Database Management System Set 18
Computer Science Engineering (CSE),
Bachelor of Science in Computer Science FY (BSc CS),
Bachelor of Science in Computer Science SY (BSc CS),
Bachelor of Science in Information Technology SY (BSc IT),
Bachelor of Computer Applications (BCA),
Bachelor of Business Administration in Computer Applications (BBA [CA]),
Bachelor of Science in Information Technology (BSc IT),
On This Page
This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 18
Q1 | Each array declaration need not give, implicitly or explicitly, the information about
- the name of array
- the data type of array
- the first data from the set to be stored
- the index set of the array
Q2 | In attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
- sql injection
- sql
- direct
- application
Q3 | A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a attack.
- two-factor authentication
- cross-site request forgery
- cross-site scripting
- cross-site scoring scripting
Q4 | is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
- two-factor authentication
- cross-site request forgery
- cross-site scripting
- cross-site scoring scripting
Q5 | A single further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
- openid
- sign-on system
- security assertion markup language (saml)
- virtual private database (vpd)
Q6 | The is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.
- openid
- sign-on system
- security assertion markup language (saml)
- virtual private database (vpd)
Q7 | allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
- openid
- single-site system
- security assertion markup language (saml)
- virtual private database (vpd)
Q8 | VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism.
- row-level authorization
- column-level authentication
- row-type authentication
- authorization security
Q9 | is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
- encryption
- data mining
- internet security
- architectural security
Q10 | In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
- encryption key
- decryption key
- primary key
- authorised key
Q11 | Which of the following is not a property of good encryption technique?
- relatively simple for authorized users to encrypt and decrypt data
- decryption key is extremely difficult for an intruder to determine
- encryption depends on a parameter of the algorithm called the encryption key
- none of the mentioned
Q12 | In which of the following encryption key is used to encrypt and decrypt the data?
- public key
- private key
- symmetric key
- asymmetric key
Q13 | Encryption of small values, such as identifiers or names, is made complicated by the possibility of
- dictionary attacks
- database attacks
- minor attacks
- random attacks
Q14 | Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?
- round key algorithm
- public key algorithm
- advanced encryption standard
- asymmetric key algorithm
Q15 | Which of the following requires no password travel across the internet?
- readable system
- manipulation system
- challenge–response system
- response system
Q16 | The is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.
- cache
- disk
- main memory
- flash memory
Q17 | Which of the following stores several gigabytes of data but usually lost when power failure?
- flash memory
- disk
- main memory
- secondary memory
Q18 | The flash memory storage used are
- nor flash
- or flash
- and flash
- all of the mentioned
Q19 | is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.
- flash memory
- disk
- main memory
- secondary memory
Q20 | The primary medium for the long-term online storage of data is the where the entire database is stored on magnetic disk.
- semiconductor memory
- magnetic disks
- compact disks
- magnetic tapes
Q21 | Optical disk systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.
- tape storage
- jukebox
- flash memory
- all of the mentioned
Q22 | There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called disks.
- write-once, read-many (worm)
- cd-r
- dvd-w
- cd-rom
Q23 | In magnetic disk stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.
- read–write head
- read-assemble head
- head–disk assemblies
- disk arm
Q24 | A is the smallest unit of information that can be read from or written to the disk.
- track
- spindle
- sector
- platter
Q25 | The disk controller uses at each sector to ensure that the data is not corrupted on data retrieval.
- checksum
- unit drive
- read disk
- readsum