0% found this document useful (0 votes)
59 views21 pages

Level 3-1

level

Uploaded by

adaneatalay26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views21 pages

Level 3-1

level

Uploaded by

adaneatalay26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

1.

a method of data collection in which the situation of interst is watched and the relevant
facts,actions and behaviours are recorde.

A.interview B.observation C.survey D.questionnaire

2. assum that there is atable named R with attributes A,B,C and D, and A is the primary
key(determinant) of R,then which of the following is true aboute fully function dependency.

A. {A}…………….>{B,C,D}

B. {A,C}----->{B,D}

C. {B,C}---------->{A,D}

D. {B,C,D}-------->{A}

3. you run a select statement and multiple duplicate of values are retrived.what keyword can you use
to retrieve only the non-duplicate value?

A.duplicate

B.individual

C.distinct

D.separate

4.in database modeling, a set of objects with the same properties or characteristics is term.

A.entity instance

B.entity type

C.relationship type

D.relationship instance

5. with sql,which types of join should you use if you want to return only matched.

A.inner join

B.left outer join

C.right outer join

D.full outer join

6.using the primary keys,which of the following is wrong statement?

A.they cannot be null


B.only unique values can be assigned to them

C.they cannot be character data types

D.they can be used as reference for other columns in arelated table.

7.which of the following backward recovery?

A. where the before-images are applied to the database

B.where the after-images are applied to the database

C. where the after-images and before-image are applied to the database

D.switching to an existing copy of the database

8. the transaction log includes which of the following?

A.the before –image of a record

B.the after-image of a record

C.the before and the after-image of a record

D.the essential data of the record

9.in sql,which of the following is correct syntax to modify a table:

A.alter table<tablename<columnname><datatype><filed size><constraint>

B.alter table ADD<columnName><dataType><filed size>

C.alter table<tableName>ADD<columnName><datatype><filed size><constraint>

D.alter table<TableName>DROP<columnName><dataType><filed size>

10. which of the following referential integrity constraint should be enforced to specify automatic
deletion of a foreign key record when a record in the base table is deleted.

A. on drop cascade

B.on delete cascade

C.on update cascade

D.on drop set null

11. all of the following can be considered as entity integrity constraint Except:

A.unique B. foreign key C.identity D.primary key


12. among the following,which activity helps you to determine the entities,attributes, and relationships
of data?

A.conceptual database modeling

B.logical database modeling

C.physical database modeling

D.database implemention

13. in the relational modes,cardinality is termed as:

A.number of tuples

B.number of attributes

C. number of tables

D. number of constraints

14. where does the DBMS store the definition of data elements and their relationship?

A. data file

B.index

C.data dictionary

D. data map

15. an entity set does not have sufficient attributes to from a primary key can be considered as:

A.a strong entity set

B.weak entity set

C.simple entity set

D.primary entity set

16. with sql,how can you populate’TRAINING’ table with rows from EMPLOYEE

A.insert into firstname,lastname training from employee


B.select firstname,lastname into employee from training

C. insert into firstname,lastname employee from training

D. select firstname,lastname into training from employee

17. during the conceptual design phase what will happen:

A. the internal components of the application are designed.

B.normalization take place

C.new entity may be discovered

D. program specification are written

18. with sql,how can you return all the records from a table named ‘’employee’’ sorted descending by
‘’firstname’’?

A. select * from employee order firstname descend

B.select * from employee order by firstname Desc

C. select * from employee order by firstname ASC

D. select * from employee order by firstname Ascend

19. while listing limitation of file processing system identify the wrong statement?

A. data redundancy and inconsistency available

B.difficult in accessing data

C. data isolation and integrity

D. concurrent access is possible

20. which of the following could not be considered as an entity type?

A.student

B.address

C.birth date

D. course

21. during modeling your data,entity relationship is applied at:

A. conceptual database
B. schema refinement

C.physical refinement

D.application and security

22. all of the following are sql servers system database components except?

A. master database

B.conventional database

C. model database

D. TempDB database

23. assum that there are two given tables,MOTHER table and CHILD table under the same database
name. what will be the possible relationship between those tables?

A. one-to-money

B. one-to –one

C. many-to-many

D. has no relation

24. which one of the following is not a data type in sql server?

A.ID

B. date/time

C. double

D.money

25.in modular programming,which statement is not considerd as the benefit?

A. less code has to be written

B.code are simple and easy to understand

C. it does NOT allows many programmers to collaborate on the same application

D. a large program can be break down into smaller independent modules

26. In the following from of table using sql statement

Select employeeidno from employeestatcstable where salary between 30000 AND 50000;
A. EMPLOYEEIDNO specifies name of the table
B. EMPLOYEESTATICSTABLE specifies name of the column
C. EMPLOYEESTATICSTABLE specifies name of the table
D. SALARY BETWEEN 30000 and 50000 data type of column

26. database design involves modeling the collected information at a high-level of abstract with out
using a particular data model or DBMS

A.conceptual database design

B.logical database design

C.physical database design

D.database design schema

27. the requirement(S)for using identity property can be specified as:

A. it can be defined with character data types

B.only one identity column is allowed per table

C. it can be updated

D. it does allow null values

28. which of the following is not true about first normal form(1NF)

A. there are no repeating or duplicate fields

B.each cell contains only asingle values

C. each record is unique

D. all non-key fields depend on all components of the primary key

28.In sql server ,which one of the following is wrong statement?

A.each entity name should be unique in the the same database

B. two attributes of an entity type can have the same name

C.count function does not return a NULL if no rows satisfy the where clause

D.IN operator allows you to specify multiple values in a where clause

29.design a database is an iterative process that involves develop and refining a database structure
based on the information and processing requirements of your business. Which one is the correct
phase of the design process.
A. data analysisphysical database designlogical database designphysical implemention

B.data analysislogical database designphysical database designphysical implemention

C. physical database designdata analysislogical database designphysical implemention

D. physical database designlogical database designdata analysisphysical implemention

30. there are steps in gathering data to identify business requirement excepts

A. ensuring stakeholder invlovment at all level of involvement

B. giving traning on how to operate to user and technical

C. understand the needs of your client

D. identify the key people who will be affected by the project

31. using database manegment system is preferable than file system when

A. the number of record is small

B. the data we need to keep is very secure

C. the speed of data accessing is our first priority

D. the company have no capacity to add new hardware and software

32. you created a table called department that stores a company department detail. The table contains
department id datatype int and department name datatype varchar(50). The primary key of this table
foreign key for other table. You selected department id primary key of the table. The reason to do this
is.

A. it identify uniquely B. it is easy to remember C. it is sequential D.it needs leaser storage device

33. the correct statement regarding entity integrity is

A. a primary key can not have null value

B. a relation can have only one key

C. a foreign key should contain the same data type in both table

D. the foreign key cannot have null values

34. which of the following an advantage of view

A. assign index to table

B. store record
C.hiding of complex queries

D. storing definition of database object

35.In order for two queries to be union compatable they must

A. both have compatable data type for each column

B. both have the same number of line in sql statement

C. both return at least one row

D. both have the same number of records

36. you have a bank database system to store account transaction data what do you do if you need to
get ordered transaction data from the most recent to the oldest transaction.

A, search ‘tranasaction date’ in ascending order

B. search ‘transaction date’ in descending order

C. search ‘transaction id’ in descending order

D. search ‘transaction id’ in asending order

37.an illegal expression used in sql

A. select null from employee

B. select name from employee

C. select name from employee where salary=null

D. select * from employee

38. a correct statement regarding truncate and delete operation in table

A. truncate operation can notbe restored

B. truncate operation drop the table

C. delete operation cannot be restored

D .delete operation is much faster than truncate

39. you are a database developer for an insurance company.every insurance policy is managed by one
and only one product manager. One producte manager can manage many policy. How can you
represent the information in the database?
A. include the manager id in the policy entity

B. include the policy id in the manager entity

C. create a relationship entity formed by the policy id and the manager id

D. include the manager in the policy entity and the policy id in the manager entity

40. incorrect statement about data dictionary

A. the data dicitionary is noramllY maintained by the data administrator

B. the data dictionary is atool used to exclusively by the database administrator

C.the datadictionary contains the name and description of each data element

D.data element in the database can be modified by changing the data dictionary

41. index are created are in most RDBMS to

A. provide quicker way to store the data

B. increase the cost of implemention

C. provide rapide random and sequential access to base table data

D. decrease the amount of disk space utilized

42. what do you do if an important table in your database is removed accidentaly?

A. undo the operation to bring it back to its prior state

B. get the deleted data from recycle bin and restore it

C. create the table and add all the data from docments

D. restore the table from backup file

43. a power failure occurred while the database was operating, unfortunately the UPS did not function
properly and did not stop the sql server in a proper manner. Once power come back, what do you have
to do to your server to recover the transaction that have been committed but not checkpointed?

A. you need backup the transaction log, restore the database from the last full database backup, and
then restore all the transaction log.

B. nothing sql server will recovery automatically, rolling back pending transaction and rolling
forward committed ones.

C. Nothing, all transaction since the last checkpoint are lost the effect of the other are in a database
D. Run roll forward all transaction

44. Whiling gathering data to determine the organization business requirement you might take recorde
of organization like annual report and organizational polices. These kind of information resources are
considered as

A. tertiary source B. secondary sources C. primary sources D. informal sources

45. a database technical documentation should contain all except

A. description of what the table means and how its functionally used

B. descrpitions of what each attribute means

C. explanation of the relationship

D. descrptions of clients

46 . not possible task to do using the alter command table

A. Change the name of table


B. Change the name of column
C. Delete column
D. Add column

47. database administration is not forced to participate in

A. conceptual database design

B. determine how to implement conceptual schema

C. implement security and integrity

D. maintain a computer system

48. you created a foreign key constraint and need to update the value referencing column, if the value
in the references column are updated which referential column are updated which referential integrity
command should be used.

A. On update restricte

B. on update no action

C. On update CASCADE

D. On update set default

49. you are assigned to lead a small team in your company that manage database identify the wrong
statement in leading the team.
A. assign responsibility to team member

B. perform all duites of the team by your own

C. process the necessary leadership skill

D. understand the team role

50. you have just implemented a soulation for a database crash in your company and you want to
celebrate the succeses. The next step you should do before starting your celebration.

A. teste the soulation in a similar organization

B. gather more information about the issue

C. docment the issue and the soulation that has implemented

D. escalate the issue

51. give the table show ,which normalization step missing

vechile

Serial_no owner model manfucture Engine_size

A. 2 NF C. 1NF
B. 3NF D. boyce code

52. In the above given table, how to remove a filed name engine_size?

A. modify table employee delete engine _size

B. alter table employee drop engine_size

C. modify table employee delete column engine_size

D. alter table employee drop column engine_size

53. With sql, how do you select all the records from a table named student the column “firstname”
start with an “B”?

A. select * from student where firstname like ‘%B%’

B. select * from student where firstname= like ‘B%’

C. select * from student where firstname like ‘B%’

D. select * from student where firstname =‘B’


54. there are certain packages that allow people to define data items, place that items in particular
records combine the records into designed file and manipulate and retrieve store data. What are they
called?

A. data storage system B. batch processing system C. database management system


D. data communcation system

55.when the value in one or more attribute being used as a foreign key that must exist an other set of
one or more attribute in an other table, you have created?

A. domain integrity constraint C. user defined integrity constraint

B. entity integrity constraint D. referintal integrity constraint

56. which one of the following not entity .


a. book. b.age.
c.customer . d.project.
57. which one of the following is correct the Sql syntax
modify the table .
a. ALTER TABLE ADD table name column name data type
size constraint .
b. ALTER TABLE table name ADD column name size
constraint .
c. ALTER table name ADD data type size constraint.
d. ALTER TABLE table name ADD data type column name
size constraint .
58. the following the flowchart to make indicate the decision
a. diamond b. arrow
c. diagnose d. rectangle
59. which of the following is true about the remove partial
dependency .
a. 2ndNF b. 3rd NF
c. 1fsNF d. deletion
60. which of the following insert the to column
first_name ,last_name in employee table .
a. insert into employee(first_name ,last_name) values
(‘hiwot’,hanke)
b. insert into values (‘hiwot’,hanke)
c. insert into employee (‘hiwot’,hanke)
d. insert into employee ‘hiwot’,hanke
61. which of the following is multiple values attribute .
a. name b. birth date
c. color d. id
62. which is the following is referential integrity rule .
a. foreign key b. primary key
c. union d. identity
63. find all record of the number the sql select statement
from employee.
a. SELECT COUNT * FROM EMPLOYEE
b. SELECT COUNT(*) FROM EMPLOYEE
c. SELECT COUNT() FROM EMPLOYEE
d. SELECT COUNT FROM EMPLOYEE
64. wchich one is not use modular programmer
a. write to the programming code
b. the understanding to easy code
c. not developer the same application
d, ………………………………………
65. which one is not true about the data definition language.
a. update b. alter
c. drop d. create
66. which one is the benefit of the database .
a. the used to data administrator
b. to facility the user data
c …………………………………….
d ………………………………………
Matching

1. Algorithm . M a. shadow paging


2. Use of an possible b. query
value for an entity. O c. Second normal
Form
3. Use to remove database and its objecte F d. data type
4. Relation type . e. union
5. Request for information from database I f. Drop from data base
G. attribute

6. Remove transitive dependency. R h. create table


7. Combine the result it. E i. select
8. Used to specify table . P j. diamond
9. A named column of relation . G k. master
10. You need to use when you create l . domain conventional
data base. H M. sequenca of step the that describe solution of problem
11. Specify search condition Q
12. The set of allowable passable values for on attribute . I

n. entity

13. Constraint that specify possible values for


each field in the table . D O.entity
p . physical database
14. Coy on write technique A q. where
15. Remove partial dependency C R. third normal Form
T. inheritance
Column A column B

1. identifying information gap and proposed a solution Q A. analysis

For the organization B. arrow with aunique label

2. fact finding and proposing solution aboute the problem of C. Attribute


organization. A
3. The process of constructing a model of the database used D. DCL
The organization. G
4. The process of testing and deployement of the design database. M E. DDL
5. Adminstaring and maintain a deployed database system. P F. DML
6. Database object about which information is to be collection. L G. design
7. The process of removing dublicated modeling in database. O H. dimond
8. An sql clause combing records from two or more a table in database. N I. double ellipses
9. In ER diagram multi value attribute are represented. I J. double rectangle
10. In ER diagram relationship are represented. H K. Ellipses
11. In ER diagram entity are represented. R L. Entity
12. In ER diagram data flow are represented. B M. implemention
13. Language that used to create structure of a database. E N. join
14. Language that used to store,retrieve and access data in a database F O. normalization

P . operation and supporte

Q. planning

R. rectangle
Column A column B

1. The process of periodical taking a copy of the database A. Pseudcode


And log file onto offline storage media Q
2. Sort the result set I B. implemention
3. Value of one attribute uniquely determine the value of
An other attribute S C. relationship
4. No primary key value can be null E D. union
5. The number of participating entity in the relationship M E. entity integrity
6. A property of an entity or a relationship Q F. first normal form
7. Building a work model of a database system P G. drop
8. A collection of normalized table H. data structure
9. Represents a value for a column that is currently unknown or I. order by
Is not applicable for this record L
10. The possible realization of the database and application design B J. entity type
11. Method used to define an algorithm A K. second normal form
12. Combine the result set of two or more select statement D L. null
13. No parital dependence K M. degree of relationship
14. A set of meaningful association among entity C N. Third normal form
15. Way of sorting and organized data in a computer H Q. Attribute
P. relational database
Q. backup
R. prototyping

S. functional dependence
T. query
1. A questionnaire is a research instrument consisting of a series of questions and other
prompts for the purpose of gathering information from respondents.
2. In E-R Diagram, an entity is represented by a rectangle.
3. A data dictionary is a collection of descriptions of the data objects or items in a data
model for the benefit of programmers and others who need to refer to them.
4. In E-R Diagram, an attribute can be represented by an ellipse (oval) shape with a line
connected it to the associated entity.
5. Age attribute is derived attribute, and the Birth-Date attribute is stored attributed
6. Primary Key is a candidate key which doesn’t have repeated values nor does it comes with a
NULL value in the table.
7. Database Security means protection of the: - data from malicious attempts to steal
(view) or modify data.
8. An index is a set of one or more keys which is used to speed up access to data in a table.
It is a separate physical data structure that enables queries to access one or more data
rows fast.
9. Database backup is the process of dumping data (from a database, a transaction log, or
a file) into backup devices that system creates and maintains.
10. Using Differential Backups the differential backup stores only the data changes that
have occurred since the last full database backup
11. Shadow paging is a technique for providing atomicity and durability in database system.
12. A flowchart is a type of diagram that represents an algorithm or process, showing the
steps as boxes of various kinds, and their order by connecting those with arrows.
13. Diamonds, which show decisions that must be made
14. Data modeling is the formalization and documentation of existing processes and events
that occur during application software design and development.

15. The Entity is a person, object, place or event for which data is collected.
16. The cardinality defines the relationship between the entities in terms of numbers. The
three main cardinal relationships are: one-to-one, expressed as 1:1; one-to-many,
expressed as 1:M; and many-to-many, expressed as M:N.
17. The HIPO (Hierarchy plus Input-Process-Output) acts as a hierarchical chart for the
function performed by the system.
18. RAD (Rapid Application Development) is a more advanced program design tool (a
programming system) that enables programmers to quickly build working programs.
19. CASE tool (Computer Aided Software Engineering tool) is software that can be used to
mean any computer-based tool for software planning, development, and evolution.
20. Prototyping is the process of quickly putting together a working model (a prototype) in
order to test various aspects of a design, illustrate ideas or features and gather early user
feedback.
21. Generalization is the process of extracting shared characteristics from two or more
classes, and combining them into a generalized superclass.
22. Entity Instance is a single occurrence of a particular entity type. An entity type is
described just one time.
23. Foreign Key is a table’s primary key attribute which is repeated in another related table
(having related data) to maintain the required data relationship.
24. The degree of a relationship type is the number of participating entity types. Meaning if
the relationship is between two entity types (for Example, Employee and Department),
then the relationship is binary, or has a degree of two.
25. The UML (Unified Modeling Language) is a general-purpose visual modeling language
that is used to specify, visualize, construct, and document the object of a software system.
It captures decisions and understanding about systems that must be constructed.
26. Association - An association represents a relationship between two classes:
27. Multiplicity - A multiplicity allows for statements about the number of objects that are
involved in an association:
28. Database auditing involves observing a database so as to be aware of the actions of
database users. Database administrators and consultants often set up auditing for security
purposes, for example, to ensure that those without the permission to access information
do not access it
29. Boyce–Codd normal form (BCNF)
30. Normalization is a process that involves dividing large tables (complex data structures)
into smaller (simple and stable data structures) that do not accept redundant values and
defining relationships between them.
31. A table is in 1NF if: - There are no duplicated rows in the table
32. 2nf All non-key attributes are dependent on the entire key (has no partial dependencies).
33. 3nf no transitive dependencies
34. Altitude :- Postive or Negitive opnion of Human Views
35. Leader Ship :- Postive Influence on the employees or workers.
Good Luck!!!!
T. query

Prepared by Addisraye bantie


14/02/2012

You might also like