

MCQOPTIONS
Saved Bookmarks
This section includes 155 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
101. |
There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called? |
A. | Data storage system |
B. | Database management system (DBMS) |
C. | Batch processing system |
D. | Data communication package |
Answer» C. Batch processing system | |
102. |
Embedded pointer provide |
A. | a secondary access path |
B. | a physical record key |
C. | an inverted index |
D. | All of the above |
Answer» B. a physical record key | |
103. |
Which two files are used during operation of the DBMS? |
A. | query language and utilities |
B. | data manipulation language and query language |
C. | data dictionary and transaction log |
D. | data dictionary and query language |
Answer» D. data dictionary and query language | |
104. |
To have a file hold a list, it is necessary to |
A. | identify the records in the list |
B. | identify the name, width and type of the fields of each record. |
C. | decide which fields will be used as sort or index keys |
D. | All of the above |
Answer» E. | |
105. |
An-owner-member set in the CODASYL specifications may have |
A. | only one owner but many owner occurrences |
B. | only one member but many member occurrence |
C. | more than one member but only one occurrence per member |
D. | All of the above |
Answer» B. only one member but many member occurrence | |
106. |
A computer file can be best described as |
A. | a single data item |
B. | a general collection of data items |
C. | an orderly collection of data items |
D. | a random collection of data items |
Answer» D. a random collection of data items | |
107. |
In order to use a DBMS, it is important to understand |
A. | the physical schema |
B. | all sub-schemas that the system supports |
C. | one subschema |
D. | both (a) and (b) |
Answer» D. both (a) and (b) | |
108. |
Data encryption techniques are particularly useful for |
A. | reducing storage space requirements |
B. | improving data integrity |
C. | protecting data in data communication systems |
D. | All of the above |
Answer» D. All of the above | |
109. |
Sophisticated report generators can |
A. | print row-oriented reports |
B. | perform arithmetic operations |
C. | selectively retrieve and print portions of a list |
D. | All of the above |
Answer» E. | |
110. |
The PROJECT command will create new table that has |
A. | more fields than the original table |
B. | more rows than the original table |
C. | both (a) and (b) |
D. | all the fields of master table |
Answer» E. | |
111. |
In a relational schema, each tuple is divided into fields called |
A. | Relations |
B. | Domains |
C. | Queries |
D. | All of the above |
Answer» C. Queries | |
112. |
In SQL, which command(s) is(are) used to enable/disable a database trigger? |
A. | MODIFY USER |
B. | CHANGE USER |
C. | ALTER TRIGGER |
D. | All of the above |
Answer» D. All of the above | |
113. |
Data item characteristics that are important in data management include |
A. | punctuation |
B. | language |
C. | spelling |
D. | width |
Answer» E. | |
114. |
In SQL, the CREATE TABLESPACE is used |
A. | to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace |
B. | to create a database trigger |
C. | to add/rename data files, to change storage |
D. | All of the above |
Answer» B. to create a database trigger | |
115. |
In SQL, which command(s) is(are) used to create a synonym for a schema object? |
A. | CREATE SCHEMA |
B. | CREATE SYNONYM |
C. | CREATE SAME |
D. | All of the above |
Answer» C. CREATE SAME | |
116. |
A number of related records that are treated as a unit is called |
A. | file |
B. | field |
C. | data |
D. | batch |
Answer» B. field | |
117. |
If a calculation is embedded in a form |
A. | the result of the calculations are stored with the form |
B. | the calculations are stored with the form |
C. | the result of the calculations are printed in report |
D. | All of the above |
Answer» C. the result of the calculations are printed in report | |
118. |
A multiple-form file management system |
A. | lets you define different forms for different operations |
B. | lets you create a look-up form with an associated read-only password to prevent access by unauthorized users |
C. | both (a) and (b) |
D. | allow you to entry data in all the forms |
Answer» D. allow you to entry data in all the forms | |
119. |
The designer of a form includes |
A. | filed designators |
B. | prompts |
C. | data |
D. | both (a) and (b) |
Answer» E. | |
120. |
A good query system |
A. | can accept English language commands |
B. | allows non-programmers to access information stored in a database |
C. | can be accessed only by data processing professionals |
D. | both (a) and (b) |
Answer» C. can be accessed only by data processing professionals | |
121. |
Which of the following is not true of the traditional approach to information processing? |
A. | There is common sharing of data among the various applications |
B. | It is file-oriented |
C. | Programs are dependent on the files |
D. | It is inflexible |
Answer» B. It is file-oriented | |
122. |
A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be |
A. | the pin code |
B. | the last name |
C. | a compound key consisting of the first name and the last name |
D. | All of the above |
Answer» D. All of the above | |
123. |
Information can be transferred between the DBMS and a |
A. | spreadsheet program |
B. | word processor program |
C. | graphics program |
D. | All of the above |
Answer» E. | |
124. |
In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction? |
A. | ZIP |
B. | PACK |
C. | COMMIT |
D. | SAVE |
Answer» D. SAVE | |
125. |
The main idea behind computer files is that it is convenient to |
A. | arrange them |
B. | store information together |
C. | create them |
D. | access them |
Answer» C. create them | |
126. |
The logical data structure with a one-to-many relationship is a : |
A. | network |
B. | tree |
C. | chain |
D. | relational |
Answer» C. chain | |
127. |
The highest level in the hierarchy of data organization is called |
A. | data bank |
B. | database |
C. | data file |
D. | data record |
Answer» C. data file | |
128. |
A report form |
A. | appears on the computer monitor during data entry |
B. | is used during report generation to format data |
C. | both (a) and (b) |
D. | All of the above |
Answer» C. both (a) and (b) | |
129. |
A database management system might consist of application programs and a software package called |
A. | FORTRAN |
B. | AUTOFLOW |
C. | BPL |
D. | TOTAL |
Answer» D. TOTAL | |
130. |
What is the language used by most of the DBMSs for helping their users to access data? |
A. | High level language |
B. | Query language |
C. | SQL |
D. | 4GL |
Answer» C. SQL | |
131. |
What is the name given to the database management system which is able to handle full text data, image data, audio and video? |
A. | Full media |
B. | Graphics media |
C. | Multimedia |
D. | Hypertext |
Answer» D. Hypertext | |
132. |
Which command is used to remove an index from the database in SQL? |
A. | DELETE INDEX |
B. | DROP INDEX |
C. | REMOVE INDEX |
D. | ROLL BACK INDEX |
Answer» C. REMOVE INDEX | |
133. |
Periodically adding, changing and deleting file records is called file |
A. | Updating |
B. | upgrading |
C. | restructuring |
D. | renewing |
Answer» B. upgrading | |
134. |
If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it. |
A. | Delete |
B. | Update |
C. | Sort Key |
D. | Index |
Answer» E. | |
135. |
The model for a _____ resembles the hierarchical model in many respects. |
A. | Network database |
B. | Relational database |
C. | Distributed database |
D. | Hierarchical database |
Answer» B. Relational database | |
136. |
Which of the following is true of a network structure? |
A. | It is a physical representation of the data |
B. | It allows a many-to-many relationship |
C. | It is conceptually simple |
D. | It will be the dominant data base of the future |
Answer» C. It is conceptually simple | |
137. |
A _____ DBMS distributes data processing tasks between the workstation and a network server. |
A. | Network |
B. | Relational |
C. | Client Server |
D. | Hierarchical |
Answer» D. Hierarchical | |
138. |
A data dictionary is a special file that contains |
A. | the names of all fields in all files |
B. | the data types of all fields in all files |
C. | the widths of all fields in all files |
D. | All of the above |
Answer» E. | |
139. |
When using a database management system, the first thing that you must do is to |
A. | create a database file |
B. | activate file editor |
C. | load the software into your micro¬computer |
D. | keep a floppy disk in readiness |
Answer» D. keep a floppy disk in readiness | |
140. |
A database management system |
A. | allows simultaneous access to multiple files |
B. | can do more than a record management system |
C. | is a collection of programs for managing data in a single file |
D. | both (a) and (b) |
Answer» E. | |
141. |
When you have finished entering information into a form |
A. | the template is written to the data file |
B. | the contents of the form are written to the data file |
C. | the contents of the form can be printed |
D. | All of the above |
Answer» C. the contents of the form can be printed | |
142. |
In SQL, which command is used to select data in rows and column from one or more tables? |
A. | CHOOSE |
B. | SELECT |
C. | LIST |
D. | BROWSE |
Answer» C. LIST | |
143. |
Each of data files has a _____ that describe the way the data is stored in the file. |
A. | File structure |
B. | Records |
C. | Fields |
D. | Database |
Answer» B. Records | |
144. |
The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain? |
A. | Bits |
B. | Characters |
C. | Data field |
D. | Schema |
Answer» D. Schema | |
145. |
Primitive operations common to all record management systems include |
A. | |
B. | Sort |
C. | Look-up |
D. | All of the above |
Answer» D. All of the above | |
146. |
In SQL, GRANT command is used to |
A. | allow user to access databases |
B. | allow user to create databases |
C. | grant system privileges, roles, and object privileges to uses and roles |
D. | choose auditing for specific SQL commands |
Answer» D. choose auditing for specific SQL commands | |
147. |
If you want to group the records in the abc database, you could use the Jobcode as the _____. |
A. | Delete |
B. | Update |
C. | Sort Key |
D. | Index |
Answer» D. Index | |
148. |
Sort/report generators |
A. | are faster than index/report generators |
B. | require more disk space than index/report generators |
C. | do not need to sort before generating a report |
D. | both (a) and (b) |
Answer» C. do not need to sort before generating a report | |
149. |
Data security threats include |
A. | hardware failure |
B. | privacy invasion |
C. | fraudulent manipulation of data |
D. | All of the above |
Answer» C. fraudulent manipulation of data | |
150. |
Which command is used to remove a table from the database in SQL? |
A. | DELETE TABLE |
B. | DROP TABLE |
C. | ERASE TABLE |
D. | UNATTACH TABLE |
Answer» C. ERASE TABLE | |