Sunday, August 3, 2014

DBMS IMPORTANT QSN ANSWER

What is a database? Describe the advantages and disadvantages of using of DBMS. (7)
Ans: Database – A database is a collection of related data and/or information stored so that it is available to many users for different purposes.
Advantages Of DBMS
1.
Centralized Management and Control - One of the main advantages of using a database system is that the organization can exert, via the DBA, centralizedmanagement and control over the data.
2.
Reduction of Redundancies and Inconsistencies - Centralized control avoids unnecessary duplication of data and effectively reduces the total amount of data storage required. Removing redundancy eliminates inconsistencies.
3.
Data Sharing - A database allows the sharing of data under its control by any number of application programs or users.
4.
Data Integrity - Data integrity means that the data contained in the database is both accurate and consistent. Centralized control can also ensure that adequate checks are incorporated in the DBMS to provide data integrity.
5.
Data Security - Data is of vital importance to an organization and may be
confidential. Such confidential data must not be accessed by unauthorized persons.The DBA who has the ultimate responsibility for the data in the DBMS can ensure that proper access procedures are followed. Different levels of security could be implemented for various types of data and operations.
6.
Data Independence - Data independence is the capacity to change the schema at one level of a database system without having to change the schema at the next level. It is usually considered from two points of view: physical data independence and logical data independence. Physical data independence is the capacity to change the internal schema without having to change conceptual schema. Logical data independence is the capacity to change the conceptual schema without having to
change external schemas or application programs.
7.
Providing Storage Structures for Efficient Query Processing - Database systems provide capabilities for efficiently executing queries and updates. Auxiliary files called indexes are used for this purpose.
8.
Backup and Recovery - These facilities are provided to recover databases from hardware and/or software failures.
Some other advantages are:
Reduced Application Development Time
Flexibility
Availability of up-to-date Information
Disadvantages Of DBMS
1.
Cost of Software/Hardware and Migration - A significant disadvantage of theDBMS system is cost.
2.
Reduced Response and Throughput - The processing overhead introduced by the DBMS to implement security, integrity, and sharing of the data causes a degradation of the response and throughput times.
3.Problem with Centralization - Centralization also means that the data is accessible from a single source namely the database. This increases the potential of security breaches and disruption of the operation of the organization because of downtimes and failures.






IMP: ACID PROPERTIES
Desirable properties of transaction:
To ensure integrity of data, we require the database system maintain the following properties of
the transaction.
1. Atomicity: either all operations of a transaction is reflected in database or none.
2. Consistency: execution of a transaction in isolation preserves consistency of database.
3. Isolation: even though multiple transactions are executing concurrently, each transaction
is unaware of other transaction.
4. Durability: after a transaction completes, the changes it has made persists.
These properties are also called ACID properties.
Example:
Let, Ti: read(A);
A:=A-50;
Write(A);
Read(B);
B:=B+50;
Write(B);
Consistency:
In this case consistency requirement here is that the total sum of A and B should always be same
i.e. before and after the transaction is executed. In this case consistency property of the transaction
prevents the unwanted creation of a destroying of money.
Ensuring consistency for an individual transaction is the responsibility of the application programmer who codes the transaction.
Atomicity:
Suppose that failure occur after write(A) operation but before write(B) operation. Hence the values reflected in the database becomes A=950 and B=2000, which is not the true value. Hence
transaction should be completed in its entirety of not at all.
Durability:
Once the execution of the transaction completed successfully and the user who initiated the transaction has been notified that the transfer of the fund has taken place, it must be the case that no
system failure will result in a loss of data corresponding to this transfer of funds.
Isolation:
Let a transaction T1 transfer Rs 50 from account A to B. While T1 reads and subtracts 50 from account A but before it was updated to account B a new transaction (T2) interrupts which reads from
account A and B. the value read by transaction T2 is A=950 and B=2000 (initial values of A=1000 and
B=2000).
Hence in order to maintain consistency isolation of transaction is required. In order to maintain isolation serial execution of transaction and use of concurrency control mechanism should be used.


What are deadlocks? How can they be avoided?
(4)
Ans: Deadlock refers to a specific condition when two or more processes are each waiting for another to release a resource, or more than two processes are waiting for resources in a circular chain. Deadlock is a common problem in multiprocessing where
many processes share a specific type of mutually exclusive resource known as a software, or soft, lock. Computers intended for the time-sharing and/or real-time markets are often
equipped with a hardware lock (or hard lock ) which guarantees exclusive access to processes, forcing serialization. Deadlocks are particularly troubling because there is nogeneral solution to avoid (soft) deadlocks.
One of the methods of deadlock avoidance related to timestamps there are two variations: wait-die and wound-wait

Define and differentiate between the following :-
(i) Deadlock prevention.
(ii) Deadlock detection.
(iii) Deadlock avoidance.
(6)
Ans:
(i) Deadlock prevention: These protocols ensure that the system will never enter a deadlock state. There are two approaches to deadlock prevention. One approach ensures
that no cyclic waits can occur by ordering the requests for locks, or requiring all locks to be acquired together. The other approach is closer to deadlock recovery, and performs
transaction rollback instead of waiting for a lock, whenever the wait could potentially result in a deadlock. In this approach two timestamp based techniques are there : wait –
die and wound – wait . In wait –die, the older transaction is allowed to wait if it needs data from older transaction. In wound - wait, the younger transaction is rolled back if it
needs data from older transaction if older transaction needs data currently held by a younger transaction, however younger transaction is allowed wait if it needs data from
older transaction.
(ii) Deadlock detection: If a system does not employ some protocol that ensures deadlock freedom, then a detection and recovery scheme must be used. An algorithm that
examines the state of the system is invoked periodically to determine whether a deadlock has occurred. If one has, then the system must attempt to recover from the deadlock.
(iii) Deadlock avoidance : These protocols also ensure that the system will never enter a deadlock state but the way it is done is different from deadlock prevention. In this
whenever a transaction requests for some data, the system consider the resources currently allocated to each process and the future requests and releases of each process
currently allocated to each process and the future requests and releases of each process, to decide whether the current request can be satisfied or must wait to avoid a possible future deadlock. In this the transactions have to give additional information about how the data
will be requested in future.


Most asked :
Explain the shadow paging recovery technique.
(8)
Ans: Shadow paging is a technique used to achieve atomic and durable transactions, and provides the ability to manipulate pages in a database. During a transaction, the pages
affected by the transaction are copied from the database file into a workspace, such as volatile memory, and modified in that workspace. When a transaction is committed, all of
the pages that were modified by the transaction are written from the workspace to unused pages in the database file. During execution of the transaction, the state of the database exposed to the user is that in which the database existed prior to the transaction, since the
database file still contains the original versions of the modified pages, as they existed before being copied into the workspace. If a user accesses the database before the transaction is complete, or upon recovery of a failure, it will appear as though the transaction has not occurred


post10) What are deferred modification and immediate modification technique for recovery?
How does recovery takes place in case of a failure in these techniques?
(7)
Ans:
Deferred Update – The deferred update techniques do not physically update the database on disk until after a transaction reaches its commit point; then the updates are recorded in the database. In other words, deferred update techniques postpone any actual updating of the database on disk until a transaction reaches its commit point. The transaction force-writes the log to disk before recording the updates in the database.
Immediate Update – The immediate update techniques may apply changes to the database on disk before the transaction reaches a successful conclusion. However, these changes are typically recorded in the log on disk by force writing before they are applied
to the database, making recovery still possible.
Recovery – In deferred update technique, if a transaction fails before reaching its commit point, it will not have changed the database in any way, so UNDO is not needed. Deferred update can lead to a recovery algorithm known as NO-UNDO/REDO. This approach, when used with certain concurrency control methods, is designed never to
require transaction rollback, and recovery simply consists of redoing the operations of transactions committed after the last checkpoint from the log. In immediate update technique, if a transaction fails after recording some changes in the database but before reaching its commit point, the effect of its operations on the database must be undone; that is, the transaction must be rolled back. This technique requires both operations and is used most often in practice. Therefore, it is also known as UNDO/REDO.


post 9) Define check point and its impact on data base recovery.
(3)
Ans:
In a large on-line database system there could be hundreds of transactions handled per minute. The log for this type of database contains a very large volume of
information. A scheme called checkpoint is used to limit the volume of log information that has to be handled and processed in the event of a system failure involving the loss of volatile information. The checkpoint scheme is an additional component of the logging scheme. A checkpoint operation, performed periodically, copies log information onto stable storage. For all transactions active at checkpoint, their identifiers and their database modification actions, which at that time are reflected only in the database buffers, will be propagated to the appropriate storage.

MostAsked
How does the two phase protocol ensure serializability in database schedules?
(4)
Ans:
A transaction is said to follow the two-phase locking protocol if all locking
operations precede the first unlock operation in the transaction. Such transaction can be divided into two phases: and expanding or growing (first) phase and a shrinking (second) phase. The two-phase locking protocol ensures serializability in database schedules.
Consider any transaction. The point in the schedule where the transaction has obtained its final lock (the end of its growing phase) is called the lock point of the transaction. Now,transactions can be ordered according to their lock points – this ordering is, in fact, a serializability ordering for the transactions

Differentiate between
(i) Procedural and non procedural languages.
(ii) Key and superkey
(iii) Primary and secondary storage
Ans: (i) Procedural and non procedural languages - A procedural language specifies the operations to be performed on the existing data to derive the results. It also specifies the sequence of operations in which they will be performed. But, a non procedural language specifies only the result or information required not how it is obtained.
(ii)
Key and superkey - A key a single attribute or a combination of two or more attributes of an entity set that is used to identify one or more instances (rows) of the set (table). If we add some additional attributes to a primary key then that augmented key is called as super key. Therefore, the primary key is the minimum super key .
(iii)
Primary and secondary storage – Primary storage device stores the data
temporarily. Primary storage is generally used by the processing unit to temporary store the data, intermediate results, and the final results before storing to the secondary storage
because the secondary storage devices are not directly accessible by the CPU. But, if we want to store data permanently then the secondary storage devices are required.Secondary storage devices are slower than the primary storage devices.

post 6) Explain the concept of a data model. What data models are used in database management systems? (8)
Data Model – Model is an abstraction process that hides irrelevant details while highlighting details relevant to the applications at hand. Similarly, a data model is a collection of concepts that can be used to describe structure of a database and provides the
necessary means to achieve this abstraction. Structure of database means the data types,relationships, and constraints that should hold for the data. In general a data model consists of two elements:
- A mathematical notation for expressing data and relationships.
• Operations on the data that serve to express queries and other manipulations of the data.
Data Models used in DBMSs:
Hierarchical Model - It was developed to model many types of hierarchical
organizations that exist in the real world. It uses tree structures to represent relationship among records. In hierarchical model, no dependent record can occur without its parent record occurrence and no dependent record occurrence may be connected to more than one parent record occurrence.
Network Model - It was formalised in the late 1960s by the Database Task Group of the Conference on Data System Language (DBTG/CODASYL). It uses two different data structures to represent the database entities and relationships between the entities, namely record type and set type . In the network model, the relationships as well as the navigation through the database are predefined at database creation time.
Relational Model - The relational model was first introduced by E.F. Codd of the IBM Research in 1970. The model uses the concept of a mathematical relation (like a table of values) as its basic building block, and has its theoretical basis in set theory and first-order predicate logic. The relational model represents the database as a collection of relations .
Object Oriented Model – This model is based on the object-oriented programming language paradigm. It includes the features of OOP like inheritance, object-identity,encapsulation, etc. It also supports a rich type system, including structured and collection types.
Object Relational Model – This model combines the features of both relational model and object oriented model. It extends the traditional relational model with a variety of features such as structured and collection types.


Post 5) Explain the concepts of relational data model.
disadvantages.Also discuss its advantages
Relational Data Model – The relational model was first introduced by Prof. E.F. Codd of the IBM Research in 1970 and attracted immediate attention due to its simplicity and mathematical foundation. The model uses the concept of a mathematical relation (like a table of values) as its basic building block, and has its theoretical basis in set theory and
first-order predicate logic. The relational model represents the database as a collection of relations. The relational model like all other models consists of three basiccomponents:
a set of domains and a set of relations
operation on relations
integrity rules
Advantages
• Ease of use – The revision of any information as tables consisting of rows and columns is quite natural and therefore even first time users find it attractive.
• Flexibility – Different tables from which information has to be linked and extracted can be easily manipulated by operators such as project and join to give information in the form in which it is desired.
• Security – Security control and authorization can also be implemented more easily by moving sensitive attributes in a given table into a separate relation with its own authorization controls. If authorization requirement permits, a particular attribute could be joined back with others to enable full information retrieval.
• Data Independence – Data independence is achieved more easily with normalization structure used in a relational database than in the more complicated tree or network structure. It also frees the users from details of storage structure and access methods.
• Data Manipulation Language – The possibility of responding to ad-hoc query by means of a language based on relational algebra and relational calculus is easy in the
relational database approach. Provides simplicity in the data organization and the availability of reasonably simple to very powerful query languages.
Disadvantages
• Performance – If the number of tables between which relationships to be established are large and the tables themselves are voluminous, the performance in responding to queries is definitely degraded.
• Unsuitable for Hierarchies – While the relational database approach is a logically attractive, commercially feasible approach, but if the data is for example naturally organized in a hierarchical manner and stored as such, the hierarchical approach may give better results.

 explain the three level architecture of the database system.
A DBMS provides three levels of data is said to follow three-level architecture. The goal of the three-schema architecture is to separate the user applications and the physical database. The view at each of these levels is described by a schema. The processes of transforming requests and results between levels are called mappings. In this architecture,schemas can be defined at the following three levels:
External Level or Subschema –
It is the highest level of database abstraction where only those portions of the database of concern to a user or application program are
included. Any number of user views (some of which may be identical) may exist for a given global or conceptual view. Each external view is described by means of a schema called an external schema or subschema.
Conceptual Level or Conceptual Schema -
At this level of database abstraction all the database entities and the relationships among them are included. One conceptual view
represents the entire database. This conceptual view is defined by the conceptual schema. There is only one conceptual schema per database. The description of data at this level is in a format independent of its physical representation. It also includes features that specify the checks to retain data consistency and integrity.
Internal Level or Physical Schema –
It is closest to the physical storage method used. It indicates how the data will be stored and describes the data structures and access methods to be used by the database. The internal view is expressed by the internal schema.

