MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Database Systems
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Q.1
A race condition occurs when
Two concurrent activities interact to cause a processing error
two users of the DBMS are interacting with different files at the same time
both (a) and (b)
All of the above
None of the above
Q.2
An indexing operation
sorts a file using a single key
sorts file using two keys
establishes an index for a file
both (b) and (c)
None of the above
Q.3
The on-line, softcopy display a customer's charge account to respond to an inquiry is an examples of a
forecasting report
exception report
regularly scheduled report
on demand report
None of the above
Q.4
In SQL, which command(s) is(are) used to create a synonym for a schema object?
CREATE SCHEMA
CREATE SYNONYM
CREATE SAME
All of the above
None of the above
Q.5
If you want your database to include methods, you should use a _____ database.
Network
Distributed
Hierarchical
Object-Oriented
None of the above
Q.6
Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL?
DEFINE TABLE
MODIFY TABLE
ALTER TABLE
All of the above
None of the above
Q.7
In SQL, the ALTER TABLESPACE command is used
to add/rename data files
to change storage characteristics
to take a tablespace online/offline
to begin/end a backup
All of the above
Q.8
The language used in application programs to request data from the DBMS is referred to as the
DML
DDL
query language
All of the above
None of the above
Q.9
A database management system might consist of application programs and a software package called
FORTRAN
AUTOFLOW
BPL
TOTAL
None of the above
Q.10
An audit trail
is used to make back-up copies
is the recorded history of operations performed on a file
can be used to restore lost information
All of the above
None of the above
Q.11
In a large DBMS
each user can "see" only a small part of the entire database
each user can access every sub¬schema
each subschema contains every field in the logical schema
All of the above
None of the above
Q.12
Which of the following command(s) is(are) used to recompile a stored procedure in SQL?
COMPILE PROCEDURE
ALTER PROCEDURE
MODIFY PROCEDURE id) All of the above
None of the above
None of the above
Q.13
Internal auditors should review data system design before they are
developed
implemented
modified
All of the above
None of the above
Q.14
A _____ means that one record in a particular record type may be related to more than one record of another record type.
One-to-one relationship
One-to-many relationship
Many-to-one relationship
Many-to many relationship
None of the above
Q.15
Which command(s) is(are) used to redefine a column of the table in SQL ?
ALTER TABLE
DEFINE TABLE
MODIFY TABLE
All of the above
None of the above
Q.16
If you want to group the records in the abc database, you could use the Jobcode as the _____.
Delete
Update
Sort Key
Index
None of the above
Q.17
The Management Information system (MIS) structure with one main computer system is called a
hierarchical MIS structure
distributed MIS structure
centralized MIS structure
decentralized MIS structure
None of the above
Q.18
If a calculation is embedded in a form
the result of the calculations are stored with the form
the calculations are stored with the form
the result of the calculations are printed in report
All of the above
None of the above
Q.19
When you have finished entering information into a form
the template is written to the data file
the contents of the form are written to the data file
the contents of the form can be printed
All of the above
None of the above
Q.20
In SQL, GRANT command is used to
allow user to access databases
allow user to create databases
grant system privileges, roles, and object privileges to uses and roles
choose auditing for specific SQL commands
None of the above
Q.21
The highest level in the hierarchy of data organization is called
data bank
database
data file
data record
None of the above
Q.22
Data security threats include
hardware failure
privacy invasion
fraudulent manipulation of data
All of the above
None of the above
Q.23
An operation that will increase the length of a list is
Insert
Look-up
Modify
All of the above
None of the above
Q.24
Which command is used to remove a table from the database in SQL?
DELETE TABLE
DROP TABLE
ERASE TABLE
UNATTACH TABLE
None of the above
Q.25
The main idea behind computer files is that it is convenient to
arrange them
store information together
create them
access them
None of the above
Q.26
A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be
the pin code
the last name
a compound key consisting of the first name and the last name
All of the above
None of the above
Q.27
The logical data structure with a one-to-many relationship is a :
network
tree
chain
relational
None of the above
Q.28
Updating a database means
revising the file structure
reorganizing the database
modifying or adding record occurrences
All of the above
None of the above
Q.29
A large computer information system maintains many different computer files. Which amongst them is called a perpetual file?
Specialized file
Log file
Master file
Update file
None of the above
Q.30
A file produced by a spreadsheet
is generally stored on disk in an ASCII text format
can be used as it by the DBMS
can be used for graphic
All of the above
None of the above
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page