Quiznetik

DataBase Management System (DBMS) | Set 7

1. Html document must always be saved with:

Correct : D. both .html & .htm

2. How many levels of headings are in html:

Correct : C. 6

3. The Java                      specification defines an application programming interface for communication between the Web server and the application program.

Correct : A. servlet

4. How many JDBC driver types does Sun define?

Correct : D. four

5. Which JDBC driver Type(s) can be used in either applet or servlet code?

Correct : C. both type 3 and type 4

6. What MySQL property is used to create a surrogate key in MySQL?

Correct : C. auto_increment

7. A JSP is transformed into a(n):

Correct : B. java servlet

8. What is bytecode?

Correct : C. machine-independent code

9. Where is metadata stored in MySQL?

Correct : C. in the mysql database mysql

10. Which of the following is true for Seeheim model?

Correct : A. presentation is abstracted from dialogue and application

11. Which of the unit operation is used in Model view controller?

Correct : B. part whole decomposition

12. Memory address refers to the successive memory words and the machine is called as

Correct : A. word addressable

13. The                            layer, which provides a high-level view of data and actions on data.

Correct : A. business logic

14. The                              layer, which provides the interface between the business-logic layer and the underlying database.

Correct : D. data access

15. The                            system is widely used for mapping from Java objects to relations.

Correct : A. hibernate

16. Which among the following are the functions that any system with a user interface must provide?

Correct : A. presentation

17. Which of the following is the main task accomplished by the user?

Correct : D. all of the mentioned

18. What are the portability concerns founded in Seeheim model?

Correct : D. replacing the presentation & application toolkit

19. Which schema object instructs Oracle to connect to a remotely access an object of a database?

Correct : D. data link

20. DML changes are

Correct : D. both insert and update

21. Which of the following object types below cannot be replicated?

Correct : D. sequence

22. How to force a log switch?

Correct : B. by using alter system switch logfile

23. The ORDER BY clause can only be used in

Correct : A. select queries

24. Which of the following rule below are categories of an index?

Correct : A. column and functional

25. Which of the following queries are legal?

Correct : D. select deptno, avg(sal) from emp group by deptno;

26. Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500?

Correct : B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;

27. Which of the following data structure is not linear data structure?

Correct : D. none of the mentioned

28. Which of the following data structure is linear data structure?

Correct : C. arrays

29. The operation of processing each element in the list is known as

Correct : D. traversal

30. Finding the location of the element with a given value is:

Correct : B. search

31. Arrays are best data structures

Correct : A. for relatively permanent collections of data

32. Linked lists are best suited

Correct : B. for the size of the structure and the data in the structure are constantly changing

33. Each array declaration need not give, implicitly or explicitly, the information about

Correct : C. the first data from the set to be stored

34. In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

Correct : A. sql injection

35. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.

Correct : C. cross-site scripting

36. is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Correct : B. cross-site request forgery

37. A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

Correct : B. sign-on system

38. The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.

Correct : C. security assertion markup language (saml)

39. allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

Correct : D. virtual private database (vpd)

40. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.

Correct : A. row-level authorization

41. is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

Correct : A. encryption

42. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

Correct : B. decryption key

43. Which of the following is not a property of good encryption technique?

Correct : D. none of the mentioned

44. In which of the following encryption key is used to encrypt and decrypt the data?

Correct : C. symmetric key

45. Encryption of small values, such as identifiers or names, is made complicated by the possibility of

Correct : A. dictionary attacks

46. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?

Correct : C. advanced encryption standard

47. Which of the following requires no password travel across the internet?

Correct : C. challenge–response system

48. The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.

Correct : A. cache

49. Which of the following stores several gigabytes of data but usually lost when power failure?

Correct : C. main memory

50. The flash memory storage used are

Correct : A. nor flash

51. is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.

Correct : A. flash memory

52. The primary medium for the long-term online storage of data is the                       where the entire database is stored on magnetic disk.

