You are on page 1of 125

1) Which of the following is not a characteristic of a relational database model?

A. Table

B. Tree like structure

C. Complex logical relationship

D. Records

2) Field is otherwise called as ......... of the record

A. data item

B. data type

C. value

D. variable

3) A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

4) A field can be called as ........... in relation context.

A. random file

B. direct file

C. attribute

D. tuple

5) In the relational modes, cardinality is termed as

A. Number of tuples

B. Number of attributes
C. Number of tables

D. Number of constraints

6) The ........ is used for creating and destroying table, indexes and other forms of structures.

A. data manipulation language

B. data control language

C. transaction control language

D. data definition language

7) The view of total database content is

A. Conceptual view

B. Internal view

C. External view

D. Physical view

8) The ............ refers to the way data is organized in and accessible from DBMS.

A. database hierarchy

B. data organization

C. data sharing

D. data model

9) Architecture of the database can be viewed as

A. two levels

B. four levels

C. three levels

D. one level

10) ........ introduced the relational database rules.


A. Atul kahate

B. James Gossling

C. EF Codd

D. Dennies Rithchie

11) In a relational model, relations are termed as

A. Tuples

B. Attributes

C. Tables

D. Rows

12) When the values in one or more attributes being used as a foreign key must exist in another set of one or
more attributes in another table, we have created a(n) ........

A. transitive dependency

B. insertion anomaly

C. referential integrity constraint

D. normal form

13) In the architecture of a database system external level is the

A. physical level

B. logical level

C. conceptual level

D. view level

14) A functional dependency is a relationship between or among .......

A. tables

B. rows
C. relations

D. attributes

15) Related fields in a database are grouped to form a

A. data file

B. data record

C. menu

D. bank

16) .......... is, a table have more than one set of attributes that could be chosen as the key

A. foreign key

B. integrity key

C. relationship

D. candidate key

17) The database environment has all of the following components except.

A. users

B. separate files

C. database

D. database administrator

18) The operation of eliminating columns in a table done by ........ operation.

A. Restrict

B. Project

C. Union

D. Divide

19) The way a particular application views the data from the database that the application uses is a
A. module

B. relational model

C. schema

D. sub schema

20) ....... is a condition specified on a database schema and restricts the data that can be stored in an instance
of the database.

A. Key Constraint

B. Check Constraint

C. Foreign key constraint

D. integrity constraint

Answers:

1) B. Tree like structure


2) A. data item
3) D. Primary key
4) C. attribute
5) A. Number of tuples
6) D. data definition language
7) A. Conceptual view
8) D. data model
9) C. three levels
10) C. EF Codd
11) C. Tables
12) C. referential integrity constraint
13) D. view level
14) D. attributes
15) B. data record
16) D. candidate key
17) A. users
18) B. Project
19) D. sub schema
20) B. Check Constraint

1. ............... joins are SQL server default

A) Outer
B) Inner

C) Equi

D) None of the above

2. The ..................... is essentially used to search for patterns in target string.

A) Like Predicate

B) Null Predicate

C) In Predicate

D) Out Predicate

3. Which of the following is/are the Database server functions?


i) Data management ii) Transaction management
iii) Compile queries iv) Query optimization

A) i, ii, and iv only

B) i, ii and iii only

C) ii, iii and iv only

D) All i, ii, iii, and iv

4. To delete a database ................... command is used

A) delete database database_name

B) Delete database_name

C) drop database database_name

D) drop database_name

5. .............. is a combination of two of more attributes used as a primary key

A) Composite Key

B) Alternate Key

C) Candidate Key

D) Foreign Key

6. Which of the following is not the function of client?

A) Compile queries

B) Query optimization

C) Receive queries

D) Result formatting and presentation


7. ............. is a special type of stored procedure that is automatically invoked whenever the data in the table is
modified.

A) Procedure

B) Trigger

C) Curser

D) None of the above

8. ................. requires that data should be made available to only authorized users.

A) Data integrity

B) Privacy

C) Security

D) None of the above

9. Some of the utilities of DBMS are .............


i) Loading ii) Backup iii) File organization iv) Process Organization

A) i, ii, and iv only

B) i, ii and iii only

C) ii, iii and iv only

D) All i, ii, iii, and iv

10. ................. allows individual row operation to be performed on a given result set or on the generated by a
selected by a selected statement.

A) Procedure

B) Trigger

C) Curser

D) None of above

Answers:

1. B) Inner
2. A) Like Predicate
3. A) i, ii, and iv only
4. C) drop ....database_name
5. A) Composite Key
6. B) Query optimization
7. B) Trigger
8. C) Security
9. B) i, ii and iii only
10. C) Curser

2. 1. Processed data is called ………………..

A) Raw data

B) Information

C) Useful data

D) Source

2. …………….. is a utility to capture a continuous record of server activity and provide auditing capability.

A) SQL server Profile

B) SQL server service manager

C) SQL server setup

D) SQL server wizard.

3. Data items grouped together for storage purposes are called a

A) record

B) title

C) list

D) string

4. …………. contains data assisting day to day activities of the organization.

A) Control database

B) Operational database

C) Strategic database

D) Sequential database

5. ………………… approach reduces time and effort required for design and lesser risk in database
management.

A) Single global database

B) Top-down approach

C) Multiple databases

D) None of the above

6. HSAM stands for ……….


A) Hierarchic Sequential Access Method

B) Hierarchic Standard Access Method

C) Hierarchic Sequential and Method

D) Hierarchic Standard and Method

7. SQL server stores index information in the ………… system table

A) syst indexes

B) system indexes

C) sysind

D) sys indexes

8. The one guideline to be followed while designing the database is

A) A database design may be ambiguous.

B) Unrelated data should be in the same table so that updating the data will be easy.

C) It should avoid/reduce the redundancy.

D) An entity should not have attributes.

9. Which of the following is not a logical database structure?

A) Chain

B) Network

C) Tree

D) Relational

10. ……………. is a preferred method for enforcing data integrity

A) Constraints

B) Stored procedure

C) Triggers

D) Cursors

3. Answers:
4. 1. B) Information
2. B) SQL server service manager
3. A) record
4. B) Operational database
5. C) Multiple databases
6. A) Hierarchic Sequential Access Method
7. D) sys indexes
8. C) It should avoid/reduce the redundancy.
9. A) Chain
10. A) Constraints

1. Processed data is called ………………..

A) Raw data

B) Information

C) Useful data

D) Source

2. …………….. is a utility to capture a continuous record of server activity and provide auditing capability.

A) SQL server Profile

B) SQL server service manager

C) SQL server setup

D) SQL server wizard.

3. Data items grouped together for storage purposes are called a

A) record

B) title

C) list

D) string

4. …………. contains data assisting day to day activities of the organization.

A) Control database

B) Operational database

C) Strategic database

D) Sequential database

5. ………………… approach reduces time and effort required for design and lesser risk in database
management.

A) Single global database

B) Top-down approach

C) Multiple databases

D) None of the above


6. HSAM stands for ……….

A) Hierarchic Sequential Access Method

B) Hierarchic Standard Access Method

C) Hierarchic Sequential and Method

D) Hierarchic Standard and Method

7. SQL server stores index information in the ………… system table

A) syst indexes

B) system indexes

C) sysind

D) sys indexes

8. The one guideline to be followed while designing the database is

A) A database design may be ambiguous.

B) Unrelated data should be in the same table so that updating the data will be easy.

C) It should avoid/reduce the redundancy.

D) An entity should not have attributes.

9. Which of the following is not a logical database structure?

A) Chain

B) Network

C) Tree

D) Relational

10. ……………. is a preferred method for enforcing data integrity

A) Constraints

B) Stored procedure

C) Triggers

D) Cursors

5. Answers:
6. 1. B) Information
2. B) SQL server service manager
3. A) record
4. B) Operational database
5. C) Multiple databases
6. A) Hierarchic Sequential Access Method
7. D) sys indexes
8. C) It should avoid/reduce the redundancy.
9. A) Chain
10. A) Constraints

Database Design::::

1) What is a data integrity?

A. It is the data contained in database that is non redundant.

B. It is the data contained in database that is accurate and consistent.

C. It is the data contained in database that is secured.

D. It is the data contained in database that is shared.

2) As per equivalence rules for query transformation, selection operation distributes over

A. Union

B. Intersection

C. Set difference

D. All of the above

3) In SQL the word 'natural' can be used with

A. inner join

B. full outer join

C. right outer join

D. all of the above

4) Which of the following relational algebraic operations is not from set theory?

A. Union

B. Intersection

C. Cartesian Product

D. Select

5) An entity set that does not have sufficient attributes to form a primary key is a

A. strong entity set


B. weak entity set

C. simple entity set

D. primary entity set

6) In case of entity integrity, the primary key may be

A. not Null

B. Null

C. both Null and not Null

D. any value

7) A logical schema

A. is the entire database.

B. is a standard way of organizing information into accessible parts.

C. describes how data is actually stored on disk

D. both A and C

8) Which of the operations constitute a basic set of operations for manipulating relational data?

A. Predicate calculus

B. Relational calculus

C. Relational algebra

D. None of the above

9) Which of the following is another name for weak entity?

A. Child

B. Owner

C. Dominant

D. All of the above

10) Which of the following is record based logical model?

A. Network Model

B. Object oriented model

C. E-R model

D. None of the above


11) A file manipulation command that extracts some of the records from a file is called

A. SELECT

B. PROJECT

C. JOIN

D. PRODUCT

12) In E-R Diagram derived attribute are represented by

A. Ellipse

B. Dashed ellipse

C. Rectangle

D. Triangle

13) The natural join is equal to

A. Cartesian Product

B. Combination of Union and Cartesian product

C. Combination of selection and Cartesian product

D. Combination of projection and Cartesian product

14) In E-R diagram relationship type is represented by

A. Ellipse

B. Dashed ellipse

C. Rectangle

D. Diamond

15) In E-R diagram generalization is represented by

A. Ellipse

B. Dashed ellipse

C. Rectangle

D. Triangle

16) A table joined with itself is called

A. Join

B. Self Join
C. Outer Join

D. Equi Join

17) ........... means multiple copies of the same data items.

A. Data reduction

B. Data integrity

C. Data consistency

D. Data redundancy

18) Different values for the same data item is referred to as .......

A. data consistency

B. data inconsistency

C. data integrity

D. data duplication

19) The .......... returns row after combining two tables based on common values.

A. difference

B. product

C. join

D. union

20) The .......... can be used to ensure database integrity.

A. entity integrity

B. database constraints

C. referential integrity

D. cardinality

Answers:

1) B. It is the data contained in database that is accurate and consistent.


2) All of the above
3) A. inner join
4) D. Select
5) B. weak entity set
6) A. not Null
7) A. is the entire database.
8) C. Relational algebra
9) Child
10) A. Network Model
11) A. SELECT
12) B. Dashed ellipse
13) D. Combination of projection and Cartesian product
14) D. Diamond
15) D. Triangle
16) B. Self Join
17) D. Data redundancy
18) B. data inconsistency
19) C. join
20) B. database constraints
2) 1. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT
statements in a single transaction?

SQL database icon


with shortcut
identification
(Photo
credit:Wikipedia)
3)

A) CREATE PACKAGE

B) CREATE SCHEMA

C) CREATE CLUSTER

A) All of the above


4)
5)

2. In SQL, the CREATE TABLESPACE is used

A) to create a place in the database for storage of scheme objects, rollback segments, and naming the
data files to comprise the tablespace.

B) to create a database trigger.

C) to add/rename data files, to change storage

D) All of the above


6)
3. Which character function can be used to return a specified portion of a character string?

A) INSTR

B) SUBSTRING

C) SUBSTR

D) POS
7)
8)
4. Which of the following is TRUE for the System Variable $date$?

A) Can be assigned to a global variable.

B) Can be assigned to any field only during design time.

C) Can be assigned to any variable or field during run time.

D) Can be assigned to a local variable.

5. What are the different events in Triggers?

A) Define, Create

B) Drop, Comment

C) Insert, Update, Delete

D) Select, Commit

6. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including
tables?

A) Data Definition Language

B) Data Manipulation Language

C) Data Described Language

D) Data Retrieval Language


7. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints

A) 6789

B) 2345

C) 1234

D) 456789

8. Which of the following SQL command can be used to modify existing data in a database table?

A) MODIFY

B) UPDATE

C) CHANGE

D) NEW

9. When SQL statements are embedded inside 3GL, we call such a program as ..........

A) nested query

B) nested programming

C) distinct query

D) embedded SQL

10. ................ provides option for entering SQL queries as execution time, rather than at the
development stage.

A) PL/SQL

B) SQL*Plus

C) SQL

D) Dynamic SQL

9) Answers:
10)

1. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT
statements in a single transaction?

B) CREATE SCHEMA

2. In SQL, the CREATE TABLESPACE is used

A) to create a place in the database for storage of scheme objects, rollback segments, and naming the
data files to comprise the tablespace.

3. Which character function can be used to return a specified portion of a character string?

C) SUBSTR

4. Which of the following is TRUE for the System Variable $date$?

B) Can be assigned to any field only during design time.

5. What are the different events in Triggers?

C) Insert, Update, Delete

6. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including
tables?

A) Data Definition Language

7. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints

B) 2345

8. Which of the following SQL command can be used to modify existing data in a database table?

B) UPDATE

9. When SQL statements are embedded inside 3GL, we call such a program as ..........

D) embedded SQL

10. ................ provides option for entering SQL queries as execution time, rather than at the
development stage.

D) Dynamic SQL

Multiple Choice Questions from Database Management System


1. Mechanism developed to enforce users to enter data in required format is:

a. Data validation

b. Input mask

c. Criteria

d. Data verification

2. The raw facts and figures are:

a. Data

b. Information

c. Snapshot

d. Reports

3. The feature that database allows to access only certain records in database is:

a. Forms

b. Reports

c. Queries

d. Tables

4. Which filter method lets you filter the records that match the selected field?

a. Filter by form

b. Filter by selection

c. Auto filter

d. Advanced filter

5. Which filter method lets you filter records based on criterion you specify?

a. Filter by form

b. Filter by selection

c. Auto filter

d. Advanced filter

6. You can find Sort & Filter group of commands in

a. Home ribbon
b. Create ribbon

c. Database tools ribbon

d. Fields ribbon

7. Which of the following filter method is not available in Access?

a. Filter by selection

b. Filter by form

c. Advanced filter

d. None of above

8. By Grouped Report you understand

a. Type of report generated by the Report Wizard

b. Type of report that present records sorted in ascending or descending order as you specify

c. Type of report that displays data grouped by fields you specified

d. None of above

9. The text you typed in Description column in Table Design View is displayed on

a. Description bar in forms

b. Report Footer when printed

c. Title bar of MS Access while entering data

d. Status bar while entering data

10. What is the maximum allowed field size for Boolean (Yes/No) fields?

a. 1

b. 8

c. 50

d. 255

11. What is the size of Data & Time field type?

a. 1

b. 8

c. 255
d. 50

12. Which of the following field type can store maximum data?

a. Yes/No fields

b. Date/Time fields

c. Text fields

d. Memo fields

13. To display associated record from related table in datasheet view, you can

a. Double click the record

b. Apply filter by form command

c. Single click on expand indicator (+) next to the record

d. Double click on expand indicator (+) next to the record

14. Arrange according to the size

a. Record, field, byte, bit

b. Bit, field, byte, record

c. Field, byte, record, bit

d. Byte, bit, record, field

15. What type of relationship exists between a Student table and Fees table?

a. One to one

b. One to many

c. Many to many

d. One to many and many to many

16. Identify the relationship between a Movie table and Stars table:

a. One to one

b. One to many

c. Many to many

d. None of above
17. What type of relationship exists between a Teacher table and Class table?

a. One to many

b. Many to many

c. One to one

d. Two to two

18. Which of following relationship type is not possible to realize in Access Database directly?

a. One to one

b. One to many

c. Many to many

d. None of above

19. For which kind of relationship you need a junction table to reflect real world situation?

a. One to one

b. One to many

c. Many to many

d. None of above

20. What do you need if you should enforce many-to-many relationship between two tables?

a. Parent table

b. Child table

c. Junction table

d. Many-to-many relationship can't be created in database

21. You can display data from multiple tables by using

a. Page break

b. Sub form

c. Columnar form

d. Tabular form

22. What is the best data type for a field that stores mobile numbers?

a. Text
b. Number

c. Date/Time

d. Memo

23. What field type is best to store serial numbers?

a. Number

b. AutoNumber

c. Text

d. Memo

24. Which of the following field type is used to store photograph of employees?

a. Memo

b. Picture

c. OLE

d. Photo

25. Which of the following method can be used to add more tables in a database?

a. Design View

b. Table Wizard

c. By Entering Data

d. All of above

26. From which version Microsoft introduced Backstage View for Access Interface?

a. Access 2003

b. Access 2007

c. Access 2010

d. Access does not have Backstage View

27. You can display Backstage View by clicking on

a. File menu

b. Home tab

c. Control box
d. Quick Access Toolbar

28. Why do you pin an item in list?

a. To mark it to delete from list

b. To move it up and make it always available

c. To make it default database when you open Access

d. None of above

29. The options like Save, Open Database, Print are available in

a. Home tab

b. Backstage View tab

c. File menu

d. Database Tools tab

30. What is relational database?

a. A place to store relational information

b. A database that is related to other databases

c. A database to store human relations

d. None of above

31. The advantage of computerized database over manual database is

a. We can get the information our quick

b. We can put in information quick

c. Solve the repeated information and consistency problem

d. All of above

32. Circular button with Office icon in it is

a. Control box

b. Office box

c. Company box

d. Control menu box


33. Group names in ribbon can be helpful to

a. Group the commands so that when you move one, you can move all of them together

