POST NO 45 UML

Unified Modelling Language



1. Object oriented analysis and design can be handled by the one who knows UML.
a) True
b) False


Answer: b
Explanation: The Unified Modeling Language includes a set of graphic notation techniques to create visual models of object-oriented software-intensive systems.
2. At Conceptual level Class diagrams should include
a) operations only
b) attributes only
c) both operations and attributes
d) none of the mentioned


Answer: b
Explanation: In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static structure diagram that describes the structure of a system by showing the system’s classes, their attributes, operations, and the relationships among objects.
3. Select the statement true for activity diagrams.
a) They can be used to discover parallel activities
b) They are used to depict workflow for a particular business activity
c) Activity diagram do not tell who does what and are difficult to trace back to object models
d) All of the mentioned


Answer: d
Explanation: Activity diagrams are graphical representations of workflows of step wise activities and actions with support for choice, iteration and concurrency.
4. Constraints can be represented in UML by
a) {text}
b) [text].
c) Constraint
d) None of the mentioned


Answer: a
Explanation: Constraints are represented by {text string}.
5. What is an object?
a) An object is an instance of a class
b) An object includes encapsulation of data
c) An object is not an instance of a class
d) All of the mentioned


Answer: a
Explanation: An object is an instance of a class.
6. What is an abstract class?
a) A class that has direct instances, but whose descendants may have direct instances
b) A class that has direct instances, but whose descendants may not have direct instances
c) A class that has no direct instances, but whose descendants may have direct instances
d) All of the mentioned


Answer: c
Explanation: An abstract type is a type in a nominative type system which cannot be instantiated directly.
7. Which of the following are the valid relationships in Use Case Diagrams
a) Generalization
b) Include
c) Extend
d) All of the mentioned


Answer: d
Explanation: Generalization, include, extend all of these are valid relationships in use case diagrams.
8. Which of the following statement(s) is true about interaction diagrams?
a) Interaction diagrams are at their best when they deal with one main design flow and not multiple variants that can happen
b) Interaction diagrams are good at designing part or all of one use case’s functionality across multiple objects
c) Interaction diagrams allow the analyst to show iteration and conditional execution for messaging between objects
d) All of the mentioned


Answer: d
Explanation: Interaction diagram is used to describe some type of interactions among the different elements in the model. So this interaction is a part of dynamic behaviour of the system.
9. UML interfaces are used to:
a) specify required services for types of objects
b) program in Java, but not in C++ or Smalltalk
c) define executable logic to reuse across classes
d) define an API for all classes


Answer: a
Explanation: An interface is like a template design for a class that contains no data or implementation; only definitions for methods, properties etc.
10. Referring to the attached diagram, the arrow indicates:
a) Navigability
b) Dependency
c) Association
d) Refers to


Answer: a
Explanation: The arrows describe the ways you can navigate.

----------------------------
----------------------------
1. Which of the following is a building block of UML?
a) Things
b) Relationships
c) Diagrams
d) All of the mentioned


Answer: d
Explanation: All are the building blocks of UML which are further sub-categorized.
2. Classes and interfaces are a part of
a) Structural things
b) Behavioral things
c) Grouping things
d) Annotational things


Answer: a
Explanation: Structural things are mostly static parts of a model, representing elements that are either conceptual or physical.
3.What is a collection of operations that specify a service of a class or component?
a) Use Case
b) Actor
c) Interface
d) Relationship


Answer: c
Explanation: None.
4. What is a physical element that exists at run time in UML?
a) A node
b) An interface
c) An activity
d) None of the mentioned


Answer: a
Explanation: A node represents a computational resource.
5. What can be requested from any object of the class to affect behavior?
a) object
b) attribute
c) operation
d) instance


Answer: c
Explanation: An operation is the implementation of a service that can be requested from any object of the class to affect behavior.
6. Which things are dynamic parts of UML models?
a) Structural things
b) Behavioral things
c) Grouping things
d) Annotational things


Answer: b
Explanation: These are the verbs of a model, representing behavior over time and space.
7. Which diagram in UML emphasizes the time-ordering of messages?
a) Activity
b) Sequence
c) Collaboration
d) Class


Answer: b
Explanation: This diagram is a model describing how groups of objects collaborate in some behavior over time.
8. Object diagram captures the behavior of a single use case.
a) True
b) False


Answer: b
Explanation: Sequence Diagram is responsible for this.
9. If you are working on real-time process control applications or systems that involve concurrent processing, you would use a
a) Activity diagram
b) Sequence diagram
c) Statechart diagram
d) Object diagram


Answer: c
Explanation: A statechart diagram shows a state machine, consisting of states, transitions, events, and activities.
10. Which diagram shows the configuration of run-time processing elements?
a) Deployment diagram
b) Component diagram
c) Node diagram
d) ER-diagram


Answer: a
Explanation: A Deployment diagram shows the configuration of run-time processing elements and the software components, processes, and objects.
11. Which things in UML are the explanatory parts of UML models?
a) Structural things
b) Behavioral things
c) Grouping things
d) Annotational things


12. Which of the following term is best defined by the statement:”a structural relationship that specifies that objects of one thing are connected to objects of another”?
a) Association
b) Aggregation
c) Realization
d) Generalization


Answer: a
Explanation: None.
13. What refers to the value associated with a specific attribute of an object and to any actions or side?
a) Object
b) State
c) Interface
d) None of the mentioned


Answer: b
Explanation: In a state chart diagram, effects occur when the attribute’s value changes.

POST NO 44 TOTAL 30 MCQ MIXED

30 MCQ MIXED
Q. _________ model consists of the particular types of services that you can access on a cloud computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned
 Answer: a
Explanation: Service models describe the type of service that the service provider is offering.

Q. The part of machine level instruction, which tells the central processor what has to be done, is

A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. None of the above
Answer:  A

Q. ________ dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data
b) Ownership
c) Security boundary
d) None of the mentioned


Answer: d
Explanation: The sourcing dimension addresses the deliverer of the service.

Q.How many digits of the DNIC (Data Network Identification Code) identify the country?

A. first three
B. first four
C. first five
D. first six
E. None of the above
Answer:  A
Q.A report generator is used to

A. update files
B. print files on paper
C. data entry
D. All of the above
E. None of the above
Answer:  B
Q. Point out the correct statement :
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
Answer: b
Explanation: Abstraction and Virtualization are the two essential concepts.

Q. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
Answer: b
Explanation: The deployment model tells you where the cloud is located and for what purpose.

Q. Point out the correct statement :
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary being the network’s firewall no longer applies in cloud computing
d) All of the mentioned


Answer: a
Explanation: Four types of deployment models exist.

Q. Which of the following is deployment model ?
a) public
b) private
c) hybrid
d) all of the mentioned
Answer: d
Explanation: Public, private, community, and hybrid clouds are deployment models.

Q. Which of the following is provided by ownership dimension of Cloud Cube Model ?
a) Proprietary
b) Owner
c) P
d) All of the mentioned

Answer: b
Explanation: P stands for Proprietary ownership.
 
Q.Which of the following refers to the associative memory?

A. the address of the data is generated by the CPU
B. the address of the data is supplied by the users
C. there is no need for an address i.e. the data is used as an address
D. the data are accessed sequentially
E. None of the above
Answer:  C

Q.A system program that combines the separately compiled modules of a program into a form suitable for execution

A. assembler
B. linking loader
C. cross compiler
D. load and go
E. None of the above
Answer:  B

Q. Point out the wrong statement :
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned
Answer: b
Explanation: Google has built mega data centres for its search engine.


Q.Frames from one LAN can be transmitted to another LAN via the device

A. Router
B. Bridge
C. Repeater
D. Modem
Answer:  B

Q. Which of the following is best known service model ?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
Answer: d
Explanation: The best-known service models are Software as a Service, Platform as a Service, and Infrastructure as a Service—the SPI model.
Q.Which of the following condition is used to transmit two packets over a medium at the same time?

A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
Answer:  B

Q. The __________ model originally did not require a cloud to use virtualization to pool resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned
Answer: b
Explanation: NIST stands for National Institute of Standards and Technology.
.
Q.Which of the following is not a logical data-base structure?

A. tree
B. relational
C. network
D. chain
E. All of the above
Answer:  D

Q. _______ model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square
b) Cloud Service
c) Cloud Cube
d) All of the mentioned

Answer: c
Explanation: Cloud Cube model is mainly used for secure collaboration.
Q. How many types of dimensions exists in Cloud Cube Model ?
a) 1
b) 2
c) 3
d) 4

Answer: d
Explanation: There are four types of dimensions in Cloud Cube.
Q. How many types of security boundary values exist in Cloud Cube model ?
a) 1
b) 2
c) 3
d) None of the mentioned


Answer: b
Explanation: There are two types depending upon network firewall.
Q.Which of the following is a database administrator's function?

