SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question Correct Answer Your Answer Database design model help in improving maintainability True True

Multiple Choice Single Answer Question Which of the following is not a criterion that should be considered when doing requirements analysis Correct Answer speed Your Answer consistency

True/False Question Correct Answer Your Answer

Non-updatable views are called as 'write-only-views'. False True

Multiple Choice Single Answer Question If a user is able to manipulate system resources to deny their availabilty to other users. Then this is reffered to as Correct Answer denial of service Your Answer denial of service

Multiple Choice Multiple Answer Question Which of the following are valid SQL commands. Correct Answer Your Answer ALTER , UPDATE ALTER , UPDATE , CHANGE

Multiple Choice Single Answer Question What is alternative name for functions Correct Answer Your Answer methods programs

Multiple Choice Multiple Answer Question Functions at the server end are

Page 1 of 34

SCDL – 2nd Semester – Database Management Systems
Correct Answer Your Answer Query , Transaction Query , Transaction , Application Program

Multiple Choice Multiple Answer Question There are two kinds of tables Correct Answer Your Answer base tables , views base tables , views

Select The Blank Question Correct Answer Your Answer

Entities are represented in ________in E-R diagram Rectangular box oval box

True/False Question Correct Answer Your Answer

A relational model relates records by the value that they contain. True True

Match The Following Question Data files Person who design and implement Database management system modules Person who design and implement tools Person responsible for running and maintenance of Hardware and Software in a Database True/False Question Correct Answer Your Answer

Correct Answer Stores the database itself Database Management system designers and implementers Tool developers Operators and maintenance personal

Your Answer Stores the database itself Database Management system designers and implementers Tool developers Operators and maintenance personal

The database is partitioned into some number of fixed length block called as pages. True True

Multiple Choice Multiple Answer

Page 2 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer The different types of database users Security officers , Database administrators , Network administrators Security officers , Database administrators , Database operators

Select The Blank Question Correct Answer Your Answer

________are used to find and steal user names and passwords Packet sniffers Network sniffers

True/False Question Correct Answer Your Answer

If company policy does not support more than 100 employees in a department . So Dept-Emp relationship is "one to many relationship" True True

Multiple Choice Single Answer Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL Correct Answer Your Answer CURE CURE

Multiple Choice Single Answer Question If each role granted to a user is either Correct Answer Your Answer enabled or disabled enabled only

Select The Blank Question Correct Answer Your Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions Data

Multiple Choice Single Answer Question Write a function which returns number of rows in the tables including duplicates Correct Answer count(*)

Page 3 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer count(*)

Select The Blank Question Correct Answer Your Answer

The query language defined by Donald Chamberlain is called as________ Structured English Query Language System R

Select The Blank Question Correct Answer Your Answer

A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization Threat Threat

Multiple Choice Multiple Answer Question Some clauses of Revoke command are as follows Correct Answer Your Answer FROM , ON FROM , ON

True/False Question Correct Answer Your Answer

SQL is low level language False True

Multiple Choice Single Answer Question A person who has control over system is called as Correct Answer Your Answer Database administrator Database administrator

Multiple Choice Multiple Answer Question Major difficulties in referring to the log is : Correct Answer Your Answer Time Consuming , Redoing transactions which have already written their updates to the database Time Consuming , Redoing transactions which have already written their updates to the database , Rechecking the log time and again

Multiple Choice Multiple Answer

Page 4 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer Types of indexes are Unique indexes , multiple inedexes , Composite indexes Composite indexes , Unique indexes

Multiple Choice Multiple Answer Question Different E-R modelling styles are Correct Answer Your Answer Crow's foot , Rein 85 , IDEFIX Crow's foot , Rein 85 , IDEFIX , Functions

Multiple Choice Multiple Answer Question Reasons of creation of views Correct Answer Your Answer When data security is required , When data redundancy is to be kept to minimum. When data security is required , When data redundancy is to be kept to minimum.

True/False Question Correct Answer Your Answer

You cannot grant or revoke system privileges to users and roles. False False

Multiple Choice Single Answer Question A collection of pages is called as : Correct Answer Your Answer Page table Index table

True/False Question Correct Answer Your Answer

The most widely used conceptual model is entity relationship model True True

True/False Question Correct Answer

A revoke command is used to take away a privilege that was granted True

Page 5 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer True

Multiple Choice Single Answer Question Write command to grant UPDATE authority on catalog table to user John Correct Answer Your Answer GRANT UPDATE ON CATALOG TO JOHN GRANT UPDATE ON CATALOG TO JOHN

Multiple Choice Multiple Answer Question Block movements between disk and main memory are initiated through 2 operations namely: Correct Answer Input , Output Your Answer Input , Output

Select The Blank Question Correct Answer Your Answer

________is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based Security Security

Match The Following Question E-R diagram Use case Activity diagrams Implementation diagram

Correct Answer Similar to class diagram Interaction between users and system Flow of tasks between components System components and their connection

Your Answer System components and their connection Interaction between users and system Flow of tasks between components Interaction between hardware and software

Select The Blank Question Correct Answer Your Answer

Database design model helps in improving________ maintainability data design

Multiple Choice Multiple Answer Question Security considerations apply to Correct Answer data, database , dbms , users and applications

Page 6 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer data, database , users and applications , variant

Select The Blank Question Correct Answer Your Answer

________published the paper "Relational Model of Data for Large Shared Data Banks " F.Codd Leon

True/False Question Correct Answer Your Answer

Transactions are not allowed to perform any update actions while checkpoint is in progress. True False

Select The Blank Question Correct Answer Your Answer

Data types CHARACTER AND CHARACTER VARYING are known collectively as ________ Character string data types Character data types

Multiple Choice Multiple Answer Question Which of the following are functions of DBA Correct Answer Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Multiple Choice Single Answer Question (%) stands for Correct Answer Your Answer Sequence of n characters in character string Single character in character string

Multiple Choice Single Answer Question A database must be prtotected against Correct Answer Your Answer viruses modification

Select The Blank

Page 7 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language ANSI American national std institute ANSI American national std institute

Multiple Choice Single Answer Question Write a syntax of SELECT which shows unique records only. Correct Answer Your Answer Select The Blank Question Correct Answer Your Answer SELECT DISTINCT * FROM SELECT DISTINCT * FROM

Enitity name is written in ________in E-R diagram upper case underline

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 8 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer Role A cannot be granted to role B

Multiple Choice Multiple Answer Question Some clauses of Revoke command are as follows Correct Answer Your Answer FROM , ON FROM , ON

True/False Question Correct Answer Your Answer

Log contains partial record of all database activity. False False

True/False Question Correct Answer Your Answer

Security is important issue in database management . True True

Select The Blank Question In________there is no security of data Correct Answer Your Answer DBMS DBMS

Select The Blank Question ________is a process by which user's identity is checked Correct Answer Your Answer Authentication Authentication

True/False Question Correct Answer Your Answer

A revoke command is used to take away a privilege that was granted True True

Multiple Choice Single Answer Question When two entities are associated then the relationship exists is called : Correct Answer binary relationship

Page 9 of 34

SCDL – 2nd Semester – Database Management Systems
Match the following 1. ADD_MONTH(D,N) 2. NEXT_DAY(DATE,CHAR) 3. LAST_DAY(D) 4. MONTHS_BETWEEN(D1,D2)

1. RETURNS DATE AFTER ADDING THE NUMBER OF MONTHS SPECIFIED . 2. returns year of the date which is passed. 3. returns number of months between d1 and d2. 4. RETURNS DATE AFTER ADDING THE NUMBER OF MONTHS SPECIFIED . 5. returns the date offirst weekday named by charthat is after the date named by date. 6. returns no of days between months d1 and d2. LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 10 of 34

SCDL – 2nd Semester – Database Management Systems

Multiple Choice Multiple Answer Question Security considerations apply to Correct Answer Your Answer users and applications , data, database , dbms data, database , dbms , users and applications

Select The Blank Question Correct Answer Your Answer

________is the process by which the user's access to physical data in the application is limited, based on his privileges. Access control Access control

Multiple Choice Multiple Answer Question Advantages of Database Management System Correct Answer Your Answer Reduced redundancy , Sharing of data , Security Reduced redundancy , Sharing of data , Security , Work Space required for execution and storage is less

Multiple Choice Multiple Answer Question Which of the following is a database privilege Correct Answer Your Answer The right to connect the database , The right to create table , The right to select rows from another user's table The right to connect the database , The right to create table , System programming

True/False Question Correct Answer Your Answer

You cannot grant or revoke system privileges to users and roles. False False

True/False Question Correct Answer Your Answer

Centralised Database Management cannot support multiple users. False False

Match The Following Question Menu driven interface Query language interface

Correct Answer Stand alone user Casual user

Your Answer

DBA

Page 11 of 34

SCDL – 2nd Semester – Database Management Systems

Multiple Choice Multiple Answer Question Some examples of select command are as following using emp_table Correct Answer Your Answer select * from emp; , select empno,name from emp , select empno,name from emp where salary in(9000,10000); select * from emp; , select empno,name from emp where salary in(9000,10000);

Multiple Choice Multiple Answer Question Strong entities are also called as Correct Answer Your Answer dominant , Parent , owner dominant , owner

Multiple Choice Multiple Answer Question Specify any three string functions used in SQL Correct Answer Your Answer lower(char) , initcap(char) , upper(char) lower(char) , upper(char) , stringlength(char)

Multiple Choice Single Answer Question What will you get when Data items are grouped together. Correct Answer Your Answer Entity Entity

Select The Blank Question Correct Answer Your Answer

A________ mechanism that can be used to provide authorization role role

Multiple Choice Multiple Answer Question Which of the following is a database privilege Correct Answer Your Answer The right to connect the database , The right to create table , The right to select rows from another user's table The right to connect the database , The right to create table , The right to select rows from another user's table , System programming

Multiple Choice Single Answer Question In order to implement checkpoint the log is checked :

Page 12 of 34

SCDL – 2nd Semester – Database Management Systems
Correct Answer Your Answer Backwards Backwards

Multiple Choice Single Answer Question ( _ ) stands for Correct Answer Your Answer any single character in character string any single character in character string

True/False Question Correct Answer Your Answer

A role provides authorisation. True True

Select The Blank Question Correct Answer Your Answer

Entities are represented in ________in E-R diagram Rectangular box square box

True/False Question Correct Answer Your Answer

The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security False True

Multiple Choice Single Answer Question One method of protecting the privacy and integrity of a system is to place a firewall between internet and Correct Answer Public network Your Answer intranet

True/False Question Correct Answer Your Answer

SQL is low level language False True

Page 13 of 34

SCDL – 2nd Semester – Database Management Systems
True/False Question Correct Answer Your Answer

To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY'; True True

Select The Blank Question Correct Answer Your Answer

________are binary computer representations of stored logical entities Data Program

Multiple Choice Single Answer Question Degree of relationship indicates no of associated Correct Answer Your Answer Entities Entities

Multiple Choice Single Answer Question To enter new field city in the table 'branch_master' following command is used Correct Answer Your Answer alter table branch_master add(city varchar2(25)) alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer Question The set of all relationships of the same type called as Correct Answer Your Answer Relationship set Relationship set

True/False Question Correct Answer Your Answer

In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. False False

Select The Blank Question Correct Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions

Page 14 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer functions

True/False Question Correct Answer Your Answer

A role provides authorisation. True True

Multiple Choice Single Answer Question Data can be inserted by row in a table following command can be used. Correct Answer Your Answer INSERT INSERT

Select The Blank Question Correct Answer Your Answer

________is a process by which the user's privileges are ascertained Authorisation Authentication

True/False Question Correct Answer Your Answer

Logical 'OR' operator returns true if both component conditions are true otherwise returns false False False

Select The Blank Question Correct Answer Your Answer

The information collected in requirement analysis stage is ________for information modeling input input

Multiple Choice Multiple Answer Question Attributes are classified as Correct Answer Your Answer Simple , Composite , Multivalued Simple , Composite , Multivalued

Multiple Choice Single Answer

Page 15 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer In three tier architecture, the layer which provides user interface and interacts with the user is : Presentation layer Presentation layer

Match The Following Question Authorisation Previlege Role Integrity

Correct Answer permission given to user Permission for accessing objects Provide authority hallmark of data security

Your Answer Provide authority Permission for accessing objects permission given to user hallmark of data security

Multiple Choice Single Answer Question Overheads can be reduced by is introducing : Correct Answer Your Answer checkpoints checkpoints

Multiple Choice Multiple Answer Question What are secured using authorisation and access control. Correct Answer Your Answer The intranet , local clients , opearators The intranet , the internet

Multiple Choice Single Answer Question Which type of attribute holds single value for single entity? Correct Answer Your Answer single valued attribute simple attribute

Select The Blank Question Correct Answer Your Answer

________regulates all user access to named objects through privileges Discretionary access control System access control

Multiple Choice Multiple Answer

Page 16 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer Which of the following are object oriented features Inheritance , Abstraction Inheritance , Polymerisation

Multiple Choice Multiple Answer Question Three levels of database service Correct Answer Your Answer External level , Conceptual level , Physical level External level , Conceptual level , Physical level

Select The Blank Question Correct Answer Your Answer

The most widely used conceptual model is________ E-R model E-R model

Select The Blank Question Correct Answer Your Answer

A________ mechanism that can be used to provide authorization role role

Select The Blank Question Correct Answer Your Answer

A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization Threat Threat

True/False Question Correct Answer Your Answer

Using database redumdancy can be removed True True

Multiple Choice Single Answer Question What is alternative name for functions Correct Answer methods

Page 17 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer programs

Multiple Choice Multiple Answer Question Different syntaxes used for update command in SQL are as follows. Correct Answer update set = , update set = where update set = where

Your Answer

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 18 of 34

SCDL – 2nd Semester – Database Management Systems

Select The Blank Question Correct Answer Your Answer

In________there is no security of data DBMS DBMS

Multiple Choice Multiple Answer Question A Database Management System has several subsystems Correct Answer Your Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem

Select The Blank Question Correct Answer Your Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions functions

Select The Blank Question Correct Answer Your Answer

In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language ANSI American national std institute ANSI American national std institute

Multiple Choice Multiple Answer Question The different types of database users Correct Answer Your Answer Security officers , Database administrators , Network administrators Database administrators , Database operators

Select The Blank Question Correct Answer Your Answer

Each attribute is associted with set of values called as________ Domain Relation

Multiple Choice Single Answer Question Access to a database can be controlled using Correct Answer Your Answer Access Privilages Access control

Page 19 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question Correct Answer Your Answer

In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. False False

Multiple Choice Multiple Answer Question Correct Answer Your Answer

The functions of Database adminstrator are Authorization for data access , Schema definition , Maintenance of Database Authorization for data access , Maintenance of Database

Multiple Choice Single Answer Question Correct Answer Your Answer

What expresses the specific number of entity occurances associated with one occurance of related entity? Cardinality Cardinality

Multiple Choice Multiple Answer Question Correct Answer Your Answer

Write examples of dbms Foxbase , foxpro Foxbase , foxpro

Select The Blank

Page 20 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer ________is a process by which the user's privileges are ascertained Authorisation Authorisation

