dbms

Embed Size (px)

DESCRIPTION

Data base Management System computer science Related subject that having many concepts like structured query language and so on...!

Citation preview

  • DBMS

    1

    1. The first generation of DBMS is represented by systemsa. Hierarchical and CODASYL systems. b. Relational modelc. Network modeld. None of the above

    2. Which of the following SQL statements are helpful in database redesign?a. Correlated subqueries onlyb. EXISTS/NOT EXISTS expressions onlyc. Both of the above are helpfuld. None of the above are helpful.

    3. What SQL command can be used to delete columns from a table?a. MODIFY TABLE TableName DROP COLUMN ColumnNameb. MODIFY TABLE TableName DROP ColumnNamec. ALTER TABLE TableName DROP COLUMN ColumnNamed. ALTER TABLE TableName DROP ColumnName

    4. Database redesign is not terribly difficult if the:a. database is structuredb. database is well-designed.c. database has no datad. database is relatively small

    5. Which SQL-92 standard SQL command can be used to change a table name?a. RENAME TABLEb. CHANGE TABLEc. ALTER TABLEd. None of the above is correct

    6. The process of reading a database schema and producing a data model from that schema is known as:

    a. data modelingb. database designc. reverse engineeringd. None of the above is correct

    7. Before any changes to database structure are attempted one should first:a. clearly understand the current structure and contents of the database onlyb. test any changes on a test database only.c. create a complete backup of the operational database onlyd. All of the above should be done

    8. Which of the following modifications may not succeed?a. Changing a column data type from char to dateb. Changing a column data type from numeric to charc. Both of the above actions should succeedd. Neither of the above actions will succeed

    9. A regular subquery can be processed:a. from the top downb. from the bottom upc. by nestingd. None of the above is correct

  • DBMS

    2

    10. What SQL command can be used to add columns to a table?a. MODIFY TABLE TableName ADD COLUMN ColumnNameb. MODIFY TABLE TableName ADD ColumnNamec. ALTER TABLE TableName ADD COLUMN ColumnNamed. ALTER TABLE TableName ADD ColumnName

    11. The EXISTS keyword will be true if:a. any row in the subquery meets the condition onlyb. all rows in the subquery fail the condition only.c. both of these two conditions are met.d. neither of these two conditions is met.

    12. Changing cardinalities in a database is:a. a common database design taskb. a rare database design task, but does occur.c. a database design task that never occurs.d. is impossible to do, so a new database must be constructed and the data

    moved into it.13. The NOT EXISTS keyword will be true if:

    a. any row in the subquery meets the condition.b. all rows in the subquery fail the condition.c. both of these two conditions are met.d. neither of these two conditions is met

    14. The data model that is produced from reverse engineering is:a. a conceptual model.b. an internal model.c. a logical model.d. None of the above is correct

    15. To drop a column that is used as a foreign key, first:a. drop the primary key.b. drop the table containing the foreign keyc. drop the foreign key constraintd. All of the above must be done

    16. What SQL command will allow you to change the table STUDENT to add the constraint named GradeCheck that states that the values of the Grade column must be greater than 0?

    a. ALTER TABLE STUDENT ALTER CONSTRAINT GradeCheck (Grade > 0);

    b. ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck (Grade > 0);

    c. ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck CHECK (Grade > 0);

    d. None of the above is correct.17. Which is not true of a correlated subquery?

    a. EXISTS/NOT EXISTS is a form of a correlated subquery.b. The processing of the SELECT statements is nested.c. They can be used to verify functional dependencies.d. They are very similar to a regular subquery

  • DBMS

    3

    18. A tool that can help designers understand the dependencies of database structures is a:

    a. dependency graph.b. data modelc. graphical displayd. None of the above is correct.

    19. Data is a a. Raw fact and figureb. Metadatac. Information onlyd. None of the above.

    20. A repository of information about a database is known as aa. Data Dictionaryb. Distributed databasec. Filed. None of the above

    21. The overall description of the database is known asa. Instanceb. Schemac. Snapshotd. None of the above

    22. Schema is same as an a. Extension of the databaseb. Intension of the databasec. Subschemad. None of the above

    23. The physical storage structures of devices could be changed without affecting conceptual schema. This is known as

    a. Physical data independenceb. Logical data independencec. External data independenced. None of the above

    24. Create, Alter and Drop are the examples of a. DDLb. DMLc. VDLd. SDL

    25. The term relation was chosen bya. Dr. Berry Boehmb. Dr. E.F. Codd.c. Dr. Jacobsond. None of the above

    26. Each row of data is known as a a. Tupleb. Cardinalityc. Degree

  • DBMS

    4

    d. None of the above27. The number of tuples in a relation is known as

    a. Cardinalityb. Degreec. Modalityd. None of the above

    28. ER-model was introduced bya. E.F. Coddb. P.P. Chenc. Constantined. None of the above

    29. The primary key of a weak entity needs to be formed. It is known as the a. Discriminator or partial keyb. Foreign keyc. Weak keyd. None of the above

    30. The process of minimizing the difference between entities by identifying their common characteristics is known as

    a. Specializationb. Generalizationc. Multiplicityd. None of the above

    31. The process of compiling information on an object, there by abstracting a higher level object is known as

    a. Specializationb. Generalizationc. Aggregationd. None of the above

    32. The relationship between a weak entity-set is called as the a. Weak relationshipb. Identifying relationship c. Connecting relationshipd. Associative relationship

    33. An ER-diagram that shows the concepts of Specialization and Generalization are known as

    a. Extended ER-diagramsb. Effective ER-diagramsc. Expanded ER-diagramsd. Enhanced ER-diagrams

    34. Those candidate keys which are not currently selected as the primary key are called as

    a. Super keysb. Candidate keyc. Alternate keyd. None of the above

    35. A key that has no meaning to the business or organization is

  • DBMS

    5

    a. Candidate keyb. Alternate keyc. Artificial keyd. None of the above

    36. A rule that states that in a base relation, the value of attribute of a primary key cannot be null is called as

    a. Entity integrity ruleb. Referential integrity rulec. Security integrity ruled. None of the above

    37. A virtual relation is also known as aa. Viewb. Tablec. Snapshotd. None of the above

    38. When we want to display records with attributes from many relations then we usea. SELECT operationb. PROJECT operationc. JOIN operationd. None of the above

    39. What is the cardinality of a table with 50 rows and 5 columns?a. 50b. 5c. 250d. None of the above

    40. What is the degree of a table with 50 rows and 5 columns?a. 50b. 5c. 250d. None of the above

    41. To sort records we usea. ORDER BY clauseb. HAVING clausec. GROUP claused. None of the above

    42. The logical tables of data extracted from existing tables are known asa. Recordsb. Viewsc. Queriesd. None of the above

    43. Oracle provides a special table that can be used to test any function. This table isa. DUAL tableb. VIEW tablec. CALCULATION tabled. None of the above

    44. ROLLBACK, COMMIT and SAVEPOINT are

  • DBMS

    6

    a. DMLsb. DDLsc. VDLsd. TCLs

    45. Primary indexing is also known asa. Clustering indexb. Non-clustering indexc. Pinned indexingd. None of the above

    46. A buffer use to store results of the recent querya. Cursorb. Triggersc. Packagesd. Exceptions

    47. The process of decomposition of a table is known as a. Specializationb. Generalizationc. Normalizationd. None of the above

    48. The process of Normalization was proposed by a. Dr. E.F. Coddb. Dr. Berry Boehmc. Jacobsond. None of the above

    49. An association between two attributes of the same table is known asa. Functional Dependencyb. Multi Valued Dependencyc. Join Dependencyd. None of the above

    50. After normalization the original table can be obtained bya. Delete operationb. Cascade operationc. Join operationd. None of the above

    51. Every BCNF is ina. 1NFb. 2NFc. 3NFd. 4NF

    52. Shadow paging was introduced bya. Boehmb. Dr. E.F. Coddc. Loried. None of the above

    53. Shadowing maintainsa. 2 tables

  • DBMS

    7

    b. 3 tablesc. 4 tablesd. None of the above

    54. The page size in shadowing technique is of the ordera. 210 to 215 bytesb. 211 to 215 bytesc. 212 to 216 bytesd. 213 to 217 bytes

    55. Shadowing may result in a. Page lossb. Data scatteringc. Page swapd. None of the above

    56. A checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out is called as a

    a. Bufferb. Fuzzy checkpointc. Shadow pagingd. None of the above

    57. The point of synchronization between the database and the transaction log file is called as a

    a. Checkpoint b. Fuzzy checkpointc. UNDO and REDOd. None of the above

    58. Shadow paging is used fora. Writing same item at same locationb. Writing same item at different locationc. Creating shadowd. None of the above

    59. The process of choosing a suitable execution strategy for processing a query is known as

    a. Query optimizationb. Query evaluationc. Query execution pland. None of the above

    60. The process of sending the result of one operator to another operator without creating a temporary relation to hold the intermediate results is known as

    a. Queryb. Relationc. Pipeliningd. None of the above

    61. The syntax of the query is checked bya. Parserb. Compilerc. Assembler

  • DBMS

    8

    d. None of the above62. The first phase of query processing is

    a. Decompositionb. Restructuringc. Analysisd. None of the above

    63. The result of a query, in a query tree is represented bya. Root nodeb. Leaf nodec. Intermediary noded. None of the above

    64. Which of the following query processing method is more efficient:a. Pipelining b. Materializationc. Tunnellingd. None of the above

  • DBMS

    9

    1. a2. c3. c4. c5. d6. c7. d8. a9. b10. d11. a12. a13. b14. d15. c16. c17. d18. a19. a20. a21. b22. b23. a24. a25. b26. a27. a28. b29. a30. b31. c32. b33. d34. c35. c36. a37. a38. c39. a40. 541. a42. b43. a44. d45. a46. a

  • DBMS

    10

    47. c48. a49. a50. c51. c52. c53. a54. a55. b56. b57. a58. b59. a60. c61. a62. a63. a64. a