| Q.21 | …….provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data ? |
| A | DBMS |
| B | Tables |
| C | Database |
| D | Protection password |
| Q.22 | Architecture of database management can be viewed as ? |
| A | Two levels |
| B | Four levels |
| C | Three levels |
| D | One level |
| Q.23 | Oracle is a ? |
| A | Hardware |
| B | High level language |
| C | Operating system |
| D | RDBMS |
| Q.24 | ……is one reason for problems of data integrity ? |
| A | Data availability constraints |
| B | Data inconsistency |
| C | Security constraints |
| D | Data redundancy |
| Q.25 | A set of possible data values is called ? |
| A | Attribute |
| B | Degree |
| C | Tuple |
| D | Domain |
| Q.26 | The particular field of a record that uniquely identifies each record is called ? |
| A | Key field |
| B | Primary field |
| C | Master field |
| D | Order field |
| Q.27 | ……..is a primary key of one file that also appears in another file ? |
| A | Physical key |
| B | Primary key |
| C | Foreign key |
| D | Logical key |
| Q.28 | A logical schema ? |
| A | Is the entire database |
| B | Is a standard way of organizing information into accessible part |
| C | Describe how data is actually stored on disk |
| D | None of these |
| Q.29 | Data duplication wastes the space but also promotes a more serious problem called ? |
| A | Isolated |
| B | Data inconsistency |
| C | Program dependency |
| D | Separated data |
| Q.30 | In E-R diagram, relationship type is represented by ? |
| A | Ellipse |
| B | Dashed ellipse |
| C | Rectangle |
| D | Diamond |
