Wednesday 1 August 2012

MC0067, MCA-2, Database Management System


Database Management System

Q.1.      The task associated with gathering the data as and when they originate is referred to as
            (1) data capture(2) data classification     (3) data storage(4) none

Q.2.      Captured data has to be classified based on the nature and intended usage is refereed as_________
            (1) data capture(2) data classification     (3) data storage(4) none

Q.3.      Which of the following task is not related to data management
            (1) data capture(2) data classification     (3) data storage(4) all(5) none

Q.4.      The function where data is for worded to the place where it would be used further is the task as
            (1) data transmission(2) data retrieval     (3) data maintenance(4) data capture

Q.5.      ________ indicate all the sequences ho data general, stored and processed
            (1) DFD (2) ERD            (3) both (1) and(2)(4) none

Q.6.      ________requires that data should be made available to only authorized user
            (1) security(2) privacy    (3) data integrity (4) none

Q.7.      ___________refers to the rights of individuals and organization so that they can decide who could be permitted access to their data
            (1) security(2) privacy    (3) data integrity(4) none

Q.8.      _______ refers to the correctness of stored data ,which is application dependent
            (1) security(2) privacy    (3) data integrity (4) none

Q.9.      _________ should have a central repository with data description at both logical and physical levels
            (1) DBMS(2) access      (3) oracle (4) none

Q.10.    Which statement is true related to the DBMS
            (1) DBMS should support data independence to reduce the cost of maintenance(2) DBMS should also provide good efficiency          (3) all(4) DBMS should provide tools to protect and recover data

Q.11.    DBMS handles user program with
            (1)two layer (2) four layer           (3) three layer(4) none of these

Q.12.    The users who supply data to the database and receive the output are called
            (1) end users(2) programmers    (3) DBA(4) none

Q.13.    Which type of utility is not provided by DBMS
            (1) a data loading(2) a back up   (3) recovery(4) none(5) all

Q.14.    ________ is responsible to collect information needs of various users
            (1) DBA(2) programmer  (3) end user(4) none

Q.15.    The utility which allows easy loading of data form the external format is called_________
            (1) a data loading (2) a back up  (3) recovery (4) monitoring

Q.16.    The utility that allows to make copies of the data base periodically to help in cases of crashes
            (1) loading(2) backup     (3) recovery(4) monitoring

Q.17.    A predominant and successful product was developed by Bachmann called_____
            (1) IDS(2) PDS  (3) GDS(4) none

Q.18.    __________ is used to represent real facts of the application
            (1) ERmodel (2) data model       (3) none(4) detailed

Q.19.    ________is the most basic concept in ER model that represent important objects in the real application
            (1) entity(2) object         (3) attribute(4) touple

Q.20.    _________ is a collection of similar entities
            (1) entity(2) object         (3) atribute(4) attribute set

Q.21.    The roll number attribute may be of integer type and range of
            (1) 0-100(2) 0-200           (3) 100-100(4) 0-500

Q.22.    __________may be single valued or multivalued
            (1) entity(2) attribute       (3) entity set(4) none

Q.23.    Entities interact with each other and these interactions are captured through the concept of____
            (1) attribute(2) relationship          (3) entity set(4) none

Q.24.    The concept of relation ship set is used for grouping relationship of________
            (1) same type(2) different type   (3) both (1)or (2)(4) none

Q.25.    _________indicates how many instances from one entity set may be related to an entity form another entity set
            (1) cardinality(2) domain (3) entity set (4) none

Q.26.    Where one entity in A may be associated at most with one entity in B is referred to as
            (1) one to one(2) one to many    (3) many to one(4) many to many

Q.27     ___________ is a minimal super key
            (1) candidate key(2) primary key (3) foreign key(4) none

Q.28     A weak entity will always be related to ___________
            (1) one strong many(2) one or more strong entity            (3) one and many(4) two strong entity

Q.29     Specialization is the concept of ___________
            (1) DFD(2) none            (3) E-R model(4) EER model

Q.30     The concept provided in the extended ER model is the concept of ________
            (1) specialization (2) aggregation            (3) modulization(4) none

Q.31     The rows of a relation are called_________
            (1) attributes (2) tuples   (3) degree(4) cardinality

Q.32     The attributes draw values from a domain, domain is
            (1) any set of values(2) legal pool of values        (3) illegal pool of values(4) none

Q.33.    The number of attributes in a relation is called _________
            (1) cardinality(2) degree (3) tuple(4) none

Q.34.    _________defines the structure of a relation which consists of fixed set of attribute domain pairs
            (1) schema(2) domain    (3) table(4) records

Q.35.    An __________of a relation is time varying set of tuples where each tuples consists of attribute value pairs
            (1) instance(2) object     (3) class (4) none

Q.36.    ________is a set of attributes
            (1) super key(2) candidate key    (3) primary key(4) none

Q.37.    __________is a set of attributes that form a super key but no proper subset of which is a super key
            (1) candidate key(2) primary key (3) super key(4) none

Q.38.    A primary key is chosen by_______
            (1) data base designer(2) end user         (3) programmers(4) none

Q.39.    A binary operator that combines information of two relations
            (1) project(2) select        (3) join(4) Cartesian product

Q.40.    A binary operator that concatenates only tuples
            (1) join (2) project          (3) union(4) intersection

Q.41.    ________ operator can be used to answer quires of the form are union compatible and used as % operator
            (1) divide(2) union          (3) intersection(4) none

Q.42.    Database design can be classified in to
            (1) two categories(2) three categories     (3) four categories(4) none

Q.43.    Which is not the type of data base
            (1) operational data base
(2) control data base    
(3) strategic planning database
(4) none

Q.44.    E-R model represents the conceptual entities and their inter relationship at ____
            (1) physical level(2) external level           (3) logical level(4) none

Q.45.    Normalization is based on the________
            (1) dependencies(2) dependency b/w attribute of a table (3) attributes and entities(4) attributes

Q.46.    Normalization is carried out in__________
            (1) zero stages(2) two stages     (3) three stages(4) none

Q.47.    The purpose of second normal form is to eliminate
            (1) part key dependency(2) non key attributes     (3) key attributes(4) none

Q.48.    SQL I based on________
            (1) relational algebra                  (2) relational calculus    
(3) either (1) or(2)                       (4) none
(5) both (1)and(2)

Q.49.    SQL has main components
            (1) DDL(2) DML (3) DCL(4) All(5) none

Q.50.    The exact number includes the data types
            (1) integer(2) smallint     (3) all(4) none(5) numeric

Q.51.    Real,double,precision,float comes under category
            (1) exact number(2) character string        (3) exact number(4) none

Q.52.    Aggregate functions are________
            (1) DDL statement (2) DML statement     (3) DLL statement(4) all

Q.53.    Which is not the DDL statement
            (1) create(2) drop           (3) alter(4) none(5)all

Q.54.    In the aggregate function count(*) * means
            (1) number of tables(2) number to tables            (3) number of attributes(4) can not measure

Q.55.    Which function are used to manipulate values
            (1) value  (2) aggregate  (3) sum(4) none

Q.56.    String value functions take one or more strings as input return ________as the result
            (1) number(2) character  (3) string(4) none

Q.57.    The function which takes a character as an operand and strips leading trailing
            (1) trim(2) value (3) upper(4) lower

Q.58.    Special form of the class of the simple comparison predicates
            (1) between                   (2) not between
(3) either(1) or(2)            (4) both (1) and (2)

Q.59.    ___________ predicate is used to figure whether column name is null or not
            (1) null(2) not null           (3) zero(4) unspecified data type

Q.60.    ___________predicate is essentially used to search for pattern in target string ,where I character________and___________are used to perform pattern matching
            (1) search,&,%(2) like,%,-           (3) search,%,$(4) none

Q.61.    Which statement is true related to sub query
            (1) sub queries are query within query(2) sub queries are special type of query     (3) sub queries are top most query(4) none

Q.62.    The exist predicate checks if the cardinality of a query is________
            (1)  (2)   (3) >0(4) <0

Q.63.    The________ predicate is used to determine whether the result of the table contains duplicate rows
            (1) not null(2) duplicate  (3) unique(4) not null

Q.64.    ______is a combination of join and union
            (1) new join(2) outer join (3) union join(4) none

Q.65.    Views are__________ which is essentially a logical window on real tables
            (1) real(2) virtual (3) physical(4) external

Q.66.    Armstrong’s Axioms are also known as
            (1) inference rules(2) reflexivity property (3) augmentation(4) none

Q.67.    A relation is called in first normal form if all its
            (1) attributes are atomic
(2) rows are duplicate   
(3) attributes are not atomic
(4) none

Q.68.    Which of the following statement is true
            (1) all non key attributes be functionally dependent on non key attribute
(2) the first normal form suffers from update anomaly    
(3) in third normal form the table must not have any transitivity property
(4) all                           
(5)none

Q.69.    The third normal form is the transformation of BCNF
            (1) true (2) false (3) can not determine(4) does not matter

Q.70.    The schemes design consists of defining_________
            (1) tables(2) keys           (3) attributes(4) none(5)all

Q.71.    In schema design the synthetic approach is the form of 
            (1) bottom up approach
(2) top down approach 
(3) either (1)or(2)
(4) none

Q.72.    Multivalued dependency is denoted by
            (1) > (2) <     (3)  <(4)   > >

Q.73.    For what condition augmentation property is true
            (1) if x y then xz  yz(2) if xy,y z then x z  (3) both (1)and (3)(4) both (2)(3)

Q.74.    A file can be of type
            (1) master file(2) transaction file (3) reference file(4) all

Q.75.    The basic access method of records in a file
            (1) sequential (2) random           (3) dynamic(4) all

Q.76.    To evaluate the performance of  a file organization the application parameters are
            (1)hit ratio (2) volatility   (3) access key and frequency(4) all

Q.77.    The parameter hit ratio is used to
            (1) find the percentage of file records will be accessed
(2) find the percentage of file records will be added       
(3) find the fields which are used for accessing the records
(4) none

Q.78.    A sequential file has its records stored in______
            (1) logical sequence (2) physical sequence         (3) sequence is not mandatory (4) none

Q.79.    A relationship b/w two record types is often implemented using pointer called
            (1) record pointer (2) null pointer (3) pointer (4) none

Q.80.    The types of indexes which are used in searching
            (1) track index               (2) cylinder index          
(3) master index            (4) only (1) (2)(5) all (1) (2)&(3)

Q.81.    The no of reads required for searching the index
            (1) two reads(2) three reads        (3) four reads(4)

Q.82.    The sequence of operations which are normally supported for the indexed sequential file
            (1) read,open,write,rewrite,delete(2) open ,read,write,rewrite,delete           (3) read,open,write,rewrite,delete(4) write,read,open,rewrite,delete

Q.83.    A file permits random access on filed that is key field in the record is called
            (1) sequence(2) indexes (3) hashed (4) none

Q.84.    B-tree practical and efficient method for organization
            (1) sequence(2) indexes (3) pointers(4) records

Q.85.    A varying length record may be stored using methods
            (1) reserved space(2) using pointers       (3) combined method(4) all(5) none

Q.86.    The hierarchical modes can easily represent
            (1) one-to-one(2) one-to-many    (3) many-to one(4) one-to-one

Q.87.    Which statement is not true for the virtual records
            (1) none(2) a virtual record is a record by itself    (3) a virtual record is a record by itself(4) a real record is a virtual record

Q.88.    The access method are used by IMS are
            (1) HSAM(2) HISM         (3) HDAM(4) HIDAM

Q.89.    Transactional manager is a part
            (1) DBMS(2) RDBM       (3) DDBMS(4) None

Q.90.    Tm includes
            (1) buffer manager(2) recovery manager (3) scheduler(4) transaction manager

Q.91.    The components and responsibilities of TMs
(1) root agent of transaction coordinates execution of agents at all sites
(2) DTM agent of exchange messages to implement 2 phase commit     
(3) LTMs implement local actions they do not communized message among themselves
(4) none

Q.92.    Database server functions are (a data management (b transaction management(c back recovery(d query optimization
            (1) only (a)        (2) only (a),(b)
            (3) a,b,c            (4) all

Q.93.    Which of the following is not the internal sorting algorithms
            (1) bubble sort(2) merge sort      (3) quick sort(4)None

No comments:

Post a Comment