Multiple Choice Single Answer Question Correct Answer Your Answer

What operation is used to protect data from corruption and deletion . Data integrity Data integrity

Multiple Choice Multiple Answer Question Correct Answer Your Answer

What can be used to manage databases data integrity rule Integrity constraints , Database triggers Integrity constraints , Database triggers

Multiple Choice Single Answer Question Correct Answer Your Answer

The set of all entities of the same type called as entity set entity set

Select The Blank Question Correct Answer Your Answer

Enitity name is written in ________in E-R diagram upper case upper case

Select The Blank Question Correct Answer Your Answer

The first commercial RDBMS was ________from Relational Software Inc. ORACLE ORACLE

Select The Blank Question Correct Answer Your Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions functions

Page 21 of 34

SCDL – 2nd Semester – Database Management Systems

True/False Question Correct Answer Your Answer

You cannot grant or revoke system privileges to users and roles. False True

Multiple Choice Single Answer Question Correct Answer Your Answer

Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm' select * from book where bookname like '_m%' select * from book where bookname like '_m%'

Select The Blank Question Correct Answer Your Answer

In________there is no security of data DBMS DBMS

Select The Blank Question Correct Answer Your Answer

File is collection of ________ records records

Multiple Choice Single Answer Question Correct Answer Your Answer

The set of all relationships of the same type called as Relationship set Relationship set

Select The Blank Question Correct Answer Your Answer

________are collection of instructions for manipulating data program program

Multiple Choice Multiple Answer Question Correct Answer

Which of the following are valid SQL commands. ALTER , UPDATE

Page 22 of 34

SCDL – 2nd Semester – Database Management Systems
Your Answer ALTER , UPDATE

Multiple Choice Single Answer Question Correct Answer Your Answer

DDL stands for Data definition language Data definition language

Multiple Choice Single Answer Question Correct Answer Your Answer

A person who has control over system is called as Database administrator Database administrator

Multiple Choice Multiple Answer Question Correct Answer Your Answer

What are secured using authorisation and access control. The intranet , local clients , opearators The intranet , local clients , opearators

Multiple Choice Single Answer Question Correct Answer Your Answer

What is nothing but refined data Information Information

True/False Question Correct Answer Your Answer

A database may include varieties of data that are interrelated in many ways. True True

Multiple Choice Multiple Answer Question Correct Answer Your Answer

Which of the following are functions of DBA Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Select The Blank

Page 23 of 34

SCDL – 2nd Semester – Database Management Systems
Question Correct Answer Your Answer SQL as a language is________of the way it is implemented internally. independent independent

Multiple Choice Multiple Answer Question Correct Answer Your Answer

Attributes are classified as Simple , Composite , Multivalued Simple , Composite , Multivalued

Match The Following Question select * from where

Correct Answer Views all columns in sorting ording by specified column_name

Your Answer Views all columns in sorting ording by specified column_name

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 24 of 34

SCDL – 2nd Semester – Database Management Systems
Question Functions at the server end are

Correct Answer Query , Transaction Your Answer Query , Transaction

Select The Blank Question Data types BIT and BIT VARYING are known as ________ Correct Answer Bit string data types Your Answer Bit string data types

True/False Question

Logical data independence is the capacity to change conceptual schema without having to change external schema. Correct Answer True Your Answer True

Multiple Choice Single Answer Question The set of all relationships of the same type called as Correct Answer Relationship set Your Answer Relationship set

Match The Following Question E-R diagram Use case Activity diagrams Implementation diagram

Correct Answer Similar to class diagram

Your Answer Similar to class diagram

Interaction between users and Interaction between users and system system Flow of tasks between components Flow of tasks between components System components and their connection System components and their connection

Multiple Choice Single Answer Question Which of the following is high level data model Correct Answer Entity-Relationship model Your Answer Entity-Relationship model