b. Give a name for buttons on ribbon

c. Find the required option by inspecting through them

d. All of above

34. The options like Relationship, SQL Server etc. are found in

a. External data tab

b. Database tools tab

c. Create tab

d. Home tab

35. Navigation pane is placed on

a. The left of Access workspace

b. The right of Access workspace

c. Just below the Access workspace

d. Just above the status bar

36. You can filter the display of different Access objects in navigation pane from

a. View tab in ribbon

b. Drop down menu at the top of navigation pane

c. Sort & Filter group in Home menu

d. Database tab

Answers to Multiple Choice Questions

1. Mechanism developed to enforce users to enter data in required format is:

b. Input mask

2. The raw facts and figures are:

a. Data

3. The feature that database allows to access only certain records in database is:
c. Queries

4. Which filter method lets you filter the records that match the selected field?

b. Filter by selection

5. Which filter method lets you filter records based on criterion you specify?

a. Filter by form

6. You can find Sort & Filter group of commands in

a. Home ribbon

7. Which of the following filter method is not available in Access?

c. Advanced filter

8. By Grouped Report you understand

c. Type of report that displays data grouped by fields you specified

9. The text you typed in Description column in Table Design View is displayed on

d. Status bar while entering data

10. What is the maximum allowed field size for Boolean (Yes/No) fields?

a. 1

11. What is the size of Data & Time field type?

b. 8

12. Which of the following field type can store maximum data?

d. Memo fields

13. To display associated record from related table in datasheet view, you can

c. Single click on expand indicator (+) next to the record


14. Arrange according to the size

a. Record, field, byte, bit

15. What type of relationship exists between a Student table and Fees table?

b. One to many

16. Identify the relationship between a Movie table and Stars table:

c. Many to many

17. What type of relationship exists between a Teacher table and Class table?

b. Many to many

18. Which of following relationship type is not possible to realize in Access Database directly?

c. Many to many

19. For which kind of relationship you need a junction table to reflect real world situation?

c. Many to many

20. What do you need if you should enforce many-to-many relationship between two tables?

c. Junction table

21. You can display data from multiple tables by using

b. Sub form

22. What is the best data type for a field that stores mobile numbers?

a. Text

23. What field type is best to store serial numbers?

b. AutoNumber

24. Which of the following field type is used to store photograph of employees?

c. OLE
25. Which of the following method can be used to add more tables in a database?

d. All of above

26. From which version Microsoft introduced Backstage View for Access Interface?

b. Access 2007

27. You can display Backstage View by clicking on

a. File menu

28. Why do you pin an item in list?

b. To move it up and make it always available

29. The options like Save, Open Database, Print are available in

c. File menu

30. What is relational database?

a. A place to store relational information

31. The advantage of computerized database over manual database is

d. All of above

32. Circular button with Office icon in it is

b. Office box

33. Group names in ribbon can be helpful to

c. Find the required option by inspecting through them

34. The options like Relationship, SQL Server etc. are found in

b. Database tools tab

35. Navigation pane is placed on


a. The left of Access workspace

36. You can filter the display of different Access objects in navigation pane from

b. Drop down menu at the top of navigation pane

1. What Are The Different Views To Display A Table

A) Datasheet View
B) Design View
C) Pivote Table & Pivot Chart View
D) All Of Above

2. Which Of The Following Creates A Drop Down List Of Values To Choose From?

A) Ole Object
B) Hyperlink
C) Memo
D) Lookup Wizard

3. The Command Center Of Access File That Appears When You Create Or Open The Ms Access Database File.

A) Database Window
B) Query Window
C) Design View Window
D) Switchboard

4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables

A) Relationship
B) Join
C) Query
D) None Of These

5. In A Database Table, The Category Of Information Is Called __________

A) Tuple
B) Field
C) Record
D) All Of Above

6. This Key Uniquely Identifies Each Record

A) Primary Key
B) Key Record
C) Unique Key
D) Field Name
7. It Is An Association Established Between Common

A) Line
B) Relationship
C) Primary Key
D) Records

8. This Is The Stage In Database Design Where One Gathers And List All The Necessary Fields For The Database Project.

A) Data Definition
B) Data Refinement
C) Establishing Relationship
D) None Of The Above

9. A Database Language Concerned With The Definition Of The Whole Database Structure And Schema Is ________

A) DCL
B) DML
C) DDL
D) All Of Above

10. Which Of The Field Has Width 8 Bytes?

A) Memo
B) Number
C) Date/time
D) Hyperlink

11. Which Of The Following Statement Is True?

A) Foreign Key Fields Don\'t Allow Duplicate Values


B) In Primary Key Field You Can Enter Duplicate Value
C) In An Indexed Field You May Or May Not Enter Duplicate Value Depending Upon Setting
D) All Statements Are True

12. Following Is Not A Database Model

A) Network Database Model


B) Relational Database Model
C) Object Oriented Database Model
D) None

13. Microsoft Access Is A

A) RDBMS
B) OODBMS
C) ORDBMS
D) Network Database Model

14. DCL Provides Commands To Perform Actions Like

A) Change The Structure Of Tables


B) Insert, Update Or Delete Records And Data Values
C) Authorizing Access And Other Control Over Database
D) None Of Above

15. The Database Language That Allows You To Access Or Maintain Data In A Database

A) DCL
B) DML
C) DDL
D) None Of Above

16. What Is The Maximum Length A Text Field Can Be?

A) 120
B) 255
C) 265
D) 75

17. Which Of The Following Is Not A Database Object?

A) Tables
B) Queries
C) Relationships
D) Reports

18. A __________ Enables You To View Data From A Table Based On A Specific Criterion

A) Form
B) Query
C) Macro
D) Report

19. What Are The Columns In A Microsoft Access Table Called?

A) Rows
B) Records
C) Fields
D) Columns

20. Which Of The Following Is Not A Type Of Microsoft Access Database Object?

A) Table
B) Form
C) Worksheets
D) Modules
Answers

1-D, 2-D, 3-A, 4-A, 5-B, 6-A, 7-B, 8-A, 9-C, 10-C, 11-C, 12-D, 13-A, 14-C, 15-A, 16-B, 17-C, 18-B, 19-C, 20-C,

Set 9

Collection of Multiple Choice Questions (MCQs) or Objective Questions from Microsoft Access (MS-Access)for Compute Jobs Exams like
Computer Operator, Computer Engineer, Computer Officer and so on.

1. What method can you use to add a new table to your database?

a. Use Design View to create a table

b. Enter data directly by using a datasheet

c. Both of above

d. All of the above

Correct Answer: c

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

2. Which action do you use in a a macro to automatically send a report snapshot in an email message?

a. Use mail

b. Send object

c. Run macro

d. All of the above

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

3. How can you display sales grouped by country, region, and salesperson, all at the same time?

a. Use the Sort Descending command.


b. Use the Pivot table view command

c. Use the find command on specified groups

d. All of above

Correct Answer: b

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

4. The checking operation performed on input data is called the

a. Validation of data

b. Verification of data

c. Cross check

d. Control of data

Correct Answer: a

Microsoft Access Multiple Choice Questions (MCQs) published on http://www.psexam.com

5. A form defines

a. Wqhere data is placed on the screen

b. The width of each field

c. Both a and b

d. All of the above

Correct Answer: c

1. State true or false.


i) Select operator is not a unary operator.
ii) Project operator chooses subset of attributes or columns of a relation.

A) i-True, ii-False

B) i-True, ii-True

C) i-False, ii-True

D) i-False, ii-False

2. …………… database is used as template for all databases created.

A) Master

B) Model
C) Tempdb

D) None of the above

3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be
assigned to each data items. This is referred to as

A) Data Security

B) Domain access

C) Data Control

D) Domain Integrity

4. ………………….. operator is basically a join followed by a project on the attributes of first relation.

