KEMBAR78
COC For Database and Web Development | PDF | Databases | Database Transaction
0% found this document useful (0 votes)
60 views9 pages

COC For Database and Web Development

The document consists of a series of multiple-choice questions related to database management, SQL commands, and web development concepts. It covers topics such as database recovery, SQL syntax, data manipulation, and CSS styling. Each question presents options for the correct answer, aimed at assessing knowledge in these areas.

Uploaded by

addisu tesfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views9 pages

COC For Database and Web Development

The document consists of a series of multiple-choice questions related to database management, SQL commands, and web development concepts. It covers topics such as database recovery, SQL syntax, data manipulation, and CSS styling. Each question presents options for the correct answer, aimed at assessing knowledge in these areas.

Uploaded by

addisu tesfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

Database Regression test can be done


A. Regular basis B. Sometimes C. Not required D. Occasionally
2. While SQL operate the power failure occurred, if you want to recover transaction which was executing at
failure time, what you have to
A. Take a back up the transaction log, restore the Database from the last full Database backup, and then
restore all the transaction logs
B. Nothing. SQL Server will recover automatically, rolling back pending transactions and rolling forward
committed ones.
C. Nothing. All transactions since the last checkpoint are lost; the effects of the others are in the Database.
d. Run ROLL FORWARD ALL TRANSACTIONS.
3. Suppose you are recruited as Database Administrator in Fulbright PLC Company where records of
Exchange commodities are expected to be managed centrally for the sake of administration using SQL.
Thus, which of the following syntax is the correct implementation of SQL commands used to build a
Table PRODUCTS and add fields such as Prodid, Prod Name, Item Quantity, ProdUnitPrice and
Description for the table?
a. INSERT TABLE PRODUCTS (Prodid, Prod Name, Item Quantity, ProdUnitPrice, Description :)
b. UPDATE PRODUCTS SET Prodld, ProdName, ItemQuantity, ProdUnitPrice, Description; WHERE
Prodid='ETH30';
c. CREATE TABLE PRODUCTS (Prodid, ProdName, Item Quantity, ProdUnitPrice, Description ;)
d. SELECT * FROM Prodld, Prod Name, Item Quantity, ProdUnitPrice, Description;
4. Assume that you are asked to design the logical view of database for ABC PLC. As database expert
which one clearly shows the skeleton structure that defines how the data is organized and how the
relationships are associated?
A. Database Architecture B. Database Schema
C. Database Manipulation D. Database Retrieval
5. Microsoft Windows, IOS, and Linux are all types of software that belong to
a. Operating system b. Database system
C. Hardware systems d. Application software
6. Which one is Data Manipulation Command?
A. DROP B. DELETE C.TRANCATE D. SELECT
7. Which of the following is the correct syntax to make the background-color of all paragraph elements to
yellow?
a. all p {background-color: #yellow;}
b. all {background-color: yellow;}
C. p {background-color: yellow;}

Prepared By Addisu T. Page 1


d. p{ background-color: #yellow;}
8. A UNION query is which of the following?
a. Combines the output from no more than two queries and does not include the same number of columns.
b. Combines the output from multiple queries and must include the same number of columns.
c. Combines the output from no more than two queries and must include the same number of columns. d.
Combines the output from multiple queries and does not include the same number of columns.
9. Performance analysis and tuning is which of the following?
a. Undertaken one time at the time of a DBMS installation
b. Undertaken as an ongoing part of managing a database
c. Undertaken as an ongoing part of the backup of a database
d. Undertaken one time at the time of the implementation of a new application
10. The collection of documents that are designed to help people who need to manage, operate or maintain
computer hardware or software.
a. Inventory record d. Inventory documents
b. Technical documentation c. Hardware inventory
11. The SQL statement that queries or reads data from a table is returns a result set of records, from one or
more tables.
a. QUERY b. ORDER C.READ d. SELECT
12. Which one of the following is an integrated part of database that can restore the database to the consistent
state of before failure?
a. Backup scheme b. Recovery scheme
c. Restoring scheme d. Transaction scheme
13. When deadlock is detected, the recovery is normally accomplished by
a. Transaction lock b. Locking of data
c. Consistency checking d. Rollback of transaction
14. What will be the output of the following CSS code snippet?
span {
border: 1px solid red;
outline: green dotted thick;
a. All span elements will have a green thick border and a red outline
b. All span elements will have an outer red border and inner green dotted border
c. All span elements will have a red border and a green dotted outline
d. All span elements will have a outer green dotted border and an inner red border
15. You have table in your database having a foreign Key. What type of command does you to add new
column to the table.

Prepared By Addisu T. Page 2


a. ON UPDATE CASCADE b. ON UPDATE SET DEFAULT
C. ON UPDATE RESTRICT d. ON UPDATE NO ACTION
16. Suppose the database consists of multiple transactions that are used to manage organization's group of
related data. So, which database attribute best describes the characteristics of a transaction that it
shouldn't be divided or split rather it can exist as a single unit is
a. Isolation C. atomicity
b. Consistency D. Durability
17. What does the <br> tag add to your webpage?
a. Section break b. Line break C. Paragraph break d. Long break
18. it is a video transmission interface that offers better resolution than the others & supports up to BK
(7680x4320) resolution at 60 Hz with an increased bandwidth of 77.37 Gbps
a. HDMI Port b. Display Port
b. DVI port d. VGA Port
19. Which one of the following is typed correctly?
a. <h1>Write Your First CSS Example<h1>
b. </p>Write Your First Paragraph</p>
c. <td>Sonoo</td
d. <imgsrc="images/nature-3.jpg" style="width:300px">
20. A network device used to connect two or more dissimilar networks.
a. Router b. Switch c. Hub d. Gateway
21. To estimate the cost of the query_____ it is possible to determine the response time, ie, the time it takes
to execute the plan.
a. Query Time b. Response Time c. Plan Time d. Evaluation Time
22. Which Microsoft office package enables users to perform mathematical computation and visualization of
data?
a. Microsoft Excel b. Microsoft Publisher
c. Microsoft Word d. Microsoft PowerPoint
23. A small piece of data sent from a website and stored in users web browser while a user is browsing a
website
a. Web client b. Web cache C. Web cookied. Web firewall
24. It is a field (or collection of fields) in one table, that refers to the PRIMARY KEY in another tableWhich
ensures a relationship is created.
a. Referential Integrity b. Metadata c. Primary Key d. Foreign Key
25. Which operator is used to compare a value to a specified list of values?
a. BETWEEN b. IN c. Where d. ANY

Prepared By Addisu T. Page 3


26. Which type of CSS is used in the below code? <p style="border:2px solid red;">
a. Internal CSS b. External CSS C. Outside CSS d. Inline CSS
27. A database keyword that indicates the constraint of a database whose column values of a Table are
required to be assigned an initial values in the database is usually damage is called
a. VALUES b. NOT NULLC. DISTINCT` d. WHERE clause
28. A security mechanism used in data communication environment to filter the packets forwarded to and
from the network is referred to be:
a. Cryptography b. Encryption c. Firewall d. Biological Biometrics
29. Which one describes and explains anything to do with your software product, ranging from internal
documentation for teams to external documentation written for end users.
a. Development methods b. Security tester
c. Technical documentation d. User documentation
30. Data schemas represent the skeleton structure of a database and it represents the _______ view of the
database as a whole.
a. Logical View b. Analytical View c. Semantic View d. Practical View
31. Below the following, one is a process of analyzing the data objects and their relationship to the other
objects.
a. Web Modeling b. System Modeling c. Data Modeling d. Storage Modeling
32. One of the following tasks is highly important while you are setting organization's objectives when you
plan and organize works?
a. Setting objectives which are difficult to measure as per the standards.
b. Developing Objectives which are inconsistent with organizational aims.
c. Identification of objectives which are not attainable
d. Enhancing the motivation and commitment of the group members.
33. Type of database system test that carried as part of system testing to check and detect if there is a
problem in the system as a result of a change made to another component of the system.
a. Functional Testing b. Regression Testing
c. Recovery Testing d. Load Testing
34. The property in CSS used to change the background color of an element is
a. background-color b. bgcolor C. color d. font-size
35. A criterion for a to select a webhosting that measure of how much of the month (or week or year) your
website is available is accessible
a. Security Features b. Uptime c. Email availability d. Customer Service
36. Which one of the following given statements possibly contains the error?
a. select empid from emp;

Prepared By Addisu T. Page 4


b. select empid from emp where empid = 10006;
c. select empid where empid = 1009 and Lastname = 'GELLER';
d. select * from emp where empid = 10003;
37. Which one is a step-in system development that lays out functional and non-functional requirements?
a. Database development b. Software requirements specification
C. Software version d. Web development
38. In the three-tier architecture, the intermediate layer between database and client server is classified as
a. Functional server b. Disk server
C. Transaction server d. Application server
39. It is clear that nowadays most organizations are developing database systems over their file management
system that they are using before. So, why do you think that organizations prefer database management
systems over file management methods?
a. File Management supports more files than Database Management systems.
b. File Management provides complex backup/recover than Database Systems
c. Database Management has simple structure to implement than File Management.
d. Database Management provides rigorous security than File Management.
40. which one of the following SQL command helps to add a record in to a row using SQL in a database?
a. ADD b. CREATE C. MAKE d. INSERT
41. Connecting website to backend servers, processing the data and controlling the behavior of the higher
layers are done by
a. Server-side PHP scripts b. CSS scripts c. HTML language d. Java scripts
42. Which feature of OOPS described the reusability of code?
a. Inheritance b. Encapsulation c. Polymorphism d. Abstraction
43. Which one the following is not an essential features of when you plan for data conversion from a legacy
system?
a. timeliness b. completeness c. user interface d. accuracy
44. ___is the data that has been organized or presented in a meaning full way.
a. Storage b. Software c. Information d. Application
45. Which of the following is used in the application programs to request data from the database management
system?
a. Transaction control language b. Data Definition Language
C. Data Manipulation language d. Data Control Language
46. Which of the following statements is false about hosting
a. Shared hosting is cheaper than dedicated hosting
b. Shared hosting is safer than dedicated hosting

Prepared By Addisu T. Page 5


c. Dedicated hosting is safer than shared hosting
d. Though more expensive than shared hosting, dedicated hosting is more secure
47. Which of the following is generally used for performing tasks like creating the structure of the relations,
deleting relation?
a. DDL(Data Definition Language) b. DML(Data Manipulation Language)
c. Relational Schema d. Query
48. From computer maintenance procedures which one is the process of reorganizing the data stored on the
hard drive so that related pieces of data are put back together, all lined up in a continuous fashion.
a. Antivirus b. Defragmenter c. Memory Partitioning d. Disk formatter
49. Backward recovery is which of the following?
a. Where the before-images are applied to the database
b. Switching to an existing copy of the database
c. Where the after-images and before-images are applied to the database
d. Where the after-images are applied to the database
50. A database user who maintains a Database Management System and necessarily responsible for looking
after its overall usage and apply limitations to maintain isolation enforce security is:
a. Database Architects b. Database Designers
c. End Users d. Database Administrators
51. What is the correct HTML for creating a hyperlink?
a. <a>https://w.w.w.gkseries.com</a>
b. <a url="https://w.w.w.gkseries.com> Gkseries.com</a>
c. <a name="https://w.w.w.gkseries.com"> Gkseries.com</a>
d. <a href="https://www.gkseries.com"> Gkseries.com</a>
52. Which of the following is true about PHP
a. It is a data definition language
b. It is a client-side scripting language
C. It is a database application
d. It is a server-side scripting language
53. The service provider for the user described in which section?
a. User requirements b. System model
C. System requirements d. Appendices
54. Among the following, which one is used for communication between the Web server and the database
server.
a. Middleware b. Native support
c. Common Gateway Interface (CGI) script d. Java database connectivity (JDBC)

Prepared By Addisu T. Page 6


55. Which SQL operator is used as a conjunction that connects the two queries to return only the required
sets of data?
a. FROM Clause b. UPDATE b. AND d. LIKE
56. A copy of database is called
a. Instance b. Sandbox C. Mailbox d. Alias
57. You are a Database developer for an insurance company. Every insurance policy is managed by one and
only one product manager. One product manager can manage many policies. How can you represent that
information in the Database?
a. Include the manager ID in the Policies entity and the policy ID in the Managers entity.
b. Create another entity which contains policy ID and the manager ID
C. Include the manager ID in the Policies entity
d. Include the policy ID in the Managers entity
58. Among the following which refers to describing the data description, representing data semantics, and
describing the consistency constraints that apply to the data.
a. Modifying data b. Adding datac. modeling data d. Refining data
59. Among the following, which one is the cheapest type of hosting?
a. VPS Web Hosting services b. Shared web hosting service
c. Dedicated web hosting service d. free web hosting service
60. you are looking for a website hosting service to host your online shopping website. What is the criteria
that will put first when you compare a hosting company?
a. Email availability b. Optimization
C. Customer Service d. Security Features
61. The type of diagram which specifies operations on objects is considered as_
a. Attribute diagram b. Entity diagram
c. Class diagram d. Functional diagram
62. What is a Functional Requirement?
a. specifies the tasks the program should not complete
b. specifies the system's operation capabilities and constraints and attempt to improve its functionality
c. defines system attributes such as security, reliability, performance, maintainability, scalability, and
usability.
d. specifies the tasks the system must complete
63. You have run an SQL statement that asked the DBMS to display data from a table named
USER_TABLES. The result includes columns of data labeled "Table name Number of Columns "and
primary key." You are looking at
a. User data b. Report data C. Indexes data d. Metadata

Prepared By Addisu T. Page 7


64. What is the name of the feature in which we enforce the definitions of the abstract function at the compile
time?
a. Dynamic Polymorphism b. Polymorphism
b. Static Polymorphism d. Dynamic or Static Polymorphism according to need
65. By normalizing relations or sets of relations, in a database we can minimize_
a. Fields b. Redundancy C. Data d. Database
66. Unnecessary conveyance of products, from one location to another, or handoff from one employee to
another is
a. Over-production waste b. Transport waste
c. Waiting-time waste d. Processing waste
67. If a database has to be maintained using OOP, to store the details of each employee in a company, which
would be the best choice among the following?
a. Define a generic type to store string and number details
b. Define a class to store details of each employee
c. Define a structure to store details of each employee
d. Define separate variable for each detail
68. Which one is a collection of similar types of entities?
a. ER Set b. Entity Set c. Attribute set d. Relationship Set
69. Which of the following are NOT characteristics of database-driven Web sites?
a. Data Accuracy b. Data Availability C. Data Integrity d. Data Security
70. Media recovery refers to recovering database
a. After some individual transaction has failed
b. After deadlock
C. After database has been physically damaged
d. After a system crash
71. Which operator can be used to free the memory allocated for an object in C++?
a. Collect b. Free() C. Unallocated d. Delete
72. Mr. Alemu is a Database Manager at XYZ Company. He is required to plan and organize the overall
works done in his respective responsibility. Then, which task is going to be executed at last by Mr.
Alemu?
a. Setting the organizational objectives
b. Implementation of the work plan outlined.
c. Reviewing and evaluating work plans and activities as per the set plan.
d. Escalation of problems
73. Which of the following techniques can be used for optimizing backed up data space?

Prepared By Addisu T. Page 8


a. Encryption and De duplication b. Authentication and De duplication
C. Compression and De duplication d. De duplication only
74. To make your website mobile friendly and to adapt it to different screen platform, you must make your
website_
a. Reactive b. Fast Loading c. Light d. Responsive
75. Which process involves developing an approximation of the costs of resources needed to complete a
project?
a. Estimating costs b. determining the budget
c. Controlling costs d. finalizing the cost baseline
76. From the 5s procedures, which one is used to remove unnecessary items from each area?
a. Shine b. Standardize C. Sort d. Sustain
77. Which one is a step that records client support requirements based on organizational rules, regulations,
and policies?
a. Priority b. Escalate c. Client d. Log
78. What is an abstraction in object-oriented programming?
a. Hiding the implementation
b. Hiding the implementation and showing only the features
c. Hiding the important data
d. Showing the important data
79. The number of blocks transferred from the disk, along with the number of disks seeks, are used to
estimate the cost of a query evaluation plan.
a. Query Estimation Plan b. Query Evaluation Plan
c. Query Exemption Plan d. Query Implementation Plan
80. When deadlock is detected, the recovery is normally accomplished by
a. Transaction locks b. Rollback of transaction
c. Locking of data d. Consistency checking
81. Which one of the following is an integrated part of database that can restore the database to the consistent
state of before failure?
a. Restoring scheme b. transaction scheme c. Recovery scheme d. Backup scheme

Prepared By Addisu T. Page 9

You might also like