100% found this document useful (4 votes)
5K views52 pages

Cs403 Solved Mcqs Final Term by Junaid

This document contains solved MCQs for a final term paper for the CS403 Database Management Systems course at Al-Junaid Institute. It was solved by Junaid Malik and a team. The document consists of 51 multiple choice questions related to database concepts like SQL statements, database design, functions, and interfaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (4 votes)
5K views52 pages

Cs403 Solved Mcqs Final Term by Junaid

This document contains solved MCQs for a final term paper for the CS403 Database Management Systems course at Al-Junaid Institute. It was solved by Junaid Malik and a team. The document consists of 51 multiple choice questions related to database concepts like SQL statements, database design, functions, and interfaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

AL-JUNAID INSTITUTE

CS403-Database GROUP
Management System
Solved MCQS for Final terms papers
Solved by JUNAID MALIK and Team
AL-JUNAID INSTITUTE GROUP

1. Truncate is an alternative of Delete command.


a. True
b. False
2. The most recently accessed data from the disk (as well as adjacent sectors) is stored in a
.

a. Memory buffer
b. EPROM
c. ROM
d. Hard disk
3. Browser Based & Non-Browser/Simple are two different types of .a.
Forms
b. Language
c. Interface
d. Programs
4. Which of the following is incorrect about alter table statement?
a. Cannot be used to modify type or size of an existing column
b. Can be used to delete a column
c. Cannot be used to create a new table
d. Can be used to add column in the existing table
5. What does the abbreviation DBMS stand for?
a. Database management software
b. Data borrowing and movement software
c. Digital base mapping system d.
Database management system
6. Suppose we have two tables T1 and T2, Tuples of T1 that do not match some row in T2
will not appear in
a. Outer joinb.
Inner join
c. Both I and II
d. None of the above
7. Value of a function in SQL is always determined by the input parameters a.
True
b. False
AL-JUNAID INSTITUTE GROUP
8. Which of the following is true about creating database in MS Access?
a. First we will run MS Access and select New option from the file. Next it will askthe
name of database.
b. After running MS Access, create database option is selected directly
c. Go to the tool option of MS Access and select create Database option with
suitable name
d. Click on the file menu, select database option and then click it
9. In SQL queries, while creating tables or relations in database, key columns may be
specified by
a. Null
b. Not Null
c. Data Type
d. None of the above
10. In SQl, which command is used to modify the rows of tables.a.
UPDATE
b. INSERT
c. BROWSE
d. APPEND
11. Which of the following is one of the purposes of using DDL commands?
a. Inserting records into databases
b. Updating records into databases
c. Manipulating databases
d. Creating and destroying databases
12. The should be user friendly. Data integrity must be ensured and checks can be
applied within the tables.
a. Input forms
b. Computer language
c. Application programming
d. Database
13. A memory cache, sometimes called a cache store or .
a. ROM
b. DROMc.
RAM
d. Hard disk
14. According to his/her level of knowledge/understanding, how many types of users are there
?

a. Three
b. Four
c. Six d.
Two
AL-JUNAID INSTITUTE GROUP
15. DML does not used to:
a. Add new rows to tables
b. Retrieve rows from table
c. Modify the rows of tablesd.
Alter a table definition
16. Which of the following prevents duplicate values to be displayed as a result of an SQL
statement?
a. DISTINCT
b. DELETE
c. UPDATE
d. ALTER
17. GRANT belongs to which type of SQL commands classification
a. DML
b. DDLc.
DCL
d. DQL
18. user interface is preferred over _ user interface with respect to user.
a. Easy to understand, efficient
b. Hard to understand, efficientc.
Easy to understand, effective
d. Hard to understand, effective
19. Which of the following is not true regarding clustering?
a. It increases the efficiency since related records are placed close to each other
b. Clustering makes records, difficult to access
c. Suitable to relatively static situations
d. It is a process, which means to place records from different tables to place in
adjacent physical locations
20. The condition allows to retrieve values within a specific range.
a. AND
b. LIKE
c. BETWEEN
d. FROM
21. WORM Stands for .
a. Write on. Read memoryb.
Write-once, read-many
c. Write only memory
d. Read only memory
AL-JUNAID INSTITUTE GROUP
22. Identify the language which is used to specify database schema.
a. DCL
b. DMLc.
DDL
d. None of the above
23. At which design level de-normalization will take place.
a. Conceptual design
b. Logical design c.
Physical design
d. All of the above
24. The keyword is used in SELECT statement to return different values.
a. LIKE
b. IN
c. DISTINCT
d. WHERE
25. “It should be user friendly and user must not search for required buttons or text boxes”
this statement is about .
a. Application program b.
User friendly interface
c. Language
d. System program
26. Which of the flowing clauses allows to sort the records in result set?
a. Where
b. Order By
c. From
d. Having
27. Data manipulation language (DML) is the set of commands used to maintain and query a
database including updating, inserting, modifying and retrieving data.
a. True
b. False
28. The function helps reduce the need to use multiple OR conditions.
a. Likeb.
IN
c. AND
d. BETWEEN
29. Correct statement for creating table in Microsoft SQL server is:a.
CREATE TABLE Customer
(SID integer PRIMARY KEY,
Last_Name varchar(30),
b. CREATE TABLE Customer(SID
AL-JUNAID INSTITUTE GROUP
integer,
Last_Name varchar(30),

c. CREATE Customer (SID


integer, Last_Name
varchar(30),
d. All of the above
30. Which of the following is not DML command?
a. Select
b. Update
c. Delete d.
Truncate
31. In SQL, which command is used to delete rows from table.a.
DELETE
b. REMOVE
c. TRUNCATE
d. Both I and II
32. Users know what to do and how to do it are called
a. Beginners
b. Intermediatec.
Experts
d. New
33. There are types of user interfaces.
a. Threeb.
Two
c. Four
d. One
34. DML stands for .
a. Dynamic Modeling Languageb.
Data Manipulation Language
c. Data Management Language
d. Domain Modeling Language
35. Columns used to uniquely identify individual rows of a given table, may be specified to be
NOT NULL.
a. True
b. False
36. Which of the following syntax of the functions in SQL is used to add column values?
a. COUNT(*)
b. COUNT(expression)
c. MAX(expression)d.
SUM(expression)
AL-JUNAID INSTITUTE GROUP
37. SQL is used for:
a. Creating, managing and deleting tables and manage the relationships among the
stored date.
b. Generating queries, organizing, managing and retrieving data stored in a
database.
c. Maintaining data integrity and coordinate data sharing.
d. All of the above
38. Which of the following function falls in the category of Aggregate functions.
a. SUM
b. MIN
c. MAX
d. All of the above
39. REVOKE is a statement.
a. Data Definitionb.
Control Access
c. Data manipulation
d. Data description
40. SQL stands for .
I - Structured Query Language II – Standard Query Language lll- Status Query Languagea.
ONLY I
b. ONLY II
c. BOTH I AND II
d. ONLY III
41. What happens if the WHERE clause is omitted from a DELETE statement?a.
All records from the table are deleted
b. No record from the table will be deleted
c. First record of the table will be deleted
d. The statement will not be executed and will give a syntax error
42. General reasoning for horizontal or vertical partitioning is.
a. Increasing the consistency
b. Decreasing the query response time
c. Smaller tables are more efficient to process as compared to the larger tables.
d. All of the above
43. We should not compromise over efficiency.
a. Consistency
b. Normalization
c. Query response time
d. All of the above
AL-JUNAID INSTITUTE GROUP
44. Which language is used to permit or prohibit access to a table?
a. DCL b.
DDL
c. DML
d. All of the above.
45. Which of the following is a correct way of selecting all the columns from a table called
PERSONS?
a. SELECT FROM * Personsb.
SELECT * FROM Persons
c. SELECT * WHERE Persons
d. SELECT WHERE * Persons
46. Which of the following is used to retrieve and insert information from database?
a. DML
b. DDL
c. DCL
d. Both DML and DDL
47. Which of the following statements creates a database named IMDB.
a. CREATE DATABASE IMDB;
b. CREATE DB IMDB;
c. ADD DATABASE named IMDB;
d. CREATE IMDB DATABASE;
48. Which of the following is not a part of an INSERT statement?
a. INTO
b. VALUE
c. INSERTd.
Modify
49. Objective of an order by clause is to display or arrange output of a select statement in a
particular order.
a. True
b. False
50. Consider a table named “emp” having fields Empname, EmpID, Age, salary.
Which of the following is true if the following SQL statement tries to execute?
SELECT *
FROM emp
WHERE Empname=’ALI’
ORDERBY Age;
a. The statement displays the entire fields from emp in which the Empname is ALIin
ascending order of their age
b. The statement has a syntax error
c. The statement displays the entire fields from emp in which the Empname is ALIin
any order
d. The statement displays the entire fields from emp in which the Empname is ALIin
AL-JUNAID INSTITUTE GROUP
descending order of their age
51. Truncate command responses time is as compared to delete command.
a. Poor
b. Samec.
Better
d. Worst
52. Functions in SQL return a single valuea.
True
b. False
53. Is the given SQL Statement prompt error?
Select * from relation1;
a. Logical Errorb.
No Error
c. Parameter Error
d. Time out Error
54. Which of the following SQL statements used to control access to the data and to the
database
a. GRANT
b. REVOKE
c. Both GRANT and REVOKE
d. SELECT
55. types of caching are commonly used in personal computers:
a. Two
b. Three
c. Four
d. Five
56. Which of the following is the correct syntax for adding a new column into an existing
table.
a. ALTER TABLE table_name { ALTER [COLUMN] column type [(size)]
[DEFAULT default] }
b. ALTER TABLE table_name { ADD [COLUMN] column type [(size)]
[DEFAULT default] }
c. Both I and II.
d. None of the above.
57. GRANT is a command.
a. DDL
b. DMLc.
DCL
d. None of the above

58. Consider the two relations,


Supplier (S_no, S_name, Contact_No, Address) and
Supply (S_no, Item_no).
Which of the following statements give(s) a list of supplier names supplying the item with
AL-JUNAID INSTITUTE GROUP
Item_no ‘555’?
a. SELECT S_name FROM Supplier WHERE Item_no=’555’
b. SELECT S_name FROM Supplier, Supply WHERE Supplier.S_no=Supply.S_no AND
Item_no=’555’
c. SELECT S_name FROM Supplier WHERE S_no EXISTS (SELECT S_no
FROM Supply WHERE Item_no=’555’)
d. SELECT S_name FROM Supplier WHERE S_name EXISTS (SELECT S_name
FROM Supply WHERE Item_no='555')
59. Which of the following is NOT a DDL command?
a. Create DB
b. Create tablec.
Delete
d. Drop
60. Which of the following is not an aggregate function
a. AVG
b. SUM
c. UPPER
d. MAX
61. Identify the basic part(s) of a SELECT statement?
a. SELECT
b. FROM
c. Both SELECT and FROM
d. DISTINCT
62. The operator allows to use wild cards in the where clause of an SQL statement.
a. IN
b. FROMc.
LIKE
d. None of the above.
63. Update command belong to which type of classificationa.
DML
b. DDL
c. DCL
d. DQL

64. When the power is turned off content of is lost.


a. Non volatile storageb.
Volatile storage
c. Permanent storage
d. Hard disk storage
65. Which of the following is used with INSERT command to insert values in a DB table?
a. ONTOb.
INTO
AL-JUNAID INSTITUTE GROUP
c. UPTO
d. WITH
66. Which of the following is used to filter rows according to some condition(s)?
a. SELECT
b. FROM c.
WHERE
d. UPDATE
67. Which of the following is the string function in SQL
a. COUNTb.
LEN
c. SQRT
d. SIN
68. Cache is a portion of memory made of high speed instead of the slower
and cheaper _used for man memory.
a. RAM,ROM
b. ROM,RAM
c. PROM,EPROM
d. Static RAM(SRAM),DRAM
69. Program written to perform different requirement created by the users / Organization
arecalled .
a. System program
b. Chip Program
c. Application Program
d. Low level program
70. The general activities, which are performed during the development of Editing,
Display, Processing related activities and Report.
a. Application program
b. Hardware Program
c. Micro Kemal program
d. Database program
71. Text base & Graphical User Interface (GUI) most commonly called as Forms are two
different type of
a. Application Program
b. System program
c. User interface
d. Language
72. Forms are used in application program, home many type o forms are available ?
a. Four
b. Five
c. One
AL-JUNAID INSTITUTE GROUP
d. Two
73. An effective user interface minimizes the users requires to learn and implement the
system.
a. Space
b. Time
c. Complexity
d. Efficiency
74. In vertical partitioning if we divide a table into two vertical partitions then efficiency of
those applications will be reduced which is used to:
a. Access data from both the vertical partitions
b. Access data from first vertical partition
c. Access data from second vertical partition
d. None of the above
75. Consider a table named “emp” having fields Empname, EmpID, Age, salary.
Which of the following is true if the following SQL statement tries to execute?
SELECT *
FROM emp
WHERE Empname=’ALI’;
a. The statement has a syntax error
b. The statement only displays the EmpID of those employees whose name is ALI c.
The statement displays the entire fields from emp in which the Empname is ALI
d. The statement must have an ORDERBY clause
76. Which feature of database provides conversion from inconsistent state of DB to a consistent
state ensuring minimum data loss?

► User accessible catalog

► Data processing

► Authorization service

► Recovery service (Page 47)

77. Which of the following statements is true about the views?

► view is always a complete set of all the tables in a database

► View can not be used for retrieving data

► The results of using a view are not permanently stored in the database Google

► Rows can not be updated or deleted in the view


AL-JUNAID INSTITUTE GROUP
Which of the following is true about myn kia krun ?

► Can be Rolled back.

► Activates Triggers.

► is DML Command.

► Resets identity of the table. Google

78. Which of the following is the correct way to find out the size of cartesian product incase of
CROSS JOIN?

► the number of columns in the first table multiplied by the number of columns in the second table.

► the number of columns in the first table multiplied by the number of rows in the second table.

► the number of rows in the first table multiplied by the number of columns in the first table.

► the number of rows in the first table multiplied by the number of rows in the second table. Google

79. Suppose there are 8 rows and 4 columns in TABLE1 and 3 rows and 4 columns in TABLE2; what
is the size of the cartesian product incase of CROSS JOIN between these two tables?

► 24 Google

► 32

► 12

► 16

Which of the following is not one of the properties of Transaction?

► atomicity

► consistency

► redundancy (Page 294)

► durability

80. Which of the following is INCORRECT about VIEWS?

► It is not possible to left out the data which is not required for a specific view. (Page 280)

► A database view displays one or more database records on the same page.

► Views can be used as security mechanisms

► Views are generally used to focus the perception each user has of the database.
AL-JUNAID INSTITUTE GROUP
81. Each course section is assigned a particular faculty member, and each course section
corresponds to a particular course. Conceptually, what is the relationship between faculty and
course (not course section).

► 1:1

► 1:M

► M:M Conceptual

► Ternary

82. Which of the following is used to add or drop columns in an existing table?

► ALTER (Page 207)

► HAVING

► SELECT

► THEN

83. Which of the following is a correct way of selecting all the columns from a table called
PERSONS?

► SELECT FROM * Persons

► SELECT * FROM Persons (Page 216)

► SELECT * WHERE Persons

► SELECT WHERE * Persons

84. Which of the following is NOT a feature of Indexed sequential files?

► Records are stored in sequence and index is maintained.

► Dense and nondense types of indexes are maintained.

► Track overflows and file overflow areas can not be ensured. (Page 264)

► Cylinder index increases the efficiency

85. Consider the given relations Student and Instructor as given below. Please note that Fname and
Lname also denote the First Name and Last Name respectively. Which of the following
statements is correct with respect to the two relations given above?

► The two relations are not union-compatible since their attribute names differ. (Page 152)

► The two relations are union-compatible since they have the same type of tuples.
AL-JUNAID INSTITUTE GROUP
► The set operations such as CARTESIAN PRODUCT and DIVISION can be pplied on these two relations.
► To find out the students who are not instructors, it is necessary to perform the operation Student ÷
Instructor.

86. Which of the following serves as a milestone or reference point in the log file?

► Constraints

► Relations

► Check points (Page 304)

87. Which of the following are the general activities, which are performed during the development
of application programs?

► Data input programs

► Editing

► Display

► All of given (Page 238)

88. Browser based forms are developed in the following tools EXCEPT

► HTML

► Scripting language

► Front Page

► Web-based Forms (Page 241)

89. Which of the following is not a form of optical disk?

► CD ROM

► WORM

► Erasable Optical

► EEPROM (Page 257

90. In which of the following situations, Clustering is suitable:

► Frequently updating
AL-JUNAID INSTITUTE GROUP
► Relatively static (Page 192)

► Relatively deletion

► Relatively dynamic

91. Only one type of constraint can be enforced in any table by CREATE command

► True

► False (Page 205)

Which of the following is disadvantage of chaining technique to handle the collisions?

► Unlimited Number of elements

► Fast re-hashing

► Overhead of multiple linked lists (Page 269)

► Maximum number of elements must be known

92. Consider the following relation R and its sample data. (Consider that these are the only tuples
for the given relation) Which of the following statements is NOT correct?

► The functional dependency ProjNo -> DeptNo holds over R.

► The functional dependency (EmpNo, ProjNo) -> DeptNo holds over R. conceptual

► The functional dependency DeptNo -> ProjNo holds over R.

► The functional dependency EmpNo -> DeptNo holds over R

93. An entity type is

► defined when the database is actually constructed

► a specific type such as an integer, text, date, logical etc

► a coherent set of similar objects that we want to store data on (e.g. STUDENT, COURSE, CAR) Google

► defined by the database designer

94. An entity can be logically connected to another by defining a ____.

► hyperlink

► common attribute Page no 145

► primary key

► superkey
AL-JUNAID INSTITUTE GROUP
95. You can’t modify more than one table at a time through a view.

► True Google

► False

96. Which of the following is one of the purposes of using DML commands?

► Creating databases

► Destroying databases

► Inserting data in tables (Page 208)

► Non of the above

97. What is the alternate name of Data Dictionary?

► Index

► Metadata

► Data

► System Catalog Google

98. IN function helps reduce the need to use multiple AND conditions.

► True

► false conceptual

99. Which of the following is not true about De-normalization?

► It is the process of attempting to optimize the performance of a database

► De-normalization is a technique to move from lower to higher normal forms of database modeling
(Page 187)

► It enhances the performance of DB

► In de-normalization it is required to add redundant data

100. Which of the following gives all the fields from employee table named as EMP?

► SELECT * from EMP; (Page 216)

► SELECT emp* from EMP'


AL-JUNAID INSTITUTE GROUP
► SELECT emp_id where EMP;

► SELECT * where EMP;

101. Which of the following types of partitioning reduces the chances of unbalanced
partitions?

► Vertical

► List

► Hash (Page 189)

► Range

102. While recovering data, which of the following files does a recovery manager examines at
first?

► A system file

► Log file (Page 303)

► Data dictionary

► Metadata

103. ALTER TABLE exams RENAME COLUMN Q_description TO Question_Descp, Std_ID to


Student_ID. Syntax of ALTER TABLE is NOT correct.

