Dbms Net Ques
Dbms Net Ques
1
Q.5.................. SQL command changes one or more fields in a record.
(1) LOOK-UP(2) INSERT(3) MODIFY(4) CHANGE
Q.10Given two relations R1(A, B) and R2(C, D), the result of following query
Select distinct A, B from R1, R2
is guaranteed to be same as R1 provided one of the following condition is
satisfied.
(1) R1 has no duplicates and R2 is empty.
(2) R1 has no duplicates and R2 is non - empty.
(3) Both R1 and R2 have no duplicates.
(4) R2 has no duplicates and R1 is non - empty.
2
Q.11Consider a schema R(A, B, C, D) and following functional dependencies.
A→B
B→C
C→D
D→B
Then decomposition of R into R1(A, B), R2(B, C) and R3(B, D) is ..................
(1) Dependency preserving and lossless join.
(2) Lossless join but not dependency preserving.
(3) Dependency preserving but not lossless join.
(4) Not dependency preserving and not lossless join.
January-2017
Q.1An attribute A of datatype varchar(20) has value 'Ram' and the attribute B of
datatype char(20) has value 'Sita' in oracle. The attribute A has .......... memory
spaces and B has .......... memory spaces.
(1) 20, 20(2) 3, 20(3) 3, 4(4) 20, 4
Q.3Let M and N be two entities in an E-R diagram with simple single vale attributes.
R1 and R2 are two relationship between M and N, whereas
R1 is one-to-many and R2 is many-to-many.
The minimum number of tables required to represent M, N, R 1 and R2 in the
relational model are…
(1) 4(2) 6(3) 7(4) 3
3
Q.5The order of a leaf node in a B+ tree is the maximum number of children it can
have. Suppose that block size is 1 kilobytes, the child pointer takes 7 bytes
long and search field value takes 14 bytes long. The order of the leaf node
is............
(1) 16(2) 63(3) 64(4) 65
Answer: Marks to all
Q.9For a database relation R(A,B,C,D) where the domains of A,B,C and D include
only atomic values, only the following functional dependencies and those that
can be inferred from them are:
A→C
B→D
The relation R is in................
(1) First normal form but not in second normal form
(2) Both in first normal form as well as in second normal form
(3) Second normal form but not in third normal form
(4) Both in second normal form as well as in third normal form
Q.10If following sequence of keys are inserted in a B+ tree with K(=3) pointers:
8, 5, 1, 7, 3, 12, 9, 6
Which of the following shall be correct B+ tree?
4
Answer: 1
August-2016 (Re-test)
Q.1DBMS provides the facility of accessing data from a database through
(A) DDL (B) DML(C) DBA (D) Schema
5
Q.2Relational database schema normalization is NOT for:
(A) reducing the number of joins required to satisfy a query.
(B) eliminating uncontrolled redundancy of data stored in the database.
(C) eliminating number of anomalies that could otherwise occur with inserts and
deletes.
(D) ensuring that functional dependencies are enforced.
If different symbols stand for different values (e.g., t 1 is definitely not equal to
t2), then which of the above could not be the relationship set for the E-R
diagram?
(A) I only
(B) I and II only
(C) II only
(D) I, II and III
6
Q.5Which of the following statements is/are True regarding some advantages that
an object-oriented DBMS (OODBMS) offers over a relational database?
I. An OODBMS avoids the “impedance mismatch” problem.
II. An OODBMS avoids the “phantom” problem.
III. An OODBMS provides higher performance concurrency control than most
relational databases.
IV. An OODBMS provides faster access to individual data objects once they have
been read from disk.
(A) II and III only (B) I and IV only(C) I, II, and III only (D) I, III and IV only
Q.8Suppose database table T1(P, R) currently has tuples {(10, 5), (15, 8), (25,
6)} and table T2 (A, C) currently has {(10, 6), (25, 3), (10, 5)}. Consider the
following three relational algebra queries RA1, RA2 and RA3:
The number of tuples in the resulting table of RA1, RA2 and RA3 are given by:
(A) 2, 4, 2 respectively (B) 2, 3, 2 respectively
(C) 3, 3, 1 respectively (D) 3, 4, 1 respectively
July-2016
Q.1In RDBMS, the constraint that no key attribute (column) may be NULL is
referred to as:
(A) Referential integrity (B) Multi-valued dependency
(C) Entity Integrity (D) Functional dependency
8
Q.3In a relational database model, NULL values can be used for all but which
one of the following?
(A) To allow duplicate tuples in the table by filling the primary key column(s)
with NULL.
(B) To avoid confusion with actual legitimate data values like 0 (zero) for integer
columns and „‟ (the empty string) for string columns.
(C) To leave columns in a tuple marked as “unknown” when the actual value is
unknown.
(D) To fill a column in a tuple when that column does not really “exist” for that
particular tuple.
Q.4Consider the following two commands C1 and C2 on the relation R from an SQL
database:
C1: drop table R;
C2: delete from R;
Which of the following statements is TRUE?
I. Both C1 and C2 delete the schema for R.
II. C2 retains relation R, but deletes all tuples in R.
III. C1 deletes not only all tuples of R, but also the schema for R.
(A) I only (B) I and II only
(C) II and III only (D) I, II and III
9
Q.7Consider the relations R(A,B) and S(B,C) and the following four relational
algebra queries over R and S:
I. πA,B(R⋈S)
II. R⋈πB(S)
III. R∩(πA(R) Χ πB(S))
IV. πA,R.B(R Χ S) where R.B refers to the column B in table R.
One can determine that:
(A) I, III and IV are the same query.
(B) II, III and IV are the same query.
(C) I, II and IV are the same query.
(D) I, III and III are the same query.
10
December-2015
Q.1Consider a “CUSTOMERS” database table having a column “CITY” filled with
all the names of Indian cities (in capital letters). The SQL statement that finds
all cities that have “GAR” somewhere in its name, is:
(A) Select *from customers where city=‟%GAR%‟;
(B) Select *from customers where city=‟$GAR$‟;
(C) Select *from customers where city like „%GAR%‟;
(D) Select *from customers where city as ‟%GAR‟;
Q.4Data which improves the performance and accessibility of the database are
called:
(A) Indexes
(B) User Data
(C) Application Metadata
(D) Data Dictionary
11
Q.6Which of the following statements regarding the features of the object-
oriented approach to databases are true?
(a) The ability to develop more realistic models of the real world.
(b) The ability to represent the world in a non-geometric way.
(c) The ability to develop databases using natural language approaches.
(d) The need to split objects into their component parts.
(e) The ability to develop database models based on location rather than state and
behaviour.
Codes:
(A) (a), (b) and (c) (B) (b), (c) and (d)
(C) (a), (d) and (e) (D) (c), (d) and (e)
Q.8Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and
relation S(B, C) currently has {(2, 5), (4, 6), (7, 8)}. Consider the following two
SQL queries SQ1 and SQ2:
SQ1: Select *
From R Full Join S
On R.B=S.B;
SQ2: Select *
From R Inner Join S
On R.B=S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query
SQ2 are given by:
(A) 2 and 6 respectively (B) 6 and 2 respectively
(C) 2 and 4 respectively (D) 4 and 2 respectively
Q.9 Consider the following three SQL queries (Assume the data in the people
table):
(a) Select Name from people where Age>21;
(b) Select Name from people where Height>180;
(c) Select Name from people where (Age>21) or (Height>180);
If the SQL queries (a) and (b) above, return 10 rows and 7 rows in the result set
respectively, then what is one possible number of rows returned by the SQL
query (c)?
(A) 3 (B) 7 (C) 10 (D) 21
12
Q.10The distributed system is a collection of (P) and communication is achieved in
distributed system by (Q), where (P) and (Q) are:
(A) Loosely coupled hardware on tightly coupled software and disk sharing,
respectively.
(B) Tightly coupled hardware on loosely coupled software and shared memory,
respectively.
(C) Tightly coupled software on loosely coupled hardware and message
passing,respectively.
(D) Loosely coupled software on tightly coupled hardware and file sharing,
respectively.
Q.11Consider the following three tables R, S and T. In this question, all the join
operations are natural joins (⨝). (π) is the projection operation of a relation :
Possible answer tables for this question are also given as below:
13
June-2015
Q.1 An Assertion is a predicate expressing a condition we wish database to always
satisfy. The correct syntax for Assertion is:
(A) CREATE ASSERTION „ASSERTION Name‟ CHECK „Predicate‟
(B) CREATE ASSERTION „ASSERTION NAME‟
(C) CREATE ASSERTION, CHECK Predicate
(D) SELECT ASSERTION
(A) (a) (B) (a), (b) and (c)(C) (d) (D) (a) and (d)
Q.4 Database applications were built directly on top of file system to overcome
the following drawbacks of using file-systems
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
(A) (a) (B) (a) and (d)
(C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Q.5 For a weak entity set to be meaningful, it must be associated with another
entity set in combination with some of their attribute values, is called as:
(A) Neighbour Set
(B) Strong Entity Set
(C) Owner entity set
(D) Weak Set
Q.6 Let E1 and E2 be two entities in E-R diagram with simple single valued
attributes. R1 and R2 are two relationships between E1 and E2 where R1 is one-
many and R2 is many-many. R1 and R2 do not have any attributes of their own.
