Subscribe to Get Free SMS alert for SCDL Assignments

SCDL Assignments Share & Earn Program.

Hello everyone !!.

So hows life going with SCDL ?. Do you think you are getting bored with SCDL Study and SCDL Assignments ?. So want some fun & funds as well ?

Click below to earn money by sharing your SCDL Assignments:-

SCDL Assignments Share & Earn Program.

Tuesday, April 7, 2009

SCDL Assignments on DBMS (Database Management System) - 6

Bookmark and Share

SCDL Solved Assignements on DBMS - 6

DBMS Question papers for SCDL:

Multiple Choice Multiple Answer
Question In a two tier architecture, the software components are distributed over which two systems
Correct Answer Client , Server 
Your Answer Client , Server 

True/False
Question Temporal constraints can be used to limit the value of a particular attribute to be in a range
Correct Answer False
Your Answer True

Multiple Choice Multiple Answer
Question Write the attributes of entity "book"
Correct Answer book_no , Book_name , Price 
Your Answer book_no , Book_name , Price 

Multiple Choice Multiple Answer
Question Set operators are as follows
Correct Answer MINUS , UNION , INTERSECT 
Your Answer UNION , INTERSECT , MINUS 

Multiple Choice Multiple Answer
Question Three levels of database service
Correct Answer External level , Conceptual level , Physical level 
Your Answer External level , Conceptual level , Internal level 

Match The Following
Question Correct Answer Your Answer

Data model must know entities,relation,attributes database characteristics

shareability optimal data model's characteristics used in physical modeling

E-R model widely used conceptual model widely used conceptual model

Database design conversion into computer usable form must know entities,relation,attributes

True/False
Question Codd developed E-R model
Correct Answer False
Your Answer False

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Multiple Choice Multiple Answer
Question The levels of abstraction of data are
Correct Answer Physical level , Logical level , View level 
Your Answer Physical level , Logical level 

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question An example of non-volatile storage is :
Correct Answer Magnetic Tapes
Your Answer Magnetic Tapes

Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network

Multiple Choice Multiple Answer
Question Functions at the server end are
Correct Answer Query , Transaction 
Your Answer Query , Transaction , Application Program 

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued 
Your Answer Simple , Composite , Multivalued 

Multiple Choice Single Answer
Question What is UML models(E-R models entities)
Correct Answer Objects
Your Answer Objects

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question The functions of Database adminstrator are
Correct Answer Authorization for data access , Schema definition , Maintenance of Database 
Your Answer Authorization for data access , Maintenance of Database 

Multiple Choice Single Answer
Question What expresses the specific number of entity occurances associated with one occurance of related entity?
Correct Answer Cardinality
Your Answer Cardinality

Multiple Choice Multiple Answer
Question Write examples of dbms
Correct Answer Foxbase , foxpro 
Your Answer Foxbase , foxpro 

Select The Blank
Question ________is a process by which the user's privileges are ascertained
Correct Answer Authorisation
Your Answer Authorisation

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers 
Your Answer Integrity constraints , Database triggers 

Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer entity set

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Select The Blank
Question The first commercial RDBMS was ________from Relational Software Inc.
Correct Answer ORACLE
Your Answer ORACLE

Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions

True/False
Question You cannot grant or revoke system privileges to users and roles.
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm'
Correct Answer select * from book where bookname like '_m%'
Your Answer select * from book where bookname like '_m%'

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DBMS

Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records

Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer Relationship set

Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program

Multiple Choice Multiple Answer
Question Which of the following are valid SQL commands.
Correct Answer ALTER , UPDATE 
Your Answer ALTER , UPDATE 

Multiple Choice Single Answer
Question DDL stands for
Correct Answer Data definition language
Your Answer Data definition language

Multiple Choice Single Answer
Question A person who has control over system is called as
Correct Answer Database administrator
Your Answer Database administrator

Multiple Choice Multiple Answer
Question What are secured using authorisation and access control.
Correct Answer The intranet , local clients , opearators 
Your Answer The intranet , local clients , opearators 

Multiple Choice Single Answer
Question What is nothing but refined data
Correct Answer Information
Your Answer Information

True/False
Question A database may include varieties of data that are interrelated in many ways.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support 
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support 

Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer independent

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued 
Your Answer Simple , Composite , Multivalued 

Match The Following
Question Correct Answer Your Answer

select * from 
order by 
Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name

Select * from View all data from table. View all data from table.

select , from 

Views 2 specified column from table Views 2 specified column from table

select * from where Views all column satisfying condition in where clause Views all column satisfying condition in where clause

Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char) 
Your Answer lower(char) , initcap(char) , upper(char) 

Multiple Choice Single Answer
Question To enter new field city in the table 'branch_master' following command is used
Correct Answer alter table branch_master add(city varchar2(25))
Your Answer alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer
Question Malfunctioning of the hardware, or bug in the database software or operating system is called as
Correct Answer System Crash
Your Answer System Crash

Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data

Multiple Choice Multiple Answer
Question Advantages of Database Management System
Correct Answer Reduced redundancy , Sharing of data , Security 
Your Answer Reduced redundancy , Sharing of data , Work Space required for execution and storage is less 

Multiple Choice Single Answer
Question When two entities are associated then the relationship exists is called :
Correct Answer binary relationship
Your Answer binary relationship

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION

Select The Blank
Question ________published the paper "Relational Model of Data for Large Shared Data Banks "
Correct Answer F.Codd
Your Answer F.Codd

Source: scdlpapers.blogspot.com

Bookmark and Share

2 comments:

  1. NeedPGDRM Retail management assignmentpaperSales management 1st semestere-mail id amit.mhj@gmail.com

    ReplyDelete
  2. I've need C structure and computer fundamental paper of 1st semester MBA exams
    mailid : praveen.giner@gmail.com

    ReplyDelete