A) Join

B) Semi-Join

C) Full Join

D) Inner Join

5. Which of the following is not a binary operator in relational algebra?

A) Join

B) Semi-Join

C) Assignment

D) Project

6. Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency
and validity of the database.

A) Increases

B) Skips

C) Does not reduce

D) Reduces

7. Which of the following is/are the DDL statements?

A) Create

B) Drop

C) Alter

D) All of the above


8. In snapshot, …………………. clause tells oracle how long to wait between refreshes.

A) Complete

B) Force

C) Next

D) Refresh

9. ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing
database integrity.

A) Column

B) Constraint

C) Index

D) Trigger

10. For like predicate which of the following is true.


i) % matches zero of more characters.
ii) _ matches exactly one character.

A) i-only

B) ii-only

C) Both of them

D) None of them

Answers:

1. C) i-False, ii-True
2. B) Model
3. D) Domain Integrity
4. B) Semi-Join
5. D) Project
6. D) Reduces
7. D) All of the above
8. D) Refresh
9. B) Constraint
10. C) Both of them
1. DBMS is a collection of ………….. that enables user to create and maintain a database.

A) Keys

B) Translators

C) Program

D) Language Activity
2. In a relational schema, each tuple is divided into fields called

A) Relations

B) Domains

C) Queries

D) All of the above

3. In an ER model, ……………. is described in the database by storing its data.

A) Entity

B) Attribute

C) Relationship

D) Notation

4. DFD stands for

A) Data Flow Document

B) Data File Diagram

C) Data Flow Diagram

D) Non of the above

5. A top-to-bottom relationship among the items in a database is established by a

A) Hierarchical schema

B) Network schema

C) Relational Schema

D) All of the above

6. ……………… table store information about database or about the system.

A) SQL

B) Nested

C) System

D) None of these
7. …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

A) Instance

B) Schema

c) Program

D) Super Key

8. ……………… clause is an additional filter that is applied to the result.

A) Select

B) Group-by

C) Having

D) Order by

9. A logical schema

A) is the entire database

B) is a standard way of organizing information into accessible parts.

C) Describes how data is actually stored on disk.

D) All of the above

10. ………………… is a full form of SQL.

A) Standard query language

B) Sequential query language

C) Structured query language

D) Server side query language

11) A relational database developer refers to a record as

A. a criteria

B. a relation

C. a tuple
D. an attribute

12) .......... keyword is used to find the number of values in a column.

A. TOTAL

B. COUNT

C. ADD

D. SUM

13) An advantage of the database management approach is

A. data is dependent on programs

B. data redundancy increases

C. data is integrated and can be accessed by multiple programs

D. none of the above

14) The collection of information stored in a database at a particular moment is called as ......

A. schema

B. instance of the database

C. data domain

D. independence

15) Data independence means

A. data is defined separately and not included in programs.

B. programs are not dependent on the physical attributes of data

C. programs are not dependent on the logical attributes of data

D. both B and C

16) A ......... is used to define overall design of the database

A. schema

B. application program

C. data definition language


D. code

17) Key to represent relationship between tables is called

A. primary key

B. secondary key

C. foreign key

D. none of the above

18) Grant and revoke are ....... statements.

A. DDL

B. TCL

C. DCL

D. DML

19) DBMS helps achieve

A. Data independence

B. Centralized control of data

C. Neither A nor B

D. Both A and B

20) .......... command can be used to modify a column in a table

A. alter

B. update

C. set

D. create

Answers:
1. C) Program
2. B) Domains
3. A) Entity
4. C) Data Flow Diagram
5. A) Hierarchical schema
6. C) System
7. B) Schema
8. C) Having
9. B) is a standard .. accessible parts.
10. C) Structured query language
11) C. a tuple
12) B. COUNT
13) C. data is integrated and can be accessed by multiple programs
14) B. instance of the database
15) D. both B and C
16) A. schema
17) C. foreign key
18) C. DCL
19) D. Both A and B
20) A. alter

1. The candidate key is that you choose to identify each row uniquely is called ……………..

A) Alternate Key

B) Primary Key

C) Foreign Key

D) None of the above

2. …………….. is used to determine whether of a table contains duplicate rows.

A) Unique predicate

B) Like Predicate

C) Null predicate

D) In predicate

3. To eliminate duplicate rows ……………… is used

A) NODUPLICATE

B) ELIMINATE

C) DISTINCT
D) None of these

4. State true or false

i) A candidate key is a minimal super key.

ii) A candidate key can also refer to as surrogate key.

A) i-true, ii-false

B) i-false, ii-true

C) i-true, ii-true

D) i-false, ii-false

5. DCL stands for

A) Data Control Language

B) Data Console Language

C) Data Console Level

D) Data Control Level

6. …………………… is the process of organizing data into related tables.

A) Normalization

B) Generalization

C) Specialization

D) None of the above

7. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are
part of some another entity.

A) Weak entity

B) Strong entity

C) Non attributes entity


D) Dependent entity

8. …………….. is the complex search criteria in the where clause.

A) Sub string

B) Drop Table

C) Predict

D) Predicate

9. ………………… is preferred method for enforcing data integrity

A) Constraints

B) Stored Procedure

C) Triggers

D) Cursors

10. The number of tuples in a relation is called its …………. While the number of attributes in a relation is called
it’s ………………..

A) Degree, Cardinality

B) Cardinality, Degree

C) Rows, Columns

D) Columns, Rows

11) The language that requires a user to specify the data to be retrieved without specifying exactly how to get it
is

A. Procedural DML

B. Non-Procedural DML

C. Procedural DDL

D. Non-Procedural DDL

12) Which two files are used during operation of the DBMS?
A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

13) The database schema is written in

A. HLL

B. DML

C. DDL

D. DCL

14) The way a particular application views the data from the database that the application uses is a

A. module

B. relational model

C. schema

D. sub schema

15) The relational model feature is that there

A. is no need for primary key data

B. is much more data independence than some other database models

C. are explicit relationships among records.

D. are tables with many dimensions

16) Which one of the following statements is false?

A. The data dictionary is normally maintained by the database administrator

B. Data elements in the database can be modified by changing the data dictionary.

C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.

17) Which of the following are the properties of entities?

A. Groups

B. Table

C. Attributes

D. Switchboards

18) Which database level is closest to the users?

A. External

B. Internal

C. Physical

D. Conceptual

19) Which are the two ways in which entities can participate in a relationship?

A. Passive and active

B. Total and partial

C. Simple and Complex

D. All of the above

20) ........ data type can store unstructured data

A. RAW

B. CHAR

C. NUMERIC

D. VARCHAR

Answers:
1. B. Primary Key
2. A. Unique predicate
3. C. DISTINCT
4. C. i-true, ii-true
5. A. Data Control Language
6. A. Normalization
7. A. Weak entity
8. D. Predicate
9. A. Constraints
10. B. Cardinality, Degree
11. B. Non-Procedural DML
12.C. Data dictionary and transaction log
13. C. DDL
14. D. sub schema
15. B. is much more data independence than some other database models
16. B. Data elements in the database can be modified by changing the data dictionary.
17. C. Attributes
18. A. External
19. B. Total and partial
20. A. RAW
1. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a
single transaction?

A) CREATE PACKAGE

B) CREATE SCHEMA

C) CREATE CLUSTER

A) All of the above

2. In SQL, the CREATE TABLESPACE is used

A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data files
to comprise the tablespace.

B) to create a database trigger.

C) to add/rename data files, to change storage

D) All of the above

3. Which character function can be used to return a specified portion of a character string?
A) INSTR

B) SUBSTRING

C) SUBSTR

D) POS

4. Which of the following is TRUE for the System Variable $date$?

A) Can be assigned to a global variable.

B) Can be assigned to any field only during design time.

C) Can be assigned to any variable or field during run time.

D) Can be assigned to a local variable.

5. What are the different events in Triggers?

A) Define, Create

B) Drop, Comment

C) Insert, Update, Delete

D) Select, Commit

6. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?

A) Data Definition Language

B) Data Manipulation Language

C) Data Described Language

D) Data Retrieval Language

7. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints

A) 6789

B) 2345
C) 1234

D) 456789

8. Which of the following SQL command can be used to modify existing data in a database table?

A) MODIFY

B) UPDATE

C) CHANGE

D) NEW

9. When SQL statements are embedded inside 3GL, we call such a program as ..........

A) nested query

B) nested programming

C) distinct query

D) embedded SQL

10. ................ provides option for entering SQL queries as execution time, rather than at the development
stage.