How much minimum number of tables are required to represent this situation
in the Relational Model?
(A) 4 (B) 3 (C) 2 (D) 1
14
Q.7 The STUDENT information in a university is stored in the relation STUDENT
(Name, Sex, Marks, DEPT_Name)
Consider the following SQL Query SELECT DEPT_Name from STUDENT where
SEX='M' group by DEPT_Name having avg (Marks)>(SELECT avg (Marks) from
STUDENT). It returns the Name of the Department for which:
(A) The Average marks of Male students is more than the average marks of students
in the same Department
(B) The average marks of male students is more than the average marks of the
students in the University
(C) The average marks of male students is more than the average marks of male
students in the University
(D) The average marks of students is more than the average marks of male students
in the University
Q.8 Select the „False‟ statement from the following statements about Normal
Forms:
(A) Lossless preserving decomposition into 3NF is always possible
(B) Lossless preserving decomposition into BCNF is always possible
(C) Any relation with two attributes is in BCNF
(D) BCNF is stronger than 3NF
Q.11 In the indexed scheme of blocks to a file, the maximum possible size of the
file depends on:
(A) The number of blocks used for index, and the size of index
(B) Size of Blocks and size of Address
(C) Size of Index
(D) Size of Block
15
December-2014
Q.1 Division operation is ideally suited to handle queries of the type:
(A) customers who have no account in any of the branches in Delhi.
(B) customers who have an account at all branches in Delhi.
(C) customers who have an account in atleast one branch in Delhi.
(D) customers who have only joint account in any one branch in Delhi
Q.3 What kind of mechanism is to be taken into account for converting a weak
entity set into strong entity set in entity-relationship diagram?
(A) Generalization (B) Aggregation
(C) Specialization (D) Adding suitable attributes
Q.4 The best normal form of relation scheme R(A, B, C, D) along with the set of
functional dependencies F = {ABC, ABD, CA, DB} is
(A) Boyce-Codd Normal form (B) Third Normal form
(C) Second Normal form (D) First Normal form
Q.5 Identify the minimal key for relational scheme R(A, B, C, D, E) with
functional dependencies F = {AB, BC, ACD}
(A) A (B) AE (C) BE (D) CE
16
Q.8............... rules used to limit the volume of log information that has to be
handled and processed in the event of system failure involving the loss of
volatile information.
(A) Write-ahead log
(B) Check-pointing
(C) Log buffer
(D) Thomas
June-2014
Q.1 Manager's salary details are hidden from the employee. This is called as
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
17
Q.5 Match the following:
List-I List-II
a.DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY Operation iv. REVOKE
Codes:
a b c d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
Answer: C
It is given that {Author, Title} is the key for both schemas.
The given dependencies are:
18
So candidate keys are: Catalog_no, {Title, Author}
But in the given dependencies, {Publisher, Title, Year} --> Price, which has
Transitive Dependency. So, Book is in 2NF.
R1∩R2≠ϕ. This makes the decomposition lossless join, as all the attributes are
keys, R1∩R2 will be a key of the decomposed relations (lossless condition says the
common attribute must be a key in at least one of the decomposed relation). Now, even
the original relation RR is in 3NF (even BCNF) as all the attributes are prime attributes
(in fact each attribute is a candidate key). Hence, any decomposition will also be
in 3NF3NF (even BCNF). Option D.
PS: Decomposition in 3NF3NF means decomposed relations are in 3NF3NF. But when
we consider any decomposed relation, we must also include any FD which are being
implied by the original relational schema. For example, in a decomposed
relation STU,STU, there will be a FD U→SU→S as well.
LIST-I LIST-II
19
A. a-iv; b-iii; c-i; d-ii
B. a-iii; b-ii; c-iv; d-i
C. a-ii; b-i; c-iv; d-iii
D. a-iii; b-i; c-iv; d-iii
Answer: A
E. LIST-I LIST-II
a. Timeout ordering protocol iv. Thomas Write Rule
b. Deadlock prevention iii. Wait-die scheme
c. Deadlock detection i. Wait for graph
d. Deadlock recovery ii. Roll back
Q.10 Which of the following concurrency control protocols ensure both
conflict serializability and freedom from deadlock?
