Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : Which command is used to concatenate all files beginning with the string 'emp' and followed by a non-numeric characters? A. cat emp[!0-9] B. more [emp][!0-9] C. cat emp[x-z]
Last Answer : A. cat emp[!0-9]
Description : A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as: (A) Data Dictionary (B) Reference Mechanism (C) Inference Engine (D) Control Strategy
Last Answer : (C) Inference Engine
Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.
Last Answer : (B) Multiple users wish to access the data.
Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation
Last Answer : A) Encryption
Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology
Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.
Description : Where the integrity constraints are stored in Data Dictionary ?
Last Answer : The integrity constraints are stored in USER_CONSTRAINTS.
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above
Last Answer : C) Security
Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity
Last Answer : A) Key integrity
Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors
Last Answer : A) Constraints
Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors
Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III
Last Answer : (A) I, II, III & IV
Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Last Answer : (D) (a), (b), (c) and (d)
Description : Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? (A) An ... ) and (B) are true; (C) false. (4) (A), (B) and (C) are false.
Last Answer : Answer: 3
Description : DDS stands for ………………… A) Data Data Systems B) Data Digital System C) Data Dictionary Systems D) Digital Data Service
Last Answer : C) Data Dictionary Systems
Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary
Last Answer : (A) Indexes
Description : From the given data below: a b b a a b b a a b which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a, b)? (1) a b (2) b b (3) b a (4) b a a b
Last Answer : (4) b a a b
Description : What are the upper and lower frequency limits of an amplifier?
Last Answer : The half-power points of a frequency-response curve. The upper and lower limits of the band f frequencies for which the amplifier is most effective.
Description : Which of the following is a valid SQL type? (A) CHARACTER (B) NUMERIC (C) FLOAT (D) All of the above
Last Answer : (D) All of the above
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : Which one of the following describes the syntax of prolog program ? I. Rules and facts are terminated by full stop (.) II. Rules and facts are terminated by semicolon (;) III. Variables names must start with upper case alphabets. ... alphabets. Codes : (A) I, II (B) III, IV (C) I, III (D) II, IV
Last Answer : (C) I, III
Description : Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand corner at (-5,1) and upper righthand corner at (3,7). ... s) is/are candidate for clipping? (A) AB (B) CD (C) EF (D) AB and CD
Last Answer : (D) AB and CD
Description : Unix command to change the case of first three lines of file “shortlist” from lower to upper (1) $ tr ‘[a-z]’ ‘[A-Z]’ shortlist | head-3 (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ (3) $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’ (4) $ tr shortlist head-3 ‘[a-z]’ ‘[A-Z]’
Last Answer : (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’
Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these
Last Answer : Answer :4
Description : Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data ... (B) III and IV only (C) I, II and III only (D) II, III and IV only
Last Answer : (D) II, III and IV only
Description : Which of the following are the principles tasks of the linker? I. Resolve external references among separately compiled program units. II. Translate assembly language to machine code. III. Relocate code and data relative to the beginning of ... (A) I and II (B) I and III (C) II and III (D) I and IV
Last Answer : (B) I and III
Description : ………………. refers to the unauthorised duplication of computer software. -Technology
Last Answer : software piracy refers to the unauthorised duplication of computer software.
Description : Which one is not the duties of bailee (a) The bailee must take care of goods as of his goods. (b) The bailee cannot use bailor’s goods in an unauthorised manner. (c) The bailee should return the goods without demand on the expiry of the time period. (d) He can set up adverse title to the goods.
Last Answer : (d) He can set up adverse title to the goods.
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : A) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : B) Integrity
Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints
Last Answer : B) Referential Integrity
Description : ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity. A) Column B) Constraint C) Index D) Trigger
Last Answer : (B) Constraints
Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces
Last Answer : D) Reduces
Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint
Last Answer : (A) Integrity constraint
Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency
Last Answer : (C) Entity Integrity
Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} print(a.setdefault(3)) a) {1: ‘A’, 2: ‘B’, 3: ‘C’} b) C c) {1: 3, 2: 3, 3: 3} d) No method called setdefault() exists for dictionary
Last Answer : b) C
Description : Which of the following is not a declaration of the dictionary? a) {1: ‘A’, 2: ‘B’} b) dict([[1,”A”],[2,”B”]]) c) {1,”A”,2”B”} d) { }
Last Answer : c) {1,”A”,2”B”}
Description : Suppose d = {“john”:40, “peter”:45}. To obtain the number of entries in dictionary which command do we use? a) d.size() b) len(d) c) size(d) d) d.len()
Last Answer : b) len(d)
Description : Which of the following statements create a dictionary? a) d = {} b) d = {“john”:40, “peter”:45} c) d = {40:”john”, 45:”peter”} d) All of the mentioned
Last Answer : d) All of the mentioned
Description : The main reason a manufacturer may try to prohibit intermediaries from selling its products outside designated sales territories is to 1. tighten its control over distribution of its products 2. ... other manufacturers 3. incorporate selective distribution 4. contain costs 5. none of these
Last Answer : tighten its control over distribution of its products
Description : The main reason a manufacturer may try to prohibit intermediaries from selling its products outside designated sales territories is to A)tighten its control over distribution of its products. B)discourage competition from other manufacturers. C)incorporate selective distribution. D)contain costs.
Last Answer : A)tighten its control over distribution of its products.
Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : What Blank Integrity refers to a set of Access rules that govern data entry and helps to ensure data accuracy?
Last Answer : Data integrity.
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens