Computer Science :: All Aptitude Test ::

1.Which of the following is not an advantage of the data-base approach?
A. elimination of the data redundancy
B. ability to associate related data
C. increased security
D. elimination of the data redundancy

2.Data encryption techniques are particularly useful for
A. reducing storage space requirements
B. improving data integrity
C. protecting data in data communication systems
D. reducing storage space requirements

3.It is more accurate to define a _____ as a variety of different record types that are treated as a single unit
A. Database
B. Table
C. Record
D. Database

4.A logical schema
A. is the entire database
B. is a standard way of organizing information into accessible parts
C. describes how data is actually stored on disk
D. is the entire database

5.Queries to a database
A. are written in English
B. can use aggregate functions like SUM and COUNT
C. both (a) and (b)
D. are written in English

6.In order to use a record management system
A. You need to understand the low-level details of how information in stored
B. You need to understand the model the record management system uses.
C. Both (a) and (b)
D. You need to understand the low-level details of how information in stored

7.In SQL, which command is used to select only one copy of each set of duplicable rows
A. SELECT DISTINCT
B. SELECT UNIQUE
C. SELECT DIFFERENT
D. SELECT DISTINCT

8.The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in
A. a tree file
B. an indexed file
C. a hashed file
D. a tree file

9.Which command is used to select distinct subject (SUB) from the table (BOOK)?
A. SELECT ALL FROM BOOK
B. SELECT DISTINCT SUB FROM BOOK
C. SELECT SUB FROM BOOK
D. SELECT ALL FROM BOOK

10.The master list of an indexed file
A. is sorted in ascending order
B. contains only a list of keys and record numbers
C. has a number assigned to each record
D. is sorted in ascending order

11.Which of the following is not the responsibility of the utilities component of DBMS software?
A. creating the physical and logical designs
B. removing flagged records for deletion
C. creating and maintaining the data dictionary
D. creating the physical and logical designs

12.In SQL, the CREATE TABLESPACE is used
A. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace
B. to create a database trigger
C. to add/rename data files, to change storage
D. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace

13.In SQL, which command is used to remove a stored function from the database?
A. REMOVE FUNCTION
B. DELETE FUNCTION
C. DROP FUNCTION
D. REMOVE FUNCTION

14.The database administration function includes
A. application programming
B. computer operations management
C. database access planning
D. application programming

15.A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As
A. tables
B. relations
C. tuple
D. tables

16.A command that lets you change one or more fields in a record is
A. Insert
B. Modify
C. Look-up
D. Insert

17.In SQL, the command(s) is(are) used to create an index for a table or cluster
A. CREATE INDEX
B. MODIFY INDEX
C. SET INDEX TO FILE
D. CREATE INDEX

18.There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?
A. Data storage system
B. Database management system (DBMS)
C. Batch processing system
D. Data storage system

19.A _____ DBMS distributes data processing tasks between the workstation and a network server.
A. Network
B. Relational
C. Client Server
D. Network

20.Information can be transferred between the DBMS and a
A. spreadsheet program
B. word processor program
C. graphics program
D. spreadsheet program

21.Data integrity control
A. is used to set upper and lower limits on numeric data
B. requires the use of passwords to prohibit unauthorized access to the file
C. has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files
D. is used to set upper and lower limits on numeric data

22.In order to use a DBMS, it is important to understand
A. the physical schema
B. all sub-schemas that the system supports
C. one subschema
D. the physical schema

23.In SQL, which command(s) is(are) used to recompile a stored function?
A. SET FUNCTION
B. SET STORED FUNCTION
C. ALTER FUNCTION
D. SET FUNCTION

24.Report generators are used to
A. store data input by a user
B. retrieve information from files
C. answer queries
D. store data input by a user

25.Administrate supervision of database activities is the responsibility of the
A. Database administrator
B. DP Manager
C. DB Manager
D. Database administrator

26.Goals for the design of the logical schema include
A. avoiding data inconsistency
B. being able to construct queries easily
C. being able to access data efficiently
D. avoiding data inconsistency

27.In SQL, which of the following is not a data definition language commands?
A. RENAME
B. REVOKE
C. GRANT
D. RENAME

28.Database management systems are intended to:
A. eliminate data redundancy
B. establish relationships among records in different files
C. manage file access
D. eliminate data redundancy

29.In SQL, which command(s) is(are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction?
A. CREATE PACKAGE
B. CREATE SCHEMA
C. CREATE CLUSTER
D. CREATE PACKAGE

30.An OR gate can be imagined as
A. switches connected in series
B. switches connected in parallel
C. MOS transistors connected in series
D. switches connected in series


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers