SBI Asst. Manager (IT Systems) Solved Paper 2012 (Part2)

S. Sujith
10
26. OLAP applications are widely used by ...............and it uses........... schema.
Choose the right option

[A] RDBMS , bus
[B] Operating system, star
[C] Java, bus
[D] Data mining, star or multidimensional.
[E] None of these


27. Arrange the following in increasing order of their size.
Choose the right option

[A] Database
[B] Bit
[C] Bit>byte>record>field>file>database
[D] Bit>byte>file record>field>database
[E] None of these



28. JVM is a virtual machine that can execute................... .
Choose the right option

[A] C language.
[B] .net programming
[C] RDBMS
[D] C++ LANGUAGE
[E] Java byte code.



29. ODBC is based on ..............
Choose the right option

[A] Structured query language
[B] C language
[C] C++
[D] Net
[E] none



30. Which of the following is not an advantage of the data –base approach?
Choose the right option

[A] Increased security
[B] Elimination data redundancy
[C] Ability to associate related data.
[D] Programming/ data independence
[E] All of above



31. In relational database row and coloum is called as ............. and ........... respectively.
Choose the right option

[A] Tuple;attribute
[B] Attribute;tuple
[D] Attribute;domain
[E] None



32. To delete a particular column in a relation the command used is:
Choose the right option

[A] Delete
[B] Update
[C] Drop
[D] Alter
[E] None of these



33. A primary key if combined with a foreign key creats
Choose the right option

[A] Parent-child relationship b/w the tables that connect them.
[B] Many to many relationship between the tables that connect them.
[C] Network model b/w the tables that connects them.
[E] None of the above.



34. Which of the following is record based logical model ?
Choose the right option

[A] Network model
[B] Object oriented model
[C] E-R model
[D] All of these.
[E] None.



35. The full form of the DDL.
Choose the right option

[A] Dynamic Data Language
[B] Detailed Data Language
[C] Data Definition Language
[D] Data Derivation Language
[E] All of these



36. Which of the following virus overtake computer system when it boots and destroy information.
Choose the right option

[A] Trojan
[B] System infectors.
[C] Boot infectors.
[D] Stealth virus.
[E] None of these.



37. The relational model includes two general integrity rules. Integrity rule 1 is concerned with........... and integrity rule 2 is concerned with ...........
Choose the right option

[A] Primary key, foreign key
[B] Primary key,composite key.
[C] Unique key , foreign key.
[D] Composite key,foreign key
[E] None of these



38. ............. is person who has the central control over both data and application Programs.
Choose the right option

[A] System engineer
[B] Database administrator
[C] Database manager
[D] Technical analyst
[E] None of these



39 . An attribute of a relation that references the primary key of another relation is known as the......................
Choose the right option

[A] Foreign key
[B] Unique key
[C] Parent key
[D] Child key
[E] Index key



40. An entity set that doesn’t have sufficient attributes to form a primary key is a
Choose the right option

[A] Strong entity set
[B] Weak entity set
[C] Simple entity set
[D] Primary entity set
[E] None of these



41. The JDBC-ODBC bridge is
Choose the right option

[A] Three tiered
[B] Multithread
[C] Best for any platform
[D] All of these
[E] None of these.



42.In a relational database ,this is a data structure that organises the information about a single topic into rows and columns.
Choose the right option

[A] Block
[B] Record
[C] Tuple
[C] Table
[E] None



43. Which statement about the java language are true ?
Choose the right option

[A] Java supports both procedural and object oriented programming
[B] Java is only a procedural language.
[C] Java is only an object –oriented .
[D] Java is related to
[E] None of the above.



44. Stack is also called ...........
Choose the right option

[A] First in first out (FIFO)
[B] Last in first out(LIFO)
[C] First in last out(FILO)
[D] First come first served(FCFS)
[E] None of the above



45. The index created by primary key column is called .........
Choose the right option

[A] Unique index
[B] Composite index
[C] Single index
[D] Primary index
[E] None of these



46.In sql ,which comman(s) is(are) used to remove rows from a table.
Choose the right option

[A] Delete
[B] Remove
[C] Truncate
[D] Both (1) and (3)
[E] none



47.In Sql , the create table is used
Choose the right option

[A] To create a table ,definition its columns,integrity constraints. And storage allocation.
[B] To add a column/integrity constraint to a table.
[C] To redefine a column
[D] To change a tables storage characteristics
[E] All of the above



48. What is the abbreviation used for a software package that permits the user to create , retrieve and maintain records in a data base ?
Choose the right option

[A] Dasd
[B] CRMD
[C] DBMS
[D] All of these
[E] None of the above



49. Choose the right sequence of virus stages
Choose the right option

[A] Triggering ,damage, Dormancy,propagation
[B] Damage ,Triggering ,Dormancy ,Propagation
[C] Damage ,Triggering ,propagation, Dormancy
[D] Triggering ,Damage ,propagation,dormancy
[E] Dormancy,propagation ,Triggering,Damage



50.In sql , which command is used to add new rows to a table
Choose the right option

[A] Alter table
[B] Add row
[C] Insert
[D] Append
[E] None

Post a Comment

10 Comments
Post a Comment
To Top