A) PL/SQL

B) SQL*Plus

C) SQL

D) Dynamic SQL

11) The RDBMS terminology for a row is

A. tuple

B. relation

C. attribute

D. degree
12) To change column value in a table the ......... command can be used.

A. create

B. insert

C. alter

D. update

13) The full form of DDL is

A. Dynamic Data Language

B. Detailed Data Language

C. Data Definition Language

D. Data Derivation Language

14) To pass on granted privileges to other user the ...... clause is used

A. create option

B. grant option

C. update option

D. select option

15) A set of possible data values is called

A. attribute

B. degree

C. tuple

D. domain

16) ......... is critical in formulating database design.

A. row column order

B. number of tables
C. functional dependency

D. normalizing

17) A primary key if combined with a foreign key creates

A. Parent-Child relationship between the tables that connect them

B. Many to many relationship between the tables that connect them

C. Network model between the tables that connect them

D. None of the above

18) A ............. represents the number of entities to which another entity can be associated

A. mapping cardinality

B. table

C. schema

D. information

19) Which two files are used during operation of the DBMS

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

20) A ........... is a set of column that identifies every row in a table.

A. composite key

B. candidate key

C. foreign key

D. super key
Answers:

1. B) CREATE SCHEMA
2. A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data
files to comprise the table-space.
3. C) SUBSTR
4. B) Can be assigned to any field only during design time.
5. C) Insert, Update, Delete
6. A) Data Definition Language
7. B) 2345
8. B) UPDATE
9. D) embedded SQL
10.D) Dynamic SQL
11) A. tuple
12) D. update
13) C. Data Definition Language
14) B. grant option
15) D. domain
16) C. functional dependency
17) A. Parent-Child relationship between the tables that connect them
18) A. mapping cardinality
19) C. Data dictionary and transaction log
20) D. super key

1. The relational model is based on the concept that data is organized and stored in two-dimensional tables
called ……………………….

A) Fields

B) Records

C) Relations

D) Keys

2. ……………….. contains information that defines valid values that are stored in a column or data type.

A) View

B) Rule

C) Index

D) Default

3. Which of the syntax is correct for insert statement?


i) insert into <table_name> values <list of values>
ii) insert into <table_name> (column list) values <list of values>

A) i-only

B) ii-only
C) Both of them

D) None of them

4. ………………. First proposed the process of normalization.

A) Edgar. W

B) Edgar F. Codd

C) Edward Stephen

D) Edward Codd

5. For using a specific database …………… command is used.

A) use database

B) database name use

C) Both A &B

D) None of them

6. Which of the following is not comparison operator?

A) <>

B) <

C) =<

D) >=

7. An outstanding functionality of SQL is its support for automatic ………… to the target data.

A) programming

B) functioning

C) navigation

D) notification

8. ………………… is a special type of integrity constraint that relates two relations & maintains consistency across
the relations.

A) Entity Integrity Constraints

B) Referential Integrity Constraints

C) Domain Integrity Constraints

D) Domain Constraints

E) Key Constraints
9. ……………..specifies a search condition for a group or an aggregate.

A) GROUP BY Clause

B) HAVING Clause

C) FROM Clause

D) WHERE Clause

10. Drop Table cannot be used to drop a table referenced by a …………… constraint.

A) Local Key

B) Primary Key

C) Composite Key

D) Foreign Key

Answers:

1. C) Relations
2. C) Index
3. C) Both of them
4. B) Edgar F. Codd
5. A) use database
6. C) =<
7. C) navigation
8. B) Referential.....Constraints
9. B) HAVING Clause
10. D) Foreign Key
1. ............... joins are SQL server default

A) Outer

B) Inner

C) Equi

D) None of the above

2. The ..................... is essentially used to search for patterns in target string.

A) Like Predicate

B) Null Predicate

C) In Predicate

D) Out Predicate

3. Which of the following is/are the Database server functions?


i) Data management ii) Transaction management
iii) Compile queries iv) Query optimization

A) i, ii, and iv only

B) i, ii and iii only

C) ii, iii and iv only

D) All i, ii, iii, and iv

4. To delete a database ................... command is used

A) delete database database_name

B) Delete database_name

C) drop database database_name

D) drop database_name

5. .............. is a combination of two of more attributes used as a primary key

A) Composite Key

B) Alternate Key

C) Candidate Key

D) Foreign Key

6. Which of the following is not the function of client?

A) Compile queries

B) Query optimization

C) Receive queries

D) Result formatting and presentation

7. ............. is a special type of stored procedure that is automatically invoked whenever the data in the table is
modified.

A) Procedure

B) Trigger

C) Curser

D) None of the above

8. ................. requires that data should be made available to only authorized users.

A) Data integrity

B) Privacy
C) Security

D) None of the above

9. Some of the utilities of DBMS are .............


i) Loading ii) Backup iii) File organization iv) Process Organization

A) i, ii, and iv only

B) i, ii and iii only

C) ii, iii and iv only

D) All i, ii, iii, and iv

10. ................. allows individual row operation to be performed on a given result set or on the generated by a
selected by a selected statement.

A) Procedure

B) Trigger

C) Curser

D) None of above

Answers:

1. B) Inner
2. A) Like Predicate
3. A) i, ii, and iv only
4. C) drop ....database_name
5. A) Composite Key
6. B) Query optimization
7. B) Trigger
8. C) Security
9. B) i, ii and iii only
10. C) Curser
1. Processed data is called ………………..

A) Raw data

B) Information

C) Useful data

D) Source

2. …………….. is a utility to capture a continuous record of server activity and provide auditing capability.

A) SQL server Profile


B) SQL server service manager

C) SQL server setup

D) SQL server wizard.

3. Data items grouped together for storage purposes are called a

A) record

B) title

C) list

D) string

4. …………. contains data assisting day to day activities of the organization.

A) Control database

B) Operational database

C) Strategic database

D) Sequential database

5. ………………… approach reduces time and effort required for design and lesser risk in database management.

A) Single global database

B) Top-down approach

C) Multiple databases

D) None of the above

6. HSAM stands for ……….

A) Hierarchic Sequential Access Method

B) Hierarchic Standard Access Method

C) Hierarchic Sequential and Method

D) Hierarchic Standard and Method

7. SQL server stores index information in the ………… system table


A) syst indexes

B) system indexes

C) sysind

D) sys indexes

8. The one guideline to be followed while designing the database is

A) A database design may be ambiguous.

B) Unrelated data should be in the same table so that updating the data will be easy.

C) It should avoid/reduce the redundancy.

D) An entity should not have attributes.

9. Which of the following is not a logical database structure?

A) Chain

B) Network

C) Tree

D) Relational

10. ……………. is a preferred method for enforcing data integrity

A) Constraints

B) Stored procedure

C) Triggers

D) Cursors

Answers:

1. B) Information
2. B) SQL server service manager
3. A) record
4. B) Operational database
5. C) Multiple databases
6. A) Hierarchic Sequential Access Method
7. D) sys indexes
8. C) It should avoid/reduce the redundancy.
9. A) Chain
10. A) Constraints

1. Reflexivity property says that X - Y is true if Y is ………………….

A) Subset of X

B) Null set of X

C) Super set of Y

D) Subset of Y

2. Anything that affects the database schema is a part of

A) DML

B) DCL

C) DDL

D) All of the above

3. An instance of a relation is a time varying set of ………………….

A) Tuples

B) Rows

C) Both of them

D) None of them

4. In the ………………… mode any record in the file can be accessed at random

A) Sequential access

B) Random access

C) Standard access

D) Source access

5. Which can be used to delete all the rows if a table?

A) Delete * from table_name

B) Delete from table_name

C) Delete table_name

D) all rows cannot be deleted at a time.

6. Which if the following is not the type of data integrity.

A) Key integrity
B) Domain integrity

C) Entity integrity

D) Referential integrity

7. 4NF stands for ..

A) Fourth Normal File

B) Fourth Normal Form

C) Fourth Normal Fraction

D) Fourth Negative File

8. A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters.

A) Recovery utility

B) Backup Utility

C) Monitoring utility

D) Data loading utility

9. ………………. Allows definitions and query language statements to be entered; query results are formatted and
displayed.

A) Schema Processor

B) Query Processor

C) Terminal Interface

D) None of the above

10. The main task carried out in the …………… is to remove repeating attributes to separate tables.

A) First Normal Form

B) Second Normal Form

C) Third Normal Form

D) Fourth Normal Form

Answers:

1. 1. A) Subset of X
2. C) DDL
3. C) Both of them
4. B) Random access
5. A) Delete * from table_name
6. A) Key integrity
7. B) Fourth Normal Form
8. B) Backup Utility
9. C) Terminal Interface
10. D) Fourth Normal Form
2. 1. ............................ is the powerful language for working with RDBMS.

A) Embedded Programs

Database Management
System (Photo
credit: Wikipedia)

3.
4. B) Dynamic Programs
5.
6. C) Query Language
7.
8. D) Static Language Programs
9.
10.
11.
12. 2. The file in DBMS is called as .................. in RDBMS.
13.
14. A) console
15.
16. B) schema
17.
18. C) table
19.
20. D) object
21.
22.
23.
24. 3. In ..................... , we have a strict parent-child relationship only.
25.
26.
27. A) hierarchical databases.
28.
29. B) network databases
30.
31. C) object oriented databases
32.
33. D) relational databases
34.
35.
36.
37. 4. Which normal form is considered adequate for relational database design?
38.
39. A) 2 NF
40.
41. B) 3 NF
42.
43. C) 4 NF
44.
45. D) BCNF
46.
47.
48.
49. 5. What operator tests column for the absence of data?
50.
51. A) IS NULL operator
52.
53. B) ASSIGNMENT operator
54.
55. C) LIKE operator
56.
57. D) NOT operator
58.
59.
60.
61. 6. Which is proper subset designed to support views belonging to different classes of users in order to
hide or protect information.
62.
63. A) Schema
64.
65. B) Sub-schema
66.
67. C) Non-schema
68.
69. D) Non-sub schema
70.
71.
72.
73. 7. Which contain information about a file needed by system programs for accessing file records?
74.
75. A) File blocks
76.
77. B) File operators
78.
79. C) File headers
80.
81. D) None of these
82.
83.
84.
85. 8. A .................... DBMS distributes data processing tasks between the workstation and network
server.
86.
87. A) Network
88.
89. B) Relational
90.
91. C) Client Server
92.
93. D) Hierarchical
94.
95.
96.
97. 9. The .................... refers to the way data is organized in and accessible from DBMS.
98.
99. A) database hierarchy
100.
101. B) data organization
102.
103. C) data sharing
104.
105. D) data model
106.
107.
108.
109. 10. ................. is a statement that is executed automatically by the system.
110.
111. A) trigger
112.
113. B) assertion
114.
115. C) durability
116.
117. D) integrity constraint
118.
119.
120.
121.

122. Answers:
123.
1. ............................ is the powerful language for working with RDBMS.

C) Query Language
2. The file in DBMS is called as .................. in RDBMS.

C) table

3. In ..................... , we have a strict parent-child relationship only.

A) hierarchical databases.

4. Which normal form is considered adequate for relational database design?

B) 3 NF

5. What operator tests column for the absence of data?

A) IS NULL operator

6. Which is proper subset designed to support views belonging to different classes of users in order to
hide or protect information.

B) Sub-schema

7. Which contain information about a file needed by system programs for accessing file records?

C) File headers

8. A .................... DBMS distributes data processing tasks between the workstation and network
server.

C) Client Server

9. The .................... refers to the way data is organized in and accessible from DBMS.

D) data model

10. ................. is a statement that is executed automatically by the system.

A) trigger
1. A report generator is used to
A. update files

B. print files on paper

C. data entry

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

124.
2. Which of the following is not a logical data-base structure?

A. tree

B. relational

C. network

D. chain

E. All of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

125.
3. Which of the following is a database administrator's function?

A. database design

B. backing up the database

C. performance monitoring

D. user coordination

E. All of the above

Answer & Explanation


Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

126.
4. Primitive operations common to all record management systems include

A. Print

B. Sort

C. Look-up

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

127.
5. Each of data files has a _____ that describe the way the data is stored in the file.

A. File structure

B. Records

C. Fields

D. Database

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


6. After you _____ a record, many data management the environments require you to issue a command to save the changes you made.

A. Delete

B. Update

C. Sort key
D. Index

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. What is the language used by most of the DBMSs for helping their users to access data?

A. High level language

B. Query language

C. SQL

D. 4GL

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. Data item characteristics that are important in data management include

A. punctuation

B. language

C. spelling

D. width

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


9. In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?

A. ZIP

B. PACK

C. COMMIT

D. SAVE

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. Periodically adding, changing and deleting file records is called file

A. Updating

B. upgrading

C. restructuring

D. renewing

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


11. Sort/report generators

A. are faster than index/report generators

B. require more disk space than index/report generators

C. do not need to sort before generating a report

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option B
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. The data dictionary tells the DBMS

A. what files are in the database

B. what attribute are possessed by the data

C. what these files contain

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. In SQL, which command(s) is(are) used to enable/disable a database trigger?

A. MODIFY USER

B. CHANGE USER

C. ALTER TRIGGER

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. If the record management system allows you to edit values before they are recorded on disk, you can

A. correct spelling changes before they are recorded

B. change the name of a field


C. change the width of a field

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. The relational model uses some unfamiliar terminology. A tuple is equivalent to a:

A. record

B. field

C. file

D. data base

E. data item

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

16. The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain?

A. Bits

B. Characters

C. Data field

D. Schema

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

17. Which command is used to remove an index from the database in SQL?

A. DELETE INDEX

B. DROP INDEX

C. REMOVE INDEX

D. ROLL BACK INDEX

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. An-owner-member set in the CODASYL specifications may have

A. only one owner but many owner occurrences

B. only one member but many member occurrence

C. more than one member but only one occurrence per member

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. What is the name given to the database management system which is able to handle full text data, image data, audio and video?

A. Full media

B. Graphics media

C. Multimedia

D. Hypertext
E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. A top-to-bottom relationship among the items in a database is established by a

A. Hierarchical schema

B. Network schema

C. Relational schema

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


21. A database management system

A. allows simultaneous access to multiple files

B. can do more than a record management system

C. is a collection of programs for managing data in a single file

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. Which of the following hardware components is the most important to the operation of a database management system?

A. high-resolution video display


B. printer

C. high speed, large-capacity disk

D. plotter

E. mouse

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. The PROJECT command will create new table that has

A. more fields than the original table

B. more rows than the original table

C. both (a) and (b)

D. all the fields of master table

E. None of the above

Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. To have a file hold a list, it is necessary to

A. identify the records in the list

B. identify the name, width and type of the fields of each record.

C. decide which fields will be used as sort or index keys

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. Sophisticated report generators can

A. print row-oriented reports

B. perform arithmetic operations

C. selectively retrieve and print portions of a list

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


26. In a _____ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.

A. Network database

B. Relational database

C. Distributed database

D. Hierarchical database

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. Which two files are used during operation of the DBMS?

A. query language and utilities

B. data manipulation language and query language

C. data dictionary and transaction log

D. data dictionary and query language


E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. When using a database management system, the first thing that you must do is to

A. create a database file

B. activate file editor

C. load the software into your micro¬computer

D. keep a floppy disk in readiness

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. A network schema

A. restricts the structure to a one-to-many relationship

B. permits many-to-many relation¬ships

C. stores data in tables

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


30. Which of the following is not a relational database?

A. dBASE IV

B. 4th Dimension

C. FoxPro

D. Reflex

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


31. Which command is used to remove a table from the database in SQL?

A. DELETE TABLE

B. DROP TABLE

C. ERASE TABLE

D. UNATTACH TABLE

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. A large computer information system maintains many different computer files. Which amongst them is called a perpetual file?

A. Specialized file

B. Log file

C. Master file

D. Update file

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. A file produced by a spreadsheet

A. is generally stored on disk in an ASCII text format

B. can be used as it by the DBMS

C. can be used for graphic

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. A form defines

A. where data is placed on the screen

B. the width of each field

C. both (a) and (b)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. Which of the following is true of a network structure?

A. It is a physical representation of the data

B. It allows a many-to-many relationship

C. It is conceptually simple
D. It will be the dominant data base of the future

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


36. In SQL, GRANT command is used to

A. allow user to access databases

B. allow user to create databases

C. grant system privileges, roles, and object privileges to uses and roles

D. choose auditing for specific SQL commands

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. The highest level in the hierarchy of data organization is called

A. data bank

B. database

C. data file

D. data record

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. The logical data structure with a one-to-many relationship is a :


A. network

B. tree

C. chain

D. relational

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. Updating a database means

A. revising the file structure

B. reorganizing the database

C. modifying or adding record occurrences

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. In SQL, which command(s) is(are) used to enable/disable all triggers on a table?

A. ALTER TRIGGERS

B. ALTER TABLE

C. MODIFY TRIGGERS IN TABLE

D. All of the above

E. None of the above

Answer & Explanation


Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


41. When you have finished entering information into a form

A. the template is written to the data file

B. the contents of the form are written to the data file

C. the contents of the form can be printed

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. The main idea behind computer files is that it is convenient to

A. arrange them

B. store information together

C. create them

D. access them

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key
would be

A. the pin code

B. the last name

C. a compound key consisting of the first name and the last name
D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. In SQL, which command is used to add new rows to a table?

