51.
|
The most
recent version of standard SQL prescribed by the American National Standards
Institute is
(a) SQL-99 (b) SQL 2002 (c) SQL – 4 (d) SQL2 (e) SQL PLUS.
|
52.
|
ANSI-standard
SQL allows the use of special operators in conjunction with the WHERE
clause. A special operator used to
check whether an attribute value is null is
(a) BETWEEN (b) IS NULL (c) LIKE (d) IN (e) Exists.
|
53.
|
A lock
that prevents the use of any tables in the database from one transaction
while another transaction is being processed is called a
(a) Database-level lock (b)
Table-level lock
(c) Page-level lock
(d) Row-level lock (e) Field-level lock.
|
54.
|
A
condition that occurs when two transactions wait for each other to unlock
data is known as a(n)
(a) Shared lock (b) Exclusive lock (c) Binary lock
(d) Two-phase lock (e)
Deadlock.
|
55.
|
_______
means that data used during the execution of a transaction cannot be used by
a second transaction until the first one is completed.
(a) Serializability (b) Atomicity (c) Isolation
(d) Time stamping (e) Durability.
|
56.
|
A unit of
storage that can store one or more records in a hash file organization is
denoted as
(a) Buckets (b) Disk pages (c) Blocks (d) Nodes (e) Baskets.
|
57.
|
The file
organization which allows us to read records that would satisfy the join
condition by using one block read is
(a) Heap file organization (b) Sequential file organization
(c) Clustering file organization (d) Hash
files organization (e) Index
File.
|
58.
|
Which of
the following is not true about B+ trees?
(a) B+ tree index takes the form of balanced
tree
(b) Performance of B+ tree degrades as the file
grows
(c) Look-up in B+ tree is straightforward and
efficient
(d) Insertion and deletion in B+ tree is
complicated but efficient
(e) None of the above.
|
59.
|
The extent of
the database resource that is included with each lock is called the level of
(a) Impact (b) Granularity (c)
Management
(d) DBMS
control (e)
Recovery.
|
60.
|
DBMS
periodically suspends all processing and synchronizes its files and journals
through the use of
(a) Checkpoint
facility (b)
Backup facility (c)
Recovery manager
(d) Database change
log (e)
Shadow Paging.
|
61.
|
When
converting one (1) to many (N) binary relationship into tables, the
recommended solution is usually
|
||||||||||
62.
|
Which of the
following is not correct?
|
||||||||||
63.
|
The property of transaction which
ensures that either all operations of the transaction are reflected properly
in the database or none, is called
|
||||||||||
64.
|
Which of the
following is correct?
|
||||||||||
65.
|
An entity type
whose existence depends on another entity type is called a _____ entity.
|
||||||||||
66.
|
A property or
characteristic of an entity type that is of interest to the organization is
called an
|
||||||||||
67.
|
A relationship
between the instances of a single entity type is called a _____ relationship.
|
||||||||||
68.
|
A ________ attribute is an attribute that can be further
subdivided to yield additional attributes.
|
||||||||||
69.
|
In a super
type/subtype hierarchy, each subtype has
|
||||||||||
70.
|
The hierarchical database model uses the hierarchic sequence
that always starts at
|
71.
|
Which of the
following is a component of the relational data model included to specify
business rules to maintain the integrity of data when they are manipulated?
|
||||||||||
72.
|
A null value is created or represented by
|
||||||||||
73.
|
A functional
dependency between two or more non-key attributes is called
|
||||||||||
74.
|
Which of the following is a classical approach to database
design?
|
||||||||||
75.
|
In the context of a database table, the statement "A
determines B" indicates that
|
||||||||||
76.
|
Which of the
following Relational Algebra operations require that both tables (or virtual
tables) involved have the exact same attributes/data types?
|
||||||||||
77.
|
Which type of file is easiest to update?
|
||||||||||
78.
|
A method that speeds query processing by
running a query at the same time against several partitions of a table using
multi processors is called
|
||||||||||
79.
|
The protocol
that ensures conflict serializability is
|
||||||||||
80.
|
Indexes are created in most RDBMS’s to
|
81.
|
What does the following SQL statement
do?
Select * From Customer Where Cust_Type =
"Best";
|
||||||||||
82.
|
In an SQL statement, which of the
following parts states the conditions for row selection?
|
||||||||||
83.
|
Which of the following questions is
answered by the SQL statement?
Select Count
(Product_Description) from Product_T;
|
||||||||||
84.
|
All of the following are advantages of
SQL-invoked routines EXCEPT
|
||||||||||
85.
|
A type of query that is placed within a
WHERE or HAVING clause of another query is called
|
||||||||||
86.
|
Which of the following is a procedure
for acquiring the necessary locks for a transaction where all necessary locks
are acquired before any are released?
|
||||||||||
87.
|
Out of the following activities, which
is the one that normally performed by DBMS, without the interference of the
DBA?
|
||||||||||
88.
|
Horizontal
Fragmentation is
|
||||||||||
89.
|
An index record appears for every search key value in the file is
|
||||||||||
90.
|
Which of the
following type of index is automatically created when we do not specify?
|
91.
|
A
database management software (DBMS) includes
|
|||||||||||||||||||||||||||||||||||
Making a
change to the conceptual schema of a database but not affecting the existing
external schemas is an example of
|
||||||||||||||||||||||||||||||||||||
If K is a
foreign key in a relation R1, then
|
||||||||||||||||||||||||||||||||||||
Which of
the following concept is applicable with respect to 2NF?
|
||||||||||||||||||||||||||||||||||||
Consider
the following relation:
What are
the functional dependencies which apply to the above relation?
|
||||||||||||||||||||||||||||||||||||
Embedded
SQL means
|
||||||||||||||||||||||||||||||||||||
“In 1978 committee proposed a generalized framework for database
systems and it provides a three_level architecture. The of the architecture defines user views of the database. The
defines the physical view of the database. The defines the logical schema of the database.”
Which of
the following set is suitable to fill the blanks in the above paragraph?
|
||||||||||||||||||||||||||||||||||||
Consider
the following ER diagram depicting the relationship of an employee and
supervisor:
What is
the possible relation if the above ERD is mapped into a relational model?
|
||||||||||||||||||||||||||||||||||||
Select
the correct statement from the following on proper naming of schema
constructs:
|
||||||||||||||||||||||||||||||||||||
Consider
the following table obtained using Student and Instructor relations.
Which
relational algebra operation could have been applied on the pair of relations
Student and Instructor to obtain the above data?
|
Answers
51.
|
Answer : (a)
Reason : SQL-99 is the most recent version of standard
SQL prescribed by the ANSI
|
52.
|
Answer : (e)
Reason: Exists is used to check whether an attribute
value is null or not in conjunction with the where clause.
|
53.
|
Answer : (a)
Reason: Data base-level lock prevents the use of any
tables in the data base from one transaction while other transaction is being
processed.
|
54.
|
Answer : (e)
Reason : Deadlock occurs when two transactions wait
for each other to unlock data
|
55.
|
Answer : (c)
Reason: isolation means that data used during the
execution of a transaction can’t be used by a second transaction until the
first one is completed.
|
56.
|
Answer : (a)
Reason: Buckets are used to store one or more records
in a hash file organization.
|
57.
|
Answer : (c)
Reason: Clustering file organization allows us to
read records that would satisfy the join condition by using one block read.
|
58.
|
Answer : (b)
Reason : The answer is evident
|
59.
|
Answer : (b)
Reason: The extent of the data base resource that is
included with each lock is called the level of Granularity.
|
60.
|
Answer : (a)
Reason: DBMS periodically suspends all processing and
synchronizes its files and journals though the use of Check point facility.
|
61.
|
Answer : (b)
Reason: When converting one (1) to many (N) binary
relationship into tables, the recommended solution is Foreign key added on
the Child (many side) referencing the parent
|
62.
|
Answer : (d)
Reason: The procedure of identifying entities
and attaching attributes always leads to a unique solution
|
63.
|
Answer : (a)
Reason: Atomicity is the property of transaction
which ensures that either all operations of the transaction are reflected
properly in the database or none
|
64.
|
Answer : (a)
Reason: Function dependencies are not associated
with relations; they are based on the semantics of information that we are
dealing with.
|
65.
|
Answer : (b)
Reason: Entity type whose existence depends on another entity
type is called a weak entity
|
66.
|
Answer : (a)
Reason: A property or characteristic of an entity type that
is of interest to the organization is called attribute
|
67.
|
Answer : (e)
Reason: A relationship between the instances of a single
entity type is called a Unary relationship.
|
68.
|
Answer : (a)
Reason: Composite attribute is an attribute that can
be further subdivided to yield additional attributes.
|
69.
|
Answer : (a)
Reason: In a super type/subtype hierarchy, each subtype has
only one super type
|
70.
|
Answer : (b)
Reason: The hierarchical database model uses the
hierarchic sequence that always starts at the left side of the tree
|
71.
|
Answer : (b)
Reason: Data integrity is a component of the relational data model included to
specify business rules to maintain the integrity of data when they are
manipulated
|
72.
|
Answer : (e)
Reason: A null value is created or represented by
Pressing the Enter key without making a prior entry of any kind
|
73.
|
Answer : (c)
Reason: A functional dependency between two or more non-key
attributes is called transitive dependency
|
74.
|
Answer : (a)
Reason: top-down approach is a classical approach to database design
|
75.
|
Answer : (d)
Reason: Knowing the value of attribute A you can look up the value of
attribute B.
|
76.
|
Answer : (c)
Reason: n relational algebra Union, Intersection,
Minus operations require that both tables (or virtual tables) involved have
the exact same attributes/data types.
|
77.
|
Answer : (b)
Reason: Hash file is easiest to update
|
78.
|
Answer : (c)
Reason: A method that speeds query processing by running a
query at the same time against several partitions of a table using multi
processors is called parallel query processing.
|
79.
|
Answer : (a)
Reason: The protocol that ensures conflict
serializability is time stamp ordering protocol.
|
80.
|
Answer : (c)
Reason: Indexes are created in most RDBMS’s to Provide
rapid, random and sequential access to base-table data
|
81.
|
Answer : (a)
Reason: Select
|
82.
|
Answer : (e)
Reason: In an SQL statement where clause states the
conditions for row selection
|
83.
|
Answer : (b)
Reason: How many different product descriptions
are in the Product Table?
|
84.
|
Answer : (d)
Reason: Security
|
85.
|
Answer : (b)
Reason: Sub-query that is placed within a WHERE or HAVING clause of
another query
|
86.
|
Answer : (d)
Reason: Two-phase lock is a procedure for
acquiring the necessary locks for a transaction where all necessary locks are
acquired before any are released
|
87.
|
Answer : (e)
Reason: Recovery is the one that normally is
performed by DBMS, without the interference of the DBA
|
88.
|
Answer : (a)
Reason: Divide the data up by logical groups of records.
|
89.
|
Answer : (b)
Reason: Dense Index record appears for every search key
valued in the file.
|
90.
|
Answer : (b)
Reason: Balanced Tree Index is automatically created
when we do not specify.
|
91.
|
Answer : (b)
Reason : A
software application that is used to define, create, maintain and provide
controlled access to user databases.
|
Answer : (c)
Reason : Logical
data independence refers to making a change to the conceptual schema of a
database but not affecting the existing external schemas.
|
|
Answer : (c)
Reason : If
k is a foreign key in a relation R1, then K is a key for some other relation.
|
|
Answer : (a)
Reason : Full
functional dependency is applicable with respect to 2NF.
|
|
Answer : (a)
Reason : Attribute
1 à
Attribute 3 are the Functional
dependencies that applies to the given relation.
|
|
Answer : (c)
Reason : Embedded
SQL refers to writing
SQL statements within codes written in a general programming language.
|
|
Answer : (d)
Reason : i).ANSI/SPARC ii) External Level iii)Internal Level iv) Conceptual Level
|
|
Answer : (e)
Reason : Employee(EmpID,
BirthDate, Salary, Name(FirstName, MiddleName, LastName),SupervisorID) is the
possible relation if the given ERD is mapped into a relational data model.
|
|
Answer : (b)
Reason : In
the narrative description of the database requirements, verbs tend to indicate the names of
relationship types.
|
|
Answer : (e)
Reason : Instructor
– Student is the relational algebra operation that could be applied on the
pair of relations Student and Instructor to obtain the above data.
|
No comments:
Post a Comment