Skip to main content

INF503 FINAL EXAM


FINAL EXAM



 1. Who is responsible for identifying data to be stored in the database and for choosing appropriate structures to represent and store

A. Data base designer




2. which of the following functions of database management system causes some data to be read and
       some data to be written into a database?

 A.Transaction



3. which of the following DBMS processes stores data on some storage medium that is controlled by the DBMS

A. Constructing 
4. which of the following applications analyzes large amount of data to search for the occurrences of specific patterns or relationships ?

A.Data mining

5. during which of the following stages for ereating a database are further specifications provided for storing accessing the database ?

A.Physical Design

6. which model is also known as the CODASYL DBTG model?

A.Network Model


7.which of the following schema levels describes the structure of the whole database for a community of users ?

A. Conceptual Schema


8. in most relational DBMSs there is no specific language that performs the role of

A.SDL


9. which of the following languages specifies the internal schema?

A.SDL
10. which of the following data models in meant for computer specialists, not for end users ?

A. Physical

11. Which constraint specifies whether the existence of an entity depends on it being related to another entity via the relationship type?

A.Participation
12. In UML terminology, relationship types are called as _______.

A.associations
13. What attribute can be divided into smaller subparts, which represent more basic attributes with independent meanings?

A.Composite
14. What is the last phase of the database design process?

A.Physical Design
15. which of the following notations indicates a specialisation generalization with the disjoint constraint.

A.Blank Triangle
16. Which of the following classes define attribute and operations but does not have object corresponding to those classes

A.Abstract
17. which is the process of classifying the class of objects into more specialised subclasses.

A.Specialization

 

18. Which of the following is an Abstraction concept for building composite objects from their component objects.

A.Aggregation
19. which of the following constraints is expressed directly in the schemas of data model.

A.Explict


20. which of the following constraint states that no primary key value can be null.

A.Entity integrity


21. which of the following constraints is violated by delete operation.

A.Referential integrity



22. which of the following clauses identify the condition for selecting the tuples from the relations.

A.WHERE
23. Which of the following commands specifies a new relation by giving it a name and specifying its attributes and initial constraints.

A.Create table
24. Which of the following clauses lists the attributes to be retrieved.

A.Select
25. Which of the following joins is the default type of join in a joined table tuple exists in the other relation?

A.Inner



26. which of the following functions returns the number of tuples or values as specified in a query.

A.Count
27. which of the following strategies updates a view when needed by a view query.

A.Lazy update 

28. which of the following symbols denotes the select operator.

A.Sigma

29. which of the following operations comblines the results of two or more SELECT statements without including duplicates.

A.Union 
30. which of the following operations combines thee result of two SEELECT statements and returns only those results which belong to the first of result ?

A.Set difference
31. which of the following approaches is most preferred as it reduces the number of tables.

A.Foreign key
32. which steps of the algorithm for er to relational mapping involves the following approaches.

A.Mapping of binary 1.1 relationship types 
 

33. First step of er to relational mapping.

A.Mapping of regular entity types


34. which of the following approaches does not suffer from the impedance same as the database data types ?

A.Database programming language 

35. which statements in the SQL standard can be used to invoke stored procedure cither from an interactive interface or from embedded SQL or SQLJ.

A.Call
36. which of the following Java Technologies for database web programming are java objects.

A.Java servlets
37. which pear db library module must be loaded to use the database functions in a php program.

A.DB.php


38. PHP variable starts with a ___ sing.

A.$

39. which aspect of object specifies whether an object is a persistent object or transient object.

A.Life time


40. Which type of literal corresponds to the values of basic data types and is predefined.

A.Atomic


41. Which type of constructor creates a collection of key-value pairs, where the value of a key can be used to retrieve the corresponding value?.

A.Dictionary
42. BCNF was proposed as a simpler form of.

A.3nf


43. which normal form is based on concepts of multivalued dependencies.

A.4nf


44. the following Normal forms is violated when a relation has undesirable multivalued dependencies and hence can be use to identify and decompose such relation?.

A.4nf


45. Which of the following buffer replacement strategies works best for certain type of database needed util all the remaining blocks in the relation are processed?

A.MRU



46. which raid level use a single parity disk relying on the disk controller to figure out which disk has failed?

A.3


47. which of the following files keeps the records ordered by the value of a particular field.

A.Sorted
48. which of the following allocation techniques allocates file blocks to consecutive disc locks.

A.Contiguous 

49. what occurs when the hash field value of Record that is being inserted has to an address that already contains a different record?.

A.Collision

50. each node in a tree expect for a special node called a has one parent node and zero or more child nodes.

A.Root

51. which type of ordered single level index is specified on non ordering fields as additional access structures to improve performance of queries and transactions ?.

A.Secondary

52. which type of index facilitates querying on multiple keys and used for relations that contain a large number of rows.

A.Bitmap

53. which of the following methods ends the iteration after all tuples that can be generated have been generated ?

A.Closed()


54. In which of the following joins does the search stop as soon as the first match is found and the tuple form outer relation in selected?.

A.Semi join

55. Which search applies to any file but all the methods depend on having appropriate access path selection condition.

A.Linear


56. what will a transaction be called If database operation a transaction not update the data with but only retrieve data.

A.Read only

57. in which of the following states does a transaction execute its read and write operations?.

A.Active


58. which two phase locking protocol is a deadlock free protocol.

A.Conservative
59. which phase of concurrency control checks whether any of the translation of dates valid serializability.

A.validation

60. which of the following clocks is too restrictive for database concurrency control purposes?

A.Binary

61. deferred update is also known as the____.

A.NO-UNDO/REDO algorithm


62. which of the following is a specific recovery scheme used in many of IBM’s relational database products ?.

A.ARIES algorithm 


63. for which of the following checkpoint actions the fuzzy checkpoint technique coming to use overcome into use to overcome from the action.

A.Suspend execution of transactions temporarily


64. what reduces the contention for CPU and IO services and simultaneously reduces access delays involved in area networks?.

A.Data localization


65. which of the following transparencies is also known as the distribution or network transparency?.

A.Data organizaton

66. which autonomy implies that component DBS has ability to decide whether and how much to share its functionality and resources with other component DBS?.

A.Association
67. when injection attack attempts to add additional SQL statements to the existing SQL statements by exploiting a computer bug which is caused by processing invalid data.

A.Code injection 

68.An Administrator who is allowed change student information can update student grades without the instructor s permission.

A.Privilege abuse

 69. What type of risk will occur when an attacker floods the server with requests?.

A.Denial of service

70. Loss of Availability occurs when.

A.a user of prgoram cannot acess data objects who has legitimate right to those objects


71. which of the following control measures is handled by creating user accounts and passwords to control the login process by the DBMS?.

A.Acess control

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh