0% found this document useful (0 votes)
42 views6 pages

Database Administration Level IV Theory Exam 8

Uploaded by

Eyachew Tewabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views6 pages

Database Administration Level IV Theory Exam 8

Uploaded by

Eyachew Tewabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1) Which of the following continues improvement that decrease cost and improve quality?

A. Shine C. Standardize
B. Kaizen D. BSC

2) Which of the following is a securable object in a database schema?

A. Database user C. Service


B. View D. Database

3) UML stands for

A. Universal modeling language C. Unified modeling language


B. United modeling language D. Uni modeling language

4) Which of the following statement is used to remove the privilege from the user amir?
A. Remove update on department from amir
B. Delete select on department from raj
C. Grant update on employee from amir
D. Revoke update on employee from amir
5) During modeling your data entity relationship is applied at

A. Application and security C. Physical refinement


B. Conceptual database D. schema refinement

6) What type of join is needed when you wish to include rows that do not have matching
values?

A. Equi join C. All of the above


B. Natural join D. Outer join

7) The behavior of effective communication skill is?

A. Incongistence body language C. Difference in perception


B. Focus fully on the speaker D. Lack of attention

8) The name for a memory location where you store some data

A. Expressions C. Data type


B. Operations D. variable

9) How do you understand the hierarchical data model?


A. Relationships are represented by a rectangle
B. Represents modem file processing
C. Can be represented as a tree graph with records appearing as nodes
D. Allows a node to have more than one parent
10)Which of the following assigns the number 5 to the area variable?

A. Area ==5 C. Area =5


B. Area 1=5 D. Area --5
11)The maximum cardinality is equal to 1 in both directions of a relationship then it is
classified

A. One to one C. Optional


B. One to many D. Many to many

12)Which of the following facilities DBMS should provide to assist data recovery?

A. Relationship facility C. Constraints facility


B. Design facility D. Checkpoint facility

13)A laboratory testing procedure in which one test is done simultaneously on multiple
speciments

A. Test case C. Scheduling


B. Test scripting D. Bach test

14)Which of the following is the first step in designing and developing a new system?

A. Requirement analysis C. System implementation


B. System testing D. System design

15)Which one is defining a kind of data will store in variables and also defines memory
storage of data?

A. Data type C. Size of array


B. Object D. variable

16)how do change the price of Book whose id=B001 to value of 600


A. Change Book set price=600 where id=’B001’
B. Grant Book set price=600 where id=’B001’
C. Update to change Book set price=600 where id=’B001’
D. Update Book set price=600 where id=’B001’
17)Which of the following does not occur in the process of normalization?

A. Redundancy is eliminated D. Separate tables are created for


B. Duplicate columns are eliminated related group of data
C. Separate tables are merged

18)A union query is which of the following?


A. Combines the output from no more than two queries and must include the same
number of columns.
B. Combines the output from no more than two queries and does not include the same
number of columns.
C. Combines the output from multiple queries and must include the same number of columns.
D. Combines the output from multiple queries and does not include the same number
of columns.
19)Microsoft access is A

A. ORDBMS B. RDBMS
C. Network database model D. OODBMS

20)Which of the following queries is correct about the following output?

Pub ID Number of

1 4

2 2

3 3

Query out put 1


A. Select Pub ID,count(*) as [number of books] from books group by PubID having
count(*)>2
B. Select PubID,count(*) as [number of books] from books group by PubID having
count(*)>=2
C. Select Pub ID,count from books group by PubID having count(*)=2
D. Select Pub ID,count(*) as [number of books] from books order by PubID having
count(*)>=2
21)While listining limitation of file processing system identity the wrong statement?

A. Difficult in accessing data D. Data redundancy and


B. Data isolation and integrity inconsistency available
C. Concurent access is possible

22)Identify three data definition language commands

A. Create,insert,drop C. Create,alter,delete
B. Create,alter,drop D. Insert,update,delete

23)the main facilities offered by database management software are


A. Ability to store a large amount of data in a structured format,easy update,sort,
query, production or reports
B. Ability to process documents for different purposes
C. Ability to rotate images,copy and paste,fill scale
D. Easy editing, spell check, perform calculations, library of mathematical functions,
replication
24)Which of the following can be mapped to a database user?

A. Domain account C. Windows group


B. Windows account D. login

25)Which of the following is true about Null value?

A. Is equivalent to zero
B. Is equivalent to space
C. Is equivalent to blank
D. Is not considered to be greater than,less than,or equivalent to any other value
26)A type of query that is placed within a WHERE or HAVING clause of another query is
called

A. Sub query C. Master query


B. Super query D. Multi query

27)Having specific information about a persons current behavior in order to help him/her
either continue the behavior or modify the behavior

A. Suggestions C. Feedback
B. Opinion D. conclusion

28)Which one true about the guidelines to create a data model?


A. No repeat the steps to optimize the model
B. Identify the different data components consider raw and processed data
C. Identify the relationships between the similar data components
D. Test the model with similar scenarios
29)When the computer can not differentiate between two overloaded constructors, they are
called

A. Dubious C. Destructed
B. Ambiguous D. overloaded

30)information of an organization can gathered by

A. Guessing business rules


B. Imagining business forms
C. Interviewing end users
D. Stealing the organizations document

31)Which of the following is true concerning triggers?


A. They have an event, condition, and action
B. You do not create them with SQL
C. They execute against only some applications that access a database
D. They can not cascade (cause another trigger to fire)

32)In a given organization, employees are forbidden to use internet at any working hour
except at lunch time and weekend what dose this?

A. Organizational policy C. Organizational mission


B. Organizational structure D. Organizational goal

33)There is a database called PUBS having tables Authors (AU_fname, AU_lname,city) and
publishers (PUB_name,city) the riport generated by the following query is
Use PUBS Select a. AU_fname, a. AU_lname, p.PUB_name from Authors left outer join
publishers p on a.city=p.city order by p. PUB_name ASC, a. AU_lname ASC, a. AU_fname,
ASC
A. List only those publishers that are located in the same cities as the authors
B. List the name of every author in the authors table
C. Retrieves the name of every author in the authors table and the names of any
publishers that are located in the same cities as the authors
D. List the name of all authors and publishers
34)A set of convetions, rules and standards employed in acomputer systems technical
framework, plus customer requirements and specifications

A. E-R diagram C. Flow chart


B. Data modeling D. System architecture

35)Which of the following is not important in order to increase the performance of the
database?
A. Use more powerful cpu’s
B. Use less memory
C. Use high speed connection between database components
D. Use more RAM capacity
36)Two concurrent transactions are active in your system. The first transaction modifies data
in a table. The second transaction sees those modifications before they are actually
committed to the database. The first transaction then rolls back the modifications. Type of
data problem has to occurred is

A. Phantom read C. Repeatable read


B. Dirty reads D. Non repeatable read

37)The…………… schema uses a page table containing pointers to all pages, the page table
itself and all updated pages are copied to a new location

A. Shadow paging C. Shadow copy


B. Update log records D. Delete log records

38)A method of combining the data and functions inside a class

A. Methods
B. Class
C. Encapsulation
D. polymorphism

You might also like