Microsoft SQL Server 2005 Question NIIT (1-50)

Microsoft SQL Server 2005 Question NIIT (1-50)


1. You are creating a Windows-based application that takes age from the user. The application should convert the age from character data type to integer data type. Which of the following functions you need to use to accomplish the desired task?


a)Convert.ToInt32

b)convert.ToInt32
c)Parse.ToInt32
d)Convert.ToInt

Answer:a

2. The _______ model is based on a real world perception that comprises a collection of objects or entities and the relationships among these.
a)ER
b)Network
c)Hierarchical
d)Relational

Answer:a

3. The ABC University used to offer a course in Visual Basic. However, due to less demand of the subject, the university dropped the course from its IT curriculum. This resulted in modification of the complete IT curriculum. Identify the type of entity that the Visual Basic course is.
a)Independent entity
b)Dependent entity
c)Weak entity     
d)Subentity

Answer:a

4. A computer institute offers courses on various programming languages for students. The students can select any number of offered courses. Which type of relationship exists between the students and offered courses?
a)One-to-Many Relationship
b)Many-to-One relationship
c)Many-to-Many Relationship
d)One-to-One relationship

Answer:c

5. Sam is accessing a table that contains details of all the employees of his organization. He needs to retrieve the details of those employees who have more than $10000 salary per month. He has decided to use the PRODUCT relational operator to accomplish this task. However, his manager has informed him that the use of this relational operator will not give the desired result. Analyze the situation and provide the operator that Sam should use.
a)PROJECT
b)UNION
c)DIVIDE
d)RESTRICT

Answer:d

6 Smith works as a Manager in TechnoWorld, Inc. He manages and evaluates the performance of his team. Identify the entities and relationship in the given scenario.

a)Entities: Smith, teamRelationship: manage
b)Entities: SmithRelationship: manage and evaluate
c)Entities: Smith, teamRelationship: evaluate
d)Entities: Smith, teamRelationship: manage and evaluate

Answer:d

7. Identify the type of relationship in the following sentence: Software engineers can work on various programming languages.
a)One-to-One Relationship
b)Many-to-One Relationship
c)One-to-Many Relationship
d)Many-to-Many Relationship

Answer:d

8. There are _______ types of relationships that exist between entities.
a)one
b)two
c)three
d)four

Answer:c

9. Peter is working as a Senior Software Engineer in NewSol, Inc. His Employee ID is N0065. He joined the organization on 19 Aug, 2008. Identify the attributes of the entity instance.
a)Date of joining(19 Aug, 2008), Employee_ID(N0065), and Designation(Senior Software Engineer).
b)Employee_ID(N0065) and Designation(Senior Software Engineer).
c)Date of joining(19 Aug, 2008) and  Employee_ID(N0065)
d)Employee_ID (N0065)

Answer:a

10. Peter has been given a task to simplify a database structure. He has to represent the data and the relationships among them in the form of rows and columns. He has decided to use the Network model for completing this task. However, his manager has informed him that the use of this model will not generate the desired result. Analyze the situation and provide the correct model that Peter should use.
a)Hierarchical model
b)Conceptual model
c)Relational model
d)ER Model

Answer:c

11. Sam is working on two tables, Employee Details and Department Details. The Employee Details table contains employee ID, employee name, department ID, and designation of all employees. The  Department Details table contains department ID and department names. Sam has to retrieve the name of the department that has the maximum number of employees working. Which operator should Sam select for the given scenario?

a)Join
b)Intersect
c)Union
d)Product

Answer:a

12. Subtypes are connected to the supertype by a relationship known as _________.

a)one-to-one
b)one-to-many
c)many-to-many
d)unnamed

Answer:d

13. __________ is a scientific method of breaking down complex table structures into simple table structures by using certain rules.

a)Normalization          
b)Renormalization
c)Functional Dependency  
d)Specialization    

Answer:a

14. When each cell of the table contains precisely one value, the table is said to be in the ______ normal form.
a)first
b)second
c)third
d)Boyce-Codd

Answer:a

15. Jim works as a database administrator in TechnoSol, Inc. He has a table that contains details of employees and location of the meetings they have attended in the last one year. Jim has to normalize the table. The table columns consist the details of Employee ID, Department ID, meeting date, and location of the meeting. On analyzing the table he found that meeting date and location of the meeting columns consist of more than one value in each cell. Jim has decided to normalize the table by using second normal form. However, his manager has informed him that using second normal form for the given scenario will not be correct. Analyze the situation and provide the normal form that Jim should use.