A. database design
B. backing up the database
C. performance monitoring
D. user coordination
E. All of the above
Answer:  E
Q. Point out the wrong statement :
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned


Answer: a
Explanation: The public cloud infrastructure is available for public use alternatively for a large industry group.
Q. __________is a measure of whether the operation is inside or outside the security boundary or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned


Answer: d
Explanation: Per stands for Perimeterised.
Q. __________ cloud is one where the cloud has been organized to serve a common function or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned


Answer: c
Explanation: A community cloud may be managed by the constituent organization(s) or by a third party.

Q. A hybrid cloud combines multiple clouds where those clouds retain their unique identities, but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid


Answer: d
Explanation: A hybrid cloud may offer standardized or proprietary access to data and applications, as well as application portability.

Q.Primitive operations common to all record management systems include

A. Print
B. Sort
C. Look-up
D. All of the above
E. None of the above
Answer:  C 

Q. Which of the following dimension is related to organization’s boundaries ?
a) Physical location of data
b) Ownership
c) Security boundary
d) All of the mentioned

Answer: a
Explanation: Internal (I) / External (E) determines your organization’s boundaries.

Q. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned


Answer: b
Explanation: The cloud may be managed by that organization or a third party.
Q.Each of data files has a _____ that describe the way the data is stored in the file.

A. File structure
B. Records
C. Fields
D. Database
E. None of the above
Answer:  A

Post No 43 Network Security

 Network Security
Most IMP 50
MCQ. Confidentiality with asymmetric-key cryptosystem has its own
A. Entities
B. Data
C. Problems
D. Translator
Answer C
MCQ. SHA-l has a message digest of
A. 160 bits
B. 512 bits
C. 628 bits
D. 820 bits
Answer A
MCQ. Message authentication is a service beyond
A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer B
MCQ. In Message Confidentiality, transmitted message must make sense to only intended
A. Receiver
B. Sender
C. Modulor
D. Translator
Answer A
MCQ. A hash function guarantees integrity of a message. It guarantees that message has not be
A. Replaced
B. Over view
C. Changed
D. Violated
Answer C
MCQ. To check integrity of a message, or document, receiver creates the
A. Hash-Table
B. Hash Tag
C. Hyper Text
D. Finger Print
Answer B
MCQ. A digital signature needs a
A. Private-key system
B. Shared-key system
C. Public-key system
D. All of them
Answer C
MCQ. One way to preserve integrity of a document is through use of a
A. Eye-Rays
B. Finger Print
C. Biometric
D. X-Rays
Answer B
MCQ. A session symmetric key between two parties is used
A. Only once
B. Twice
C. Multiple times
D. Conditions dependant
Answer A
MCQ. Encryption and decryption provide secrecy, or confidentiality, but not
A. Authentication
B. Integrity
C. Privacy
D. All of above
Answer B
MCQ. MAC stands for
A. Message authentication code
B. Message arbitrary connection
C. Message authentication control
D. Message authentication cipher
Answer A
MCQ. Digest created by a hash function is normally called a
A. Modification detection code (MDC)
B. Modify authentication connection
C. Message authentication control
D. Message authentication cipher
Answer A
MCQ. Message confidentiality is using
A. Cipher Text
B. Cipher
C. Symmetric-Key
D. Asymmetric-Key
Answer D
MCQ. A sender must not be able to deny sending a message that was sent, is known as
A. Message Nonrepudiation
B. Message Integrity
C. Message Confidentiality
D. Message Sending
Answer A
MCQ. To preserve integrity of a document, both document and fingerprint are
A. Not Used
B. Unimportant
C. Needed
D. Not needed
Answer C
MCQ. When data must arrive at receiver exactly as they were sent, its called
A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer B
MCQ. Message digest needs to be
A. public
B. private
C. kept secret
D. None
Answer C
MCQ. In Message Integrity, message digest needs to be kept
A. Secret
B. Low
C. High
D. Constant 0
Answer A
MCQ. In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
A. 512 Bit Blocks
B. 1001 Bit Blocks
C. 1510 Bit Blocks
D. 2020 Bit Blocks
Answer A
MCQ. Message confidentiality or privacy means that sender and receiver expect
A. Integrity
B. Confidentiality
C. Authentication
D. Nonrepudiation
Answer B
MCQ. Message must be encrypted at sender site and decrypted at the
A. Sender Site
B. Site
C. Receiver site
D. Conferencing
Answer C 

Post No 42 CLOUD COMPUTING

CLOUD COMPUTING 
1. What is Cloud Computing replacing?
A. Corporate data centers
B. Expensive personal computer hardware
C. Expensive software upgrades
D. All of the above
Ans:D
2. What is the number one concern about cloud computing?
A. Too expensive
B. Security concerns
C. Too many platforms
D. Accessability
ANS:B
3. Which of these companies is not a leader in cloud computing?
A. Google
B. Amazon
C. Blackboard
D. Microsoft
ANS:C
4. Google Docs is a type of cloud computing.
A. True
B. False
ANS:A
5. Which one of these is not a cloud computing pricing model?
A. Free
B. Pay Per Use
C. Subscription
D. Ladder
E. Perpetual License
ANS:D
6. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
ANS:A
7. An Internet connection is neccessary for cloud computing interaction.
A. True
B. False
ANS:A
8. Which is not a major cloud computing platform?
A. Google 101
B. IBM Deep blue
C. Microsoft Azure
D. Amazon EC2
ANS:B
9. “Cloud” in cloud computing represents what?
A. Wireless
B. Hard drives
C. People
D. Internet
ANS:D
10. Which of these should a company consider before implementing cloud computing technology?
A. Employee satisfaction
B. Potential cost reduction
C. Information sensitivity
D. All of the above
ANS:D
A. A way to organize desktop computers
B. Lightweight software that takes up little space on a hard drive
C. Computing resources that can be accessed on demand, like electricity from a utility
D. The World Wide Web
Ans: C
12. What widely used service is built on cloud-computing technology?
A. Twitter B. Skype
C. GmailD. YouTube
E. All of the above
Ans: E
13. Which of these techniques is vital for creating cloud-computing centers?
A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
Ans: A
14. An internal cloud is…
A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate firewall
D. The group of knowledge workers who use a social network for water-cooler gossip
Ans: C.
15. Match the provider with the cloud-based service.
A. Amazon1. Azure
B. IBM2. Elastic Compute Cloud
C. EMC3. Decho
D. Microsoft4. Cloudburst
ANS: A
16. Cloud computing embraces many concepts that were previously touted as the next big thing in
information technology. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Grid computing
E. Desktop computing
Ans: E
17. IBM, EMC and Boeing Co. were among the companies signing what document whose title is reminiscent
of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Ans: D.
18. The term “cloud computing” is a metaphor that originated in what?
A. Graphical depiction of computer architectures
B. Meteorological symbolism
C. Worries about an unclear future for computing architectures
D. The idea that computer users trust in magic
Ans: A

19. Link the cloud-based service on the left with the desktop or server application it is designed to displace
on the right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-relationship
management
D. Amazon EC24. Backup disk
Ans: A
20. What August event was widely seen as an example of the risky nature of cloud computing?
A. Spread of Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
Ans: B

Post No 41 CLOUD COMPUTING

Cloud computing

QUESTION 1
Amazon Web Services is which type of cloud computing distribution model?
Software as a service
Platform as a service
Infrastructure as a service
CORRECT ANSWER - Infrastructure as a service

QUESTION 2
What is private cloud?
A standard cloud service offered via the Internet
A cloud architecture maintained within an enterprise data center
A cloud service inaccessible to anyone but the cultural elite
CORRECT ANSWER  A cloud architecture maintained within an enterprise data center

QUESTION 3
What is the name of the Rackspace cloud service?
Cloud On-Demand
Cloud Servers
EC2


CORRECT ANSWER - Cloud Servers

QUESTION 4
Which Amazon cloud product recently experienced a massive outage?
SimpleDB
EBS
S3
CloudFront


CORRECT ANSWER - EBS

QUESTION 5
What is the name of the organization helping to foster security standards for cloud computing?
Cloud Security Standards Working
Cloud Security Alliance
Cloud Security WatchDog
Security in the Cloud Alliance


CORRECT ANSWER - Cloud Security Alliance

QUESTION 6
What is Cloud Foundry?
A factory that produces cloud components
VMware-led open source PaaS
An industry wide PaaS initiative
VMware-led closed source PaaS


CORRECT ANSWER - VMware-led open source PaaS

QUESTION 7
Which of the following isn't an advantage of cloud?
No worries about running out of storage
Easier to maintain a cloud network
Immediate access to computing resources
Paying only for what you use


CORRECT ANSWER - Easier to maintain a cloud network

QUESTION 8
Which company recently shut the doors on its cloud storage service?
Hitachi Data Systems
Savvis
Iron Mountain
Symantec


CORRECT ANSWER - Iron Mountain

QUESTION 9
Which of these services is not platform as a service?
Force.com
Microsoft Azure
Amazon EC2
Joyent


