Description : A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters. A) Recovery utility B) Backup Utility C) Monitoring utility
Last Answer : B) Backup Utility
Description : ome of the utilities of DBMS are ............. i) Loading ii) Backup iii) File organization iv) Process Organization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv
Last Answer : B) i, ii and iii only
Description : Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data ... (B) III and IV only (C) I, II and III only (D) II, III and IV only
Last Answer : (D) II, III and IV only
Description : DBMS provides the facility of accessing data from a database through (A) DDL (B) DML (C) DBA (D) Schema
Last Answer : (B) DML
Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces
Last Answer : D) Reduces
Description : In distributed databases, location transparency allows for database users, programmers and administrators to treat the data as if it is at one location. A SQL query with location transparency needs to specify: (A) Inheritances (B) Fragments (C) Locations (D) Local formats
Last Answer : (B) Fragments
Description : How does one backup a database using the export utility? (for DBA
Last Answer : Oracle exports are "logical" database backups (not physical) as they extract data and logical definitions from the database into a file. Other backup strategies normally back-up the physical data ... exports include more information about the database in the export file than user level exports.
Description : Which of the following is not the responsibility of the utilities component of DBMS software? A. creating the physical and logicaldesigns B. removingflaggedrecords for deletion C. creatingand maintaining the data dictionary D. monitoring performance E. None of the above
Last Answer : creating the physical and logicaldesigns
Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.
Last Answer : (B) Multiple users wish to access the data.
Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above
Last Answer : Database management system (DBMS)
Description : In a Database Managemnt System (DBMS), the content and the location of the data is defined by the ____. (1) Multi Dimensional data (2) Sequence data (3) Meta data (4) Sub data
Last Answer : Meta data
Description : What steps were taken by Hitler to reconstruct Germany? -History 9th
Last Answer : Germany was crushed under the harsh terms of Treaty of Versailles when Hitler assumed power. The steps taken by Hitler to reconstruct Germany were: 1) Hitler assigned the responsibility of economic recovery to economist ... Japan and Italy 6) By the end of 1940, Hitler was at the peak of his power.
Last Answer : The steps taken by Hitler to reconstruct Germany were: Hitler assigned the responsibility of economic recovery to economist HjalmarSchacht who aimed at the full production and full employment through a state fund work creation programme. Hitler got success in foreign policy also.
Description : How can you increase the capacity of an Oracle tablespace? Note: there are 2 correct answers in this question A. Resize the existing data file B. Add a new data file to ... compression of backup data using Oracle advanced compression D. Increase the value of the database parameter DB_BLOCK_SIZE
Last Answer : B. Add a new data file to the existing tablespace
Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these
Last Answer : b) Backup software
Description : Which of the following concepts means adding new concepts to a program as it runs? (A) Data hiding (B) Dynamic loading (C) Dynamic typing (D) Dynamic binding
Last Answer : (B) Dynamic loading
Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program
Last Answer : (B) provide a mechanism to map physical device to file names
Description : Which process is used to reinstall data from a copy when the original data has been lost? a) Backup b) Recovery c) Benchmarking d) Data cleansing
Last Answer : b) Recovery
Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned
Last Answer : All of the mentioned
Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : b. recovery
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : Explain Database Management. What are the features of DBMS? -Technology
Last Answer : It refers to the software that is responsible for storing, maintaining and utilising a database. It enables a user to define, create and maintain the database and provide controlled access on it. A ... Data security e.g. MS-Access, Corel Paradox, Lotus Approach, MySQL, OpenOffice.org Base etc.
Description : DBMS is a program that controls the creation, maintenance and use of database. Here, DBMS referred to -Technology
Last Answer : (c) Here, DBMS stands for Database Management System.
Description : What is DBMS or Database Management System ?
Last Answer : DataBase Management System is the full form of DBMS . DBMS is a set of programs required for accessing , storing , controlling and managing interconnected information called database management systems.
Description : DBMS is a collection of ………….. that enables user to create and maintain a database. A) Keys B) Translators C) Program D) Language Activity
Last Answer : C) Program
Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware
Last Answer : d) Hardware
Description : …………… is a way to bind the data and its associated functions together which allows the data and functions to be hidden. A) Structure B) Class C) Enum D) Both A and B
Last Answer : B) Class
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : .................. allows selection of the relevant information necessary for the data warehouse. (A) The Top-Down View (B) Data Warehouse View (C) Data source View (D) Business Query View
Last Answer : Answer: A
Description : Select the alternative which consists of positive factors contributing to effectiveness of teaching: List of factors: (a) Teacher's knowledge of the subject. (b) Teacher's socio-economic background. (c) Communication skill of the teacher. ( ... and (f) (C) (b), (d) and (e) (D) (a), (c) and (f)
Last Answer : Answer: D
Description : Which of the following is/are the Database server functions? i) Data management ii) Transaction management iii) Compile queries iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv
Last Answer : A) i, ii, and iv only
Description : Identify the criteria for designing database from the point of view of user A) No redundancy B) No inapplicable attributes C) Uniformity in naming & definitions of the data items D) All of the above
Last Answer : D) All of the above
Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.
Last Answer : C) It should avoid/reduce the redundancy.
Description : ………. contains data assisting day to day activities of the organization. A) Control database B) Operational database C) Strategic database D) Sequential database
Last Answer : B) Operational database
Description : A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above
Last Answer : B) is a standard way of organizing information into accessible parts.
Description : In an ER model, ……………. is described in the database by storing its data. A) Entity B) Attribute C) Relationship D) Notation
Last Answer : A) Entity
Description : Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as (A) Data mining (B) Meta data (C) Data warehousing (D) Database
Last Answer : (C) Data warehousing
Description : A Network Schema (A) restricts to one to many relationship (B) permits many to many relationship (C) stores Data in a Database (D) stores Data in a Relation
Last Answer : (B) permits many to many relationship
Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Last Answer : (D) (a), (b), (c) and (d)
Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ? (A) 5 (B) 10 (C) 15 (D) 50
Last Answer : (A) 5
Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary
Last Answer : (A) Indexes
Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.
Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.
Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.
Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.
Description : In Data mining, classification rules are extracted from .............. (A) Data (B) Information (C) Decision Tree (D) Database
Last Answer : (C) Decision Tree
Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System
Last Answer : (C) Data warehouse
Description : Relational database schema normalization is NOT for: (A) reducing the number of joins required to satisfy a query. (B) eliminating uncontrolled redundancy of data stored in the database. (C) ... could otherwise occur with inserts and deletes. (D) ensuring that functional dependencies are enforced.
Last Answer : reducing the number of joins required to satisfy a query.
Description : Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? (A) An ... ) and (B) are true; (C) false. (4) (A), (B) and (C) are false.
Last Answer : Answer: 3
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.
Last Answer : (1) Neither I nor II is correct.