Resources » Articles/Knowledge Sharing » Placement Papers

Important questions on DBMS


Posted Date: 29-Feb-2008  Last Updated:   Category: Placement Papers    
Author: Member Level: Gold    Points: 5



DBMS

1.Following are the advantages of DBMS?
a.Redundancy is controlled
b.unauthorized access is restricted
c.Doesnt enforce integrity constraints
d.both a & b
2.levels of data abstraction available?
a) 1 b)2 c) 3 d)4
3.The highest level of abstraction describes only part of entire database.
a.Physical level b)logical level c)view level d)both b and c
4.A collection of conceptual tools for describing data, data relationships
data semantics and constraints.
a)data model b)E-R model c)object oriented model d)none
5.This data model is based on real world that consists of basic objects called
entities and of relationship among these objects
a)data model b)E-R model c)object oriented model d)none
6.A'thing' in the real world with an independent existence
a)entity b)model c)both a and b d)none of these
7.A data base schema that is specified by a set of definitions expressed by a
special language is called
a)DDL b)VDL c)DML d)SDL
8.The language that is used to specify the internal schema is
a)DDL b)VDL c)DML d)SDL
9.The process of analysing the given relation schemas based on their Functional
Dependencies is known as
a)Dependency b)normalization c)both a and b d)none
10.A relation schema R is in ____ if it is in 1NF and every non-prime attribute
A in R is fully functionally dependent on primary key.
a)1 NF b)2 NF c)3 NF d)BCNF
11.A relation schema R is in ____ if it is in 3NF and satisfies an additional
constraint that for every FD X A, X must be a candidate key
a)1 NF b)2 NF c)3 NF d)BCNF
12.The set of attributes that can uniquely identify weak entities and that
are related to same owner entity is
a)Partial key b)alternate key c)artificial key d)compound key
13.All Candidate Keys excluding the Primary Key are known as ___
a)Partial keys b)alternate keys c)artificial keys d)compound keys
14.When one of the data elements stored within a construct is utilized as the primary
key, then it is called the....
a)alternate key b)natural key c)compound key d)partial key
15.The technique for determining how quickly specific data can be found is known as__
a)normalization b)data manipulating c)indexing d)none of these
16.Number of types of indexing ...
a)1 b)4 c)5 d)2
17.The phase that identifies an efficient execution plan for evaluating a query that has
the least estimated cost is referred to as
a)query generation b)query optimization c)dependency d)redundancy
18.The concept which is used to model a relationship between a collection of entities and
relationships...
a)atomicity b)aggregation c)deadlock d)both a and b
19.By taking ______, the DBMS can reduce the amount of work to be done during restart
in the event of subsequent crashes
a)dead lock b)atomicity c)aggregations d)checkpoints
20.Number of transaction phases available
a)1 b)2 c)3 d)4
21.Concatenation of every row in one relation with every row in another
a)product b)join c)insertion d)none of these
22.Concatenation of rows from one relation and related rows from another
a)product b)join c)insertion d)none of these
23.Major sets of files on disk that compose a database
a)database files b)control files c)redo logs d)all the above
24._____is a PL/SQL block that can defined to automatically execute for insert, update, and
delete statements against a table
a)database b)database trigger c)both a and b d)none of these
25.Stored procedures are used to ____
a)increase the network traffic
b)Remove the network traffic
c)reduce the network traffic
d)block the network traffic
26.Tables derived from the ERD
a) Are totally unnormalised
b) Are always in 1NF
c) Can be further denormalised
d) May have multi-valued attributes

27.Spurious tuples may occur due to
i. Bad normalization
ii. Theta joins
iii. Updating tables from join
a) i & ii b) ii & iii
c) i & iii d) ii & iii

28.A B C is a set of attributes. The functional dependency is as follows
AB -> B
AC -> C
C -> B
a) is in 1NF
b) is in 2NF
c) is in 3NF
d) is in BCNF
29.In mapping of ERD to DFD
a) entities in ERD should correspond to an existing entity/store in DFD
b) entity in DFD is converted to attributes of an entity in ERD
c) relations in ERD has 1 to 1 correspondence to processes in DFD
d) relationships in ERD has 1 to 1 correspondence to flows in DFD
30.A dominant entity is the entity
a) on the N side in a 1 : N relationship
b) on the 1 side in a 1 : N relationship
c) on either side in a 1 : 1 relationship
d) nothing to do with 1 : 1 or 1 : N relationship
31.Select 'NORTH', CUSTOMER From CUST_DTLS Where REGION = 'N' Order By
CUSTOMER Union Select 'EAST', CUSTOMER From CUST_DTLS Where REGION = 'E' Order By CUSTOMER
The above is
a) Not an error
b) Error - the string in single quotes 'NORTH' and 'SOUTH'
c) Error - the string should be in double quotes
d) Error - ORDER BY clause
32._____is a program module that provides the interface between the low-level data stored
in database, application programs and queries submitted to the system
a)storage manager
b)buffer manager
c)transaction manager
d)file manager
33.____is a program module, which is responsible for fetching data from disk storage into main
memory and deciding what data to be cache in memory
a)storage manager
b)buffer manager
c)transaction manager
d)file manager
34.____is a program module, which ensures that database, remains in a consistent state despite
system failures and concurrent transaction execution proceeds without conflicting
a)storage manager
b)buffer manager
c)transaction manager
d)file manager
35._______is a program module, which manages the allocation of space on disk storage and data
structure used to represent information stored on a disk
a)storage manager
b)buffer manager
c)transaction manager
d)file manager
36.copying the three sets of files (database files, redo logs, and control file) when the
instanceis shut down is known as ____
a)cold backup b)hot backup
37.Which is the subset of SQL commands used to manipulate Oracle Database structures, including
tables?
a)DDL b)DML c)VDL d)DSL
38.What operator performs pattern matching?
a)LIKE b)NULL c)NOT NULL d)IS NULL
39.What will be the output of the following query?
SELECT DECODE(TRANSLATE('A','1234567890','1111111111'), '1','YES', 'NO' );
a)1 b)YES c)NO d)YESNO
40.What will be the output of the following query?
SELECT REPLACE(TRANSLATE(LTRIM(RTRIM('!! ATHEN !!','!'), '!'), 'AN', '**'),'*','TROUBLE') FROM DUAL;
a)TROUBLE
b)ATHENTROUBLE
c)THETROUBLE
d)TROUBLETHETROUBLE


Did you like this resource? Share it with your friends and show your love!




Responses to "Important questions on DBMS"

No responses found. Be the first to respond...

Feedbacks      

Post Comment:




  • Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
  • No HTML formatting and links to other web sites are allowed.
  • This is a strictly moderated site. Absolutely no spam allowed.
  • Name:   Sign In to fill automatically.
    Email: (Will not be published, but required to validate comment)



    Type the numbers and letters shown on the left.


    Submit Article     Return to Article Index

    Awards & Gifts
    Active Members
    TodayLast 7 Daysmore...

    ISC Technologies, Kochi - India. Copyright © All Rights Reserved.