Database Interview Questions and Answers

201. A list in alphabetical order

A. is in descending order
B. is in ascending order
C. is the result of a sort operation
D. both (b) and (c)
Ans: D

202. If a piece of data is stored in two places in the database, then

A. storage space is wasted
B. changing the data is one spot will cause data inconsistency
C. it can be more easily accessed
D. both (a) and (b)
Ans: D

203. A data dictionary is a special file that contains

A. the names of all fields in all files
B. the data types of all fields in all files
C. the widths of all fields in all files
D. All of the above
Ans: D


204. A file that is organized in uniform format is formally referred to as a _____ or a database file.

A. Document                                                        B. Database
C. Record                                                            D. Structured data file
Ans: D

205. A form can be used to

A. modify records                                                            B. delete records
C. format printed output                                                   D. All of the above
Ans: D

206. Which language has recently become the de-facto standard for interfacing application programs with relational database system?

A. Oracle                                                              B. SQL
C.  dBase                                                              D.4GL
Ans: B

207. In SQL, the CREATE TABLE is used

A. to create a table, defining its columns, integrity constrains, and storage allocation
B. to add a column/integrity constraint to a table
C. to redefine a column
D. to change a table's storage characteristics
Ans: A


208. Which of the following is not true of the traditional approach to information processing?

A. There is common sharing of data among the various applications
B. It is file-oriented
C. Programs are dependent on the files
D. It is inflexible
Ans: A

209. Batch processing is appropriate if  

A. a large computer system is available
B. only a small computer system is available
C. only a few transactions are involved
D. All of the above
Ans: E

210. What is the abbreviation used for a software package that permits the users to create, retrieve and maintain records in a database?

A.DASD                                                             B. FMS
C. EMMS                                                           D.DBMS
Ans: D

211. Which of the following is not an advantage of the data-base approach?

A. elimination of the data redundancy
B. ability to associate related data
C. increased security
D. program/data independence
E. All of the above are advantages
Ans: E

212. A data dictionary doesn't provide information about:

A. where data is located
B. the size of the disk storage device
C. It allows a many-to-many relationship
D. It is conceptually simple
Ans: B

213. Data encryption techniques are particularly useful for

A. reducing storage space requirements
B. improving data integrity
C. protecting data in data communication systems
D. All of the above
Ans: C

214. It is more accurate to define a _____ as a variety of different record types that are treated as a single unit  

A. Database                                                              B. Table
C. Record                                                                 D. Flat File
Ans: A
.
215. A logical schema

A. is the entire database
B. is a standard way of organizing information into accessible parts
C. describes how data is actually stored on disk
D. All of the above
Ans: B

216. Queries to a database

A. are written in English
B. can use aggregate functions like SUM and COUNT
C. both (a) and (b)
D. All of the above
Ans: B

217. In order to use a record management system

A. You need to understand the low-level details of how information in stored
B. You need to understand the model the record management system uses.
C. Both (a) and (b)
D. All of the above
Ans: B

218. In SQL, which command is used to select only one copy of each set of duplicable rows

A.SELECT DISTINCT                                      B. SELECT UNIQUE
C. SELECT DIFFERENT                                  D. All of the above
Ans: A

219. The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in

A .a tree file                                                       B. an indexed file
C. a hashed file                                                  D. a sequential file
Ans: C

220. Which command is used to select distinct subject (SUB) from the table (BOOK)?

A.SELECT ALL FROM BOOK
B. SELECT DISTINCT SUB FROM BOOK
C. SELECT SUB FROM BOOK
D. All of the above
Ans: B

221. The master list of an indexed file

A. is sorted in ascending order
B. contains only a list of keys and record numbers
C. has a number assigned to each record
D. both (b) and (c)
Ans: C

222. Which of the following is not the responsibility of the utilities component of DBMS software?

A. creating the physical and logical designs
B. removing flagged records for deletion
C. creating and maintaining the data dictionary
D. monitoring performance
Ans: A


223. In SQL, the CREATE TABLESPACE is used to create a place in the database for storage of scheme objects, rollback segments, and

A. naming the data files to comprise the table space
B. to create a database trigger
C. to add/rename data files, to change storage
D. All of the above
Ans: A

224. In SQL, which command is used to remove a stored function from the database?

A.REMOVE FUNCTION
B. DELETE FUNCTION
C. DROP FUNCTION
D.ERASE FUNCTION
Ans: C

225. The database administration function includes

A. application programming
B. computer operations management
C. database access planning
D. All of the above
Ans: C

226. A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As

A. tables                                                      B. relations
C.  tuple                                                      D. both (a) and (b)
Ans: D

227. A command that lets you change one or more fields in a record is

A. Insert                                          B. Modify
C. Look-up                                     D. All of the above
Ans:  B

228. The designer of a form includes

A. filed designators                              B. prompts
C. data                                                D. both (a) and (b)
Ans: D



Database Interview Questions and Answers

151. An indexing operation

A. sorts a file using a single key
B. sorts file using two keys
C. establishes an index for a file
D. both (b) and (c)
Ans: C


152. The on-line, softcopy display a customer's charge account to respond to an inquiry is an examples of a

A. forecasting report
B. exception report
C. regularly scheduled report
D. on demand report
Ans: D


153. In SQL, which command(s) is(are) used to create a synonym for a schema object?

A.CREATE SCHEMA                   B. CREATE SYNONYM
C. CREATE SAME                        D. All of the above 
Ans: B

154. If you want your database to include methods, you should use a _____ database.

A. Network                                 B. Distributed
C. Hierarchical                             D. Object-Oriented
Ans: D

155. In SQL, which of the following is not a data Manipulation Language Commands?

A.DELETE                                 B. SELECT
C. UPDATE                                D.CREATE
Ans: D


156. Which of the following is not characteristic of a relational database model?

A. tables                                                              B. treelike structure
C. complex logical relationships                            D. records
Ans: B


157. A computer file contains several records. What does each record contain?

A. Bytes                                                             B. Words
C. Fields                                                             D. Database
Ans: C


158. In SQL, the CREATE VIEW command is used

A. to recompile view
B. to define a view of one or more tables or views
C. to recompile a table
D. to create a trigger
Ans: B

159. A ____ Contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

A. File structure                                             B. Records
C. Fields                                                        D. Database
Ans: C


160. In the DBM approach, application programs perform the

A. storage function                                      B. processing functions
C. access control                                        D. All of the above
Ans: B

161. In SQL, which command is used to create a database user?

A.ADD USER TO DATABASE                          B. MK USER
C. CREATE USER                                              D. All of the above
Ans: C


162. When performing a look-up operation using a form

A. you enter the search value into the form
B. you look at each form sequentially until you see the one you want
C. you type the key in an entry line, and the correct form is displayed
D. All of the above
Ans: A


163. A _____ means that one record in a particular record type is related to only one record of another record type.

A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
D. Many-to-many relationship
Ans: A

164. A _____ database does not use pointers or physical links, but instead finds related records by examining the contents of fields.

A. Network                                          B. Hierarchical
C. Relational                                         D. Object-Oriented
Ans: C

165. In SQL, which command(s) is(are) used to redefine an index's future storage allocation

A.ALTER INDEX                              B. REDEFINE INDEX
C. MODIFY INDEX                         D. DO INDEX
Ans: A

166. Which of the following is a serious problem of file management systems?

A. difficult to update
B. lack of data independence
C. data redundancy
D. program dependence
E. All of the above
Ans: E

167. With respect to data input, the most accurate description of batch control is

A. dividing documents to be entered into batches
B. controlling the input of each input clerk comparing to a pre-calculated figure the total of a data item summed across a batch records
C. put into the system
D. All of the above
Ans: C


168. The model for a _____ resembles the hierarchical model in many respects.

A. Network database
B. Relational database
C. Distributed database
D. Hierarchical database
Ans: A

169. A set of programs that handle a firm's data base responsibilities is called a

A. Data Base Management System (DBMS)
B. Data Base Processing System (DBPS)
C. Data Management System (DMS)
D. All of the above
Ans: D

 

170. Long-range planning report produced in an MIS are primarily designed for

A. top management
B. middle management
C. lower management
D. All of the above
Ans: A

171. The model for a record management system might be

A. handwritten list                                 B. a Rolodex card file
C. a business form                                D. All of the above
Ans: D

172. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?

A. report writer                                                 B. query language
C. data manipulation language                            D. transaction log
Ans: D

173. Two files may be joined into a third file if

A. they have a row in common
B. they have a field in common
C. they have no records with the same value in the common field
D. both (b) and (c)
Ans: B

174. Characteristic(s) of a distributed MIS structure is

A.  interactive sharing of the workload
B. a multiprocessing environment
C. computers supporting local DP operations
D. All of the above
Ans: D


175. The data-base environment has all of the following components except:

A. users                                            B. separate files
C. data base                                     D. data-base administrator
Ans: B


176. The way a particular application views the data from the data base that the application uses is

A. module                                     B. relational model
C. schema                                    D. subschema
Ans: D

177. A compound key

A. is made up a several pieces of information
B. uniquely identifies an item in a list
C. both (a) and (b)
D. is a combination of each unique key
Ans: C

178. The distinguishable parts of a record are called

A. files                                                                B. data
C. fields                                                              D. database
Ans: C


179. Large collections of files are called

A. fields                                                         B. records
C. databases                                                  D. file system
Ans: C


180. The index consists of

A. a list of keys
B. pointers to the master list
C. both (a) and (b)
D. All of the above
Ans: C


181. In SQL, which command is used to select data in rows and column from one or more tables?

A.CHOOSE                                       B. SELECT
C. LIST                                              D.BROWSE
Ans: B

182. A scheme describes

A. data elements
B. records and files
C. record relationships
D. All of the above
Ans: D


183. If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it

A. Delete                                     B. Update
C. Sort Key                                 D .Index
Ans: D

184. The modify operation is likely to be done after

A. Delete                                    B. Look-up
C. Insert                                     D. All of the above
Ans: B

185. One data dictionary software package is called

A.DB/DC dictionary                           B. TOTAL
C. ACCESS                                       D. any of the above
Ans: A
.

186. One approach to standardizing storing of data

A.MIS
B. structured programming
C. CODASYL specifications
D. All of the above
Ans: C


187. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?

A. Special purpose packages
B. Custom made programs
C. Single function application packages
D. Data management packages
Ans: D


188. A multiple-form file management system

A. lets you define different forms for different operations lets you create a look-up form with an associated read-only password to prevent access by
B. unauthorized users
C. both (a) and (b)
D. allow you to entry data in all the forms
Ans: C

189. The term _____ is sometimes used to refer to a data file in which all the records have the same record format, that is, the same field names, field lengths, and data types.

A. Database                                                 B. Table
C. Flat file                                                    D. Data structure
Ans: C

190. A _____ Contains fields of data about one entity.

A. Record                                                B. File
C. Fields                                                  D. Document
Ans: A


191. A condition that led to the development of databases was

A. a demand for more data to support information needs
B. an increase in the amount of data handled by organizations
C. the proliferation of data files
D. All of the above .
Ans: D


192. The _____ command is used to allocates an extent for the table in SQL

A.MODIFY ALLOCATES
B. MODIFY TABLE
C. ALTER TABLE
D.REDEFINE TABLE
Ans: A


193. Embedded pointer provide

A. a secondary access path
B. a physical record key
C. an inverted index
D. All of the above
Ans: A

194. Which of the following is a type of DBMS software?

A. database manipulation language
B. query language
C. utilities
D. report writer
Ans: A


195. Data items grouped together for storage purposes are called a

A. record                                               B. title
C. list                                                     D. string
Ans: A


196. The activity of a file

A. is a low percentages of number of records added or deleted from a file
B. if high, reduces processing efficiency for sequential and non sequential files
C. is a measure of the percentage of existing records updated during a run
D. refers to how closely the files fits into the allocated
Ans: A


197. Versatile report generators can provide

A. Columnar totals                                                          B. Subtotals
C. Calculations                                                                D. All of the above
Ans: D


198. Related fields in a data base are grouped to form

A. data file                                                                   B. data record
C. menu                                                                       D. bank
Ans: B

199. A _____ means that one record in a particular record type can be related to many records in another record type and vice-versa.

A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
D. Many-to-many relationship
Ans: D

200. In SQL, the _____ command is used to recompile a view

A.COMPILE VIEW                                                B. DEFINE VIEW
C. CREATE VIEW                                                  D.ALTER VIEW
Ans: D



Database Interview Questions and Answers

101. A large computer information system maintains many different computer files. Which amongst them is called a perpetual file?

A. Specialized file                                     B. Log file
C. Master file                                           D. Update file
 Ans: C

102. A file produced by a spreadsheet

A. is generally stored on disk in an ASCII text format
B. can be used as it by the DBMS
C. can be used for graphic
D. All of the above
Ans: A

103. A form defines

A. where data is placed on the screen
B. the width of each field
C. both (a) and (b)
D. All of the above
Ans: C

104. Which of the following is true of a network structure?

A. It is a physical representation of the data
B. It allows a many-to-many relationship
C. It is conceptually simple
D. It will be the dominant data base of the future
Ans: B

105. Which of the following fields in a student file can be used as a primary key?

A. class                                         B. Social Security Number
C. GPA                                         D. Major
Ans: B


106. Which of the following is not an advantage of the database approach?

A. Elimination of data redundancy
B. Ability of associate deleted data
C. increased security
D. program/data independence
E. all of the above
Ans: E

107. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?

A. report writer                                           B. query language
C . data manipulation language                     D. transaction log
Ans: D

108. In the DBMS approach, application programs perform the

A. storage function                                B. processing functions
C. access control                                  D. all of the above none of the above
Ans: B

109. A set of programs that handle a firm's database responsibilities is called

A. database management system (DBMS)
B. database processing system (DBPS)
C. data management system (DMS)
D. all of above
Ans: D

110. Which is the make given to the database management system which is able to handle full text data, image data, audio and video?

A. full media                               B. graphics media
C. multimedia                             D. hypertext
Ans: C

111. A record management system

A. can handle many files of information at a time
B. can be used to extract information stored in a computer file
C. always uses a list as its model
D. both a and b
Ans: B

112. A command that lets you change one or more fields in a record is

A. insert                                            B. modify
C. lookup                                         D. none of above
Ans: B

113. A transparent DBMS

A. cannot hide sensitive information from users
B. keeps its logical structure hidden from users
C. keeps its physical structure hidden from users
D. both b and c
Ans: C

114. A file produced by a spreadsheet

A. is generally stored on disk in an ASCII text fromat
B. can be used as is by the DBMS
C. both a and b
D. none of the above
Ans: A

115. The ascending order of a data hierarchy is:

A. bit-byte-record-field-file-database
B. byte-bit-field-record-file-database
C. bit-byte-field-record-file-database
D. bit-byte-file-record-field-database
Ans: C

116. Which of the following is true of a network structure?

A. t is a physical representation of the data
B. It allows a many-to-many relationship
C. It is conceptually simple
D. It will be dominant data base of the future
Ans: B

 

117. Which of the following is a problem of file management system?

A. difficult to update
B. lack of data independence
C. data redundancy
D. program dependence
E. all of above
Ans: E

118. One data dictionary software package is called

A. DB/DC dictionary
B. TOTAL
C. ACCESS
D. Database
E. Data Manager
Ans: A

119. The function of a database is ...

A. to check all input data
B. to check all spelling
C. to collect and organize input data
D. to output data
Ans: C

120. What is the language used by most of the DBMSs for helping their users to access data?

A. High level language
B. SQL
C. Query Language
D. 4GL
Ans: C

121. Referential integrity means

A. Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table
B. Do not enter a value in the primary key field of chield table if that value does not exist in the primary key of the parent table
C. Do not enter a value in the foreign key field of a parent table if that value does not exist in the primary key of the child table
D. All of above
Ans: A

122.  Cascade delete option

A. is used to delete all the records of all tables in a database
B. will repeat the recent delete operation to all the records of current table
C. is available in Edit relatiionship dialog box which makes sure that all the related records will be deleted automatically whn the record from parent table is deleted
D. None of above
Ans: C

 

 123. cascade update option

A. means do not change the value in the primary key field if that record has related records in another table
B. means change all the related records in child tables if the record in parent table is changed
C. Both of above
D. None of above
Ans: C

124. We can remove a relationship defined between two tables by

A. From Edit menu choose Delete Relationship
B. Select the relationship line and press Delete
C. Choose Delete option from Relationship menu
D. All of above
Ans: B

125. If you need to edit a relationship

A. Right click the relationship line and choose Edit Relationship
B. Double click the relationship line
C. Both of above
D. None of above
Ans: C

126. If you write criteria values vertically (one in a row) it will mean

A. OR conditions
B. AND conditions
C. NOT condition
D. None of above
Ans: A

 

127. A search value can be an exact value or it can be

A. Logical Operator
B. Relationship
C. Wild card character
D. Comparison operation
Ans: C

128. Both conditions display on the same row in the design grid when ___operator is in use

A. OR                                                 B. IN
C. AND                                              D. LIKE
Ans: C

 

129. the two form layout types will display multiple records at one time are tabular and___

A. columnar                                      B. justified
C. date sheet                                     D. pivot table
Ans: B

130. You can automatically include all of the field in a table in a query by___ a strike that appear list box in query design view

A. Clicking                                      B. Right clicking
C. Double clicking                           D. None of the above
Ans: C

131. The___ operator will cause a record to be selected only if two or more conditions are satisfied
A. Or                                                    B. If or
C. Range                                               D. And
Ans: D

132. When a picture or other graphic image is placed in the report header section it will appear____

A. Once in the bugging of the report
B. At the top of every page
C. Every after record break
D. On the 1st and last pages of the report
Ans: A

133. To duplicate a controls formatting you can use___

A. Manager                              B. Wizard
C. Painter                                 D. Control
Ans: C

 

134. The__ button on the tool box display data from a related table

A. Sub form sub report
B. Relationships
C. Select objects
D. More controls
Ans: A

135. You can set a controls border type to make the border invisible.

A. Transparent
B. Invisible
C. Do not display
D. No border
Ans: C

136. A __ name must be unique within a database

A. Table                                          B. Field
C. Record                                       D. Character
Ans: A

137. The expression builder is an access tool that controls an expression___ for entering an expression

A. Table                                       B. Box
C. Cell                                         D. Palette
Ans: B

138. Data security threats include

A.  hardware failure                                      B. privacy invasion

.C. fraudulent manipulation of data                D. All of the above

Ans: B

139. In SQL, which command is used to add a column/integrity constraint to a table

A.ADD COLUMN                          B. INSERT COLUMN
C. MODIFY TABLE                        D.ALTER TABLE  
Ans: D


140. In SQL, which command is used to changes data in a table?

A.UPDATE                                     B. INSERT
C. BROWSE                                   D.APPEND
Ans: A


141.  What name is given to the collection of facts, items of information or data which are related in some way?

A. Database                                     B. Directory information
C. Information tree                           D. Information provider
Ans: A

142. In a large DBMS

A. each user can "see" only a small part of the entire database
B. each user can access every sub¬schema
C. each subschema contains every field in the logical schema
D. All of the above
Ans: A

143. Which of the following command(s) is (are) used to recompile a stored procedure in SQL?

A.COMPILE PROCEDURE                               B. ALTER PROCEDURE
C. MODIFY PROCEDURE                                D. All of the above
Ans: B


144. Internal auditors should review data system design before they are

A. developed                                                        B. implemented
C. modified                                                           D. All of the above
Ans: D


145. A _____ means that one record in a particular record type may be related to more than one record of another record type.

A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
D. Many-to many relationship
Ans: B

146. Which command(s) is(are) used to redefine a column of the table in SQL ?

A.ALTER TABLE                            B. DEFINE TABLE
C. MODIFY TABLE                       D. All of the above
Ans: A

147. Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL?

A.DEFINE TABLE                        B. MODIFY TABLE
C. ALTER TABLE                         D. All of the above
Ans: C

147. In SQL, the ALTER TABLESPACE command is used

A. to add/rename data files
B. to change storage characteristics
C. to take a table space online/offline
D. to begin/end a backup
Ans: E


148. The language used in application programs to request data from the DBMS is referred to as the

A.DML                                                  B. DDL
C. query language                                   D. All of the above
Ans: A


149. A database management system might consist of application programs and a software package called

A.FORTRAN                                   B. AUTOFLOW
C. BPL                                             D.TOTAL
Ans: C


150.  A race condition occurs when

A. Two concurrent activities interact to cause a processing error
B. two users of the DBMS are interacting with different files at the same time
C. both (a) and (b)
D. All of the above
Ans:  A



Database Interview Questions and Answers

51. Which Of The Following Store Command To Retrieve Data From Database?

A. Forms                             B. Reports
C. Queries                           D. Tables
Ans: C

52. Which Of The Following Database Object Produces The Final Result To Present?

A. Forms                       B. Reports
C. Queries                     D. Tables
Ans: B

53. Goals for the design of the logical schema include

A. avoiding data inconsistency
B. being able to construct queries easily
C. being able to access data efficiently
D. All of the above
Ans: D

54. In SQL, which command(s) is(are) used to change a table's storage characteristics?

A.ALTER TABLE                            B. MODIFY TABLE
C. CHANGE TABLE                      D. All of the above
Ans: A

55. In SQL, which of the following is not a data definition language commands?
A.RENAME                             B. REVOKE
C. GRANT                               D.UPDATE
Ans: D

56. Subschema can be used to

A. create very different, personalized views of the same data
B.   present information in different formats
C.   hides sensitive information by omitting fields from the sub¬schema's description
D. All of the above
Ans: D

57. Database management systems are intended to:

A. eliminate data redundancy
B. establish relationships among records in different files
C. manage file access
D. maintain data integrity
Ans: E

58. In SQL, which command(s) is (are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction?

A.CREATE PACKAGE                                   B. CREATE SCHEMA
C. CREATE CLUSTER                                   D. All of the above
Ans: B

59. Which of the following is not a relational database?

A. dBase IV                       B. 4th Dimension
C. FoxPro                          D. Reflex
Ans: D

60.  In order to use a record management system

A. you need to understand the low level details of how information is stored
B. you need to understand the model the record management system uses
C. bother a and b
D. none of the above
Ans: C

61. Sort/Report generators

A. are faster than index/report generators
B. require more disk space than indexed/report generators
C. do not need to sort before generating report
D. both a and b
Ans: B

62. If a piece of data is stored in two places in the database, then

A. storage space is wasted
B. changing the data in one spot will cause data inconsistency
C. in can be more easily accessed
D. both a and b
Ans: D

63. What is the name given to the database management system which is able to handle full text data, image data, audio and video?

A. Full media                   B. Graphics media
C. Multimedia                  D. Hypertext
Ans: C

64. A top-to-bottom relationship among the items in a database is established by a

A. Hierarchical schema              B. Network schema
C. Relational schema                 D. All of the above
Ans: A

65. A database management system

A. allows simultaneous access to multiple files
B. can do more than a record management system
C. is a collection of programs for managing data in a single file
D. both (a) and (b)
Ans: D


66. Which of the following hardware components is the most important to the operation of a database management system?

A. high-resolution video display
B. printer
C. high speed, large-capacity disk
D. plotter
Ans: C

67. The PROJECT command will create new table that has

A. more fields than the original table
B. more rows than the original table
C. both (a) and (b)
D. all the fields of master table
E. None of the above
Ans: E

68. To have a file hold a list, it is necessary to

A. identify the records in the list
B  identify the name, width and type of the fields of each record.
C. decide which fields will be used as sort or index keys
D. All of the above
E. None of the above
Ans: D

69. Sophisticated report generators can

A. print row-oriented reports
B. perform arithmetic operations
C. selectively retrieve and print portions of a list
D. All of the above
Ans: D


70. Which Of The Following Is A Method To Create A New Table In Ms Access?

A. Create Table In Design View
B. Create Table Using Wizard
C. Create Table By Entering Data
D. All Of Above
Ans: D

71. To Create A New Table, In Which Method You Don’t Need To Specify The Field Type And Size?

A. Create Table In Design View
B. Create Table Using Wizard
C. Create Table By Entering Data
D. All Of Above
Ans: C

72. When Creating A New Table Which Method Can Be Used To Choose Fields From Standard Databases And Tables

A. Create Table in Design View
B. Create Table Using Wizard
C. Create Table by Entering Data
D. None Of Above
Ans: B

73. In Table Design View, Which Key Can Be Used To Switch Between The Field Names And Properties Panels?

A. F3                                           B. F4
C. F5                                           D. F6
Ans: D

74. In Table Design View What Are The First Column Of Buttons Used For

A. Indicate Primary Key
B. Indicate Current Row
C. Both Of Above
D. None Of Above
Ans: C

75. The Default And Maximum Size Of Text Field In Access

A. 50 And 255 Characters
B. 8 And 1 Gb
C. 266 Characters & 64000 Characters
D. None Of Above
Ans: A

76. The Size Of Yes No Field Is Always

A. 1 Bit                                  B. 1 Byte
C. 1 Character                       D. 1 Gb
Ans: A

77. Which Of The Following Is Not A Field Type In Access

A. Memo                           B. Hyperlink
C. Ole Object                    D. Lookup Wizard
Ans: D

78. Which Field Type Will You Select When Creating A New Table If You Require To Enter Long Text In That Field?

A. Text                                               B. Memo
C. Currency                                       D. Hyperlink
Ans: B

 79. Which Field Type Can Store Photos?

A. Hyperlink
B. Ole
C. Both Of These Can Be Used
D. Access Tables Can’t Store Photos
Ans: B

80. When Entering Field Name, How Many Characters You Can Type In Maximum?

A. 60                                                          B. 64
C. 68                                                         D. Any Number Of Character
Ans: B

81. After Entering All Fields Required For A Table, If You Realize That The Third Field Is Not Needed, How Will You Remove?

A. You Need To Delete The Whole Table. There Is No Method To Remove A Particular Field Only.
B. Delete All The Fields From Third Downwards And Reenter The Required Fields Again.
C. Select the Third Column In Datasheet View Then Delete
D. Select The Third Row In Table Design View Then Delete
Ans: D

82. How Can You Define A Field So That When Entering Data For That Field It Will Display ****** Instead Of Actual Typed Text

A. Input Mask                                       B. Validation Rule
C. Indexed                                            D. Ime Mode
Ans: A

83. Which two files are used during operation of the DBMS?

A. query language and utilities
B. data manipulation language and query language
C. data dictionary and transaction log
D. data dictionary and query language
Ans: C

84. When using a database management system, the first thing that you must do is to

A. create a database file
B. activate file editor
C. load the software into your microÂcomputer
D. keeps a floppy disk in readiness
Ans: C

85. A network schema

A. restricts the structure to a one-to-many relationship
B. permits many-to-many relationÂships
C. stores data in tables
D. All of the above
Ans: B


86. Which of the following is not a relational database?
A.  dBase IV                                 B. 4th Dimension
C. FoxPro                                     D. Reflex
Ans: D

87. Which command is used to remove a table from the database in SQL?

A.DELETE TABLE
B. DROP TABLE
C. ERASE TABLE
D.UNATTACH TABLE
Ans: B

88. To Sort Records In A Table

A. Open Table, Click On The Field On Which The Sorting Is To Be Done, Then Click Sort Button On Database Toolbar
B. Open Table, Click Sort Button On Database Toolbar, Choose Field Based On Which To Sort, Click Ok
C. Click The Field Heading To Sort It Ascending Or Descending
D. All Of Above
Ans: A

89. Queries in Access can be used as

A. view, change and analyze data in different ways
B. a source of records for forms and reports
C. Only a
D. Both a and b
Ans: D

90. To create queries in Access

A. You can drag and drop fields on query builders
B. you can type the SQL command in SQL view
C. You can use query wizard or design view
D. All of above
Ans: D

91. Query design window has two parts. The upper part shows

A. Name of fields, field type and size
B. Tables with fields and relationships between tables
C. Criteria
D. Sorting check boxes
Ans: B

92. What does the show check box in query design window indicate?

A. It indicates whether the field is to be used or not
B. It indicates whether the field is to be displayed in query result or not
C. It indicates whether the field names to be displayed in query result or not
D. None of above
Ans: B

93. What is a form in MS Access

A. It is a printed page where users will write their data to fill it up
B. It is an input screen designed to make the viewing and entering data easier
C. This is an important part of database used by analysts to draw conclusions
D. All of above
Ans: B

94. Which of the following statement is true

A. Reports can be used to retrieve data from tables and calculate
B. Queries can be printed in well formatted manner and presented as the information
C. Queries can include calculated fields that do not exist in table
D. Reports and forms are similar but forms are use to print but reports to display on screen only
Ans: C

95. Two tables can be linked with relationship so that the data integrity can be enforced. Where can you find Relationship Command?

A. File menu                                                  B. View Menu
C. Database Menu                                         D. Tools Menu
Ans: D

96. Which of the following is not a type of relationship that can be applied in Access database

A. One to One                                            B. One to Many
C. Many to Many                                        D. All of above can be applied
Ans: D

97. To create relationship between two tables

A. drag the primary key of a table into foreign key of another table
B. drag the foreign key of a table into the primary key of another table
C. drag any field from parent table and drop on child table
D. Any of above can be done to create relationship
Ans: A

98. While creating relationship, when you drag a field of a field to drop into another table the mouse pointer changes into

A. a doctor’s sign
B. thin + sign
C. outline rectangle
D. None of above
Ans: C

99. What happens when you release mouse pointer after you drop the primary key of a table into foreign key of another table?

A. A relationship is created
B. Edit relationship dialog box appears
C. Error occurs
D. Nothing happens
Ans: B

100. What do you mean by one to many relationship between Student and Class table?

A. One student can have many classes
B. One class may have many student
C. Many classes may have many students
D. Many students may have manu classes
Ans: A 


Database Interview Questions and Answers

1. The relational database environment has all of the following components except

A.   users                                              B. separate files
C. database                                          D. query languages
Ans:  B

2. One approach to standardization storing of data?

A. MIS                                                 B. structured programming
C. CODASYL specification                  D. none of the above
Ans: C

3. The language used application programs to request data from the DBMS is referred to as the

A. DML                                              B. DDL
C. query language                                D. any of the above
Ans:  A

4. A report generator is used to

A. update files                          B. print files on paper
C.  data entry                           D. All of the above
Ans: B

5.  Which of the following is not a logical data-base structure?

A. tree                                      B. relational
C. network                               D. chain
Ans: D

6. Which of the following is a database administrator's function?

A. database design                          B. backing up the database
C.   performance monitoring            D. user coordination
E. All of the above
Ans: E

7. . Primitive operations common to all record management systems include

A. Print                                         B. Sort
C. Look-up                                  D. All of the above
Ans: C

8. What Are The Different Views To Display A Table

A. Datasheet View                               B. Design View
C. Pivot Table & Pivot Chart View       D. All Of Above
Ans: D

9. Which Of The Following Creates A Drop Down List Of Values To Choose From?

A. Ole Object                                           B. Hyperlink
C. Memo                                                  D. Lookup Wizard
Ans: D

10.  The Command Center Of Access File That Appears When You Create Or Open The Ms Access Database File.

A. Database Window                              B. Query Window
C. Design View Window                         D. Switchboard
Ans: A

11.  The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And Create A ___________ Between Tables

A. Relationship                                     B. Join
C. Query                                              D. None Of These
Ans: A

12. In a Database Table, The Category Of Information Is Called __________

A. Tuple                                             B. Field
C. Record                                          D. All Of Above
Ans: B

13. In SQL, the command(s) is (are) used to create an index for a table or cluster

A.CREATE INDEX                  B. MODIFY INDEX
C. SET INDEX TO FILE          D. All of the above
Ans: A

14. . There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?

A. Data storage system                    B. Database management system (DBMS)
C. Batch processing system             D. Data communication package

Ans: B

15.  A _____ DBMS distributes data processing tasks between the workstation and a network server.

A. Network                                   B. Relational
C. Client Server                             D. Hierarchical
Ans: C

16. . Information can be transferred between the DBMS and a

A. spreadsheet program                       B. word processor program
C. graphics program                             D. All of the above 

Ans: D

17. Choose the RDBMS which supports full fledged client server application development

A. dBase V                                             B. Oracle 7.1
C. FoxPro 2.1                                        D. Ingress
Ans: B

18. Report generators are used to

A. store data input by a user                          B. retrieves information from files
C. answer queries                                         D. both b and c
Ans: D

19. A form defined

A. where data is placed on the screen
B. the width of each field
C. both a and b
D. none of the above
Ans: A

20. A top-to-bottom relationship among the items in a database is established by a

A. hierarchical schema                         B. network schema
C. relational schema                             D. all of the above
Ans: A

21.. After you _____ a record, many data management the environments require you to issue a command to save the changes you made.

A. Delete                                        B. Update
C. Sort key                                     D .Index
Ans: B

22 . What is the language used by most of the DBMSs for helping their users to access data?  

A. High level language                          B. Query language
C. SQL                                                D.4GL
Ans: B


23. Data item characteristics that are important in data management include

A. punctuation                                             B. language
C. spelling                                                   D. width
Ans: D

24. A locked file can be

A. accessed by only one user
B. modified by users with the correct password
C. is used to hide sensitive information
D. both (b) and (c)
Ans: A

25. In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?

A.ZIP                                              B. PACK
C. COMMIT                                  D.SAVE
Ans: C

26. Periodically adding, changing and deleting file records is called file

A. Updating                                   B. upgrading
C. restructuring                              D. renewing
Ans: A

27. Sort/report generators

A. are faster than index/report generators
B. require more disk space than index/report generators
C. do not need to sort before generating a report
D. both (a) and (b)
Ans: B

28. A Database Language Concerned With The Definition Of The Whole Database Structure And Schema Is ________

A. DCL                                                B. DML
C. DDL                                                D. All Of Above
Ans: C

29. Which Of The Field Has Width 8 Bytes?

A. Memo                                             B. Number
C. Date/time                                        D. Hyperlink
Ans: C

30. Which Of The Following Statement Is True?

A. Foreign Key Fields Don\'t Allow Duplicate Values
B. In Primary Key Field You Can Enter Duplicate Value
C. In An Indexed Field You May Or May Not Enter Duplicate Value Depending Upon Setting
D. All Statements Are True
Ans: C

31. Following Is Not A Database Model

A. Network Database Model
B. Relational Database Model
C. Object Oriented Database Model
D. None
Ans: D

32. Microsoft Access Is A

A. RDBMS                                           B. OODBMS
C. ORDBMS                                        D. Network Database Model
Ans: A

33. DCL Provides Commands To Perform Actions Like

A.Change The Structure Of Tables
B. Insert, Update Or Delete Records And Data Values
C. Authorizing Access And Other Control Over Database
D. None Of Above
Ans: C

34. The Database Language That Allows You To Access Or Maintain Data In A Database

A. DCL                                                 B. DML
C. DDL                                                 D. None Of Above
Ans: A

35. What Is The Maximum Length A Text Field Can Be?

A. 120                                                B. 255
C. 265                                                D. 75
Ans: B

36. In order to use a DBMS, it is important to understand

A. the physical schema
B.   all sub-schemas that the system supports
C.   one subschema
D. both (a) and (b)
Ans: C

37. In SQL, which command(s) is(are) used to recompile a stored function?

A.SET FUNCTION                        B. SET STORED FUNCTION
C. ALTER FUNCTION                  D. All of the above
Ans: C

38. Report generators are used to

A. store data input by a user
B. retrieve information from files
C. answer queries
D. both (b) and (c)
Ans: D

39. Which of the following is not true of the traditional approach to information processing?

A. there is common sharing of data among the various applications
B. it is file oriented
C. are dependent on the file
D. it is inflexible
Ans: A

40. Which of the following hardware component is the most important to the operation of database management system?

A. high resolution video display
B. printer
C. high speed, large capacity disk
D. plotter e. mouse
Ans: C

41.  Generalized database management system do not retrieve data to meet routine request

A         True                                      B. false
Ans: B

42. Batch processing is appropriate if

A. large computer system is available
B. only a small computer system is available
C. only a few transactions are involved
D. all of the above
E. none of the above
Ans: E

43. In SQL, which command(s) is(are) used to enable/disable a database trigger?

A.MODIFY USER                 B. CHANGE USER
C. ALTER USER                    D. All of the above
Ans: C


44. If the record management system allows you to edit values before they are recorded on disk, you can

A. correct spelling changes before they are recorded
B. change the name of a field
C. change the width of a field
D. All of the above 
Ans: A


45. The relational model uses some unfamiliar terminology. A tuple is equivalent to a:

A. record                             B. field
C. file                                   D. data base .
Ans: A

46. The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain?

A. Bits                                    B. Characters
C. Data field                           D. Schema
Ans: C

47. A __________ Enables You To View Data From A Table Based On A Specific Criterion

A. Form                                 B. Query
C. Macro                               D. Report
Ans: B

48. What Are The Columns In A Microsoft Access Table Called?

A. Rows                       B. Records
C. Fields                       D. Columns
Ans: C

49. Which Of The Following Is Not A Type Of Microsoft Access Database Object?

A. Table                         B. Form
C. Worksheets               D. Modules
Ans: C

50. Which Of The Following Database Object Hold Data?

A. Forms                          B. Reports
C. Queries                        D. Tables

Ans: D


Networking Questions and Answers

61.  Which of the following communication modes support two-way traffic but in only one direction at a time?

A. simplex                                                        B. half duplex
C. three-quarters duplex                                   D. all of the above

Ans B

62.  Which of the following might be used by a company to satisfy its growing communications needs?

A. front end processor                           B. multiplexer
C. controller                                          D. concentrator
E. all of the above

Ans   E

63.  What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?

A. 4                                                                      B. 2
C. 6                                                                      D. 3

Ans  D

64.  The interactive transmission of data within a time sharing system may be best suited to

A. simplex lines                                              B. half-duplex lines
C. full duplex lines                                          D. biflex-lines

Ans   B

65.  Which of the following statement is incorrect?

A. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission.
B. Half duplex line is a communication line in which data can move in two directions, but not at the same time.
C. Teleprocessing combines telecommunications and DP techniques in online activities
D. Batch processing is the preferred processing mode for telecommunication operation.

Ans D

66. Which of the following is considered a broad band communication channel?

A. coaxial cable                                     B. fiber optics cable
C. microwave circuits                            D. all of above

Ans D

67.  Which of the following is not a transmission medium?

A. telephone lines                            B. coaxial cables
C. modem                                       D. microwave systems

Ans  C

68.  Which of the following does not allow multiple uses or devices to share one communication line?

A. duplexer                                   B. multiplexer
C. concentrator                             D. controller

Ans A

69.  Which of the following signal is not standard RS-232-C signal?

A. VDR                                           B. RTS
C. CTS                                           D. DSR

Ans A

70.  Which of the following statement is incorrect?

A. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line
B. HDLC is a standard synchronous communication protocol.
C. RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data
D. RTS/CTS is the way the terminal indicates ringing

Ans   D

71.  Which of the following is an advantage to using fiber optics data transmission?

A. resistance to data theft
B. fast data transmission rate
C. low noise level
D. all of above

Ans  D

72.  Which of the following is required to communicate between two computers?

A. communications software
B. protocol
C. communication hardware
D. all of above including access to transmission medium

Ans  D

73.  The transmission signal coding method of TI carrier is called

A. Bipolar                                      B. NRZ
C. Manchester                               D. Binary

Ans   A

74.  Which data communication method is used to transmit the data over a serial communication link?

A. simplex                                    B. half-duplex
C. full-duplex                               D. b and c

Ans:  C

75.  What is the minimum number of wires needed to send data over a serial communication link layer?

A. 1                                                          B. 2
C. 4                                                          D. 6

Ans   B

76.  Which of the following types of channels moves data relatively slowly?

A. wide band channel                           B. voice band channel
C. narrow band channel                        D. none of the above

Ans   C

77.  Most data communications involving telegraph lines use:

A. simplex lines                                               B. wideband channel
C. narrowband channel                                   D. dialed service

Ans  C

 
78.  A communications device that combines transmissions from several I/O devices into one line is a

A. concentrator                                              B. modifier
C. multiplexer                                                 D. full-duplex line

Ans   C

 
79.  How much power (roughly) a light emitting diode can couple into an optical fiber?

A. 100microwatts                                  B. 440microwatts
C. 100picowatts                                    D. 10miliwatts

Ans   A

 
80.  The synchronous modems are more costly than the asynchronous modems because

A. they produce large volume of data
B. they contain clock recovery circuits
C. they transmit the data with stop and start bits
D. they operate with a larger bandwidth

Ans   B

81.  Which of the following statement is correct?

A. terminal section of a synchronous modem contains the scrambler
B. receiver section of a synchronous modem contains the scrambler
C. transmission section of a synchronous modem contains the scrambler
D. control section of a synchronous modem contains the scrambler

Ans   C

 82.  In a synchronous modem, the digital-to-analog converter transmits signal to the

A. equalizer                                          B. modulator
C. demodulator                                    D. terminal

Ans   A

 
83. Which of the following communications lines is best suited to interactive processing applications?

A. narrow band channel                            C. simplex lines
C. full duplex lines                                     D. mixed band channels

Ans  C

84. A remote batch-processing operation in which data is solely input to a central computer would require

A. telegraph line                                      B. simplex lines
C. mixed bad channel                              D. all of above

Ans   B

85.  A band is always equivalent to

A. a byte                                                        B. a bit
C. 100 bits                                                     D. none of above

Ans   D

86.  The loss in signal power as light travels down the fiber is called

A. attenuation                                      B. prorogation
C. scattering                                        D. interruption

Ans  A

87.  Avalanche photodiode receivers can detect bits of transmitted data by receiving

A. 100photons                                     B. 200 photons
C. 2000photons                                   D. 300 photons

Ans   B

88.  Communication circuits that transmit data in both directions but not at the same time are operating in

A. a simplex mode                                  B. a half duplex mode
C. a full duplex mode                              D. an asynchronous mode

Ans   B

89. Mechanism to protect private networks from outside attack is

A.  Firewall                                 B.  Antivirus
C.  Digital signature                     D.  Formatting

Ans: A

90.  Hubs are present in the network

A. To diagnose line failures, measure and manage traffic flow and simplify re configuring of LANs.
B. To interconnect the LAN with WANs.
C. To interconnect the WANs with WANs.
D. To interconnect the WANs with LANs.

Ans: B