1. Data integrity refers to the consistency and accuracy of data that is stored in a database.
Ans: TRUE
2. Database cannot be repaired if it is crashed
Ans: False
3. The primary role of the database administrator is not to administer, develop, maintain and
implement the procedures necessary to ensure the security and integrity of the corporate
database.
Ans: TRUE
4. The _ _ _ verifies that the database is running not only at the system level but at the level of
tables and queries as well.
Ans: Database Administrator
5. Which is used to update the records in a table? i. UPDATE table _name equals
column1=value1, column2=value2,…..WHERE some_column=some_value; ii. UPDATE
table_name SET column1=value1,column2=value2,…WHERE some_colum=some_value;
6. Ans: UPDATE table_name SET column1=value1,column2=value2,…WHERE
some_colum=some_value;
7. Full outer join is a Cartesian join that does not necessitate any condition to join.
Ans: False
8. Advantages of non-database systems
Ans: none
9. Database management system is categorized as relational, Extended-Relational, Object-oriented, object-relational.
Ans:
10. DBMS _ _ _ random value when atomicity occurs.
Ans:
11. In file processing system, we can’t access multiple data at the___
Ans: same time
12. Who verifies that the database is running not only at the system level but at the level of
tables and queries as well?
Ans: None
13. Will DBMS give random value when atomicity occurs?
Ans: no
14. Data integrity is not a component of information security.
Ans: False
15. Who is responsible for approving the design of new databases?(i) Developer (ii) Project
Manager
Ans: None
16. Second normal form rule 1-the table should be in _ _ _
Ans: 1NF
17. Which of the following statement is used to update existing records in a table? i) alter ii)
drop iii) join iv) view
Ans: none
18. T-SQL is an extension of _ _ _
Ans: SQL
19. Partial dependency is not the functional dependency on part of the primary key instead of
the entire primary key
Ans: False
20. TRUNCATE command is used to delete the data inside the table, and not the table itself.
Ans: TRUE
21. The second normal form does not consist of I. Transitive dependencies II. Partial dependencies
Ans: Partial dependencies
22. Each manager manages one or more employees follows many to many relationships.
Ans: false
23. INSERT INTO table_name(column1,column3,column4,…) VALUES (Value1,value2,value3,..) Is
the statement right?
Ans: False
24. Which among the following is an administrative function responsible for managing data
quality and assuring that organizational applications meet the enterprise goals?
Ans: Here ans is other than Database administrator
25. _ _ _ is the process of two lower level entities combines to form higher-level entities.
Ans: Generalization
26. DBMS acts as a layer of abstraction on top of the file system.
Ans: TRUE
27. Partial dependencies are good due to duplication of data and update anomalies.
Ans: False
28. Normalization is a method for organizing data elements in a database into maps.
Ans: False
29. A transitive functional dependency is when changing a non-key column, might cause any of
the other non-key columns to change.
Ans: False
30. One of the primary roles of _ _ _ is to deal with the performance issues.
Ans: Database Administrator
31. Create, Edit, Read-only and delete are all authorisation levels
Ans: TRUE
32. In student table with s_if,s_name,s_address and subject_opted,at the time of admission only
Id and name are inserted and other values will be null which leads to insert anomaly.
Ans: TRUE
33. Which column is used to hold date values?
Ans: Date
34. The Database Administrator is not responsible for approving the operation of new programs
with existing production databases, based on results of testing with test data.
Ans: False
35. _ _ _ in cardinality has exactly one instance
Ans: One-mandatory
36. In file processing system, consistent data is provided when multiple users try to access
Ans: False
37. A database is an organized collection of data which is deal for storing and retrieving
information.
Ans: TRUE
38. Delete is an authorisation level.
Ans: TRUE
39. SQL Joins are used to relate information in different tables
Ans:
40. The function ___returns the largest value
Ans: MAX()
41. The non-key attribues of the table need not depend on all the attributes of the composite
key
Ans: False
42. Scientific process of decomposing complex tables(relations) into smaller and easily
manageable tables is called denormalization
Ans: False
43. A normalized relation should not have attributes involved in a_ _ _dependency relationship
with the primary key.
Ans: Transitive
44. Which of the following is correct .(i) the primary key is row in a table (ii) the primary key
must always have value.
Ans: the primary key must always have value.
45. Interviews and observations are done in requirements stage.
Ans: true
46. Meta data contains integrity constraints
Ans: False
47. DML allows the user to _____, ___,DELETE and SELECT data in a database.
Ans: INSERT, UPDATE
48. Internal marketing of DA concepts is a function of Database Administrator
Ans: True
49. PRIMARY KEY means which that this particular column will accept duplicate values.
Ans: False
50. A In hierarchical database If a change in the data is necessary, the change might need to be
processed more than once.
Ans: False
51. ___is the process of efficiently organizing data in a databse.
Ans: Normalization
52. Cross join is acartesian join that does not necessitate any condtion to join.
Ans: True
53. Metadata does not contain about integrity constraints and relationship between data
elements.
Ans: False
54. When a parent record have a child record we can use outer join
Ans: False
55. Since many application programs access the data, the supervision of concurrent access
anomalies becomes difficult.
Ans: True
56. The third normal form (3NF) covers in case of multi-column primary keys, second normal
form(2NF) is meant to cover single column keys as mentioned in transitive functional
dependencies.
Ans: False
57. Repetition of data, results in consumption of _ _ _memory space.
Ans: greater
58. The primary role of the Database Administrator is to administer, develop, maintain and
implement the policies necessary to
Ans: Ensure security of database and Ensure integrity of database
59. DBMS must not support the isolation of data structure from the programs
Ans: False
60. Which of the following statements are correct. i. theory of normalization is still developing ii.
The 1st normal form is currently in progress.
Ans: theory of normalization is still developing
61. _ _ _ _ must support the isolation of database from the programs
Ans: DBMS
62. The table name that follows the keyword from specifies the table that will be queried to
retrieve the desired results.
Ans: True
63. It is the duty of _ _ _ to verify that the database is running not only at the system level but
at the level of tables and queries as well.
Ans: Database Administrator
64. ____ is used to ensure that data is added into the table accuretly.
Ans: constraints
65. Each manager manages one or more employees followos one to many relationship.
Ans: True
66. Who is the responsible for approving the design of new database ?
Ans: Database Adminstrator
67. Data in DBMS is based on types of database you will encounter
Ans: True
68. A row defined as UNIQUE can contain NULL values.
Ans: False
69. Privilege_name is the process right or privilege granted to the_ _ _
Ans: user
70. Whose primary role is to maintain table? (i) DBA (ii) Project Manager
Ans: DBA
71. During interview and observations, we should not collect the business rules which may
constrain the usage of database.
Ans: False
72. DBMS can ensure the authorised uswrs are allowed to access the data.
Ans: True
73. In _ _ _,inconsistent data is provided when multiple users try to acess
Ans: other thanfile processing system
74. _ _ _ anomalies are very frequent if databse is normalized.
Ans: insertion, Updation, Deeteion
75. Who is the responsible for the actual content of databases?
Ans: user
76. Whose primary role is Database accessibility?
Ans: None (Analyst, Manager, leader)
77. Delete statement cannot be _ _ _
Ans: undone, retrieved, restored
78. Whose responsibility is Data conflict (ownership) resolution? I) project manager ii) Program
Analyst
Ans: None
79. A table that has fields that repeat redundantly is called as normalized table
Ans: False
80. Major threats to database security A is loss of data availability through sabotage by
Ans: A virus
81. Who set up the referential integrity definitions for the database? i. DBA II. Project Manager
Ans: DBA
82. The data type of single column in relational database is?
Ans: same
83. It is the duty of _ _ _ to detect dealocks.
Ans: Database Administrator
84. DBMS is a _ _ _ _ _ _conceptual design
Ans: flexible
85. The function of a _ _ _ is Data conflict (ownership) resolution
Ans: Database Administrator
86. Who is responsible for defining internal layout of the database, Revoking privilieges and
recording the procedures?
Ans: Database Administrator
87. _ _ _ is the following advantage of RDBMS
Ans: Data Dependency, increases redundancy, user access controls
88. DBMS will not give random value when _ _ _ _ occurs
Ans: Atomicity
89. The functions of a data administrator id internal marketing of DA concepts
Ans: True
90. The LIKE pattern is used within which clause?
Ans: where
91. Normalization doesn’t ensures data is logically stored.
Ans: False
92. Process of developing a database system consists of 3 stages. Is this statement true or false?
Ans: True
93. The functions of DBA in A Managing data security and privacy is not complicated by use of
distributed systems such as internet access and client/ server technology.
Ans: False
94. _ _ _ _ is the process of the one higher level entity is broken down into two lower level
entity
Ans: Specialization
95. A department assigns many lecturers is a _ _ _ relationship
Ans: one(1) to many(n)
96. A AA data administrator A also known as data architect
Ans: True
97. DBMS maintains data dictionary for storage of _ _ _ pertaining to data fields and data
manipulation
Ans: ans other than data
98. One of the primary roles of Database Administrator is not to dealwith the performance
issues.
