0% found this document useful (0 votes)
58 views

BCA4002

The document appears to be the introduction or instructions for an exam on database management systems (DBMS). It includes information such as the exam details like paper code and series, instructions for examinees on how to handle the question booklet and answer sheet, and a note that remaining instructions are on the last page.

Uploaded by

AVANI SHARMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

BCA4002

The document appears to be the introduction or instructions for an exam on database management systems (DBMS). It includes information such as the exam details like paper code and series, instructions for examinees on how to handle the question booklet and answer sheet, and a note that remaining instructions are on the last page.

Uploaded by

AVANI SHARMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Roll No. ....................................

Question Booklet Number

O. M. R. Serial No.

B. C. A. (Fourth Semester) EXAMINATION, 2022-23


DATABASE MANAGEMENT SYSTEM
Questions Booklet
Paper Code Series

B C A 4 0 0 2 A
Time : 1:30 Hours ] [ Maximum Marks : 75

Instructions to the Examinee : ijh{kkfFkZ;ksa ds fy, funsZ’k %

1. Do not open the booklet unless you are 1. iz’u&iqfLrdk dks rc rd u [kksyas tc rd vkils dgk
asked to do so. u tk,A

2. The booklet contains 100 questions. 2. iz’u&iqfLrdk esa 100 iz’u gSaA ijh{kkFkhZ dks 75 iz’uksa
Examinee is required to answer 75 dks dsoy nh xbZ OMR vkUlj&’khV ij gh gy djuk
questions in the OMR Answer-Sheet
gS iz’u&iqfLrdk ij ughaA lHkh iz’uksa ds vad leku
provided and not in the question booklet.
All questions carry equal marks. gSaA

3. Examine the Booklet and the OMR Answer- 3. iz’uksa ds mŸkj vafdr djus ls iwoZ iz’u&iqfLrdk rFkk
Sheet very carefully before you proceed. OMR vkUlj&’khV dks lko/kkuhiwod
Z ns[k ysAa nks”kiw.kZ
Faulty question booklet due to missing or
iz’u&iqfLrdk ftlesa dqN Hkkx Nius ls NwV x, gksa ;k
duplicate pages/questions or having any
iz’u ,d ls vf/kd ckj Ni x, gksa ;k mlesa fdlh
other discrepancy should be got
immediately replaced. vU; izdkj dh deh gks rks mls rqjUr cny ysAa

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
(Only for Rough Work)

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
1. What does DBMS stand for ? 6. Which of the following is not a type of

(A) Database Management System DBMS ?


(B) Data Business Management
(A) Hierarchical DBMS
System
(C) Digital Backup Management (B) Relational DBMS
System (C) Object-Oriented DBMS
(D) Data Buffering and Monitoring
(D) Distributed DBMS
System

2. Which of the following is not a 7. Which language is commonly used to


component of a DBMS ? interact with a DBMS ?
(A) Data dictionary
(A) SQL (Structured Query Language)
(B) Query optimizer
(C) User interface (B) HTML (Hypertext Markup
(D) Spreadsheet application Language)

3. Which of the following is not a (C) Java


characteristic of a DBMS ?
(D) C++
(A) Data redundancy
(B) Data consistency 8. What does SQL stand for ?
(C) Data independence
(A) Standard Query Language
(D) Data security
(B) Structured Query Language
4. What is the primary purpose of a DBMS ?
(C) System Query Language
(A) To create tables and columns
(B) To manage and organize data (D) Simple Query Language

(C) To generate reports and charts


9. Which of the following is an example of
(D) To develop web applications
a database model used in DBMS ?
5. Which of the following is an example of
a popular open-source DBMS ? (A) Entity-Relationship model

(A) Oracle Database (B) Object-Oriented model


(B) Microsoft SQL Server
(C) Relational model
(C) IBM DB2
(D) All of the above
(D) MySQL

BCA-4002 (3) Set-A


10. What is data redundancy in the context of 13. Which of the following is an example of
DBMS ? a primary key in a relational database ?

(A) Storing multiple copies of the same (A) Employee name

data (B) Customer address

(B) Ensuring data consistency across (C) Product price

multiple databases (D) Student ID

(C) Encrypting sensitive data to 14. What is the purpose of database


prevent unauthorized access normalization ?
(D) Splitting data into multiple tables (A) To remove duplicate data from the
for better performance database
(B) To organize data into multiple
11. Which of the following is not a benefit of
tables and eliminate data
using a DBMS ?
redundancy
(A) Improved data sharing and
(C) To create indexes for faster data
integration retrieval
(B) Enhanced data security and privacy (D) To generate reports and analytics
(C) Reduced data consistency and from the data
integrity
15. Which of the following is not a level of
(D) Increased data accessibility and
data abstraction in a DBMS ?
availability
(A) Physical level
12. What is the role of a data dictionary in a (B) Logical level
DBMS ? (C) External level

(A) To store user passwords (D) Hierarchical level

(B) To provide a graphical user 16. Which of the following is not a database
interface operation supported by a DBMS ?
(C) To manage database backups and (A) Create
recovery (B) Read
(D) To store metadata about the (C) Update
database structure (D) Execute

BCA-4002 (4) Set-A


17. What is the purpose of a transaction in a 21. In the ER model, an entity is represented
DBMS ? by :
(A) To generate reports and charts
(A) Rectangle
(B) To manage database users and
permissions (B) Circle

(C) To ensure data consistency and (C) Diamond


integrity (D) Triangle
(D) To organize data into tables and
columns 22. Which of the following is not an example

of an entity in an ER model ?
18. Which of the following is an example of
a database management system ? (A) Customer
(A) Microsoft Word (B) Product
(B) Adobe Photoshop
(C) Relationship
(C) Microsoft Excel
(D) Oracle Database (D) Employee

19. Which of the following is not a data 23. The relationship between two entities is
model used in DBMS ? represented by :
(A) Hierarchical model
(A) Rectangle
(B) Relational model
(C) Network model (B) Circle

(D) Sequential model (C) Diamond

20. What is the purpose of a database schema (D) Triangle


in a DBMS ?
24. In the ER model, a relationship is also
(A) To define the structure and
known as :
organization of a database
(B) To create backups and restore data (A) Tuple
(C) To execute complex queries and (B) Attribute
calculations
(C) Key
(D) To generate graphical reports and
visualizations (D) Association

BCA-4002 (5) Set-A


25. Which of the following cardinality ratios 30. Which of the following cardinality ratios
represents a mandatory relationship ? represents a one-to-many relationship ?
(A) 1:1
(A) 1:1
(B) 1:N
(B) 1:N
(C) N:M
(C) N:M
(D) 0:N
(D) 0:N
26. In the ER model, an attribute is
represented by : 31. The maximum number of entities that
(A) Rectangle can be involved in a relationship is
(B) Circle known as the :
(C) Diamond
(A) Cardinality
(D) Ellipse
(B) Degree
27. Which of the following is not a valid
(C) Entity set
attribute type in the ER model ?
(D) Attribute
(A) Numeric
(B) Text 32. In the ER model, a weak entity is an
(C) Boolean entity that :
(D) Association
(A) Has a composite primary key
28. A primary key in an ER model uniquely
(B) Cannot exist without a related
identifies a(n) :
entity
(A) Entity
(C) Has a derived attribute
(B) Relationship
(C) Attribute (D) Has a many-to-many relationship

(D) Table
33. Which of the following represents a
29. The process of converting an ER model multivalued attribute in the ER model ?
into a relational schema is called :
(A) Underline
(A) Normalization
(B) Double ellipse
(B) Indexing
(C) Dotted line
(C) Data modeling
(D) Mapping (D) Double line

BCA-4002 (6) Set-A


34. In the ER model, an associative entity is 38. Which of the following is not a type of

used to represent : relationship in the ER model ?