Correct : B. magnetic disks

53. Optical disk                systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.

Correct : B. jukebox

54. There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called                      disks.

Correct : A. write-once, read-many (worm)

55. In magnetic disk                  stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.

Correct : D. disk arm

56. A                      is the smallest unit of information that can be read from or written to the disk.

Correct : C. sector

57. The disk controller uses                  at each sector to ensure that the data is not corrupted on data retrieval.

Correct : A. checksum

58. is the time from when a read or write request is issued to when data transfer begins.

Correct : A. access time

59. The time for repositioning the arm is called the                  and it increases with the distance that the arm must move.

Correct : C. seek time

60. is around one-half of the maximum seek time.

Correct : B. average seek time

61. Hybrid disk drives are hard-disk systems that combine magnetic storage with a smaller amount of flash memory, which is used as a cache for frequently accessed data.

Correct : B. disk drivers

62. Optical disk technology uses

Correct : D. raid

63. With multiple disks, we can improve the transfer rate as well by                        data across multiple disks.

Correct : A. striping

64. partitions data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk.

Correct : B. block interleaved distributed parity

65. The RAID level which mirroring is done along with stripping is

Correct : D. both raid 1+0 and raid 0

66. Where performance and reliability are both important, RAID level          is used.

Correct : D. 0+1

67. is popular for applications such as storage of log files in a database system since it offers the best write performance.

Correct : A. raid level 1

68. which increases the number of I/O operations needed to write a single logical block, pays a significant time penalty in terms of write performance.

Correct : A. raid level 1

69. Tertiary storage is built with :

Correct : C. removable media

70. Operating system is responsible for

Correct : D. all of the mentioned

71. A typical tape drive is                  a typical disk drive.

Correct : A. more expensive than

72. During recovery from a failure

Correct : A. each pair of physical block is examined

73. A magneto-optic disk is :

Correct : C. tertiary storage

74. Which of the following are the process of selecting the data storage and data access characteristics of the database?

Correct : B. physical database design

75. The replacement of a bad block generally is not totally automatic because

Correct : B. data in bad block is usually lost

76. Which of the following is the oldest database model?

Correct : D. network

77. The surface area of a tape is                  the surface area of a disk.

Correct : B. much larger than

78. Which one of the following is not a secondary storage?

Correct : C. ram

79. Which level of RAID refers to disk mirroring with block striping?

Correct : A. raid level 1

80. A unit of storage that can store one or more records in a hash file organization is denoted as

Correct : A. buckets

81. The file organization which allows us to read records that would satisfy the join condition by using one block read is

Correct : C. clustering file organization

82. What are the correct features of a distributed database?

Correct : C. users see the data in one global schema.

83. Each tablespace in an Oracle database consists of one or more files called

Correct : C. datafiles

84. The management information system (MIS) structure with one main computer system is called a

Correct : C. centralized mis structure

85. Choose the RDBMS which supports full fledged client server application development

Correct : B. oracle 7.1

86. One approach to standardization storing of data?

Correct : C. codasyl specification

87. The highest level in the hierarchy of data organization is called

Correct : B. data base

88. An audit trail

Correct : B. is the recorded history of operations performed on a file

89. Large collection of files are called

Correct : C. database

90. Which of the following is not true of the traditional approach to information processing

Correct : A. there is common sharing of data among the various applications

91. Which of these is not a feature of Hierarchical model?

Correct : D. child node can have any number of parent nodes

92. Which of these data models is an extension of the relational data model?

Correct : B. object-relational data model

93. The information about data in a database is called

Correct : A. metadata

94. A data dictionary is a special file that contains?

Correct : D. all of the mentioned

95. The DBMS acts as an interface between what two components of an enterprise-class database system?

Correct : A. database application and the database

96. A relational database system needs to maintain data about the relations, such as the schema of the relations. This is called

Correct : A. metadata

97. Relational schemas and other metadata about relations are stored in a structure called the

Correct : D. data dictionary

98. is the collection of memory structures and Oracle background processes that operates against an Oracle database.

Correct : B. instance

99. A                  is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.

Correct : A. tablespace

100. A tablespace is further broken down into

Correct : B. segments