Ans: TRUE
2. Database cannot be repaired if it is crashed
Ans: False
3. The primary role of the database administrator is not to administer, develop, maintain and
implement the procedures necessary to ensure the security and integrity of the corporate
database.
Ans: TRUE
4. The _ _ _ verifies that the database is running not only at the system level but at the level of
tables and queries as well.
Ans: Database Administrator
5. Which is used to update the records in a table? i. UPDATE table _name equals
column1=value1, column2=value2,…..WHERE some_column=some_value; ii. UPDATE
table_name SET column1=value1,column2=value2,…WHERE some_colum=some_value;
6. Ans: UPDATE table_name SET column1=value1,column2=value2,…WHERE
some_colum=some_value;
7. Full outer join is a Cartesian join that does not necessitate any condition to join.
Ans: False
8. Advantages of non-database systems
Ans: none
9. Database management system is categorized as relational, Extended-Relational, Object-oriented, object-relational.
Ans:
10. DBMS _ _ _ random value when atomicity occurs.
Ans:
11. In file processing system, we can’t access multiple data at the___
Ans: same time
12. Who verifies that the database is running not only at the system level but at the level of
tables and queries as well?
Ans: None
13. Will DBMS give random value when atomicity occurs?
Ans: no
14. Data integrity is not a component of information security.
Ans: False
15. Who is responsible for approving the design of new databases?(i) Developer (ii) Project
Manager
Ans: None
16. Second normal form rule 1-the table should be in _ _ _
Ans: 1NF
17. Which of the following statement is used to update existing records in a table? i) alter ii)
drop iii) join iv) view
Ans: none
18. T-SQL is an extension of _ _ _
Ans: SQL
19. Partial dependency is not the functional dependency on part of the primary key instead of
the entire primary key
Ans: False
20. TRUNCATE command is used to delete the data inside the table, and not the table itself.
Ans: TRUE
21. The second normal form does not consist of I. Transitive dependencies II. Partial dependencies
Ans: Partial dependencies
22. Each manager manages one or more employees follows many to many relationships.
Ans: false
23. INSERT INTO table_name(column1,column3,column4,…) VALUES (Value1,value2,value3,..) Is
the statement right?
Ans: False
24. Which among the following is an administrative function responsible for managing data
quality and assuring that organizational applications meet the enterprise goals?
Ans: Here ans is other than Database administrator
25. _ _ _ is the process of two lower level entities combines to form higher-level entities.
Ans: Generalization
26. DBMS acts as a layer of abstraction on top of the file system.
Ans: TRUE
27. Partial dependencies are good due to duplication of data and update anomalies.
Ans: False
28. Normalization is a method for organizing data elements in a database into maps.
Ans: False
29. A transitive functional dependency is when changing a non-key column, might cause any of
the other non-key columns to change.
Ans: False
30. One of the primary roles of _ _ _ is to deal with the performance issues.
Ans: Database Administrator
31. Create, Edit, Read-only and delete are all authorisation levels
Ans: TRUE
32. In student table with s_if,s_name,s_address and subject_opted,at the time of admission only
Id and name are inserted and other values will be null which leads to insert anomaly.
Ans: TRUE
33. Which column is used to hold date values?
Ans: Date
34. The Database Administrator is not responsible for approving the operation of new programs
with existing production databases, based on results of testing with test data.
Ans: False
35. _ _ _ in cardinality has exactly one instance
Ans: One-mandatory
36. In file processing system, consistent data is provided when multiple users try to access
Ans: False
37. A database is an organized collection of data which is deal for storing and retrieving
information.
Ans: TRUE
38. Delete is an authorisation level.
Ans: TRUE
39. SQL Joins are used to relate information in different tables
Ans:
40. The function ___returns the largest value
Ans: MAX()
41. The non-key attribues of the table need not depend on all the attributes of the composite
key
Ans: False
42. Scientific process of decomposing complex tables(relations) into smaller and easily
manageable tables is called denormalization
Ans: False
43. A normalized relation should not have attributes involved in a_ _ _dependency relationship
with the primary key.
Ans: Transitive
44. Which of the following is correct .(i) the primary key is row in a table (ii) the primary key
must always have value.
Ans: the primary key must always have value.
45. Interviews and observations are done in requirements stage.
Ans: true
46. Meta data contains integrity constraints
Ans: False
47. DML allows the user to _____, ___,DELETE and SELECT data in a database.
Ans: INSERT, UPDATE
48. Internal marketing of DA concepts is a function of Database Administrator
Ans: True
49. PRIMARY KEY means which that this particular column will accept duplicate values.
Ans: False
50. A In hierarchical database If a change in the data is necessary, the change might need to be
processed more than once.
