0% found this document useful (0 votes)
116 views10 pages

DBMS

Uploaded by

Raviranjan2320
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
116 views10 pages

DBMS

Uploaded by

Raviranjan2320
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
1. In the relational modes, cardinality is termed as wumber of tuples’ (b) number of attributes ©) number of tables —_(d) number of constraints 2 Relational calculus is a (2) procedural language PY non-procedural language (c) data definition language (@) high level language 3. The view of total database content is Naf conceptual view (b) internal view (©) external view (@) physical view 4. Cartesian product in relational algebra is (a) a unary operator Ybfa binary operator (c) aternary operator (d) not defined 8. DML is provided for (a) description of logical structure of database (b) addition of new structures in the database system Xermanipulation and processing of database (d) definition of physical structure of database system 6. ‘AS" clause is used in SQL for (a) selection operation ~ bf rename operation () join operation (d) projection operation 7. ODBC stands for (a) Object Database Connectivity (0) Oral Database Connectivity (6) Oracle Database Connectivity (Gf Open Database Connectivity 8. Architecture of the database can be viewed as {a) two levels {b) four levels &F three levels (d) one level 9. In a relational model, relations are termed as (a) tuples (b) attributes Yer iables (@) rows 10. The database schema is written in (a) HLL (b) DML. Yor DDL (@ DCL 11. A schema describes {a) data elements (c) record relationship [UGC NET, Dee 2005] (b) records and files Nar All of these 12, An embedded pointer provides [UGC NET, Dec 2005] (a) physical record key (b) an inserted Index Nef'a secondary access path (a) All of these 13, In an architecture of a database system, external level is the (a) physical level (c) conceptual level (b) logical level ef view level 14 An entity set that does not have sufficient attrib, " for form a primary ey is gaat entiy set {3 Step enti set (@) primary entity set 15, A primary key for an entity is [UGC NET, Dee 2 (a) a candidate key (b) any ote fe Yer a unique attribute —__(d) a super key 16. Aggregate functions in SQL are [UGC NET, Dee 2) (a) GREATEST, LEAST and ABS ey SUM, COUNT and AVG (c) UPPER, LOWER and LENGTH (@) SQRT, POWER and MOD . ion is in 2 NF and 3 NF forms, then 17, Ifa relation is in dora Shen (@) no non-prime attribute is functionally dependes| on other non-prime attributes (b) no non-prime attribute is functionally dependea on prime attributes (c)_all attributes are functionally independent rime attribute is functionally independent of a ver p ly indep non-prime attributes 18, The end of an SQL command is denoted by [UGC NET, Dec 210) ) / (a) an end of line character (b) an enter-key marker (6) entering F4 key Xe a semicolon () 18. In a database table, the category of informations called (a) tuple WSF field (©) record (@) All of these 20. Which of the following statements is true? (a) Foreign key fields do not allow duplicate values (b) In primary key field you can enter duplicate valat vera an indexed Gitta you may or may not en luplicate value depending upon (@) All ofthe above PS “POR setting 21. Which of the followin, data from database? (a) Forms ig store command to retrie {b) Reports Wer Queries (@) Tables 2 Which normal form i: i relational database design? et ad (a) 2NF Veh 3 NF () 4NF (@) BCNF 23, A locked file can be Mar-accessed by onl (b) modified by users with a (c) is used to hide sensit {@) Both (b) and (c) (Use ner, pec 20 ith the corret password ive information a. a aor of locking can be used to solve the (a) lost update (b) uncommitted dependency (c) inconsistent data \ey All of these 2% A functional dependency of the form X-> ¥ is trivial ug YoX (b) ¥ox ()XeY (@ XcYandycx 2 If every nonkey attribute is function on the primary ey, then the relation wal an f@) first normal form (b) secondary normal form ucrthird normal form (4) fourth normal form 21. Ina hierarchical model records are organi Ogaph O) ot inke ree 28. In an ER diagram, attributes are represent O Sangle Be aguare, leaps" (lane 2. Incase of entity integrity the prim: Xe} not null yey key may be (c) Both (a) and (b) (d) any value 30, One approach to standardizing storing of data [UGC NET, Dec 2005] (@) MIS \ey CODASYL (Q structured programming (d) None of these 3. Consider the query : SELECT student_name FROM students WHERE class_name = (SELECT class_name FROM students WHERE math-marks =100); What will be the output? (a) The list of names of students wi mathematics (0) The names of all stuc atleast one student has {ef The names of all student ‘marks in mathematics (@ The names and class of all students w! mathematics are 100 2 Given relations R(w,s) and S| SELECT DISTINCT w, * FROM R, S is guaranteed to be same as Rif Mel R has no duplicates and S is non-empty (b) Rand S have no duplicates ( Shas no duplicates and R is non-empty (@) Rand § have the same number of tuples 3. The lan, ‘ased in application programs {0 vse fetafom the DBMS in referred 10 * the DML (o) DDL () VDL (@ SDL [UGC NET, Dee 2007] ith 100 marks in dents of all classes in which 100 marks in mathematics ts in all classes having 100 yhose marks in y, 2) the result of 34, A logical schema Alaris the entire database {b) is standard way of organizing information into accessible parts (c) deseribes how data is actually stored on disk (4) Both (a) and (c) 35, In an ER diagram, an entity set is represented by a \b}rectangle (b) ellipse (6) diamond box (a) circle 36, The property/properties of a database is/are {a) it is an integrated collection of logically related records {b) it consolidates separate files into a common pool of data records {c) data stored in a database is independent of the application programs using it \lay All of the above 37. In a relational schema, each tuple is divided into fields called [UGC NET, Dec 2005} (@) relations ‘domains (6) queries (a) All of these 38, The data type created by the data abstraction process is called {UGC NET, June 2010] (a) class (b) structure leyrabstract data type _() user defined data type 39. Generalization is .......-.+++ Process. [UGC NET, June 2010} {a) top-down Wr bottom up (c) Both (a) and (b) (d) None of these 40, An entity instance is a single occurrence of on [UGC NET, June 2005] Ney entity type {b) relationship type (c) entity and relationship type {@) None of these #1. Match List I with List II and select the correct answere using the codes given below the lists. [UGC NET, June 2010} Lat | List 1 PB ONF | 1. Transitive dependencies eliminated Q 3aNnF i Multivalued attribute removed R 4NF 3. Contains no partial functional dependencies S. SNF 4. Contains no join dependency Codes PQRS Mj3r2 4 (41 2 3 (34 1 2 (1234 42, A superkey for an entity consists of {UGC NET, June 201 (a) one attibute only _(b) afleast wo atibutes (6) at most two attributes (gf one or more attributes ‘3. The DBMS language component which can be embedded in a pro, is (a) the Data Definition Language (DDL) YP the Data Manipulation Language (DML) (c) ‘The Database Administrator (DBA) (4) a query language a. nies expresses fa) the logical view (b) the physical view le} the external view 8 ‘all of hee 48. Count function in SQU retums the number of \(a} values (b) distinct values (6) groups (@) columns 48. Which of the following statements is false? (a) The data disctionary is normally maintained by the database administrator \er Data elements in the database can be modified by changing the data dictionary () The data disctionary contains the name and description of each data element (4) The data dictionary is tool used exclusively by the database administrator 47. An advant is (a) data is dependent on programs (b) data redundancy increases Nor data is integrated and can be accessed by multiple programs (d) None of the above 48. A DBMS query language is designed to (a) support end users who use English-like commands (b) support in the development of complex applications software (c) specify the structure of a database {dy All of the above 49, It is possible to define a schema completely using () VDLand DDL = (bY DDL and DML (c) SDL and DDL (@) VDL and DML 50. Data independence means (a) data is defined separately and not included in programs (b) programs are not dependent on the physical aitributes of data (c) programs are not dependent on the logical attributes of data 4@}-Both (b) and (c) 51. Which of the following sets of keywords constitutes a mapping in SQL? [UGC NET, June 2008), (a) SELECT, FROM, TABLE \\by SELECT, FROM, WHERE (c) CONNECT, TABLE, CREATE (d) SELECT, TABLE, INSERT 52. Ifa relation is in 2.NF, then [UGC NET, June 2008] (a) every candidate key is a primary key every non-prime attribute is fully functionally dependent on each relation key (c) every attribute is functionally