A. ALTER TABLE

B. ADD ROW

C. INSERT

D. APPEND

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. A number of related records that are treated as a unit is called

A. file

B. field

C. data

D. batch

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


46. If you want to group the records in the abc database, you could use the Jobcode as the _____.
A. Delete

B. Update

C. Sort Key

D. Index

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. The Management Information system (MIS) structure with one main computer system is called a

A. hierarchical MIS structure

B. distributed MIS structure

C. centralized MIS structure

D. decentralized MIS structure

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. If a calculation is embedded in a form

A. the result of the calculations are stored with the form

B. the calculations are stored with the form

C. the result of the calculations are printed in report

D. All of the above

E. None of the above

Answer & Explanation


Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


1. Data security threats include

A. hardware failure

B. privacy invasion

C. fraudulent manipulation of data

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. An operation that will increase the length of a list is

A. Insert

B. Look-up

C. Modify

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. In SQL, which command is used to add a column/integrity constraint to a table

A. ADD COLUMN

B. INSERT COLUMN

C. MODIFY TABLE
D. ALTER TABLE

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. In SQL, which command(s) is(are) used to enable/disable a database trigger?

A. ALTER TRIGGER

B. ALTER DATABASE

C. ALTER TABLE

D. MODIFY TRIGGER

E. All of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. In a relational schema, each tuple is divided into fields called

A. Relations

B. Domains

C. Queries

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


6. In SQL, which command is used to changes data in a table?
A. UPDATE

B. INSERT

C. BROWSE

D. APPEND

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. What name is given to the collection of facts, items of information or data which are related in some way?

A. Database

B. Directory information

C. Information tree

D. Information provider

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. In a large DBMS

A. each user can "see" only a small part of the entire database

B. each user can access every sub¬schema

C. each subschema contains every field in the logical schema

D. All of the above

E. None of the above

Answer & Explanation


Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. Which of the following command(s) is(are) used to recompile a stored procedure in SQL?

A. COMPILE PROCEDURE

B. ALTER PROCEDURE

C. MODIFY PROCEDURE id) All of the above

D. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. Internal auditors should review data system design before they are

A. developed

B. implemented

C. modified

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


11. A _____ means that one record in a particular record type may be related to more than one record of another record type.

A. One-to-one relationship

B. One-to-many relationship

C. Many-to-one relationship

D. Many-to many relationship


E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. Which command(s) is(are) used to redefine a column of the table in SQL ?

A. ALTER TABLE

B. DEFINE TABLE

C. MODIFY TABLE

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL?

A. DEFINE TABLE

B. MODIFY TABLE

C. ALTER TABLE

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


14. In SQL, the ALTER TABLESPACE command is used

A. to add/rename data files

B. to change storage characteristics

C. to take a tablespace online/offline

D. to begin/end a backup

E. All of the above

Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. query language

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


16. A database management system might consist of application programs and a software package called

A. FORTRAN

B. AUTOFLOW

C. BPL

D. TOTAL

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. An audit trail

A. is used to make back-up copies

B. is the recorded history of operations performed on a file

C. can be used to restore lost information

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. A race condition occurs when

A. Two concurrent activities interact to cause a processing error

B. two users of the DBMS are interacting with different files at the same time

C. both (a) and (b)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. An indexing operation

A. sorts a file using a single key

B. sorts file using two keys

C. establishes an index for a file


D. both (b) and (c)

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. The on-line, softcopy display a customer's charge account to respond to an inquiry is an examples of a

A. forecasting report

B. exception report

C. regularly scheduled report

D. on demand report

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


21. In SQL, which command(s) is(are) used to create a synonym for a schema object?

A. CREATE SCHEMA

B. CREATE SYNONYM

C. CREATE SAME

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. If you want your database to include methods, you should use a _____ database.
A. Network

B. Distributed

C. Hierarchical

D. Object-Oriented

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. In SQL, which of the following is not a data Manipulation Language Commands?

A. DELETE

B. SELECT

C. UPDATE

D. CREATE

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. Which of the following is not characteristic of a relational database model?

A. tables

B. treelike structure

C. complex logical relationships

D. records

E. None of the above

Answer & Explanation


Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. A computer file contains several records. What does each record contain?

A. Bytes

B. Words

C. Fields

D. Database

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


26. In SQL, the CREATE VIEW command is used

A. to recompile view

B. to define a view of one or more tables or views

C. to recompile a table

D. to create a trigger

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. A ____ Contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

A. File structure

B. Records

C. Fields
D. Database

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. In the DBM approach, application programs perform the

A. storage function

B. processing functions

C. access control

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. In SQL, which command is used to create a database user?

A. ADD USER TO DATABASE

B. MK USER

C. CREATE USER

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


30. When performing a look-up operation using a form

A. you enter the search value into the form

B. you look at each form sequentially until you see the one you want

C. you type the key in an entry line, and the correct form is displayed

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


31. A _____ means that one record in a particular record type is related to only one record of another record type.

A. One-to-one relationship

B. One-to-many relationship

C. Many-to-one relationship

D. Many-to-many relationship

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. A _____ database does not use pointers or physical links, but instead finds related records by examining the contents of fields.

A. Network

B. Hierarchical

C. Relational

D. Object-Oriented

E. None of the above

Answer & Explanation

Answer: Option C
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. In SQL, which command(s) is(are) used to redefine an index's future storage allocation

A. ALTER INDEX

B. REDEFINE INDEX

C. MODIFY INDEX

D. DO INDEX

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which of the following is a serious problem of file management systems?

A. difficult to update

B. lack of data independence

C. data redundancy

D. program dependence

E. All of the above

Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. With respect to data input, the most accurate description of batch control is

A. dividing documents to be entered into batches

B. controlling the input of each input clerk


C. comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


36. The model for a _____ resembles the hierarchical model in many respects.

A. Network database

B. Relational database

C. Distributed database

D. Hierarchical database

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. A set of programs that handle a firm's data base responsibilities is called a

A. Data Base Management System (DBMS)

B. Data Base Processing System (DBPS)

C. Data Management System (DMS)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


38. In any hierarchy of data organization, the smallest entity to be processed as a single unit is called

A. data field

B. data record

C. data file

D. database

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. Long-range planning report produced in an MIS are primarily designed for

A. top management

B. middle management

C. lower management

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. The model for a record management system might be

A. handwritten list

B. a Rolodex card file

C. a business form

D. All of the above

E. None of the above

Answer & Explanation


Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


41. The designer of a form includes

A. filed designators

B. prompts

C. data

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?

A. report writer

B. query language

C. data manipulation language

D. transaction log

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. Two files may be joined into a third file if

A. they have a row in common

B. they have a field in common

C. they have no records with the same value in the common field
D. both (b) and (c)

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. Characteristic(s) of a distributed MIS structure is

A. interactive sharing of the workload

B. a multiprocessing environment

C. computers supporting local DP operations

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. The data-base environment has all of the following components except:

A. users

B. separate files

C. data base

D. data-base administrator

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


46. The way a particular application views the data from the data base that the application uses is a :
A. module

B. relational model

C. schema

D. subschema

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. A compound key

A. is made up a several pieces of information

B. uniquely identifies an item in a list

C. both (a) and (b)

D. is a combination of each unique key

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. The distinguishable parts of a record are called

A. files

B. data

C. fields

D. database

E. None of the above

Answer & Explanation


Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

49. Large collections of files are called

A. fields

B. records

C. databases

D. file system

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

50. The index consists of

A. a list of keys

B. pointers to the master list

C. both (a) and (b)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


1. In SQL, which command is used to select data in rows and column from one or more tables?

A. CHOOSE

B. SELECT

C. LIST
D. BROWSE

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. A scheme describes

A. data elements

B. records and files

C. record relationships

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. A report form

A. appears on the computer monitor during data entry

B. is used during report generation to format data

C. both (a) and (b)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


4. A computer file can be best described as

A. a single data item

B. a general collection of data items

C. an orderly collection of data items

D. a random collection of data items

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. A good query system

A. can accept English language commands

B. allows non-programmers to access information stored in a database

C. can be accessed only by data processing professionals

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


6. If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it.

A. Delete

B. Update

C. Sort Key

D. Index

E. None of the above

Answer & Explanation

Answer: Option D
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. The modify operation is likely to be done after

A. Delete

B. Look-up

C. Insert

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. One data dictionary software package is called

A. DB/DC dictionary

B. TOTAL

C. ACCESS

D. any of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. One approach to standardizing storing of data

A. MIS

B. structured programming
C. CODASYL specifications

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?

