dbms one mark questions-new
TRANSCRIPT
DBMS One mark Questions and Answers
1. ............................ is the powerful language for working with RDBMS.
A) Embedded Programs
B) Dynamic Programs
C) Query Language
D) Static Language Programs
2. The file in DBMS is called as .................. in RDBMS.
A) console
B) schema
C) table
D) object
3. In ..................... , we have a strict parent-child relationship only.
A) hierarchical databases.
B) network databases
C) object oriented databases
D) relational databases
4. Which normal form is considered adequate for relational database design?
A) 2 NF
B) 3 NF
C) 4 NF
D) BCNF
5. What operator tests column for the absence of data?
A) IS NULL operator
B) ASSIGNMENT operator
C) LIKE operator
D) NOT operator
6. Which is proper subset designed to support views belonging to different classes of users in order to hide or protect information.
A) Schema
B) Sub-schema
C) Non-schema
D) Non-sub schema
7. Which contain information about a file needed by system programs for accessing file records?
A) File blocks
B) File operators
C) File headers
D) None of these
8. A .................... DBMS distributes data processing tasks between the workstation and network server.
A) Network
B) Relational
C) Client Server
D) Hierarchical
9. The .................... refers to the way data is organized in and accessible from DBMS.
A) database hierarchy
B) data organization
C) data sharing
D) data model
10. ................. is a statement that is executed automatically by the system.
A) trigger
B) assertion
C) durability
D) integrity constraint
SET 1
11. DBMS is a collection of ………….. that enables user to create and maintain a database.
A) Keys
B) Translators
C) Program
D) Language Activity
12. In a relational schema, each tuple is divided into fields called
A) Relations
B) Domains
C) Queries
D) All of the above
13. In an ER model, ……………. is described in the database by storing its data.
A) Entity
B) Attribute
C) Relationship
D) Notation
14. DFD stands for
A) Data Flow Document
B) Data File Diagram
C) Data Flow Diagram
D) Non of the above
15. A top-to-bottom relationship among the items in a database is established by a
A) Hierarchical schema
B) Network schema
C) Relational Schema
D) All of the above
16. ……………… table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
17. . …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
A) Instance
B) Schema
c) Program
D) Super Key
18. ……………… clause is an additional filter that is applied to the result.
A) Select
B) Group-by
C) Having
D) Order by
19. A logical schema
A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above
20. ………………… is a full form of SQL.
A) Standard query language
B) Sequential query language
C) Structured query language
D) Server side query language
21. A relational database developer refers to a record as
A. a criteria
B. a relation
C. a tuple
D. an attribute
22. .......... keyword is used to find the number of values in a column.
A. TOTAL
B. COUNT
C. ADD
D. SUM
23. An advantage of the database management approach is
A. data is dependent on programs
B. data redundancy increases
C. data is integrated and can be accessed by multiple programs
D. none of the above
24. The collection of information stored in a database at a particular moment is called as ......
A. schema
B. instance of the database
C. data domain
D. independence
25. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data
C. programs are not dependent on the logical attributes of data
D. both B and C
26. A ......... is used to define overall design of the database
A. schema
B. application program
C. data definition language
D. code
27. Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
28. Grant and revoke are ....... statements.
A. DDL
B. TCL
C. DCL
D. DML
29. DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A nor B
D. Both A and B
30. .......... command can be used to modify a column in a table
A. alter
B. update
C. set
D. create
SET 2
31. The candidate key is that you choose to identify each row uniquely is called ……………..
A) Alternate Key
B) Primary Key
C) Foreign Key
D) None of the above
32. …………….. is used to determine whether of a table contains duplicate rows.
A) Unique predicate
B) Like Predicate
C) Null predicate
D) In predicate
33. To eliminate duplicate rows ……………… is used
A) NODUPLICATE
B) ELIMINATE
C) DISTINCT
D) None of these
34. State true or false
i) A candidate key is a minimal super key.
ii) A candidate key can also refer to as surrogate key.
A) i-true, ii-false
B) i-false, ii-true
C) i-true, ii-true
D) i-false, ii-false
35. DCL stands for
A) Data Control Language
B) Data Console Language
C) Data Console Level
D) Data Control Level
36. …………………… is the process of organizing data into related tables.
A) Normalization
B) Generalization
C) Specialization
D) None of the above
37. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.
A) Weak entity
B) Strong entity
C) Non attributes entity
D) Dependent entity
38. …………….. is the complex search criteria in the where clause.
A) Sub string
B) Drop Table
C) Predict
D) Predicate
39. ………………… is preferred method for enforcing data integrity
A) Constraints
B) Stored Procedure
C) Triggers
D) Cursors
40. The number of tuples in a relation is called its …………. While the number of attributes in a relation is called it’s ………………..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
41) The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
42) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
43) The database schema is written in
A. HLL
B. DML
C. DDL
D. DCL
44) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
45) The relational model feature is that there
A. is no need for primary key data
B. is much more data independence than some other database models
C. are explicit relationships among records.
D. are tables with many dimensions
46) Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
47) Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
48) Which database level is closest to the users?
A. External
B. Internal
C. Physical
D. Conceptual
49) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
50) ........ data type can store unstructured data
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
SET 3
51. State true or false.i) Select operator is not a unary operator.ii) Project operator chooses subset of attributes or columns of a relation.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
52. …………… database is used as template for all databases created.
A) Master
B) Model
C) Tempdb
D) None of the above
53. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid
values can be assigned to each data items. This is referred to as
A) Data Security
B) Domain access
C) Data Control
D) Domain Integrity
54. ………………….. operator is basically a join followed by a project on the attributes of first relation.
A) Join
B) Semi-Join
C) Full Join
D) Inner Join
55. Which of the following is not a binary operator in relational algebra?
A) Join
B) Semi-Join
C) Assignment
D) Project
56. Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database.
A) Increases
B) Skips
C) Does not reduce
D) Reduces
57. Which of the following is/are the DDL statements?
A) Create
B) Drop
C) Alter
D) All of the above
58. In snapshot, …………………. clause tells oracle how long to wait between refreshes.
A) Complete
B) Force
C) Next
D) Refresh
59. ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity.
A) Column
B) Constraint
C) Index
D) Trigger
60. For like predicate which of the following is true.i) % matches zero of more characters.ii) _ matches exactly one character.
A) i-only
B) ii-only
C) Both of them
D) None of them
SET 4
61. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
A) All of the above
62. In SQL, the CREATE TABLESPACE is used
A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
D) All of the above
63. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
64. Which of the following is TRUE for the System Variable $date$?
A) Can be assigned to a global variable.
B) Can be assigned to any field only during design time.
C) Can be assigned to any variable or field during run time.
D) Can be assigned to a local variable.
65. What are the different events in Triggers?
A) Define, Create
B) Drop, Comment
C) Insert, Update, Delete
D) Select, Commit
66. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?
A) Data Definition Language
B) Data Manipulation Language
C) Data Described Language
D) Data Retrieval Language
67. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints
A) 6789
B) 2345
C) 1234
D) 456789
68. Which of the following SQL command can be used to modify existing data in a database table?
A) MODIFY
B) UPDATE
C) CHANGE
D) NEW
69. When SQL statements are embedded inside 3GL, we call such a program as ..........
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
70. ................ provides option for entering SQL queries as execution time, rather than at the development stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL
71) The RDBMS terminology for a row is
A. tuple
B. relation
C. attribute
D. degree
72) To change column value in a table the ......... command can be used.
A. create
B. insert
C. alter
D. update
73) The full form of DDL is
A. Dynamic Data Language
B. Detailed Data Language
C. Data Definition Language
D. Data Derivation Language
74) To pass on granted privileges to other user the ...... clause is used
A. create option
B. grant option
C. update option
D. select option
75) A set of possible data values is called
A. attribute
B. degree
C. tuple
D. domain
76) ......... is critical in formulating database design.
A. row column order
B. number of tables
C. functional dependency
D. normalizing
77) A primary key if combined with a foreign key creates
A. Parent-Child relationship between the tables that connect them
B. Many to many relationship between the tables that connect them
C. Network model between the tables that connect them
D. None of the above
78) A ............. represents the number of entities to which another entity can be associated
A. mapping cardinality
B. table
C. schema
D. information
79) Which two files are used during operation of the DBMS
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
80) A ........... is a set of column that identifies every row in a table.
A. composite key
B. candidate key
C. foreign key
D. super key
SET 5
81. The relational model is based on the concept that data is organized and stored in two-dimensional tables called ……………………….
A) Fields
B) Records
C) Relations
D) Keys
82. ……………….. contains information that defines valid values that are stored in a column or data type.
A) View
B) Rule
C) Index
D) Default
83. Which of the syntax is correct for insert statement?i) insert into <table_name> values <list of values>ii) insert into <table_name> (column list) values <list of values>
A) i-only
B) ii-only
C) Both of them
D) None of them
84. . ………………. First proposed the process of normalization.
A) Edgar. W
B) Edgar F. Codd
C) Edward Stephen
D) Edward Codd
85. . For using a specific database …………… command is used.
A) use database
B) database name use
C) Both A &B
D) None of them
86. Which of the following is not comparison operator?
A) <>
B) <
C) =<
D) >=
87. An outstanding functionality of SQL is its support for automatic ………… to the target data.
A) programming
B) functioning
C) navigation
D) notification
88. ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
A) Entity Integrity Constraints
B) Referential Integrity Constraints
C) Domain Integrity Constraints
D) Domain Constraints
E) Key Constraints
89. ……………..specifies a search condition for a group or an aggregate.
A) GROUP BY Clause
B) HAVING Clause
C) FROM Clause
D) WHERE Clause
90. Drop Table cannot be used to drop a table referenced by a …………… constraint.
A) Local Key
B) Primary Key
C) Composite Key
D) Foreign Key
SET 6
91. ............... joins are SQL server default
A) Outer
B) Inner
C) Equi
D) None of the above
92. The ..................... is essentially used to search for patterns in target string.
A) Like Predicate
B) Null Predicate
C) In Predicate
D) Out Predicate
93. Which of the following is/are the Database server functions?i) Data management ii) Transaction managementiii) Compile queries iv) Query optimization
A) i, ii, and iv only
B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii, and iv
94. To delete a database ................... command is used
A) delete database database_name
B) Delete database_name
C) drop database database_name
D) drop database_name
95. .............. is a combination of two of more attributes used as a primary key
A) Composite Key
B) Alternate Key
C) Candidate Key
D) Foreign Key
96. Which of the following is not the function of client?
A) Compile queries
B) Query optimization
C) Receive queries
D) Result formatting and presentation
97. ............. is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.
A) Procedure
B) Trigger
C) Curser
D) None of the above
98. ................. requires that data should be made available to only authorized users.
A) Data integrity
B) Privacy
C) Security
D) None of the above
99. Some of the utilities of DBMS are .............i) Loading ii) Backup iii) File organization iv) Process Organization
A) i, ii, and iv only
B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii, and iv
100. . ................. allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.
A) Procedure
B) Trigger
C) Curser
D) None of above
SET 7
101. Processed data is called ………………..
A) Raw data
B) Information
C) Useful data
D) Source
102. …………….. is a utility to capture a continuous record of server activity and provide auditing capability.
A) SQL server Profile
B) SQL server service manager
C) SQL server setup
D) SQL server wizard.
103. Data items grouped together for storage purposes are called a
A) record
B) title
C) list
D) string
104. …………. contains data assisting day to day activities of the organization.
A) Control database
B) Operational database
C) Strategic database
D) Sequential database
105. ………………… approach reduces time and effort required for design and lesser risk in database management.
A) Single global database
B) Top-down approach
C) Multiple databases
D) None of the above
106. HSAM stands for ……….
A) Hierarchic Sequential Access Method
B) Hierarchic Standard Access Method
C) Hierarchic Sequential and Method
D) Hierarchic Standard and Method
107. SQL server stores index information in the ………… system table
A) syst indexes
B) system indexes
C) sysind
D) sys indexes
108. The one guideline to be followed while designing the database is
A) A database design may be ambiguous.
B) Unrelated data should be in the same table so that updating the data will be easy.
C) It should avoid/reduce the redundancy.
D) An entity should not have attributes.
109. Which of the following is not a logical database structure?
A) Chain
B) Network
C) Tree
D) Relational
110. . ……………. is a preferred method for enforcing data integrity
A) Constraints
B) Stored procedure
C) Triggers
D) Cursors
SET 8111. Reflexivity property says that X - Y is true if Y is ………………….
A) Subset of X
B) Null set of X
C) Super set of Y
D) Subset of Y
112. Anything that affects the database schema is a part of
A) DML
B) DCL
C) DDL
D) All of the above
113. An instance of a relation is a time varying set of ………………….
A) Tuples
B) Rows
C) Both of them
D) None of them
114. In the ………………… mode any record in the file can be accessed at random
A) Sequential access
B) Random access
C) Standard access
D) Source access
115. Which can be used to delete all the rows if a table?
A) Delete * from table_name
B) Delete from table_name
C) Delete table_name
D) all rows cannot be deleted at a time.
116. Which if the following is not the type of data integrity.
A) Key integrity
B) Domain integrity
C) Entity integrity
D) Referential integrity
117. 4NF stands for ..
A) Fourth Normal File
B) Fourth Normal Form
C) Fourth Normal Fraction
D) Fourth Negative File
118. A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters.
A) Recovery utility
B) Backup Utility
C) Monitoring utility
D) Data loading utility
119. ………………. Allows definitions and query language statements to be entered; query results are formatted and displayed.
A) Schema Processor
B) Query Processor
C) Terminal Interface
D) None of the above
120. The main task carried out in the …………… is to remove repeating attributes to separate tables.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Fourth Normal Form
121. Relational Algebra is a __________ query language that takes two relation as input and produces another relation as output of the query.A) RelationalB) StructuralC) ProceduralD) Fundamental
122. Which of the following is a fundamental operation in relational algebra?a) Set intersectionb) Natural join
c) Assignmentd) None of the mentioned
123. Which of the following is used to denote the selection operation in relational algebra ?a) Pi (Greek)b) Sigma (Greek)c) Lambda (Greek)d) Omega (Greek)View Answer
124. For select operation the ________ appear in the subscript and the ___________ argument appears in the paranthesis after the sigma.a) Predicates, relationb) Relation, Predicatesc) Operation, Predicatesd) Relation, Operation
125. The ___________ operation, denoted by −, allows us to find tuples that are in one relation but are not in another.a) Unionb) Set-differencec) Differenced) Intersection
126. Which is a unary operation:a) Selection operationb) Primitive operationc) Projection operationd) Generalized selection
127. Which is a join condition contains an equality operator:a) Equijoinsb) Cartesianc) Naturald) Left
128. In precedence of set operators the expression is evaluated froma) Left to leftb) Left to rightc) Right to left
d) From user specification
129. Which of the following is not outer join ?a) Left outer joinb) Right outer joinc) Full outer joind) All of the mentioned
130. The assignment operator is denoted bya) ->b) <-c) =d) ==
131. An ________ is a set of entities of the same type that share the same properties, or attributes .a) Entity setb) Attribute setc) Relation setd) Entity model
132. The function that an entity plays in a relationship is called that entity’s _____________.a) Participationb) Positionc) Roled) Instance
133. The attribute name could be structured as a attribute consisting of first name, middle initial, and last name . This type of attribute is calleda) Simple attributeb) Composite attributec) Multivalued attributed) Derived attribute
134. The attribute AGE is calculated from DATE_OF_BIRTH . The attribute AGE isa) Single valuedb) Multi valuedc) Composited) Derived
135. Not applicable condition can be represented in relation entry asa) NAb) 0c) NULLd) Blank Space
136. Which of the following can be a multivalued attribute ?a) Phone_numberb) Namec) Date_of_birthd) All of the mentioned
137. Which of the following is a single valued attributea) Register_numberb) Addressc) SUBJECT_TAKENd) Reference
138. In a relation between the entities the type and condition of the relation should be specified . That is called as______attributea) Desciptiveb) Derivedc) Recursived) Relative
139. In the __________ normal form, a composite attribute is converted to individual attributes.A) FirstB) SecondC) ThirdD) Fourth
140. A table on the many side of a one to many or many to many relationship must:a) Be in Second Normal Form (2NF)b) Be in Third Normal Form (3NF)c) Have a single attribute keyd) Have a composite key
141. Tables in second normal form (2NF):a) Eliminate all hidden dependenciesb) Eliminate the possibility of a insertion anomaliesc) Have a composite keyd) Have all non key fields depend on the whole primary key
142. Which-one ofthe following statements about normal forms is FALSE?a) BCNF is stricter than 3 NFb) Lossless, dependency -preserving decomposition into 3 NF is always possible
c) Loss less, dependency – preserving decomposition into BCNF is always possibled) Any relation with two attributes is BCNF
143. Functional Dependencies are the types of constraints that are based on______a) Keyb) Key revisitedc) Superset keyd) None of these
144. Which is a bottom-up approach to database design that design by examining the relationship between attributes:a) Functional dependencyb) Database modelingc) Normalizationd) Decomposition
145. Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:a) 1NFb) 2NFc) 3NFd) All of the mentioned
146. Which forms has a relation that possesses data about an individual entity:a) 2NFb) 3NFc) 4NFd) 5NF
147. Which forms are based on the concept of functional dependency:a) 1NFb) 2NFc) 3NFd) 4NF
148. Empdt1(empcode, name, street, city, state,pincode).For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation ina) 1 NF onlyb) 2 NF and hence also in 1 NFc) 3NF and hence also in 2NF and 1NFd) BCNF and hence also in 3NF, 2NF and 1NF
149. A collection of data designed to be used by different people is called a/ana) Organizationb) Databasec) Relationship
d) Schema
150. Which of the following is the oldest database model?a) Relationalb) Deductivec) Physicald) Network
151. Which of the following schemas does define a view or views of the database for particular users?a) Internal schemab) Conceptual schemac) Physical schemad) External schema
152. Which of the following is an attribute that can uniquely identify a row in a table?a) Secondary keyb) Candidate keyc) Foreign keyd) Alternate key
153. Which of the following is the process of selecting the data storage and data access characteristics of the database?a) Logical database designb) Physical database designc) Testing and performance tuningd) Evaluation and selecting
154. Which of the following terms does refer to the correctness and completeness of the data in a database?a) Data securityb) Data constraintc) Data independenced) Data integrity
155. The relationship between DEPARTMENT and EMPLOYEE is aa) One-to-one relationshipb) One-to-many relationshipc) Many-to-many relationshipd) Many-to-one relationship
156. A table can be logically connected to another table by defining aa) Super keyb) Candidate keyc) Primary keyd) Unique key
157. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is calleda) Consistent stateb) Parallel statec) Durable stated) Inconsistent state
158. Ensuring isolation property is the responsibility of thea) Recovery-management component of the DBMSb) Concurrency-control component of the DBMSc) Transaction-management component of the DBMSd) Buffer management component in DBMS
159. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which of the following form a transaction ?a) Only 1b) Only 2c) Both 1 and 2 individuallyd) Either 1 or 2
160. A transaction is delimited by statements (or function calls) of the form __________.a) Begin transaction and end transactionb) Start transaction and stop transactionc) Get transaction and post transactiond) Read transaction and write transaction
161. Identify the characteristics of transactionsa) Atomicityb) Durabilityc) Isolationd) All of the mentioned
162. . Which of the following has “all-or-none” property ?a) Atomicityb) Durabilityc) Isolationd) All of the mentioned
163. The database system must take special actions to ensure that transactions operate properly without interference from concurrently executing database statements. This property is referred to asa) Atomicityb) Durabilityc) Isolationd) All of the mentioned
164. The property of transaction that persists all the crashes isa) Atomicityb) Durabilityc) Isolationd) All of the mentioned
165. __________ states that only valid data will be written to the database.a) Consistencyb) Atomicityc) Durabilityd) Isolation
166. Transaction processing is associated with everything below excepta) Producing detail summary or exception reportsb) Recording a business activityc) Confirming a action or triggering a responsed) Maintaining a data
167. The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.a) BEGINb) SET TRANSACTIONc) BEGIN TRANSACTIONd) COMMIT
168. ____ means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.a) Consistencyb) Atomicityc) Durabilityd) Isolation
169. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?a) CREATE PACKAGEb) CREATE SCHEMAc) CREATE CLUSTERd) All of the mentioned
170. In SQL, the CREATE TABLESPACE is useda) To create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace.b) To create a database trigger.c) To add/rename data files, to change storaged) All of the mentioned
171. Which character function can be used to return a specified portion of a character string?a) INSTRb) SUBSTRINGc) SUBSTRd) POS
172. Which of the following is TRUE for the System Variable $date$?a) Can be assigned to a global variable.b) Can be assigned to any field only during design time.c) Can be assigned to any variable or field during run time.d) Can be assigned to a local variable.
173. What are the different events in Triggers?a) Define, Createb) Drop, Commentc) Insert, Update, Deleted) Select, Commit
174. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?a) Data Definition Languageb) Data Manipulation Languagec) Data Described Languaged) Data Retrieval Language
175. The SQL statement SELECT SUBSTR(’123456789′, INSTR(‘abcabcabc’,'b’), 4) FROM EMP; printsa) 6789b) 2345c) 1234d) 456789
176. Which of the following SQL command can be used to modify existing data in a database table?a) MODIFYb) UPDATEc) CHANGEd) NEW
177. When SQL statements are embedded inside 3GL, we call such a program asa) Nested queryb) Nested programmingc) Distinct queryd) Embedded SQL
178. _______________ provides option for entering SQL queries as execution time, rather than at the development stage.a) PL/SQLb) SQL*Plusc) SQLd) Dynamic SQL
179. A transaction may not always complete its execution successfully. Such a transaction is termeda) Abortedb) Terminatedc) Closedd) All of the mentioned
180. If an transaction is performed in a database and committed, the changes are taken to the previous state of transaction bya) Flashbackb) Rollbackc) Both a and bd) Cannot be done
181. Each modification done in database transaction are first recorded into thea) Harddriveb) Logc) Diskd) Datamart
182. When the transaction finishes the final statement the transaction enters intoa) Active stateb) Committed statec) Partially committed stated) Abort state
183. The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready for execution shall be calleda) Batch. Exeb) Trans. Exec) Opt. Exed) Edit.Exe
184. Which of the following is an atomic sequence of database actions?a) Transactionb) Concurrencyc) Relationsd) All of the mentioned
185. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is calleda) Consistent stateb) Parallel statec) Atomic stated) Inconsistent state
186. _______ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.a) Serializabilityb) Atomicityc) Isolationd) Time stamping
187. DBMS periodically suspends all processing and synchronizes its files and journals through the use ofa) Checkpoint facilityb) Backup facilityc) Recovery managerd) Database change log
188. Which of the following is not a state in transaction ?a) Activeb) Terminatedc) Abortedd) Partially committed
189. In concurrency control policy the the lock is obtained ona) Entire databaseb) A particular transaction alonec) All the new elementsd) All of the mentioned
190. A concurrency-control policy such as this one leads to ______ performance, since it forces transactions to wait for preceding transactions to finish before they can start.a) Goodb) Averagec) Poord) Unstable
191. __________ are used to ensure that transactions access each data item in order of the transactions’ ____ if their accesses conflict.a) Zoneb) Relayc) Line
d) Timestamps
192. EMPDET is an external table containing the columns EMPNO and ENAME. Which command would work in relation to the EMPDET table?a) UPDATE empdetSET ename = ‘Amit’WHERE empno = 1234;b) DELETE FROM empdetWHERE ename LIKE ‘J%’;c) CREATE VIEW empvuASSELECT * FROM empdept;d) CREATE INDEXempdet_idxON empdet(empno);
193. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?a) To find the groups forming the subtotal in a rowb) To create group-wise grand totals for the groups specified within a GROUP BY clausec) To create a grouping for expressions or columns specified within a GROUP BY clause in one direction, fromright to left for calculating the subtotalsd) To create a grouping for expressions or columns specified within a GROUP BY clause in all possibledirections, which is cross-tabular report for calculating the subtotals
194.
Name Null? TypeCust_id Not null Number(2)Cust_Name Varchar2(15)
Evaluate the following SQL statements executed in the given order:
ALTER TABLE custADD CONSTRAINT cust_id_pk PRIMARY KEY(cust_id) DEFERRABLE
INITIALLY DEFERRED; INSERTINTO cust VALUES (1,'RAJ'); --row 1INSERT INTO cust VALUES (1,'SAM'); --row 2COMMIT;SET CONSTRAINT cust_id_pk IMMEDIATE;INSERT INTO cust VALUES (1,'LATA'); --row 3INSERT INTO cust VALUES (2,'KING'); --row 4COMMIT;
Which rows would be made permanent in the CUST table?a) row 4 onlyb) rows 2 and 4c) rows 3 and 4d) rows 1 and 4
195. Which statement is true regarding external tables?a) The default REJECT LIMIT for external tables is UNLIMITED.b) The data and metadata for an external table are stored outside the database.c) ORACLE_LOADER and ORACLE_DATAPUMP have exactly the same functionality when used with anexternal table.d) The CREATE TABLE AS SELECT statement can be used to unload data into regular table in the databasefrom an external table.
196. A non-correlated subquery can be defined as ____.a) A set of sequential queries, all of which must always return a single valueb) A set of sequential queries, all of which must return values from the same tablec) A SELECT statement that can be embedded in a clause of another SELECT statement onlyd) A set of one or more sequential queries in which generally the result of the inner query is used as thesearch value in the outer query
197. Evaluate the following SQL statements in the given order:
DROP TABLE dept;CREATE TABLE dept(deptno NUMBER(3) PRIMARY KEY,deptname VARCHAR2(10));DROP TABLE dept;FLASHBACK TABLE dept TO BEFORE DROP;
Which statement is true regarding the above FLASHBACK operation?a) It recovers only the first DEPT table.b) It recovers only the second DEPT table.c) It does not recover any of the tables because FLASHBACK is not possible in this case.d) It recovers both the tables but the names would be changed to the ones assigned in the RECYCLEBIN
198.
CREATE TABLE digits(id NUMBER(2),description VARCHAR2(15));INSERT INTO digits VALUES (1,'ONE');UPDATE digits SET description ='TWO' WHERE id=1;INSERT INTO digits VALUES (2,'TWO');COMMIT;DELETE FROM digits;SELECT description FROM digitsVERSIONS BETWEEN TIMESTAMP MINVALUE AND MAXVALUE;
What would be the outcome of the above query?a) It would not display any values.b) It would display the value TWO once.c) It would display the value TWO twice.d) It would display the values ONE, TWO, and TWO
199. Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.a) Higher-level lockb) Lower-level lockc) Read only lockd) Read write
200. Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is calleda) Logical operationb) Redo operationc) Logical undo operationd) Undo operation
201. Which of the following is used for undo operations alone ?a) Logical loggingb) Physical loggingc) Physical log recordsd) Both b and c
202. Redo operations are performed exclusively usinga) Logical loggingb) Physical loggingc) Physical log recordsd) Both b and c
203. To perform logical redo or undo, the database state on disk must be operation _____________, that is, it should not have partial effects of any operation.
a) Persistentb) Resistantc) Consistentd) None of the mentioned
204. An operation is said to be __________ if executing it several times in a row gives the same result as executing it once.a) Idempotentb) Changedc) Repetitived) All of the above
205. Immediate database modification technique usesa) Both undo and redob) Undo but no redoc) Redo but no undod) Neither undo nor redo
206. Shadow paging hasa) no redob) no undoc) redo but no undod) neither redo nor undo
207. For correct behaviour during recovery, undo and redo operation must bea) Commutativeb) Associativec) Idempotentd) Distributive
208. If ___________ are not obtained in undo operation it will cause problem in undo-phase.a) Higher-level lockb) Lower-level lockc) Read only lockd) Read write
209. Which level of RAID refers to disk mirroring with block striping?a) RAID level 1b) RAID level 2c) RAID level 0d) RAID level 3
210. Optical disk technology usesa) Helical scanningb) DATc) a laser beam
d) RAID
211. With multiple disks, we can improve the transfer rate as well by ___________ data across multiple disks.a) Stripingb) Dividingc) Mirroringd) Dividing
212. Which one of the following is a Stripping technique ?a) Byte level strippingb) Raid level strippingc) Disk level strippingd) Block level stripping
213. The RAID level which mirroring is done along with stripping isa) RAID 1+0b) RAID 0c) RAID 2d) Both a and b
214. Where performance and reliability are both important, RAID level ____ is used.a) 0b) 1c) 2d) 0+1
215. ______________ partitiones data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk.a) Block interleaved parityb) Block interleaved distributed parityc) Bit parityd) Bit interleaved parity
216. Hardware RAID implementations permit _________; that is, faulty disks can be removed and replaced by new ones without turning power off.a) Scrappingb) Swappingc) Hot swappingd) None of the mentioned
217. ___________ is popular for applications such as storage of log files in a database system, since it offers the best write performance.a) RAID level 1b) RAID level 2c) RAID level 0
d) RAID level 3
218. ______________ which increases the number of I/O operations needed to write a single logical block, pays a significant time penalty in terms of write performance.a) RAID level 1b) RAID level 2c) RAID level 5d) RAID level 3
219. A system is in a ______ state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.a) Idleb) Waitingc) Deadlockd) Ready
220. The deadlock state can be changed back to stable state by using _____________ statement.a) Commitb) Rollbackc) Savepointd) Deadlock
221. What are the ways of dealing with deadlock ?a) Deadlock preventionb) Deadlock recoveryc) Deadlock detectiond) All of the mentionedView Answer
222. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj ). Otherwise, Ti is rolled back (dies). This isa) Wait-dieb) Wait-woundc) Wound-waitd) Wait
223. When transaction Ti requests a data item currently held by Tj , Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti ). This isa) Wait-dieb) Wait-woundc) Wound-waitd) Wait
224. The situation where the lock waits only for a specified amount of time for another lock to be released is
a) Lock timeoutb) Wait-woundc) Timeoutd) Wait
225. The deadlock in a set of transaction can be determined bya) Read-only graphb) Wait graphc) Wait-for graphd) All of the mentioned
226. A deadlock exists in the system if and only if the wait-for graph contains a ___________.a) Cycleb) Directionc) Bi-directiond) Rotation
227. Selecting the victim to be rollbacked to the previous state is determined by the minimum cost. The factors determining cost of rollback isa) How long the transaction has computed, and how much longer the transaction will compute before it completes its designated task.b) How many data items the transaction has used.c) How many more data items the transaction needs for it to complete.d) How many transactions will be involved in the rollback.
228. __________ rollback requires the system to maintain additional information about the state of all the running transactions.a) Totalb) Partialc) Timed) Commit
229. The log is a sequence of ___________, recording all the update activities in the database.a) Log recordsb) Recordsc) Entriesd) Redo
230. In the ___________ scheme, a transaction that wants to update the database first creates a complete copy of the database.a) Shadow copyb) Shadow Pagingc) Update log recordsd) All of the mentioned
231. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.a) Shadow copyb) Shadow Pagingc) Update log recordsd) All of the mentioned
232. The current copy of the database is identified by a pointer, called _____________, which is stored on disk.a) Db-pointerb) Update logc) Update log recordsd) All of the mentioned
233. If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.a) Deferred-modificationb) Late-modificationc) Immediate-modificationd) Undo
234. If database modifications occur while the transaction is still active, the transaction is said to use the ___________technique.a) Deferred-modificationb) Late-modificationc) Immediate-modificationd) Undo
235. ____________ using a log record sets the data item specified in the log record to the old value.a) Deferred-modificationb) Late-modificationc) Immediate-modificationd) Undo
236. In the __________ phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.a) Repeatingb) Redoc) Replayd) Undo
237. The actions which are played in the order while recording it is called ______________ history.a) Repeatingb) Redoc) Replay
d) Undo
238. A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes calleda) Log recordsb) Recordsc) Compensation log recordsd) Compensation redo records
239. _____________ can help us detect poor E-R design.a) Database Design Processb) E-R Design Processc) Relational schemed) Functional dependencies
240. If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from one of the following sources.a) A many-to-many relationship setb) A multivalued attribute of an entity setc) A one-to-many relationship setd) Both a and b
241. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set.a) A many-to-many relationship setb) A multivalued attribute of an entity setc) A one-to-many relationship setd) Both a and b
242. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.a) A many-to-many relationship setb) A multivalued attribute of an entity setc) A one-to-many relationship setd) Both a and b
243. Suppose the user finds the usage of room number and phone number in a relational schema there is confusion.This is reduced bya) Unique-role assumptionb) Unique-key assignmentc) Role intergral assignmentd) None of the mentioned
244. What is the best way to represent the attributes in a large database?a) Relational-andb) Concatenationc) Dot representation
d) All of the above
245. Designers use which of the following to tune performance of systems to support time-critical operations?a) Denormalizationb) Redundant optimizationc) Optimizationd) Realization
246. In the schema (dept name, size) we have relations total inst 2007, total inst 2008 . Which dependency have lead to this relation ?a) Dept name, year->sizeb) Year->sizec) Dept name->sized) Size->year
247. Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009) .Here the only functional dependencies are from dept name to the other attributes .This relation is ina) Fourth NFb) BCNFc) Third NFd) Second NF
248. Thus a _______ of course data gives the values of all attributes, such as title and department, of all courses at a particular point in time.a) Instanceb) Snapshotc) Both a and bd) All of the mentioned
249. Representations such as the in the dept year relation, with one column for each value of an attribute, are called _______; they are widely used in spreadsheets and reports and in data analysis tools.a) Cross-tabsb) Snapshotc) Both a and bd) All of the mentioned
250. A domain is ______ if elements of the domain are considered to be indivisible units.a) Atomicb) Subatomicc) Substructured) Subset
251. Identify the composite attributesa) Salaryb) Creditsc) Section_idd) None of the mentioned
252. Consider the relation given below and ind the maximum normal form applicable to them1. R(A, B) with productions { A –> B }2. R(A, B) with productions { B –> A }3 R(A, B) with productions {A —> B, B –> A }4 R(A, B, C) with productions {A –>B, B –> A, AB –> C }a) 1, 2 and 3 are in 3NF and 4 is in BCNFb) 1 and 2 are in BCNF and 3 and 4 are in 3NFc) All are in 3NFd) All are in BCNF
253. Which one is based on multi-valued dependency:a) Firstb) Secondc) Thirdd) Fourth
254. If a relation is in BCNF, then it is also ina) 1 NFb) 2 NFc) 3 NFd) All of the mentioned
255. If every non-key attribute is functionally depedent primary key, then the relation will be ina) First normal formb) Second normal formc) Third formd) Fourth normal form
256. If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called _____ is needed.a) DKNFb) BCNFc) Fourth
d) Third
257. The term for information that describes what type of data is available in a database is:a) Data dictionaryb) data repositoryc) Index datad) Metadata
258. A data type that creates unique numbers for key columns in Microsoft Access is:a) Autonumberb) Booleanc) Sequential keyd) Sequential number
259. A dependency exist between two columns whena) Together they constitute a composite key for the tableb) Knowing the value in one column determines the value stored in another columnc) The table is in 3NFd) Together they constitute a foreign key
260. In the __________ normal form, a composite attribute is converted to individual attributes.A) FirstB) SecondC) ThirdD) Fourth
261. A table on the many side of a one to many or many to many relationship must:a) Be in Second Normal Form (2NF)b) Be in Third Normal Form (3NF)c) Have a single attribute keyd) Have a composite key
262. Tables in second normal form (2NF):a) Eliminate all hidden dependenciesb) Eliminate the possibility of a insertion anomaliesc) Have a composite keyd) Have all non key fields depend on the whole primary key
263. Which-one ofthe following statements about normal forms is FALSE?a) BCNF is stricter than 3 NFb) Lossless, dependency -preserving decomposition into 3 NF is always possiblec) Loss less, dependency – preserving decomposition into BCNF is always possibled) Any relation with two attributes is BCNF
264. Functional Dependencies are the types of constraints that are based on______a) Keyb) Key revisitedc) Superset keyd) None of these
265. Which is a bottom-up approach to database design that design by examining the relationship between attributes:a) Functional dependencyb) Database modelingc) Normalizationd) Decomposition
266. Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:a) 1NFb) 2NFc) 3NFd) All of the mentioned
267. Which forms has a relation that possesses data about an individual entity:a) 2NFb) 3NFc) 4NFd) 5NF
268. Which forms are based on the concept of functional dependency:a) 1NFb) 2NFc) 3NFd) 4NF
269. Empdt1(empcode, name, street, city, state,pincode).For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation ina) 1 NF only
b) 2 NF and hence also in 1 NFc) 3NF and hence also in 2NF and 1NFd) BCNF and hence also in 3NF, 2NF and 1NF
270. A __________ is a special kind of a store procedure that executes in response to certain action on the table like insertion, deletion or updation of data.a) Proceduresb) Triggersc) Functionsd) None of the mentioned
271. Trigger are supported ina) Deleteb) Updatec) Viewsd) All of the mentioned
272. The CREATE TRIGGER statement is used to create the trigger. THE _____ clause specifies the table name on which the trigger is to be attached. The ______ specifies that this is an AFTER INSERT trigger.a) for insert, onb) On, for insertc) For, insertd) Both a and c
273. What are the after triggers ?a) Triggers generated after a particular operationb) These triggers run after an insert, update or delete on a tablec) These triggers run after an insert, views, update or delete on a tabled) Both b and c
274. The variables in the triggers are declared usinga) -b) @c) /d) /@
275. The default extension for an Oracle SQL*Plus file is:a) .txtb) .plsc) .ora
d) .sql
276. Which of the following is NOT an Oracle-supported trigger?a) BEFOREb) DURINGc) AFTERd) INSTEAD OF
277. What are the different in triggers ?a) Define, Createb) Drop, Commentc) Insert, Update, Deleted) All of the mentioned
278. Triggers ________ enabled or disableda) Can beb) Cannot bec) Ought to bed) Always
279. Which prefixes are available to Oracle triggers?a) : new onlyb) : old onlyc) Both :new and : oldd) Neither :new nor : old
280. Dates must be specified in the formata) mm/dd/yyb) yyyy/mm/ddc) dd/mm/yyd) yy/dd/mmView Answer
281. An ________ on an attribute of a relation is a data structure that allows the database system to find those tuples in the relation that have a specified value for that attribute efficiently, without scanning through all the tuples of the relation.a) Indexb) Referencec) Assertiond) Timestamp
282. Create index studentID_index on student(ID);Here which one denotes the relation for which index is created ?a) StudentID_indexb) IDc) StudentIDd) Student
283. Which of the following is used to store movie and image files ?a) Clobb) Blobc) Binaryd) Image
284. The user defined data type can be created usinga) Create datatypeb) Create datac) Create definetyped) Create type
285. Values of one type can be converted to another domain using which of the following ?a) Castb) Drop typec) Alter typed) Convert
286. Create domain YearlySalary numeric(8,2)constraint salary value test __________;In order to ensure that an instructor’s salary domain allows only values greater than a specified value use:a) Value>=30000.00b) Not null;c) Check(value >= 29000.00);d) Check(value)
287. Which of the following closely resembles Create view ?a) Create table . . .likeb) Create table . . . asc) With datad) Create view as
288. In contemporary databases the top level of the hierarchy consists of ______, each of which can contain _____.a) Catalogs, schemasb) Schemas, catalogsc) Environment, schemasd) Schemas, Environment
289. Which of the following statements creates a new table temp instructor that has the same schema as instructor.a) create table temp_instructor;b) Create table temp_instructor like instructor;c) Create Table as temp_instructor;d) Create table like temp_instructor;
290. Select name ____ instructor name, course idfrom instructor, teacheswhere instructor.ID= teaches.ID;Which keyword must be used here to rename the field name ?a) Fromb) Renamec) Asd) Join
291. Select * from employee where dept_name=”Comp Sci”;In the SQL given above there is an error . Identify the error .a) Dept_nameb) Employeec) “Comp Sci”d) From
292. Select emp_namefrom departmentwhere dept_name like ’ _____ Computer Science’;Which one of the following has to be added into the blank to select the dept_name which has Computer Science as its ending string ?a) %b) _c) ||d) $
293. ’_ _ _ ’ matches any string of ______ three characters. ’_ _ _ %’ matches any string of at ______ three characters.a) Atleast, Exactlyb) Exactly, Atleastc) Atleast, Alld) All , Exactly
294. Select namefrom instructorwhere dept name = ’Physics’order by name;By default, the order by clause lists items in ______ order.a) Descendingb) Any
c) Samed) Ascending
295. Select *from instructororder by salary ____, name ___;To display the salary from greater to smaller and name in ascending order which of the following options should be used ?a) Ascending, Descendingb) Asc, Descc) Desc, Ascd) Descending, Ascending
296. Select namefrom instructorwhere salary <= 100000 and salary >= 90000;This query can be replaced by which of the following ?a) Select namefrom instructorwhere salary between 90000 and 100000;b) Select namefrom employeewhere salary <= 90000 and salary>=100000;c) Select namefrom employeewhere salary between 90000 and 100000;d) Select namefrom instructorwhere salary between 100000 and 90000;
297. Select instructor.*from instructor, teacheswhere instructor.ID= teaches.ID;This query does which of the following operation?a) All attributes of instructor and teaches are selectedb) All attributes of instructor are selected on the given conditionc) All attributes of teaches are selected on given conditiond) Only the some attributes from instructed and teaches are selected
298. In SQL the spaces at the end of the string are removed by _______ function .a) Upperb) Stringc) Trimd) Lower
299. _____ operator is used for appending two strings.a) &b) %c) ||d) _
300. A _____ indicates an absent value that may exist but be unknown or that may not exist at all.a) Empty tupleb) New valuec) Null valued) Old value
301. The predicate in a where clause can involve Boolean operations such as and.The result of true and unknown is_______, false and unknown is _____, while unknown and unknown is _____.a) Unknown, unknown, falseb) True, false, unknownc) True, unknown, unknownd) Unknown, false, unknown
302. Select namefrom instructorwhere salary is not null;Selectsa) Tuples with null valueb) Tuples with no null valuesc) Tuples with any salaryd) All of the mentioned
303. In a employee table to include the attributes whose value always have some value which of the following constraint must be used ?a) Nullb) Not nullc) Uniqued) Distinct
304. Using the ______ clause retains only one copy of such identical tuples.a) Nullb) Uniquec) Not null
d) Distinct
305. Create table employee (id integer,name varchar(20),salary not null);Insert into employee values (1005,Rach,0);Insert into employee values (1007,Ross, );Insert into employee values (1002,Joey,335);Some of these insert statements will produce an error. Identify the statement.a) Insert into employee values (1005,Rach,0);b) Insert into employee values (1002,Joey,335);c) Insert into employee values (1007,Ross, );d) Both a and c
306. The primary key must bea) Uniqueb) Not nullc) Both a and bd) Either a or b
307. You attempt to query the database with this command: (25)select nvl (100 / quantity, none)from inventory;Why does this statement cause an error when QUANTITY values are null?a. The expression attempts to divide by a null value.b. The data types in the conversion function are incompatible.c. The character string none should be enclosed in single quotes (‘ ‘).d. A null value used in an expression cannot be converted to an actual value
308. The result of _____unknown is unknown.a) Xorb) Orc) Andd) Not