Ans: False
51. ___is the process of efficiently organizing data in a databse.
Ans: Normalization
52. Cross join is acartesian join that does not necessitate any condtion to join.
Ans: True
53. Metadata does not contain about integrity constraints and relationship between data
elements.
Ans: False
54. When a parent record have a child record we can use outer join
Ans: False
55. Since many application programs access the data, the supervision of concurrent access
anomalies becomes difficult.
Ans: True
56. The third normal form (3NF) covers in case of multi-column primary keys, second normal
form(2NF) is meant to cover single column keys as mentioned in transitive functional
dependencies.
Ans: False
57. Repetition of data, results in consumption of _ _ _memory space.
Ans: greater
58. The primary role of the Database Administrator is to administer, develop, maintain and
implement the policies necessary to
Ans: Ensure security of database and Ensure integrity of database
59. DBMS must not support the isolation of data structure from the programs
Ans: False
60. Which of the following statements are correct. i. theory of normalization is still developing ii.
The 1st normal form is currently in progress.
Ans: theory of normalization is still developing
61. _ _ _ _ must support the isolation of database from the programs
Ans: DBMS
62. The table name that follows the keyword from specifies the table that will be queried to
retrieve the desired results.
Ans: True
63. It is the duty of _ _ _ to verify that the database is running not only at the system level but
at the level of tables and queries as well.
Ans: Database Administrator
64. ____ is used to ensure that data is added into the table accuretly.
Ans: constraints
65. Each manager manages one or more employees followos one to many relationship.
Ans: True
66. Who is the responsible for approving the design of new database ?
Ans: Database Adminstrator
67. Data in DBMS is based on types of database you will encounter
Ans: True
68. A row defined as UNIQUE can contain NULL values.
Ans: False
69. Privilege_name is the process right or privilege granted to the_ _ _
Ans: user
70. Whose primary role is to maintain table? (i) DBA (ii) Project Manager
Ans: DBA
71. During interview and observations, we should not collect the business rules which may
constrain the usage of database.
Ans: False
72. DBMS can ensure the authorised uswrs are allowed to access the data.
Ans: True
73. In _ _ _,inconsistent data is provided when multiple users try to acess
Ans: other thanfile processing system
74. _ _ _ anomalies are very frequent if databse is normalized.
Ans: insertion, Updation, Deeteion
75. Who is the responsible for the actual content of databases?
Ans: user
76. Whose primary role is Database accessibility?
Ans: None (Analyst, Manager, leader)
77. Delete statement cannot be _ _ _
Ans: undone, retrieved, restored
78. Whose responsibility is Data conflict (ownership) resolution? I) project manager ii) Program
Analyst
Ans: None
79. A table that has fields that repeat redundantly is called as normalized table
Ans: False
80. Major threats to database security A is loss of data availability through sabotage by
Ans: A virus
81. Who set up the referential integrity definitions for the database? i. DBA II. Project Manager
Ans: DBA
82. The data type of single column in relational database is?
Ans: same
83. It is the duty of _ _ _ to detect dealocks.
Ans: Database Administrator
84. DBMS is a _ _ _ _ _ _conceptual design
Ans: flexible
85. The function of a _ _ _ is Data conflict (ownership) resolution
Ans: Database Administrator
86. Who is responsible for defining internal layout of the database, Revoking privilieges and
recording the procedures?
Ans: Database Administrator
87. _ _ _ is the following advantage of RDBMS
Ans: Data Dependency, increases redundancy, user access controls
88. DBMS will not give random value when _ _ _ _ occurs
Ans: Atomicity
89. The functions of a data administrator id internal marketing of DA concepts
Ans: True
90. The LIKE pattern is used within which clause?
Ans: where
91. Normalization doesn’t ensures data is logically stored.
Ans: False
92. Process of developing a database system consists of 3 stages. Is this statement true or false?
Ans: True
93. The functions of DBA in A Managing data security and privacy is not complicated by use of
distributed systems such as internet access and client/ server technology.
Ans: False
94. _ _ _ _ is the process of the one higher level entity is broken down into two lower level
entity
Ans: Specialization
95. A department assigns many lecturers is a _ _ _ relationship
Ans: one(1) to many(n)
96. A AA data administrator A also known as data architect
Ans: True
97. DBMS maintains data dictionary for storage of _ _ _ pertaining to data fields and data
manipulation
Ans: ans other than data
98. One of the primary roles of Database Administrator is not to dealwith the performance
issues.