(A) One-to-one
(A) Inheritance between entities
(B) One-to-many
(B) Aggregation of entities
(C) Many-to-one
(C) Relationships between
(D) Many-to-many
relationships
39. In the ER model, a derived attribute is an
(D) Weak entities
attribute that :
35. The process of removing duplicate data (A) Can be calculated from other
from an ER model is known as : attributes
(A) Normalization (B) Represents a relationship

(B) Denormalization (C) Must have a null value

(C) Deduplication (D) Is derived from a primary key

(D) Factoring 40. The process of grouping similar entities


into higher-level entities is known as :
36. Which of the following represents an
(A) Aggregation
identifying relationship in the ER model ?
(B) Composition
(A) Dashed line
(C) Normalization
(B) Double line
(D) Generalization
(C) Solid line
41. What is normalization in the context of
(D) None of the above
database design ?
37. In the ER model, a composite attribute is (A) The process of converting data into
an attribute that : a different format
(B) The process of removing duplicate
(A) Consists of multiple values
data from a database
(B) Cannot be further divided into
(C) The process of organizing data into
subparts
tables and eliminating redundancy
(C) Depends on other attributes
(D) The process of encrypting data to
(D) Represents a primary key enhance security

BCA-4002 (7) Set-A


42. Which normal form requires that the 46. Which normal form is based on the
database is in first normal form (1NF) concept of a functional dependency ?
and all non-key attributes are fully (A) First normal form (1NF)
functionally dependent on the primary
(B) Second normal form (2NF)
key ?
(C) Third normal form (3NF)
(A) First normal form (1NF) (D) Boyce-Codd normal form (BCNF)
(B) Second normal form (2NF)
47. Which normal form is violated if a non-
(C) Third normal form (3NF)
key attribute depends on a subset of the
(D) Boyce-Codd normal form (BCNF)
primary key ?
43. Which normal form eliminates transitive
(A) First normal form (1NF)
dependencies between non-key attributes ?
(B) Second normal form (2NF)
(A) First normal form (1NF)
(C) Third normal form (3NF)
(B) Second normal form (2NF)
(D) Boyce-Codd normal form (BCNF)
(C) Third normal form (3NF)
(D) Boyce Codd normal form (BCNF) 48. Which normal form allows repeating
groups and is considered to be the lowest
44. Which normal form is also known as the
level of normalization ?
highest normal form and eliminates all
(A) First normal form (1NF)
possible anomalies ?
(B) Second normal form (2NF)
(A) First normal form (1NF)
(C) Third normal form (3NF)
(B) Second normal form (2NF)
(D) Boyce-Codd normal form (BCNF)
(C) Third normal form (3NF)
(D) Boyce-Codd normal form (BCNE) 49. Which normal form allows only atomic
values and eliminates multi-valued
45. Which normal form allows partial
dependencies between non-key attributes ? dependencies ?

(A) First normal form (1NF) (A) First normal form (1NF)

(B) Second normal form (2NF) (B) Second normal form (2NF)

(C) Third normal form (3NF) (C) Third normal form (3NF)
(D) Boyce-Codd normal form (BCNF) (D) Boyce-Codd normal form (BCNF)

BCA-4002 (8) Set-A


50. Which normal form is an extension of the 53. In functional dependency A -> B, what

third normal form (3NF) and further does B represent ?

addresses dependencies involving (A) The primary key of the table


candidate keys ?
(B) The foreign key of the table
(A) First normal form (1NF) (C) The dependent attribute
(B) Second normal form (2NF)
(D) The determinant attribute
(C) Third normal form (3NF)
54. Which of the following is true about
(D) Boyce-Codd normal form (BCNF)
functional dependency ?
51. What is functional dependency in the
(A) A single attribute can determine
context of database design ?
multiple attributes.
(A) A relationship between two tables
(B) A single attribute can be
in a database
determined by multiple attributes.
(B) A constraint that defines a unique
(C) A functional dependency can exist
identifier for a table
between two tables.
(C) A relationship between attributes
(D) A functional dependency is always
within a table
symmetric.
(D) A constraint that enforces

referential integrity 55. Which of the following statements is true

about a candidate key in functional


52. In functional dependency A -> B, what

does A represent ? dependency ?

(A) The primary key of the table (A) It is a determinant attribute.

(B) The foreign key of the table (B) It is a dependent attribute.

(C) The dependent attribute (C) It is a unique identifier for a table.

(D) The determinant attribute (D) It is always composite.

BCA-4002 (9) Set-A


56. Which of the following functional 60. Which of the following dependencies
dependencies violates the second normal indicates that changing one attribute can
form (2NF) ? affect another attribute in the same table ?
(A) Partial dependency
(A) Trivial dependency
(B) Transitive dependency
(B) Partial dependency
(C) Multi-valued dependency
(C) Multi-valued dependency
(D) Trivial dependency
(D) Full dependency
57. In functional dependency A -> B, what
61. SQL stands for :
does the arrow symbol (->) represent ?
(A) Structured Query Language
(A) Assignment operator

(B) Logical AND operator (B) Simple Query Language

(C) Logical OR operator (C) Standard Query Language

(D) Implies or implies not operator (D) Sequential Query Language

58. Which of the following dependencies 62. Which SQL command is used to retrieve
indicates that two attributes are data from a database ?
functionally independent of each other ?
(A) SELECT
(A) Trivial dependency
(B) UPDATE
(B) Partial dependency
(C) DELETE
(C) Multi-valued dependency
(D) INSERT
(D) Full dependency
63. Which SQL command is used to insert
59. Which normal form is based on the
new data into a table ?
concept of functional dependency ?
(A) SELECT
(A) First normal form (1NF)
(B) UPDATE
(B) Second normal form (2NF)

(C) Third normal form (3NF) (C) DELETE

(D) Boyce-Codd normal form (BCNF) (D) INSERT

BCA-4002 ( 10 ) Set-A
64. Which SQL command is used to modify 68. Which SQL command is used to remove

existing data in a table ? a table from a database ?

(A) SELECT (A) CREATE TABLE


(B) ALTER TABLE
(B) UPDATE
(C) DROP TABLE
(C) DELETE
(D) DELETE TABLE
(D) INSERT
69. Which SQL command is used to retrieve
65. Which SQL command is used to remove
unique records from a table ?
data from a table ? (A) SELECT DISTINCT
(A) SELECT (B) SELECT UNIQUE

(B) UPDATE (C) SELECT UNIQUE RECORDS

(C) DELETE (D) SELECT UNIQUE VALUES

(D) INSERT 70. Which SQL command is used to


combine rows from two or more tables
66. Which SQL command is used to create a
based on related columns ?
new table ?
(A) JOIN
(A) CREATE TABLE
(B) UNION
(B) ALTER TABLE (C) INTERSECT
(C) DROP TABLE (D) MERGE
(D) INSERT TABLE
71. What is a transaction in the context of

67. Which SQL command is used to add a transaction processing ?


(A) A unit of work that is executed as a
new column to an existing table ?
single, indivisible operation
(A) CREATE COLUMN (B) A record stored in a database
(B) ALTER COLUMN (C) A query executed against a
database
(C) ADD COLUMN
(D) A user session in a database
(D) UPDATE COLUMN
management system

BCA-4002 ( 11 ) Set-A
72. ACID properties of a transaction include : 75. Which of the following is an example of

(A) Atomicity, Consistency, Isolation, a transaction processing system ?

Durability (A) Online banking system

(B) Atomicity, Concurrency, Isolation, (B) Word processing software

Durability (C) Video editing software

(C) Availability, Consistency, (D) Gaming console


Isolation, Durability
76. The process of undoing or rolling back a
(D) Availability, Concurrency,
transaction to its original state is called :
Integrity, Durability
(A) Recovery
73. In transaction processing, consistency (B) Commit
refers to : (C) Abort
(A) Ensuring that the database remains (D) Consistency check
in a valid state before and after a
77. Which of the following concurrency
transaction
control techniques ensures serializability
(B) Providing concurrent access to the
of transactions ?
database by multiple users
(A) Locking
(C) Recovering the database after a
(B) Two-phase commit
system failure
(C) Timestamp ordering
(D) Preserving the order of transactions
(D) Checkpointing
in a system
78. The process of combining multiple
74. Which of the following is an example of
transactions into a single logical unit of
a transaction processing system ?
work is called :
(A) Online banking system (A) Transaction commit
(B) Word processing software (B) Transaction rollback
(C) Video editing software (C) Transaction isolation

(D) Gaming console (D) Transaction serialization

BCA-4002 ( 12 ) Set-A
79. Which of the following is an example of 82. Which of the following data models

a distributed transaction processing represents data in a hierarchical structure

system ? with parent-child relationships ?

