Sail E0 Webinar

MCQs

Total Questions : 286 | Page 25 of 29 pages
Question 241. Embedded pointer provide
  1.    a secondary access path
  2.    a physical record key
  3.    an inverted index
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option A. -> a secondary access path
Question 242. A condition that led to the development of databases was
  1.    a demand for more data to support information needs
  2.    an increase in the amount of data handled by organizations
  3.    the proliferation of data files
  4.    All of the above
  5.    None of the above.
 Discuss Question
Answer: Option D. -> All of the above
Question 243. The _____ command is used to allocates an extent for the table in SQL
  1.    MODIFY ALLOCATES
  2.    MODIFY TABLE
  3.    ALTER TABLE
  4.    REDEFINE TABLE
  5.    None of the above
 Discuss Question
Answer: Option A. -> MODIFY ALLOCATES
Question 244. The database administration function includes
  1.    application programming
  2.    computer operations management
  3.    database access planning
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option C. -> database access planning
Question 245. A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As
  1.    tables
  2.    relations
  3.    tuple
  4.    both (a) and (b)
  5.    None of the above
 Discuss Question
Answer: Option D. -> both (a) and (b)
Question 246. A command that lets you change one or more fields in a record is
  1.    Insert
  2.    Modify
  3.    Look-up
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option B. -> Modify
Question 247. If you want to group the records in the abc database, you could use the Jobcode as the _____.
  1.    Delete
  2.    Update
  3.    Sort Key
  4.    Index
  5.    None of the above
 Discuss Question
Answer: Option C. -> Sort Key
Question 248. Data security threats include
  1.    hardware failure
  2.    privacy invasion
  3.    fraudulent manipulation of data
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option B. -> privacy invasion
Question 249. The Management Information system (MIS) structure with one main computer system is called a
  1.    hierarchical MIS structure
  2.    distributed MIS structure
  3.    centralized MIS structure
  4.    decentralized MIS structure
  5.    None of the above
 Discuss Question
Answer: Option C. -> centralized MIS structure
Question 250. An operation that will increase the length of a list is
  1.    Insert
  2.    Look-up
  3.    Modify
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option A. -> Insert

Latest Videos

Latest Test Papers