On This Page

This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 18

Q1 | Each array declaration need not give, implicitly or explicitly, the information about
Q2 | In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
Q3 | A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.
Q4 |                    is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
Q5 | A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
Q6 | The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.
Q7 |                                allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
Q8 | VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.
Q9 |                        is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
Q10 | In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
Q11 | Which of the following is not a property of good encryption technique?
Q12 | In which of the following encryption key is used to encrypt and decrypt the data?
Q13 | Encryption of small values, such as identifiers or names, is made complicated by the possibility of                      
Q14 | Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?
Q15 | Which of the following requires no password travel across the internet?
Q16 | The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.
Q17 | Which of the following stores several gigabytes of data but usually lost when power failure?
Q18 | The flash memory storage used are
Q19 |                      is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.
Q20 | The primary medium for the long-term online storage of data is the                       where the entire database is stored on magnetic disk.
Q21 | Optical disk                systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.
Q22 | There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called                      disks.
Q23 | In magnetic disk                  stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.
Q24 | A                      is the smallest unit of information that can be read from or written to the disk.
Q25 | The disk controller uses                  at each sector to ensure that the data is not corrupted on data retrieval.