Q: 1 RAID stands for:
Redundant Array of Independent Disks
Redundant Array of Independent Database
Relational Array of Independent Disks
None of the above
[ Option A ]
RAID (Redundant Array of Independent Disks) is a storage technology that combines multiple physical disks into a single logical unit to improve performance and reliability (fault tolerance). Key characteristics of RAID include:
Q: 2 Which of the following is used as a temporary file created by an information system for a single task?
Transaction file
Work file
History File
Security file
[ Option B ]
A Work File is a temporary file created by an information system to perform a specific or single task. It is used to hold intermediate data during processing and is usually discarded after the task is completed.
Q: 3 To express all the constraints on domain variables, the condition box feature is used in:
QBE
QUEL
SQL
None of these
[ Option A ]
QBE (Query By Example) is a graphical query language where users specify queries by filling example values in tables. The condition box in QBE is specifically used to define constraints or conditions on domain variables, such as comparisons, ranges, or logical conditions.
Q: 4 In Oracle SQL, the owner of the DUAL table is:
SYS
SUPERUSER
SCOTT
MANAGER
[ Option A ]
The DUAL table is a special one-row, one-column table provided by Oracle. It is commonly used to evaluate expressions, call functions, or display system values without referencing any user table.
The owner of the DUAL table is SYS, which is the default system schema in Oracle.
Q: 5 According to the Bell-LaPadula security model, a subject S is permitted to write to an object O only if the security classification of S satisfies which of the following conditions with respect to O?
class (S) ≥ class(O)
class (S) > class(O)
class(S) ≤ class (O)
class (S) < class (O)
[ Option C ]
According to the Bell-LaPadula security model, a subject S is permitted to write to an object O only if the security classification of the subject satisfies the condition:
class(S)≤class(O)
This is known as the "No Write Down" or Star (*) Property rule, which prevents a subject from writing information to a lower security level object, thereby preventing potential information leakage from higher classified data to lower classification levels.
Q: 6 Which of the following is considered a fourth-generation language (4GL)?
COBOL
VB
SQL
JAVA
[ Option C ]
A fourth-generation language (4GL) is a non-procedural language that allows users to specify what result is required, not how to compute it.
SQL fits this definition because users write queries to describe the desired data, and the DBMS decides the execution steps.
Q: 7 Which of the following ensures database security?
Data encryption
Passwords
Granting privileges
All of the above
[ Option D ]
Database security is maintained using:
Q: 8 A trigger is written in which of the following languages?
SQL
PL/SQL
Java
Machine language
[ Option B ]
A trigger is a stored program that automatically executes when a specific event occurs on a table or view.
In Oracle DBMS, triggers are written using PL/SQL, which extends SQL with procedural features like variables, conditions, and loops.
Q: 9 Performance benchmarks are:
Suit of tasks that are used to quantify the performance
Suit of tasks that are used to qualify the performance
Standard of performance
None of the above
[ Option A ]
Performance benchmarks are a set of standard tasks or workloads used to measure and quantify the performance of a system, such as response time, throughput, or resource usage.
Q: 10 Which of the following query languages has a two-dimensional syntax?
SQL
QUEL
QBE
None of the above
[ Option C ]
QBE (Query By Example) uses a two-dimensional, tabular syntax where users specify queries by filling values into table-like forms.
Rows and columns are used to represent conditions and data, making it easy and visual.
Q: 11 Oracle is an example of which type of database management system?
RDBMS
OODBMS
ORDBMS
All of the above
[ Option C ]
Oracle is primarily an Object–Relational Database Management System (ORDBMS). It is based on the relational model but also supports object-oriented features such as user-defined types, inheritance, and methods.
Q: 12 Authorization in a database system can be:
Read authorization
Insert authorization
Update authorization
All of the above
[ Option D ]
Authorization defines the permissions granted to a user regarding database operations.
Q: 13 A _________ contains record that contains day-to-day business and operational data.
Transactional File
Work File
Table File
Master File
[ Option A ]
A Transactional File stores day-to-day business operations such as sales, purchases, payments, or receipts. These records are created frequently and change regularly as business activities occur.
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.