Database Management System
Q.1. The task associated with
gathering the data as and when they originate is referred to as
(1) data capture(2) data
classification (3) data storage(4)
none
Q.2. Captured data has to be
classified based on the nature and intended usage is refereed as_________
(1) data capture(2) data
classification (3) data storage(4)
none
Q.3. Which of the following
task is not related to data management
(1) data capture(2) data
classification (3) data storage(4)
all(5) none
Q.4. The function where data is
for worded to the place where it would be used further is the task as
(1) data transmission(2)
data retrieval (3) data maintenance(4)
data capture
Q.5. ________ indicate all the
sequences ho data general, stored and processed
(1) DFD (2) ERD (3) both (1) and(2)(4) none
Q.6. ________requires that data
should be made available to only authorized user
(1) security(2) privacy (3) data integrity (4) none
Q.7. ___________refers to the
rights of individuals and organization so that they can decide who could be
permitted access to their data
(1) security(2) privacy (3) data integrity(4) none
Q.8. _______ refers to the
correctness of stored data ,which is application dependent
(1) security(2) privacy (3) data integrity (4) none
Q.9. _________ should have a
central repository with data description at both logical and physical levels
(1) DBMS(2) access (3) oracle (4) none
Q.10. Which statement is true
related to the DBMS
(1) DBMS should support
data independence to reduce the cost of maintenance(2) DBMS should also provide
good efficiency (3) all(4) DBMS
should provide tools to protect and recover data
Q.11. DBMS handles user program
with
(1)two layer (2) four
layer (3) three layer(4) none of
these
Q.12. The users who supply data
to the database and receive the output are called
(1) end users(2)
programmers (3) DBA(4) none
Q.13. Which type of utility is
not provided by DBMS
(1) a data loading(2) a
back up (3) recovery(4) none(5) all
Q.14. ________ is responsible to
collect information needs of various users
(1) DBA(2) programmer (3) end user(4) none
Q.15. The utility which allows
easy loading of data form the external format is called_________
(1) a data loading (2) a
back up (3) recovery (4) monitoring
Q.16. The utility that allows to
make copies of the data base periodically to help in cases of crashes
(1) loading(2) backup (3) recovery(4) monitoring
Q.17. A predominant and
successful product was developed by Bachmann called_____
(1) IDS(2) PDS (3) GDS(4) none
Q.18. __________ is used to
represent real facts of the application
(1) ERmodel (2) data
model (3) none(4) detailed
Q.19. ________is the most basic
concept in ER model that represent important objects in the real application
(1) entity(2) object (3) attribute(4) touple
Q.20. _________ is a collection
of similar entities
(1) entity(2) object (3) atribute(4) attribute set
Q.21. The roll number attribute
may be of integer type and range of
(1) 0-100(2) 0-200 (3) 100-100(4) 0-500
Q.22. __________may be single
valued or multivalued
(1) entity(2) attribute (3) entity set(4) none
Q.23. Entities interact with each
other and these interactions are captured through the concept of____
(1) attribute(2)
relationship (3) entity set(4)
none
Q.24. The concept of relation
ship set is used for grouping relationship of________
(1) same type(2)
different type (3) both (1)or (2)(4)
none
Q.25. _________indicates how many
instances from one entity set may be related to an entity form another entity
set
(1) cardinality(2)
domain (3) entity set (4) none
Q.26. Where one entity in A may
be associated at most with one entity in B is referred to as
(1) one to one(2) one to
many (3) many to one(4) many to many
Q.27 ___________ is a minimal
super key
(1) candidate key(2) primary
key (3) foreign key(4) none
Q.28 A weak entity will always
be related to ___________
(1) one strong many(2)
one or more strong entity (3)
one and many(4) two strong entity
Q.29 Specialization is the
concept of ___________
(1) DFD(2) none (3) E-R model(4) EER model
Q.30 The concept provided in the
extended ER model is the concept of ________
(1) specialization (2)
aggregation (3) modulization(4)
none
Q.31 The rows of a relation are
called_________
(1) attributes (2)
tuples (3) degree(4) cardinality
Q.32 The attributes draw values
from a domain, domain is
(1) any set of values(2)
legal pool of values (3) illegal
pool of values(4) none
Q.33. The number of attributes in
a relation is called _________
(1) cardinality(2)
degree (3) tuple(4) none
Q.34. _________defines the
structure of a relation which consists of fixed set of attribute domain pairs
(1) schema(2) domain (3) table(4) records
Q.35. An __________of a relation
is time varying set of tuples where each tuples consists of attribute value
pairs
(1) instance(2) object (3) class (4) none
Q.36. ________is a set of
attributes
(1) super key(2)
candidate key (3) primary key(4) none
Q.37. __________is a set of
attributes that form a super key but no proper subset of which is a super key
(1) candidate key(2)
primary key (3) super key(4) none
Q.38. A primary key is chosen
by_______
(1) data base
designer(2) end user (3)
programmers(4) none
Q.39. A binary operator that
combines information of two relations
(1) project(2) select (3) join(4) Cartesian product
Q.40. A binary operator that
concatenates only tuples
(1) join (2) project (3) union(4) intersection
Q.41. ________ operator can be
used to answer quires of the form are union compatible and used as % operator
(1) divide(2) union (3) intersection(4) none
Q.42. Database design can be
classified in to
(1) two categories(2)
three categories (3) four
categories(4) none
Q.43. Which is not the type of
data base
(1) operational data
base
(2) control data base
(3) strategic planning database
(4) none
Q.44. E-R model represents the
conceptual entities and their inter relationship at ____
(1) physical level(2)
external level (3) logical
level(4) none
Q.45. Normalization is based on
the________
(1) dependencies(2)
dependency b/w attribute of a table (3)
attributes and entities(4) attributes
Q.46. Normalization is carried
out in__________
(1) zero stages(2) two
stages (3) three stages(4) none
Q.47. The purpose of second
normal form is to eliminate
(1) part key
dependency(2) non key attributes (3)
key attributes(4) none
Q.48. SQL I based on________
(1) relational algebra (2) relational calculus
(3) either (1) or(2) (4) none
(5) both (1)and(2)
Q.49. SQL has main components
(1) DDL(2) DML (3) DCL(4) All(5) none
Q.50. The exact number includes
the data types
(1) integer(2) smallint (3) all(4) none(5) numeric
Q.51. Real,double,precision,float
comes under category
(1) exact number(2)
character string (3) exact
number(4) none
Q.52. Aggregate functions
are________
(1) DDL statement (2)
DML statement (3) DLL statement(4) all
Q.53. Which is not the DDL
statement
(1) create(2) drop (3) alter(4) none(5)all
Q.54. In the aggregate function
count(*) * means
(1) number of tables(2)
number to tables (3) number of
attributes(4) can not measure
Q.55. Which function are used to
manipulate values
(1) value (2) aggregate (3)
sum(4) none
Q.56. String value functions take
one or more strings as input return ________as the result
(1) number(2) character (3) string(4) none
Q.57. The function which takes a
character as an operand and strips leading trailing
(1) trim(2) value (3) upper(4) lower
Q.58. Special form of the class
of the simple comparison predicates
(1) between (2) not between
(3) either(1) or(2) (4) both (1) and (2)
Q.59. ___________ predicate is
used to figure whether column name is null or not
(1) null(2) not null (3) zero(4) unspecified data type
Q.60. ___________predicate is
essentially used to search for pattern in target string ,where I
character________and___________are used to perform pattern matching
(1) search,&,%(2)
like,%,- (3) search,%,$(4) none
Q.61. Which statement is true
related to sub query
(1) sub queries are
query within query(2) sub queries are special type of query (3) sub queries are top most query(4) none
Q.62. The exist predicate checks
if the cardinality of a query is________
(1) (2) (3)
>0(4) <0
Q.63. The________ predicate is
used to determine whether the result of the table contains duplicate rows
(1) not null(2)
duplicate (3) unique(4) not null
Q.64. ______is a combination of
join and union
(1) new join(2) outer
join (3) union join(4) none
Q.65. Views are__________ which
is essentially a logical window on real tables
(1) real(2) virtual (3) physical(4) external
Q.66. Armstrong’s Axioms are also
known as
(1) inference rules(2)
reflexivity property (3) augmentation(4)
none
Q.67. A relation is called in
first normal form if all its
(1) attributes are
atomic
(2) rows are duplicate
(3) attributes are not atomic
(4) none
Q.68. Which of the following
statement is true
(1) all non key
attributes be functionally dependent on non key attribute
(2) the first normal form suffers from update
anomaly
(3) in third normal form the table must not
have any transitivity property
(4) all
(5)none
Q.69. The third normal form is
the transformation of BCNF
(1) true (2) false (3) can not determine(4) does not matter
Q.70. The schemes design consists
of defining_________
(1) tables(2) keys (3) attributes(4) none(5)all
Q.71. In schema design the
synthetic approach is the form of
(1) bottom up approach
(2) top down approach
(3) either (1)or(2)
(4) none
Q.72. Multivalued dependency is
denoted by
(1) > (2) < (3) <(4) > >
Q.73. For what condition
augmentation property is true
(1) if x y then xz
yz(2) if xy,y z then x z (3) both
(1)and (3)(4) both (2)(3)
Q.74. A file can be of type
(1) master file(2)
transaction file (3) reference file(4) all
Q.75. The basic access method of
records in a file
(1) sequential (2)
random (3) dynamic(4) all
Q.76. To evaluate the performance
of a file organization the application
parameters are
(1)hit ratio (2)
volatility (3) access key and
frequency(4) all
Q.77. The parameter hit ratio is
used to
(1) find the percentage
of file records will be accessed
(2) find the percentage of file records will
be added
(3) find the fields which are used for
accessing the records
(4) none
Q.78. A sequential file has its
records stored in______
(1) logical sequence (2)
physical sequence (3) sequence is
not mandatory (4) none
Q.79. A relationship b/w two
record types is often implemented using pointer called
(1) record pointer (2)
null pointer (3) pointer (4) none
Q.80. The types of indexes which
are used in searching
(1) track index (2) cylinder index
(3) master index (4) only (1) (2)(5) all (1) (2)&(3)
Q.81. The no of reads required
for searching the index
(1) two reads(2) three
reads (3) four reads(4)
Q.82. The sequence of operations
which are normally supported for the indexed sequential file
(1)
read,open,write,rewrite,delete(2) open ,read,write,rewrite,delete (3) read,open,write,rewrite,delete(4)
write,read,open,rewrite,delete
Q.83. A file permits random
access on filed that is key field in the record is called
(1) sequence(2) indexes (3) hashed (4) none
Q.84. B-tree practical and
efficient method for organization
(1) sequence(2) indexes (3) pointers(4) records
Q.85. A varying length record may
be stored using methods
(1) reserved space(2)
using pointers (3) combined
method(4) all(5) none
Q.86. The hierarchical modes can
easily represent
(1) one-to-one(2)
one-to-many (3) many-to one(4)
one-to-one
Q.87. Which statement is not true
for the virtual records
(1) none(2) a virtual
record is a record by itself (3) a
virtual record is a record by itself(4) a real record is a virtual record
Q.88. The access method are used
by IMS are
(1) HSAM(2) HISM (3) HDAM(4) HIDAM
Q.89. Transactional manager is a
part
(1) DBMS(2) RDBM (3) DDBMS(4) None
Q.90. Tm includes
(1) buffer manager(2)
recovery manager (3) scheduler(4)
transaction manager
Q.91. The components and
responsibilities of TMs
(1) root agent of transaction coordinates execution of agents at all
sites
(2) DTM agent of exchange messages to implement 2 phase commit
(3) LTMs implement local actions they do not communized message among
themselves
(4) none
Q.92. Database server functions
are (a data management (b transaction management(c back recovery(d query
optimization
(1) only (a) (2) only (a),(b)
(3) a,b,c (4) all
Q.93. Which of the following is
not the internal sorting algorithms
(1) bubble sort(2) merge
sort (3) quick sort(4)None
No comments:
Post a Comment