Explain five duties of Database Administrator.
(5)
Ans:
1. DBA administers the three levels of the database and, in consultation with the overall user community, sets up the definition of the global view or conceptual level of the database.
2. Mappings between the internal and the conceptual levels, as well as between the conceptual and external levels, are also defined by the DBA.
3. DBA ensures that appropriate measures are in place to maintain the integrity of the database and that the database is not accessible to unauthorized users.
4. DBA is responsible for granting permission to the users of the database and stores the profile of each user in the database.
5. DBA is responsible for defining procedures to recover the database from failures with minimal loss of data.
2)Explain the terms primary key, candidate key and foreign key.
Ans:
Primary Key – Primary key is one of the candidate keys that uniquely
identifies each row in the relation.
Candidate Key – A candidate key of an entity set is a minimal superkey, that uniquely identifies each row in the relation.
Foreign Key – Let there are two relations (tables) R and S. Any candidate key of the relation R which is referred in the relation S is called the foreign key in the relation S and referenced key in the relation R. The relation R is also called as parent table and relation S is also called as child table.
:


Saturday, August 2, 2014

Tuesday, July 29, 2014

LICENSING AND ITS TYPES

What is licensing ?

- Agreement or contract between software publisher and end user
- Also called EULA (End user license agreement)
- Protects copyright by placing restriction in use of software
- Restrictions like duplication , modification , Using for other purpose , Redistribution etc.
- Restricts reverse engineering and piracy
- kind of disclaimer and it approves that publisher is not liable for any kind of harm from software
- Some use shrinkwrap as license acceptance some as clickwrap
- Shrinkwrap is like forceful licensing ,If seal broken Non returnable
- Invalid licensing
- In Clickwrap ,license embeded in software itself , User can abort installation if he doesn't agree with terms
- Many types of licensing
- Freeware is less restrictive as compared to shareware/Retail softwares
- Shareware gives freedom to unlimited download but restrict the modification in software
- in public domain license , No restriction is posed , All products belongs to public not a particular vendor

Types of licensing:

- Licensing is a legally binding agreement which specifies the term of use of application and defines right of software producer and end user
- All software must be legally licensed before installation
- 3 types
a) Based on mode of contract
- Negotiable
- Non-negotiable
- Shrink wrap
- click wrap
b) Based on relation between parties
- Developer publisher
-- Publisher distributor
c) Based on freedom of use
- proprietary
- Free license
- Open source license
- Workstation
- perpetual 
Non perpetual
- site license
- Concurrent use
- license with maintenance

Based On Freedom :


a)Proprietary License :
- Most softwares are proprietary
- Publisher grants one/more copies to the user but ownership of these copies remains to publisher
- user must accept license before using
- Most restrictive form of license
- User have no right to modify , copy , Redistribute
- All right to copyright holder , limited right to users
- closed source
- May be free or paid
- eg: Microsoft windows , adobe photoshop , Maya , FIFA , GTA vice city etc.
b)Free/Open source license(mainly GnuGPL but other too):
- More freedom than proprietary
- No copyright laws
- Matter of freedom instead price
- Ownership not limited to publisher
- Less restrictive
- license do'not restrict users from use in any way
- Mostly free
- Credit must given to original developer if modified
- No personal ownership
- Anyone can modify source code
2 types:
Copyleft and permissive free software license
GNUGPL:
- Defines free and open source licensing guidelines
- May change source code but refinement must be licensed under GNUGPL
- eg: hami vlc media player ko code edit garera Different version banayera distribute garna sakchhau , but license chai gnuGPL mai garnupar6
- also called free/copyleft license
- May be free or paid
- GNU : Gnu's not unix , Founder richard stallman
- Linux , VLc etc are licensed under GNUGPL
**more about free and open source license in chapter 2 , 'll post soon**
d)Workstation license: 
- Permits installation of application in single pc 
- You may not install app on more machine until purchasing license for each machine
- user can make backup of software only for recovery
e)concurrent use license:
- You can use in multiple pc as long as it doesn't exceed number of license which u have purchased
- used in license manager
f)Site license: 
- only for use in particular sites like school,university,Research center etc.
g) Perpetual license:
- License without expiration 
- No need to pay fees 
- Forever license
h)Non-Perpetual:
- Lease software for particulat period of time
- It may be annual,bi-annual 
- If date ceased , need to pay fee
- Software must removed after date
i) License with maintainance:
- Must purchase maintainance
- pay assurance fee with license fee
B)Based on Mode of contract:
a)negotiable : Both parties negotiate to make valid contract
b)Non-negotiable : Predefined terms and condition
c)Shrink-wrap : Software bundled with plastic seal
d)Click-wrap: EULA embeded in Software itself
C)Based on Relation between parties:
a) Developer-publisher: Negotiation between developer and publisher , about royalty issues
b) Publisher-distributor: Where to distribute , How to distribute , About profit sharing
Thanks ,,,,Hit Like for support ..
Lau dude haru ramrosanga padha

Friday, June 6, 2014

Purbanchal University Old question Of microprocessor

Old Question Purbanchal University 2014  ,2013

Answer 5 Questions .. 

(a) -> 8 marks , (b,c) -> 4 marks Each 

Subject : Microprocessor 


1(a) Draw the timing diagram for memory write operation and explain it .
1(b) If a microprocessor is of 8 bit , what does it specify ? Write application of Microprocessor .
1(c)  Write down an assembly level program in 8085 that will count the odd numbers stored in location c000H And C0009h . Also store the count at E000h location.

2(a) What is interrupt ? Classify it on the basis of priority . Also mention its importance .

2(b) Explain about RS-232 c Physical layer standards with its application .
2(c) Write about the output Of the Following Program . 

Lxi sp 4400h
lxi b 1234h
lxi d 2678h
PUSH B
PUSH D
POP B
POP D
HLT

3(a) Draw the block diagram of 8086 microprocessor . Explain about Each Blocks .

3(b) What are the adressing modes of 8085 microprocessor ? Explain in brief .

3(c) Write an ALP in which there are 16 bit data and are stored in 2 tables starting at D000H  and E000H , 10 data in each table . Add corresponding data and store it in third table starting from F000H in 8085.

4(a) Draw the Block diagram of 8255a PPI and Explain about its different Modes of operation .

4(b) Iterface 1kb EEPROM with the microprocessor using 3x8 decoder . Find the address range .

4(c) Differentiate between 8085 and 8086 Microprocessor.

5(a) Write an ALP in 8085 that will arrange the 10 bits data stored from location D000H in descending order .

5(b) Write an ALP that will complement the contents of program status word (PSW) . 

5(c) What do You mean by i/o interface ? Explain About its types .

6(a) What do you Mean By assembler directive ? Explain about its types .

6(b) Explain about the importance of virtual Memory.
6(c) Write about the flag registers of 8086 Microprocessor .

The End And BEst of Luck ...




And of 2013 Here ,,,



Tuesday, May 27, 2014

DBMS OBJECTIVE QUESTIONS SET 3

Choose the correct or the best alternative in the following:

Q.1  Which of the following relational algebra operations do not require the participating
tables to be union-compatible?
(A)Union  (B) Intersection
(C)  Difference  (D)  Join
Ans: (D)
Q.2  Which of the following is not a property of transactions?
(A)  Atomicity  (B)Concurrency
(C)  Isolation  (D)  Durability
Ans: (B)
Q.3  Relational Algebra does not have
(A)  Selection operator.  (B)  Projection operator.
(C)  Aggregation operators.  (D)  Division operator.
Ans: (C )
Q.4  Checkpoints are a part of
(A)  Recovery measures.  (B)  Security measures.
(C )  Concurrency measures.  (D)Authorization measures.
Ans: (A)
Q.5  Tree structures are used to store data in
(A)  Network model.  (B)  Relational model.
(C)Hierarchical model. (D)  File based system.
Ans: (C )
Q.6  The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is
(A)  Procedural DML.  (B)  Non-Procedural DML.
(C)Procedural DDL.  (D)  Non-Procedural DDL.
Ans: (B)
Q.7  Precedence graphs help to find a
 (A)  Serializable schedule.  (B)  Recoverable schedule.
(C)  Deadlock free schedule.  (D)  Cascadeless schedule.
Ans: (A)
Q.8  The rule that a value of a foreign key must appear  as a value of some specific table is
called a
(A)Referential constraint.  (B) Index.
(C)  Integrity constraint.  (D)  Functional dependency.
Ans: (A)  The rule that a value of a foreign key must appear  as a value of some specific
table is called a referential constraint. (Referential integrity constraint is concerned with
foreign key)
Q.9  The clause in SQL that specifies that the query result should be sorted in ascending or
descending order based on the values of one or more columns is
(A)View  (B)  Order by
(C)  Group by  (D)  Having
Ans: (B)  The clause in SQL that specifies that the query result should be sorted in
ascending or descending order based on the values of one or more columns is ORDER
BY. (ORDER BY clause is used to arrange the result of the SELECT statement)
Q.10  What is a disjoint less constraint?
(A)  It requires that an entity belongs to no more than one level entity set.
(B)  The same entity may belong to more than one level.
(C)The database must contain an unmatched foreign keyvalue.
(D)  An entity can be joined with another entity in the same level entity set.
Ans: (A) Disjoint less constraint requires that an entity belongs to no more than one level
entity set. (Disjoint less constraint means that anentity can be a member of at most one of
the subclasses of the specialization.)
Q.11  According to the levels of abstraction, the schema at the intermediate level is called
(A)  Logical schema.  (B)  Physical schema.
(C)  Subschema.  (D)  Super schema.
Ans: According to the levels of abstraction, the schema at the intermediate level is called
conceptual schema.
(Note:All the options given in the question are wrong.)
Q.12  It is an abstraction through which relationships are treated as higher level entities
(A)  Generalization.  (B)  Specialization.
(C)  Aggregation.  (D)  Inheritance.
Ans: (C )  It is an abstraction through which relationships are treated as higher level
entities Aggregation. (In ER diagram, aggregation is used to represent a relationship as an
entity set.)
Q.13  A relation is in ____________ if an attribute of acomposite key is dependent on an
attribute of other composite key.
(A)  2NF  (B)  3NF
(C)  BCNF  (D)  1NF
Ans: (B)  A relation is in 3 NF if an attribute of a composite key is dependent on an
attribute of other composite key. (If an attribute  of a composite key is dependent on an
attribute of other composite key then the relation  is not in BCNF, hence it has to be
decomposed.)
Q.14 What is data integrity?
(A)  It is the data contained in database that is non redundant.
(B)  It is the data contained in database that is accurate and consistent.
(C)  It is the data contained in database that is secured.
(D)  It is the data contained in database that is shared.
Ans: (B)  (Data integrity means that the data must be valid according to the given
constraints. Therefore, the data is accurate and consistent.)
Q.15  What are the desirable properties of a decomposition
(A)  Partition constraint.  (B)  Dependency preservation.
(C)  Redundancy.  (D)  Security.
Ans: (B) What are the desirable properties of a decomposition – dependency preserving.
(Lossless join and dependency preserving are the two goals of the decomposition.)
Q.16  In an E-R diagram double lines indicate
(A)Total participation.(B)  Multiple participation.
(C)  Cardinality N.  (D)None of the above.
Ans: (A)
Q.17 The operation which is not considered a basic operation of relational algebra is
(A)  Join.  (B)Selection.
(C)  Union.  (D)  Cross product.
Ans: (A)
Q.18 Fifth Normal form is concerned with
(A)  Functional dependency.  (B)  Multivalued dependency.
(C)Join dependency.  (D)Domain-key.
Ans: (C)
Q.19  Block-interleaved distributed parity is RAID level
(A)  2.  (B)  3
(C)  4.  (D)  5.
Ans: (D)
Q.20  Immediate database modification technique uses
(A)Both undo and redo.  (B)Undo but no redo.
(C)Redo but no undo.  (D)Neither undo nor redo.
Ans: (A)
Q.21  In SQL the statement select * from R, Sis equivalent to
(A)  Select * from R natural join S.  (B)  Select * from R cross join S.
(C)  Select * from R union join S.  (D)  Select * from R inner join S.
Ans: (B)
Q.22  Which of the following is not a consequence of concurrent operations?
(A)  Lost update problem.  (B)  Update anomaly.
(C)Unrepeatable read.  (D) Dirty read.
Ans: (B)
Q.23  As per equivalence rules for query transformation, selection operation distributes over
(A)  Union.  (B)  Intersection.
(C)  Set difference.  (D)  All of the above.
Ans: (D)
Q.24  The metadata is created by the
(A)DML compiler  (B)  DML pre-processor
(C)  DDL interpreter  (D)  Query interpreter
Ans: (C)
Q.25  When an E-R diagram is mapped to tables, the representation is redundant for
(A)  weak entity sets  (B)weak relationship sets
(C)strong entity sets  (D)strong relationship sets
Ans: (B)  
Q.26  When  φ = ∩ S R , then the cost of computing  S R < > is
(A)  the same as R  × S  (B)greater the R  × S
(C)less than R  × S  (D)cannot say anything
Ans: (A)
Q.27 In SQL the word ‘natural’ can be used with
(A)  inner join  (B)full outer join
(C)right outer join  (D)all of the above
Ans: (A)
Q.28 The default level of consistency in SQL is
(A) repeatable read  (B)  read committed
(C)  read uncommitted  (D)serializable
Ans:  (D)
Q.29 If a transaction T has obtained an exclusive lock on item Q, then T can
(A)  read Q  (B)write Q
(C)both read and write Q  (D)write Q but not read Q
Ans: (C)
Q.30 Shadow paging has
(A)no redo  (B)no undo
(C)redo but no undo  (D)neither redo nor undo
Ans: (A)
Q.31 If the closure of an attribute set is the entire relation then the attribute set is a
(A)  superkey  (B)candidate key
(C)  primary key  (D)  not a key
Ans: (A)
Q.32 DROP is a ______________ statement in SQL.
(A)  Query  (B)Embedded SQL
(C)  DDL  (D)  DCL
Ans: (C)
Q.33 If two relations R and S are joined, then the non  matching tuples of both R and S are
ignored in
(A)  left outer join  (B)right outer join
(C)full outer join  (D)  inner join
Ans: (D)
Q.34  The keyword to eliminate duplicate rows from the query result in SQL is
(A)  DISTINCT  (B)  NO DUPLICATE
(C)  UNIQUE  (D)  None of the above
` Ans: (C)
Q.35 In 2NF
(A)  No functional dependencies (FDs) exist.
(B)  No multivalued dependencies (MVDs) exist.
(C)No partial FDs exist.
(D)No partial MVDs exist.

Ans: (C)
Q.36  Which one is correct statement?
Logical data independence provides following without changing application programs:
(i)Changes in access methods.
(ii)Adding new entities in database
(iii)Splitting an existing record into two or more records
(iv)Changing storage medium
(A)(i) and (ii)  (B)(iv) only, (C)(i) and (iv) (D)(ii) and (iii)
Ans: (D)
Q.37 In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the
following is incorrect :
(A)Operationally, if Y is deleted, so is X
(B)existence is dependent on Y.
(C)Operationally, if X is deleted, so is Y.
(D)  Operationally, if X is deleted, & remains the same.
Ans: (C)
Q.38 Relational Algebra is
(A)  Data Definition Language .
(B)  Meta Language
(C)  Procedural query Language
(D)  None of the above
Ans: (C)
Q.39 Which of the following aggregate functions does not ignore nulls in its results?.
(A)COUNT .  (B)  COUNT (*)
(C) MAX  (D)  MIN
Ans: (B)
Q.41 Consider the join of relation R with a relation S.If R has m tuples and S has n
tuples, then the maximum and minimum size of the join respectively are
(A)m+n and 0  (B)m+n and |m-n|
(C)  mn and 0  (D)  mn and m+n
Ans: (C)
Q.42 Maximum height of a B+ tree of order m with n key values is
(A)  Logm(n)  (B)(m+n)/2
(C)Logm/2(m+n)  (D)None of these
Ans: (D)
Q.43 Which one is true statement :
(A)With finer degree of granularity of locking a highdegree of concurrency is
possible.
(B)Locking prevents non – serializable schedules.
(C)Locking cannot take place at field level.
(D)An exclusive lock on data item X is granted even if a shared lock is already
held on X.
Ans: (A)  
Q.44 Which of the following statement on the view concept in SQL is invalid?
(A)All views are not updateable
(B)The views may be referenced in an SQL statement whenever tables are
referenced.
(C)The views are instantiated at the time they are referenced and not when they
are defined.
(D)The definition of a view should not have GROUP BY clause in it.
Ans: (D)
Q.45 Which of the following concurrency control schemesis not based on the
serializability property?
(A)Two – phase locking  (B)  Graph-based locking
(C)Time-stamp based locking  (D) None of these .
Ans: (D)
Q.46  Which of the following is a reason to model data?
(A)  Understand each user’s perspective of data
(B)  Understand the data itself irrespective of the physical representation
(C)Understand the use of data across application areas
(D)All of the above
Ans: (D)
Q.47 If an entity can belong to only one lower level entity then the constraint is
(A)disjoint  (B)partial
(C)  overlapping  (D)single
Ans: (B)
Q.48 The common column is eliminated in
(A)theta join  (B)outer join  (C)natural join  (D)composed join
Ans: (C )
Q.49 In SQL, testing whether a sub query is empty is done using
(A)DISTINCT  (B)UNIQUE
(C)NULL  (D)EXISTS
Ans: (D)
Q.50 Use of UNIQUE while defining an attribute of a table in SQL means that the attribute
values are
(A)  distinct values  (B)  cannot have NULL
(C)  both (A)& (B)  (D)same as primary key
Ans: (C)
Q.51 The cost of reading and writing temporary files while evaluating a query can be reduced
by
(A)  building indices  (B)pipelining
(C)join ordering  (D)  none of the above
Ans: (B)
Q.52A transaction is in __________ state after the final statement has been executed.
(A)  partially committed  (B)active
(C)committed  (D)none of the above
Ans: (C)
Q.53 In multiple granularity of locks SIX lock is compatible with
(A)  IX  (B)IS
(C)  S  (D)  SIX
Ans: (B)
Q.54 The statement that is executed automatically by the system as a side effect of the
modification of the database is
(A)  backup  (B)assertion
(C)  recovery  (D) trigger
Ans: (D)
Q.55 The normal form that is not necessarily dependency preserving is
(A)  2NF  (B)3NF
(C)  BCNF  (D)  4NF
Ans: (A)
Q.56  A functional dependency of the form  y x → is trivial if
 (A)  x y    (B)  x y
(C)  y x    (D)  y x
Ans: (A)
Q.57  The normalization was first proposed by ______________.
(A)  Code  (B)Codd
(C)  Boyce Codd  (D)Boyce
Ans: (B)
Q.58 The division operator divides a dividend A of degree m+n by a divisor relation B of
degree n and produces a result of degree
(A)  m – 1  (B)m + 1
(C)  m * m  (D)  m
Ans: (D)
Q.59 Which of the following is not a characteristic of a relational database model?
(A)  Table  (B)Tree like structure
(C)Complex logical relationship  (D)Records
Ans: (B)
Q.60 Assume transaction A holds a shared lock R. If transaction B also requests for a shared
lock on R.
(A)It will result in a deadlock situation.
(B)It will immediately be rejected.
(C)It will immediately be granted.
(D)It will be granted as soon as it is released by A .
Ans: (C)  
Q.61 In E-R Diagram total participation is represented by
(A)double lines  (B)Dashed lines
(C)single line  (D)  Triangle
Ans: (A)
Q.62 The FD A →B , DB →C implies
(A)DA →C  (B)A →C
(C)B →A  (D)DB →A
Ans: (A)
Q.63 The graphical representation of a query is ________.
(A)B-Tree  (B)graph
(C)Query Tree  (D)directed graph
Ans: (C)
Q.64 Union operator is a :
(A)Unary Operator  (B)Ternary Operator
(C)Binary Operator  (D)Not an operator
Ans: (C)
Q.65 Relations produced from an E-R model will always be
(A)First normal form.  (B)Second normal form.
(C)Third normal form.  (D)Fourth normal form.
Ans: (A)
Q.66 Manager salary details are hidden from the employee .This is
(A)Conceptual level data hiding.
(B)External level data hiding.
(C)Physical level data hiding.
(D)None of these.
Ans: (A)
Q.67 Which of the following is true for network structure?
(A)  It is a physical representation of the data.
(B)  It allows many to many relationship.
(C)  It is conceptually simple.
(D)  It will be the dominant database of the future.
Ans:  (A)
Q.68 Which two files are used during operation of the DBMS?
(A)Query languages and utilities
(B)  DML and query language
(C)Data dictionary and transaction log
(D)Data dictionary and query language
Ans: (C )
Q.69 A list consists of last names, first names, addresses and pin codes. If all people in the
list have the same last name and same pin code a useful key would be
(A)  the pin code
(B)  the last name
(C)  the compound key first name and last name
(D)  Tr from next page
Ans: (C )
Q.70 In b-tree the number of keys in each node is ____ than the number of its children.
(A)  one less  (B)same
(C)  one more  (D)half
Ans: (A)
Q.71 The drawback of shadow paging technique are
(A)  Commit overhead  (B)Data fragmentation
(C)  Garbage collection  (D)  All of these
Ans: (D)
Q.72 Which normal form is considered adequate for normal relational database design?
(A)  2NF  (B)5NF
(C)  4NF  (D)3NF
Ans: (D)
Q.73 Which of the following addressing modes permits relocation without any change over
in the code?
(A)  Indirect addressing  (B)Indexed addressing
(C)  PC relative addressing  (D)Base register addressing
Ans: (B)
Q.74 In a multi-user database, if two users wish to update the same record at the same time,
they are prevented from doing so by
(A)  jamming  (B)password
(C)  documentation  (D)record lock
Ans: (D)
Q.75  The values of the attribute describes a particular_____________
(A)  Entity set  (B)File
(C)Entity instance  (D)  Organization
Ans: (C)
Q.76  Which of the following relational algebraic operations is not from set theory?
(A)Union  (B)Intersection
(C)Cartesian Product  (D)  Select
Ans: (D)
Q.77  Which of the following ensures the atomicity of thetransaction?
(A)Transaction management component of DBMS
(B)Application Programmer
(C)Concurrency control component of DBMS
(D)Recovery management component of DBMS
Ans: (A)
Q.78 If both the functional dependencies : X→Y and Y→X hold for two attributes X and Y
then the relationship between X and Y is
 (A)M:N  (B)M:1
(C)1:1  (D)1:M
Ans: (C)
Q.79  What will be the number of columns and rows respectively obtained for the operation, A-
B, if A B are Base union compatible and all the rows of a are common to B? Assume A
has 4 columns and 10 rows; and B has 4 columns and 15 rows
(A)  4,0  (B)0,0
(C)  4,5(D)  8,5
Ans: (A)
Q.80  For correct behaviour during recovery, undo and redo operation must be
(A)Commutative  (B)Associative
(C)idempotent  (D)distributive
Ans: (C)
Q.81 Which of the following is not a consequence of non-normalized database?
(A)Update Anomaly  (B)Insertion Anomaly
(C)Redundancy  (D)Lost update problem
Ans: (D)
Q.82  Which of the following is true for relational calculus?
(A)  x(P(x))≡¬(x)(¬P(x))  (B)  x(P(x))≡¬(x)(P(x))
(C)  x(P(x))≡(x)(¬P(x))  (D)  x(P(x))≡(x)(P(x))
Ans: (A)
Q.83  The part of a database management system which ensures that the data remains in a
consistent state is
(A)  authorization and integrity manager
(B)  buffer manager
(C)  transaction manager
(D)  file manager
Ans: (C)
Q.84  Relationships among relationships can be represented in an-E-R model using
(A)Aggregation  (B)  Association
(C)Weak entity sets  (D)Weak relationship sets
Ans: (A)
Q.85 In tuple relational calculus P1 AND P2 is equivalent to
(A)  (¬P1OR¬P2).  (B)  ¬(P1OR¬P2).
(C)  ¬(¬P1OR P2).  (D)  ¬(¬P1OR ¬P2).
Ans: (D)
Q.86  If α→βholds then so does
(A)  γα→γβ  (B)  α→→γβ
(C)both (A) and (B)  (D)None of the above
Ans: (A)
Q.87  Cascading rollback is avoided in all protocol except
(A)  strict two-phase locking protocol.
(B)tree locking protocol
(C)two-phase locking protocol
(D)validation based protocol.
Ans: (D)
Q. 88  Wait-for graph is used for
(A)detecting view serializability.  (B)detecting conflict serializability.
(C)deadlock prevention  (D)deadlock detection
Ans: (D)
Q.90  The clausealter table in SQL can be used to
(A)  add an attribute
(B)  delete an attribute
(C)  alter the default values of an attribute
(D)  all of the above
Ans: (D)
Q. 91  The data models defined by ANSI/SPARC architecture are
(A)  Conceptual, physical and internal
(B)  Conceptual, view and external
(C)Logical, physical and internal
(D)  Logical, physical and view
Ans: (D)
Q.92Whenever two independent one-to-many relationshipsare mixed in the same relation, a
_______ arises.
(A)Functional dependency  (B)Multi-valued dependency
(C)  Transitive dependency  (D)  Partial dependency
Ans:(B)
Q.93  A table can have only one
(A)Secondary key  (B)Alternate key
(C)Unique key  (D)Primary key
Ans: (D)
Q.94 Dependency preservation is not guaranteed in
(A)BCNF  (B)3NF
(C)PJNF  (D)DKNF
Ans: (A)
Q.95 Which is the best file organization when data is frequently added or deleted from a file?
(A)Sequential  (B)Direct
(C)Index sequential  (D)None of the above
Ans: (B)
Q.96 Which of the following constitutes a basic set of operations for manipulating relational
data?
(A)Predicate calculus  (B)Relational calculus
(C)Relational algebra  (D)SQL
Ans: (C)
Q.97 An advantage of views is
(A)Data security  (B)Derived columns
(C)Hiding of complex queries  (D)All of the above
Ans: (A)
Q.98  Which of the following is not a recovery technique?
(A)Deferred update  (B)Immediate update
(C)Two-phase commit  (D)  Shadow paging
Ans: (C)
Q.99  Isolation of the transactions is ensured by
(A)Transaction management  (B)Application programmer
(C)  Concurrency control  (D)  Recovery management
Ans: (C)
Q.100  _______ operator is used to compare a value to a list of literals values that have been
specified.
(A)  Like  (B)COMPARE
(C)  BETWEEN  (D)  IN

