Vous êtes sur la page 1sur 7

H

F-XC A N GE
Question - Answer List Page 1 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k LIST OF ATTEMPTED QUESTIONS AND ANSWERS c u-tr a c k

True/False
Question Security is important issue in database management .

Correct Answer True

Your Answer True

True/False
Question In shadow paging recovery is done using current page.

Correct Answer False

Your Answer True

Select The Blank


Question ________means data is protected from deletion and corruption, both while it
resides within database
Correct Answer Data integrity

Your Answer Data security

Multiple Choice Single Answer


Question Indexes canbe dropped by using

Correct Answer DROP INDEX

Your Answer DROP INDEX

True/False
Question If GRANT include the WITH GRANT OPTION, the grantee can further grant
object privilege to other users.
Correct Answer True

Your Answer True

Select The Blank


Question UML additionaly provide set of ________that can be invoked to compute
values on the basis of attributes of the object
Correct Answer functions

Your Answer program

Select The Blank


Question ________regulates all user access to named objects through privileges

Correct Answer Discretionary access control

Your Answer System access control

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006
H
F-XC A N GE
Question - Answer List Page 2 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k c u-tr a c k

True/False
Question Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
Correct Answer False

Your Answer True

Multiple Choice Multiple Answer


Question The uses of external model are

Correct Answer Program has set of relationships , logical independence , ensuring database
security
Your Answer Program has set of relationships , logical independence , ensuring database
security

Multiple Choice Multiple Answer


Question SSL protocol provides

Correct Answer authorisation , data encryption , data integrity

Your Answer data encryption , data integrity , security

Match The Following


Question Correct Answer Your Answer

Database design real world entities describe file structures

External level Highest level Highest level

Conceptual database design independent of implementation describe storage structure


design
Physical database design describe storage structure describe record designs

Multiple Choice Multiple Answer


Question Which of the following are valid SQL commands.

Correct Answer ALTER , UPDATE

Your Answer ALTER , UPDATE

Select The Blank


Question The information collected in requirement analysis stage is ________for
information modeling
Correct Answer input

Your Answer data

Select The Blank


Question ________are binary computer representations of stored logical entities

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006
H
F-XC A N GE
Question - Answer List Page 3 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k Correct Answer Data c u-tr a c k

Your Answer Data

Select The Blank


Question A________ mechanism that can be used to provide authorization

Correct Answer role

Your Answer Security

Multiple Choice Single Answer


Question Write SQL statement, which shows contents of table book, whose price is less
than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000

Your Answer select * from book where price>1000 and price<4000

Multiple Choice Multiple Answer


Question Which of the following are functions of DBA

Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security ,
contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security ,
Data operation

Multiple Choice Single Answer


Question A database must be prtotected against

Correct Answer viruses

Your Answer modification

Multiple Choice Multiple Answer


Question Application development tools are

Correct Answer Power Builder , VB

Your Answer VB , C++

Multiple Choice Multiple Answer


Question Which of the following is a database privilege

Correct Answer The right to connect the database , The right to create table , The right to
select rows from another user's table
Your Answer The right to connect the database , The right to create table , The right to
select rows from another user's table

Select The Blank


Question Integrated computer aided manufacturing studies is long form of ________

Correct Answer ICAM

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006
H
F-XC A N GE
Question - Answer List Page 4 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k c u-tr a c k
Your Answer ICAM

Select The Blank


Question ________are used to find and steal user names and passwords

Correct Answer Packet sniffers

Your Answer Network sniffers

Select The Blank


Question A ________is permission to access a named object in a prescribed manner

Correct Answer Previlege

Your Answer Authorisation

Match The Following


Question Correct Answer Your Answer

E-R diagram Similar to class diagram Similar to class diagram

Use case Interaction between users and information processing


system
Activity diagrams Flow of tasks between Flow of tasks between
components components
Implementation diagram System components and their Interaction between hardware
connection and software

Multiple Choice Single Answer


Question Write a command to select privileges on catalog table from John.

