2-2 Dbms QN Bank
2-2 Dbms QN Bank
2 Marks
2 Marks
2 Marks
2 Marks
2 Marks
(2,3,5,7,11,17,19,23,29,31)
5
assume that the tree is initially empty and values are added in ascending order.
Construct B+ tree for the cases where the number of pointers that will fit in one node is as
6 follows.
What alternatives are available for the data entries in an index? Explain. (Nov/Dec 2015)
7 Explain in detail heap file organization with indexes. (Nov/Dec 2015)
a)four
8 What is B+ tree? Explain the inserton operations in B+ tree indexing with example. (June 2014)
9 Explain about Indexed sequential access methods (ISAM) and B+ trees. (Apr/May 2012)
b)six
c)eight
*** Assignment questions must be from previous question papers and must be mentioned
OBJECTIVE QUESTIONS
UNIT-I
1. _____________ express the number of entities to which another entity can be associated via a
relationship set.
a) Mapping Cardinality
b) Relational Cardinality
c) Participation Constraints
View Answer
2. An entity in A is associated with at most one entity in B, and an entity in B is associated with at most
one entity in A.This is called as
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one
View Answer
3. An entity in A is associated with at most one entity in B. An entity in B, however, can be associated
with any number (zero or more) of entities in A.
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one
View Answer
b) Ensure that duplicate records are not entered into the table
View Answer
5. Establishing limits on allowable property values, and specifying a set of acceptable, predefined options
that can be assigned to a property are examples of:
a) Attributes
c) Method constraints
View Answer
6. Which of the following can be addressed by enforcing a referential integrity constraint?
b) Certain fields are required (such as the email address, or phone number) before the record is accepted
c) Information on the customer must be known before anything can be sold to that customer
d) Then entering an order quantity, the user must input a number and not some text (i.e., 12 rather than „a
dozen‟)
View Answer
7. ______ is a special type of integrity constraint that relates two relations & maintains consistency across
the relations.
d) Domain Constraints
View Answer
8. Which one of the following uniquely identifies the elements in the relation?
a) Secondary Key
b) Primary key
c) Foreign key
d) Composite key
View Answer
a) Local Key
b) Primary Key
c) Composite Key
d) Foreign Key
View Answer
a) Constraints
b) Stored Procedure
c) Triggers
d) Cursors
View Answer
11. Which of the following gives a logical structure of the database graphically ?
a) Entity-relationship diagram
b) Entity diagram
c) Database diagram
d) Architectural representation
View Answer
a) Double diamonds
b) Undivided rectangles
c) Dashed lines
d) Diamond
View Answer
b) Relationship set
d) Primary key
View Answer
14. Consider a directed line(->) from the relationship set advisor to both entity sets instructor and student.
This indicates _________ cardinality
a) One to many
b) One to one
c) Many to many
d) Many to one
View Answer
15. We indicate roles in E-R diagrams by labeling the lines that connect ___________ to __________
a) Diamond , diamond
b) Rectangle, diamond
c) Rectangle, rectangle
d) Diamond, rectangle
View Answer
16. An entity set that does not have sufficient attributes to form a primary key is termed a __________
b) Variant set
d) Variable set
View Answer
17. For a weak entity set to be meaningful, it must be associated with another entity set, called the
a) Identifying set
b) Owner set
c) Neighbour set
View Answer
a) Underline
b) Double line
c) Double diamond
d) Double rectangle
View Answer
19. If you were collecting and storing information about your music collection, an album would be
considered a(n) _____
a) Relation
b) Entity
c) Instance
d) Attribute
View Answer
20. What term is used to refer to a specific record in your music database; for instance; information stored
about a specific album?
a) Relation
b) Instance
c) Table
c) Column
View Answer
a) Tables
b) Fields
c) Records
d) Keys
View Answer
a) Column
b) Key
c) Row
d) Entry
View Answer
a) Attribute
b) Tuple
c) Field
d) Instance
View Answer
b) Column
c) Tuple
d) Key
View Answer
25. For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.
a) Domain
b) Relation
c) Set
d) Schema
View Answer
26. Database __________ which is the logical design of the database, and the database _______ which is
a snapshot of the data in the database at a given instant in time.
a) Instance, Schema
b) Relation, Schema
c) Relation, Domain
d) Schema, Instance
View Answer
27.Course(course_id,sec_id,semester)
Here the course_id,sec_id and semester are __________ and course is a _________
a) Relations, Attribute
b) Attributes, Relation
c) Tuple, Relation
d) Tuple, Attributes
View Answer
28. Department (dept name, building, budget) and Employee (employee_id , name, dept name,salary)
Here the dept_name attribute appears in both the relations .Here using common attributes in relation
schema is one way of relating ___________ relations.
a) Attributes of common
b) Tuple of common
c) Tuple of distinct
d) Attributes of distinct
View Answer
29. A domain is atomic if elements of the domain are considered to be ____________ units.
a) Different
b) Indivisbile
c) Constant
d) Divisible
View Answer
a) Any
b) Same
c) Sorted
d) Constant
View Answer
31. Using which language can a user request information from a database ?
a) Query
b) Relational
c) Structural
d) Compiler
View Answer
a) Name
b) Dept
c) Tot_cred
d) ID
View Answer
c) Relational algebra
d) Query language
View Answer
34. The_____ operation allows the combining of two relations by merging pairs of tuples, one from each
relation, into a single tuple.
a) Select
b) Join
c) Union
d) Intersection
View Answer
35. The result which operation contains all pairs of tuples from the two relations, regardless of whether
their attribute values match.
a) Join
b) Cartesian product
c) Intersection
d) Set difference
View Answer
36. The _______operation performs a set union of two “similarly structured” tables
a) Union
b) Join
c) Product
d) Intersect
View Answer
37. The most commonly used operation in relational algebra for projecting a set of tuple from a relation is
a) Join
b) Projection
c) Select
d) Union
View Answer
38. The _______ operator takes the results of two queries and returns only rows that appear in both result
sets.
a) Union
b) Intersect
c) Difference
d) Projection
View Answer
39. A ________ is a pictorial depiction of the schema of a database that shows the relations in the
database, their attributes, and primary keys and foreign keys.
a) Schema diagram
b) Relational algebra
c) Database diagram
d) Schema flow
View Answer
40. The _________ provides a set of operations that take one or more relations as input and return a
relation as an output.
a) Schematic representation
b) Relational algebra
c) Scheme diagram
d) Relation flow
View Answer
UNIT-II
1. Relational Algebra is a __________ query language that takes two relation as input and produces
another relation as output of the query.
a) Relational
b) Structural
c) Procedural
d) Fundamental
View Answer
a) Set intersection
b) Natural join
c) Assignment
View Answer
3. ##Which of the following is used to denote the selection operation in relational algebra ?
a) Pi (Greek)
b) Sigma (Greek)
c) Lambda (Greek)
d) Omega (Greek)
View Answer
4. For select operation the ________ appear in the subscript and the ___________ argument appears in
the paranthesis after the sigma.
a) Predicates, relation
b) Relation, Predicates
c) Operation, Predicates
d) Relation, Operation
View Answer
5. The ___________ operation, denoted by −, allows us to find tuples that are in one relation but are not
in another.
a) Union
b) Set-difference
c) Difference
d) Intersection
View Answer
a) Selection operation
b) Primitive operation
c) Projection operation
d) Generalized selection
View Answer
a) Equijoins
b) Cartesian
c) Natural
d) Left
View Answer
a) Left to left
b) Left to right
c) Right to left
View Answer
9. Which of the following is not outer join ?
View Answer
a) ->
b) <-
c) =
d) ==
View Answer
11. Find the ID, name, dept name, salary for instructors whose salary is greater than $80,000 .
b) Э t ∈ r (Q(t))
View Answer
a) {t | P() | t}
b) {P(t) | t }
c) {t | P(t)}
13.
∧ u[building] = “Watson”))}
a) Finds the names of all instructors whose department is in the Watson building.
c) Finds the name of the dapartment whose instructor and building is Watson.
View Answer
a) ^
b) V
c) ¬
d) ~
View Answer
15. “Find all students who have taken all courses offered in the Biology department.” The expressions
that matches this sentence is :
a) Э t ε r (Q(t))
b) ∀ t ε r (Q(t))
c) ¬ t ε r (Q(t))
d) ~ t ε r (Q(t))
View Answer
16. Which of the following is the comparison operator in tuple relational calculus
a) ⇒
b) =
c) ε
View Answer
View Answer
18. Find the names of all instructors in the Physics department together with the course id of all courses
they teach:
∧s = “Fall” ∧ y = “2009”
∧s = “Spring” ∧ y = “2010”
View Answer
19. In domain relaional calculus “there exist” can be expressed as
a) (P1(x))
b) (P1(x)) Э x
c) V x (P1(x))
d) Э x (P1(x))
View Answer
a) Outer
b) Inner
c) Equi
View Answer
21. A _____ indicates an absent value that may exist but be unknown or that may not exist at all.
a) Empty tuple
b) New value
c) Null value
d) Old value
View Answer
22. If the attribute phone number is included in the relation all the values need not be entered into the
phone number column . This type of entry is given as
a) 0
b) –
c) Null
d) Empty space
View Answer
23. The predicate in a where clause can involve Boolean operations such as and.The result of true and
unknown is_______ false and unknown is _____ while unknown and unknown is _____
View Answer
24.
SELECT name
FROM instructor
Selects
View Answer
25. In a employee table to include the attributes whose value always have some value which of the
following constraint must be used ?
a) Null
b) Not null
c) Unique
d) Distinct
View Answer
26. Using the ______ clause retains only one copy of such identical tuples.
a) Null
b) Unique
c) Not null
d) Distinct
View Answer
27.
Some of these insert statements will produce an error. Identify the statement.
View Answer
a) Unique
b) Not null
View Answer
FROM inventory;
Why does this statement cause an error when QUANTITY values are null?
View Answer
a) Xor
b) Or
c) And
d) Not
View Answer
31. Which one of the following is used to define the structure of the relation ,deleting relations and
relating schemas ?
d) Relational Schema
View Answer
32. Which one of the following provides the ability to query information from the database and to insert
tuples into, delete tuples from, and modify tuples in the database ?
c) Query
d) Relational Schema
View Answer
a) DML
b) DDL
c) View
d) Integrity constraint
View Answer
a) DML
b) DDL
c) View
d) Integrity constraint
View Answer
35. The basic data type char(n) is a _____ length character string and varchar(n) is _____ length
character.
a) Fixed, equal
b) Equal, variable
c) Fixed, variable
d) Variable, equal
View Answer
36. An attribute A of datatype varchar(20) has the value “Avi” . The attribute B of datatype char(20) has
value ”Reed” .Here attribute A has ____ spaces and attribute B has ____ spaces.
a) 3, 20
b) 20, 4
c) 20 , 20
d) 3, 4
View Answer
37. To remove a relation from an SQL database, we use the ______ command.
a) Delete
b) Purge
c) Remove
d) Drop table
View Answer
a) Remove relation
b) Clear relation entries
c) Delete fields
d) Delete rows
View Answer
a) Query
b) DML
c) Relational
d) DDL
View Answer
a) Integrity constraints
b) Transaction control
c) Authorization
d) DDL constraints
View Answer
UNIT-III
A) First
B) Second
C) Third
D) Fourth
View Answer
2. A table on the many side of a one to many or many to many relationship must:
View Answer
d) Have all non key fields depend on the whole primary key
View Answer
View Answer
5. Functional Dependencies are the types of constraints that are based on______
a) Key
b) Key revisited
c) Superset key
View Answer
6. Which is a bottom-up approach to database design that design by examining the relationship between
attributes:
a) Functional dependency
b) Database modeling
c) Normalization
d) Decomposition
View Answer
7. Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:
a) 1NF
b) 2NF
c) 3NF
View Answer
8. Which forms has a relation that possesses data about an individual entity:
a) 2NF
b) 3NF
c) 4NF
d) 5NF
View Answer
9. Which forms are based on the concept of functional dependency:
a) 1NF
b) 2NF
c) 3NF
d) 4NF
View Answer
For any pincode, there is only one city and state. Also, for given street, city and state, there is just one
pincode. In normalization terms, empdt1 is a relation in
a) 1 NF only
View Answer
11. The normal form which satisfies multivalued dependencies and which is in BCNF is
a) 4 NF
b) 3 NF
c) 2 NF
View Answer
a) Functional dependency
b) Equality-generating dependencies
c) Multivalued dependencies
d) Non-functional dependency
View Answer
13. The main task carried out in the __________ is to remove repeating attributes to separate tables.
View Answer
a) First
b) Second
c) Third
d) Fourth
View Answer
15. Which forms has a relation that possesses data about an individual entity?
a) 2NF
b) 3NF
c) 4NF
d) 5NF
View Answer
16. If a multivalued dependency holds and is not implied by the corresponding functional dependency, it
usually arises from one of the following sources.
a) A many-to-many relationship set
View Answer
17. Which of the following has each related entity set has its own schema and there is an additional
schema for the relationship set?
View Answer
18. In which of the following , a separate schema is created consisting of that attribute and the primary
key of the entity set.
View Answer
a) Functional dependency
b) Multivalued dependency
c) Join dependency
d) Domain-key
View Answer
20. In 2NF
View Answer
21. We can use the following three rules to find logically implied functional dependencies. This collection
of rules is called
a) Axioms
b) Armstrong‟s axioms
c) Armstrong
d) Closure
View Answer
a) Reflexivity rule
b) Transitivity rule
c) Pseudotransitivity rule
d) Augmentation rule
View Answer
a) Lossless decomposition
b) Lossless-join decomposition
c) Both a and b
View Answer
24. Inst_dept (ID, name, salary, dept name, building, budget) is decomposed into
a) Lossy-join decomposition
b) Lossy decomposition
c) Lossless-join decomposition
d) Both a and b
View Answer
25. There are two functional dependencies with the same set of attributes on the left side of the arrow:
A->BC
A->B
a) A->BC
b) A->B
c) B->C
d) None of the mentioned
View Answer
D -> AB
a) 2
b) 7
c) 10
d) 12
View Answer
27. Suppose we wish to find the ID‟s of the employees that are managed by people who are managed by
the employee with ID 123. Here are two possible queries:
I.SELECT ee.empID
II.SELECT empID
FROM Emps
WHERE mgrID IN
Which, if any, of the two queries above will correctly (in SQL2) get the desired set of employee ID‟s?
a) Both I and II
b) I only
c) II only
d) Neither I nor I
View Answer
28. Suppose relation R(A,B) currently has tuples {(1,2), (1,3), (3,4)} and relation S(B,C) currently has
{(2,5), (4,6), (7,8)}. Then the number of tuples in the result of the SQL query:
<i>SELECT *
a) 2
b) 4
c) 6
View Answer
29. Suppose now that R(A,B) and S(A,B) are two relations with r and s tuples, respectively (again, not
necessarily distinct). If m is the number of (not necessarily distinct) tuples in the result of the SQL query:
R intersect S;
Then which of the following is the most restrictive, correct condition on the value of m?
(a) m = min(r,s)
View Answer
30. Suppose relation R(A,B,C,D,E) has the following functional dependencies:
A -> B
B -> C
BC -> A
A -> D
E -> A
D -> E
a) A
b) E
c) B,C
d) D
View Answer
a) 2NF
b) 3NF
c) BCNF
d) 1NF
View Answer
a) Partition constraint
b) Dependency preservation
c) Redundancy
d) Security
View Answer
33. R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving
BCNF decomposition.
a) A->#B, B->#CD
c) AB->C, C->AD
d) A->BCD
View Answer
Class (course id, title, dept name, credits, sec id, semester, YEAR, building, room NUMBER, capacity,
TIME slot id)
course id, sec id, semester, year->building, room NUMBER, TIME slot id
A candidate KEY FOR this schema IS {course id, sec id, semester, YEAR}
34. Consider the above conditions. Which of the following relation holds ?
d) Cannot be determined
View Answer
35. The algorithm that takes a set of dependencies and adds one schema at a time, instead of decomposing
the initial schema repeatedly is
a) BCNF algorithm
b) 2NF algorithm
d) 1NF algorithm
View Answer
36. The functional dependency can be tested easily on the materialized view, using the constraints
____________.
a) Primary key
b) Null
c) Unique
View Answer
37. Which normal form is considered adequate for normal relational database design?
a) 2NF
b) 5NF
c) 4NF
d) 3NF
View Answer
38. Relation R with an associated set of functional dependencies, F, is decomposed into BCNF. The
redundancy (arising out of functional dependencies) in the resulting set of relations is
a) Zero
b) More than zero but less than that of an equivalent 3NF decomposition
d) Indeterminate
View Answer
39. A table has fields F1, F2, F3, F4, and F5, with the following functional dependencies:
F1->F3
F2->F4
(F1,F2)->F5
a) 1NF
b) 2NF
c) 3NF
View Answer
40. Let R(A,B,C,D,E,P,G) be a relational schema in which the following FDs are known to hold:
AB->CD
DE->P
C->E
P->C
B->G
a) in BCNF
d) not in 2NF
View Answer
UNIT-IV
1. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which
of the following form a transaction ?
a) Only 1
b) Only 2
d) Either 1 or 2
View Answer
View Answer
a) Atomicity
b) Durability
c) Isolation
View Answer
a) Atomicity
b) Durability
c) Isolation
View Answer
5. The database system must take special actions to ensure that transactions operate properly without
interference from concurrently executing database statements. This property is referred to as
a) Atomicity
b) Durability
c) Isolation
View Answer
a) Atomicity
b) Durability
c) Isolation
View Answer
7. __________ states that only valid data will be written to the database.
a) Consistency
b) Atomicity
c) Durability
d) Isolation
View Answer
d) Maintaining a data
View Answer
9. The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.
a) BEGIN
b) SET TRANSACTION
c) BEGIN TRANSACTION
d) COMMIT
View Answer
10. ____ means that the data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.
a) Consistency
b) Atomicity
c) Durability
d) Isolation
View Answer
11. A transaction may not always complete its execution successfully. Such a transaction is termed
a) Aborted
b) Terminated
c) Closed
View Answer
12. If an transaction is performed in a database and committed, the changes are taken to the previous state
of transaction by
a) Flashback
b) Rollback
d) Cannot be done
View Answer
13. Each modification done in database transaction are first recorded into the
a) Harddrive
b) Log
c) Disk
d) Datamart
View Answer
14. When the transaction finishes the final statement the transaction enters into
a) Active state
b) Committed state
d) Abort state
View Answer
15. The name of the transaction file shall be provided by the operator and the file that contains the edited
transactions ready for execution shall be called
a) Batch. Exe
b) Trans. Exe
c) Opt. Exe
d) Edit.Exe
View Answer
a) Transaction
b) Concurrency
c) Relations
View Answer
17. If the state of the database no longer reflects a real state of the world that the database is supposed to
capture, then such a state is called
a) Consistent state
b) Parallel state
c) Atomic state
d) Inconsistent state
View Answer
18. _______ means that data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.
a) Serializability
b) Atomicity
c) Isolation
d) Time stamping
View Answer
19. DBMS periodically suspends all processing and synchronizes its files and journals through the use of
a) Checkpoint facility
b) Backup facility
c) Recovery manager
View Answer
a) Active
b) Terminated
c) Aborted
d) Partially committed
View Answer
21. In order to maintain transactional integrity and database consistency, what technology does a DBMS
deploy?
a) Triggers
b) Pointers
c) Locks
d) Cursors
View Answer
22. A lock that allows concurrent transactions to access different rows of the same table is known as a
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock
View Answer
23. Which of the following are introduced to reduce the overheads caused by the log-based recovery?
a) Checkpoints
b) Indices
c) Deadlocks
d) Locks
View Answer
24. Which of the following protocols ensures conflict serializability and safety from deadlocks?
View Answer
25. Which of the following is the block that is not permitted to be written back to the disk?
a) Dead code
b) Read only
c) Pinned
d) Zapped
View Answer
26. If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an __________ on
all the records belonging to that file.
View Answer
27. Which refers to a property of computer to run several operation simultaneously and possible as
computers await response of each other
a) Concurrency
b) Deadlock
c) Backup
d) Recovery
View Answer
28. All lock information is managed by a __________ which is responsible for assigning and policing the
locks used by the transactions.
a) Scheduler
b) DBMS
c) Lock manager
d) Locking agent
View Answer
29. The ____ lock allows concurrent transactions to access the same row as long as they require the use of
different fields within that row.
a) Table-level
b) Page-level
c) Row-level
d) Field-level
View Answer
30. Which of the following is a procedure for acquiring the necessary locks for a transaction where all
necessary locks are acquired before any are released?
a) Record controller
b) Exclusive lock
c) Authorization rule
View Answer
31. The log is a sequence of _________ recording all the update activities in the database.
a) Log records
b) Records
c) Entries
d) Redo
View Answer
32. In the ___________ scheme, a transaction that wants to update the database first creates a complete
copy of the database.
a) Shadow copy
b) Shadow Paging
View Answer
33. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and
all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
View Answer
34. The current copy of the database is identified by a pointer, called ____________ which is stored on
disk.
a) Db-pointer
b) Update log
View Answer
35. If a transaction does not modify the database until it has committed, it is said to use the ___________
technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
36. If database modifications occur while the transaction is still active, the transaction is said to use the
___________technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
37. ____________ using a log record sets the data item specified in the log record to the old value.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
View Answer
38. In the __________ phase, the system replays updates of all transactions by scanning the log forward
from the last checkpoint.
a) Repeating
b) Redo
c) Replay
d) Undo
View Answer
39. The actions which are played in the order while recording it is called ______________ history.
a) Repeating
b) Redo
c) Replay
d) Undo
View Answer
40. A special redo-only log record <Ti , Xj , V1> is written to the log, where V1 is the value being
restored to data item Xj during the rollback. These log records are sometimes called
a) Log records
b) Records
UNIT-V
a) RAID level 1
b) RAID level 2
c) RAID level 0
d) RAID level 3
View Answer
a) Helical scanning
b) DAT
c) A laser beam
d) RAID
View Answer
3. With multiple disks, we can improve the transfer rate as well by ___________ data across multiple
disks.
a) Striping
b) Dividing
c) Mirroring
d) Dividing
View Answer
View Answer
a) RAID 1+0
b) RAID 0
c) RAID 2
View Answer
6. Where performance and reliability are both important, RAID level ____ is used.
a) 0
b) 1
c) 2
d) 0+1
View Answer
7. ______________ partitiones data and parity among all N+1 disks, instead of storing data in N-disks
and parity in one disk.
c) Bit parity
View Answer
8. Hardware RAID implementations permit _________ that is, faulty disks can be removed and replaced
by new ones without turning power off.
a) Scrapping
b) Swapping
c) Hot swapping
View Answer
9. ___________ is popular for applications such as storage of log files in a database system, since it offers
the best write performance.
a) RAID level 1
b) RAID level 2
c) RAID level 0
d) RAID level 3
View Answer
10. ______________ which increases the number of I/O operations needed to write a single logical block,
pays a significant time penalty in terms of write performance.
a) RAID level 1
b) RAID level 2
c) RAID level 5
d) RAID level 3
View Answer
11. A(n) _________ can be used to preserve the integrity of a document or a message.
a) Message digest
b) Message summary
c) Encrypted message
d) None of the mentioned
View Answer
a) Two
b) Three
c) Four
View Answer
View Answer
14. The property (or set of properties) that uniquely defines each row in a table is called the:
a) Identifier
b) Index
c) Primary key
d) Symmetric key
View Answer
15. The separation of the data definition from the program is known as:
a) Data dictionary
b) Data independence
c) Data integrity
d) Referential integrity
View Answer
View Answer
17. The traditional storage of data that is organized by customer, stored in separate folders in filing
cabinets is an example of what type of „database‟ system?
a) Hierarchical
b) Network
c) Object oriented
d) Relational
View Answer
18. The database design that consists of multiple tables that are linked together through matching data
stored in each table is called
a) Hierarchical database
b) Network database
d) Relational database
View Answer
19. The association role defines:
b) The relationship between the class diagram and the tables in the database
View Answer
View Answer
21. If h is any hashing function and is used to hash n keys in to a table of size m, where n<=m, the
expected number of collisions involving a particular key x is :
a) Less than 1
b) Less than n
c) Less than m
View Answer
a) Binary Search
b) Linear Search
c) Tree Search
d) Hashing
View Answer
23. The searching technique that takes O (1) time to find a data is
a) Linear Search
b) Binary Search
c) Hashing
d) Tree Search
View Answer
a) O(1) time
b) O(n2 )time
c) O(log n ) time
View Answer
25. Consider a hash table of size seven, with starting index zero, and a hash function (3x + 4)mod7.
Assuming the hash table is initially empty, which of the following is the contents of the table when the
sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Note that „_‟ denotes an empty
location in the table.
a) 8, _, _, _, _, _, 10
b) 1, 8, 10, _, _, _, 3
c) 1, _, _, _, _, _,3
d) 1, 10, 8, _, _, _, 3
View Answer
26. A hash table can store a maximum of 10 records, currently there are records in location 1,
3,4,7,8,9,10. The probability of a new record going into location 2, with hash functions resolving
collisions by linear probing is
a) 0.1
b) 0.6
c) 0.2
d) 0.5
View Answer
a) Hash tables
b) Heaps
d) Skip list
View Answer
b) Two entries with different data have the exact same key
c) Two entries with different keys have the same exact hash value
d) Two entries with the exact same key have different hash values
View Answer
29. Which of the following scenarios leads to linear running time for a random search hit in a linear-
probing hash table?
View Answer
a) Binary trees
b) Stacks
c) Graphs
View Answer
31. ARIES uses a ___________ to identify log records, and stores it in database pages.
b) Log number
c) Lock number
d) Sequence
View Answer
32. ARIES supports ___________ operations, which are physical in that the affected page is physically
identified, but can be logical within the page.
a) Physiological redo
b) Physiological undo
c) Logical redo
d) Logical undo
View Answer
c) Dirty redo
View Answer
34. __________ scheme that records only information about dirty pages and associated information and
does not even require of writing dirty pages to disk.
a) Fuzzy logic
b) Checkpoints
c) Fuzzy-checkpoint
d) Logical checkpoint
View Answer
35. Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the
_______ field of the page.
a) LSN
b) ReadLSN
c) PageLSN
d) RedoLSN
View Answer
36. There are special redo-only log records generated during transaction rollback, called _________ in
ARIES.
View Answer
37. The __________________ contains a list of pages that have been updated in the database buffer.
b) Page table
c) Dirty redo
View Answer
38. ___________ determines which transactions to undo,which pages were dirty at the time of the crash,
and the LSN from which the redo pass should start.
a) Analysis pass
b) Redo pass
c) Undo pass
View Answer
39. __________ starts from a position determined during analysis, and performs a redo, repeating history,
to bring the database to a state it was in before the crash.
a) Analysis pass
b) Redo pass
c) Undo pass
View Answer
40. ______________ rolls back all transactions that were incomplete at the time of crash.
a) Analysis pass
b) Redo pass
c) Undo pass
View Answer
d) Storage space is wasted & Changing the data in one spot will cause data inconsistency
View Answer
View Answer
a) Fields
b) Records
c) Database
d) Sectors
View Answer
44. Which of the following hardware component is the most important to the operation of database
management system?
a) High resolution video display
b) Printer
d) Mouse
View Answer
45. Which of the following is not true of the traditional approach to information processing
b) It is file oriented
d) It is inflexible
View Answer
View Answer
View Answer
48. The information about data in a database is called _______
a) Metadata
b) Hyper data
c) Tera data
View Answer
View Answer
50. The DBMS acts as an interface between what two components of an enterprise-class database system?
View Ans