Multiple Choice Single Answer Question In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships? Correct Answer Line

Page 25 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 26 of 34

SCDL – 2nd Semester – Database Management Systems

Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer DBMS

Multiple Choice Multiple Answer Question A Database Management System has several subsystems Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem Select The Blank Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object Correct Answer functions Your Answer functions

Select The Blank Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language Correct Answer ANSI American national std institute Your Answer ANSI American national std institute

Multiple Choice Multiple Answer Question The different types of database users Correct Answer Security officers , Database administrators , Network administrators Your Answer Database administrators , Database operators

Select The Blank Question Each attribute is associted with set of values called as________ Correct Answer Domain Your Answer Relation

Multiple Choice Single Answer Question Access to a database can be controlled using Correct Answer Access Privilages Your Answer Access control

Page 27 of 34

SCDL – 2nd Semester – Database Management Systems

Page 28 of 34

SCDL – 2nd Semester – Database Management Systems
LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 29 of 34

SCDL – 2nd Semester – Database Management Systems
Database design conversion into computer usable must know form entities,relation,attributes

True/False Question

Codd developed E-R model

Correct Answer False Your Answer False

Select The Blank Question ________means data is protected from deletion and corruption, both while it resides within database Correct Answer Data integrity Your Answer Data integrity

Multiple Choice Single Answer Question Write output of following example SELECT LOWER('JOHN') FROM DUAL; Correct Answer john Your Answer john

Multiple Choice Multiple Answer Question The levels of abstraction of data are Correct Answer Physical level , Logical level , View level Your Answer Physical level , Logical level

Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer Data integrity

Select The Blank Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges. Correct Answer Access control Your Answer Access control

Multiple Choice Single Answer Question An example of non-volatile storage is : Correct Answer Magnetic Tapes

Page 30 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 31 of 34

SCDL – 2nd Semester – Database Management Systems

True/False Question

In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. Correct Answer False Your Answer False

Multiple Choice Multiple Answer Question The functions of Database adminstrator are Correct Answer Authorization for data access , Schema definition , Maintenance of Database Your Answer Authorization for data access , Maintenance of Database

Multiple Choice Single Answer Question What expresses the specific number of entity occurances associated with one occurance of related entity? Correct Answer Cardinality Your Answer Cardinality

Multiple Choice Multiple Answer Question Write examples of dbms Correct Answer Foxbase , foxpro Your Answer Foxbase , foxpro

Select The Blank Question ________is a process by which the user's privileges are ascertained Correct Answer Authorisation Your Answer Authorisation

Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer Data integrity

Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer Integrity constraints , Database triggers

Page 32 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question The different types of database users Correct Answer Your Answer Network administrators , Security officers , Database administrators Network administrators , Security officers , Database administrators

Multiple Choice Multiple Answer Question The front end of database consists of tools such as Correct Answer Your Answer Forms , Query evaluators , Graphical user interfaces Forms , Query evaluators , Graphical user interfaces

True/False Question Correct Answer Your Answer

The determination of information requirements for an application doesnot play a crucial role in the selection of an actual database structural data model. False False

Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Your Answer Integrity constraints , Database triggers Integrity constraints , Database triggers

Match The Following Question

Correct Answer

Your Answer

Page 33 of 34

SCDL – 2nd Semester – Database Management Systems
select * from order by Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question The different types of database users Correct Answer Network administrators , Security officers , Database administrators Your Answer Network administrators , Security officers , Database administrators

Multiple Choice Multiple Answer Question The front end of database consists of tools such as Correct Answer Forms , Query evaluators , Graphical user interfaces Your Answer Forms , Query evaluators , Graphical user interfaces

True/False Question

The determination of information requirements for an application doesnot play a crucial role in the selection of an actual database structural data model. Correct Answer False Your Answer False

Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer Integrity constraints , Database triggers

Page 34 of 34

Sign up to vote on this title
UsefulNot useful