FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 1)

Similar documents
BCA. Database Management System

DATABASE MANAGEMENT SYSTEMS. Question Bank:


Database 10g Edition: All possible 10g features, either bundled or available at additional cost.

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?

Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions

Basic Concepts of Database Systems

Oracle SQL. Course Summary. Duration. Objectives

Files. Files. Files. Files. Files. File Organisation. What s it all about? What s in a file?

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY

Oracle Database: SQL and PL/SQL Fundamentals NEW

IT2305 Database Systems I (Compulsory)

1 File Processing Systems

Oracle 10g PL/SQL Training

Demystified CONTENTS Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals CHAPTER 2 Exploring Relational Database Components

Physical Data Organization

SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases.

IT2304: Database Systems 1 (DBS 1)

Transactions and the Internet

The first time through running an Ad Hoc query or Stored Procedure, SQL Server will go through each of the following steps.

David Dye. Extract, Transform, Load

Database Administration with MySQL

Transactions and Recovery. Database Systems Lecture 15 Natasha Alechina

Oracle Database: SQL and PL/SQL Fundamentals NEW

5. CHANGING STRUCTURE AND DATA

Oracle Database: SQL and PL/SQL Fundamentals

Oracle Database: SQL and PL/SQL Fundamentals

Databases What the Specification Says

Instant SQL Programming

Oracle Database 10g: Introduction to SQL

ETL Process in Data Warehouse. G.Lakshmi Priya & Razia Sultana.A Assistant Professor/IT

1. INTRODUCTION TO RDBMS

Introduction to Database Systems. Module 1, Lecture 1. Instructor: Raghu Ramakrishnan UW-Madison

Database Management. Chapter Objectives

Fundamentals of Database Design

Relational Database Basics Review

Database System Architecture & System Catalog Instructor: Mourad Benchikh Text Books: Elmasri & Navathe Chap. 17 Silberschatz & Korth Chap.

Introduction to Databases

Chapter 6: Physical Database Design and Performance. Database Development Process. Physical Design Process. Physical Database Design

DBMS / Business Intelligence, SQL Server

B2.2-R3: INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

Database Design. Marta Jakubowska-Sobczak IT/ADC based on slides prepared by Paula Figueiredo, IT/DB

Physical Database Design and Tuning

Oracle Database 12c: Introduction to SQL Ed 1.1

Database Design Standards. U.S. Small Business Administration Office of the Chief Information Officer Office of Information Systems Support

1. Physical Database Design in Relational Databases (1)

Oracle Database: Introduction to SQL

Topics. Introduction to Database Management System. What Is a DBMS? DBMS Types

Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server

MOC 20461C: Querying Microsoft SQL Server. Course Overview

Oracle Database: Introduction to SQL

COMP5138 Relational Database Management Systems. Databases are Everywhere!

Physical Design. Meeting the needs of the users is the gold standard against which we measure our success in creating a database.

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems

SQL Simple Queries. Chapter 3.1 V3.0. Napier University Dr Gordon Russell

Oracle Database: Introduction to SQL

Performance Tuning for the Teradata Database

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation

Oracle Database 11g SQL

W I S E. SQL Server 2008/2008 R2 Advanced DBA Performance & WISE LTD.

2) What is the structure of an organization? Explain how IT support at different organizational levels.

Database Management Systems 2015

Databases and BigData

MySQL for Beginners Ed 3

INTRODUCTION TO DATABASE SYSTEMS

Optimizing Performance. Training Division New Delhi

Principles of Database. Management: Summary

Review: The ACID properties

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

1.264 Lecture 15. SQL transactions, security, indexes

Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-

In this session, we use the table ZZTELE with approx. 115,000 records for the examples. The primary key is defined on the columns NAME,VORNAME,STR

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Modern Systems Analysis and Design

Chapter 14: Recovery System

Duration Vendor Audience 5 Days Oracle End Users, Developers, Technical Consultants and Support Staff

Oracle Database 11g: SQL Tuning Workshop

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè.

Chapter 1: Introduction

D61830GC30. MySQL for Developers. Summary. Introduction. Prerequisites. At Course completion After completing this course, students will be able to:

MS SQL Performance (Tuning) Best Practices:

Conventional Files versus the Database. Files versus Database. Pros and Cons of Conventional Files. Pros and Cons of Databases. Fields (continued)

Week 1 Part 1: An Introduction to Database Systems. Databases and DBMSs. Why Use a DBMS? Why Study Databases??

Chapter 1 File Organization 1.0 OBJECTIVES 1.1 INTRODUCTION 1.2 STORAGE DEVICES CHARACTERISTICS

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001

Oracle Database 10g Express

How to Implement Multi-way Active/Active Replication SIMPLY

Introduction to Database. Systems HANS- PETTER HALVORSEN,

Question 1. Relational Data Model [17 marks] Question 2. SQL and Relational Algebra [31 marks]

Using Multiple Operations. Implementing Table Operations Using Structured Query Language (SQL)

Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability

Talking to Databases: SQL for Designers

Relational Databases. Christopher Simpkins

Bridge from Entity Relationship modeling to creating SQL databases, tables, & relations

CERULIUM TERADATA COURSE CATALOG

Overview of Data Management

Transcription:

FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 1) 1. The property of enables an entity subtype to hold the properties of its super type. Null Constraint Integrity Inheritance Uniqueness 2. Which of the following most certainly implies the need for an entire table to implement? A binary relationship 40 A ternary relationship A recursive relationship An identifying relationship 3. A shared collection of logically related data is known as Database 10 File Processing System Program and Data Interdependence DBMS 4. On magnetic media, data is stored in Page 1

Text Images Binary format 40 Tables 5. Which of the following is one of the purposes of using DDL commands? inserting records into databases updating records into databases manipulating databases creating and destroying databases 196 6. is used to create and destroy database and database objects ERD DCL DDL 196 DML 7. Which of the following is used to add or drop columns in an existing table? ALTER 206 HAVING SELECT THEN 8. The constraint specifies whether each entity supertype occurrence must also be a member of at its one subtype. Total completeness 103 Specialization Uniqueness Inheritance 9. Which of the following is a correct way to implement many-to-many cardinality in a binary relationship while designing tables? Page 2

Using a third table with the keys from both the tables forming the composite primary key of third table. 143 By splitting the data into five tables with primary key and foreign key relationships. By splitting the data into five tables with primary key and foreign key relationships. By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key). 10. Which of the following is INCORRECT regarding De-normalization? It is the process of attempting optimization of Database. It is a technique to move from lower to higher normal forms of database modeling. 187 In this process, it is required to add redundant data. It enhances the performance of DB. 11. Hash Partitioning is applied on. Rows Columns Algorthim 189 Attributes 12. is used to sort the result set in ascending or descending order Group by Clause From Clause Where Clause Order by Clause 220 13. Which of the following SQL Function does not use input parameter? LOWER UPPER LEN CURRENT_TIME 221 14. Select * from STUDENT, DEPARTMENT is an example of Cartesian Join 225 Page 3

Inner Join Outer Join Full Outer Join 15. Which of the following is not a DDL Command? Create table Alter table Insert into 202 insert into a sql command Create database 16. Which of the following commands is used to drop the table named STUDENT? DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 17. Which of the following is the correct syntax for SELECT statement? SELECT column_name(s) FROM table_name 211 SELECT FROM table_name column_name(s) FROM SELECT column_name(s) table_name FROM table_name SELECT column_name(s) 18. Which of the following specifies the tables, which we access in the query? SELECT Clause FROM Clause 212 WHERE Clause ORDER BY Clause 19. Procedure of finding the size of Cartesian Product is The number of columns in the first table multiplied by the number of rows in the second table. Page 4

The number of rows in the first table multiplied by the number of columns in the first table. The number of rows in the first table multiplied by the number of rows in the second table. 224 The number of columns in the first table multiplied by the number of columns in the second table 20. Which of the following is not a type of user interface? Graphical User Interface (GUI) Forms Database Schema 240 Text based Interface 21. is an example of volatile memory. RAM ROM FLASH MEMORY 256 CPU 22.Which of the following is the correct way of removing the Index called branchnoindex? DROP INDEX branchnoindex; 207 APPEND INDEX branchnoindex; REMOVE INDEX branchnoindex; DEL INDEX branchnoindex; 23. Which of the following is incorrect regarding Indexes? It can not be created on composite attributes. Index can be defined even when there is no data in the table. It support Range selections. It can be created using Create Index statement 273 24. Which of the following is NOT a part of Deadlock Resolution? Choose a victim Page 5

A message is passed to the victim and depending on the system the transaction may or may not be started again automatically. Picking a list of all previously completed transactions and undoing all the updates. Page 323 Rollback `victim' transaction and restart it. 25. A Table can have clustered index (es). Only one 275 Only two More than two Only three 26. Which of the following is true about the views? View can only show few attributes of a table View can not be used for retrieving data View can not be used as security mechanisms We can customize the order of the table fields through Views page280 27. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the columns? CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST 28. must identify a record in the table, uniquely. Key 260 SQL Statement Index Hash Algorithm 29. manages mass storage devices like hard disks and tape drive. Index Operating System 261 RAID Sequential File Access 30. A perfect hash function map a key to distinct location having search time. O(1) 266 O(n) O(n+1) O(n-1) 31. Which of the following is not the property of Transaction? Atomicity Consistency Page 6

Redundancy 291 Durability 32. Dead Lock can be prevented by giving each transaction a. Name Clustered Index Cartesian Join Priority 299 33. While recovering data, which of the following files does a Recovery Manager examines at first? Clustered Index Log file 303 Data dictionary Metadata 34. Which of the following serves as reference point in the log file? Constraints Relations Check points 304 Relationships 35. -------------- occurs when multiple users want to update same object at the same time. Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 36. After execution of commit statement, is updated first. Database Buffer 303 Clustered-Index Non-Clustered Index Application Program 37. It is not necessary for any super type entity to have its entire instance set to be associated with any of the subtype entity, is called as. Partial Completeness 103 Disjoint Overlap Complete Overlap Total Completeness 38. R X θ S, If R and S are relations and θ is a. Table Name Page 7

Attributes Primary Key Condition 158 39. If D --> E, F then D --> E and D --> F. This inference rules is called as. Transitivity Additive Projectivity 166 Augmentation 40. Which of the following constraints enforces Entity Integrity? PRIMARY KEY FOREIGN KEY CHECK NOT NULL 134 FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 1) 1. Which of the following most certainly implies the need for an entire table to implement? A binary relationship 140 A ternary relationship A recursive relationship An identifying relationship 2. Database System is the combination of. Database and DBMS Database and Data Data and Information Operating System and Database 3. End User directly interact with External Schema 42 Page 8

Conceptual Schema Internal Schema Core of Database Architecture 4. is also known as Community View of Database. External Schema Conceptual Schema 37 User views Internal Schema 5. On magnetic media, data is stored in Text Images Binary format 40 Tables 6. contains data about all the Databases in DBMS. Data Dictionary page64. Schema Cross Reference Matrix Conceptual Data Model 7.In which of the following situations, Clustering is suitable: Frequently updating Relatively static page192. Frequently deletion Relatively dynamic 8. SQL is an standard computer language ANSI 193 Page 9

General Cold fusion Interactive 9. Which of the following statements creates a database named COMPANY. CREATE DATABASE COMPANY 202 CREATE DB company ADD DATABASE company CREATE company DATABASE 10. is used to read, write, and remove the data from a database SQL 194. ERD ANSI Data Model 11. Which of the following is used to add or drop columns in an existing table? ALTER 206 HAVING SELECT THEN 12. Which of the following SQL keywords is not used with DDL statements? Table 234 Update Create Create 13. Which of the following statements are DML commands? ALTER Page 10

CREATE INSERT GRANT page 200. 14. The constraint specifies whether each entity supertype occurrence must also be a member of at its one subtype. Total completeness 103 Specialization Uniqueness Inheritance 15. Which of the following is not a DDL Command? Create table Alter table Insert into 202 insert into a SQL command Create database 16. Which of the following commands is used to drop the table named STUDENT? DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 17.If a relation contains single Key, the relation is automatically in. 1NF 2NF169 3NF 4NF 18.Which of the following is not a type of user interface? Graphical User Interface (GUI) Page 11

Forms Database Schema 240 Text based Interface 19. Which of the following is not related with Browser based forms development? HTML ASP Front Page Dev C 241 20. Which of the following is the activity, which is not performed during the development of application programs? Data input programs Editing Display Data Collection 238 21. Which of the following is not correct about input forms? Provide an easy, effective, efficient way to enter data into a table Especially useful when the person entering the data is not familiar with the inner workings Provide different controls to add data into the tables One input forms can populate one table at a time 246 22. is a control that users click to perform an action. Input form 246 Report Button Text box 23. is disadvantage of chaining technique to handle the collisions. Unlimited Number of elements Page 12

