| Q 1: | 5 NF refers to |
| (1) | Absence of multi-valued dependencies |
| (2) | Foreign key |
| (3) | Super key |
| (4) | Non-loss decomposition |
| Correct Answer: Non-loss decomposition | |
| Q 2: | Select the correct statement from the following and referential integrity. |
| (1) | Referential integrity constraints check whether the primary key values are unique. |
| (2) | Referential integrity constraints are specified between two relations in a schema. |
| (3) | Referential integrity constraints check whether an attribute value lies the given range. |
| (4) | Referential integrity constraints are specified between entities having recursive relationships. |
| Correct Answer: Referential integrity constraints are specified between two relations in a schema. | |
| Q 3: | Database systems that store each relation in a separate operating system file may use the operating system's authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is false? |
| (1) | The administrator enjoys more control on the grant option |
| (2) | This is difficult to differentiate among the update, delete and insert authorizations. |
| (3) | Cannot store more than one relation in a file |
| (4) | Operations on the database are speeded up as the authorization procedure is carried out at the operating system level |
| Correct Answer: Operations on the database are speeded up as the authorization procedure is carried out at the operating system level | |
| Q 4: | AS' clause is used in SQL for |
| (1) | Selection Operation |
| (2) | Rename Operation |
| (3) | Join Operation |
| (4) | Projection Operation |
| Correct Answer: Rename Operation | |
| Q 5: | In link state routing algorithm after construction of link state packets, new routes are computed using: |
| (1) | DES algorithm |
| (2) | Dijkstra's algorithm |
| (3) | RSA algorithm |
| (4) | Packets |
| Correct Answer: Dijkstra's algorithm | |
| Q 6: | ...... means that the sender and receiver expect confidentiality |
| (1) | Nonrepudiation |
| (2) | Integrity |
| (3) | Authentication |
| (4) | None |
| Correct Answer: None | |
| Q 7: | Which diagram is like a flow chart which shows the steps, decision points and branches? |
| (1) | Sequence Diagram |
| (2) | Composite Structure Diagram |
| (3) | Interaction Overview Diagram |
| (4) | Activity Diagram |
| Correct Answer: Activity Diagram | |
| Q 8: | The original IEEE 802.11, has a data rate of........... Mbps |
| (1) | 1 |
| (2) | 6 |
| (3) | 11 |
| (4) | 22 |
| Correct Answer: 1 | |
| Q 9: | Which of the following has disrupted the belief that managers must make all the decisions? |
| (1) | Distributed databases |
| (2) | Expert systems |
| (3) | Advanced telecommunications networks |
| (4) | Decision support tool |
| Correct Answer: Decision support tool | |
| Q 10: | Which on is measure of software complexity |
| (1) | Number of lines of code (LOC) |
| (2) | Number of function points (FP) |
| (3) | Number of man years |
| (4) | All |
| Correct Answer: Number of lines of code (LOC) | |