CuriousTab
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank Clerk
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Database
‣
The Database Development Process
See What Others Are Saying!
Question
Which of the following database activities require a specific knowledge of a DBMS?
Options
A. Enterprise modeling
B. Conceptual data modeling
C. Logical database design
D. Physical database design and definition
Correct Answer
Physical database design and definition
More questions
1. 1:1, 1:N and N:M relationships are also known as HAS-A relationships.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
2. A user data source is one that can be shared among database users.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: False
3. When a business rule involves three or more graphical symbols, you can show the constraint as a note and attach the note to each of the symbols by a dashed line.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
4. An exclusive lock locks the item from change but not from read.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: False
5. Which of the following refers to an entity in which the identifier of one entity includes the identifier of another entity?
Options
A. Weak entity
B. Strong entity
C. ID-dependent entity
D. ID-independent entity
Show Answer
Scratch Pad
Discuss
Correct Answer: ID-dependent entity
6. Authorization tables contain highly sensitive data and should be protected by stringent security rules.
Options
A. True
B. False
Show Answer
Scratch Pad
Discuss
Correct Answer: True
7. Poor data administration can lead to which of the following?
Options
A. A single definition of the same data entity
B. Familiarity with existing data
C. Missing data elements
D. All of the above.
Show Answer
Scratch Pad
Discuss
Correct Answer: Missing data elements
8. Needing to using more complicated SQL in database applications is a(n) ________ of normalization.
Options
A. advantage
B. disadvantage
C. either an advantage or disadvantage
D. neither an advantage nor disadvantage
Show Answer
Scratch Pad
Discuss
Correct Answer: disadvantage
9. Which type of SQL Server cursor concurrency places an update lock on a row when the row is read?
Options
A. READ_ONLY
B. SCROLL_LOCK
C. OPTIMISTIC
D. READCOMMITTED
Show Answer
Scratch Pad
Discuss
Correct Answer: READCOMMITTED
10. XML Schemas consist of:
Options
A. properties and methods.
B. elements and attributes.
C. structure and data.
D. tables and relationships.
Show Answer
Scratch Pad
Discuss
Correct Answer: elements and attributes.
Comments
There are no comments.
Enter a new Comment
Save
More in Database:
Advanced SQL
Data and Database Administration
Data Modeling with ER Model
Data Models into Database Designs
Data Warehousing
Database Design Using Normalization
Database Processing for BIS
Database Redesign
Distributed Databases
ER Model and Business Rules
Introduction to Database
Introduction to SQL
JDBC, Java Server Pages, and MySQL
Logical Database Design
Managing Databases with Oracle
Managing Multiuser Databases
Modeling Data in the Organization
Object-Oriented Data Modeling
Object-Oriented Database
ODBC, OLE DB, ADO, and ASP
Physical Database Design
SQL for Database Construction
SQL Server 2000
The Client-Server Database
The Database Development Process
The Database Environment
The Internet Database Environment
The Relational Model and Normalization
XML and ADO.NET