Description : Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? (A) An ... ) and (B) are true; (C) false. (4) (A), (B) and (C) are false.
Last Answer : Answer: 3
Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Last Answer : (D) (a), (b), (c) and (d)
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints
Last Answer : B) Referential Integrity
Description : Which of the following was one of the weaker aspects of early cloud computing service offerings? a) Logging b) Integrity checking c) Consistency checking d) None of the mentioned
Last Answer : Logging
Description : The DBMS utility, ...................... allows to reconstruct the correct state of database from the backup and history of transactions. A) Backup B) Recovery C) Monitoring D) Data loading
Last Answer : B) Recovery
Description : Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data ... (B) III and IV only (C) I, II and III only (D) II, III and IV only
Last Answer : (D) II, III and IV only
Description : DBMS provides the facility of accessing data from a database through (A) DDL (B) DML (C) DBA (D) Schema
Last Answer : (B) DML
Description : ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity. A) Column B) Constraint C) Index D) Trigger
Last Answer : (B) Constraints
Description : ………………… approach reduces time and effort required for design and lesser risk in database management. A) Single global database B) Top-down approach C) Multiple databases D) None of the above
Last Answer : C) Multiple databases
Description : Recording of capital contributed by the owner as liability ensures the adherence of principle of– (A) Consistency (B) Going concern (C) Separate entity (D) Materiality
Last Answer : Answer: Separate entity
Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.
Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.
Description : When a teacher ensures that students complete an exercise in mathematics and makes sure instructions are clear and specific. The teacher ensures the ........ aspect of assessment Options: A) A Validity B) Practicality C) Reliability D) Wash-back effect
Last Answer : A) A Validity
Description : Which of the following statement is correct? Options: A) Reliability ensures validity B) Validity ensures reliability C) Reliability and validity are independent of each other D) Reliability does not depend on objectivity
Last Answer : C) Reliability and validity are independent of each other
Description : Which of the following statement is correct ? (A) Reliability ensures validity (B) Validity ensures reliability (C) Reliability and validity are independent of each other (D) Reliability does not depend on objectivity
Last Answer : Answer: B These two terms, reliability and validity, are often used interchangeably when they are not related to statistics. When critical readers of statistics use these terms, however, they refer to different ... step on it) but will not be valid, since it is not reading your actual weight.
Description : Which of the following is a type of criterion–related validity evidence? a. Concurrent evidence b. Predictive evidence c. Internal consistency d. Both a and b are correct answers
Last Answer : d. Both a and b are correct answers
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Description : ome of the utilities of DBMS are ............. i) Loading ii) Backup iii) File organization iv) Process Organization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv
Last Answer : B) i, ii and iii only
Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.
Last Answer : (B) Multiple users wish to access the data.
Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.
Last Answer : C) It should avoid/reduce the redundancy.
Description : Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained? a) Atomicity b) Consistency c) Isolation d) Durability
Last Answer : Consistency
Description : Being conscientious, admitting mistakes, and knowing one's strengths and limitations are the skills associated with _______. (a) Competence ; (b) consistency ; (c) loyalty ; (d) integrity
Last Answer : (a) Competence ;
Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock : I. 2-phase locking II. Time phase ordering (A) Both I & II (B) II only (C) I only (D) Neither I nor II
Last Answer : (B) II only
Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock ? (a) 2-phase Locking (b) Time stamp - ordering (A) Both (a) and (b) (B) (a) only (C) (b) only (D) Neither (a) nor (b)
Last Answer : (C) (b) only
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : The practitioner makes a critical assessment of validity of audit evidence, with a questioning mind and being alert to conditions which may indicate possible misstatement due to error or ... integrity b. Professional skepticism c. Independence is mental attitude d. Sufficient appropriate evidence
Last Answer : Professional skepticism
Description : Which design metric is used to measure the compactness of the program in terms of lines of code? (A) Consistency (B) Conciseness (C) Efficiency (D) Accuracy
Last Answer : (B) Conciseness
Description : A good thesis writing should involve: (a) reduction of punctuation and grammatical errors to a minimum. (b) careful checking of references. (c) consistency in the way the thesis is written. (d) a clear and well written abstract. Select ... c) and (d) (C) (a), (b) and (c) (D) (a), (b) and (d)
Last Answer : Answer: B
Description : Explain Database Management. What are the features of DBMS? -Technology
Last Answer : It refers to the software that is responsible for storing, maintaining and utilising a database. It enables a user to define, create and maintain the database and provide controlled access on it. A ... Data security e.g. MS-Access, Corel Paradox, Lotus Approach, MySQL, OpenOffice.org Base etc.
Description : DBMS is a program that controls the creation, maintenance and use of database. Here, DBMS referred to -Technology
Last Answer : (c) Here, DBMS stands for Database Management System.
Description : What is DBMS or Database Management System ?
Last Answer : DataBase Management System is the full form of DBMS . DBMS is a set of programs required for accessing , storing , controlling and managing interconnected information called database management systems.
Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above
Last Answer : Database management system (DBMS)
Description : DBMS is a collection of ………….. that enables user to create and maintain a database. A) Keys B) Translators C) Program D) Language Activity
Last Answer : C) Program
Description : In a Database Managemnt System (DBMS), the content and the location of the data is defined by the ____. (1) Multi Dimensional data (2) Sequence data (3) Meta data (4) Sub data
Last Answer : Meta data
Description : Which strategy used to promote qualitative research validity uses multiple research methods to study a phenomenon? a. Data triangulation b. Methods triangulation c. Theory triangulation d. Member checking
Last Answer : b. Methods triangulation
Description : The use of multiple observers to allow cross-checking of observations to make sure that the investigators agree with what took place is known as a. Interpretive validity b. Researcher bias c. Multiple operationalism d. Investigator triangulation
Last Answer : d. Investigator triangulation
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : A) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : B) Integrity
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above
Last Answer : C) Security
Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity
Last Answer : A) Key integrity
Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors
Last Answer : A) Constraints
Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors
Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data
Last Answer : (B) Passwords to prohibit unauthorised access to files.
Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III
Last Answer : (A) I, II, III & IV
Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint
Last Answer : (A) Integrity constraint
Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency
Last Answer : (C) Entity Integrity
Description : As far as surgical removal of wisdom teeth is concerned which of the following is true? a- Prophylactic prescription of antibiotic reduces dramatically the chances of infection. b- Raising a lingual ... e- The use of vasoconstrictors in local anaesthetics will increase the chances of infection.
Last Answer : b- Raising a lingual flap will increases the incidence of neurapraxia but will reduce the incidence of neurotmesis with respect to the lingual nerve.
Description : As far as surgical removal of wisdom teeth is concerned, which of the following is true?**CHECK A. Prophylactic prescription of antibiotic reduces dramatically the chances of infection B. Raising ... root E. The use of vasoconstrictors in local anaesthetics will increase the chances of infection.
Last Answer : C. Prophylactic prescription of dexamethasone will dramatically reduces post operative swelling