CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Database Systems
Comments
Question
A compound key
Options
A. is made up a several pieces of information
B. uniquely identifies an item in a list
C. both (a) and (b)
D. is a combination of each unique key
E. None of the above
Correct Answer
both (a) and (b)
Database Systems problems
Search Results
1. In SQL, which command is used to create a database user?
Options
A. ADD USER TO DATABASE
B. MK USER
C. CREATE USER
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: CREATE USER
2. In SQL, which command(s) is(are) used to create a synonym for a schema object?
Options
A. CREATE SCHEMA
B. CREATE SYNONYM
C. CREATE SAME
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: CREATE SYNONYM
3. A set of programs that handle a firm's data base responsibilities is called a
Options
A. Data Base Management System (DBMS)
B. Data Base Processing System (DBPS)
C. Data Management System (DMS)
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: All of the above
4. An operation that will increase the length of a list is
Options
A. Insert
B. Look-up
C. Modify
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Insert
5. Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
Options
A. report writer
B. query language
C. data manipulation language
D. transaction log
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: transaction log
6. With respect to data input, the most accurate description of batch control is
Options
A. dividing documents to be entered into batches
B. controlling the input of each input clerk
C. comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: comparing to a pre-calculated figure the total of a data item summed across a batch records put into the system
7. Data security threats include
Options
A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: privacy invasion
8. A computer file contains several records. What does each record contain?
Options
A. Bytes
B. Words
C. Fields
D. Database
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Fields
9. If you want your database to include methods, you should use a _____ database.
Options
A. Network
B. Distributed
C. Hierarchical
D. Object-Oriented
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Object-Oriented
10. The language used in application programs to request data from the DBMS is referred to as the
Options
A. DML
B. DDL
C. query language
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: DML
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT