Data Base Management System CSJM University MCQ Questions for BCA 5th Semester Part 2

1. OLAP stands for

a) Online analytical processing

b) Online analysis processing

c) Online transaction processing

d) Online aggregate processing

View Answer

 

Answer: a

Explanation: OLAP is the manipulation of information to support decision making .

2. Data that can be modeled as dimension attributes and measure attributes are called _______ data.

a) Multidimensional

b) Singledimensional

c) Measured

d) Dimensional

View Answer

 

Answer: a

Explanation: Given a relation used for data analysis, we can identify some of its attributes as measure attributes, since they measure some value, and can be aggregated upon.Dimension attribute define the dimensions on which measure attributes, and summaries of measure attributes, are viewed.

3. The generalization of cross-tab which is represented visually is ____________ which is also called as data cube.

a) Two dimensional cube

b) Multidimensional cube

c) N-dimensional cube

d) Cuboid

View Answer

 

Answer: a

Explanation: Each cell in the cube is identified for the values for the three dimensional attributes.

4. The process of viewing the cross-tab (Single dimensional) with a fixed value of one attribute is

a) Slicing

b) Dicing

c) Pivoting

d) Both Slicing and Dicing

View Answer

 

Answer: a

Explanation: The slice operation selects one particular dimension from a given cube and provides a new sub-cube. Dice selects two or more dimensions from a given cube and provides a new sub-cube.

5. The operation of moving from finer-granularity data to a coarser granularity (by means of aggregation) is called a ________

a) Rollup

b) Drill down

c) Dicing

d) Pivoting

View Answer

 

Answer: a

Explanation: The opposite operation—that of moving fromcoarser-granularity data to finer-granularity data—is called a drill down.

6. In SQL the cross-tabs are created using

a) Slice

b) Dice

c) Pivot

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Pivot (sum(quantity) for color in (’dark’,’pastel’,’white’)) .

7.

 

{ (item name, color, clothes size), (item name, color), (item name, clothes size), (color, clothes size), (item name), (color), (clothes size), () }

This can be achieved by using which of the following ?

a) group by rollup

b) group by cubic

c) group by

d) none of the mentioned

View Answer

 

Answer: d

Explanation: ‘Group by cube’ is used .

8. What do data warehouses support?

a) OLAP

b) OLTP

c) OLAP and OLTP

d) Operational databases

View Answer

 

Answer: a

Explanation: None .

9.

 

SELECT item name, color, clothes SIZE, SUM(quantity)

FROM sales

GROUP BY rollup(item name, color, clothes SIZE);

How many grouping is possible in this rollup?

a) 8

b) 4

c) 2

d) 1

View Answer

 

Answer: b

Explanation: { (item name, color, clothes size), (item name, color), (item name), () } .

10. Which one of the following is the right syntax for DECODE ?

a) DECODE (search, expression, result [, search, result]… [, default])

b) DECODE (expression, result [, search, result]… [, default], search)

c) DECODE (search, result [, search, result]… [, default], expression)

d) DECODE (expression, search, result [, search, result]… [, default])

View Answer

 

Answer: d

Explanation: None.

 

1. Relational Algebra is a __________ query language that takes two relation as input and produces another relation as output of the query.

a) Relational

b) Structural

c) Procedural

d) Fundamental

View Answer

 

Answer: c

Explanation: This language has fundamental and other operations which are used on relations .

2. Which of the following is a fundamental operation in relational algebra ?

a) Set intersection

b) Natural join

c) Assignment

d) None of the mentioned

View Answer

 

Answer: d

Explanation: The fundamental operations are select, project, union, set difference, Cartesian product, and rename.

3. __Which of the following is used to denote the selection operation in relational algebra ?

a) Pi (Greek)

b) Sigma (Greek)

c) Lambda (Greek)

d) Omega (Greek)

View Answer

 

Answer: b

Explanation: The select operation selects tuples that satisfy a given predicate.

4. For select operation the ________ appear in the subscript and the ___________ argument appears in the paranthesis after the sigma.

a) Predicates, relation

b) Relation, Predicates

c) Operation, Predicates

d) Relation, Operation

View Answer

 

Answer: a

Explanation: None.

5. The ___________ operation, denoted by −, allows us to find tuples that are in one relation but are not in another.

a) Union

b) Set-difference

c) Difference

d) Intersection

View Answer

 

Answer: b

Explanation: The expression r − s produces a relation containing those tuples in r but not in s.

6. Which is a unary operation:

a) Selection operation

b) Primitive operation

c) Projection operation

d) Generalized selection

View Answer

 

Answer: d

Explanation: Generalization Selection takes only one argument for operation.

7. Which is a join condition contains an equality operator:

a) Equijoins

b) Cartesian

c) Natural

d) Left

View Answer

 

Answer: a

Explanation: None.

8. In precedence of set operators the expression is evaluated from

a) Left to left

b) Left to right

c) Right to left

d) From user specification

View Answer

 

Answer: b

Explanation: The expression is evaluated from left to right according to the precedence.

9. Which of the following is not outer join ?

a) Left outer join

b) Right outer join

c) Full outer join

d) All of the mentioned

View Answer

 

Answer: d

Explanation: The FULL OUTER JOIN keyword combines the result of both LEFT and RIGHT joins.

10. The assignment operator is denoted by

a) ->

b) <-

c) =

d) ==

View Answer

 

Answer: b

Explanation: The result of the expression to the right of the ← is assigned to the relation variable on the left of the ←.

 

1. Find the ID, name, dept name, salary for instructors whose salary is greater than $80,000 .

a) {t | t ε instructor t[salary] > 80000}

b) Э t r (Q(t))

c) {t | Э s ε instructor (t[ID] = s[ID] s[salary] > 80000)}

d) None of the mentioned

View Answer

 

Answer: a

Explanation: This expression is in tuple relational format.

2. A query in the tuple relational calculus is expressed as:

a) {t | P() | t}

b) {P(t) | t }

c) {t | P(t)}

d) All of the mentioned

View Answer

 

Answer: c

Explanation: The tuple relational calculus, is a nonprocedural query language. It describes the desired information without giving a specific procedure for obtaining that information.

3.

 

{t | &#x42D; s &#x3B5; instructor (t[name] = s[name]

&#x42D; u &#x3B5; department (u[dept name] = s[dept name]

u[building] = “Watson”))}

Which of the following best describes the query ?

a) Finds the names of all instructors whose department is in the Watson building.

b) Finds the names of all department is in the Watson building.

c) Finds the name of the dapartment whose instructor and building is Watson.

d) Returns the building name of all the departments.

View Answer

 

Answer: a

Explanation: This query has two “there exists” clauses in our tuple-relational-calculus expression, connected by and ().

4. Which of the following symbol is used in the place of except ?

a) ^

b) V

c) ¬

d) ~

View Answer

 

Answer: c

Explanation: The query ¬P negates the value of P .

5. “Find all students who have taken all courses offered in the Biology department.” The expressions that matches this sentence is :

a) Э t ε r (Q(t))

b) t ε r (Q(t))

c) ¬ t ε r (Q(t))

d) ~ t ε r (Q(t))

View Answer

 

Answer: b

Explanation: is used denote “for all” in SQL.

6. Which of the following is the comparison operator in tuple relational calculus

a)

b) =

c) ε

d) All of the mentioned

View Answer

 

Answer: b

Explanation: The comparison operators are (<, ≤, =, =, >, ≥).

7. An expression in the domain relational calculus is of the form

a) {P(x1, x2, . . . , xn) | < x1, x2, . . . , xn > }

b) {x1, x2, . . . , xn | < x1, x2, . . . , xn > }

c) { x1, x2, . . . , xn | x1, x2, . . . , xn}

d) {< x1, x2, . . . , xn > | P(x1, x2, . . . , xn)}

View Answer

 

Answer: d

Explanation: Here x1, x2, . . . , xn represent domain variables. P represents a formula composed of atoms, as was the case in the tuple relational calculus.

8. Find the names of all instructors in the Physics department together with the course id of all courses they teach:

a) {< c > | Э s (< c, a, s, y, b, r, t >ε section

s = “Fall” y = “2009”

Эu (< c, a, s, y, b, r, t >ε section

s = “Spring” y = “2010”

b) {< n, c > | Э i, a (< i, c, a, s, y > ε teaches

Э d, s (< i, n, d, s > ε instructor d = “Physics”))}

c) {< n > | Э i, d, s (< i, n, d, s > ε instructor s > 80000)}

d) {< i, n, d, s > | < i, n, d, s > ε instructor s > 80000}

View Answer

 

Answer: b

Explanation: None.

9. In domain relaional calculus “there exist” can be expressed as

a) (P1(x))

b) (P1(x)) Э x

c) V x (P1(x))

d) Э x (P1(x))

View Answer

 

Answer: d

Explanation:Э is used to denote “some” values in relational calculus.

10. A set of possible data values is called

a) Attribute

b) Degree

c) Tuple

d) Domain

View Answer

 

Answer: d

Explanation: None.

 

1. An ________ is a set of entities of the same type that share the same properties, or attributes.

a) Entity set

b) Attribute set

c) Relation set

d) Entity model

View Answer

 

Answer: a

Explanation: An entity is a “thing” or “object” in the real world that is distinguishable from all other objects.

2. Entity is a _________

a) Object of relation

b) Present working model

c) Thing in real world

d) Model of relation

View Answer

 

Answer: c

Explanation: For example, each person in a university is an entity.

3. The descriptive property possessed by each entity set is _________

a) Entity

b) Attribute

c) Relation

d) Model

View Answer

 

Answer: b

Explanation: Possible attributes of the instructor entity set are ID, name, dept name, and salary.

4. The function that an entity plays in a relationship is called that entity’s _____________

a) Participation

b) Position

c) Role

d) Instance

View Answer

 

Answer: c

Explanation: A relationship is an association among several entities.

5. The attribute name could be structured as a attribute consisting of first name, middle initial, and last name. This type of attribute is called

a) Simple attribute

b) Composite attribute

c) Multivalued attribute

d) Derived attribute

View Answer

 

Answer: b

Explanation: Composite attributes can be divided into subparts (that is, other attributes).

6. The attribute AGE is calculated from DATE_OF_BIRTH . The attribute AGE is

a) Single valued

b) Multi valued

c) Composite

d) Derived

View Answer

 

Answer: d

Explanation: The value for this type of attribute can be derived from the values of other related attributes or entities.

7. Not applicable condition can be represented in relation entry as

a) NA

b) 0

c) NULL

d) Blank Space

View Answer

 

Answer: c

Explanation: NULL always represents that the value is not present.

8. Which of the following can be a multivalued attribute ?

a) Phone_number

b) Name

c) Date_of_birth

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Name and Date_of_birth cannot hold more than 1 value.

9. Which of the following is a single valued attribute

a) Register_number

b) Address

c) SUBJECT_TAKEN

d) Reference

View Answer

 

Answer: a

Explanation: None.

10. In a relation between the entities the type and condition of the relation should be specified . That is called as______attribute.

a) Desciptive

b) Derived

c) Recursive

d) Relative

View Answer

 

Answer: a

Explanation: Consider the entity sets student and section, which participate in a relationship set takes. We may wish to store a descriptive attribute grade with the relationship to record the grade that a student got in the class.

 

 

1. _____________ express the number of entities to which another entity can be associated via a relationship set.

a) Mapping Cardinality

b) Relational Cardinality

c) Participation Constraints

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Mapping cardinality is also called as cardinality ratio.

2. An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A.This is called as

a) One-to-many

b) One-to-one

c) Many-to-many

d) Many-to-one

View Answer

 

Answer: b

Explanation: Here one entity in one set is related to one one entity in other set.

3. An entity in A is associated with at most one entity in B. An entity in B, however, can be associated with any number (zero or more) of entities in A.

a) One-to-many

b) One-to-one

c) Many-to-many

d) Many-to-one

View Answer

 

Answer: d

Explanation: Here more than one entity in one set is related to one one entity in other set.

4. Data integrity constraints are used to:

a) Control who is allowed access to the data

b) Ensure that duplicate records are not entered into the table

c) Improve the quality of data entered for a specific property

d) Prevent users from changing the values stored in the table

View Answer

 

Answer: c

Explanation: The data entered will be in a particular cell (i.e., table column).

5. Establishing limits on allowable property values, and specifying a set of acceptable, predefined options that can be assigned to a property are examples of:

a) Attributes

b) Data integrity constraints

c) Method constraints

d) Referential integrity constraints

View Answer

 

Answer: b

Explanation: Only particular value satsfying the constraints are entered in column .

6. Which of the following can be addressed by enforcing a referential integrity constraint?

a) All phone numbers must include the area code

b) Certain fields are required (such as the email address, or phone number) before the record is accepted

c) Information on the customer must be known before anything can be sold to that customer

d) Then entering an order quantity, the user must input a number and not some text (i.e., 12 rather than ‘a dozen’)

View Answer

 

Answer: c

Explanation: None.

7. ______ is a special type of integrity constraint that relates two relations & maintains consistency across the relations.

a) Entity Integrity Constraints

b) Referential Integrity Constraints

c) Domain Integrity Constraints

d) Domain Constraints

View Answer

 

Answer: b

Explanation: None.

8. Which one of the following uniquely identifies the elements in the relation?

a) Secondary Key

b) Primary key

c) Foreign key

d) Composite key

View Answer

 

Answer: b

Explanation: Primary key checks for not null and uniqueness constraint .

9. Drop Table cannot be used to drop a table referenced by a _________ constraint.

a) Local Key

b) Primary Key

c) Composite Key

d) Foreign Key

View Answer

 

Answer: d

Explanation: Foreign key is used when primary key of one relation is used in another relation .

10. ____________ is preferred method for enforcing data integrity

a) Constraints

b) Stored Procedure

c) Triggers

d) Cursors

View Answer

 

Answer: a

Explanation: Constraints are specified to restrict entries in the relation.

 

1. Which of the following gives a logical structure of the database graphically ?

a) Entity-relationship diagram

b) Entity diagram

c) Database diagram

d) Architectural representation

View Answer

 

Answer: a

Explanation: E-R diagrams are simple and clear—qualities that may well account in large part for the widespread use of the E-R model.

2. The entity relationship set is represented in E-R diagram as

a) Double diamonds

b) Undivided rectangles

c) Dashed lines

d) Diamond

View Answer

 

Answer: d

Explanation: Dashed lines link attributes of a relationship set to the relationship set.

3. The Rectangles divided into two parts represents

a) Entity set

b) Relationship set

c) Attributes of a relationship set

d) Primary key

View Answer

 

Answer: a

Explanation: The first part of the rectangle , contains the name of the entity set. The second part contains the names of all the attributes of the entity set.

4. Consider a directed line(->) from the relationship set advisor to both entity sets instructor and student. This indicates _________ cardinality

a) One to many

b) One to one

c) Many to many

d) Many to one

View Answer

 

Answer: b

Explanation: This indicates that an instructor may advise at most one student, and a student may have at most one advisor.

5. We indicate roles in E-R diagrams by labeling the lines that connect ___________ to __________

a) Diamond , diamond

b) Rectangle, diamond

c) Rectangle, rectangle

d) Diamond, rectangle

View Answer

 

Answer: d

Explanation: Diamond represents a relationship set and rectangle represents a entity set.

6. An entity set that does not have sufficient attributes to form a primary key is termed a __________

a) Strong entity set

b) Variant set

c) Weak entity set

d) Variable set

View Answer

 

Answer: c

Explanation: An entity set that has a primary key is termed a strong entity set.

7. For a weak entity set to be meaningful, it must be associated with another entity set, called the

a) Identifying set

b) Owner set

c) Neighbour set

d) Strong entity set

View Answer

 

Answer: a

Explanation: Every weak entity must be associated with an identifying entity; that is, the weak entity set is said to be existence dependent on the identifying entity set. The identifying entity set is said to own the weak entity set that it identifies.It is also called as owner entity set.

8. Weak entity set is represented as

a) Underline

b) Double line

c) Double diamond

d) Double rectangle

View Answer

 

Answer: c

Explanation: An entity set that has a primary key is termed a strong entity set.

9. If you were collecting and storing information about your music collection, an album would be considered a(n) _____

a) Relation

b) Entity

c) Instance

d) Attribute

View Answer

 

Answer: b

Explanation: An entity set is a logical container for instances of an entity type and instances of any type derived from that entity type.

10. What term is used to refer to a specific record in your music database; for instance; information stored about a specific album?

a) Relation

b) Instance

c) Table

c) Column

View Answer

 

Answer: b

Explanation: The environment of database is said to be instance. A database instance or an ‘instance’ is made up of the background processes needed by the database

 

1. Which one of the following can be treated as a primary key in teaches relation ?

a) Id

b) Semester

c) Sec_id

d) Year

View Answer

 

Answer: a

Explanation: Here Id is the only attribute that has to have unique entry.

2. The primary key in the section relation is

a) Course_id

b) Sec_id

c) Both Course_id and Sec_id

d) All the attributes

View Answer

 

Answer: c

Explanation: Both the entries has unique entry.

3. Select * from teaches where Sec_id = ‘CS-101’ ;

Which of the following Id is selected for the following query ?

a) 1003

b) 1001

c) None

d) Error message appears

View Answer

 

Answer: d

Explanation: The value CS-101 matches the Course_id but not Id .

4. Select Id,Course_id,Building from section s and teaches t where t.year=2009 ;

Which of the following Id are displayed ?

a) 1003

b) 1001

c) Both 1003 and 1001

d) Error message appears

View Answer

 

Answer: c

Explanation: Two rows are select in the above query.

5. The query which selects the Course_id ‘CS-101’ from the section relation is

a) Select Course_id from section where Building = ‘Richard’;

b) Select Course_id from section where Year = ‘2009’;

c) Select Course_id from teaches where Building = ‘Packyard’;

d) Select Course_id from section where Sec_id = ‘3’;

View Answer

 

Answer: b

Explanation: The year ‘2009’ should be selected from the section relation.

6.

 

CREATE TABLE SECTION

(Course_id VARCHAR (8),

Sec_id VARCHAR (8),

Semester VARCHAR (6),

YEAR NUMERIC (4,0),

Building NUMERIC (15),

PRIMARY KEY (course id, sec id, semester, YEAR),

FOREIGN KEY (course id) REFERENCES course);

Which of the following has an error in the above create table for the relation section

a) Primary key (course id, sec id, semester, year)

b) Foreign key (course id) references course

c) Year numeric (4,0)

d) Building numeric (15)

View Answer

 

Answer: d

Explanation: It should be replaced by Year Building varchar (15).

7. The relation with primary key can be created using

a) Create table instructor ( Id , Name)

b) Create table instructor ( Id , Name , primary key(name))

c) Create table instructor ( Id , Name , primary key (Id))

d) Create table instructor ( Id unique, Name )

View Answer

 

Answer: c

Explanation: The value Name cannot be a primary key.

8. How can the values in the relation teaches be deleted ?

a) Drop table teaches;

b) Delete from teaches;

c) Purge table teaches;

d) Delete from teaches where Id =’Null’;

View Answer

 

Answer: b

Explanation: Delete table cleans the entry from the table.

9. In the above teaches relation ” Select * from teaches where Year = ‘2010’” displays how many rows ?

a) 2

b) 4

c) 5

d) 1

View Answer

 

Answer: a

Explanation: There are two tuples with year is 2009.

10. The relation changes can be got back using ________ command

a) Flashback

b) Purge

c) Delete

d) Getback

View Answer

 

Answer: a

Explanation: Purge deletes the table and delete cleans the table entry.

 

1. Let us consider phone_number ,which can take single or several values . Treating phone_numberas an _________ permits instructors to have several phone numbers (including zero) associated with them.

a) Entity

b) Attribute

c) Relation

d) Value

View Answer

 

Answer: a

Explanation: Treating a phone as an attribute phone_number implies that instructors have precisely one phone number each.

2. The total participation by entities is represented in E-R diagram as

a) Dashed line

b) Double line

c) Double rectangle

d) Circle

View Answer

 

Answer: b

Explanation: It is used to represent the relation between several attributes.

3. Given the basic ER and relational models, which of the following is INCORRECT?

a) An attribute of an entity can have more than one value

b) An attribute of an entity can be composite

c) In a row of a relational table, an attribute can have more than one value

d) In a row of a relational table, an attribute can have exactly one value or a NULL value

View Answer

 

Answer: c

Explanation: It is possible to have several values for a single attribute provide it is a multi-valued attribute.

4. Which of the following indicates the maximum number of entities that can be involved in a relationship?

a) Minimum cardinality

b) Maximum cardinality

c) ERD

d) Greater Entity Count

View Answer

 

Answer: b

Explanation: In SQL (Structured Query Language), the term cardinality refers to the uniqueness of data values contained in a particular column (attribute) of a database table.

5. In E-R diagram generalization is represented by

a) Ellipse

b) Dashed ellipse

c) Rectangle

d) Triangle

View Answer

 

Answer: d

Explanation: Ellipse represents attributes,rectangle represents entity.

6. What is a relationship called when it is maintained between two entities?

a) Unary

b) Binary

c) Ternary

d) Quaternary

View Answer

 

Answer: b

Explanation: Binary word usually represents two attributes.

7. Which of the following is a low level operator?

a) Insert

b) Update

c) Delete

d) Directory

View Answer

 

Answer: d

Explanation: Directory is a low level to word on in file system .

8. Key to represent relationship between tables is called

a) Primary key

b) Secondary Key

c) Foreign Key

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Primary key of one relation used as an attribute in another relation is called foreign key.

9. A window into a portion of a database is

a) Schema

b) View

c) Query

d) Data dictionary

View Answer

 

Answer: b

Explanation: View is a logical portion of a database which is needed by some users.

10. A primary key is combined with a foreign key creates

a) Parent-Child relation ship between the tables that connect them

b) Many to many relationship between the tables that connect them

c) Network model between the tables that connect them

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Using the two relationships mother and father provides us a record of a child’s mother, even if we are not aware of the father’s identity; a null value would be required if the ternary relationship parent is used. Using binary relationship sets is preferable in this case

 

1. The entity set person is classified as student and employee. This process is called _________

a) Generalization

b) Specialization

c) Inheritance

d) Constraint generalization

View Answer

 

Answer: b

Explanation: The process of designating subgroupings within an entity set is called specialization.

2. Which relationship is used to represent a specialization entity ?

a) ISA

b) AIS

c) ONIS

d) WHOIS

View Answer

 

Answer: a

Explanation: In terms of an E-R diagram, specialization is depicted by a hollow arrow-head pointing from the specialized entity to the other entity.

3. The refinement from an initial entity set into successive levels of entity subgroupings represents a ________ design process in which distinctions are made explicit.

a) Hierarchy

b) Bottom-up

c) Top-down

d) Radical

View Answer

 

Answer: c

Explanation: The design process may also proceed in a bottom-up manner, in which multiple entity sets are synthesized into a higher-level entity set on the basis of common features.

4. There are similarities between the instructor entity set and the secretary entity set in the sense that they have several attributes that are conceptually the same across the two entity sets: namely, the identifier, name, and salary attributes. This process is called

a) Commonality

b) Specialization

c) Generalization

d) Similarity

View Answer

 

Answer: c

Explanation: Generalization is used to emphasize the similarities among lower-level entity sets and to hide the differences.

5. If an entity set is a lower-level entity set in more than one ISA relationship, then the entity set has

a) Hierarchy

b) Multilevel inheritance

c) Single inheritance

d) Multiple inheritance

View Answer

 

Answer: d

Explanation: The attributes of the higher-level entity sets are said to be inherited by the lower-level entity sets.

6. A _____________ constraint requires that an entity belong to no more than one lower-level entity set.

a) Disjointness

b) Uniqueness

c) Special

d) Relational

View Answer

 

Answer: a

Explanation: For example, student entity can satisfy only one condition for the student type attribute; an entity can be either a graduate student or an undergraduate student, but cannot be both.

7. Consider the employee work-team example, and assume that certain employees participate in more than one work team . A given employee may therefore appear in more than one of the team entity sets that are lower level entity sets of employee. Thus, the generalization is _____________

a) Overlapping

b) Disjointness

c) Uniqueness

d) Relational

View Answer

 

Answer: a

Explanation: In overlapping generalizations, the same entity may belong to more than one lower-level entity set within a single generalization.

8. The completeness constraint may be one of the following: Total generalization or specialization , Partial generalization or specialization . Which is the default ?

a) Total

b) Partial

c) Should be specified

d) Cannot be determined

View Answer

 

Answer: b

Explanation: Partial generalization or specialization – Some higher-level entities may not belong to any lower-level entity set.

9. Functional dependencies are a generalization of

a) Key dependencies

b) Relation dependencies

c) Database dependencies

d) None of the mentioned

View Answer

 

Answer: a

Explanation: The subclasses are combined to form the superclass.

10. Which of the following is another name for weak entity?

a) Child

b) Owner

c) Dominant

d) All of the mentioned

View Answer

 

Answer: a

Explanation: A parent may be called as a strong entity.

 

1. Which is the main relation which is used in the university database which is referenced by all other relation of the university.

a) Teaches

b) Course

c) Department

d) Section

View Answer

 

Answer: c

Explanation: Department is the only relation which forms the main part of the university database .

2. The department relation has the an entry budget whose type has to be replaced by

a) Varchar (20)

b) Varchar2 (20)

c) Numeric (12,2)

d) Numeric

View Answer

 

Answer: c

Explanation: Department is the only relation which forms the main part of the university database.

3. In the course relation the title field should throw an error in case of any missing title. The command to be added in title is

a) Unique

b) Not null

c) 0

d) Null

View Answer

 

Answer: b

Explanation: By specifying not null the value cannot be left blank.

4. In the above DDL command the foreign key entries are got by using the keyword

a) References

b) Key reference

c) Relating

d) None of the mentioned

View Answer

 

Answer: a

Explanation: References (table_name) give the prior table name for the entry.

5. Identify the error in the section relation

a) No error

b) Year numeric (4,0)

c) Building varchar (15)

d) Sec_id varchar (8)

View Answer

 

Answer: a

Explanation: The building and the sec_id have varchar values and year is of numeric type. So no such errors are found in the relation.

6. The following entry is given in to the instructor relation .

 

(100202,Drake,Biology,30000)

Identify the output of the query given

a) Row(s) inserted

b) Error in ID of insert

c) Error in Name of insert

d) Error in Salary of the insert

View Answer

 

Answer: b

Explanation: The varchar(5) value cannot hold the entry 100202.

7. Which of the following can be used as a primary key entry of the instructor relation.

a) DEPT_NAME

b) NAME

c) ID

d) All of the mentioned

View Answer

 

Answer: c

Explanation: The value ID can only be primary key unlike dept_name which is used as a foreign key.

8. In the section relation which of the following is used as a foreign key ?

a) Course_id

b) Course_id,sec_id

c) Room_number

d) Course_id,sec_id,room_number

View Answer

 

Answer: a

Explanation: Course_id is the only field which is present in the course relation.

9. In order to include an attribute Name to the teaches relation which of the following command is used ?

a) Alter table teaches include Name;

b) Alter table teaches add Name;

c) Alter table teaches add Name varchar;

d) Alter table teaches add Name varchar(20);

View Answer

 

Answer: d

Explanation: The form of the alter table command is

alter table r add AD;

where r is the name of an existing relation, A is the name of the attribute to be added, and D is the type of the added attribute.

10. To replace the relation section with some other relation the initial step to be carried out is

a) Delete section;

b) Drop section;

c) Delete from section;

d) Replace section new_table ;

View Answer

 

Answer: b

Explanation: Droping the table drops all the references to that table .

 

1. Which of the following command is used to display the departments of the instructor relation ?

a) Select * from instructor where Dept_name = Finance;

b) Select * from instructor ;

c) Select dept_name from instructor;

d) Select dept_name for instructor where Name=Jackson;

View Answer

 

Answer: c

Explanation: Only one field is necessary for the query and where clause is not needed for the selection.

2. How can we select the elements which have common Dept_name in both the relation ?

a) Select * from instructor i , course c where i.Dept_name=c.Dept_name;

b) Select Dept name from instructor ,Course ;

c) Select * from instructor i , course c ;

d) Select Dept_name from instructor where Dept_name = NULL;

View Answer

 

Answer: a

Explanation: Here only the common elements are displayed .

3. Select distinct Dept_name from instructor ;

How many row(s) are displayed ?

a) 4

b) 3

c) 5

d) Error

View Answer

 

Answer: a

Explanation: Distinct keyword eliminates the the common Dept_name .

4. Suppose the Authority want to include a new instructor for the title Neuroscience what command should be inserted ?

a) Insert into instructor values(12111,Emma,NeuroScience,200000);

b) Insert into course values(12111,Introduction,NeuroScience,2);

c) Insert into instructor values(12111,Emma,Biology,200000);

Insert into course values(BIO-112,Introduction to Neuro Science,NeuroScience,2);

d) Insert into course values(12111,Emma,NeuroScience,200000);

View Answer

 

Answer: c

Explanation: The values have to be inserted into both the relations to be intact .

5. If a person all the people in Music department gets fired which of the following has to be performed on the instructor relation ?

a) Delete Dept_name=Music in instructor;

b) Delete from instructor where Dept_name=Music;

c) Remove Dept_name= Music

d) All of the mentioned

View Answer

 

Answer: b

Explanation: Delete from table_name where condition .

6.

 

SELECT DISTINCT T.name

FROM instructor AS T, instructor AS S

WHERE T.salary > S.salary AND S.dept name = ’Comp.Sci.’;

What will be displayed as the value of name for the above query ?

a) Hayley

b) Jackson

c) Hayley and Crick

d) Crick

View Answer

 

Answer: d

Explanation: Only the greatest salary in Comp.Sci dept is selected for the query.

7.

 

SELECT Name

FROM instructor

WHERE salary > SOME (SELECT salary FROM instructor WHERE dept_name = 'Comp.Sci.');

How many rows are selected ?

a) 3

b) 4

c) 2

d) 1

View Answer

 

Answer: d

Explanation: This displays the names of instructors with salary greater than that of some (at least one) instructor in the Biology department .

8. How will you select the Names whose first letter is E ?

 

a) SELECT Name

   FROM instructor

   WHERE Name LIKE ’A%;

b) SELECT Name

   FROM course

   WHERE Name LIKE ’A%;

c) SELECT Dept_name

   FROM instructor

   WHERE Name LIKE ’A%;

d) SELECT Name

   FROM instructor

   WHERE Dept_name LIKE ’A%;

View Answer

Answer: a

Explanation: % is used to indicate that some characters may appear .

 

 

9. Which function is used to find the count of distinct departments?

a) Dist

b) Distinct

c) Count

d) Count,Dist

View Answer

 

Answer: a

Explanation: Count (distinct ID) is the correct usage .

10. Which function is used to identify the title with Least scope ?

a) Min(Credits)

b) Max(Credits)

c) Min(title)

d) Min(Salary)

View Answer

 

Answer: a

Explanation: Max is used to find the highest element and Min is used to find the lowest element .

 

1. A domain is ______ if elements of the domain are considered to be indivisible units.

a) Atomic

b) Subatomic

c) Substructure

d) Subset

View Answer

 

Answer: a

Explanation: A set of names is an example of a nonatomic value.

2. Identify the composite attributes

a) Salary

b) Credits

c) Section_id

d) None of the mentioned

View Answer

 

Answer: d

Explanation: Composite attributes, such as an attribute address with component attributes street, city, state, and zip have nonatomic domains.

3. Consider the relation given below and ind the maximum normal form applicable to them

 

1. R(A, B) WITH productions { A --> B }

2. R(A, B) WITH productions  { B --> A }

3 R(A, B) WITH productions {A —> B, B --> A }

4  R(A, B, C) WITH productions {A -->B, B --> A, AB --> C }

a) 1, 2 and 3 are in 3NF and 4 is in BCNF

b) 1 and 2 are in BCNF and 3 and 4 are in 3NF

c) All are in 3NF

d) All are in BCNF

View Answer

 

Answer: d

Explanation: One of the more desirable normal forms that we can obtain is Boyce–Codd normal form (BCNF). It eliminates all redundancy that can be discovered based on functional dependencies.

4. Which one is based on multi-valued dependency:

a) First

b) Second

c) Third

d) Fourth

View Answer

 

Answer: d

Explanation: One of the more desirable normal forms that we can obtain is Boyce–Codd normal form (BCNF). It eliminates all redundancy that can be discovered based on functional dependencies.

5. If a relation is in BCNF, then it is also in

a) 1 NF

b) 2 NF

c) 3 NF

d) All of the mentioned

View Answer

 

Answer: d

Explanation: Third normal form (3NF) relaxes this constraint slightly by allowing certain nontrivial functionaldependencieswhose left side is not a superkey.

6. If every non-key attribute is functionally depedent primary key, then the relation will be in

a) First normal form

b) Second normal form

c) Third form

d) Fourth normal form

View Answer

 

Answer: b

Explanation: Third normal form (3NF) relaxes this constraint slightly by allowing certain nontrivial functionaldependencieswhose left side is not a superkey.

7. If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called _____ is needed.

a) DKNF

b) BCNF

c) Fourth

d) Third

View Answer

 

Answer: b

Explanation: BCNF eliminates all redundancy that can be discovered based on functional dependencies.

8. The term for information that describes what type of data is available in a database is:

a) Data dictionary

b) data repository

c) Index data

d) Metadata

View Answer

 

Answer: d

Explanation: Meta data is generally data about a data.

9. A data type that creates unique numbers for key columns in Microsoft Access is:

a) Autonumber

b) Boolean

c) Sequential key

d) Sequential number

View Answer

 

Answer: a

Explanation: This can be taken as a primary key .

10. A dependency exist between two columns when

a) Together they constitute a composite key for the table

b) Knowing the value in one column determines the value stored in another column

c) The table is in 3NF

d) Together they constitute a foreign key

View Answer

 

Answer: a

Explanation: Given a set F of functional dependencies on a schema, we can prove that certain other functional dependencies also hold on the schema.

 

1. In the __________ normal form, a composite attribute is converted to individual attributes.

A) First

B) Second

C) Third

D) Fourth

View Answer

 

Answer: a

Explanation: The first normal form is used to eliminate the duplicate information.

2. A table on the many side of a one to many or many to many relationship must:

a) Be in Second Normal Form (2NF)

b) Be in Third Normal Form (3NF)

c) Have a single attribute key

d) Have a composite key

View Answer

 

Answer: d

Explanation: The relation in second normal form is also in first normal form and no partial dependencies on any column in primary key.

3. Tables in second normal form (2NF):

a) Eliminate all hidden dependencies

b) Eliminate the possibility of a insertion anomalies

c) Have a composite key

d) Have all non key fields depend on the whole primary key

View Answer

 

Answer: a

Explanation: The relation in second normal form is also in first normal form and no partial dependencies on any column in primary key.

4. Which-one ofthe following statements about normal forms is FALSE?

a) BCNF is stricter than 3 NF

b) Lossless, dependency -preserving decomposition into 3 NF is always possible

c) Loss less, dependency – preserving decomposition into BCNF is always possible

d) Any relation with two attributes is BCNF

View Answer

 

Answer: c

Explanation: We say that the decomposition is a lossless decomposition if there is no loss of information by replacing r (R) with two relation schemas r1(R1) andr2(R2).

5. Functional Dependencies are the types of constraints that are based on______

a) Key

b) Key revisited

c) Superset key

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Key is the basic element needed for the constraints.

6. Which is a bottom-up approach to database design that design by examining the relationship between attributes:

a) Functional dependency

b) Database modeling

c) Normalization

d) Decomposition

View Answer

 

Answer: c

Explanation: Normalisation is the process of removing redundancy and unwanted data.

7. Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:

a) 1NF

b) 2NF

c) 3NF

d) All of the mentioned

View Answer

 

Answer: c

Explanation: The first normal form is used to eliminate the duplicate information.

8. Which forms has a relation that possesses data about an individual entity:

a) 2NF

b) 3NF

c) 4NF

d) 5NF

View Answer

 

Answer: c

Explanation: A Table is in 4NF if and only if, for every one of its non-trivial multivalued dependencies X \twoheadrightarrow Y, X is a superkey—that is, X is either a candidate key or a superset thereof.

9. Which forms are based on the concept of functional dependency:

a) 1NF

b) 2NF

c) 3NF

d) 4NF

View Answer

 

Answer: c

Explanation: The table is in 3NF if every non-prime attribute of R is non-transitively dependent (i.e. directly dependent) on every superkey of R.

10. Empdt1(empcode, name, street, city, state,pincode).

For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in

a) 1 NF only

b) 2 NF and hence also in 1 NF

c) 3NF and hence also in 2NF and 1NF

d) BCNF and hence also in 3NF, 2NF and 1NF

View Answer

 

Answer: b

Explanation: The relation in second normal form is also in first normal form and no partial dependencies on any column in primary key.

 

1. We can use the following three rules to find logically implied functional dependencies. This collection of rules is called

a) Axioms

b) Armstrong’s axioms

c) Armstrong

d) Closure

View Answer

 

Answer: b

Explanation: By applying these rules repeatedly, we can find all of F+, given F.

2. Which of the following is not a Armstrong’s Axiom ?

a) Reflexivity rule

b) Transitivity rule

c) Pseudotransitivity rule

d) Augmentation rule

View Answer

 

Answer: c

Explanation: It is possible to use Armstrong’s axioms to prove that Pseudotransitivity rule is sound.

3. The relation employee(ID,name,street,Credit,street,city,salary) is decomposed into

 

employee1 (ID, name)

employee2 (name, street, city, salary)

This type of decomposition is called

a) Lossless decomposition

b) Lossless-join decomposition

c) Both a and b

d) None of the mentioned

View Answer

 

Answer: d

Explanation: Lossy-join decomposition is the decomposition used here .

4. Inst_dept (ID, name, salary, dept name, building, budget) is decomposed into

 

instructor (ID, name, dept name, salary)

department (dept name, building, budget)

This comes under

a) Lossy-join decomposition

b) Lossy decomposition

c) Lossless-join decomposition

d) Both a and b

View Answer

 

Answer: d

Explanation: Lossy-join decomposition is the decomposition used here .

5. There are two functional dependencies with the same set of attributes on the left side of the arrow:

A->BC

A->B

This can be combined as

a) A->BC

b) A->B

c) B->C

d) None of the mentioned

View Answer

 

Answer: a

Explanation: This can be computed as the canonical cover .

6. Consider a relation R(A,B,C,D,E) with the following functional dependencies:

 

ABC -> DE and

D -> AB

The number of superkeys of R is:

a) 2

b) 7

c) 10

d) 12

View Answer

 

Answer: c

Explanation: A superkey is a combination of columns that uniquely identifies any row within a relational database management system (RDBMS) table.

7. Suppose we wish to find the ID’s of the employees that are managed by people who are managed by the employee with ID 123. Here are two possible queries:

 

I.SELECT ee.empID

  FROM Emps ee, Emps ff

  WHERE ee.mgrID = ff.empID AND ff.mgrID = 123;

II.SELECT empID

  FROM Emps

  WHERE mgrID IN

  (SELECT empID FROM Emps WHERE mgrID = 123);

Which, if any, of the two queries above will correctly (in SQL2) get the desired set of employee ID’s?

a) Both I and II

b) I only

c) II only

d) Neither I nor I

View Answer

 

Answer: a

Explanation: The query can be satisfied by any of the two options.

8. Suppose relation R(A,B) currently has tuples {(1,2), (1,3), (3,4)} and relation S(B,C) currently has {(2,5), (4,6), (7,8)}. Then the number of tuples in the result of the SQL query:

 

<i>SELECT *

            FROM R NATURAL OUTER JOIN S; </i>IS:

a) 2

b) 4

c) 6

d) None of the mentioned

View Answer

 

Answer: a

Explanation: The SQL NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with same name of associate tables will appear once only.

9. Suppose now that R(A,B) and S(A,B) are two relations with r and s tuples, respectively (again, not necessarily distinct). If m is the number of (not necessarily distinct) tuples in the result of the SQL query:

 

R intersect S;

 

Then which of the following is the most restrictive, correct condition on the value of m?

 

(a)       m = min(r,s)

(b)       0 <= m <= r + s

(c)        min(r,s) <= m <= max(r,s)

(d)       0 <= m <= min(r,s)

View Answer

 

Answer: d

Explanation: The value of m must lie between the min value of r and s and 0.

10. Suppose relation R(A,B,C,D,E) has the following functional dependencies:

 

A -> B

B -> C

BC -> A

A -> D

E -> A

D -> E

Which of the following is not a key?

a) A

b) E

c) B,C

d) D

View Answer

 

Answer: c

Explanation: Here the keys are not formed by B and C.

 

1. A relation is in ____________ if an attribute of a composite key is dependent on an attribute of other composite key.

a) 2NF

b) 3NF

c) BCNF

d) 1NF

View Answer

 

Answer: b

Explanation: A relation is in 3 NF if an attribute of a composite key is dependent on an attribute of other composite key. (If an attribute of a composite key is dependent on an attribute of other composite key then the relation is not in BCNF, hence it has to be decomposed.).

2. What are the desirable properties of a decomposition

a) Partition constraint

b) Dependency preservation

c) Redundancy

d) Security

View Answer

 

Answer: b

Explanation: Lossless join and dependency preserving are the two goals of the decomposition.

3. R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving BCNF decomposition.

a) A->_B, B->_CD

b) A->B, B->C, C->D

c) AB->C, C->AD

d) A->BCD

View Answer

 

Answer: d

Explanation: This relation gives a relation without any loss in the values.

Class (course id, title, dept name, credits, sec id, semester, YEAR, building, room NUMBER, capacity, TIME slot id)

The SET OF functional dependencies that we require TO hold ON class are:

course id->title, dept name, credits

building, room number->capacity

course id, sec id, semester, year->building, room NUMBER, TIME slot id

A candidate KEY FOR this schema IS {course id, sec id, semester, YEAR}

4. Consider the above conditions. Which of the following relation holds ?

a) Course id-> title, dept name, credits

b) Title-> dept name, credits

c) Dept name-> credits

d) Cannot be determined

View Answer

 

Answer: a

Explanation: Here course id is not a superkey. Thus, class is not in BCNF.

5. The algorithm that takes a set of dependencies and adds one schema at a time, instead of decomposing the initial schema repeatedly is

a) BCNF algorithm

b) 2NF algorithm

c) 3NF synthesis algorithm

d) 1NF algorithm

View Answer

 

Answer: c

Explanation: The result is not uniquely defined, since a set of functional dependencies can have more than one canonical cover, and, further, in some cases, the result of the algorithm depends on the order in which it considers the dependencies in Fc .

6. The functional dependency can be tested easily on the materialized view, using the constraints ____________.

a) Primary key

b) Null

c) Unique

d) Both Null and Unique

View Answer

 

Answer: d

Explanation: Primary key contains both unique and not null constraints .

7. Which normal form is considered adequate for normal relational database design?

a) 2NF

b) 5NF

c) 4NF

d) 3NF

View Answer

 

Answer: d

Explanation: A relational database table is often described as “normalized” if it is in the Third Normal Form because most of the 3NF tables are free of insertion, update, and deletion anomalies .

8. Relation R with an associated set of functional dependencies, F, is decomposed into BCNF. The redundancy (arising out of functional dependencies) in the resulting set of relations is

a) Zero

b) More than zero but less than that of an equivalent 3NF decomposition

c) Proportional to the size of F+

d) Indeterminate

View Answer

 

Answer: b

Explanation: Redundancy in BCNF is low when compared to 3NF. For more details on BCNF .

9. A table has fields F1, F2, F3, F4, and F5, with the following functional dependencies:

 

F1->F3

F2->F4

(F1,F2)->F5

in terms of normalization, this table is in

a) 1NF

b) 2NF

c) 3NF

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Since the primary key is not given we have to derive the primary key of the table. Using the closure set of attributes we get the primary key as (F1,F2). From functional dependencies, “F1->F3, F2->F4”, we can see that there is partial functional dependency therefore it is not in 1NF. Hence the table is in 1NF.

10. Let R(A,B,C,D,E,P,G) be a relational schema in which the following FDs are known to hold:

 

AB->CD

DE->P

C->E

P->C

B->G

The relation schema R is

a) in BCNF

b) in 3NF, but not in BCNF

c) in 2NF, but not in 3NF

d) not in 2NF

View Answer

 

Answer: d

Explanation: From the closure set of attributes we can see that the key for the relation is AB. The FD B->G is a partial dependency, hence it is not in 2NF.

 

1. The normal form which satisfies multivalued dependencies and which is in BCNF is

a) 4 NF

b) 3 NF

c) 2 NF

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Fourth normal form is more restrictive than BCNF.

2. Which of the following is a tuple-generating dependencies ?

a) Functional dependency

b) Equality-generating dependencies

c) Multivalued dependencies

d) Non-functional dependency

View Answer

 

Answer: c

Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.

3. The main task carried out in the __________ is to remove repeating attributes to separate tables.

a) First Normal Form

b) Second Normal Form

c) Third Normal Form

d) Fourth Normal Form

View Answer

 

Answer: a

Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.

4. Which of the normal form is based on multivalued dependencies ?

a) First

b) Second

c) Third

d) Fourth

View Answer

 

Answer: d

Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.

5. Which forms has a relation that possesses data about an individual entity?

a) 2NF

b) 3NF

c) 4NF

d) 5NF

View Answer

 

Answer: c

Explanation: A Table is in 4NF if and only if, for every one of its non-trivial multivalued dependencies X \twoheadrightarrow Y, X is a superkey—that is, X is either a candidate key or a superset thereof.

6. If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from one of the following sources.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) Both A many-to-many relationship set and A multivalued attribute of an entity set

View Answer

 

Answer: d

Explanation: For a many-to-many relationship set each related entity set has its own schema and there is an additional schema for the relationship set. For a multivalued attribute, a separate schema is created consisting of that attribute and the primary key of the entity set.

7. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set?

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) None of the mentioned

View Answer

 

Answer: a

Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

8. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) None of the mentioned

View Answer

 

Answer: b

Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

9. Fifth Normal form is concerned with

a) Functional dependency

b) Multivalued dependency

c) Join dependency

d) Domain-key

View Answer

 

Answer: c

Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

10. In 2NF

a) No functional dependencies (FDs) exist

b) No multivalued dependencies (MVDs) exist

c) No partial FDs exist

d) No partial MVDs exist

View Answer

 

Answer: c

Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

 

1. _____________ can help us detect poor E-R design.

a) Database Design Process

b) E-R Design Process

c) Relational scheme

d) Functional dependencies

View Answer

 

Answer: d

Explanation: For eg.,Suppose an instructor entity set had attributes dept name and dept address, and there is a functional dependency dept name -> dept address.

2. If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from one of the following sources.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) Both A many-to-many relationship set and A multivalued attribute of an entity set

View Answer

 

Answer: d

Explanation: For a many-to-many relationship set each related entity set has its own schema and there is an additional schema for the relationship set. For a multivalued attribute, a separate schema is created consisting of that attribute and the primary key of the entity set.

3. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) All of the mentioned

View Answer

 

Answer: a

Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

4. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.

a) A many-to-many relationship set

b) A multivalued attribute of an entity set

c) A one-to-many relationship set

d) All of the mentioned

View Answer

 

Answer: b

Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

5. Suppose the user finds the usage of room number and phone number in a relational schema there is confusion.This is reduced by

a) Unique-role assumption

b) Unique-key assignment

c) Role intergral assignment

d) None of the mentioned

View Answer

 

Answer: a

Explanation: A desirable feature of a database design is the unique-role assumption, which means that each attribute name has a unique meaning in the database.

6. What is the best way to represent the attributes in a large database?

a) Relational-and

b) Concatenation

c) Dot representation

d) All of the mentioned

View Answer

 

Answer: b

Explanation: Example inst sec and student sec.

7. Designers use which of the following to tune performance of systems to support time-critical operations?

a) Denormalization

b) Redundant optimization

c) Optimization

d) Realization

View Answer

 

Answer: a

Explanation: The process of taking a normalized schema and making it nonnormalized is called denormalization.

8. In the schema (dept name, size) we have relations total inst 2007, total inst 2008 . Which dependency have lead to this relation ?

a) Dept name, year->size

b) Year->size

c) Dept name->size

d) Size->year

View Answer

 

Answer: a

Explanation: The process of taking a normalized schema and making it nonnormalized is called denormalization.

9. Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009) .Here the only functional dependencies are from dept name to the other attributes .This relation is in

a) Fourth NF

b) BCNF

c) Third NF

d) Second NF

View Answer

 

Answer: b

Explanation: BCNF has only one normal form.

10. Thus a _______ of course data gives the values of all attributes, such as title and department, of all courses at a particular point in time.

a) Instance

b) Snapshot

c) Both Instance and Snapshot

d) All of the mentioned

View Answer

 

Answer: b

Explanation: We use the term snapshot of data to mean the value of the data at a particular point in time.

11. Representations such as the in the dept year relation, with one column for each value of an attribute, are called _______ they are widely used in spreadsheets and reports and in data analysis tools.

a) Cross-tabs

b) Snapshot

c) Both Cross-tabs and Snapshot

d) All of the mentioned

View Answer

 

Answer: a

Explanation: SQL includes features to convert data from a normal relational representation to a crosstab.

 

1. An approach to website design with the emphasis on converting visitors to outcomes required by the owner is referred to as:

a) Web usability

b) Persuasion

c) Web accessibility

d) None of the mentioned

View Answer

 

Answer: b

Explanation: In computing, graphical user interface is a type of user interface that allows users to interact with electronic devices.

2. A method of modelling and describing user tasks for an interactive application is referred to as:

a) Customer journey

b) Primary persona

c) Use case

d) Web design persona

View Answer

 

Answer: c

Explanation: The actions in GUI are usually performed through direct manipulation of the graphical elements.

3. Information architecture influences:

a) Answer choice

b) Site structure

c) Labeling

d) Navigation design

View Answer

 

Answer: b

Explanation: The actions in GUI are usually performed through direct manipulation of the graphical elements.

4. Also known as schematics, a way of illustrating the layout of an individual webpage is a:

a) Wireframe

b) Sitemap

c) Card sorting

d) Blueprint

View Answer

 

Answer: a

Explanation: An application programming interface specifies how some software components should interact with each other.

5. A graphical or text depiction of the relationship between different groups of content on a website is referred to as a:

a) Wireframe

b) Blueprint

c) Sitemap

d) Card sorting

View Answer

 

Answer: c

Explanation: An application programming interface specifies how some software components should interact with each other.

6. Blueprints are intended to:

a) Prototype of the screen layout showing navigation and main design elements

b) Show the grouping of pages and user journeys

c) Indicate the structure of a site during site design and as a user feature

d) Prototype typical customer journeys or clickstreams through a website

View Answer

 

Answer: c

Explanation: A blueprint is a reproduction of a technical drawing, documenting an architecture or an engineering design, using a contact print process .

7. Storyboards are intended to:

a) Indicate the structure of a site during site design and as a user feature

b) Prototype of the screen layout showing navigation and main design elements

c) Integrate consistently available components on the webpage (e.g. navigation, search boxes)

d) Prototype typical customer journeys or click streams through a website

View Answer

 

Answer: d

Explanation: An application programming interface specifies how some software components should interact with each other.

8. Which of the following occupies boot record of hard and floppy disks and activated during computer startup?

a) Worm

b) Boot sector virus

c) Macro virus

d) Virus

View Answer

 

Answer: b

Explanation: A blueprint is a reproduction of a technical drawing, documenting an architecture or an engineering design, using a contact print process .

9. A graphical or text depiction of the relationship between different groups of content on a website is a:

a) Page template

b) Wireframe

c) Site map

d) Cascading style sheet (CSS)

View Answer

 

Answer: c

Explanation: In computing, graphical user interface is a type of user interface that allows users to interact with electronic devices.

10. Which of the following is a description of information organization schemes?

a) Minimising the number of clicks needed to access relevant content

b) Providing an overall design to a site consistent with the positioning of the products and services

c) The menu options chosen to group and categorize information

d) Providing specific content and services appropriate to different audience members

View Answer

 

Answer: c

Explanation: In computing, graphical user interface is a type of user interface that allows users to interact with electronic devices.

 

1. Which of the following is a valid uniform resource locator ?

a) http://www.acm.org/sigmod

b) www.google.com

c) www.ann.in

d) http:/www.acm.org/sigmod/

View Answer

 

Answer: a

Explanation: A uniform resource locator (URL) is a globally unique name for each document that can be accessed on the Web.

2. http://www.google.com/search?q=silberschatz

In the above URL which one is the argument which is used for processing of the URL?

a) google

b) google.com

c) search

d) q=silberschatz

View Answer

 

Answer: d

Explanation: Argument is always placed after ? symbol.

3. HTTP defines two ways in which values entered by a user at the browser can be sent to the Web server. The _____ method encodes the values as part of the URL.

a) Post

b) Get

c) Read

d) Argument

View Answer

 

Answer: b

Explanation: For example, if the Google search page used a form with an input parameter

named q with the get method, and the user typed in the string “silberschatz” and submitted the form, the browser would request the following URL from the Web server: http://www.google.com/search?q=silberschatz.

4. A __________ is a program running on the server machine,which accepts requests from a Web browser and sends back results in the form of HTML documents.

a) HTML

b) HTTP

c) Web Server

d) Web browser

View Answer

 

Answer: c

Explanation: The browser and Web server communicate via HTTP. Web servers provide powerful features, beyond the simple transfer of documents.

5. The application program typically communicates with a database server, through ___________ or other protocols, in order to get or store data.

a) JDBC

b) ODBC

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: c

Explanation: The common gateway interface (CGI) standard defines how the Web server communicates with application programs.

6. This extra information is usually maintained in the form of a _________ at the client.

a) Cookie

b) History

c) Remainder

d) None of the mentioned

View Answer

 

Answer: a

Explanation: A cookie is simply a small piece of text containing identifying information and with an associated name.

7. Which of the following is not true about HTML ?

a) <meta>…</meta>

b) <meta…./>

c) <metadata>…</metadata>

d) <metadata name=”” />

View Answer

 

Answer: b

Explanation: Meta data is the data about data which is included in the meta data tag.

8. Html code contains:

a) Tags

b) Attributes

c) Elements

d) All of the mentioned

View Answer

 

Answer: d

Explanation:<> are tags,size is a attribute.

9. Html document must always be saved with:

a) .html

b) .htm

c) .doc

d) Both .html & .htm

View Answer

 

Answer: d

Explanation: .doc is used only for the word document format.

10. How many levels of headings are in html:

a) 2

b) 7

c) 6

d) 4

View Answer

 

Answer: c

Explanation: The heading levels are h1,h2,h3,h4,h5,h6.

 

1. The Java __________ specification defines an application programming interface for communication between the Web server and the application program.

a) Servlet

b) Server

c) Program

d) Randomize

View Answer

 

Answer: a

Explanation: Servlets are commonly used to generate dynamic responses to HTTP requests.

2. The doGet() method in the example extracts values of the parameter’s type and number by using __________

a) request.getParameter()

b) request.setParameter()

c) responce.getParameter()

d) responce.getAttribute()

View Answer

 

Answer: a

Explanation: These methods uses these values to run a query against a database.

3. How many JDBC driver types does Sun define?

a) One

b) Two

c) Three

d) Four

View Answer

 

Answer: d

Explanation: JBDB.DriverManager.getConnection() is used to get the connection to the database.

4. Which JDBC driver Type(s) can be used in either applet or servlet code?

a) Both Type 1 and Type 2

b) Both Type 1 and Type 3

c) Both Type 3 and Type 4

d) Type 4 only

View Answer

 

Answer: c

Explanation: In a Type 3 driver, a three-tier approach is used to accessing databases. The JDBC clients use standard network sockets to communicate with an middleware application server.In a Type 4 driver, a pure Java-based driver that communicates directly with vendor’s database through socket connection.

5. What MySQL property is used to create a surrogate key in MySQL?

a) UNIQUE

b) SEQUENCE

c) AUTO_INCREMENT

d) None of the mentioned

View Answer

 

Answer: c

Explanation: A surrogate key in a database is a unique identifier for either an entity in the modeled world or an object in the database.

6. A JSP is transformed into a(n):

a) Java applet

b) Java servlet

c) Either 1 or 2 above

d) Neither 1 nor 2 above

View Answer

 

Answer: b

Explanation: Servlets are commonly used to generate dynamic responses to HTTP requests.

7. Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge?

a) Type 1

b) Type 2

c) Type 3

d) Type 4

View Answer

 

Answer: a

Explanation: In a Type 1 driver, a JDBC bridge is used to access ODBC drivers installed on each client machine.

8. What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?

a) VBScript only

b) Jscript only

c) Java only

d) All of the mentioned

View Answer

 

Answer: c

Explanation: JSP primarily uses Java for the certain codes.

9. What is bytecode?

a) Machine-specific code

b) Java code

c) Machine-independent code

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Java bytecode is the form of instructions that the Java virtual machine executes. Each bytecode opcode is one byte in length, although some require parameters, resulting in some multi-byte instructions.

10. Where is metadata stored in MySQL?

a) In the MySQL database metadata

b) In the MySQL database metasql

c) In the MySQL database mysql

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Metadata contains data about other data which is given in the … tags.

 

1. Which of the following is true for Seeheim model?

a) Presentation is abstracted from dialogue and Application

b) Presentation and Dialogue is abstracted from Application

c) Presentation and Application is abstracted from Dialogue

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Presentation is abstracted from dialogue and application.

2. Which of the unit operation is used in Model view controller?

a) Is a Decomposition

b) Part Whole Decomposition

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Part whole decomposition is applied to MVC.

3. Memory address refers to the successive memory words and the machine is called as _______________

a) word addressable

b) byte addressable

c) bit addressable

d) Terra byte addressable

View Answer

 

Answer: a

Explanation: Part whole decomposition is applied to MVC.

4. Which layer deals which deals with user interaction is called _____________ layer.

a) Business logic

b) Presentation

c) User interaction

d) Data access

View Answer

 

Answer: b

Explanation: The single application may have several different versions of this layer, corresponding to distinct kinds of interfaces such as Web browsers, and user interfaces of mobile phones, which have much smaller screens.

5. The _____________ layer, which provides a high-level view of data and actions on data.

a) Business logic

b) Presentation

c) User interaction

d) Data access

View Answer

 

Answer: a

Explanation: The single application may have several different versions of this layer, corresponding to distinct kinds of interfaces such as Web browsers, and user interfaces of mobile phones, which have much smaller screens.

6. The ______________ layer, which provides the interface between the business-logic layer and the underlying database.

a) Business logic

b) Presentation

c) User interaction

d) Data access

View Answer

 

Answer: d

Explanation: Many applications use an object-oriented language to code the business-logic layer, and use an object-oriented model of data, while the underlying database is a relational database.

7. The _____________ system is widely used for mapping from Java objects to relations.

a) Hibernate

b) Object oriented

c) Objective

d) None of the mentioned

View Answer

 

Answer: a

Explanation: In Hibernate, the mapping from each Java class to one or more relations is specified in a mapping file.

8. Which among the following are the functions that any system with a user interface must provide?

a) Presentation

b) Dialogue

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Presentation and Application are the functions that any system with a user interface must provide.

9. Which of the following is the main task accomplished by the user?

a) Compose a document

b) Create a spread sheet

c) Send mail

d) All of the mentioned

View Answer

 

Answer: d

Explanation: All of the mentioned are the main task accomplished by the user.

10. What are the portability concerns founded in Seeheim model?

a) Replacing the presentation toolkit

b) Replacing the application toolkit

c) Replacing the dialogue toolkit

d) Replacing the presentation & application toolkit

View Answer

 

Answer: d

Explanation: The portability concerns founded in Seeheim model are- Replacing the presentation toolkit and Replacing the application toolkit.

 

 

1. Which schema object instructs Oracle to connect to a remotely access an object of a database?

a) Sequence

b) Remote link

c) Database link

d) Data link

View Answer

 

Answer: d

Explanation: A database link (DBlink) is a definition of how to establish a connection from one Oracle database to another.

2. DML changes are

a) Insert

b) Update

c) Create

d) Both Insert and Update

View Answer

 

Answer: d

Explanation: Create is a DDL operation.

3. Which of the following object types below cannot be replicated?

a) Data

b) Trigger

c) View

d) Sequence

View Answer

 

Answer: d

Explanation: Sequence is a series of items which is like a unique index .

4. How to force a log switch?

a) By using ALTER SYSTEM LOG

b) By using ALTER SYSTEM SWITCH LOGFILE

c) By using ALTER SYSTEM SWITCH LOGS

d) By using ALTER SYS LOGFILES

View Answer

 

Answer: b

Explanation: ALTER SYSTEM ARCHIVE LOG CURRENT is the best practice for production backup scripts with RMAN. .

5. In the following query, which expression is evaluated first?

 

SELECT id_number, (quantity - 100 / 0.15 - 35 * 20) FROM inventory

a) 100 / 0.15

b) quantity – 100

c) 35*20

d) 0.15-35

View Answer

 

Answer: a

Explanation: According to the precedence of expression as in BODMAS the expression evaluated.

6. The ORDER BY clause can only be used in

a) SELECT queries

b) INSERT queries

c) GROUP BY queries

d) HAVING queries

View Answer

 

Answer: a

Explanation: SELECT column_name,column_name

FROM table_name

ORDER BY column_name,column_name ASC|DESC;.

7. Which of the following rule below are categories of index?

a) Column and Functional

b) Multiple Column and functional

c) Column, Multiple Column and functional

d) None of the mentioned

View Answer

 

Answer: a

Explanation: The CREATE INDEX statement is used to create indexes in tables.

8. What is the purpose of SMON background process?

a) Performs crash recovery when a failed instance starts up again

b) Performs recovery when a user process fails

c) Writes redo log entries to disk

d) None of the mentioned

View Answer

 

Answer: a

Explanation: SMON (System MONitor) is an Oracle background process created when you start a database instance .

9. Which of the following queries are legal?

a) SELECT deptno, count(deptno) FROM emp GROUP BY ename;

b) SELECT deptno, count(deptno), job FROM emp GROUP BY deptno;

c) SELECT deptno, avg(sal) FROM emp;

d) SELECT deptno, avg(sal) FROM emp GROUP BY deptno;

View Answer

 

Answer: d

Explanation: For aggregate functions group by clause is necessary.

10. Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500?

a) select job, sum(sal) from emp where sum(sal) > 2500 and comm is null;

b) select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;

c) select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job;

d) select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null;

View Answer

 

Answer: b

Explanation: For aggregate functions group by clause is necessary.

 

1. The indirect change of the values of a variable in one module by another module is called

a) Internal change

b) Inter-module change

c) Side effect

d) Side-module update

View Answer

 

Answer: c

Explanation: The module of the search tree and the flow is directed by its values.

2. Which of the following data structure is not linear data structure?

a) Arrays

b) Linked lists

c) Arrays & Linked lists

d) None of the mentioned

View Answer

 

Answer: d

Explanation: Both array and linked lists are in data structure concepts.

3. Which of the following data structure is linear data structure?

a) Trees

b) Graphs

c) Arrays

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Tree and graphs are not linear.

4. Which of the following criterion is NOT written using the proper syntax?

a) “Haris”

b) <500

c) NO VALUE

d) Between #1/1/2000# and #12/31/2000#

View Answer

 

Answer: c

Explanation: NO VALUE cannot be specified.

5. The operation of processing each element in the list is known as

a) Sorting

b) Merging

c) Inserting

d) Traversal

View Answer

 

Answer: d

Explanation: There are several types of traversals.

6. Finding the location of the element with a given value is:

a) Traversal

b) Search

c) Sort

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Search is performed by traversing through the tree.

7. Arrays are best data structures

a) For relatively permanent collections of data

b) For the size of the structure and the data in the structure are constantly changing

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: a

Explanation: The operator tree has a tree like format where the evaluation starts from root of the tree.

8. Linked lists are best suited

a) For relatively permanent collections of data

b) For the size of the structure and the data in the structure are constantly changing

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: b

Explanation: A linked list is a data structure consisting of a group of nodes which together represent a sequence.

9. Each array declaration need not give, implicitly or explicitly, the information about

a) The name of array

b) The data type of array

c) The first data from the set to be stored

d) The index set of the array

View Answer

 

Answer: c

Explanation: The operator tree has a tree like format where the evaluation starts from root of the tree.

10. The elements of an array are stored successively in memory cells because

a) By this way computer can keep track only the address of the first element and the addresses of other elements can be calculated

b) The architecture of computer memory does not allow arrays to store other than serially

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Memory is always allotted in order.

 

1. In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

a) SQL injection

b) SQL

c) Direct

d) Application

View Answer

 

Answer: a

Explanation: Application security has to deal with several security threats and issues beyond those handled by SQL authorization .

2. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

View Answer

 

Answer: c

Explanation: In such an attack, a malicious user enters code written in a client-side scripting language such as JavaScript or Flash instead of entering a valid name or comment.

3. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

View Answer

 

Answer: b

Explanation: Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF.

4. Many applications use _________________, where two independent factors are used to identify a user.

a) Two-factor authentication

b) Cross-site request forgery

c) Cross-site scripting

d) Cross-site scoring scripting

View Answer

 

Answer: a

Explanation: The two factors should not share a common vulnerability.

5. Even with two-factor authentication, users may still be vulnerable to_____________attacks.

a) Radiant

b) Cross attack

c) scripting

d) Man-in-the-middle

View Answer

 

Answer: d

Explanation: In such attacks, a user attempting to connect to the application is diverted to a fake Web site, which accepts the password from the user, and uses it immediately to authenticate to the original application.

6. A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

a) OpenID

b) Sign-on system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

View Answer

 

Answer: b

Explanation: Once the user logged in at one site, he does not have to enter his user name and password at other sites that use the same single sign-on service.

7. The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.

a) OpenID

b) Sign-on system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

View Answer

 

Answer: c

Explanation: The user’s password and other authentication factors are never revealed to the application, and the user need not register explicitly with the application.

8. The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.

a) OpenID

b) Single-site system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

View Answer

 

Answer: a

Explanation: The user’s password and other authentication factors are never revealed to the application, and the user need not register explicitly with the application.

9. _______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

a) OpenID

b) Single-site system

c) Security Assertion Markup Language (SAML)

d) Virtual Private Database (VPD)

View Answer

 

Answer: d

Explanation: Some database systems provide mechanisms for fine-grained authorization.

10. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.

a) Row-level authorization

b) Column-level authentication

c) Row-type authentication

d) Authorization security

View Answer

 

Answer: a

Explanation: Oracle Virtual Private Database (VPD) allows a system administrator to associate a function with a relation.

 

1. ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

a) Encryption

b) Data mining

c) Internet Security

d) Architectural security

View Answer

 

Answer: a

Explanation: Encryption is also used to carry out other tasks, such as authentication.

2. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

a) Encryption key

b) Decryption key

c) Primary key

d) Authorised key

View Answer

 

Answer: b

Explanation: Even if the message is intercepted by an enemy, the enemy, not knowing the key, will not be able to decrypt and understand the message.

3. Which of the following is not a property of good encryption technique ?

a) Relatively simple for authorized users to encrypt and decrypt data

b) Decryption key is extremely difficult for an intruder to determine

c) Encryption depends on a parameter of the algorithm called the encryption key

d) None of the mentioned

View Answer

 

Answer: d

Explanation: Here a,b and c are the properties have to be present in a good design of a encryption technique.

4. In which of the following encryption key is used to encrypt and decrypt the data ?

a) Public key

b) Private key

c) Symmetric key

d) Asymmetric key

View Answer

 

Answer: c

Explanation: In public-key (also known as asymmetric-key) encryption techniques, there are two different keys, the public key and the private key, used to encrypt and decrypt the data.

5. Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________

a) Dictionary attacks

b) Database attacks

c) Minor attacks

d) Random attacks

View Answer

 

Answer: a

Explanation: This happens when particularly if the encryption key is publicly available.

6. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?

a) Round key algorithm

b) Public key algorithm

c) Advanced Encryption Standard

d) Asymmetric key algorithm

View Answer

 

Answer: c

Explanation: The standard is based on the Rijndael algorithm.

7. Which of the following requires no password travel across the internet ?

a) Readable system

b) Manipulation system

c) Challenge–response system

d) Responce system

View Answer

 

Answer: c

Explanation: The database system sends a challenge string to the user. The user encrypts the challenge string using a secret password as encryption key and then returns the result. The database system can verify the authenticity of the user by decrypting the string with the same secret password and checking the result with the original challenge string.

8. Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?

a) Not true, the message can also be decrypted with the Public Key

b) A so called “one way function with back door” is applyed for the encryption

c) The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key

d) The encrypted message contains the function for decryption which identifies the Private Key

View Answer

 

Answer: b

Explanation: An one-way function is a function which a computer can calculate quickly, but whose reversal would last months or years. An one-way function with back door can be reversed with the help of a couple of additional information (the back door), but scarcely without this information. The information for the back door is contained in the private Key.

9. Which is the largest disadvantage of the symmetric Encryption?

a) More complex and therefore more time-consuming calculations

b) Problem of the secure transmission of the Secret Key

c) Less secure encryption function

d) Isn’t used any more

View Answer

 

Answer: b

Explanation: As there is only one key in the symmetrical encryption, this must be known by both sender and recipient and this key is sufficent to decrypt the secret message. Therefore it must be exchanged between sender and receiver in such a manner that an unauthorized person can in no case take possesion of it.

10. Which is the principle of the encryption using a key?

a) The key indicates which funcion is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown

b) The key contains the secret function for encryption including parameters. Only a password can activate the key

c) All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption

d) The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption

View Answer

 

Answer: b

Explanation: The encoding of a message is calculated by an algorithm. If always the same algorithm would be used, it would be easy to crack intercepted messages. However, it isn’t possible to invent a new algorithm whenever the old one was cracked, therefor the possibility to parameterize algorithms is needed and this is the assignment of the key.

 

1. Which of the following is a physical storage media ?

a) Tape Storage

b) Optical Storage

c) Flash memory

d) All of the mentioned

View Answer

 

Answer: d

Explanation: The storage media are classified by the speed with which data can be accessed, by the cost per unit of data to buy the medium, and by the medium’s reliability.

2. The _________ is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.

a) Cache

b) Disk

c) Main memory

d) Flash memory

View Answer

 

Answer: a

Explanation: Cache storage is easy to access because it is closer to the processor.

3. Which of the following stores several gigabytes of data but usually lost when power failure?

a) Flash memory

b) Disk

c) Main memory

d) Secondary memory

View Answer

 

Answer: c

Explanation: The contents of main memory are usually lost if a power failure or system crash occurs.

4. The flash memory storage used are

a) NOR Flash

b) OR Flash

c) AND Flash

d) All of the mentioned

View Answer

 

Answer: a

Explanation: NAND flash has a much higher storage capacity for a given cost, and is widely used for data storage in devices such as cameras, music players, and cell phones.

5. __________ is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.

a) Flash memory

b) Disk

c) Main memory

d) Secondary memory

View Answer

 

Answer: a

Explanation: Flash memory is of two types – NAND and NOR.

6. Which is the cheapest memory device in terms of costs/bit ?

a) Semiconductor memory

b) Magnetic disks

c) Compact disks

d) Magnetic tapes

View Answer

 

Answer: c

Explanation: Compact disk is used for easy storage at lower cost .

7. The primary medium for the long-term online storage of data is the __________ where the entire database is stored on magnetic disk.

a) Semiconductor memory

b) Magnetic disks

c) Compact disks

d) Magnetic tapes

View Answer

 

Answer: b

Explanation: The system must move the data from disk to main memory so that they can be accessed .

8. Optical disk _______ systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.

a) Tape Storage

b) Jukebox

c) Flash memory

d) All of the mentioned

View Answer

 

Answer: b

Explanation: The most popular form of optical disks are CD and DVD.

9. There are “record-once” versions of compact disk and digital video disk, which can be written only once; such disks are also called __________ disks.

a) Write-once, read-many (WORM)

b) CD-R

c) DVD-W

d) CD-ROM

View Answer

 

Answer: a

Explanation: There are also “multiple-write” versions of compact disk (called CD-RW) and digital video disk (DVD-RW, DVD+RW, and DVD-RAM), which can be written multiple times.

10. Tape storage is referred to as __________ storage.

a) Direct-access

b) Random-access

c) Sequential-access

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Tape storage is used primarily for backup and archival data.

 

1. In magnetic disk ________ stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.

a) Read–write head

b) Read-assemble head

c) Head–disk assemblies

d) Disk arm

View Answer

 

Answer: d

Explanation: Each side of a platter of a disk has a read–write head that moves across the platter to access different tracks.

2. A __________ is the smallest unit of information that can be read from or written to the disk.

a) Track

b) Spindle

c) Sector

d) Platter

View Answer

 

Answer: c

Explanation: The disk surface is logically divided into tracks, which are subdivided into sectors.

3. The disk platters mounted on a spindle and the heads mounted on a disk arm are together known as ___________

a) Read-disk assemblies

b) Head–disk assemblies

c) Head-write assemblies

d) Read-read assemblies

View Answer

 

Answer: b

Explanation: Each side of a platter of a disk has a read–write head that moves across the platter to access different tracks.

4. The disk controller uses ________ at each sector to ensure that the data is not corrupted on data retrieval.

a) Checksum

b) Unit drive

c) Read disk

d) Readsum

View Answer

 

Answer: a

Explanation: A disk controller interfaces between the computer system and the actual hardware of the disk drive.

5. _________ is the time from when a read or write request is issued to when data transfer begins.

a) Access time

b) Average seek time

c) Seek time

d) Rotational latency time

View Answer

 

Answer: a

Explanation: To access (that is, to read or write) data on a given sector of a disk, the arm first must move so that it is positioned over the correct track, and then must wait for the sector to appear under it as the disk rotates.

6. The time for repositioning the arm is called the ________ and it increases with the distance that the arm must move.

a) Access time

b) Average seek time

c) Seek time

d) Rotational latency time

View Answer

 

Answer: c

Explanation: Typical seek times range from 2 to 30 milliseconds, depending on how far the track is from the initial arm position.

7. _________ is around one-half of the maximum seek time.

a) Access time

b) Average seek time

c) Seek time

d) Rotational latency time

View Answer

 

Answer: b

Explanation: Average seek times currently range between 4 and 10 milliseconds, depending on the disk model.

8. Once the head has reached the desired track, the time spent waiting for the sector to be accessed to appear under the head is called the _______________

a) Access time

b) Average seek time

c) Seek time

d) Rotational latency time

View Answer

 

Answer: d

Explanation: Rotational speeds of disks today range from 5400 rotations per minute (90 rotations per second) up to 15,000 rotations per minute (250 rotations per second), or, equivalently, 4 milliseconds to 11.1 milliseconds per rotation.

9. In Flash memory, the erase operation can be performed on a number of pages, called an _______ at once, and takes about 1 to 2 milliseconds.

a) Delete block

b) Erase block

c) Flash block

d) Read block

View Answer

 

Answer: b

Explanation: The size of an erase block (often referred to as just “block” in flash literature) is usually significantly larger than the block size of the storage system.

10. Hybrid disk drives are hard-disk systems that combine magnetic storage with a smaller amount of flash memory, which is used as a cache for frequently accessed data.

a) Hybrid drivers

b) Disk drivers

c) Hybrid disk drivers

d) All of the mentioned

View Answer

 

Answer: b

Explanation: Frequently accessed data that are rarely updated are ideal for caching in flash memory.

 

 

1. Which level of RAID refers to disk mirroring with block striping?

a) RAID level 1

b) RAID level 2

c) RAID level 0

d) RAID level 3

View Answer

 

Answer: a

Explanation: RAID level 1 refers to disk mirroring with block striping.

2. Optical disk technology uses

a) Helical scanning

b) DAT

c) A laser beam

d) RAID

View Answer

 

Answer: d

Explanation: Redundant Array of Inexpensive Disks.

3. With multiple disks, we can improve the transfer rate as well by ___________ data across multiple disks.

a) Striping

b) Dividing

c) Mirroring

d) Dividing

View Answer

 

Answer: a

Explanation: Data striping consists of splitting the bits of each byte across multiple disks; such striping is called bitlevel striping.

4. Which one of the following is a Stripping technique ?

a) Byte level stripping

b) Raid level stripping

c) Disk level stripping

d) Block level stripping

View Answer

 

Answer: d

Explanation: Block-level striping stripes blocks across multiple disks. It treats the array of disks as a single large disk, and it gives blocks logical numbers.

5. The RAID level which mirroring is done along with stripping is

a) RAID 1+0

b) RAID 0

c) RAID 2

d) Both RAID 1+0 and RAID 0

View Answer

 

Answer: d

Explanation: Mirroring without striping can also be used with arrays of disks, to give the appearance of a single large, reliable disk.

6. Where performance and reliability are both important, RAID level ____ is used.

a) 0

b) 1

c) 2

d) 0+1

View Answer

 

Answer: d

Explanation: Mirroring without striping can also be used with arrays of disks, to give the appearance of a single large, reliable disk.

7. ______________ partitiones data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk.

a) Block interleaved parity

b) Block interleaved distributed parity

c) Bit parity

d) Bit interleaved parity

View Answer

 

Answer: b

Explanation: In level 5, all disks can participate in satisfying read requests, unlike RAID level 4, where the parity disk cannot participate, so level 5 increases the total number of requests that can be met in a given amount of time.

8. Hardware RAID implementations permit _________ that is, faulty disks can be removed and replaced by new ones without turning power off.

a) Scrapping

b) Swapping

c) Hot swapping

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Hot

swapping reduces the mean time to repair, since replacement of a disk does not have to wait until a time when the system can be shut down.

9. ___________ is popular for applications such as storage of log files in a database system, since it offers the best write performance.

a) RAID level 1

b) RAID level 2

c) RAID level 0

d) RAID level 3

View Answer

 

Answer: a

Explanation: RAID level 1 refers to disk mirroring with block striping.

10. ______________ which increases the number of I/O operations needed to write a single logical block, pays a significant time penalty in terms of write performance.

a) RAID level 1

b) RAID level 2

c) RAID level 5

d) RAID level 3

View Answer

 

Answer: a

Explanation: In level 5, all disks can participate in satisfying read requests, unlike RAID level 4, where the parity disk cannot participate, so level 5 increases the total number of requests that can be met in a given amount of time.

 

1. Tertiary storage is built with :

a) a lot of money

b) unremovable media

c) removable media

d) secondary storage

View Answer

 

Answer: c

Explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

2. Operating system is responsible for

a) disk initialization

b) booting from disk

c) bad-bock recovery

d) all of the mentioned

View Answer

 

Answer: d

Explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

3. A typical tape drive is ________ a typical disk drive.

a) more expensive than

b) cheaper than

c) of the same cost as

d) none of the mentioned

View Answer

 

Answer: a

Explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

4. During recovery from a failure

a) each pair of physical block is examined

b) specified pair of physical block is examined

c) first pair of physical block is examined

d) none of the mentioned

View Answer

 

Answer: a

Explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

5. A magneto-optic disk is :

a) primary storage

b) secondary storage

c) tertiary storage

d) removable disk

View Answer

 

Answer: c and d

Explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

6. Which of the following is the process of selecting the data storage and data access characteristics of the database?

a) Logical database design

b) Physical database design

c) Testing and performance tuning

d) Evaluation and selecting

View Answer

 

Answer: b

Explanation: Physical database design is the process of selecting the data storage and data access characteristics of the database.

7. The replacement of a bad block generally is not totally automatic because

a) data in bad block can not be replaced

b) data in bad block is usually lost

c) bad block does not contain any data

d) none of the mentioned

View Answer

 

Answer: b

Explanation: Physical database design is the process of selecting the data storage and data access characteristics of the database.

8. Which of the following is the oldest database model?

a) Relational

b) Hierarchical

c) Physical

d) Network

View Answer

 

Answer: d

Explanation: Network model has data stored in a hierarchical network flow .

9. The surface area of a tape is ________ the surface area of a disk.

a) much lesser than

b) much larger than

c) equal to

d) none of the mentioned

View Answer

 

Answer: b

Explanation: Network model has data stored in a hierarchical network flow .

10. Which one of the following is not a secondary storage?

a) magnetic disks

b) magnetic tapes

c) ram

d) none of the mentioned

View Answer

 

Answer: c

Explanation: Tertiary storage involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into a storage device according to the system’s demands; this data is often copied to secondary storage before use.

 

1. Which level of RAID refers to disk mirroring with block striping?

a) RAID level 1

b) RAID level 2

c) RAID level 0

d) RAID level 3

View Answer

 

Answer: a

Explanation: RAID (redundant array of independent disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks.

2. A unit of storage that can store one or more records in a hash file organization is denoted as

a) Buckets

b) Disk pages

c) Blocks

d) Nodes

View Answer

 

Answer: a

Explanation: A unit of storage that can store one or more records in a hash file organization is denoted as buckets.

3. The file organization which allows us to read records that would satisfy the join condition by using one block read is

a) Heap file organization

b) Sequential file organization

c) Clustering file organization

d) Hash file organization

View Answer

 

Answer: c

Explanation: All systems in the cluster share a common file structure via NFS, but not all disks are mounted on all other systems.

4. What are the correct features of a distributed database?

a) Is always connected to the internet

b) Always requires more than three machines

c) Users see the data in one global schema.

d) Have to specify the physical location of the data when an update is done

View Answer

 

Answer: c

Explanation: Users see the data in one global schema.

5. Each tablespace in an Oracle database consists of one or more files called

a) Files

b) name space

c) datafiles

d) PFILE

View Answer

 

Answer: c

Explanation: A data file is a computer file which stores data to use by a computer application or system.

6. The management information system (MIS) structure with one main computer

system is called a

a) Hierarchical MIS structure

b) Distributed MIS structure

c) Centralized MIS structure

d) Decentralized MIS structure

View Answer

 

Answer: c

Explanation: Structure of MIS may be understood by looking at the physical components of the information system in an organization.

7. A top-to-bottom relationship among the items in a database is established by a

a) Hierarchical schema

b) Network schema

c) Relational schema

d) All of the mentioned

View Answer

 

Answer: a

Explanation: A hierarchical database model is a data model in which the data is organized into a tree-like structure. The structure allows representing information using parent/child relationships.

8. Choose the RDBMS which supports full fledged client server application development

a) dBase V

b) Oracle 7.1

c) FoxPro 2.1

d) Ingress

View Answer

 

Answer: b

Explanation: RDBMS is Relational DataBase Management System.

9. One approach to standardization storing of data?

a) MIS

b) Structured programming

c) CODASYL specification

d) None of the mentioned

View Answer

 

Answer: c

Explanation: CODASYL is an acronym for “Conference on Data Systems Languages”.

10. The highest level in the hierarchy of data organization is called

a) Data bank

b) Data base

c) Data file

d) Data record

View Answer

 

Answer: b

Explanation: Database is a collection of all tables which contains the data in form of fields.

 

1. If a piece of data is stored in two places in the database, then

a) Storage space is wasted

b) Changing the data in one spot will cause data inconsistency

c) In can be more easily accessed

d) Storage space is wasted & Changing the data in one spot will cause data inconsistency

View Answer

 

Answer: d

Explanation: The database is always consistent and so there is no duplication .

2. An audit trail ___________

a) Is used to make backup copies

b) Is the recorded history of operations performed on a file

c) Can be used to restore lost information

d) None of the mentioned

View Answer

 

Answer: b

Explanation: This is more useful for all recovery actions .

3. Large collection of files are called ____________

a) Fields

b) Records

c) Database

d) Sectors

View Answer

 

Answer: c

Explanation: The operator tree has a tree like format where the evaluation starts from root of the tree .

4. Which of the following hardware component is the most important to the operation of database management system?

a) High resolution video display

b) Printer

c) High speed, large capacity disk

d) Mouse

View Answer

 

Answer: c

Explanation: All the data are stored in form of memory in the disk.

5. Which of the following is not true of the traditional approach to information processing

a) There is common sharing of data among the various applications

b) It is file oriented

c) Programs are dependent on the file

d) It is inflexible

View Answer

 

Answer: a

Explanation: All the data are stored in form of memory in the disk.

6. Which of these is not a feature of Hierarchical model?

a) Organizes the data in tree-like structure

b) Parent node can have any number of child nodes

c) Root node does not have any parent

d) Child node can have any number of parent nodes

View Answer

 

Answer: d

Explanation: The data are traversed using several algorithms.

7. Which of these data models is an extension of relational data model?

a) Object-oriented data model

b) Object-relational data model

c) Semi structured data model

d) None of the mentioned

View Answer

 

Answer: b

Explanation: All the data are stored in form of memory in the disk.

8. The information about data in a database is called _______

a) Metadata

b) Hyper data

c) Tera data

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Metadata is information about a data.

9. A data dictionary is a special file that contains?

a) The names of all fields in all files

b) The data types of all fields in all files

c) The widths of all fields in all files

d) All of the mentioned

View Answer

 

Answer: d

Explanation: The data dictionary is structured in tables and views, just like other database data.

10. The DBMS acts as an interface between what two components of an enterprise-class database system?

a) Database application and the database

b) Data and the database

c) The user and the database application

d) Database application and SQL

View Answer

 

Answer: a

Explanation: Database application is the interface with the user to access the database

 

 

1. A relational database system needs to maintain data about the relations, such as the schema of the relations. This is called

a) Metadata

b) Catalog

c) Log

d) Dictionary

View Answer

 

Answer: a

Explanation: Each side of a platter of a disk has a read–write head that moves across the platter to access different tracks.

2. Relational schemas and other metadata about relations are stored in a structure called the ____________

a) Metadata

b) Catalog

c) Log

d) Data Dictionary

View Answer

 

Answer: d

Explanation: Data dictionary is also called as system catalog.

3. ___________ is the collection of memory structures and Oracle background processes that operates against an Oracle database.

a) Database

b) Instance

c) Tablespace

d) Segment

View Answer

 

Answer: b

Explanation: Instance is a snapshot of database at any point of time.

4. A ________ is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.

a) Tablespace

b) Segments

c) Extents

d) Blocks

View Answer

 

Answer: a

Explanation: A tablespace is a storage location where the actual data underlying database objects can be kept.

5. A tablespace is further broken down into ________

a) Tablespace

b) Segments

c) Extents

d) Blocks

View Answer

 

Answer: b

Explanation: Segment names are used in create table and create index commands to place tables or indexes on specific database devices.

6. __________ is a contiguous group of blocks allocated for use as part of a table, index, and so forth.

a) Tablespace

b) Segment

c) Extent

d) Block

View Answer

 

Answer: c

Explanation: An extent is a set of contiguous blocks allocated in a database.

7. ________ is the smallest unit of allocation in an Oracle database.

a) Database

b) Instance

c) Tablespace

d) Database Block

View Answer

 

Answer: d

Explanation: Data block is a form of database space allocation.

8. An Oracle __________ is a set of tables and views that are used as a read-only reference about the database.

a) Database dictionary

b) Dictionary table

c) Data dictionary

d) Dictionary

View Answer

 

Answer: c

Explanation: Data dictionary is also called as system catalog.

9. A data dictionary is created when a __________ created.

a) Instance

b) Segment

c) Database

d) Dictionary

View Answer

 

Answer: c

Explanation: Data dictionary is also called as system catalog.

10. An Oracle object type has two parts the _________ and__________

a) Instance and body

b) Segment and blocks

c) Specification and body

d) Body and segment

View Answer

 

Answer: c

Explanation: Segment names are used in create table and create index commands to place tables or indexes on specific database devices. An extent is a set of contiguous blocks allocated in a database.

 

1. The _______ is that part of main memory available for storage of copies of disk blocks.

a) Buffer

b) Catalog

c) Storage

d) Secondary storage

View Answer

 

Answer: a

Explanation: There is always a copy kept on disk of every block, but the copy on disk may be a version of the block older than the version in the buffer.

2. A major goal of the database system is to minimize the number of block transfers between the disk and memory. This is achieved by

a) Buffer

b) Catalog

c) Storage

d) Secondary storage

View Answer

 

Answer: a

Explanation: There is always a copy kept on disk of every block, but the copy on disk may be a version of the block older than the version in the buffer.

3. The subsystem responsible for the allocation of buffer space is called the ___________

a) Buffer

b) Buffer manager

c) Storage

d) Secondary storage

View Answer

 

Answer: b

Explanation: Programs in a database system make requests (that is, calls) on the buffer manager when they need a block from disk.

4. In the buffer where there is no space for another block, the bllock can be inserted using

a) Pinned block strategy

b) Forced output block

c) Buffer replacement strategy

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Most operating systems use a least recently used (LRU) scheme, in which the block that was referenced least recently is written back to disk and is removed from the buffer.

5. A block that is not allowed to be written back to disk is said to be ______________

a) Pinned

b) Forced

c) Buffer

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Although many operating systems do not support pinned blocks, such a feature is essential for a database system that is resilient to crashes.

6. There are situations in which it is necessary to write back the block to disk, even though the buffer space that it occupies is not needed. This write is called the

a) Pinned block strategy

b) Forced output block

c) Buffer replacement strategy

d) All of the mentioned

View Answer

 

Answer: b

Explanation: The main-memory contents and thus buffer contents are lost in a crash, whereas data on disk usually survive a crash.

7. The frequently used buffer replacement strategy is

a) Most recently used

b) Least recently used

c) Longest block

d) All of the mentioned

View Answer

 

Answer: b

Explanation: If a block must be replaced, the least recently referenced block is replaced.

8. In case the buffer manager do not write the blocks properly then the buffer manager uses

a) Replacement strategy

b) Forced strategy

c) Crash recovery system

d) Both Replacement and Forced strategy

View Answer

 

Answer: c

Explanation: The crash-recovery subsystem imposes stringent constraints on block replacement.

9. The technique where the blocks which have been used are replaced is called

a) Replacement strategy

b) Forced strategy

c) Crash recovery system

d) Most recently used

View Answer

 

Answer: d

Explanation: The optimal strategy for block replacement is the most recently used (MRU) strategy.

10. ___________________ frees the space occupied by a block as soon as the final tuple of that block has been processed.

a) Replacement strategy

b) Forced strategy

c) Toss immediate strategy

d) Most recently used

View Answer

 

Answer: c

Explanation: The optimal strategy for block replacement is the most recently used (MRU) strategy.

 

1. In ordered indices the file containing the records is sequentially ordered, a ___________ is an index whose search key also defines the sequential order of the file.

a) Clustered index

b) Structured index

c) Unstructured index

d) Nonclustered index

View Answer

 

Answer: a

Explanation: Clustering index are also called primary indices; the term primary index may appear to denote an index on a primary key, but such indices can in fact be built on any search key.

2. Indices whose search key specifies an order different from the sequential order of the file are called ___________ indices.

a) Nonclustered

b) Secondary

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Nonclustering index are also called secondary indices.

3. An ____________ consists of a search-key value and pointers to one or more records with that value as their search-key value.

a) Index entry

b) Index hash

c) Index cluster

d) Index map

View Answer

 

Answer: a

Explanation: The pointer to a record consists of the identifier of a disk block and an offset within the disk block to identify the record within the block.

4. In a _______ clustering index, the index record contains the search-key value and a pointer to the first data record with that search-key value and the rest of the records will be in the sequential pointers.

a) Dense

b) Sparse

c) Straight

d) Continuous

View Answer

 

Answer: a

Explanation: In a dense nonclustering index, the index must store a list of pointers to all records with the same search-key value.

5. In a __________ index, an index entry appears for only some of the search-key values.

a) Dense

b) Sparse

c) Straight

d) Continuous

View Answer

 

Answer: a

Explanation: Sparse indices can be used only if the relation is stored in sorted order of the search key, that is, if the index is a clustering index.

6. Incase the indices values are larger, index is created for these values of index. This is called

a) Pointed index

b) Sequential index

c) Multilevel index

d) Multiple index

View Answer

 

Answer: c

Explanation: Indices with two or more levels are called multilevel indices.

7. A search key containing more than one attribute is referred to as a _________ search key.

a) Simple

b) Composite

c) Compound

d) Secondary

View Answer

 

Answer: b

Explanation: The structure of the index is the same as that of any other index, the only difference being that the search key is not a single attribute, but rather is a list of attributes.

8. In B+ tree the node which points to another node is called

a) Leaf node

b) External node

c) Final node

d) Internal node

View Answer

 

Answer: d

Explanation: Nonleaf nodes are also referred to as internal nodes.

9. Insertion of a large number of entries at a time into an index is referred to as __________ of the index.

a) Loading

b) Bulk insertion

c) Bulk loading

d) Increase insertion

View Answer

 

Answer: c

Explanation: Bulk loading is used to improve the efficiency and scalability.

10. While inserting the record into the index, if the search-key value does not appear in the index.

a) The system adds a pointer to the new record in the index entry

b) The system places the record being inserted after the other records with the same search-key values

c) The system inserts an index entry with the search-key value in the index at the appropriate position

d) None of the mentioned

View Answer

 

Answer: c

Explanation: If the index entry stores pointers to all records with the same search key value, the system adds a pointer to the new record in the index entry.

 

1. If h is any hashing function and is used to hash n keys in to a table of size m, where n<=m, the expected number of collisions involving a particular key x is :

a) Less than 1

b) Less than n

c) Less than m

d) Less than n/2

View Answer

 

Answer: a

Explanation: Hashing is also a method of sorting key values in a database table in an efficient manner.

2. A technique for direct search is

a) Binary Search

b) Linear Search

c) Tree Search

d) Hashing

View Answer

 

Answer: d

Explanation: Hashing is one way to enable security during the process of message transmission when the message is intended for a particular recipient only.

3. The searching technique that takes O (1) time to find a data is

a) Linear Search

b) Binary Search

c) Hashing

d) Tree Search

View Answer

 

Answer: c

Explanation: A formula generates the hash, which helps to protect the security of the transmission from unauthorized users.

4. The goal of hashing is to produce a search that takes

a) O(1) time

b) O(n2 )time

c) O(log n ) time

d) O(n log n ) time

View Answer

 

Answer: a

Explanation: Time complexity is given by the big oh notation.

5. Consider a hash table of size seven, with starting index zero, and a hash function (3x + 4)mod7. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Note that ‘_’ denotes an empty location in the table.

a) 8, _, _, _, _, _, 10

b) 1, 8, 10, _, _, _, 3

c) 1, _, _, _, _, _,3

d) 1, 10, 8, _, _, _, 3

View Answer

 

Answer: b

Explanation: A formula generates the hash, which helps to protect the security of the transmission from unauthorized users.

6. A hash table can store a maximum of 10 records, currently there are records in location 1, 3,4,7,8,9,10. The probability of a new record going into location 2, with hash functions resolving collisions by linear probing is

a) 0.1

b) 0.6

c) 0.2

d) 0.5

View Answer

 

Answer: b

Explanation: Hashing is used to index and retrieve items in a database because it is easier to find the item using the shortened hashed key than using the original value.

7. Key value pairs is usually seen in

a) Hash tables

b) Heaps

c) Both Hash tables and Heaps

d) Skip list

View Answer

 

Answer: a

Explanation: Hashing is used to index and retrieve items in a database because it is easier to find the item using the shortened hashed key than using the original value.

8. What is the best definition of a collision in a hash table?

a) Two entries are identical except for their keys

b) Two entries with different data have the exact same key

c) Two entries with different keys have the same exact hash value

d) Two entries with the exact same key have different hash values

View Answer

 

Answer: a

Explanation: This level is the root of the tree.

9. Which of the following scenarios leads to linear running time for a random search hit in a linear-probing hash table?

a) All keys hash to same index

B) All keys hash to different indices

c) All keys hash to an even-numbered index

d) All keys hash to different even-numbered indices

View Answer

 

Answer: a

Explanation: If all keys hash to the same location then the i-th inserted key would need i lookups to be found. The probability of looking up i-th key is 1/n (since it’s random). If you know some probability it’s trivial to show that such lookups have linear time.

10. Breadth First Search is used in

a) Binary trees

b) Stacks

c) Graphs

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Hashing is used to index and retrieve items in a database because it is easier to find the item using the shortened hashed key than using the original value.

 

1. A(n) _________ can be used to preserve the integrity of a document or a message.

a) Message digest

b) Message summary

c) Encrypted message

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Encryption algorithms are used to keep the contents safe.

2. A hash function must meet ________ criteria.

a) Two

b) Three

c) Four

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Only if the criteria is fulfilled the values are hashed.

3. What is the main limitation of Hierarchical Databases?

a) Limited capacity (unable to hold much data)

b) Limited flexibility in accessing data

c) Overhead associated with maintaining indexes

d) The performance of the database is poor

View Answer

 

Answer: b

Explanation: In this the data items are place in a tree like hierarchical structure.

4. The property (or set of properties) that uniquely defines each row in a table is called the:

a) Identifier

b) Index

c) Primary key

d) Symmetric key

View Answer

 

Answer: c

Explanation: Primary is used to uniquely identify the tuples.

5. The separation of the data definition from the program is known as:

a) Data dictionary

b) Data independence

c) Data integrity

d) Referential integrity

View Answer

 

Answer: b

Explanation: Data dictionary is the place where the meaning of the data are organized.

6. In the client / server model, the database:

a) Is downloaded to the client upon request

b) Is shared by both the client and server

c) Resides on the client side

d) Resides on the server side

View Answer

 

Answer: d

Explanation: The server has all the database information and the client access it.

7. The traditional storage of data that is organized by customer, stored in separate folders in filing cabinets is an example of what type of ‘database’ system?

a) Hierarchical

b) Network

c) Object oriented

d) Relational

View Answer

 

Answer: a

Explanation: Hierarchy is based on Parent-Child Relationship. Parent-Child Relationship Type is basically 1:N relationship.

8. The database design that consists of multiple tables that are linked together through matching data stored in each table is called

a) Hierarchical database

b) Network database

c) Object oriented database

d) Relational database

View Answer

 

Answer: d

Explanation: A relational database is a collection of data items organized as a set of formally described tables from which data can be accessed or reassembled.

9. The association role defines:

a) How tables are related in the database

b) The relationship between the class diagram and the tables in the database

c) The tables that each attribute is contained

d) Which attribute is the table’s primary key

View Answer

 

Answer: a

Explanation: The tables are always related in the database to form consistency.

10. The purpose of an N-Ary association is:

a) To capture a parent-child relationship

b) To deal with one to many relationships

c) To deal with relationships that involve more than two tables

d) To represent an inheritance relationship

View Answer

 

Answer: c

Explanation: The is binary n-array association meaning more than two classes are involved in the relationship.

 

1. A(n) _________ can be used to preserve the integrity of a document or a message.

a) Message digest

b) Message summary

c) Encrypted message

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Encryption algorithms are used to keep the contents safe.

2. A hash function must meet ________ criteria.

a) Two

b) Three

c) Four

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Only if the criteria is fulfilled the values are hashed.

3. What is the main limitation of Hierarchical Databases?

a) Limited capacity (unable to hold much data)

b) Limited flexibility in accessing data

c) Overhead associated with maintaining indexes

d) The performance of the database is poor

View Answer

 

Answer: b

Explanation: In this the data items are place in a tree like hierarchical structure.

4. The property (or set of properties) that uniquely defines each row in a table is called the:

a) Identifier

b) Index

c) Primary key

d) Symmetric key

View Answer

 

Answer: c

Explanation: Primary is used to uniquely identify the tuples.

5. The separation of the data definition from the program is known as:

a) Data dictionary

b) Data independence

c) Data integrity

d) Referential integrity

View Answer

 

Answer: b

Explanation: Data dictionary is the place where the meaning of the data are organized.

6. In the client / server model, the database:

a) Is downloaded to the client upon request

b) Is shared by both the client and server

c) Resides on the client side

d) Resides on the server side

View Answer

 

Answer: d

Explanation: The server has all the database information and the client access it.

7. The traditional storage of data that is organized by customer, stored in separate folders in filing cabinets is an example of what type of ‘database’ system?

a) Hierarchical

b) Network

c) Object oriented

d) Relational

View Answer

 

Answer: a

Explanation: Hierarchy is based on Parent-Child Relationship. Parent-Child Relationship Type is basically 1:N relationship.

8. The database design that consists of multiple tables that are linked together through matching data stored in each table is called

a) Hierarchical database

b) Network database

c) Object oriented database

d) Relational database

View Answer

 

Answer: d

Explanation: A relational database is a collection of data items organized as a set of formally described tables from which data can be accessed or reassembled.

9. The association role defines:

a) How tables are related in the database

b) The relationship between the class diagram and the tables in the database

c) The tables that each attribute is contained

d) Which attribute is the table’s primary key

View Answer

 

Answer: a

Explanation: The tables are always related in the database to form consistency.

10. The purpose of an N-Ary association is:

a) To capture a parent-child relationship

b) To deal with one to many relationships

c) To deal with relationships that involve more than two tables

d) To represent an inheritance relationship

View Answer

 

Answer: c

Explanation: The is binary n-array association meaning more than two classes are involved in the relationship.

 

1. Bitmap indices are a specialized type of index designed for easy querying on ___________

a) Bit values

b) Binary digits

c) Multiple keys

d) Single keys

View Answer

 

Answer: c

Explanation: Each bitmap index is built on a single key.

2. A _______ on the attribute A of relation r consists of one bitmap for each value that A can take.

a) Bitmap index

b) Bitmap

c) Index

d) Array

View Answer

 

Answer: a

Explanation: A bitmap is simply an array of bits.

3.

 

SELECT *

FROM r

WHERE gender = ’f’ AND income level = ’L2’;

In this selection, we fetch the bitmaps for gender value f and the bitmap for income level value L2, and perform an ________ of the two bitmaps.

a) Union

b) Addition

c) Combination

d) Intersection

View Answer

 

Answer: d

Explanation: We compute a new bitmap where bit i has value 1 if the ith bit of the two bitmaps are both 1, and has a value 0 otherwise.

4. To identify the deleted records we use the ______________

a) Existence bitmap

b) Current bitmap

c) Final bitmap

d) Deleted bitmap

View Answer

 

Answer: a

Explanation: The bitmaps which are deleted are denoted by 0.

5. Bitmaps can be used as a compressed storage mechanism at the leaf nodes of ________ for those values that occur very frequently.

a) B-trees

b) B+-trees

c) Bit trees

d) Both B-trees and B+-trees

View Answer

 

Answer: b

Explanation: Bitmaps are combined and stored in a B+ tree.

6. Bitmaps can be combined with regular B+-tree indices for relations where a few attribute values are extremely common, and other values also occur, but much less frequently.

a) Bitmap, B-tree

b) Bitmap, B+tree

c) B-tree, Bitmap

d) B+tree, Bitmap

View Answer

 

Answer: b

Explanation: Bitmaps are combined and stored in a B+ tree.

7. In a B+-tree index ______ for each value we would normally maintain a list of all records with that value for the indexed attribute.

a) Leaf

b) Node

c) Root

d) Link

View Answer

 

Answer: a

Explanation: Bitmaps are combined and stored in a B+ tree.

8. A tablespace is further broken down into ________

a) Tablespace

b) Segments

c) Extents

d) Blocks

View Answer

 

Answer: b

Explanation: Segment names are used in create table and create index commands to place tables or indexes on specific database devices.

9. In ordered indices the file containing the records is sequentially ordered, a ___________ is an index whose search key also defines the sequential order of the file.

a) Clustered index

b) Structured index

c) Unstructured index

d) Nonclustered index

View Answer

 

Answer: a

Explanation: Clustering index are also called primary indices; the term primary index may appear to denote an index on a primary key, but such indices can in fact be built on any search key.

10. Indices whose search key specifies an order different from the sequential order of the file are called ___________ indices.

a) Nonclustered

b) Secondary

c) All of the mentioned

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Nonclustering index are also called secondary indices.

 

1. What is the purpose of index in sql server

a) To enhance the query performance

b) To provide an index to a record

c) To perform fast searches

d) All of the mentioned

View Answer

 

Answer: d

Explanation: A database index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes.

2. How many types of indexes are there in sql server?

a) 1

b) 2

c) 3

d) 4

View Answer

 

Answer: b

Explanation: They are clustered index and non clustered index.

3. How non clustered index point to the data?

a) It never points to anything

b) It points to a data row

c) It is used for pointing data rows containing key values

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Nonclustered indexes have a structure separate from the data rows. A nonclustered index contains the nonclustered index key values and each key value entry has a pointer to the data row that contains the key value.

4. Which one is true about clustered index?

a) Clustered index is not associated with table

b) Clustered index is built by default on unique key columns

c) Clustered index is not built on unique key columns

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Nonclustered indexes have a structure separate from the data rows. A nonclustered index contains the nonclustered index key values and each key value entry has a pointer to the data row that contains the key value.

5. What is true about indexes?

a) Indexes enhance the performance even if the table is updated frequently

b) It makes harder for sql server engines to work to work on index which have large keys

c) It doesn’t make harder for sql server engines to work to work on index which have large keys

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Indexes tend to improve the performance.

6. Does index take space in the disk ?

a) It stores memory as and when required

b) Yes, Indexes are stored on disk

c) Indexes are never stored on disk

d) Indexes take no space

View Answer

 

Answer: b

Explanation: Indexes take memory slots which are located on the disk.

7. What are composite indexes ?

a) Are those which are composed by database for its internal use

b) A composite index is a combination of index on 2 or more columns

c) Composite index can never be created

d) None of the mentioned

View Answer

 

Answer: b

Explanation: A composite index is an index on two or more columns of a table.

8. If an index is _________________ the metadata and statistics continue to exists

a) Disabling

b) Dropping

c) Altering

d) Both Disabling and Dropping

View Answer

 

Answer: a

Explanation: A database index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes.

9. In _______________ index instead of storing all the columns for a record together, each column is stored separately with all other rows in an index.

a) Clustered

b) Column store

c) Non clustered

d) Row store

View Answer

 

Answer: b

Explanation: A database index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes.

10. A _________________ index is the one which satisfies all the columns requested in the query without performing further lookup into the clustered index.

a) Clustered

b) Non Clustered

c) Covering

d) B-Tree

View Answer

 

Answer: c

Explanation: A covered query is a query where all the columns in the query’s result set are pulled from non-clustered indexes.

 

 

1. A collection of data designed to be used by different people is called a/an

a) Organization

b) Database

c) Relationship

d) Schema

View Answer

 

Answer: b

Explanation: Database is a collection of related tables.

2. Which of the following is the oldest database model?

a) Relational

b) Deductive

c) Physical

d) Network

View Answer

 

Answer: d

Explanation: The network model is a database model conceived as a flexible way of representing objects and their relationships.

3. Which of the following schemas does define a view or views of the database for particular users?

a) Internal schema

b) Conceptual schema

c) Physical schema

d) External schema

View Answer

 

Answer: d

Explanation: An externally-defined schema can provide access to tables that are managed on any PostgreSQL, Microsoft SQL Server, SAS, Oracle, or MySQL database.

4. Which of the following is an attribute that can uniquely identify a row in a table?

a) Secondary key

b) Candidate key

c) Foreign key

d) Alternate key

View Answer

 

Answer: b

Explanation: A Candidate Key can be any column or a combination of columns that can qualify as unique key in database.

5. Which of the following is the process of selecting the data storage and data access characteristics of the database?

a) Logical database design

b) Physical database design

c) Testing and performance tuning

d) Evaluation and selecting

View Answer

 

Answer: b

Explanation: The physical design of the database optimizes performance while ensuring data integrity by avoiding unnecessary data redundancies.

6. Which of the following terms does refer to the correctness and completeness of the data in a database?

a) Data security

b) Data constraint

c) Data independence

d) Data integrity

View Answer

 

Answer: d

Explanation: ACID property is satisfied by transaction in database.

7. The relationship between DEPARTMENT and EMPLOYEE is a

a) One-to-one relationship

b) One-to-many relationship

c) Many-to-many relationship

d) Many-to-one relationship

View Answer

 

Answer: b

Explanation: One entity department is related to several employees.

8. A table can be logically connected to another table by defining a

a) Super key

b) Candidate key

c) Primary key

d) Unique key

View Answer

 

Answer: c

Explanation: A superkey is a combination of attributes that can be uniquely used to identify a database record.

9. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called

a) Consistent state

b) Parallel state

c) Durable state

d) Inconsistent state

View Answer

 

Answer: d

Explanation: SQL data consistency is that whenever a transaction is performed, it sees a consistent database.

10. Ensuring isolation property is the responsibility of the

a) Recovery-management component of the DBMS

b) Concurrency-control component of the DBMS

c) Transaction-management component of the DBMS

d) Buffer management component in DBMS

View Answer

 

Answer: b

Explanation: Concurrency control ensures that correct results for concurrent operations are generated, while getting those results as quickly as possible.

 

1. In query processing, the ___________ is the lowest-level operator to access data.

a) Index Search

b) Linear search

c) File scan

d) Access paths

View Answer

 

Answer: c

Explanation: File scans are search algorithms that locate and retrieve records that fulfill a selection condition.

2. In a ____________ the system scans each file block and tests all records to see whether they satisfy the selection condition.

a) Index Search

b) Linear search

c) File scan

d) Access paths

View Answer

 

Answer: b

Explanation: An initial seek is required to access the first block of the file.

3. Index structures are referred to as __________ since they provide a path through which data can be located and accessed.

a) Index Search

b) Linear search

c) File scan

d) Access paths

View Answer

 

Answer: d

Explanation: A primary index is an index that allows the records of a file to be read in an order that corresponds to the physical order in the file.

4. Search algorithms that use an index are referred to as

a) Index Search

b) Linear search

c) File scan

d) Access paths

View Answer

 

Answer: a

Explanation: Selection predicates are used to guide in the choice of the index to use in processing the query.

5. Which algorithm uses equality comparison on a key attribute with a primary index to retrieve a single record that satisfies the corresponding equality condition.

a) A2

b) A4

c) A5

d) A6

View Answer

 

Answer: a

Explanation: A2 – primary index, equality on key.

6. The strategy can retrieve a single record if the equality condition is on a key;multiple records may be retrieved if the indexing field is not a key is

a) A2

b) A4

c) A5

d) A6

View Answer

 

Answer: b

Explanation: A4 – Secondary index, equality.

7. The algorithm that uses a secondary ordered index to guide retrieval for comparison conditions involving <,≤,≥, or > is

a) A2

b) A4

c) A5

d) A6

View Answer

 

Answer: d

Explanation: A6 – Secondary index, comparison.

8. The ___ algorithm scans each index for pointers to tuples that satisfy an individual condition.

a) A2

b) A4

c) A9

d) A6

View Answer

 

Answer: c

Explanation: A9 – Conjunctive selection by intersection of identifiers.

9. If access paths are available on all the conditions of a disjunctive selection, each index is scanned for pointers to tuples that satisfy the individual condition. This is satisfied by

a) A10

b) A7

c) A9

d) A6

View Answer

 

Answer: a

Explanation: A10 – Disjunctive selection by union of identifiers.

10. Conjunctive selection using one index. This is

a) A10

b) A7

c) A9

d) A6

View Answer

 

Answer: b

Explanation: To reduce the cost of A7 we choose a _i and one of algorithms A1 through A6 for which the combination results in the least cost for __i (r ). The cost of algorithm A7 is given by the cost of the chosen algorithm.

 

1. Two main measures for the efficiency of an algorithm are

a) Processor and memory

b) Complexity and capacity

c) Time and space

d) Data and space

View Answer

 

Answer: c

Explanation: Depending on the time and space complexity only the algorithm for sorting will be chosen.

2. The time factor when determining the efficiency of algorithm is measured by

a) Counting microseconds

b) Counting the number of key operations

c) Counting the number of statements

d) Counting the kilobytes of algorithm

View Answer

 

Answer: b

Explanation: The operations taking place with the time and space is counted.

3. The space factor when determining the efficiency of algorithm is measured by

a) Counting the maximum memory needed by the algorithm

b) Counting the minimum memory needed by the algorithm

c) Counting the average memory needed by the algorithm

d) Counting the maximum disk space needed by the algorithm

View Answer

 

Answer: a

Explanation: Time complexity maintains the maximum time needed.

4. Which of the following case does not exist in complexity theory

a) Best case

b) Worst case

c) Average case

d) Null case

View Answer

 

Answer: d

Explanation: Null case cannot be counted as the factor for complexity.

5. The Worst case occur in linear search algorithm when

a) Item is somewhere in the middle of the array

b) Item is not in the array at all

c) Item is the last element in the array

d) Item is the last element in the array or is not there at all

View Answer

 

Answer: d

Explanation: Algorithmic complexity is concerned about how fast or slow particular algorithm performs.

6. The Average case occur in linear search algorithm

a) When Item is somewhere in the middle of the array

b) When Item is not in the array at all

c) When Item is the last element in the array

d) When Item is the last element in the array or is not there at all

View Answer

 

Answer: a

Explanation: Algorithmic complexity is concerned about how fast or slow particular algorithm performs.

7. The complexity of the average case of an algorithm is

a) Much more complicated to analyze than that of worst case

b) Much more simpler to analyze than that of worst case

c) Sometimes more complicated and some other times simpler than that of worst case

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Algorithmic complexity is concerned about how fast or slow particular algorithm performs.

8. The complexity of linear search algorithm is

a) O(n)

b) O(log n)

c) O(n2)

d) O(n log n)

View Answer

 

Answer: a

Explanation: It refers to n values complexity in the algorithm which can be reduced by choosing the other algorithms.

9. The complexity of Binary search algorithm is

a) O(n)

b) O(log )

c) O(n2)

d) O(n log n)

View Answer

 

Answer: b

Explanation: This shows that it has a standard complexity in addressing.

10. The complexity of Bubble sort algorithm is

a) O(n)

b) O(log n)

c) O(n2)

d) O(n log n)

View Answer

 

Answer: c

Explanation: Bubble sort, is a simple sorting algorithm that works by repeatedly stepping through the list to be sorted, comparing each pair of adjacent items and swapping them if they are in the wrong order.

 

1. A_____ is a query that retrieves rows from more than one table or view:

a) Start

b) End

c) Join

d) All of the mentioned

View Answer

 

Answer: c

Explanation: An SQL join clause combines records from two or more tables in a database. It creates a set that can be saved as a table or used as it is. A JOIN is a means for combining fields from two tables by using values common to each.

2. A condition is referred to as __________

a) Join in SQL

b) Join condition

c) Join in SQL & Condition

d) None of the mentioned

View Answer

 

Answer: b

Explanation: An SQL join clause combines records from two or more tables in a database. It creates a set that can be saved as a table or used as it is. A JOIN is a means for combining fields from two tables by using values common to each.

3. Which oracle is the join condition is specified using the WHERE clause:

a) Oracle 9i

b) Oracle 8i

c) Pre-oracle 9i

d) Pre-oracle 8i

View Answer

 

Answer: c

Explanation: Oracle 9i is a version of the Oracle Database. The i stands for “Internet” to indicate that 9i is “Internet ready”.

4. How many join types in join condition:

a) 2

b) 3

c) 4

d) 5

View Answer

 

Answer: d

Explanation: INNER JOIN, LEFT JOIN, RIGHT JOIN, FULL JOIN, EQUIJOIN.

5. Which are the join types in join condition:

a) Cross join

b) Natural join

c) Join with USING clause

d) All of the mentioned

View Answer

 

Answer: d

Explanation: INNER JOIN, LEFT JOIN, RIGHT JOIN, FULL JOIN, EQUIJOIN are the types of joins.

6. Which product is returned in a join query have no join condition:

a) Equijoins

b) Cartesian

c) Both Equijoins and Cartesian

d) None of the mentioned

View Answer

 

Answer: b

Explanation: A Cartesian coordinate system is a coordinate system that specifies each point uniquely in a plane by a pair of numerical coordinates.

7. Which is a join condition contains an equality operator:

a) Equijoins

b) Cartesian

c) Both Equijoins and Cartesian

d) None of the mentioned

View Answer

 

Answer: a

Explanation: An equi-join is a specific type of comparator-based join, that uses only equality comparisons in the join-predicate.

8. Which join refers to join records from the write table that have no matching key in the left table are include in the result set:

a) Left outer join

b) Right outer join

c) Full outer join

d) Half outer join

View Answer

 

Answer: b

Explanation: A right outer join will return all the rows that an inner join returns plus one row for each of the other rows in the second table that did not have a match in the first table. It is the same as a left outer join with the tables specified in the opposite order.

9. Which operation are allowed in a join view:

a) UPDATE

b) INSERT

c) DELETE

d) All of the mentioned

View Answer

 

Answer: d

Explanation: The DELETE statement is used to delete rows in a table.The UPDATE statement is used to update existing records in a table.The INSERT INTO statement is used to insert new records in a table.

10. Which view that contains more than one table in the top-level FROM clause of the SELECT statement:

a) Join view

b) Datable join view

c) Updatable join view

d) All of the mentioned

View Answer

 

Answer: c

Explanation: The DELETE statement is used to delete rows in a table.The UPDATE statement is used to update existing records in a table.The INSERT INTO statement is used to insert new records in a table.

 

1. Pictorial representation of an expression is called

a) Expression tree

b) Operator tree

c) Expression flow

d) Expression chart

View Answer

 

Answer: b

Explanation: The operator tree has a tree like format where the evaluation starts from root of the tree .

2. The results of each intermediate operation are created and then are used for evaluation of the next-level operations. This is called

a) Materialized evaluation

b) Expression evaluation

c) Tree evaluation

d) Tree materialization

View Answer

 

Answer: a

Explanation: The cost of a materialized evaluation is not simply the sum of the costs of the operations involved .

3. ______________ allows the algorithm to execute more quickly by performing CPU activity in parallel with I/O activity.

a) Buffering

b) Double buffering

c) Multiple buffering

d) Double reading

View Answer

 

Answer: a

Explanation: Double buffering using two buffers, with one continuing execution of the algorithm while the other is being written out .

4. Pipelines can be executed in

a) 4

b) 3

c) 2

d) 5

View Answer

 

Answer: c

Explanation: Demand driven and producer driven pipelines are the two ways .

5. In a _________ the system makes repeated requests for tuples from the operation at the top of the pipeline.

a) Demand-driven pipeline

b) Producer-driven pipeline

c) Demand pipeline

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Each time that an operation receives a request for tuples, it computes the next tuple (or tuples) to be returned, and then returns that tuple .

6. In a _____________ operations do not wait for requests to produce tuples, but instead generate the tuples eagerly.

a) Demand-driven pipeline

b) Producer-driven pipeline

c) Demand pipeline

d) All of the mentioned

View Answer

 

Answer: b

Explanation: Each operation in a producer-driven pipeline is modeled as a separate process or thread within the system that takes a stream of tuples from its pipelined inputs and generates a stream of tuples for its output.

7. Each operation in a demand-driven pipeline can be implemented as an ____ that provides the following functions: open(), next(), and close().

a) Demand

b) Pipeline

c) Iterator

d) All of the mentioned

View Answer

 

Answer: c

Explanation: After a call to open(), each call to next() returns the next output tuple of the operation.

8. The iterator maintains the __________ of its execution in between calls, so that successive next() requests receive successive result tuples.

a) State

b) Transition

c) Rate

d) Block

View Answer

 

Answer: a

Explanation: The function close() tells an iterator that no more tuples are required.

9. Tuples are generated ___________ in producer-driven pipelining, they are generated ________ on demand, in demand-driven pipelining.

a) Lazily, Eagerly

b) Eagerly, Lazily

c) Slowly, Eagerly

d) Eagerly, Slowly

View Answer

 

Answer: b

Explanation: Producer-driven pipelining is very useful in parallel processing systems.

10. When two inputs that we desire to pipeline into the join are not already sorted it is the _____________ technique.

a) Hash join

b) Buffer join

c) double-pipelined hash join

d) double-pipelined join

View Answer

 

Answer: d

Explanation: When hash indices are used on tuples, the resultant algorithm is called the double-pipelined hash-join technique..

 

 

3. Which of the following is/are false for RAW mode of FOR XML?

a) XMLSCHEMA option does not returns an in-line XSD schema

b) BINARY BASE32 returns the binary data in base32-encoded format

c) Each row in the query result is transformed into an XML element

d) None of the mentioned

View Answer

 

Answer: b

Explanation: XML was designed to transport and store data.

4. ___________ refers to the ability of the system to recover committed transaction updates if either the system or the storage media fails.

a) Isolation

b) Atomicity

c) Consistency

d) Durability

View Answer

 

Answer: d

Explanation: In database systems, durability is the ACID property which guarantees that transactions that have committed will survive permanently.

5. Which utilities can we used to export data from sql server to a text file?

a) DTS export wizard

b) BCP

c) ISQL

d) DTS export wizard and BCP

View Answer

 

Answer: d

Explanation: The bcp utility bulk copies data between an instance of Microsoft SQL Server and a data file in a user-specified format.

6. You have a column that will only contain values from 0 to 256. What is the most economical data type to use for the column?

a) TINYINT

b) SMALLINT

c) INT

d) DECIMAL(1)

View Answer

 

Answer: b

Explanation: The bcp utility bulk copies data between an instance of Microsoft SQL Server and a data file in a user-specified format.

7. Problems occurs if we don’t implement proper locking strategy

a) Dirty reads

b) Phantom reads

c) Lost updates

d) Unrepeatable reads

View Answer

 

Answer: b

Explanation: Phantom reads occur when an insert or delete action is performed against a row that belongs to a range of rows being read by a transaction.

8. Which of the following fixed database roles can add or remove user IDs?

a) db_accessadmin

b) db_securityadmin

c) db_setupadmin

d) db_sysadmin

View Answer

 

Answer: a

Explanation: The db_accessadmin role manages security, but handles access to the database, as the name implies.

9. By default sql server has ___________ isolation level

a) READ COMMITTED

b) READ UNCOMMITTED

c) SERIALIZABLE

d) REPEATABLE READ

View Answer

 

Answer: a

Explanation: READ UNCOMMITTED is the most optimistic concurrency isolation option available in SQL Server.

10. Which of the following pair of regular expression are not equivalent?

a) 1(01)* and (10)*1

b) x(xx)* and (xx)*x

c) (ab)* and a*b*

d) x+ and x*x+

View Answer

 

Answer: c

Explanation: (ab)*=(a*b*)*.

 

1. Which feature converts row data to column for better analytical view?

a) Views

b) Join

c) Pivot

d) Trigger

View Answer

 

Answer: c

Explanation: Pivot table is very powerful, and very easy to use.

2. Which of the following statements is/are not true for SQL profiler?

a) Enables you to monitor events

b) Check if rows are being inserted properly

c) Check the performance of a stored procedure

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Stored procedures are like functions which do not return values.

3. Which global variables can be used to determine if a transaction is still open?

a) @@NESTLEVEL

b) @@FETCH_STATUS

c) @@TRANCOUNT

d) @@CONNECTIONS

View Answer

 

Answer: c

Explanation: PRINT @@TRANCOUNT — The BEGIN TRAN statement will increment the — transaction count by 1.

4. Which statement is used to define a cursor?

a) OPEN

b) FETCH

c) DECLARE CURSOR

d) @@FETCH_STATUS

View Answer

 

Answer: c

Explanation: A database cursor is a control structure that enables traversal over the records in a database.

5. What is the default “SORT” order for a SQL?

a) Ascending

b) Descending

c) As specified by the user

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Default is ascending order.

6. Capabilities of RAISERROR

a) It can be logged in the error log

b) It can print a message to the application

c) It can assign an error number, state and severity

d) All of the mentioned

View Answer

 

Answer: d

Explanation: A relational database table is often described as “normalized” if it is in the Third Normal Form because most of the 3NF tables are free of insertion, update, and deletion anomalies.

7. How inserting data through stored procedure do reduces network traffic and increase database performance?

a) Stored procedure can accept parameter

b) Permission check is not required

c) The execution plan is stored in the cache after it was executed the first time

d) None of the mentioned

View Answer

 

Answer: c

Explanation: A relational database table is often described as “normalized” if it is in the Third Normal Form because most of the 3NF tables are free of insertion, update, and deletion anomalies.

8. Stored procedures are safe from SQL injection attacks

a) True

b) False

c) Depends on the result

d) Always safe

View Answer

 

Answer: a

Explanation: Injection attack is not possible in SP.

9. Which of the following connection type supports application role permissions and password encryption?

a) OLE DB

b) DBLib

c) ODBC

d) OLE DB and ODBC

View Answer

 

Answer: d

Explanation: Open Database Connectivity (ODBC) is Microsoft’s strategic interface for accessing data in a heterogeneous environment of relational.

10. Cursor that reflects the changes made to the database table even after the result set is returned

a) Static

b) Dynamic

c) FORWARD_ONLY

d) Keyset

View Answer

 

Answer: b

Explanation: A database cursor is a control structure that enables traversal over the records in a database.

 

 

1. Which normal form is considered adequate for normal relational database design?

a) 2NF

b) 5NF

c) 4NF

d) 3NF

View Answer

 

Answer: d

Explanation: A relational database table is often described as “normalized” if it is in the Third Normal Form because most of the 3NF tables are free of insertion, update, and deletion anomalies.

2. Consider a schema R(A, B, C, D) and functional dependencies A -> B and C -> D. Then the decomposition of R into R1 (A, B) and R2(C, D) is

a) dependency preserving and lossless join

b) lossless join but not dependency preserving

c) dependency preserving but not lossless join

d) not dependency preserving and not lossless join

View Answer

 

Answer: d

Explanation: While decomposing a relational table we must verify the following properties:

i) Dependency Preserving Property

ii) Lossless-Join Property.

3. Relation R with an associated set of functional dependencies, F, is decomposed into BCNF. The redundancy (arising out of functional dependencies) in the resulting set of relations is

a) Zero

b) More than zero but less than that of an equivalent 3NF decomposition

c) Proportional to the size of F+

d) Indeterminate

View Answer

 

Answer: b

Explanation: Redundancy in BCNF is low when compared to 3NF.

4. Which one of the following statements about normal forms is FALSE?

a) BCNF is stricter than 3NF

b) Lossless, dependency-preserving decomposition into 3NF is always possible

c) Lossless, dependency-preserving decomposition into BCNF is always possible

d) Any relation with two attributes is in BCNF

View Answer

 

Answer: c

Explanation: Achieving Lossless and dependency-preserving decomposition property into BCNF is difficult.

5. A table has fields F1, F2, F3, F4, and F5, with the following functional dependencies:

 

F1->F3

F2->F4

(F1,F2)->F5

in terms of normalization, this table is in

a) 1NF

b) 2NF

c) 3NF

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Since the primary key is not given we have to derive the primary key of the table. Using the closure set of attributes we get the primary key as (F1,F2). From functional dependencies, “F1->F3, F2->F4”, we can see that there is partial functional dependency therefore it is not in 1NF. Hence the table is in 1NF.

6. Which of the following is TRUE?

a) Every relation in 2NF is also in BCNF

b) A relation R is in 3NF if every non-prime attribute of R is fully functionally dependent on every key of R

c) Every relation in BCNF is also in 3NF

d) No relation can be in both BCNF and 3NF

View Answer

 

Answer: c

Explanation: A relational database table is often described as “normalized” if it is in the Third Normal Form because most of the 3NF tables are free of insertion, update, and deletion anomalies.

7. Consider the following functional dependencies in a database.

 

   Date_of_Birth->Age            Age->Eligibility

   Name->Roll_number             Roll_number->Name

   Course_number->Course_name    Course_number->Instructor

   (Roll_number, Course_number)->Grade

The relation (Roll_number, Name, Date_of_birth, Age) is

a) In second normal form but not in third normal form

b) In third normal form but not in BCNF

c) In BCNF

d) None of the mentioned

View Answer

 

Answer: d

Explanation: For the given relation only some of the above FDs are applicable. The applicable FDs are given below:

Date_of_Birth->Age

Name->Roll_number

Roll_number->Name

Finding the closure set of attributes we get the candidate keys:(Roll_number,Date_of_Birth), and (Name,Date_of_Birth) .

On selecting any one of the candidate key we can see that the FD Date_of_Birth->Age is a partial dependency. Hence the relation is in 1NF.

8. The relation schema Student_Performance (name, courseNo, rollNo, grade) has the following FDs:

 

name,courseNo->grade

rollNo,courseNo->grade

name->rollNo

rollNo->name

The highest normal form of this relation scheme is

a) 2NF

b) 3NF

c) BCNF

d) 4NF

View Answer

 

Answer: b

Explanation: A super key is a combination of prime attributes and one or more non-prime key attribute(s). It also uniquely identifies a record in a table. Primary key can be defined as super key with minimal attributes.

9. The relation EMPDT1 is defined with attributes empcode(unique), name, street, city, state, and pincode. For any pincode,there is only one city and state. Also, for any given street, city and state, there is just one pincode. In normalization terms EMPDT1 is a relation in

a) 1NF only

b) 2NF and hence also in 1NF

c) 3NF and hence also in 2NF and 1NF

d) BCNF and hence also in 3NF, 2NF and 1NF

View Answer

 

Answer: b

Explanation: Empcode is unique, therefore it is the primary key. Since the primary key consists of a single attribute there will be no partial dependency, hence the relation is in 2NF.

From the question we get the FDs as below:

pincode -> city, state

street,city,state -> pincode

From the FDs we can see that there are transitive dependencies, hence the table is not in 3NF.

10. Which one of the following statements if FALSE?

a) Any relation with two attributes is in BCNF

b) A relation in which every key has only one attribute is in 2NF

c) A prime attribute can be transitively dependent on a key in a 3 NF relation

d) A prime attribute can be transitively dependent on a key in a BCNF relation

View Answer

 

Answer: d

Explanation: A table is in 3NF if and only if, for each of its functional dependencies X -> A, at least one of the following conditions holds:

* X contains A (that is, X -> A is trivial functional dependency), or

* X is a superkey, or

* A should be prime attribute.

 

1. _______________ is a procedural extension of Oracle – SQL that offers language constructs similar to those in imperative programming languages.

a) SQL

b) PL/SQL

c) Advanced SQL

d) PQL

View Answer

 

Answer: b

Explanation: PL/SQL is an imperative 3GL that was designed specifically for the seamless processing of SQL commands.

2. ___________ combines the data manipulating power of SQL with the data processing power of Procedural languages.

a) PL/SQL

b) SQL

c) Advanced SQL

d) PQL

View Answer

 

Answer: a

Explanation: PL/SQL is an imperative 3GL that was designed specifically for the seamless processing of SQL commands.

3. _______________ has made PL/SQL code run faster without requiring any additional work on the part of the programmer.

a) SQL Server

b) My SQL

c) Oracle

d) SQL Lite

View Answer

 

Answer: c

Explanation: An Oracle database is a collection of data treated as a unit. The purpose of a database is to store and retrieve related information.

4. A line of PL/SQL text contains groups of characters known as

a) Lexical Units

b) Literals

c) Textual Units

d) Identifiers

View Answer

 

Answer: a

Explanation: Lexical items can be generally understood to convey a single meaning, much as a lexeme, but are not limited to single words.

5. We use ______________ name PL/SQL program objects and units.

a) Lexical Units

b) Literals

c) Delimiters

d) Identifiers

View Answer

 

Answer: d

Explanation: The database object name is referred to as its identifier.

6. A ___________________ is an explicit numeric, character, string or Boolean value not represented by an identifier.

a) Comments

b) Literals

c) Delimiters

d) Identifiers

View Answer

 

Answer: b

Explanation: The terms literal and constant value are synonymous and refer to a fixed data value.

7. If no header is specified, the block is said to be an _______________ PL/SQL block.

a) Strong

b) Weak

c) Empty

d) Anonymous

View Answer

 

Answer: d

Explanation: The terms literal and constant value are synonymous and refer to a fixed data value.

8. _________________ is a sequence of zero or more characters enclosed by single quotes.

a) Integers literal

b) String literal

c) String units

d) String label

View Answer

 

Answer: b

Explanation: The terms literal and constant value are synonymous and refer to a fixed data value.

9. In _______________ the management of the password for the account can be handled outside of oracle such as operating system.

a) Database Authentication

b) Operating System Authentication

c) Internal Authentication

d) External Authentication

View Answer

 

Answer: b

Explanation: Database management involves the monitoring, administration, and maintenance of the databases and database groups in your enterprise.

10. In ________________ of Oracle, the database administrator creates a user account in the database for each user who needs access.

a) Database Authentication

b) Operating System Authentication

c) Internal Authentication

d) External Authentication

View Answer

 

Answer: a

Explanation: Database management involves the monitoring, administration, and maintenance of the databases and database groups in your enterprise.

 

1. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which of the following form a transaction ?

a) Only 1

b) Only 2

c) Both 1 and 2 individually

d) Either 1 or 2

View Answer

 

Answer: c

Explanation: The term transaction refers to a collection of operations that form a single logical unit of work.

2. A transaction is delimited by statements (or function calls) of the form __________

a) Begin transaction and end transaction

b) Start transaction and stop transaction

c) Get transaction and post transaction

d) Read transaction and write transaction

View Answer

 

Answer: a

Explanation: The transaction consists of all operations executed between the begin transaction and end transaction.

3. Identify the characteristics of transactions

a) Atomicity

b) Durability

c) Isolation

d) All of the mentioned

View Answer

 

Answer: d

Explanation: Because of the above three properties, transactions are an ideal way of structuring interaction with a database.

4. Which of the following has “all-or-none” property ?

a) Atomicity

b) Durability

c) Isolation

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Either all operations of the transaction are reflected properly in the database, or none are.

5. The database system must take special actions to ensure that transactions operate properly without interference from concurrently executing database statements. This property is referred to as

a) Atomicity

b) Durability

c) Isolation

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Even though multiple transactions may execute concurrently, the system guarantees that, for every pair of transactions Ti and Tj , it appears to Ti that either Tj finished execution before Ti started or Tj started execution after Ti finished.

6. The property of transaction that persists all the crashes is

a) Atomicity

b) Durability

c) Isolation

d) All of the mentioned

View Answer

 

Answer: b

Explanation: After a transaction completes successfully, the changes it has made to the database persist, even if there are system failures.

7. __________ states that only valid data will be written to the database.

a) Consistency

b) Atomicity

c) Durability

d) Isolation

View Answer

 

Answer: a

Explanation: If, for some reason, a transaction is executed that violates the database’s consistency rules, the entire transaction will be rolled back and the database will be restored to a state consistent with those rules.

8. Transaction processing is associated with everything below except

a) Producing detail summary or exception reports

b) Recording a business activity

c) Confirming a action or triggering a response

d) Maintaining a data

View Answer

 

Answer: c

Explanation: Collections of operations that form a single logical unit of work are called transactions.

9. The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.

a) BEGIN

b) SET TRANSACTION

c) BEGIN TRANSACTION

d) COMMIT

View Answer

 

Answer: b

Explanation: Commit is used to store all the transactions.

10. ____ means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

a) Consistency

b) Atomicity

c) Durability

d) Isolation

View Answer

 

Answer: d

Explanation: Even though multiple transactions may execute concurrently, the system guarantees that, for every pair of transactions Ti and Tj, it appears to Ti that either Tj finished execution before Ti started or Tj started execution after Ti finished.

 

1. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?

a) CREATE PACKAGE

b) CREATE SCHEMA

c) CREATE CLUSTER

d) All of the mentioned

View Answer

 

Answer: b

Explanation: A database schema of a database system is its structure described in a formal language supported by the database management system and refers to the organization of data as a blueprint of how a database is constructed.

2. In SQL, the CREATE TABLESPACE is used

a) To create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace

b) To create a database trigger

c) To add/rename data files, to change storage

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Triggers are used to initialise the actions for a activity.

3. Which character function can be used to return a specified portion of a character string?

a) INSTR

b) SUBSTRING

c) SUBSTR

d) POS

View Answer

 

Answer: c

Explanation: SUBSTR are used to match the particular characters in a string.

4. Which of the following is TRUE for the System Variable $date$?

a) Can be assigned to a global variable

b) Can be assigned to any field only during design time

c) Can be assigned to any variable or field during run time

d) Can be assigned to a local variable

View Answer

 

Answer: b

Explanation: A database schema of a database system is its structure described in a formal language supported by the database management system and refers to the organization of data as a blueprint of how a database is constructed.

5. What are the different events in Triggers?

a) Define, Create

b) Drop, Comment

c) Insert, Update, Delete

d) Select, Commit

View Answer

 

Answer: c

Explanation: A database trigger is procedural code that is automatically executed in response to certain events on a particular table or view in a database.

6. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?

a) Data Definition Language

b) Data Manipulation Language

c) Data Described Language

d) Data Retrieval Language

View Answer

 

Answer: a

Explanation: DDL are used to define schema and table characters.

7. The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), 4) FROM EMP; prints

a) 6789

b) 2345

c) 1234

d) 456789

View Answer

 

Answer: b

Explanation: SUBSTR are used to match the particular characters in a string.

8. Which of the following SQL command can be used to modify existing data in a database table?

a) MODIFY

b) UPDATE

c) CHANGE

d) NEW

View Answer

 

Answer: b

Explanation: Syntax : UPDATE table_name

SET column1=value1,column2=value2,…

WHERE some_column=some_value; .

9. When SQL statements are embedded inside 3GL, we call such a program as

a) Nested query

b) Nested programming

c) Distinct query

d) Embedded SQL

View Answer

 

Answer: d

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

10. _______________ provides option for entering SQL queries as execution time, rather than at the development stage.

a) PL/SQL

b) SQL*Plus

c) SQL

d) Dynamic SQL

View Answer

 

Answer: d

Explanation: Dynamic SQL enables you to write programs that reference SQL statements whose full text is not known until runtime.

 

1. The storage structure which do not survive system crashes are ______

a) Volatile storage

b) Non-volatile storage

c) Stable storage

d) Dynamic storage

View Answer

 

Answer: a

Explanation: Volatile storage, is a computer memory that requires power to maintain the stored information, in other words it needs power to reach the computer memory.

2. Storage devices like tertiary storage , magnetic disk comes under

a) Volatile storage

b) Non-volatile storage

c) Stable storage

d) Dynamic storage

View Answer

 

Answer: b

Explanation: Information residing in nonvolatile storage survives system crashes.

3. For a transaction to be durable, its changes need to be written to ________ storage.

a) Volatile storage

b) Non-volatile storage

c) Stable storage

d) Dynamic storage

View Answer

 

Answer: c

Explanation: Similarly, for a transaction to be atomic, log records need to be written to stable storage before any changes are made to the database on disk.

4. The unit of storage that can store one are more records in a hash file organization are

a) Buckets

b) Disk pages

c) Blocks

d) Nodes

View Answer

 

Answer: a

Explanation: Buckets are used to store one or more records in a hash file organization.

5. A ______ file system is software that enables multiple computers to share file storage while maintaining consistent space allocation and file content.

a) Storage

b) Tertiary

c) Secondary

d) Cluster

View Answer

 

Answer: d

Explanation: With a cluster file system, the failure of a computer in the cluster does not make the file system unavailable.

6. A file produced by a spreadsheet

a) is generally stored on disk in an ASCII text format

b) can be used as is by the DBMS

c) all of the mentioned

d) none of the mentioned

View Answer

 

Answer: a

Explanation: ASCII text format uses the standard text file for the changing the value.

7. SDL means _____________

a) Storage Discrete Language

b) Storage Definition Language

c) Storage Definition Localisation

d) Storage Discrete Localisation

View Answer

 

Answer: b

Explanation: It specifies internal schema and also mapping between two schemas.

8. Which of the following is the process of selecting the data storage and data access characteristics of the database?

a) Logical database design

b) Physical database design

c) Testing and performance tuning

d) Evaluation and selecting

View Answer

 

Answer: b

Explanation: Physical database design is the process of selecting the data storage and data access characteristics of the database.

9. Which of the following is the oldest database model?

a) Relational

b) Hierarchical

c) Physical

d) Network

View Answer

 

Answer: d

Explanation: Network model has data stored in a hierarchical network flow.

10. The process of saving information onto secondary storage devices is referred to as

a) Backing up

b) Restoring

c) Writing

d) Reading

View Answer

 

Answer: c

Explanation: The information is written into the secondary storage device.

 

 

1. A transaction may not always complete its execution successfully. Such a transaction is termed

a) Aborted

b) Terminated

c) Closed

d) All of the mentioned

View Answer

 

Answer: a

Explanation: If we are to ensure the atomicity property, an aborted transaction must have no effect on the state of the database.

2. If an transaction is performed in a database and committed, the changes are taken to the previous state of transaction by

a) Flashback

b) Rollback

c) Both Flashback and Rollback

d) Cannot be done

View Answer

 

Answer: d

Explanation: Once committed the changes cannot be rolled back.

3. Each modification done in database transaction are first recorded into the

a) Harddrive

b) Log

c) Disk

d) Datamart

View Answer

 

Answer: b

Explanation: After commit is issued the data are stored in database and stored in drive.

4. When the transaction finishes the final statement the transaction enters into

a) Active state

b) Committed state

c) Partially committed state

d) Abort state

View Answer

 

Answer: c

Explanation: The commit statement has to be issued to enter into committed state.

5. The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready for execution shall be called

a) Batch. Exe

b) Trans. Exe

c) Opt. Exe

d) Edit.Exe

View Answer

 

Answer: c

Explanation: Transactions has to be managed by the executable files.

6. Which of the following is an atomic sequence of database actions?

a) Transaction

b) Concurrency

c) Relations

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Transactions is collection of operations that provides single logical function in database.

7. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called

a) Consistent state

b) Parallel state

c) Atomic state

d) Inconsistent state

View Answer

 

Answer: d

Explanation: If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called in consistent state.

8. _______ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

a) Serializability

b) Atomicity

c) Isolation

d) Time stamping

View Answer

 

Answer: c

Explanation: Isolation means that data used during the execution of a transaction can’t be used by a second transaction until the first one is completed.

9. DBMS periodically suspends all processing and synchronizes its files and journals through the use of

a) Checkpoint facility

b) Backup facility

c) Recovery manager

d) Database change log

View Answer

 

Answer: a

Explanation: DBMS periodically suspends all processing and synchronizes its files and journals though the use of Check point facility.

10. Which of the following is not a state in transaction ?

a) Active

b) Terminated

c) Aborted

d) Partially committed

View Answer

 

Answer: b

Explanation: The transaction states are abort,active,committed,partially committed, Failed.

 

1. _______________ joins are SQL server default

a) Outer

b) Inner

c) Equi

d) None of the Mentioned

View Answer

 

Answer: b

Explanation: Inner query joins only the rows that are matching.

2. The ________________ is essentially used to search for patterns in target string.

a) Like Predicate

b) Null Predicate

c) In Predicate

d) Out Predicate

View Answer

 

Answer: a

Explanation: Like matches the pattern with the query.

3. Which of the following is/are the Database server functions?

i) Data management ii) Transaction management

iii) Compile queries iv) Query optimization

a) i, ii, and iv only

b) i, ii and iii only

c) ii, iii and iv only

d) All i, ii, iii, and iv

View Answer

 

Answer: a

Explanation: All these are functions of database.

4. To delete a database ___________ command is used

a) Delete database database_name

b) Delete database_name

c) drop database database_name

d) drop database_name

View Answer

 

Answer: c

Explanation: This will delete the database with its structure.

5. ____________ is a combination of two of more attributes used as a primary key

a) Composite Key

b) Alternate Key

c) Candidate Key

d) Foreign Key

View Answer

 

Answer: a

Explanation: Primary keys together form the composite key.

6. Which of the following is not the function of client?

a) Compile queries

b) Query optimization

c) Receive queries

d) Result formatting and presentation

View Answer

 

Answer: b

Explanation: Query optimization is used to improve the quality.

7. ____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.

a) Procedure

b) Trigger

c) Curser

d) None of the Mentioned

View Answer

 

Answer: b

Explanation: Triggers are used to initiate a action to take place.

8. ______________ requires that data should be made available to only authorized users.

a) Data integrity

b) Privacy

c) Security

d) None of the Mentioned

View Answer

 

Answer: c

Explanation: Some algorithms may be used for the security.

9. Some of the utilities of DBMS are _____________

i) Loading ii) Backup iii) File organization iv) Process Organization

a) i, ii, and iv only

b) i, ii and iii only

c) ii, iii and iv only

d) All i, ii, iii, and iv

View Answer

 

Answer: b

Explanation: Processing is not the a utility in dbms.

10. ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.

a) Procedure

b) Trigger

c) Curser

d) None of the Mentioned

View Answer

 

Answer: c

Explanation: Triggers are used to initiate a action to take place.

 

1. Which s essential a business problem not a data problem:

a) Data

b) Database

c) Database design

d) All of the mentioned

View Answer

 

Answer: c

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

2. Which is primarily the result of a thorough understanding of information about an enterprise:

a) Data

b) Database

c) Database design

d) Data modeling

View Answer

 

Answer: d

Explanation: Data modelling designs the data in a secured manner.

3. McFadden has defined normalization in his which book___________

a) Database modern management

b) Management database of modern

c) Modern database management

d) Database management

View Answer

 

Answer: c

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

4. The database design prevents some data from being represented due to _______

a) Deletion anomalies

b) Insertion anomalies

c) Update anomaly

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Insertion anomaly is due to confusion in data deletion or insertion.

5. How many types of insertion anomalies:

a) 1

b) 2

c) 3

d) 4

View Answer

 

Answer: b

Explanation: Insertion anomaly is due to confusion in data deletion or insertion.

6. Who developed the normalization process:

a) E.F. codd

b) F.F. codd

c) E.E. codd

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Normalization helps in improving the quality of the data.

7. E.F.Codd developed the normalization process in the which early:

a) 1969

b) 1970

c) 1971

d) 1972

View Answer

 

Answer: b

Explanation: Normalization helps in improving the quality of the data.

8. Which is a bottom-up approach to database design that design by examining the relationship between attributes:

a) Functional dependency

b) Database modeling

c) Normalization

d) Decomposition

View Answer

 

Answer: c

Explanation: Normalization helps in improving the quality of the data.

9. Which is the process of breaking a relation into multiple relations:

a) Functional dependency

b) Database modeling

c) Normalization

d) Decomposition

View Answer

 

Answer: d

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

10. Which formal method that locates and analyses relation schemas on the basis of their primary, candidate keys, and the FD’s that are present among the attributes of these schemas:

a) Functional dependency

b) Database modeling

c) Normalization

d) Decomposition

View Answer

 

Answer: c

Explanation: Normalization helps in improving the quality of the data.

 

 

1. Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:

a) Concurrency

b) Deadlock

c) Backup

d) Recovery

View Answer

 

Answer: b

Explanation: Deadlock will stop further processing.

2. Which is a duplicate copy of a file program that is stored on a different storage media than the original location:

a) Concurrency

b) Deadlock

c) Backup

d) Recovery

View Answer

 

Answer: c

Explanation: Backup is required to take all the data.

3. Which is duplication of computer operations and routine backups to combat any unforeseen problems:

a) Concurrency

b) Deadlock

c) Backup

d) Recovery

View Answer

 

Answer: d

Explanation: Recovery means to take the backup data while there is a crash.

4. Optimization that is basically related to the rewriter module is termed as__________

a) Semantic query optimization

b) Global query optimization

c) All of the Mentioned

d) None of the Mentioned

View Answer

 

Answer: a

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

5. Optimization basically related to the Rewrite module is termed as_______

a) Semantic query optimization

b) Global query optimization

c) All of the Mentioned

d) None of the Mentioned

View Answer

 

Answer: a

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

6. Database security helps organizations to protect data from _____

a) Internal users

b) External users

c) Non-external users

d) Non internal users

View Answer

 

Answer: b

Explanation: External users are the people who do not involve in the processing of the database.

7. Copying files to secondary or specific devices is known as ______

a) Retrieve

b) Backup

c) Recovery

d) Deadlock

View Answer

 

Answer: b

Explanation: Backup is required to take all the data.

8. How many types of recovery control techniques:

a) 2

b) 3

c) 4

d) 5

View Answer

 

Answer: a

Explanation: Recovery means to take the backup data while there is a crash.

9. Which are types of recovery control techniques:

a) Deferred update

b) Immediate update

c) All of the Mentioned

d) None of the Mentioned

View Answer

 

Answer: c

Explanation: Recovery means to take the backup data while there is a crash.

10. Which server can joins the indexes when only multiple indexes combined can cover the query:

a) SQL

b) DBMS

c) RDBMS

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Indexing reduces the difficulty in searching the data.

 

1. In concurrency control policy the the lock is obtained on

a) Entire database

b) A particular transaction alone

c) All the new elements

d) All of the mentioned

View Answer

 

Answer: a

Explanation: It is to avoid deadlock.

2. A concurrency-control policy such as this one leads to ______ performance, since it forces transactions to wait for preceding transactions to finish before they can start.

a) Good

b) Average

c) Poor

d) Unstable

View Answer

 

Answer: c

Explanation: It provides a poor degree of concurrency.

3. __________ are used to ensure that transactions access each data item in order of the transactions’ ____ if their accesses conflict.

a) Zone

b) Relay

c) Line

d) Timestamps

View Answer

 

Answer: d

Explanation: When this is not possible, offending transactions are aborted and restarted with a new timestamp.

4. EMPDET is an external table containing the columns EMPNO and ENAME. Which command would work in relation to the EMPDET table?

 

a) UPDATE empdet

SET ename = 'Amit'

WHERE empno = 1234;

b) DELETE FROM empdet

WHERE ename LIKE 'J%';

c) CREATE VIEW empvu

AS

SELECT * FROM empdept;

d) CREATE INDEX

empdet_idx

ON empdet(empno);

View Answer

Answer: c

Explanation: View is the temporary space created for the database.

 

 

5. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?

a) To find the groups forming the subtotal in a row

b) To create group-wise grand totals for the groups specified within a GROUP BY clause

c) To create a grouping for expressions or columns specified within a GROUP BY clause in one direction, from right to left for calculating the subtotals

d) To create a grouping for expressions or columns specified within a GROUP BY clause in all possible directions, which is cross-tabular report for calculating the subtotals

View Answer

 

Answer: c

Explanation: View is the temporary space created for the database.

6.

Name Null?  Type

Cust_id          Not null          Number(2)

Cust_Name               Varchar2(15)

Evaluate the following SQL statements executed in the given order:

 

ALTER TABLE cust

ADD CONSTRAINT cust_id_pk PRIMARY KEY(cust_id) DEFERRABLE INITIALLY DEFERRED; INSERT

INTO cust VALUES (1,'RAJ'); --row 1

INSERT INTO cust VALUES (1,'SAM'); --row 2

COMMIT;

SET CONSTRAINT cust_id_pk IMMEDIATE;

INSERT INTO cust VALUES (1,'LATA'); --row 3

INSERT INTO cust VALUES (2,'KING'); --row 4

COMMIT;

Which rows would be made permanent in the CUST table?

a) row 4 only

b) rows 2 and 4

c) rows 3 and 4

d) rows 1 and 4

View Answer

 

Answer: c

Explanation: View is the temporary space created for the database.

7. Which statement is true regarding external tables?

a) The default REJECT LIMIT for external tables is UNLIMITED

b) The data and metadata for an external table are stored outside the database

c) ORACLE_LOADER and ORACLE_DATAPUMP have exactly the same functionality when used with an external table

d) The CREATE TABLE AS SELECT statement can be used to unload data into regular table in the database from an external table

View Answer

 

Answer: d

Explanation: This will replicate the table as in the select statement.

8. A non-correlated subquery can be defined as ______

a) A set of sequential queries, all of which must always return a single value

b) A set of sequential queries, all of which must return values from the same table

c) A SELECT statement that can be embedded in a clause of another SELECT statement only

d) A set of one or more sequential queries in which generally the result of the inner query is used as the search value in the outer query

View Answer

 

Answer: d

Explanation: This will replicate the table as in the select statement.

9. Evaluate the following SQL statements in the given order:

 

DROP TABLE dept;

CREATE TABLE dept

(deptno NUMBER(3) PRIMARY KEY,

deptname VARCHAR2(10));

DROP TABLE dept;

FLASHBACK TABLE dept TO BEFORE DROP;

Which statement is true regarding the above FLASHBACK operation?

a) It recovers only the first DEPT table

b) It recovers only the second DEPT table

c) It does not recover any of the tables because FLASHBACK is not possible in this case

d) It recovers both the tables but the names would be changed to the ones assigned in the RECYCLEBIN

View Answer

 

Answer: b

Explanation: This will replicate the table as in the select statement.

10.

 

CREATE TABLE digits

(id NUMBER(2),

description VARCHAR2(15));

INSERT INTO digits VALUES (1,'ONE');

UPDATE digits SET description ='TWO' WHERE id=1;

INSERT INTO digits VALUES (2,'TWO');

COMMIT;

DELETE FROM digits;

SELECT description FROM digits

VERSIONS BETWEEN TIMESTAMP MINVALUE AND MAXVALUE;

What would be the outcome of the above query?

a) It would not display any values

b) It would display the value TWO once

c) It would display the value TWO twice

d) It would display the values ONE, TWO, and TWO

View Answer

 

Answer: c

Explanation: This will replicate the table as in the select statement.

 

1. Which of the following is not a property of transactions?

a) Atomicity

b) Concurrency

c) Isolation

d) Durability

View Answer

 

Answer: d

Explanation: ACID properties are the properties of transactions.

2. SNAPSHOT is used for (DBA)

a) Synonym

b) Tablespace

c) System server

d) Dynamic data replication

View Answer

 

Answer: d

Explanation: Snapshot gets the instance of the database at that time.

3. Isolation of the transactions is ensured by

a) Transaction management

b) Application programmer

c) Concurrency control

d) Recovery management

View Answer

 

Answer: c

Explanation: ACID properties are the properties of transactions.

4. Constraint checking can be disabled in existing _______________ and _____________ constraints so that any data you modify or add to the table is not checked against the constraint.

a) CHECK, FOREIGN KEY

b) DELETE, FOREIGN KEY

c) CHECK, PRIMARY KEY

d) PRIMARY KEY, FOREIGN KEY

View Answer

 

Answer: a

Explanation: Check and foreign constraints are used to constraint the table data.

5. Problems occurs if we don’t implement proper locking strategy

a) Dirty reads

b) Phantom reads

c) Lost updates

d) Unrepeatable reads

View Answer

 

Answer: d

Explanation: In a concurrent execution of these transactions, it is intuitively clear that they conflict, but this is a conflict not captured by our simple model. This situation is referred to as the phantom phenomenon, because a conflict may exist on “phantom” data.

6. Which of the following fixed database roles can add or remove user IDs?

a) db_accessadmin

b) db_securityadmin

c) db_setupadmin

d) db_sysadmin

View Answer

 

Answer: a

Explanation: The database can be accessed by assigning the roles.

7. By default sql server has ___________ isolation level

a) READ COMMITTED

b) READ UNCOMMITTED

c) SERIALIZABLE

d) REPEATABLE READ

View Answer

 

Answer: a

Explanation: Read committed is used to commit the default read operation.

8. Which of the following statements is/are not true for SQL profiler?

a) Enables you to monitor events

b) Check if rows are being inserted properly

c) Check the performance of a stored procedure

d) ALL of the mentioned

View Answer

 

Answer: c

Explanation: Read committed is used to commit the default read operation.

9. Which of the following is the original purpose of SQL?

a) To specify the syntax and semantics of SQL data definition language

b) To specify the syntax and semantics of SQL manipulation language

c) To define the data structures

d) All of the mentioned

View Answer

 

Answer: d

Explanation: Read committed is used to commit the default read operation.

10. SQL can be used to:

a) Create database structures only

b) Query database data only

c) Modify database data only

d) All of the mentioned

View Answer

 

Answer: d

Explanation: In a concurrent execution of these transactions, it is intuitively clear that they conflict, but this is a conflict not captured by our simple model. This situation is referred to as the phantom phenomenon, because a conflict may exist on “phantom” data.

 

 

1. In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?

a) Triggers

b) Pointers

c) Locks

d) Cursors

View Answer

 

Answer: c

Explanation: Locks are used to maintain database consistency.

2. A lock that allows concurrent transactions to access different rows of the same table is known as a

a) Database-level lock

b) Table-level lock

c) Page-level lock

d) Row-level lock

View Answer

 

Answer: d

Explanation: Locks are used to maintain database consistency.

3. Which of the following are introduced to reduce the overheads caused by the log-based recovery?

a) Checkpoints

b) Indices

c) Deadlocks

d) Locks

View Answer

 

Answer: d

Explanation: Checkpoints are introduced to reduce overheads caused by the log-based recovery.

4. Which of the following protocols ensures conflict serializability and safety from deadlocks?

a) Two-phase locking protocol

b) Time-stamp ordering protocol

c) Graph based protocol

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Time-stamp ordering protocol ensures conflict serializability and safety from deadlocks.

5. Which of the following is the block that is not permitted to be written back to the disk?

a) Dead code

b) Read only

c) Pinned

d) Zapped

View Answer

 

Answer: c

Explanation: A block that is not permitted to be written back to the disk is called pinned.

6. If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an ­­­­­­__________ on all the records belonging to that file.

a) Explicit lock in exclusive mode

b) Implicit lock in shared mode

c) Explicit lock in shared mode

d) Implicit lock in exclusive mode

View Answer

 

Answer: d

Explanation: If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an implicit lock in exclusive mode on all the records belonging to that file.

7. Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other

a) Concurrency

b) Deadlock

c) Backup

d) Recovery

View Answer

 

Answer: a

Explanation: Concurrency is a property of systems in which several computations are executing simultaneously, and potentially interacting with each other.

8. All lock information is managed by a __________ which is responsible for assigning and policing the locks used by the transactions.

a) Scheduler

b) DBMS

c) Lock manager

d) Locking agent

View Answer

 

Answer: c

Explanation: A distributed lock manager (DLM) provides distributed software applications with a means to synchronize their accesses to shared resources.

9. The ____ lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.

a) Table-level

b) Page-level

c) Row-level

d) Field-level

View Answer

 

Answer: d

Explanation: Lock is limited to the attributes of the relation.

10. Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?

a) Record controller

b) Exclusive lock

c) Authorization rule

d) Two phase lock

View Answer

 

Answer: d

Explanation: Two-phase lock is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

 

1. A system is in a ______ state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.

a) Idle

b) Waiting

c) Deadlock

d) Ready

View Answer

 

Answer: c

Explanation: When one data item is waiting for another data item in a transaction then system is in deadlock.

2. The deadlock state can be changed back to stable state by using _____________ statement.

a) Commit

b) Rollback

c) Savepoint

d) Deadlock

View Answer

 

Answer: b

Explanation: Rollback is used to rollback to the point before lock is obtained.

3. What are the ways of dealing with deadlock ?

a) Deadlock prevention

b) Deadlock recovery

c) Deadlock detection

d) All of the mentioned

View Answer

 

Answer: d

Explanation: Deadlock prevention is also called as deadlock recovery.Prevention is commonly used if the probability that the system would enter a deadlock state is relatively high; otherwise, detection and recovery are more efficient.

4. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj ). Otherwise, Ti is rolled back (dies). This is

a) Wait-die

b) Wait-wound

c) Wound-wait

d) Wait

View Answer

 

Answer: a

Explanation: The wait–die scheme is a non-preemptive technique.

5. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti ). This is

a) Wait-die

b) Wait-wound

c) Wound-wait

d) Wait

View Answer

 

Answer: c

Explanation: The wound–wait scheme is a preemptive technique. It is a counterpart to the wait–die scheme.

6. The situation where the lock waits only for a specified amount of time for another lock to be released is

a) Lock timeout

b) Wait-wound

c) Timeout

d) Wait

View Answer

 

Answer: a

Explanation: The timeout scheme is particularly easy to implement, and works well if transactions are short and if longwaits are likely to be due to deadlocks.

7. The deadlock in a set of transaction can be determined by

a) Read-only graph

b) Wait graph

c) Wait-for graph

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Each transaction involved in the cycle is said to be deadlocked.

8. A deadlock exists in the system if and only if the wait-for graph contains a ___________

a) Cycle

b) Direction

c) Bi-direction

d) Rotation

View Answer

 

Answer: a

Explanation: Each transaction involved in the cycle is said to be deadlocked.

9. Selecting the victim to be rollbacked to the previous state is determined by the minimum cost. The factors determining cost of rollback is

a) How long the transaction has computed, and how much longer the transaction will compute before it completes its designated task

b) How many data items the transaction has used

c) How many more data items the transaction needs for it to complete

d) All of the mentioned

View Answer

 

Answer: d

Explanation: We should roll back those transactions that will incur the minimum cost.

10. __________ rollback requires the system to maintain additional information about the state of all the running transactions.

a) Total

b) Partial

c) Time

d) Commit

View Answer

 

Answer: b

Explanation: In total rollback abort the transaction and then restart it.

 

1. In a granularity hierarchy the highest level represents the

a) Entire database

b) Area

c) File

d) Record

View Answer

 

Answer: a

Explanation: This level is the root of the tree.

2. In a database the file is contained in ________

a) Entire database

b) Two area

c) One area

d) more than one area

View Answer

 

Answer: c

Explanation: This level is below the root of the tree.

3. If a node is locked in an intention mode, explicit locking is done at a lower level of the tree. This is called

a) Intention lock modes

b) Explicit lock

c) Implicit lock

d) Exclusive lock

View Answer

 

Answer: a

Explanation: There is an intention mode associated with shared mode, and there is one with exclusive mode.

4. If a node is locked in __________ explicit locking is being done at a lower level of the tree, but with only shared-mode locks.

a) Intention lock modes

b) Intention-shared-exclusive mode

c) Intention-exclusive (IX) mode

d) Intention-shared (IS) mode

View Answer

 

Answer: a

Explanation: There is an intention mode associated with shared mode, and there is one with exclusive mode.

5. If a node is locked in ____________ then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks.

a) Intention lock modes

b) Intention-shared-exclusive mode

c) Intention-exclusive (IX) mode

d) Intention-shared (IS) mode

View Answer

 

Answer: c

Explanation: There is an intention mode associated with shared mode, and there is one with exclusive mode.

6. If a node is locked in ______________ the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with exclusive-mode locks.

a) Intention lock modes

b) shared and intention-exclusive (SIX) mode

c) Intention-exclusive (IX) mode

d) Intention-shared (IS) mode

View Answer

 

Answer: b

Explanation: There is an intention mode associated with shared mode, and there is one with exclusive mode.

7. ____________ denotes the largest timestamp of any transaction that executed write(Q) successfully.

a) W-timestamp(Q)

b) R-timestamp(Q)

c) RW-timestamp(Q)

d) WR-timestamp(Q)

View Answer

 

Answer: a

Explanation: The most common method for doing ordering transaction is to use a timestamp-ordering scheme.

8. The _____________ ensures that any conflicting read and write operations are executed in timestamp order.

a) Timestamp-ordering protocol

b) Timestamp protocol

c) W-timestamp

d) R-timestamp

View Answer

 

Answer: a

Explanation: The most common method for doing ordering transaction is to use a timestamp-ordering scheme.

9. The __________ requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

a) Validation protocol

b) Validation-based protocol

c) Timestamp protocol

d) Timestamp-ordering protocol

View Answer

 

Answer: a

Explanation: A concurrency-control scheme imposes overhead of code execution and possible delay of transactions. It may be better to use an alternative scheme that imposes less overhead.

10. This validation scheme is called the _________ scheme since transactions execute optimistically, assuming they will be able to finish execution and validate at the end.

a) Validation protocol

b) Validation-based protocol

c) Timestamp protocol

d) Optimistic concurrency-control

View Answer

 

Answer: a

Explanation: A concurrency-control scheme imposes overhead of code execution and possible delay of transactions. It may be better to use an alternative scheme that imposes less overhead.

 

 

1. The most recent version of standard SQL prescribed by the American National Standards Institute is

a) SQL 2011

b) SQL 2002

c) SQL – 4

d) SQL2

View Answer

 

Answer: a

Explanation: SQL-99 is the most recent version of standard SQL prescribed by the ANSI.

2. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is

a) BETWEEN

b) IS NULL

c) LIKE

d) IN

View Answer

 

Answer: b

Explanation: Exists is used to check whether an attribute value is null or not in conjunction with the where clause.

3. A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a

a) Database-level lock

b) Table-level lock

c) Page-level lock

d) Row-level lock

View Answer

 

Answer: a

Explanation: Data base-level lock prevents the use of any tables in the data base from one transaction while other transaction is being processed.

4. A condition that occurs when two transactions wait for each other to unlock data is known as a(n)

a) Shared lock

b) Exclusive lock

c) Binary lock

d) Deadlock

View Answer

 

Answer: a

Explanation: Deadlock occurs when two transactions wait for each other to unlock data.

5. _______ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

a) Serializability

b) Atomicity

c) Isolation

d) Time stamping

View Answer

 

Answer: c

Explanation: Isolation means that data used during the execution of a transaction can’t be used by a second transaction until the first one is completed..

6. A unit of storage that can store one or more records in a hash file organization is denoted as

a) Buckets

b) Disk pages

c) Blocks

d) Nodes

View Answer

 

Answer: a

Explanation: Buckets are used to store one or more records in a hash file organization.

7. The file organization which allows us to read records that would satisfy the join condition by using one block read is

a) Heap file organization

b) Sequential file organization

c) Clustering file organization

d) Hash files organization

View Answer

 

Answer: c

Explanation: Clustering file organization allows us to read records that would satisfy the join condition by using one block read.

8. Which of the following is not true about B+ trees?

a) B+ tree index takes the form of balanced tree

b) Performance of B+ tree degrades as the file grows

c) Look-up in B+ tree is straightforward and efficient

d) Insertion and deletion in B+ tree is complicated but efficient

View Answer

 

Answer: b

Explanation: The answer is evident .

9. The extent of the database resource that is included with each lock is called the level of

a) Impact

b) Granularity

c) Management

d) DBMS control

View Answer

 

Answer: b

Explanation: The extent of the data base resource that is included with each lock is called the level of Granularity.

10. DBMS periodically suspends all processing and synchronizes its files and journals through the use of

a) Checkpoint facility

b) Backup facility

c) Recovery manager

d) Database change log

View Answer

 

Answer: a

Explanation: DBMS periodically suspends all processing and synchronizes its files and journals though the use of Check point facility.

 

1. Snapshot isolation is a particular type of ______________ scheme.

a) Concurrency-control

b) Concurrency-allowance

c) Redirection

d) Repetition-allowance

View Answer

 

Answer: a

Explanation: It has gained wide acceptance in commercial and open-source systems, including Oracle, PostgreSQL, and SQL Server.

2. Snapshot isolation is used to give

a) Transaction a snapshot of the database

b) Database a snapshot of the transaction

c) Database a snapshot of committed values in the transaction

d) Transaction a snapshot of the database and Database a snapshot of committed values in the transaction

View Answer

 

Answer: d

Explanation: The data values in the snapshot consist only of values written by committed transactions.

3. Lost update problem is

a) Second update overwrites the first

b) First update overwrites the second

c) The updates are lost due to conflicting problem

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Lost update problem has to be resolved.

4. Under first updater wins the system uses a __________ mechanism that applies only to updates.

a) Close

b) Read

c) Locking

d) Beat

View Answer

 

Answer: c

Explanation: Reads are unaffected by this, since they do not obtain locks.

5. When a transaction Ti attempts to update a data item, it requests a _________ on that data item.

a) Read lock

b) Update lock

c) Write lock

d) Chain lock

View Answer

 

Answer: c

Explanation: Reads are unaffected by this, since they do not obtain locks.

6. Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as

a) Read skew

b) Update skew

c) Write lock

d) None of the mentioned

View Answer

 

Answer: d

Explanation: Write skew is the issue addressed here.

7. An application developer can guard against certain snapshot anomalies by appending a ______ clause to the SQL select query.

a) For update

b) For read

c) For write

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Adding the for update clause causes the system to treat data that are read as if they had been updated for purposes of concurrency control.

8. Evaluate the CREATE TABLE statement:

 

CREATE TABLE products

(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));

Which statement is true regarding the PROD_ID_PK constraint?

a) It would be created only if a unique index is manually created first

b) It would be created and would use an automatically created unique index

c) It would be created and would use an automatically created no unique index

d) It would be created and remains in a disabled state because no index is specified in the command

View Answer

 

Answer: b

Explanation: Syntax: create table table_name(name constraint).

9. Evaluate the following CREATE SEQUENCE statement:

 

CREATE SEQUENCE seq1

START WITH 100

INCREMENT BY 10

MAXVALUE 200

CYCLE

NOCACHE;

The sequence SEQ1 has generated numbers up to the maximum limit of 200. You issue the following SQL statement:

SELECT seq1.nextval FROM dual;

What is displayed by the SELECT statement?

a) 1

b) 10

c) 100

d) an error

View Answer

 

Answer: a

Explanation: Sequence is used to generate a series of values.

10. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?

a) To find the groups forming the subtotal in a row

b) To create group-wise grand totals for the groups specified within a GROUP BY clause

c) To create a grouping for expressions or columns specified within a GROUP BY clause in one direction, from

right to left for calculating the subtotals

d) To create a grouping for expressions or columns specified within a GROUP BY clause in all possible

directions, which is cross-tabular report for calculating the subtotals

View Answer

 

Answer: c

Explanation: Sequence is used to generate a series of values.

 

1. Which statements are correct regarding indexes?

a) When a table is dropped, the corresponding indexes are automatically dropped

b) For each DML operation performed, the corresponding indexes are automatically updated

c) A non-deferrable PRIMARY KEY or UNIQUE KEY constraint in a table automatically creates a unique index

d) All of the mentioned

View Answer

 

Answer: d

Explanation: Indexes are used to access the data efficiently.

2. You executed the following SQL statements in the given order:

 

CREATE TABLE orders

(order_id NUMBER(3) PRIMARY KEY,

order_date DATE,

customer_idnumber(3));

 

INSERT INTO orders VALUES (100,'10-mar-2007,,222);

 

ALTER TABLE orders MODIFY order_date NOT NULL;

 

UPDATE orders SET customer_id=333;

 

DELETE FROM order;

The DELETE statement results in the following error:

ERROR at line 1: table or view does not exist

What would be the outcome?

a) All the statements before the DELETE statement would be rolled back

b) All the statements before the DELETE statement would be implicitly committed within the session

c) All the statements up to the ALTER TABLE statement would be committed and the outcome of UPDATE statement would be rolled back

d) All the statements up to the ALTER TABLE statement would be committed and the outcome of the UPDATE statement is retained uncommitted within the session

View Answer

 

Answer: d

Explanation: Committing a transaction refers to making the changes to record in the database.

3. Evaluate the following statements:

 

CREATE TABLE digits

(id NUMBER(2),

description VARCHAR2(15));

INSERT INTO digits VALUES (1,'ONE);

UPDATE digits SET description ='TWO'WHERE id=1;

INSERT INTO digits VALUES (2 ,'TWO');

COMMIT;

DELETE FROM digits;

SELECT description FROM digits

VERSIONS BETWEEN TIMESTAMP MINVALUE AND MAXVALUE;

What would be the outcome of the above query?

a) It would not display any values

b) It would display the value TWO once

c) It would display the value TWO twice

d) It would display the values ONE, TWO, and TWO

View Answer

 

Answer: c

Explanation: The VERSIONS BETWEEN clause of the SELECT statement is used to create a Flashback Version Query.

4. A non-correlated subquery can be defined as________

a) A set of sequential queries, all of which must always return a single value

b) A set of sequential queries, all of which must return values from the same table

c) A SELECT statement that can be embedded in a clause of another SELECT statement only

d) A set of one or more sequential queries in which generally the result of the inner query is used as the search value in the outer query

View Answer

 

Answer: d

Explanation: A noncorrelated subquery is subquery that is independent of the outer query and it can executed on its own without relying on main outer query.

5. Which statement is true regarding synonyms?

a) Synonyms can be created for tables but not views

b) Synonyms are used to reference only those tables that are owned by another user

c) A public synonym and a private synonym can exist with the same name for the same table

d) The DROP SYNONYM statement removes the synonym, and the status of the table on which the synonym has been created becomes invalid

View Answer

 

Answer: c

Explanation: A synonym is an alias or alternate name for a table, view, sequence, or other schema object. They are used mainly to make it easy for users to access database objects owned by other users.

6. SCOTT is a user in the database.

 

Evaluate the commands issued BY the DBA:

1 - CREATE ROLE mgr;

2 - GRANT CREATE TABLE, SELECT

ON oe. orders TO mgr;

3 - GRANT mgr, CREATE TABLE TO SCOTT;

Which statement is true regarding the execution of the above commands?

a) Statement 1 would not execute because the WITH GRANT option is missing

b) Statement 1 would not execute because the IDENTIFIED BY clause is missing

c) Statement 3 would not execute because role and system privileges cannot be granted together in a single GRANT statement

d) Statement 2 would not execute because system privileges and object privileges cannot be granted together in a single GRANT command

View Answer

 

Answer: d

Explanation: The GRANT statement is used to give privileges to a specific user or role, or to all users, to perform actions on database objects.

7. OE and SCOTT are the users in the database. The ORDERS table is owned by OE. Evaluate the statements issued by the DBA in the following sequence:

 

CREATE ROLE r1;

GRANT SELECT, INSERT ON oe. orders TO r1;

GRANT r1 TO scott;

GRANT SELECT ON oe. orders TO scott;

REVOKE SELECT ON oe.orders FROM scott;

What would be the outcome after executing the statements?

a) SCOTT would be able to query the OE.ORDERS table

b) SCOTT would not be able to query the OE.ORDERS table

c) The REVOKE statement would remove the SELECT privilege from SCOTT as well as from the role R1

d) The REVOKE statement would give an error because the SELECT privilege has been granted to the role R1

View Answer

 

Answer: a

Explanation: The REVOKE statement is used to remove privileges from a specific user or role, or from all users, to perform actions on database objects.

8. Given below are the SQL statements executed in a user session:

 

CREATE TABLE product

(pcode NUMBER(2),

pnameVARCHAR2(10));

INSERT INTO product VALUES(1, 'pen');

INSERT INTO product VALUES (2,'penci');

SAVEPOINT a;

UPDATE product SET pcode = 10 WHERE pcode = 1;

SAVEPOINT b;

DELETE FROM product WHERE pcode = 2;

COMMIT;

DELETE FROM product WHERE pcode=10;

ROLLBACK TO SAVEPOINT a;

Which statement describes the consequences?

a) No SQL statement would be rolled back

b) Both the DELETE statements would be rolled back

c) Only the second DELETE statement would be rolled back

d) Both the DELETE statements and the UPDATE statement would be rolled back

View Answer

 

Answer: d

Explanation: The SAVEPOINT statement names and marks the current point in the processing of a transaction. With the ROLLBACK TO statement, savepoints undo parts of a transaction instead of the whole transaction.

9. Evaluate the following command:

 

CREATE TABLE employees (employee_id NUMBER(2) PRIMARY KEY, last_name VARCHAR2(25) NOT

NULL, department_id NUMBER(2), job_id VARCHAR2(8), salary NUMBER(10,2));

You issue the following command TO CREATE a VIEW that displays the IDs AND LAST names OF the sales staff IN the organization:

CREATE OR REPLACE VIEW sales_staff_vu AS SELECT employee_id, last_name job_id FROM employees

WHERE job_id LIKE 'SA_%' WITH CHECK OPTION;

Which statements are true regarding the above view?

a) It allows you to insert details of all new staff into the EMPLOYEES table

b) It allows you to delete the details of the existing sales staff from the EMPLOYEES table

c) It allows you to update the job ids of the existing sales staff to any other job id in the EMPLOYEES table

d) It allows you to insert the IDs, last

View Answer

 

Answer: d

Explanation: SQL Create view syntax :

CREATE VIEW view_name AS

SELECT column_name(s)

FROM TABLE_NAME

WHERE condition.

10. EMPDET is an external table containing the columns EMPNO and ENAME. Which command would work in relation to the EMPDET table?

 

a) UPDATE empdet

SET ename = 'Amit'

WHERE empno = 1234;

b) DELETE FROM empdet

WHERE ename LIKE 'J%';

c) CREATE VIEW empvu

AS

SELECT* FROM empdept;

d) CREATE INDEX empdet_idx

ON empdet(empno);

View Answer

Answer: c

Explanation: External tables are created using the SQL CREATE TABLE…ORGANIZATION EXTERNAL statement. When an external table is created, you specify type ,default directory, access parameters and location.

 

1. The method of access that uses key transformation is called as

a) Direct

b) Hash

c) Random

d) Sequential

View Answer

 

Answer: b

Explanation: Hash technique uses particular hash key value.

2. Why do we need concurrency control on B+ trees ?

a) To remove the unwanted data

b) To easily add the index elements

c) To maintain accuracy of index

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Indices do not have to be treated like other database structures.

3. How many techniques are available to control concurrency on B+ trees?

a) One

b) Three

c) Four

d) None of the mentioned

View Answer

 

Answer: d

Explanation: Two techniques are present.

4. In crabbing protocol locking

a) Goes down the tree and back up

b) Goes up the tree and back down

c) Goes down the tree and releases

d) Goes up the tree and releases

View Answer

 

Answer: a

Explanation: It moves in a crab like manner.

5. The deadlock can be handled by

a) Removing the nodes that are deadlocked

b) Restarting the search after releasing the lock

c) Restarting the search without releasing the lock

d) Resuming the search

View Answer

 

Answer: b

Explanation: Crabbing protocol moves in a crab like manner.

6. In crabbing protocol the the lock obtained on the root node is in _________ mode.

a) Shared

b) Exclusive

c) Read only

d) None of the mentioned

View Answer

 

Answer: a

Explanation: Crabbing protocol moves in a crab like manner down the index tree.

7. If needed to split a node or coalesce it with its siblings, or redistribute key values between siblings, the crabbing protocol locks the parent of the node in ____________ mode.

a) Shared

b) Exclusive

c) Read only

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Crabbing protocol moves in a crab like manner down the index tree.

8. In crabbing protocol to inset or delete a key value the leaf node has to be locked in ___________ mode.

a) Shared

b) Exclusive

c) Read only

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Crabbing protocol moves in a crab like manner down the index tree.

9. B-link tree requires a pointer to its __________ sibling.

a) Upper

b) Lower

c) Right

d) Left

View Answer

 

Answer: c

Explanation: This pointer is required because a lookup that occurs while a node is being split may have to search not only that node but also that node’s right sibling.

10. Instead of locking index leaf nodes in a two-phase manner, some index concurrency-control schemes use ___________ on individual key values, allowing other key values to be inserted or deleted from the same leaf.

a) B+ tree locking

b) Link level locking

c) Key-value locking

d) Next value locking

View Answer

 

Answer: c

Explanation: Key-value locking thus provides increased concurrency.

 

1. The recovery scheme must also provide

a) High availability

b) Low availability

c) High reliability

d) High durability

View Answer

 

Answer: a

Explanation: It must minimize the time for which the database is not usable after a failure.

2. Which one of the following is a failure to system

a) Boot crash

b) Read failure

c) Transaction failure

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Types of system failure are transaction failure, system crash and disk failure.

3. Which of the following belongs to transaction failure

a) Read error

b) Boot error

c) Logical error

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Types of system transaction failure are logical and system error.

4. The system has entered an undesirable state (for example, deadlock), as a result of which a transaction cannot continue with its normal execution. This is

a) Read error

b) Boot error

c) Logical error

d) System error

View Answer

 

Answer: c

Explanation: The transaction, can be re-executed at a later time.

5. The transaction can no longer continue with its normal execution because of some internal condition, such as bad input, data not found, overflow, or resource limit exceeded. This is

a) Read error

b) Boot error

c) Logical error

d) System error

View Answer

 

Answer: c

Explanation: The transaction, can be re-executed at a later time.

6. The assumption that hardware errors and bugs in the software bring the system to a halt, but do not corrupt the nonvolatile storage contents, is known as the

a) Stop assumption

b) Fail assumption

c) Halt assumption

d) Fail-stop assumption

View Answer

 

Answer: d

Explanation: Well-designed systems have numerous internal checks, at the hardware and the software level, that bring the system to a halt when there is an error. Hence, the fail-stop assumption is a reasonable one.

7. Which kind of failure loses its data in head crash or failure during transfer operation.

a) Transaction failure

b) System crash

c) Disk failure

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Copies of the data on other disks, or archival backups on tertiary media, such as DVD or tapes, are used to recover from the failure.

8. The failure occurred sufficiently early during the transfer that the destination block remains intact.

a) Partial Failure

b) Total failure

c) Successful completion

d) Data transfer failure

View Answer

 

Answer: a

Explanation: Copies of the data on other disks, or archival backups on tertiary media, such as DVD or tapes, are used to recover from the failure.

9. The database is partitioned into fixed-length storage units called

a) Parts

b) Blocks

c) Reads

d) Build

View Answer

 

Answer: b

Explanation: Blocks are the units of data transfer to and from disk, and may contain several data items.

10. Which of the following causes system to crash

a) Bug in software

b) Loss of volatile data

c) Hardware malfunction

d) All of the mentioned

View Answer

 

Answer: d

Explanation: The content of non-volatile storage remains intact, and is not corrupted.

 

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “Recovery”.

1. The log is a sequence of _________ recording all the update activities in the database.

a) Log records

b) Records

c) Entries

d) Redo

View Answer

 

Answer: a

Explanation: The most widely used structure for recording database modifications is the log.

2. In the ___________ scheme, a transaction that wants to update the database first creates a complete copy of the database.

a) Shadow copy

b) Shadow Paging

c) Update log records

d) All of the mentioned

View Answer

 

Answer: a

Explanation: If at any point the transaction has to be aborted, the system merely deletes the new copy. The old copy of the database has not been affected.

3. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.

a) Shadow copy

b) Shadow Paging

c) Update log records

d) All of the mentioned

View Answer

 

Answer: b

Explanation: Any page which is not updated by a transaction is not copied, but instead the new page table just stores a pointer to the original page.

4. The current copy of the database is identified by a pointer, called ____________ which is stored on disk.

a) Db-pointer

b) Update log

c) Update log records

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Any page which is not updated by a transaction is not copied, but instead the new page table just stores a pointer to the original page.

5. If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.

a) Deferred-modification

b) Late-modification

c) Immediate-modification

d) Undo

View Answer

 

Answer: a

Explanation: Deferred modification has the overhead that transactions need to make local copies of all updated data items; further, if a transaction reads a data item that it has updated, it must read the value from its local copy.

6. If database modifications occur while the transaction is still active, the transaction is said to use the ___________technique.

a) Deferred-modification

b) Late-modification

c) Immediate-modification

d) Undo

View Answer

 

Answer: c

Explanation: We say a transaction modifies the database if it performs an update on a disk buffer, or on the disk itself; updates to the private part of main memory do not count as database modifications.

7. ____________ using a log record sets the data item specified in the log record to the old value.

a) Deferred-modification

b) Late-modification

c) Immediate-modification

d) Undo

View Answer

 

Answer: d

Explanation: Undo brings the previous contents.

8. In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.

a) Repeating

b) Redo

c) Replay

d) Undo

View Answer

 

Answer: b

Explanation: Undo brings the previous contents.

9. The actions which are played in the order while recording it is called ______________ history.

a) Repeating

b) Redo

c) Replay

d) Undo

View Answer

 

Answer: a

Explanation: Undo brings the previous contents.

10. A special redo-only log record <Ti , Xj , V1> is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called

a) Log records

b) Records

c) Compensation log records

d) Compensation redo records

View Answer

 

Answer: c

Explanation: Such records do not need undo information, since we never need to undo such an undo operation.

 

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “Buffer Management”.

1. In order to reduce the overhead in retrieving the records from the storage space we use

a) Logs

b) Log buffer

c) Medieval space

d) Lower records

View Answer

 

Answer: b

Explanation: The output to stable storage is in units of blocks.

2. The order of log records in the stable storage ____________ as the order in which they were written to the log buffer.

a) Must be exactly the same

b) Can be different

c) Is opposite

d) Can be partially same

View Answer

 

Answer: a

Explanation: As a result of log buffering, a log record may reside in only main memory (volatile storage) for a considerable time before it is output to stable storage.

3. Before a block of data in main memory can be output to the database, all log records pertaining to data in that block must have been output to stable storage. This is

a) Read-write logging

b) Read-ahead logging

c) Write-ahead logging

d) None of the mentioned

View Answer

 

Answer: c

Explanation: The WAL rule requires only that the undo information in the log has been output to stable storage, and it permits the redo information to be written later.

4. Writing the buffered log to __________ is sometimes referred to as a log force.

a) Memory

b) Backup

c) Redo memory

d) Disk

View Answer

 

Answer: d

Explanation: If there are insufficient log records to fill the block, all log records in main memory are combined into a partially full block and are output to stable storage.

5. The _______________ policy, allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk.

a) Force

b) No-force

c) Steal

d) No-steal

View Answer

 

Answer: b

Explanation: No-force policy allows faster commit of transactions.

6. ______________ policy allows multiple updates to accumulate on a block before it is output to stable storage, which can reduce the number of output operations greatly for frequently updated blocks.

a) Force

b) No-force

c) Steal

d) No-steal

View Answer

 

Answer: b

Explanation: No-force policy allows faster commit of transactions.

7. The ___________ policy, allows the system to write modified blocks to disk even if the transactions thatmade those modifications have not all committed.

a) Force

b) No-force

c) Steal

d) No-steal

View Answer

 

Answer: c

Explanation: The no-steal policy does not work with transactions that perform a large number of updates.

8. Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing them in a non-two-phase manner does not have any implications on transaction serializability. This is

a) Latches

b) Swap Space

c) Dirty Block

d) None of the mentioned

View Answer

 

Answer: a

Explanation: These locks, and other similar locks that are held for a short duration.

9. The __________________ contains a list of blocks that have been updated in the database buffer.

a) Latches

b) Swap Space

c) Dirty Block

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Dirty blocks are those that have been updated in memory, and the disk version is not up-to-date.

10. The operating system reserves space on disk for storing virtual-memory pages that are not currently in main memory; this space is called

a) Latches

b) Swap Space

c) Dirty Block

d) None of the mentioned

View Answer

 

Answer: b

Explanation: Almost all current-generation operating systems retain complete control of virtual memory.

 

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “Failure with Nonvolatile Storage”.

1. The silicon chips used for data processing are called

a) RAM chips

b) ROM chips

c) Micro processors

d) PROM chips

View Answer

 

Answer: d

Explanation: PROM is Programmable Read Only Memory.

2. Which of the following is used for manufacturing chips?

a) Control bus

b) Control unit

c) Parity unit

d) Semiconductor

View Answer

 

Answer: d

Explanation: A semiconductor is a material which has electrical conductivity between that of a conductor such as copper and that of an insulator such as glass.

3. What was the name of the first commercially available microprocessor chip?

a) Intel 308

b) Intel 33

c) Intel 4004

d) Motorola 639

View Answer

 

Answer: c

Explanation: The Intel 4004 is a 4-bit central processing unit (CPU) released by Intel Corporation in 1971

4. The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as

a) Magnetic core memory

b) Magnetic tape memory

c) Magnetic disk memory

d) Magnetic bubble memory

View Answer

 

Answer: d

Explanation: Bubble domain visualization by using CMOS-MagView.

5. The ALU of a computer normally contains a number of high speed storage element called

a) Semiconductor memory

b) Registers

c) Hard disks

d) Magnetic disk

View Answer

 

Answer: b

Explanation: External control unit tells the ALU what operation to perform on that data, and then the ALU stores its result into an output register.

6. Which of the following is used only for data entry and storage, and never for processing?

a) Mouse

b) Dumb terminal

c) Micro computer

d) Dedicated data entry system

View Answer

 

Answer: b

Explanation: Dumb terminals are those that can interpret a limited number of control codes.

7. Non-volatile storage needs to have a _________ where the loses in future can be recovered.

a) Dump

b) Recover place

c) Disk

d) Redo plan

View Answer

 

Answer: a

Explanation: The basic scheme is to dump the entire contents of the database to stable storage periodically—say, once per day.

8. A dump of the database contents is also referred to as an _____________ dump.

a) Archival

b) Fuzzy

c) SQL

d) All of the mentioned

View Answer

 

Answer: a

Explanation: We can archive the dumps and use them later to examine old states of the database.

9. ________ dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re-create the database.

a) Archival

b) Fuzzy

c) SQL

d) All of the mentioned

View Answer

 

Answer: c

Explanation: Such dumps are useful when migrating data to a different instance of the database, or to a different version of the database software, since the physical locations and layout may be different in the other database instance or database software version.

10. _________ dump schemes have been developed that allow transactions to be active while the dump is in progress.

a) Archival

b) Fuzzy

c) SQL

d) All of the mentioned

View Answer

 

Answer: b

Explanation: The simple dump procedure described here is costly and so fuzzy dump is used.

 

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “ARIES”.

1. ARIES uses a ___________ to identify log records, and stores it in database pages.

a) Log sequence number

b) Log number

c) Lock number

d) Sequence

View Answer

 

Answer: b

Explanation: LSN to is used identify which operations have been applied to a database page.

2. ARIES supports ___________ operations, which are physical in that the affected page is physically identified, but can be logical within the page.

a) Physiological redo

b) Physiological undo

c) Logical redo

d) Logical undo

View Answer

 

Answer: a

Explanation: The deletion of a record from a page may result in many other records in the page being shifted, if a slotted page structure is used.

3. ______________ is used to minimize unnecessary redos during recovery.

a) Dirty page table

b) Page table

c) Dirty redo

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Dirty pages are those that have been updated in memory, and the disk version is not up-to-date.

4. __________ scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.

a) Fuzzy logic

b) Checkpoints

c) Fuzzy-checkpoint

d) Logical checkpoint

View Answer

 

Answer: c

Explanation: It flushes dirty pages in the background, continuously, instead of writing them during checkpoints.

5. Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the _______ field of the page.

a) LSN

b) ReadLSN

c) PageLSN

d) RedoLSN

View Answer

 

Answer: c

Explanation: Each page maintains an identifier called the PageLSN.

6. There are special redo-only log records generated during transaction rollback, called _________ in ARIES.

a) Compensation log records

b) Read log records

c) Page log records

d) Redo log records

View Answer

 

Answer: a

Explanation: These serve the same purpose as the redo-only log records in our earlier recovery scheme.

7. The __________________ contains a list of pages that have been updated in the database buffer.

a) Dirty page table

b) Page table

c) Dirty redo

d) All of the mentioned

View Answer

 

Answer: a

Explanation: Dirty pages are those that have been updated in memory, and the disk version is not up-to-date.

8. ___________ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.

a) Analysis pass

b) Redo pass

c) Undo pass

d) None of the mentioned

View Answer

 

Answer: a

Explanation: The analysis pass finds the last complete checkpoint log record, and reads in the DirtyPageTable from this record.

9. __________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.

a) Analysis pass

b) Redo pass

c) Undo pass

d) None of the mentioned

View Answer

 

Answer: b

Explanation: The redo pass repeats history by replaying every action that is not already reflected in the page on disk.

10. ______________ rolls back all transactions that were incomplete at the time of crash.

a) Analysis pass

b) Redo pass

c) Undo pass

d) None of the mentioned

View Answer

 

Answer: c

Explanation: It performs a single backward scan of the log, undoing all transactions in undo-list.

 

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “Lock Release and Undo Operations”.

1. Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.

a) Higher-level lock

b) Lower-level lock

c) Read only lock

d) Read write

View Answer

 

Answer: a

Explanation: Operations acquire lower-level locks while they execute, but release them when they complete; the corresponding transaction must however retain a higher-level lock in a two-phase manner to prevent concurrent transactions from executing conflicting actions.

2. Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called

a) Logical operation

b) Redo operation

c) Logical undo operation

d) Undo operation

View Answer

 

Answer: a

Explanation: It is important that the lower-level locks acquired during an operation are sufficient to perform a subsequent logical undo of the operation.

3. Which of the following is used for undo operations alone ?

a) Logical logging

b) Physical logging

c) Physical log records

d) Physical logging and Physical log records

View Answer

 

Answer: a

Explanation: If the operation inserted an entry in a B+-tree, the undo information U would indicate that a deletion operation is to be performed, and would identify the B+-tree and what entry to delete from the tree. Such logging of information about operations is called logical logging.

4. Redo operations are performed exclusively using

a) Logical logging

b) Physical logging

c) Physical log records

d) Both Physical logging and Physical log records

View Answer

 

Answer: d

Explanation: Logging of old-value and new-value information is called physical logging.

5. To perform logical redo or undo, the database state on disk must be operation ___________ that is, it should not have partial effects of any operation.

a) Persistent

b) Resistant

c) Consistent

d) None of the mentioned

View Answer

 

Answer: c

Explanation: Data structures such as B+-trees would not be in a consistent state, and neither logical redo nor logical undo operations can be performed on an inconsistent data structure.

6. An operation is said to be __________ if executing it several times in a row gives the same result as executing it once.

a) Idempotent

b) Changed

c) Repetitive

d) All of the above

View Answer

 

Answer: a

Explanation: Operations such as inserting an entry into a B+-tree may not be idempotent, and the recovery algorithm must therefore make sure that an operation that has already been performed is not performed again.

7. Immediate database modification technique uses

a) Both undo and redo

b) Undo but no redo

c) Redo but no undo

d) Neither undo nor redo

View Answer

 

Answer: a

Explanation: Undo erases all the changes and redo makes the deleted changes.

8. Shadow paging has

a) no redo

b) no undo

c) redo but no undo

d) neither redo nor undo

View Answer

 

Answer: a

Explanation: Undo erases all the changes and redo makes the deleted changes.

9. For correct behaviour during recovery, undo and redo operation must be

a) Commutative

b) Associative

c) Idempotent

d) Distributive

View Answer

 

Answer: c

Explanation: Undo erases all the changes and redo makes the deleted changes.

10. If ___________ are not obtained in undo operation it will cause problem in undo-phase.

a) Higher-level lock

b) Lower-level lock

c) Read only lock

d) Read write

View Answer

 

Answer: b

Explanation: Operations acquire lower-level locks while they execute, but release them when they complete; the corresponding transaction must however retain a higher-level lock in a two-phase manner to prevent concurrent transactions from executing conflicting actions.

 

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “Remote Backup Systems”.

1. The remote backup site is sometimes also called the

a) Primary Site

b) Secondary Site

c) Tertiary Site

d) None of the mentioned

View Answer

 

Answer: b

Explanation: We can achieve high availability by performing transaction processing at one site, called the primary site, and having a remote backup site where all the data from the primary site are replicated.

2. Remote backup system must be _________ with the primary site.

a) Synchronised

b) Separated

c) Connected

d) Detached but related

View Answer

 

Answer: a

Explanation: We can achieve high availability by performing transaction processing at one site, called the primary site, and having a remote backup site where all the data from the primary site are replicated.

3. The backup is taken by

a) Erasing all previous records

b) Entering the new records

c) Sending all log records from primary site to the remote backup site

d) Sending selected records from primary site to the remote backup site

View Answer

 

Answer: c

Explanation: We can achieve high availability by performing transaction processing at one site, called the primary site, and having a remote backup site where all the data from the primary site are replicated.

4. When the __________ the backup site takes over processing and becomes the primary.

a) Secondary fails

b) Backup recovers

c) Primary fails

d) None of the mentioned

View Answer

 

Answer: c

Explanation: When the original primary site recovers, it can either play the role of remote backup, or take over the role of primary site again.

5. The simplest way of transferring control is for the old primary to receive __________ from the old backup site.

a) Undo logs

b) Redo Logs

c) Primary Logs

d) All of the mentioned

View Answer

 

Answer: c

Explanation: If control must be transferred back, the old backup site can pretend to have failed, resulting in the old primary taking over.

6. The time to process the remote backup can be reduced by

a) Flags

b) Breakpoints

c) Redo points

d) Checkpoints

View Answer

 

Answer: d

Explanation: If the log at the remote backup grows large, recovery will take a long time. The remote backup site can periodically process the redo log records that it has received and can perform a checkpoint, so that earlier parts of the log can be deleted.

7. A _______________ configuration can make takeover by the backup site almost instantaneous.

a) Hot-spare

b) Remote

c) Direct

d) Spare

View Answer

 

Answer: d

Explanation: In this configuration, the remote backup site continually processes redo log records as they arrive, applying the updates locally.

8. A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is

a) One Safe

b) Two Safe

c) Two-very Safe

d) Very Safe

View Answer

 

Answer: a

Explanation: The problem with this scheme is that the updates of a committed transaction may not have made it to the backup site, when the backup site takes over processing.

9. A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is

a) One Safe

b) Two Safe

c) Two-very Safe

d) Very Safe

View Answer

 

Answer: c

Explanation: The problem with this scheme is that transaction processing cannot proceed if either the primary or the backup site is down.

10. If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is

a) One Safe

b) Two Safe

c) Two-very Safe

d) Very Safe

View Answer

 

Answer: b

Explanation: This scheme provides better availability than does two-very-safe,while avoiding the problem of lost transactions faced by the one-safe scheme

Topic :Software & Types, Subject: Computer Fundamental Notes for CSJM University Kanpur(for different courses like BBA, BCA, etc..)

Software Software refers to the programs, data, and instructions that enable a computer or other digital device to perform specific tasks or...