0% found this document useful (0 votes)
17 views

2013 exam

Same

Uploaded by

getubekele1989
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

2013 exam

Same

Uploaded by

getubekele1989
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Athlete Kenenisa Bekele Poly Technique Collage Department of ICT

2013 Academic year Summative Exam of Database Administration For Level IV


Name: Getu Bekele _________________ ID. NO RI/0501/10 _________ Level __IV___

CHOOSE THE CORRECT ANSWER FOR THE FOLLOWING QUESTIONS.

1. What is the difference between object and class?

A. Object is the instance of class. C. Object is the same as class.


B. Class is the instance of object D. Object is the collection of class

2. Abebe is one of the database worker in your organization and he changed his id number from Org123 to
Org12 but he could not change his salary. Then which one of the following is a possible reason for
Abebe?
A. He may not have update privilege on id number column while he has on salary column.
B. He may not have update privilege on salary while he has on id number column
C. He may not have update privilege for the entire column of the table
D. He may not have update privilege for the database as whole.
3. The language associated with a database management system that is employed by end users and
programmers to alter data in the database is the:

A. Data presentation language C. Data translation language


B. Data manipulation language D. Data definition language

4. One of the following is not the responsibility of database administrator.


A. Control over data and program accessing data
B. Authorizing access to the database.
C. Maintenance and performance of hardware and software component of the entire organization.
D. Data constraints
5. How do you prevent system privileges deletion and updating authority on PRICE and YEAR column
of the CATALOGUE table from user Girma.
A. Grant Delete, update(price, year) on catalogue from Girma
B. Allow Delete, update(price, year) on catalogue from Girma
C. Revoke Delete, update(price, year) on catalogue from Girma.
D. Deny Delete, update (price, year) on catalogue from Girma.
6. Planning and organizing a given work does not include:

A. Setting attainable objectives C. Monitoring and evaluating activities


B. Creating and manipulating database D. Scheduling activities

7. The process for protecting against the loss of data due to disk failure by maintaining a fully redundant
copy of data in separate disk is called
A. Encryption B. Mirroring C. Roles D. Backup
8. ______________Enable you to assemble users into a single unit to which you can apply permissions.
A. Encryption B. Mirroring C. Roles D. Backup

Page 1 of 5
9. In a relational database, a database object that provides fast access to data in the rows of table(based on
key value) is
A Index B. Roles C. Backup D. Recovery
10. Data encryption techniques are particularly used for

A. Reducing storage space requirements C. Protecting data in data communication


B. Improving data integrity D. Maximize data quality

11. A functional dependency between two or more non-key attributes is called

A. Transitive dependency C. Functional dependency


B. Partial transitive dependency D. Partial functional dependency

12. A relation that has no partial dependencies is in which normal form


A. First B. Second C. Third D. BCNF
13. In the context of a database table, the statement "A determines B" indicates that
A. Knowing the value of attribute A you cannot look up the value of attribute B
B. You do not need to know the value of attribute A in order to look up the value of attribute B
C. Knowing the value of attribute A you can look up the value of attribute B
D. None of the above.
14. A pilot can fly three types of planes and a plane can be piloted by any qualified pilot. The pilot-plane
type relationship is
A. N:3 B. 3:N C. 1:3 D. 3:1
15. A student can take not more than 5 subjects in a semester. The number of students allowed in a subject
in a semester is not more than 40. The student – subject relationship is:
A. 5:40 B. 40:5 C. N:5 D. 40:M
16. What is the goal of database performance?

A. To return accurate results C. To execute queries as fast as possible

B. To prevent an inconsistent state D. To replace other forms of data storage

17. Database ____ refers to a set of activities and procedures designed to reduce the response time of the
database system.

A. integrity checking C. query handling

B. locking D. performance tuning

18. A transaction completes its execution is said to

A. Saved C. Rolled
B. Loaded D. Committed

19. A type of query that is placed within a WHERE or HAVING clause of another query is called

Page 2 of 5
A. Super query C. Master query
B. Sub query D. Multi-query

20. Granting of authorization for data access is the responsibility of_____________

A. DBA C. File manager


B. Database manager D. Buffer manager

21. __________specifies the number of instances of an entity associated with another entity participating in
a relationship.

A. Cardinality B. Degree C. State D. View

22. Which one of the following does not affect database performance (response time)?
A. Database design C. Number of concurrent users
B. Number of columns to be retrieved from tables D. Number of users with administrative access right
23. Which of the following is correct?
A. Two tables in the same schema can have the same name
B. The ORDERD BY key word sorts the records in ascending order by default in select statement
C. A table can have multiple primary keys with single or multiple fields
D. None
24. A relation which is in higher normal form
A. May not satisfy the conditions of lower normal form C. Is independent of lower normal form
B. Is also be in lower normal form D. None of these
25. Which of the following is false
A. DBA can assign privileges to different users
B. A user can assign privileges to any user on any relation
C. A user can assign privileges to any user on its own relation only
D. All of these
26. _________ is an atomic unit of work that is either completed in its entirety or not done at all
A. Transaction B. Recovery C. Commit D. Aborted
27. For recovery from any type of failure data values prior to modification(BFIM-Before Image) and the new
value after modification(AFIM- After Image) are required and information is stored in a sequential file
A. Database recovery C. Data update
B. Transaction Log D. Immediate Update
28. The security mechanism of a DBMS must include provisions for restricting access to the database as
whole
A. Access control C. Authorization
B. Security D. Authentication
29. Let book be a table with two columns: isbn and title. Assuming that isbn is unique and there are no
identical titles, which of the following is true?
A. title a key of the table. C. the book table in 3NF
B. isbn functionally depend on title D. All are correct

Page 3 of 5
30. Let R(A, B, C) be a relation with the functional dependency: C →B. (The attributes A and B build the
composite key, and the attribute B is functionally dependent on C.) In which normal form is the relation
R?
A. 1NF B. 2NF C. 3NF D. None
31. In your data model, you have two relations associated with each other by many-to-many relationship.
How will this relationship be physically implemented in a relational database?
A. By adding a third relation between the original two relations in order to create two one-to-many relationships.
B. By adding the primary key of the first relation to the second relation as a foreign key.
C. By dragging the primary key of the second table to the first table
D. By adding any key of the first table to the second table as a foreign key
32. It is not an activity to establish quality standard specifications to maintain and improve quality at
work.

A. Developing an agreed upon specifications


B. Identifying quality requirements
C. Monitoring the effectiveness of quality assurance procedures
D. Providing services for requested department
33. You are assigned to lead a small team in your company that manages database. Identify the wrong
statement in leading the team

A. Assign responsibilities to team members C. Possess necessary leadership skill


B. Favor some individuals in your team D. Understand the team role
34. The property of transaction which ensures that either all operations of the transaction are reflected
properly in the database or none, is called

A. Atomicity C. Isolation E. Deadlock


B. Durability D. Consistency

35. Embedded SQL means


A. Using the EMBED key word in a SQL statement.
B. Writing a SQL statement to retrieve data from more than one relation.
C. Writing SQL statements within codes written in a general programming language.
D. Specifying a condition and action to be taken in case the given condition is satisfied in a trigger.
E. Using SQL language constructs like revoke and grant respectively for revoking and granting privileges' to users.
36. Which of the following is the preferred way to recover a database after a transaction in progress
terminates abnormally?
A. Rollback B. Rollforward C. Switch to duplicate database D. Reprocess transactions

37. ______________ facilitate searching, sorting, and using aggregate functions and even join operations.

A. Indexes B. Plans C. Queries D. Fetches

38. Concurrency control is important for which of the following reasons?


A. To ensure data integrity when updates occur to the database in a multiuser environment.
B. To ensure data integrity when updates occur to the database in a single-user environment.

Page 4 of 5
C. To ensure data integrity while reading data occurs to the database in a multiuser environment.
D. To ensure data integrity while reading data occurs to the database in a single-user environment
39. A shared lock allows which of the following types of transactions to occur?
A. Delete B. Insert C. Read D. Update
40. Performance analysis and tuning is which of the following?
A. Undertaken one time at the time of a DBMS installation.
B. Undertaken one time at the time of the implementation of a new application.
C. Undertaken as an ongoing part of the backup of a database.
D. Undertaken as an ongoing part of managing a database

ANSWERED BY GECH

1. A 11. A 21. A 31. A

2. B 12. B 22. B 32. D

3. B 13. A 23. B 33. B

4. D 14. A 24. B 34. A

5. D 15. B 25. B 35. C

6. B 16. C 26. A 36. A

7. D 17. D 27. B 37. A

8. C 18. D 28. A 38. A

9. A 19. B 29. D 39. C

10. C 20. A 30.B 40. D

Page 5 of 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy