1.
|
A collection of data
designed to be used by different people is called a/an
|
||||||||||
2.
|
Which of the following is
the oldest database model?
|
||||||||||
3.
|
Which of the following
schemas does define a view or views of the database for particular users?
|
||||||||||
4.
|
Which of the following is
an attribute that can uniquely identify a row in a table?
|
||||||||||
5.
|
Which of the following is
the process of selecting the data storage and data access characteristics of
the database?
|
||||||||||
6.
|
Which of the following terms
does refer to the correctness and completeness of the data in a database?
|
||||||||||
7.
|
The relationship between
DEPARTMENT and EMPLOYEE is a
|
||||||||||
8.
|
A table can be logically
connected to another table by defining a
|
||||||||||
9.
|
If the state of the
database no longer reflects a real state of the world that the database is
supposed to capture, then such a state is called
|
||||||||||
10.
|
Ensuring isolation
property is the responsibility of the
|
||||||||||
11.
|
A transaction completes
its execution is said to be
|
||||||||||
12.
|
The process of managing
simultaneous operations on the database without having them interfere with
one another is
|
||||||||||
13.
|
A schedule where the
operations of each transaction are executed consecutively without any other
interference from other transactions is called
|
||||||||||
14.
|
Which of the following is not
a deadlock handling strategy?
|
||||||||||
15.
|
Which of the following
does refer to the size of the data item chosen as the unit of protection by a
concurrency control program?
|
||||||||||
16.
|
Which of the following
hashing techniques does allow a hash file to expand and shrink its number of
buckets dynamically without needing a directory?
|
||||||||||
17.
|
Which of the following
indexes is based on the values being uniformly distributed using a
mathematical function?
|
||||||||||
18.
|
A join in which the
joining condition is based on equality between values in the common columns
is called
|
||||||||||
19.
|
A type of query that is
placed within a WHERE or HAVING clause of another query is called
|
||||||||||
20.
|
The entity integrity rule
states that
|
||||||||||
21.
|
A named set of SQL
statements that are considered when a data modification occurs are called
|
||||||||||
22.
|
Which protocol ensures
conflict serializability?
|
||||||||||
23.
|
Which type of file is
easiest to update?
|
||||||||||
24.
|
When a regular entity type
contains a multivalued attribute, one must
|
||||||||||
25.
|
Given following figure is
an example of mapping which type of relationship?
|
||||||||||
26.
|
A candidate key must
satisfy all of the following conditions EXCEPT
|
||||||||||
27.
|
A relation that contains
no multivalued attributes and has nonkey attributes solely dependent on the
primary key, but contains transitive dependencies is in which normal form?
|
||||||||||
28.
|
A functional dependency
between two or more nonkey attributes is called a
|
||||||||||
29.
|
Which of the following
technique is an alternative to log based recovery?
|
||||||||||
30.
|
DBMS periodically suspends
all processing and synchronizes its files and journals through the use of
|
||||||||||
31.
|
Data management is a
discipline that focuses on
(a) The
management of end users
(b) The proper
generation, storage, and retrieval of data
(c) The help
items to be used by end users
(d) The proper
generation, storage, and retrieval of information
(e) The
management of data bases.
|
||||||||||
32.
|
The DBMS allows you to
extrapolate information from your data by using
(a) Query
language
(b) Table generator
(c) Security system
(d) Access
control
(e) Program.
|
||||||||||
33.
|
One of the advantages of a
relational database model is
(a) Structural
dependence
(b) Conceptual complexity
(c) Complex
database
design
(d) Easier database
design
(e) Structural
independence.
|
||||||||||
34.
|
A DBMS performs several
important functions that guarantee the integrity and consistency of the data
in the database. Which of the following is NOT one of those functions?
(a) Data
integrity
(b) Storage management
(c) Data reports
(d) Security
management
(e) Data consistency.
|
||||||||||
35.
|
The most important
advantages of the hierarchical database model are
(a) Conceptual
simplicity, security, integrity, diversity, and security
(b) Security,
efficiency, diversity, simplicity, and integrity
(c) Integrity,
efficiency, diversity, independence, and simplicity
(d) Conceptual
simplicity, security, hierarchy
(e) Conceptual
simplicity, security, independence, integrity, and efficiency.
|
||||||||||
36.
|
The most widely used
conceptual model is the ______________.
(a) E-R
model
(b) Chen model
(c) External model
(d) Attribute
model
(e) Use-case Model.
|
||||||||||
37.
|
The _____model represents
a global view of the data.
(a)
Internal
(b)
External
(c)
Physical
(d)
Conceptual
(e) High-level.
|
||||||||||
38.
|
The ____ model operates at
the lowest level of abstraction, describing how the data is saved on storage
devices.
(a) Internal
(b)
External
(c)
Physical
(d)
Conceptual
(e) View level.
|
||||||||||
39.
|
A ____ attribute is an
attribute that can be further subdivided to yield additional attributes.
(a)
Composite (b)
Simple
(c) Single-valued (d)
Multivalued (e) Derived.
|
||||||||||
40.
|
The entity integrity rule
requires that
(a) All
primary key entries are not unique
(b) A part of
the key may be null
(c) Foreign
key values do not reference primary key values
(d) Duplicate
object values are allowed
(e) All
primary key entries are unique.
|
||||||||||
41.
|
A super key is any key
that uniquely identifies each
(a) Entity
uniquely
(b) Object in a
table
(c) Table
(d) Structure
in a
table
(e) Column uniquely.
|
||||||||||
42.
|
A table can be logically
connected to another table by defining a
(a)
Hyperlink
(b) Common
attribute
(c) Primary key
(d) Candidate
key
(e) Super Key.
|
||||||||||
43.
|
A primary key that
consists of more than one field is called a
(a) Composite
key
(b) Secondary key (c) Group key
(d) All of the
above
(e) None of the above.
|
||||||||||
44.
|
Which of the following
statements concerning the primary key is true?
(a) All
primary key entries are unique
(b) The
primary key may be null
(c) The
primary key is not required for all tables
(d) The
primary key data does not have to be unique
(e) For every
primary key there must be a foreign key.
|
||||||||||
45.
|
In the context of a
database table, the statement "A determines B" indicates that
(a) Knowing
the value of attribute A you can not look up the value of attribute B
(b) You do not
need to know the value of attribute A in order to look up the value of
attribute
(c) Knowing
the value of attribute B you can look up the value of attribute A
(d) Knowing
the value of attribute A you can look up the value of attribute B
(e) None of
the above.
|
||||||||||
46.
|
A super key that does not
contain a subset of attributes that is itself a super key is called a
(a) Candidate
key (b) Primary
key
(c) Super key
(d) Secondary
key (e) Foreign key.
|
||||||||||
47.
|
A table that displays data
redundancies yields ____________ anomalies.
(a) Update
(b)
Insertion
(c) Deletion
(d) All of the
above
(e) None of the above.
|
||||||||||
48.
|
A table is in the Fourth
Normal Form (4NF) if
(a) All
attributes must be dependent on the primary key, and must be dependent on
each other
(b) All
attributes must be dependent on the primary key, but must be independent of
each other
(c) No row can
contain two or more multivalued facts about an entity
(d) A and C
(e) B and C.
|
||||||||||
49.
|
A table where all
attributes are dependent on the primary key and are independent of each
other, and no row contains two or more multivalued facts about an entity, is
said to be in
(a)
1NF
(b)
2NF
(c) 3NF
(d)
4NF
(e) BCNF.
|
||||||||||
50.
|
The basic SQL aggregate
function that gives the number of rows containing not null values for the
given column is
(a)
MIN
(b)
COUNT
(c) MAX
(d)
SUM
(e) AVG.
|
Answers
1.
|
Answer : (b)
Reason: A collection of data
designed to be used by different people is called a data base.
|
2.
|
Answer : (d)
Reason: Network Model is the
oldest database model.
|
3.
|
Answer : (d)
Reason: External Schema
define a view or views of the database for particular users.
|
4.
|
Answer : (b)
Reason: Candidate Key
following is an attribute that can uniquely identify a row in a table.
|
5.
|
Answer : (b)
Reason: Physical database
design is the process of selecting the data storage and data access
characteristics of the database.
|
6.
|
Answer : (e)
Reason: Data integrity refer
to the correctness and completeness of the data in a database.
|
7.
|
Answer : (b)
Reason: The relationship
between DEPARTMENT and EMPLOYEE is a one-to-many relationship.
|
8.
|
Answer : (c)
Reason: A table can be
logically connected to another table by defining a Primary Key.
|
9.
|
Answer : (e)
Reason: If the state of the
database no longer reflects a real state of the world that the database is
supposed to capture, then such a state is called in consistent state.
|
10.
|
Answer : (b)
Reason: Ensuring isolation
property is the responsibility of the concurrency-control component of
the DBMS
|
11.
|
Answer : (a)
Reason: A transaction the
completes its execution is said to be Committed.
|
12.
|
Answer : (c)
Reason: The process of managing
simultaneous operations on the database without having them interfere with
one another is Concurrency control.
|
13.
|
Answer : (b)
Reason: A schedule where the
operations of each transaction are executed consecutively without any other
interference from other transactions is called Serial schedule.
|
14.
|
Answer : (d)
Reason: Deadlock
annihilation is NOT a deadlock handling strategy.
|
15.
|
Answer : (a)
Reason: Granularity refer to
the size of the data item chosen as the unit of protection by a concurrency
control program.
|
16.
|
Answer : (b)
Reason: Extensible hashing
techniques does allow a hash file to expand and shrink its number of buckets
dynamically without needing a directory.
|
17.
|
Answer : (b)
Reason: Extensible hashing
techniques does allow a hash file to expand and shrink its number of buckets
dynamically without needing a directory.
|
18.
|
Answer : (d)
Reason: The equi-join is a
join in which records are retrieved based on whether the join fields have
matching values in both tables. That may seem like just a definition of a
join, but it isn't. An example of a non-equal join is a join where records in
the first table are joined to those records in the second table where the
joined field in the first table is greater than (instead of equal to) the
joined field in the second table (or less than, or anything besides equal
to). Naturally, this returns more records than an equi-join.
A natural join is one in which only one of the two tables’ joined fields is
returned. Since these two fields are by definition identical in an equi-join,
it is redundant to include both. For a non-equal join, it is important to
include both of those fields. So, equi-joins and natural joins go together.
|
19.
|
Answer : (e)
Reason: A type of query that
is placed within a WHERE or HAVING clause of another query is called Sub
query
|
20.
|
Answer : (a)
Reason: The entity integrity
rule states that no primary key attribute can be null
|
21.
|
Answer : (b)
Reason: A named set of SQL
statements that are considered when a data modification occurs are called
triggers
|
22.
|
Answer : (c)
Reason: Timestamp based
protocol ensures conflict serializability.
|
23.
|
Answer : (b)
Reason: Hashed file is
easiest to update.
|
24.
|
Answer : (b)
Reason: When a regular
entity type contains a multivalued attribute, one must Create two new
relations, one containing the multivalued attribute.
|
25.
|
Answer : (d)
Reason: The given mapping is
an example of ternary relationship of Patient Treatment with three entities,
viz., Patient, Physician and Treatment.
|
26.
|
Answer : (b)
Reason: A candidate key (i)
must uniquely identify the row
(ii) must indicate the row’s position in the table
(iii) must be non-redundant and
(iv) (iv)
One of the primary key.
A candidate key does not indicate the row’s positon in the table. Hence
option (b) is the answer.
|
27.
|
Answer : (b)
Reason: A relation that
contains no multivalued attributes and has non-key attributes solely
dependent on the primary key, but contains transitive dependencies is in
second normal form.
|
28.
|
Answer : (c)
Reason: A functional
dependency between two or more non-key attributes is called a transitive
dependency.
|
29.
|
Answer : (e)
Reason: Shadow paging
technique is an alternative to log based recovery.
|
30.
|
Answer : (a)
Reason: DBMS periodically
suspends all processing and synchronizes its files and journals through the
use of Checkpoint facility.
|
31.
|
Answer : (b)
Reason : DBMS mainly focuses on
the proper generation, storage, and retrieval of data
|
32.
|
Answer : (a)
Reason :
Query language is used to interact with
the database
|
33.
|
Answer : (d)
Reason: Relational data base helps
us to design the data base in a easier manner.
|
34.
|
Answer : (c)
Reason : Data reports is not a
function of DBMS
|
35.
|
Answer : (e)
Reason : The main important
advantage of hierarchical data base model is conceptual simplicity, security,
independence, integrity and efficiency
|
36.
|
Answer : (a)
Reason: Most widely used
conceptual model is the E-R model.
|
37.
|
Answer : (d)
Reason : Conceptual model
represents the global view of the
data
|
38.
|
Answer : (c)
Reason: Physical model operates at
the lowest level of abstraction.
|
39.
|
Answer : (a)
Reason : Composite attribute
can be further divided into additional attributes
|
40.
|
Answer : (e)
Reason: All primary key entries
are unique.
|
41.
|
Answer : (a)
Reason : Super key is any key that
uniquely identifies each entity uniquely
|
42.
|
Answer : (b)
Reason : Common attribute is
maintained to connect two tables logically
|
43.
|
Answer : (a)
Reason :
A primary key that consists of more than
one field is called Composite key
|
44.
|
Answer : (a)
Reason: All primary keys are
unique.
|
45.
|
Answer : (d)
Reason : The answer is
evident
|
46.
|
Answer : (a)
Reason: The minimal set of super
key is called candidate key.
|
47.
|
Answer : (d)
Reason :
Table that displays data redundancies
yields update, insertion, deletion
anomalies
|
48.
|
Answer : (e)
Reason :
The answer is evident
|
49.
|
Answer : (d)
Reason :
Answer is obvious
|
50.
|
Answer : (b)
Reason : Count function gives the
number of rows containing not null values for the given column
|
No comments:
Post a Comment