Computer Science :: All Aptitude Test ::

1.The logical data structure with a one-to-many relationship is a :
A. network
B. tree
C. chain
D. network

2.Updating a database means
A. revising the file structure
B. reorganizing the database
C. modifying or adding record occurrences
D. revising the file structure

3.In SQL, which command(s) is(are) used to enable/disable all triggers on a table?
A. ALTER TRIGGERS
B. ALTER TABLE
C. MODIFY TRIGGERS IN TABLE
D. ALTER TRIGGERS

4.When you have finished entering information into a form
A. the template is written to the data file
B. the contents of the form are written to the data file
C. the contents of the form can be printed
D. the template is written to the data file

5.The main idea behind computer files is that it is convenient to
A. arrange them
B. store information together
C. create them
D. arrange them

6.A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be
A. the pin code
B. the last name
C. a compound key consisting of the first name and the last name
D. the pin code

7.In SQL, which command is used to add new rows to a table?
A. ALTER TABLE
B. ADD ROW
C. INSERT
D. ALTER TABLE

8.A number of related records that are treated as a unit is called
A. file
B. field
C. data
D. file

9.If you want to group the records in the abc database, you could use the Jobcode as the _____.
A. Delete
B. Update
C. Sort Key
D. Delete

10.The Management Information system (MIS) structure with one main computer system is called a
A. hierarchical MIS structure
B. distributed MIS structure
C. centralized MIS structure
D. hierarchical MIS structure

11.If a calculation is embedded in a form
A. the result of the calculations are stored with the form
B. the calculations are stored with the form
C. the result of the calculations are printed in report
D. the result of the calculations are stored with the form

12.Data security threats include
A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. hardware failure

13.An operation that will increase the length of a list is
A. Insert
B. Look-up
C. Modify
D. Insert

14.In SQL, which command is used to add a column/integrity constraint to a table
A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ADD COLUMN

15.In SQL, which command(s) is(are) used to enable/disable a database trigger?
A. ALTER TRIGGER
B. ALTER DATABASE
C. ALTER TABLE
D. ALTER TRIGGER

16.In a relational schema, each tuple is divided into fields called
A. Relations
B. Domains
C. Queries
D. Relations

17.In SQL, which command is used to changes data in a table?
A. UPDATE
B. INSERT
C. BROWSE
D. UPDATE

18.What name is given to the collection of facts, items of information or data which are related in some way?
A. Database
B. Directory information
C. Information tree
D. Database

19.In a large DBMS
A. each user can "see" only a small part of the entire database
B. each user can access every sub�schema
C. each subschema contains every field in the logical schema
D. each user can "see" only a small part of the entire database

20.Which of the following command(s) is(are) used to recompile a stored procedure in SQL?
A. COMPILE PROCEDURE
B. ALTER PROCEDURE
C. MODIFY PROCEDURE id) All of the above
D. COMPILE PROCEDURE

21.Internal auditors should review data system design before they are
A. developed
B. implemented
C. modified
D. developed

22.A _____ means that one record in a particular record type may be related to more than one record of another record type.
A. One-to-one relationship
B. One-to-many relationship
C. Many-to-one relationship
D. One-to-one relationship

23.Which command(s) is(are) used to redefine a column of the table in SQL ?
A. ALTER TABLE
B. DEFINE TABLE
C. MODIFY TABLE
D. ALTER TABLE

24.Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL?
A. DEFINE TABLE
B. MODIFY TABLE
C. ALTER TABLE
D. DEFINE TABLE

25.In SQL, the ALTER TABLESPACE command is used
A. to add/rename data files
B. to change storage characteristics
C. to take a tablespace online/offline
D. to add/rename data files

26.The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. query language
D. DML

27.A database management system might consist of application programs and a software package called
A. FORTRAN
B. AUTOFLOW
C. BPL
D. FORTRAN

28.An audit trail
A. is used to make back-up copies
B. is the recorded history of operations performed on a file
C. can be used to restore lost information
D. is used to make back-up copies

29.A race condition occurs when
A. Two concurrent activities interact to cause a processing error
B. two users of the DBMS are interacting with different files at the same time
C. both (a) and (b)
D. Two concurrent activities interact to cause a processing error

30.An indexing operation
A. sorts a file using a single key
B. sorts file using two keys
C. establishes an index for a file
D. sorts a file using a single key


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers