Header Ads


1.     The model for record management system might be
(a)   Hand written list
(b)   Rolodex card file
(c)   A business form
(d)   All of these                   

2.     Record management  system 
(a)   Can handle many files of information at a time
(b)   Can be used to extract information stored in a computer file
(c)   Always uses a list as its model
(d)   Both (a) and (b)

3.     In  order  to use a record management  system  it is required to understand
(a)   Low level details of how information is stored
(b)   Model  the  record  management  system  uses
(c)   Both (a) and (b)
(d)   None of these

4.     Report  generators are used
(a)   Store data input by a user
(b)   Retrieve information from files
(c)   Answer queries
(d)   Both (b) and (c)

5.     Sophisticated  generators  can
(a)   Print row oriented reports
(b)   Perform  arithmetic  operations
(c)   Selectively retrieve and print portions of a list
(d)   All of these

6.     The modify operation is likely to be done
(a)   Delete
(b)   Lookup
(c)   Insert
(d)   None of these
7.     The operation that will increase the length of a list, is
(a)   Insert
(b)   Lookup
(c)   Modify
(d)   All of these
8.     A compound key
(a)   Made of up several attributes
(b)   Unequally identifies an entity
(c)   Both a and b
(d)   None of these
9.     A list in alphabetical order is
(a)   In descending order
(b)   In ascending order
(c)   Results of sort operation
(d)   Both b and c
10.  A list consists of last name and first name and address and pin codes. If all people in the list have the same last and the same pin code ,a useful key would be
(a)   The pin code
(b)   The last name
(c)   A compound key consisting of first name and the last name
(d)   All of these

11.  An indexing operation
(a)   sorts of a file using a single key
(b)   sorts of a file using two keys
(c)   establishes an index for a file
(d)   both (b) and (c)
12.  The master lists of an indexed file
(a)   Is sorted in an ascending order
(b)   Contains only a list of keys
(c)   And record numbers
(d)   Both (b) and (c)

13.  The index consists of list of keys
(a)   Pointers to the master list
(b)   List of keys
(c)   Both a and b
(d)   None of these

14.  To have a file hold a list it is necessary to
(a)   Identify the records in the list
(b)   Identify the name width and type of the fields of each record
(c)   Decide which fields will be used as sort or index keys
(d)   All of these
15.  If a numeric  field has a width of 5.2 then the value of the field could be
(a)   23.10
(b)   121.8
(c)   143.87
(d)   Both a and b
16.  If record management system allows to edit values before they are recorded in the disk, then one can
(a)   Correct  spelling changes before they are recorded
(b)   Change name of a field
(c)   Change width of a field
(d)   All of these
17.  Primitive operation common to all record management  systems include
(a)   Print
(b)   Sort
(c)   Lookup
(d)   All of these
18.  A command that lets you change one or more fields in a record is
(a)   Insert
(b)   Modify
(c)   Look up
(d)   None of these
19.  Sort /report generators
(a)   Are faster than the index/report generators
(b)   Require more disk space than index/report generators
(c)   Do not need to search before generating a report
(d)   Both a and b
20.  Report  form
(a)   appears on the computer monitor during data entry
(b)   is used during report generation to format data
(c)   both a and b
(d)   none of these
21.  versatile-report  generators can provide
(a)   columnar total
(b)   subtotals
(c)   calculation
(d)   all of these
22.  A form defines
(a)   Where data is placed on the screen
(b)   Width of each field
(c)   Both (a) and (b)
(d)   None of these
23.  The designer of a form includes
(a)   Field designators
(b)   Prompts
(c)   Data
(d)   Both (a)  and (b)
24.  When we have finished entering information into a form
(a)   Template is written to the data file
(b)   Contents of the form are written to the data file
(c)   Both (a) and (b)
(d)   None of these
25.  When performing a look-up operation using a form
(a)   Enter search value into the form
(b)   Look at each form sequentially until you see the one you want
(c)   Type key in an entry line, and the correct form is displayed
(d)   None of these
26.  A form can be used to
(a)   modify records
(b)   delete records
(c)   format printed output
(d)   all of these
27.  If a calculation is embedded in a form
(a)   result of the calculation stored in the form
(b)   calculations are stored with the form
(c)   both b and a
(d)    none of these
28.  A multiple form file management system allows to
(a)    define different form for different operations
(b)    create a lookup form with an associated read only passwords to present access by unauthorized users
(c)    both (a) and (b)
(d)    none of these
29.  A database management system
(a)   allows simultaneous access to multiple file
(b)   can do more than a record management system
(c)   is a collection of programs for managing data
(d)   both a and b
30.  A logical scheme
(a)   is the entire database
(b)   is a standard way of organizing information
(c)   describes how data is actually stored on disk
(d)   none of these
31.  In order to use a DBMS, it is important to understand
(a)   physical schema
(b)   all subschema that the system supports
(c)    one subschema
(d)   None of these
32.  In a large DBMS
(a)   each user can “see” only a small part of the entire database
(b)   each subschema contains every field in the logical schema
(c)   each user can access every subschema
(d)   all of these