(A) Relational data model


(A) Online shopping website
(B) Network data model
(B) Personal finance management
(C) Hierarchical data model
software
(D) Object-oriented data model
(C) Inventory management system
83. Which data model represents data as a
(D) Social media platform
collection of objects with properties and

80. Which of the following is not a methods ?

component of a transaction processing (A) Relational data model

system ? (B) Network data model


(C) Hierarchical data model
(A) Transaction manager
(D) Object-oriented data model
(B) Database server
84. Which data model represents data as a set
(C) Query optimizer
of tables with rows and columns ?
(D) User interface
(A) Relational data model

81. What is a data model ? (B) Network data model


(C) Hierarchical data model
(A) A representation of data
(D) Object-oriented data model
relationships in a database
85. Which data model allows for complex
(B) A programming language used to
data structures, relationships, and
manipulate data
inheritance ?
(C) A storage structure for data in a
(A) Relational data model
database
(B) Network data model
(D) A set of rules for accessing data in
(C) Hierarchical data model
a database (D) Object-oriented data model

BCA-4002 ( 13 ) Set-A
86. Which data model is based on a 91. Relation algebra is a formalism for
mathematical concept called set theory ? manipulating and querying relational
(A) Relational data model databases. Which of the following is true
(B) Network data model
about relation algebra ?
(C) Hierarchical data model
(D) Object-oriented data model (A) It is a procedural language for

87. Which data model represents data as a database programming.


collection of records connected through (B) It is a declarative language for
pointers ? expressing queries on databases.
(A) Relational data model
(C) It is a physical storage format for
(B) Network data model
databases.
(C) Hierarchical data model
(D) Object-oriented data model (D) It is a network model for

88. Which data model is the most widely organizing data in databases.
used for commercial databases ?
92. Which of the following operations in
(A) Relational data model
relation algebra is used to select rows
(B) Network data model
(C) Hierarchical data model from a relation that satisfy a given
(D) Object-oriented data model condition ?

89. Which data model is used to describe the (A) Union


structure and behavior of a database (B) Join
system ?
(C) Projection
(A) Conceptual data model
(B) Logical data model (D) Selection
(C) Physical data model
93. Which of the following operations in
(D) External data model
relation algebra combines tuples from
90. Which data model represents the overall
two relations based on a common
structure of a database without
attribute ?
implementation details ?
(A) Union
(A) Conceptual data model
(B) Join
(B) Logical data model
(C) Physical data model (C) Projection

(D) External data model (D) Difference

BCA-4002 ( 14 ) Set-A
94. The difference operation in relation 97. Which of the following is a common
algebra is used to : technique used for data recovery in
databases ?
(A) Combine tuples from two relations.
(A) Replication
(B) Remove duplicates from a relation. (B) Encryption
(C) Redundancy
(C) Select rows from a relation that
(D) Indexing
satisfy a given condition.
98. What is data security in the context of
(D) Remove tuples from one relation
databases ?
that appear in another relation.
(A) The process of ensuring data

95. Which of the following operations in consistency in a database


(B) The process of maintaining data
relation algebra is used to combine tuples
integrity in a database
from two relations into a single relation
(C) The process of protecting data from
without duplicates ? unauthorized access, use,
(A) Union disclosure, disruption,
modification, or destruction
(B) Join
(D) The process of backing up data in a
(C) Projection database
(D) Intersection
99. Which of the following is a common

96. What is data recovery in the context of method for enhancing data security in

databases ? databases ?
(A) Database normalization
(A) The process of restoring a database
(B) Database replication
to a previous state after a system
(C) Database encryption
failure
(D) Database indexing
(B) The process of securing data from
100. Which of the following is an example of
unauthorized access
a database security threat ?
(C) The process of converting data into
(A) Data redundancy
a readable format
(B) Data corruption
(D) The process of optimizing database (C) SQL injection
performance (D) Data normalization

