Q1 Which of the following is not arelational database?

A. dBASE IV

B. 4th Dimension

C. FoxPro

D. Relfex

Q2 Periodically ading, changing and deleting file records is called file

A. Updating

B. upgrading

C. Restructuring

D. History file

Q3 A large computer information system maintains many different computer files, Which amongst themis called perpetual file?

A. Specialized file

B. Lon file

C. Master file

D. History file

Q4 Which of thefollowng is thefre form data base for IBM and compatible personal computers?

A. Memory mate

B. Q&A

C. Paradox

D. Double helix

Q5 Which langauge has recently become the defecate standard for interfacing application progrms with relational database system

A. Oracle

B. SQL

C. Dbase

D. 4 GL

Q6 Embedded pointer provide

A. a secondary access path

B. a physical record key

C. an inverted index

D. all of the above

Q7 What is the make given to the database management system whichis able to handle full text data, image data, audio and video?

A. fullmedia

B. Graphics media

C. Multimedia

D. Hypertext

Q8 Large collectionof files are called

A. fields

B. record

C. database

D. sectors

Q9 choose theRDBMS which supports full-fledged client-server application development

A. Dbase IV

B. Oracle 7.1

C. FoxPro2.1

D. Ingress

Q10 Which of the following is not true of the traditional approach to information processing?

A. There is common sharing of data among the various applications

B. It is file-oriented

C. Programs are dependent on the files

D. It is inflexible

Q11 The data-base environment has all of the following components except:

A. users

B. separate files

C. data base

D. data-base administrator

Q12 Which of the following is true of the data-manipulation language (DML)?

A. It refers to data using physical addresses

B. It cannot interface with high-level programming languages

C. It is used to define the physical characteristics of each record

D. None of the above

Q13 What is the language used by most of the DBMSs for helping their users to access data?

A. High level language

B. SQL

C. Query language

D. 4 GL

Q14 An owner-member set in the CODASYL specification may have

A. only one owner but many owner occurrences

B. only one member but many member occurrence

C. More than one member but only one occurrence

D. any of the above

Q15 Updating a database means

A. revising the file structure

B. reorganizing the data base

C. modifying or adding record occurrence

D. all of the above

Q16 A schema describes

A. data elements

B. records and files

C. record relationships

D. all of the above

Q17 In the DBMS approach, applicationprograms perform the

A. storage function

B. processing functions

C. access control

D. all of the above

Q18 A number of related records that are treated as aunit is called

A. file

B. field

C. data

D. batch

Q19 The key to a cost-effective data input operation is

A. OCR equipment

B. Validity checks

C. Validation

D. Employee motivation

Q20 There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?

A. Data storage system

B. Database management system (DBMS)

C. Batch processing system

D. Data communication package

Q21 The data base management system might consist of application programs and software package called

A. FORTRAN

B. AUTOFLOW

C. BPL

D. TOTAL

Q22 The function of a data base is….

A. to check all input data

B. to check allspelling

C. tocollect and organize input data

D. to output data

Q23 To logical data structure with a one-to-many relationship is a:

A. network

B. tree

C. chain

D. relational

Q24 The langauge used application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. query language

D. any of the above

Q25 Related fields in a data base are grouped to form

A. data file

B. data record

C. menu

D. bank

Q26 Which of the following is not a logical data-base structure?

A. tree

B. relational

C. network

D. chain

Q27 Data security threats include

A. hardware failure

B. privacy invasion

C. fraudulent manipulation of data

D. all of the above

Q28 Data encryption techniques are particularly useful for

A. reducing storage space requirements

B. improving data integrity

C. protecting data in data communication systems

D. all of the above

Q29 A set of programs that handle a firm's data base responsibilities is called a

A. Data Base Management System (DBMS)

B. Data Base Processing System (DBPS)

C. Data Management System (DMS)

D. all of the above

Q30 The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. query language

D. any of the above

Q31 The files stored on a secondary storage device are composed of a hierarchy of data. What does a record in a file contain?

A. Bits

B. Characters

C. Data field

D. Schema

Q32 When using a database management system, the first thing that you must do is to

A. create a database file

B. activate file editor

C. load the software into your microcomputer

D. keep a floppy disk in readiness

Q33 The distinguishable parts of a record are called

A. files

B. data

C. fields

D. formats

Q34 A computer file contains several records. What does each record contain?

A. Bytes

B. Words

C. Fields

D. Programs

Q35 What name is given to the collection of facts, items of information or data which are related in some way?

A. Database

B. Directory information

C. Information tree

D. Information provider

Q36 A computer file can be best described as

A. a single data item

B. a general collection of data items

C. an orderly collection of data items

D. a random collection of data items

Q37 The highest level in the hierarchy of data organisation is called

A. data bank

B. database

C. data file

D. data record

Q38 Which of the following is a type of DBMS software?

A. database manipulation language

B. query language

C. utilities

D. all of the above

Q39 Data encryption techniques are particularly useful for

A. reducing storage space requirements

B. improving data integrity

C. protecting data in data communication systems

D. all of the above

Q40 The data-base administrator is, in effect, the coordinator between the ________ and the _______.

A. DBMS; data base

B. application program; data base

C. data base; users

D. application programs; users

Q41 Which of the following is true of a network structure?

A. It is a physical representation of the data

B. It allows a many-to-many relationship

C. It is conceptually simple

D. It will be the dominant data base of the future

Q42 Which of the following hardware components is the most important to the operation of a database management system?

A. high-resolution video display

B. printer

C. high speed, large-capacity disk

D. plotter

Q43 With respect to data input, the most accurate description of batch control is

A. dividing documents to be entered into batches

B. controlling the input of each input clerk

C. comparing to a precalculated figure the total of a data item summed across a batch records put into the system

D. none of the above

Q44 A record in third normal form is better than a record to first normal form from a relational mathematics viewpoint.

A. True

B. False

C. -------

D. --------

Q45 One data dictionary software packagae is called

A. DB/DC dictionary

B. TOTAL

C. ACCESS

D. any of the above

Q46 Batch processing is appropriate if

A. a large computer system is available

B. only a small computer system is available

C. only a few transactions are involved

D. none of the above

Q47 The relatinal model uses some unfamiliar terminolog. T tupelo is equvalent to a

A. record

B. field

C. file

D. data base

Q48 Data items grouped together for storage purpose are called a:

A. Record

B. title

C. list

D. string

Q49 The data base administration function includes

A. application programming

B. computer operations management

C. database access planning

D. all of the above

Q50 Which of the following fields in a student file can be used as a primary key?

A. class

B. social security number

C. GPA

D. Major

Q51 Which of the following is not true of the traditional approach to informationprocessing?

A. There is common sharing of data among the various applications

B. it is file-oriented

C. programs are dependent on othe file

D. it is inflexible

Q52 The relational data-base environemnt has all of othe followng components except

A. users

B. separate files

C. data base

D. Query language

Q53 The way a particular application views the data from the data base that the application uses is a

A. module

B. relational mode

C. schema

D. sunschema

Q54 Which of the following is not a logical data base structure?

A. Tree

B. relational

C. network

D. chain

Q55 The logical data structure with a one to many relationship is a

A. network

B. tree

C. chain

D. relational

Q56 The data base administrator is, in effect, the coordinatror between the ……and the…….

A. DBMS; data base

B. Application program, data base

C. Data base; users

D. Application programs; users

Q57 Which of the following is not an advantage of the data-base approach

A. elimination of the data redundancy

B. ability of associate related data

C. increased security

D. all of the above

Q58 Which of thefollowing hardware components is the most improtant to the operation of data base management system?

A. high-resolution video display

B. printer

C. high-speed, large-capacity disk

D. mouse

Q59 A data dictionary doesn't provide information about

A. where data is located

B. the size of the disk storage device

C. who won or is responsible for the data

D. how the data is used

Q60 Which of the follwing is true of the data manipulation language(DML)?

A. it refer todata using physical addresses

B. it cannot interface with high-level programming language

C. it is used to define the physicalcharacteristics of each record

D. none of the above

Q61 Data base management system are intended to

A. eliminate data redundancy

B. establish relationships among records in different files

C. manage file access

D. all of the above

Q62 Which of the following contains a complete record of all activity that affectted the contents of a data bae during a ceertain perido of time?

A. reprot writer

B. query language

C. data manipulation language

D. transaction log

Q63 Which two files are used during operation of the RDBMS?

A. query langauge and utilities

B. data manipulation language and query langauge

C. data dictionary and transaction log

D. data dictionary and query language

Q64 Generalized data base management systems do not retrieve data tomeet routine requests

A. True

B. False

C. -

D. -

Q65 One approach to standarizing storing of data?

A. MIS

B. structured programming

C. CODASYL specifications

D. none of the above

Q66 Which of the following is a data base administrator's function?

A. data base design

B. backing oup the database

C. performance monitoring

D. all of the above

Q67 Which of the following is a component of DBMS software

A. data base manipulation langauge

B. query language

C. utilities

D. all of of the above

Q68 Data item characteristics that are important in data management include

A. punctuation

B. language

C. spelling

D. width

Q69 Which of the following is not the responsibility of the utilities component of DBMS software?

A. creating the physical and logical designs

B. removing flagged records for deletion

C. Creating and maintaining the data dictionary

D. monitoring performance

Q70 Which of the following is not characteristic of a relational data bae model?

A. Tables

B. Treelike- structure

C. Complex logical relationships

D. records

Q71 Which of the following is a prblem of file management system?

A. difficult to update

B. lack of data independence

C. data redundancy

D. all of the above

MCQ Questions, ihkcl.in
MCQ Questions, ihkcl.in
MCQ Questions, ihkcl.in
MCQ Questions, ihkcl.in
MCQ Questions, ihkcl.in
MCQ Questions, ihkcl.in