100% found this document useful (1 vote)
1K views26 pages

Coc Model Q Edit

The document contains 35 multiple choice questions related to database administration concepts. Some key topics covered include: - Database terminology like scheduling, mission statements, data integration, data conversion - SQL commands like select, join, create - Database design principles like normalization, primary keys - Database management tasks like backup and recovery

Uploaded by

Emente Emente
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views26 pages

Coc Model Q Edit

The document contains 35 multiple choice questions related to database administration concepts. Some key topics covered include: - Database terminology like scheduling, mission statements, data integration, data conversion - SQL commands like select, join, create - Database design principles like normalization, primary keys - Database management tasks like backup and recovery

Uploaded by

Emente Emente
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Sector of ICT in database administration level IV theoretical question

I. Choose the best answer from the given alternatives

1. The process of deciding how to commit resources between varieties possible tasks is:
a. Consistency b. Scheduling c. realistic d. specificity
2. The component of strategic plan that defines the organization’s purpose and primary objectives.
A. Mission statement c. guiding principles
B. Vision statement d. SWOT analysis
3. Which one of the following is the correct procedure that you follow to solve a problem?
a. Define the problem implement the plan develop a plan evaluate the result
b. implement the plan Define the problem develop a plan evaluate the result
c. develop a plan Define the problem implement the plan evaluate the result
d. Define the problem develop a plan implement the plan evaluate the result
4. The process of combining heterogeneous data sources in to a single queriable schema to get a unified view of
these data.
a. Data transformation c. data integration
b. Data processing d. data cleaning
5. The process of changing the data into the format of new database system is.
a. Installation b. Documentation c. data conversion d. maintenance
6. Suppose that you have an activity which can perform a number of times repeatedly. Then which one of the
following statement is more preferable?
a. If…else statement c. case statement
b. Loop statement d. jump statement
7. Assume you are a database administrator in the department of information technology .then if you want to
generate a report about all female students, which sql command is applicable?
a. Create b. retrieve c. Update d. select
8. If you join data from two tables then which one of the following true about the application of inner join.
a. Returns only the rows from each table that has matching values in the join columns
b. Returns all the rows of the first table
c. Returns a row in the result table for each combination of rows of using Cartesian product
d. Returns all the row of the second tables
9. Mr. Abebe is one of database worker in your organization and he can change his id_number from org123 to
org12 but he could not change his salary. Then which one of the following is a possible reason for abebe?
a. He may not have update privilege on id_number column while he has on salary column
b. He may not have update privilege on salary column while he has on id_number column
c. He may not have update privilege for the entire column of that table.
d. He may not have update privilege for the database as a whole.
10. Which one of the following activity is dune during requirement gathering and analysis?
a. Identify system user c. testing the system against the requirements
b. Starting the actual code d. prepare the schema of the database
11. Which one of the following is the main advantage of migrate to new technology?
a. It increases cost
b. It helps to merge with the organizations that run the same technology
c. It brings new solution which meets the short term plan
d. It is capable of enhancement
12. Which one of the following is an open source DBMS tool?
a. Microsoft sql server b. Microsoft access c. My sql d. oracle
13. Which one of the following programming language is used for database programming?
a. C++ b. java c. C d. structured query language
Sector of ICT in database administration level IV theoretical question
14. Miss Lemlem is a database programmer at civil service college.as a database system profession the
responsibility of lemlem is:
a. Design the conceptual model of database. C. coding and implementing the application program
b. Deny the granted database users d. manage the overall database system
15. In Modular programming, which statement is not considered as benefit?
A. Less code has to be written
B. Codes are simple and easy to understand
C. It does not allow many programmers to collaborate on the some application
D. A large program can be break down into smaller independent modules
16. Among the following term which one can be considered multi values attributes
A. Name B. Id C. Hobby D. Sex
17. Data base design involves modeling the collected information at high level of abstraction without
Using particular data or DBMS
A. Conceptual database design
B. Logical database design
C. Physical database design
D. Database design schema
18. The requirement(s) for using identity property can be specified as
A. It can be define character date type
B. Copy one identity column
C. It can be up date
D. It does allow null values
19. Which one of the following not true first normal form(inf)
A. There are no repeating or duplicate fields
B. Each call contain only a single values
C. Each records is unique
D. All non key field depend on all component the primary key
20. In SQL server which one of the following is a working statement
A. Each entity name should be unique in the some database
B. Two attribute of an entity type can have same name
C. Count function does not return a null
D. In operator allows you to specify multiple value of a WHERE clause
21. Designing a data base is an iterative process that involves Structure based on information and processing
requirement of your, which one is Correct phase of the design process?
A. Data analysis - physical database - logical database design – physical implementation
B. Data analysis – logical database design – physical database design – physical implementation
C. physical database design – Data analysis - logical database design – physical implementation
D. physical database design – logical database design – data analysis – physical database implementation
22. During the conceptual design phase what will happen
A. the internal component of the application are designed
B. normalization take place
C. new entity may be discovered
D. program specified are written
23. With SQL how can you return the records from a table name ‘’EMPLOYEE’’ sorted descending By ‘’first name’’
A. select * from EMPLOYEE ORDER first name descend
B. select * from EMPLOYEE ORDER by first name desc
C. select * from EMPLOYEE ORDER by first name asc
D. select * from EMPLOYEE ORDER by first name ascend
Sector of ICT in database administration level IV theoretical question
24. while listing limitation of file processing system identify the working statement
A. data redundancy inconsistency available
B. difficult in accessing data
C. data isolation and integrity
D. concurrent accessing is possible

