100% found this document useful (1 vote)
573 views8 pages

WD and DBA Holistic Exam Answear - 084106 - 092543-11

The document is a holistic exam worksheet covering various topics in database administration and web development. It includes multiple-choice questions on subjects such as system development, JavaScript, disaster recovery, database design, and web hosting. The exam assesses knowledge on technical documentation, programming languages, and project management principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
573 views8 pages

WD and DBA Holistic Exam Answear - 084106 - 092543-11

The document is a holistic exam worksheet covering various topics in database administration and web development. It includes multiple-choice questions on subjects such as system development, JavaScript, disaster recovery, database design, and web hosting. The exam assesses knowledge on technical documentation, programming languages, and project management principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

DATABASE ADMINISTRATION AND WEB DEVELOPMENT

HOLISTIC EXAM WORKSHEET


1. Which one of the following is a display device unit that acts as an interface between the user and the computer
system?
A) Printer B) Scanner C) Monitor D) Mouse
2. Which document defines the what, when, and who questions of system development including all activities to be
performed, the individuals or resources who will perform the activities and the time required completing each
activity?
A) Project milestone B) Requirements C) Critical success factors D) Project plan
3. Which one of the following is correct about JavaScript?
A) It is a database B) It is a client side scripting language
C) It is a server side scripting language D) It is software
4. All of the following are key elements which can be used to implement a Comprehensive Disaster Recovery
Program EXCEPT:
A) Recovery Procedures B) Implementation Procedures
C) Back-up procedures D) Non- critical Application Assessment
5. Which one describes and explains anything to do with your software product, ranging from internal
documentation for teams to external documentation written for end users?
A) User documentation B) Security tester C) Development methods D) Technical documentation
6. Which one of the following is a correct syntax to call an external JavaScript file in the current HTML document?
A) <import src=”jsfile.js”></import> B) <script link=”jsfile.js”></script>
C) <script src=”jsfile.js”></script> D) <script href=”jsfile.js”></script>
7. In the three tier architecture, the intermediate layer between database an client server is classified as:
A) Transaction server B) Application server C) Disk server D) Functional server
8. It is a field(collection of fields) in one table, that refers to the PRIMARY KEY in another table which ensures a
relationship is created:
A) Metadata B) Primary key C) Referential Integrity D) Foreign key
9. Suppose the database consists of multiple transactions that are used to manage organizations group of related
data. So which database attribute best describes the characteristics of a transaction that it shouldn’t be divided or split
rather it can exist as a single unit is:
A) Consistency B) Isolation C) Atomicity D) Durability
10. From the 5s procedures, which one is used to remove unnecessary items from each area?
A) Sort B) Sustain C) Standardize D) Shine
11. Which step records client support requirements based on organizational rules, regulations, and policies?
A) Client B) Escalate C) Log D) Priority
12. The most important roles of a system analyst in business is:
A) Technical understanding of information system
B) Knowing what data needs to be stored and used
C) Problem solving
D) Special programming skills
13. A network device used to connect two or more dissimilar network is:
A) Switch B) Hub C) Router D) Gateway
14. Which one of the following technique can be used for optimizing backed-up data space?
A) Authentication and Deduplication B) Compression and Deduplication
C) Deduplication only D) Encryption and Deduplication

Database Administration and Web Development Holistic Exam Page 1


15. Which one of the following is the correct syntax to make the background-color of all paragraph elements to be
yellow?
A) all {background-color: yellow;} B) P {background-color:#yellow;}
C) all {background-color:#yellow;} D) p{background-color: yellow;}
16. Among the following, which one is the cheapest type of hosting?
A) VPS web hosting services B) Shared web-hosting services
C) Dedicated web hosting services D) Free web hosting services
17. What will the output of the following CSS code snippet?
span {
border:1px solid red;
outline : green dotted thick;
}
A) All span elements will have a green thick border and a red outline
B) All span elements will have an outer red border and inner green dotted border
C) All span elements will have a red border and a green dotted outline
D) All span elements will have an outer green dotted border and an inner red border
18. _________ is used to anticipate, react to, and recover from events that threaten the security of information and
information assets in the organization.
A) Manning plan B) Quality assurance plan C) Contingency plan D) 3Action plan
19. A small piece of data sent from a website and stored in users web browser while a user is browsing a website is:
A) Web cookie B) Web firewall C) Web cache D) Web client
20. A UNION query is which one of the following?
A) Combines the output from no more than two queries and must include the same number of columns.
B) Combines the output from multiple queries and does not include the same number of columns.
C) Combines the output from multiple queries and must include the same number of columns.
D) Combines the output from no more than two queries and does not include the same number of columns.
21. When deadlock is detected, the recovery is normally accomplished by:
A) Rollback of transaction B) Consistency checking C) Transaction lock D) Locking of data
22. You are looking for a website hosting service to host you online shopping website. What are the criteria that will
put first when you compare a hosting company?
A) Security features B) Uptime C) Email availability D) Customer Service
23. You have table in your database having a foreign key. What type of command do you use to add new column to
the table?
A) On Update Cascade B) On Update Restrict
C) On Update Set Default D) On Update No Action
24. The collection of documents that are designed to help people who need to manage, operate or maintain computer
hardware or software is:
A) Inventory documents B) Inventory record C) Hardware Inventory D) Technical documentation
25. In which HTML element, we put the JavaScript code?
A) <javascript>…….</javascript> B) <CSS>………</CSS>
C) <javascript>…….</javascript> D) <script>------</script>
26. Which Microsoft office package enables users to perform mathematical computation and visualization of data?
A) Microsoft Excel B) Microsoft Publisher C) Microsoft PowerPoint D) Microsoft Word
27. The first step in developing a plan is ____________
A) Putting the plan into action B) Prioritization of problems
C) Situational analysis D) Setting the organizational objectives
28. Which features of OOP describes the reusability of codes?
A) Encapsulation B) Inheritance C) Abstraction D) Polymorphism

Database Administration and Web Development Holistic Exam Page 2


29. One of the following critical resources needs to be consider in system infrastructure design plan for any system
development:
A) Procedure B) Time requirement C) Network and Hardware resources D) Performance of user
30. Among the following, which one is used for communication between the web server and the database server?
A) Native support B) Common Gateway Interface (CGI) script
C) Middleware D) Java Database Connectivity (JDBC)
31. Assume that you are asked to design the logical view of the database for ABC PLC. As a database expert which
one clearly shows the skeleton structure that defines how the data is organized and how the relationships are
associated?
A) Database Manipulation B) Database Schema C) Database Retrieval D) Database Architecture
32. Which process involves in developing an approximation of the cost of resources needed to complete a project?
A) Finalizing the cost baseline B) Estimating costs C) Controlling costs D) Determining the budget
33. Which one of the following is the feature of the database?
A) Lack of authentication B) Store data in multiple locations
C) User interface provided D) No backup for the data stored
34. Commercial Bank of Ethiopia would like to distribute to all branches about business applications across multiple
locations and computer systems, reserving the data center for web server, database, and telecommunications
function. This is example of:
A) Technology Architecture Planning B) Enterprise Resource Planning (ERP)
C) Applications Architecture Planning D) Strategic Planning
35. Which two features of OOP are the same?
A) Encapsulation and Polymorphism B) Inheritance and Encapsulation
C) Encapsulation and Abstraction D) Abstraction and Polymorphism
36. The process finding the defect and suggesting improvements about the system quality is:
A) Prevent and Recovery B) Total Quality Management
C) Quality Planning D) Process Management
37. From computer maintenance procedures which one is the process of recognizing the data stored on the hard drive
so that related pieces of data are put back together, all lined up in a continuous fashion:
A) Defragmenter B) Disk formatter C) Antivirus D) Memory Partitioning
38. Mr.’s Alemu was ICT technician for ABC PLC. He is responsible for interpreting system requests and
specifications, site preparation and user training, and contact point for customers. This skill is:
A) Team management B) Customer relations C) Leadership D) Conflict Management
39. You are a database developer for an insurance company. One and only one product manager manage every
insurance policy. One product manager can manage many policies. How can you represent that information in
the database?
A) Create another entity, which contains policy ID and the manager ID
B) Include the manager ID in the Policies entity
C) Include the manager ID in the policies entity and the policy ID in the manager’s entity
D) Include the policy ID in the Managers entity
40. The horizontal bar chart that depicts project task against the calendar:
A) Manning B) Functional break down C) Budget breaks down D) Schedule
41. The last step of the analyst’s approach to problem solving is:
A) Decide which solution is best, and make a recommendation
B) Verify that the benefits of solving the problem outweigh the costs
C) Monitor to make sure that you obtain the desired results
D) Implement the solution
42. Which one of the following is included in web and database need strategy?
A) Evaluate current financial requirement B) Evaluate the impact of changes
C) Business benefit D) People involvement

Database Administration and Web Development Holistic Exam Page 3


43. Database regression test can be done:
A) Sometimes B) Occasionally C) Regular basis D) Not required
44. Among the following which refers to describing the data description, representing data semantics, and describing
the consistency constraints that apply to the data?
A) Modifying data B) Refining data C) Modeling data D) Adding data
45. Part of normal work and that does not require a special event to occur and alien with a sequence of events or
project is:
A) Continuous Improvement B) Relevant Metrics
C) Organizational Knowledge D) Breakthrough Improvement
46. What is the correct HTML code for create a hyperlink?
A) <a>https://w.w.w.gkseries.com</a>
B) <a href=”https://w.w.w.gkseries.com”>Gkseries.com</a>
C) <a name=”https://w.w.w.gkseries.com”>Gkseries.com</a>
D) <a url=”https://w.w.w.gkseries.com>Gkseries.com</a>
47. It is a video transmission interface that offers better resolution than the others and supports up to
8K()7680X4320) resolution at 60HZ with an increased bandwidth of 77.37Gbps.
A) DVI Port B) VGA Port C) HDMI Port D) Display Port
48. A copy of the database is called_______
A) Sandbox B) Alias C) Instance D) Mailbox
49. Suppose you are recruited as a Database Administrator in FullBright PLC where records of exchange
commodities are expected to be managed centrally for the sake of administration using SQL. Thus, which of the
following syntax is the correct implementation of SQL commands used to build a table PRODUCTS and add
fields such as ProdID, ProdName, ItemQuantity, ProdUnitPrice and Description for the table?
A) Insert table products (ProdID, ProdName, ItemQuantity, ProdUnitPrice, Description);
B) Select *from ProdID, ProdName, ItemQuantity ,ProdUnitPrice, Description;
C) update products set ProdID, ProdName, ItemQuantity, ProdUnitPrice, Description; WHERE
ProdID=’ETH30’;
D) Create table products (ProdID, ProdName, ItemQuantity, ProdUnitPrice, Description);
50. The systems development life cycle is:
A) A structured approach for developing information systems.
B) A set of guidelines that an end users follows when developing their own business applications
C) The analysis and assessment tasks that need to be completed when designing and developing information
systems
D) A method for testing new IT applications.
51. What is a Functional Requirement?
A) Specifies the tasks the program should not complete
B) Specifies the tasks the system must complete
C) Defines system attributes such as security, reliability, performance, maintainability, scalability and usability
D) Specifies the system’s operation capabilities, constraints, and attempt to improve its functionality
52. A person or organization that has an interest in system or is impacted by the system is:
A) Network Admin B) Stakeholder C) System Analyst D) Database Admin
53. A security mechanism used in data communication environment to filter he packets forwarded to and from the
network is referred to as:
A) Encryption B) Cryptography C) Biological Biometrics D) Firewall
54. Solution developers, business clients working together or number of third party solution developers working
together are:
A) Clients B) Supporters and Vendors C) Manager D) Project Team
55. Which type of data cannot be stored in the database?
A) Texts, files containing data B) JSON C) Image oriented data D) Data in the form of audio or video

Database Administration and Web Development Holistic Exam Page 4


56. Connecting website to backend servers, processing the data and controlling the behaviors of the higher layers are
done by:
A) Server side PHP scripts B) CSS scripts C) Java scripts D) HTML Language
57. Which of the following is true?
A) Data recovery from optical devices is faster than tape
B) Tape library is not an example of near line storage
C) Data recovery can take hours for offline backup
D) Data can be recovered slower in online backup
58. Which one of the following CSS selector is used to specify a group of elements?
A) tag B) class C) id D) collector
59. To bring solution to prevent database system crash in your company, what action you are going to take?
A) Escalate the issue
B) Document the issue and the solution that has implemented
C) Test the solution in the similar organization
D) Gather more information about the issues
60. Which one of the following given statements possibly contains the error?
A) Select empid from emp where empid=10006;
B) Select empid from emp;
C) Select *from emp where empid=10003;
D) Select empid where empid=1009 and Lasstname=’GELLER’;
61. Which one of the following is the correct syntax to link an external style sheet in the HTML file?
A) <link rel=”stylesheeet” src=”style.css”>
B) < style rel=”style sheet” link=”style.css”/>
C) style rel=”style sheet” src=”style.css”/>
D) <link rel=”style sheet” href=”style.css”/>
62. Which one of the following refers to the division of a system into processes or subsystems?
A) Programming B) Functional decomposition C) Data Management D) System design
63. Which one of the following is an integrated part of database that can restore the database to the consistent state
of before failure?
A) Transaction scheme B) Restoring scheme C) Backup scheme D) Recovery scheme
64. Which of the following is generally used for performing tasks like creating the structure of the relation and
deleting the relation?
A) DML (Data Manipulation Language) B) DDL (Data Definition Language)
C) Relational schema D) Query
65. Media recovery reefers to recovering database
A) After a system crash B) After deadlock
C) After database has been physically damaged D) After some individual transaction has failed
66. A database user who maintains a database management system and necessarily responsible for looking after its
overall usage and apply limitations to maintain isolation enforce security is:
A) Database Architects B) Database Designers C) Database Administrators D) End Users
67. Over a period of time, a system failure may result in a program crash and /or loss of data. As an IT expert, you
are called to restore system files and to restart the system. Which of the following best describes this?
A) Technical support B) System enhancement C) Program Maintenance D) System recovery
68. The first official activity of the project team as it initiates the project planning phase is to:
A) Write a project proposal B) Develop a cost/benefit analysis
C) Define the business problem D) Staff the project team
69. Microsoft Windows, IOS, and UNIX/LINUX are all types of software that belongs to_____.
A) Application software B) Operating system C) Database system D) Hardware system

Database Administration and Web Development Holistic Exam Page 5


70. Data schemas represent the skeleton structure of a database and it represents the ____view of the database as a
whole.
A) Practical view B) Logical view C) Semantic view D) Analytical view
71. DHTML, HTML, and XML are an example of:
A) Markup language B) Web Browsers C) Word processor D) Data structure
72. The most common risk management strategy in web based system is:
A) Avoidance B) Acceptance C) Mitigation D) Transference
73. Unnecessary convenience of products, from one location to another or handoff from one employee to another is:
A) Over production waste B) Transport waste C) Waiting time waste D) Processing waste
74. Which SQL operator is used as a conjunction that connects the two queries to return only the required set of
data?
A) FROM Clause B) LIKE C) AND D) UPDATE
75. A database key word that indicates the constrain of a database whose column values of a table are required to be
assign an initial values in the database is usually:
A) VALUES B) WHERE Clause C) DISTNICT D) NOT NULL
76. A technique that seeks to alter the nature of the work done in a business function with the objective of radically
improving performance is called_____
A) Information Systems Strategic Planning B) Business Process Reengineering
C) Strategic Planning D) Enterprise Resource Planning
77. Which of the following is not common in conducting an applied research regarding the improvement of an ICT
infrastructure in an organization?
A) Acknowledge others to communicate with you verbally and non-verbally
B) Organizational needs and selection criteria are taken for granted
C) Reporting your findings to an appropriate person
D) Maintain a positive attitude for your research area
78. Mr. Alemu is a database manager at XYZ Company. He is required to plan and organize the overall works done
in his respective responsibility. Then, which task is going to be executed at last by Mr. Alemu?
A) Reviewing and evaluating work plans and activities as per the set plan
B) Implementation of the work plan outlined
C) Setting the organizational objectives
D) Escalation of problems
79. One of the following task is highly important while you are setting organizations objectives when you plan and
organize works?
A) Setting objectives which are difficult to measure as per the standards
B) Identifications of objectives which are not attainable
C) Developing objectives which are inconsistent with organizational aims
D) Enhancing the motivations and commitment of the group members
80. What is an abstraction in Object-oriented programming?
A) Showing the important data B) Hiding the implementation
C) Hiding the important data D) Hiding the implementation and showing only the features
81. Which one of the following is typed correctly?
A) </p> Write your first paragraph</p>
B) <h1> Write your first CSS Example<h1>
C) <imgsrc=”images/nature-3.jpg” style=”width:300px”>
D) <td>Sonoo<td
82. If a database has to be maintained using OOP, to store the details of each employee in a company, which would
be the best choice among the following?
A) Define a separate variable for each detail B) Define a generic type to store string and number details
C) Define a structure to store details of each employee D) Define a class to store details of each employee

Database Administration and Web Development Holistic Exam Page 6


83. Which of the following used in the application programs to request data from the database management system?
A) Data definition language B) Transaction control language
C) Data control language D) Data manipulation language
84. Which of the following are not characteristics of database-driven web sites?
A) Data Availability B) Data Accuracy C) Data Security D) Data Integrity
85. Below the following, one is a process of analyzing the data objects and their relationship to the other objects.
A) Storage Modeling B) System Modeling C) Web Modeling D) Data Modeling
86. Which operator can be used to free the memory allocated for an object in C++?
A) Unallocate B) Free() C) Delete D) Collect
87. A criterion for a web to select a webhosting that measures of how much of the month or week or year your
website is available is accessible:
A) Security features B) Email availability C) Uptime D) Customer Service
88. Which of the following statement is false about hosting?
A) Through more expensive than shared hosting, Dedicated hosting is more secure.
B) Dedicated hosting is safer than shared hosting
C) Shared hosting is cheaper than dedicated hosting
D) Shared hosting is safer than dedicated hosting
89. The service provider for the user described in which section?
A) User requirements B) System model C) System requirements D) Appendices
90. To make your website mobile friendly and to adapt it to different screen platform, you must make your
website_______
A) Reactive B) Fast Loading C) Responsive D) Light
91. The type of diagram which specifies operations on objects is considered as__________
A) Entity diagram B) Attribute diagram C) Class diagram D) Functional diagram
92. Which deadlock is detected, the recovery is normally accomplished by____
A) Locking of data B) Rollback of transaction C) Consistency checking D) Transaction lock
93. Which one of the following is not an essential features of when you plan for data conversion from a legacy
system?
A) Completeness B) Accuracy C) Timelines D) User interface
94. By normalizing relations or sets of relations, in a database we can minimize_______
A) Databases B) Redundancy C) Data D) Fields
95. Which one is a Data Manipulation command?
A) TRANCATE B) DROP C) SELECT D) DELETE
96. Backward recovery is which of the following?
A) Where the after-images are applied to the database
B) Where the before-images are applied to the database
C) Where the after-images and before-images are applied to the database
D) Switching to an existing copy of the database
97. Performance analysis and tuning is which of the following?
A) Undertaken one time at the time of a DBMS installation
B) Undertaken as an ongoing part of the backup of a database
C) Undertaken as an ongoing part of managing a database
D) Undertaken one time at the time of the implementation of a new application
98. You have run SQL statement that asked the DBMS to display data from a table named USER_TABLES. The
result include columns of data labeled “Table name”, “Number of columns” and “primary key”. You are looking:
A) Report data B) Meta data C) User data D) Indexes data

Database Administration and Web Development Holistic Exam Page 7


99. The number of blocks transferred from the disk, along with the number of disks seeks, are used to estimate the
cost of a query evaluation plan.
A) Query Implementation plan B) Query Exemption plan
C) Query Evaluation plan D) Query Estimation plan
100. What does the <br> tag adds to your webpage?
A) Paragraph break B) Long break C) Section break D) Line break
101. Which type of CSS is used in the below code? <p style=”border:2px solid red;”>
A) Internal CSS B) Inline CSS C) External CSS D) Outside CSS
102. Connecting website to backend servers, processing the data and controlling the behavior of the higher layers are
done by?
A) HTML language B) Java scripts C) Server-side PHP scripts D) CSS scripts
103. Which one of the following SQL command helps to add a record in to a row using SQL in a database?
A) INSERT B) ADD C) CREATE D) MAKE
104. Which SQL operator is used as a conjunction that connects the two queries to return only the required sets of
data?
A) UPDATE B) LIKE C) FROM Clause D) AND
105. Which operator is used to compare a value to a specified list of values?
A) BETWEEN B) ANY C) WHERE D) IN
106. Which one is a step in system development that lays out the functional and non-functional requirements?
A) Software version B) Database development
C) Web development D) Software requirement specifications
107. Which one is a collection of similar types of entities?
A) Relational set B) Entity set C) Attribute set D) ER set
108. __________ is the data that has been organized or presented in a meaning full way?
A) Storage B) Software C) Information D) Application
109. The SQL statement that queries or reads data from a table is returns a result set of records, from one or more
tables.
A) QUERY B) SELECT C) ORDER D) READ
110. It is clear that nowadays most organizations are developing database systems over their file management
systems that they are using before. So, why do you think that operations prefer database management systems
over file management methods?
A) File management supports more files than Database Management Systems
B) Database management provides rigorous security than File management
C) File management provides complex backup/recover than Database systems
D) Database management has simple structure to implement than file management

Database Administration and Web Development Holistic Exam Page 8

You might also like