Skip to main content

INF503 WEEK-1 PRE-COURSE ASST


Q1) Which of the following java technologies exists on the web server on the web server machine interactions with the client?

A) Java Servlet



Q2) Which of the following constraints can be directly expressed in the schemas of the data model?
         Each correct answer represents a complete solution. Choose all the apply.

A)  1. Entity integrity
      2. Key
      3. Domain

Q3) Considering the following Customers table :

A) SELECT*FROM Customer WHERE Satisfaction_Rate >=92;



Q4) Which of the following associations is represented as a line connecting the participating classes, and may optionally have a name?

 A) Binary



Q5)  Which of the following comparison operators does SQL use to compare an attribute value to NULL?

A) 1.IS NOT

     2. IS


Q6) Which of the following updates recomputes a view only upon demand?

A) Lazy 


Q7) Due to which of the following action does a checkpoint record in log also include additional information, and this can facilitate undoing transaction operations in the event that a transaction must be rolled back?

A) Force-write all main memory buffers that have been modified to disk



Q8) Consider the following statement;

"if the validation phase is successful, the transaction updates are applied to the database; otherwise the update are discard and transaction is restarted."

In which of the following phases of concurrence control protocol does this happen?

A) Write


Q9) Which of the following interpretations are true of NULLs?

Each correct answers represent a complete solutions. Choose all that apply.

A) 

1. The attribute value for the tuple is unknow.

2. The attribute does not apply to the tuple.

3. The value is know but absent; that is, it has not been recorded yet.


Q10) Which of the following entries is the web site name (URL) of the client user computer?


A) $_SERVER['REMOTE_HOST']


Q11) What challenges are faced by big data technologies when they are used for analytics applications?

A) 
1. Inconsistent and incomplete information.
2. Privacy and confidentially.
3. Heterogeneity of information.



Q12) Which of the following steps of ER-to-relational mapping algorithm?

A) 

1. Mapping of N-ary relationship types.

2. Mapping of binary 1:1 relationship types.

3. Mapping of week entity types.

4. Mapping of regular entity types.


Q13) Which operation is used for inserting new data or new versions of existing data items?

A) Put


Q14) What are the NOSQL Characteristics related to distributed database and distributed systems?

A)

1. High-performance data access

2. Scalability.

3. Replication models.

4. Sharding of files


Q15) Consider the following statement:

"If the validation phase is successful, the transaction updates are applied to the database; otherwise, the updates are discarded and the transaction is restarted,"

A) Write



Q16) Which of following java technologies exists on the web serve machine and manager interactions with the client?

A) Java Servlet


Q17) Which of the following methods are used for collision resolution?

A) 

1. Multiple hashing

2. Chaining 

3. Open addressing


Q18) Due to which of the following actions does a checkpoint record in the log also include additional information, and this can facilitate undoing transaction operations in the event that a transaction must be rolled back?

A) Force-write all main memory buffers that have been modified to dosk.



Q19) Which statistical model provides a framework in which term weighting, ranking of retrieved document, and determining the relevance of feedback are possible?

A) Vector space 


Q20) Which of the following types of the commands does the NameNode send to the DataNode?

A)

1.Reregister the node or Shut down the node

2. Remove a block replica

3. Replication a block to another node.



Q21) Which of the following algorithms was the first alogrithm to use the download closure and antimontonicity propertes?

A) Apriori



Q22) Which of the following techniques to make accessing data more efficient on HDDs deals with the incompatibility of speed between a CPU and the electromechanical device?

A) Buffering of data


Q23) During which step of the ARIES recovery procedure is the log scanned backward and the operation of transactions that the operations of transaction that were active at the time of the crash are undone in reverse order?

A) UNDO



Q24) Which spatial operator provides a more specific description of the object's geometry and measure some global properties of single objects?

A) Metric


Q25) Which of the following is described in the given statement?

"Take immediate action to eliminate the attacker's the access to the system and to isolate or contain the problem to prevent further spread."

A) Confinement


Q26) What are the characteristics of a dynamic programming alogrithm?

A)

1. Recursively defines the value of optimal solution.

2. Computers optimal solutions and develops its value in a bottom-up fashion.

3. Develop the structure of an optimal solution.



Q27) Which of the following clauses assigns a variable to range over each of the individual elements in a sequence?

A) FOR


Q28) Which type of XML document is formatted as XML document in order to exchange it over the web?

A) Data-centric


Q29) Consider the following functions:

Allocates resources to applications.

Provides some degree of management of application masters.

manager cluster, doling out resources based on a pluggable scheduling policy.


A) ResourceManager



Q30) Which type of the XML document is formatted as XML document in order to exchange it over the web?

A) Data-centric


Q31) Which of the following interruptions are true of NULLs?

A)

1. The value is know but absent; that is, it has not been recorded yet.

2. The attribute does not apply to the tuple.

3. The attribute value for the tuple is unknow.


Q32) Who is responsible for security breaches and poor system response time  problems?

A) Database administrator.


Q33) Which of following entries in the web site name (URL) of the client user computer?

A) $_SERVER['REMOTE_HOST']


Q34) Which of the following constraints are possible constraints on a specialization?

A)

1. Overlapping, partial

2. Overlapping, total

3. Disjoint, total


Q35) Consider the following options for mapping specializing or generalization;

Option 1: Multiple relations-superclass and subclasses .

Option 2: Multiple relations-subclass relations only.

Option 3: Single relation with one type attribute.

Option 4: Single relation with multiple type attributes

Which of the following options works for any constraints on the specialization, i.e, disjoint or overlapping, total or partial?

A) Option 1


Q36) Consider the following skills of a surgical technical:

Ability to work in groups 

Possesses a calm nature

Excellent communication skills

Willingness to learn

The skills of a surgical technical are an example of which type of attribute?

A) Multivalued attribute.


Q37) During which of the following steps do the database designers interview prospective database used to understand and document their data necessities?

A) Requirement collection and analysis

Q38) Which problem occur due to the redundancy in storing the same data multiple times?

A)
1. Inconsistency 
2. Wastage of storage space
3. Duplication of effort


Q39) Consider the following statement:

"Web analysis is used to find interesting usage patters of web sites. If any flew in a web site has been exploited, it can be inferred using web analysis, there by allowing the design of more robust web sites,"

Which application of web analysis does the give statement refer to?

A) Web security


Q40) Who design and implement software packages that facilitate database modeling and design, and improved performance?

A) Tool developers



Q41) Which of the following functional dependencies occurs only in a relation that contains three or more attributes is indirectly dependent on another attribute that is not part of the primary key?

A) Transitive


Q42) What will be the next step after importing the JDBC class library when writing a java application program with database access through JDBC function calls?

A) Load the JDBC driver


Q43) Which abstaraction Concept is needed to distinguish among database objects and classes, and to identify database objects?

A) Identification


Q44) Consider the following example:
"The salary of an employee should not exceed of the salary of the employee's supervisor."
Which of the following constraints is suitable for the given example?

A) Transition


Q45) Which of the following strategies updates a views as the base tables are changes?

A) Immediate update


Q46) Which of the following indexes requires that the ordering field of the file has a distinct value for each records are of fixed length with two fields ?

A) Primary 



Q47) Who communicates with all prospective database users to understand their requirement and to create a design that meets those requirements ?

A) Database designer.


Q48) Which stage of a distributed database query is performed locally?

A) Local query optimization


Q49) Consider the following function:
"The current source format of a data file and the desired database files structure are specified to a utility. Which then automatically reformats the data and stories it in the database."
Which database utility performs the given functions?

A) Loading


Q50) At which of the following levels is the actual data stored in a database?

A) Physical

Q51) Consider the following customer table:

A) SELECT * FROM Customer WHERE Satisfaction_Rate >= 92;


Q52) Which of the following violations will occur when a transaction may read a set of rows from a table, based on some condition specified in the SQL WHERE-clause?

A) Phantom



Q53) Which type of end user tries to learn most of the DBMS facilities to achieve their complex requirement ?

A) Sophisticated



Q54) Which of the following properties is enforced by the concurrency control subsystem of the DBMS?

A) Isolation



Q55) Which of the following functions does SQL allow to be blocked from public use, and an EXECUTE privilege is needed to have access to these function?

A) 

1. Mutator

2. Constructor

3. Observer



Q56) Which of the following types of actions are used to control discretionary database authorization?

A) 

1. Privilege granting

2. Privilege revocation 


Q57) in which of the following categories do the physical design decision for indexing fall?

A) 

1. Wheather to set up a clustered index

2. What attribute or attributes to index on

3. Whethere to index an attribute

4. Whethere to use a hash index over a tree index



Q58) Which of the following operations takes the results of two queries and returns only those rows that appear in both results sets without eliminations duplicates?

A) INTERSECT ALL



Q59) Which of the following multiset operation do not eliminates duplicates?

A) 

1. UNION ALL

2. EXCEPT ALL

3. INTERSECT ALL



Q60) Which of the following rules states that a set of attributes always determines itself or any of its subset?

A) Reflexive


61). Consider the first step involved in acquisition of data for warehouse:
"Extract data from multiple and heterogeneous sources.”
Which of the following steps will be the second step involved in acquisition of data for warehouse?

Answer: Format data for consistency within a warehouse.


62). What term is used for intermediate form of databases before they are cleansed, aggregated, and transformed into a data warehouse?

Answer: ODS

63). Consider the following functions:
# Allocates resources to applications
# Provides some degree of management of ApplicationMasters
# Manages cluster, doling out resources based on a pluggable scheduling policy
Which component of the YARN architecture performs the given functions?

Answer: ResourceManager

64. What problems occur due to the redundancy in storing the same data multiple times?
Each correct answer represents a complete solution. Choose all that apply.

Answers: 
Wastage of storage space

Inconsistency

Duplication of effort

65). Consider the following Customers table:
Which of the following queries will result in the below output?

Answer: SELECT * FROM Customers WHERE Satisfaction_Rate >= 92; 

66).Which of the following types of commands does the NameNode send to the DataNode?
Each correct answer represents a complete solution. Choose all that apply.

Answers
Re-register the node or shut down the node.
Replicate a block to another node.
Remove a block replica.














































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh