FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 1) 1. The property of enables an entity subtype to hold the properties of its super type. Null Constraint Integrity Inheritance Uniqueness 2. Which of the following most certainly implies the need for an entire table to implement? A binary relationship 40 A ternary relationship A recursive relationship An identifying relationship 3. A shared collection of logically related data is known as Database 10 File Processing System Program and Data Interdependence DBMS 4. On magnetic media, data is stored in Page 1
Text Images Binary format 40 Tables 5. Which of the following is one of the purposes of using DDL commands? inserting records into databases updating records into databases manipulating databases creating and destroying databases 196 6. is used to create and destroy database and database objects ERD DCL DDL 196 DML 7. Which of the following is used to add or drop columns in an existing table? ALTER 206 HAVING SELECT THEN 8. The constraint specifies whether each entity supertype occurrence must also be a member of at its one subtype. Total completeness 103 Specialization Uniqueness Inheritance 9. Which of the following is a correct way to implement many-to-many cardinality in a binary relationship while designing tables? Page 2
Using a third table with the keys from both the tables forming the composite primary key of third table. 143 By splitting the data into five tables with primary key and foreign key relationships. By splitting the data into five tables with primary key and foreign key relationships. By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key). 10. Which of the following is INCORRECT regarding De-normalization? It is the process of attempting optimization of Database. It is a technique to move from lower to higher normal forms of database modeling. 187 In this process, it is required to add redundant data. It enhances the performance of DB. 11. Hash Partitioning is applied on. Rows Columns Algorthim 189 Attributes 12. is used to sort the result set in ascending or descending order Group by Clause From Clause Where Clause Order by Clause 220 13. Which of the following SQL Function does not use input parameter? LOWER UPPER LEN CURRENT_TIME 221 14. Select * from STUDENT, DEPARTMENT is an example of Cartesian Join 225 Page 3
Inner Join Outer Join Full Outer Join 15. Which of the following is not a DDL Command? Create table Alter table Insert into 202 insert into a sql command Create database 16. Which of the following commands is used to drop the table named STUDENT? DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 17. Which of the following is the correct syntax for SELECT statement? SELECT column_name(s) FROM table_name 211 SELECT FROM table_name column_name(s) FROM SELECT column_name(s) table_name FROM table_name SELECT column_name(s) 18. Which of the following specifies the tables, which we access in the query? SELECT Clause FROM Clause 212 WHERE Clause ORDER BY Clause 19. Procedure of finding the size of Cartesian Product is The number of columns in the first table multiplied by the number of rows in the second table. Page 4
The number of rows in the first table multiplied by the number of columns in the first table. The number of rows in the first table multiplied by the number of rows in the second table. 224 The number of columns in the first table multiplied by the number of columns in the second table 20. Which of the following is not a type of user interface? Graphical User Interface (GUI) Forms Database Schema 240 Text based Interface 21. is an example of volatile memory. RAM ROM FLASH MEMORY 256 CPU 22.Which of the following is the correct way of removing the Index called branchnoindex? DROP INDEX branchnoindex; 207 APPEND INDEX branchnoindex; REMOVE INDEX branchnoindex; DEL INDEX branchnoindex; 23. Which of the following is incorrect regarding Indexes? It can not be created on composite attributes. Index can be defined even when there is no data in the table. It support Range selections. It can be created using Create Index statement 273 24. Which of the following is NOT a part of Deadlock Resolution? Choose a victim Page 5
A message is passed to the victim and depending on the system the transaction may or may not be started again automatically. Picking a list of all previously completed transactions and undoing all the updates. Page 323 Rollback `victim' transaction and restart it. 25. A Table can have clustered index (es). Only one 275 Only two More than two Only three 26. Which of the following is true about the views? View can only show few attributes of a table View can not be used for retrieving data View can not be used as security mechanisms We can customize the order of the table fields through Views page280 27. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the columns? CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST 28. must identify a record in the table, uniquely. Key 260 SQL Statement Index Hash Algorithm 29. manages mass storage devices like hard disks and tape drive. Index Operating System 261 RAID Sequential File Access 30. A perfect hash function map a key to distinct location having search time. O(1) 266 O(n) O(n+1) O(n-1) 31. Which of the following is not the property of Transaction? Atomicity Consistency Page 6
Redundancy 291 Durability 32. Dead Lock can be prevented by giving each transaction a. Name Clustered Index Cartesian Join Priority 299 33. While recovering data, which of the following files does a Recovery Manager examines at first? Clustered Index Log file 303 Data dictionary Metadata 34. Which of the following serves as reference point in the log file? Constraints Relations Check points 304 Relationships 35. -------------- occurs when multiple users want to update same object at the same time. Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 36. After execution of commit statement, is updated first. Database Buffer 303 Clustered-Index Non-Clustered Index Application Program 37. It is not necessary for any super type entity to have its entire instance set to be associated with any of the subtype entity, is called as. Partial Completeness 103 Disjoint Overlap Complete Overlap Total Completeness 38. R X θ S, If R and S are relations and θ is a. Table Name Page 7
Attributes Primary Key Condition 158 39. If D --> E, F then D --> E and D --> F. This inference rules is called as. Transitivity Additive Projectivity 166 Augmentation 40. Which of the following constraints enforces Entity Integrity? PRIMARY KEY FOREIGN KEY CHECK NOT NULL 134 FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 1) 1. Which of the following most certainly implies the need for an entire table to implement? A binary relationship 140 A ternary relationship A recursive relationship An identifying relationship 2. Database System is the combination of. Database and DBMS Database and Data Data and Information Operating System and Database 3. End User directly interact with External Schema 42 Page 8
Conceptual Schema Internal Schema Core of Database Architecture 4. is also known as Community View of Database. External Schema Conceptual Schema 37 User views Internal Schema 5. On magnetic media, data is stored in Text Images Binary format 40 Tables 6. contains data about all the Databases in DBMS. Data Dictionary page64. Schema Cross Reference Matrix Conceptual Data Model 7.In which of the following situations, Clustering is suitable: Frequently updating Relatively static page192. Frequently deletion Relatively dynamic 8. SQL is an standard computer language ANSI 193 Page 9
General Cold fusion Interactive 9. Which of the following statements creates a database named COMPANY. CREATE DATABASE COMPANY 202 CREATE DB company ADD DATABASE company CREATE company DATABASE 10. is used to read, write, and remove the data from a database SQL 194. ERD ANSI Data Model 11. Which of the following is used to add or drop columns in an existing table? ALTER 206 HAVING SELECT THEN 12. Which of the following SQL keywords is not used with DDL statements? Table 234 Update Create Create 13. Which of the following statements are DML commands? ALTER Page 10
CREATE INSERT GRANT page 200. 14. The constraint specifies whether each entity supertype occurrence must also be a member of at its one subtype. Total completeness 103 Specialization Uniqueness Inheritance 15. Which of the following is not a DDL Command? Create table Alter table Insert into 202 insert into a SQL command Create database 16. Which of the following commands is used to drop the table named STUDENT? DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 17.If a relation contains single Key, the relation is automatically in. 1NF 2NF169 3NF 4NF 18.Which of the following is not a type of user interface? Graphical User Interface (GUI) Page 11
Forms Database Schema 240 Text based Interface 19. Which of the following is not related with Browser based forms development? HTML ASP Front Page Dev C 241 20. Which of the following is the activity, which is not performed during the development of application programs? Data input programs Editing Display Data Collection 238 21. Which of the following is not correct about input forms? Provide an easy, effective, efficient way to enter data into a table Especially useful when the person entering the data is not familiar with the inner workings Provide different controls to add data into the tables One input forms can populate one table at a time 246 22. is a control that users click to perform an action. Input form 246 Report Button Text box 23. is disadvantage of chaining technique to handle the collisions. Unlimited Number of elements Page 12
Fast re-hashing Overhead of multiple linked lists 269 Maximum number of elements must be known 24. What is the impact of setting multiple indexes for the same key? Multiple indexes for the same key can not be set It increases efficiency 263 It decreases efficiency It will increase complexity as the access time will be increased 25. Which of the following is the correct way of removing the Index called branchnoindex? DROP INDEX branchnoindex; 207 APPEND INDEX branchnoindex; REMOVE INDEX branchnoindex; DEL INDEX branchnoindex; 26. Which of the following is NOT a part of Deadlock Resolution? Choose a victim A message is passed to the victim and depending on the system the transaction may or may not be started again automatically. Picking a list of all previously completed transactions and undoing all the updates. 323 Rollback `victim' transaction and restart it. 27. Which of the following is true regarding Index? Index can only be created for a single table in database 262 Index can maximum be created for two tables in database Index can only be created, when a database has at least 3 tables Index can be created for every table in the database 28. Which of the following is not a type of VIEWS? Materialized View Page 13
Simple Views Complex View Cross Reference View 283 29. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the columns? CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST 30. must identify a record in the table, uniquely. Hash Algorithm Key 260 SQL Statement Index 31. manages mass storage devices like hard disks and tape drive. Index Operating System 261 RAID Sequential File Access 32.A file with records, with sequential access file, an average of key comparisons are necessary. 10000, 5500 10000, 5000 262 10000, 4500 10000, 500 33. A perfect hash function map a key to distinct location having search time. O(1) 266 Page 14
O(n) O(n+1) O(n-1) 34. Dead Lock can be prevented by giving each transaction a. Name Clustered Index Cartesian Join Priority 299 35. Wait-for graph is maintained by Lock manager 300 Index Manager View Manager Constraint Manager 36. Which of the following serves as reference point in the log file? Constraints Relations Check points 304 Relationships 37. -------------- occurs when multiple users want to update same object at the same time. Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 38. After execution of commit statement, is updated first. Database Buffer 303 Page 15
Clustered-Index Non-Clustered Index Application Program 39. are called participants, when enrolled in a relationship. Attributes Relations Entities 86 Keys 40. Which of the following constraints enforces Entity Integrity? PRIMARY KEY FOREIGN KEY CHECK NOT NULL 134 FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 2) 1. Which of the following is true about NOT NULL constraint? Enforce domain integrity. Limit the values that can be placed in a column. Prevents any actions that would destroy links between tables with the corresponding data values. 135 Enforces the uniqueness of the values in a set of columns. 2. Which of the following constraints enforces Referential Integrity? FOREIGN KEY page134 CHECK PRIMARY KEY UNIQUE 3. An Entity is defined when the database is physically constructed in DBMS a specific type such as an integer, text, date, logical etc defined by DBMS basic building block of the E-R data model page71 4. is also known as Community View of Database. External Schema Conceptual Schema page37 Page 16
User views Internal Schema 5. On magnetic media, data is stored in Text Images Binary format Tables 6. SQL is an standard computer language ANSI General Cold fusion Interactive 7. Which of the following is one of the purposes of using DDL commands? Inserting records into databases Updating records into databases Manipulating databases creating and destroying databases page 196 8. is used to create and destroy database and database objects DDL page 196 DML DCL ERD 9. is used to read, write, and remove the data from a database SQL page194 ERD Page 17
ANSI Data Model 10. Which of the following gives all the fields from employee table named as EMP? select * from EMP page224 select emp* from EMP select emp_id where EMP select * where EMP 11. Which of the following statements are Data Definition Language commands? GRANT GRANT INSERT 196 UPDATE 12. The ER- data model is an example of: Physical database design Logical database design Relational database design Conceptual database design page 70 13. Consider two sets A and B. A contains 3 elements and B contains 4. How many elements do their Cartesian product contains? 12 129 9 16 7 14. Identify the factor which enforces a relation in 3NF? Relation is in 2nd NF and every non-key attribute is fully functionally dependent on primary key. Relation is in 2nd NF and every non-key attribute is transitive dependent on super key. The domain of attribute may include multiple values. Relation is in 2nd NF and every non-key attribute is non-transitively dependent on primary key. 171 Page 18
15. In 1st Normal Form, we remove Repeating Groups page 167 Transitive Dependency Functional Dependency Multi-valued Dependency 16. Which of the following is INCORRECT regarding De-normalization? It is the process of attempting optimization of Database. It is a technique to move from lower to higher normal forms of database modeling page 187 In this process, it is required to add redundant data. It enhances the performance of DB. 17. Select * from STUDENT, DEPARTMENT is an example of. Cartesian Join page 224 Inner Join Outer Join Full Outer Join 18. Which of the following is not a DDL Command? Create table Alter table Insert into Create database page201 19. Which of the following commands is used to TRUNCATE the table named STUDENT? TRUNCATE TABLE STUDENT page 207 TABLE TRUNCATE STUDENT TABLE STUDENT TRUNCATE STUDENT TABLE TRUNCATE Page 19
20. Suppose there are 5 rows and 4 columns in TABLE1 and 6 rows and 7 columns in TABLE2; what is the size of the Cartesian product incase of CROSS JOIN between these two tables? 30 35 24 28 21. Which of the following is not a feature of effective interface? Effective interfaces can require more work to implement An effective user interface minimizes the time users require to learn and implement the system It helps users to accomplish their tasks and otherwise gets out of the way An effective interface imposes its requirements on users page 239 22. Which of the following is not correct about input forms? Provide an easy, effective, efficient way to enter data into a table Especially useful when the person entering the data is not familiar with the inner workings Provide different controls to add data into the tables One input forms can populate one table at a time page 246 23. is a control that presents a set of choices from which a user can select one or more items; items can be text, graphics, or both. Button page 243 List box Text input 4. The main memory of a computer system is also known as ROM RAM page256 PROM Hard disk Page 20
25. is not a feature of hash access Report. indexes to search or maintain page266 Very fast direct access Inefficient sequential access Use when direct access is needed, but sequential access is not 26. is disadvantage of chaining technique to handle the collisions. Unlimited Number of elements Fast re-hashing Fast re-hashing Overhead of multiple linked lists page269 Maximum number of elements must be known 27. is advantage of Re-Hashing technique to handle the collisions. Collisions don t use primary table space Unlimited number of elements Fast access through use of main table space page 269 Overhead of multiple linked lists 28. Which of the following is NOT a part of Deadlock Resolution? Choose a victim A message is passed to the victim and depending on the system the transaction may or may not be started again automatically. Picking a list of all previously completed transactions and undoing all the updates. Page 323 Rollback `victim' transaction and restart it. 29. Which of the following is true about the views? View can only show few attributes of a table View can not be used for retrieving data View can not be used as security mechanisms We can customize the order of the table fields through Views page280 Page 21
30. Which of the following is not a type of VIEWS? Materialized View Simple Views Complex View Cross Reference View page283 31. A file with records, with sequential access file, an average of key comparisons are necessary. 10000, 5500 10000, 5000 page 262 10000, 4500 10000, 500 32. A perfect hash function map a key to distinct location having search time. O(1) page 266 O(n) O(n+1) O(n-1) 33. Which of following is INCORRECT about Materialized Views? These are suitable in Data Warehouses. These are schema objects which can be use to summaries the data. Page 291 They can not be partitioned. Their existence is transparent to SQL applications and users. 34. is used to detect the dead lock. Wait-for graph page 320 Cross Reference Matrix Inner Join Clustered Index Page 22
35. Wait-for graph is maintained by Lock manager page 320 Index Manager View Manager Constraint Manager 36. Which of the following serves as reference point in the log file? Constraints Relations Check points page 304 Relationships 37. -------------- occurs when multiple users want to update same object at the same time. Lost Update Problem page 308 Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem 38. After execution of commit statement, is updated first. Database Buffer page 303 Clustered-Index Non-Clustered Index Application Program 39. To select the range while creating Indexes, the operator that is not used is. Equals to (==). Less than (<) And (&&) Between Page 23
40. DBA is responsible for Monitoring Disk Space Database Backup page25 Managing Print Jobs Development of Database Application Programs FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems 1. Maximum Cardinality shows that how many of one entity can be placed in another relation at most. Keys Instances 91 page Attributes Relationships 2. A shared collection of logically related data is known as Database page 10 File Processing System Program and Data Interdependence DBMS 3. Metadata is also known as for the real world data. Attribute Schema 23 Entity Relation 4. provides the change transparency between Conceptual and External level. Physical Data Independence 45 Concurrency Control Logical Data Independence Functional Dependency 5. User rights information is stored in. Conceptual Database A user accessible Catalog 46 Logical Database Buffer Page 24
6. Which of the following types of partitioning reduces the chances of unbalanced partitions? Vertical List Hash 189 Range 7. In which of the following situations, Clustering is suitable: Frequently updating Relatively static 192 Frequently deletion Relatively dynamic 8. Vertical partitioning is done on the basis of Attributes 191 Rows Clustering Replication 09. Which of the following is one of the purposes of using DML commands? Creating databases Destroying databases Inserting data in tables 196 Create table 10. is used to create and destroy database and database objects ERD DCL DDL 196 DML 11. is used to read, write, and remove the data from a database SQL 196 ERD ANSI Data Model 12. Which of the following gives all the fields from employee table named as EMP? select * from EMP select emp* from EMP select emp_id where EMP select * where EMP 13. Which of the following SQL keywords is not used with DDL statements? Table Update 234 Create Alter Page 25
14. Which of the following statements are Data Definition Language command? INSERT 196 GRANT ALTER UPDATE 15. Which of the following is true about relational table? The sequence of columns is significant. The sequence of rows is significant. Contains only derived attributes. Contains only derived attributes. 16. If W, X, Y and Z are attributes of a relation, which of the following inference rules for functional dependencies is correct? If X Y then Y -> X If X -> Y then (X, Z) -> (Y,W) If X -> Y,Z then X -> Y If (X, Z) -> Y then X -> Y and Z -> Y 17. is used to sort the result set in ascending or descending order From Clause Where Clause Order by Clause 220 Group by Clause 18. Which of the following commands is used to drop the table named STUDENT? DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 19. Which of the following is NOT a feature of a good interface? data structure based user friendly consistency process based 243 20. Which of the following is the activity, which is not performed during the development of application programs? Data input programs Editing Display Data Collection 238 Page 26
21. is a control that users click to perform an action. Input form 246 Report Button Text box 22. is an example of non-volatile memory. SRAM Cache Memory Flash memory 256 DRAM 23. is an example of volatile memory. RAM ROM Flash memory 256 CPU 24. What is the impact of setting multiple indexes for the same key? Multiple indexes for the same key can not be set It increases efficiency 263 It decreases efficiency It will increase complexity as the access time will be increased 25. Which of the following is incorrect regarding Indexes? It can not be created on composite attributes. Index can be defined even when there is no data in the table. It supports Range selections. It can be created using Create Index statement. 273 26. Which of the following SQL Command will DROP a view named STUDENT DROP VIEW STUDENT 288 DROP FROM STUDENT VIEW DELETE STUDENT FROM VIEW DELETE ALL STUDENT VIEW 27. Which of the following is NOT CORRECT Regarding VIEWS? VIEWS can be used to interact with the database. 281 Through VIEWS users can focus on their interested data. VIEW can show one or more records from a database. VIEW cannot be updated VIEW cannot be updated CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST Page 27
29. Which of the following command shows all the columns from PRODUCT-VIEW? SELECT * FROM PRODUCT-VIEW 286 SELECT PRODUCT-VIEW SHOW ALL PRODUCT-VIEW PRODUCT-VIEW SELECT 30. must identify a record in the table, uniquely. Hash Algorithm Key 260 SQL Statement Index 31. A file with records, with sequential access file, an average of key comparisons are necessary. 10000, 5500 10000, 5000 262 10000, 4500 10000, 500 32. Which of the following is INCORRECT about Database Transaction? It can only end in one way, which is ROLLBACK 295 It must preserve the consistency of the database. It must follow the ACID properties. It is seen by the DBMS as a list of actions. 33. Which of the following is not a feature of Database Transaction? Users should be able to regard the execution of each transaction as atomic. It must follow the ACID properties. Either all actions of a Transaction are carried out or none are. Transaction always affects the every other concurrent transaction. 294 34. is used to detect the dead lock. Wait-for graph 320 Cross Reference Matrix Inner Join Clustered Index 35. While recovering data, which of the following files does a Recovery Manager examines at first? Clustered Index Log file 303 Data dictionary Metadata Page 28
36. -------------- occurs when multiple users want to update same object at the same time. Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 37. After execution of commit statement, is updated first. Database Buffer 303 Clustered-Index Non-Clustered Index Application Program 38.. It is not necessary for any super type entity to have its entire instance set to be associated with any of the subtype entity, is called as. Partial Completeness 103 Disjoint Overlap Complete Overlap Total Completeness 39. is an abstraction of a relationship. Relationship Type 85 Relationship Name Relation Type Relation Name 40. DBA is not responsible for Monitoring Disk Space Database Backup Managing Print Jobs Development of Database Application Programs 29 Page 29