33.  subschema can be used to
(a)   create very different personalized views of the same data
(b)   present information in different formats
(c)   hide sensitive information by omitting all fields from the subschema’s description
(d)   all of these

34.  A transparent DBMS
(a)   cannot hide sensitive information from user
(b)   keeps its logical structure hidden from user
(c)   keep its physical structure hidden from the user
(d)   both b and c

35.  Goals for the design of the logical schema include
(a)   avoiding data inconsistency
(b)   being able to construct queries easily
(c)   being able to access data efficiently
(d)   all of these 

36.  If a piece of data is stored in two places in the databases, then
(a)   storage space is wasted
(b)   changing the data in one spot will cause data inconsistency
(c)   it can be more easily accessed
(d)   both (a) and (b)

37.  A top-do-bottom relationship among the items in a database is established by a
(a)   hierarchical schema
(b)   network schema
(c)   relational schema
(d)   all of these
38.  A network schema
(a)   restricts the structure to a one-to-many relationship
(b)   permits many-to-many relationship
(c)   stores data in tables
(d)   none of these
39.  In a relationship schema, each tuple is divided into fields called
(a)   relations
(b)   domains
(c)   queries
(d)   none of these
40.  A query is
(a)   a miniature program that tells the DBMS what to do
(b)   expressed using a query language
(c)   both a and b
(d)   none of these
41.  The physical location of a record is determined by a mathematical formula that transforms a file             key into a record location in a/an
(a)   B-tree file
(b)   Indexed file
(c)   Hashed file
(d)   Sequential file
42.  A data dictionary is a special file that contains
(a)   name of all fields in all files
(b)   data types of all fields in all files
(c)   widths of all fields in all files
(d)   all of these

43.  queries to a database
(a)   are written in English
(b)   can use aggregated functions like SUM and COUNT
(c)   both a and b
(d)   none of these

44.  A file manipulation command that extracts some of the records from a file is called
(a)   SELECT
(c)   JOIN
(d)   None of these
45.  Two files may be jointed into a third file if they have
(a)   a row in common
(b)   a field in common
(c)   no records with the same value in the common field
(d)   both c and b
46.  The project command will create new table that has
(a)   more fields than the original table
(b)   more rows than the original table
(c)   both a and b
(d)   none of these
47.  The data dictionary tells the DBMS
(a)   what files are in the databases
(b)   what attributes are possessed by the data
(c)   what these files contain
(d)   all of these
48.  Data integrity control
(a)   is used to set upper and lower limits on numeric data
(b)   requires the use of passwords to prohibit unauthorized access to the files
(c)   has the data dictionary keep the data and time of last access last backup, and the most recent modification for all files
(d)   none of these
49.  A good query system
(a)   can accept English language commands
(b)   allows non-programmer to access information stored in databases
(c)   can be accessed only by data processing professional
(d)   both a and b
50.  one approach to standardizing storing of data is
(a)   MIS
(b)    Structured programming
(c)   CODASYL specifications
(d)   None of these

Answers--- DBMS
1(d) 2(b) 3(b) 4(d)  5(d) 6(b) 7(a) 8(c) 9(d) 10(c)
11 (C) 12 (c) 13(c) 14(d) 15(a) 16(a) 17(c) 18(b) 19(d) 20(b)
21(b) 22(c) 23(d) 24(b) 25(a) 26(d) 27(b) 28(c) 29(d) 30(b)
31(c) 32(a) 33(d) 34(c) 35(d) 36(d) 37(a) 38(b) 39(b) 40(c)
41(c) 42(d) 43(b) 44(a) 45(b) 46(d) 47(d) 48(c) 49(b) 50(c)

No comments

Powered by Blogger.