You are on page 1of 10

lOMoARcPSD|34390831

DBA level 3 COC Questions

Computer_Security (Addis Ababa University)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Ebo Sdt (ebosdt@gmail.com)
lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

1. The process of dumping data from database transaction log or file


A. Database backup c. Database restore \
B. Database recovery d. Database transaction
2. A set of object that share the same attributes operation and relation ship
A. Object B. Class C. Interface D. Coding
3. The process of extracting sharing characteristics from two or more class and combining them into a super
class
A. Specialization
B. Generalization
C. Division
D. Separation
4. Designed to test and trial design to enhance precision by system analyst and user
a. Audit trial B. Feedback C. Prototype D. Association
5. Entity type that do not have key attribute (strong key) are called
A. Weak entity type C. Strong entity type
B. Weak attribute type D. Strong attribute type
6. Which one of the following is should not be consider when we plan the database
A. User need and requirement C. The complexity and simplicity of the work
B. The designer interest D. Feasibility of the database system
7. You run the select statement and multiple duplicate of values retrieved what key word can you use to retrieve
only the non-duplicate values /data
A. Duplicate B. Individual C. Distinct D. Separate
8. Which one of the following is not single value attribute
a. Sex B. Id number C. Color of eye D. Address
9. A student table versus course is relation will be
a. One to one B. One to money C. Money to money D.No relation ship
10. Which one of the following is not data type
A. Id B. date time c. text d. number
11. Which one of the following is the database management system
A. Microsoft access B. ORACLE C. Adobe reader d. Microsoft sql servere
12. Which one of the following is not necessary information to backup the database
a. Name of database to backup
b. Backup device to be backup
c. Whether you granted to operate the backup test
d. Model of the database
13. Which one of the following is number data type
A. N12 B. 123.45 C. XYZ D.08GH
14. In which database model is information organized in table
a. Relational database b. object oriented c. network d. hierarchical
15. Revoking involves
a. removing previously granted permission from user account ,role or group in the database
b. Removing previously denied permission from user account role or group in the database
c. Removing previously granted or denied permission from a user account role or group in a database
d. Removing a user from a role or group
16. Which one of the following is not true about the primary key

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

a. Primary key do not allow null values


b. No two rows can have the same primary key values
c. Aprimary key value always uniquely identifies a single row
d. All tables must have aprimary key
17. Which of the following is not true about index
a. Provides fast access to data in the rows of the table
b. Enforces uniqueness on the row in the table
c. Is applied only for char data type
d. The primary key of a table is automatically indexes
18. Which one of the following true about a view
a. It is a base table C. It is partly a derived and base table
b. It is derived table D.It is stored table
19. Which one of the following are central to normalization
a. Functional dependency C. foreign key
b. Query d. data type
20. Which statement should you use to change existing data in one or more rows in a table
a. Select b. insert c. update d. modify
21. You can not include sub queries in
a. Select b. insert c. update d. drop
22. Which types of join should you use if you want to retrieve only match rows
A. INNER JOIN B. Left outer join c. right outer join d. full join
23. One of the following is not barrier in communication
a. Understanding each other
b. Poor listening and pre-matured evaluation
c. Language difference and poor expression
d. Emotionality
24. Task measurement and evaluation are made except
a. After the task is completed
b. During the accomplishment of task
c. Before the task is identified
d. After the plan of task is complied
25. Which of the following terms refers to the degree to which data in the database system are accurate ,correct
and consistent
a. Data security b. data manipulation c. data independences d. data integrity
26. One of the following creates a virtual relation for storing the query ?
a. Function b. view c. procedure d. entity
27. Which one of the following provides the ability to query information from the database to insert tuples
into ,delete tuples from ,and modify tuples in the database ?
a. DML B. DDL C. Query D. relational schema
28. Which one of the following related entity set has its own schema and there is an additional schema for the
relation ship set
a. One to many relation ship set
b. Many to many relation ship set
c. A multi value attribute of an entity set
d. One tone relation ship set

