Practice Exercise

1.A field that uniquely identifies which person, thing, or event the record describes is a

(a) file (b) data ) field (d) key (e) None of these


2.The ability to find an individual item in a file immediately –

(a) sequential access (b) file allocation table (c) direct access (d) directory (e) None of these


3.Which of the following places the common data elements in order from smallest to largest?

(a) Character, file record, field, database (b) Character, record, field, file, database (c) Character, field, record, file, database (d) Bit, byte, character, record, field, file, database (e) None of these


4.Files are organised by storing them in

(a) tables (b) databases (c) folders D (d) graphs None of these


5.A collection of unprocessed items is

(a) information (b) data (c) memory (d) reports None of these


6.Example of non-numeric data is

(a) Employee address (b) Examination score Bank balance (d) All of these (e) None of these


7.Periodically adding, changing and deleting file records is called file

(a) updating (b) upgrading (c) restructiring (d) renewing (e) None of these


8.Which of the following statements best describes the batch method of input?

(a) Data is processed as soon as it is input (b) Data is input at the time it is collected (c) Data is collected in the form of source documents, placed into groups, and then input to the computer (d) Source documents are not used (e) None of these represents raw facts, whereas


9._ is data made meaningful.

(a) Information, reporting (b) Data, informatione (c) Information, bits (d) Records, bytes (e) None of these


10.An ad hoc query is a

(a) pre-planned question (b) pre-scheduled question (c) spur-of-the-moment question (d) question that will not return any results (e) None of these


11.A telephone number, a birth date, and a customer name are all examples of

(a) a record (b) data (c) a file (d) a database (e) None of these


12.A collection of interrelated files in a computer is a

(a) file manager : (b) field (C) record (d) database (e) None of these


13.Collecting personal information and effectively posing as another individual is known as the crime of

(a) spooling  (b) identity theft (c) spoofing *(d) hacking (e) None of these


14.The first step in the transaction processing cycle is

(a) database operations (b) audit (c) data entry (d) user inquiry (e) None of these


15.A tuple is a

(a) column of a table (b) two-dimensional table (c) row of a table (d) key of a table (e) None of these _


16.The method of file organization in which data records in a file are arranged in a specified order according to key filed is known as the

(a) Direct access method (b) Queuing method (c) Predetermined method (d) Sequential access method (e) None of these


17.Numbers in table columns are usually

(a) right-aligned (b) left-aligned (c) justified (d) centered (e) None of these


18.The simultaneous execution of two or more instructions is called

(a) sequential access (b) reduced instruction set computing (c) multiprocessing (d) disk mirroring (e) None of these


19.A collection of interrelated records is called a

(a) management information system (b) spreadsheet (C) database (d) text file (e) None of these


20.How many options does a binary choice offer?

(a) One (b) Two (c) Three (d) It depends on the amount of memory in the computer (e) None of the above


21.The name of the location of a particular piece of data is its

(a) address (b) memory name (c) storage site data location (e) None of the above


22. A Field is a related group of

(a) Records (b) Files (C) Characters (d) Cables (e) None of the above


23. A prescribed set of well-defined instructions for solving mathematical problems is called

(a) a compiler (b) a code (c) a description (d) an algorithm (e) None of the above


24. A record is related to a file as a statement is related to a

(a) procedure (b) file (c) program (d) data (e) None of the above


25.Meaningful filename helps in easy file .

(a) Storing (b) Accessing (c) Identification (d) Printing (e) None of the above


26.You organise files by storing them in

(a) archives (b) folders (c) indexes (d) lists (e) None of these


27.Distributed processing involves

(a) solving computer component problems from a different computer (b) solving computing problems by breaking them into smaller parts that are separately processed by different computers (c) allowing users to share files on a network (d) allowing users to access network resources away from the office (e) None of these


28.When data changes in multiple lists and all lists are not updated, this causes

(a) data redundancy (b) information overload (c) duplicate data (d) data inconsistency

(e) data repetition


29.The issues that deals with the collection and use of data about individuals is

(a) access (b) publicity (c) accuracy (d) property (e) privacy


30.Participants can see and hear each other in a/an

(a) electronic mail system (b) message system (c) teleconference (d) bulletin board

(e) None of these |


31.How do businesses protect their databases?

(a) Security guards are hired to watch the databases at all times. (b) Databases are protected by file swapping. (c) Databases are naturally protected. (d) Databases are kept physically and electronically secure. (e) The computer room is kept locked after

office hours.


32.The path of creation of an executable is

(a) coding, linking, compiling, parsing (b) coding, parsing, compiling, linking. (c) coding, compiling, parsing, linking (d) coding, compiling, linking, parsing. (e) coding, parsing, linking, compiling


33._______increase the accuracy of a search by fine-tuning the keywords in the search.

(a) Indexes (b)Italics (c) Compounds (d) Links (e) Operators


34.The main purpose(s) of a database management program is to

(a) allow users to retrieve and analyze stored records. (b) provide a way to store information about specified entities. (c) make it possible for users to store information as interrelated records. (d) translate hard-to-read data into more legible formats. (e) a, b, and c above


35.Files are organised by storing them in

(a) tables (b) databases (c) folders (d) graphs (e) diagrams


36.Which of the following contains permanent data and gets updated during the processing of transactions?

(a) Operating System File (b) Transaction file (c) Software File (d) Master file

(e) None of these


37.The DBMS acts as an interface between what two components of an enterprise-class database system?

(a) Database application and the database (b) Data and the database (c) The user and the database application (d) Database application and SQL

(e) None of these


38.The following are components of a database except

(a) user data (b) metadata (c) reports indexes (e) None of these


39.An application where only one user accesses the database at a given time is an example of a(n)

(a) single-user database application (b) multiuser database application (c) e-commerce database application (d) data mining database application (e) None of these


40.A DBMS that combines a DBMS and an application generator is

(a) Microsoft’s SQL Server (b) Microsoft’s Access (c) IBM’s DB2 (d) Oracle Corporation’s Oracle (e) None of these


41.The DBMS that is most difficult to use is

(a) Microsoft’s SQL Server (b) Microsoft’s Access (C) IBM’s DB2 (d) Oracle Corporation’s Oracle (e) None of these


42.In order to understand DBMS, it is important to understand ?

(a) the physical schema (b) all sub schema that are system support (C) one sub schema (d) Both (a) and (b) (e) on demand report


43.Databases overall structure is maintained in a file called

(a) Redolog file (b) Data file (c) Control file (d) All of the above (e) None of these


44.E-R modeling technique is a

(a) top-down approach (b) bottom-up approach (c) left-right approach (d) both top-down and bottom-up (e) None of these


45.Data independency in DBMS is known as

(a) Data modeling (b) Data hiding (c) Data capturing (d) Data consistency

(e) None of these

Ans. A

46.A data dictionary doesn’t provide information about

(a) where data is located (b) the size of the disk storage disk (c) who owns or is responsible for the data (d) how the data is used

(e) None of these

Ans. B

47.The database administrator is, in effect, the coordinator between the ____ and the

(a) DBMS; database (b) application program; database (C) database, users (d) application programs; users (e) None of these

Ans. C

48.What does the data dictionary identify?.

(a) Field names (b) Field types (c) Field formates (d) All of the above (e) None of these

Ans. D

49.Which is one function of a database management system (DBMS)?

(a) Ensuring usability (b) Identifying what a user needs (C) Deciding what to do with legacy systems (d) Preventing errors arising, while enabling multiple, simultaneous users (e) None of these


50.A relation (from the relational database model) consists of a set of tuples, which implies that

(a) relational model supports multi-valued attributes whose values can be represented in sets. (b) for any two tuples, the values associated with all of their attributes may be the same. (c) for any two tuples, the value associated with one or more of their attributes must differ. (d) all tuples in particular relation may have different attributes. (e) None of these


Get more important gk topic
in your mailbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Leave a Reply

Your email address will not be published. Required fields are marked *