Practice Exercise

1.A field that uniquely identifies which person, thing, or event the record describes is a

(a) file (b) data ) field (d) key (e) None of these

Ans.D

2.The ability to find an individual item in a file immediately –

(a) sequential access (b) file allocation table (c) direct access (d) directory (e) None of these

Ans.C

3.Which of the following places the common data elements in order from smallest to largest?

(a) Character, file record, field, database (b) Character, record, field, file, database (c) Character, field, record, file, database (d) Bit, byte, character, record, field, file, database (e) None of these

Ans.C

4.Files are organised by storing them in

(a) tables (b) databases (c) folders D (d) graphs None of these

Ans.C

5.A collection of unprocessed items is

(a) information (b) data (c) memory (d) reports None of these

Ans.B

6.Example of non-numeric data is

(a) Employee address (b) Examination score Bank balance (d) All of these (e) None of these

Ans.A

7.Periodically adding, changing and deleting file records is called file

(a) updating (b) upgrading (c) restructiring (d) renewing (e) None of these

Ans.A

8.Which of the following statements best describes the batch method of input?

(a) Data is processed as soon as it is input (b) Data is input at the time it is collected (c) Data is collected in the form of source documents, placed into groups, and then input to the computer (d) Source documents are not used (e) None of these represents raw facts, whereas

Ans.C

9._ is data made meaningful.

(a) Information, reporting (b) Data, informatione (c) Information, bits (d) Records, bytes (e) None of these

Ans.B

10.An ad hoc query is a

(a) pre-planned question (b) pre-scheduled question (c) spur-of-the-moment question (d) question that will not return any results (e) None of these

Ans.C

11.A telephone number, a birth date, and a customer name are all examples of

(a) a record (b) data (c) a file (d) a database (e) None of these

Ans.A

12.A collection of interrelated files in a computer is a

(a) file manager : (b) field (C) record (d) database (e) None of these

Ans.D

13.Collecting personal information and effectively posing as another individual is known as the crime of

(a) spooling  (b) identity theft (c) spoofing *(d) hacking (e) None of these

Ans.B

14.The first step in the transaction processing cycle is

(a) database operations (b) audit (c) data entry (d) user inquiry (e) None of these

Ans.C

15.A tuple is a

(a) column of a table (b) two-dimensional table (c) row of a table (d) key of a table (e) None of these _

Ans.C

16.The method of file organization in which data records in a file are arranged in a specified order according to key filed is known as the

(a) Direct access method (b) Queuing method (c) Predetermined method (d) Sequential access method (e) None of these

Ans.D

17.Numbers in table columns are usually

(a) right-aligned (b) left-aligned (c) justified (d) centered (e) None of these

Ans.A

18.The simultaneous execution of two or more instructions is called

(a) sequential access (b) reduced instruction set computing (c) multiprocessing (d) disk mirroring (e) None of these

Ans.C

19.A collection of interrelated records is called a

(a) management information system (b) spreadsheet (C) database (d) text file (e) None of these

Ans.C

20.How many options does a binary choice offer?

(a) One (b) Two (c) Three (d) It depends on the amount of memory in the computer (e) None of the above

Ans.B

21.The name of the location of a particular piece of data is its

(a) address (b) memory name (c) storage site data location (e) None of the above

Ans.A

22. A Field is a related group of

(a) Records (b) Files (C) Characters (d) Cables (e) None of the above

Ans.A

23. A prescribed set of well-defined instructions for solving mathematical problems is called

(a) a compiler (b) a code (c) a description (d) an algorithm (e) None of the above

Ans.D

24. A record is related to a file as a statement is related to a

(a) procedure (b) file (c) program (d) data (e) None of the above

Ans.D

25.Meaningful filename helps in easy file .

(a) Storing (b) Accessing (c) Identification (d) Printing (e) None of the above

Ans.B

26.You organise files by storing them in

(a) archives (b) folders (c) indexes (d) lists (e) None of these

Ans.B

27.Distributed processing involves

(a) solving computer component problems from a different computer (b) solving computing problems by breaking them into smaller parts that are separately processed by different computers (c) allowing users to share files on a network (d) allowing users to access network resources away from the office (e) None of these

Ans.B

28.When data changes in multiple lists and all lists are not updated, this causes

(a) data redundancy (b) information overload (c) duplicate data (d) data inconsistency

(e) data repetition

Ans.D

29.The issues that deals with the collection and use of data about individuals is

(a) access (b) publicity (c) accuracy (d) property (e) privacy

Ans.E

30.Participants can see and hear each other in a/an

(a) electronic mail system (b) message system (c) teleconference (d) bulletin board

(e) None of these |

Ans.C

31.How do businesses protect their databases?

