Coc Model Q Edit
Coc Model Q Edit
1. The process of deciding how to commit resources between varieties possible tasks is:
a. Consistency b. Scheduling c. realistic d. specificity
2. The component of strategic plan that defines the organization’s purpose and primary objectives.
A. Mission statement c. guiding principles
B. Vision statement d. SWOT analysis
3. Which one of the following is the correct procedure that you follow to solve a problem?
a. Define the problem implement the plan develop a plan evaluate the result
b. implement the plan Define the problem develop a plan evaluate the result
c. develop a plan Define the problem implement the plan evaluate the result
d. Define the problem develop a plan implement the plan evaluate the result
4. The process of combining heterogeneous data sources in to a single queriable schema to get a unified view of
these data.
a. Data transformation c. data integration
b. Data processing d. data cleaning
5. The process of changing the data into the format of new database system is.
a. Installation b. Documentation c. data conversion d. maintenance
6. Suppose that you have an activity which can perform a number of times repeatedly. Then which one of the
following statement is more preferable?
a. If…else statement c. case statement
b. Loop statement d. jump statement
7. Assume you are a database administrator in the department of information technology .then if you want to
generate a report about all female students, which sql command is applicable?
a. Create b. retrieve c. Update d. select
8. If you join data from two tables then which one of the following true about the application of inner join.
a. Returns only the rows from each table that has matching values in the join columns
b. Returns all the rows of the first table
c. Returns a row in the result table for each combination of rows of using Cartesian product
d. Returns all the row of the second tables
9. Mr. Abebe is one of database worker in your organization and he can change his id_number from org123 to
org12 but he could not change his salary. Then which one of the following is a possible reason for abebe?
a. He may not have update privilege on id_number column while he has on salary column
b. He may not have update privilege on salary column while he has on id_number column
c. He may not have update privilege for the entire column of that table.
d. He may not have update privilege for the database as a whole.
10. Which one of the following activity is dune during requirement gathering and analysis?
a. Identify system user c. testing the system against the requirements
b. Starting the actual code d. prepare the schema of the database
11. Which one of the following is the main advantage of migrate to new technology?
a. It increases cost
b. It helps to merge with the organizations that run the same technology
c. It brings new solution which meets the short term plan
d. It is capable of enhancement
12. Which one of the following is an open source DBMS tool?
a. Microsoft sql server b. Microsoft access c. My sql d. oracle
13. Which one of the following programming language is used for database programming?
a. C++ b. java c. C d. structured query language
Sector of ICT in database administration level IV theoretical question
14. Miss Lemlem is a database programmer at civil service college.as a database system profession the
responsibility of lemlem is:
a. Design the conceptual model of database. C. coding and implementing the application program
b. Deny the granted database users d. manage the overall database system
15. In Modular programming, which statement is not considered as benefit?
A. Less code has to be written
B. Codes are simple and easy to understand
C. It does not allow many programmers to collaborate on the some application
D. A large program can be break down into smaller independent modules
16. Among the following term which one can be considered multi values attributes
A. Name B. Id C. Hobby D. Sex
17. Data base design involves modeling the collected information at high level of abstraction without
Using particular data or DBMS
A. Conceptual database design
B. Logical database design
C. Physical database design
D. Database design schema
18. The requirement(s) for using identity property can be specified as
A. It can be define character date type
B. Copy one identity column
C. It can be up date
D. It does allow null values
19. Which one of the following not true first normal form(inf)
A. There are no repeating or duplicate fields
B. Each call contain only a single values
C. Each records is unique
D. All non key field depend on all component the primary key
20. In SQL server which one of the following is a working statement
A. Each entity name should be unique in the some database
B. Two attribute of an entity type can have same name
C. Count function does not return a null
D. In operator allows you to specify multiple value of a WHERE clause
21. Designing a data base is an iterative process that involves Structure based on information and processing
requirement of your, which one is Correct phase of the design process?
