1) A multiple - form file management system ?
- Lets you define different forms for different operations
- Lets you create a look up form with an associated read only password to prevent access by unauthorized users.
- Both A and B
- Allows you to entry data in all the forms
- None of above
Show/Hide Answer
Answer = C
Explanation:Multiple form management system allows to perform different operations along with checks for the unauthorized access.
2) Embedded pointer provide ? Explanation:Multiple form management system allows to perform different operations along with checks for the unauthorized access.
- A secondary access path
- A physical record key
- An inverted index
- None of above
Show/Hide Answer
Answer = A
Explanation: Embedded pointer is a pointer set in a data record instead of in a directory.
3) In relational schema, each tuple is divided into fields called ?Explanation: Embedded pointer is a pointer set in a data record instead of in a directory.
- Relations
- Domains
- Queries
- All of above
Show/Hide Answer
Answer = B
Explanation:No Explanation
4) A logical schema ? Explanation:No Explanation
- is the entire database
- is a standard way of organizing information into accessible parts
- describes how data is actually stored on disk
- All of above
Show/Hide Answer
Answer =B
Explanation: A logical schema is a data model of a specific problem domain expressed in terms of a particular data management technology.
5) Administrate supervision of database activity is the responsibility of ? Explanation: A logical schema is a data model of a specific problem domain expressed in terms of a particular data management technology.
- Database administrator
- DP Manager
- DB Manager
- DP Administration
- None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
6) What software packages are commonly for business that have to track extensive lists of clients and inventory? Explanation: No Explanation
- Special purpose packages
- Custom made programs
- Single function application packages
- Data management packages
- None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
7) Periodically adding, changing and deleting file records is called file ? Explanation: No Explanation
- updating
- upgrading
- restructuring
- renewing
- None of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
8) Data security threats include ? Explanation: No Explanation
- hardware failure
- privacy invasion
- fraudulent manipulation of data
- All of above
Show/Hide Answer
Answer = B
Explanation: No Explanation
9) The online soft copy display a customer's charge account to respond to an inquiry is an example of ? Explanation: No Explanation
- forecasting report
- exception report
- regularly scheduled report
- on demand report
Show/Hide Answer
Answer = D
Explanation: No Explanation
10) In order to understand DBMS, it is important to understand? Explanation: No Explanation
- the physical schema
- all sub schema that are system support
- one sub schema
- Both A and B
- None of above
Show/Hide Answer
Answer = C
Explanation:No Explanation
Explanation:No Explanation
Next ››
Do You Like This? Please take 5 seconds to share with your firends.