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

29. Select * from employee where dept name =’’comp sei’’ in this sql statement there is an error identify the error
a. Select b. employee c. from d. ’’comp sei’’
30. Which one of the following is not a data type in sql server
a. ID b. DATETIME c. DOUBLE d. MONEY
31. In identifying primary key which of the following is wrong statement
a. They can not be null
b. Only unique values can be assigned to then
c. They can not be character data type
d. They can be used as references for other columns in related table
32. To fix the database after failure such as ahard disk malfunction the appropriate key word is
a. Backup b. recovery c. security d. access control
33. With DBMS which of the following is not the data definition language (DDL) Command
A. ALTER B. update C. create D. Drop
34. In Sql which one of the following is a correct syntax to modify atable
a. Alter table<table name > <column name ><data type ><field size><constraints >
b. Alter table add<column name ><data type><field size><constraints >
c. Alter table<table name > add <column name ><data type><field size><constraints >
d. Alter table<table name > drop <column name ><data type><field size><constraints >
35. Which of the following referential integrity constraints should be enforced to specify automatic deletion of
foreign key record when arecord in the base table deleted
A. On drop cascade b. on delete cascade c. on update cascade ` d. on drop set null
36. All of the following can be considered as entity integrity constraint except
A. Unique b. foreign key c. identity d. primary key
37. In the database design which of the following is could be the first task
A. Identifying entity types c. identifying relation ship types
B. Normalization D. Determine field domains
38. At which stage of database design data integrity rule is maintained
a. Data definition stage c. data manipulation satge
b. Normalization d. security
39. At which stage of database design data integrity rule maintained
A. DATA definition c. data manipulation
B. Normalization d. security
40. In database relation no attribute of primary key can assume avalue of null this type of constraint indicate
a. Domain integrity c. enterprise integrity
b. referential integrity d. entity integrity
41. Which of the following data definition language adds one or more column to the existing table ?
a. Update b. alter c. create d. add
42. Which of the following query selects the student whose f_name begin with ‘cha’?
a. Select * from student
b. Select * from student where f_name=’cha ’
c. Select * from student where f_name like ’cha% ’
d. Select * from student where =’cha ’
43. In a flow chart decision symbol is represented by _____
a. Diamond b. rectangle c. ellipse d. circle
44. In entity relation ship diagram if we represent an entity with double rectangle then what it implies ?

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

a. An entity is strong entity c. an entity is weak entity


b. An entity is multi valued d. an entity is null
45. Suppose you have person table select * from person where firstname like ‘f%’
a. Record which contain f% in their first name from person table
b. All record the first name begins with f from person table
c. Record which contain f in their firstname from person table
d. All record the first name begins with person from person table
46. An attribute that calculated from other attribute example age can be calculate from birth date is called
a. Simple attribute b. composite attribute c. derived attribute d. multi value attribute
47. Which DML language changes the value of one or more column s based on the condition
a. Select b. update c. delete d. create
48. Can be used a security mechanism by allowing users data with out granting the users permission to directly
access the underline base table
A. Table b. view c. index d. report
49. When the value is one or more attribute being used as foreign key must exist in another set of one or more
attributes in another table we have created
a. Transitive dependency c. insertion anomaly
b. Referential integrity d. normal form
50. Which one of the following is no an aggregate function
A.MIN b. MAX c. SELECT d. AVG
51. THE attribute that can be divided in to other attribute
A. simple attribute b. composite attribute c. multi value attribute d. derived
52. the different class of relation created by the technique for preventing modification anomalies are called
A. normal form c. referential integrity constraint
B. functional dependencies d. delete anomalies
53. which of the following indicates maximum number of entities that can be involved in a relationship
A. minimum cardinality b. maximum cardinality c. ERD d . greater entity count
54. which type of entity can not exist in the database unless another type of entity also exist in the database but
does not require that the identifier of that other entity be included as part of its own identifier
A. weak entity C. strong entity
B. c. id dependent entity D.ID independent entity
55. which of the following is true regarding referential integrity
A. every primary key value must match aprimary key value in associated table
B. every primary key value must match foreign key value in associated table
C. every foreign key value must match primary key value in associated table
D. every foreign key value must match foreign key value in associated table
56. Which of the following key word displays the unique values of the domain
a. ALL B. FROM C. Distinct d. name
57. Which of the following statements contains an error
a. Select * from emp where empid=10003;
b. Select empid from emp where empid=10006;
c. Select empid from emp
d. Select empid where empid=1009 and lastname =’kebede’
58. Insert into employee______ (1002,joey,2000) in the given query which of the keywords has to be inserted?
a. Table b. values c. relation d. field

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

59. In which normal form a composite attribute is converted into individual’s attribute
a. First b. second c. third d. fourth
60. By default, the order by clause lists an item?
a. Descending b. any c. same d. asending
61. All of the following are results of kaizen implementation in work place except
a. Improvement in product quality c. safety in work place
b. Efficient space utilization d. high waiting time
62. Which of the following is not market promotional tool?
a. Supply/demand b. seminars c. advertising d. networking and referral
63. Which of the following of categorized as richest channel in conveying information effectively?
a. Telephone b. face to face communication c. posted notices and bulletins d. e-mail
64. Create table employee (id integer, name varchar (20), salary money not null) which of these insert statement
will produce error
a. Insert into employee values (1005,’rach’,0) c. Insert into employee values (1002,’joey’,335)
b. Insert into employee values (1007,’ross’,) d. Insert into employee values (4502,’beza’,780)
65. An employee table to include the attributes whose value always have some value which of the following
constraints must be used?
a. Null b. not null c. unique d. distinct
66. An entity set that does not have sufficient attributes to form primary key is:-
a. Strong entity set b. variant set c. weak entity set d. variable set
67. Among the following term which one can be considered as multi value attribute ?
a. Name b. birth date c. college diploma d. id
68. Assume that there are two given tables people and language table under the same database name what will be
possible relationship between those tables
a. One to one b. one to many c. many to many d. has no relation
69. In flow chart which one of the following shows the decision that must be made ?
a. Rectangle b. elongated ellipse c. diamond d. arrow
70. All of the following are SQL server’s system database component except
A. Master database b. conventional database c. model database d. tempdb database
71. Which of the following could not be considered as entity type?
a. Book b. sex c. customer d. material
72. With SQL how can you return the number of all record in the department table?
a. Select count * from department c. Select count from department
b. Select count () from department d. Select count (*) from department
73. With SQL how can you return all record from table named employee sorted descending by first_name ?
A. Select * from employee order by first_name descending
B. Select * from employee order by first_name desc
C. Select * from employee order by first_name asc
D. Select * from employee order by first_name ascending
74. The presence of partial dependencies will be removed during
a. Second normal form c. first normal form
b. Insertion of data d. ER to relational mapping
75. With SQL how can you insert new record into firstname and last_name in the employee
a. Insert into employee (firstname,last_name)values (‘haimanot’,’aster’)
b. Insert into employee (‘haimanot’,’aster’)

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

c. Insert values into employee (‘haimanot’,’aster’)


d. Insert into (firstname,last_name)values (‘haimanot’,’aster’)
76. In SQL server which one of the following is wrong statement ?
a. Each entity name should be unique in the same database
b. Two attributes of an entity type can have the same name
c. Count function does not return the null if no rows satisfy the where clause
d. In operator allows you to specify multiple values in where clause
77. In DBMS which of the following is an advantage ?
A. Requires expertise and resource to administrator
B. Facilitated development of new application program
C. Initial training required for all users
D. Cost of hardware and software
78. The requirements for using identity property can be specified as
a. It can be defined with character data types c. It can be updated
b. only one identity column is allowed per table d. it doesn’t allow null values
79. use the above table employee and department table that are realized with the deptnumber column which can be
SQL code to provide answer to the following question ?
find firstname and salary of all female employees who are working in accounting department
a. select gender from employee where deptmname =’accounting’
b. select firstname,salary from employee where gender =’female’and departmentnumbe in ( select
deptnumer from department table where deptname =’accounting ’ )
c. select gender ,firstname, salary from employee where gender =’female’ and deptname =’accounting’
d. select firstname,salary from employee department where gender =’female’
80. the process of bringing together all of the modules that a program comprises for testing purpose is?
a. Unit test b. integration testing c. system testing d. stub testing
81. Atype of backup in which backup is taken when database is offline not accessible for updating and users
cannot do any thing on the database
a. Partial b. cold c. hot d. shadow \
82. In case of back ward recovery
a. Unwanted changes are eliminated
b. Changes of some failed transaction are applied to the database
c. All changes made by various transaction are done
d. The changes are un specified
83. Preparing technical documentation in database design is for the sake of
a. Future enjoyment b. future reference c. user manual d. for testing
84. Type of documentation that consists of the details of steps and procedures for using database is
a. Technical documentation c. schema documentation
b. user documentation d. requirement documentation
85. In which step of database normalization is that no non primary key field is transitively dependent on the
primary key
a. First normal form b. second normal form c. third normal form d. fourth normal form
86. Which one is the correct order in the development of database design
a. Requirement analysis--- Logical design --physical design ---implementation --maintenance
b. Requirement analysis--- physical design -- Logical design ---implementation --maintenance
c. Requirement analysis--- physical design -- implementation --- Logical design --maintenance