► True

► False conceptual

104. Which of the following is the correct description of cache hit?

► When data is found in the cache (Page 256)

► When data is removed in the cache

► The number of times the cache is accessed directly by the processor

► When data is lost from the cache

105. Which of the following is NOT a component of a DFD? Select correct option:

► Dataflow

► Datastore
AL-JUNAID INSTITUTE GROUP
► External entities

► Relationship between external entities (Page 57)

106. Laser records data by burning microscopic holes in the surface of the disk with a

► Hard disk

► RAM

► Optical disk (Page 257)

► Floppy disk

107. Which of the following concepts is applicable with respect to 3NF?

► Full functional dependency

► Any kind of dependency

► Transitive dependency (Page 180)

► Partial functional dependency

108. Which of the following is NOT a feature of a good interface?

► Consistency

► Process based

► Data structure based (Page 243)

► User friendly

109. Making a change to the conceptual schema of a database but not affecting the existing
external schemas is an example of

► Physical data independence.

► Concurrency control

► Logical data independence Conceptual

► Functional dependency

110. GRANT SELECT, UPDATE(Designation) ON Employee TO Amali,Hiruni WITH GRANT


OPTION; What does this SQL statement do?

► Grant permission to Amali,only to retrieve data from Employee table and grant permission to Hiruni,
only to update the designation from Employee table.
AL-JUNAID INSTITUTE GROUP
► Grant permission to Hiruni in order to grant, select and update permission to Amali.

► Grant permission to Amali & Hiruni to update designation of employees in the Employee table

► Grant permission to Amali and Hiruni to update all data except designation in Employee table Click
here for detail

111. Which key word is available in SQL to enforce referential integrity?

► Check

► Primary Key (Page 134)

► Set Default

► Unique

112. How many clustered index(es) do each database table have?

► 2

► 3

► 5

► 1 (Page 275)

113. Which of the following is true about DELETE command?

► is DDL Command.

► Resets identity of the table

► cannot activate a trigger

► Can be Rolled back Google

114. Which of the following is not a feature of TRANSACTION?

► Users should be able to regard the execution of each transaction as atomic.

► Each transaction, run by itself.

► must preserve the consistency of the database

► dependant on other concurrent transactions (Page 294)


AL-JUNAID INSTITUTE GROUP
115. Suppose there are 4 fields in a table named CUST (customer_id, first_name, last_name,
phone). Which of the following gives all the information of the customers in the table whose
last name is ALI?

► SELECT * FROM CUST WHERE last_name='ALI'; (Page 216)

► SELECT * FROM CUST WHERE last_name=ALI;

► SELECT * FROM CUSTOMER WHERE name=ALI;

► SELECT * FROM CUSTOMER WHERE last_name=ALI;

116. Which of the following is not true with respect to denormalization ?

► A denormalized data model is not the same as a data model that has not been normalized

► Denormalization takes place before the normalization process Google

► It is an attempt to optimize the performance of database

► Denormalization process can not be initiated before the Database design

117. Which of the following is incorrect with respect to indexed sequential files?

► New records are added to an overflow file

► Record in main file that precedes it is updated to contain a pointer to the new record

► The overflow is merged with the main file during a batch update

► Multiple indexes for the same key field cannot be setup (Page 264)

118. DML commands are used for:

► inserting data into databases (Page 208)

► creating databases

► destroying databases

► creating DB objects

119. Which of the following is INCORRECT with respect to file systems?


AL-JUNAID INSTITUTE GROUP
► At the physical level, pointer or hashed address scheme may be employed to provide a certain degree
of data independence at the user level.

► A logical record is concerned with efficient storage of information in the secondary storage devices.
Google

► Some physical organisations use pointers to record blocks to locate records on disk.

► The efficiency of a file system depends on how efficiently operations such as retrieve, insert, update,
delete may be performed on the information stored in the file.

120. Which of the following is correct regarding Dataflow diagram?

► Single DFD is required to represent a system

► The dataflow must be bidirectional

► Created at increasing levels of detail Google

121. Select the correct statement among the following on proper naming of schema
constructs:

► Entity type name applies to all the entities belonging to that entity type and therefore a plural name is
selected for entity type.

► In the narrative description of the database requirements, verbs tend to indicate the names of
relationship types. Google

► The nouns arising from a database requirement description can be considered as names of attributes.
► Additional nouns which are appearing in the narrative description of the database requirements
represent the weak entity type names.

122. Structural constraints of a relationship type refer to

► identifying the owner entity type relevant to a given entity type

► whether the existence of an entity depends on it being related to another entity via the relationship
type.

► the role that a participating entity from the entity type plays in each relationship instance.

► the constraints applicable in granting access to tables, columns and views in a database schema.

123. Identify the correct statement.


AL-JUNAID INSTITUTE GROUP
► Entity integrity constraints specify that primary key values can be composite. Google

► Entity integrity constraints are specified on individual relations.

► Entity integrity constraints are specified between weak entities.

► When entity integrity rules are enforced, a tuple in one relation that refers to another relation must
refer to an existing tuple.

124. Which of the following is not true regarding Indexes?

► Index can be defined even when there is no data in the table

► It support Range selections

► It can be created using ‘Create Index’ statement

► It can not be created on composite attributes (Page 273)

125. The main memory of a computer system is also known as

► ROM

► RAM (Page 256)

► PROM

► Hard disk

126. _______ records data by burning microscopic holes in the surface of the disk with a laser.

► Hard disk

► RAM

► Optical disk (Page 257) rep

► Floppy disk

127. Which of the following is true regarding Index?

► Index can only be created for a single table in database

► Index can maximum be created for two tables in database

► Index should be created for every table in the database

► Index can be created for every table in the database Google

128. Which of the following will be deleted relating to a table if you use TRUNCATE command?
AL-JUNAID INSTITUTE GROUP
► all rows in a table (Page 207) rep

► indexes

► table structure and its columns

► constraints

129. Which of the following is not true about relational tables?

► Column values are of the same kind.

► Each row is unique.

► Each column must have a unique name.

► The sequence of rows is significant. Google

130. What is the maximum limit of keys in context with Indexed sequential files?

► 7

► 255 (Page 236)

► 1

► 235

131. Which of the given techniques is/are used to improve query performance in database?

► Good File organization

► Indexing Page no 193

► Both Indexing and Good File organization

► Select only one record per query

132. _______ is a control that users click to perform an action, set or toggle a state, or set an
option.

► Button Click here for detail

► Text box

► Input form
AL-JUNAID INSTITUTE GROUP
► Report Google

133. _______is a control that enables users to select one option from an associated list; users
can also type an option.

