QN1: Which of the following scenarios may lead to an irrecoverable error in a database system ?
A transaction writes a data item after it is read by an uncommitted transaction
A transaction reads a data item after it is read by an uncommitted transaction
A transaction reads a data item after it is written by a committed transaction
A transaction reads a data item after it is written by an uncommitted transaction
Answer
Answer: A transaction reads a data item after it is read by an uncommitted transaction
QN2: Which of the following is not a recovery technique?
Deferred update
Immediate update
Two-phase commit
Recovery management
Answer
Answer: Two-phase commit
QN3: Consider the schedule: T1:R(X);T2:R(Y); T3:W(X); T2:R(X);T1:R(Y). The schedule T1 is?
Conflict & View Serializable
Not Conflict, but View Serializable
Not Conflict & not View Serializable
Conflict,but not View Serializable
Answer
Answer: Conflict,but not View Serializable
QN4: “Which is the subset of SQL commands used to manipulate Oracle Database structures, including tables?”
Data Definition Language(DDL)
Data Manipulation Language(DML)
Both of above
None
Answer
Answer: Data Definition Language(DDL)
QN5: “An ……… is an exact copy of a single datafile, archived redo log file, or control file.”
image copy
datafile copy
copy log
control copy
Answer
Answer: image copy
QN6: An integral part of database that can restore database to consistent state of before failure is called
Recovery scheme
Backup scheme
Restoring scheme
Transaction scheme
Answer
Answer: Recovery scheme
QN7: In which the database can be restored up to the last consistent state after the system failure?
Backup
Recovery
Both
None
QN8: Which of the following is the original purpose of SQL?
To specify the syntax and semantics of SQL data definition language
To specify the syntax and semantics of SQL manipulation language
To define the data structures
All of the above.
Answer
Answer: All of the above.
QN9: “In SQL, which command(s) is(are) used to change a table’s storage characteristics?”
ALTER TABLE
MODIFY TABLE
CHANGE TABLE
All of the above
Answer
Answer: ALTER TABLE
QN10: Transaction . ensures that the transaction are being executed successfully.
concurrency
consistency
serialisability
non serialiasability
Answer
Answer: serialisability
QN11: Which of the following are the five built-in functions provided by SQL?
“COUNT, SUM, AVG, MAX, MIN”
“SUM, AVG, MIN, MAX, MULT”
“SUM, AVG, MULT, DIV, MIN”
“SUM, AVG, MIN, MAX, NAME”
Answer
Answer: “COUNT, SUM, AVG, MAX, MIN”
QN12: Which of the following is false?
“The more important the data, the greater the need for backing it up”
A backup is as useful as its associated restore strategy
Storing the backup copy near to its original site is best strategy
Automated backup and scheduling is preferred over manual operations
Answer
Answer: Storing the backup copy near to its original site is best strategy
QN13: “In a two-phase locking protocol, a transaction release locks in phase.”
shrinking phase
growing phase
running phase
initial phase
Answer
Answer: shrinking phase
QN14: Which of the following do you need to consider when you make a table in SQL?
Data types
Primary keys
Default values
All of the above.
Answer
Answer: All of the above.
QN15: The command to remove rows from a table ‘CUSTOMER’ is:
REMOVE FROM CUSTOMER
DROP FROM CUSTOMER
DELETE FROM CUSTOMER WHERE
UPDATE FROM CUSTOMER
Answer
Answer: DELETE FROM CUSTOMER WHERE
QN16: Checkpoints are a part of
Recovery measures
Security measures
Concurrency measures
Authorization measures
Answer
Answer: Recovery measures
QN17: . . helps solve concurrency problem.
locking
transaction monitor
transaction serializability
two phase commit
QN18: What is the full form of SQL?
Structured Query Language
Structured Query List
Simple Query Language
None of these
Answer
Answer: Structured Query Language
QN19: Which of the following is the correct order of keywords for SQL SELECT statements?
“SELECT, FROM, WHERE”
“FROM, WHERE, SELECT”
“WHERE, FROM,SELECT”
“SELECT,WHERE,FROM”
Answer
Answer: “SELECT, FROM, WHERE”
QN20: “If a transaction acquires exclusive lock, then it can perform . operation.”
read
write
read and write
update
Answer
Answer: read and write
QN21: “For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.”
Domain
Relation
Set
Schema
QN22: The term _______ is used to refer to a row.
Attribute
Tuple
Field
Instance
QN23: An advantage of the database management approach is
data is dependent on programs
data redundancy increases
data is integrated and can be accessed by multiple programs
none of the above
Answer
Answer: data is integrated and can be accessed by multiple programs
QN24: The entity relationship set is represented in E-R diagram as
Double diamonds
Undivided rectangles
Dashed lines
Diamond
QN25: A relational database consists of a collection of
Tables
Fields
Records
Keys
QN26: “Course(course_id,sec_id,semester); Here the course_id,sec_id and semester are ____ and course is a ___”
“Relations, Attribute”
“Attributes, Relation”
“Tuple, Relation”
“Tuple, Attributes”
Answer
Answer: “Attributes, Relation”
QN27: Which of the following is a single valued attribute
Register_number
Address
SUBJECT_TAKEN
Reference
Answer
Answer: Register_number
QN28: A table on the many side of a one to many or many to many relationship must:
Be in Second Normal Form (2NF)
Be in Third Normal Form (3NF)
Have a single attribute key
Have a composite key
Answer
Answer: Have a composite key
QN29: Key to represent relationship between tables is called
primary key
secondary key
foreign key
none of the above
Answer
Answer: foreign key
QN30: Which-one ofthe following statements about normal forms is FALSE?
BCNF is stricter than 3 NF
“Lossless, dependency -preserving decomposition into 3 NF is always possible”
“Loss less, dependency preserving decomposition into BCNF is always possible”
Any relation with two attributes is BCNF
Answer
Answer: “Loss less, dependency preserving decomposition into BCNF is always possible”
QN31: DBMS is a collection of .. that enables user to create and maintain a database.
Keys
Translators
Program
Language Activity
QN32: Which of the following is not a logical database structure?
Chain
Network
Tree
Relational
QN33: A is used to define overall design of the database
schema
application program
data definition language
code
QN34: ” Empdt1(empcode, name, street, city, state,pincode).; For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in”
1 NF only
2 NF and hence also in 1 NF
3NF and hence also in 2NF and 1NF
“BCNF and hence also in 3NF, 2NF and 1NF”
Answer
Answer: 2 NF and hence also in 1 NF
QN35: “In an ER model, . is described in the database by storing its data.”
Entity
Attribute
Relationship
Notation
QN36: Data items grouped together for storage purposes are called a
record
title
list
string
QN37: The attribute AGE is calculated from DATE_OF_BIRTH . The attribute AGE is
Single valued
Multi valued
Composite
Derived
QN38: . is a preferred method for enforcing data integrity
Constraints
Stored procedure
Triggers
Cursors
Answer
Answer: Constraints
QN39: DFD stands for
Data Flow Document
Data File Diagram
Data Flow Diagram
None of the above
Answer
Answer: Data Flow Diagram
QN40: “Inst_dept (ID, name, salary, dept name, building, budget) is decomposed into; instructor (ID, name, dept name, salary), department (dept name, building, budget). This comes under”
Lossy-join decomposition
Lossy decomposition
Lossless-join decomposition
Both a and b
Answer
Answer: Both a and b
DistPub Team
Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.