Monday, July 26, 2010

Database Management System 10--SCDL

Database Management System 10:

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

 Multiple Choice Multiple Answer
  Question
Security considerations apply to
  Correct Answer
users and applications , data, database , dbms
  Your Answer
data, database , dbms , users and applications

 Select The Blank
  Question
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
  Correct Answer
Access control
  Your Answer
Access control

 Multiple Choice Multiple Answer
  Question
Advantages of Database Management System
  Correct Answer
Reduced redundancy , Sharing of data , Security
  Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for
execution and storage is less

 Multiple Choice Multiple Answer
  Question
Which of the following is a database privilege
  Correct Answer
The right to connect the database , The right to create table , The right to
select rows from another user's table
  Your Answer
The right to connect the database , The right to create table , System
programming

 True/False
  Question
You cannot grant or revoke system privileges to users and roles.
  Correct Answer
False
  Your Answer
False

 True/False
  Question
Centralised Database Management cannot support multiple users.
  Correct Answer
False
  Your Answer
False

 Match The Following
Question
Correct Answer
Your Answer
Menu driven interface
Stand alone user

Query language interface
Casual user
DBA
Programming language interface
Application user
Application user
Forms and command code
Parametric user
Storage Manager


 Multiple Choice Multiple Answer
  Question
Different syntaxes used for update command in SQL are as follows.
  Correct Answer
update
set = , update
set = where
  Your Answer
update
set = where

 Multiple Choice Multiple Answer
  Question
Some examples of select command are as following using emp_table
  Correct Answer
select * from emp; , select empno,name from emp , select empno,name from emp
where salary in(9000,10000);
  Your Answer
select * from emp; , select empno,name from emp where salary in(9000,10000);


 Multiple Choice Multiple Answer
  Question
Strong entities are also called as
  Correct Answer
dominant , Parent , owner
  Your Answer
dominant , owner

 Multiple Choice Multiple Answer
  Question
Specify any three string functions used in SQL
  Correct Answer
lower(char) , initcap(char) , upper(char)
  Your Answer
lower(char) , upper(char) , stringlength(char)

 Multiple Choice Single Answer
  Question
What will you get when Data items are grouped together.
  Correct Answer
Entity
  Your Answer
Entity

 Select The Blank
  Question
A________ mechanism that can be used to provide authorization
  Correct Answer
role
  Your Answer
role

 Multiple Choice Multiple Answer
  Question
Which of the following is a database privilege
  Correct Answer
The right to connect the database , The right to create table , The right to
select rows from another user's table
  Your Answer
The right to connect the database , The right to create table , The right to
select rows from another user's table , System programming

 Multiple Choice Single Answer
  Question
In order to implement checkpoint the log is checked :
  Correct Answer
Backwards
  Your Answer
Backwards

 Multiple Choice Single Answer
  Question
( _ ) stands for
  Correct Answer
any single character in character string
  Your Answer
any single character in character string

 True/False
  Question
A role provides authorisation.
  Correct Answer
True
  Your Answer
True

 Select The Blank
  Question
Entities are represented in ________in E-R diagram
  Correct Answer
Rectangular box
  Your Answer
square box

 True/False
  Question
The SSL protocol developed by microsoft corporation, is an industry accepted
standard for network transport layer security
  Correct Answer
False
  Your Answer
True

 Multiple Choice Single Answer
  Question
One method of protecting the privacy and integrity of a system is to place a
firewall between internet and
  Correct Answer
Public network
  Your Answer
intranet

 True/False
  Question
SQL is low level language
  Correct Answer
False
  Your Answer
True

 True/False
  Question
To update city_name to bombay following command is used. UPDATE EMP_TABLE
SET CITY='BOMBAY';
  Correct Answer
True
  Your Answer
True

 Select The Blank
  Question
________are binary computer representations of stored logical entities
  Correct Answer
Data
  Your Answer
Program

 Multiple Choice Single Answer
  Question
Degree of relationship indicates no of associated -
  Correct Answer
Entities
  Your Answer
Entities

 Multiple Choice Single Answer
  Question
To enter new field city in the table 'branch_master' following command is
used
  Correct Answer
alter table branch_master add(city varchar2(25))
  Your Answer
alter table branch_master add(city varchar2(25))

 Multiple Choice Single Answer
  Question
The set of all relationships of the same type called as
  Correct Answer
Relationship set
  Your Answer
Relationship set

 True/False
  Question
In Database management system, protection includes against hardware and
Software malfunctions and not against unauthorized access.
  Correct Answer
False
  Your Answer
False

 Select The Blank
  Question
UML additionaly provide set of ________that can be invoked to compute values
on the basis of attributes of the object
  Correct Answer
functions
  Your Answer
functions

 True/False
  Question
A role provides authorisation.
  Correct Answer
True
  Your Answer
True

 Multiple Choice Single Answer
  Question
Data can be inserted by row in a table following command can be used.
  Correct Answer
INSERT
  Your Answer
INSERT

 Select The Blank
  Question
________is a process by which the user's privileges are ascertained
  Correct Answer
Authorisation
  Your Answer
Authentication

 True/False
  Question
Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
  Correct Answer
False
  Your Answer
False

 Select The Blank
  Question
The information collected in requirement analysis stage is ________for
information modeling
  Correct Answer
input
  Your Answer
input

 Multiple Choice Multiple Answer
  Question
Attributes are classified as
  Correct Answer
Simple , Composite , Multivalued
  Your Answer
Simple , Composite , Multivalued

 Multiple Choice Single Answer
  Question
In three tier architecture, the layer which provides user interface and
interacts with the user is :
  Correct Answer
Presentation layer
  Your Answer
Presentation layer

 Match The Following
Question
Correct Answer
Your Answer
Authorisation
permission given to user
Provide authority
Previlege
Permission for accessing objects
Permission for accessing objects
Role
Provide authority
permission given to user
Integrity
hallmark of data security
hallmark of data security


 Multiple Choice Single Answer
  Question
Overheads can be reduced by is introducing :
  Correct Answer
checkpoints
  Your Answer
checkpoints

 Multiple Choice Multiple Answer
  Question
What are secured using authorisation and access control.
  Correct Answer
The intranet , local clients , opearators
  Your Answer
The intranet , the internet

 Multiple Choice Single Answer
  Question
Which type of attribute holds single value for single entity?
  Correct Answer
single valued attribute
  Your Answer
simple attribute

 Select The Blank
  Question
________regulates all user access to named objects through privileges
  Correct Answer
Discretionary access control
  Your Answer
System access control

 Multiple Choice Multiple Answer
  Question
Which of the following are object oriented features
  Correct Answer
Inheritance , Abstraction
  Your Answer
Inheritance , Polymerisation

 Multiple Choice Multiple Answer
  Question
Three levels of database service
  Correct Answer
External level , Conceptual level , Physical level
  Your Answer
External level , Conceptual level , Physical level

 Select The Blank
  Question
The most widely used conceptual model is________
  Correct Answer
E-R model
  Your Answer
E-R model

 Select The Blank
  Question
A________ mechanism that can be used to provide authorization
  Correct Answer
role
  Your Answer
role

 Select The Blank
  Question
A________is a situation,event or Personnel that will adversely affect the
database security and the smooth functioning of organization
  Correct Answer
Threat
  Your Answer
Threat

 True/False
  Question
Using database redumdancy can be removed
  Correct Answer
True
  Your Answer
True

 Multiple Choice Single Answer
  Question
What is alternative name for functions
  Correct Answer
methods
  Your Answer
programs


No comments:

Post a Comment