A. Special purpose packages

B. Custom made programs

C. Single function application packages

D. Data management packages

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


11. A multiple-form file management system

A. lets you define different forms for different operations

B. lets you create a look-up form with an associated read-only password to prevent access by unauthorized users

C. both (a) and (b)

D. allow you to entry data in all the forms

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


12. The term _____ is sometimes used to refer to a data file in which all the records have the same record format, that is, the same field names, field
lengths, and data types.

A. Database

B. Table

C. Flat file

D. Data structure

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. A _____ Contains fields of data about one entity.

A. Record

B. File

C. Fields

D. Document

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. A condition that led to the development of databases was

A. a demand for more data to support information needs

B. an increase in the amount of data handled by organizations

C. the proliferation of data files

D. All of the above

E. None of the above.

Answer & Explanation


Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. The _____ command is used to allocates an extent for the table in SQL

A. MODIFY ALLOCATES

B. MODIFY TABLE

C. ALTER TABLE

D. REDEFINE TABLE

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


16. Embedded pointer provide

A. a secondary access path

B. a physical record key

C. an inverted index

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. Which of the following is a type of DBMS software?

A. database manipulation language

B. query language

C. utilities
D. report writer

E. All of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. Data items grouped together for storage purposes are called a

A. record

B. title

C. list

D. string

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. The activity of a file

A. is a low percentages of number of records added or deleted from a file

B. if high, reduces processing efficiency for sequential and nonsequential files

C. is a measure of the percentage of existing records updated during a run

D. refers to how closely the files fits into the allocated

E. None of the above.

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


20. Versatile report generators can provide

A. Columnar totals

B. Subtotals

C. Calculations

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


21. Related fields in a data base are grouped to form

A. data file

B. data record

C. menu

D. bank

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. A _____ means that one record in a particular record type can be related to many records in another record type and vice-versa.

A. One-to-one relationship

B. One-to-many relationship

C. Many-to-one relationship

D. Many-to-many relationship

E. None of the above

Answer & Explanation

Answer: Option D
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. In SQL, the _____ command is used to recompile a view

A. COMPILE VIEW

B. DEFINE VIEW

C. CREATE VIEW

D. ALTER VIEW

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. A list in alphabetical order

A. is in descending order

B. is in ascending order

C. is the result of a sort operation

D. both (b) and (c)

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. If a piece of data is stored in two places in the database, then

A. storage space is wasted

B. changing the data is one spot will cause data inconsistency


C. it can be more easily accessed

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


26. A data dictionary is a special file that contains

A. the names of all fields in all files

B. the data types of all fields in all files

C. the widths of all fields in all files

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. A file that is organized in uniform format is formally referred to as a _____ or a database file.

A. Document

B. Database

C. Record

D. Structured data file

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


28. A form can be used to

A. modify records

B. delete records

C. format printed output

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. Which language has recently become the de-facto standard for interfacing application programs with relational database system?

A. Oracle

B. SQL

C. dBASE

D. 4GL

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. In SQL, the CREATE TABLE is used

A. to create a table, defining its columns, integrity constrains, and storage allocation

B. to add a column/integrity constraint to a table

C. to redefine a column

D. to change a table's storage characteristics

E. All of the above

Answer & Explanation


Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


31. Which of the following is not true of the traditional approach to information processing?

A. There is common sharing of data among the various applications

B. It is file-oriented

C. Programs are dependent on the files

D. It is inflexible

E. All of the above are true

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. Batch processing is appropriate if

A. a large computer system is available

B. only a small computer system is available

C. only a few transactions are involved

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. What is the abbreviation used for a software package that permits the users to create, retrieve and maintain records in a database?

A. DASD

B. FMS

C. EMMS
D. DBMS

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which of the following is not an advantage of the data-base approach?

A. elimination of the data redundancy

B. ability to associate related data

C. increased security

D. program/data independence

E. All of the above are advantages

Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. A data dictionary doesn't provide information about:

A. where data is located

B. the size of the disk storage device

C. It allows a many-to-many relationship

D. It is conceptually simple

E. It will be the dominant data base of the future

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


36. Data encryption techniques are particularly useful for
A. reducing storage space requirements

B. improving data integrity

C. protecting data in data communication systems

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. It is more accurate to define a _____ as a variety of different record types that are treated as a single unit

A. Database

B. Table

C. Record

D. Flat File

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. A logical schema

A. is the entire database

B. is a standard way of organizing information into accessible parts

C. describes how data is actually stored on disk

D. All of the above

E. None of the above

Answer & Explanation


Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. Queries to a database

A. are written in English

B. can use aggregate functions like SUM and COUNT

C. both (a) and (b)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. In order to use a record management system

A. You need to understand the low-level details of how information in stored

B. You need to understand the model the record management system uses.

C. Both (a) and (b)

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


41. In SQL, which command is used to select only one copy of each set of duplicable rows

A. SELECT DISTINCT

B. SELECT UNIQUE

C. SELECT DIFFERENT
D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in

A. a tree file

B. an indexed file

C. a hashed file

D. a sequential file

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. Which command is used to select distinct subject (SUB) from the table (BOOK)?

A. SELECT ALL FROM BOOK

B. SELECT DISTINCT SUB FROM BOOK

C. SELECT SUB FROM BOOK

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


44. The master list of an indexed file

A. is sorted in ascending order

B. contains only a list of keys and record numbers

C. has a number assigned to each record

D. both (b) and (c)

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. Which of the following is not the responsibility of the utilities component of DBMS software?

A. creating the physical and logical designs

B. removing flagged records for deletion

C. creating and maintaining the data dictionary

D. monitoring performance

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


46. In SQL, the CREATE TABLESPACE is used

A. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace

B. to create a database trigger

C. to add/rename data files, to change storage

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. In SQL, which command is used to remove a stored function from the database?

A. REMOVE FUNCTION

B. DELETE FUNCTION

C. DROP FUNCTION

D. ERASE FUNCTION

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. The database administration function includes

A. application programming

B. computer operations management

C. database access planning

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

49. A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As

A. tables

B. relations
C. tuple

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

50. A command that lets you change one or more fields in a record is

A. Insert

B. Modify

C. Look-up

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


1. In SQL, the command(s) is(are) used to create an index for a table or cluster

A. CREATE INDEX

B. MODIFY INDEX

C. SET INDEX TO FILE

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


2. There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files
and then manipulate and retrieve the stored data. What are they called?

A. Data storage system

B. Database management system (DBMS)

C. Batch processing system

D. Data communication package

E. None of the above

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. A _____ DBMS distributes data processing tasks between the workstation and a network server.

A. Network

B. Relational

C. Client Server

D. Hierarchical

E. None of the above.

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. Information can be transferred between the DBMS and a

A. spreadsheet program

B. word processor program

C. graphics program

D. AH of the above

E. None of the above

Answer & Explanation


Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. Data integrity control

A. is used to set upper and lower limits on numeric data

B. requires the use of passwords to prohibit unauthorized access to the file

C. has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


6. In order to use a DBMS, it is important to understand

A. the physical schema

B. all sub-schemas that the system supports

C. one subschema

D. both (a) and (b)

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. In SQL, which command(s) is(are) used to recompile a stored function?

A. SET FUNCTION

B. SET STORED FUNCTION

C. ALTER FUNCTION
D. All of the above

E. None of the above

Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. Report generators are used to

A. store data input by a user

B. retrieve information from files

C. answer queries

D. both (b) and (c)

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. Administrate supervision of database activities is the responsibility of the

A. Database administrator

B. DP Manager

C. DB Manager

D. DP administration

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


10. Goals for the design of the logical schema include

A. avoiding data inconsistency

B. being able to construct queries easily

C. being able to access data efficiently

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


11. In SQL, which command(s) is(are) used to change a table's storage characteristics?

A. ALTER TABLE

B. MODIFY TABLE

C. CHANGE TABLE

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. In SQL, which of the following is not a data definition language commands?

A. RENAME

B. REVOKE

C. GRANT

D. UPDATE

E. None of the above

Answer & Explanation

Answer: Option D
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. Subschema can be used to

A. create very different, personalized views of the same data

B. present information in different formats

C. hide sensitive information by omitting fields from the sub¬schema's description

D. All of the above

E. None of the above

Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. Database management systems are intended to:

A. eliminate data redundancy

B. establish relationships among records in different files

C. manage file access

D. maintain data integrity

E. All of the above

Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. In SQL, which command(s) is(are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction?

A. CREATE PACKAGE

B. CREATE SCHEMA
C. CREATE CLUSTER

D. All of the above

E. None of the above ;

Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

You might also like