Relational Database Management System Rdbms Solved Mcqs
Relational Database Management System Rdbms Solved Mcqs
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
8. A selection of the form satisfying the union of all records satisfying individual simple conditions is
1. Which of the following are steps in query processing? a) Conjunctive selection
a) Parsing and translation b) Disjunctive selection
b) Optimization c) Negation
c) Evaluation d) None of the mentioned
d) All of the mentioned
9. A selection of the form giving all the records not satisfying simple individual conditions is ______
2. A relational algebra operation annotated with instructions on how to evaluate it is called _______ a) Conjunctive selection
a) Evaluation algebra b) Disjunctive selection
b) Evaluation plan c) Negation
c) Evaluation primitive d) None of the mentioned
d) Evaluation engine
10. Which of the following can be implemented?
3. A sequence of primitive operations that can be used to evaluate a query are called as __________ a) Conjunctive selection using one index
a) Query evaluation algebra b) Conjunctive selection using composite index
b) Query evaluation plan c) Conjunctive selection by intersection of identifiers
c) Query evaluation primitive d) All of the mentioned
d) Query evaluation engine
11. A join of the form r ⨝r.A=s.B s is called as
4. The lowest level operator to access data in query processing is _______ a) Equi join
a) File scan b) Left outer join
b) File manipulation c) Right outer join
c) File handling d) Full outer join
d) File organization
12. for each tuple tr in r do begin
5. Search algorithms that use an index are referred to as _________ FOR each tuple ts IN s do BEGIN
a) Index scans test pair (tr , ts ) TO see IF they satisfy the JOIN condition _
b) Search scans IF they do, ADD tr • ts TO the RESULT;
c) Primary scans END
d) Equality scans END
13. What type of join is this?
6. Sorting of relations that do not fit in memory is called as _______ a) Equi join
a) Internal sorting b) Hash join
b) External sorting c) Nested loop join
c) Overflow sorting d) Block nested loop join
d) Overload sorting
14. If nested loop join is done on a per block basis rather than on a per tuple basis, it is called as
7. A selection of the form satisfying the intersection of all records satisfying individual simple conditions a) Equi join
is b) Hash join
a) Conjunctive selection c) Nested loop join
b) Disjunctive selection
c) Negation
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
d) Block nested loop join 22. If the results of one operation are passed on to the other, it is called as ________
a) Chain
15. The merge join can be used to compute b) Pipeline
a) Natural joins c) Materialized
b) Equi joins d) Tree
c) Both the mentioned
d) None of the mentioned 23. The result of each intermediate operation are created and then are used for valuation of the next level
operations, this evaluation is called as ________
16. The ___________ merges the sorted relation with leaf entries of the secondary B+ tree index. a) Chain evaluation
a) Merge join algorithm b) Pipeline evaluation
b) Hybrid merge join algorithm c) Materialized evaluation
c) Hash join algorithm d) Demand driven evaluation
d) Hybrid Hash join algorithm
24. If the system makes repeated requests for tuples from the operation at the top of the table, it is called as
17. The splitting of input until each partition of the build input fits the memory is called as ______ _________
a) Temporary partitioning a) Demand driven pipeline
b) Block partitioning b) Producer driven pipeline
c) Recursive partitioning c) Query driven pipeline
d) Byte partitioning d) None of the mentioned
18. Overflow resolution is performed when, 25. If the operations do not wait to produce tuples, then it is called as _________
a) A hash index overflow is detected a) Demand driven pipeline
b) Extra hash indices are to be added b) Producer driven pipeline
c) When the number of partitions are to be increased c) Query driven pipeline
d) None of the mentioned d) None of the mentioned
19. Which of the following is not a set operation 26. State true or false: Sorting is an inherently blocking operation
a) Union a) True
b) Intersection b) False
c) And operation
d) Set difference 27. State true or false: Join is an inherently blocking operation
a) True
20. Which of the following joins preserves the tuples of the relation on the left side of the operator? b) False
a) Left outer join
b) Natural join 28. 7. Which of the following techniques does not exist?
c) Right outer join a) Pipelined join technique
d) None of the mentioned b) Left pipelined join technique
c) Right pipelined join technique
21. State true or false: The aggregation functions can be implemented in the same way as that of duplicate d) None of the mentioned
elimination.
a) True 29. State true or false: Hybrid hash join is partially pipelined on the probe relation
b) False a) True
b) False
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
30. The usage of two buffers, with one continuing execution of the algorithm while the other is written is d) Durability
called as __________
a) Double execution 37. Which of the following systems is responsible for ensuring durability?
b) Multi tasking a) Recovery system
c) Double buffering b) Atomic system
d) Double algorithm c) Concurrency control system
d) Compiler system
31. Which of the following functions does an iterator not provide
a) Open() 38. Which of the following systems is responsible for ensuring isolation?
b) Next() a) Recovery system
c) Close() b) Atomic system
d) Wait() c) Concurrency control system
d) Compiler system
Unit 2 : Transaction Management 39. State true or false: Information residing in the volatile storage does not usually survive system crashes
a) True
32. Collections of operations that form a single logical unit of work are called __________ b) False
a) Views
b) Networks 40. A transaction that has not been completed successfully is called as _______
c) Units a) Compensating transaction
d) Transactions b) Aborted transaction
c) Active transaction
33. The “all-or-none” property is commonly referred to as _________ d) Partially committed transaction
a) Isolation
b) Durability 41. Which of the following is not a transaction state?
c) Atomicity a) Active
d) None of the mentioned b) Partially committed
c) Failed
34. Which of the following is a property of transactions? d) Compensated
a) Atomicity
b) Durability 42. The execution sequences in concurrency control are termed as ________
c) Isolation a) Serials
d) All of the mentioned b) Schedules
c) Organizations
35. Execution of translation in isolation preserves the _________ of a database d) Time tables
a) Atomicity
b) Consistency 43. The scheme that controls the interaction between executing transactions is called as _____
c) Durability a) Concurrency control scheme
d) All of the mentioned b) Multiprogramming scheme
c) Serialization scheme
36. Which of the following is not a property of a transaction? d) Schedule scheme
a) Atomicity
b) Simplicity
c) Isolation
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
44. I and J are _________ if they are operations by different transactions on the same data item, and at c) Predicate locking
least one of them is a write operation. d) Snapshot isolation
a) Conflicting
b) Overwriting 52. A transaction that performs only one operation is called as a _________
c) Isolated a) Partial schedule
d) Durable b) Complete schedule
c) Dependent schedule
45. If a schedule S can be transformed into a schedule S’ by a series of swaps of non-conflicting d) Independent schedule
instructions, then S and S’ are
a) Non conflict equivalent 53. The phenomenon in which one failure leads to a series of transaction rollbacks is called as ________
b) Equal a) Cascading rollback
c) Conflict equivalent b) Cascadeless rollback
d) Isolation equivalent c) Cascade cause
d) None of the mentioned
46. A schedule is __________ if it is conflict equivalent to a serial schedule.
a) Conflict serializable 54. State true or false: Every cascadeless schedule is also recoverable
b) Conflicting a) True
c) Non serializable b) False
d) None of the mentioned
55. A ___________ is one where, for each pair of transactions Ti and Tj such that Tj reads a data item
47. The set of ________ in a precedence graph consists of all the transactions participating in the schedule previously written by Ti , the commit operation of Ti appears before the commit operation of Tj
a) Vertices a) Partial schedule
b) Edges b) Dependent schedule
c) Directions c) Recoverable schedule
d) None of the mentioned d) None of the mentioned
48. A ___________of the transactions can be obtained by finding a linear order consistent with the partial 56. State true or false: Transactions can only run serially
order of the precedence graph. a) True
a) Serializability order b) False
b) Direction graph
c) Precedence graph 57. Which of the following are the advantages of transaction concurrency?
