0% found this document useful (1 vote)
359 views

Unit 1

RDBMS Textbook for understanding the principles of relational Databases and learning about one of the key facets of Database Management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
359 views

Unit 1

RDBMS Textbook for understanding the principles of relational Databases and learning about one of the key facets of Database Management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 48

Introduction to DBMS:

1.A collection of operations that performs a single logic function is called


a.)schedule
b.)transaction
c.)DBA
d.)none of the above
Ans: b
2.A table
a.)does not define logical order of records
b.)orders record by key field in a record
c.)orders records by the first field of a record
d.)imposes a logical order on record
Ans: a
Sol: Records are stored in table in same order as user inputs them.
3.Atomicity means
1 .complete commit
2. complete rollback
3. partial commit
4. partial roll back
a.)1 only b.)2 only c.)1 and 2 d.)3 and 4
Ans: c
Sol: Atomicity of a transaction means either to commit or roll back completely.
4. Which of the following property ensures that the state of database is same when it ends
as it was began
a.) Atomicity
b.) Consistency
c.) Isolation
d.) Durability
Ans: b
Sol: This is definition

5. What is isolation
a.)The operation of one transaction does not affect the operation of other transaction
b.)Once a transaction is completed the results will persist
c.)The state of database is the same when it ends as it begins
d.)none
Ans: a
6.In strict relational terminology , an attribute is
a.) a record
b.) an entity
c.) a field
d.) a table
Ans: c
7. In which of the model(s) strictly require the relationships be predefined.
1. Network model
2. Hierarchial model
3. Relational model
4. none
a.)1 only b.)2 only c.)1 and 2 d.)4
Ans: c
8 .The type of the datastrucure that is used in relational model is
a.) Table
b.)Tree
c.)Node
d.)none of the above
Ans: a

9. The data in the database that cannot be removed by other process until and unless it is
requested is
a.) Persistent data
b.) Transient data
c.)In consistent data
d.)none
Ans: a
10. Data integrity in a relational database requires that
1.)it is not permitted to delete a record from a secondary table if there is corresponding
record in the primary table
2.)no key can be null
3.)the key in a record must be unique
4.)a foreign key must match an existing record in the primary table
a.)1 only b.)2 only c.)2,3,4 d.)1,2,3 and 4
ans : d
11. Which of the following statements is true?
a.) A database must contain two or more tables
b.) A database must contain two data tables
c.) A database must contain at least one data table
d.) A database must contain one data table
Ans: c
12. A COMPLEX KEY FIELD is one which
a.) Is capable of storing more than one data type in it
b.) Ensures that there cannot be more than one record in a table with the same key field
values
c.) Is made up of more than one field
d.) Is a numerical data type
Ans : c
Sol: it's possible to choose a combination of fields in a table to be the key.

13. Data Validation is


a.) The practice of ensuring that only valid data is input into a database
b.) The practice of running a check on existing data to confirm that there is no invalid
data
c.) A separate program that checks existing data for errors
d.) A process of filtering out invalid data on a weekly or monthly basis
Ans: a
Sol: It's good practice to prevent invalid data being entered in the first place
14. A field is
a.) can store any type of data at any time
b.) capable of storing many facts
c.) the smallest amount of data DBMS can store
d.) either true or false
Ans: c
Sol: fields are said to be "atomic"
15. Which of the following is a valid key field.
a.) Initials+family name
b.) Student name
c.) Car registration number
d.) Streetname
Ans:c
Sol: Car regno is unique .So it is valid key field.
16. Which of the following is a valid database.
1. A telephone directory
2. The northern college record system
3. box of flowers
4.none
a.)2 only b.)1 and 2 c.)2 and 3 d.)4
Ans: b

17. Assume you are extending the design of The Northern College Student Records
System to include details on each classroom. The college is never likely to have more
than ten classrooms and definitely not ever going to have more than 25 classrooms. What
data type would you select
a.) Numeric- Integer
b.) Numeric Long Integer
c.) Numeric Byte
d.) Numeric Single
Ans: c
Sol: this will only store whole numbers between 0 and 255 at the least expense in storage
space (1 byte)
18. A Database Management System can
1.Delete data
2. Retrieve data
3. Add new data
4. Edit Data
a.)1 and 2

b.)1,2 and 4

c.)1,2 and 3

d.)1,2,3 and 4.

Ans : d
19. A unique key field is
a.) Is a special field that has to be a unique number
b.) Is a special field that identifies a particular record in a data table
c.) Is a special field that each database has to have.
d.) none
Ans: b

20. Input Masks are


a.) only used with a RDBMS
b.) Used to force user input into a particular form.
c.) Used to prevent any data at all being entered into a particular field
d.) Use to ensure that numbers are kept within expected bounds
Ans: b
Sol: for example, we can ensure that intials are stored in upper case regardless of whether
the user types in upper or lower case.
21.A flat file Database management system is
a.) A DBMS that can only have one table in it
b.) A DBMS that contains records that have a large number of fields in them
c.) A DBMS that can only have simple data tables in it
d.) none of these
Ans : a
Sol: a flat file DBMS can only copy with simple situations.
22. A table
a.) Cannot be empty
b.) consists of rows and columns
c.) Consists of Alphanumeric data
d.)can only store data of one type.
Ans: b

23.Which of the following statements are true


1. A character data type can contain 0,1,2,3,4,5,6,7,8,9
2. Some DBMSs can use DATE data types
3. Numerical data can be stored in different formats
4. A Logical data type can store three values, TRUE, UNKNOWN and FALSE
a.)1 and 2

b.)1,2 and 3

c.)1,2 and 4

d.)1,2,3 and 4

Ans: c

24. Which of the following statements are true


1. All records in a data table need not necessarily have the same fields in them
2. A data table is made up of records
3. Fields must contain specified types of data
4. A record is made up of fields
a.)1,2 and 4

b.)2,3 and 4

c.)1,3 and 4

d.)1,2,3 and 4

Ans: b

25. This is the structure of table STUDREC


SREF

INIT

SNAME

DOB

GENDER

RES

KIDS

SREF is equivalent to Student id.


RES means resident or non resident(RES field will be either true or false)
What datatype is RES.
a.)Numeric
b.)Logical
c.)Text
d.)Real
Ans: b

HTOWN

26. What is the unique KEY field in the table STUDREC?


SREF

INIT

SNAME

DOB

GENDER

RES

KIDS

HTOWN

A SREF+ DOB
B SREF
C INIT + SNAME (as a complex key field)
D SNAME
Ans: B
27.The person who is having central control over data and programs accessing that data
a.)DBA
b.)Database Designer
c.)Developer
d.)none
Ans: a
28.The users who use the database by writing special database application programs are
called
a.)Sophisticated end user
b.) Specialized end user
c.) Nave end user
d.)Native end user
Ans: a

29.The persons who interact with the system through DML calls embedded in a program
written in host language
a.)System developers.
b.)System analysts
c.)DBA
d.)Application Programmers
Ans: d
30.This level of abstraction is concerned with the physical storage of the information.
i)Physical level
ii)Conceptual level
iii)View level
a.)i only

b.)i and ii c.)i,ii and iii d.)none

Ans: a
31.Physical level is also known as
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans: a
32.Storage allocation and access paths are considered in this level.
i)Physical level
ii)Conceptual level
iii)View level
a.)i only
Ans: a

b.)i and ii c.)i,ii and iii d.)none

33.The following schema hides the details of physical storage structures and concentrates
on describing entities, data types and relationships.
a.)internal schema
b.)external schema
c.)conceptual schema
d.)view schema
Ans: c
34.Which view is normally more stable
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans:c
35.The level which has the view of whole enterprise without concern of physical storage
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans:c
36.A school prepared a timetable describing the entire details of teaches,hours etc.
This does not contain any allocation of rooms etc.,This comes under which level.
a.)internal level
b.)external level
c.)conceptual level
d.)view level
Ans:c

37.View level is also known as


a.)internal level
b.)external level
c.)conceptual level
d.)physical level
Ans:b
38.The following is a restricted view of database
a.)internal level
b.)external level
c.)conceptual level
d.)physical level
Ans:b
39.Suppose in the time table prepared by a college,if a lecturer is interested to see only
his classes and if a student is interested to see only his lecturers,then this type of view can
be
a.)internal level
b.)external level
c.)conceptual level
d.)physical level
Ans: b
40.The highest level of abstraction of data occurs in
a.)internal level
b.)external level
c.)conceptual level
d.)physical level
Ans: b

41.Which of the following schema defines the view level


a.)internal schema
b.)external schema
c.)conceptual schema
d.)none
Ans: b
42.Which of the following schema defines the physical level
a.)internal schema
b.)external schema
c.)conceptual schema
d.)none
Ans:a
43. Which of the following include definitions of each of the various types of data
a.)internal schema
b.)external schema
c.)conceptual schema
d.)none
Ans:c
44.The ability to modify the internal schema without causing any change to the external
schema
a.)Physical data independence
b.)Logical Data independence
c.)External Data independence
d.)none
Ans: a

45 .The ability to modify the conceptual schema without causing any change to the
application program
a.)Physical data independence
b.)Logical Data independence
c.)External Data independence
d.)none
Ans: b
46.Which of the following processes the query to identify the basic operators that are
contained in query.
a.)query optimizer
b.)query processor
c.)query analyzer
d.)query manager
Ans: b
47.Which of the following arrives at an correct execution plan of sequence of basic
operators..
a.)query optimizer
b.)query processor
c.)query analyzer
d.)query manager
Ans: a
48._______decides the portions of data that should be transferred from secondary
storage to the primary storage
a.)file manager
b.)query manager
c.)buffer manager
d.)database manager
Ans: c

49.The information about data in a databse is called _____


a.)Meta data
b.)Tera data
c.)hyper data
d.)none
Ans: a
50. The _______ takes care of accessing the physically stored file
a.)file manager
b.)query manager
c.)buffer manager
d.)database manager
Ans: a
51.One of the following is not a Object Based logical model
a.)ER model
b.)Object Oriented model
c.)Binary Model
d.)Network model
Ans: d
52.___________ is an association among several entities
a.)Cardinality
b.)Mapping
c.)Relationship
d.)class
Ans:c

53.Objects that contain the same types of values and same methods are grouped into
a.)relations
b.)classes
c.)attributes
d.)tuples
Ans: b
54.This model has fixed format records
a.)ER model
b.)Object Oriented model
c.)Record based logical model
d.)Relational model
Ans: c
55.Which model(s) is(are) implementation data model s
i)ER model
ii)Relational
iii.)Network
iv)Hierarchical model
a.)i only

b) i and ii c)i ,ii and iii d)i ,ii ,iii and iv

Ans: a

56. The collection of allocated memory and the running processes on the server is called
a.)snapshot
b.)instance
c.)both a and b
d.)none
Ans: c

57. The property of existence of data is called


a.)Persistent
b.)transient
c.)snapshot
d.)instance
Ans: a
58. Which DBMS allows a single database to be split apart such that its pieces reside at
geographically separated sites.
a.)Object Oriented DBMS
b.)ER model
c.)Distributed DBMS
d.)Centralized DBMS
Ans: c
59. To store both numbers and characters in database which data type u prefer?
a.)Number
b.)Character
c.)Varchar
d.)String
Ans: c

60.A ___________ is a structure that stores and protects data.


a.)Instance
b.)Snapshot
c.)Persistent
d.)Repository
Ans: d

61.A ___________ is a sequence of database operations.


a.)Instance
b.)Snapshot
c.)Persistent
d.)Transaction
Ans: d

62.The following is not a level of abstraction


a.)conceptual
b.)view
c.)persistent
d.)internal
Ans: c
63.The network model uses the concept of
a.)Node
b.)Tree
c.)Queue
d.)Stack
Ans: a
64.The relation model is truly a_______________ based model
a.)Mathematically
b.)Physically
c.)Chemically
d.)none
ans: a

65.What is the language used for queries in RDBMS


a.)Perl
b.)Cobol
c.)SQL
d.)None
Ans: c
66.The instance of a class used in OO model is
a.)Object
b.)Subject
c.)Structure
d.)Union
Ans: a
67.State True or false , != ,<>,^= denote the same operation
a.)True
b.)False
c.)Cannot say
d.)None
Ans: a
68.The data model that is widely accepted and used is
a.)RDBMS
b.)Network model
c.)Hierarchical model
d.)Cannot say
Ans: a
69.A _________ is a collection of facts
a.)System
b.)Data
c.)Star
d.)None
Ans: b

70. A _____________is a data repository along with a user interface providing for the
manipulation and administration of a database.
a.)DBMS
b.)TBMS
c.)SDMs
d.)Nothing
Ans: a
71. A specific example where physical data independence would hold is
(i) when data file is changed from an unordered file to a sorted file.
(ii) when an additional access structure, (e.g. an index) is created for a relation.
(iii) when DBA decides to store the data in a B+ tree.
(iv) when the user retrieves data from the database.
(v) when the user writes an application program to join tables.
a.)i,ii and iii

b.)I,ii,ii and iv

c.)iv and v d.)none

Ans: a
72. A relation (from the relational database model) consists of a set of tuples, which
implies that
(a) relational model supports multi-valued attributes whose values can be represented in
sets.
(b) for any two tuples, the values associated with all of their attributes may be the same.
(c) for any two tuples, the values associated with one or more of their attributes must
differ.
(d )all tuples in a particular relation may have different attributes.
Ans: c
73. If K is a foreign key in relation R1, then
(a) every tuple of R1 has a distinct value for K.
(b) K cannot have a null value for tuples in R1.
(c) K is a key for some other relation.
(d) K is a composite key for R1.
Sol:c

74. Practitioners and Users are involved with database systems. Which of the statements
below is/are true
regarding them?
(a) Systems Designer is a user.
(b) Departmental Heads are users.
(c) Information Systems Manager is a user.
(d) Clerical staff are practitioners.
Ans: a
75. Which of the following statements is a/are characteristic(s) of Physical data
Independence?
(a) It hides the database file structure and Indexes.
(b) It allows use of Views.
(c) It allows changes to the physical storage structure, without affecting the applications.
(d) It is not referred to in the ANSI/SPARC 3 tier architecture.
(e) It insulates the conceptual schema from changes in the physical storage.
A.) a,b and c

B.)a,c and e

C.)a,b,c and e D)a,b,c,d and e

Ans: B
76. Components of a DBMS includes
(a) a user query and reporting facility.
(b) a database access sub system.
(c) a security and integrity sub system.
(d)All the above
Ans: d
77. The blanks of the following three statements have to be filled.
The (i) level provides the physical view of the database.
The (ii) level gives a user oriented description of the data elements and relationships.
The (iii) level provides all users information needs and definition of data items needs to
meet them.
Which of the following will correctly fill the blanks?
(a) (i) conceptual (ii) external (iii) internal
(b) (i) internal (ii) external (iii) conceptual
(c) (i) external (ii) conceptual (iii) internal
(d) (i) internal (ii) conceptual (iii) external
Ans: b

78. Protecting a database from unauthorized or malicious use is termed


(a) data integrity.
(b) concurrent processing.
(c) data security.
(d) data recovery.
Ans: a
79. Which of the following closely resemble(s) an Enterprise Level database?
(a) A large health care Organization that operates a group of hospitals.
(b) A software development team maintaining a list of software components.
(c) A students CD collection database.
(d) A salesmans list of contacts.
Ans: a
80. What are the tasks which database administrators may be called upon to specifically
perform?
(a) To enter and/or delete data in the database
(b) Performance monitoring and maintenance
(c) Deciding the Graphical User Interface (GUI) necessary for data entry
(d) Enhancing the SQL queries
Ans: b
81. Which of the following is an/are incorrect statement(s)?
(a) Seek-time = The time taken to extend/retract the read/write head.
(b) Rotational delay is also called Latency.
(c) Block transfer time is the time to locate and transfer an arbitrary block, given its
address.
(d) The seek time and rotational delay when added is equal to Block transfer time.
Ans: d
82. Data Redundancy
(a) is a problem with traditional file systems.
(b) is reduced by normalization.
(c) has no effect on cost and maintenance of a system.
(d) can lead to inconsistency of data.
A.) a,b and d

B.)a,c C.)a,b,c D)none

Ans: A
83. A data processing system is

(a) a system that uniquely identifies a record in a file.


(b) an automated system, which organizes data to produce information.
(c) information on organized or summarized data.
(d) an automated system for processing the data of an organization.
Ans: d
84. Consider the following statements.
(i)
Glucorala is a company located in Colombo.
(ii)
Total income of Glucorala has increased by 1.5% compared with that of the
previous year.
(iii)
A. Chandran is a supplier to Glucorala and his email address is
[email protected].
(iv)
A. Chandran had supplied 24% of the total sugar requirement of the company.
Which of the following is a/are true statement(s)?
(a) Statements (i) and (ii) represent data while statements (iii) and (iv) represent
information.
(b) Statements (i) and (iii) represent data while statements (ii) and (iv) represent
information.
(c) Statements (i) and (iv) represent data while statements (ii) and (iii) represent
information.
(d) Statement (i) represents data and the other statements represent information.
Ans: b.
85. Which of the following is an/are incorrect statement(s)?
(a) Pointer A data model which assumes that all data relationships can be structured as
hierarchies
(b) Data model A physical address which identifies where a record can be found on a
disk
(c) Child record An owner record in a hierarchical relationship
(d) Network model A data relationship in which a record can be owned by records from
more than one type
(e) Data model A conceptual method of structuring data
A.) a,b and d
Ans: A

B.)a,b and c

C.)a,b,c and e D)a,b,c,d and e

86. Data transfer time refers to the


(a)
amount of time required in transferring data from/to the disk to/from primary
memory.
(b)
expected time to access a disk address and transfer a block of data.
(c)
time required activating a read/write head.
(d)
time required for the disk to rotate the sought-for record under the read-write
head.
Ans: b
87. The functions of a database administrator include(s):
(a)
Defining database schema.
(b)
Defining backup and recovery procedures.
(c)
Granting authorization for data access.
(d) Managing storage structures and access methods.
A.) a,b B.)b and c
Ans: C

C.)a,b,c and d D)a,b,c,

88. Which of the following statement(s) is/are true related to data, information and
databases?
(a)
A database is designed, built and populated with data or information for a specific
purpose.
(b)
A list of students who have scored more than fifty can be recognised as a set of
data.
(c)
Meta data allow database designers and users to understand what data exist, what
the data mean, and their limitations.
(d)
A sales person may include in his database, photographic images of customers
and video clips of discussions he has had with the customer.
A.) a,b B.)a,b and c

C.)c, d

D)a,c and d

Ans: D

89. A database management software (DBMS) includes:


(a)
programs.

Automated tools (CASE) used to design databases and application

(b)
A software application that is used to define, create, maintain and provide
controlled access to user databases.
(c)
Application programs that are used to provide information to users.
(d)
Database that contains occurrences of logically organised data or
information.
Ans: b
90. Which of the following closely describe the limitations of traditional file processing
systems?
(a)
File descriptions of files are stored within each application program that accesses
those files.
(b)
A duplication of certain columns of a file used by one department may appear in
another file used by another department of the organisation.
(c)
Different application programs used in different departments can easily have
inter- program communication to share data.
(d)
Addition of a new attribute to a certain computer file requires forcible shut down
of all applications that use the particular file.
A.) a,b and d

B.)a,b and c

C.)c, d

D)b,d

Ans: A
91. In addition to the database management software, the other possible types of software
a database system will have are
(a)
(b)
(c)
(d)

languages used for coding user interfaces and application programs.


presentation software for documenting the design of the database.
computer-aided software engineering tools (CASE).
a fourth generation language such as Embedded Structured Query Language.

A.) a,c and d

B.)a,b and c

C.)c, d

D)b,d

Ans: A
92. Which of the following statement(s) is/are correct in relation to database applications?
(a)
An enterprise database is intended to support organisation-wide operations and
decision-making.
(b)
An organisation can have multiple databases which are separate departmental
databases or as an enterprise database.
(c)
Usually, work group databases are larger than departmental databases.

(d)
Data warehouse is an integrated decision support database whose content is
derived from the various operational databases.
A.) a,c and d

B.)a,b and d

C.)c, d

D) b,d

Ans: B
93. Which of the following is/are describing the proper order of data access methods of
Relational Database, Hierarchical Database and the Network databases?
(a)
Supports direct access to a specific record and is difficult to access multiple
records related to a single record.
(b)
Supports access to multiple records related to a single record and is dependent on
pre defined physical pointers.
(c)
Supports hierarchical and non-hierarchical data relationships and is dependent on
predefined physical pointers.
(d)
Supports all logical data relationships and the logical data access, and is
independent of physical implementation techniques.
A.) a,c and d

B.)d, c and b

C.) b, c and d D) d and b

Ans: B

94. Which of the following describe(s) the features of distributed databases?


(a)
These databases are stored on computers at multiple locations and are not
interconnected by a network.
(b)
These databases form a single logical database that is spread physically across
computers in multiple locations that are connected by a data communication link.
(c)
Homogeneous type of distributed databases use the same type of database
management system at each location.
(d)
All users access the database through one global schema or database definition.
A.) a,c and d

B.)a, c C.)b, c and d D)d and b

Ans: C
95. With respect to the database development process, identify function(s) applicable to
the logical design stage.
(a)
Identify scope of database requirements for the proposed information system.
(b)
Analyse in detail the transactions, forms, displays, and inquiries (database views)
required by the business functions supported by the database and integrate those views
into conceptual data model.
(c)
Transform the combined and reconciled data specifications into basic or atomic
elements following well-established rules for well-structured data specifications.
(d)
Identify data integrity and security requirements and populate the repository.
A.) a,c and d

B.)a, c C.) b, c and d

D)d and b

Ans: C

96. Which of the following is/are true in relation to the database design process?
(a)
Identification of entities, their attributes, relationships, and business rules is
carried out at the conceptual design stage.
(b)
A weak entity is an entity that exists independently of other regular entity types.
(c)
Relationship instance is an association between entity instances, where each
relationship instance includes exactly one entity from each participating entity type.
(d)
Cardinality constraint specifies the number of instances of one entity that can be
associated with each instance of another entity.
A.) a,c and d

B.)a, c

C.) b, c and d

D) d and b

Ans: A
97. A Service centre for servicing vehicles has a large number of employees. Each
vehicle that comes for servicing will pass through several sections of the service centre.

Therefore many employees of the service centre service each vehicle. Further an
employee services many vehicles coming to the service centre
Which of the following is/are true in relation to the above description?
(a)
Three regular entities named EMPLOYEE, VEHICLE and SERVICE can be
identified.
(b)
Two entities named EMPLOYEE and VEHICLE can be identified.
(c)
SERVICE is an associate entity having attributes related to job done by whom and
to which vehicle.
(d)
Relationship between EMPLOYEE and SERVICE is one to many and the
relationship between SERVICE and VEHICLE is many to one.
A.) a,c and d

B.)a, c

C.)b, c and d

D)

d and b

Ans: C

98.
Consider the following two entity types identified at the analysis stage of an information
system.
Make
TRUCK
MaxLoa
d

MaxPassengers
BUS

Price
RegNo

RegNo

Price
Make

If we generalise these two entities by introducing a VEHICLE entity, then which of the
following best describes the characteristics for each of the three entities?
(a) TRUCK: RegNo, Make, Price, MaxLoad.
(b) BUS: RegNo, MaxPassengers.
(c) VEHICLE: RegNo, Make, Price.

(d) BUS: RegNo, Make, Price, MaxPassengers.


(e) TRUCK: RegNo, MaxLoad.

A.) a,c and d

B.)a, c and e C.)b, c and e D)d,e and b

Ans: C
99. The data type of a field is usually one of the standard data types used in
programming. Which of the following data types may result in use of variable-length
records?
(a)
Floating point
(c)
Date and time
Ans: d

(b) Boolean
(d) String of characters

100. The following is a list of data types and possible example values, except for items
(iv) and (v) which are references to data types.
.
(i)
(ii)
(iii)
(iv)
(v)

Datatype
Integer
Real
Double Precision
VARCHAR
BLOB

Value/type
IT 2301
10-10
10000.00
Reference to a legal document
Reference to a digital image

Which of the above statement(s) is/are correct?


(a)
(d)

(i)
(iv)

A.) a,c and d


Ans: B

(b)
(e)

(ii)
(v)

(c) iii

B.) c and e C.)b and e D)d,e and b

101. Which of the following is (are) correct with respect to file systems?
(a)
A logical record is concerned with efficient storage of information in the
secondary storage devices.
(b)
The efficiency of a file system depends on how efficiently operations such
as retrieve, insert, update, delete may be performed on the information stored in the file.
(c)
A sequential file system turns out to be quite efficient for an application
where most of the storage and retrieval of records are performed sequentially and
randomly.
(d)
Some physical organisations use pointers to record blocks to locate
records on disk.
A.) a,c and d

B.) b and d C.)b and c D)d and a

Ans: B

102. A file organisation essentially means organisation of records in the file. Which of
the following technique(s) is (are) used for indexed file organisations?
(a)

Heap (b)
Sequential
(c)
B+ tree
(d)
ISAM
A.) a,c and d B.) b and d C.)c,d D)d and a
Ans:C

103. Which of the following step(s) is (are) true for sequential file organisation when
attempting to insert a record
(i)
Locate the record in the file that comes before the record to be inserted in search
key order
(ii) If there is a free record (that is a space left after a deletion) within the same block as
the located record insert the new record there. Otherwise, insert the new record in an
overflow block
(iii) Adjust the pointers if the new record is inserted in an overflow block, otherwise do
not adjust the pointers

(a)
(c)

Only (i) is true


Only (i) and (iii) are true

(b)
(d)

Only (i) and (ii) are true


Only (ii) and (iii) are true

Ans: b
104. Practitioners are the people responsible for the database system and its associated
application software. Which of the following person(s) is a (are) practitioner(s)?
(a)
(c)
(d)

System Designer
(b)
Programmer/Analyst
Departmental heads
Information System Manager

A.) a,c and d

B.) c and d C.)a,b and d D)d and b

Ans: C
105. Most database software includes:
(a)
special purpose database management software called the DBMS.
(b)
application software that uses DBMS facilities to manipulate the database
to achieve a specific business function.
(c)
application software that is always written using a fourth-generation
language supplied with the DBMS.
(d)
application software that utilises the command language of the DBMS.
A.) a,c and d B.) c and b C.) b and d D)a and b
Ans: C

106. Which of the following closely describes a workgroup database application?


(a)
A sales person keeping track of his customer information with contact
details.
(b)
A software development team maintaining a list of software objects.
(c)
A personnel database that is designed to track data concerning employees,
job skills and job assignments for a large organisation.
(d)
A large healthcare organisation that operates a group of medical centres
including hospitals, clinics and nursing homes.
Ans: b
107. The following are the three language components of a database management system
(DBMS).

(i)
(ii)
(iii)

Data Definition Language (DDL)


Sub-schema DDL
Data Manipulation Language

Two different types of people (users and practioners) are concerned with them. Which of
them do users of a DBMS usually deal with?
(a)
(i) only
(d)
(ii) and (iii) only
Ans: B

(b)(iii) only

(c) (i) and (ii) only

108. Data Independence refers to:


(a)
Handling of data by the DBMS software entirely independent of the
operating system.
(b)
Insulating the application program from external changes such as
inclusion of a new data item into an existing record structure.
(c)
Separation of data descriptions from the application programs that uses the
data.
(d)
Allowing application programs to be executed at a node different to the
database server.
Ans: b

109. Which of the following is (are) true with respect to data models?
(a)
The network data model was introduced to overcome the main deficiencies in the
use of files.
(b)
The hierarchical data model uses a tree data structure.
(c)
The object-oriented data model was introduced to deal with non-traditional
commercial applications such as Geographical Information Systems (GIS).
(d)
The relational data model was widely accepted by most users from its inception in
early 1970s.
A.) a,c and d
Ans: C

B.) c and d C.)b and c

D)d and b

110. A _________ is a logically coherent collection of data with some inherent meaning,
representing some aspect of real world

A. Database
B. data
C. Data dictionary
D. none
Ans : A
111. A __________ is a collection of programs that enables user to create and maintain a
database.
A. DBMS
B. Data
C. Data dictionary
D. none
Ans : A
112. The database and DBMS software together is called as_________
a.)Database collection
b)Database method
c)Database system.
d)Database repository.
Ans: c
113. The following is /are the Advantage(s) of DBMS?
a. Redundancy is controlled.
b. Unauthorised access is restricted.
c. Providing multiple user interfaces.
d.All the above
Ans: d
114. The level of abstraction that describes only part of entire database
a.)Physical
b.)External
c.)Internal
d.)Conceptual
Ans: b
115. The ability to modify the schema definition in one level should not affect the schema
definition in the next higher level is known as _____________
A. Data Independence
B. Data dependence
c.)Conceptual Independence
d.)none
Ans : A

116. Modification in physical level should not affect the logical level.This is
a.)Physical data independence
b.)Logical Data independence
c.)Conceptual Independence
d.)none
Ans: a
117. Modification in logical level should not affect the external level.This is
a.)Physical data independence
b.)Logical Data independence
c.)Conceptual Independence
d.)none
Ans: b
118. A__________ collection of conceptual tools for describing data, data relationships
data semantics and constraints
A. Data model.
B. Object oriented model
C. both A & B
d. none
Ans : A
119. ________ model is based on collection of objects
Ans: Object oriented model.
120._______ is an association among two or more entities.
Ans: Relation.
121. An attribute or attributes that uniquely identify each row in a relation is called a(n)
A) field pointer.
B) column.
C) primary key.
D) foreign key.
Ans: c

122. Data modeling may be the most important part of the systems development process
because
A) data characteristics are important in the design of programs and other systems
components.
B) The data in a system are generally more complex than processes, and play a central
role in development.
C) Data are less stable than processes.
D) A and B.
Ans: D

123. A database is an organized collection of _____ related data.


A) not
B) badly
C) physically
D) logically
Ans: D

124. Which of the following is an entity type on which a strong entity depends?
A) member.
B) weak.
C) unary.
D) owner.
Ans: D

125. Disadvantages of traditional file processing systems include


A) reduced data duplication.
B) program-data dependence.
C) limited data sharing.
D) B and C.
Ans: D

126. A(n) _____ specifies the number of instances of one entity that can be associated
with the each instance of another entity.
A) maximum
B) cardinality constraint
C) limit
D) counter constraint
Ans: B
127. Duplication of data in files may cause
A) data integrity problems.
B) data items with the same names used for different purposes.
C) data items with different names in different files.
D) A and C
Ans: D

128. Which of the following is NOT an advantage of database systems?


A) better data quality
B) program-data independence
C) redundant data
D) standards enforcement
Ans: C

129. Which of the following is NOT a function of a DBMS?


A) data storage, retrieval, and update.
B) logical data dependence.
C) recovery services.
D) integrity services
Ans: b
130. Which of the following is used to store the structure and format of user forms,
reports, queries, and other application components?
A.)Application MetaData
B.)Report Table
C.)Query By Example
D.)None

Ans: A

131. Data in the database that represent a description of the database structure are called:
A.) Indexes
B.) User Data
C.)Application metadata
D.)Metadata
Ans: D

132. The intermediary between the design tools and run-time subsystems and data is
called:
A.) DBMS engine
B.)Database schema
C.)Operating system
D.)User interface
Ans: A

133. Restrictions on the business activities that need to be reflected in the database and
database application are known as:
A.) Database schema
B.)Relationships
C.)Business rules
D.)None

Ans: C

134. Which of the following is not a way in which a query can be expressed?
A.) By surrogate keys
B.)Query by form
C.)Use the data access language SQL
D.)Query by example
Ans: A

135.
a)

What is Database?
Collection of Information
b)

Collection of meaningful real world data

c) Which stores Data


d) All the above

ans:

136.

Advantages of DBMS. Which statement is true?

(i)

security

(ii)

Redundancy is controlled

(iii)

Providing backup and recovery

(iv)

Providing multiple user interfaces.

a)

(i) and (ii)

b)

(iii) and (vi)

c)

(i),(ii),(iii) and not (iv)

d)

(i),(ii),(iii) and (iv)

ans:

137.

Number of tuples present in a table at any instance is called as?

a) intension b) extension c) integrity

ans :
138.

d) None of the above

b
Tables derived from the ERD

a) Are totally normalized


b) Are always in 1NF
c) Can be further denormalised
d) May have multi-valued attributes

ans: (b)
139. What is degree of a Relation?
a)

It is the number of attribute of its relation schema

b)

It is an association among two or more entities

c)

The collection (or set) of similar relationships

d)

None of the above

Ans : a
140. What is Relationship?
a)

It is the number of attribute of its relation schema

b)

The collection (or set) of similar relationships

c)

None of the above

d)

It is an association among two or more entities

Ans : d
141. The particular property which describes the entity is called as
a)

Integrity

b)

Table

c)

Database

d)

Attribute

Ans : d
142. Which language of database specifies user views and their mappings to the
conceptual schema
a)

SDL (Storage Definition Language)

b)

VDL (View Definition Language)

c)

DDL (Data Definition Language)

d)

Data Storage - Definition Language

Ans : b
143.Which translates DML statements in a query language?
a)

DDL Interpreter

b)

Query evaluation engine

c)

DML Compiler

d)

None of the above

Ans : c

144.

Which abstraction existing in the DBMS?

a)

Physical level

b)

Logical level

c)

View level

d)

All the above

Ans : d
145. The 'thing' in the real world with an independent existence is called as.
a) Entity set
b) attributes
c) degree
d) entity
ans : d
146. A database with single table structure is called a _________
a. Hierarchical data model
b. Relational data model
c. Flat file structure
d. Network data model
Answer :- (c)
147. ____________ data models are used to describe data at the lowest level.
a. Logical data model
b. Physical data model

c. Network data model


d. None of the above
Answer :- (b)
148. The data type which contains raw binary data otherwise the same as a LONG
column is
a. BFILE
b. CLOB
c. BLOB
d. LONGRAW
Answer :- (c)
149. A __________ provides the data security.
a. view
b. Queries
c.Commands
d. All of the above
Answer :- (a)
150. A ________ is an organized collection of logically related data.
a. Column
b. Composite attribute
c. Database
d. All of the above
Answer :- (c)
151. Once the DBMS informs the user that a transaction has successfully completed, its
effects should persist even if the system crashes before all its changes are reflected on
disk. This property is called.
A. consistency
B. isolation
C. durability
D. atomicity
Ans : C
152. Name the buffer in which all the commands that are typed in are stored
A. EDIT buffer

B. STORE buffer
C. both A & B
D. none
Ans : A
153. How do you communicate with an RDBMS?
A. using SQL
B. using ORACLE
C. using VC++
D. none.
ANS : A
154. Deadlock occurs when
a.
transactions compete for the same resource.
b.
the DBMS cannot decide what to do next.
c.
the user requests a cascade abort
d.
a transaction cannot decide what to do next.
Ans : a
155.
a.
b.
c.
d.

The role of a DBA includes which of the following topics?


User interfaces, salary budgeting, performance monitoring.
Supporting all programming languages which might be used with a database.
Loading data, evaluating new database systems, performance monitoring.
Installing databases, C++ programming, user support.

Ans : c
156. Aborting a transaction
a.
removes changes made so far in the current transaction.
b.
removes changes made in a transaction after it has committed.
c.
is only possible in Microsoft Access.
d.
results in deadlock.
Ans : b
157. interaction with the file manager is the responsibility of _______
a. data base manager
b. data base designer
c. data base administrator
d. none.

Ans : a
158. back up and recovery is the responsibility of ___________
a. data base manager
b. data base designer
c. data base administrator
d. none.
Ans : c
159. _________ is the person having central control over data and programs accessing
that data.
a. data base manager
b. data base designer
c. data base administrator
d. none.
Ans : c
160. the following are the roles of data base designer.
a. schema definition
b. storage structure and access method definition
c. schema and physical organization modification
d. all the above.
ans : d
161. making a change in the conceptual schema by not effecting the external schema is
called
a. physical data independence
b. logical data independence
c. functional dependency
d. none.
Ans : b
162.Select the correct statement/s from among the following on proper naming of schema
constructs:
(a) Entity type name applies to all the entities belonging to that entity type and therefore a
plural

name is selected for entity type.


(b) In the narrative description of the database requirements, verbs tend to indicate the
names of
relationship types.
(c) The nouns arising from a database requirement description can be considered as
names of
attributes.
(d) Additional nouns which are appearing in the narrative description of the database
requirements represent the weak entity type names.
Ans : b
163. Which of the following statement(s) is (are) true for database management systems?
(a)
(b)
(c)
(d)

Provide protection for data against unexpected loss, damage or destruction.


Allow maintenance of high quality, consistent and up to date data.
Keep data and the programs that manipulate it together.
both a & b

Ans : d
164. Which of the following statement(s) is (are) components of DBMS?
(a)
subsystem.
(c)

Data dictionary/directory subsystem. (b)

Security

Database administrator.

both a & b

(d)

Ans : d
165. a table consists of ________
a. spread sheet
b. tuples and attributes
c. descriptors
d. none
ans : b
166. an RDBMS is_____________
a. an approach intended to readily deal with many to many relationships
b. an approach which logicaly views data as a collection of tables.
c. an approach based on relational algebra
d. both b & c

and

integrity

ans : d
167. a two dimensional structure with data is called_____
A. set
b. tables
c. group
d. spread sheet
ans :b
168. object types are used to create
a. new data type
b. data base object
c. schema
d. meta data
ans : a
169. Which of the following statement(s) is (are) true with respect to data types?
(a)

INTEGER data type can store decimal numbers exceeding that number

32,767.
(b)
VARCHAR data type often reduces disk storage wastage when compared
to CHAR data type.
(c)
BLOB data is streams of bytes of fixed length.
(d)
BYTE data type cannot store any type of binary data.
Ans : b
170. CLOB datatype accomodates character information upto
a. 8 GB
b. 2 GB
c. 2000 bytes
d. 4 GB
ans : d

171. The characteristics of the database are

a) Can be sharable
above

b) related logically

c) can be protected

d) all the

ans: d
172. The functionalities of the RDBMS are
a) Store data
b) execute transactions
above
ans : d

c) Security

d) all the

You might also like