2013 exam
2013 exam
2. Abebe is one of the database worker in your organization and he changed his id number from Org123 to
Org12 but he could not change his salary. Then which one of the following is a possible reason for
Abebe?
A. He may not have update privilege on id number column while he has on salary column.
B. He may not have update privilege on salary while he has on id number column
C. He may not have update privilege for the entire column of the table
D. He may not have update privilege for the database as whole.
3. The language associated with a database management system that is employed by end users and
programmers to alter data in the database is the:
7. The process for protecting against the loss of data due to disk failure by maintaining a fully redundant
copy of data in separate disk is called
A. Encryption B. Mirroring C. Roles D. Backup
8. ______________Enable you to assemble users into a single unit to which you can apply permissions.
A. Encryption B. Mirroring C. Roles D. Backup
Page 1 of 5
9. In a relational database, a database object that provides fast access to data in the rows of table(based on
key value) is
A Index B. Roles C. Backup D. Recovery
10. Data encryption techniques are particularly used for
17. Database ____ refers to a set of activities and procedures designed to reduce the response time of the
database system.
A. Saved C. Rolled
B. Loaded D. Committed
19. A type of query that is placed within a WHERE or HAVING clause of another query is called
Page 2 of 5
A. Super query C. Master query
B. Sub query D. Multi-query
21. __________specifies the number of instances of an entity associated with another entity participating in
a relationship.
22. Which one of the following does not affect database performance (response time)?
A. Database design C. Number of concurrent users
B. Number of columns to be retrieved from tables D. Number of users with administrative access right
23. Which of the following is correct?
A. Two tables in the same schema can have the same name
B. The ORDERD BY key word sorts the records in ascending order by default in select statement
C. A table can have multiple primary keys with single or multiple fields
D. None
24. A relation which is in higher normal form
A. May not satisfy the conditions of lower normal form C. Is independent of lower normal form
B. Is also be in lower normal form D. None of these
25. Which of the following is false
A. DBA can assign privileges to different users
B. A user can assign privileges to any user on any relation
C. A user can assign privileges to any user on its own relation only
D. All of these
26. _________ is an atomic unit of work that is either completed in its entirety or not done at all
A. Transaction B. Recovery C. Commit D. Aborted
27. For recovery from any type of failure data values prior to modification(BFIM-Before Image) and the new
value after modification(AFIM- After Image) are required and information is stored in a sequential file
A. Database recovery C. Data update
B. Transaction Log D. Immediate Update
28. The security mechanism of a DBMS must include provisions for restricting access to the database as
whole
A. Access control C. Authorization
B. Security D. Authentication
29. Let book be a table with two columns: isbn and title. Assuming that isbn is unique and there are no
identical titles, which of the following is true?
A. title a key of the table. C. the book table in 3NF
B. isbn functionally depend on title D. All are correct
Page 3 of 5
30. Let R(A, B, C) be a relation with the functional dependency: C →B. (The attributes A and B build the
composite key, and the attribute B is functionally dependent on C.) In which normal form is the relation
R?
A. 1NF B. 2NF C. 3NF D. None
31. In your data model, you have two relations associated with each other by many-to-many relationship.
How will this relationship be physically implemented in a relational database?
A. By adding a third relation between the original two relations in order to create two one-to-many relationships.
B. By adding the primary key of the first relation to the second relation as a foreign key.
C. By dragging the primary key of the second table to the first table
D. By adding any key of the first table to the second table as a foreign key
32. It is not an activity to establish quality standard specifications to maintain and improve quality at
work.
37. ______________ facilitate searching, sorting, and using aggregate functions and even join operations.
Page 4 of 5
C. To ensure data integrity while reading data occurs to the database in a multiuser environment.
D. To ensure data integrity while reading data occurs to the database in a single-user environment
39. A shared lock allows which of the following types of transactions to occur?
A. Delete B. Insert C. Read D. Update
40. Performance analysis and tuning is which of the following?
A. Undertaken one time at the time of a DBMS installation.
B. Undertaken one time at the time of the implementation of a new application.
C. Undertaken as an ongoing part of the backup of a database.
D. Undertaken as an ongoing part of managing a database
ANSWERED BY GECH
Page 5 of 5