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

d. Requirement analysis--- Logical design --physical design --- maintenance -- implementation
87. The following are property of quality database except ?
a. Well normalized b. weak performance c. highly secured d. cost effective
88. How would you resolve the conflicts occurred at your team organization
A. Discussing with team member c. blaming the team member
B. Dividing the team member D. making incentive in some members
89. In a given organization the only communication channel is internet if one faces a serious problem
unexpectedly how he/she communicate with her/him ?
a. Through telephone C. through friend in the organization
b. Through e-mail D. Through fax
90. Which of the following tool is used to improve a business activity
a. SWOT analysis C. SMART ANALAYSIS
b. Changing business type D. decreasing the number of employees
91. Improvement of product quality wastage minimization work place safetly and efficient resource utilization in
the organization can be achieved by implementing
a. BPR B. BSC C. KAIZEN D. SMT
92. A relational database is the group of
a. Common fields B. field values C. Records D. TABLE
93. DATABASE models were developed to
a. Model real world events or condition
b. Deposit data within a single file
c. Keep data within multiple data repositories
d. Allow DBMS to maintain lose control over the database activities
94. The RDBMS
A. Does not manage the data structure
B. Allows the users /designer to ignore the logical view of the database
C. Performs function provide by the hierarchical and network DBMS system
D. Does not manage the details of physical storage
95. AN RDBMS hides the system complexity from the user/designer because
a. It does not exhibit data independence C. It does not exhibit structural independences
b. Data management is easier D. Provide object oriented concepts to the database system
96. Database modeling describes
a. How data are represented for an access to user and programmers
b. The different relationship that can exist b/n d/t terms in the database
c. How data elements are stored in the database
d. All of the above
97. If the maximum cardinality number is equals to 1 in both direction of relationship, then it is classified as
a. One to one b. many to many c. one to many d. optional
98. Derived valued attributes
a. Are those that may take on more than one value for under entity instance
b. Can be logically grouped in to super attributes
c. Represent value that is calculated from the value of related attributes
d. Are those that may not null
99. Multi value attributes
a. Are those that may take on more than one value for under entity instance

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

b. Can be logically grouped in to super attributes


c. Represent value that is calculated from the value of related attributes
d. It has single value
100. Relational DB approach
a. It store data using tables c. doesn’t require predefined relationship
b. Physical order of the records is immaterial d. all of the above
101. The conceptual level of doesn’t represent
a. All entities attributes and their relation ship c. constraints on the data
b. Syntactic information about the data d. security and integrity information
102. The process of running the database system with the target of finding programming error
a. Implementing b. planning c. testing d. operational maintenance
103. Reporting to make sure that the type of and quality end of product meet the needs of the user
a. Quality assurance c. quality control
b. Standard operation procedure d. service delivery
104. The requirements of using identity property can be specified as
a. It can be defined use character data types c. only one identity column is allowed per table
b. It can be updated D. IT DOESNOT ALLOW NULL VALUES
105. IN work place which are not the main factor model of job performance
A. motivation B. Absence c. record information D. JOB Satisfaction
106. In DBMS which of the following is not data definition language (DDL) Command
a. Alter b. create c. update d. drop
107. SQL statements to change all employee salary whose names begin with the letter ‘SH’ from the employee
table
a. Modify employee set salary =4000 where name like ‘SH %’
b. UPDATE employee set salary =4000 where name like ‘SH %’
c. Modify employee set salary =4000 where name like ‘%SH ’
d. UPDATE employee set salary =4000 where name like ‘%SH’

Downloaded by Ebo Sdt (ebosdt@gmail.com)


lOMoARcPSD|34390831

DATABASE LEVELL 3 COC THEORY QUESTION

Downloaded by Ebo Sdt (ebosdt@gmail.com)

You might also like