(a) Security guards are hired to watch the databases at all times. (b) Databases are protected by file swapping. (c) Databases are naturally protected. (d) Databases are kept physically and electronically secure. (e) The computer room is kept locked after

office hours.

Ans.D

32.The path of creation of an executable is

(a) coding, linking, compiling, parsing (b) coding, parsing, compiling, linking. (c) coding, compiling, parsing, linking (d) coding, compiling, linking, parsing. (e) coding, parsing, linking, compiling

Ans.D

33._______increase the accuracy of a search by fine-tuning the keywords in the search.

(a) Indexes (b)Italics (c) Compounds (d) Links (e) Operators

Ans.A

34.The main purpose(s) of a database management program is to

(a) allow users to retrieve and analyze stored records. (b) provide a way to store information about specified entities. (c) make it possible for users to store information as interrelated records. (d) translate hard-to-read data into more legible formats. (e) a, b, and c above

Ans.E

35.Files are organised by storing them in

(a) tables (b) databases (c) folders (d) graphs (e) diagrams

Ans.C

36.Which of the following contains permanent data and gets updated during the processing of transactions?

(a) Operating System File (b) Transaction file (c) Software File (d) Master file

(e) None of these

Ans.D

37.The DBMS acts as an interface between what two components of an enterprise-class database system?

(a) Database application and the database (b) Data and the database (c) The user and the database application (d) Database application and SQL

(e) None of these

Ans.A

38.The following are components of a database except

(a) user data (b) metadata (c) reports indexes (e) None of these

Ans.C

39.An application where only one user accesses the database at a given time is an example of a(n)

(a) single-user database application (b) multiuser database application (c) e-commerce database application (d) data mining database application (e) None of these

Ans.A

40.A DBMS that combines a DBMS and an application generator is

(a) Microsoft’s SQL Server (b) Microsoft’s Access (c) IBM’s DB2 (d) Oracle Corporation’s Oracle (e) None of these

Ans.B

41.The DBMS that is most difficult to use is

(a) Microsoft’s SQL Server (b) Microsoft’s Access (C) IBM’s DB2 (d) Oracle Corporation’s Oracle (e) None of these

Ans.D

42.In order to understand DBMS, it is important to understand ?

(a) the physical schema (b) all sub schema that are system support (C) one sub schema (d) Both (a) and (b) (e) on demand report

Ans.C

43.Databases overall structure is maintained in a file called

(a) Redolog file (b) Data file (c) Control file (d) All of the above (e) None of these

Ans.C

44.E-R modeling technique is a

(a) top-down approach (b) bottom-up approach (c) left-right approach (d) both top-down and bottom-up (e) None of these

Ans.A

45.Data independency in DBMS is known as

(a) Data modeling (b) Data hiding (c) Data capturing (d) Data consistency

(e) None of these

Ans. A

46.A data dictionary doesn’t provide information about

(a) where data is located (b) the size of the disk storage disk (c) who owns or is responsible for the data (d) how the data is used

(e) None of these

Ans. B

47.The database administrator is, in effect, the coordinator between the ____ and the

(a) DBMS; database (b) application program; database (C) database, users (d) application programs; users (e) None of these

Ans. C

48.What does the data dictionary identify?.

(a) Field names (b) Field types (c) Field formates (d) All of the above (e) None of these

Ans. D

49.Which is one function of a database management system (DBMS)?

(a) Ensuring usability (b) Identifying what a user needs (C) Deciding what to do with legacy systems (d) Preventing errors arising, while enabling multiple, simultaneous users (e) None of these

Ans.d

50.A relation (from the relational database model) consists of a set of tuples, which implies that

(a) relational model supports multi-valued attributes whose values can be represented in sets. (b) for any two tuples, the values associated with all of their attributes may be the same. (c) for any two tuples, the value associated with one or more of their attributes must differ. (d) all tuples in particular relation may have different attributes. (e) None of these

Ans.c

Get more important gk topic
in your mailbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Leave a Reply

Your email address will not be published. Required fields are marked *