BCA-4002 ( 15 ) Set-A
4. Four alternative answers are mentioned for 4. iz’u&iqfLrdk esa izR;sd iz’u ds pkj lEHkkfor mŸkj
each question as—A, B, C & D in the booklet. A, B, C ,oa D gSaA ijh{kkFkhZ dks mu pkjksa fodYiksa esa ls
The candidate has to choose the correct
answer and mark the same in the OMR
lgh mŸkj Nk¡Vuk gSA mŸkj dks OMR vkUlj&’khV esa
Answer-Sheet as per the direction : lEcfU/kr iz’u la[;k esa fuEu izdkj Hkjuk gS %
Example : mnkgj.k %
Question : iz’u %
Q. 1 iz’u 1
Q. 2 iz’u 2
Q. 3 iz’u 3
Illegible answers with cutting and viBuh; mŸkj ;k ,sls mŸkj ftUgsa dkVk ;k cnyk x;k
over-writing or half filled circle will be gS ;k xksys esa vk/kk Hkjdj fn;k x;k mUgsa fujLr dj
cancelled.
fn;k tk,xkA
5. Each question carries equal marks. Marks 5. izR;sd iz’u ds vad leku gSaA vkids ftrus mŸkj
will be awarded according to the number of lgh gksxa ]s mUgha ds vuqlkj vad iznku fd;s tk;saxAs
correct answers you have.
6. All answers are to be given on OMR Answer 6. lHkh mŸkj dsoy vks- ,e- vkj- mŸkj&i=d (OMR
sheet only. Answers given anywhere other Answer Sheet) ij gh fn;s tkus gSaA mŸkj&i=d esa
than the place specified in the answer sheet fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k
will not be considered valid.
mŸkj ekU; ugha gksxkA
7. Before writing anything on the OMR Answer 7. vks- ,e- vkj- mŸkj&i=d (OMR Answer Sheet) ij
Sheet, all the instructions given in it should dqN Hkh fy[kus ls iwoZ mlesa fn;s x;s lHkh vuqns’kksa dks
be read carefully. lko/kkuhiwoZd i<+ fy;k tk;sA
8. After the completion of the examination 8. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks
candidates should leave the examination hall viuh OMR Answer Sheet miyC/k djkus ds ckn
only after providing their OMR Answer gh ijh{kk d{k ls izLFkku djsaA ijh{kkFkhZ vius lkFk
Sheet to the invigilator. Candidate can carry
their Question Booklet.
iz’u&iqfLrdk ys tk ldrs gSaA
9. There will be no negative marking. 9. fuxsfVo ekfd±x ugha gSA
10. Rough work, if any, should be done on the 10. dksbZ Hkh jQ dk;Z iz’u&iqfLrdk ds vUr esa jQ&dk;Z
blank pages provided for the purpose in the
booklet.
ds fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A
11. To bring and use of log-book, calculator, 11. ijh{kk&d{k esa ykWx&cqd] dSydqysVj] istj rFkk lsY;qyj
pager and cellular phone in examination hall Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA
is prohibited.
12. In case of any difference found in English 12. iz’u ds fgUnh ,oa vaxszth :ikUrj.k esa fHkUurk gksus dh
and Hindi version of the question, the n’kk esa iz’u dk vaxst
z h :ikUrj.k gh ekU; gksxkA
English version of the question will be held
authentic.
Impt. : On opening the question booklet, first egRoiw.kZ % iz’uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysa
check that all the pages of the question fd iz’u&iqfLrdk ds lHkh i`”B HkyhHkk¡fr Nis gq, gSaA
booklet are printed properly. If there is ny ;fn iz’uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks
discrepancy in the question Booklet, then
after showing it to the invigilator, get
fn[kkdj mlh fljht dh nwljh iz’u&iqfLrdk izkIr
another question Booklet of the same series. dj ysaA

You might also like