► Combo box Google

► Button

► Text box

► Static area

134. Partitions may become unbalanced in:

► Range partitioning (Page 189)

► Hash partitioning

► List partitioning

► Vertical partitioning

135. ALTER TABLE exams ALTER COLUMN Q_description varchar(50) Syntax of ALTER TABLE is
NOT correct.

► True

► False (Page 207)

136. In which of the following, Materialized Views are suitable

► Data warehousing

► Decision support

► Mobile computing

► All of the Given (Page 290)

137. A software package designed to store and manage databases

► Database

► DBMS (Page 18)

► Data model
AL-JUNAID INSTITUTE GROUP
► Data

138. A superkey that does not contain a subset of attributes that is itself a superkey is called a
____.

► candidate key (Page 82)

► primary key

► superkey

► secondary key

139. A ____ relationship exists when an association is maintained within a single entity.

► unary (Page 144)

► ternary

► binary

► weak

140. Which of the following is NOT one of the ways of resolving deadlocks?

► Undoing all the updates made by the particular transaction which is the cause of deadlock.

► A message is passed to the victim and depending on the system the transaction may or may not be
started again automatically.

► Picking a list of all previously completed transactions and undoing all the updates. (Page 323)

► Rollback `victim' transaction and restart it. 22

141. Which of the following statements are Data Definition Language command?

► INSERT

► UPDATE

► GRANT Google

► TRUNCATE

142. How many clustered index(es) do each database table have?

► 2

► 3

► 5
AL-JUNAID INSTITUTE GROUP
► 1 (Page 275) rep

143. Suppose there are 4 rows and 3 columns in TABLE1 and 6 rows and 5 columns in TABLE2;
what is the size of the Cartesian product incase of CROSS JOIN between these two tables?

► 24 Click here for detail rep

► 20

► 18

► 15

144. Consider the relation Interview(CandidateNo, InterviewDate, InterviewTime, StaffNo,


RoomNo) and the following functional dependencies. FD1 : CandidateNo, InterviewDate ->
InterviewTime, StaffNo, RoomNo FD2 : RoomNo, InterviewDate, InterviewTime -> StaffNo,
CandidateNo FD3 : StaffNo, InterviewDate -> RoomNo Which of the following is correct?

► The relation Interview is in 3NF Google

► The relation Interview is in BCNF.

► The FD3 violates 3NF.

► The FD2 violates 2NF.

145. Which of the following is one of the purposes of using DDL commands?

► inserting records into databases

► updating records into databases

► manipulating databases

► creating and destroying databases (Page 196)

146. Which of the following statements creates a database named COMPANY.

► CREATE DATABASE company Google

► CREATE DB company

► ADD DATABASE copmany

► CREATE company DATABASE25


AL-JUNAID INSTITUTE GROUP
147. What is the impact of setting multiple indexes for the same key, in index sequential files?

► Multiple indexes for the same key can not be set

► It increases efficiency (Page 263) rep

► It decreases efficiency

► It will increase complexity as the access time will be increased

148. Consider a transaction which includes following operations Z= Z + 10 Write Z ... Suppose
that the value of Z after addition and the execution of this operation is 17. Now against the
write operation the entry made in the log file will be What does Z reflects in the above entry?

► Object being updated (Page 302)

► Identity of the transaction

► Object value

► Identity of the next transaction to be executed

149. Which of the following is not true regarding DB transactions?

► A set of database operations that are processed partly (Page 291) rep

► A database transaction is a logical unit of database operations

► A database transaction must be atomic

► A database transaction must contains the ACID property

150. Which of the following is not true about input forms?

► Provide an easy, effective, efficient way to enter data into a table

► Especially useful when the person entering the data is not familiar with the inner workings

► Provide different controls to add data into the tables

► One input forms can populate one table at a time (Page 246)

151. Which of the following is an example of volatile memory?

► RAM Google
AL-JUNAID INSTITUTE GROUP
► ROM

► Flash memory

► CPU26

152. Which of following is NOT generally the aim of data partitioning and placement of data?

► Reduce Workload

► Balance Workload

► Merging different relations (Page 189)

► Speed up rate of useful works.

153. Which of the following is Advantage of Re-Hashing technique to handle the collisions?

► Collisions don’t use primary table space

► Unlimited number of elements

► Fast access through use of main table space (Page269 )

► Overhead of multiple linked lists

154. Materialized views and Indexes are NOT similar by the following way(s).

► They consume storage space

► They must be refreshed when the data in their master tables changes.

► They can be accessed directly using a SELECT statement (Page 291)

► All of the Given

155. Select 'NORTH', CUSTOMER From CUST_DTLS Where REGION = 'N' Order By CUSTOMER
Union Select 'EAST', CUSTOMER From CUST_DTLS Where REGION = 'E' Order By CUSTOMER The
above statement:

► Has an error - the string should be in double quotes.

► Has an error - ORDER BY clause. Google

► Does not have an error.

► Has an error - the string in single quotes 'NORTH' and 'SOUTH'.27


AL-JUNAID INSTITUTE GROUP
156. A software package designed to store and manage databases

► Database

► DBMS (Page 18)

► Data model

► Data

157. Who is responsible for authorizing access to the database, for coordinating and
monitoring its use ?

► Database Designers

► Database Administrators (Page 26)

► End Users

► Application Programmers

158. A super key that does not contain a subset of attributes that is itself a super key is called a
____.

► candidate key (Page 82)

► primary key

► superkey

► secondary key

159. A ____ entity has a primary key that is partially or totally derived from the parent entity in
the relationship.

► strong

► weak Google

► business

► relationship

160. Which of the following SQL keywords is not used with DDL statements?

► Table

► Update Google

► Create
AL-JUNAID INSTITUTE GROUP
► Alter 28

161. Identify the constraint that limits the values that can be placed in a column.

► NOT NULL

► CHECK Google

► FOREIGN KEY

► UNIQUE

162. Suppose there are 8 rows and 4 columns in TABLE1 and 3 rows and 4 coulmns in TABLE2;
what is the size of the cartesian product incase of CROSS JOIN between these two tables?

► 24 Google

► 32

► 12

► 16

163. Suppose there are 4 fields in a table named WORKER (Id, first_name, last_name,
joining_year). Which of the following gives all the information of the workers who have joined
after 1965?

