Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?

A. Data storage system
B. Database management system (DBMS)
C. Batch processing system
D. Data communication package
Answer» C. Batch processing system
2.

Embedded pointer provide

A. a secondary access path
B. a physical record key
C. an inverted index
D. All of the above
Answer» B. a physical record key
3.

Which two files are used during operation of the DBMS?

A. query language and utilities
B. data manipulation language and query language
C. data dictionary and transaction log
D. data dictionary and query language
Answer» D. data dictionary and query language
4.

To have a file hold a list, it is necessary to

A. identify the records in the list
B. identify the name, width and type of the fields of each record.
C. decide which fields will be used as sort or index keys
D. All of the above
Answer» E.
5.

An-owner-member set in the CODASYL specifications may have

A. only one owner but many owner occurrences
B. only one member but many member occurrence
C. more than one member but only one occurrence per member
D. All of the above
Answer» B. only one member but many member occurrence
6.

A computer file can be best described as

A. a single data item
B. a general collection of data items
C. an orderly collection of data items
D. a random collection of data items
Answer» D. a random collection of data items
7.

In order to use a DBMS, it is important to understand

A. the physical schema
B. all sub-schemas that the system supports
C. one subschema
D. both (a) and (b)
Answer» D. both (a) and (b)
8.

Data encryption techniques are particularly useful for

A. reducing storage space requirements
B. improving data integrity
C. protecting data in data communication systems
D. All of the above
Answer» D. All of the above
9.

Sophisticated report generators can

A. print row-oriented reports
B. perform arithmetic operations
C. selectively retrieve and print portions of a list
D. All of the above
Answer» E.
10.

The PROJECT command will create new table that has

A. more fields than the original table
B. more rows than the original table
C. both (a) and (b)
D. all the fields of master table
Answer» E.
11.

In a relational schema, each tuple is divided into fields called

A. Relations
B. Domains
C. Queries
D. All of the above
Answer» C. Queries
12.

In SQL, which command(s) is(are) used to enable/disable a database trigger?

A. MODIFY USER
B. CHANGE USER
C. ALTER TRIGGER
D. All of the above
Answer» D. All of the above
13.

Data item characteristics that are important in data management include

A. punctuation
B. language
C. spelling
D. width
Answer» E.
14.

In SQL, the CREATE TABLESPACE is used

A. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace
B. to create a database trigger
C. to add/rename data files, to change storage
D. All of the above
Answer» B. to create a database trigger
15.

In SQL, which command(s) is(are) used to create a synonym for a schema object?

A. CREATE SCHEMA
B. CREATE SYNONYM
C. CREATE SAME
D. All of the above
Answer» C. CREATE SAME
16.

A number of related records that are treated as a unit is called

A. file
B. field
C. data
D. batch
Answer» B. field
17.

If a calculation is embedded in a form

A. the result of the calculations are stored with the form
B. the calculations are stored with the form
C. the result of the calculations are printed in report
D. All of the above
Answer» C. the result of the calculations are printed in report
18.

A multiple-form file management system

A. lets you define different forms for different operations
B. lets you create a look-up form with an associated read-only password to prevent access by unauthorized users
C. both (a) and (b)
D. allow you to entry data in all the forms
Answer» D. allow you to entry data in all the forms
19.

The designer of a form includes

A. filed designators
B. prompts
C. data
D. both (a) and (b)
Answer» E.
20.

A good query system

A. can accept English language commands
B. allows non-programmers to access information stored in a database
C. can be accessed only by data processing professionals
D. both (a) and (b)
Answer» C. can be accessed only by data processing professionals
21.

Which of the following is not true of the traditional approach to information processing?

A. There is common sharing of data among the various applications
B. It is file-oriented
C. Programs are dependent on the files
D. It is inflexible
Answer» B. It is file-oriented
22.

A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be

A. the pin code
B. the last name
C. a compound key consisting of the first name and the last name
D. All of the above
Answer» D. All of the above
23.

Information can be transferred between the DBMS and a

A. spreadsheet program
B. word processor program
C. graphics program
D. All of the above
Answer» E.
24.

In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?

A. ZIP
B. PACK
C. COMMIT
D. SAVE
Answer» D. SAVE
25.

The main idea behind computer files is that it is convenient to

A. arrange them
B. store information together
C. create them
D. access them
Answer» C. create them
26.

The logical data structure with a one-to-many relationship is a :

A. network
B. tree
C. chain
D. relational
Answer» C. chain
27.

The highest level in the hierarchy of data organization is called

A. data bank
B. database
C. data file
D. data record
Answer» C. data file
28.

A report form

A. appears on the computer monitor during data entry
B. is used during report generation to format data
C. both (a) and (b)
D. All of the above
Answer» C. both (a) and (b)
29.

A database management system might consist of application programs and a software package called

A. FORTRAN
B. AUTOFLOW
C. BPL
D. TOTAL
Answer» D. TOTAL
30.

What is the language used by most of the DBMSs for helping their users to access data?

A. High level language
B. Query language
C. SQL
D. 4GL
Answer» C. SQL
31.

What is the name given to the database management system which is able to handle full text data, image data, audio and video?

A. Full media
B. Graphics media
C. Multimedia
D. Hypertext
Answer» D. Hypertext
32.

Which command is used to remove an index from the database in SQL?

A. DELETE INDEX
B. DROP INDEX
C. REMOVE INDEX
D. ROLL BACK INDEX
Answer» C. REMOVE INDEX
33.

Periodically adding, changing and deleting file records is called file

A. Updating
B. upgrading
C. restructuring
D. renewing
Answer» B. upgrading
34.

If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it.

A. Delete
B. Update
C. Sort Key
D. Index
Answer» E.
35.

The model for a _____ resembles the hierarchical model in many respects.

A. Network database
B. Relational database
C. Distributed database
D. Hierarchical database
Answer» B. Relational database
36.

Which of the following is true of a network structure?

A. It is a physical representation of the data
B. It allows a many-to-many relationship
C. It is conceptually simple
D. It will be the dominant data base of the future
Answer» C. It is conceptually simple
37.

A _____ DBMS distributes data processing tasks between the workstation and a network server.

A. Network
B. Relational
C. Client Server
D. Hierarchical
Answer» D. Hierarchical
38.

A data dictionary is a special file that contains

A. the names of all fields in all files
B. the data types of all fields in all files
C. the widths of all fields in all files
D. All of the above
Answer» E.
39.

When using a database management system, the first thing that you must do is to

A. create a database file
B. activate file editor
C. load the software into your micro¬computer
D. keep a floppy disk in readiness
Answer» D. keep a floppy disk in readiness
40.

A database management system

A. allows simultaneous access to multiple files
B. can do more than a record management system
C. is a collection of programs for managing data in a single file
D. both (a) and (b)
Answer» E.
41.

When you have finished entering information into a form

A. the template is written to the data file
B. the contents of the form are written to the data file
C. the contents of the form can be printed
D. All of the above
Answer» C. the contents of the form can be printed
42.

In SQL, which command is used to select data in rows and column from one or more tables?

A. CHOOSE
B. SELECT
C. LIST
D. BROWSE
Answer» C. LIST
43.

Each of data files has a _____ that describe the way the data is stored in the file.

A. File structure
B. Records
C. Fields
D. Database
Answer» B. Records
44.

The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain?

A. Bits
B. Characters
C. Data field
D. Schema
Answer» D. Schema
45.

Primitive operations common to all record management systems include

A. Print
B. Sort
C. Look-up
D. All of the above
Answer» D. All of the above
46.

In SQL, GRANT command is used to

A. allow user to access databases
B. allow user to create databases
C. grant system privileges, roles, and object privileges to uses and roles
D. choose auditing for specific SQL commands
Answer» D. choose auditing for specific SQL commands
47.

If you want to group the records in the abc database, you could use the Jobcode as the _____.

A. Delete
B. Update
C. Sort Key
D. Index
Answer» D. Index
48.

Sort/report generators

A. are faster than index/report generators
B. require more disk space than index/report generators
C. do not need to sort before generating a report
D. both (a) and (b)
Answer» C. do not need to sort before generating a report
49.

Data security threats include

A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above
Answer» C. fraudulent manipulation of data
50.

Which command is used to remove a table from the database in SQL?

A. DELETE TABLE
B. DROP TABLE
C. ERASE TABLE
D. UNATTACH TABLE
Answer» C. ERASE TABLE