More MCQs
601.

Html document must always be saved with:

A. .html
B. .htm
C. .doc
D. both .html & .htm
Answer» D. both .html & .htm
602.

How many levels of headings are in html:

A. 2
B. 7
C. 6
D. 4
Answer» C. 6
603.

The Java                      specification defines an application programming interface for communication between the Web server and the application program.

A. servlet
B. server
C. program
D. randomize
Answer» A. servlet
604.

How many JDBC driver types does Sun define?

A. one
B. two
C. three
D. four
Answer» D. four
605.

Which JDBC driver Type(s) can be used in either applet or servlet code?

A. both type 1 and type 2
B. both type 1 and type 3
C. both type 3 and type 4
D. type 4 only
Answer» C. both type 3 and type 4
606.

What MySQL property is used to create a surrogate key in MySQL?

A. unique
B. sequence
C. auto_increment
D. none of the mentioned
Answer» C. auto_increment
607.

A JSP is transformed into a(n):

A. java applet
B. java servlet
C. either 1 or 2 above
D. neither 1 nor 2 above
Answer» B. java servlet
608.

What is bytecode?

A. machine-specific code
B. java code
C. machine-independent code
D. none of the mentioned
Answer» C. machine-independent code
609.

Where is metadata stored in MySQL?

A. in the mysql database metadata
B. in the mysql database metasql
C. in the mysql database mysql
D. none of the mentioned
Answer» C. in the mysql database mysql
610.

Which of the following is true for Seeheim model?

A. presentation is abstracted from dialogue and application
B. presentation and dialogue is abstracted from application
C. presentation and application is abstracted from dialogue
D. none of the mentioned
Answer» A. presentation is abstracted from dialogue and application
611.

Which of the unit operation is used in Model view controller?

A. is a decomposition
B. part whole decomposition
C. all of the mentioned
D. none of the mentioned
Answer» B. part whole decomposition
612.

Memory address refers to the successive memory words and the machine is called as

A. word addressable
B. byte addressable
C. bit addressable
D. terra byte addressable
Answer» A. word addressable
613.

The                            layer, which provides a high-level view of data and actions on data.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» A. business logic
614.

The                              layer, which provides the interface between the business-logic layer and the underlying database.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» D. data access
615.

The                            system is widely used for mapping from Java objects to relations.

A. hibernate
B. object oriented
C. objective
D. none of the mentioned
Answer» A. hibernate
616.

Which among the following are the functions that any system with a user interface must provide?

A. presentation
B. dialogue
C. all of the mentioned
D. none of the mentioned
Answer» A. presentation
617.

Which of the following is the main task accomplished by the user?

A. compose a document
B. create a spread sheet
C. send mail
D. all of the mentioned
Answer» D. all of the mentioned
618.

What are the portability concerns founded in Seeheim model?

A. replacing the presentation toolkit
B. replacing the application toolkit
C. replacing the dialogue toolkit
D. replacing the presentation & application toolkit
Answer» D. replacing the presentation & application toolkit
619.

Which schema object instructs Oracle to connect to a remotely access an object of a database?

A. sequence
B. remote link
C. database link
D. data link
Answer» D. data link
620.

DML changes are

A. insert
B. update
C. create
D. both insert and update
Answer» D. both insert and update
621.

Which of the following object types below cannot be replicated?

A. data
B. trigger
C. view
D. sequence
Answer» D. sequence
622.

How to force a log switch?

A. by using alter system log
B. by using alter system switch logfile
C. by using alter system switch logs
D. by using alter sys logfiles
Answer» B. by using alter system switch logfile
623.

The ORDER BY clause can only be used in

A. select queries
B. insert queries
C. group by queries
D. having queries
Answer» A. select queries
624.

Which of the following rule below are categories of an index?

A. column and functional
B. multiple column and functional
C. column, multiple column and functional
D. none of the mentioned
Answer» A. column and functional
625.

Which of the following queries are legal?

A. select deptno, count(deptno) from emp group by ename;
B. select deptno, count(deptno), job from emp group by deptno;
C. select deptno, avg(sal) from emp;
D. select deptno, avg(sal) from emp group by deptno;
Answer» D. select deptno, avg(sal) from emp group by deptno;
626.

Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500?

A. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null;
B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;
C. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job;
D. select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null;
Answer» B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;
627.

Which of the following data structure is not linear data structure?

A. arrays
B. linked lists
C. arrays & linked lists
D. none of the mentioned
Answer» D. none of the mentioned
628.

Which of the following data structure is linear data structure?

A. trees
B. graphs
C. arrays
D. none of the mentioned
Answer» C. arrays
629.

The operation of processing each element in the list is known as

A. sorting
B. merging
C. inserting
D. traversal
Answer» D. traversal
630.

Finding the location of the element with a given value is:

A. traversal
B. search
C. sort
D. none of the mentioned
Answer» B. search
631.

Arrays are best data structures

A. for relatively permanent collections of data
B. for the size of the structure and the data in the structure are constantly changing
C. all of the mentioned
D. none of the mentioned
Answer» A. for relatively permanent collections of data
632.

Linked lists are best suited

A. for relatively permanent collections of data
B. for the size of the structure and the data in the structure are constantly changing
C. all of the mentioned
D. none of the mentioned
Answer» B. for the size of the structure and the data in the structure are constantly changing
633.

Each array declaration need not give, implicitly or explicitly, the information about

A. the name of array
B. the data type of array
C. the first data from the set to be stored
D. the index set of the array
Answer» C. the first data from the set to be stored
634.

In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. sql injection
B. sql
C. direct
D. application
Answer» A. sql injection
635.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» C. cross-site scripting
636.

                   is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» B. cross-site request forgery
637.

A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» B. sign-on system
638.

The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» C. security assertion markup language (saml)
639.

                               allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

A. openid
B. single-site system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» D. virtual private database (vpd)
640.

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.

A. row-level authorization
B. column-level authentication
C. row-type authentication
D. authorization security
Answer» A. row-level authorization
641.

                       is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

A. encryption
B. data mining
C. internet security
D. architectural security
Answer» A. encryption
642.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

A. encryption key
B. decryption key
C. primary key
D. authorised key
Answer» B. decryption key
643.

Which of the following is not a property of good encryption technique?

A. relatively simple for authorized users to encrypt and decrypt data
B. decryption key is extremely difficult for an intruder to determine
C. encryption depends on a parameter of the algorithm called the encryption key
D. none of the mentioned
Answer» D. none of the mentioned
644.

In which of the following encryption key is used to encrypt and decrypt the data?

A. public key
B. private key
C. symmetric key
D. asymmetric key
Answer» C. symmetric key
645.

Encryption of small values, such as identifiers or names, is made complicated by the possibility of                      

A. dictionary attacks
B. database attacks
C. minor attacks
D. random attacks
Answer» A. dictionary attacks
646.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?

A. round key algorithm
B. public key algorithm
C. advanced encryption standard
D. asymmetric key algorithm
Answer» C. advanced encryption standard
647.

Which of the following requires no password travel across the internet?

A. readable system
B. manipulation system
C. challenge–response system
D. response system
Answer» C. challenge–response system
648.

The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.

A. cache
B. disk
C. main memory
D. flash memory
Answer» A. cache
649.

Which of the following stores several gigabytes of data but usually lost when power failure?

A. flash memory
B. disk
C. main memory
D. secondary memory
Answer» C. main memory
650.

The flash memory storage used are

A. nor flash
B. or flash
C. and flash
D. all of the mentioned
Answer» A. nor flash
651.

                     is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.

A. flash memory
B. disk
C. main memory
D. secondary memory
Answer» A. flash memory
652.

The primary medium for the long-term online storage of data is the                       where the entire database is stored on magnetic disk.

A. semiconductor memory
B. magnetic disks
C. compact disks
D. magnetic tapes
Answer» B. magnetic disks
653.

Optical disk                systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.

A. tape storage
B. jukebox
C. flash memory
D. all of the mentioned
Answer» B. jukebox
654.

There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called                      disks.

A. write-once, read-many (worm)
B. cd-r
C. dvd-w
D. cd-rom
Answer» A. write-once, read-many (worm)
655.

In magnetic disk                  stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.

A. read–write head
B. read-assemble head
C. head–disk assemblies
D. disk arm
Answer» D. disk arm
656.

A                      is the smallest unit of information that can be read from or written to the disk.

A. track
B. spindle
C. sector
D. platter
Answer» C. sector
657.

The disk controller uses                  at each sector to ensure that the data is not corrupted on data retrieval.

A. checksum
B. unit drive
C. read disk
D. readsum
Answer» A. checksum
658.

                   is the time from when a read or write request is issued to when data transfer begins.

A. access time
B. average seek time
C. seek time
D. rotational latency time
Answer» A. access time
659.

The time for repositioning the arm is called the                  and it increases with the distance that the arm must move.

A. access time
B. average seek time
C. seek time
D. rotational latency time
Answer» C. seek time
660.

                   is around one-half of the maximum seek time.

A. access time
B. average seek time
C. seek time
D. rotational latency time
Answer» B. average seek time
661.

Hybrid disk drives are hard-disk systems that combine magnetic storage with a smaller amount of flash memory, which is used as a cache for frequently accessed data.

A. hybrid drivers
B. disk drivers
C. hybrid disk drivers
D. all of the mentioned
Answer» B. disk drivers
662.

Optical disk technology uses

A. helical scanning
B. dat
C. a laser beam
D. raid
Answer» D. raid
663.

With multiple disks, we can improve the transfer rate as well by                        data across multiple disks.

A. striping
B. dividing
C. mirroring
D. dividing
Answer» A. striping
664.

                             partitions data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk.

A. block interleaved parity
B. block interleaved distributed parity
C. bit parity
D. bit interleaved parity
Answer» B. block interleaved distributed parity
665.

The RAID level which mirroring is done along with stripping is

A. raid 1+0
B. raid 0
C. raid 2
D. both raid 1+0 and raid 0
Answer» D. both raid 1+0 and raid 0
666.

Where performance and reliability are both important, RAID level          is used.

A. 0
B. 1
C. 2
D. 0+1
Answer» D. 0+1
667.

                       is popular for applications such as storage of log files in a database system since it offers the best write performance.

A. raid level 1
B. raid level 2
C. raid level 0
D. raid level 3
Answer» A. raid level 1
668.

                             which increases the number of I/O operations needed to write a single logical block, pays a significant time penalty in terms of write performance.

A. raid level 1
B. raid level 2
C. raid level 5
D. raid level 3
Answer» A. raid level 1
669.

Tertiary storage is built with :

A. a lot of money
B. unremovable media
C. removable media
D. secondary storage
Answer» C. removable media
670.

Operating system is responsible for

A. disk initialization
B. booting from disk
C. bad-bock recovery
D. all of the mentioned
Answer» D. all of the mentioned
671.

A typical tape drive is                  a typical disk drive.

A. more expensive than
B. cheaper than
C. of the same cost as
D. none of the mentioned
Answer» A. more expensive than
672.

During recovery from a failure

A. each pair of physical block is examined
B. specified pair of physical block is examined
C. first pair of physical block is examined
D. none of the mentioned
Answer» A. each pair of physical block is examined
673.

A magneto-optic disk is :

A. primary storage
B. secondary storage
C. tertiary storage
D. none of the mentioned
Answer» C. tertiary storage
674.

Which of the following are the process of selecting the data storage and data access characteristics of the database?

A. logical database design
B. physical database design
C. testing and performance tuning
D. evaluation and selecting
Answer» B. physical database design
675.

The replacement of a bad block generally is not totally automatic because

A. data in bad block cannot be replaced
B. data in bad block is usually lost
C. bad block does not contain any data
D. none of the mentioned
Answer» B. data in bad block is usually lost
676.

Which of the following is the oldest database model?

A. relational
B. hierarchical
C. physical
D. network
Answer» D. network
677.

The surface area of a tape is                  the surface area of a disk.

A. much lesser than
B. much larger than
C. equal to
D. none of the mentioned
Answer» B. much larger than
678.

Which one of the following is not a secondary storage?

A. magnetic disks
B. magnetic tapes
C. ram
D. none of the mentioned
Answer» C. ram
679.

Which level of RAID refers to disk mirroring with block striping?

A. raid level 1
B. raid level 2
C. raid level 0
D. raid level 3
Answer» A. raid level 1
680.

A unit of storage that can store one or more records in a hash file organization is denoted as

A. buckets
B. disk pages
C. blocks
D. nodes
Answer» A. buckets
681.

The file organization which allows us to read records that would satisfy the join condition by using one block read is

A. heap file organization
B. sequential file organization
C. clustering file organization
D. hash file organization
Answer» C. clustering file organization
682.

What are the correct features of a distributed database?

A. is always connected to the internet
B. always requires more than three machines
C. users see the data in one global schema.
D. have to specify the physical location of the data when an update is done
Answer» C. users see the data in one global schema.
683.

Each tablespace in an Oracle database consists of one or more files called

A. files
B. name space
C. datafiles
D. pfile
Answer» C. datafiles
684.

The management information system (MIS) structure with one main computer system is called a

A. hierarchical mis structure
B. distributed mis structure
C. centralized mis structure
D. decentralized mis structure
Answer» C. centralized mis structure
685.

Choose the RDBMS which supports full fledged client server application development

A. dbase v
B. oracle 7.1
C. foxpro 2.1
D. ingress
Answer» B. oracle 7.1
686.

One approach to standardization storing of data?

A. mis
B. structured programming
C. codasyl specification
D. none of the mentioned
Answer» C. codasyl specification
687.

The highest level in the hierarchy of data organization is called

A. data bank
B. data base
C. data file
D. data record
Answer» B. data base
688.

An audit trail                        

A. is used to make backup copies
B. is the recorded history of operations performed on a file
C. can be used to restore lost information
D. none of the mentioned
Answer» B. is the recorded history of operations performed on a file
689.

Large collection of files are called

A. fields
B. records
C. database
D. sectors
Answer» C. database
690.

Which of the following is not true of the traditional approach to information processing

A. there is common sharing of data among the various applications
B. it is file oriented
C. programs are dependent on the file
D. it is inflexible
Answer» A. there is common sharing of data among the various applications
691.

Which of these is not a feature of Hierarchical model?

A. organizes the data in tree-like structure
B. parent node can have any number of child nodes
C. root node does not have any parent
D. child node can have any number of parent nodes
Answer» D. child node can have any number of parent nodes
692.

Which of these data models is an extension of the relational data model?

A. object-oriented data model
B. object-relational data model
C. semi structured data model
D. none of the mentioned
Answer» B. object-relational data model
693.

The information about data in a database is called                

A. metadata
B. hyper data
C. tera data
D. none of the mentioned
Answer» A. metadata
694.

A data dictionary is a special file that contains?

A. the names of all fields in all files
B. the data types of all fields in all files
C. the widths of all fields in all files
D. all of the mentioned
Answer» D. all of the mentioned
695.

The DBMS acts as an interface between what two components of an enterprise-class database system?

A. database application and the database
B. data and the database
C. the user and the database application
D. database application and sql
Answer» A. database application and the database
696.

A relational database system needs to maintain data about the relations, such as the schema of the relations. This is called

A. metadata
B. catalog
C. log
D. dictionary
Answer» A. metadata
697.

Relational schemas and other metadata about relations are stored in a structure called the                          

A. metadata
B. catalog
C. log
D. data dictionary
Answer» D. data dictionary
698.

                       is the collection of memory structures and Oracle background processes that operates against an Oracle database.

A. database
B. instance
C. tablespace
D. segment
Answer» B. instance
699.

A                  is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.

A. tablespace
B. segments
C. extents
D. blocks
Answer» A. tablespace
700.

A tablespace is further broken down into

A. tablespace
B. segments
C. extents
D. blocks
Answer» B. segments
Tags
Question and answers in DataBase Management System (DBMS), DataBase Management System (DBMS) multiple choice questions and answers, DataBase Management System (DBMS) Important MCQs, Solved MCQs for DataBase Management System (DBMS), DataBase Management System (DBMS) MCQs with answers PDF download