a)BCNF                
b)First normal form
c)Second normal form
d)Third normal form

Answer:b

16. A table lists the details of all the students studying in an institute. Identify the determinant among the four columns of the given table. Click the Exhibit button to view the table.

a)Student Name      
b)Student Roll Number
c)Student Address
d)Student Fathers' Name

Answer:b

17. Which of the following sentences is CORRECT about second normal form?
a)A table is said to be in second normal form if Boyce-Codd normal form is applied to it.
b)A table is said to be in second normal form when every attribute in a row is not functionally dependent on any particular key.
c)A table is said to be in second normal form, when every attribute in a row is dependent on just part of the whole key.
d)A table is said to be in second normal form, when every attribute in a row is functionally dependent upon the whole key, and not just part of the key.

Answer:d

18. A table is said to be in _____ normal form when it is in second normal form and every non-key attribute is functionally dependent only on the primary key.
a)first
b)fourth
c)third
d)Boyce-Codd

Answer:c

19. Which of the following processes can increase disk space utilization?

a)Normalization
b)Denormalization
c)Generalization
d)Specialization     

Answer:b

20. Stella is working on a table that contains the details of students who have appeared for different course exams. She has to normalize the table. The primary key of the given table is Roll Number + Exam Code. On analyzing, Stella found that any modification in Student Name column will lead to modification in the whole table and Student Name + Exam Code can also be chosen as the primary key. To avoid this redundancy, which normal form should Stella select? Click the Exhibit button to view the table.

a)1NF
b)2NF
c)3NF
d)BCNF

Answer:d

21. Jim is working on an ER diagram. He has been instructed by his manager to map the given ER diagram to its corresponding tables. On analyzing the whole ER diagram, he is planning to create a table called Account Details. However, his colleague has advice him that creating only one table will not give the desired result. Analyze the given ER diagram and provide the tables that Jim should create.
Click the Exhibit button to view the figure.

a)Account Details  and Saving Account Details
b) Account Details , Current Account Details ,and Saving Account Details
c)Salary Account Details , Current Account Details ,and Saving Account Details
d)Account Details, Salary Account Details , Current Account Details ,and Saving Account Details

Answer:d

22. The _________ operator builds a relation from tuples appearing in either or both of the specified relations.

a)Project
b)Divide
c)Join  
d)Union

Answer:d

23. The ________ model represents all data in a database as simple tables in the row-column format.
a)Relational
b)Hierarchical
c)Network
d)ER

Answer:a

24. Replacing optional attributes with subentities is called __________.
a)denormalization
b)normalization
c)generalization
d)specialization

Answer:d

25. Which of the following sentences is NOT correct about normalization?
a)Each table should have an identifier.
b)Each table should store data for a single type of entity.
c)There should be at least one column that accepts a NULL value.
d)The repetition of values or columns should be avoided.

Answer:c

26. Which of the following sentences is NOT true about an attribute?
a)It identifies its owner entity.
b)It refers to another entity.
c)It simplifies the description of an entity.
d)It cannot refer to another entity.

Answer:d

27. The Employee_Details table lists the details of an employee. If Employee ID is the primary key, identify the alternate key in the table? 

a)Employee Name
b)Designation Code
c)Email ID
d)Phone Number

Answer:b

28. In the database structure, a table is called by which of the following name?
a)Cardinality
b)Tuple
c)Relation
d)Degree

Answer:c

29. Jack is working on a table that describes salary details of an employee. Which of the columns in the table will you use to uniquely identify all the rows of the table? Click the Exhibit button to view the table.
a)Employee ID +Account Number
b)Employee ID + Department ID +Account Number
c)Employee ID+ Department ID + Designation ID
d)Employee ID+ Department ID + Designation ID +Account Number

Answer:a

30. Ryan is working on a table containing details of projects that the students have submitted after completing a course on a specific programming language.
The primary key in the table is Student ID + Project Code. Ryan is thinking of applying third normal form to simplify the table structure. On discussing with his senior, he found that his decision of selecting the third normal form is not correct. Analyze the given table and identify which normal form should Ryan select.


