601.Which of the following constraint is used to limit the value range that can be placed
- Default
- Unique
- None
- Check
602.A Foreign key in one table points to a key in another table
- Alternate
- Default
- None
- Primary
603. Domain constraints, functional dependency and referential integrity are special forms
- Foreign key
- Primary key
- Referential constraint
- Assertion
604. 4NF stands for
- Fourth Normal Fraction
- Fourth Negative File
- Fourth Normal Form
605. Which of the following field type is used to store photograph of employees?
- Memo
- Picture
- Photo
- OLE
606. statement is used in conjunction with the aggregate functions to group the result-set
by one or more columns
- Select
- Distinct
- None
- Group By
607.Which of the following method can be used to add more tables in a database?
- Design View
- Table Wizard
- None
- Both
608.Which of the following field type is the best to store serial numbers?
- Number
- Text
- Memo
- Auto Number
609.The feature that database allows to access only certain records in database is
- Reports
- Forms
- Table
- Queries
610.A collection of interrelated records is called a
- Database
- Spreadsheet
- Management
- information system
- Text file
611. The method of file organization in which data records in a file are arranged in a specified according to key field is known as the
- Sequential access method
- Queuing method
- Predetermined method
- Direct access method
612. Unlike filters queries can be saved as in a database.
- Database
- Filters
- Objects
- All
613.Database created using DBMS package
- Database created in MS-Word
- Database created in EXCEL
- All of the above
- External database is…
614.ROLLBACK in a database is ____ statement.
- DDL
- DML
- DCL
- TCL
615. Report generators are used for store data input by a user
- Retrieve information from files
- with queries
- Both a, b
616.The logical data structure with a one-to-many relationship is a
- Tree
- Chain
- Network
- All
617.In a database, related fields are grouped to
- File
- Bank
- data
- Data record
618.The database environment has all the following components except
- Database administrator
- Database
- User
- Separate files
619.Which database handles full text data, image, audio and video?
- Video on demand database
- Graphics database
- Traction database
- Multimedia database
620.In a large DBMS
- each user can access every sub schema
- each sub schema contains every field in the logical schema
- all
- each user can “see” only a small part of the entire database
621.A network schema
- stores data in tables
- restricts the structure to a one-to-many relationship
- none
- permits many-to-many relationships
622.Administrative supervision of database activities is the responsibility of the
- DB manager
- DP manager
- VP-DP administration
- Database administrator
623.Each table must have a ____ key.
- primary
- secondary
- logical
- foreign
624.In a three level DBMS architecture, the ____ level interacts directly with the users.
- external
- conceptual
- internal
- physical
625.A collection of concepts that can be used to describe the structure of a database?
- Database
- DBMS
- Data model
626. Which of the following constraints enforces entity integrity?
- PRIMARY KEY
- FOREIGN KEY
- CHECK
- NOT NULL
627.Which feature of database provides conversion from inconsistent state of DB to a consistent state ensuring minimum data loss?
- User accessible catalog
- Data processing
- Recovery service
- Authorization service
628.Which of the following is NOT a component of a DFD?
- Dataflow
- Data store
- External entities
- Relationship between external entities
629.Data inconsistency leads to a number of problems such as?
- loss of information and in results
- less secure
- data
- redundant data
630.User rights information is stored in
- Physical
- database
- Catalog
- Logical
631.A table can be logically connected to another table by defining
- Hyperlink
- common attribute
- primary key
- super key
632.Which levels are mostly used for Detailed DFD?
- Level0, Level
- Level, Level2
- Level2, Level3
- Level3, Level4
633.Which of the following constraints enforces entity integrity?
- PRIMARY KEY
- FOREIGN KEY
- CHECK
- NOT NULL
634.The most widely used conceptual model is the model?
- Implementation
- ER
- Object Oriented
- Intern
635.A primary key is an attribute or set of attributes that has been chosen for an entity, whose values are used to uniquely identify a particular instance of an entity. True or false?
- True
- False Partially
- True
- None of the
- given
636.Which model operates at the lowest level of abstraction?
- conceptual
- internal
- external
- physical
637.Which feature of database provides conversion from inconsistent state of DB to a consistent state ensuring minimum data loss?
- User accessible catalog
- Data processing
- Recovery service
- Authorization service
638.A description on a particular collection of data using the given data model
- Database
- Relation
- Schema
- None
639.A candidate key that does not have a null value and is selected to uniquely identify all other a attribute values
in any given row is called a _ _
- Super key
- candidate key
- primary key
- secondary key
640.A relational database
- one that consists of two or more tables
- a database that is able to process tables, queries, forms, orts and macros
- one that consists of two or more tables that are joined in some way the same as a flat file database
641.A description on a particular collection of data using the given data mod
- Database
- Relation
- Schema
- None
642.A candidate key that does not have a null value and is selected to uniquely identify all other
values in any given row is called a _ _
- Super key
- candidate key
- primary key
- secondary key
643.A relational database one that consists of two or more tables
- a database that is able to process tables, queries, forms, orts and macros
- one that consists of two or more tables that are joined in some way
- the same as a flat file database
644.Which of the following is NOT a component of a DFD
- Dataflow
- Data store
- External entities
- Relationship between external entities
645.Data inconsistency leads to a number of problems such as
- loss of information and in results
- less secure data
- redundant data
646.Which of the following constraints enforces entity integrity?
- PRIMARY KEY
- FOREIGN KEY
- CHECK
- NOT NULL
647.Which of the following is a feature of CHECK
constraint?
- limit the values that can be placed in a column.
- used to enforce referential integrity.
- enforces the uniqueness of the values in a set of columns .
- is a unique identifier for a row within a database table.
648.In “One to Many” cardinality one instance of a relation is mapped with
- many instances of second entity type
- One instance of second entity type
- Primary key of 2 relations
- none of above
649.Binary relationships are those, which are established between
- One entity type
- Two entity type
- Three entity type
- Unlimited entities
650.in “many to many relationship” one instance of first entity can be mapped with many instances of second entity
- true
- false