LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 True/False
  Question 
Encryption alone is sufficient to secure the data.
  Correct Answer 
False
  Your Answer 
False
 Multiple Choice Single Answer
  Question 
Which attribute holds multiple values for single entity?
  Correct Answer 
Multi valued attribute
  Your Answer 
Multi valued attribute
 Select The Blank
  Question 
________ is one closest to the users.
  Correct Answer 
Logical level
  Your Answer 
Physical level
 True/False
  Question 
All views are not updatable.
  Correct Answer 
True
  Your Answer 
False
 Multiple Choice Single Answer
  Question 
(%) stands for :-
  Correct Answer 
Sequence of n characters in character string
  Your Answer 
Sequence of n characters in character string
 True/False
  Question 
Logical 'OR' operator returns true if both component conditions are true otherwise returns false
  Correct Answer 
False
  Your Answer 
False
 True/False
  Question 
Structural constraints are specified to force the placement of information into structures.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
Immediate database modification uses :-
  Correct Answer 
Old Value & New Value
  Your Answer 
Only New Value
 True/False
  Question 
Distinct clause in select command eliminates rows that have exactly same contents in each column.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
  Correct Answer 
Program operation independence
  Your Answer 
Program operation independence
 Multiple Choice Multiple Answer
  Question 
Attributes are classified as :-
  Correct Answer 
Simple , Composite , Multivalued
  Your Answer 
Simple , Composite , Multivalued , Variant
 Multiple Choice Single Answer
  Question 
Security issues become more complex in which environment?
  Correct Answer 
Network
  Your Answer 
Network
 Multiple Choice Multiple Answer
  Question 
Set operators are as follows :-
  Correct Answer 
UNION , INTERSECT , MINUS
  Your Answer 
UNION , INTERSECT , MINUS
 Multiple Choice Single Answer
  Question 
What will you get when Data items are grouped together?
  Correct Answer 
Entity
  Your Answer 
Data
 Multiple Choice Multiple Answer
  Question 
The ICAM studies created lot of graphical methods for defining :-
  Correct Answer 
Functions , Data structures
  Your Answer 
Functions , Combinations , Data structures , Conditions
 True/False
  Question 
The information collected during requirement analysis forms input for information modeling.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Multiple Answer
  Question 
Security considerations apply to :-
  Correct Answer 
Data, database , DBMS , Users and applications
  Your Answer 
Users and applications , Variant , Data, database , DBMS
 Multiple Choice Multiple Answer
  Question 
Specify any three string functions used in SQL :-
  Correct Answer 
initcap(char) , upper(char) , lower(char)
  Your Answer 
lower(char) , initcap(char) , upper(char) , stringlength(char)
 Match The Following
Question
Correct Answer
Your Answer
select * from
order by
Views all columns in sorting ording by specified column_name
Views all columns in reverse order
Select * from
View all data from table.
Views all column satisfying condition in where clause
select , from
Views 2 specified column from table
Updates records which satisfy condition
select * from where
Views all column satisfying condition in where clause
Views all columns in sorting ording by specified column_name
 Multiple Choice Multiple Answer
  Question 
Write the attributes of entity "book" :-
  Correct Answer 
Book_no , Book_name , Price
  Your Answer 
Book , Book_no , Book_name , Price
 Select The Blank
  Question 
Database design model helps in improving________.
  Correct Answer 
Maintainability
  Your Answer 
Maintainability
 Select The Blank
  Question 
The program which allows multiple users and programs to access the database concurrently is called ________ a database.
  Correct Answer 
Sharing
  Your Answer 
Sharing
 Multiple Choice Single Answer
  Question 
If a data transfer failure is detected the system involves :-
  Correct Answer 
Recovery procedure
  Your Answer 
Check points
 Multiple Choice Multiple Answer
  Question 
To be able to successfully design and maintain databases we have to do following :-
  Correct Answer 
Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
  Your Answer 
Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
 True/False
  Question 
Wait-die scheme is based on preemptive technique.
  Correct Answer 
False
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
Backbone of any organization is :-
  Correct Answer 
Information
  Your Answer 
Information
 Select The Blank
  Question 
A ________ is a database that can maintain information such as video, images, sounds in traditional form.
  Correct Answer 
Universal server
  Your Answer 
Server
 Select The Blank
  Question 
An alternative technique to log based crash recovery is ________.
  Correct Answer 
Shadow Paging
  Your Answer 
Backup Mechanism
 Select The Blank
  Question 
File is collection of ________.
  Correct Answer 
Records
  Your Answer 
Records
 Multiple Choice Multiple Answer
  Question 
Some clauses of Revoke command are as follows :-
  Correct Answer 
FROM , ON
  Your Answer 
FROM , ON , ANY , MANY
 Multiple Choice Single Answer
  Question 
Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
  Correct Answer 
Single valued
  Your Answer 
Single valued
 Multiple Choice Multiple Answer
  Question 
Different E-R modeling styles are :-
  Correct Answer 
Rein 85 , IDEFIX , Crow's foot
  Your Answer 
Crow's foot , Rein 85 , IDEFIX , Functions
 Multiple Choice Multiple Answer
  Question 
Reasons of creation of views are :-
  Correct Answer 
When data security is required , When data redundancy is to be kept to minimum.
  Your Answer 
When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required
 Select The Blank
  Question 
Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
  Correct Answer 
Character string data types
  Your Answer 
Character string data types
 Multiple Choice Multiple Answer
  Question 
The front end of database consists of tools such as :-
  Correct Answer 
Forms , Query evaluators , Graphical user interfaces
  Your Answer 
Forms , Query evaluators , Report writers , Graphical user interfaces
 Select The Blank
  Question 
________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
  Correct Answer 
Security
  Your Answer 
Security
 Multiple Choice Multiple Answer
  Question 
What are secured using authorization and access control?
  Correct Answer 
The intranet , Local clients , Operators
  Your Answer 
The intranet , Local clients , Operators , The internet
 Multiple Choice Single Answer
  Question 
When two entities are associated then the relationship which exists is called :-
  Correct Answer 
Binary relationship
  Your Answer 
Quarterly relationship
 Multiple Choice Single Answer
  Question 
Shadow paging technique maintains two pages during the life time of a transaction namely :-
  Correct Answer 
Current page & Shadow page
  Your Answer 
Current page & Shadow page
 Multiple Choice Single Answer
  Question 
Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
  Correct Answer 
CURE
  Your Answer 
SERE
 True/False
  Question 
A fully developed data model includes domains for each attribute in the E-R model.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
Which of the following term means that the data model is not specific to any particular application?
  Correct Answer 
Sharebillity
  Your Answer 
Structured validity
 Match The Following
Question
Correct Answer
Your Answer
DBA
Data base administrator
Data base administrator
UML
Unified modeling language
Unified modeling language
DBMS
Data base management system
Data base management system
RDBMS
Relational DBMS
Relational DBMS
 True/False
  Question 
If attribute is multi-valued then single lines are used.
  Correct Answer 
False
  Your Answer 
True
 Select The Blank
  Question 
In________there is no security of data.
  Correct Answer 
DBMS
  Your Answer 
RDBMS
 Select The Blank
  Question 
________ is a process by which user's identity is checked.
  Correct Answer 
Authentication
  Your Answer 
Authentication
 True/False
  Question 
If attribute is derived dotted line is used.
  Correct Answer 
True
  Your Answer 
True