a)First Normal Form
b)Second Normal Form
c)Fourth Normal Form
d)Boyce-Codd Normal Form

Answer:b

31. John is working on a table that includes the details of employees and their departments. He has to normalize that table. The primary key of that table is Employee ID. Which normal form should he choose to simplify the table? Click the Exhibit button to view the table.
a)1NF
b)2NF
c)3NF
d)BCNF

Answer:c

32. Which of the following commands is used to initiate a chat session in Linux?

a)who
b)talk
c)pine
d)elm

Answer:b

33. Joe is communicating with Jack by using the Chat utility of Linux. Now, he wants to end the chat session. Which of the following commands would help him do so?

a)Ctrl + C keys
b)Ctrl + X keys
c)Ctrl + S keys
d)Ctrl + N keys

Answer:a

34. Kim has logged on to the Linux system. She received a query from the customer. To resolve the query, she has to communicate with the back office. Identify the correct sequence of steps that she needs to follow to communicate with the back office.

a) 1. Identify the user with whom she needs to communicate.
    2. Check whether the user is online and ready to receive messages.
    3. Identify the mechanism for communication.
    4. Identify the contents of the message."

b) 1. Identify the user with whom she needs to communicate.
    2. Identify the mechanism for communication.
    3. Check whether the user is online and ready to receive messages.
    4. Identify the contents of the message."

c) 1. Identify the mechanism for communication.
    2. Identify the user with whom she needs to communicate.
    3. Check whether the user is online and ready to receive messages.
    4. Identify the contents of the message."

d) 1. Identify the contents of the message.
    2. Identify the user with whom she needs to communicate.
    3. Check whether the user is online and ready to receive messages.
    4. Identify the mechanism for communication."

Answer:a

35. Joe is working on a Linux system. He has to chat with Angela. He first wants to check whether Angela is online and ready to receive messages. For this, he types the following command at the shell prompt and presses the Enter key:
who However, the preceding command displays the list of currently logged on users. This list does not indicate whether the user is ready to receive messages. Identify the correct command that Joe should use to accomplish the required task?
a) who -t
b) who -T
c) who -h
d) who -H

Answer:b

36. Which of the following options is NOT an example of Mail User Agent (MUA)?

a)pine
b)elm
c)mail
d)sendmail

Answer:d

37. Which of the following statements is a function of Mail User Agent (MUA)?
a)MUA deciphers the recipient's address and delivers the mail to the recipient's mailbox.
b)MUA manages the sending and receiving of mails.
c)MUA displays a failure message if there is any problem in delivering the mail.
d)MUA is used to read the message at the recipient's end.

Answer:d

38. Jack is working on his Linux system. His boss has sent him a mail that lists the tasks to be performed by Jack. Jack has to access his inbox to read the new mails received on his Linux system. Identify the correct sequence of steps that Jack needs to follow to read the new mails.
a)1. Type pine at the shell prompt, and press Enter.
   2. Press C.
   3. Select the relevant mail by using the up and down-arrow keys.
   4. Press Enter.

b) 1. Type pine at the shell prompt, and press Enter.
    2. Press A.
    3. Select the relevant mail by using the up and down-arrow keys.
    4. Press Enter.

c) 1. Type pine at the shell prompt, and press Enter.
    2. Press L.
    3. Select the relevant mail by using the up and down-arrow keys.
    4. Press Enter.

d) 1. Type pine at the shell prompt, and press Enter.
    2. Press I.
    3. Select the relevant mail by using the up and down-arrow keys.
    4. Press Enter.

Answer:c

39. Julia is logged on to the Linux system. She has to access her Inbox to read mails. She invoked the pine MUA and pressed the S key to display the list of folders. Analyze whether Julia has pressed the correct key to display the list of folders. If not, provide the correct solution.

a)Yes, Julia has pressed the correct key.
b)No, Julia needs to press the L key.
c)No, Julia needs to press the F key.
d)No, Julia needs to press the I key.

Answer:b

40. Which of the following options do you need to press on the main menu of pine to configure the pine options?
a) S
b) C
c) O
d) P

Answer:a

41. You have sent a mail by using the pine utility of Linux. Now, you need to verify whether the mail has been sent or not. How will you perform this task?

a) By checking the contents of the sent folder.
b) By checking the contents of the Folders list.
c) By checking the contents of the sent-mail folder.
d) By checking the contents of the Inbox.

