LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question
Security considerations apply to
Correct Answer
users and applications , data, database , dbms
Your Answer
data, database , dbms , users and applications
Select The Blank
Question
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Correct Answer
Access control
Your Answer
Access control
Multiple Choice Multiple Answer
Question
Advantages of Database Management System
Correct Answer
Reduced redundancy , Sharing of data , Security
Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for
execution and storage is less
Multiple Choice Multiple Answer
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to
select rows from another user's table
Your Answer
The right to connect the database , The right to create table , System
programming
True/False
Question
You cannot grant or revoke system privileges to users and roles.
Correct Answer
False
Your Answer
False
True/False
Question
Centralised Database Management cannot support multiple users.
Correct Answer
False
Your Answer
False
Match The Following
Question
Correct Answer
Your Answer
Menu driven interface
Stand alone user
Query language interface
Casual user
DBA
Programming language interface
Application user
Application user
Forms and command code
Parametric user
Storage Manager
Multiple Choice Multiple Answer
Question
Different syntaxes used for update command in SQL are as follows.
Correct Answer
update
set = , update
set = where
Your Answer
update
set = where
Multiple Choice Multiple Answer
Question
Some examples of select command are as following using emp_table
Correct Answer
select * from emp; , select empno,name from emp , select empno,name from emp
where salary in(9000,10000);
Your Answer
select * from emp; , select empno,name from emp where salary in(9000,10000);
Multiple Choice Multiple Answer
Question
Strong entities are also called as
Correct Answer
dominant , Parent , owner
Your Answer
dominant , owner
Multiple Choice Multiple Answer
Question
Specify any three string functions used in SQL
Correct Answer
lower(char) , initcap(char) , upper(char)
Your Answer
lower(char) , upper(char) , stringlength(char)
Multiple Choice Single Answer
Question
What will you get when Data items are grouped together.
Correct Answer
Entity
Your Answer
Entity
Select The Blank
Question
A________ mechanism that can be used to provide authorization
Correct Answer
role
Your Answer
role
Multiple Choice Multiple Answer
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to
select rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to
select rows from another user's table , System programming
Multiple Choice Single Answer
Question
In order to implement checkpoint the log is checked :
Correct Answer
Backwards
Your Answer
Backwards
Multiple Choice Single Answer
Question
( _ ) stands for
Correct Answer
any single character in character string
Your Answer
any single character in character string
True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Entities are represented in ________in E-R diagram
Correct Answer
Rectangular box
Your Answer
square box
True/False
Question
The SSL protocol developed by microsoft corporation, is an industry accepted
standard for network transport layer security
Correct Answer
False
Your Answer
True
Multiple Choice Single Answer
Question
One method of protecting the privacy and integrity of a system is to place a
firewall between internet and
Correct Answer
Public network
Your Answer
intranet
True/False
Question
SQL is low level language
Correct Answer
False
Your Answer
True
True/False
Question
To update city_name to bombay following command is used. UPDATE EMP_TABLE
SET CITY='BOMBAY';
Correct Answer
True
Your Answer
True
Select The Blank
Question
________are binary computer representations of stored logical entities
Correct Answer
Data
Your Answer
Program
Multiple Choice Single Answer
Question
Degree of relationship indicates no of associated -
Correct Answer
Entities
Your Answer
Entities
Multiple Choice Single Answer
Question
To enter new field city in the table 'branch_master' following command is
used
Correct Answer
alter table branch_master add(city varchar2(25))
Your Answer
alter table branch_master add(city varchar2(25))
Multiple Choice Single Answer
Question
The set of all relationships of the same type called as
Correct Answer
Relationship set
Your Answer
Relationship set
True/False
Question
In Database management system, protection includes against hardware and
Software malfunctions and not against unauthorized access.
Correct Answer
False
Your Answer
False
Select The Blank
Question
UML additionaly provide set of ________that can be invoked to compute values
on the basis of attributes of the object
Correct Answer
functions
Your Answer
functions
True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Data can be inserted by row in a table following command can be used.
Correct Answer
INSERT
Your Answer
INSERT
Select The Blank
Question
________is a process by which the user's privileges are ascertained
Correct Answer
Authorisation
Your Answer
Authentication
True/False
Question
Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
Correct Answer
False
Your Answer
False
Select The Blank
Question
The information collected in requirement analysis stage is ________for
information modeling
Correct Answer
input
Your Answer
input
Multiple Choice Multiple Answer
Question
Attributes are classified as
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued
Multiple Choice Single Answer
Question
In three tier architecture, the layer which provides user interface and
interacts with the user is :
Correct Answer
Presentation layer
Your Answer
Presentation layer
Match The Following
Question
Correct Answer
Your Answer
Authorisation
permission given to user
Provide authority
Previlege
Permission for accessing objects
Permission for accessing objects
Role
Provide authority
permission given to user
Integrity
hallmark of data security
hallmark of data security
Multiple Choice Single Answer
Question
Overheads can be reduced by is introducing :
Correct Answer
checkpoints
Your Answer
checkpoints
Multiple Choice Multiple Answer
Question
What are secured using authorisation and access control.
Correct Answer
The intranet , local clients , opearators
Your Answer
The intranet , the internet
Multiple Choice Single Answer
Question
Which type of attribute holds single value for single entity?
Correct Answer
single valued attribute
Your Answer
simple attribute
Select The Blank
Question
________regulates all user access to named objects through privileges
Correct Answer
Discretionary access control
Your Answer
System access control
Multiple Choice Multiple Answer
Question
Which of the following are object oriented features
Correct Answer
Inheritance , Abstraction
Your Answer
Inheritance , Polymerisation
Multiple Choice Multiple Answer
Question
Three levels of database service
Correct Answer
External level , Conceptual level , Physical level
Your Answer
External level , Conceptual level , Physical level
Select The Blank
Question
The most widely used conceptual model is________
Correct Answer
E-R model
Your Answer
E-R model
Select The Blank
Question
A________ mechanism that can be used to provide authorization
Correct Answer
role
Your Answer
role
Select The Blank
Question
A________is a situation,event or Personnel that will adversely affect the
database security and the smooth functioning of organization
Correct Answer
Threat
Your Answer
Threat
True/False
Question
Using database redumdancy can be removed
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
What is alternative name for functions
Correct Answer
methods
Your Answer
programs
No comments:
Post a Comment