0% found this document useful (0 votes)
41 views38 pages

35021C04 - DATABASE MANAGEMENT SYSTEMS (Print Taken) Solved - Answer

The document contains questions and answers related to database management systems (DBMS). It covers topics like the full form of DBMS, definitions of database and DBMS, types of data that can be stored in a database, database management system components, relational database concepts like tables, rows, columns, relationships between entities, SQL commands for data manipulation and definition, ACID properties, and database design concepts.

Uploaded by

Sawan Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views38 pages

35021C04 - DATABASE MANAGEMENT SYSTEMS (Print Taken) Solved - Answer

The document contains questions and answers related to database management systems (DBMS). It covers topics like the full form of DBMS, definitions of database and DBMS, types of data that can be stored in a database, database management system components, relational database concepts like tables, rows, columns, relationships between entities, SQL commands for data manipulation and definition, ACID properties, and database design concepts.

Uploaded by

Sawan Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Qn.

P Part 35021C04 - Database Management Systems


No

What is the full form of DBMS?


a) Data of Binary Management System
1 1 1 b) Database Management System
c) Database Management Service
d) Data Backup Management System

What is a database?
a) Organized collection of information that cannot be accessed, updated, and
managed
1 1 2 b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and
managed
d) Organized collection of data that cannot be updated

What is DBMS?
a) DBMS is a collection of queries
1 1 3 b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data

Procedural language among the following is __________


a) Domain relational calculus
1 1 4 b) Tuple relational calculus
c) Relational algebra
d) Query language

Which type of data can be stored in the database?


a) Image oriented data
1 1 5 b) Text, files containing data
c) Data in the form of audio or video
d) All of the above

In which of the following formats data is stored in the database management system?
a) Image
1 1 6 b) Text
c) Table
d) Graph

Which of the following is not a type of database?


a) Hierarchical
1 1 7 b) Network
c) Distributed
d) Decentralized

Which of the following is not an example of DBMS?


a) MySQL
1 1 8 b) Microsoft Acess
c) IBM DB2
d) Google

Page 1
Which of the following is not a feature of DBMS?
a) Minimum Duplication and Redundancy of Data
1 1 9 b) High Level of Security
c) Single-user Access only
d) Support ACID Property

Which of the following is a feature of the database?


a) No-backup for the data stored
1 1 10 b) User interface provided
c) Lack of Authentication
d) Store data in multiple locations

Which of the following is not a function of the database?


a) Managing stored data
1 1 11 b) Manipulating data
c) Security for stored data
d) Analysing code

Which of the following is a function of the DBMS?


a) Storing data
1 1 12 b) Providing multi-users access control
c) Data Integrity
d) All of the above

Which of the following is a component of the DBMS?


a) Data
1 1 13 b) Data Languages
c) Data Manager
d) All of the above

Non Procedural language among the following is __________


a) Domain relational calculus
1 1 14 b) Tuple relational calculus
c) Relational algebra
d) both a and b

What is information about data called?


a) Hyper data
1 1 15 b) Tera data
c) Meta data
d) Relations

What does an RDBMS consist of?


a) Collection of Records
1 1 16 b) Collection of Keys
c) Collection of Tables
d) Collection of Fields

Which command is used to remove a relation from an SQL?


a) Drop table
1 1 17 b) Delete
c) Purge
d) remove

Page 2
Which of the following is not the utility of DBMS?
i) Backup ii) Loading iii) Process Organization iv) File organization
a) i, ii, and iv only
1 1 18
b) i, ii and iii only
c) i, iii and iv only
d) All i, ii, iii, and iv

The DBMS acts as an interface between ________________ and


________________ of an enterprise-class system.
a) Data and the DBMS
1 1 19
b) Application and SQL
c) Database application and the database
d) The user and the software

The ability to query data, as well as insert, delete, and alter tuples, is offered by
____________
a) TCL (Transaction Control Language)
1 1 20
b) DCL (Data Control Language)
c) DDL (Data Definition Language)
d) DML (Data Manipulation Language)

What is the function of the following command?


Delete from r where P;
a) Clears entries from relation
2 1 21
b) Deletes relation
c) Deletes particular tuple from relation
d) All of the mentioned

Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
2 1 22 b) Concatenation
c) Relational-and
d) All of the mentioned

Which of the following is the subset of SQL commands used to manipulate Oracle
Structures, including tables?
a) Data Described Language
2 1 23
b) Data Retrieval Language
c) Data Manipulation Language
d) Data Definition Language

__________ command is used in SQL to issue multiple CREATE TABLE, CREATE


VIEW and GRANT statements in a single transaction.
a) CREATE CLUSTER
2 1 24
b) CREATE PACKAGE
c) CREATE SCHEMA
d) All of the mentioned

The oldest DB model is _______________


a) Network
2 1 25 b) Physical
c) Hierarchical
d) Relational

Page 3
A relational database consists of a collection of
a) Tables
2 1 26 b) Fields
c) Records
d) Keys

A ________ in a table represents a relationship among a set of values.


a) Column
2 1 27 b) Key
c) Row
d) Entry

The term _______ is used to refer to a row.


a) Attribute
2 1 28 b) Tuple
c) Field
d) Instance

The term attribute refers to a ___________ of a table.


a) Record
2 1 29 b) Column
c) Tuple
d) Key

For each attribute of a relation, there is a set of permitted values, called the ________
of that attribute.
a) Domain
2 1 30
b) Relation
c) Set
d) Schema

Course(course_id,sec_id,semester)
Here the course_id,sec_id and semester are __________ and course is a _________
a) Relations, Attribute
2 1 31
b) Attributes, Relation
c) Tuple, Relation
d) Tuple, Attributes

The tuples of the relations can be of ________ order.


a) Any
2 1 32 b) Same
c) Sorted
d) Constant

Which one of the following is used to define the structure of the relation, deleting
relations and relating schemas?
a) DML(Data Manipulation Langauge)
2 1 33
b) DDL(Data Definition Langauge)
c) Query
d) Relational Schema

Page 4
The union operation is represented by
a) ∩
2 1 34 b) U
c) –
d) *

If we want to retain all duplicates, we must write ________ in place of union.


a) Union all
2 1 35 b) Union some
c) Intersect all
d) Intersect some

A _________ consists of a sequence of query and/or update statements.


a) Transaction
2 1 36 b) Commit
c) Rollback
d) Flashback

Which of the following makes the transaction permanent in the database?


a) View
2 1 37 b) Commit
c) Rollback
d) Flashback

In order to undo the work of transaction after last commit which one should be used?
a) View
2 1 38 b) Commit
c) Rollback
d) Flashback

In case of any shut down during transaction before commit which of the following
statement is done automatically?
a) View
2 1 39
b) Commit
c) Rollback
d) Flashback

In order to maintain the consistency during transactions, database provides


a) Commit
2 1 40 b) Atomic
c) Flashback
d) Retain

_____________ can help us detect poor E-R design.


a) Database Design Process
3 1 41 b) E-R Design Process
c) Relational scheme
d) Functional dependencies

Designers use which of the following to tune the performance of systems to support
time-critical operations?
a) Denormalization
3 1 42
b) Redundant optimization
c) Optimization
d) Realization

Page 5
Relational Algebra is a __________ query language that takes two relations as input
and produces another relation as an output of the query.
a) Relational
3 1 43
b) Structural
c) Procedural
d) Fundamental

Which of the following is a fundamental operation in relational algebra?


a) Set intersection
3 1 44 b) Natural join
c) Assignment
d) None of the mentioned

_____________ express the number of entities to which another entity can be


associated via a relationship set.
a) Mapping Cardinality
3 1 45
b) Relational Cardinality
c) Participation Constraints
d) None of the mentioned

Data integrity constraints are used to:


a) Control who is allowed access to the data
3 1 46 b) Ensure that duplicate records are not entered into the table
c) Improve the quality of data entered for a specific property
d) Prevent users from changing the values stored in the table

______ is a special type of integrity constraint that relates two relations & maintains
consistency across the relations.
a) Entity Integrity Constraints
3 1 47
b) Referential Integrity Constraints
c) Domain Integrity Constraints
d) Domain Constraints

____________ is preferred method for enforcing data integrity


a) Constraints
3 1 48 b) Stored Procedure
c) Triggers
d) Cursors

In the __________ normal form, a composite attribute is converted to individual


attributes.
a) First
3 1 49
b) Second
c) Third
d) Fourth

A table on the many side of a one to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
3 1 50 b) Be in Third Normal Form (3NF)
c) Have a single attribute key
d) Have a composite key

Page 6
Tables in second normal form (2NF):
a) Eliminate all hidden dependencies
3 1 51 b) Eliminate the possibility of a insertion anomalies
c) Have a composite key
d) Have all non key fields depend on the whole primary key

Functional Dependencies are the types of constraints that are based on______
a) Key
3 1 52 b) Key revisited
c) Superset key
d) None of the mentioned

Dates must be specified in the format


a) mm/dd/yy
3 1 53 b) yyyy/mm/dd
c) dd/mm/yy
d) yy/dd/mm

A ________ on an attribute of a relation is a data structure that allows the database


system to find those tuples in the relation that have a specified value for that attribute
efficiently, without scanning through all the tuples of the relation.
3 1 54 a) Index
b) Reference
c) Assertion
d) Timestamp

Which of the following is used to store movie and image files?


a) Clob
3 1 55 b) Blob
c) Binary
d) Image

Which forms are based on the concept of functional dependency:


a) 1NF
3 1 56 b) 2NF
c) 3NF
d) 4NF

What are the desirable properties of a decomposition


a) Partition constraint
3 1 57 b) Dependency preservation
c) Redundancy
d) Security

The term "NTFS" refers to which one of the following?


a) New Technology File System
3 1 58 b) New Tree File System
c) New Table type File System
d) Both A and C

Which of the following refers to the level of data abstraction that describes exactly
how the data actually stored?
a) Conceptual Level
3 1 59
b) Physical Level
c) File Level
d) Logical Level

Page 7
Which of the following refers collection of the information stored in a database at a
specific time?
a) Independence
3 1 60
b) Instance of the database
c) Schema
d) Data domain

Ranking of queries is done by which of the following?


a) Group by
4 1 61 b) Order by
c) Having
d) Both Group by and Order by

A management procedure called ___ control is required to control the process of


concurrently performing operations on a database.
a) Database
4 1 62
b) Conspiracy
c) Concurrency
d) Relational

The concurrent execution of the database in a ____-user system refers to the fact that
multiple users are able to access and use it at the same time.
a) Single
4 1 63
b) Two
c) Three
d) Multiple

When dealing with database transactions, there is often a need for multiple users to
use a database to perform different operations. In this case, ___ of the database
occurs.
4 1 64 a) Concurrent Connection
b) Concurrent Reduction
c) Concurrent Execution
d) Concurrent Revolution

What are the two main operations in the database transaction?


a) READ
4 1 65 b) WRITE
c) Both A and B
d) None of the above

The concurrency ___ allows us to maintain the concurrency of the database.


a) Protocols
4 1 66 b) Controls
c) Control Protocols
d) None

As part of concurrency control protocols, the concurrent execution of database


transactions will be ___, durable, and serializable.
a) Atomic
4 1 67
b) Consistent
c) Isolated
d) All of the above

Page 8
Which property of database transaction creates an illusion then only 1 transaction is
executed in the system in spite of more than one transaction being executed in a
parallel manner?
4 1 68 a) Atomicity
b) Consistency
c) Isolation
d) Durability

In a strict two-phase locking protocol


a) All the exclusive locks held by the transaction are released when the transaction is
completed
4 1 69 b) All the shared locks held by the transaction are released when the transaction is
completed.
c) Both A & B
d) None of these

In a transaction, a ...................... operation will read data from the table and write on
the buffer.
(A).Write
4 1 70
(B).Read
(C).Execute
(D).None of these

Serializability of current transaction is ensured by


(A).locking
4 1 71 (B).time sharing
(C).Both A & B
(D).None of these

......................................... ensure that system will never entered in deadlock.


(A).Two-phase locking protocol
4 1 72 (B).Deadlock detection protocol
(C).Deferred update protocol
(D).Timestamp ordering protocol

In 2-phase locking a transaction must :


(A).Release all its locks at the same time
4 1 73 (B).Not obtain any new locks once it has started releasing locks
(C).Ensure that deadlocks will never occur
(D).None of these

Collections of operations that form a single logical unit of work are called
__________
a) Views
4 1 74
b) Networks
c) Units
d) Transactions

Which of the following systems is responsible for ensuring durability?


a) Recovery system
4 1 75 b) Atomic system
c) Concurrency control system
d) Compiler system

Page 9
Which of the following systems is responsible for ensuring isolation?
a) Recovery system
4 1 76 b) Atomic system
c) Concurrency control system
d) Compiler system

A transaction that has not been completed successfully is called as _______


a) Compensating transaction
4 1 77 b) Aborted transaction
c) Active transaction
d) Partially committed transaction

The execution sequences in concurrency control are termed as ________


a) Serials
4 1 78 b) Schedules
c) Organizations
d) Time tables

The scheme that controls the interaction between executing transactions is called as
_____
a) Concurrency control scheme
4 1 79
b) Multiprogramming scheme
c) Serialization scheme
d) Schedule scheme

It is an abstraction through which relationships are treated as higher level entities


(A) Generalization.
4 1 80 (B) Specialization.
(C) Aggregation.
(D) Inheritance.

A unit of storage that can store one or more records in a hash file organization is
denoted as
5 1 81 a) Buckets
b) Disk pages
c) Blocks d) Nodes

The file organization which allows us to read records that would satisfy the join
condition by using one block read is
a) Heap file organization
5 1 82
b) Sequential file organization
c) Clustering file organization
d) Hash file organization

Each tablespace in an Oracle database consists of one or more files called


a) Files
5 1 83 b) name space
c) datafiles
d) PFILE

Which level of RAID refers to disk mirroring with block striping?


a) RAID level 1
5 1 84 b) RAID level 2
c) RAID level 0
d) RAID level 3

Page 10
Which one of the following is a Stripping technique?
a) Byte level stripping
5 1 85 b) Raid level stripping
c) Disk level stripping
d) Block level stripping

Hardware RAID implementations permit _________ that is, faulty disks can be
removed and replaced by new ones without turning power off.
a) Scrapping
5 1 86
b) Swapping
c) Hot swapping
d) None of the mentioned

Which of the following is a physical storage media?


a) Tape Storage
5 1 87 b) Optical Storage
c) Flash memory
d) All of the mentioned

The _________ is the fastest and most costly form of storage, which is relatively
small; its use is managed by the computer system hardware.
a) Cache
5 1 88
b) Disk
c) Main memory
d) Flash memory

Which of the following stores several gigabytes of data but usually lost when power
failure?
a) Flash memory
5 1 89
b) Disk
c) Main memory
d) Secondary memory

_________ is increasingly being used in server systems to improve performance by


caching frequently used data, since it provides faster access than disk, with larger
storage capacity than main memory.
a) Flash memory
5 1 90
b) Disk
c) Main memory
d) Secondary memory

Explanation: Flash memory is of two types – NAND and NOR.


Which is the cheapest memory device in terms of costs/ bit?
a) Semiconductor memory
5 1 91
b) Magnetic disks
c) Compact disks
d) Magnetic tapes

Tape storage is referred to as __________ storage.


a) Direct-access
5 1 92 b) Random-access
c) Sequential-access
d) All of the mentioned

Page 11
The storage structure which do not survive system crashes are ______
a) Volatile storage
5 1 93 b) Non-volatile storage
c) Stable storage
d) Dynamic storage

A ______ file system is software that enables multiple computers to share file
storage while maintaining consistent space allocation and file content.
a) Storage
5 1 94
b) Tertiary
c) Secondary
d) Cluster

Various storage devices store ___ in the form of data.


a) Bits
5 1 95 b) Bytes
c) Both A and B
d) None of the above

Which of the following has the highest speed?


a) Primary Storage
5 1 96 b) Secondary Storage
c) Tertiary Storage
d) All of the above

Data that is accessible via the storage medium is processed by the ___.
a) Cache
5 1 97 b) Main memory
c) Both A and B
d) None of the above

Every instruction a computer machine receives goes into the ___.


a) Main memory
5 1 98 b) Cache
c) Main Memory & Cache
d) None of the above

Storage media such as cache are ____.


a) Cheap
5 1 99
b) Expensive
c) Average price d)None

Flash memory files are stored on ___- keys, which are connected to a computer
through ___ ports.
a) USB
5 1 100
b) UBS
c) BUS
d) SUB

Page 12
Answer

b) Database
Management
System

c) Organized
collection of data
or information
that can be
accessed,
updated, and
managed

d) DBMS stores,
modifies and
retrieves data

c) Relational
algebra

d) All of the
above

c) Table

d) Decentralized

d) Google

Page 13
c) Single-user
Access only

b) User interface
provided

d) Analysing code

d) All of the
above

d) All of the
above

d) both a and b

c) Meta data

c) Collection of
Tables

a) Drop table

Page 14
a) i, ii, and iv only

c) Database
application and
the database

d) DML (Data
Manipulation
Language)

c) Deletes
particular tuple
from relation

b) Concatenation

d) Data Definition
Language

c) CREATE
SCHEMA

a) Network

Page 15
a) Tables

c) Row

b) Tuple

b) Column

a) Domain

b) Attributes,
Relation

a) Any

b) DDL(Data
Definition
Langauge)

Page 16
b) U

a) Union all

a) Transaction

b) Commit

c) Rollback

c) Rollback

b) Atomic

d) Functional
dependencies

a)
Denormalization

Page 17
c) Procedural

d) None of the
mentioned

a) Mapping
Cardinality

c) Improve the
quality of data
entered for a
specific property

b) Referential
Integrity
Constraints

a) Constraints

a) First

d) Have a
composite key

Page 18
a) Eliminate all
hidden
dependencies

a) Key

b) yyyy/mm/dd

a) Index

b) Blob

c) 3NF

b) Dependency
preservation

a) New
Technology File
System

b) Physical Level

Page 19
b) Instance of the
database

b) Order by

c) Concurrency

d) Multiple

c) Concurrent
Execution

c) Both A and B

c) Control
Protocols

d) All of the
above

Page 20
c) Isolation

a) All the
exclusive locks
held by the
transaction are
released when
the transaction is
completed

(A).Write

(C).Both A & B

(A).Two-phase
locking protocol

(C).Ensure that
deadlocks will
never occur

d) Transactions

a) Recovery
system

Page 21
c) Concurrency
control system

b) Aborted
transaction

b) Schedules

a) Concurrency
control scheme

(C) Aggregation.

a) Buckets

c) Clustering file
organization

c) datafiles

a) RAID level 1

Page 22
d) Block level
stripping

c) Hot swapping

d) All of the
mentioned

a) Cache

c) Main memory

a) Flash memory

c) Compact disks

c) Sequential-
access

Page 23
a) Volatile
storage

d) Cluster

c) Both A and B

a) Primary
Storage

b) Main memory

a) Main memory

b) Expensive

a) USB

Page 24
Par Qn. Blooms COs
P 35021C04 - Database Management Systems
t No Level Level

What is the full form of DBMS?


a) Data of Binary Management System
1 1 1 b) Database Management System 1 CO1
c) Database Management Service
d) Data Backup Management System

What is a database?
a) Organized collection of information that cannot be accessed, updated, and
managed
1 1 2 b) Collection of data or information without organizing 1 CO1
c) Organized collection of data or information that can be accessed, updated, and
managed
d) Organized collection of data that cannot be updated

What is DBMS?
a) DBMS is a collection of queries
1 1 3 b) DBMS is a high-level language 1 CO1
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data

Procedural language among the following is __________


a) Domain relational calculus
1 1 4 b) Tuple relational calculus 2 CO1
c) Relational algebra
d) Query language

Which type of data can be stored in the database?


a) Image oriented data
1 1 5 b) Text, files containing data 1 CO1
c) Data in the form of audio or video
d) All of the above

In which of the following formats data is stored in the database management system?
a) Image
1 1 6 b) Text 1 CO1
c) Table
d) Graph

Which of the following is not a type of database?


a) Hierarchical
1 1 7 b) Network 1 CO1
c) Distributed
d) Decentralized

Which of the following is not an example of DBMS?


a) MySQL
1 1 8 b) Microsoft Acess 1 CO1
c) IBM DB2
d) Google

Page 25
Which of the following is not a feature of DBMS?
a) Minimum Duplication and Redundancy of Data
1 1 9 b) High Level of Security 1 CO1
c) Single-user Access only
d) Support ACID Property

Which of the following is a feature of the database?


a) No-backup for the data stored
1 1 10 b) User interface provided 1 CO1
c) Lack of Authentication
d) Store data in multiple locations

Which of the following is not a function of the database?


a) Managing stored data
1 1 11 b) Manipulating data 1 CO1
c) Security for stored data
d) Analysing code

Which of the following is a function of the DBMS?


a) Storing data
1 1 12 b) Providing multi-users access control 1 CO1
c) Data Integrity
d) All of the above

Which of the following is a component of the DBMS?


a) Data
1 1 13 b) Data Languages 1 CO1
c) Data Manager
d) All of the above

Non Procedural language among the following is __________


a) Domain relational calculus
1 1 14 b) Tuple relational calculus 2 CO1
c) Relational algebra
d) both a and b

What is information about data called?


a) Hyper data
1 1 15 b) Tera data 1 CO1
c) Meta data
d) Relations

What does an RDBMS consist of?


a) Collection of Records
1 1 16 b) Collection of Keys 1 CO1
c) Collection of Tables
d) Collection of Fields

Which command is used to remove a relation from an SQL?


a) Drop table
1 1 17 b) Delete 1 CO1
c) Purge
d) remove

Page 26
Which of the following is not the utility of DBMS?
i) Backup ii) Loading iii) Process Organization iv) File organization
a) i, ii, and iv only CO1
1 1 18 1
b) i, ii and iii only
c) i, iii and iv only
d) All i, ii, iii, and iv

The DBMS acts as an interface between ________________ and


________________ of an enterprise-class system.
a) Data and the DBMS CO1
1 1 19 2
b) Application and SQL
c) Database application and the database
d) The user and the software

The ability to query data, as well as insert, delete, and alter tuples, is offered by
____________
a) TCL (Transaction Control Language) CO1
1 1 20 2
b) DCL (Data Control Language)
c) DDL (Data Definition Language)
d) DML (Data Manipulation Language)

What is the function of the following command?


Delete from r where P;
a) Clears entries from relation CO2
2 1 21 1
b) Deletes relation
c) Deletes particular tuple from relation
d) All of the mentioned

Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
2 1 22 b) Concatenation 1 CO2
c) Relational-and
d) All of the mentioned

Which of the following is the subset of SQL commands used to manipulate Oracle
Structures, including tables?
a) Data Described Language CO2
2 1 23 1
b) Data Retrieval Language
c) Data Manipulation Language
d) Data Definition Language

__________ command is used in SQL to issue multiple CREATE TABLE, CREATE


VIEW and GRANT statements in a single transaction.
a) CREATE CLUSTER CO2
2 1 24 2
b) CREATE PACKAGE
c) CREATE SCHEMA
d) All of the mentioned

The oldest DB model is _______________


a) Network
2 1 25 b) Physical 1 CO2
c) Hierarchical
d) Relational

Page 27
A relational database consists of a collection of
a) Tables
2 1 26 b) Fields 1 CO2
c) Records
d) Keys

A ________ in a table represents a relationship among a set of values.


a) Column
2 1 27 b) Key 2 CO2
c) Row
d) Entry

The term _______ is used to refer to a row.


a) Attribute
2 1 28 b) Tuple 2 CO2
c) Field
d) Instance

The term attribute refers to a ___________ of a table.


a) Record
2 1 29 b) Column 2 CO2
c) Tuple
d) Key

For each attribute of a relation, there is a set of permitted values, called the ________
of that attribute.
a) Domain CO2
2 1 30 2
b) Relation
c) Set
d) Schema

Course(course_id,sec_id,semester)
Here the course_id,sec_id and semester are __________ and course is a _________
a) Relations, Attribute CO2
2 1 31 2
b) Attributes, Relation
c) Tuple, Relation
d) Tuple, Attributes

The tuples of the relations can be of ________ order.


a) Any
2 1 32 b) Same 2 CO2
c) Sorted
d) Constant

Which one of the following is used to define the structure of the relation, deleting
relations and relating schemas?
a) DML(Data Manipulation Langauge) CO2
2 1 33 1
b) DDL(Data Definition Langauge)
c) Query
d) Relational Schema

Page 28
The union operation is represented by
a) ∩
2 1 34 b) U 1 CO2
c) –
d) *

If we want to retain all duplicates, we must write ________ in place of union.


a) Union all
2 1 35 b) Union some 1 CO2
c) Intersect all
d) Intersect some

A _________ consists of a sequence of query and/or update statements.


a) Transaction
2 1 36 b) Commit 2 CO2
c) Rollback
d) Flashback

Which of the following makes the transaction permanent in the database?


a) View
2 1 37 b) Commit 1 CO2
c) Rollback
d) Flashback

In order to undo the work of transaction after last commit which one should be used?
a) View
2 1 38 b) Commit 1 CO2
c) Rollback
d) Flashback

In case of any shut down during transaction before commit which of the following
statement is done automatically?
a) View CO2
2 1 39 2
b) Commit
c) Rollback
d) Flashback

In order to maintain the consistency during transactions, database provides


a) Commit
2 1 40 b) Atomic 2 CO2
c) Flashback
d) Retain

_____________ can help us detect poor E-R design.


a) Database Design Process
3 1 41 b) E-R Design Process 2 CO3
c) Relational scheme
d) Functional dependencies

Designers use which of the following to tune the performance of systems to support
time-critical operations?
a) Denormalization CO3
3 1 42 2
b) Redundant optimization
c) Optimization
d) Realization

Page 29
Relational Algebra is a __________ query language that takes two relations as input
and produces another relation as an output of the query.
a) Relational CO3
3 1 43 2
b) Structural
c) Procedural
d) Fundamental

Which of the following is a fundamental operation in relational algebra?


a) Set intersection
3 1 44 b) Natural join 1 CO3
c) Assignment
d) None of the mentioned

_____________ express the number of entities to which another entity can be


associated via a relationship set.
a) Mapping Cardinality CO3
3 1 45 2
b) Relational Cardinality
c) Participation Constraints
d) None of the mentioned

Data integrity constraints are used to:


a) Control who is allowed access to the data
3 1 46 b) Ensure that duplicate records are not entered into the table 2 CO3
c) Improve the quality of data entered for a specific property
d) Prevent users from changing the values stored in the table

______ is a special type of integrity constraint that relates two relations & maintains
consistency across the relations.
a) Entity Integrity Constraints CO3
3 1 47 2
b) Referential Integrity Constraints
c) Domain Integrity Constraints
d) Domain Constraints

____________ is preferred method for enforcing data integrity


a) Constraints
3 1 48 b) Stored Procedure 2 CO3
c) Triggers
d) Cursors

In the __________ normal form, a composite attribute is converted to individual


attributes.
a) First CO3
3 1 49 1
b) Second
c) Third
d) Fourth

A table on the many side of a one to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
3 1 50 b) Be in Third Normal Form (3NF) 1 CO3
c) Have a single attribute key
d) Have a composite key

Page 30
Tables in second normal form (2NF):
a) Eliminate all hidden dependencies
3 1 51 b) Eliminate the possibility of a insertion anomalies 2 CO3
c) Have a composite key
d) Have all non key fields depend on the whole primary key

Functional Dependencies are the types of constraints that are based on______
a) Key
3 1 52 b) Key revisited 2 CO3
c) Superset key
d) None of the mentioned

Dates must be specified in the format


a) mm/dd/yy
3 1 53 b) yyyy/mm/dd 1 CO3
c) dd/mm/yy
d) yy/dd/mm

A ________ on an attribute of a relation is a data structure that allows the database


system to find those tuples in the relation that have a specified value for that attribute
efficiently, without scanning through all the tuples of the relation.
3 1 54 a) Index 1 CO3
b) Reference
c) Assertion
d) Timestamp

Which of the following is used to store movie and image files?


a) Clob
3 1 55 b) Blob 1 CO3
c) Binary
d) Image

Which forms are based on the concept of functional dependency:


a) 1NF
3 1 56 b) 2NF 2 CO3
c) 3NF
d) 4NF

What are the desirable properties of a decomposition


a) Partition constraint
3 1 57 b) Dependency preservation 1 CO3
c) Redundancy
d) Security

The term "NTFS" refers to which one of the following?


a) New Technology File System
3 1 58 b) New Tree File System 2 CO3
c) New Table type File System
d) Both A and C

Which of the following refers to the level of data abstraction that describes exactly
how the data actually stored?
a) Conceptual Level CO3
3 1 59 1
b) Physical Level
c) File Level
d) Logical Level

Page 31
Which of the following refers collection of the information stored in a database at a
specific time?
a) Independence CO3
3 1 60 1
b) Instance of the database
c) Schema
d) Data domain

Ranking of queries is done by which of the following?


a) Group by
4 1 61 b) Order by 2 CO4
c) Having
d) Both Group by and Order by

A management procedure called ___ control is required to control the process of


concurrently performing operations on a database.
a) Database CO4
4 1 62 2
b) Conspiracy
c) Concurrency
d) Relational

The concurrent execution of the database in a ____-user system refers to the fact that
multiple users are able to access and use it at the same time.
a) Single CO4
4 1 63 2
b) Two
c) Three
d) Multiple

When dealing with database transactions, there is often a need for multiple users to
use a database to perform different operations. In this case, ___ of the database
occurs.
4 1 64 a) Concurrent Connection 1 CO4
b) Concurrent Reduction
c) Concurrent Execution
d) Concurrent Revolution

What are the two main operations in the database transaction?


a) READ
4 1 65 b) WRITE 1 CO4
c) Both A and B
d) None of the above

The concurrency ___ allows us to maintain the concurrency of the database.


a) Protocols
4 1 66 b) Controls 2 CO4
c) Control Protocols
d) None

As part of concurrency control protocols, the concurrent execution of database


transactions will be ___, durable, and serializable.
a) Atomic CO4
4 1 67 2
b) Consistent
c) Isolated
d) All of the above

Page 32
Which property of database transaction creates an illusion then only 1 transaction is
executed in the system in spite of more than one transaction being executed in a
parallel manner?
4 1 68 a) Atomicity 1 CO4
b) Consistency
c) Isolation
d) Durability

In a strict two-phase locking protocol


a) All the exclusive locks held by the transaction are released when the transaction is
completed
4 1 69 b) All the shared locks held by the transaction are released when the transaction is 2 CO4
completed.
c) Both A & B
d) None of these

In a transaction, a ...................... operation will read data from the table and write on
the buffer.
(A).Write CO4
4 1 70 2
(B).Read
(C).Execute
(D).None of these

Serializability of current transaction is ensured by


(A).locking
4 1 71 (B).time sharing 2 CO4
(C).Both A & B
(D).None of these

......................................... ensure that system will never entered in deadlock.


(A).Two-phase locking protocol
4 1 72 (B).Deadlock detection protocol 2 CO4
(C).Deferred update protocol
(D).Timestamp ordering protocol

In 2-phase locking a transaction must :


(A).Release all its locks at the same time
4 1 73 (B).Not obtain any new locks once it has started releasing locks 2 CO4
(C).Ensure that deadlocks will never occur
(D).None of these

Collections of operations that form a single logical unit of work are called
__________
a) Views CO4
4 1 74 1
b) Networks
c) Units
d) Transactions

Which of the following systems is responsible for ensuring durability?


a) Recovery system
4 1 75 b) Atomic system 1 CO4
c) Concurrency control system
d) Compiler system

Page 33
Which of the following systems is responsible for ensuring isolation?
a) Recovery system
4 1 76 b) Atomic system 1 CO4
c) Concurrency control system
d) Compiler system

A transaction that has not been completed successfully is called as _______


a) Compensating transaction
4 1 77 b) Aborted transaction 2 CO4
c) Active transaction
d) Partially committed transaction

The execution sequences in concurrency control are termed as ________


a) Serials
4 1 78 b) Schedules 2 CO4
c) Organizations
d) Time tables

The scheme that controls the interaction between executing transactions is called as
_____
a) Concurrency control scheme CO4
4 1 79 2
b) Multiprogramming scheme
c) Serialization scheme
d) Schedule scheme

It is an abstraction through which relationships are treated as higher level entities


(A) Generalization.
4 1 80 (B) Specialization. 1 CO4
(C) Aggregation.
(D) Inheritance.

A unit of storage that can store one or more records in a hash file organization is
denoted as
5 1 81 a) Buckets 2 CO5
b) Disk pages
c) Blocks d) Nodes

The file organization which allows us to read records that would satisfy the join
condition by using one block read is
a) Heap file organization CO5
5 1 82 2
b) Sequential file organization
c) Clustering file organization
d) Hash file organization

Each tablespace in an Oracle database consists of one or more files called


a) Files
5 1 83 b) name space 2 CO5
c) datafiles
d) PFILE

Which level of RAID refers to disk mirroring with block striping?


a) RAID level 1
5 1 84 b) RAID level 2 1 CO5
c) RAID level 0
d) RAID level 3

Page 34
Which one of the following is a Stripping technique?
a) Byte level stripping
5 1 85 b) Raid level stripping 1 CO5
c) Disk level stripping
d) Block level stripping

Hardware RAID implementations permit _________ that is, faulty disks can be
removed and replaced by new ones without turning power off.
a) Scrapping CO5
5 1 86 2
b) Swapping
c) Hot swapping
d) None of the mentioned

Which of the following is a physical storage media?


a) Tape Storage
5 1 87 b) Optical Storage 1 CO5
c) Flash memory
d) All of the mentioned

The _________ is the fastest and most costly form of storage, which is relatively
small; its use is managed by the computer system hardware.
a) Cache CO5
5 1 88 2
b) Disk
c) Main memory
d) Flash memory

Which of the following stores several gigabytes of data but usually lost when power
failure?
a) Flash memory CO5
5 1 89 1
b) Disk
c) Main memory
d) Secondary memory

_________ is increasingly being used in server systems to improve performance by


caching frequently used data, since it provides faster access than disk, with larger
storage capacity than main memory.
a) Flash memory CO5
5 1 90 2
b) Disk
c) Main memory
d) Secondary memory

Explanation: Flash memory is of two types – NAND and NOR.


Which is the cheapest memory device in terms of costs/ bit?
a) Semiconductor memory CO5
5 1 91 2
b) Magnetic disks
c) Compact disks
d) Magnetic tapes

Tape storage is referred to as __________ storage.


a) Direct-access
5 1 92 b) Random-access 2 CO5
c) Sequential-access
d) All of the mentioned

Page 35
The storage structure which do not survive system crashes are ______
a) Volatile storage
5 1 93 b) Non-volatile storage 2 CO5
c) Stable storage
d) Dynamic storage

A ______ file system is software that enables multiple computers to share file
storage while maintaining consistent space allocation and file content.
a) Storage CO5
5 1 94 2
b) Tertiary
c) Secondary
d) Cluster

Various storage devices store ___ in the form of data.


a) Bits
5 1 95 b) Bytes 2 CO5
c) Both A and B
d) None of the above

Which of the following has the highest speed?


a) Primary Storage
5 1 96 b) Secondary Storage 1 CO5
c) Tertiary Storage
d) All of the above

Data that is accessible via the storage medium is processed by the ___.
a) Cache
5 1 97 b) Main memory 2 CO5
c) Both A and B
d) None of the above

Every instruction a computer machine receives goes into the ___.


a) Main memory
5 1 98 b) Cache 2 CO5
c) Main Memory & Cache
d) None of the above

Storage media such as cache are ____.


a) Cheap CO5
5 1 99 2
b) Expensive
c) Average price d)None

Flash memory files are stored on ___- keys, which are connected to a computer
through ___ ports.
a) USB CO5
5 1 100 2
b) UBS
c) BUS
d) SUB
1 2 1 List out DBMS applications with example. 2 CO1
1 2 2 Explain the concept of DML with example. 2 CO1
1 2 3 Describe the Database design in detail 2 CO1
1 2 4 Illustrate the View of Data and quote its types 2 CO1
1 2 5 Explain about Data Abstraction 2 CO1
1 2 6 Describe about Data Independence 2 CO2
1 2 7 Illustrate the concepts of Instance and Schema 2 CO2

Page 36
1 2 8 Explain the concepts of DDL. 2 CO2
1 2 9 Discuss the concepts of DCL & TCL. 2 CO2
1 2 10 Describe the concepts of Database Administrator. 2 CO2
2 2 11 Explain the concept of null value in DBMS relation 2 CO2
2 2 12 Summarise SQL fundamentals 2 CO2
2 2 13 Describe the Triggers with example. 2 CO2
2 2 14 Explain Security of databases. 2 CO2
2 2 15 Illustrate the Embedded SQL and Dynamic SQL 2 CO2
2 2 16 Describe Client/server database. 2 CO1
2 2 17 Discuss the concepts of Distributed DBMS. 2 CO1
2 2 18 Differentiate Client/Server and Distributed DBMS 2 CO1
2 2 19 Summarise the concepts of Integrity constraints. 1 CO3
2 2 20 Brief the concepts of SQL Data Types and Schemas 2 CO2
3 2 21 Brief then concept of Relational database design. 2 CO3
3 2 22 State the four stages of Relational database design 1 CO3
3 2 23 Describe functional dependencies and its rules in brief. 2 CO3
3 2 24 List out the Types of Functional Dependencies in DBMS 1 CO3
3 2 25 State the concept of Normalization and its needs. 2 CO3
3 2 26 Brief the types of Normalization. 2 CO3
3 2 27 List the advantages and disadvantages of Normalization 1 CO3
3 2 28 Describe the concept of Dependency Preserving 2 CO3
3 2 29 Explain the concept of Entity Sets and its Types in DBMS. 2 CO3
3 2 30 Describe Weak Entity and strong entity. 2 CO3
4 2 31 Brief the concepts of transaction states and transaction recovery 2 CO4
4 2 32 Explain the ACID Properties 2 CO4
4 2 33 Explain system Recovery and media recovery. 2 CO4
4 2 34 State the concepts of two phase commit protocol. 2 CO4
4 2 35 Summarise the concept of buffer management in DBMS 2 CO4
4 2 36 Illustrate the concept of concurrency and its need. 2 CO4
4 2 37 Explain the concept of locking protocols in DBMS. 2 CO4
4 2 38 Describe the deadlock handling concept in DBMS. 2 CO4
4 2 39 Brief the concepts of Serializability 2 CO4
4 2 40 Illustrate the concept of SQL Facilities for Concurrency. 2 CO4
5 2 41 Describe about the Overview of Physical Storage Media in short. 2 CO5
5 2 42 Illustrate Primary storage and secondary storage 2 CO5
5 2 43 Describe the concepts of Magnetic Disks 2 CO5
5 2 44 Brief the concepts of Tertiary storage 2 CO5
5 2 45 Explain the concepts of Organization of Records in Files 2 CO5
5 2 46 Describe about Ordered Indices 2 CO5
5 2 47 Explain the concept of Sorting in DBMS 2 CO5
5 2 48 Illustrate about the Catalogue Information for Cost Estimation in short 2 CO5
5 2 49 Explain about the Query optimization 2 CO5
5 2 50 Describe about Database Data Analysis 2 CO5
1 3 1 Explain the various Views of Data in DBMS. 2 CO1
1 3 2 Describe Data Abstraction, Data Independence and Instance and Schema in detail 2 CO1
1 3 3 Describe the various types of Database Languages. 2 CO1
1 3 4 Explain Data Definition Language, Data Manipulation Language with example querie 2 CO1
1 3 5 State Database Application Architecture and explain it in detail. 2 CO1

Page 37
1 3 6 Explain 1-Tier Architecture, 2-Tier Architecture and 3-Tier Architecture 2 CO1
2 3 7 Explain the Relational Model in DBMS with example. 2 CO2
2 3 8 Describe various types of keys used in DBMS. 2 CO2
2 3 9 Describe the concept of Relational algebra with example. 2 CO2
2 3 10 Explain Domain relational calculus, Tuple relational calculus with examples. 2 CO2
2 3 11 State and explain various Fundamental operations in relational algebra. 2 CO2
2 3 12 Explain Distributed Databases and Client/Server Databases. 2 CO2
3 3 13 Explain the Overview of the Relational Database Design Process 2 CO3
3 3 14 Explain the concepts of functional dependencies and its types 2 CO3
3 3 15 Explain the concepts of Normalization in detail. 2 CO3
3 3 16 Describe the conversion of 2nd normal form to Boyce Codd normal form 2 CO3
3 3 17 Explain the conversion of fourth normal form to fifth normal form,. 2 CO3
3 3 18 Describe in detail about Entity Sets and its Types in DBMS 2 CO3
Explain in detail about Transaction Concepts, Transaction States and Transaction CO4
4 3 19 2
Recovery.
4 3 20 Describe the concepts of Locking Protocols and Two Phase Locking 2 CO4
4 3 21 Explain the Deadlock Handling and Serializability 2 CO4
4 3 22 Summarise 2 CO4
Describe inthedetail
concept of Buffer
about management
the SQL Facilitiesand
forRemote Backup
recovery SystemsRecovery
Advanced
4 3 23 Techniques 2 CO4
4 3 24 Explain Two Phase Commit and Recovery Isolation Levels in detail 2 CO4
5 3 25 Describe in detail about the Redundant Array of Independent Disk 2 CO5
5 3 26 Explain in detail about Indexing and Hashing in DBMS 2 CO5
5 3 27 Describe in detail about B+ tree Index Files and B- tree Index Files 2 CO5
5 3 28 Explain Static Hashing and Dynamic Hashing 2 CO5
5 3 29 Explain Query Processing in DBMS 2 CO5
5 3 30 Explain the various types of Join Operation with example. 2 CO5

Page 38

You might also like