Answer:c

42. You have sent an E-mail to your friend by using the pine utility of Linux. After you have sent the mail, its copy is saved automatically in the sent-mail folder. Now, you need to verify this by checking the content of the sent-mail folder. Which of the following sequence of steps do you follow to perform this task?

a) 1. Press the M key.
    2. Select the Folders List option, and press Enter.
    3. Select the sent-mail option from the Folders List by using the Tab key, and press Enter.

b) 1. Select the Folders List option, and press Enter.
    2. Press the M key.
    3. Select the sent-mail option from the Folders List by using the Tab key, and press Enter.

c) 1. Select the Folders List option, and press Enter.
    2. Select the sent-mail option from the Folders List by using the Tab key, and press Enter.
    3. Press the M key.

d) 1. Select the sent-mail option from the Folders List by using the Tab key, and press Enter.
    2. Press the M key.
    3. Select the Folders List option, and press Enter."

Answer:a

43. You have a Linux system. You have to send an E-mail to your friend. For this, you performed the followed steps:

1. Type pine at the shell prompt, and press Enter.
2. Press C.
3. Type the name of the recipient in the To: block, and press Enter.
4. Type the subject in the Subject: block, and press Enter.
5. Type the contents of the mail.
6. Press the Ctrl and C keys to send the e-mail.

However, you are not able to send the e-mail by using the preceding steps. Identify the problem and provide the correct solution.
a) At step 6, the Ctrl and O keys should be pressed to send the E-mail.
b) At step 6, the Ctrl and J keys should be pressed to send the E-mail.
c) At step 6, the Ctrl and S keys should be pressed to send the E-mail.
d) At step 6, the Ctrl and X keys should be pressed to send the E-mail.

Answer:d

44. Which of the following statements is NOT the correct file naming guideline of the Linux operating system?
a) A file name should be unique within a directory.
b) A file name can have maximum of 286 characters.
c) A file name can contain digits, letters, and special characters except backslash.
d) A file name should typically reflect the contents of a file.

Answer:b

45. Which of the following options do you need to press to switch to the Insert mode and then type the contents at the current cursor position of the vi editor?

a) i
b) w
c) v
d) s

Answer:a

46. You have written a file by using the vi editor. Now, you need to save the file by the name myfile.txt. Which of the following steps do you need to follow to save the file and close the vi editor?
a) 1. Press the Esc key.
    2. Type :w /home/Complaints/myfile.txt, and press Enter.
    3. Type :q, and press Enter.
b) 1. Press the Esc key.
    2. Type :w /home/Complaints/myfile.txt, and press Enter.
    3. Type :c, and press Enter.

c) 1. Press the Esc key.
    2. Type :s /home/Complaints/myfile.txt, and press Enter.
    3. Type :c, and press Enter.

d) 1. Press the C key.
    2. Type :w /home/Complaints/myfile.txt, and press Enter.
    3. Type :c, and press Enter.

Answer:a

47. Which of the following commands can be used to replace a character at the current cursor position and switch back to the Command mode?
a) i
b) a
c) R
d) r

Answer:d

48. You have opened a file in the vi editor. You have to make some changes in the third line of the file. The cursor is currently at the end of the second line. To make changes in the third line, you pressed the k command. However, the cursor moved to the first line instead of the third line. Analyze the situation and provide the correct command that should have been used to move the cursor from the second to the third line.

a) You need to press the j command to move to the third line.
b) You need to press the h command to move to the third line.
c) You need to press the l command to move to the third line.
d) You need to press the o command to move to the third line.

Answer:a

49. You have to view the files stored in the /home/bill directory. You are currently in the bill directory. Which of the following commands would you use for this purpose?
a) ls        
b) ls bill
c) ls /bill
d) ls /home

Answer:a

50. There are three files in the /home/math directory. The file names are math001.2009, math002.2009, and math003.2009. You need to copy all the files in the /home/math directory to the /home/backup directory. You are currently in the math directory. Which of the following commands would you use to perform this task?

a) cp /home/math/math00[1*3].2009 /home/backup
b) cp /home/math/math00[1?3].2009 /home/backup
c) cp /home/backup /home/math/math00[1-3].2009
d) cp /home/math/math00[1-3].2009 /home/backup


Answer:d

Post a Comment

Previous Post Next Post