Unit 1
Unit 1
5. What is isolation
a.)The operation of one transaction does not affect the operation of other transaction
b.)Once a transaction is completed the results will persist
c.)The state of database is the same when it ends as it begins
d.)none
Ans: a
6.In strict relational terminology , an attribute is
a.) a record
b.) an entity
c.) a field
d.) a table
Ans: c
7. In which of the model(s) strictly require the relationships be predefined.
1. Network model
2. Hierarchial model
3. Relational model
4. none
a.)1 only b.)2 only c.)1 and 2 d.)4
Ans: c
8 .The type of the datastrucure that is used in relational model is
a.) Table
b.)Tree
c.)Node
d.)none of the above
Ans: a
9. The data in the database that cannot be removed by other process until and unless it is
requested is
a.) Persistent data
b.) Transient data
c.)In consistent data
d.)none
Ans: a
10. Data integrity in a relational database requires that
1.)it is not permitted to delete a record from a secondary table if there is corresponding
record in the primary table
2.)no key can be null
3.)the key in a record must be unique
4.)a foreign key must match an existing record in the primary table
a.)1 only b.)2 only c.)2,3,4 d.)1,2,3 and 4
ans : d
11. Which of the following statements is true?
a.) A database must contain two or more tables
b.) A database must contain two data tables
c.) A database must contain at least one data table
d.) A database must contain one data table
Ans: c
12. A COMPLEX KEY FIELD is one which
a.) Is capable of storing more than one data type in it
b.) Ensures that there cannot be more than one record in a table with the same key field
values
c.) Is made up of more than one field
d.) Is a numerical data type
Ans : c
Sol: it's possible to choose a combination of fields in a table to be the key.
17. Assume you are extending the design of The Northern College Student Records
System to include details on each classroom. The college is never likely to have more
than ten classrooms and definitely not ever going to have more than 25 classrooms. What
data type would you select
a.) Numeric- Integer
b.) Numeric Long Integer
c.) Numeric Byte
d.) Numeric Single
Ans: c
Sol: this will only store whole numbers between 0 and 255 at the least expense in storage
space (1 byte)
18. A Database Management System can
1.Delete data
2. Retrieve data
3. Add new data
4. Edit Data
a.)1 and 2
b.)1,2 and 4
c.)1,2 and 3
d.)1,2,3 and 4.
Ans : d
19. A unique key field is
a.) Is a special field that has to be a unique number
b.) Is a special field that identifies a particular record in a data table
c.) Is a special field that each database has to have.
d.) none
Ans: b
b.)1,2 and 3
c.)1,2 and 4
d.)1,2,3 and 4
Ans: c
b.)2,3 and 4
c.)1,3 and 4
d.)1,2,3 and 4
Ans: b
INIT
SNAME
DOB
GENDER
RES
KIDS
HTOWN
INIT
SNAME
DOB
GENDER
RES
KIDS
HTOWN
A SREF+ DOB
B SREF
C INIT + SNAME (as a complex key field)
D SNAME
Ans: B
27.The person who is having central control over data and programs accessing that data
a.)DBA
b.)Database Designer
c.)Developer
d.)none
Ans: a
28.The users who use the database by writing special database application programs are
called
a.)Sophisticated end user
b.) Specialized end user
c.) Nave end user
d.)Native end user
Ans: a
29.The persons who interact with the system through DML calls embedded in a program
written in host language
a.)System developers.
b.)System analysts
c.)DBA
d.)Application Programmers
Ans: d
30.This level of abstraction is concerned with the physical storage of the information.
i)Physical level
ii)Conceptual level
iii)View level
a.)i only
Ans: a
31.Physical level is also known as
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans: a
32.Storage allocation and access paths are considered in this level.
i)Physical level
ii)Conceptual level
iii)View level
a.)i only
Ans: a
33.The following schema hides the details of physical storage structures and concentrates
on describing entities, data types and relationships.
a.)internal schema
b.)external schema
c.)conceptual schema
d.)view schema
Ans: c
34.Which view is normally more stable
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans:c
35.The level which has the view of whole enterprise without concern of physical storage
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans:c
36.A school prepared a timetable describing the entire details of teaches,hours etc.
This does not contain any allocation of rooms etc.,This comes under which level.
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans:c
45 .The ability to modify the conceptual schema without causing any change to the
application program
a.)Physical data independence
b.)Logical Data independence
c.)External Data independence
d.)none
Ans: b
46.Which of the following processes the query to identify the basic operators that are
contained in query.
a.)query optimizer
b.)query processor
c.)query analyzer
d.)query manager
Ans: b
47.Which of the following arrives at an correct execution plan of sequence of basic
operators..
a.)query optimizer
b.)query processor
c.)query analyzer
d.)query manager
Ans: a
48._______decides the portions of data that should be transferred from secondary
storage to the primary storage
a.)file manager
b.)query manager
c.)buffer manager
d.)database manager
Ans: c
53.Objects that contain the same types of values and same methods are grouped into
a.)relations
b.)classes
c.)attributes
d.)tuples
Ans: b
54.This model has fixed format records
a.)ER model
b.)Object Oriented model
c.)Record based logical model
d.)Relational model
Ans: c
55.Which model(s) is(are) implementation data model s
i)ER model
ii)Relational
iii.)Network
iv)Hierarchical model
a.)i only
Ans: a
56. The collection of allocated memory and the running processes on the server is called
a.)snapshot
b.)instance
c.)both a and b
d.)none
Ans: c
70. A _____________is a data repository along with a user interface providing for the
manipulation and administration of a database.
a.)DBMS
b.)TBMS
c.)SDMs
d.)Nothing
Ans: a
71. A specific example where physical data independence would hold is
(i) when data file is changed from an unordered file to a sorted file.
(ii) when an additional access structure, (e.g. an index) is created for a relation.
(iii) when DBA decides to store the data in a B+ tree.
(iv) when the user retrieves data from the database.
(v) when the user writes an application program to join tables.
a.)i,ii and iii
b.)I,ii,ii and iv
Ans: a
72. A relation (from the relational database model) consists of a set of tuples, which
implies that
(a) relational model supports multi-valued attributes whose values can be represented in
sets.
(b) for any two tuples, the values associated with all of their attributes may be the same.
(c) for any two tuples, the values associated with one or more of their attributes must
differ.
(d )all tuples in a particular relation may have different attributes.
Ans: c
73. If K is a foreign key in relation R1, then
(a) every tuple of R1 has a distinct value for K.
(b) K cannot have a null value for tuples in R1.
(c) K is a key for some other relation.
(d) K is a composite key for R1.
Sol:c
74. Practitioners and Users are involved with database systems. Which of the statements
below is/are true
regarding them?
(a) Systems Designer is a user.
(b) Departmental Heads are users.
(c) Information Systems Manager is a user.
(d) Clerical staff are practitioners.
Ans: a
75. Which of the following statements is a/are characteristic(s) of Physical data
Independence?
(a) It hides the database file structure and Indexes.
(b) It allows use of Views.
(c) It allows changes to the physical storage structure, without affecting the applications.
(d) It is not referred to in the ANSI/SPARC 3 tier architecture.
(e) It insulates the conceptual schema from changes in the physical storage.
A.) a,b and c
B.)a,c and e
Ans: B
76. Components of a DBMS includes
(a) a user query and reporting facility.
(b) a database access sub system.
(c) a security and integrity sub system.
(d)All the above
Ans: d
77. The blanks of the following three statements have to be filled.
The (i) level provides the physical view of the database.
The (ii) level gives a user oriented description of the data elements and relationships.
The (iii) level provides all users information needs and definition of data items needs to
meet them.
Which of the following will correctly fill the blanks?
(a) (i) conceptual (ii) external (iii) internal
(b) (i) internal (ii) external (iii) conceptual
(c) (i) external (ii) conceptual (iii) internal
(d) (i) internal (ii) conceptual (iii) external
Ans: b
Ans: A
83. A data processing system is
B.)a,b and c
88. Which of the following statement(s) is/are true related to data, information and
databases?
(a)
A database is designed, built and populated with data or information for a specific
purpose.
(b)
A list of students who have scored more than fifty can be recognised as a set of
data.
(c)
Meta data allow database designers and users to understand what data exist, what
the data mean, and their limitations.
(d)
A sales person may include in his database, photographic images of customers
and video clips of discussions he has had with the customer.
A.) a,b B.)a,b and c
C.)c, d
D)a,c and d
Ans: D
(b)
A software application that is used to define, create, maintain and provide
controlled access to user databases.
(c)
Application programs that are used to provide information to users.
(d)
Database that contains occurrences of logically organised data or
information.
Ans: b
90. Which of the following closely describe the limitations of traditional file processing
systems?
(a)
File descriptions of files are stored within each application program that accesses
those files.
(b)
A duplication of certain columns of a file used by one department may appear in
another file used by another department of the organisation.
(c)
Different application programs used in different departments can easily have
inter- program communication to share data.
(d)
Addition of a new attribute to a certain computer file requires forcible shut down
of all applications that use the particular file.
A.) a,b and d
B.)a,b and c
C.)c, d
D)b,d
Ans: A
91. In addition to the database management software, the other possible types of software
a database system will have are
(a)
(b)
(c)
(d)
B.)a,b and c
C.)c, d
D)b,d
Ans: A
92. Which of the following statement(s) is/are correct in relation to database applications?
(a)
An enterprise database is intended to support organisation-wide operations and
decision-making.
(b)
An organisation can have multiple databases which are separate departmental
databases or as an enterprise database.
(c)
Usually, work group databases are larger than departmental databases.
(d)
Data warehouse is an integrated decision support database whose content is
derived from the various operational databases.
A.) a,c and d
B.)a,b and d
C.)c, d
D) b,d
Ans: B
93. Which of the following is/are describing the proper order of data access methods of
Relational Database, Hierarchical Database and the Network databases?
(a)
Supports direct access to a specific record and is difficult to access multiple
records related to a single record.
(b)
Supports access to multiple records related to a single record and is dependent on
pre defined physical pointers.
(c)
Supports hierarchical and non-hierarchical data relationships and is dependent on
predefined physical pointers.
(d)
Supports all logical data relationships and the logical data access, and is
independent of physical implementation techniques.
A.) a,c and d
B.)d, c and b
Ans: B
Ans: C
95. With respect to the database development process, identify function(s) applicable to
the logical design stage.
(a)
Identify scope of database requirements for the proposed information system.
(b)
Analyse in detail the transactions, forms, displays, and inquiries (database views)
required by the business functions supported by the database and integrate those views
into conceptual data model.
(c)
Transform the combined and reconciled data specifications into basic or atomic
elements following well-established rules for well-structured data specifications.
(d)
Identify data integrity and security requirements and populate the repository.
A.) a,c and d
D)d and b
Ans: C
96. Which of the following is/are true in relation to the database design process?
(a)
Identification of entities, their attributes, relationships, and business rules is
carried out at the conceptual design stage.
(b)
A weak entity is an entity that exists independently of other regular entity types.
(c)
Relationship instance is an association between entity instances, where each
relationship instance includes exactly one entity from each participating entity type.
(d)
Cardinality constraint specifies the number of instances of one entity that can be
associated with each instance of another entity.
A.) a,c and d
B.)a, c
C.) b, c and d
D) d and b
Ans: A
97. A Service centre for servicing vehicles has a large number of employees. Each
vehicle that comes for servicing will pass through several sections of the service centre.
Therefore many employees of the service centre service each vehicle. Further an
employee services many vehicles coming to the service centre
Which of the following is/are true in relation to the above description?
(a)
Three regular entities named EMPLOYEE, VEHICLE and SERVICE can be
identified.
(b)
Two entities named EMPLOYEE and VEHICLE can be identified.
(c)
SERVICE is an associate entity having attributes related to job done by whom and
to which vehicle.
(d)
Relationship between EMPLOYEE and SERVICE is one to many and the
relationship between SERVICE and VEHICLE is many to one.
A.) a,c and d
B.)a, c
C.)b, c and d
D)
d and b
Ans: C
98.
Consider the following two entity types identified at the analysis stage of an information
system.
Make
TRUCK
MaxLoa
d
MaxPassengers
BUS
Price
RegNo
RegNo
Price
Make
If we generalise these two entities by introducing a VEHICLE entity, then which of the
following best describes the characteristics for each of the three entities?
(a) TRUCK: RegNo, Make, Price, MaxLoad.
(b) BUS: RegNo, MaxPassengers.
(c) VEHICLE: RegNo, Make, Price.
Ans: C
99. The data type of a field is usually one of the standard data types used in
programming. Which of the following data types may result in use of variable-length
records?
(a)
Floating point
(c)
Date and time
Ans: d
(b) Boolean
(d) String of characters
100. The following is a list of data types and possible example values, except for items
(iv) and (v) which are references to data types.
.
(i)
(ii)
(iii)
(iv)
(v)
Datatype
Integer
Real
Double Precision
VARCHAR
BLOB
Value/type
IT 2301
10-10
10000.00
Reference to a legal document
Reference to a digital image
(i)
(iv)
(b)
(e)
(ii)
(v)
(c) iii
101. Which of the following is (are) correct with respect to file systems?
(a)
A logical record is concerned with efficient storage of information in the
secondary storage devices.
(b)
The efficiency of a file system depends on how efficiently operations such
as retrieve, insert, update, delete may be performed on the information stored in the file.
(c)
A sequential file system turns out to be quite efficient for an application
where most of the storage and retrieval of records are performed sequentially and
randomly.
(d)
Some physical organisations use pointers to record blocks to locate
records on disk.
A.) a,c and d
Ans: B
102. A file organisation essentially means organisation of records in the file. Which of
the following technique(s) is (are) used for indexed file organisations?
(a)
Heap (b)
Sequential
(c)
B+ tree
(d)
ISAM
A.) a,c and d B.) b and d C.)c,d D)d and a
Ans:C
103. Which of the following step(s) is (are) true for sequential file organisation when
attempting to insert a record
(i)
Locate the record in the file that comes before the record to be inserted in search
key order
(ii) If there is a free record (that is a space left after a deletion) within the same block as
the located record insert the new record there. Otherwise, insert the new record in an
overflow block
(iii) Adjust the pointers if the new record is inserted in an overflow block, otherwise do
not adjust the pointers
(a)
(c)
(b)
(d)
Ans: b
104. Practitioners are the people responsible for the database system and its associated
application software. Which of the following person(s) is a (are) practitioner(s)?
(a)
(c)
(d)
System Designer
(b)
Programmer/Analyst
Departmental heads
Information System Manager
Ans: C
105. Most database software includes:
(a)
special purpose database management software called the DBMS.
(b)
application software that uses DBMS facilities to manipulate the database
to achieve a specific business function.
(c)
application software that is always written using a fourth-generation
language supplied with the DBMS.
(d)
application software that utilises the command language of the DBMS.
A.) a,c and d B.) c and b C.) b and d D)a and b
Ans: C
(i)
(ii)
(iii)
Two different types of people (users and practioners) are concerned with them. Which of
them do users of a DBMS usually deal with?
(a)
(i) only
(d)
(ii) and (iii) only
Ans: B
(b)(iii) only
109. Which of the following is (are) true with respect to data models?
(a)
The network data model was introduced to overcome the main deficiencies in the
use of files.
(b)
The hierarchical data model uses a tree data structure.
(c)
The object-oriented data model was introduced to deal with non-traditional
commercial applications such as Geographical Information Systems (GIS).
(d)
The relational data model was widely accepted by most users from its inception in
early 1970s.
A.) a,c and d
Ans: C
D)d and b
110. A _________ is a logically coherent collection of data with some inherent meaning,
representing some aspect of real world
A. Database
B. data
C. Data dictionary
D. none
Ans : A
111. A __________ is a collection of programs that enables user to create and maintain a
database.
A. DBMS
B. Data
C. Data dictionary
D. none
Ans : A
112. The database and DBMS software together is called as_________
a.)Database collection
b)Database method
c)Database system.
d)Database repository.
Ans: c
113. The following is /are the Advantage(s) of DBMS?
a. Redundancy is controlled.
b. Unauthorised access is restricted.
c. Providing multiple user interfaces.
d.All the above
Ans: d
114. The level of abstraction that describes only part of entire database
a.)Physical
b.)External
c.)Internal
d.)Conceptual
Ans: b
115. The ability to modify the schema definition in one level should not affect the schema
definition in the next higher level is known as _____________
A. Data Independence
B. Data dependence
c.)Conceptual Independence
d.)none
Ans : A
116. Modification in physical level should not affect the logical level.This is
a.)Physical data independence
b.)Logical Data independence
c.)Conceptual Independence
d.)none
Ans: a
117. Modification in logical level should not affect the external level.This is
a.)Physical data independence
b.)Logical Data independence
c.)Conceptual Independence
d.)none
Ans: b
118. A__________ collection of conceptual tools for describing data, data relationships
data semantics and constraints
A. Data model.
B. Object oriented model
C. both A & B
d. none
Ans : A
119. ________ model is based on collection of objects
Ans: Object oriented model.
120._______ is an association among two or more entities.
Ans: Relation.
121. An attribute or attributes that uniquely identify each row in a relation is called a(n)
A) field pointer.
B) column.
C) primary key.
D) foreign key.
Ans: c
122. Data modeling may be the most important part of the systems development process
because
A) data characteristics are important in the design of programs and other systems
components.
B) The data in a system are generally more complex than processes, and play a central
role in development.
C) Data are less stable than processes.
D) A and B.
Ans: D
124. Which of the following is an entity type on which a strong entity depends?
A) member.
B) weak.
C) unary.
D) owner.
Ans: D
126. A(n) _____ specifies the number of instances of one entity that can be associated
with the each instance of another entity.
A) maximum
B) cardinality constraint
C) limit
D) counter constraint
Ans: B
127. Duplication of data in files may cause
A) data integrity problems.
B) data items with the same names used for different purposes.
C) data items with different names in different files.
D) A and C
Ans: D
Ans: A
131. Data in the database that represent a description of the database structure are called:
A.) Indexes
B.) User Data
C.)Application metadata
D.)Metadata
Ans: D
132. The intermediary between the design tools and run-time subsystems and data is
called:
A.) DBMS engine
B.)Database schema
C.)Operating system
D.)User interface
Ans: A
133. Restrictions on the business activities that need to be reflected in the database and
database application are known as:
A.) Database schema
B.)Relationships
C.)Business rules
D.)None
Ans: C
134. Which of the following is not a way in which a query can be expressed?
A.) By surrogate keys
B.)Query by form
C.)Use the data access language SQL
D.)Query by example
Ans: A
135.
a)
What is Database?
Collection of Information
b)
ans:
136.
(i)
security
(ii)
Redundancy is controlled
(iii)
(iv)
a)
b)
c)
d)
ans:
137.
ans :
138.
b
Tables derived from the ERD
ans: (b)
139. What is degree of a Relation?
a)
b)
c)
d)
Ans : a
140. What is Relationship?
a)
b)
c)
d)
Ans : d
141. The particular property which describes the entity is called as
a)
Integrity
b)
Table
c)
Database
d)
Attribute
Ans : d
142. Which language of database specifies user views and their mappings to the
conceptual schema
a)
b)
c)
d)
Ans : b
143.Which translates DML statements in a query language?
a)
DDL Interpreter
b)
c)
DML Compiler
d)
Ans : c
144.
a)
Physical level
b)
Logical level
c)
View level
d)
Ans : d
145. The 'thing' in the real world with an independent existence is called as.
a) Entity set
b) attributes
c) degree
d) entity
ans : d
146. A database with single table structure is called a _________
a. Hierarchical data model
b. Relational data model
c. Flat file structure
d. Network data model
Answer :- (c)
147. ____________ data models are used to describe data at the lowest level.
a. Logical data model
b. Physical data model
B. STORE buffer
C. both A & B
D. none
Ans : A
153. How do you communicate with an RDBMS?
A. using SQL
B. using ORACLE
C. using VC++
D. none.
ANS : A
154. Deadlock occurs when
a.
transactions compete for the same resource.
b.
the DBMS cannot decide what to do next.
c.
the user requests a cascade abort
d.
a transaction cannot decide what to do next.
Ans : a
155.
a.
b.
c.
d.
Ans : c
156. Aborting a transaction
a.
removes changes made so far in the current transaction.
b.
removes changes made in a transaction after it has committed.
c.
is only possible in Microsoft Access.
d.
results in deadlock.
Ans : b
157. interaction with the file manager is the responsibility of _______
a. data base manager
b. data base designer
c. data base administrator
d. none.
Ans : a
158. back up and recovery is the responsibility of ___________
a. data base manager
b. data base designer
c. data base administrator
d. none.
Ans : c
159. _________ is the person having central control over data and programs accessing
that data.
a. data base manager
b. data base designer
c. data base administrator
d. none.
Ans : c
160. the following are the roles of data base designer.
a. schema definition
b. storage structure and access method definition
c. schema and physical organization modification
d. all the above.
ans : d
161. making a change in the conceptual schema by not effecting the external schema is
called
a. physical data independence
b. logical data independence
c. functional dependency
d. none.
Ans : b
162.Select the correct statement/s from among the following on proper naming of schema
constructs:
(a) Entity type name applies to all the entities belonging to that entity type and therefore a
plural
Ans : d
164. Which of the following statement(s) is (are) components of DBMS?
(a)
subsystem.
(c)
Security
Database administrator.
both a & b
(d)
Ans : d
165. a table consists of ________
a. spread sheet
b. tuples and attributes
c. descriptors
d. none
ans : b
166. an RDBMS is_____________
a. an approach intended to readily deal with many to many relationships
b. an approach which logicaly views data as a collection of tables.
c. an approach based on relational algebra
d. both b & c
and
integrity
ans : d
167. a two dimensional structure with data is called_____
A. set
b. tables
c. group
d. spread sheet
ans :b
168. object types are used to create
a. new data type
b. data base object
c. schema
d. meta data
ans : a
169. Which of the following statement(s) is (are) true with respect to data types?
(a)
INTEGER data type can store decimal numbers exceeding that number
32,767.
(b)
VARCHAR data type often reduces disk storage wastage when compared
to CHAR data type.
(c)
BLOB data is streams of bytes of fixed length.
(d)
BYTE data type cannot store any type of binary data.
Ans : b
170. CLOB datatype accomodates character information upto
a. 8 GB
b. 2 GB
c. 2000 bytes
d. 4 GB
ans : d
a) Can be sharable
above
b) related logically
c) can be protected
d) all the
ans: d
172. The functionalities of the RDBMS are
a) Store data
b) execute transactions
above
ans : d
c) Security
d) all the