Data Base

0371240

Examination

Booklet

Contributed by:

Mr. Ahmed Al-Ghoul

Faculty of Administrative and Financial Sciences Business Networking and Systems Management Department

Database Management System

lecturer :- Ahmad Al_Ghoul

2006/2007

1)  Which of the following languages is used to define the schema of the database?

A.  DCL

B.  =DDL

C.  DML

D.  None of these

2)  The DML is used for:

a)  Creating tables

b)  =Retrieving data

c)  Deleting users

d)  Inserting data

e)  Deleting data

A.  b,c,d

B.  =b,d,e

C.  None of these

D.  All of these

3)  Which language is used to permit or prohibit access to a table?

A.  =DCL

B.  DDL

C.  DML

D.  All of these

4)  The relationship between data is defined in the ______.

A.  physical level

B.  =view level

C.  =logical level

5)  The security features of the database are set up by the ______.

A.  Online Users

B.  =Database Administrator

C.  =Naive Users

D.  Application Programmer

6)  Which of the following are the roles of the Database Administrator:

a) Managing security issues
b) Storage structure definition
c) Develop application programs
d) Take backups of the database

A.  a

B.  a,b,c

C.  =a,b,d

D.  All of these

7)  A group of associated fields is called a ______.

A.  attribute

B.  =record

C.  field

D.  table

8)  Which language is used to define the integrity constraints?

A.  DCL

B.  DDL

C.  =DML

D.  None of these

9)  The database oriented approach ______the redundancy of data compared to the file oriented approach.

A.  =reduces

B.  increases

10) SQL is platform independent.

A.  =True

B.  False

11) SQL is a ______language.

A.  =non-procedural

B.  object-oriented

C.  procedural

12) SQL statements can be executed without a DBMS.

A.  True

B.  =False

13) SQL stands for ______.

A.  Structured Question Language

B.  Structural Query Language

C.  =Structured Query Language

D.  Systematic Query Language

14) SQL is used for:

A. creating, managing and deleting tables and manage the relationships among the stored date.
B. generating queries, organizing, managing and retrieving data stored in a database.
C. maintaining data integrity and coordinate data sharing.

A.  A and B

B.  B and C

C.  =All of the above

D.  None of the above

15) What are the two types of tables that can be created in a RDBMS?

A.  =Permanent and Temporary

B.  Static and Dynamic

C.  Local and Global

16) The ON COMMIT clause can be applied to ______tables.

A.  permanent

B.  =temporary

C.  both temporary and permanent

17) Which of the following are valid column constraints:

A. NULL
B. DISTINCT
C CHECK
D. FOREIGN KEY

A.  A

B.  C

C.  =C, D

D.  All of the above

18) Which of the following are valid table constraints:

A. PRIMARY KEY
B. UNIQUE
C. CHECK
D. FOREIGN KEY

A.  A and D

B.  B and C

C.  A, C and D

D.  =All of the above

19) Table constraints can be applied to individual columns and groups of columns.

A.  True

B.  False

20) Which of these describes a major advantage in using databases for storing data?

A.  The data have a better chance of being available for the user in an accurate, integral form.

B.  All of the data is stored in one place and therefore more vulnerable to loss or destruction.

C.  Bureaucratic procedures may make it difficult for users to access data.

D.  Data retrieval cannot be optimized for a single application.

21) A ______consists of linked tables that form one overall data structure.

A.  =database system

B.  data structure

C.  file processing system

D.  file-oriented system

22) Which of the following is used for archiving purposes?

A.  transaction file

B.  work file

C.  =history file

D.  security file

23) Which of the following is used as a temporary file created by an information system for a single task?

A.  transaction file

B.  work file

C.  history file

D.  security file

24) Typically, a database management system is managed by a person called a ______.

A.  system manager

B.  technology manager

C.  database manager

D.  =database administrator

25) A _____ language allows a user to specify a task without specifying how the task will be accomplished.

A.  programming

B.  database

C.  =query

D.  user-oriented

26) A _____ refers to the complete definition of a database, including descriptions of all fields, tables, and relationships.

A.  =schema

B.  data repository

C.  data manipulation language

D.  none of the above

27) Intranets and extranets use the same protocols as the Internet; they are called _____.

A.  =Web-centric

B.  externally aligned

C.  frame compatible

D.  HTML-based

28) A (n) ______is software that connects dissimilar applications and enables them to communicate and exchange data.

A.  =Middleware

B.  application

C.  protocol

D.  extranet

29) ______is the language used to write Web pages for the Internet.

A.  THML

B.  LMHT

C.  MHTL

D.  =HTML

30) Which of these is an example of an entity?

A.  student

B.  a patient’s name

C.  an employee’s ID

D.  =all of the above

31) The rule that a primary key cannot have a null value, and if the primary key is a composite key, none of the component fields can contain a null value is referred to as:

A.  referential integrity

B.  domain integrity.

C.  =entity integrity constraint.

D.  a data validation constraint.

32) The rule that requires that a foreign key value cannot be entered in one table unless it matches an existing primary key in another table

A.  =referential integrity

B.  domain integrity.

C.  entity integrity constraint.

D.  a data validation constraint.

33) A(n) ______is a person, place, thing, or event for which data is collected and maintained.

A.  primary key

B.  =table

C.  record

D.  entity

34) A(n) ______is a field or combination of fields that can be used to access or retrieve records.

A.  foreign key

B.  =secondary key

C.  ERD

D.  command key

35) A _____ relationship has an associative entity with its own characteristics.

A.  1:1

B.  =M:N

C.  1:M

D.  all of the above

36) The first entity in the relationship is the ______entity.

A.  =parent

B.  child.

C.  mother

D.  brother

37) A type of cardinality notation called ______notation because of the shapes

A.  dove’s foot

B.  bird’s foot

C.  = foot

D.  any one from the above

38) In a crow’s foot cardinality notation a single bar indicates

A.  =

B.  many

C.  zero

D.  one and only one

39) In a crow’s foot cardinality notation a double bar indicates

A.  one

B.  many

C.  zero

D.  =one and only one

40) A table design that contains a repeating group is called______.

A.  a repetitive group

B.  unfixed

C.  =

D.  1NF

41) Standard notation format is represented in the example of_____.

A.  FIELD 1: NAME (FIELD 2, FIELD 3)

B.  =NAME (FIELD 1, FIELD 2, FIELD 3)

C.  (FIELD 1, FIELD 2, FIELD 3)

D.  ,FIELD 2, FIELD 3 (NAME)

42) A (n) ______record is one that contains a repeating group.

A.  =unnormalized

B.  1NF

C.  2NF

D.  3NF

43) in the 1NF

A.  All key attributes defined

B.  No repeating groups in a table

C.  All attributes dependent on a primary key

D.  =All of the above

44) What are the three steps of normalization to third normal form for databases?

A.  Identify the primary key, select secondary keys, and define relationships.

B.  =Remove repeating groups, remove partial dependencies, and remove transitive dependencies.

C.  Define entities, select relationships, and define attributes.

D.  None of the above is correct.

45) A table design is in ______if it is 1NF and if all the fields that are not part of the primary key are functionally dependent on the entire primary key.

A.  second normal form

B.  third normal form

C.  fourth normal form

D.  fifth normal form

46) Non key field is a field that is______

A.  not a candidate key for the primary key

B.  a candidate key for the primary key

C.  a primary key

D.  none of the above is correct

47) STUDENT (STUDENT-NUMBER, STUDENT-NAME, TOTAL-CREDITS,

GPA, ADVISOR-NUMBER, ADVISOR-NAME, (COURSE-NUMBER, COURSE-DESC, NUM-CREDITS, GRADE))

The STUDENT table above is______

A.  unnormalized

B.  in the 1NF

C.  in the 2NF

D.  in the 3NF

48) STUDENT (STUDENT-NUMBER, STUDENT-NAME, TOTAL-CREDITS, GPA, ADVISOR-NUMBER, ADVISOR-NAME, COURSE-NUMBER, COURSE-DESC, NUM-CREDITS, GRADE)

The STUDENT table above is ______

A.  unnormalized

B.  in the 1NF

C.  in the 2NF

D.  in the 3NF

49) A _____ contains records that contain day-to-day business and operational data.

A.  transaction file

B.  work file

C.  table file

D.  master file

50) Scalability refers to _____.

A.  a system can be modified, expanded, or down-sized easily to meet changing needs .

B.  data can be shared across the enterprise, allowing more users access to more data .

C.  consistent standards are set for data names, formats, and documentation .

D.  systems are relatively independent of how the physical data is maintained.

51) ______is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data uses SQL

Statements.

A.  ODBC

B.  JDBC

C.  HTML

D.  XML

52) A (n) ______is a query language that allows PC users to communicate with servers and mainframe computers.

A.  structured query language.

B.  standard query language.

C.  procedural query language.

D.  manipulation query language.

53) A _____ refers to a single characteristic or fact about an entity.

A.  record

B.  table

C.  field

D.  primary key

54) In a crow’s foot cardinality notation a circle indicates

A.  one

B.  many

C.  zero

D.  one and only one

55) The process of creating table designs by assigning specific files or attributes to each table in the database is _____.

A.  Compatibility

B.  referential integrity

C.  cardinality

D.  normalization

56) in the 2NF

A.  Attributes may be functionally dependent on nonkey attributes

B.  No attribute dependent on a nonkey attribute

C.  no attributes dependent on a primary key

D.  none of the above is correct

57) Data that the db needs to manage itself is called.

A.  User data.

B.  system data.

C.  Information data.

D.  All of the above.

58) The Redo Logs (Transaction log)

A.  A type of operating system files.

B.  In which Oracle records all changes or transactions that happen to the db.

C.  Redo logs work in a circular fashion.

D.  all of the above.

59) SQL Commands that allow you to manipulate data in existing database objects is called.

A.  DDL.

B.  DCL.

C.  DML.

D.  DFL.

60) You can create a new object in a data base by.

A.  DDL.

B.  DCL.

C.  DML.

D.  DFL.

61) the category that includes commands that protect the integrity of the database and the consistency of data by controlling and managing the access to the database structures.

A.  DDL.

B.  DCL.

C.  DML.

D.  DFL.

62) Arithmetic Expressions can be used with.

A.  With number data type.

B.  With date data type.

C.  With character data type.

D.  Both a and b

63) SQL is:

A.  Procedural Query Language.

B.  Structure Query Language.

C.  Non procedural Language.

D.  B and C.

64) In SQL; the statements are executed:

A.  Statement by statement.

B.  Block of statements together.

C.  All of the statements together.

D.  B and C.

65) Rollback segments used for:

A.  Records all changes or transactions that happen to the DB.

B.  Used to recover the committed data that’s not written to the data files.

C.  Used to undo transaction.

D.  Used to hold users personal information.

66) Commands in data definition language (DDL) allow you:

A.  Modify the structure of the DB.

B.  Manipulate data in existing DB objects.

C.  Protect the integrity of the DB.

D.  All of the above.

67) The ‘Insert’ command is one of the popular command in:

A.  DDL.

B.  DML.

C.  DCL.

D.  None of the above.

68) SQL*Plus is:

A.  Procedural Query Language.

B.  Structure Query Language.

C.  Non procedural Language.

D.  Is an oracle tool.

E.  is an Oracle tool an

69) SQL :

A.  A language

B.  ANSI standard

C.  Keyword cannot be abbreviated.

D.  All of the above.

70) If you divide number 500 on the number one, then you add 200, multiply the result by null. The result will be:

A.  You get an error.

B.  You get 200.

C.  You get 700.

D.  You get null value.

71) Commands in data definition language (DML) allow you:

A.  Modify the structure of the DB.

B.  Manipulate data in existing DB objects.

C.  Protect the integrity of the DB.

D.  All of the above.

72) Review the following output :

which of the following SQL statements likely produced the output above:

A.  select deptno || ' ' || dname || ' in ' || loc Departments from dept;

B.  select deptno || “ “ || dname || “ in “ || loc DEPARTMENT from dept;

C.  select deptno || ' ' || ‘dname’ || ' in ' || loc DEPARTMENT from dept;

D.  select dname || ' ' || deptno || in || loc departments from dept;

73) Review the following output :

which of the following SQL statements likely produced the output above:

A.  select job from emp;

B.  select job from emp where job is not null;

C.  select * from emp;

D.  select distinct job from emp;

74) Review the following output :