Data Manager
Data Manager
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
2. What is a database?
a) Organized collection of information that cannot be accessed, updated, and managed
b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and
managed
d) Organized collection of data that cannot be updated
View Answer
Answer: c
Explanation: It is defined as an organized collection of data or information for easy
access, updating, and management in a computer.
3. What is DBMS?
a) DBMS is a collection of queries
b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
View Answer
Answer: d
Explanation: DBMS is nothing but a storehouse wherein the authorized user can
create a database to store, modify or retrieve the organized data in the table. It can
be modified or retrieved by users who have access to DBMS only.
advertisement
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
14. Which of the following is known as a set of entities of the same type that share
same properties, or attributes?
a) Relation set
b) Tuples
c) Entity set
d) Entity Relation model
View Answer
Answer: c
Explanation: In the actual world, an entity is a distinct “thing” or “object” from all
other objects. For example: Each employee of an organization is an entity.
advertisement
17. The values appearing in given attributes of any tuple in the referencing relation
must likewise occur in specified attributes of at least one tuple in the referenced
relation, according to _____________________ integrity constraint.
a) Referential
b) Primary
c) Referencing
d) Specific
View Answer
Answer: a
Explanation: Consider 2 relations r1 and r2. r1 may include among its attributes the
primary key of relation r2. This attribute is called a foreign key from r1, referencing
r2. The relation r1 is also called the referencing relation of the foreign key
dependency, and r2 is called the referenced relation of the foreign key.
18. _____________ is a hardware component that is most important for the operation of a
database management system.
a) Microphone
b) High speed, large capacity disk to store data
c) High-resolution video display
d) Printer
View Answer
Answer: b
Explanation: Since all the data are stored in form of memory in the disk, a high
speed, and large-capacity disk is required for the operation of the database
management system.
advertisement
20. The ability to query data, as well as insert, delete, and alter tuples, is offered by
____________
a) TCL (Transaction Control Language)
b) DCL (Data Control Language)
c) DDL (Data Definition Langauge)
d) DML (Data Manipulation Langauge)
View Answer
Answer: d
Explanation: A query is a request for data or information. Relational Schema is the
design and structure of the relation. DDL consists of commands that help in
modifying. DML performs the change in the values of the relation.
23. Which of the following set should be associated with weak entity set for weak entity
to be meaningful?
a) Neighbour set
b) Strong entity set
c) Owner set
d) Identifying set
View Answer
Answer: d
Explanation: Every weak entity must be linked to an identifying entity; in other words,
the existence of the weak entity set is contingent on the presence of the identifying
entity set. The weak entity set that the identifying entity set identifies is said to be
owned by the identifying entity set. Owner entity set is another name for it.
24. Which of the following command is correct to delete the values in the relation
teaches?
a) Delete from teaches;
b) Delete from teaches where Id =’Null’;
c) Remove table teaches;
d) Drop table teaches;
View Answer
Answer: a
Explanation: To delete the entries from the table Delete from table command should
be used.
27. Which forms have a relation that contains information about a single entity?
a) 4NF
b) 2NF
c) 5NF
d) 3NF
View Answer
Answer: a
Explanation: If and only if, for each of its non-trivial multivalued dependencies X
\twoheadrightarrow Y, a table is in 4NF. X is a superkey—that is, X is either a
candidate key or a superset thereof.
28. The top level of the hierarchy consists of ______ each of which can contain _____.
a) Schemas, Catalogs
b) Schemas, Environment
c) Environment, Schemas
d) Catalogs, Schemas
View Answer
Answer: d
Explanation: Schemas represent the logical configuration of the DBMS. Catalogs
consist of metadata of the objects and system settings used.
29. _______ indicates the maximum number of entities that can be involved in a
relationship.
a) Greater Entity Count
b) Minimum cardinality
c) Maximum cardinality
d) ERD
View Answer
Answer: c
Explanation: The term cardinality refers to the uniqueness of data values included in
a single column (attribute) of a table in SQL (Structured Query Language).
30. The user IDs can be added or removed using which of the following fixed roles?
a) db_sysadmin
b) db_accessadmin
c) db_securityadmin
d) db_setupadmin
View Answer
Answer: b
Explanation: Along with security, as the name suggests the db_accessadmin role also
handles access. db_sysadmin refers to the system administrator. db_securityadmin
as the name suggests it involves granting or declining permission to access the data
ensuring security.
