Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency
Last Answer : (C) Entity Integrity
Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints
Last Answer : B) Referential Integrity
Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint
Last Answer : (A) Integrity constraint
Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III
Last Answer : (A) I, II, III & IV
Description : What are the Referential actions supported by FOREIGN KEY integrity constraint ?
Last Answer : UPDATE and DELETE Restrict - A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade - When a referenced row is deleted all associated dependent rows are deleted.
Description : What are the Referential actions supported by FOREIGN KEY integrity constraint?
Last Answer : UPDATE and DELETE Restrict – A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade – When a referenced row is deleted all associated dependent rows are deleted.
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.
Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.
Description : Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? (A) An ... ) and (B) are true; (C) false. (4) (A), (B) and (C) are false.
Last Answer : Answer: 3
Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys
Last Answer : (B) Constraints
Description : Give two examples of referential integrity constraints.
Last Answer : rential integrity constraints.
Description : Describe Referential Integrity ?
Last Answer : A rule defined on a column (or set of columns) in one table that allows the insert or update of a row only if the value for the column or set of columns (the dependent value) matches a value ... data and the action to be performed on dependent data as a result of any action on referenced data.
Description : What is Referential Integrity ?
Last Answer : Maintaining data integrity through a set of rules that restrict the values of one or more columns of the tables based on the values of primary key or unique key of the referenced table.
Description : How can you Enforce Referential Integrity in snapshots ?
Last Answer : Time the references to occur when master tables are not in use. Peform the reference the manually immdiately locking the master tables. We can join tables in snopshots by creating a complex snapshots that will based on the master tables.
Description : Can Check constraint be used for self referential integrity ? How ?
Last Answer : ? Yes. In the CHECK condition for a column of a table, we can reference some other column of the same table and thus enforce self referential integrity.
Description : • Describe Referential Integrity?
Last Answer : A rule defined on a column (or set of columns) in one table that allows the insert or update of a row only if the value for the column or set of columns (the dependent value) matches a ... data and the action to be performed on dependent data as a result of any action on referenced data.
Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world
Last Answer : Answer: D
Description : ………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs. A) Instance B) Schema c) Program D) Super Key
Last Answer : B) Schema
Description : A data cannot flow between a store and i) a store ii) a process iii) an external entity A) i and iii B) i and ii C) ii and iii D) ii
Last Answer : A) i and iii
Description : A rectangle in a DFD represents A) a process B) a data store C) an external entity D) an input unit
Last Answer : C) an external entity
Description : A data flow can A) Only emanate from an external entity B) Only terminate in an external entity C) May emanate and terminate in an external entity D) May either emanate or terminate in an external entity but not both
Last Answer : C) May emanate and terminate in an external entity
Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.
Last Answer : C) It should avoid/reduce the redundancy.
Description : In an ER model, ……………. is described in the database by storing its data. A) Entity B) Attribute C) Relationship D) Notation
Last Answer : A) Entity
Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above
Last Answer : C) Security
Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors
Last Answer : A) Constraints
Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data
Last Answer : (B) Passwords to prohibit unauthorised access to files.
Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Last Answer : (D) (a), (b), (c) and (d)
Description : Which of the following auditor concerns most likely could be so serious that the auditor concludes that a financial statement audit cannot be conducted? a. The entity has no formal written ... subject to management override d. Management fails to modify prescribed controls for changes in conditions
Last Answer : The integrity of the entity’s management is suspect
Description : Specialization Lattice stands for (A) An entity type can participate as a subclass in only one specialization. (B) An entity type can participate as a subclass in more than one specialization. ... can participate in one specialization. (D) An entity type that can participate in one generalization.
Last Answer : (B) An entity type can participate as a subclass in more than one specialization.
Description : A set of possible data values is called (A) attribute. (B) degree. (C) tuple. (D) domain.
Last Answer : D) domain.
Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing
Last Answer : (B) Black-box testing
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : Process is ........................ A) A program in execution B) An instance of a program running on a computer. C) The entity that can be assigned to and executed D) All of the above.
Last Answer : D) All of the above.
Description : By an external entity we mean a A) Unit outside the system being designed which can be controlled by an analyst. B) Unit outside the system whose behavior is independent of the system being designed C) A unit external to the system being designed D) A unit which is not part of a DFD
Last Answer : C) A unit external to the system being designed
Description : The number of attributes in relation is called as its ..................... A) Cardinality B) Degree C) Tuples D) Entity
Last Answer : B) Degree
Description : A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity. A) Weak entity B) Strong entity C) Non attributes entity D) Dependent entity
Last Answer : A) Weak entity
Description : What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram ? (A) Generalization (B) Aggregation (C) Specialization (D) Adding suitable attributes
Last Answer : (D) Adding suitable attributes
Description : For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as : (A) Neighbour Set (B) Strong Entity Set (C) Owner entity set (D) Weak Set
Last Answer : (C) Owner entity set
Description : Consider the following Entity-Relationship (E-R) diagram and three possible relationship sets (I, II and III) for this E-R diagram: If different symbols stand for different values (e.g., t1 is definitely not equal to t2 ... diagram ? (A) I only (B) I and II only (C) II only (D) I, II and III
Last Answer : (A) I only
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : A) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : B) Integrity
Description : ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity. A) Column B) Constraint C) Index D) Trigger
Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces
Last Answer : D) Reduces
Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack
Last Answer : (C) Scheduling parameters
Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ? (A) 5 (B) 10 (C) 15 (D) 50
Last Answer : (A) 5
Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.
Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.