independent (d) every relational key is a primary key tage of the database management approach i 53. Which ofthe following is true? [USC NET, dune | (a) A relation in 3 NF is always in one ; ‘relation in BONF is always ip 9 (¢) BCNF and 3 NF are totally diferent (@) A relation in BCNF is in 2 NF but NP 54. Consider the query : SELECT student_name FROM student data WHERE roll_no (SELECT roll_no FROM student_marks ; WHERE SEMI_MARK =SEM2_MARK); Which of the following is true? [UGC NET, June (a) It gives the name of the student whose marly semester 1 and semester 2 are same (b) It gives all the names and roll numbets of thoy students whose marks in semester 1 and semeste are same Tt gives the name of all students whose marks; semester 1 and semester 2 are same (@) It gives roll number of all students whose marisa semester | and semester 2 are same 55, The ER model is expressed in terms of I. entities Il, the relationship among entities III. The attributes of the entitites IV. Functional relationship [UGC NET, Dec 20 (a) Tand IT (b) 1, Wand IV (o) I, Mand Vv \@r and DIT 56. Specialization is .. .- process, [UGC NET, Dec 210 (b) bottom up (€) Both (a) and (b) (d) None of these 57. Match List I with List II and select the contt answer using the codes given below the lists. [UGC NET, Dec 20 ar List It P. Determinants | 1. No attribute can a ; No can be added & Candidate key [2. Uniquely identified a row Nom-redundancy |3. A constraint between attributes Group of attributes on Na}fop-down S. Functional 4 dependency left hand side of arrow 4 —————___|__funetional dependency Codes RSs Ma 4 = 13 )24 1 3 (043 2 1 123 4 S8A function that dependencies are in... My, _ Partial funci [Uc ner, pec 208 \6 2NF (@) BONE (a) 3NF () 4NF 58, Which of the following statements is wrong? 1 i [UGC NET, June 2009) {a} Two phase locking protocol suffers from deadlocke (b) Timestamp protocol suffers from more aber ys Timestamp protocol suffers" from cascading rollbacks where as two phase locking protocel de inbound follows. “IV. Multivalued dependency; mn mute is checked at 3NFlevel, “TONE attribute is V. An enity relationship diagram isa tool to represent event model. [UGC NET, Dec 2009) ‘Wef I, I and U1 (b) U1, 111 and IV. : \ef Ill, 1V and V (@) I IV and Vv 1, Which data management language component enabled the DBA to define the scheme component [UGC NET, June 2006) () DML (b) Subschema DLL yer ‘Schema DLL (d) All of these 62.A subclass having more than one super class is called [UGC NET, June 2005} {a) category (b) classification (©) combination \(9) partial participation 63. Immediate updates as a recovery protocol is preferable, when [UGC NET, June 2006] (a) database reads more than writes Nor writes are more than reads (c) it does not matter as itis good in both situations (@) there are only writes 64.A ‘elation R=(4,B,C,D, E, F) is given with following set of functional dependencies : = {A> B, ADC, BF, AE} Which of the following is candidate key? [UGC NET, June 2006] 4 (b) Ac 40 (@) None of these 6. The statement in SQL which allows to change the definition of a table is ‘alter (b) update (c) create (d) select . 66. ER model uses this symbol to represent weak entity set {a) dotted rectangle (b) diamond st doubly outlined rectangle (d) None of these produces the relation that has attributes of R, and Ry. Var Cartesian product (c) Intersection (b) Difference (d) Product 68, The file organization that provides very fast access to any arbitray record of a file is (a) ordered file (b) unordered file \(ey hashed file (€) Betree 68, The ER model is expressed in terms of I. Entities IL, The relationship among entities, IIL. The attributes of the entities Then, [UGC NET, Dec 2004] (a) Land 111 » (db) Land I (9 Mand I AF None of these 7, The completeness constraint has rule [UGC NET, Dec 2004] (a) supertype, subtype br total specialization, partial specialization (c) specialization, generalization (@) All of the above 71. An entity has 1. a set of properties. IL. a set of properties and values for all the properties. IIL. a set of properties and the values for some set of Properties may non-uniquely identify an entity. IV. a set of properties and the values of some set of Properties may uniquely identify an entity. Which of the above are valid? (UGC NET, Dec 2004] (a) Only (b) Only It (c) Only III yfe¥“Only IV 7. Which of the following is correct? (a) SQL query automatically eliminate duplicates (©) SQL permits stinbute names to be repeated in the same relation (c) a SQL query will not word if there are no indexes Nar None of the above 73, Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose and R, form a decomposition of R Then, the decomposition is a lossless jon decmposition of provided that [UGC NET, Dec 2008] (@) RAR, > Risin F* (0) ROR, +R, is in F* (9 both ROR, +R, and RAR, > R, functional dependonciegareh F172 7% fnction Lsratleast one from R, mR, rR, and R, Ry Ry is 14, Aggregation is (cc NET, Dec 2008) (@) an abstraction through which relationship are treated as lower level entities \ PF an abstraction through which treated as higher level entities (6) an abstraction through which relationships-are not tweated at all as entities (d) None of the above 75, 1. DML includes a query language based relation algebra and tuple calelus © O Poth HL. DML includes calculus. relationships are query language based on tuple IIL. DML includes a que ed on relational algebra.” ae IV. DML includes a query language based on none of the relational algebra and tuple calculus. Which one is correct? [UGC NET, June 2008] (a) Only I (b) Only 1 (97 Only TH (a) Only IV 75, There exists a construct which returns a value ‘true’ if the argument subquery is [UGC NET, June 2009] (a) empty \ef non-empty (c) in error (d) None of these 77. Which construct in SQU is used to test whether a subquery has any tuples in its result? [UGC NET, June 2009} wy EXISTS (a) EXCEPT (a) UNIQUE () GROUP BY 78, Oracle supports (a) inner join and outer join {b) outer join and semi join (c) inner join, outer join and semi join \(a¥ inner join, outer join, semi join and anti join 78. Which of the following operations is used we are interested in only certain columns of a table? \@y PROJECTION (b) SELECTION (c) UNION (a) JOIN 80. Which of the following is a valid SQL type? (a) CHARACTER (b) NUMERIC (c) FLOAT \(aF All of these 81. Which of the following operations needs the participating relations to be union compatible? (a) UNION (b) INTERSECTION (c) DIFFERENCE \F All of these 82. The result of the UNION operation between R, and Ry is a relation that includes (a) all tuples of R, (b) all tuples of R, (c) all the tuples of R, and R, all the tuples of R, and R, which have common ‘columns 83. A WINDOW into a portion of a database is [UGC NET, June 2005] (a) schema Vey view (©) query (@) data dictionary 54, Multivalued dependency among attribute is checked at which level? [UGC NET, June 2005} (b) 3 NF er 4 NF (@) 5 NF 85. A block hole ina DFD isa [UGC NET, June 2005] (a) a data store with no in bound flows Uefa data store with only in bound flows (c) a data store with more than one in bound flow (d) None of the above 96, An entity relationship diagram is a tool to represent [UGC NET, June 2005) (b) process model data model (@) customer model (c) event model create new tabl. [UGC NET, June 2, has ny} (a) more fields than the original table ) more rows than original table . (¢) Both (a) and (b) ‘None of the above .d update means 8, In DBMS, deferred up Ree! (a) all the updates are done first but the ents made in the log file later all the log files entries are m updates are done later (c) every update is done first the lag file : (@) changes in the view are deferred till a query ai for a view 89, NULL is fa) the same as 0 for integer {b) the same as blank for character (c) the same as 0 for integer and blank for character ef not a value 90. A file manipulation command that extracts some | ! the records from a file is called ELECT (b) PROJECT (o) JOIN (@) PRODUCT 31. An instance of a relational schema R(A, B,C) be distinct values of A including NULL values. Whid] one of the following is true? (a) Aisa candidate key \(by A is not a candidate key {c) Ais a primary key {@) Both (a) and (c) 2, The natural join is equal to (a) cartesian product {b) combination of union and cartesian product (c) combination of selection and cartesian product \(g)-combination of projection and cartesian product To delete a particular column in a selaion #4, command used is (@) UPDATE (b) DROP ¥pyALTER (4) DELET| | 94. The .....ee. operator is used to compare a value alist of itera values that tae been Specified B ry (IN (@) ALL. ; 95. Two phase protocol in a database managem system is [UGC NET, pec 208) | it ‘ concurrency mechanism that is not deadlock ft | (b) a rec ) a recovery. protocol used for restoring a dali] \ (c) any update to the system I ; {a) not etective in datebece SOR" 1 eworp bee 6, Which possibility among the following is invalid case of data flow dagen vowing 3s ined (a) A process having inboun cubomd Gate fears not news me (b) A data flow between two processes 7, The PROJECT command will ade first but the acy followed by a writing g, \e(A data flow between two data stores (@) A data sore having more than one inbound data 7, Which is one function of a Database Managem: System (DBMS)? “oo {a} Ensuring usability (b) Identifying what a user needs () Deciding what to do with legacy systems eventing errors arising, while enabling mul VP Silanes were ate 8, Ifa system can enforce referential integrity, then this ensures that (a) a record can never contain a null v; ra foreign key attribute pee (b) @ non-null foreign key attribute always refers to another record ne WAYS refers (¢) a foreign key attributes in a record always ré another record which contains nulls ian tn a foreign key attribute in a record always refers te another record which does not contain alls 7 9. A set of FD’s is given for a relation R(A, B,C, D, E, F, G) {A— B, BC DE, AEF -G} ‘What is the cosure of (4, C]* under this set? (a) 4, BC (b) 4,B,C,D () 4, B,C, D, E, F (YA, B,C, D, E 100. 3 NF is preferred than BCNF because I. we normally choose to retain dependency preservation. IL. a high penalty in system performance is to be paid or rish the integrity of the data in our database. Ill. there is not any problem of repetition of information. IV. Given statement is wrong. (a) Only IV is true (b) II and III are true \py Tand Il are ture (d) Only II is true 101. ‘A lack of normalization can lead to which one of the following problems? (a) Insertion problems —_(b) Deadlock (c) Lost updates \ay Deferred updates 102. Which of the following is an optimistic concurrency control method? [UGC NET, Dec 2010) Validation based _—_(b) Timestamp ordering (6) Lock based (@) None of these M03. The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X —>Y specified in F, [UGC NET, Dec 2010] (@) appeared directly in one of the relation schemas Ry in the decomposed D . () could be inferred from dependencies that appear in some R, oF Both (a) and (b) (d) None of the above 104, Which of the following cannot be restorted? (@) Transaction aborted dur to software error (b) ‘Transaction aborted due to hardware error ‘Transaction aborted due to hardware or software error that was created by internal logic (a) Observable external writes 105, Locking was introduced into data bases so that (@) keys can be provided to maintain security (b) all simultaneous transactions are prevented (c) passwords can be provided to maintain security consistency can be enforced 106, Which of the following is true for two-phase locking (a) lock acquisition in the second phase (b) locks can be acquired at any time locks are acquired in the first phase (d) None of the above Directions (Q. Nos. 107 to 114) Each of the following questions has two options (a) and (b). You are to study the question carefully and |= mark (a), if the given statement is true + mark (b), if the given statement is false. 107. A candidate key which is not a primary key is known as a alternative key. (@2 108. Join is one of the traditional set operator defined on ‘relational algebra. (b) 109. A tuple resembles a record. (-) M0. IFR.ARBand RB>RC then RA>RC. @) 1M, Any relation can be non-loss decomposed into an equivalent collection of 4 NF relations. (2) 12, Relation R(A, B,C] is equal to the join of its Projections (4) and Ry( AC) ifthe HD A> B jolds in. (bd NA database system is filly relational fit supports relational data bases and a language as pow relational algebra.(a.> meee 114. The function of a database is to collect and organi: input data. ©) _ 115. A good query system (a) ‘can accept English language commands \PF allows non-programmers to access informati stored in a database — (6) can be accessed only professionals (2) Both (a) and (b) 116. A command that lets you change one or more fields by data processing a record is, (a) insert (ey modit (6) look-up (@) Al or these 117. If a piece of data is stored in two database, then >@ storage space is wasted anging the data is on wil sentay Cn ome tw cae ci places in the (c) it can be more easily accessed \(9¥ Both (a) and (b) MB In order to use a DBMS, it is important to understand (a) the physical schema (b) all subchemas that the one subschema (@) Both (a) and (b) ‘V8. When performing a look-up operation using a form, (a) you enter the search value into the form (b) You look at each form sequentially until you see the one you want (©) you type the key in an entry line and the correct form is displayed UAI“AIl of above 120. A compound key (a) is made up of several pieces of information {b) uniquely identifies an item in a list \e}-Both (a) and (b) (d) is a combination of each unique 121. Report generators are used to (a) store data input by a user (b) retrieve information from files Usy-answer queries (d) Both (b) and (c) 122. Subschema can be used to (a) create very different, personalized views of the ai mae Pe same dat (b) present information in different formats () hide sensitive information by omitting fields from the subschema’s description \dy All of above 123. In order to use the record management system (a) you need to understand the lower level details of how information is stored \Jbyou need to understand the model the record ‘management system uses {c) Both (a) and (b) (d) All of the above 124. The database environment has all of the following components except : (a) users \lb}’ separate files (c) data base ; (@) database administration 125, Data security threats include (a) hardware failure rivacy invasion eo Faudulent manipulation of data (d) All of the above fl tomer’s telephone number is stored in a uence fle, a sales agent files and in an invoice fil. In database, this is known as (a) transparency (0) availability (or redundancy (d) integrity system supports sidered minimally relational the Dpy ba nes oppor the following key relational function! a) SELECT, UNION, INTERSE' (b) SELECT, UNION, JOIN Ue SELECT; PROJECT. JOIN (d) SELECT, PROJECT, UN! 128. The schema of a table is an example of (a) relationship (b) enty a{ovrmetadata (d) atomicity 12, Match List I with List II and select correct any using the codes given below the lists. List BA ease a et Nice P. SELECT 1. Vertical subset ofa table Q PROJECT 2, Horizontal subset of a table 3. Common tuples Codes PQ (@) 3 2 (b) 3 1 vey 2 1 @1 2. 130, Database that are designed and managed specifica, to met information needs are called (a) database management system \b}- data warehourses (6) transaction databases (d) production databases 131. The data retrieval time factor is most critical for (a) data warehouse (b) decision DBMS usytransactional DBMS (d) Both (a) and (6) 132. A file system is said to exhibit data dependes because xp) when any of the file's data characteristics changed data access programs are subject to change (b) data is the most important part of a file syste which also includes hardware, software pepole ani procedures (©) organization of the data, within the file # determined by the data’s expected use (@) a change in any file’s structure such as the adeiiot or deletion of a field requires the modification oft! Programs using that file 133, Which of the following is a database administra! function? (@) User coordinator (b) Performance monitoring (c) Backing up the database \@FAll of the above 134. Which two file DBMS? Ss are used during operaton of # (c) Data manipulati (@) Query language and utilies 435, A transparent DBMS ‘ef keeps its physical structure hidden from us (b) keeps its logical structure hidden from users (¢) cannot hide sensitive information from users {@) Both (a) and (b) . 136, A phone number in a database is an (a) file (b) sort Mf field (4) record 437. Arace condition occurs when (a) two users of the DBMS are ii different files at the same time two concurrent activities interact to cause a processing error (c) Both (a) and (b) (d) None of the above 138, The distinguishable parts of a record are called (a) database \by fields (c) data (a) files 439. The logical data structure with a one-to1 relationship is a ne {a) relational Vey tree 40. In a large DBMS (a) each sub-schema contains every field in the logical schema (b) each user can access every subschema (c) each user can see only a small part of the entire database MAP All of the above 141. A network schema (a) stores data in tables oT permits many to many relationships (¢) restricts the structure to a one-to-many relationship (d) None of the above 442. Goals for the design of the logical schema includes (a) being able to access data efficiently (b) being able to construct queries easily (6) avoiding data inconsistencies \r All of the above 443. When several users access the database at the same time, itis said to be | Yer concurrent storing _—_(b) connection trap (©) database management (d) integrated data 44. Which of the following is not a responsibility of @ DDA? (a) Deciding access strategy (b) Deciding the storage structure and access strategy \er Marketing the software {d) Deciding the information content of the database . the first 45. When using a database management sysem, the Urs thing that we must do is to (a) Thad the software into our micro-computer (b) activate file editor MEF create a database file (@) keep a floppy disk in readiness example of a feracting with (b) chain (4) network 448, Which of the following in an advantage of the database approach? (@) Program/data independence (b) Elimination of the data redundancy (6) Ability to associate related data \Gr All of the above 147, Spurious tuples are (@) the multiple entries with same value | (b) the tuples with null values, that exist in the original relation Ap the tuples with null values, that did not exist in the original relations (@) the tuples with null values 448. A primary key if combined with a foreign key creates (a) many to many relationship between the tables that ‘connect them (b) network model between the tables that connect them Vey’ parent child relationship between the tables that connect them (4) None of the above 149, Which of the normal form is considered adequate for nomal relational database design? (a) 2NF (b) 5NF (¢) 4NF ar 3NF 152, Which one ofthe following statements about normal forms is false? (a) BCNF is stricter than 3NF (b) Lossless, dependency preserving decomposition into 3NF is always possible Vf Lossless, dependency-preserving decomposition, into BCNF is always possible (@) Any relation with two attributes is BCNF 151. Which of the following is used to add new attribute (column) in the existing relation schema? (a) DROP (b) CREATE (o) INSERT \@raDD 152. Sophisticated report generators can (a) print row-oriented reports ® perform arithmetic operations () selectively retrieve and print portion of list WAllofthe above 183. A large computer information system maintains many different computer files. Which amongst them is called a perpetual file? (a) Specialized file (b) Log file ey Master file () Update file 154. The highest level in the hierarchy of data organization is called {a) databank database (c) data file (d) data record 185. Internal auditors should review data system desi before they are 7 aoe (a) developed (b) implemented (c) modified At All of these 156. Batch processing is appropriate if (a) a large computer system is available (b) only a small computer system is available (c) only a few transactions are involved \{9Y None of the above 157. Which is the correct order, if all the six clauses given below appears in a query? \pY SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY (b) SELECT, FROM, WHERE, ORDER BY, HAVING, GROUP BY (c) SELECT, FROM, WHERE, HAVING, ORDER BY, GROUP BY (@) SELECT, FROM, WHERE, HAVING, GROUP BY, ORDER BY 188. An operation that will increase the length of a list is Ni modify (b) look-up (c) insert (d) All of these 158. In SQL, which command is used to add a column line integrity constraint to a table (a) ALTER TABLE (b) MODIFY TABLE () INSERT COLUMN g}“ADD COLUMN 160. In SQL, which command(s) is (are) used to remove rows form a table? (a) TRUNCATE () DELETE (c) REMOVE \l7 Both (a) and (b) 161. RAID stands for (a) Rapid Action In Disaster (b) Randon Access Internal Disks (c) Rapid Application Interface Design \ar Redundant Arrays of Independent Disks 162. A tree is said to balanced if {a) it has even number of leaf nodes (0) it has even number of nodes exclusing root (c) it has even number of nodes including root, at None of the above 163. Atomicity is ensured by the component (a) observable external writer \WeF transaction-management component (c) recovery-management component (d) concurrency-control component 164. Insolation is ensured by the component (a) observable external writer (b) transaction-management component (c) recovery-management component \(@F concurrency-control component 165, Durability it ensured by the component iter a) observation external wri 6) coe manageent 2mpnent py recovery-management componen (@) concurreney-control component 166. Which of the following schemas are used 4, ing atomicity? eae ih defered modification (b) Log with immdiate modification (0) Shadow paging ‘All of the above 167. Which of the follownig scenarios may lead to irrecoverable error in a database system? (a) A transaction writes a data item after it is ready an uncommitted transaction (b) A transaction reads a data item after it is read byy, uncommitted transaction (c) transaction reads a data item after it is ‘written by committed transation ‘A transaction reads a data item after it is ‘written by an uncommited transaction 168, Amongst the ACID properties of a transaction, ty durability property requires that the change made» the database by a successful transaction persist. (a) except in case of an operating system crash (b) except in case of disk crash (c) except in case of power failure ‘always, even if there is a failure of any kind 169, A hash function A is defined as Ai) =i? mod 8 Find the value of A(8) and A(18). wey, 4 (b) 0,2 @ 14 (@) 14,2 170. The concept of locking can be used to solve b roblem of A deadlock (b) lost update (c) inconsistent data \@V"All of the above 11. In SQL, GRANT command is used to (a) choosing auditing for specific SQL commands vfb}-grant sysem privileges, roles and object priviles* to use and roles (c) allow user to create databases (@) allow user to access data bases Answers 20) 3 60) 7@ &O 14) 16.0) 17. @) 18) 19.) 2H) 26) 27.2) 2H) 3D) 36. (8), 370) 38) 30) 40) 46. (b) 47. (c) 48. (a) 49. (b) 50. (a) 56. (a) 57. (a) 58. (b) 59. (c) 60. (a) 66.() 67 @) BR). 7.) 76.0) 77.0) 78. (8) 79) 8. (8) 86, (a) 87. (d) 88. (b) 89. (d) 90. (a) 96.() 97, (4) «98. (2) 99 (@)—*100 (0) 106. (c) 107. (a) 108. (b) 109. (c) 110. (a) 146. (b) 117. (@) 148.) 149. (@)——120. (c) 126. (c) 127. (c) 128. (c)—«*129 (e)—«130. (b) 436. () 137. 0) 138.0) 139.) 140. (@) 146.) 147, (48. (149. @)—— 150. (0) 156. (d) 157. (a) 158. (a). 159. (d). 160. (4) 166. (4) 167. (d) 168. (a) 169. (a) 170. (d) Hints and Solutions 1.) 4m 5 Ho) 20 BO wey =O anf 22) 23. (2) 24, a). Ga) 3. 32 @) 33. @) 34. (a) 35, (a) ae) 4% @) 40) as) 5.0) 5% 0) 53.) 5K), o() 8% (@) 6300) 6). n@ 7%@ 2@ me) Te a) 82 @) 8300). 9.0) 922 9 (0) 94) 5. ®) yor, () 102. (@) 203. (@) 204, (6) 305. (@) s1.() 12 (6) 443. (@) 14. (@) a5, () sai.) 122 @)— 123.) 126, (0) 325.) BL) 32@) 133. @ 136.0) 135, @) wi) 2. (8) 143.) 45, @) 151, (@) 152 (4) 153. (0) 156.0) 155. @) 161. (@) 162. (8) 163.0) 164. @) 165. @) 1.0) 25, A functional dependency can be trivial and non-trivial, FED is tivial (X +), then X 3Y (X is superset of Y) If FD is non-trivial (XY), then X#Y (There is nothing common attributes in X, Y) This query will be executed as follows : In where clause, in class_name variables, those class name will be included which belongs to the students having 100 marks in math and so this complete query will give the name of those students in all classes which have 100 marks in ‘mathematics The query will be executed as follows : In where clase, soll number varables contains those cll number of students who have equal marks in semester ! and femester 2 and this complete query will give the name of all students whose marks in semester 1 and semester 2 are same. '=(4, B,C, D, B, F) FD set F =(A—> B, AD-> To find a candidate key, we if attribute closure contains a in relations then that will be candidate {4} = (ABFE} (Not all the attributes 60 aL. 5 a ¢,B>F,A>E) ‘have to find the attribute closure il the attributes which are given key. Ais not the candidate lap} = [ABDCEF) contains all the attributes which are given in relation. So, ADis the candidate key. {AC} = [ACBEF} not all attribut Key. ies so AC is not a candidate 99, Given, relation R:{4, B,C, D, E, FG) FD: F = (A> B, BC > DE, AEF ->G) {4,C) ={4,C, B, D, E) WR-ASRB and RB RC So, by the transitive property of dependency, we can say that 4>BandB>C>A>C So, here R-A > RC Hence, this statement is true, SELECT yields value for all attributes found in a table. SELECT ean be used to list all of the row’s values for each attribute or it can yield selected row values for each attribute, In other words, SELECT yields a horizontal subset of a table, Project produces @ list of all values for selected attributes. In other words, PROJECT yields a vertical subset of a table, ‘The correct order is, SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY. Only’ the first’ two are ‘compulsory, but we cannot use a HAVING clause without a GROUP BY clause. Whichever additional clauses appear ‘must be in the order listed above. ‘The tree is balanced means that all paths from the root to a leaf have the same length 110, 48, 146. 11.

You might also like