CORRECT ANSWER - Amazon EC2

QUESTION 10
What feature does not belong in a private cloud?
Metered billing
Self-service portal
Dial-home support
Rapid elasticity


CORRECT ANSWER - Dial-home support 

Post No 40 Cloud Computing

Cloud Computing 

1. _________ computing refers to applications and services that run on a distributed network using virtualized resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel


Answer: b
Explanation: Cloud Computing applications are accessed by common Internet protocols and networking standards.
2. Point out the wrong statement :
a) The massive scale of cloud computing systems was enabled by the popularization of the Internet
b) Soft computing represents a real paradigm shift in the way in which systems are deployed
c) Cloud computing makes the long-held dream of utility computing possible with a pay-as-you-go, infinitely scalable, universally available system
d) All of the mentioned


Answer: b
Explanation: Cloud Computing is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted from the user.
3. ________ as a utility is a dream that dates from the beginning of the computing industry itself.
a) Model
b) Computing
c) Software
d) All of the mentioned


Answer: b
Explanation: Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility.
4. Which of the following is essential concept related to Cloud ?
a) Reliability
b) Productivity
c) Abstraction
d) All of the mentioned


Answer: c
Explanation: Cloud computing abstracts the details of system implementation from users and developers.
5. Point out the wrong statement :
a) All applications benefit from deployment in the cloud
b) With cloud computing, you can start very small and become big very fast
c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary
d) None of the mentioned


Answer: a
Explanation: Issues with latency, transaction control, and in particular security and regulatory compliance are of particular concern.
6. Which of the following cloud concept is related to pooling and sharing of resources ?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned


Answer: c
Explanation: Applications run on physical systems that aren’t specified, data is stored in locations that are unknown, administration of systems is outsourced to others, and access by users is ubiquitous.
7. ________ has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned


Answer: a
Explanation: The Internet offers abstraction, runs using the same set of protocols and standards, and uses the same applications and operating systems.
8. Which of the following can be identified as cloud ?
a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned


Answer: c
Explanation: When an intranet becomes large enough that a diagram no longer wishes to differentiate between individual physical systems, the intranet too becomes identified as a cloud.
9. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.
a) real
b) virtual
c) cloud
d) none of the mentioned


Answer: b
Explanation: Cloud Computing is a new model for provisioning resources, for staging applications, and for platform-independent user access to services.
10. Which of the following is Cloud Platform by Amazon ?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned


Answer: b
Explanation: One of the most successful cloud-based businesses is Amazon Web Services, which is an Infrastructure as a Service offering that lets you rent virtual computers on Amazon’s own infrastructure.

Post Id 39

1. The normal form which satisfies multivalued dependencies and which is in BCNF is
a) 4 NF
b) 3 NF
c) 2 NF
d) All of the mentioned


Answer: a
Explanation: Fourth normal form is more restrictive than BCNF.
2. Which of the following is a tuple-generating dependencies ?
a) Functional dependency
b) Equality-generating dependencies
c) Multivalued dependencies
d) Non-functional dependency


Answer: c
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
3. The main task carried out in the __________ is to remove repeating attributes to separate tables.
a) First Normal Form
b) Second Normal Form
c) Third Normal Form
d) Fourth Normal Form


Answer: a
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
4. Which of the normal form is based on multivalued dependencies ?
a) First
b) Second
c) Third
d) Fourth


Answer: d
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
5. Which forms has a relation that possesses data about an individual entity?
a) 2NF
b) 3NF
c) 4NF
d) 5NF


Answer: c
Explanation: A Table is in 4NF if and only if, for every one of its non-trivial multivalued dependencies X \twoheadrightarrow Y, X is a superkey—that is, X is either a candidate key or a superset thereof.
6. If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from one of the following sources.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) Both A many-to-many relationship set and A multivalued attribute of an entity set


Answer: d
Explanation: For a many-to-many relationship set each related entity set has its own schema and there is an additional schema for the relationship set. For a multivalued attribute, a separate schema is created consisting of that attribute and the primary key of the entity set.
7. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set?
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) None of the mentioned


Answer: a
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.
8. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) None of the mentioned


Answer: b
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.
9. Fifth Normal form is concerned with
a) Functional dependency
b) Multivalued dependency
c) Join dependency
d) Domain-key


Answer: c
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.
10. In 2NF
a) No functional dependencies (FDs) exist
b) No multivalued dependencies (MVDs) exist
c) No partial FDs exist
d) No partial MVDs exist


Answer: c
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.