d) Scheduling scheme a) Increased throughput
b) Increased utilization
49. State true or false: If I = read(Q) and J = read(Q) then the order of I and J does not matter. c) Reduces average response time
a) True d) All of the mentioned
b) False
58. The average time for a transaction to be completed after it has been submitted is called as __________
50. State true or false: If I = read(Q) and J = write(Q) then the order of I and J does not matter. a) Minimum response time
a) True b) Average response time
b) False c) Average reaction time
d) Minimum reaction time
51. Which of the following is the most expensive method?
a) Timestamping
b) Plain locking
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
83. A transaction is made to wait until all ________ locks held on the item are released
a) Compatible
b) Incompatible
c) Concurrent
d) Equivalent
84. State true or false: It is not necessarily desirable for a transaction to unlock a data item immediately
after its final access
a) True
b) False
85. The situation where no transaction can proceed with normal execution is known as ________
a) Road block
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
100. Which of the following cannot be used to implement a timestamp c) Validation protocol
a) System clock d) None of the mentioned
b) Logical counter
c) External time counter 108. In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and TS(Ti)<W-
d) None of the mentioned timestamp(Q), then
a) Read operation is executed
101. A logical counter is _________ after a new timestamp has been assigned b) Read operation is rejected
a) Incremented c) Write operation is executed
b) Decremented d) Write operation is rejected
c) Doubled
d) Remains the same 109. In timestamp ordering protocol, suppose that the transaction Ti issues write(Q) and TS(Ti)<W-
timestamp(Q), then
102. W-timestamp(Q) denotes? a) Read operation is executed
a) The largest timestamp of any transaction that can execute write(Q) successfully b) Read operation is rejected
b) The largest timestamp of any transaction that can execute read(Q) successfully c) Write operation is executed
c) The smallest timestamp of any transaction that can execute write(Q) successfully d) Write operation is rejected
d) The smallest timestamp of any transaction that can execute read(Q) successfully
110. The _________ requires each transaction executes in two or three different phases in its lifetime
103. R-timestamp(Q) denotes? a) Validation protocol
a) The largest timestamp of any transaction that can execute write(Q) successfully b) Timestamp protocol
b) The largest timestamp of any transaction that can execute read(Q) successfully c) Deadlock protocol
c) The smallest timestamp of any transaction that can execute write(Q) successfully d) View protocol
d) The smallest timestamp of any transaction that can execute read(Q) successfully
111. During __________ phase, the system reads data and stores them in variables local to the
104. A ________ ensures that any conflicting read and write operations are executed in timestamp order transaction.
a) Organizational protocol a) Read phase
b) Timestamp ordering protocol b) Validation phase
c) Timestamp execution protocol c) Write phase
d) 802-11 protocol d) None of the mentioned
105. The default timestamp ordering protocol generates schedules that are 112. During the _________ phase the validation test is applied to the transaction
a) Recoverable a) Read phase
b) Non-recoverable b) Validation phase
c) Starving c) Write phase
d) None of the mentioned d) None of the mentioned
106. State true or false: The Thomas write rule has a greater potential concurrency than the timestamp 113. During the _______ phase, the local variables that hold the write operations are copied to the
ordering protocol database
a) True a) Read phase
b) False b) Validation phase
c) Write phase
107. Which of the following timestamp based protocols generates serializable schedules? d) None of the mentioned
a) Thomas write rule
b) Timestamp ordering protocol
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
114. Read only operations omit the _______ phase 121. If the first update is overwritten by a second, it is called as a _______ update
a) Read phase a) Useful
b) Validation phase b) Overlapping
c) Write phase c) Lost
d) None of the mentioned d) Concurrent
115. Which of the following timestamp is used to record the time at which the transaction started 122. State true or false: Snapshot isolation prevents lost updates
execution? a) True
a) Start(i) b) False
b) Validation(i)
c) Finish(i) 123. Which of the following is a variant of snapshot isolation
d) Write(i) a) First committer wins
b) First updater wins
116. Which of the following timestamps is used to record the time when a transaction has finished its c) More than one of the mentioned
read phase? d) None of the mentioned
a) Start(i)
b) Validation(i) 124. Under ________ the system uses locking mechanism that applies only to updates
c) Finish(i) a) First updater wins
d) Write(i) b) First committer wins
c) First writer wins
117. Which of the following timestamps is used to record the time when a database has completed its d) None of the mentioned
write operation?
a) Start(i) 125. The situation in which each pair of transactions has read a data written by the other, but there is no
b) Validation(i) data written by the transactions is called as _______
c) Finish(i) a) Deadlock
d) Write(i) b) Read skew
c) Deadlock skew
118. State true or false: Locking and timestamp ordering force a wait or rollback whenever a conflict is d) Write skew
detected.
a) True 126. Oracle uses __________ for the serializable isolation level
b) False a) Multiversion scheme
b) Timestamp protocol
119. State true or false: We determine the serializability order of validation protocol by the validation c) Lock based protocol
ordering technique d) Snapshot isolation
a) True
b) False 127. State true or false: Snapshot isolation has low overhead
a) True
120. In _______ schemes, each write operation creates a new version of Q b) False
a) Multiversion
b) Snapshot isolation 128. In ________ no two aborts occur unless two concurrent transactions update the same data item.
c) Lock based a) Multiversion scheme
d) Timestamp b) Timestamp protocol
c) Lock based protocol
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
d) Quadruple d) Recovery
143. Which of the following fields does the update log record have? 150. If the database modifications occur while the transaction is still active, the transaction is said to use
a) Transaction identifier the __________ modification technique
b) Data-item identifier a) Deferred
c) Old value b) Immediate
d) All of the mentioned c) More than one of the mentioned
d) None of the mentioned
144. The unique identifier of the transaction that performed the write operation is called as _______
a) Transaction identifier 151. Which of the following is not a feature of a good relational design?
b) Data-item identifier a) Specifying primary keys
c) Old value b) Specifying foreign keys
d) New value c) Preserving integrity constraints
d) Allowing redundancy of attributes
145. The value of the data item prior to the write is called as _________
a) Transaction identifier 152. The dependency rules specified by the database designer are known as _______
b) Data-item identifier a) Designer dependencies
c) Old value b) Database rules
d) New value c) Functional dependencies
d) None of the mentioned
146. If a transaction does not modify the database until it has committed it is said to use a _______
modification technique 153. If the decomposition is unable to represent certain important facts about the relation, then such a
a) Deferred decomposition is called as?
b) Immediate a) Lossless decomposition
c) More than one of the mentioned b) Lossy decomposition
d) None of the mentioned c) Insecure decomposition
d) Secure decomposition
147. We say that a transaction has been ________ when its commit log record has been output to stable
storage. 154. If the decomposition is able to represent all the facts about the relation then such a decomposition is
a) Locked called as?
b) Completed a) Lossless decomposition
c) Committed b) Lossy decomposition
d) Released c) Insecure decomposition
d) Secure decomposition
148. State true or false: Using checkpoints reduces overhead
a) True 155. A domain whose elements are indivisible is called as ______
b) False a) Unique domain
b) Proxy domain
149. A __________ checkpoint is a checkpoint where transactions are allowed to perform updates even c) Atomic domain
while buffer blocks are being written out. d) Multiple domain
a) Temporary
b) Fuzzy 156. If all the domains are atomic then the relational schema is in ________ normal form
c) Permanent a) 1
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
b) 2 c) Check clause
c) 3 d) All of the mentioned
d) 4
165. Which of the following is not a condition for the third normal form in the case of XY?
157. State true or false: Composite attributes have non-atomic domains. a) X→ Y is trivial
a) True b) X is the superkey for R
b) False c) Each attribute in Y-X is a candidate key for R
d) Each attribute in X-Y is a candidate key for R
158. State true or false: Redundancy is desired in a relational schema
a) True 166. F+ is called as the ________ of F
b) False a) Closure
159. An instance of a relation that satisfies all real world constraints is known as? b) Sum
a) Proper relation c) Cartesian product
b) Ideal relation d) None of the mentioned
c) Perfect relation
d) Legal relation 167. State true or false: A functional dependency must first satisfy the second normal form to satisfy the
third normal form.
160. If K → R then K is said to be the _______ of R a) True
a) Candidate key b) False
b) Foreign key
c) Super key 168. State true or false: The fourth normal form does not exist and it is instead called as the BCNF.
d) Domain a) True
b) False
161. X → Y holds on a schema k(K) if?
a) At least one legal instance satisfies the functional dependency 169. A functional dependency f on R is _______ by a set of functional dependencies F on r if every
b) No legal instance satisfies the functional dependency instance of r(R) that satisfies f also satisfies F.
c) Each and every legal instance satisfies the functional dependency a) Logically Defined
d) None of the mentioned b) Logically Derived
c) Logically implied
162. X→ Y is trivial if? d) None of the mentioned
a) X ⊂ Y
b) Y ⊂ X 170. If F is a set of functional dependencies, then the closure of F is denoted by?
c) X ⊇ Y a) F*
d) None of the mentioned b) Fo
c) F+
163. Which of the following is not a condition for X→ Y in Boyce codd normal form? d) F
a) X → Y is trivial
b) X is the superkey for the relational schema R 171. If a functional dependency is reflexive, B is a subset of A and A is the set of attributes, then
c) Y is the superkey for the relational schema R a) B→A holds
d) All of the mentioned b) A→B holds
c) AB→C holds
164. Which of the following is used to express database consistency? d) None of the mentioned
a) Primary keys
b) Functional dependencies
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
172. State true or false: Armstrong’s axioms allow us to generate all F+ for any given F d) None of the mentioned
a) True
b) False 180. The 3NF decomposition algorithm is also called as _______
a) 3NF normal algorithm
173. Armstrong axioms are called sound because? b) 3NF synthesis algorithm
a) They are expensive c) 3NF generator
b) They cannot generate correct functional dependencies d) Functional dependence algorithm
c) They allow us to generate the complete closure
d) They cannot generate incorrect functional dependencies 181. Which of the following is desirable in a database design with functional dependencies?
a) BCNF
174. State true or false: Functional dependencies are transitive b) Losslessness
a) True c) Dependency preservation
b) False d) All of the mentioned
175. If A→B, A→ C then which of the following is true? 182. State true or false: SQL specifies a way of mentioning functional dependencies
a) A→BC a) True
b) A→B b) False
c) A→C
d) All of the mentioned 183. State true or false: Most current database systems do not support constraints on materialized view
a) True
176. If B is an attribute and A→B, Then B is said to be ________ by a. b) False
a) Logically implied
b) Functionally implied 184. Multi valued dependencies are also called as __________
c) Logically determined a) Equality generating dependencies
d) Functionally determined b) Tuple generating dependencies
c) Multi-purpose dependencies
177. We say that a decomposition having the property F’+ = F+ is a __________ decomposition. d) None of the mentioned
a) Dependency losing
b) Dependency preserving 185. Functional dependencies are sometimes referred to as ________
c) Lossless a) Equality generating dependencies
d) None of the mentioned b) Tuple generating dependencies
c) Multi-purpose dependencies
178. A _________ Fc for F is a set of dependencies such that F logically implies all dependencies in Fc, d) None of the mentioned
and Fc logically implies all dependencies in F.
a) Canonical cover 186. The _______ is a set of all functional and multi values dependencies implied by a set of functional
b) Complete cover dependencies
c) Canonical dependency a) Star
d) Canonical clause b) Closure
c) Derivation
179. What does the BCNF decomposition algorithm do? d) Evolution
a) States a method to decompose a relation satisfying BCNF
b) States a method for joining two relations satisfying BCNF 187. State true or false: If a relational schema is in _______ NF and A is a subset of R and B is also a
c) States a method to decompose a relational schema such that there are no multiple occurrences subset of R then it is that A is a superkey is a trivial multi values dependency.
a) 1
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
193. The data that have a time interval associated with them during which they are valid are called as 1. Package Specification only requires recompilation
________ 2. Package body only requires recompilation
a) Timed data
b) Temporal data 3. Both package & body requires recompilation
c) Model data 4. Both package & body does not require recompilation.
d) Clocked data
200 The packaged procedure that makes data in form permanent in the Database is
194. The value of the data at a particular time is called as?
a) Instance
b) Picture 1. Post
c) Snapshot 2. Post form
Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA) Subject : Relational Database Management System (RDBMS) Class : S.Y. BBA(CA)
b a b c c b a a a c
201 202 203
c b d