INF3703
EXAM
PACK 2023
QUESTIONS WITH ANSWERS
Email;
,INF3703
Exam Pack
2023
LATEST QUESTIONS
AND ANSWERS
, INF3703/201
2. _______ has been enhanced with extensions that support OLAP type
processing and data generation.
[1] SQL
[2] DBMS
[3] DBLC
[4] SDLC.
3. Data stored in the company database must be protected from access by
unauthorized users. Data measures include all of the following EXCEPT….
[1] User authentication
[2] Physical security
[3] Data encryption
[4] Top down authentication
4. The following is NOT a factor that influences the choice of database design
strategies.
[1] The company’s market knowledge
[2] The company’s structure
[3] The company’s scope
[4] The company’s management style
5. What describes the extent to which modules are independent of one another?
[1] Module cohesivity
[2] Module coupling
[3] Module collaboration
[4] Module connectivity
, INF3703/201
6. What are the three main types of indexes?
[1] Primary, Secondary, and Mixed index
[2] Primary, Secondary, and Multi-level index
[3] Primary, Secondary, and Maintenance index
[4] Primary, Secondary, and Mandatory index
7. The ____ lock allows concurrent transactions to access the same row as long
as they require the use of different fields within that row.
[1] Table-level
[2] Page-level
[3] Row-level
[4] Field-level
8. The following are the deadlock control techniques.
[1] Prevention, avoidance and uniqueness
[2] Prevention, detection and avoidance
[3] Prevention, isolation and detection
[4] Prevention, time-stamping and avoidance
9. Concurrency control with optimistic methods moves through which phases?
[1] Read, validation and growing
[2] Read, write and growing
[3] Growing, write and shrinking
[4] Validation, write and read
EXAM
PACK 2023
QUESTIONS WITH ANSWERS
Email;
,INF3703
Exam Pack
2023
LATEST QUESTIONS
AND ANSWERS
, INF3703/201
2. _______ has been enhanced with extensions that support OLAP type
processing and data generation.
[1] SQL
[2] DBMS
[3] DBLC
[4] SDLC.
3. Data stored in the company database must be protected from access by
unauthorized users. Data measures include all of the following EXCEPT….
[1] User authentication
[2] Physical security
[3] Data encryption
[4] Top down authentication
4. The following is NOT a factor that influences the choice of database design
strategies.
[1] The company’s market knowledge
[2] The company’s structure
[3] The company’s scope
[4] The company’s management style
5. What describes the extent to which modules are independent of one another?
[1] Module cohesivity
[2] Module coupling
[3] Module collaboration
[4] Module connectivity
, INF3703/201
6. What are the three main types of indexes?
[1] Primary, Secondary, and Mixed index
[2] Primary, Secondary, and Multi-level index
[3] Primary, Secondary, and Maintenance index
[4] Primary, Secondary, and Mandatory index
7. The ____ lock allows concurrent transactions to access the same row as long
as they require the use of different fields within that row.
[1] Table-level
[2] Page-level
[3] Row-level
[4] Field-level
8. The following are the deadlock control techniques.
[1] Prevention, avoidance and uniqueness
[2] Prevention, detection and avoidance
[3] Prevention, isolation and detection
[4] Prevention, time-stamping and avoidance
9. Concurrency control with optimistic methods moves through which phases?
[1] Read, validation and growing
[2] Read, write and growing
[3] Growing, write and shrinking
[4] Validation, write and read