A) 2-phase locking
B) Time-stamp ordering
1. I only
2. II only
3. Both I and II
4. Neither I nor II
December-2013
Q.1 The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Q.2 GO BOTTOM and SKIP-3 commands are given one after another in a
database file of 30 records. It shifts the control to
(A) 28th record
(B) 27th record
(C) 3rd record
(D) 4th record
20
Q.4 Based on the cardinality ratio and participation ............... associated with a
relationship type, choose either the Foreign Key Design, the Cross
Referencing Design or Mutual Referencing Design.
(A) Entity (B) Constraints (C) Rules (D) Keys
Explanation:
Since R1 is many to one and participation of M is total, M and R1 can be combined
to form the table {M1, M2, M3, P1}. N is a week entity set, so it can be combined
with P.
21
Q.9 Consider the table
Student(stuid, name, course, marks). Which one of the following two queries
is correct to find the highest marks student in course 5?
Q.1. Select S.stuid
From student S
Where not exists
(select * from student e where e course='5' and e marks ≥ s marks)
Q.2. Select S.stuid
From student S
Where s.marks > any (select distinct marks from student S where s.couse = 5)
(A) Q.1
(B) Q.2
(C) Both Q.1 and Q.2
(D) Neither Q.1 nor Q.2
22
Codes:
a b c d
(A) i ii iv iii
(B) ii i iv iii
(C) i iii iv ii
(D) ii iv i iii
Q.3 .................. constraints ensure that a value that appears in one relation for a
given set of attributes also appears for a certain set of attributes in another relation.
(A) Logical Integrity
(B) Referential Integrity
(C) Domain Integrity
(D) Data Integrity
23
Q.6 Match the following:
(a) Create (i) The E-R Model
(b) Select (ii) Relationship Model
(c) Rectangle (iii) DDL
(d) Record (iv) DML
Codes:
(a) (b) (c) (d)
(A) (iii) (iv) (i) (ii)
(B) (iv) (iii) (ii) (i)
(C) (iv) (iii) (i) (ii)
(D) (iii) (iv) (ii) (i)
Codes:
(a) (b) (c) (d)
(A) (iii) (iv) (ii) (i)
(B) (iv) (iii) (ii) (i)
(C) (ii) (iii) (iv) (i)
(D) (iii) (iv) (i) (ii)
June-2013
Q.1 Manager's salary details are to be hidden from Employee Table. This
Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
24
Q.3 Which normal form is considered as adequate for usual database design?
(A) 2NF (B) 3NF
(C) 4NF (D) 5NF
Q.4 If D1, D2,…. Dn are domains in a relational model, then the relation is a
table, which is a subset of
(A) D1+D2+…. +Dn
(B) D1x D2x… xDn
(C) D1U D2U….UDn
(D) D1- D2-….-Dn
Q.5 The “PROJECT” operator of a relational algebra creates a new table that
has always
(A) More columns than columns in original table
(B) More rows than original table
(C) Same number of rows as the original table
(D) Same number of columns as the original table
December-2012
Q.1 Which of the following is true?
(A) A relation in BCNF is always in 3NF.
(B) A relation in 3NF is always in BCNF.
(C) BCNF and 3NF are same.
(D) A relation in BCNF is not in 3NF.
25
Q.2 Given a Relation POSITION (Posting-No, Skill), then query to retrieve all
distinct pairs of posting-nos. requiring skill is
(A) Select p.posting-No, p.posting-No
from position p
where p.skill = p.skill
and p.posting-No < p.posting-No
(B) Select p1.posting-No, p2.posting-No
from position p1, position p2
where p1.skill = p2.skill
(C) Select p1.posting-No, p2.posting-No
from position p1, position p2
where p1.skill = p2.skill
and p1.posting-No < p2.posting-No
(D) Select p1.posting-No, p2.posting-No
from position p1, position p2
where p1.skill = p2.skill
and p1.posting-No = p2.posting-No
Explanation:
Let R be a relation schema.
Let F be a set of functional dependencies on R.
Let R1 and R2 form a decomposition of R.
The decomposition is a lossless-join decomposition of R if at least one of the
following functional dependencies are in F+
1. R1∩R2→R1
2. R1∩R2→R2
Q.4 Which level of Abstraction describes how data are stored in the data
base?