25. During modeling your data, entity relationship is applied at


A. conceptual database B. schema refinement C. physical refinement D. application and
security

26. all of the following are SQL server system database component except
A. master database B. conventional database C. model database D. temped database

27. Assume that there are two given table, MATHOR table and CHILDRN table under the some database name.
What will be the possible relationship between those tables?
A. one- to- many C. many-to – many
B. one- to-one D. has no relationship
28. in defining primary key ,which one of the following is wrong statement
A. they cannot be null
B. only unique values can be assigned to them
C. they cannot be used as reference for the columns in a related table
D. they cannot be character data type
29. To fix the database after a failure such as a hard disk malfunction, the appropriate key word is
A. back up B. recovery C. security D. access control

30. Which DBMS, which one of the following not the data definition language (DDL)command
A. Alter B. update C. create D. drop
31. In SQL, which one the following is a correct syntax to modify
A. alter ,< table name> <column name > <data type> <field size > <constraint>
B. alter table add<column name > <data type> <field size > <constraint>
C. alter table < table name> add <column name > <data type> <field size > <constraint>
D. alter table < table name> drop <column name > <data type> <field size >
32. Which one of the following referential integrity, constraint should be specify automatic deletion of a foreign
key record when a record in the base table is deleted
A. on drop cascade B. on delete cascade C. on update cascade D. on drop set null
33. All of the following can consider as entity integrity constraint except:
A. Unique B. foreign key C. identity D. primary key
34. Which one of the following is common type of data manipulation language
A. Select B. Create table C. drop D. None
35. is used to limit values range that can be placed in a column
a. foreign key b. primary key c. check d. not null e. none
36. ___ is used to allow specific user to perform a specific task
a. Revoke b. Grant c. Distinct d. all
37. ___is used to filter records based on more than one condition
a. Or operator b. And operator c. A&b d. all
38. Which one of the following false about the primary key constraint
a. Uniquely identifies each record in a data base table
b. Must constraint unique constraint
c. Column can contain null value
d. All
39. Which one of the following is false statement about DDL
a. create table b. drop table c. alter table d. change table
40. ___ join return all raw when there is match in one of the table
a. Full b. Inner c. Left d. right

41. aggregate function are


a. except ignore null value
b. deterministic
c. frequently used with the group by clause of the select statement
d. all
42. sub quire also called a ______
a. inner quire b. inner select c. nested quire d. all
43. which one of the following false statement about sub quire
a. sub quire immediately enclosed in a set function
b. sub quire can have only one column in the some select close
c. sub quire that return more than can only used with multiple value operators
d. all
44. ___ holds a fixed length string can control letter, numbers, & a special characters
a. Varchar b. Char c. Int d. all

45. ___ are used to limit the type of data that can go into the table?
a. Property b. Constraint c. All d. none
46. ___ is constraint uniquely identify each record in a database table
a. Primary key b. Foreign key c. Check d. all

47. drop statement is not used to


a. delete a table b. drop a table c. delete record d. all
48. which one of the following in correct syntax for text & numeric values
a. select * from table name where fname=’teshome’
b. select * from table name Where year=1999
c. select * from table name Where fname=’’teshome’’
d. all
49. Which one is dedicated server?
A. One user process-many server process
B. One server process—many user process
C. One server process—one user process
D. None
50. which of the following should be considered when we plan a database design?
A. User need and requirement
B. The designer interest
C. The complexity and simplicity of the work
D. Feasibility of the database system
51. A method of data collection in the which the situation of interest is watched the relevant facts,
action and behaviors are recorded.

A .interview B. observation C. Survey D. questionnaire

52. you run select statement and multiple duplicates of values are retrieved what key word can
you use to retrieve only the non duplicate value ?

A. duplicate B . individual C. distinct D. Separate

53. with SQL, which types of join should you use if you want to return only matched rows?

A. inner join B. left outer join C. right outer join D. full outer join

54. dropping a table will remove.

A . Only the table definition ,but not the stored values

B. only the permission specified for that table

C . only the stored values ,but not the table definition

D. the table definition and all stored values

55. how you can change “Bertukan”in to Birtukan” in the“LastName” column in the student table?

A. UPDATE STUDENT SET Last Name=’Bertukan’ INTO Last Name =’Birtukan’

B.modify student set Last Name ‘Birtukan ‘ where LastName =’bertukan’

C. update student set Last Name=’Birtukan’ where LastName=’Bertukan’

D. modify student set Last Name =’bertukan’ into Last Name =’birtukan’

56. There are certain packages that allow people to define data items ,place these items in particular records ,
combine the records in to designated files and then manipulate and retrieve the stored data .what are they
called?

A. Data storage system C. Database manage system


B. Batch processing system D. Data communication package
57. when the values in one or more attributes being used as foreign key that must exist in another set
of one or more attributes in another table .you have created :
A. domain integrity constraint C. user defined integrity constraint
B. entity integrity constraint D . referential integrity constraint
58. among the following ,which activity helps you to determine the entities, attributes, and
relationship s of data ?
A. conceptual database modeling C. physical database modeling
B. logical database modeling D . database implementation
59. where does DBMS store the definition of data elements and their relationships ?
A. data file B. Index C. Data dictionary D . data map

60. Using database management system is preferable than file system when
A. The number of record is small
B. The data we need to keep is very secure
C. The speed of accessing data is our first priority
D. The company have no capacity to add new hardware and software
61. Which of the following is not task in gathering data to identify business requirements
A. Ensuring stake holder involvement at all levels
B. Giving training on how to operate to users and technical’s
C. Understand the needs of your client
D. Identify the key people who will be enacted by the project
62. Indexes are created in most RDBMSs to:
A. Provides a quicker way to store data
B. Increase the cost of implementation
C. Provide rapid random and sequential access to base-table data.
D. Decrease the amount of disk space utilized.
63. What do you do if an important table in your database in removed accidentally?
A. Undo the operation to bring it backs to its prior state
B. Get the deleted data from recycle bin and restore it
C. Create the table and add all the data from documents
D. Restore the table from back up file
64. A power failure occurred while the database was operating unfortunately , the UPS did not function
properly and did not stop the SQL SERVER in a proper manner .once power comes back, what do you
have to do to your server to recover the transactions that have been commanded but not check pointed ?
A. You need to back up the transaction log restore the database from the last full database backup ,
and then restore all the transaction log
B. Naming .SQL server will recover automatically, rolling back pending transactions and rolling
forward committed ones.
C. Nothing all transactions since the last checkpoint are lost , the effect of the others are in the
database
D. RUN ROLL FORWARDS ALL TRANSACTIONS.
65. A database technical documentation should contain all except
A. Descriptions of what the table means and how it’s functionally used
B. Descriptions of what each attribute means
C. Explanations of the relationship
D. Distributions of clients
66. Application where only one user accesses the data base at given time is an example of
A. Single user database
B. Multiuser database application
C. E-commerce database application
D. Data mining database application
67. The database administrator wants to fix the database after the failure such as a hard disk malfunction
from ,where he/she start to make database functional again?
A. From back up C. From security
B. From partition D D. From access control
68. You are assigned to lead a small team in your company that manages database identify the wrong
statement in leading the team
A. Assign responsibilities to team members
B. Perform all duties of the team by your own
C. Possess necessary leadership skill
D. Understand the team role
69. You need bring data from an access database in the database in SQL server. You want to perform the task
as simply as possible which one of the following options best meets the requirements?
A. Import and export wizard C. Create database wizard
B. Copy database wizard D. Create form design wizard
70. Which of the following is a securable object in a database schema?

A . database user b. database c. service d. view

71. The main facilities offered by database management software are:


a. Ability to store a large amount of data in structured format
b. Easy editing ,spell check, perform calculations, library of mathematical operations
c. Ability to rotate images, copy and paste ,fill scale
d. Ability to process documents for different purposes
72. Running out of space on the drive used to store backups, all of the server file on location. what can you
do to save space with your backups while maintain … backups?
a. Use data compression
b. Use compressed backups
c. Use full backups
d. Use a third party tool
73. Which of the following is a scalability feature in sql server enterprise edition?
a. Partitioning b. data meaning queries c. binary and compressed xml transport d. publishing
74. Which of the following defines mixed mode authentication?
a. Connection can be made using only windows account
b. Connection can be made using only sql server logins
c. Connection can be made using only database users
d. Connection to sql server can be made with either windows account or sql server logins
75. When you change the authentication mode, what action do you need to perform become takes effect?
a. Reboot the server operating system
b. Lockout all the database users
c. Restart SQL server agent
d. Restart the sql server instance
76. An open source DBMS product that runs on unix,linux and windows.
a. MYSQL b. JSP/SQL c. JDBC/SQL d. Sun ACCESS
77. One of the following is NOT related to database performance
a. Partitioning of tables
b. SQl tunning
c. Hardware optimization
d. Taking backup
78. One of the statements below indicate the advantage of document review.
a. Pictures and diagrams are not valuable tools for understanding systems.
b. Documents will always be up to date
c. Documents will always reflect current procedures
d. Documents often present overviews better than other mechanisms can
79. The machine must have loaded and running to run a compiled java program?
a. Java compiler
b. Java virtual machine
c. Java bytecode
d. A web browser
80. The requirement to being database from an access into sql server .
a. Business intelligence development studio
b. Copy database wizard
c. Import and export wizard
d. BCP
81. Which transaction property ensures changes are still present following a crash or system.
a. Atomicity b. Isolation c. Consistency d. Durability
82. which type of join should be equal
a. Inner joint b. Left joint c. Right joint d. Full joint
83. Which statement should you see the change record main specific criteria
a. Select b. Insert c. Update d. modification
84. which one of the following central normalization
a. foundational dependency b. query c. foreign key d. data type
85. which one of the following DBMS
A. C++ C. AWER
B. ORACLE D. ADOBE READER
86. -----is refer to a number of entity type that participate in the relationship type?
A. Cardinality ratio C. Role levels
B. Degree of relationship D. Relationship type
matching

“A”

1. Sequential steps of perform a specific task. “B”


2. Set of objects that share the same attributes and
operations A. Foreign key
3. Confirming sql server connectivity B. Shadow paging
4. Participating entity from in ERD C. Authentication
5. Smallest unit of data storage in ms sql server. D. Page
6. To create the performance of database in logically. E. Data dictionary
7. Attribute in a table uniquely determines another F. Enterprise integrity
attributes. G. Tuning
8. The candidate key which is selected to identify H. Primary key
records a relation uniquely. I. Batch production
9. Additional rules which is specified by users. J. Class
10. The term which refers to a specific group of K. Leadership
components. L. Algorithm
11. The process of creating new classes from the M. Role name
existing class. N. Weak entity
12. Special kind of stored procedure that executes. O. Inheritance
13. Whenever an attempt is made to modify data in a P. Trigger
table. Q. Schema
14. A business rule property which does not allow R. Instance
transaction on holidays and weekend. S. Constraint
15. Detailed information about what or who is needed T. Query optimization
or about the product to be supplied. U. Specification
16. A query plan that determine the most efficient way V. Grant statement
of executing a given query. W. Backup
17. The process of taking a copy of data for feature use. X. Role
18. Random set of privileges that are granted to users. Y. Testing environment
19. A setup of sw and hw through which the testing Z. Entity integrity
team validate the newly built sw/hw product. AA. Referential integrity
20. The integrity rule which does not allow null value BB. Isolation
for a primary key. CC. Data redundancy
21. Problem solving techniques which is applied to
work situations in business.
22. Multiple copies of the same data in the database.
Matching 2

‘’ A ‘’ ‘’B’’

1. A function that performs a calculation on a column in a set of rows and returns a sing value
2. A set of routines available in an application ,such as ADO, for use by software programmers
when designing an application interface
3. An operation that deletes a row containing a primary key value that is referenced by foreign key
columns in existing rows in other tables
4. A set of system tables that are stored in a catalog and that include definitions of database
structures and related information , such as permissions.
5. A situation where two users, each having a lock on one piece of data, attempt to aquire a lock on
the other’s piece
6. A database backup contains all used data pages and the log files written during the backup.
7. A method of keeping sensitive information confidential by changing data into an unreadable
format.
8. The process of segmenting a single table into multiple tables based on selected rows.
9. In a relational database, a database object that provides fast access to data in the rows of a table
(based on key values)
10. The process for protecting against the loss of data due to disk failure by maintaining a fully
redundant copy of data on a separate disk.
11. By, one task the insertion of a new row or the deletion of an existing row in a range rows
previously read by another task that has not yet committed its transaction
12. Provides a collection of prewritten queries
13. Enable you to assemble users into a single unit to which you can apply permissions
14. A form of software reuse in which a new class is created by absorbing an existing class’s
members and embellishing them with new or modified capabilities
15. System carried out by the test team within the development organization.

A. Horizontal partitioning
B. Application programming interface (API)
C. Beta testing
D. Differential backup
E. Index
F. Cascading delete
G. Deadlock
H. Encryption
I. Roles
J. Mirroring
K. Aggregate function
L. Inheritance
M. Decryption
N. Updating delete
O. Data dictionary
P. Phantom
Q. System stored procedures
R. Alpha testing
S. Full backup
T. Vertical partitioning
U. Primary keys

Matching 3

‘’A’’
16. Packing of data and functions in to a single component
17. Using data without knowing how the data is stored.
18. A mechanism that allows you to implement a function in different ways.
19. Protecting database against unauthorized.
20. SQL keyword sorts the result according to specified criteria.
21. Gives permissions to a specific user or all users to perform actions on database objects.
22. The process of organizing the attributes and table of a relational database to minimize data
redundancy.
23. Collection of similar data items which shares a common name with in the consecutive memory.
24. The overall process of choosing the most efficient means of executing a SQL statement.
25. Identifying a person or thing as known or experienced.
26. Rule in which the foreign key in any referencing table allows refer to a valid row in the
referenced table.
27. Organization of data within the computer memory.
28. Multiple copies of the same data in the database.
29. The result of activities of organization or investment in a given period of time.
30. Problem solving techniques which is applied to work values in business.

‘’B’’

A. Data abstraction
B. Encapsulation
C. Array
D. Polymorphism
E. Security
F. Instance
G. Order by
H. Group by
I. Query optimization
J. Grant statements
K. Recognition
L. Data redundancy
M. Backup
N. Testing
O. Entity integrity
P. Referential integrity
Q. Physical data modeling
R. Negotiation
S. Database normalization
T. Performance

matching 4

‘’A’’

1. Which is used to represent the data model graphically with entities attributes and
relationship
2. Firewall profile identified by network administrator
3. Resolves host name to IP address during DNS server configuration
4. One piece of information about an object or entity
5. A possible type of data to store salary field
6. Enables sharing files using DFS name space and replicating files between DFS
servers
7. Install tools for generating storage reports, configuring, quotas and defining file
screen policies
8. Indexes files for faster searching when clients connect to shared folders
9. The transaction of data into a secret code
10. A networking device that converts one cabling technology to another
11. The lowest unit of meaningful information in a file or document may consist of
numbers ,letters or a combination of both.
12. Place where list of problems that occurred on a system are found
13. A method of collecting information or determining requirements
14. A term used in information retrieval pertaining to particular request for the
database
15. A complete set of information about one thing in a table

1. How to change data from sql to access?


a. Import export wizard
b. Scp
c. Business intelligent studied
2. Which one not true about resource location role manager
a. Scheduling
b. Acknowledge mail
c. Prepare and reading report
d. Meting
3. Which one is true about……non
a. Equal to zero
b. Space
c. Blank
d. Not to say greater than zero equal to or less than
4. Complete picture of data in database?
a. Schema
b. Record
c. System flow chart
d. Relational database management system
5. Which one is not true about strategic plan?
a. Implemented by 2 years
b. Sh
c. O

6. Which one is open source and run on lnux window…..Unix operating system?
a. My sql
b. Jspisql
c. Ml
7. Some words can not use as object and variable name in java?
a. Keyword
b. Syntax
c. Class
d. Reserved words
8. Which one is procedure to change authentication mode?
a. Reboot operating system
b. Restart sql server login
c. Restart sql server agent
d. Use…….
9. Which one is scalability feature of sql server edition?
a. Publishing
b. Partitioning
c. C
10. Which one is sql level principal?
a. Sql server
b. Sql server login
c. Window account
11. Which do you mean by ……sive relationship?
a. Employees has many department
b. Employees manage department
c. Employees manage ti……..
d. ………………………manage organization
12. Relation R cardinality 2 degree 3 and relation Y cardinality3 degree 2 do this by
Cartesian product?
a. Degree 5 and cardinality 6
b. Degree 6 and cardinality 5
c. Degree 8 and cardinality 5
d. Degree 12 and cardinality 5
13. Which one is a machine that used to run java program?
a. Java compiler
b. Java virtual machine(JVM)
14. Which one is true when you run a single program an multiple program the result should
be the same?
a. Atomicity
b. Durability
c. Consistency
d. Isolation
15. Which one is not true about performance of database?
a. Taking backup
b. Hard ware optimization
c. Index
d. Database tuning
16. Which one is secure features of database schema
a. Database user
b. Service
c. Database
d. View
17. Which one is perform in not sql server
a. Un usable change security
b. M
18. ------------user mapped
a. Login
b. Window group
c. Window count

Matching
A
1. Restores data due to after disk failure -
b B
2. Provide fast data access-g A. APL
3. Reuse existing code B. Mirroring
4. Assigned to database for privilege C. Alpha testing
purpose-p D. Beta testing
5. All files backup-i E. Stored procedure
6. Soft wares tested by team member-d F. Primary key
7. Prewritten syntax G. Index
8. Catalog for the definition of data -l H. Inheritance
9. A single table divide in multiple table- I. Full back up
h J. Differential backup
10. Calculate mathematical operation-u K. Phantom
11. Software interface package-a L. Data dictionary
12. To delete referenced record-q M. Deadlock
13. It is a sensitive word char is not N. Horizontal partitioning
readable for unauthorized person-s O. Vertical partitioning
14. On one task insert a new raw or delete P. Role
are cord from exiting table-r Q. Cascadedelete
15. That occur when the two tasks path in R. Update delete
the same way-n S. Encryption
T. Decryption
U. Aggregate function
1. Which of the following problems using the sql group by phrase with a select statement can help to detect?
A. The multivalue multicolumn
B. The inconsistent values
C. The missing values
D. The general-purpose remarks
2. Which of the following column properties specifies whether or not cells in a column must contain a database
values?
A. Null status
B. Data type
C. Default value
D. Data constraints
3. What are the instructions called that tell a system what how, and when to do something?
A. Object-oriented technology approach
B. Object-oriented database
C. Program Database management
4. A logical schema
A. Is the entire database
B. Is a standard way of organizing information in to accessible parts
C. Describes how data is actually stored on disk
D. The design of the database
5. In sql, which command is used to remove a stored function from the database?
A. REMOVE FUNCTION
B. DELTE FUNCTION
C. DROP FUNCTION
D. ERASE FUNCTION
6. The action in java class is
A. Procedure
B. Function
C. Method
D. Subroutines
7. Which of the following is true concerning toggles?
A. Do not create them with sql
B. Execute against only some applications that access a database.
C. Have an event ,condition, and action
D. Can not cascade (cause another trigger to fire)
8. Which of the following is not part of an administrative policy to secure a database?
A. Authentication policy
B. Limiting particular areas within a building to only authorized people
C. Ensure appropriate responses rates are in external maintenance agreements
D. Present information in different formats
9. When the values in one or more attributes being used as a foreign key must exist in another set of one or
more attributes in another table , we have created a(n):
A. Transitive dependency
B. Insertion anomaly
C. Referential integrity constraint
D. Normal form
10. Which of the following is not a restriction for a table to be a relation?
A. The cells of the table must contain a single value.
B. All of the entries in any column must be of the same kind
C. The columns must be ordered
D. No two rows in a table may be identical
11. Which of the following do not include strategic panning factors
A. Organizational goals
B. Critical success factors
C. Information engineering
D. Problem areas
12. What is the fact that the same operation may apply to two or more classes
A. Inheritance
B. Polymorphism
C. Encapsulation
D. Multiple classifications
13. Which of the following statement is true concerning object and/or classes
A. An object is an instance of a class
B. A class is an instance of an object
C. An object includes encapsulates only data
D. A class includes encapsulates only data
14. Which of the following qualifies as best DR (Disaster Recovery) site?
A. DR site in the same campus
B. DR site in the same city
C. DR site in the same country
D. DR site in a different country
15. Which of the following data constraints would be used to specify that the value of cells in a column
must be one of a specific set of possible values?
A. Domain constraint
B. Range constrain
C. An intra-relation constraint
D. An inter-relation constraint

Matching 13. enforces valid entries. K


14. ensures that all values in a column satisfy
certain conditions-H
Column A 15. to combine the results of two queries together
M
1. using either of the equivalent queries give the
intersection of the two tables - L
2. a blueprint or prototype from which objects are
created-d
3. is a namespace for organizing classes and
interfaces in a logical manner-P
4. provides the ability to vary the implementation
of a method or property o
5. a program which converts the program written
in a programming language to a program in
machine language-A
6. logical values on which logical operations are
performed-R
7. returns all distinct row selected by either query-
U Column B
8. mainly deals with the internal structure of the
A. complier
database-e
B. Prioritizes
9. the process of efficiently organizing in a
C. Normalization
database -c
D. Class
10. retrieve data from tables quicker-g
E. White box testing
11. identifies more critical and less critical
F. UNION ALL
activities and assignments -b
G. Indexes
12. descriptions of objects J
H. CHECK constraint
I. Package
J. Schema
K. Domain integrity
L. Full outer join
M. Inner join
N. Dim
O. Commit
P. Boolean operators
Q. UNION
R. Boolean
S. Polymorphism
T. DDL

Setting up Database User Accounts and login:

Most Windows users need SQL Server login account to connect to SQL Server. This shows how to
design a SQL Server login account.
* User name is the name that is used to identify the user inside the database.
* Login specifies the login for which the user is being created.
* A password is a secret word or string of characters that is used for user authentication to prove
identity, or for access approval to gain access to a resource.

Confirm database design


6.1.Identifying database back-up and recovery requirements
Database backup is the process of dumping data (from a database, a transaction log, or a file) into
backup devices that system creates and maintains.
- I.e.: A backup is a copy of data from your database that can be used to reconstruct that data.
Backups can be divided into physical backups and logical backups.
 Physical backups are backups of the physical files used in storing and recovering your database, such as data
files, control files, and archived redo logs.
 A logical backup (export) of a database exports the database objects independent of the physical location of
those objects. Ie: a logical backup exports the data stored in a table regardless of the location of the table.
Recovery is the process of using the backup media to replace uncommitted, inconsistent, or lost data.
The reasons for data loss can be divided into the following groups:
- Program errors
- Administrator (human) errors
- Computer failures (system crash)
- Disk failures
- Catastrophes (fire, flood, earthquake) or theft
Therefore, Backup and recovery refers to the various strategies and procedures involved in protecting
your database against data loss and reconstructing the database after any kind of data loss.
The SQL Server backup and restore component provides an essential safeguard for protecting critical
data stored in your SQL Server databases. To minimize the risk of catastrophic data loss, you need to
back up your databases to preserve modifications to your data on a regular basis. A well-planned backup
and restore strategy helps protect databases against data loss caused by a variety of failures.

Database Engine provides four different backup methods:


- Full database backup
- Differential backup
- Transaction log backup
- File (or file group) backup
Full Database Backup
A full database backup captures the state of the database at the time the backup is started. During the full
database backup, the system copies the data as well as the schema of all tables of the database and the
corresponding file structures. If the full database backup is executed dynamically, the database system
records any activity that takes place during the backup.
Differential Backup
A differential backup creates a copy of only the parts of the database that have changed since the last
full database backup.
The advantage of a differential backup is speed. It minimizes the time required to back up a database,
because the amount of data to be backed up is considerably smaller than in the case of a full database
backup.
Transaction Log Backup
A transaction log backup considers only the changes recorded in the log. This form of backup is
therefore not based on physical parts (pages) of the database, but rather on logical operations (that is,
changes executed using the DML statements INSERT, UPDATE, and DELETE). Because the amount
of data is smaller, this process can be performed significantly quicker than a full database backup and
quicker than a differential backup.
File or File group Backup
File (or file group) backup allows you to back up specific database files (or file groups) instead of the
entire database. In this case, Database Engine backs up only files you specify.
Individual files (or file groups) can be restored from a database backup, allowing recovery from a failure
that affects only a small subset of the database files. You can use either a database backup or a file group
backup to restore individual files or file groups.

1.2.Identifying risks and failure scenarios


Database security concerns the use of a broad range of information security controls to protect
databases against compromises of their confidentiality (secrecy or privacy), integrity/reliability and
availability (ease of use).
It involves various types or categories of controls, such as technical, procedural/administrative and
physical control.
Security risks to database systems include:
 Unauthorized or unintended activity or misuse(use wrongly) by authorized database users, database
administrators, or network/systems managers, or by unauthorized users or hackers
Example: Inappropriate access to sensitive data, metadata or functions within databases, or
inappropriate
changes to the database programs, structures or security configurations.
 Malware infections causing incidents such as unauthorized access, damage to the data or programs.
 Physical damage to database servers caused by computer room fires or floods, overheating, lightning,
electronic breakdowns/equipment failures.
 Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system
administration processes, sabotage/criminal damage etc.

Types of information security control appropriate to databases include:


* Access control * Encryption
* Auditing * Integrity controls
* Authentication * Backups
Database Failures can be due to: - A power failure.
. System crashes, resulting in loss of main - An emergency shutdown
memory. procedure.
. Application software errors. . User Error
. Natural physical disasters. - Accidentally dropping a table.
. Carelessness or unintentional destruction - Wrongly modify or delete data from
of data or facilities. a table.
. Statement Failure: e.g. - When a . Media Failures
program attempts to enter invalid data - Lose a disk or a disk controller
into a database table. fails or a head crash
. User Process Failure: e.g. - A user - File corruption
process may be terminated suddenly or - The overwriting or deletion of a
unexpectedly data file
. Network Failure: e.g. - The network
interface card or the network connection Preventing data loss is one of the most
has failed. critical issues involved in managing
. Instance Failure database systems.
- Hardware failure.
Data can be lost as a result of many and one mirrored database named
different problems: SQLDB-1
 Disk failures (physical problems)
 Viruses
 Incorrect use of UPDATE and DELETE
statements
 Software bug(Program errors) or transaction
(some operation) error
 Administrator (human) errors
 Computer failures (system crash) such as
hardware, software or network error
 Catastrophes (Disasters such as fire, flood, The second common configuration is
earthquake) or theft the environment with one SQL Server
If database has been damaged: machine, two SQL Server instances,
- Need to restore last backup copy of and one mirrored database named
database and reapply updates of committed SQLDB-1. This solution has a major
transactions using log file. flaw because if SQLServer-1 goes
If database is only inconsistent: down, both instances will be
- Need to undo changes that caused unavailable
inconsistency.
To prevent data loss, you can
implement a recovery strategy for your
databases.

What is SQL Server database


mirroring?