A. Data analysis - physical database - logical database design – physical implementation
B. Data analysis – logical database design – physical database design – physical implementation
C. physical database design – Data analysis - logical database design – physical implementation
D. physical database design – logical database design – data analysis – physical database implementation
22. During the conceptual design phase what will happen
A. the internal component of the application are designed
B. normalization take place
C. new entity may be discovered
D. program specified are written
23. With SQL how can you return the records from a table name ‘’EMPLOYEE’’ sorted descending By ‘’first name’’
A. select * from EMPLOYEE ORDER first name descend
B. select * from EMPLOYEE ORDER by first name desc
C. select * from EMPLOYEE ORDER by first name asc
D. select * from EMPLOYEE ORDER by first name ascend
Sector of ICT in database administration level IV theoretical question
24. while listing limitation of file processing system identify the working statement
A. data redundancy inconsistency available
B. difficult in accessing data
C. data isolation and integrity
D. concurrent accessing is possible
26. all of the following are SQL server system database component except
A. master database B. conventional database C. model database D. temped database
27. Assume that there are two given table, MATHOR table and CHILDRN table under the some database name.
What will be the possible relationship between those tables?
A. one- to- many C. many-to – many
B. one- to-one D. has no relationship
28. in defining primary key ,which one of the following is wrong statement
A. they cannot be null
B. only unique values can be assigned to them
C. they cannot be used as reference for the columns in a related table
D. they cannot be character data type
29. To fix the database after a failure such as a hard disk malfunction, the appropriate key word is
A. back up B. recovery C. security D. access control
30. Which DBMS, which one of the following not the data definition language (DDL)command
A. Alter B. update C. create D. drop
31. In SQL, which one the following is a correct syntax to modify
A. alter ,< table name> <column name > <data type> <field size > <constraint>
B. alter table add<column name > <data type> <field size > <constraint>
C. alter table < table name> add <column name > <data type> <field size > <constraint>
D. alter table < table name> drop <column name > <data type> <field size >
32. Which one of the following referential integrity, constraint should be specify automatic deletion of a foreign
key record when a record in the base table is deleted
A. on drop cascade B. on delete cascade C. on update cascade D. on drop set null
33. All of the following can consider as entity integrity constraint except:
A. Unique B. foreign key C. identity D. primary key
34. Which one of the following is common type of data manipulation language
A. Select B. Create table C. drop D. None
35. is used to limit values range that can be placed in a column
a. foreign key b. primary key c. check d. not null e. none
36. ___ is used to allow specific user to perform a specific task
a. Revoke b. Grant c. Distinct d. all
37. ___is used to filter records based on more than one condition
a. Or operator b. And operator c. A&b d. all
38. Which one of the following false about the primary key constraint
a. Uniquely identifies each record in a data base table
b. Must constraint unique constraint
c. Column can contain null value
d. All
39. Which one of the following is false statement about DDL
a. create table b. drop table c. alter table d. change table
40. ___ join return all raw when there is match in one of the table
a. Full b. Inner c. Left d. right
45. ___ are used to limit the type of data that can go into the table?
a. Property b. Constraint c. All d. none
46. ___ is constraint uniquely identify each record in a database table
a. Primary key b. Foreign key c. Check d. all
52. you run select statement and multiple duplicates of values are retrieved what key word can
you use to retrieve only the non duplicate value ?
53. with SQL, which types of join should you use if you want to return only matched rows?
A. inner join B. left outer join C. right outer join D. full outer join
55. how you can change “Bertukan”in to Birtukan” in the“LastName” column in the student table?
D. modify student set Last Name =’bertukan’ into Last Name =’birtukan’
56. There are certain packages that allow people to define data items ,place these items in particular records ,
combine the records in to designated files and then manipulate and retrieve the stored data .what are they
called?