(A) Physical level
(B) View level
(C) Abstraction level
(D) Logical level
26
Q.6 Referential integrity is directly related to
(A) Relation key(B) Foreign key
(C) Primary key(D) Candidate key
June-2012
Q.1 What deletes the entire file except the file structure?
(A) ERASE (B) DELETE(C) ZAP (D) PACK
Q.6What is Granularity?
(A) The size of database
(B) The size of data item
(C) The size of record
(D) The size of file
Q.7 Which level of Abstraction describes what data are stored in the
Database?
(A) Physical level
(B) View level
(C) Abstraction level
(D) Logical level
27
Q.8The problem that occurs when one transaction updates a database item
and then the transaction fails for some reason is …………….
(A) Temporary Select Problem
(B) Temporary Modify Problem
(C) Dirty Read Problem
(D) None
December-2011
Q.1 B + tree are preferred to binary tree in database because
(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disk are more reliable than memory
Q.2 What deletes the entire file except the file structure?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
Q.3 Which command classes text file, which has been created using “SET
ALTERNATIVE” <FILE NAME> “Command”?
(A) SET ALTERNATE OFF
(B) CLOSE DATABASE
(C) CLOSE ALTERNATE
(D) CLEAR ALL
Q.4 Which of the following statements is true, when structure of database file
with 20 records is modified?
(A) ? EOF ( ) Prints T
(B) ? BOF ( ) Prints F
(C) ? BOF ( ) Prints T
(D) ? EOF ( ) Prints F
28
Q.5 The SQL Expression
Select distinct T. branch name from branch T, branch S where T. assets > S.
assets and S. branch-city = DELHI, finds the name of
(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.
June-2011
Q.1 The basic variants of time-stampbased method of concurrency control are
(A) Total time stamp-ordering
(B) Partial time stamp ordering
(C) Multiversion Time stamp ordering
(D) All of the above
29
December-2010
Q.1 In generalisation, the differences between members of an entity is
(A) maximized
(B) minimized
(C) both (A) & (B)
(D) None of these
Q.5 Which of the following is the process by which a user‟s access to physical
data in the application is limited, based on his privileges?
(A) Authorization
(B) Authentication
(C) Access Control
(D) All of these
June-2010
Q.1 x1 is a clone of x” means x1 is identical to x in terms of the physical
attributes namely, height, weight and complexion. Given, height, weight and
complexion only form a complete set of attributes for an entity, cloning is an
equivalence relation. What is your impression about this statement?
(A) The statement is true
(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these
30
Q.2 An entity instance is a single occurrence of an …………..
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these
Q.5 Which data management language component enabled the DBA to define
the schema components?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these
Q.6 The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these
31
December-2009
Q.1 If she is my friend and you are her friend, then we are friends. Given this,
the friend relationship in this context is …………...
(i) commutative
(ii) transitive
(iii) implicative
(iv) equivalence
(A) (i) and (ii)
(B) (iii)
(C) (i), (ii), (iii) and (iv)
(D) None of these
32
Q.5A function that has no partial functional dependencies is in …………….
form.
(A) 3 NF
(B) 2 NF
(C) 4 NF
(D) BCNF
June-2009
Q.1 Which one is correct?
(i) DML includes a query language based on both relation algebra and tuple calculus
(ii) DML includes a query language based on tuple calculus
(iii) DML includes a query language based on relational algebra
(iv) DML includes a query language based on none of the relational algebra and
tuple calculus
(A) (i) only
(B) (ii) only
(C) (iii) only
(D) (iv) only
Q.2 Which construct in SQL is used to test whether a subquery has any tuples
in its result?
(A) UNIQUE
(B) EXISTS
(C) GROUP BY
(D) EXCEPT
33
December-2008
Q.1 An entity has:
(i) a set of properties
(ii) a set of properties and values for all the properties
(iii) a set of properties and the values for some set of properties may non-uniquely
identify an entity
(iv) a set of properties and the values for some set of properties may uniquely
identify an entity
Which of the above are valid?
(A) (i) only
(B) (ii) only
(C) (iii) only
(D) (iv) only
June-2008
Q.1 A superkey for an entity consists of:
(A) one attribute only
(B) at least two attributes
(C) at most two attributes
(D) one or more attributes
34
Q.3 If a relation is in 2NF then:
(A) every candidate key is a primary key
(B) every non-prime attribute is fully functionally dependent on each relation
key
(C) every attribute is functionally independent
(D) every relational key is a primary key
December-2007
Q.1 A primary key for an entity is:
(A) a candidate key (B) any attribute
(C) a unique attribute (D) a super key
35
Q.4 The end of an SQL command is denoted by:
(A) an end-of-line character
(B) an „enter-key‟ marker
(C) entering F4 key
(D) a semicolon (;)
June-2007
Q.1Which of the following statements is wrong?
(A) 2-phase Locking Protocols suffer from deadlocks
(B) Time-Stamp Protocols suffer from more aborts
(C) Time-Stamp Protocols suffer from cascading roll back where as 2-Phase
locking Protocol do not
(D) None of these
Q.3 A sub class having more than one super class is called:
(A) Category (B) Classification
(C) Combination (D) Partial Participation
December-2006
36
Q.1 In DBMS, deferred update means:
(A) All the updates are done first but the entries are made in the log file later
(B) All the log files entries are made first but the actual updates are done later
(C) Every update is done first followed by a writing on the log file
(D) Changes in the views are deferred till a query asks for a view
June-2006
Q.1 A relation R = {A, B, C, D, E, F} is given with following set of functional
dependencies:
F = {A→B, AD→C, B→F, A→E}
Which of the following is candidate key?
(A) A
(B) AC
(C) AD
(D) None of these
Q.4 Which data management language component enabled the DBA to define
the schema components?
(A) DML
(B) Subschema DLL
37
(C) Schema DLL
(D) All of these
December-2005
Q.1 A schema describes:
(A) data elements (B) records and files
(C) record relationship (D) all of the above
June-2005
Q.1 If a data-item is declared as a protected access specifier then it can be
accessed:
(A) Anywhere in the program
(B) By the base and derived classes
(C) Only by base class
(D) Only by derived class
38
(C) 4 NF
(D) 5 NF
December-2004
Q.1 The E-R model is expressed in terms of:
(i) Entities
(ii) The relationship among entities
(iii) The attributes of the entities
Then
(A) (i) and (iii)
(B) (i), (ii) and (iii)
(C) (ii) and (iii)
(D) None of the above
Q.4 The entity type on which the ................. type depends is called the
identifying owner.
(A) Strong entity (B) Relationship
(C) Weak entity (D) E - R
39
JULY-2018
Q.1 In RDBMS, which type of Join returns all rows that satisfy the join
condition?
(1) Inner Join (2) Outer Join
(3) Semi Join (4) Anti Join
Q.2 Consider a relation book (title, price) which contains the titles and prices
of different books. Assuming that no two books have the same price, what
does the following SQL query list?
Select title
from book as B
where (select count (*)
from book as T
where T.price > B.price) < 7
(1) Titles of the six most expensive books.
(2) Title of the sixth most expensive books.
(3) Titles of the seven most expensive books.
(4) Title of the seventh most expensive books.
40
(1) First normal form but not in second normal form
(2) Second normal form but not in third normal form
(3) Third normal form
(4) BCNF
Q.7 A many-to-one relationship exists between entity sets r1 and r2. How will it
be represented using functional depedencies if Pk(r) denotes the primary key
attribute of relation r?
(1) Pk(r1) → Pk(r2)
(2) Pk(r2) → Pk(r1)
(3) Pk(r2) → Pk(r1) and Pk(r1) → Pk(r2)
(4) Pk(r2) → Pk(r1) or Pk(r1) → Pk(r2)
Q.8 Database systems that store each relation in a separate operating system
file may use the operating system‟s authorization scheme, instead of defining
a special scheme themselves. In this case, which of the following is false?
(1) The administrator enjoys more control on the grant option.
(2) It is difficult to differentiate among the update, delete and insert authorizations.
(3) Cannot store more than one relation in a file.
(4) Operations on the database are speeded up as the authorization procedure is
carried out at the operating system level.
Q.9 Let R1(a, b, c) and R2(x, y, z) be two relations in which a is the foreign key
of R1 that refers to the primary key of R2. Consider following four options.
(a) Insert into R1 (b) Insert into R2
(c) Delete from R1 (d) Delete from R2
Which of the following is correct about the referential integrity constraint with
respect to above?
(1) Operations (a) and (b) will cause violation.
(2) Operations (b) and (c) will cause violation.
(3) Operations (c) and (d) will cause violation.
(4) Operations (d) and (a) will cause violation.
29-Oct-18
X
Amit Khurana
HOD@PIAIM
41
42