Ans: (A) 

Thanks For Viewing , Any comments or suggestions Are welcomed. 

DBMS OBJECTIVE QUESTIONS SET 2

DBMS OBJECTIVE QUESTIONS MODEL 2
             model 1 @http://mytrickopedia.blogspot.com/2014/05/database-management-system-multiple.html


Choose the correct or best alternative in the following:

Q.1  In the relational modes, cardinality is termed as:
(A)  Number of tuples.  (B)Number of attributes.
(C)  Number of tables.  (D)  Number of constraints.
Ans: A
Q.2  Relational calculus is a
(A)  Procedural language.  (B)  Non- Procedural language.
(C)Data definition language.(D)  High level language.
Ans: B
Q.3  The view of total database content is
(A)Conceptual view.  (B)Internal view.
(C)External view.  (D)  Physical View.
Ans: A
Q.4  Cartesian product in relational algebra is
(A)a Unary operator.  (B)a Binary operator.
(C)a Ternary operator.  (D)not defined.
Ans: B  Cartesian product in relational algebra is a binaryoperator.
(It requires two operands. e.g., P X Q)
Q.5  DML is provided for
(A)Description of logical structure of database.
(B)Addition of new structures in the database system.
(C)Manipulation & processing of database.
(D)Definition of physical structure of database system.
Ans: C  DML is provided for manipulation & processing of database.

Q.6  ‘AS’ clause is used in SQL for
(A)Selection operation.  (B)Rename operation.
(C)Join operation.  (D)Projection operation.
Ans: B  ‘AS’ clause is used in SQL for rename operation.
(e.g., SELECT ENO AS EMPLOYEE_NO FROM EMP)
Q.7  ODBC stands for
(A)  Object Database Connectivity.
(B)  Oral Database Connectivity.
(C)  Oracle Database Connectivity.
(D)  Open Database Connectivity.
Ans: D
Q.8  Architecture of the database can be viewed as
(A)  two levels.  (B)four levels.
(C)  three levels.  (D)one level.
Ans: C
Q.9  In a relational model, relations are termed as
(A)Tuples.  (B)Attributes
(C)Tables.  (D)Rows.
Ans:
Q.10  The database schema is written in
(A)  HLL  (B)DML
(C)  DDL  (D)DCL
Ans: C
Q.11  In the architecture of a database system external level is the
(A)physical level.  (B)logical level.
(C)conceptual level  (D)view level.
Ans: D
Q.12  An entity set that does not have sufficient attributes to form a primary key is a
(A)strong entity set.  (B)weak entity set.
(C)simple entity set.  (D)primary entity set.
Ans: B
Q.13  In a Hierarchical model records are organized as
(A)Graph.  (B)List.
(C)Links.  (D)Tree.

Ans: D
Q.14  In an E-R diagram attributes are represented by
(A)rectangle.  (B)square.
(C)ellipse.  (D) triangle.
Ans: C
Q.15  In case of entity integrity, the primary key may be
(A)not Null  (B)Null
(C)both Null & not Null.  (D)any value.
Ans: A
Q.16  In tuple relational calculus

P P → is equivalent to
(A)

P P ∨ ¬
(B)

P P ∨
(C)
P P ∧
(D)

P P ¬ ∧
Ans: A  In tuple relational calculus P
is equivalent to ¬P1 ∨P2
.
(The logical implication expression A B, meaning if A then B,is equivalent to ¬A ∨B)
Q.17  The language used in application programs to request data from the DBMS is referred
to as the
(A)DML  (B)DDL
(C)  VDL  (D)SDL
Ans: A
Q.18  A logical schema
(A)is the entire database.
(B)is a standard way of organizing information into accessible parts.
(C)describes how data is actually stored on disk.
(D)both (A) and (C)
Ans: A
Q.19  Related fields in a database are grouped to form a
(A)data file.(B)  data record.
(C)menu.  (D)  bank.
Ans: B  Related data fields in a database are grouped to form a data record.
(A record is a collection of related fields)
Q.20  The database environment has all of the following components except:
(A)users.(B)separate files.
(C)  database.(D)  database administrator.
Ans: A

Q.21  The language which has recently become the defacto standard for interfacing application
programs with relational database system is
(A)Oracle.(B)SQL.
(C)  DBase.(D)  4GL.
Ans: B
Q.22  The way a particular application views the data from the database that the application
uses is a
(A)  module.(B)  relational model.
(C)  schema.(D)sub schema.
Ans: D
Q.23  In an E-R diagram an entity set is represent by a
(A)  rectangle.  (B)  ellipse.
(C)  diamond box.  (D)  circle.
Ans: A
Q.24  A report generator is used to
(A)  update files.  (B)  print files on paper.
(C)  data entry.  (D)  delete files.
Ans: B
Q.25  The property / properties of a database is / are :
(A)  It is an integrated collection of logically related records.
(B)  It consolidates separate files into a common pool of data records.
(C)  Data stored in a database is independent of the application programs using it.
(D)  All of the above.
Ans: D
Q.26  The DBMS language component which can be embedded in a program is
(A)  The data definition language (DDL).
(B)  The data manipulation language (DML).
(C)  The database administrator (DBA).
(D)  A query language.
Ans: B
Q.27  A relational database developer refers to a record as
(A)  a criteria.  (B)  a relation.
(C)  a tuple.  (D)  an attribute.
Ans: C
Q.28  The relational model feature is that there

(A) is no need for primary key data.
(B) is much more data independence than some other database models.
(C)  are explicit relationships among records.
(D)  are tables with many dimensions.
Ans: B
Q.29  Conceptual design
(A)  is a documentation technique.
(B)  needs data volume and processing frequencies to determine the size of the database.
(C)  involves modelling independent of the DBMS.
(D)  is designing the relational model.
Ans:C
Q.30  The method in which records are physically stored in a specified order according to a key
field in each record is
(A)  hash.  (B)direct.
(C)  sequential.  (D)  all of the above.
Ans: A  A method in which records are physically stored in  a specified order according
to a key field in each record is hash.
(In hash method, a hash function is performed on  the key value to determine the
unique physical address of the record to store or retrieve)
Q.31  A subschema expresses
(A)  the logical view.  (B)the physical view.
(C)the external view.  (D)all of the above.
Ans: C  A subschema expresses the external view.
(External schemas are called also called as subschemas)
Q.32  Count function in SQL returns the number of
(A)values.  (B)  distinct values.
(C)groups.  (D)columns.
Ans: A  Count function in SQL returns the number of values.
(Count function counts all the not null values inthe specific column. If we want to
count only distinct values than the DISTINCT keyword is also to be used)
Q.33Which one of the following statements is false?
(A)The data dictionary is normally maintained by thedatabase
administrator.
(B)Data elements in the database can be modified by changing the data dictionary.
(C)The data dictionary contains the name and description of each data element.
(D)The data dictionary is a tool used exclusively by the database administrator.
Ans: B

Q.34An advantage of the database management approach is
(A)data is dependent on programs.
(B)data redundancy increases.
(C)data is integrated and can be accessed by multiple programs.
(D) none of the above.
Ans: C
Q.35  A DBMS query language is designed to
(A)  support end users who use English-like commands.
(B)  support in the development of complex applications software.
(C)  specify the structure of a database.
(D)  all of the above.
Ans:  D
Q.36Transaction processing is associated with everything below except
(A)  producing detail, summary, or exception reports.
(B)  recording a business activity.
(C)  confirming an action or triggering a response.
(D)  maintaining data.
Ans: C
Q.37  It is possible to define a schema completely using
(A)  VDL and DDL.(B)  DDL and DML.
(C)  SDL and DDL.(D)  VDL and DML.
Ans: B
Q.38 The method of access which uses key transformation is known as
(A)  direct.(B)hash.
(C)  random.(D) sequential.
Ans: B
Q.39  Data independence means
(A)data is defined separately and not included in programs.
(B)programs are not dependent on the physical attributes of data.
(C)  programs are not dependent on the logical attributes of data.
(D) both (B) and (C).
Ans: D  both (B) and (C)
Q.40 The statement in SQL which allows to change the definition of a table is
(A)Alter.  (B)Update.
(C)Create.  (D)select.
Ans:  A

Q.41  E-R model uses this symbol to represent weak entityset ?
(A)  Dotted rectangle.
(B)  Diamond
(C)  Doubly outlined rectangle
(D)  None of these
Ans: C
Q.42 SET concept is used in :
(A)  Network Model
(B)  Hierarchical Model
(C)  Relational Model
(D)  None of these
Ans: A
Q.43  Relational Algebra is
(A)  Data Definition Language.
(B)  Meta Language
(C)  Procedural query Language
(D)  None of the above
Ans: C
Q.44  Key to represent relationship between tables is called
(A)  Primary key(B)Secondary Key
(C)Foreign Key(D)None of these
Ans: C
Q.45 _______ produces the relation that has attributes of R1 andR2
(A)  Cartesian product  (B)Difference
(C)Intersection  (D)Product
Ans: A
Q.46  The file organization that provides very fast access to any arbitrary record of a file is
(A)Ordered file  (B)Unordered file
(C)Hashed file  (D)B-tree
Ans: C
Q.47  DBMS helps achieve
(A)Data independence  (B)Centralized control of data
(C)Neither (A) nor (B)  (D)both (A) and (B)
Ans: D
Q.48  Which of the following are the properties of entities?
(A)  Groups (B)  Table

(C)Attributes(D)Switchboards
Ans: C
Q.49  In a relation
(A)  Ordering of rows is immaterial
(B)  No two rows are identical
(C)  (A) and (B) both are true
(D)  None of these.
Ans: C
Q.50  Which of the following is correct:
(A)a SQL query automatically eliminates duplicates.
(B) SQL permits attribute names to be repeated in the same relation.
(C)a SQL query will not work if there are no indexeson the relations
(D)None of these
Ans: D
Q.51  It is better to use files than a DBMS when there are
(A)Stringent real-time requirements.
(B)Multiple users wish to access the data.
(C)Complex relationships among data.
(D)All of the above.
Ans: B
Q.52 The conceptual model is
(A)dependent on hardware.
(B) dependent on software.
(C)dependent on both hardware and software .
(D)  independent of both hardware and software.
Ans: D
Q.53 What is a relationship called when it is maintained between two entities?
(A)  Unary(B)  Binary
(C)  Ternary(D)  Quaternary
Ans: B
Q.54  Which of the following operation is used if we are interested in only certain columns of a
table?
(A)PROJECTION  (B)SELECTION
(C)UNION  (D)JOIN
Ans: A

Q.55 Which of the following is a valid SQL type?
(A)  CHARACTER  (B)NUMERIC
(C)FLOAT  (D)All of the above
Ans: D
Q.56 The RDBMS terminology for a row is
(A)  tuple.(B)  relation.
(C)  attribute.(D)  degree.
Ans:  A
Q.57 Which of the following operations need the participating relations to be union compatible?
(A)  UNION  (B)INTERSECTION
(C)DIFFERENCE  (D)All of the above
Ans: D
Q.58 The full form of DDL is
(A  Dynamic Data Language(B)  Detailed Data Language
(C)  Data Definition Language(D)Data Derivation Language
Ans: C
Q.59 Which of the following is an advantage of view?
(A)  Data security  (B)Derived columns
(C)  Hiding of complex queries  (D)All of the above
Ans:  D
Q.60  Which of the following is a legal expression in SQL?
(A)  SELECT NULL FROM EMPLOYEE;
(B)  SELECT NAME FROM EMPLOYEE;
(C)  SELECT NAME FROM EMPLOYEE WHERE SALARY = NULL;
(D)  None of the above
Ans: B
Q.61 The users who use easy-to-use menu are called
(A)Sophisticated end users.  (B)Naïve users.
(C)  Stand-alone users.  (D)  Casual end users.
Ans: B
Q.62 Which database level is closest to the users?
(A)  External(B)  Internal
(C)Physical(D)  Conceptual
Ans: A

Q.63 Which are the two ways in which entities can participate in a relationship?
(A)  Passive and active  (B)Total and partial
(C)  Simple and Complex  (D)  All of the above
Ans: B
Q.64 The result of the UNION operation between R1 and R2 is a relation that includes
(A)  all the tuples of R1
(B)  all the tuples of R2
(C)all the tuples of R1 and R2
(D)all the tuples of R1 and R2 which have common columns
Ans: D
Q.65 Which of the following is a comparison operator inSQL?
(A)  = (B)LIKE
(C)BETWEEN (D)All of the above
Ans: D
Q.66 A set of possible data values is called
(A)  attribute.(B)  degree.
(C)  tuple.(D)  domain.
Ans: D
Q.67 Which of the operations constitute a basic set of  operations for manipulating relational
data?
(A)  Predicate calculus  (B)Relational calculus
(C)  Relational algebra(D)None of the above
Ans:C
Q.68 Which of the following is another name for weak entity?
(A)Child  (B)Owner
(C)Dominant  (D)All of the above
Ans: A
Q.69 Which of the following database object does not physically exist?
(A)base table  (B)index
(C)view  (D)none of the above
Ans: C
Q.70 NULL is
(A)  the same as 0 for integer
(B)  the same as blank for character
(C)  the same as 0 for integer and blank for character

(D)  not a value
Ans: D
Q.71  Which of the following is record based logical model?
(A)Network Model  (B)Object oriented model
(C)  E-R Model  (D)None of these
Ans: A
Q.72 A data dictionary is a special file that contains:
(A)The name of all fields in all files.
(B)The width of all fields in all files.
(C)  The data type of all fields in all files.
(D)  All of the above.
Ans: D
Q.73 A file manipulation command that extracts some of the records from a file is called
(A)  SELECT(B)  PROJECT
(C)JOIN(D)  PRODUCT
Ans: A
Q.74 The physical location of a record is determined bya mathematical formula that transforms
a file key into a record location is :
(A) B-Tree File(B) Hashed File
(C)  Indexed File(D) Sequential file.
Ans: B
Q.75 Using Relational Algebra the query that finds customers, who have a balance of over
1000 is
(A)  Π Customer_name
( σ balance >1000
(Deposit))
(B)  σ Customer_name
( Π balance >1000
(Deposit))
(C)  Π Customer_name
( σ balance >1000
(Borrow))
(D)  σ Customer_name
( Π balance >1000
(Borrow))
Ans:  A
Q.76 A primary key is combined with a foreign key creates
(A)  Parent-Child relation ship between the tables that connect them.
(B)  Many to many relationship between the tables that connect them.
(C)  Network model between the tables that connect them.
(D)  None of the above.
Ans: A
Q.77 In E-R Diagram derived attribute are represented by

(A)  Ellipse(B)  Dashed ellipse
(C)Rectangle(D)  Triangle
Ans  B
Q.78 Cross Product is a:
(A)  Unary Operator(B)  Ternary Operator
(C)  Binary Operator(D)  Not an operator
Ans: C
Q.79  An instance of relational schema R (A, B, C) has distinct values of A including NULL
values. Which one of the following is true?
(A)A is a candidate key  (B)A is not a candidate key
(C)A is a primary Key  (D)Both (A) and (C)
Ans: B
Q.80  Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:
(A)  mn(B) m+n
(C)(m+n)/2(D) 2(m+n)
Ans: A
Q.81 The natural join is equal to :
(A)  Cartesian Product
(B)Combination of Union and Cartesian product
(C)Combination of selection and Cartesian product
(D)Combination of projection and Cartesian product
Ans: D
Q.82 Which one of the following is not true for a view:
(A)  View is derived from other tables.
(B)  View is a virtual table.
(C)A view definition is permanently stored as part of the database.
(D)View never contains derived columns.
Ans: C
Q.83 A primary key if combined with a foreign key creates
(A)  Parent-Child relationship between the tables that connect them.
(B)  Many to many relationship between the tables that connect them.
(C)  Network model between the tables that connect them.
(D)  None of the above.
Ans: A

Q.84 In E-R Diagram relationship type is represented by
(A)  Ellipse(B)  Dashed ellipse
(C)Rectangle(D)  Diamond
Ans: D
Q.85 Hierarchical model is also called
(A)  Tree structure(B)  Plex Structure
(C)Normalize Structure  (D)Table Structure
Ans:  A
Q.86  To delete a particular column in a relation the command used is:
(A)UPDATE  (B)DROP
(C)ALTER  (D)DELETE
Ans: C
Q.87 The ______ operator is used to compare a value to a list of literals values that have been
specified.
(A)  BETWEEN(B)  ANY
(C)  IN(D)  ALL
Ans: A
Q.88 A logical schema
A)  is the entire database
B)  is a standard way of organizing information into a accessible part
C)  describe how data is actually stored on disk
D)  none of these
Ans: D
Q.89 A B-tree of order m has maximum of _____________ children
(A)  m  (B)m+1
(C)  m-1  (D)m/2
Ans: A
Q.90 _____________ function divides one numeric expression by another and returns the
remainder.
(A)POWER  (B)MOD
(C)ROUND  (D)REMAINDER
Ans: B
Q.91 A data manipulation command the combines the records from one or more tables is called
(A)SELECT  (B)PROJECT
(C)JOIN  (D)  PRODUCT

Ans: C
Q.92 In E-R diagram generalization is represented by
(A)Ellipse  (B)  Dashed ellipse
(C)  Rectangle  (D)  Triangle
Ans: D
Q.93_________ is a virtual table that draws its data from the result of an SQL
SELECT statement.
(A)View  (B)Synonym
(C)Sequence  (D)Transaction
Ans: A
Q.94 The method of access which uses key transformation is known as
(A)Direct  (B)  Hash
(C)Random  (D)Sequential
Ans: B
Q.95 A table joined with itself is called
(A)Join  (B)Self Join
(C)Outer Join  (D)Equi Join
Ans: B
Q.96_________ data type can store unstructured data
(A)RAW  (B)CHAR
(C)NUMERIC  (D)  VARCHAR
Ans: A
Q.97 Which two files are used during operation of the DBMS
(A)  Query languages and utilities
(B)  DML and query language
(C)  Data dictionary and transaction log
(D)  Data dictionary and query language
Ans: C

Thats For NOw , More in Set 3.

Design>