0% found this document useful (0 votes)
40 views

1 DBMS MCQ 1 Merged Merged

The document provides an overview of database systems, including approaches to building databases, architecture, and components of a DBMS. It contains a series of questions and answers related to database concepts, such as data models, keys, normalization, and SQL commands. Additionally, it covers relational data models, functional dependencies, and the importance of data integrity in database management.

Uploaded by

Aniket Kumre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

1 DBMS MCQ 1 Merged Merged

The document provides an overview of database systems, including approaches to building databases, architecture, and components of a DBMS. It contains a series of questions and answers related to database concepts, such as data models, keys, normalization, and SQL commands. Additionally, it covers relational data models, functional dependencies, and the importance of data integrity in database management.

Uploaded by

Aniket Kumre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 114

Introduction to database systems: Approaches to building a database, Three-tier

architecture of a database, Challenges in building a DBMS, DBMS Architecture, Various


components of a DBMS, Types of Data models.

Sr. Question Options Answer


No.
1. Which of the following is a. DML(Data Manipulation d. DDL(Data
generally used for performing
tasks like creating the structure Language) Definition
of the relations, deleting b. b. Query Language)
relation? c. Relational Schema
d. DDL(Data Definition
Language)

2. Which of the following a. DML(Data Manipulation a. DML(Data


provides the ability to query
information from the database Language) Manipulation
and insert tuples into, delete b. DDL(Data Definition Language)
tuples from, and modify tuples
in the database? Language)
c. Query
d. Relational Schema

3. What is DBMS? a. DBMS is a d.DBMS stores,


collection of queries modifies and
b. DBMS is a high- retrieves data
level language
c. DBMS is a
programming
language
d. DBMS stores,
modifies and
retrieves data
4. A collection of tables to a. Entity b. relational model
represent both data and the relationship
relationships among data, is model
known as b. Relationship
c. Object based
data model
d. Semi structured
model
5. The preface that converts the a. DML pre- d. DML precompiler
DML statements to normal executer
procedure calls in the host b. DML
language is known as executer
c. DML
compiler
d. DML
precompiler
6. The storage manager a. Buffer manager a. Buffer
component who decides what b. File manager manager
data to cache in main memory c. Transaction manager
is referred as d. Authorization and
integrity manager
7. Who created the first DBMS? a. Edgar Frank Codd b. Charles
b. Charles Bachman Bachman
c. Charles Babbage
d. Sharon B. Codd
8. In which of the following a. Image c. Table
formats data is stored in the b. Text
database management system? c. Table
d. Graph
9. Which of the following can be c. data
used to extract or filter the data a. Data redundancy mining
& information from the data b. Data recovery tool
warehouse? c. Data mining
d. Both B and C

10. Which one of the following


refers to the copies of the same a. Data Repository d. Data Redundancy
data (or information) occupying b. Data Inconsistency
the memory space at multiple
places. c. Data Mining
d. Data Redundancy

11. Which of the following refers


to the level of data abstraction a. Conceptual Level b. Physical
that describes exactly how the b. Physical Level Level
data actually stored?
c. File Level
d. Logical Level

12. To which of the following the


term "DBA" referred? a. Data Bank b. Database
Administrator Administrator
b. Database
Administrator
c. Data Administrator
d. None of the above

13. In general, a file is basically a


collection of all related______. a. Rows & Columns d. Records
b. Fields
c. Database
d. Records

14. The term "Data" refers to:


a. The electronic c. Row Facts and
representation of the figures
information( or data)
b. Basic information
c. Row Facts and
figures
d. Both A and C

15. Rows of a relation are known as


the _______. a. Degree d. All of the above
b. Tuples
c. Entity
d. All of the above
16. Which of the following refers
to the number of tuples in a a. Entity c. Cardinality
relation? b. Column
c. Cardinality
d. None of the above

17. Which one of the following is a


type of Data Manipulation a. Create c. delete
Command? b. Alter
c. Delete
d. All of the above

18. Which of the following


command is a type of Data a. Create a. Create
Definition language command? b. Update
c. Delete
d. Merge

19. Which of the following is a top-


down approach in which the a. Aggregation c. Specialization
entity's higher level can be b. Generalization
divided into two lower sub-
entities? c. Specialization
d. All of the above

20. The term "TCL" stands


for_____. a. Ternary Control d. Transaction
Language Control Language
b. Transmission
Control Language
c. Transaction Central
Language
d. Transaction Control
Language

21. Which of the following is used


in the application programs to a. Data Manipulation a. Data
request data from the database language Manipulation
management system? language
b. Data Definition
Language
c. Data Control
Language
d. All of the above

22. The term "SQL" stands for


a. Standard query c. Structured query
language language
b. Sequential query
language
c. Structured query
language
d. Server-side query
language

23. The term "Data independence"


refers to____ a. Data is defined d. Both B & C
separately and not included
in the programs
b. Programs are not
dependent on the
logical attributes of
the data
c. Programs are not
dependent on the
physical attributes of
the data
d. Both B & C

24. Which one of the following


refers to the total view of the a. Conceptual view a. Conceptual
database content? b. Physical view view

c. Internal view
d. External view

25. The architecture of a database


can be viewed as the ________ a. One level c. Three-level
b. Two-level
c. Three-level
d. Four level

26. Which of the following levels is


considered as the level closed a. Internal Level b. External
to the end-users? b. External Level Level

c. Conceptual Level
d. Physical Level

27. Which one of the following is


commonly used to define the a. Application program c. schema
overall design of the database? b. Data definition
language
c. Schema
d. Source code

28. DDL stands for what a. Database Definition a. Database


Level Definition
Level
b. Data Definition
Language
c. Data Device Latency
d. None of the above

29. An advantage of the database a. Data is dependent on c. Data is integrated


management approach is programs and can be accessed
b. Data by multiple programs
redundancy increases
c. Data is integrated and
can be accessed by
multiple programs
d. None of the above

30. Which two files are used during a. Query languages and c. Data
operation of the DBMS utilities dictionary and
b. DML and query transaction log
language
c. Data dictionary and
transaction log
d. None of the above
Relational Data Model: Concept of relations, Schema-instance distinction, Keys, referential
integrity and foreign keys, Relational algebra operators, Tuple relation calculus, Domain
relational calculus. Physical and logical hierarchy: Concept of index, B-trees, hash index,
function index, bitmap index. Concepts of Functional dependency, Normalization (1NF, 2NF,
3NF, BCNF, etc).

Sr. Question Options Answer


No.
1. a. Subset of a b. Subset of a
A Relation is a Cartesian product Cartesian product
of a list of of a list of
attributes domains
b. Subset of a
Cartesian product
of a list of domains
c. Subset of a
Cartesian product
of a list of tuple
d. Subset of a
Cartesian product
of a list of relations
2. In mathematical term Table a. Relation a. relation
is referred as b. Attribute
c. Table
d. domain
3. In mathematical term Row is a. Relation c. tuple
referred as b. Attribute
c. Tuple
d. domain
4. _______ allow us to identify a. Superkey a. Superkey
uniquely a tuple in the b. Domain
relation. c. Attribute
d. Schema
5. Minimal Superkeys are a. Schema keys b. Candidate keys
called b. Candidate keys
c. Domain keys
d. Attribute keys
6. Who proposed the relational a. Bill Gates b. E.F. Codd
model? b. E.F. Codd
c. Herman Hollerith
d. Charles Babbage
7. Which of the following in a. Every primary-key c. Every foreign-key
true regarding Referential value must match a value must match
Integrity? primary-key value a primary-key
in an associated value in an
table associated table
b. Every primary-key
value must match a
foreign-key value
in an associated
table
c. Every foreign-key
value must match a
primary-key value
in an associated
table
d. Every foreign-key
value must match a
foreign-key value
in an associated
table
8. How many types of keys in a. Candidate key d. All of these
Database Design? b. Primary key
c. Foreign key
d. All of these
9. Domain constraints, a. Foreign key c. Assertion
functional dependency and b. Primary key
referential integrity are c. Assertion
special forms of _________. d. Referential
constraint
10. Which one of the following a. Secondary Key b. Primary key
uniquely identifies the b. Primary key
elements in the relation? c. Composite key
d. Foreign key
11. A _____ is a property of the a. Rows b. rows
entire relation, rather than of b. Key
the individual tuples in which c. Attribute
each tuple is unique. d. Fields
12. Which one of the following a. Name c. Id
attribute can be taken as a b. Street
primary key ? c. Id
d. Department
13. A relation is considered a: a. Column c. two-dimensional table
b. one-dimensional
table
c. two-dimensional
table
d. three-dimensional
table
14. A key: a. must always be c. identifies a row.
composed of two
or more columns.
b. can only be one
column.
c. identifies a row.
d. identifies a
column.
15. In the relational models, a. Number of tuples a. Number of tuples
cardinality is termed as: b. Number of
attributes
c. Number of table
d. Number of
constraints
16. Key to represent relationship a. Primary key c. Foreign Key
between tables is called b. Secondary Key
c. Foreign Key
d. None of these
17. Which of the following is a. Reflexivity rule c. Pseudotransitivity rule
not Armstrong’s Axiom? c. Transitivity rule
c. Pseudotransitivity rule
d. Augmentation rule
18. Inst_dept (ID, name, salary, This comes under d) Both Lossy and Lossy-
dept name, building, budget) a) Lossy-join join decomposition
is decomposed into decomposition
b) Lossy decomposition
instructor (ID, name, dept c) Lossless-join
decomposition
name, salary)
d) Both Lossy and Lossy-
department (dept name, join decomposition
building, budget)

19. There are two functional This can be combined as a) A->BC


dependencies with the same a) A->BC
set of attributes on the left b) A->B
side of the arrow: c) B->C
A->BC d) None of the mentioned
A->B

20. Consider a relation The number of superkeys c) 10


R(A,B,C,D,E) with the of R is:
following functional a) 2
dependencies: b) 7
c) 10
ABC -> DE and d) 12
D -> AB

21. Suppose we wish to find the Which, if any, of the two a) Both I and II
ID’s of the employees that queries above will
are managed by people who correctly (in SQL2) get the
are managed by the desired set of employee
employee with ID 123. Here ID’s?
are two possible queries: a) Both I and II
b) I only
I.SELECT ee.empID c) II only
d) Neither I nor I
FROM Emps ee, Emps ff
WHERE ee.mgrID =
ff.empID AND ff.mgrID =
123;
II.SELECT empID
FROM Emps
WHERE mgrID IN
(SELECT empID FROM
Emps WHERE mgrID =
123);

22. Suppose relation Which of the following is c) B, C


R(A,B,C,D,E) has the not a key?
following functional a) A
dependencies: b) E
c) B, C
A -> B d) D
B -> C
BC -> A
A -> D
E -> A
D -> E

23. Which of the following is


not a valid SQL type? a. FLOAT c. DECIMAL
b. NUMERIC
c. DECIMAL
d. CHARACTER

24. Which of the following are


TCL commands? a. COMMIT and a. COMMIT and
ROLLBACK ROLLBACK
b. UPDATE and
TRUNCATE
c. SELECT and
INSERT
d. GRANT and
REVOKE

25. How many Primary keys can


have in a table? a. Only 1 a. Only 1
b. Only 2
c. Depends on no of
Columns
d. Depends on DBA

26. Which of the following is


not a valid aggregate a. COUNT b. COMPUTE
function? b. COMPUTE
c. SUM
d. MAX

27. Which operator is used to


compare a value to a a. ANY d. IN
specified list of values? b. BETWEEN
c. ALL
d. IN
28. What operator tests column
for absence of data a. NOT Operator c. IS NULL Operator
b. Exists Operator
c. IS NULL Operator
d. None of the above

29. If we have not specified


ASC or DESC after a SQL a. DESC b. ASC
ORDER BY clause, the b. ASC
following is used by default
c. There is no default
value
d. None of the
mentioned

30. Which of the following is


also called an INNER JOIN? a. SELF JOIN b. EQUI JOIN
b. EQUI JOIN
c. NON-EQUI JOIN
d. None of the above

31. The tree structure diagram in


which the pointers of data are a. Tree b. B+ tree
stored at the leaf nodes of b. B+ tree
diagram is classified as c. B2 tree
d. B. tree

32. Which of the following is a


fundamental operation in a) Set intersection b) Natural join
relational algebra? b) Natural join
c) Assignment
d) None of the mentioned
33. The ___________ operation,
denoted by −, allows us to a) Union b) Set-difference
find tuples that are in one b) Set-difference
relation but are not in
another.
c) Difference
d) Intersection
34. The relational algebra query A. Analytical B. Procedural
language is ___. B. Procedural
C. Symmetrical
D. Instrumental

35. How many types of relational A. 6 B. 7


operations are there? B. 7
C. 8
D. 9

36. Select operation is denoted A. σ A. Σ


by - B. R
C. P
D. S

37. What is Project Operation A. P D.∏


denoted by – B. R
C. O
D. ∏

38. In ___ products, the rows in A. Cross C. Both A and B


one table are combined with B. Cartesian
the rows in another table. C. Both A and B
D. None of the above
Overview, measures of query cost, query optimization, selection operation, sorting, join, evaluation
of expressions, transformation of relational expressions, estimating statistics of expression results,
evaluation plans, materialized views.

Sr. No. Question Options Answer


1. A ________ explores the a. Cost based optimizer a. Cost based
space of all query evaluation b. b. Space based optimizer
plans that are equivalent to a optimizer
given query. c. c. Time based optimizer
d. d. None of the
mentioned
2. In query processing, the a. Index Search b. Linear search
___________ is the lowest- b. Linear search
level operator to access data. c. File scan
d. Access paths
3. Which oracle is the join a. Oracle 9i c.Pre-oracle 9i
condition is specified using the b. Oracle 8i
WHERE clause: c. Pre-oracle 9i
d. Pre-oracle 8i
4. Which are the join types in a. Cross join d. All of the
join condition: b. Natural join mentioned
c. Join with USING clause
d. All of the mentioned
5. ___________ combines the a. PL/SQL a. PL/SQL
data manipulating power of b. SQL
SQL with the data processing c. Advanced SQL
power of Procedural d. PQL
languages.
6. What is the disadvantage of a. It is too expensive a. It is too expensive
cost-based optimizers? b. It is inefficient in
producing results
c. It does not perform the
desired function
d. None of the mentioned
7. The rule that allows the a. Logical equivalence rule b. Physical
transformation of a logical b. Physical equivalence equivalence rule
operation to a physical rule
operation is called ----- c. Memory equivalence
rule
d. None of the mentioned
8. Size estimation can be done a. Projection d. All of the
for which of the following b. Aggregation mentioned
processes? c. Set operation
d. All of the mentioned
9. If the results of one operation a. Chain b. Pipeline
are passed on to the other, it b. Pipeline
is called as _____ c. Materialized
d. Tree
10. Which feature converts row a. Views c. Pivot
data to a column for better b. Join
analytical view? c. Pivot
d. Trigger
11. What is the disadvantage of a. It is too expensive a. It is too expensive
cost-based optimizers? b. It is inefficient in
producing results
c. It does not perform the
desired function
d. None of the mentioned
12. The process of finding a good a. Query optimization a. Query
strategy for processing a b. Query processing optimization
query is called c. Query management
d. Query cost
13. The modification to a relation a. Moderator a. Differential
or expression is referred to as b. Change
its c. Alterations
d. differential
14. The operations of Natural-join a. Commutative b. associative
are b. Associative
c. Distributive
d. conjunctive
15. The iterator operation of a a. open() d.all of the above
demand driven pipeline b. next()
provides the function of c. close()
d. all of the above
16. Incremental view a. Materialized views a. Materialized
maintenance is needed to b. Relational views views
efficiently update c. Rational views
d. Query views
17. Materialized views constitute a. Linear data d.redundant data
b. Uniform data
c. Unique data
d. Redundant data
18. Advanced optimization a. Top-K optimization d.all of the above
techniques include b. Join minimization
optimization of updates, c. Parametric query
multiquery optimization and optimization
d. All of the above
19. The optimizer that explores a. Cost-based a.Cost-based
the space of all query- b. Plan-based
evaluation plans is called c. Estimate-based
d. Count-based
20. The complex queries a. Disk accesses a.Disk accesses
evaluation plan involves many b. Sector accesses
c. Parameters
d. Differentials
21. The process of replacement of a. Correlation b.Decorrelation
a nested query by a query b. Decorrelation
with a join is called c. Materialization
d. Non-materialization
22. The technique chosen by the a. Relation c.Both a & b
database system for b. Distributed columns
evaluation of an operation c. Both a & b
depends on the size of d. Distribution of tuples
23. Each relational algebra a. Parameters c.Operatins
expression represents a b. Differentials
particular sequence of c. Operations
d. routines
24. The operations of theta-join a. distributive c.Commutative
are b. conjunctive
c. commutative
d. associative
25. Keeping a materialized view a. deferred maintenance c.View maintenance
up-to-date with respect to the b. immediate
underlying data is known as maintenance
c. view maintenance
d. data maintenance
26. Modern database system a. incremental view a.Incremental view
provides more direct support maintenance maintenance
for b. data view maintenance
c. deferred view
maintenance
d. immediate view
maintenance
27. The two expression generates a. Dependent c.Equivalent
the same set of tuples on b. Independent
every legal database instance, c. Equivalent
the relational are said to be d. Non-equivalent
28. Materialized views are used to a. Query optimization b.Query processing
speed up b. Query processing
c. Query management
d. Query cost
29. Optimizers use __________ to a. Analyzers c.Heuristic
reduce the cost of b. Statistics
optimization. c. Heuristics
d. Caches
30. The join orders where the a. Right deep join orders b. Left deep join
right operand of each join is in b. Left deep join orders orders
one of the initial relations are c. Outer join orders
called as ________ d. None of the mentioned
Transaction: Transaction concepts, properties of transactions, serializability of transactions,
testing for serializability, System recovery, Two- Phase Commit protocol, Recovery and
Atomicity, Log-based recovery, concurrent executions of transactions and related problems,
Locking mechanism, solution to concurrency related problems, deadlock, , two-phase locking
protocol, Isolation.

Sr. Question Options Answer


No.
1. An operation is part of a A. Logically A) Logically
transaction if it is ___ related. B. Analytically
C. Reasonably
D. None

2. To access the contents of the A. Single A) Single


database, ___ user performs B. Two
transactions. C. Three
D. Multiple

3. Which of the following is an A. Read D) All of the above


operation of transactions? B. Write
C. Commit
D. All of the above

4. X is read from a database and A. Read A) Read


stored in a buffer in main memory B. Write
with the ___ operation. C. Commit
D. Rollback

5. __ is used to permanently save the A. Read C) Commit


work. B. Write
C. Commit
D. Rollback

6. An undo operation is called a ___. A. Rollback A. Rollback


B. Commit
C. Write
D. Read
7. In a database, prior to and after a A. Consistency A) Consistency
transaction, properties are used to B. Redundancy
ensure ___. C. Latency
D. Anonymity

8. Which of the following is a A. Atomicity D. All of the above


property of transaction? B. Consistency
C. Durability
D. All of the above

9. ___ states that all operations of a A. Atomicity A. Atomicity


transaction must occur B. Consistency
simultaneously; otherwise, the C. Isolation
transaction will be aborted. D. Durability

10. With regards to transaction a. Ensuring that d. All of the


processing, any DBMS should be transactions are free above.
capable of: from interference
from other users.
b. Parts of a transaction
are not lost due to a
failure.
c. Transactions do not
make the database
inconsistent.
d. All of the above.

11. What is ACID properties of A. Atomicity, B. Atomicity,


Transactions? Consistency, Consistency,
Isolation, Database Isolation,
B. Atomicity, Durability
Consistency,
Isolation, Durability
C. Atomicity,
Consistency,
Inconsistent,
Durability
D. Automatically,
Concurrency,
Isolation, Durability
12. Database locking concept is used A. Lost Update D. All of the
to solve the problem of B. Uncommitted above
Dependency
C. Inconsistent Data
D. All of the above

13. A system is in a ______ state if A. Idle C. Deadlock


there exists a set of transactions B. Waiting
such that every transaction in the C. Deadlock
set is waiting for another D. Ready
transaction in the set.
14. The deadlock state can be A. Commit B. Rollback
changed back to stable state by B. Rollback
using _____________ statement. C. Savepoint
D. Deadlock
15. _________ rollback requires the A. Total B. Partial
system to maintain additional B. Partial
information about the state of all C. Time
the running transactions. D. Commit
16. A transaction for which all A. Atomic D. durable
committed changes are permanent B. Consistent
is called: C. Isolated
D. durable

17. A transaction may not always A. Aborted A. Aborted


complete its execution B. Terminated
successfully. Such a transaction is C. Closed
termed D. All of the mentioned
18. Transaction management ensures A. Atomicity and B. Atomicity
____________ and __________ Intigrity and
properties. B. Atomicity and Durability
Durability
C. Atomicity and
Abstraction
D. None of these
19. Which of the following is the A. Rollback C. Switch to
preferred way to recover a B. Rollforward duplicate
database after a system failure? C. Switch to duplicate database
database
D. Reprocess
transactions
20. A shared lock allows which of the A. Delete C. READ
following types of transactions to B. INSERT
occur? C. READ
D. UPDATE

21. Locking may cause which of the A. Erroneous updates B. Deadlock


following problems? B. Deadlock
C. Versioning
D. All of the above.

22. The transaction log includes a. The before-image of d. The essential data
which of the following? a record of the record
b. The after-image of a
record
c. The before and after-
image of a record
d. The essential data of
the record

23. The “all-or-none” property is a. Isolation c. Atomicity


commonly referred to as b. Durability
_________ c. Atomicity
d. None of the
mentioned

24. Which of the following is not a a. Atomicity b. Simplicity


property of a transaction? b. Simplicity
c. Isolation
d. Durability

25. A transaction that has not been a. Compensating b. Aborted


completed successfully is called transaction transaction
as _______ b. Aborted transaction
c. Active transaction
d. Partially committed
transaction

26. Which of the following is not a a. Active d. Compensated


transaction state? b. Partially committed
c. Failed
d. Compensated

27. The execution sequences in a. Serials b. Schedules


concurrency control are termed as b. Schedules
________ c. Organizations
d. Time tables

28. I and J are _________ if they are A. Conflicting A. Conflicting


operations by different B. Overwriting
transactions on the same data C. Isolated
item, and at least one of them is a D. Durable
write operation.
29. If a schedule S can be transformed A. Non conflict C. Conflict
into a schedule S’ by a series of equivalent equivalent
swaps of non-conflicting B. Equal
instructions, then S and S’ are C. Conflict equivalent
D. Isolation equivalent

30. A schedule is __________ if it is A. Conflict serializable A. Conflict


conflict equivalent to a serial B. Conflicting serializable
schedule. C. Non serializable
D. None of the
mentioned
Recovery System: failure classification, recovery and atomicity, log based recovery,
checkpoints, buffer management, advanced recovery techniques. Introduction to Web
databases, distributed databases, data warehousing and data mining, Data Security

Sr. No. Question Options Answer


1. Which of the following is a. Deferred update c.Two-phase
not a recovery technique? b. Immediate update commit
c. Two-phase commit
d. Recovery management
2. Checkpoints are a part of a. Recovery measures a. Recovery
b. Security measures measures
c. Concurrency measures
d. Authorization measures
3. Before a block of data in a. Read-write logging c. Write-ahead
main memory can be b. Read-ahead logging logging
output to the database, all c. Write-ahead logging
log records pertaining to d. None of the mentioned
data in that block must
have been output to
stable storage. This is
___
4. Writing the buffered log a. Memory d. Disk
to __________ is b. Backup
sometimes referred to as c. Redo memory
a log force. d. Disk
5. The a. Latches c. Dirty Block
__________________ b. Swap Space
contains a list of blocks c. Dirty Block
that have been updated in d. None of the mentioned
the database buffer.
6. A distributed database is a. A single logical database a. A single
which of the following? that is spread to multiple logical
locations and is database that
interconnected by a network is spread to
b. A loose collection of file multiple
that is spread to multiple locations and
locations and is is
interconnected by a network interconnected
c. A single logical database by a network
that is limited to one
location.
d. A loose collection of file
that is limited to one
location.
7. Which of the following is a. Reduced network traffic c. Each site
a disadvantage of b. If the database fails at one must have the
replication? site, a copy can be located same storage
at another site. capacity
c. Each site must have the
same storage capacity.
d. Each transaction may
proceed without
coordination across the
network.
8. A distributed database a. Totally centralized at one d. All of the
can use which of the location and accessed by above
following strategies? many sites
b. Partially or totally
replicated across sites
c. Partitioned into segments at
different sites
d. All of the above

9. In a data mining task a. Perform all possible data d. Allow


when it is not clear about mining tasks interaction
what type of patterns b. Handle different with the user
could be interesting, the granularities of data and to guide the
data mining system patterns mining
should: c. Perform both descriptive process
and predictive tasks
d. Allow interaction with the
user to guide the mining
process
10. To detect fraudulent a. Feature selection c. Outlier
usage of credit cards, the b. Prediction analysis
following data mining c. Outlier analysis
task should be used: d. All of the above
11. In high dimensional a. It becomes difficult to a. It becomes
spaces, the distance distinguish between the difficult to
between data points nearest and farthest distinguish
becomes meaningless neighbors between the
because: b. The nearest neighbor nearest and
becomes unreachable farthest
c. The data becomes sparse neighbors
d. There are many
uncorrelated features
12. When we update any a. Select authorization b. update
tuple in the relation b. Update authorization authorization
which Authorization on a c. Grant authorization
relation allows a user to? d. Define authorization
13. The grants privileges on a. Specified attributes c. Entire
SQL authorization b. Specified tuples Entire relation
mechanism doesn’t have relation
___ c. Entire relation
d. None of the above
14. An Error that occurs a. System error c. Logical
because of some internal b. View error error
condition that interrupts c. Logical error
the normal execution is d. Application Error
called
15. In which phase, the a. Repeating b. Redo
system replays updates of b. Redo
all transactions by c. Replay
scanning the log forward d. Undo
from the last checkpoint.
16. What is that part of main a. Buffer a. Buffer
memory available for b. Catalog
storage of copies of disk c. Storage
blocks. d. Secondary storage
17. In the buffer where there a. Pinned block strategy c. Buffer
is no space for another b. Forced output block replacement
block, the block can be c. Buffer replacement strategy strategy
inserted using ____ d. All of the mentioned
18. The frequently used a. Most recently used b. Least
buffer replacement b. Least recently used recently used
strategy is c. Longest block
d. All of the mentioned
19. The technique where the a. Replacement strategy d. Most
blocks which have been b. Forced strategy recently used
used are replaced is c. Crash recovery system
called ___ d. Most recently used
20. Which of the following is a. Network Transparency d. None of the
not a promise of b. Replication Transparency above
distributed database? c. Fragmentation
Transparency
d. None of the above
21. What is true about data a. Data Mining is defined as d. All of the
mining? the procedure of extracting above
information from huge sets
of data
b. Data mining also involves
other processes such as Data
Cleaning, Data Integration,
Data Transformation
c. Data mining is the
procedure of mining
knowledge from data
d. All of the above
22. What may be defined as a. Outlier Analysis a. Outlier
the data objects that do b. Evolution Analysis Analysis
not comply with the c. Prediction
general behavior or d. Classification
model of the data
available.
23. Which one of the a. Boot crash c. Transaction
following is a failure to a b. Read failure failure
system? c. Transaction failure
d. All of the mentioned
24. Which of the following a. Read error c. Logical
belongs to transaction b. Boot error error
failure? c. Logical error
d. All of the mentioned
25. The assumption that a. Stop assumption d. Fail-stop
hardware errors and bugs b. Fail assumption assumption
in the software bring the c. Halt assumption
system to a halt, but do d. Fail-stop assumption
not corrupt the
nonvolatile storage
contents, is known as the
26. Which kind of failure a. Transaction failure c. Disk failure
loses its data in head b. System crash
crash or failure during a c. Disk failure
transfer operation. d. All of the mentioned
27. Which of the following a. Bug in software d. All of the
causes system to crash b. Loss of volatile data mentioned
c. Hardware malfunction
d. All of the mentioned
28. The log is a sequence of a. Log records a. Log records
_________ recording all b. Records
the update activities in c. Entries
the database. d. Redo
29. Writing the buffered log a. Memory d. Disk
to __________ is b. Backup
sometimes referred to as c. Redo memory
a log force. d. Disk
30. The remote backup site is a. Primary Site b. Secondary
sometimes also called the b. Secondary Site Site
c. Tertiary Site
d. None of the mentioned
DBMS Question Bank
Sr. No Question Answer

ROLLBACK in a database is ____ statement.

(A) DDL

(B) DML

(C) DCL

1 (D) TCL D

In a relational model, relations are termed as

(A) Rows

(B) Tables

(C) Attributes

2 (D) Tuples B

Which of the following is a procedural language?

(A) Relational algebra

(B) Query language

(C) Tuple relational calculus

3 (D) Domain relational calculus A


Which of the following types of tables constraints will prevent the entry of
duplicate rows?

(A) Primary keys

(B) Foreign keys

(C) Unique keys


4 A

In an E-R diagrams, ellipses represents

(A) Attributes

(B) Link between attributes and entity sets

(C) Relation among entity set

5 (D) Entity set A


In a relational modes, a cardinality is termed as

(A) Number of constraints

(B) Number of tables

(C) Number of attributes

6 (D) Number of tuples D


Which of the following is not a type of database?

