The language used in application programs to request data from the DBMS is referred to as the
1.DML
2.DDL
3.VDL
4.SDL
A ROLLBACK statement will also release any existing savepoints that may not be in use.
1.True
2.False
3.Error
4.Can't say
What do you mean by atomicity?
1.When an update occurs to a database, either all or none of the update becomes available to anyone
2. It determines how the transaction integrity will be visible to the other users and systems
3.The transactions have been committed and will survive permanently
4.All of the above
What is 5NF?
1.The database should be in 3NF and all tables can have only one primary key.
2.There should be no cyclic dependencies in a composite key.
3.All attributes within the entity should depend solely on the entity's unique identifier.
4.Tables cannot have multi - valued dependencies on a Primary Key.
What is the maximum possible size of the file in the index allocation scheme of blocks to a file depend on? (Database)
1.The size of the blocks and the size of the address of the blocks
2.The number of blocks used for the index, the size of the blocks and the size of the address of the blocks
3.The number of blocks used for the index and the size of the blocks
4.None of the above
Which of the following forms is considered as adequate for normal relational database design?
1.1NF
2.5NF
3.4 NF
4.3NF
A trigger is ?
1.A statement that enables to start any DBMS b.
2. A statement that is executed by the user when debugging an application program
3.A condition the system tests for the validity of the database user
4. A statement that is executed automatically by the system as a side effect of modification to the database
An unnormalized relation contains values ?
1.Atomic
2.Non - Atomic
3.Classified
4.None of these
Consider an SQL query SELECT A.Id FROM A WHERE A.Age> All (SELECT B.Age FROM B WHERE B.name = ‘Anay’) The result of this query contains
1.1 tuple
2.2 tuples
3.3 tuples
4. 4 tuples
Database: A condition that led to the development of database was
1.A demand for more data to support information needs
2.An increase in the amount of data handled by organizations
3.The poliferation of data files
4.All of the above
Database: In second normal form ______________________
1. A composite attributes is converted to individual attributes.
2.Non key attributes are functional dependent on key attributes.
3.The non key attributes functionally dependent on not a part of key attributes.
4. All the above.
Database: Which is not a function of aggregate function?
1. Count
2.Avg
3.Create
4.Max
Database: Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
1.full media
2.graphics media
3.multimedia
4.hypertext
Database: Which of the following fields in a student file can be used as a primary key?
1.class
2.Social Security Number
3.GPA
4.Major
Databases: The view of total database content is _____
1.Conceptual view.
2.Internal view
3.External view
4.Physical View.
Issuing which type of savepoint will cause the named savepoint to be discarded? (Database)
1.TRUNCATE SAVEPOINT
2.DELETE SAVEPOINT
3.DISCARD SAVEPOINT
4. RELEASE SAVEPOINT
Primitive operations common to all record management system include ? (Database)
1.Print
2.Sort
3.Look up
4.All of the above
State the concurrency protocols which ensure both conflict serializability and freedom from deadlock 1. 2-phase locking 2. Time-stamp ordering
1.1 only
2.2 only
3. Both 1 and 2
4.Neither 1 nor 2
The functional dependencies for the relational schema student performance (name, courseNo, rollno, grade) is given below : name, courseNo -> grade rollno, courseNo -> grade name -> rollno rollno-> name What is the highest normal form of this relational schema?
1.3NF
2. 4NF
3.BCNF
4.2NF
What are the important criteria for designing tables?
1. Meaningful grouping of attribute
2. No redundancy
3.No inapplicable attribute
4.All of the above
What are the Report Generators used for?
1.Retrieve information from files
2.Answer queries
3.Both A & B
4.None of these
What is an audit trial? (Database)
1.Used for making backup copies
2.The recorded history of operations performed on a file
3.Used for retrieving the lost information
4.All of the above
What is degree 0 isolation?
1.Transaction does not read dirty data from other transactions.
2. Transaction does not commit any writes until it completes all its writes
3.Transactions do not dirty data read by a transaction before the transaction commits.
4.A transaction does not overwrite data updated by another user or process.
What is durability?
1. When an update occurs to a database, either all or none of the update becomes available to anyone
2. The transactions have been committed and will survive permanently
3.It determines how the transaction integrity will be visible to the other users and systems
4.All of the above
What is the highest level in a hierarchy of data organization?
1.Data Record
2.Data File
3.Database
4.None of the above
What is truncating a table?
1. Data alone deleted, Performs an automatic commit
2.Data alone deleted, Doesn’t perform automatic commit
3.Table structure + Data are deleted
4. Table structure alone deleted, Performs an automatic commit
What type of form says “ Each column type is unique †?
1. 1NF
2.2NF
3.4NF
4.BCNF
What type of relationship does a hierarchical schema help to establish between the items of a database?
1.top-to-bottom relationship
2. bottom-to-top relationship
3.one-to-many relationship
4.many-to-one
Which among the following comprises of a complete record of all activities responsible in affecting the database contents for a specific duration?
1.Transaction log
2.Data manipulation language
3.Query language
4. Report writer
Which command helps to display schema of a table?
1. DESCRIBE
2.DISPLAY
3.DESC
4.SHOW
Which is an essential characteristic of a normal form where every determinant in a table must be a candidate key?
1.First
2.Second
3.Boyce - Codd
4.Fifth
Which is the concurrency control protocol that ensure both conflict serializability and freedom from deadlock? (Database)
1.Time stamp ordering
2.2 - phase locking
3.both (a) and (b)
4. Neither A nor B
Which is the major data structure used in RDBMS?
1.Trees
2.Stacks
3.Graph
4.Array
Which normal relational database design the form that is considered adequate?
1.3NF
2.5NF
3.2NF
4.4NF
Which of the following database object does not physically exist? (Database)
1.Base table
2.Index
3.View
4.None of the above
Which of the following has a relationship between / among themselves as a functional dependency?
1.Rows
2.Relations
3.Attributes
4.Tables
Which of the following is used to define the schema of each database hosted in the DBMS?
1. ER diagram
2.UML
3.Database model
4.Both b and c above
Which of the following may lead to an irrecoverable error in a database system?
1.A transaction reads a data item after it is written by an uncommitted transaction
2.A transaction reads a data item after it is written by a committed transaction
3.A transaction reads a data item after it is read by an uncommitted transaction
4.A transaction writes a data item after it is read by an uncommitted transaction
Which of the following statement is / are not true about normal forms? (Database)
1. Any relation with two attributes is in BCNF
2.BCNF is stricter than 3NF
3.Lossless, dependency - preserving decomposition into 3NF is always possible
4.Lossless, dependency - preserving decomposition into BCNF is always possible
Which one of the following statements is / are true about SQL?
1.SQL permits attribute names to be repeated in the same relation
2.If there are no indexes on the relations then an SQL query will not work
3.Duplicates are automatically eliminated by an SQL query
4.None of the above
Which SQL keyword is used to remove the duplication of rows from the result set?
1.DELETE
2.SELECT
3.DISTINCT
4.UNIQUE
Which type of clustering index is defined on the fields?
1. Non-key and non-ordering
2.Non-key and ordering
3.Key and non-ordering
4.Key and Ordering
Which type of lock does a record or page get locked immediately?
1.Pessimistic locking
2.Optimistic locking
3.both (a) and (b)
4.None of these
Why are B+ trees preferred over binary trees in databases?
1.Disk capacities are greater than memory capacities
2.Disk access is much slower than memory access
3.Disk data transfer rates are much less than memory data transfer rates
4.Disks are more reliable than memory