Correct Answer REVOKE SELECT ON CATALOG FROM JOHN

Your Answer REVOKE SELECT ON CATALOG FROM JOHN

Select The Blank


Question ________provides a graphical means of modeling various components of
software system
Correct Answer UML

Your Answer ERD

Multiple Choice Single Answer


Question One method of protecting the privacy and integrity of a system is to place a
firewall between internet and
Correct Answer Public network

Your Answer Private intranet

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006
H
F-XC A N GE
Question - Answer List Page 5 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k c u-tr a c k

Select The Blank


Question ________is a process by which user's identity is checked

Correct Answer Authentication

Your Answer Authentication

Multiple Choice Multiple Answer


Question Reasons of creation of views

Correct Answer When data security is required , When data redundancy is to be kept to
minimum.
Your Answer When data security is required , When data redundancy is to be kept to
minimum. , When sharing of data is required

Multiple Choice Single Answer


Question If a user is able to manipulate system resources to deny their availabilty to
other users. Then this is reffered to as
Correct Answer denial of service

Your Answer denial of service

Select The Blank


Question Enitity name is written in ________in E-R diagram

Correct Answer upper case

Your Answer lowercase

Multiple Choice Multiple Answer


Question To be able to successfully design and maintain databases we have to do
following
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us ,
Data dictionary
Your Answer Hardware manipulations , Identify relationship between objects , Data
dictionary

Multiple Choice Single Answer


Question To enter new field city in the table 'branch_master' following command is used

Correct Answer alter table branch_master add(city varchar2(25))

Your Answer alter table branch_master add(city varchar2(25))

Select The Blank


Question ________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Correct Answer Access control

Your Answer Access control

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006
H
F-XC A N GE
Question - Answer List Page 6 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k c u-tr a c k

Multiple Choice Single Answer


Question Write command to give system privileges for creating tables and views to
Meera
Correct Answer GRANT CREATE TABLE,CREATE VIEW TO MEERA

Your Answer GRANT CREATE VIEW TO MEERA

True/False
Question The undo and redo list of transactions are always full.

Correct Answer False

Your Answer True

True/False
Question Composite attribute is one that holds a single value for single entity

Correct Answer False

Your Answer True

Multiple Choice Multiple Answer


Question Which of the following are functions of DBA

Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security ,
contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security ,
Data operation

True/False
Question You cannot grant or revoke system privileges to users and roles.

Correct Answer False

Your Answer False

Multiple Choice Single Answer


Question Select the model based on a collection of objects.

Correct Answer Object oriented model

Your Answer Object oriented model

Multiple Choice Single Answer


Question In an Entity relationship diagram total participation of an entity in a
relationship set is indicated by :
Correct Answer Double line

Your Answer Rectangle

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006
H
F-XC A N GE
Question - Answer List Page 7 of 7 H
F-XC A N GE
PD PD

!
W

W
O

O
N

N
y

y
bu

bu
to

to
k

k
lic

lic
C

C
w

w
m

m
w w
w

w
o

o
.d o .c .d o .c
c u-tr a c k True/False c u-tr a c k

Question If attribute is derived dotted line is used

Correct Answer True

Your Answer True

True/False
Question DES provides standards based encryption for data privacy

Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question Which of the following are object oriented features

Correct Answer Inheritance , Abstraction

Your Answer Inheritance , Abstraction , Polymerisation

True/False
Question Logical data independence is the capacity to change conceptual schema
without having to change external schema.
Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question Following are properties of roles allowed for easier privilege management

Correct Answer Reduced privilege administration , Dynamic privilege administration ,


application awareness
Your Answer Reduced privilege administration , Dynamic privilege administration ,
application awareness

Multiple Choice Multiple Answer


Question A Database Management System has several subsystems

Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage


Manager Subsystem
Your Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage
Manager Subsystem

http://www.scdl.net/Assessment/Student/PreviousDetailScoreCard.aspx 8/17/2006

Vous aimerez peut-être aussi