26. OLAP applications are widely used by ...............and it uses........... schema.
Choose the right option
[A] RDBMS , bus
[B] Operating system, star
[C] Java, bus
[D] Data mining, star or multidimensional.
[E] None of these
27. Arrange the following in increasing order of their size.
Choose the right option
[A] Database
[B] Bit
[C] Bit>byte>record>field>file>database
[D] Bit>byte>file record>field>database
[E] None of these
28. JVM is a virtual machine that can execute................... .
Choose the right option
[A] C language.
[B] .net programming
[C] RDBMS
[D] C++ LANGUAGE
[E] Java byte code.
29. ODBC is based on ..............
Choose the right option
[A] Structured query language
[B] C language
[C] C++
[D] Net
[E] none
30. Which of the following is not an advantage of the data –base approach?
Choose the right option
[A] Increased security
[B] Elimination data redundancy
[C] Ability to associate related data.
[D] Programming/ data independence
[E] All of above
31. In relational database row and coloum is called as ............. and ........... respectively.
Choose the right option
[A] Tuple;attribute
[B] Attribute;tuple
[D] Attribute;domain
[E] None
32. To delete a particular column in a relation the command used is:
Choose the right option
[A] Delete
[B] Update
[C] Drop
[D] Alter
[E] None of these
33. A primary key if combined with a foreign key creats
Choose the right option
[A] Parent-child relationship b/w the tables that connect them.
[B] Many to many relationship between the tables that connect them.
[C] Network model b/w the tables that connects them.
[E] None of the above.
34. Which of the following is record based logical model ?
Choose the right option
[A] Network model
[B] Object oriented model
[C] E-R model
[D] All of these.
[E] None.
35. The full form of the DDL.
Choose the right option
[A] Dynamic Data Language
[B] Detailed Data Language
[C] Data Definition Language
[D] Data Derivation Language
[E] All of these
36. Which of the following virus overtake computer system when it boots and destroy information.
Choose the right option
[A] Trojan
[B] System infectors.
[C] Boot infectors.
[D] Stealth virus.
[E] None of these.
37. The relational model includes two general integrity rules. Integrity rule 1 is concerned with........... and integrity rule 2 is concerned with ...........
Choose the right option
[A] Primary key, foreign key
[B] Primary key,composite key.
[C] Unique key , foreign key.
[D] Composite key,foreign key
[E] None of these
38. ............. is person who has the central control over both data and application Programs.
Choose the right option
[A] System engineer
[B] Database administrator
[C] Database manager
[D] Technical analyst
[E] None of these
39 . An attribute of a relation that references the primary key of another relation is known as the......................
Choose the right option
[A] Foreign key
[B] Unique key
[C] Parent key
[D] Child key
[E] Index key
40. An entity set that doesn’t have sufficient attributes to form a primary key is a
Choose the right option
[A] Strong entity set
[B] Weak entity set
[C] Simple entity set
[D] Primary entity set
[E] None of these
41. The JDBC-ODBC bridge is
Choose the right option
[A] Three tiered
[B] Multithread
[C] Best for any platform
[D] All of these
[E] None of these.
42.In a relational database ,this is a data structure that organises the information about a single topic into rows and columns.
Choose the right option
[A] Block
[B] Record
[C] Tuple
[C] Table
[E] None
43. Which statement about the java language are true ?
Choose the right option
[A] Java supports both procedural and object oriented programming
[B] Java is only a procedural language.
[C] Java is only an object –oriented .
[D] Java is related to
[E] None of the above.
44. Stack is also called ...........
Choose the right option
[A] First in first out (FIFO)
[B] Last in first out(LIFO)
[C] First in last out(FILO)
[D] First come first served(FCFS)
[E] None of the above
45. The index created by primary key column is called .........
Choose the right option
[A] Unique index
[B] Composite index
[C] Single index
[D] Primary index
[E] None of these
46.In sql ,which comman(s) is(are) used to remove rows from a table.
Choose the right option
[A] Delete
[B] Remove
[C] Truncate
[D] Both (1) and (3)
[E] none
47.In Sql , the create table is used
Choose the right option
[A] To create a table ,definition its columns,integrity constraints. And storage allocation.
[B] To add a column/integrity constraint to a table.
[C] To redefine a column
[D] To change a tables storage characteristics
[E] All of the above
48. What is the abbreviation used for a software package that permits the user to create , retrieve and maintain records in a data base ?
Choose the right option
[A] Dasd
[B] CRMD
[C] DBMS
[D] All of these
[E] None of the above
49. Choose the right sequence of virus stages
Choose the right option
[A] Triggering ,damage, Dormancy,propagation
[B] Damage ,Triggering ,Dormancy ,Propagation
[C] Damage ,Triggering ,propagation, Dormancy
[D] Triggering ,Damage ,propagation,dormancy
[E] Dormancy,propagation ,Triggering,Damage
50.In sql , which command is used to add new rows to a table
Choose the right option
[A] Alter table
[B] Add row
[C] Insert
[D] Append
[E] None
Choose the right option
[A] RDBMS , bus
[B] Operating system, star
[C] Java, bus
[D] Data mining, star or multidimensional.
[E] None of these
27. Arrange the following in increasing order of their size.
Choose the right option
[A] Database
[D] Bit>byte>file record>field>database
[E] None of these
Choose the right option
[A] C language.
[B] .net programming
[C] RDBMS
[D] C++ LANGUAGE
[E] Java byte code.
Choose the right option
[A] Structured query language
[B] C language
[C] C++
[D] Net
[E] none
Choose the right option
[A] Increased security
[B] Elimination data redundancy
[C] Ability to associate related data.
[D] Programming/ data independence
[E] All of above
Choose the right option
[A] Tuple;attribute
[B] Attribute;tuple
[D] Attribute;domain
[E] None
Choose the right option
[A] Delete
[B] Update
[C] Drop
[D] Alter
[E] None of these
Choose the right option
[A] Parent-child relationship b/w the tables that connect them.
[B] Many to many relationship between the tables that connect them.
[C] Network model b/w the tables that connects them.
[E] None of the above.
Choose the right option
[A] Network model
[B] Object oriented model
[C] E-R model
[D] All of these.
[E] None.
Choose the right option
[A] Dynamic Data Language
[B] Detailed Data Language
[C] Data Definition Language
[D] Data Derivation Language
[E] All of these
Choose the right option
[A] Trojan
[B] System infectors.
[C] Boot infectors.
[D] Stealth virus.
[E] None of these.
Choose the right option
[A] Primary key, foreign key
[B] Primary key,composite key.
[C] Unique key , foreign key.
[D] Composite key,foreign key
[E] None of these
Choose the right option
[A] System engineer
[B] Database administrator
[C] Database manager
[D] Technical analyst
[E] None of these
Choose the right option
[A] Foreign key
[B] Unique key
[C] Parent key
[D] Child key
[E] Index key
Choose the right option
[A] Strong entity set
[B] Weak entity set
[C] Simple entity set
[D] Primary entity set
[E] None of these
Choose the right option
[A] Three tiered
[B] Multithread
[C] Best for any platform
[D] All of these
[E] None of these.
Choose the right option
[A] Block
[B] Record
[C] Tuple
[C] Table
[E] None
Choose the right option
[A] Java supports both procedural and object oriented programming
[B] Java is only a procedural language.
[C] Java is only an object –oriented .
[D] Java is related to
[E] None of the above.
Choose the right option
[A] First in first out (FIFO)
[B] Last in first out(LIFO)
[C] First in last out(FILO)
[D] First come first served(FCFS)
[E] None of the above
Choose the right option
[A] Unique index
[B] Composite index
[C] Single index
[D] Primary index
[E] None of these
Choose the right option
[A] Delete
[B] Remove
[C] Truncate
[D] Both (1) and (3)
[E] none
Choose the right option
[A] To create a table ,definition its columns,integrity constraints. And storage allocation.
[B] To add a column/integrity constraint to a table.
[C] To redefine a column
[D] To change a tables storage characteristics
[E] All of the above
Choose the right option
[A] Dasd
[B] CRMD
[C] DBMS
[D] All of these
[E] None of the above
Choose the right option
[A] Triggering ,damage, Dormancy,propagation
[B] Damage ,Triggering ,Dormancy ,Propagation
[C] Damage ,Triggering ,propagation, Dormancy
[D] Triggering ,Damage ,propagation,dormancy
[E] Dormancy,propagation ,Triggering,Damage
Choose the right option
[A] Alter table
[B] Add row
[C] Insert
[D] Append
[E] None
thank u.. its awsome :)
ReplyDeleteI will share this link in FB
ReplyDeleteCoz it's nowhere except here
great work, thanks :)
ReplyDeletegood job
ReplyDeletethanks great work !helpful
ReplyDeleteReally grt work done..Plz update 2013 and 2014 papers with answers too..
ReplyDeletetyvm
ReplyDeleteque no 50
ReplyDeletec option is correct
realy awsm
ReplyDeletethanks a tonne
ReplyDelete