Database Questions Practice Question and Answer
8 Q: U. S. B. The full form of is:
653 064a5413065d2524cbf0bee84
64a5413065d2524cbf0bee84- 1Universal Serial Bustrue
- 2Universal sequential busfalse
- 3Unique serial busfalse
- 4Unique sequential busfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Universal Serial Bus"
Explanation :
1. The full form of USB is Universal Serial Bus.
2. USB is a wired device with the help of which you can connect any other device like mobile with laptop, mobile with computer etc.
3. Apart from this, you can also insert a memory card inside the laptop with its help because it is a port in which we can insert things like Pendrive, Card Reader, Data Cable etc.
Q: Which of the following statements is true?
(I) Primary storage units have faster access time and less storage capacity than secondary storage units.
(II) Primary storage units have sequential access.
(III) Secondary storage units are non-volatile storage.
747 064a515518ecb104cc62515e1
64a515518ecb104cc62515e1(I) Primary storage units have faster access time and less storage capacity than secondary storage units.
(II) Primary storage units have sequential access.
(III) Secondary storage units are non-volatile storage.
- 1(I) and (II) onlyfalse
- 2(I) and (III) onlytrue
- 3(II) and (III) onlyfalse
- 4All (I), (II) and (III)false
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "(I) and (III) only"
Explanation :
All of the following statements are true.
(I) Primary storage units have faster access time and less storage capacity than secondary storage units.
(II) Secondary storage units are non-volatile storage.
Q: Which files are used during the operation of DBMS?
726 063e9ed787312b71d33d7943a
63e9ed787312b71d33d7943a- 1Query language and utilitiesfalse
- 2Data manipulation language and query languagefalse
- 3Data dictionary and transaction logtrue
- 4Data dictionary and query languagefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Data dictionary and transaction log "
Explanation :
During DBMS operation, essential files include the data dictionary, containing metadata like table structures, and the transaction log, recording all database transactions. The data dictionary guides the DBMS in understanding database organization, while the transaction log ensures data integrity by recording modifications. Both files are crucial for effective database management, enabling accurate querying, data manipulation, and system recovery in case of failures, ensuring the system's reliability and consistency.
Q: Which command is used to remove a table from the database in SQL?
870 063e9ee077312b71d33d794fb
63e9ee077312b71d33d794fb- 1DELETE TABLEfalse
- 2DROP TABLEtrue
- 3ERASE TABLEfalse
- 4UNATTACH TABLEfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "DROP TABLE "
Explanation :
In SQL, the DROP TABLE command is used to remove a table from the database. When you execute DROP TABLE, it deletes the table along with all its data, indexes, triggers, constraints, and permissions. It should be used with caution as it permanently removes the table and all associated objects from the database.
Q: The Best way to protect your hard drive data Select:
615 064a51756dc607a4d2b27c13f
64a51756dc607a4d2b27c13f- 1Scanningfalse
- 2Backuptrue
- 3Defragmentationfalse
- 4Remove junkfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Backup"
Explanation :
The best way to protect your hard drive data is a multi-tiered approach that includes the following:-
1. Data Backup: This is the most important security measure. If your hard drive fails, is stolen, or the data becomes corrupted, you must have a way to restore the data. Data backups should be maintained regularly and in a safe location.
2. Password Protection: Password protects your hard drive. This will help prevent unauthorized access. Use strong passwords that are easy to remember, but difficult to guess.
3. Encryption: Encrypt your hard drive. This will make the data unreadable to people who do not know the password. Encryption provides an additional security layer that keeps data safe in the event of theft or loss.
4. Virus and malware protection: Install a reliable antivirus and antimalware program on your computer. This will help protect your data from harmful software.
5. Secure file sharing: If you plan to share your data with others, make sure you do so in a secure manner. Use a secure file-sharing service that offers encryption and password protection.
Q: In a _______, a parent record type can be associated with one or more "child" record types, but a child record type can have only one parent.
819 063e9ed089353301b5cd70ce7
63e9ed089353301b5cd70ce7- 1network databasefalse
- 2relational databasefalse
- 3distributed databasefalse
- 4hierarchical databasetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "hierarchical database"
Explanation :
In a hierarchical database model, a parent record type can be associated with one or more child record types, but a child record type can have only one parent. This hierarchical structure is represented as a tree-like schema, where each parent record can have multiple child records, but each child record has only one parent. This model is useful for representing data with hierarchical relationships, such as organizational structures or file systems.
Q: While using a database management system, the first thing you have to do is ________.
661 063e9edbeaa2a114c95182ea5
63e9edbeaa2a114c95182ea5- 1Create a database filefalse
- 2Activate file editorfalse
- 3Load the software into your computertrue
- 4Keep a floppy disk in readinessfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Load the software into your computer "
Explanation :
While using a database management system, the first thing you have to do is install the software on your computer. Loading the software involves the installation process, which includes copying the necessary files and configuring the system to run the database management software effectively. Once installed, you can then create databases, define data structures, and start working with the DBMS to manage your data.
Q: _______ is used to measure the speed of the processor.
572 064a52879dc607a4d2b28119b
64a52879dc607a4d2b28119b- 1Velocityfalse
- 2Unitfalse
- 3Clock speedtrue
- 4Memoryfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Clock speed"
Explanation :
1. Clock speed is used to measure the speed of the processor.
2. Clock speed is the rate at which a processor can complete a processing cycle. It is usually measured in megahertz or gigahertz.
3. One megahertz is equal to one million cycles per second, while one gigahertz is equal to one billion cycles per second. This means that a 1.8 GHz processor has twice the clock speed of a 900 MHz processor.