Database Interview Questions and Answers

101. A large computer information system maintains many different computer files. Which amongst them is called a perpetual file?

A. Specialized file                                     B. Log file
C. Master file                                           D. Update file
 Ans: C

102. A file produced by a spreadsheet

A. is generally stored on disk in an ASCII text format
B. can be used as it by the DBMS
C. can be used for graphic
D. All of the above
Ans: A

103. A form defines

A. where data is placed on the screen
B. the width of each field
C. both (a) and (b)
D. All of the above
Ans: C

104. Which of the following is true of a network structure?

A. It is a physical representation of the data
B. It allows a many-to-many relationship
C. It is conceptually simple
D. It will be the dominant data base of the future
Ans: B

105. Which of the following fields in a student file can be used as a primary key?

A. class                                         B. Social Security Number
C. GPA                                         D. Major
Ans: B


106. Which of the following is not an advantage of the database approach?

A. Elimination of data redundancy
B. Ability of associate deleted data
C. increased security
D. program/data independence
E. all of the above
Ans: E

107. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?

A. report writer                                           B. query language
C . data manipulation language                     D. transaction log
Ans: D

108. In the DBMS approach, application programs perform the

A. storage function                                B. processing functions
C. access control                                  D. all of the above none of the above
Ans: B

109. A set of programs that handle a firm's database responsibilities is called

A. database management system (DBMS)
B. database processing system (DBPS)
C. data management system (DMS)
D. all of above
Ans: D

110. Which is the make given to the database management system which is able to handle full text data, image data, audio and video?

A. full media                               B. graphics media
C. multimedia                             D. hypertext
Ans: C

111. A record management system

A. can handle many files of information at a time
B. can be used to extract information stored in a computer file
C. always uses a list as its model
D. both a and b
Ans: B

112. A command that lets you change one or more fields in a record is

A. insert                                            B. modify
C. lookup                                         D. none of above
Ans: B

113. A transparent DBMS

A. cannot hide sensitive information from users
B. keeps its logical structure hidden from users
C. keeps its physical structure hidden from users
D. both b and c
Ans: C

114. A file produced by a spreadsheet

A. is generally stored on disk in an ASCII text fromat
B. can be used as is by the DBMS
C. both a and b
D. none of the above
Ans: A

115. The ascending order of a data hierarchy is:

A. bit-byte-record-field-file-database
B. byte-bit-field-record-file-database
C. bit-byte-field-record-file-database
D. bit-byte-file-record-field-database
Ans: C

116. Which of the following is true of a network structure?

A. t is a physical representation of the data
B. It allows a many-to-many relationship
C. It is conceptually simple
D. It will be dominant data base of the future
Ans: B

 

117. Which of the following is a problem of file management system?

A. difficult to update
B. lack of data independence
C. data redundancy
D. program dependence
E. all of above
Ans: E

118. One data dictionary software package is called

A. DB/DC dictionary
B. TOTAL
C. ACCESS
D. Database
E. Data Manager
Ans: A

119. The function of a database is ...

A. to check all input data
B. to check all spelling
C. to collect and organize input data
D. to output data
Ans: C

120. What is the language used by most of the DBMSs for helping their users to access data?

A. High level language
B. SQL
C. Query Language
D. 4GL
Ans: C

121. Referential integrity means

A. Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table
B. Do not enter a value in the primary key field of chield table if that value does not exist in the primary key of the parent table
C. Do not enter a value in the foreign key field of a parent table if that value does not exist in the primary key of the child table
D. All of above
Ans: A

122.  Cascade delete option

A. is used to delete all the records of all tables in a database
B. will repeat the recent delete operation to all the records of current table
C. is available in Edit relatiionship dialog box which makes sure that all the related records will be deleted automatically whn the record from parent table is deleted
D. None of above
Ans: C

 

 123. cascade update option

A. means do not change the value in the primary key field if that record has related records in another table
B. means change all the related records in child tables if the record in parent table is changed
C. Both of above
D. None of above
Ans: C

124. We can remove a relationship defined between two tables by

A. From Edit menu choose Delete Relationship
B. Select the relationship line and press Delete
C. Choose Delete option from Relationship menu
D. All of above
Ans: B

125. If you need to edit a relationship

A. Right click the relationship line and choose Edit Relationship
B. Double click the relationship line
C. Both of above
D. None of above
Ans: C

126. If you write criteria values vertically (one in a row) it will mean

A. OR conditions
B. AND conditions
C. NOT condition
D. None of above
Ans: A

 

127. A search value can be an exact value or it can be

A. Logical Operator
B. Relationship
C. Wild card character
D. Comparison operation
Ans: C

128. Both conditions display on the same row in the design grid when ___operator is in use

A. OR                                                 B. IN
C. AND                                              D. LIKE
Ans: C

 

129. the two form layout types will display multiple records at one time are tabular and___

A. columnar                                      B. justified
C. date sheet                                     D. pivot table
Ans: B

130. You can automatically include all of the field in a table in a query by___ a strike that appear list box in query design view

A. Clicking                                      B. Right clicking
C. Double clicking                           D. None of the above
Ans: C

131. The___ operator will cause a record to be selected only if two or more conditions are satisfied
A. Or                                                    B. If or
C. Range                                               D. And
Ans: D

132. When a picture or other graphic image is placed in the report header section it will appear____

A. Once in the bugging of the report
B. At the top of every page
C. Every after record break
D. On the 1st and last pages of the report
Ans: A

133. To duplicate a controls formatting you can use___

A. Manager                              B. Wizard
C. Painter                                 D. Control
Ans: C

 

134. The__ button on the tool box display data from a related table

A. Sub form sub report
B. Relationships
C. Select objects
D. More controls
Ans: A

135. You can set a controls border type to make the border invisible.

A. Transparent
B. Invisible
C. Do not display
D. No border
Ans: C

136. A __ name must be unique within a database

A. Table                                          B. Field
C. Record                                       D. Character
Ans: A

137. The expression builder is an access tool that controls an expression___ for entering an expression

A. Table                                       B. Box
C. Cell                                         D. Palette
Ans: B

138. Data security threats include

A.  hardware failure                                      B. privacy invasion

.C. fraudulent manipulation of data                D. All of the above

Ans: B

139. In SQL, which command is used to add a column/integrity constraint to a table

A.ADD COLUMN                          B. INSERT COLUMN
C. MODIFY TABLE                        D.ALTER TABLE  
Ans: D


140. In SQL, which command is used to changes data in a table?

A.UPDATE                                     B. INSERT
C. BROWSE                                   D.APPEND
Ans: A


141.  What name is given to the collection of facts, items of information or data which are related in some way?

A. Database                                     B. Directory information
C. Information tree                           D. Information provider
Ans: A

142. In a large DBMS

A. each user can "see" only a small part of the entire database
B. each user can access every subĂ‚¬schema
C. each subschema contains every field in the logical schema
D. All of the above
Ans: A

143. Which of the following command(s) is (are) used to recompile a stored procedure in SQL?

A.COMPILE PROCEDURE                               B. ALTER PROCEDURE
C. MODIFY PROCEDURE                                D. All of the above
Ans: B


144. Internal auditors should review data system design before they are

A. developed                                                        B. implemented
C. modified                                                           D. All of the above
Ans: D


145. A _____ means that one record in a particular record type may be related to more than one record of another record type.

A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
D. Many-to many relationship
Ans: B

146. Which command(s) is(are) used to redefine a column of the table in SQL ?

A.ALTER TABLE                            B. DEFINE TABLE
C. MODIFY TABLE                       D. All of the above
Ans: A

147. Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL?

A.DEFINE TABLE                        B. MODIFY TABLE
C. ALTER TABLE                         D. All of the above
Ans: C

147. In SQL, the ALTER TABLESPACE command is used

A. to add/rename data files
B. to change storage characteristics
C. to take a table space online/offline
D. to begin/end a backup
Ans: E


148. The language used in application programs to request data from the DBMS is referred to as the

A.DML                                                  B. DDL
C. query language                                   D. All of the above
Ans: A


149. A database management system might consist of application programs and a software package called

A.FORTRAN                                   B. AUTOFLOW
C. BPL                                             D.TOTAL
Ans: C


150.  A race condition occurs when

A. Two concurrent activities interact to cause a processing error
B. two users of the DBMS are interacting with different files at the same time
C. both (a) and (b)
D. All of the above
Ans:  A



No comments:

Post a Comment