60. Using database management system is preferable than file system when
A. The number of record is small
B. The data we need to keep is very secure
C. The speed of accessing data is our first priority
D. The company have no capacity to add new hardware and software
61. Which of the following is not task in gathering data to identify business requirements
A. Ensuring stake holder involvement at all levels
B. Giving training on how to operate to users and technical’s
C. Understand the needs of your client
D. Identify the key people who will be enacted by the project
62. Indexes are created in most RDBMSs to:
A. Provides a quicker way to store data
B. Increase the cost of implementation
C. Provide rapid random and sequential access to base-table data.
D. Decrease the amount of disk space utilized.
63. What do you do if an important table in your database in removed accidentally?
A. Undo the operation to bring it backs to its prior state
B. Get the deleted data from recycle bin and restore it
C. Create the table and add all the data from documents
D. Restore the table from back up file
64. A power failure occurred while the database was operating unfortunately , the UPS did not function
properly and did not stop the SQL SERVER in a proper manner .once power comes back, what do you
have to do to your server to recover the transactions that have been commanded but not check pointed ?
A. You need to back up the transaction log restore the database from the last full database backup ,
and then restore all the transaction log
B. Naming .SQL server will recover automatically, rolling back pending transactions and rolling
forward committed ones.
C. Nothing all transactions since the last checkpoint are lost , the effect of the others are in the
database
D. RUN ROLL FORWARDS ALL TRANSACTIONS.
65. A database technical documentation should contain all except
A. Descriptions of what the table means and how it’s functionally used
B. Descriptions of what each attribute means
C. Explanations of the relationship
D. Distributions of clients
66. Application where only one user accesses the data base at given time is an example of
A. Single user database
B. Multiuser database application
C. E-commerce database application
D. Data mining database application
67. The database administrator wants to fix the database after the failure such as a hard disk malfunction
from ,where he/she start to make database functional again?
A. From back up C. From security
B. From partition D D. From access control
68. You are assigned to lead a small team in your company that manages database identify the wrong
statement in leading the team
A. Assign responsibilities to team members
B. Perform all duties of the team by your own
C. Possess necessary leadership skill
D. Understand the team role
69. You need bring data from an access database in the database in SQL server. You want to perform the task
as simply as possible which one of the following options best meets the requirements?
A. Import and export wizard C. Create database wizard
B. Copy database wizard D. Create form design wizard
70. Which of the following is a securable object in a database schema?
“A”
‘’ A ‘’ ‘’B’’
1. A function that performs a calculation on a column in a set of rows and returns a sing value
2. A set of routines available in an application ,such as ADO, for use by software programmers
when designing an application interface
3. An operation that deletes a row containing a primary key value that is referenced by foreign key
columns in existing rows in other tables
4. A set of system tables that are stored in a catalog and that include definitions of database
structures and related information , such as permissions.
5. A situation where two users, each having a lock on one piece of data, attempt to aquire a lock on
the other’s piece
6. A database backup contains all used data pages and the log files written during the backup.
7. A method of keeping sensitive information confidential by changing data into an unreadable
format.
8. The process of segmenting a single table into multiple tables based on selected rows.
9. In a relational database, a database object that provides fast access to data in the rows of a table
(based on key values)
10. The process for protecting against the loss of data due to disk failure by maintaining a fully
redundant copy of data on a separate disk.
11. By, one task the insertion of a new row or the deletion of an existing row in a range rows
previously read by another task that has not yet committed its transaction
12. Provides a collection of prewritten queries
13. Enable you to assemble users into a single unit to which you can apply permissions
14. A form of software reuse in which a new class is created by absorbing an existing class’s
members and embellishing them with new or modified capabilities
15. System carried out by the test team within the development organization.
A. Horizontal partitioning
B. Application programming interface (API)
C. Beta testing
D. Differential backup
E. Index
F. Cascading delete
G. Deadlock
H. Encryption
I. Roles
J. Mirroring
K. Aggregate function
L. Inheritance
M. Decryption
N. Updating delete
O. Data dictionary
P. Phantom
Q. System stored procedures
R. Alpha testing
S. Full backup
T. Vertical partitioning
U. Primary keys
Matching 3
‘’A’’
16. Packing of data and functions in to a single component
17. Using data without knowing how the data is stored.
18. A mechanism that allows you to implement a function in different ways.
19. Protecting database against unauthorized.
20. SQL keyword sorts the result according to specified criteria.
21. Gives permissions to a specific user or all users to perform actions on database objects.
22. The process of organizing the attributes and table of a relational database to minimize data
redundancy.
23. Collection of similar data items which shares a common name with in the consecutive memory.
24. The overall process of choosing the most efficient means of executing a SQL statement.
25. Identifying a person or thing as known or experienced.
26. Rule in which the foreign key in any referencing table allows refer to a valid row in the
referenced table.
27. Organization of data within the computer memory.
28. Multiple copies of the same data in the database.
29. The result of activities of organization or investment in a given period of time.
30. Problem solving techniques which is applied to work values in business.
‘’B’’
A. Data abstraction
B. Encapsulation
C. Array
D. Polymorphism
E. Security
F. Instance
G. Order by
H. Group by
I. Query optimization
J. Grant statements
K. Recognition
L. Data redundancy
M. Backup
N. Testing
O. Entity integrity
P. Referential integrity
Q. Physical data modeling
R. Negotiation
S. Database normalization
T. Performance
matching 4
‘’A’’
1. Which is used to represent the data model graphically with entities attributes and
relationship
2. Firewall profile identified by network administrator
3. Resolves host name to IP address during DNS server configuration
4. One piece of information about an object or entity
5. A possible type of data to store salary field
6. Enables sharing files using DFS name space and replicating files between DFS
servers
7. Install tools for generating storage reports, configuring, quotas and defining file
screen policies
8. Indexes files for faster searching when clients connect to shared folders
9. The transaction of data into a secret code
10. A networking device that converts one cabling technology to another
11. The lowest unit of meaningful information in a file or document may consist of
numbers ,letters or a combination of both.
12. Place where list of problems that occurred on a system are found
13. A method of collecting information or determining requirements
14. A term used in information retrieval pertaining to particular request for the
database
15. A complete set of information about one thing in a table
6. Which one is open source and run on lnux window…..Unix operating system?
a. My sql
b. Jspisql
c. Ml
7. Some words can not use as object and variable name in java?
a. Keyword
b. Syntax
c. Class
d. Reserved words
8. Which one is procedure to change authentication mode?
a. Reboot operating system
b. Restart sql server login
c. Restart sql server agent
d. Use…….
9. Which one is scalability feature of sql server edition?
a. Publishing
b. Partitioning
c. C
10. Which one is sql level principal?
a. Sql server
b. Sql server login
c. Window account
11. Which do you mean by ……sive relationship?
a. Employees has many department
b. Employees manage department
c. Employees manage ti……..
d. ………………………manage organization
12. Relation R cardinality 2 degree 3 and relation Y cardinality3 degree 2 do this by
Cartesian product?
a. Degree 5 and cardinality 6
b. Degree 6 and cardinality 5
c. Degree 8 and cardinality 5
d. Degree 12 and cardinality 5
13. Which one is a machine that used to run java program?
a. Java compiler
b. Java virtual machine(JVM)
14. Which one is true when you run a single program an multiple program the result should
be the same?
a. Atomicity
b. Durability
c. Consistency
d. Isolation
15. Which one is not true about performance of database?
a. Taking backup
b. Hard ware optimization
c. Index
d. Database tuning
16. Which one is secure features of database schema
a. Database user
b. Service
c. Database
d. View
17. Which one is perform in not sql server
a. Un usable change security
b. M
18. ------------user mapped
a. Login
b. Window group
c. Window count
Matching
A
1. Restores data due to after disk failure -
b B
2. Provide fast data access-g A. APL
3. Reuse existing code B. Mirroring
4. Assigned to database for privilege C. Alpha testing
purpose-p D. Beta testing
5. All files backup-i E. Stored procedure
6. Soft wares tested by team member-d F. Primary key
7. Prewritten syntax G. Index
8. Catalog for the definition of data -l H. Inheritance
9. A single table divide in multiple table- I. Full back up
h J. Differential backup
10. Calculate mathematical operation-u K. Phantom
11. Software interface package-a L. Data dictionary
12. To delete referenced record-q M. Deadlock
13. It is a sensitive word char is not N. Horizontal partitioning
readable for unauthorized person-s O. Vertical partitioning
14. On one task insert a new raw or delete P. Role
are cord from exiting table-r Q. Cascadedelete
15. That occur when the two tasks path in R. Update delete
the same way-n S. Encryption
T. Decryption
U. Aggregate function
1. Which of the following problems using the sql group by phrase with a select statement can help to detect?
A. The multivalue multicolumn
B. The inconsistent values
C. The missing values
D. The general-purpose remarks
2. Which of the following column properties specifies whether or not cells in a column must contain a database
values?
A. Null status
B. Data type
C. Default value
D. Data constraints
3. What are the instructions called that tell a system what how, and when to do something?
A. Object-oriented technology approach
B. Object-oriented database
C. Program Database management
4. A logical schema
A. Is the entire database
B. Is a standard way of organizing information in to accessible parts
C. Describes how data is actually stored on disk
D. The design of the database
5. In sql, which command is used to remove a stored function from the database?
A. REMOVE FUNCTION
B. DELTE FUNCTION
C. DROP FUNCTION
D. ERASE FUNCTION
6. The action in java class is
A. Procedure
B. Function
C. Method
D. Subroutines
7. Which of the following is true concerning toggles?
A. Do not create them with sql
B. Execute against only some applications that access a database.
C. Have an event ,condition, and action
D. Can not cascade (cause another trigger to fire)
8. Which of the following is not part of an administrative policy to secure a database?
A. Authentication policy
B. Limiting particular areas within a building to only authorized people
C. Ensure appropriate responses rates are in external maintenance agreements
D. Present information in different formats
9. When the values in one or more attributes being used as a foreign key must exist in another set of one or
more attributes in another table , we have created a(n):
A. Transitive dependency
B. Insertion anomaly
C. Referential integrity constraint
D. Normal form
10. Which of the following is not a restriction for a table to be a relation?
A. The cells of the table must contain a single value.
B. All of the entries in any column must be of the same kind
C. The columns must be ordered
D. No two rows in a table may be identical
11. Which of the following do not include strategic panning factors
A. Organizational goals
B. Critical success factors
C. Information engineering
D. Problem areas
12. What is the fact that the same operation may apply to two or more classes
A. Inheritance
B. Polymorphism
C. Encapsulation
D. Multiple classifications
13. Which of the following statement is true concerning object and/or classes
A. An object is an instance of a class
B. A class is an instance of an object
C. An object includes encapsulates only data
D. A class includes encapsulates only data
14. Which of the following qualifies as best DR (Disaster Recovery) site?
A. DR site in the same campus
B. DR site in the same city
C. DR site in the same country
D. DR site in a different country
15. Which of the following data constraints would be used to specify that the value of cells in a column
must be one of a specific set of possible values?
A. Domain constraint
B. Range constrain
C. An intra-relation constraint
D. An inter-relation constraint
Most Windows users need SQL Server login account to connect to SQL Server. This shows how to
design a SQL Server login account.
* User name is the name that is used to identify the user inside the database.
* Login specifies the login for which the user is being created.
* A password is a secret word or string of characters that is used for user authentication to prove
identity, or for access approval to gain access to a resource.
‘’B’’
A. Reverse zone
B. Home or work/private network
C. File server recourse manager
D. Transceivers
E. Data element
F. Query
G. Field
H. Distributed file system
I. Currency
J. Forward zone
K. Entity relationship diagram
L. Attribute
M. Print server resource manager
N. Windows search service
O. Encryption
P. Event viewer
Q. Questionnaire
R. Record