SQL Server database mirroring is a Operating modes


disaster recovery and high availability SQL Server database mirroring can be
technique that involves two SQL Server set to provide high availability or
instances on the same or different disaster recovery. Depending on the
machines. One SQL Server instance needs, a DBA can choose among three
acts as a primary instance called the available modes
principal, while the other is a mirrored  High safety – Data is written and committed
instance called the mirror. In special on the principal and mirror databases
cases, there can be a third SQL Server synchronously. Only after committing on
instance that acts as a witness both databases, the database application can
Implementation examples continue with activity
One of the common mirroring o Might produce delay and slower
configuration is the environment with operation because transactions must
two SQL Servers (SQLServer-1 and be committed on both databases
SQLServer-2), two instances o If the principal database goes down,
(SQLInstance-1 and SQLInstance-2), two options are available:
 Do nothing – wait for the again. The SQL Server is
principal to become available unavailable. Mirroring will
again. During that time, the continue where it has stopped
SQL Server instance is  Force the SQL Server
unavailable. Mirroring will instance on the mirror
continue where it has stopped database – the mirror
 Force the SQL Server database becomes the
instance on the mirror principal. Greater possibility
database – the mirror for data loss, due to
database becomes the asynchronous communication
principal. Possible data loss between databases
due to committed  Manual update – to reduce
transactions on the original data loss, take the tail of the
principal database which are log backup if the failed server
not yet committed on the allows, remove mirroring and
mirror currently acting as the restore the tail of the log on
principal the previously mirrored
 High safety with automatic failover – database
Three servers are necessary. Data is written
and must be committed synchronously both
on the principal and mirror databases. Only
after committing on both databases, the
application can continue running Advantages and disadvantages of
o Might produce delay and slower using SQL Server database
operation because transactions must mirroring
be committed on both databases Using SQL Server database mirroring
o If the principal database goes down, has multiple benefits: a built-in SQL
only one option is available: Server feature, relatively easy to set up,
 Let the automatic failover can provide automatic failover in high
process complete, the safety mode, etc. Database mirroring
mirrored database becomes can be combined with other disaster
the principal recovery options such as clustering, log
 High performance – the asynchronous shipping, and replication
communication, data is written and Database mirroring will be removed
committed on the principal server, and later from SQL Server in future versions in
sent and committed to the mirror server. favor of AlwaysOn Availability
Automatic failover isn’t possible and the Groups. Also, database mirroring is per
witness server can’t be used database only solution, which means
o The high performance mode is only that logins and jobs from the principal
available in the Enterprise edition of SQL Server must be manually recreated
SQL Server on the mirror. There is also possibility
o If the principal database goes down, for delay, which can only be reduced
three options are available: with better hardware
 Do nothing – wait for the Setting up the database mirroring
principal to become available environment
The database mirroring feature is consistency. This article will describe
available in SQL Server 2005 version the different modes of database
and greater. Availability of the mirroring and how it is different from
operating modes depends on the SQL other technologies. Here will not get
Server edition. Different SQL Server into the specifics of the SQL Server
versions can be combined, but it’s not 2008 enhancements but will take a high
recommended level tour of SQL Server Mirroring
The database that needs to be mirrored concepts.
must be in the full recovery model.
System databases can’t be mirrored
A full database and transaction log
backups of the database which will be
mirrored must be created and restored
on the SQL Server instance which will
act as the mirror. The restore process For loop statement
must be executed using the WITH 1. #include <iostream.h>
NORECOVERY option void main()
The database mirroring setup needs to {
be initiated from the principal server inta,b;
using the SQL Server Management for(a=1;a<=5;a++)
Studio wizard or T-SQL code. At the {
beginning of the setup process, there’s for(b=a;b>=1;b--)
an option for choosing a witness SQL {
Server instance which is only required cout<<"*";
if the high safety with automatic }
failover mode is desired. SQL Server cout<<endl;
instances must be able to communicate }
which requires creation of so-called }
endpoints with the port and name
specified. These setting are required 2. #include<iostream.h>
both on the principal and mirror SQL intsubstracion(inta,int b)
Server instances {
int Different;
Introduction to Database Mirroring Different=a-b;
in SQL Server return(Different);
Database mirroring was introduced with }
Microsoft SQL Server 2005 technology int main()
that can be used to design high- {
availability and high-performance inta,b,g;
solutions for database redundancy. It is cout<<"Enter the first number"<<endl;
designed to maintain a hot standby cin>>a;
server with a transitionally consistent cout<<"Enter the second
copy of the database. Mirroring is cost- number"<<endl;
effective, speedy, requires no special cin>>b;
hardware, and ensures transactional
g=substracion(a,b);
cout<<"the result is "<< g;
return 0;
}
//the result is 7

‘’B’’

A. Reverse zone
B. Home or work/private network
C. File server recourse manager
D. Transceivers
E. Data element
F. Query
G. Field
H. Distributed file system
I. Currency
J. Forward zone
K. Entity relationship diagram
L. Attribute
M. Print server resource manager
N. Windows search service
O. Encryption
P. Event viewer
Q. Questionnaire
R. Record

You might also like