(A) Relational

(B) Hierarchical

(C) Network

7 (D) Transition D

The most commonly used operation in relational algebra for projecting a set
of tuple from a relation is

(A) Union

(B) Select

(C) Projection

8 (D)
TheJoin
_____ operation allows the combining of two relations by merging pairs B
of tubles, one from each relation, into a single tuple.

(A) Intersection

(B) Union
9 C
A _____ is an abstract model that describes how the data are organised and
represented.

(A) Database

(B) Schema

(C) Instances

10 (D) Data model D


Which of the following is a set of one or more attributes taken collectively to
uniquely identify a record?

(A) Foreign key

(B) Super key

(C) Sub key

11 (D) Candidate key B


The ____ provides a set of operations that take one or more relations as input
and return a relation as an output.

(A) Relation flow

(B) Scheme diagram

(C) Relational algebra

12 (D) Schematic representation C

Where will we find the referential integrity command?

(A) Table

(B) Tools

(C) Format

13 (D) None of these D

____ represents raw facts, whereas ___ is data made meaningful.

(A) Data, information

(B) Information, reporting

(C) Information, bits

14 (D) Records, bytes A


When data changes in multiple lists and all lists are not updated, this causes

(A) Data redundancy

(B) Data inconsistency

(C) Duplicate data

15 (D) Information overload B

Which of the following is a Data Model?


(A) Entity-Relationship model
(B) Relational data model
(C) Object-Based data model
16 (D) All of the above D
Snapshot of the data in the database at a given instant of time is called
(A) Database Schema
(B) Database Instance
(C) Database Snapshot
17 (D) All of the above B

A functional dependency between two or more non-key attributes is called


(A) Transitive dependency
(B) Partial transitive dependency
(C) Functional dependency
18 (D) Partial functional dependency A

The Primary key must be


(A) Non Null
(B) Unique
(C) Option A or B
19 (D) Option A and B C
In SQL, which of the following is not a data Manipulation Language
Commands?
(A) DELETE
(B) SELECT
(C) UPDATE
20 (D) CREATE D

A transaction completes its execution is said to be


(A) Saved
(B) Loaded
(C) Rolled
21 (D) Committed D

Which of the following is not a Schema?


(A) Database Schema
(B) Physical Schema
(C) Critical Schema
22 (D) Logical Schema C

Who proposed the relational model?


(A) Bill Gates
(B) E.F. Codd
(C) Herman Hollerith
23 (D) Charles Babbage B

The index consists of


(A) A list of keys
(B) Pointers to the master list
(C) Both (a) and (b)
24 (D) None of the above C
In SQL, GRANT command is used to
(A) Allow user to access databases
(B) Allow user to create databases
(C) Grant system privileges, roles, and object privileges to uses and roles
25 (D) Choose auditing for specific SQL commands C

In an Entity-Relationship Diagram Rectangles represents


(A) Entity sets
(B) Attributes
(C) Database
26 (D) Tables A

Set of permitted values of each attribute is called


(A) Domain
(B) Tuple
(C) Relation
27 (D) Schema A

The attribute that can be divided into other attributes is called


(A) Simple Attribute
(B) Composite Attribute
(C) Multi-valued Attribute
28 (D) Derived Attribute B

Database locking concept is used to solve the problem of


(A) Lost Update
(B) Uncommitted Dependency
(C) Inconsistent Data
29 (D) All of the above D

Which of the following is Relation algebra Operation?


(A) Select
(B) Union
(C) Rename
30 (D) All of the above D

In an Entity-Relationship Diagram “Diamonds” represents


(A) Attributes
(B) Multi-valued attributes
(C) Weak entity set
31 (D) Relationship sets D

What are ACID properties of Transactions?


(A) Atomicity, Consistency, Isolation, Database
(B) Atomicity, Consistency, Isolation, Durability
(C) Atomicity, Consistency, Inconsistent, Durability
32 (D) Automatically, Concurrency, Isolation, Durability B
A relation that has no partial dependencies is in which normal form
(A) First
(B) Second
(C) Third
33 (D) BCNF B

A command to remove a relation from an SQL database


(A) Delete table <table name>
(B) Drop table <table name>
(C) Erase table <table name>
34 (D) Alter
Which oftable <table name>
the following in true regarding Referential Integrity? B
(A) Every primary-key value must match a primary-key value in an associated
table
(B) Every primary-key value must match a foreign-key value in an associated
table
(C) Every foreign-key value must match a primary-key value in an associated
35 table C
A relation is ………………. if every field contains only atomic values that are, no
lists or sets.
A) 1 NF
B) 2 NF
C) 3 NF
36 D) BCNF A

A table is in the ………………….. if only candidate keys are the determinants.


A) functional dependency
B) transitive dependency
C) 4 NF
37 D) BCNF D
The rule that a value of a foreign key must appear as a value of some specific
table is called a
A. Referential constraint
B. Index
C. Integrity constraint
38 D. Functional A

Relational Algebra is
A. Data Definition Language
B. Meta Language
C. Procedural query Language
39 D. None of the above C

Relational calculus is a
A. Procedural language
B. Non-Procedural language
C. Data definition language
40 D. High level language B
E-R model uses this symbol to represent the weak entity set?
A. Dotted rectangle
B. Diamond
C. Doubly outlined rectangle
41 D. None of these C

………. is an alternative of log based recovery.


A. Disk recovery
B. Shadow paging
C. Dish shadowing
42 D. Crash recovery B

Which of the following is not a property of transactions?


A. Atomicity
B. Concurrency
C. Isolation
43 D. Durability B

Which of the following ensures the atomicity of the transaction?


A. Transaction management component of DBMS
B. Application Programmer
C. The concurrency control component of DBMS
44 D. Recovery management component of DBMS A
……… protocol is used to perform multiple transactions that execute on a
different database.
A. commit
B. two-phase lock
C. two-phase commit
45 D. locking C

Which of the following represents a query in the tuple relational calculus?


a) { }{P(t) | t }
b) {t | P(t)}
c) t | P() | t
46 d) All of the mentioned B
A user executes a query which the ___ in the system uses to generate the
internal form of the query. In addition to checking the syntax of the query, the
____ verifies the name of the relation in the database, then the tuple, then the
attribute value.
A) Parser B) Translation
47 C) Optimization D) Evaluation A

The system must create a query ____ plan before it can fully evaluate a query.
A) Optimization B) Parser
48 C) Translation D) Evaluation D
The concept whichchecks the syntax of query which is written according to
rules of the grammer is classified as
a) Query graph b) Query tree
49 c) Parser d) Scanner c

A relation that has no partial dependencies is in which normal form


a) First b) Second
50 c) Third d) BCNF b

Which of the following makes the transaction permanent in the database ?


a) View b) Commit
51 c) Rollback d) Flashback b

The system must create a query ____ plan before it can fully evaluate a query.
a) Optimization b) Parser
52 c) Translation d) Evaluation d

Collections of operations that form a single logical unit of work are called
__________?
a) Views b) Networks
53 c) Units d) Transactions d

The real use of the Two-phase commit protocol is ______________


a) Deadlock will not occur b) Concurrency control can be avoided
54 c) Atomicity, i.e, all-or-nothing commits at all sites d) None of the above c

Which of the following is a property of transactions?


a) Atomicity b) Durability
55 c) Isolation d) All of the mentioned d

Checkpoints are a part of


a)Recovery measures. b) Security measures.
56 c) Concurrency measures. d) Authorization measures. a
Which of the following is not a recovery technique?
a) Deferred Database Modification
b) Immediate Database Modification
c) Two-phase commit
57 d) Recovery management c

The “all-or-none” property is commonly referred to as _________?


a) Isolation b) Durability
58 c) Atomicity d) None of the mentioned c

Transaction processing is associated with everything below except


a) Conforming a action or triggering a response
b) Producing detail summary or exception report
c) Recording a business activity
59 d) Maintaining a data a
Which functional dependency types is/are not present in the following
dependencies?
Empno -> EName, Salary, Deptno, DName
DeptNo -> DName
EmpNo -> DName
a) Full functional dependency
b) Partial functional dependency
c) Transitive functional dependency
60 d) BothofB the
Which andfollowing
C is the preferred way to recover a database after a b
transaction in progress terminates abnormally?
a.Rollback
b.Rollforward
c.Switch to duplicate database
d.Reprocess transactions
61 a
Database locking concept is used to solve the problem of
a)Lost Update
b)Uncommitted Dependency
c)Inconsistent Data
d)All of the above
62 d
The deadlock state can be changed back to stable state by using
_____________ statement.

a)Commit

b)Rollback

c)Savepoint

d)Deadlock
63 b
Which of the following contains a complete record of all activity that affected
the contents of a database during a certain period of time?

a)report writer

b)query language

c)data manipulation language

d)transaction log
64 d

Concurrency control is important for which of the following reasons?


a)To ensure data integrity when updates occur to the database in a multiuser
environment
b)To ensure data integrity when updates occur to the database in a single-user
environment
c)To ensure data integrity while reading data occurs to the database in a
multiuser environment
d)To ensure data integrity while reading data occurs to the database in a
single-user environment
65 a
A deadlock exists in the system if and only if the wait-for graph contains a
___________.
a)Cycle
b)Direction
c)Bi-direction
d)Rotation
66 a

What is/are the step(s) involved in fetching the data from the database in
query processing?
a)Parsing and translation b) Optimization
67 c) Evaluation d) All of the above d

If one attribute is determinant of second, which in turn is determinant of third,


then the relation cannot be:
a) Well-structured b) 1NF
68 c) 2NF d) 3NF d

Which of the following is not a recovery technique?


a) Deferred update
b) Immediate update
c) Two-phase commit
69 d) Recovery management c

The simplest approach to introducing redundancy is to duplicate every disk is


called …..
a) mirroring b) imaging
70 c) copying d) All of the above a
If database modifications occur while the transaction is still active, the
transaction is said to use the ___________technique.
a) Deferred-modification b) Late-modification
71 c) Immediate-modification d) Undo c
The log is a sequence of _________ recording all the update activities in the
database.
a) Log records b) Records
72 c) Entries d) Redo b
Let us suppose that in a distributed database, during a transaction T1, one of
the sites, say S1, is failed. When recovers, the site S1 has to check its log file
(log based recovery) to decide the next move on the transaction T1. If the log
contains a <T, Commit> record, what the site S1 has to do?
a) Need not do anything b) Perform Undo
73 c) Perform Redo d) Abort the transaction c
With regards to transaction processing, any DBMS should be capable of:
a)Ensuring that transactions are free from interference from other users.
b)Parts of a transaction are not lost due to a failure.
c)Transactions do not make the database inconsistent.
d)All of the above.
74 d

In case of any shut down during transaction before commit which of the
following statement is done automatically ?
a) View b)Commit
75 c) Rollback d) Flashback c
What is ACID properties of Transactions?
a)Atomicity, Consistency, Isolation, Database
b)Atomicity, Consistency, Isolation, Durability
c)Atomicity, Consistency, Inconsistent, Durability
d)Automatically, Concurrency, Isolation, Durability
76 b

A system is in a ______ state if there exists a set of transactions such that


every transaction in the set is waiting for another transaction in the set.
a) Idle b) waiting
77 c) Ready d) Deadlock d
A transaction completes its execution is said to be
a)Saved
b)Loaded
c)Rolled
d)Committed
78 d
A transaction may not always complete its execution successfully. Such a
transaction is termed
a)Aborted
b)Terminated
c)Closed
d)All of the mentioned
79 a
Locking may cause which of the following problems?
a)Erroneous updates
b)Deadlock
c)Versioning
d)All of the above.
80 b
In database management system, the executing process or executing program
which considers the updating or reading of records stored in database is called
a)conceptualization
b)execution
c)implementation
d)transaction
81 d
Execution of translation in isolation preserves the _________ of a database
a)Atomicity
b)Consistency
c)Durability
d)All of the mentioned
82 b
Which of the following is not a property of a transaction?

a)Atomicity

b)Simplicity
83 b
X is read from a database and stored in a buffer in main memory with the ___
operation.
A. Read
B. Write
C. Commit
84 D. Rollback A

Which of the following is an operation of transactions?


A. Read
B. Write
C. Commit
85 D. All of the above D

An operation is part of a transaction if it is ___ related.


A. Logically
B. Analytically
C. Reasonably
86 D. None A
Writing the data from the buffer back to the database is accomplished by
using the _____ operation.
A. Read
B. Write
C. Commit
87 D. Rollback B
In a database, prior to and after a transaction, properties are used to ensure
___.
A. Consistency
B. Redundancy
C. Latency
88 D. Anonymity A

All changes made in a transaction are ___ once it commits.


A. Visible
B. Not Visible
C. Broken
89 D. Not Broken A
What is TRUE about Consistency?
A. As a result of integrity constraints, the database remains consistent before
and after the transaction.
B. In most cases, a database remains either in its previous stable state or in a
new stable state following the execution of a transaction.
C. Every transaction undergoes a consistent database instance, which is the
consistent property of databases.
90 D. All of the above D
What is TRUE about Isolation?
A. By using the data used during a transaction, the second transaction will not
be able to use it until the first has been executed.
B. The data item X cannot be accessed by any other transaction T2 until the
transaction T1 is completed and the data item X is used by the transaction T1.
C. It enforced the isolation property via its concurrency control subsystem.
91 D. All of the above D

What is TRUE about atomicity?


A. The transaction cannot be partially completed, since there is no midway.
B. In each transaction, either the entire transaction is executed or it is not.
C. Both A and B
92 D. None of the above C

When dealing with database transactions, there is often a need for multiple
users to use a database to perform different operations. In this case, ___ of
the database occurs.
A. Concurrent Connection
B. Concurrent Reduction
C. Concurrent Execution
93 D. Concurrent Revolution C
During simultaneous execution, each operation should be performed
interleaved with the others, ensuring that there is no interference with the
other operations. This maintains a database ___.
A. Consistency
B. Redundancy
C. Concurrency
94 D. None C
What is TRUE about Durability?
A. The failure of the system or an error in a transaction cannot cause them to
be lost.
B. A consistent state is reached when a transaction is completed.
C. System failures cannot lead to the loss of that consistent state.
95 D. All of the above D
The concurrency ___ allows us to maintain the concurrency of the database.
A. Protocols
B. Controls
C. Control Protocols
96 D. None C

What is the Dirty Read Problem also known as?


A. W-W Conflict
B. W-R Conflict
C. R-R Conflict
97 D. None B
Priyadarshini College Of Engineering, Nagpur
Questions bank of DBMS

1) Which one of the following is a type of data manipulation command?

a. Create

b. Alter

c. Delete

d. All of the above

Answer C

2) Which of the following is generally used for performing tasks like creating the structure of
the relation, deleting relation?

a. DML

b. Query

c. Relational schema

d. DDL

Answer D

3) Which of the following the term 'DBA' referred?

a. Data bank administrator

b. Database administrator

c. Data admin

d. None of the above

Answer B

4) Which of the following refers to copies of the same data (or information) occupying the
memory space at multiple places?

a. Data responsibility
b. Data inconsistency

c. Data mining

d. Data redundancy

Answer D

5) Which of the following refers to the level of data abstraction that describes exactly how the
data actually stored?

a. Conceptual level

b. Physical level

c. File level

d. Logical level

Answer B

6) Which of the following is generally used for performing tasks like creating the structure of
the relations, deleting relation?

a)DML(Data Manipulation Language)

b)Query

c)Relational Schema

d)DDL(Data Definition Language)

Answer:d

7)A Database Management System is a type of _____software.

a)It is a type of system software

b)It is a kind of application software

c)It is a kind of general software

d)Both A and C

Answer:a

8) A huge collection of the information or data accumulated form several different sources is
known as ____:

a)Data Management
b)Data Mining

c)Data Warehouse

d)Both B and C

Answer:c

9) In general, a file is basically a collection of all related____.

a)Rows & Columns

b)Fields

c)Database

d)Records

Answer:d

10)Which of the following refers to the number of tuples in a relation?

a)Entity

b)Column

c)Cardinality

d)None of the above

Answer:c

11) which of the following is a feature of the database ?

a) No- backup for the data stored

b) User interface provided

c)Lack of Authentication

d)store data in multiple locations

Answer - b

12) which forms have a relation that contain information about a single entity ?

a) 4NF

b) 2NF

c) 5NF
d) 3NF

Answer - a

13)which of the following is not an example of DBMS ?

a) MYSQL

b) Microsoft acess

c) IBM DB2

d) Google

Answer - d

14) which of the following is a function of the DBMS ?

a) Storing data

b) providing multi- users access control

c) data integrity

d) All of the above

Answer - d

15) It is a better to use files than a DBMS when there are ........

a) stringent real - time requirements

b) multiple users wish to access the data

c) complex relationship among data

d) All of the above

Answer – b

16)In the architecture of a database system external level is the ...............

A. physical level

B. logical level

C. conceptual level

D. view level

Ans : view level


17) The ........ is used for creating and destroying table, indexes and other forms of structures.

A. data manipulation language

B. data control language

C. transaction control language

D. data definition language

Ans : data definition language

18) is, a table have more than one set of attributes that could be chosen as the key

A. foreign key

B. integrity key

C. relationship

D. candidate key

Ans : Candidate key

19) A ......... is used to define overall design of the database

A. schema

B. application program

C. data definition language

D. code

Ans : Schema

20) A ........... is a set of column that identifies every row in a table.

A. composite key

B. candidate key

C. foreign key

D. super key

Ans: super key

21) Which type of data can be stored in the database?

a) Image oriented data


b) Text, files containing data

c) Data in the form of audio or video

d) All of the above

Answer: d

22)In which of the following formats data is stored in the database management system?

a) Image

b) Text

c) Table

d) Graph

Answer: c

23)Which of the following is not a type of database?

a) Hierarchical

b) Network

c) Distributed

d) Decentralized

Answer: d

24)What does an RDBMS consist of?

a) Collection of Records

b) Collection of Keys

c) Collection of Tables

d) Collection of Fields

Answer: c

25)The DBMS acts as an interface between ______ and ______ of an enterprise-class system.

a) Data and the DBMS

b) Application and SQL

c) Database application and the database


d) The user and the software

Answer: c

26)What do you mean by one to many relationship between Teacher and Class table?

A.One class may have many teachers

B.One teacher can have many classes

C.Many classes may have many teachers

D.Many teachers may have many classes

Answer : [Option : B]

27)What are the different view to present a Table ?

A.Datasheet View

B.Design View

C.Pivote TableView

D.All Of Above

Answer : C

28)In one-to-many relationship the table on 'many' side is called ___

A.Parent

B.Child

C.Sister

D.Master

Answer : [Option : B]

29)In which state one gathers and list all the necessary fields for the database design project.

A.Data Definition

B.Data Refinement

C.Establishing Relationship

D.None Of The Above

Answer : [Option : A]
30)Which of the following enables us to view data from a table based on a specific criterion

A.Form

B.Query

C.Macro

D.Report

Answer : [Option : B]

31) Which of the following is a feature of DBMS?

a) Minimum Duplication and Redundancy of Data

b) High Level of Security

c) Single-user Access only

d) Support ACID Property

Ans:-C

32) Which of the following is a feature of the database?

a) No-backup for the data stored

b) User interface provided

c) Lack of Authentication

d) Store data in multiple locations

Ans :-B

33) Which of the following is a function of the DBMS?

a) Storing data

b) Providing multi-users access control

c) Data Integrity

d) All of the above

Ans :- D

34) Which of the following is a component of the DBMS?

a) Data
b) Data Languages

c) Data Manager

d) All of the above

Ans:-D

35) A Database Management System is a type of _____software.

a) It is a type of system software

b) It is a kind of application software

c) It is a kind of general software

d) Both A and C

Ans:- A

36) Which of the following can be used to extract or filter the data & information from the data
warehouse?

a) Data redundancy

b) Data recovery tool

c) Data mining

d) Both B and C

Ans:-C

37)______ is a set of one or more attributes taken collectively to uniquely identify a record.

a) Primary Key

b) Foreign key

c) Super key

d) Candidate key

Answer: c

38)The highest level in the hierarchy of data organization is called

a) Data bank

b) Data base

c) Data file
d) Data record

Answer: b

39)The property (or set of properties) that uniquely defines each row in a table is called the:

A. Identifier B. Index

C. Primary key

D. Symmetric key

Answer C. Primary key

40)What is a database?

a) Organized collection of information that cannot be accessed, updated, and managed

b) Collection of data or information without organizing

c) Organized collection of data or information that can be accessed, updated, and managed

d) Organized collection of data that cannot be updated

Answer: c

41)What does an RDBMS consist of?

a) Collection of Records

b) Collection of Keys

c) Collection of Tables

d) Collection of Fields

Answer: c

42)Which of the following schema concept provides different view of relational table to
different user?

1.Physical schema

2.External schema

3.Logical schema

4.Data model

Option 2 : External schema

43)Which symbol denote derived attributes in ER Model?


1.Double ellipse

2.Dashed ellipse

3.Squared ellipse

4.Ellipse with attribute name underlined

Option 2 : Dashed ellipse

44)Which of the following components is not a part of Entity Relationship Diagrams?

1.Ellipse

2.Double rectangle

3.Double lines

4.Hexagons

Option 4 : Hexagons

45) A collection of interrelated records is called a ____.

1.spreadsheet

2. management information system

3.database

4.utility file

Option 3 : database

46) The ER model describes data as

1.entities only

2.entities, relationships and attributes

3. attributes only

4.none of the above

Option 2 : entities, relationships and attributes

47)What are a database management system?

(a) Allows simultaneous access to multiple files


(b) Can do more than one record management system

(c) A file contains a collection of programs for managing data

(d) Both (a) and (b)

Answer: D

48)An attribute of a table cannot contain more than one value____

(a) First normal form (1NF)

(b) Second normal form (2NF)

(c) Third normal form (3NF)

(d) Fourth normal form (4NF)

Answer: A

49)Which of the following is a Data Model?

(a) Entity Relationship model

(b) Relational data model

(c) Object Based data model

(d) All

Answer: D

50) Which command is used in SQL to remove index from database?

(a) DELETE INDEX

(b) DROP INDEX

(c) REMOVE INDEX

(d) ROLL BACK INDEX

Answer: B

51)In hierarchical model, data is organized_____

(a) Logical structure

(b) Physical structure

(c) Tree like structure


(d) None of these

Answer: C

52)What does ‘Double Rectangles’ show in the Entity-Relationship diagram?

(a) Relationship Set

(b) Weak Entity Sets

(c) Derived Attributes

(d) Multi-valued Attributes

Answer: B

53)Database Management System (DBMS) is:

(a) Collection of interrelated data

(b) Collection of programs to access data

(c) Collection of data describing one particular enterprise

(d) All of the above

Answer: D

54)How many types of keys are there in Database Design?

(a) Candidate key

(b) Primary key

(c) Foreign key

(d) All of these

Answer: D

55)What is the name given to database management system which is capable of handling full
text data, image data, audio and video?

(a) Full media

(b) Graphics media

(c) Multimedia

(d) Hypertext

Answer: C
56)Relational model uses some unfamiliar terminology. One tuple is equal to __

(a) record

(b) field

(c) file

(d) data base

Answer: A

57)Which command is used to remove a relation from an SQL?

a) Drop table

b) Delete

c) Purge

d) Remove

Answer: a

58) ______ is a set of one or more attributes taken collectively to uniquely identify a record.

a) Primary Key

b) Foreign key

c) Super key

d) Candidate key

Answer: c

59)Which of the following is the subset of SQL commands used to manipulate Oracle
Structures, including tables?

a) Data Described Language

b) Data Retrieval Language

c) Data Manipulation Language

d) Data Definition Language

Answer: d

60)Which of the following is not the utility of DBMS?

i) Backup ii) Loading iii) Process Organization iv) File organization


a) i, ii, and iv only

b) i, ii and iii only

c) i, iii and iv only

d) All i, ii, iii, and iv

Answer: a

61)Which of the following command is correct to delete the values in the relation teaches?

a) Delete from teaches;

b) Delete from teaches where Id =’Null’;

c) Remove table teaches;

d) Drop table teaches;

Answer: a

62) Procedural language among the following is ____

a) Domain relational calculus

b) Tuple relational calculus

c) Relational algebra

d) Query language

Answer: c

63)Which of the following is not a function of the database?

a) Managing stored data

b) Manipulating data

c) Security for stored data

d) Analysing code

Answer: d

64) Which of the following is a component of the DBMS?

a) Data

b) Data Languages
c) Data Manager

d) All of the above

Answer: d

65)The DBMS acts as an interface between ______ and ______ of an enterprise-class system.

a) Data and the DBMS

b) Application and SQL

c) Database application and the database

d) The user and the software

Answer: c

66)The ability to query data, as well as insert, delete, and alter tuples, is offered by ____

a) TCL (Transaction Control Language)

b) DCL (Data Control Language)

c) DDL (Data Definition Langauge)

d) DML (Data Manipulation Langauge)

Answer: d

67) Procedural language among the following is ____

a) Domain relational calculus

b) Tuple relational calculus

c) Relational algebra

d) Query language

Answer: c

68)What is the full form of DBMS?

a) Data of Binary Management System

b) Database Management System

c) Database Management Service

d) Data Backup Management System


Answer: b

69)What is a database?

a) Organized collection of information that cannot be accessed, updated, and managed

b) Collection of data or information without organizing

c) Organized collection of data or information that can be accessed, updated, and managed

d) Organized collection of data that cannot be updated

Answer: c

70)Which type of data can be stored in the database?

a) Image oriented data

b) Text, files containing data

c) Data in the form of audio or video

d) All of the above

Answer: d

71)Which of the following is not a type of database?

a) Hierarchical

b) Network

c) Distributed

d) Decentralized

Answer: d

72)Which of the following is a feature of DBMS?

a) Minimum Duplication and Redundancy of Data

b) High Level of Security

c) Single-user Access only

d) Support ACID Property

Answer: c
73)In the __________ normal form, a composite attribute is converted to individual attributes.
A. First

B. Second

C. Third

D. Fourth

Answer: A

74) Tables in second normal form (2NF):

A. Eliminate all hidden dependencies

B. Eliminate the possibility of a insertion anomalies

C. Have a composite key

D. Have all non key fields depend on the whole primary key

Answer: A

75) Which-one of the following statements about normal forms is FALSE?

A. BCNF is stricter than 3 NF

B. Lossless, dependency -preserving decomposition into 3 NF is always possible

C. Loss less, dependency – preserving decomposition into BCNF is always possible

D. Any relation with two attributes is BCNF

Answer: C

76)Functional Dependencies are the types of constraints that are based on______

A. Key

B. Key revisited

C. Superset key

D. None of the mentioned

Answer: A

77)Which is a bottom-up approach to database design that design by examining the


relationship between attributes:

A. Functional dependency

B. Database modeling
C. Normalization

D. Decomposition

Answer: C

78) Which forms simplifies and ensures that there are minimal data aggregates and repetitive
groups:

A. 1NF

B. 2NF

C. 3NF

D. All of the mentioned

Answer: C

79) Which forms has a relation that possesses data about an individual entity:

A. 2NF

B. 3NF

C. 4NF

D. 5NF

Answer: C

80) Which forms are based on the concept of functional dependency:

A. 1NF

B. 2NF

C. 3NF sets at

D. 4NF

Answer: C

81) Empdt1(empcode, name, street, city, state, pincode). For any pincode, there is only one
city and state. Also, for given street, city and state, there is just one pincode. In normalization
terms, empdt1 is a relation in

A. 1 NF only

B. 2 NF and hence also in 1 NF


C. 3NF and hence also in 2NF and 1NF

D. BCNF and hence also in 3NF, 2NF and 1NF

Answer: B

82) We can use the following three rules to find logically implied functional dependencies. This
collection of rules is called

A. Axioms

B. Armstrong’s axioms

C. Armstrong

D. Closure

Answer: B

83) Which of the following is not Armstrong’s Axiom?

A. Reflexivity rule

B. Transitivity rule

C. Pseudotransitivity rule

D. Augmentation rule

Answer: C

84) The relation employee(ID,name,street,Credit,street,city,salary) is decomposed into


employee1 (ID, name) employee2 (name, street, city, salary) This type of decomposition is
called

A. Lossless decomposition

B. Lossless-join decomposition

C. All of the mentioned

D. None of the mentioned

Answer: D

85) Inst_dept (ID, name, salary, dept name, building, budget) is decomposed into instructor (ID,
name, dept name, salary) department (dept name, building, budget) This comes under

A. Lossy-join decomposition

B. Lossy decomposition
C. Lossless-join decomposition

D. Both Lossy and Lossy-join decomposition

Answer: D

86)There are two functional dependencies with the same set of attributes on the left side of the
arrow: A->BC A->B This can be combined as

A. A->BC

B. A->B

C. B->C

D. None of the mentioned

Answer: A

87) Consider a relation R(A,B,C,D,E) with the following functional dependencies: ABC -> DE and
D -> AB The number of superkeys of R is:

A. 2

B. 7

C. 10

D. 12

Answer: C

88) Which, if any, of the two queries above will correctly (in SQL2) desired set of employee ID’s?

A. Both I and II

B. I only

C. II only

D. Neither I nor I

Answer: A

89) Suppose now that R(A,B:) and S(A,B:) are two relations with r and s tuples, respectively
(again, not necessarily distinct). If m is the number of (not necessarily distinct) tuples in the
result of the SQL query: R intersect S; Then which of the following is the most restrictive,
correct condition on the value of m?

A. m = min(r,s)
B. 0 <= m <= r + s

C. min(r,s) <= m <= max(r,s)

D. 0 <= m <= min(r,s)

Answer: D

90)Which of the following is not a key? A. A B. E C. B, C D. D Answer: C 19. If a relation is in


BCNF, then it is also in

A. 1 NF B. 2 NF C. 3 NF D. All of the above

Answer: D

91) What action does ? operator perform in relational algebra

A. Output specified attributes from all rows of the input relation and remove duplicate tuples
from the output

B. Outputs pairs of rows from the two input relations that have the same value on all attributes
that have the same name

C. Output all pairs of rows from the two input relations (regardless of whether or not they have
the same values on common attributes)

D. Return rows of the input relation that satisfy the predicate

Answer: A

92) Statement 1: A tuple is a row in a relation

Statement 2: Existence of multiple foreign keys in a same relation is possible

A. Both the statements are true

B. Statement 1 is correct but Statement 2 is false

C. Statement 1 is false but Statement 2 is correct

D. Both the statements are false

Answer: A

93) The____condition allows a general predicate over the relations being joined.

A. On B. Using C. Set D. Where

Answer: A

94) Which of the join operations do not preserve non matched tuples?
A. Left outer join

B. Right outer join

C. Inner join

D. Natural join

Answer: B

95)The normal form which satisfies multivalued dependencies and which is in BCNF is

A. 4 NF B. 3 NF C. 2 NF D. All of the mentioned

Answer: A

96) Which of the following is a tuple-generating dependencies?

A. Functional dependency B. Equality-generating dependencies

C. Multivalued dependencies D. Non-functional dependency

Answer: B

1. Collections of operations that form a single logical unit of work are called __________
a) Views
b) Networks
c) Units
d) Transactions

Answer: d
Explanation: Collections of operations that form a single logical unit of work are called
transactions. A database system must ensure proper execution of transactions.

2. The “all-or-none” property is commonly referred to as _________


a) Isolation
b) Durability
c) Atomicity
d) None of the mentioned

Answer: c
Explanation: The all or none policy is commonly referred to as atomicity. It ensures that a
work is either completed or not completed and there are no intermediate stages.

3. Which of the following is a property of transactions?


a) Atomicity
b) Durability
c) Isolation
d) All of the mentioned
Answer: d
Explanation: Atomicity, Durability and Isolation are all properties of transactions.

4. Execution of translation in isolation preserves the _________ of a database


a) Atomicity
b) Consistency
c) Durability
d) All of the mentioned

Answer: b
Explanation: Execution of translation in isolation preserves the consistency of a database. It
ensures that no other transaction is running concurrently.

5. Which of the following is not a property of a transaction?


a) Atomicity
b) Simplicity
c) Isolation
d) Durability

Answer: b
Explanation: Simplicity is not a property of a transaction. Atomicity, Isolation, Durability are
all parts of ACID properties.

6. Which of the following systems is responsible for ensuring durability?


a) Recovery system
b) Atomic system
c) Concurrency control system
d) Compiler system

Answer: a
Explanation: The recovery system is responsible for the maintenance of durability. In
addition, it also ensures atomicity.
7. Which of the following systems is responsible for ensuring isolation?
a) Recovery system
b) Atomic system
c) Concurrency control system
d) Compiler system

Answer: c
Explanation: The concurrency control system is responsible for ensuring isolation in a
database system.
8. State true or false: Information residing in the volatile storage does not usually survive
system crashes
a) True
b) False
Answer: a
Explanation: Information residing in the volatile storage does not usually survive system
crashes but the information in stable storage can survive system crashes efficiently.

9. A transaction that has not been completed successfully is called as _______


a) Compensating transaction
b) Aborted transaction
c) Active transaction
d) Partially committed transaction

Answer: b
Explanation: Aborted transaction is a state after the transaction has been rolled back and
the database has been restored to the state prior to the transaction.

10. Which of the following is not a transaction state?


a) Active
b) Partially committed
c) Failed
d) Compensated

Answer: d
Explanation: Compensated is not a transaction state. But active, partially committed and
failed are different states of a transaction.

11. The execution sequences in concurrency control are termed as ________


a) Serials
b) Schedules
c) Organizations
d) Time tables

Answer: b
Explanation: The execution sequences in concurrency control are known as schedules.
12. The scheme that controls the interaction between executing transactions is called as
_____
a) Concurrency control scheme
b) Multiprogramming scheme
c) Serialization scheme
d) Schedule scheme

Answer: a
Explanation: The scheme that controls the interaction between executing transactions is
called as concurrency control scheme.
This set of RDBMS Question Bank focuses on “Transaction Isolation Levels”.

1. Which of the following is a transaction isolation level as specified by SQL standard?


a) Serializable
b) Repeatable read
c) Read committed
d) All of the mentioned

Answer: a
Explanation: Serializable, repeatable read, read committed and read uncommitted are the
four levels of transactions.

2. State true or false: Serializable level may allow both serializable and non-serializable
executions
a) True
b) False

Answer: a
Explanation: Serializable level generally allows only serializable executions but in some
special cases, it may also allow non-serializable execution.

3. ________ allows only committed data to be read and further requires that no other
transaction is allowed to update it between two reads of a data item by a transaction.
a) Read uncommitted
b) Serializable
c) Repeatable read
d) Read committed

Answer: c
Explanation: Repeatable read allows only committed data to be read and further requires
that no other transaction is allowed to update it between two reads of a data item by a
transaction. However, the transaction may not be serializable with respect to other
transactions.

4. ________ allows only committed data to be read, but does not require repeatable reads
a) Read uncommitted
b) Serializable
c) Repeatable read
d) Read committed

Answer: d
Explanation: Read committed allows only committed data to be read, but does not require
repeatable reads. For instance, between two reads of a data item by the transaction,
another transaction may have updated the data item and committed.

5. ___________ allows uncommitted data to be read


a) Read uncommitted
b) Serializable
c) Repeatable read
d) Read committed

Answer: a
Explanation: Real uncommitted allows uncommitted data to be read. It is the lowest
isolation level allowed by SQL.
6. State true or false: All the isolation levels disallow dirty writes
a) True
b) False

Answer: a
Explanation: All the isolation levels above additionally disallow dirty writes, that is, they
Disallow writes to a data item that has already been written by another transaction that has
not yet committed or aborted.

7. When is a timestamp allotted


a) When execution begins
b) When execution is taking place
c) When execution is completed
d) None of the mentioned

Answer: a
Explanation: Timestamp is allotted when execution of a transaction begins.

8. In ___________ isolation each transaction is given its own version of the database
a) Timestamp
b) Snapshot
c) Lock based
d) All of the mentioned

Answer: b
Explanation: In snapshot isolation, each transaction is given its own version or snapshot of
the database on which it can operate.

9. What is the disadvantage of locking?


a) Does not control concurrency
b) Is not atomic
c) Is not durable
d) Has a poor degree of concurrency

Answer: Locking has a poor degree of concurrency. It in fact has no concurrency at all.

What is a view?
a) An brief description of the schema diagram.
b) A relation that is not a part of the schema but is a virtual relation
c) Any relation that is a part of the schema
d) A relation that is a part of the schema but which needs to be specified in every operation
made on that particular relation.

Answer: b
Explanation: A relation that is not a part of the schema but is a virtual relation is called as
view. Views improve writability as viewing the entire logical model is not feasible.

2. What is the command used to define view in SQL?


a) define view
b) new view
c) create view
d) none of the mentioned

Answer: c
Explanation: We use the create view command to define a view in SQL.
3. create view studentdet
select ID, address, name
from student;

What is the result of the above query?


a) It creates a view named studentdet with 3 attributes
b) It creates a view named studentdet with 1 attribute
c) It creates a view named ID with 2 attributes
d) It is syntactically wrong and does not give a result

Answer: d
Explanation: immediately after specifying the name of the view, we have to write the “as”
keyword. So this query does not give any result as it is syntactically incorrect.
4. State true or false: One view can be used in the expression defining another view
a) True
b) False

Answer: a
Explanation: One view can be used to define another view in its expression. This further
improves the writability of the code as we are reducing the entire logical model.

5. If the actual relations used in the view definition change, the view is updated immediately.
Such views are called _________
a) Instant views
b) Instantaneous views
c) Materialistic views
d) Materialized views

Answer: d
Explanation: If the actual relations used in the view definition change, the view is updated
immediately. Such views are called Materialized views. Materialized views help to keep the
database up-to-date.

6. The process of maintaining views up to date is called _________


a) View maintenance
b) View updating
c) View materialization
d) View isolation

Answer: a
Explanation: The process of maintaining views up to date is called View maintenance. View
maintenance can be done immediately when any of the views is updated.
7. How can we insert data into a view?
a) insert into ();
b) create data values ();
c) enter ();
d) insert into values ();

Answer: d
Explanation: We can insert data into a view using the inset into values (); statement. This
operation can be done only if the view is updatable.
8. State true or false: We can update a view if it has multiple database relations in the from
clause
a) True
b) False

Answer: b
Explanation: We can update a view only if it has a single database relation in the “from”
clause.
9. The _______ statement makes the updates performed by the transaction permanent.
a) Finalize work
b) Finish work
c) Commit work
d) None of the mentioned

Answer: c
Explanation: The Commit work statement makes the updates performed by the transaction
permanent. After a transaction is committed, a new transaction is automatically started.

10. The _______ statement causes the statements to undo all the updates performed on
the transaction
a) Undo work
b) Rollback work
c) Commit work
d) Replace work

Answer: b
Explanation: The Rollback work statement causes the statements to undo all the updates
performed on the transaction. The database is then restored to the state of what it was
before the first statement of the transaction was executed.

1.The activity of choosing an efficient execution strategy for processing a


query is called as
a) Query execution
b) Query optimization
c) Query plan evaluation
d) Query parsing

Answer: (b) Query optimization

Query optimization is a process of choosing the cheapest and efficient of several equivalent
query execution plans by using the statistics about data. A query typically has many possible
execution strategies, and the process of choosing a suitable one for processing a query is known
as query optimization.

Why do we need to optimize the query?

As there are many equivalent transformations of the same high-level query, the aim of query
optimization is to choose the one that minimizes resource usage.

Need more clarity? Please read further.

A query which is written by the user may not be the efficient one. Also, the query written by
the user can be transformed into several equivalent (each one producing the same result)
expressions (queries).

The cost of processing each of these equivalent expressions is different. One may be costly and
the other may be cheap.

We do not expect users to write their queries so that they can be processed efficiently. Rather,
we expect the system to construct a query-evaluation plan that minimizes the cost of query
evaluation. This is where query optimization comes into play.

Query optimization is the process of selecting the most efficient query-evaluation plan from
among the many strategies usually possible for processing a given query, especially if the
query is complex.

Timestamp ordering protocol is said to be free from deadlock because of


this reason.
a) It is cascade free
b) It guarantees serializability
c) No transaction is made to wait
d) Every write operation updates the W-timestamp of the data item
Answer: (c) No transaction is made to wait

In timestamp ordering protocol, a transaction is either permitted to execute the operation or


rolled back. No transaction is made to wait for some other transaction. A transaction is
permitted to execute in all the following cases and rolled back otherwise;

A transaction T that tries to execute read(Q) operation will be permitted if and only if the
timestamp(T) >= W-timestamp(Q). That is, T is permitted to execute if it is started after a
successful write on Q by some transactions.

A transaction T that tries to execute write(Q) operation will be permitted if the timestamp(T)
is greater than both the R-timestamp(Q) and W-timestamp(Q). That is, T is permitted to write
a data item which was read/write by older transactions.

If a transaction is allowed to read a data item that was produced by an


uncommitted transaction, what do we call this read?
a) Repeatable read
b) Phantom read
c) Dirty read
d) Conflict read

Answer: (c) Dirty read

Reading the value of a data item that was produced by an uncommitted transaction is referred
as dirty read problem. This will be avoided if we permit transactions to read the values that
are produced by committed transactions.

Possible problems with dirty read in database

• It may result in non-recoverable schedule. This is possible if a transaction T1 consumes


the data written by T2 but commits before T2, and T2 decided to rollback.
• It may lead to cascading rollback. This situation is possible if a transaction T3
consumes the data written by T2 which in turn read the data from another transaction T1, and
T1 decided to rollback.
• A dirt read can cause duplicate rows to be returned where none exist. alternatively, a
dirty read can cause no rows to be returned when one (or more) exists. In some cases, dirty
reads can return data that was never in the database at all (eg. rolled back before commit).
How you may avoid dirty read?

You can set the TRANSACTION ISOLATION LEVEL as READ COMMITTED. This specifies
that the statements cannot read data that has been modified but not committed by other
transaction. This prevents dirty reads.

Consider the transaction T1 as given below; T1 enters into which of the


following states if there is a system crash after the instruction 5?
T1

1 Begin_transaction

2 Read(A)

3 A:=A-500;

4 Write(A);

5 Read(B)

6 B:=B+500;

7 Write(B);

8 Commit;

a) Partially committed
b) Committed
c) Aborted
d) Failed

Answer: (d) Failed

A transaction enters into FAILED state if the transaction cannot be committed or the
transaction is aborted while in the ACTIVE state, perhaps due to the user aborting the
transaction or as a result of system failures (system crash, transaction errors, disk failures
etc.) or as a result of the concurrency control protocol aborting the transaction to ensure
serializability.

The transaction at FAILED state is rolled back to undo the changes made to the data
items and ABORTED.

Transaction states

Active - if a transaction starts its execution it is said to be in active state

Partially committed - if a transaction successfully executed it last statement

Committed - if a transaction successfully executed commit statement.

Failed - if a transaction is not able to proceed for various reasons (refer above)

Aborted - if a transaction reached a failed state, then it will be aborted.

1. Consider the transaction T1 as given below; T1 enters from which of the


transaction states into which other state if there is a failure after executing
the instruction 7?
T1

1 Begin_transaction

2 Read(A)

3 A:=A-500;

4 Write(A);

5 Read(B)

6 B:=B+500;

7 Write(B);

8 Commit;
a) Active, Partially committed
b) Partially committed, Committed
c) Active, Failed
d) Partially committed, Failed

Answer: (d) Partially committed, Failed

A transaction is said to be in PARTIALLY COMMITTED state if it has successfully executed


all the instructions in it.

At this point, it may be found that the transaction has stopped due to system failure and any
updates made to the data items by the transaction may not have been safely recorded on
secondary storage. Or the transaction might have violated serializability or an integrity
constraint and the transaction has to be aborted. In such cases, the transaction would go into
the FAILED state.

The transaction at FAILED state is rolled back to undo the changes made to the data items
and ABORTED.

Transaction states

Active - if a transaction starts its execution it is said to be in active state

Partially committed - if a transaction successfully executed it last statement

Committed - if a transaction successfully executed commit statement.

Failed - if a transaction is not able to proceed for various reasons (refer above)

Aborted - if a transaction reached a failed state, then it will be aborted.

Transaction-processing systems usually allow multiple transactions to run


concurrently. Which of the following best suits as the advantage(s) of
allowing concurrent execution of transactions?
a) Improved transaction throughput
b) Reduced execution complexity
c) Serializability
d) Reduced waiting time

Answer: (a) Improved transaction throughput and (d) Reduced waiting time

Improved transaction throughput - Permitting multiple transactions to execute in parallel


will increase the number of transaction executed. The parallelism of the CPU and the IO
system can be used to handle concurrent execution of transactions.

Reduced waiting time – the short transaction need not wait for the longer ones to complete if
they are permitted to execute concurrently.

Concurrent execution reduces the unpredictable delays in running transactions. Moreover, it


also reduces the average response time: the average time for a transaction to be completed after
it has been submitted.

How would we improve the transaction throughput?

By permitting multiple transactions to work in parallel.

What is transaction throughput?

Number of transactions executed per second

How do we reduce waiting time of smaller transactions?

When we permit multiple transactions to work simultaneously, smaller transactions need not
wait for the longer one to finish. [Smaller transactions may have to wait for longer one to
finish if we permit them to execute serially, ie, one after the other]

To ensure integrity of the data, a database system should ensure transactions


to possess certain properties. The property which make sure that the partial
effects of incomplete transactions should not visible to the other transactions
is called
a) Atomicity
b) Consistency
c) Isolation
d) Durability

Answer: (c) Isolation


Isolation property is one of ACID properties that a transaction should possess. It
ensures that the changed made by a transaction should not be visible to other
concurrent transactions. It means that the data used during the execution of a
transaction cannot be used by a second transaction until the first one is completed.

ACID properties are the desirable properties that any transaction should possess in a
relational database management system. These properties help in safeguarding the
integrity of the data.

ACID properties should be enforced by concurrency control methodologies.

To ensure integrity of the data, a database system should ensure transactions


to possess certain properties. The property that makes sure that “either all
instructions executed successfully or none of them are” is called
a) Atomicity
b) Consistency
c) Isolation
d) Durability

Answer: (a) Atomicity

While executing a transaction, the most desirable property is to execute all the instructions of
the given transaction or execute none (if executed few, roll them back). This property helps to
avoid inconsistencies caused by an incomplete transaction. Atomicity is the property which
ensures this.

ACID properties are the desirable properties that any transaction should possess in a
relational database management system. These properties help in safeguarding the integrity
of the data.

ACID properties should be enforced by concurrency control methodologies.

Which of the following concurrency control protocol can avoid cascading


rollback?
a) Simple 2 Phase Locking protocol
b) Strict 2 Phase Locking protocol
c) Rigorous 2 Phase Locking protocol
d) Timestamp ordering protocol
Answer: (b) Strict 2 Phase Locking protocol and (c) Rigorous 2 Phase Locking protocol

Transactions that use either strict or rigorous 2PL protocols delay releasing the EXCLUSIVE
locks on their data items until the transaction commits. Hence, other
concurrent transactions cannot consume the data items that were modified by
the transactions under strict or rigorous 2PL until the later release the locks.

What is cascading rollback and how is it caused?

If a transaction consumes the data item that was written by an uncommitted


transaction, it may lead to cascading rollback, in case if the uncommitted transaction
is decided to abort.

Example: Suppose T1 and T2 are two concurrent transactions. If T1 writes a data item A and
T1 not yet committed. Now, T2 reads the value of A which was just modified by T1. This is
uncommitted read / dirty read. At this time, if for some reason T1 decides to rollback or abort.
This forces T2 to rollback because, T2 used the data produced by T1.

1. Consider the transactions T1 and T2 that are executing concurrently as


given below. Which of the following isolation levels can permit such
concurrently executing interleaved transactions to proceed?

T1 T2

Begin_transaction

Begin_transaction

Read(A)

Read(A)

Read(B)

Read(B)
Commit;

Commit;

a) Serializable
b) Repeatable read
c) Read committed
d) All of the above

Answer: (d) All of the above

The given schedule consists of transactions that are read-only. Hence, the above sequence of
operations can occur at all levels of isolation since the transactions only read data without
writing.

If all transactions are read-only transactions in a schedule, then that schedule is a


serializable schedule.

What is dirty read?

Dirty read is the one where a transaction consumes a data item that was updated by
another ongoing not-yet-committed transaction. In this question, no WRITE
operation is involved.

In the question, the schedule does not have any WRITE operations. So, dirty reads are not
possible. For this reason, SERIALIZABLE, REPEATABLE READ and READ COMMITTED
isolation levels permit the given schedule.

1. In order to maintain transactional integrity and database consistency, what technology


does a DBMS deploy?
a) Triggers
b) Pointers
c) Locks
d) Cursors
View Answer
Answer: c
Explanation: Locks are used to maintain database consistency.

2. A lock that allows concurrent transactions to access different rows of the same table is
known as a
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock
View Answer
Answer: d
Explanation: Locks are used to maintain database consistency.

3. Which of the following are introduced to reduce the overheads caused by the log-based
recovery?
a) Checkpoints
b) Indices
c) Deadlocks
d) Locks
View Answer
Answer: a
Explanation: Checkpoints are introduced to reduce overheads caused by the log-based
recovery.
4. Which of the following protocols ensures conflict serializability and safety from
deadlocks?
a) Two-phase locking protocol
b) Time-stamp ordering protocol
c) Graph based protocol
d) None of the mentioned
View Answer
Answer: b
Explanation: Time-stamp ordering protocol ensures conflict serializability and safety from
deadlocks.

5. Which of the following is the block that is not permitted to be written back to the disk?
a) Dead code
b) Read only
c) Pinned
d) Zapped
View Answer
Answer: c
Explanation: A block that is not permitted to be written back to the disk is called pinned.

6. If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an -
__________ on all the records belonging to that file.
a) Explicit lock in exclusive mode
b) Implicit lock in shared mode
c) Explicit lock in shared mode
d) Implicit lock in exclusive mode
View Answer
Answer: d
Explanation: If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it
has an implicit lock in exclusive mode on all the records belonging to that file.
7. Which refers to a property of computer to run several operation simultaneously and
possible as computers await response of each other
a) Concurrency
b) Deadlock
c) Backup
d) Recovery
View Answer
Answer: a
Explanation: Concurrency is a property of systems in which several computations are
executing simultaneously, and potentially interacting with each other.

8. All lock information is managed by a __________ which is responsible for assigning and
policing the locks used by the transactions.
a) Scheduler
b) DBMS
c) Lock manager
d) Locking agent
View Answer
Answer: c
Explanation: A distributed lock manager (DLM) provides distributed software applications
with a means to synchronize their accesses to shared resources.

9. The ____ lock allows concurrent transactions to access the same row as long as they
require the use of different fields within that row.
a) Table-level
b) Page-level
c) Row-level
d) Field-level
View Answer
Answer: d
Explanation: Lock is limited to the attributes of the relation.
10. Which of the following is a procedure for acquiring the necessary locks for a transaction
where all necessary locks are acquired before any are released?
a) Record controller
b) Exclusive lock
c) Authorization rule
d) Two phase lock
View Answer
Answer: d
Explanation: Two-phase lock is a procedure for acquiring the necessary locks for a
transaction where all necessary locks are acquired before any are released.

. A system is in a ______ state if there exists a set of transactions such that every
transaction in the set is waiting for another transaction in the set.
a) Idle
b) Waiting
c) Deadlock
d) Ready
View Answer
Answer: c
Explanation: When one data item is waiting for another data item in a transaction then
system is in deadlock.

2. The deadlock state can be changed back to stable state by using _____________
statement.
a) Commit
b) Rollback
c) Savepoint
d) Deadlock
View Answer
Answer: b
Explanation: Rollback is used to rollback to the point before lock is obtained.

3. What are the ways of dealing with deadlock?


a) Deadlock prevention
b) Deadlock recovery
c) Deadlock detection
d) All of the mentioned
View Answer
Answer: d
Explanation: Deadlock prevention is also called as deadlock recovery. Prevention is
commonly used if the probability that the system would enter a deadlock state is relatively
high; otherwise, detection and recovery are more efficient.

Note: Join free Sanfoundry classes at Telegram or Youtube


advertisement

4. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if
it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled
back (dies). This is
a) Wait-die
b) Wait-wound
c) Wound-wait
d) Wait
View Answer
Answer: a
Explanation: The wait–die scheme is a non-preemptive technique.

5. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if
it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is
rolled back (Tj is wounded by Ti). This is
a) Wait-die
b) Wait-wound
c) Wound-wait
d) Wait
View Answer
Answer: c
Explanation: The wound–wait scheme is a preemptive technique. It is a counterpart to the
wait–die scheme.

Take Database Management System Mock Tests - Chapterwise!


Start the Test Now: Chapter 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

6. The situation where the lock waits only for a specified amount of time for another lock to
be released is
a) Lock timeout
b) Wait-wound
c) Timeout
d) Wait
View Answer
Answer: a
Explanation: The timeout scheme is particularly easy to implement, and works well if
transactions are short and if longwaits are likely to be due to deadlocks.
7. The deadlock in a set of a transaction can be determined by
a) Read-only graph
b) Wait graph
c) Wait-for graph
d) All of the mentioned
View Answer
Answer: a
Explanation: Each transaction involved in the cycle is said to be deadlocked.

8. A deadlock exists in the system if and only if the wait-for graph contains a ___________
a) Cycle
b) Direction
c) Bi-direction
d) Rotation
View Answer
Answer: a
Explanation: Each transaction involved in the cycle is said to be deadlocked.
9. Selecting the victim to be rollbacked to the previous state is determined by the minimum
cost. The factors determining cost of rollback is
a) How long the transaction has computed, and how much longer the transaction will
compute before it completes its designated task
b) How many data items the transaction has used
c) How many more data items the transaction needs for it to complete
d) All of the mentioned
View Answer
Answer: d
Explanation: We should roll back those transactions that will incur the minimum cost.
10. __________ rollback requires the system to maintain additional information about the
state of all the running transactions.
a) Total
b) Partial
c) Time
d) Commit
View Answer
Answer: b
Explanation: In total rollback abort the transaction and then restart it.

1. In a granularity hierarchy the highest level represents the


a) Entire database
b) Area
c) File
d) Record
View Answer
Answer: a
Explanation: This level is the root of the tree.

2. In a database the file is contained in ________


a) Entire database
b) Two area
c) One area
d) more than one area
View Answer
Answer: c
Explanation: This level is below the root of the tree.

3. If a node is locked in an intention mode, explicit locking is done at a lower level of the
tree. This is called
a) Intention lock modes
b) Explicit lock
c) Implicit lock
d) Exclusive lock
View Answer
Answer: a
Explanation: There is an intention mode associated with shared mode, and there is one with
an exclusive mode.

Subscribe Now: DBMS Newsletter | Important Subjects Newsletters


advertisement

4. If a node is locked in __________ explicit locking is being done at a lower level of the
tree, but with only shared-mode locks.
a) Intention lock modes
b) Intention-shared-exclusive mode
c) Intention-exclusive (IX) mode
d) Intention-shared (IS) mode
View Answer
Answer: a
Explanation: There is an intention mode associated with shared mode, and there is one with
an exclusive mode.
5. If a node is locked in ____________ then explicit locking is being done at a lower level,
with exclusive-mode or shared-mode locks.
a) Intention lock modes
b) Intention-shared-exclusive mode
c) Intention-exclusive (IX) mode
d) Intention-shared (IS) mode
View Answer
Answer: c
Explanation: There is an intention mode associated with shared mode, and there is one with
an exclusive mode.

Get Free Certificate of Merit in Database Management System Now!

6. If a node is locked in ______________ the subtree rooted by that node is locked explicitly
in shared mode, and that explicit locking is being done at a lower level with exclusive-mode
locks.
a) Intention lock modes
b) shared and intention-exclusive (SIX) mode
c) Intention-exclusive (IX) mode
d) Intention-shared (IS) mode
View Answer
Answer: b
Explanation: There is an intention mode associated with shared mode, and there is one with
an exclusive mode.

7. ____________ denotes the largest timestamp of any transaction that executed write(Q)
successfully.
a) W-timestamp(Q)
b) R-timestamp(Q)
c) RW-timestamp(Q)
d) WR-timestamp(Q)
View Answer
Answer: a
Explanation: The most common method for doing ordering transaction is to use a
timestamp-ordering scheme.
8. The _____________ ensures that any conflicting read and write operations are executed
in timestamp order.
a) Timestamp-ordering protocol
b) Timestamp protocol
c) W-timestamp
d) R-timestamp
View Answer
Answer: a
Explanation: The most common method for doing ordering transaction is to use a
timestamp-ordering scheme.

9. The __________ requires that each transaction Ti executes in two or three different
phases in its lifetime, depending on whether it is a read-only or an update transaction.
a) Validation protocol
b) Validation-based protocol
c) Timestamp protocol
d) Timestamp-ordering protocol
View Answer
Answer: a
Explanation: A concurrency-control scheme imposes the overhead of code execution and
possible delay of transactions. It may be better to use an alternative scheme that imposes
less overhead.

10. This validation scheme is called the _________ scheme since transactions execute
optimistically, assuming they will be able to finish execution and validate at the end.
a) Validation protocol
b) Validation-based protocol
c) Timestamp protocol
d) Optimistic concurrency-control
View Answer
Answer: a
Explanation: A concurrency-control scheme imposes the overhead of code execution and
possible delay of transactions. It may be better to use an alternative scheme that imposes
less overhead.

. The most recent version of standard SQL prescribed by the American National Standards
Institute is
a) SQL 2016
b) SQL 2002
c) SQL – 4
d) SQL2
View Answer
Answer: a
Explanation: SQL-2016 is the most recent version of standard SQL prescribed by the ANSI.
2. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE
clause. A special operator used to check whether an attribute value is null is
a) BETWEEN
b) IS NULL
c) LIKE
d) IN
View Answer
Answer: b
Explanation: Exists is used to check whether an attribute value is null or not in conjunction
with the where clause.

3. A lock that prevents the use of any tables in the database from one transaction while
another transaction is being processed is called a
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock
View Answer
Answer: a
Explanation: Data base-level lock prevents the use of any tables in the data base from one
transaction while another transaction is being processed.

Subscribe Now: DBMS Newsletter | Important Subjects Newsletters


advertisement

4. A condition that occurs when two transactions wait for each other to unlock data is known
as a(n)
a) Shared lock
b) Exclusive lock
c) Binary lock
d) Deadlock
View Answer
Answer: d
Explanation: Deadlock occurs when two transactions wait for each other to unlock data.

5. _______ means that data used during the execution of a transaction cannot be used by a
second transaction until the first one is completed.
a) Serializability
b) Atomicity
c) Isolation
d) Time stamping
View Answer
Answer: c
Explanation: Isolation means that data used during the execution of a transaction can’t be
used by a second transaction until the first one is completed.

Become Top Ranker in Database Management System Now!


6. A unit of storage that can store one or more records in a hash file organization is denoted
as
a) Buckets
b) Disk pages
c) Blocks
d) Nodes
View Answer
Answer: a
Explanation: Buckets are used to store one or more records in a hash file organization.

7. The file organization which allows us to read records that would satisfy the join condition
by using one block read is
a) Heap file organization
b) Sequential file organization
c) Clustering file organization
d) Hash files organization
View Answer
Answer: c
Explanation: Clustering file organization allows us to read records that would satisfy the join
condition by using one block read.

8. Which of the following is not true about B+ trees?


a) B+ tree index takes the form of balanced tree
b) Performance of B+ tree degrades as the file grows
c) Look-up in B+ tree is straightforward and efficient
d) Insertion and deletion in B+ tree is complicated but efficient
View Answer
Answer: b
Explanation: The answer is evident.

9. The extent of the database resource that is included with each lock is called the level of
a) Impact
b) Granularity
c) Management
d) DBMS control
View Answer
Answer: b
Explanation: The extent of the data base resource that is included with each lock is called
the level of Granularity.

10. DBMS periodically suspends all processing and synchronizes its files and journals
through the use of
a) Checkpoint facility
b) Backup facility
c) Recovery manager
d) Database change log
View Answer
Answer: a
Explanation: DBMS periodically suspends all processing and synchronizes its files and
journals through the use of Check point facility.

1. The recovery scheme must also provide


a) High availability
b) Low availability
c) High reliability
d) High durability
View Answer
Answer: a
Explanation: It must minimize the time for which the database is not usable after a failure.
2. Which one of the following is a failure to a system
a) Boot crash
b) Read failure
c) Transaction failure
d) All of the mentioned
View Answer
Answer: c
Explanation: Types of system failure are transaction failure, system crash and disk failure.

3. Which of the following belongs to transaction failure


a) Read error
b) Boot error
c) Logical error
d) All of the mentioned
View Answer
Answer: c
Explanation: Types of system transaction failure are logical and system error.

Note: Join free Sanfoundry classes at Telegram or Youtube


advertisement

4. The system has entered an undesirable state (for example, deadlock), as a result of
which a transaction cannot continue with its normal execution. This is
a) Read error
b) Boot error
c) Logical error
d) System error
View Answer
Answer: c
Explanation: The transaction, can be re-executed at a later time.

5. The transaction can no longer continue with its normal execution because of some
internal condition, such as bad input, data not found, overflow, or resource limit exceeded.
This is
a) Read error
b) Boot error
c) Logical error
d) System error
View Answer
Answer: c
Explanation: The transaction, can be re-executed at a later time.

Take Database Management System Tests Now!

6. The assumption that hardware errors and bugs in the software bring the system to a halt,
but do not corrupt the nonvolatile storage contents, is known as the
a) Stop assumption
b) Fail assumption
c) Halt assumption
d) Fail-stop assumption
View Answer
Answer: d
Explanation: Well-designed systems have numerous internal checks, at the hardware and
the software level, that bring the system to a halt when there is an error. Hence, the fail-stop
assumption is a reasonable one.
7. Which kind of failure loses its data in head crash or failure during a transfer operation.
a) Transaction failure
b) System crash
c) Disk failure
d) All of the mentioned
View Answer
Answer: c
Explanation: Copies of the data on other disks, or archival backups on tertiary media, such
as DVD or tapes, are used to recover from the failure.

8. The failure occurred sufficiently early during the transfer that the destination block
remains intact.
a) Partial Failure
b) Total failure
c) Successful completion
d) Data transfer failure
View Answer
Answer: a
Explanation: Copies of the data on other disks, or archival backups on tertiary media, such
as DVD or tapes, are used to recover from the failure.
9. The database is partitioned into fixed-length storage units called
a) Parts
b) Blocks
c) Reads
d) Build
View Answer
Answer: b
Explanation: Blocks are the units of data transfer to and from disk, and may contain several
data items.
10. Which of the following causes system to crash
a) Bug in software
b) Loss of volatile data
c) Hardware malfunction
d) All of the mentioned
View Answer
Answer: d
Explanation: The content of non-volatile storage remains intact, and is not corrupted.
1. The log is a sequence of _________ recording all the update activities in the database.
a) Log records
b) Records
c) Entries
d) Redo
View Answer
Answer: a
Explanation: The most widely used structure for recording database modifications is the log.
2. In the ___________ scheme, a transaction that wants to update the database first
creates a complete copy of the database.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
View Answer
Answer: a
Explanation: If at any point the transaction has to be aborted, the system merely deletes the
new copy. The old copy of the database has not been affected.

3. The ____________ scheme uses a page table containing pointers to all pages; the page
table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
View Answer
Answer: b
Explanation: Any page which is not updated by a transaction is not copied, but instead the
new page table just stores a pointer to the original page.

Subscribe Now: DBMS Newsletter | Important Subjects Newsletters


advertisement

4. The current copy of the database is identified by a pointer, called ____________ which is
stored on disk.
a) Db-pointer
b) Update log
c) Update log records
d) All of the mentioned
View Answer
Answer: a
Explanation: Any page which is not updated by a transaction is not copied, but instead the
new page table just stores a pointer to the original page.
5. If a transaction does not modify the database until it has committed, it is said to use the
___________ technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
Answer: a
Explanation: Deferred modification has the overhead that transactions need to make local
copies of all updated data items; further, if a transaction reads a data item that it has
updated, it must read the value from its local copy.

Get Free Certificate of Merit in Database Management System Now!


6. If database modifications occur while the transaction is still active, the transaction is said
to use the ___________technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
Answer: c
Explanation: We say a transaction modifies the database if it performs an update on a disk
buffer, or on the disk itself; updates to the private part of main memory do not count as
database modifications.

7. ____________ using a log record sets the data item specified in the log record to the old
value.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
Answer: d
Explanation: Undo brings the previous contents.

8. In the __________ phase, the system replays updates of all transactions by scanning the
log forward from the last checkpoint.
a) Repeating
b) Redo
c) Replay
d) Undo
View Answer
Answer: b
Explanation: Undo brings the previous contents.
9. The actions which are played in the order while recording it is called ______________
history.
a) Repeating
b) Redo
c) Replay
d) Undo
View Answer
Answer: a
Explanation: Undo brings the previous contents.

10. A special redo-only log record < Ti, Xj, V1> is written to the log, where V1 is the value
being restored to data item Xj during the rollback. These log records are sometimes called
a) Log records
b) Records
c) Compensation log records
d) Compensation redo records
View Answer
Answer: c
Explanation: Such records do not need undo information since we never need to undo such
an undo operation.

In order to reduce the overhead in retrieving the records from the storage space we use
a) Logs
b) Log buffer
c) Medieval space
d) Lower records
View Answer

Answer: b
Explanation: The output to stable storage is in units of blocks.

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on
“Buffer Management”.

1. In order to reduce the overhead in retrieving the records from the storage space we
use
a) Logs
b) Log buffer
c) Medieval space
d) Lower records
View Answer

Answer: b
Explanation: The output to stable storage is in units of blocks.

2. The order of log records in the stable storage ____________ as the order in which
they were written to the log buffer.
a) Must be exactly the same
b) Can be different
c) Is opposite
d) Can be partially same
View Answer

Answer: a
Explanation: As a result of log buffering, a log record may reside in only main
memory (volatile storage) for a considerable time before it is output to stable
storage.

3. Before a block of data in main memory can be output to the database, all log
records pertaining to data in that block must have been output to stable storage. This is
a) Read-write logging
b) Read-ahead logging
c) Write-ahead logging
d) None of the mentioned
View Answer

Answer: c
Explanation: The WAL rule requires only that the undo information in the log has
been output to stable storage, and it permits the redo information to be written
later.

4. Writing the buffered log to __________ is sometimes referred to as a log force.


a) Memory
b) Backup
c) Redo memory
d) Disk
View Answer

Answer: d
Explanation: If there are insufficient log records to fill the block, all log records in
main memory are combined into a partially full block and are output to stable
storage.

5. The _______________ policy, allows a transaction to commit even if it has


modified some blocks that have not yet been written back to disk.
a) Force
b) No-force
c) Steal
d) No-steal
View Answer

Answer: b
Explanation: No-force policy allows faster commit of transactions.
6. ______________ policy allows multiple updates to accumulate on a block before it
is output to stable storage, which can reduce the number of output operations greatly
for frequently updated blocks.
a) Force
b) No-force
c) Steal
d) No-steal
View Answer

Answer: b
Explanation: No-force policy allows faster commit of transactions.

7. The ___________ policy, allows the system to write modified blocks to disk even if
the transactions that made those modifications have not all committed.
a) Force
b) No-force
c) Steal
d) No-steal
View Answer

Answer: c
Explanation: The no-steal policy does not work with transactions that perform a large
number of updates.

8. Locks on buffer blocks are unrelated to locks used for concurrency-control of


transactions, and releasing them in a non-two-phase manner does not have any
implications on transaction serializability. This is
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
View Answer

Answer: a
Explanation: These locks, and other similar locks that are held for a short duration.

9. The __________________ contains a list of blocks that have been updated in the
database buffer.
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
View Answer

Answer: c
Explanation: Dirty blocks are those that have been updated in memory, and the disk
version is not up-to-date.

10. The operating system reserves space on disk for storing virtual-memory pages that
are not currently in main memory; this space is called
a) Latches
b) Swap Space
c) Dirty Block
d) None of the mentioned
View Answer

Answer: b
Explanation: Almost all current-generation operating systems retain complete
control of virtual memory.

Which of the following refers to the problem of finding abstracted patterns (or structures) in
the unlabeled data?

a. Supervised learning
b. Unsupervised learning
c. Hybrid learning
d. Reinforcement learning

Hide Answer Workspace

Answer: b

Explanation: Unsupervised learning is a type of machine learning algorithm that is


generally used to find the hidden structured and patterns in the given unlabeled data.

2) Which one of the following refers to querying the unstructured textual data?
a. Information access
b. Information update
c. Information retrieval
d. Information manipulation

Show Answer Workspace

3) Which of the following can be considered as the correct process of Data Mining?

a. Infrastructure, Exploration, Analysis, Interpretation, Exploitation


b. Exploration, Infrastructure, Analysis, Interpretation, Exploitation
c. Exploration, Infrastructure, Interpretation, Analysis, Exploitation
d. Exploration, Infrastructure, Analysis, Exploitation, Interpretation

Hide Answer Workspace

Answer: a

Explanation: The process of data mining contains many sub-processes in a specific order.
The correct order in which all sub-processes of data mining executes is Infrastructure,
Exploration, Analysis, Interpretation, and Exploitation.

4) Which of the following is an essential process in which the intelligent methods are applied
to extract data patterns?

a. Warehousing
b. Data Mining
c. Text Mining
d. Data Selection

Hide Answer Workspace

Answer: b
Explanation: Data mining is a type of process in which several intelligent methods are
used to extract meaningful data from the huge collection ( or set) of data.

5) What is KDD in data mining?

a)Knowledge Discovery Database b)Knowledge Discovery Data

c)Knowledge Data definition d)Knowledge data house

Hide Answer Workspace

Answer: a

Explanation: The term KDD or Knowledge Discovery Database is refers to a broad process
of discovering the knowledge in the data and emphasizes the high-level applications of
specific Data Mining techniques as well.

) Which of the following is not a recovery technique?


A. Deferred update
B. Immediate update
C. Two-phase commit
D. Recovery management

2) Checkpoints are a part of


A. Recovery measures
B. Security measures
C. Concurrency measures
D. Authorization measures

3) ……. deals with soft errors, such as power failures.


A. system recovery
B. media recovery
C. database recovery
D. failure recovery

4) ……….. is an essential part of any backup system.


A. Filter
B. Recovery
C. Security
D. Scalability
5) Media recovery deals with ………..
A. disk errors
B. hard errors
C. system errors
D. power failures
6) For a backup/restore system, …………. is a prerequisite for service in a enterprise.
A. Filter
B. Recovery
C. Security
D. Scalability

7) Failure recovery and media recovery fall under ……..


A. transaction recovery
B. database recovery
C. system recovery
D. value recovery

8) The ………. consists of the various applications and database that play a role in a backup and
recovery strategy.
A. Recovery Manager environment
B. Recovery Manager suit
C. Recovery Manager file
D. Recovery Manager database

9) In which the database can be restored up to the last consistent state after the system
failure?
A. Backup
B. Recovery
C. Both
D. None

10) A ……….. is a block of Recovery Manager(RMAN) job commands that is stored in the
recovery catalog.
A. recovery procedure
B. recovery block
C. stored block
D. stored script

Table of Contents
READ ALSO: MCQ ON DISTRIBUTED DATABASE TRANSACTION
MANAGEMENT
11) In log based recovery, the log is sequence of ………
A. filter
B. records
C. blocks
D. numbers

12) The enrolling of a database in a recovery catalogue is called ………


A. set up
B. registration
C. start up
D. enrollment

13) ………. is an alternative of log based recovery.


A. Disk recovery
B. Shadow paging
C. Dish shadowing
D. Crash recovery

14) Most backup and recovery commands in ……….. are executed by server sessions.
A. Backup Manager
B. Recovery Manager
C. Backup and Recovery Manager
D. Database Manager

15) …….. systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID

16) An ……… is an exact copy of a single data-file, archived redo log file, or control file.
A. image copy
B. data file copy
C. copy log
D. control copy

17) ………. known as memory-style error correcting-code(ECC) organization, employs parity


bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4

18) The remote backup site is sometimes called the ………. site.
A. primary
B. secondary
C. ternary
D. None of the above

19) EXP command is used ………..


A. to take Backup of the Oracle Database
B. to import data from the exported dump file
C. to create Rollback segments
D. to create Schedule.

20) The simplest approach to introducing redundancy is to duplicate every disk is called …..
A. mirroring
B. imaging
C. copying
D. All of the above

ANSWERS:
1) C. Two-phase commit
2) A. Recovery measures
3) D. failure recovery
4) C. Security
5) A. disk errors
6) D. Scalability
7) C. system recovery
8) A. Recovery Manager environment
9) B. Recovery
10) D. stored script
11) B. records
12) B. registration
13) B. Shadow paging
14) B. Recovery Manager
15) D. RAID
16) A. image copy
17) B. RAID level 2
18) B. secondary
19) A. to take Backup of the Oracle Database
20) A. mirroring
DBMS Question Bank
Sr. No Question Answer

ROLLBACK in a database is ____ statement.

(A) DDL

(B) DML

(C) DCL

1 (D) TCL D

In a relational model, relations are termed as

(A) Rows

(B) Tables

(C) Attributes

2 (D) Tuples B

Which of the following is a procedural language?

(A) Relational algebra

(B) Query language

(C) Tuple relational calculus

3 (D) Domain relational calculus A


Which of the following types of tables constraints will prevent the entry of
duplicate rows?

(A) Primary keys

(B) Foreign keys

(C) Unique keys


4 A

In an E-R diagrams, ellipses represents

(A) Attributes

(B) Link between attributes and entity sets

(C) Relation among entity set

5 (D) Entity set A


In a relational modes, a cardinality is termed as

(A) Number of constraints

(B) Number of tables

(C) Number of attributes

6 (D) Number of tuples D


Which of the following is not a type of database?

(A) Relational

(B) Hierarchical

(C) Network

7 (D) Transition D

The most commonly used operation in relational algebra for projecting a set
of tuple from a relation is

(A) Union

(B) Select

(C) Projection

8 (D)
TheJoin
_____ operation allows the combining of two relations by merging pairs B
of tubles, one from each relation, into a single tuple.

(A) Intersection

(B) Union
9 C
A _____ is an abstract model that describes how the data are organised and
represented.

(A) Database

(B) Schema

(C) Instances

10 (D) Data model D


Which of the following is a set of one or more attributes taken collectively to
uniquely identify a record?

(A) Foreign key

(B) Super key

(C) Sub key

11 (D) Candidate key B


The ____ provides a set of operations that take one or more relations as input
and return a relation as an output.

(A) Relation flow

(B) Scheme diagram

(C) Relational algebra

12 (D) Schematic representation C

Where will we find the referential integrity command?

(A) Table

(B) Tools

(C) Format

13 (D) None of these D

____ represents raw facts, whereas ___ is data made meaningful.

(A) Data, information

(B) Information, reporting

(C) Information, bits

14 (D) Records, bytes A


When data changes in multiple lists and all lists are not updated, this causes

(A) Data redundancy

(B) Data inconsistency

(C) Duplicate data

15 (D) Information overload B

Which of the following is a Data Model?


(A) Entity-Relationship model
(B) Relational data model
(C) Object-Based data model
16 (D) All of the above D
Snapshot of the data in the database at a given instant of time is called
(A) Database Schema
(B) Database Instance
(C) Database Snapshot
17 (D) All of the above B

A functional dependency between two or more non-key attributes is called


(A) Transitive dependency
(B) Partial transitive dependency
(C) Functional dependency
18 (D) Partial functional dependency A

The Primary key must be


(A) Non Null
(B) Unique
(C) Option A or B
19 (D) Option A and B C
In SQL, which of the following is not a data Manipulation Language
Commands?
(A) DELETE
(B) SELECT
(C) UPDATE
20 (D) CREATE D

A transaction completes its execution is said to be


(A) Saved
(B) Loaded
(C) Rolled
21 (D) Committed D

Which of the following is not a Schema?


(A) Database Schema
(B) Physical Schema
(C) Critical Schema
22 (D) Logical Schema C

Who proposed the relational model?


(A) Bill Gates
(B) E.F. Codd
(C) Herman Hollerith
23 (D) Charles Babbage B

The index consists of


(A) A list of keys
(B) Pointers to the master list
(C) Both (a) and (b)
24 (D) None of the above C
In SQL, GRANT command is used to
(A) Allow user to access databases
(B) Allow user to create databases
(C) Grant system privileges, roles, and object privileges to uses and roles
25 (D) Choose auditing for specific SQL commands C

In an Entity-Relationship Diagram Rectangles represents


(A) Entity sets
(B) Attributes
(C) Database
26 (D) Tables A

Set of permitted values of each attribute is called


(A) Domain
(B) Tuple
(C) Relation
27 (D) Schema A

The attribute that can be divided into other attributes is called


(A) Simple Attribute
(B) Composite Attribute
(C) Multi-valued Attribute
28 (D) Derived Attribute B

Database locking concept is used to solve the problem of


(A) Lost Update
(B) Uncommitted Dependency
(C) Inconsistent Data
29 (D) All of the above D

Which of the following is Relation algebra Operation?


(A) Select
(B) Union
(C) Rename
30 (D) All of the above D

In an Entity-Relationship Diagram “Diamonds” represents


(A) Attributes
(B) Multi-valued attributes
(C) Weak entity set
31 (D) Relationship sets D

What are ACID properties of Transactions?


(A) Atomicity, Consistency, Isolation, Database
(B) Atomicity, Consistency, Isolation, Durability
(C) Atomicity, Consistency, Inconsistent, Durability
32 (D) Automatically, Concurrency, Isolation, Durability B
A relation that has no partial dependencies is in which normal form
(A) First
(B) Second
(C) Third
33 (D) BCNF B

A command to remove a relation from an SQL database


(A) Delete table <table name>
(B) Drop table <table name>
(C) Erase table <table name>
34 (D) Alter
Which oftable <table name>
the following in true regarding Referential Integrity? B
(A) Every primary-key value must match a primary-key value in an associated
table
(B) Every primary-key value must match a foreign-key value in an associated
table
(C) Every foreign-key value must match a primary-key value in an associated
35 table C
A relation is ………………. if every field contains only atomic values that are, no
lists or sets.
A) 1 NF
B) 2 NF
C) 3 NF
36 D) BCNF A

A table is in the ………………….. if only candidate keys are the determinants.


A) functional dependency
B) transitive dependency
C) 4 NF
37 D) BCNF D
The rule that a value of a foreign key must appear as a value of some specific
table is called a
A. Referential constraint
B. Index
C. Integrity constraint
38 D. Functional A

Relational Algebra is
A. Data Definition Language
B. Meta Language
C. Procedural query Language
39 D. None of the above C

Relational calculus is a
A. Procedural language
B. Non-Procedural language
C. Data definition language
40 D. High level language B
E-R model uses this symbol to represent the weak entity set?
A. Dotted rectangle
B. Diamond
C. Doubly outlined rectangle
41 D. None of these C

………. is an alternative of log based recovery.


A. Disk recovery
B. Shadow paging
C. Dish shadowing
42 D. Crash recovery B

Which of the following is not a property of transactions?


A. Atomicity
B. Concurrency
C. Isolation
43 D. Durability B

Which of the following ensures the atomicity of the transaction?


A. Transaction management component of DBMS
B. Application Programmer
C. The concurrency control component of DBMS
44 D. Recovery management component of DBMS A
……… protocol is used to perform multiple transactions that execute on a
different database.
A. commit
B. two-phase lock
C. two-phase commit
45 D. locking C

Which of the following represents a query in the tuple relational calculus?


a) { }{P(t) | t }
b) {t | P(t)}
c) t | P() | t
46 d) All of the mentioned B
A user executes a query which the ___ in the system uses to generate the
internal form of the query. In addition to checking the syntax of the query, the
____ verifies the name of the relation in the database, then the tuple, then the
attribute value.
A) Parser B) Translation
47 C) Optimization D) Evaluation A

The system must create a query ____ plan before it can fully evaluate a query.
A) Optimization B) Parser
48 C) Translation D) Evaluation D
The concept whichchecks the syntax of query which is written according to
rules of the grammer is classified as
a) Query graph b) Query tree
49 c) Parser d) Scanner c

A relation that has no partial dependencies is in which normal form


a) First b) Second
50 c) Third d) BCNF b

Which of the following makes the transaction permanent in the database ?


a) View b) Commit
51 c) Rollback d) Flashback b

The system must create a query ____ plan before it can fully evaluate a query.
a) Optimization b) Parser
52 c) Translation d) Evaluation d

Collections of operations that form a single logical unit of work are called
__________?
a) Views b) Networks
53 c) Units d) Transactions d

The real use of the Two-phase commit protocol is ______________


a) Deadlock will not occur b) Concurrency control can be avoided
54 c) Atomicity, i.e, all-or-nothing commits at all sites d) None of the above c

Which of the following is a property of transactions?


a) Atomicity b) Durability
55 c) Isolation d) All of the mentioned d

Checkpoints are a part of


a)Recovery measures. b) Security measures.
56 c) Concurrency measures. d) Authorization measures. a
Which of the following is not a recovery technique?
a) Deferred Database Modification
b) Immediate Database Modification
c) Two-phase commit
57 d) Recovery management c

The “all-or-none” property is commonly referred to as _________?


a) Isolation b) Durability
58 c) Atomicity d) None of the mentioned c

Transaction processing is associated with everything below except


a) Conforming a action or triggering a response
b) Producing detail summary or exception report
c) Recording a business activity
59 d) Maintaining a data a
Which functional dependency types is/are not present in the following
dependencies?
Empno -> EName, Salary, Deptno, DName
DeptNo -> DName
EmpNo -> DName
a) Full functional dependency
b) Partial functional dependency
c) Transitive functional dependency
60 d) BothofB the
Which andfollowing
C is the preferred way to recover a database after a b
transaction in progress terminates abnormally?
a.Rollback
b.Rollforward
c.Switch to duplicate database
d.Reprocess transactions
61 a
Database locking concept is used to solve the problem of
a)Lost Update
b)Uncommitted Dependency
c)Inconsistent Data
d)All of the above
62 d
The deadlock state can be changed back to stable state by using
_____________ statement.

a)Commit

b)Rollback

c)Savepoint

d)Deadlock
63 b
Which of the following contains a complete record of all activity that affected
the contents of a database during a certain period of time?

a)report writer

b)query language

c)data manipulation language

d)transaction log
64 d

Concurrency control is important for which of the following reasons?


a)To ensure data integrity when updates occur to the database in a multiuser
environment
b)To ensure data integrity when updates occur to the database in a single-user
environment
c)To ensure data integrity while reading data occurs to the database in a
multiuser environment
d)To ensure data integrity while reading data occurs to the database in a
single-user environment
65 a
A deadlock exists in the system if and only if the wait-for graph contains a
___________.
a)Cycle
b)Direction
c)Bi-direction
d)Rotation
66 a

What is/are the step(s) involved in fetching the data from the database in
query processing?
a)Parsing and translation b) Optimization
67 c) Evaluation d) All of the above d

If one attribute is determinant of second, which in turn is determinant of third,


then the relation cannot be:
a) Well-structured b) 1NF
68 c) 2NF d) 3NF d

Which of the following is not a recovery technique?


a) Deferred update
b) Immediate update
c) Two-phase commit
69 d) Recovery management c

The simplest approach to introducing redundancy is to duplicate every disk is


called …..
a) mirroring b) imaging
70 c) copying d) All of the above a
If database modifications occur while the transaction is still active, the
transaction is said to use the ___________technique.
a) Deferred-modification b) Late-modification
71 c) Immediate-modification d) Undo c
The log is a sequence of _________ recording all the update activities in the
database.
a) Log records b) Records
72 c) Entries d) Redo b
Let us suppose that in a distributed database, during a transaction T1, one of
the sites, say S1, is failed. When recovers, the site S1 has to check its log file
(log based recovery) to decide the next move on the transaction T1. If the log
contains a <T, Commit> record, what the site S1 has to do?
a) Need not do anything b) Perform Undo
73 c) Perform Redo d) Abort the transaction c
With regards to transaction processing, any DBMS should be capable of:
a)Ensuring that transactions are free from interference from other users.
b)Parts of a transaction are not lost due to a failure.
c)Transactions do not make the database inconsistent.
d)All of the above.
74 d

In case of any shut down during transaction before commit which of the
following statement is done automatically ?
a) View b)Commit
75 c) Rollback d) Flashback c
What is ACID properties of Transactions?
a)Atomicity, Consistency, Isolation, Database
b)Atomicity, Consistency, Isolation, Durability
c)Atomicity, Consistency, Inconsistent, Durability
d)Automatically, Concurrency, Isolation, Durability
76 b

A system is in a ______ state if there exists a set of transactions such that


every transaction in the set is waiting for another transaction in the set.
a) Idle b) waiting
77 c) Ready d) Deadlock d
A transaction completes its execution is said to be
a)Saved
b)Loaded
c)Rolled
d)Committed
78 d
A transaction may not always complete its execution successfully. Such a
transaction is termed
a)Aborted
b)Terminated
c)Closed
d)All of the mentioned
79 a
Locking may cause which of the following problems?
a)Erroneous updates
b)Deadlock
c)Versioning
d)All of the above.
80 b
In database management system, the executing process or executing program
which considers the updating or reading of records stored in database is called
a)conceptualization
b)execution
c)implementation
d)transaction
81 d
Execution of translation in isolation preserves the _________ of a database
a)Atomicity
b)Consistency
c)Durability
d)All of the mentioned
82 b
Which of the following is not a property of a transaction?

a)Atomicity

b)Simplicity
83 b
X is read from a database and stored in a buffer in main memory with the ___
operation.
A. Read
B. Write
C. Commit
84 D. Rollback A

Which of the following is an operation of transactions?


A. Read
B. Write
C. Commit
85 D. All of the above D

An operation is part of a transaction if it is ___ related.


A. Logically
B. Analytically
C. Reasonably
86 D. None A
Writing the data from the buffer back to the database is accomplished by
using the _____ operation.
A. Read
B. Write
C. Commit
87 D. Rollback B
In a database, prior to and after a transaction, properties are used to ensure
___.
A. Consistency
B. Redundancy
C. Latency
88 D. Anonymity A

All changes made in a transaction are ___ once it commits.


A. Visible
B. Not Visible
C. Broken
89 D. Not Broken A
What is TRUE about Consistency?
A. As a result of integrity constraints, the database remains consistent before
and after the transaction.
B. In most cases, a database remains either in its previous stable state or in a
new stable state following the execution of a transaction.
C. Every transaction undergoes a consistent database instance, which is the
consistent property of databases.
90 D. All of the above D
What is TRUE about Isolation?
A. By using the data used during a transaction, the second transaction will not
be able to use it until the first has been executed.
B. The data item X cannot be accessed by any other transaction T2 until the
transaction T1 is completed and the data item X is used by the transaction T1.
C. It enforced the isolation property via its concurrency control subsystem.
91 D. All of the above D

What is TRUE about atomicity?


A. The transaction cannot be partially completed, since there is no midway.
B. In each transaction, either the entire transaction is executed or it is not.
C. Both A and B
92 D. None of the above C

When dealing with database transactions, there is often a need for multiple
users to use a database to perform different operations. In this case, ___ of
the database occurs.
A. Concurrent Connection
B. Concurrent Reduction
C. Concurrent Execution
93 D. Concurrent Revolution C
During simultaneous execution, each operation should be performed
interleaved with the others, ensuring that there is no interference with the
other operations. This maintains a database ___.
A. Consistency
B. Redundancy
C. Concurrency
94 D. None C
What is TRUE about Durability?
A. The failure of the system or an error in a transaction cannot cause them to
be lost.
B. A consistent state is reached when a transaction is completed.
C. System failures cannot lead to the loss of that consistent state.
95 D. All of the above D
The concurrency ___ allows us to maintain the concurrency of the database.
A. Protocols
B. Controls
C. Control Protocols
96 D. None C

What is the Dirty Read Problem also known as?


A. W-W Conflict
B. W-R Conflict
C. R-R Conflict
97 D. None B

You might also like