Database Questions Practice Question and Answer

Q:

U. S. B. The full form of is:

448 0

  • 1
    Universal Serial Bus
    Correct
    Wrong
  • 2
    Universal sequential bus
    Correct
    Wrong
  • 3
    Unique serial bus
    Correct
    Wrong
  • 4
    Unique sequential bus
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Universal Serial Bus"
Explanation :

1. The full form of USB is Universal Serial Bus.

2. USB is a wired device with the help of which you can connect any other device like mobile with laptop, mobile with computer etc.

3. Apart from this, you can also insert a memory card inside the laptop with its help because it is a port in which we can insert things like Pendrive, Card Reader, Data Cable etc.

Q:

Which of the following statements is true?
 (I) Primary storage units have faster access time and less storage capacity than secondary storage units.
 (II) Primary storage units have sequential access.
 (III) Secondary storage units are non-volatile storage.

515 0

  • 1
    (I) and (II) only
    Correct
    Wrong
  • 2
    (I) and (III) only
    Correct
    Wrong
  • 3
    (II) and (III) only
    Correct
    Wrong
  • 4
    All (I), (II) and (III)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "(I) and (III) only"
Explanation :

All of the following statements are true.

(I) Primary storage units have faster access time and less storage capacity than secondary storage units.

(II) Secondary storage units are non-volatile storage.

Q:

Which files are used during the operation of DBMS?

458 0

  • 1
    Query language and utilities
    Correct
    Wrong
  • 2
    Data manipulation language and query language
    Correct
    Wrong
  • 3
    Data dictionary and transaction log
    Correct
    Wrong
  • 4
    Data dictionary and query language
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Data dictionary and transaction log "
Explanation :

During DBMS operation, essential files include the data dictionary, containing metadata like table structures, and the transaction log, recording all database transactions. The data dictionary guides the DBMS in understanding database organization, while the transaction log ensures data integrity by recording modifications. Both files are crucial for effective database management, enabling accurate querying, data manipulation, and system recovery in case of failures, ensuring the system's reliability and consistency.


Q:

Which command is used to remove a table from the database in SQL?

491 0

  • 1
    DELETE TABLE
    Correct
    Wrong
  • 2
    DROP TABLE
    Correct
    Wrong
  • 3
    ERASE TABLE
    Correct
    Wrong
  • 4
    UNATTACH TABLE
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "DROP TABLE "
Explanation :

In SQL, the DROP TABLE command is used to remove a table from the database. When you execute DROP TABLE, it deletes the table along with all its data, indexes, triggers, constraints, and permissions. It should be used with caution as it permanently removes the table and all associated objects from the database.


Q:

The Best way to protect your hard drive data Select:

375 0

  • 1
    Scanning
    Correct
    Wrong
  • 2
    Backup
    Correct
    Wrong
  • 3
    Defragmentation
    Correct
    Wrong
  • 4
    Remove junk
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Backup"
Explanation :

The best way to protect your hard drive data is a multi-tiered approach that includes the following:-

1. Data Backup: This is the most important security measure. If your hard drive fails, is stolen, or the data becomes corrupted, you must have a way to restore the data. Data backups should be maintained regularly and in a safe location.

2. Password Protection: Password protects your hard drive. This will help prevent unauthorized access. Use strong passwords that are easy to remember, but difficult to guess.

3. Encryption: Encrypt your hard drive. This will make the data unreadable to people who do not know the password. Encryption provides an additional security layer that keeps data safe in the event of theft or loss.

4. Virus and malware protection: Install a reliable antivirus and antimalware program on your computer. This will help protect your data from harmful software.

5. Secure file sharing: If you plan to share your data with others, make sure you do so in a secure manner. Use a secure file-sharing service that offers encryption and password protection.

Q:

In a _______, a parent record type can be associated with one or more "child" record types, but a child record type can have only one parent.

526 0

  • 1
    network database
    Correct
    Wrong
  • 2
    relational database
    Correct
    Wrong
  • 3
    distributed database
    Correct
    Wrong
  • 4
    hierarchical database
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "hierarchical database"
Explanation :

In a hierarchical database model, a parent record type can be associated with one or more child record types, but a child record type can have only one parent. This hierarchical structure is represented as a tree-like schema, where each parent record can have multiple child records, but each child record has only one parent. This model is useful for representing data with hierarchical relationships, such as organizational structures or file systems.


Q:

While using a database management system, the first thing you have to do is ________.

403 0

  • 1
    Create a database file
    Correct
    Wrong
  • 2
    Activate file editor
    Correct
    Wrong
  • 3
    Load the software into your computer
    Correct
    Wrong
  • 4
    Keep a floppy disk in readiness
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Load the software into your computer "
Explanation :

While using a database management system, the first thing you have to do is install the software on your computer. Loading the software involves the installation process, which includes copying the necessary files and configuring the system to run the database management software effectively. Once installed, you can then create databases, define data structures, and start working with the DBMS to manage your data.

Q:

_______ is used to measure the speed of the processor.

416 0

  • 1
    Velocity
    Correct
    Wrong
  • 2
    Unit
    Correct
    Wrong
  • 3
    Clock speed
    Correct
    Wrong
  • 4
    Memory
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Clock speed"
Explanation :

1. Clock speed is used to measure the speed of the processor.

2. Clock speed is the rate at which a processor can complete a processing cycle. It is usually measured in megahertz or gigahertz.

3. One megahertz is equal to one million cycles per second, while one gigahertz is equal to one billion cycles per second. This means that a 1.8 GHz processor has twice the clock speed of a 900 MHz processor.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully