Abbreviate ACID.
1.Atomicity, Consistency, Isolation, Durability
2. Atomicity, Concurrency, Isolation, Duplicity
3.Aggregation, Consistency, Isolation, Durability
4.Atomicity, Consistency, Identity, Durability
Between what can information be transferred?
1.DBMS to Spread sheet program
2. DBMS to Word processor program
3. DBMS to Graphics program
4.All of the above
Match the following A) Composite attribute ------ i) Attribute whose value is calculated from other attributes B) Multivalued Attribute ---- ii) Attribute that can be further subdivided to yield additional attributes C) Derived Attribute -------- iii) Attribute that can have more values
1.A-i, B-ii, C-iii
2.A-ii, B-i, C-iii
3.A-ii, B-iii, C-i
4.A-iii, B-ii, C-i
Which of the following is / are known as a minimal superkey?
1.Primary key
2.Foreign key
3.Unique key
4.Candidate key
A transaction state changes from active to______, after the transaction has been rolled back and the database restored to its state prior to the start of the transaction.
1.Partially committed
2.Committed
3.Aborted
4.Failed
An attribute or combination of attributes in one table whose values must either match the primary key in another table or be null is called __________.
1.Secondary Key
2.Super key
3.Candidate Key
4.Foreign Key
Data items are composed of data elements.
1.True
2.False
3.Error
4.Can not say
Generalization is a bottom up design process that combines a number of entity sets, which share the same features into a higher level entity set.
1.True b.
2.False
3.Error
4.Can't say
How can a tuple be divided in a relational schema?
1.Domains
2.Queries
3.Relations
4.Joins
How is specialization denoted in an ER Diagram?
1.Triangle labeled IS A
2.Rectangle labeled IS A
3.Rectangle Labeled HAS A
4.Triangle labeled HAS A
How many primary key can a table in database have?
1.Only one
2.At least one
3.More than one
4.Any number of
State the main difference between a latch and a lock.
1.Locks are more restrictive than Latches in that they are always exclusive.
2.Latches are more restrictive than locks in that they are always exclusive.
3.Latch is used to protect data while lock is not.
4.Lock is used to protect data while latch is not.
The problem caused by independent multivalued dependencies is eliminated in which of the normal form?
1.3NF
2.BCNF
3. 4NF
4.5NF
Under which category do the commands CREATE and ALTER belong to?
1.DML
2.DDL
3.UML
4.None of these
What are the following types of? SERIALIZABLE REPEATABLE READ
1.Locks
2.Logs
3.Isolation level
4.Latch types
What are the properties of Relational Database model?
1.Data is presented as a collection of relations.
2.Each relation is depicted as a table
3.Each row ( “ tuple †) represents as a single entity
4.All of the above
What data structure is used to construct a Prev LSN in a database log?
1.Queue
2.Link List
3.Graph
4.Tree
What does a form define?
1.Where data is placed on screen
2.The width of each field
3.Both A and B
4.None of the above
What does a query processor do in semantic checking?
1.Checks whether all the relations mentioned under the FROM clause in the SQL statement are from the database the user is referenced.
2.Checks all the attribute values and also checks whether they exist in a particular relation that is specified in the query. It checks all the attribute values that are mentioned in the SELECT and WHER
3.Verifies whether the types of attributes are compatible with the values used for the attributes
4.All of the above
What information is not provided by a data dictionary?
1.How data is used
2.Where data is located
3.Size of storage disk
4.Who owns or is responsible for data
What is a degree of relation?
1.It is the number of attributes of its relation schema.
2.The number of relationships with other tables
3.Number of association among two or more entities
4.Number of foreign key dependencies
What is a master list of index file?
1.Has a number assigned to each record
2.Is sorted in ascending order
3.Contains only a list of keys and record number
4.None of These
What is a network structure?
1.Dominant database.
2.Is physical representation of data
3.Many to many relationship
4.Is conceptually simple
What is a report generator used for?
1.Update Files
2.Print Files
3.Alter files
4.All of the above
What is a schedule for a set of transactions?
1.It consists of all instructions of those transactions.
2.It preserve the order in which the instructions appear in each individual transaction.
3.both (a) and (b)
4.None of these
What is a transparent DBMS?
1.Keeps its logical structure hidden from users
2.Keeps its physical structure hidden from users
3.Cannot hide sensitive information from users.
4. Both A and B.
What is a trigger?
1.It is a procedural code which is executed automatically in response to certain events on a particular table or view.
2.Statement that enables to start any DBMS.
3.Condition the system tests for the validity of the database user.
4.Statement that is executed by the user when debugging an application program.
What is Degree of relationships?
1. number of participating entity types
2.number of participating relations
3.number of participating attribute types
4.number of participating constraints
What is the generalization of functional dependencies?
1.Database dependencies
2.Key dependencies
3. Relation dependencies
4.None of these
What is the maximum length of a field name?
1. 10 characters
2.30 characters
3.50 characters
4.20 characters
What is the responsibility of the buffer manager?
1.Fetching data from disk storage into main memory, and deciding what data to cache in main memory.
2.Allocation of space on disk storage and the data structures used to represent information stored on disk.
3.Storing details such as how many users, which user has which permissions etc.
4.None of the above
What is used to delete an entire file except for a file structure?
1.Eraser
2.Pack
3.Delete
4.Zap
What relationships does Referential integrity control?
1.Attributes in a table
2.Operations of an object
3.Instances of a class
4.Tables in a database
What stores the metadata about the structure of the database, in particular the schema of the database?
1.Indices
2.Database log
3.Data files
4.Data Dictionary
What type of database object represents a result set and is used to manipulate data row by row?
1.Trigger
2.Procedure
3.Cursor
4.Monitor
When a primary key is define in the table, DBMS automatically creates a ____ on a primary key column.
1.Unique index
2.Sequence
3.Trigger
4.Synonym
Where can a subschema be used?
1.Present information in different formats
2.Create very different personalized view of the same data
3. Hide sensitive information
4.All of the above
Which command allows the user to change multiple fields?
1.Modify
2.Lookup
3.Update
4.Change
Which command permanently deletes the record from database?
1.PACK
2.ZAP
3.SEEK
4.SKIP
Which is not the relational algebra operator?
1.Set difference
2.Cartesian product
3.Rename
4.Join
Which is the correct SQL syntax from the following to create a PRIMARY KEY constraint on existing table “ EMPLOYEE †on " EMPID " column and currently column does not contain any value?
1.Alter table EMPLOYEE Add Constraint PK - EMPID Primary Key, EMPID;
2. Update table EMPLOYEE Add Constraint PK - EMPID Primary Key (EMPID);
3.Alter table EMPLOYEE Add Constraint PK - EMPID Primary Key (EMPID);
4.Alter table EMPLOYEE Add Constraint PK - EMPID Primary Key (EMPID);
Which normal form is the partial dependency removed?
1.First
2.Second
3.Third
4.BCNF
Which of the following command executes faster?
1.Copy File < FILE 1>< FILE 2 >
2.Copy Structure to < NEW FILE > c. . d.
3.Copy to M FILE - DAT DELIMITED
4.Copy to < New file >
Which of the following is an Open Source DBMS?
1.MySQL
2.Microsoft SQL Server
3.Microsoft Access
4.Oracle
Which of the following is not a relational data of DBMS?
1.FOX PRO
2.dBASE IV
3.4th Dimension
4.ReFlex
Which of the following is not true regarding to traditional information processing?
1.Common sharing of data between applications
2.Is file oriented
3. Programs are dependent on the files
4.It is inflexible
Which of the following is true regarding indexing operation?
1. Established an index for a file
2.Sorts a file using a single key
3.Sorts a file using two keys
4.Both B and C
Which of the following language is used to define the integrity constraints?
1.DCL
2.DML
3.DDL
4.All of the above
Which of the following provides an access path?
1.Physical record key
2. Private key
3. b.c. File key
4.None of These
Which type of lock ensures that multiple updates cannot be made to the same resource at the same time?
1.Schema
2.Shared
3.Exclusive
4.Intent