► SELECT * FROM WORKER WHERE joining_Year>1965; Google

► SELECT * FROM WORKER WHERE joining_Year>'1965';

► SELECT * FROM WORKER AND joining_Year>'1965';

► SELECT * WHERE joining_Year>1965;

164. Which of the following enforces a relation into 1st normal form?

► The domain of attribute must include only atomic values. (Page 167)

► Every non-key attribute is fully functionally dependent on primary key

► non-key attribute is non-transitively dependent on primary key.

► Every non-key attribute is partially dependent on super key

165. Which of the following is NOT a feature of HASH ACCESS?

► indexes to search or maintain (Page 266)


AL-JUNAID INSTITUTE GROUP
► Very fast direct access

► Inefficient sequential access

► Use when direct access is needed, but sequential access is not.

166. Which of the following is NOT a feature of a good interface?

► data structure based (Page 243) rep

► user friendly

► consistency

► process based29

167. Which of the following is true about application programs?

► develop before the database design

► Tools selection is made after the development database

► meant to perform different operations by the user (Page 238)

► must to design before the designing and developing database

168. A relation (from the relational database model) consists of a set of tuples, which implies
that

► Relational model supports multi-valued attributes whose values can be represented in sets.

► for any two tuples, the values associated with all of their attributes may be the same.

► for any two tuples, the values associated with one or more of their attributes must differ. Google

► all tuples in a particular relation may have different attributes.30

169. The information regarding ‘views’ and ‘Integrity constraints’ are found in

► Both Data Dictionary and System Catalog

► System Catalog

► Data Dictionary
AL-JUNAID INSTITUTE GROUP
► Indexes

170. Which of following is not the feature of Indexes?

► consume storage space.

► must be refreshed when the data in their master tables changes

► improve the performance of SQL execution when they are used for query rewrites

► can be accessed directly using a SELECT statement (Page 291)

171. Which of the following is not a type of user interface?

► Graphical User Interface (GUI)

► Forms

► DB tables (Page 240)

► Text based

172. In SQL queries, while creating tables or relations in database, key columns may be
specified by

► Data type

► Null

► Not Null (Page 203)

► Owner

173. The ____ constraint specifies whether each entity supertype occurrence must also be a
member of at least one subtype.

► specialization Google

► uniqueness

► inheritance

► completeness

174. In a conceptual model for a university, what type of relationship exists between Grade and
Student entities?

► 1:1

► 1:M Google
AL-JUNAID INSTITUTE GROUP
► M:M

► Ternary

175. ______ is a control that presents a set of choices from which a user can select one or
more items; items can be text, graphics, or both.

► Text input

► Report

► Button

► List box Google

176. _______is a control that enables users to select one option from an associated list; users
can also

► Button

► Text box

► Static area

177. Which of the following should not be a property of a database transaction?

► Atomicity

► Isolation

► Durability

► Divergence ( page 291)

178. Which of the following is the correct way of removing the Index called branchNoIndex?

► DROP INDEX branchNoIndex; Google

► APPEND INDEX branchNoIndex;

► REMOVE INDEX branchNoIndex;

► DEL INDEX branchNoIndex;


AL-JUNAID INSTITUTE GROUP
179. Consider the following diagram depicting a kind of a relationship type where X and Z are
entities and Y is a relationship type: Select the correct statement among the following on the
above diagram.

► The relationship type Y is of cardinality ratio 1 : N Google

► The diagram depicts existence dependencies.

► The participation of X in the Y relationship type is total.

► The participation of Z in the Y relationship type is partial.

180. Identify the correct statement about ANSI/SPARC architecture.

► The external level is not concerned with individual user perceptions

► The internal level, in a database system, will always be relational

► Any given database has exactly one conceptual schema and one physical schema, but it may have
several external schemas.

► A data definition language is used to define the internal schema. Google

181. Which of the following SQL commands deletes a record of an employee with the
employee_id 12345, from a table named PERSON.

► DELETE FROM person WHERE employee_id = ‘2345’

► DELETE WHERE person FROM employee_id = 12345

► DROP FROM person WHERE employee_id = 12345

► DELETE WHERE person WHERE employee_id = 12345

Identify the correct statement with respect to normalization.

182. ► Normalization is a formal technique that can be used only at the starting phase of the
database design.

► Normalization can be used as a top-down standalone database design technique.

► The process of normalization through decomposition must achieve the lossless join property at any
cost whereas the dependency reservation property is sometimes sacrificed.
AL-JUNAID INSTITUTE GROUP
► The process of normalization through decomposition must achieve the dependency reservation
property at any cost whereas the lossless join property is sometimes sacrificed Google

183. Which of the following concept is applicable with respect to 2NF?

► Non-transitive dependency

► Full functional dependency (Page 167)

► Partial dependency

► Transitive dependency

184. Which of the following is INCORRECT about VIEWS?

► It is not possible to left out the data which is not required for a specific view. (Page 280)

► A database view displays one or more database records on the same page.

► Views can be used as security mechanisms

► Views are generally used to focus the perception each user.

185. Identify the advantage of DELETE command over TRUNCATE.

► Can be Rolled back. Google

► is DDL Command.

► cannot activate a trigger.

► faster and uses fewer system

186. Which of the following statements are Data Manipulation Language command?

► INSERT Google

► GRANT

► TRUNCATE

► CREAT

187. Which of the following is not a type of VIEWS?

► Materialized View
AL-JUNAID INSTITUTE GROUP
► Simple Views

► Complex View

► Cross Reference View Google

188. A file with ______ records, with sequential access file, an average of _______ key
comparisons are

necessary.

► 10000, 5500

► 10000, 5000 Conceptual

► 10000, 4500

► 10000, 500

189. A perfect hash function map a key to distinct location having search time _________.

► O(1) Page no 266

► O(n)

► O(n+1)

► O(n-1)

190. ____________ is used to detect the dead lock.


 Wait-for graph Page no 320
 Cross Reference Matrix
 Inner Join
 Clustered Index

191. Wait-for graph is maintained by __________


 Lock manager Page no 320
 Index Manager
 View Manager
 Constraint Manager
AL-JUNAID INSTITUTE GROUP
192. Which of the following serves as reference point in the log file?
 Constraints
 Relations
 Check points google
 Relationships

193. After execution of “commit” statement, ____________ is updated first.


 Database Buffer Page no 303
 Clustered-Index
 Non-Clustered Index
 Application Program

194. To select the range while creating Indexes, the operator that is not used is _____.
 Equals to (==). google
 Less than (<)
 And (&&)
 Between

195. Which of the following constraints enforces Entity Integrity?


 PRIMARY KEY google
 FOREIGN KEY
 CHECK
 NOT NULL

196. The property of ____ enables an entity subtype to hold the properties of its super type.
 Null Constraint
 Integrity
 Inheritance google
 Uniqueness

197. Which of the following most certainly implies the need for an entire table to implement?
 A binary relationship
 A ternary relationship google
 A recursive relationship
 An identifying relationship
AL-JUNAID INSTITUTE GROUP
198. “A shared collection of logically related data” is known as
 Database Page no 10
 File Processing System
 Program and Data Interdependence
 DBMS

199. On magnetic media, data is stored in ______________


 Text
 Images
 Binary format Google
 Tables

200. Which of the following is one of the purposes of using DDL commands?
 inserting records into databases
 updating records into databases
 manipulating databases
 creating and destroying databases google
201. _________ is used to create and destroy database and database objects
 ERD
 DCL
 DDL google
 DML

202. The ____ constraint specifies whether each entity super type occurrence must also be a
member of at its one subtype.
 Total completeness Google
 Specialization
 Uniqueness
 Inheritance

203. Which of the following is a correct way to implement many-to-many cardinality in a binary
relationship while designing tables?
AL-JUNAID INSTITUTE GROUP
 Using a third table with the keys from both the tables forming the composite primary key of third
Table. Google
 By splitting the data into five tables with primary key and foreign key relationships.
 By splitting the data into five tables with primary key and foreign key relationships.
 By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key).

204. Which of the following is INCORRECT regarding De-normalization?


 It is the process of attempting optimization of Database.
 It is a technique to move from lower to higher normal forms of database modeling. Google
 In this process, it is required to add redundant data.
 It enhances the performance of DB.

205. Hash Partitioning is applied on _______.


 Rows
 Columns
 Algorthim Google
 Attributes

206. _____________ is used to sort the result set in ascending or descending order
 Group by Clause
 From Clause
 Where Clause
 Order by Clause Page no 220

207. Which of the following SQL Function does not use input parameter?
 LOWER
 UPPER
 LEN
 CURRENT_TIME Page no 221

208. “Select * from STUDENT, DEPARTMENT” is an example of


 Cartesian Join Page 225
 Inner Join
 Outer Join
 Full Outer Join
AL-JUNAID INSTITUTE GROUP
209. Which of the following is not a DDL Command?
 Create table
 Alter table
 Insert into Google
 Create database

210. Which of the following is the correct syntax for SELECT statement?
 SELECT column_name(s) FROM table_name Conceptual
 SELECT FROM table_name column_name(s)
 FROM SELECT column_name(s) table_name
 FROM table_name SELECT column_name(s)

211. Which of the following specifies the tables, which we access in the query?
 SELECT Clause page no 212
 FROM Clause
 WHERE Clause
 ORDER BY Clause

212. Procedure of finding the size of Cartesian Product is _____

 The number of columns in the first table multiplied by the number of rows in the second table.
 The number of rows in the first table multiplied by the number of columns in the first table.
 The number of rows in the first table multiplied by the number of rows in the second table.
 The number of columns in the first table multiplied by the number of columns in the second table

213. Which of the following is not a type of user interface?


 Graphical User Interface (GUI)
 Forms
 Database Schema page no 240
 Text based Interface
AL-JUNAID INSTITUTE GROUP
214. Which of the following is incorrect regarding Indexes?
 It can not be created on composite attributes.
 Index can be defined even when there is no data in the table.
 It support Range selections.
 It can be created using ‘Create Index’ statement

215. Which of the following is NOT a part of Deadlock Resolution?


 Choose a victim
 A message is passed to the victim and depending on the system the transaction may or may not
be started again automatically.
 Picking a list of all previously completed transactions and undoing all the updates. Page 323
 Rollback `victim' transaction and restart it.

216. A Table can have ___________ clustered index (es).


 Only one Google
 Only two
 More than two
 Only three

217. Which of the following is true about the views?


 View can only show few attributes of a table
 View can not be used for retrieving data
 View can not be used as security mechanisms
 We can customize the order of the table fields through Views Google

218. Which of the following Command creates a view named ST-LIST on STUDENT table to
show all the columns?
 CREATE VIEW ST_LIST AS SELECT * FROM STUDENT page no 284
 SELECT * FROM STUDENT VIEW ST_LIST
 CREATE ST_LIST VIEW AS STUDENT
 SELECT * FROM STUDENT TO ST_LIST

219. __________ must identify a record in the table, uniquely.


 Key Google
 SQL Statement
 Index
AL-JUNAID INSTITUTE GROUP
 Hash Algorithm

220. ___________ manages mass storage devices like hard disks and tape drive.
 Index
 Operating System Google
 RAID
 Sequential File Access

221. Which of the following is not the property of Transaction?


 Atomicity
 Consistency
 Redundancy page no 291
 Durability

222. While recovering data, which of the following files does a Recovery Manager examines at
first?
 Clustered Index
 Log file Google
 Data dictionary
 Metadata

223. Which of the following serves as reference point in the log file?
 Constraints
 Relations
 Check points Google
 Relationships

224. -------------- occurs when multiple users want to update same object at the same time.
 Uncommitted Update Problem
 Inconsistent Analysis Problem
 Lost of Joins Problem
 Lost Update Problem page no308
AL-JUNAID INSTITUTE GROUP
225. It is not necessary for any super type entity to have its entire instance set to be associated
with any of the subtype entity, is called as ______________.
 Partial Completeness page no 103
 Disjoint Overlap
 Complete Overlap
 Total Completeness

226. R X θ S, If R and S are relations and θ is a ______.


 Table Name
 Attributes
 Primary Key
 Condition Google

227. If D --> E, F then D --> E and D --> F.

This inference rules is called as _______.

 Transitivity
 Additive
 Projectivity conceptual
 Augmentation

228. Which of the following constraints enforces Entity Integrity?


 PRIMARY KEY Google
 FOREIGN KEY
 CHECK
 NOT NULL

229. Which of the following most certainly implies the need for an entire table to implement?
 A binary relationship
 A ternary relationship Google
 A recursive relationship
 An identifying relationship
230. “Database System” is the combination of_________________.
 Database and DBMS Google
 Database and Data
 Data and Information
 Operating System and Database
AL-JUNAID INSTITUTE GROUP
231. End User directly interact with _______________
 External Schema page: 35
 Conceptual Schema
 Internal Schema
 Core of Database Architecture
232. _____________ is also known as Community View of Database.
 External Schema
 Conceptual Schema Google
 User views
 Internal Schema
233. _____________ contains data about all the Databases in DBMS.
 Data Dictionary Google
 Schema
 Cross Reference Matrix
 Conceptual Data Model
234. In which of the following situations, Clustering is suitable:
 Frequently updating
 Relatively static Google
 Frequently deletion
 Relatively dynamic
235. SQL is an _____________ standard computer language
 ANSI Google
 General
 Cold fusion
 Interactive
236. Which of the following statements creates a database named COMPANY.
 CREATE DATABASE COMPANY Google
 CREATE DB company
 ADD DATABASE company
 CREATE company DATABASE
237. ___________ is used to read, write, and remove the data from a database
 SQL Page 194
 ERD
 ANSI
 Data Model
238. Which of the following SQL keywords is not used with DDL statements?
 Table page no 234
 Update
 Create
 Create
239. Which of the following statements are DML commands?
 ALTER
 CREATE
AL-JUNAID INSTITUTE GROUP
 INSERT
 GRANT google
240. The ____ constraint specifies whether each entity supertype occurrence must also be a
member of at its one subtype.
 Total completeness google
 Specialization
 Uniqueness
 Inheritance
241. Which of the following commands is used to drop the table named STUDENT?
 DROP TABLE STUDENT Page no 208
 TABLE STUDENT DROP
 TABLE DROP STUDENT
 STUDENT TABLE DROP
242. If a relation contains single Key, the relation is automatically in _______.
 1NF
 2NF google
 3NF
 4NF
243. Which of the following is not a type of user interface?
 Graphical User Interface (GUI)
 Forms
 Database Schema google
 Text based Interface

244. Which of the following is not related with Browser based forms development?
 HTML
 ASP
 Front Page
 Dev C Conceptual
245. Which of the following is the activity, which is not performed during the development of
application

programs?

 Data input programs


 Editing
 Display
 Data Collection google
246. Which of the following is not correct about input forms?
 Provide an easy, effective, efficient way to enter data into a table
 Especially useful when the person entering the data is not familiar with the inner workings
 Provide different controls to add data into the tables
AL-JUNAID INSTITUTE GROUP
 One input forms can populate one table at a time Conceptual
247. _______ is a control that users click to perform an action.
 Input form
 Report
 Button google
 Text box
248. ________ is disadvantage of chaining technique to handle the collisions.
 Unlimited Number of elements
 Fast re-hashing
 Overhead of multiple linked lists google
 Maximum number of elements must be known

249. What is the impact of setting multiple indexes for the same key?
 Multiple indexes for the same key can not be set
 It increases efficiency google
 It decreases efficiency
 It will increase complexity as the access time will be increased

250. Which of the following is NOT a part of Deadlock Resolution?


 Choose a victim
 A message is passed to the victim and depending on the system the transaction may or may not
be started again automatically.
 Picking a list of all previously completed transactions and undoing all the updates. google
 Rollback `victim' transaction and restart it.

251. Which of the following is true regarding Index?


 Index can only be created for a single table in database page 262
 Index can maximum be created for two tables in database
 Index can only be created, when a database has at least 3 tables
 Index can be created for every table in the database

252. Which of the following Command creates a view named ST-LIST on STUDENT table to
show all the

columns?

 CREATE VIEW ST_LIST AS SELECT * FROM STUDENT Conceptual


AL-JUNAID INSTITUTE GROUP
 SELECT * FROM STUDENT VIEW ST_LIST
 CREATE ST_LIST VIEW AS STUDENT
 SELECT * FROM STUDENT TO ST_LIST

253. __________ must identify a record in the table, uniquely.


 Hash Algorithm
 Key page 260
 SQL Statement
 Index

254. ___________ manages mass storage devices like hard disks and tape drive.
 Index
 Operating System google
 RAID
 Sequential File Access

255. Dead Lock can be prevented by giving each transaction a ___________.


 Name
 Clustered Index
 Cartesian Join
 Priority Conceptual

256. Wait-for graph is maintained by __________


 Lock manager google
 Index Manager
 View Manager
 Constraint Manager

257. Which of the following serves as reference point in the log file?
 Constraints
 Relations
 Check points google
 Relationships

258. -------------- occurs when multiple users want to update same object at the same time.
AL-JUNAID INSTITUTE GROUP
 Uncommitted Update Problem
 Inconsistent Analysis Problem
 Lost of Joins Problem
 Lost Update Problem google
259. _______________ are called participants, when enrolled in a relationship.
 Attributes
 Relations
 Entities google
 Keys
260. Which of the following constraints enforces Entity Integrity?
 PRIMARY KEY google
 FOREIGN KEY
 CHECK
 NOT NULL

261. A index determines the storage order of data in table


a. Primary
b. Clustered
c. Dense
d. Secondary
262. Views are generally used to focus, simplify and customize the perceptions
eachuser has of the
a. Database
b. Program
c. Operating system
d. View
263. provides rapid, non-sequential , direct access to
recordsa. Hashing
b. Collisions handling
c. Non hashing
d. Sequential
264. The log file is also called
a. Non Transaction file
b. Transaction file
c. Temporary file
d. Hash file
265. There are ways to create a new view in your database
a. Three
b. Two
c. Five
AL-JUNAID INSTITUTE GROUP
d. Six
266. The
index which has some of the key value is classified as
a. Linear index
b. Dense index
c. Non dense index
d. Cluster index
267. Which of the following is not related to index sequential file structure
a. Records are stored in sequence and index in maintained
b. Dese and non dese type of indexes are maintained
c. Track overflow and file overflow areas are ensues
d. We chose a number of bucket to corresponds to the number of search
keyvalues we will have stored in the data base
268. Which file organization is allowed by direct access storage device?
a. Sequential only
b. Direct only
c. Indexed and direct only
d. Sequential indexed and direct
269. generally are complex views , views of views, and view of
multipletable
a. Dynamic views
b. Simple views
c. Materialized view
d. Generalized view
270. Inverted files or inversion , linked list B+ trees, there are the
threeimplementation approaches of
a. Sequential Access
b. Hashing
c. Non
sequentiald.
Indexes
271. Following are the
characteristics if
1) Non indexes to search or maintain
2) Very fast direct access
3) Inefficient sequential access
4) Use when direct access in needed, but sequential access is not
a. Index access
b. Sequential
indexc. Hashed
access
d. Non hashed access
272. Can be defined when even there is no data in the table , existing values
are checked in execution of this command , it supports section of forms ,
these arethe major properties of
a. Sequential approach
b. Direct approach
c. view
d. indexes
273. The two basic types of record access methods are
a. sequential and random
AL-JUNAID INSTITUTE GROUP
b. sequential and indexed
c. direct and immediate
d. sequential and immediate

You might also like