33. After groups have been established, SQL applies predicates in the ___________
clause, allowing aggregate functions to be used.
a) Where
b) Having
c) Group by
d) With
View Answer
Answer: d
Explanation: The “with” clause was introduced to reduce the complexity of the
queries which are lengthy. The “with” clause allows you to define a temporary
relation whose definition is only visible to the query in which it appears.
36. Which of the following is correct according to the technology deployed by DBMS?
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency
View Answer
Answer: c
Explanation: Pointers are used to access data with great speed and accuracy.
Consistency is maintained using locks.
37. Which of the following is correct regarding the file produced by a spreadsheet?
a) can be used as it is by the DBMS
b) stored on disk in an ASCII text format
c) all of the mentioned
d) none of the mentioned
View Answer
Answer: a
Explanation: For updating the value in ASCII text format, a regular text file is used.
40. The query specifying the SQL view is said to be updatable if it meets which of the
following conditions?
a) select clause contains relation attribute names but not have expressions, aggregates,
or distinct specification
b) from clause has 1 relation
c) query does not have group by or having clause
d) All of the mentioned
View Answer
Answer: d
Explanation: To update the view in sql all the conditions must be satisfied.
41. When the “ROLLUP” operator for expression or columns within a “GROUP BY”
clause is used?
a) Find the groups that make up the subtotal in a row
b) Create group-wise grand totals for the groups indicated in a GROUP BY clause
c) Group expressions or columns specified in a GROUP BY clause in one direction, from
right to left, for computing the subtotals
d) To produce a cross-tabular report for computing subtotals by grouping phrases or
columns given within a GROUP BY clause in all available directions
View Answer
Answer: c
Explanation: A view can be thought of as a virtual table that gets its data from one or
more table columns.
42. Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
b) Concatenation
c) Relational-and
d) All of the mentioned
View Answer
Answer: b
Explanation: Concatenation in DBMS is used to join two or more table fields of the
same table or different tables. Example inst sec and student sec.
43. Which of the following is the subset of SQL commands used to manipulate Oracle
Structures, including tables?
a) Data Described Language
b) Data Retrieval Language
c) Data Manipulation Language
d) Data Definition Language
View Answer
Answer: d
Explanation: DDLs are used to define schema and table characters and consist of
commands that help in modifying. DML performs the change in the values of the
relation.
44. Which of the following functions construct histograms and use buckets for ranking?
a) Ntil()
b) Newtil()
c) Rank()
d) All of the mentioned
View Answer
Answer: a
Explanation: ntile(n) returns the number of the bucket in which each tuple is stored,
with bucket numbers beginning with 1.
45. __________ command is used in SQL to issue multiple CREATE TABLE, CREATE VIEW
and GRANT statements in a single transaction.
a) CREATE CLUSTER
b) CREATE PACKAGE
c) CREATE SCHEMA
d) All of the mentioned
View Answer
Answer: c
Explanation: A schema is a description of a system’s structure in a formal language
supported by the database management system, and it refers to data organization
as a blueprint for how a db is built.
46. Which of the following key is required in to handle the data when the encryption is
applied to the data so that the unauthorised user cannot access the data?
a) Primary key
b) Authorised key
c) Encryption key
d) Decryption key
View Answer
Answer: d
Explanation: The encryption key is used to encrypt the message. Even if the message
is intercepted by an enemy, the enemy will be unable to decrypt and interpret the
message because he lacks the key.
47. Which of the following is known as the process of viewing cross-tab with a fixed
value of one attribute?
a) Dicing
b) Pivoting
c) Slicing
d) Both Pivoting and Dicing
View Answer
Answer: c
Explanation: Slice procedure takes one dimension from a cube and turns it into a
new sub-cube. Dice takes two or more dimensions from a cube and creates a new
sub-cube from them.
48. For designing a normal RDBMS which of the following normal form is considered
adequate?
a) 4NF
b) 3NF
c) 2NF
d) 5NF
View Answer
Answer: b
Explanation: Because most 3NF tables are free of insertion, update, and deletion
anomalies, an RDBMS table is sometimes regarded as “normalized” if it is in the Third
Normal Form.
49. Which of the following is popular for applications such as storage of log files in a
database management system since it offers the best write performance?
a) RAID level 0
b) RAID level 1
c) RAID level 2
d) RAID level 3
View Answer
Answer: b
Explanation: RAID level 0 refers to data stripping. RAID level 1 refers to disk mirroring
with block striping. RAID level 2 refers to bit-level stripping and RAID level 3 refers to
byte-level striping with dedicated parity.
50. Which of the following represents a query in the tuple relational calculus?
a) { }{P(t) | t }
b) {t | P(t)}
c) t | P() | t
d) All of the mentioned
View Answer
Answer: b
Explanation: A nonprocedural query language is the tuple relational calculus. It
specifies the needed information but does not provide a detailed strategy for
obtaining it.
52. Evaluate the statements issued by the DBA in the given sequence if OE and SCOTT
are the users and the ORDERS table is owned by OE.
53. Which of the following establishes a top-to-bottom relationship among the items?
a) Relational schema
b) Network schema
c) Hierarchical schema
d) All of the mentioned
View Answer
Answer: c
Explanation: A data model in which the data is structured into a tree-like structure is
known as a hierarchical model. The structure allows information to be represented
using parent-child relationships.
54. A major goal of the db system is to minimize the number of block transfers
between the disk and memory. Which of the following helps in achieving this goal?
a) Secondary storage
b) Storage
c) Catalog
d) Buffer
View Answer
Answer: d
Explanation: Every block has a copy on disc, however, the copy on the disc may be an
earlier version of the block than the version in the buffer.
55. What happens if a piece of data is stored in two places in the db?
a) Storage space is wasted & Changing the data in one spot will cause data
inconsistency
b) In can be more easily accessed
c) Changing the data in one spot will cause data inconsistency
d) Storage space is wasted
View Answer
Answer: a
Explanation: One of the main features of a database management system is
minimum data duplication and redundancy. Hence, is always consistent and so there
is no duplication.
56. The logical design, and the snapshot of the data at a given instant in time is known
as?
a) Instance & Relation
b) Relation & Schema
c) Domain & Schema
d) Schema & Instance
View Answer
Answer: d
Explanation: Instance is an instance of time, the relation is also known as table
consists of data with similar characteristics, Domain is the collection of values that an
attribute can contain and schema is a representation
(2) Project managers have to assess the risks that may affect a project.
[A] True
[B] False
Answer: False
(6) Which of the following is/are main parameters that you should use when computing the costs of
a software development project?
[A] travel and training costs
[B] hardware and software costs
[C] effort costs (the costs of paying software engineers and managers)
[D] all of the mentioned
Answer: all of the mentioned
[A] team
[B] project
[C] customers
[D] project manager
Answer: project
(8) Which of the following is incorrect activity for the configuration management of a software
system?
[A] True
[B] False
Answer: False
[A] permanent
[B] temporary
[C] (A) or (B)
[D] Both (A) and (B)
Answer: temporary
(2) A process that involves continuously improving and detailing a plan as more detail become
available is termed as
kseries D o w n l o a d A p p
1. Home/
2. General Knowledge/
3. multiple-choice-questions-and-answers-on-project-management
Go To Download Page
[A] permanent
[B] temporary
[C] (A) or (B)
[D] Both (A) and (B)
Answer: temporary
(2) A process that involves continuously improving and detailing a plan as more detail become available
is termed as
[A] plans
[B] people and work
[C] related projects
[D] unrelated projects
Answer: related projects
[A] 5
[B] 7
[C] 9
[D] 11
Answer: 5
(6) If any one factor of a project changes, _____ other factor(s) is/are likely to be affected.
[A] all
[B] one
[C] at least one
[D] at most one
Answer: at least one
[A] Fixtures
[B] Trademarks
[C] Monetary assets
[D] Stockholder equity
Answer: Trademarks
[A] Utility
[B] Public benefit
[C] Brand recognition
[D] Good will
Answer: Utility
(10) Which from the following represents the correct project cycle?
[A] Planning→Initiating→Executing→Closing
[B] Planning→Executing→Initiating→Closing
[C] Initiating→Planning→Executing→Closing
[D] Initiating→Executing→Planning→Closing
Answer: Initiating→Planning→Executing→Closing
(1) The strategy used to correct resource over-allocations by balancing demand for resources and
the available supply is known as
[A] resource assignment
[B] resource leveling
[C] resource splitting
[D] resource scheduling
Answer: resource leveling
(2) A horizontal bar chart that shows project tasks against a calendar is called
[A] milestone
[B] goal
[C] Gantt chart
[D] PERT chart
Answer: Gantt chart
(3) The statistical tool that depicts a project’s tasks and the relationships between those tasks is
known as
[A] milestone
[B] goal
[C] Gantt chart
[D] PERT chart
Answer: PERT chart
I. It brings change
II. It has risk
III. The outcome is certain
Which of the following statement(s) is/are true about a Project? I. It brings change II. It has risk III.
The outcome is certain
[A] I only
[B] II only
[C] I and II only
[D] II and III only
Answer: I and II only
[A] initiating
[B] monitoring
[C] closing
[D] All above are parts
Answer: All above are parts
(6) The scope of the work is defined in which phase of the project management?
[A] Initiating
[B] Planning
[C] Executing
[D] Closing
Answer: Initiating
(7) How the project work will be carried out, monitored, and controlled? These questions are
answered in which phase of the project management?
[A] Initiating
[B] Planning
[C] Executing
[D] Closing
Answer: Planning
(8) The review of the successes and the mistakes is normally held during _____ phase.
[A] initiation
[B] planning
[C] execution
[D] closure
Answer: closure
(9) The business case and the justification for the project is determined during the _____ phase.
[A] initiation
[B] planning
[C] execution
[D] closure
Answer: initiation
(10) According to Olivier Mesly, the 4 P’s critical for the success of a project are:
Explanation:
The five basic parameters of software economics are: Size, process, personnel,
environment, and required quality.
2. Choose the correct option which depicts the relationships between the five
parameters of software economics?
A. Project=(effort)(environment)(quality)(size)process
B. effort=(personnel)(environment)(quality)(size)process
C. effort=(Process)(environment)(quality)(size)personnel
D. quality=(Process)(environment)(process)(size)personnel
Explanation:
A. The diseconomy of the scale of software development is a result of the process exponent
being greater than 1
B. The diseconomy of the scale of software development is a result of the process exponent
being greater than 0
C. The diseconomy of the scale of software development is a result of the process exponent
being greater than 1.0
D. The diseconomy of the scale of software development is a result of the process exponent
being less than 1
Explanation:
A. Producing a product that achieves the design goals with a minimum amount of human-
generated source materials
B. Producing a product that achieves the design goals
C. Producing a product that achieves the design goals that satisfy the customer
D. All of the above
Answer: A) Producing a product that achieves the design goals with a minimum amount
of human-generated source materials
Explanation:
Producing a product that achieves the design goals with a minimum amount of human-
generated source materials is the most significant way to improve affordability and
return on investment.
Explanation:
Universal functions points (UFP) are useful estimators for language-independent, early
life cycle estimates.
Question: 1
(B) Spreadsheet
View Answer
Ans: A
Database
Question: 2
View Answer
Ans: A
Question: 3
(B) Filters
(C) Objects
View Answer
Ans: C
2. Computer-Quiz
3. Dbms-Mcq6
Question: 1
(B) Spreadsheet
View Answer
Ans: A
Database
Question: 2
View Answer
Ans: A
Question: 3
Unlike filters queries can be saved as in a database.
(A) Database
(B) Filters
(C) Objects
View Answer
Ans: C
Objects
Question: 4
External database is
(A) Database created using DBMS package
View Answer
Ans: A
Question: 5
(B) DML
(C) DCL
(D) TCL
View Answer
Ans: D
TCL
Question: 6
View Answer
Ans: D
Question: 7
(B) Chain
(C) Network
View Answer
Ans: A
Tree
Question: 8
(B) Bank
(C) Menu
View Answer
Ans: D
Data record
Question: 9
(B) Database
(C) Users
View Answer
Ans: D
Separate files
Which database handles full text data, image, audio and video?
(A) Multimedia database
View Answer
Ans: A
Data manager preparation exam .
Multimedia database