Database MCQ Set 1
1. Which of the following is true for Seeheim model?
a) Presentation is abstracted from dialogue and Application
b) Presentation and Dialogue is abstracted from Application
c) Presentation and Application is abstracted from Dialogue
d) None of the mentioned
Answer
Answer: a [Reason:] Presentation is abstracted from dialogue and application.
2. Which of the unit operation is used in Model view controller?
a) Is a Decomposition
b) Part Whole Decomposition
c) All of the mentioned
d) None of the mentioned
Answer
Answer: b [Reason:] Part whole decomposition is applied to MVC.
3. Memory address refers to the successive memory words and the machine is called as ___
a) word addressable
b) byte addressable
c) bit addressable
d) Terra byte addressable
Answer
Answer: a [Reason:] Part whole decomposition is applied to MVC.
4. Which layer deals which deals with user interaction is called _______ layer.
a) Business logic
b) Presentation
c) User interaction
d) Data access
Answer
Answer: b [Reason:] The single application may have several different versions of this layer, corresponding to distinct kinds of interfaces such as Web browsers, and user interfaces of mobile phones, which have much smaller screens.
5. The _______ layer, which provides a high-level view of data and actions on data.
a) Business logic
b) Presentation
c) User interaction
d) Data access
Answer
Answer: a [Reason:] The single application may have several different versions of this layer, corresponding to distinct kinds of interfaces such as Web browsers, and user interfaces of mobile phones, which have much smaller screens.
6. The ________ layer, which provides the interface between the business-logic layer and the underlying database.
a) Business logic
b) Presentation
c) User interaction
d) Data access
Answer
Answer: d [Reason:] Many applications use an object-oriented language to code the business-logic layer, and use an object-oriented model of data, while the underlying database is a relational database.
7. The _______ system is widely used for mapping from Java objects to relations.
a) Hibernate
b) Object oriented
c) Objective
d) None of the mentioned
Answer
Answer: a [Reason:] In Hibernate, the mapping from each Java class to one or more relations is specified in a mapping file.
8. Which among the following are the functions that any system with a user interface must provide?
a) Presentation
b) Dialogue
c) All of the mentioned
d) None of the mentioned
Answer
Answer: a [Reason:] Presentation and Application are the functions that any system with a user interface must provide.
9. Which of the following is the main task accomplished by the user?
a) Compose a document
b) Create a spread sheet
c) Send mail
d) All of the mentioned
Answer
Answer: d [Reason:] All of the mentioned are the main task accomplished by the user.
10. What are the portability concerns founded in Seeheim model?
a) Replacing the presentation toolkit
b) Replacing the application toolkit
c) Replacing the dialogue toolkit
d) Replacing the presentation & application toolkit
Answer
Answer: d [Reason:] The portability concerns founded in Seeheim model are- Replacing the presentation toolkit and Replacing the application toolkit.
Database MCQ Set 2
1. The indirect change of the values of a variable in one module by another module is called
a) Internal change
b) Inter-module change
c) Side effect
d) Side-module update
Answer
Answer: c [Reason:] The module of the search tree and the flow is directed by its values.
2. Which of the following data structure is not linear data structure?
a) Arrays
b) Linked lists
c) Arrays & Linked lists
d) None of the mentioned
Answer
Answer: d [Reason:] Both array and linked lists are in data structure concepts.
3. Which of the following data structure is linear data structure?
a) Trees
b) Graphs
c) Arrays
d) None of the mentioned
Answer
Answer: c [Reason:] Tree and graphs are not linear.
4. Which of the following criterion is NOT written using the proper syntax?
a) “Haris”
b) <500
c) NO VALUE
d) Between #1/1/2000# and #12/31/2000#
Answer
Answer: c [Reason:] NO VALUE cannot be specified.
5. The operation of processing each element in the list is known as
a) Sorting
b) Merging
c) Inserting
d) Traversal
Answer
Answer: d [Reason:] There are several types of traversals.
6. Finding the location of the element with a given value is:
a) Traversal
b) Search
c) Sort
d) None of the mentioned
Answer
Answer: b [Reason:] Search is performed by traversing through the tree.
7. Arrays are best data structures
a) For relatively permanent collections of data
b) For the size of the structure and the data in the structure are constantly changing
c) All of the mentioned
d) None of the mentioned
Answer
Answer: a [Reason:] The operator tree has a tree like format where the evaluation starts from root of the tree.
8. Linked lists are best suited
a) For relatively permanent collections of data
b) For the size of the structure and the data in the structure are constantly changing
c) All of the mentioned
d) None of the mentioned
Answer
Answer: b [Reason:] A linked list is a data structure consisting of a group of nodes which together represent a sequence.
9. Each array declaration need not give, implicitly or explicitly, the information about
a) The name of array
b) The data type of array
c) The first data from the set to be stored
d) The index set of the array
Answer
Answer: c [Reason:] The operator tree has a tree like format where the evaluation starts from root of the tree.
10. The elements of an array are stored successively in memory cells because
a) By this way computer can keep track only the address of the first element and the addresses of other elements can be calculated
b) The architecture of computer memory does not allow arrays to store other than serially
c) All of the mentioned
d) None of the mentioned
Answer
Answer: a [Reason:] Memory is always allotted in order.
Database MCQ Set 3
1. In _____ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
a) SQL injection
b) SQL
c) Direct
d) Application
Answer
Answer: a [Reason:] Application security has to deal with several security threats and issues beyond those handled by SQL authorization .
2. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___ attack.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
Answer
Answer: c [Reason:] In such an attack, a malicious user enters code written in a client-side scripting language such as JavaScript or Flash instead of entering a valid name or comment.
3. ___ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
Answer
Answer: b [Reason:] Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF.
4. Many applications use _____, where two independent factors are used to identify a user.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
Answer
Answer: a [Reason:] The two factors should not share a common vulnerability.
5. Even with two-factor authentication, users may still be vulnerable to_______attacks.
a) Radiant
b) Cross attack
c) scripting
d) Man-in-the-middle
Answer
Answer: d [Reason:] In such attacks, a user attempting to connect to the application is diverted to a fake Web site, which accepts the password from the user, and uses it immediately to authenticate to the original application.
6. A single ________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
a) OpenID
b) Sign-on system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
Answer
Answer: b [Reason:] Once the user logged in at one site, he does not have to enter his user name and password at other sites that use the same single sign-on service.
7. The ___ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.
a) OpenID
b) Sign-on system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
Answer
Answer: c [Reason:] The user’s password and other authentication factors are never revealed to the application, and the user need not register explicitly with the application.
8. The ____ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.
a) OpenID
b) Single-site system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
Answer
Answer: a [Reason:] The user’s password and other authentication factors are never revealed to the application, and the user need not register explicitly with the application.
9. ___ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
a) OpenID
b) Single-site system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
Answer
Answer: d [Reason:] Some database systems provide mechanisms for fine-grained authorization.
10. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _______ mechanism.
a) Row-level authorization
b) Column-level authentication
c) Row-type authentication
d) Authorization security
Answer
Answer: a [Reason:] Oracle Virtual Private Database (VPD) allows a system administrator to associate a function with a relation.
Database MCQ Set 4
1. ARIES uses a _____ to identify log records, and stores it in database pages.
a) Log sequence number
b) Log number
c) Lock number
d) Sequence
Answer
Answer: b [Reason:] LSN to is used identify which operations have been applied to a database page.
2. ARIES supports _____ operations, which are physical in that the affected page is physically identified, but can be logical within the page.
a) Physiological redo
b) Physiological undo
c) Logical redo
d) Logical undo
Answer
Answer: a [Reason:] The deletion of a record from a page may result in many other records in the page being shifted, if a slotted page structure is used.
3. ________ is used to minimize unnecessary redos during recovery.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned
Answer
Answer: a [Reason:] Dirty pages are those that have been updated in memory, and the disk version is not up-to-date.
4. ____ scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.
a) Fuzzy logic
b) Checkpoints
c) Fuzzy-checkpoint
d) Logical checkpoint
Answer
Answer: c [Reason:] It flushes dirty pages in the background, continuously, instead of writing them during checkpoints.
5. Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the _______ field of the page.
a) LSN
b) ReadLSN
c) PageLSN
d) RedoLSN
Answer
Answer: c [Reason:] Each page maintains an identifier called the PageLSN.
6. There are special redo-only log records generated during transaction rollback, called ___ in ARIES.
a) Compensation log records
b) Read log records
c) Page log records
d) Redo log records
Answer
Answer: a [Reason:] These serve the same purpose as the redo-only log records in our earlier recovery scheme.
7. The ______ contains a list of pages that have been updated in the database buffer.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned
Answer
Answer: a [Reason:] Dirty pages are those that have been updated in memory, and the disk version is not up-to-date.
8. _____ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
Answer
Answer: a [Reason:] The analysis pass finds the last complete checkpoint log record, and reads in the DirtyPageTable from this record.
9. ____ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
Answer
Answer: b [Reason:] The redo pass repeats history by replaying every action that is not already reflected in the page on disk.
10. ________ rolls back all transactions that were incomplete at the time of crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
Answer
Answer: c [Reason:] It performs a single backward scan of the log, undoing all transactions in undo-list.
Database MCQ Set 5
1. A domain is ______ if elements of the domain are considered to be indivisible units.
a) Atomic
b) Subatomic
c) Substructure
d) Subset
Answer
Answer: a [Reason:] A set of names is an example of a nonatomic value.
2. Identify the composite attributes
a) Salary
b) Credits
c) Section_id
d) None of the mentioned
Answer
Answer: d [Reason:] Composite attributes, such as an attribute address with component attributes street, city, state, and zip have nonatomic domains.
3. Consider the relation given below and ind the maximum normal form applicable to them
1. R(A, B) WITH productions { A --> B } 2. R(A, B) WITH productions { B --> A } 3 R(A, B) WITH productions {A —> B, B --> A } 4 R(A, B, C) WITH productions {A -->B, B --> A, AB --> C }
a) 1, 2 and 3 are in 3NF and 4 is in BCNF
b) 1 and 2 are in BCNF and 3 and 4 are in 3NF
c) All are in 3NF
d) All are in BCNF
Answer
Answer: d [Reason:] One of the more desirable normal forms that we can obtain is Boyce–Codd normal form (BCNF). It eliminates all redundancy that can be discovered based on functional dependencies.
4. Which one is based on multi-valued dependency:
a) First
b) Second
c) Third
d) Fourth
Answer
Answer: d [Reason:] One of the more desirable normal forms that we can obtain is Boyce–Codd normal form (BCNF). It eliminates all redundancy that can be discovered based on functional dependencies.
5. If a relation is in BCNF, then it is also in
a) 1 NF
b) 2 NF
c) 3 NF
d) All of the mentioned
Answer
Answer: d [Reason:] Third normal form (3NF) relaxes this constraint slightly by allowing certain nontrivial functionaldependencieswhose left side is not a superkey.
6. If every non-key attribute is functionally depedent primary key, then the relation will be in
a) First normal form
b) Second normal form
c) Third form
d) Fourth normal form
Answer
Answer: b [Reason:] Third normal form (3NF) relaxes this constraint slightly by allowing certain nontrivial functionaldependencieswhose left side is not a superkey.
7. If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called _____ is needed.
a) DKNF
b) BCNF
c) Fourth
d) Third
Answer
Answer: b [Reason:] BCNF eliminates all redundancy that can be discovered based on functional dependencies.
8. The term for information that describes what type of data is available in a database is:
a) Data dictionary
b) data repository
c) Index data
d) Metadata
Answer
Answer: d [Reason:] Meta data is generally data about a data.
9. A data type that creates unique numbers for key columns in Microsoft Access is:
a) Autonumber
b) Boolean
c) Sequential key
d) Sequential number
Answer
Answer: a [Reason:] This can be taken as a primary key .
10. A dependency exist between two columns when
a) Together they constitute a composite key for the table
b) Knowing the value in one column determines the value stored in another column
c) The table is in 3NF
d) Together they constitute a foreign key
Answer
Answer: a [Reason:] Given a set F of functional dependencies on a schema, we can prove that certain other functional dependencies also hold on the schema.