Q.1

The on-line, softcopy display a customer's charge account to respond to an inquiry is an examples of a

  • forecasting report
  • exception report
  • regularly scheduled report
  • on demand report
  • None of the above
Q.2

With respect to data input, the most accurate description of batch control is

  • dividing documents to be entered into batches
  • controlling the input of each input clerk
  • comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system
  • All of the above
  • None of the above
Q.3

A computer file contains several records. What does each record contain?

  • Bytes
  • Words
  • Fields
  • Database
  • None of the above
Q.4

The model for a record management system might be

  • handwritten list
  • a Rolodex card file
  • a business form
  • All of the above
  • None of the above
Q.5

A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As

  • tables
  • relations
  • tuple
  • both (a) and (b)
  • None of the above
Q.6

A command that lets you change one or more fields in a record is

  • Insert
  • Modify
  • Look-up
  • All of the above
  • None of the above
Q.7

The designer of a form includes

  • filed designators
  • prompts
  • data
  • both (a) and (b)
  • None of the above
Q.8

Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?

  • report writer
  • query language
  • data manipulation language
  • transaction log
  • None of the above
Q.9

Two files may be joined into a third file if

  • they have a row in common
  • they have a field in common
  • they have no records with the same value in the common field
  • both (b) and (c)
  • None of the above
Q.10

A _____ means that one record in a particular record type may be related to more than one record of another record type.

  • One-to-one relationship
  • One-to-many relationship
  • Many-to-one relationship
  • Many-to many relationship
  • None of the above
Q.11

The way a particular application views the data from the data base that the application uses is a :

  • module
  • relational model
  • schema
  • subschema
  • None of the above
Q.12

Data security threats include

  • hardware failure
  • privacy invasion
  • fraudulent manipulation of data
  • All of the above
  • None of the above
Q.13

Related fields in a data base are grouped to form

  • data file
  • data record
  • menu
  • bank
  • None of the above
Q.14

If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it.

  • Delete
  • Update
  • Sort Key
  • Index
  • None of the above
Q.15

A multiple-form file management system

  • lets you define different forms for different operations
  • lets you create a look-up form with an associated read-only password to prevent access by unauthorized users
  • both (a) and (b)
  • allow you to entry data in all the forms
  • None of the above
Q.16

Data encryption techniques are particularly useful for

  • reducing storage space requirements
  • improving data integrity
  • protecting data in data communication systems
  • All of the above
  • None of the above
Q.17

In SQL, which command is used to select only one copy of each set of duplicable rows

  • SELECT DISTINCT
  • SELECT UNIQUE
  • SELECT DIFFERENT
  • All of the above
  • None of the above
Q.18

Characteristic(s) of a distributed MIS structure is

  • interactive sharing of the workload
  • a multiprocessing environment
  • computers supporting local DP operations
  • All of the above
  • None of the above
Q.19

The data-base environment has all of the following components except:

  • users
  • separate files
  • data base
  • data-base administrator
  • None of the above
Q.20

Which command(s) is(are) used to redefine a column of the table in SQL ?

  • ALTER TABLE
  • DEFINE TABLE
  • MODIFY TABLE
  • All of the above
  • None of the above
Q.21

Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL?

  • DEFINE TABLE
  • MODIFY TABLE
  • ALTER TABLE
  • All of the above
  • None of the above
Q.22

A compound key

  • is made up a several pieces of information
  • uniquely identifies an item in a list
  • both (a) and (b)
  • is a combination of each unique key
  • None of the above
Q.23

An operation that will increase the length of a list is

  • Insert
  • Look-up
  • Modify
  • All of the above
  • None of the above
Q.24

A _____ means that one record in a particular record type can be related to many records in another record type and vice-versa.

  • One-to-one relationship
  • One-to-many relationship
  • Many-to-one relationship
  • Many-to-many relationship
  • None of the above
Q.25

The modify operation is likely to be done after

  • Delete
  • Look-up
  • Insert
  • All of the above
  • None of the above
Q.26

The term _____ is sometimes used to refer to a data file in which all the records have the same record format, that is, the same field names, field lengths, and data types.

  • Database
  • Table
  • Flat file
  • Data structure
  • None of the above
Q.27

It is more accurate to define a _____ as a variety of different record types that are treated as a single unit

  • Database
  • Table
  • Record
  • Flat File
  • None of the above
Q.28

The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in

  • a tree file
  • an indexed file
  • a hashed file
  • a sequential file
  • None of the above
Q.29

In SQL, the ALTER TABLESPACE command is used

  • to add/rename data files
  • to change storage characteristics
  • to take a tablespace online/offline
  • to begin/end a backup
  • All of the above
Q.30

The distinguishable parts of a record are called

  • files
  • data
  • fields
  • database
  • None of the above
0 h : 0 m : 1 s