Fast re-hashing Overhead of multiple linked lists 269 Maximum number of elements must be known 24. What is the impact of setting multiple indexes for the same key? Multiple indexes for the same key can not be set It increases efficiency 263 It decreases efficiency It will increase complexity as the access time will be increased 25. Which of the following is the correct way of removing the Index called branchnoindex? DROP INDEX branchnoindex; 207 APPEND INDEX branchnoindex; REMOVE INDEX branchnoindex; DEL INDEX branchnoindex; 26. Which of the following is NOT a part of Deadlock Resolution? Choose a victim A message is passed to the victim and depending on the system the transaction may or may not be started again automatically. Picking a list of all previously completed transactions and undoing all the updates. 323 Rollback `victim' transaction and restart it. 27. Which of the following is true regarding Index? Index can only be created for a single table in database 262 Index can maximum be created for two tables in database Index can only be created, when a database has at least 3 tables Index can be created for every table in the database 28. Which of the following is not a type of VIEWS? Materialized View Page 13

Simple Views Complex View Cross Reference View 283 29. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the columns? CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST 30. must identify a record in the table, uniquely. Hash Algorithm Key 260 SQL Statement Index 31. manages mass storage devices like hard disks and tape drive. Index Operating System 261 RAID Sequential File Access 32.A file with records, with sequential access file, an average of key comparisons are necessary. 10000, 5500 10000, 5000 262 10000, 4500 10000, 500 33. A perfect hash function map a key to distinct location having search time. O(1) 266 Page 14

O(n) O(n+1) O(n-1) 34. Dead Lock can be prevented by giving each transaction a. Name Clustered Index Cartesian Join Priority 299 35. Wait-for graph is maintained by Lock manager 300 Index Manager View Manager Constraint Manager 36. Which of the following serves as reference point in the log file? Constraints Relations Check points 304 Relationships 37. -------------- occurs when multiple users want to update same object at the same time. Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 38. After execution of commit statement, is updated first. Database Buffer 303 Page 15

Clustered-Index Non-Clustered Index Application Program 39. are called participants, when enrolled in a relationship. Attributes Relations Entities 86 Keys 40. Which of the following constraints enforces Entity Integrity? PRIMARY KEY FOREIGN KEY CHECK NOT NULL 134 FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 2) 1. Which of the following is true about NOT NULL constraint? Enforce domain integrity. Limit the values that can be placed in a column. Prevents any actions that would destroy links between tables with the corresponding data values. 135 Enforces the uniqueness of the values in a set of columns. 2. Which of the following constraints enforces Referential Integrity? FOREIGN KEY page134 CHECK PRIMARY KEY UNIQUE 3. An Entity is defined when the database is physically constructed in DBMS a specific type such as an integer, text, date, logical etc defined by DBMS basic building block of the E-R data model page71 4. is also known as Community View of Database. External Schema Conceptual Schema page37 Page 16

User views Internal Schema 5. On magnetic media, data is stored in Text Images Binary format Tables 6. SQL is an standard computer language ANSI General Cold fusion Interactive 7. Which of the following is one of the purposes of using DDL commands? Inserting records into databases Updating records into databases Manipulating databases creating and destroying databases page 196 8. is used to create and destroy database and database objects DDL page 196 DML DCL ERD 9. is used to read, write, and remove the data from a database SQL page194 ERD Page 17

ANSI Data Model 10. Which of the following gives all the fields from employee table named as EMP? select * from EMP page224 select emp* from EMP select emp_id where EMP select * where EMP 11. Which of the following statements are Data Definition Language commands? GRANT GRANT INSERT 196 UPDATE 12. The ER- data model is an example of: Physical database design Logical database design Relational database design Conceptual database design page 70 13. Consider two sets A and B. A contains 3 elements and B contains 4. How many elements do their Cartesian product contains? 12 129 9 16 7 14. Identify the factor which enforces a relation in 3NF? Relation is in 2nd NF and every non-key attribute is fully functionally dependent on primary key. Relation is in 2nd NF and every non-key attribute is transitive dependent on super key. The domain of attribute may include multiple values. Relation is in 2nd NF and every non-key attribute is non-transitively dependent on primary key. 171 Page 18

15. In 1st Normal Form, we remove Repeating Groups page 167 Transitive Dependency Functional Dependency Multi-valued Dependency 16. Which of the following is INCORRECT regarding De-normalization? It is the process of attempting optimization of Database. It is a technique to move from lower to higher normal forms of database modeling page 187 In this process, it is required to add redundant data. It enhances the performance of DB. 17. Select * from STUDENT, DEPARTMENT is an example of. Cartesian Join page 224 Inner Join Outer Join Full Outer Join 18. Which of the following is not a DDL Command? Create table Alter table Insert into Create database page201 19. Which of the following commands is used to TRUNCATE the table named STUDENT? TRUNCATE TABLE STUDENT page 207 TABLE TRUNCATE STUDENT TABLE STUDENT TRUNCATE STUDENT TABLE TRUNCATE Page 19

20. Suppose there are 5 rows and 4 columns in TABLE1 and 6 rows and 7 columns in TABLE2; what is the size of the Cartesian product incase of CROSS JOIN between these two tables? 30 35 24 28 21. Which of the following is not a feature of effective interface? Effective interfaces can require more work to implement An effective user interface minimizes the time users require to learn and implement the system It helps users to accomplish their tasks and otherwise gets out of the way An effective interface imposes its requirements on users page 239 22. Which of the following is not correct about input forms? Provide an easy, effective, efficient way to enter data into a table Especially useful when the person entering the data is not familiar with the inner workings Provide different controls to add data into the tables One input forms can populate one table at a time page 246 23. is a control that presents a set of choices from which a user can select one or more items; items can be text, graphics, or both. Button page 243 List box Text input 4. The main memory of a computer system is also known as ROM RAM page256 PROM Hard disk Page 20

25. is not a feature of hash access Report. indexes to search or maintain page266 Very fast direct access Inefficient sequential access Use when direct access is needed, but sequential access is not 26. is disadvantage of chaining technique to handle the collisions. Unlimited Number of elements Fast re-hashing Fast re-hashing Overhead of multiple linked lists page269 Maximum number of elements must be known 27. is advantage of Re-Hashing technique to handle the collisions. Collisions don t use primary table space Unlimited number of elements Fast access through use of main table space page 269 Overhead of multiple linked lists 28. Which of the following is NOT a part of Deadlock Resolution? Choose a victim A message is passed to the victim and depending on the system the transaction may or may not be started again automatically. Picking a list of all previously completed transactions and undoing all the updates. Page 323 Rollback `victim' transaction and restart it. 29. Which of the following is true about the views? View can only show few attributes of a table View can not be used for retrieving data View can not be used as security mechanisms We can customize the order of the table fields through Views page280 Page 21

30. Which of the following is not a type of VIEWS? Materialized View Simple Views Complex View Cross Reference View page283 31. A file with records, with sequential access file, an average of key comparisons are necessary. 10000, 5500 10000, 5000 page 262 10000, 4500 10000, 500 32. A perfect hash function map a key to distinct location having search time. O(1) page 266 O(n) O(n+1) O(n-1) 33. Which of following is INCORRECT about Materialized Views? These are suitable in Data Warehouses. These are schema objects which can be use to summaries the data. Page 291 They can not be partitioned. Their existence is transparent to SQL applications and users. 34. is used to detect the dead lock. Wait-for graph page 320 Cross Reference Matrix Inner Join Clustered Index Page 22

35. Wait-for graph is maintained by Lock manager page 320 Index Manager View Manager Constraint Manager 36. Which of the following serves as reference point in the log file? Constraints Relations Check points page 304 Relationships 37. -------------- occurs when multiple users want to update same object at the same time. Lost Update Problem page 308 Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem 38. After execution of commit statement, is updated first. Database Buffer page 303 Clustered-Index Non-Clustered Index Application Program 39. To select the range while creating Indexes, the operator that is not used is. Equals to (==). Less than (<) And (&&) Between Page 23

40. DBA is responsible for Monitoring Disk Space Database Backup page25 Managing Print Jobs Development of Database Application Programs FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems 1. Maximum Cardinality shows that how many of one entity can be placed in another relation at most. Keys Instances 91 page Attributes Relationships 2. A shared collection of logically related data is known as Database page 10 File Processing System Program and Data Interdependence DBMS 3. Metadata is also known as for the real world data. Attribute Schema 23 Entity Relation 4. provides the change transparency between Conceptual and External level. Physical Data Independence 45 Concurrency Control Logical Data Independence Functional Dependency 5. User rights information is stored in. Conceptual Database A user accessible Catalog 46 Logical Database Buffer Page 24

6. Which of the following types of partitioning reduces the chances of unbalanced partitions? Vertical List Hash 189 Range 7. In which of the following situations, Clustering is suitable: Frequently updating Relatively static 192 Frequently deletion Relatively dynamic 8. Vertical partitioning is done on the basis of Attributes 191 Rows Clustering Replication 09. Which of the following is one of the purposes of using DML commands? Creating databases Destroying databases Inserting data in tables 196 Create table 10. is used to create and destroy database and database objects ERD DCL DDL 196 DML 11. is used to read, write, and remove the data from a database SQL 196 ERD ANSI Data Model 12. Which of the following gives all the fields from employee table named as EMP? select * from EMP select emp* from EMP select emp_id where EMP select * where EMP 13. Which of the following SQL keywords is not used with DDL statements? Table Update 234 Create Alter Page 25

14. Which of the following statements are Data Definition Language command? INSERT 196 GRANT ALTER UPDATE 15. Which of the following is true about relational table? The sequence of columns is significant. The sequence of rows is significant. Contains only derived attributes. Contains only derived attributes. 16. If W, X, Y and Z are attributes of a relation, which of the following inference rules for functional dependencies is correct? If X Y then Y -> X If X -> Y then (X, Z) -> (Y,W) If X -> Y,Z then X -> Y If (X, Z) -> Y then X -> Y and Z -> Y 17. is used to sort the result set in ascending or descending order From Clause Where Clause Order by Clause 220 Group by Clause 18. Which of the following commands is used to drop the table named STUDENT? DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 19. Which of the following is NOT a feature of a good interface? data structure based user friendly consistency process based 243 20. Which of the following is the activity, which is not performed during the development of application programs? Data input programs Editing Display Data Collection 238 Page 26

21. is a control that users click to perform an action. Input form 246 Report Button Text box 22. is an example of non-volatile memory. SRAM Cache Memory Flash memory 256 DRAM 23. is an example of volatile memory. RAM ROM Flash memory 256 CPU 24. What is the impact of setting multiple indexes for the same key? Multiple indexes for the same key can not be set It increases efficiency 263 It decreases efficiency It will increase complexity as the access time will be increased 25. Which of the following is incorrect regarding Indexes? It can not be created on composite attributes. Index can be defined even when there is no data in the table. It supports Range selections. It can be created using Create Index statement. 273 26. Which of the following SQL Command will DROP a view named STUDENT DROP VIEW STUDENT 288 DROP FROM STUDENT VIEW DELETE STUDENT FROM VIEW DELETE ALL STUDENT VIEW 27. Which of the following is NOT CORRECT Regarding VIEWS? VIEWS can be used to interact with the database. 281 Through VIEWS users can focus on their interested data. VIEW can show one or more records from a database. VIEW cannot be updated VIEW cannot be updated CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST Page 27

29. Which of the following command shows all the columns from PRODUCT-VIEW? SELECT * FROM PRODUCT-VIEW 286 SELECT PRODUCT-VIEW SHOW ALL PRODUCT-VIEW PRODUCT-VIEW SELECT 30. must identify a record in the table, uniquely. Hash Algorithm Key 260 SQL Statement Index 31. A file with records, with sequential access file, an average of key comparisons are necessary. 10000, 5500 10000, 5000 262 10000, 4500 10000, 500 32. Which of the following is INCORRECT about Database Transaction? It can only end in one way, which is ROLLBACK 295 It must preserve the consistency of the database. It must follow the ACID properties. It is seen by the DBMS as a list of actions. 33. Which of the following is not a feature of Database Transaction? Users should be able to regard the execution of each transaction as atomic. It must follow the ACID properties. Either all actions of a Transaction are carried out or none are. Transaction always affects the every other concurrent transaction. 294 34. is used to detect the dead lock. Wait-for graph 320 Cross Reference Matrix Inner Join Clustered Index 35. While recovering data, which of the following files does a Recovery Manager examines at first? Clustered Index Log file 303 Data dictionary Metadata Page 28

36. -------------- occurs when multiple users want to update same object at the same time. Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 37. After execution of commit statement, is updated first. Database Buffer 303 Clustered-Index Non-Clustered Index Application Program 38.. It is not necessary for any super type entity to have its entire instance set to be associated with any of the subtype entity, is called as. Partial Completeness 103 Disjoint Overlap Complete Overlap Total Completeness 39. is an abstraction of a relationship. Relationship Type 85 Relationship Name Relation Type Relation Name 40. DBA is not responsible for Monitoring Disk Space Database Backup Managing Print Jobs Development of Database Application Programs 29 Page 29