Q1 Which of the following is not arelational database?A. dBASE IV B. 4th Dimension C. FoxPro D. Relfex |
Q2 Periodically ading, changing and deleting file records is called fileA. Updating B. upgrading C. Restructuring D. History file |
Q3 A large computer information system maintains many different computer files, Which amongst themis called perpetual file?A. Specialized file B. Lon file C. Master file D. History file |
Q4 Which of thefollowng is thefre form data base for IBM and compatible personal computers?A. Memory mate B. Q&A C. Paradox D. Double helix |
Q5 Which langauge has recently become the defecate standard for interfacing application progrms with relational database systemA. Oracle B. SQL C. Dbase D. 4 GL |
Q6 Embedded pointer provideA. a secondary access path B. a physical record key C. an inverted index D. all of the above |
Q7 What is the make given to the database management system whichis able to handle full text data, image data, audio and video?A. fullmedia B. Graphics media C. Multimedia D. Hypertext |
Q8 Large collectionof files are calledA. fields B. record C. database D. sectors |
Q9 choose theRDBMS which supports full-fledged client-server application developmentA. Dbase IV B. Oracle 7.1 C. FoxPro2.1 D. Ingress |
Q10 Which of the following is not true of the traditional approach to information processing?A. There is common sharing of data among the various applications B. It is file-oriented C. Programs are dependent on the files D. It is inflexible |
Q11 The data-base environment has all of the following components except:A. users B. separate files C. data base D. data-base administrator |
Q12 Which of the following is true of the data-manipulation language (DML)?A. It refers to data using physical addresses B. It cannot interface with high-level programming languages C. It is used to define the physical characteristics of each record D. None of the above |
Q13 What is the language used by most of the DBMSs for helping their users to access data?A. High level language B. SQL C. Query language D. 4 GL |
Q14 An owner-member set in the CODASYL specification may haveA. only one owner but many owner occurrences B. only one member but many member occurrence C. More than one member but only one occurrence D. any of the above |
Q15 Updating a database meansA. revising the file structure B. reorganizing the data base C. modifying or adding record occurrence D. all of the above |
Q16 A schema describesA. data elements B. records and files C. record relationships D. all of the above |
Q17 In the DBMS approach, applicationprograms perform theA. storage function B. processing functions C. access control D. all of the above |
Q18 A number of related records that are treated as aunit is calledA. file B. field C. data D. batch |
Q19 The key to a cost-effective data input operation isA. OCR equipment B. Validity checks C. Validation D. Employee motivation |
Q20 There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?A. Data storage system B. Database management system (DBMS) C. Batch processing system D. Data communication package |
Q21 The data base management system might consist of application programs and software package calledA. FORTRAN B. AUTOFLOW C. BPL D. TOTAL |
Q22 The function of a data base is….A. to check all input data B. to check allspelling C. tocollect and organize input data D. to output data |
Q23 To logical data structure with a one-to-many relationship is a:A. network B. tree C. chain D. relational |
Q24 The langauge used application programs to request data from the DBMS is referred to as theA. DML B. DDL C. query language D. any of the above |
Q25 Related fields in a data base are grouped to formA. data file B. data record C. menu D. bank |
Q26 Which of the following is not a logical data-base structure?A. tree B. relational C. network D. chain |
Q27 Data security threats includeA. hardware failure B. privacy invasion C. fraudulent manipulation of data D. all of the above |
Q28 Data encryption techniques are particularly useful forA. reducing storage space requirements B. improving data integrity C. protecting data in data communication systems D. all of the above |
Q29 A set of programs that handle a firm's data base responsibilities is called aA. Data Base Management System (DBMS) B. Data Base Processing System (DBPS) C. Data Management System (DMS) D. all of the above |
Q30 The language used in application programs to request data from the DBMS is referred to as theA. DML B. DDL C. query language D. any of the above |
Q31 The files stored on a secondary storage device are composed of a hierarchy of data. What does a record in a file contain?A. Bits B. Characters C. Data field D. Schema |
Q32 When using a database management system, the first thing that you must do is toA. create a database file B. activate file editor C. load the software into your microcomputer D. keep a floppy disk in readiness |
Q33 The distinguishable parts of a record are calledA. files B. data C. fields D. formats |
Q34 A computer file contains several records. What does each record contain?A. Bytes B. Words C. Fields D. Programs |
Q35 What name is given to the collection of facts, items of information or data which are related in some way?A. Database B. Directory information C. Information tree D. Information provider |
Q36 A computer file can be best described asA. a single data item B. a general collection of data items C. an orderly collection of data items D. a random collection of data items |
Q37 The highest level in the hierarchy of data organisation is calledA. data bank B. database C. data file D. data record |
Q38 Which of the following is a type of DBMS software?A. database manipulation language B. query language C. utilities D. all of the above |
Q39 Data encryption techniques are particularly useful forA. reducing storage space requirements B. improving data integrity C. protecting data in data communication systems D. all of the above |
Q40 The data-base administrator is, in effect, the coordinator between the ________ and the _______.A. DBMS; data base B. application program; data base C. data base; users D. application programs; users |
Q41 Which of the following is true of a network structure?A. It is a physical representation of the data B. It allows a many-to-many relationship C. It is conceptually simple D. It will be the dominant data base of the future |
Q42 Which of the following hardware components is the most important to the operation of a database management system?A. high-resolution video display B. printer C. high speed, large-capacity disk D. plotter |
Q43 With respect to data input, the most accurate description of batch control isA. dividing documents to be entered into batches B. controlling the input of each input clerk C. comparing to a precalculated figure the total of a data item summed across a batch records put into the system D. none of the above |
Q44 A record in third normal form is better than a record to first normal form from a relational mathematics viewpoint.A. True B. False C. ------- D. -------- |
Q45 One data dictionary software packagae is calledA. DB/DC dictionary B. TOTAL C. ACCESS D. any of the above |
Q46 Batch processing is appropriate ifA. a large computer system is available B. only a small computer system is available C. only a few transactions are involved D. none of the above |
Q47 The relatinal model uses some unfamiliar terminolog. T tupelo is equvalent to aA. record B. field C. file D. data base |
Q48 Data items grouped together for storage purpose are called a:A. Record B. title C. list D. string |
Q49 The data base administration function includesA. application programming B. computer operations management C. database access planning D. all of the above |
Q50 Which of the following fields in a student file can be used as a primary key?A. class B. social security number C. GPA D. Major |
Q51 Which of the following is not true of the traditional approach to informationprocessing?A. There is common sharing of data among the various applications B. it is file-oriented C. programs are dependent on othe file D. it is inflexible |
Q52 The relational data-base environemnt has all of othe followng components exceptA. users B. separate files C. data base D. Query language |
Q53 The way a particular application views the data from the data base that the application uses is aA. module B. relational mode C. schema D. sunschema |
Q54 Which of the following is not a logical data base structure?A. Tree B. relational C. network D. chain |
Q55 The logical data structure with a one to many relationship is aA. network B. tree C. chain D. relational |
Q56 The data base administrator is, in effect, the coordinatror between the ……and the…….A. DBMS; data base B. Application program, data base C. Data base; users D. Application programs; users |
Q57 Which of the following is not an advantage of the data-base approachA. elimination of the data redundancy B. ability of associate related data C. increased security D. all of the above |
Q58 Which of thefollowing hardware components is the most improtant to the operation of data base management system?A. high-resolution video display B. printer C. high-speed, large-capacity disk D. mouse |
Q59 A data dictionary doesn't provide information aboutA. where data is located B. the size of the disk storage device C. who won or is responsible for the data D. how the data is used |
Q60 Which of the follwing is true of the data manipulation language(DML)?A. it refer todata using physical addresses B. it cannot interface with high-level programming language C. it is used to define the physicalcharacteristics of each record D. none of the above |
Q61 Data base management system are intended toA. eliminate data redundancy B. establish relationships among records in different files C. manage file access D. all of the above |
Q62 Which of the following contains a complete record of all activity that affectted the contents of a data bae during a ceertain perido of time?A. reprot writer B. query language C. data manipulation language D. transaction log |
Q63 Which two files are used during operation of the RDBMS?A. query langauge and utilities B. data manipulation language and query langauge C. data dictionary and transaction log D. data dictionary and query language |
Q64 Generalized data base management systems do not retrieve data tomeet routine requestsA. True B. False C. - D. - |
Q65 One approach to standarizing storing of data?A. MIS B. structured programming C. CODASYL specifications D. none of the above |
Q66 Which of the following is a data base administrator's function?A. data base design B. backing oup the database C. performance monitoring D. all of the above |
Q67 Which of the following is a component of DBMS softwareA. data base manipulation langauge B. query language C. utilities D. all of of the above |
Q68 Data item characteristics that are important in data management includeA. punctuation B. language C. spelling D. width |
Q69 Which of the following is not the responsibility of the utilities component of DBMS software?A. creating the physical and logical designs B. removing flagged records for deletion C. Creating and maintaining the data dictionary D. monitoring performance |
Q70 Which of the following is not characteristic of a relational data bae model?A. Tables B. Treelike- structure C. Complex logical relationships D. records |
Q71 Which of the following is a prblem of file management system?A. difficult to update B. lack of data independence C. data redundancy D. all of the above |