0% found this document useful (0 votes)
12 views

Question Bank(DBMS)

The document is a question bank related to Database Management Systems (DBMS), containing multiple-choice questions and answers on various topics such as SQL commands, relational models, transaction properties, and data integrity. Each question is numbered and includes options labeled A through D, with the correct answer indicated. It serves as a study aid for individuals preparing for exams or seeking to enhance their knowledge of DBMS concepts.

Uploaded by

Aniket Kumre
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Question Bank(DBMS)

The document is a question bank related to Database Management Systems (DBMS), containing multiple-choice questions and answers on various topics such as SQL commands, relational models, transaction properties, and data integrity. Each question is numbered and includes options labeled A through D, with the correct answer indicated. It serves as a study aid for individuals preparing for exams or seeking to enhance their knowledge of DBMS concepts.

Uploaded by

Aniket Kumre
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

DBMS Question Bank

Sr. No Question Answer

ROLLBACK in a database is ____ statement.

(A) DDL

(B) DML

(C) DCL

1 (D) TCL D

In a relational model, relations are termed as

(A) Rows

(B) Tables

(C) Attributes

2 (D) Tuples B

Which of the following is a procedural language?

(A) Relational algebra

(B) Query language

(C) Tuple relational calculus

3 (D) Domain relational calculus A


Which of the following types of tables constraints will prevent the entry of
duplicate rows?

(A) Primary keys

(B) Foreign keys

(C) Unique keys


4 A

In an E-R diagrams, ellipses represents

(A) Attributes

(B) Link between attributes and entity sets

(C) Relation among entity set

5 (D) Entity set A


In a relational modes, a cardinality is termed as

(A) Number of constraints

(B) Number of tables

(C) Number of attributes

6 (D) Number of tuples D


Which of the following is not a type of database?

(A) Relational

(B) Hierarchical

(C) Network

7 (D) Transition D

The most commonly used operation in relational algebra for projecting a set
of tuple from a relation is

(A) Union

(B) Select

(C) Projection

8 (D)
TheJoin
_____ operation allows the combining of two relations by merging pairs B
of tubles, one from each relation, into a single tuple.

(A) Intersection

(B) Union
9 C
A _____ is an abstract model that describes how the data are organised and
represented.

(A) Database

(B) Schema

(C) Instances

10 (D) Data model D


Which of the following is a set of one or more attributes taken collectively to
uniquely identify a record?

(A) Foreign key

(B) Super key

(C) Sub key

11 (D) Candidate key B


The ____ provides a set of operations that take one or more relations as input
and return a relation as an output.

(A) Relation flow

(B) Scheme diagram

(C) Relational algebra

12 (D) Schematic representation C

Where will we find the referential integrity command?

(A) Table

(B) Tools

(C) Format

13 (D) None of these D

____ represents raw facts, whereas ___ is data made meaningful.

(A) Data, information

(B) Information, reporting

(C) Information, bits

14 (D) Records, bytes A


When data changes in multiple lists and all lists are not updated, this causes

(A) Data redundancy

(B) Data inconsistency

(C) Duplicate data

15 (D) Information overload B

Which of the following is a Data Model?


(A) Entity-Relationship model
(B) Relational data model
(C) Object-Based data model
16 (D) All of the above D
Snapshot of the data in the database at a given instant of time is called
(A) Database Schema
(B) Database Instance
(C) Database Snapshot
17 (D) All of the above B

A functional dependency between two or more non-key attributes is called


(A) Transitive dependency
(B) Partial transitive dependency
(C) Functional dependency
18 (D) Partial functional dependency A

The Primary key must be


(A) Non Null
(B) Unique
(C) Option A or B
19 (D) Option A and B C
In SQL, which of the following is not a data Manipulation Language
Commands?
(A) DELETE
(B) SELECT
(C) UPDATE
20 (D) CREATE D

A transaction completes its execution is said to be


(A) Saved
(B) Loaded
(C) Rolled
21 (D) Committed D

Which of the following is not a Schema?


(A) Database Schema
(B) Physical Schema
(C) Critical Schema
22 (D) Logical Schema C

Who proposed the relational model?


(A) Bill Gates
(B) E.F. Codd
(C) Herman Hollerith
23 (D) Charles Babbage B

The index consists of


(A) A list of keys
(B) Pointers to the master list
(C) Both (a) and (b)
24 (D) None of the above C
In SQL, GRANT command is used to
(A) Allow user to access databases
(B) Allow user to create databases
(C) Grant system privileges, roles, and object privileges to uses and roles
25 (D) Choose auditing for specific SQL commands C

In an Entity-Relationship Diagram Rectangles represents


(A) Entity sets
(B) Attributes
(C) Database
26 (D) Tables A

Set of permitted values of each attribute is called


(A) Domain
(B) Tuple
(C) Relation
27 (D) Schema A

The attribute that can be divided into other attributes is called


(A) Simple Attribute
(B) Composite Attribute
(C) Multi-valued Attribute
28 (D) Derived Attribute B

Database locking concept is used to solve the problem of


(A) Lost Update
(B) Uncommitted Dependency
(C) Inconsistent Data
29 (D) All of the above D

Which of the following is Relation algebra Operation?


(A) Select
(B) Union
(C) Rename
30 (D) All of the above D

In an Entity-Relationship Diagram “Diamonds” represents


(A) Attributes
(B) Multi-valued attributes
(C) Weak entity set
31 (D) Relationship sets D

What are ACID properties of Transactions?


(A) Atomicity, Consistency, Isolation, Database
(B) Atomicity, Consistency, Isolation, Durability
(C) Atomicity, Consistency, Inconsistent, Durability
32 (D) Automatically, Concurrency, Isolation, Durability B
A relation that has no partial dependencies is in which normal form
(A) First
(B) Second
(C) Third
33 (D) BCNF B

A command to remove a relation from an SQL database


(A) Delete table <table name>
(B) Drop table <table name>
(C) Erase table <table name>
34 (D) Alter
Which oftable <table name>
the following in true regarding Referential Integrity? B
(A) Every primary-key value must match a primary-key value in an associated
table
(B) Every primary-key value must match a foreign-key value in an associated
table
(C) Every foreign-key value must match a primary-key value in an associated
35 table C
A relation is ………………. if every field contains only atomic values that are, no
lists or sets.
A) 1 NF
B) 2 NF
C) 3 NF
36 D) BCNF A

A table is in the ………………….. if only candidate keys are the determinants.


A) functional dependency
B) transitive dependency
C) 4 NF
37 D) BCNF D
The rule that a value of a foreign key must appear as a value of some specific
table is called a
A. Referential constraint
B. Index
C. Integrity constraint
38 D. Functional A

Relational Algebra is
A. Data Definition Language
B. Meta Language
C. Procedural query Language
39 D. None of the above C

Relational calculus is a
A. Procedural language
B. Non-Procedural language
C. Data definition language
40 D. High level language B
E-R model uses this symbol to represent the weak entity set?
A. Dotted rectangle
B. Diamond
C. Doubly outlined rectangle
41 D. None of these C

………. is an alternative of log based recovery.


A. Disk recovery
B. Shadow paging
C. Dish shadowing
42 D. Crash recovery B

Which of the following is not a property of transactions?


A. Atomicity
B. Concurrency
C. Isolation
43 D. Durability B

Which of the following ensures the atomicity of the transaction?


A. Transaction management component of DBMS
B. Application Programmer
C. The concurrency control component of DBMS
44 D. Recovery management component of DBMS A
……… protocol is used to perform multiple transactions that execute on a
different database.
A. commit
B. two-phase lock
C. two-phase commit
45 D. locking C

Which of the following represents a query in the tuple relational calculus?


a) { }{P(t) | t }
b) {t | P(t)}
c) t | P() | t
46 d) All of the mentioned B
A user executes a query which the ___ in the system uses to generate the
internal form of the query. In addition to checking the syntax of the query, the
____ verifies the name of the relation in the database, then the tuple, then the
attribute value.
A) Parser B) Translation
47 C) Optimization D) Evaluation A

The system must create a query ____ plan before it can fully evaluate a query.
A) Optimization B) Parser
48 C) Translation D) Evaluation D
The concept whichchecks the syntax of query which is written according to
rules of the grammer is classified as
a) Query graph b) Query tree
49 c) Parser d) Scanner c

A relation that has no partial dependencies is in which normal form


a) First b) Second
50 c) Third d) BCNF b

Which of the following makes the transaction permanent in the database ?


a) View b) Commit
51 c) Rollback d) Flashback b

The system must create a query ____ plan before it can fully evaluate a query.
a) Optimization b) Parser
52 c) Translation d) Evaluation d

Collections of operations that form a single logical unit of work are called
__________?
a) Views b) Networks
53 c) Units d) Transactions d

The real use of the Two-phase commit protocol is ______________


a) Deadlock will not occur b) Concurrency control can be avoided
54 c) Atomicity, i.e, all-or-nothing commits at all sites d) None of the above c

Which of the following is a property of transactions?


a) Atomicity b) Durability
55 c) Isolation d) All of the mentioned d

Checkpoints are a part of


a)Recovery measures. b) Security measures.
56 c) Concurrency measures. d) Authorization measures. a
Which of the following is not a recovery technique?
a) Deferred Database Modification
b) Immediate Database Modification
c) Two-phase commit
57 d) Recovery management c

The “all-or-none” property is commonly referred to as _________?


a) Isolation b) Durability
58 c) Atomicity d) None of the mentioned c

Transaction processing is associated with everything below except


a) Conforming a action or triggering a response
b) Producing detail summary or exception report
c) Recording a business activity
59 d) Maintaining a data a
Which functional dependency types is/are not present in the following
dependencies?
Empno -> EName, Salary, Deptno, DName
DeptNo -> DName
EmpNo -> DName
a) Full functional dependency
b) Partial functional dependency
c) Transitive functional dependency
60 d) BothofB the
Which andfollowing
C is the preferred way to recover a database after a b
transaction in progress terminates abnormally?
a.Rollback
b.Rollforward
c.Switch to duplicate database
d.Reprocess transactions
61 a
Database locking concept is used to solve the problem of
a)Lost Update
b)Uncommitted Dependency
c)Inconsistent Data
d)All of the above
62 d
The deadlock state can be changed back to stable state by using
_____________ statement.

a)Commit

b)Rollback

c)Savepoint

d)Deadlock
63 b
Which of the following contains a complete record of all activity that affected
the contents of a database during a certain period of time?

a)report writer

b)query language

c)data manipulation language

d)transaction log
64 d

Concurrency control is important for which of the following reasons?


a)To ensure data integrity when updates occur to the database in a multiuser
environment
b)To ensure data integrity when updates occur to the database in a single-user
environment
c)To ensure data integrity while reading data occurs to the database in a
multiuser environment
d)To ensure data integrity while reading data occurs to the database in a
single-user environment
65 a
A deadlock exists in the system if and only if the wait-for graph contains a
___________.
a)Cycle
b)Direction
c)Bi-direction
d)Rotation
66 a

What is/are the step(s) involved in fetching the data from the database in
query processing?
a)Parsing and translation b) Optimization
67 c) Evaluation d) All of the above d

If one attribute is determinant of second, which in turn is determinant of third,


then the relation cannot be:
a) Well-structured b) 1NF
68 c) 2NF d) 3NF d

Which of the following is not a recovery technique?


a) Deferred update
b) Immediate update
c) Two-phase commit
69 d) Recovery management c

The simplest approach to introducing redundancy is to duplicate every disk is


called …..
a) mirroring b) imaging
70 c) copying d) All of the above a
If database modifications occur while the transaction is still active, the
transaction is said to use the ___________technique.
a) Deferred-modification b) Late-modification
71 c) Immediate-modification d) Undo c
The log is a sequence of _________ recording all the update activities in the
database.
a) Log records b) Records
72 c) Entries d) Redo b
Let us suppose that in a distributed database, during a transaction T1, one of
the sites, say S1, is failed. When recovers, the site S1 has to check its log file
(log based recovery) to decide the next move on the transaction T1. If the log
contains a <T, Commit> record, what the site S1 has to do?
a) Need not do anything b) Perform Undo
73 c) Perform Redo d) Abort the transaction c
With regards to transaction processing, any DBMS should be capable of:
a)Ensuring that transactions are free from interference from other users.
b)Parts of a transaction are not lost due to a failure.
c)Transactions do not make the database inconsistent.
d)All of the above.
74 d

In case of any shut down during transaction before commit which of the
following statement is done automatically ?
a) View b)Commit
75 c) Rollback d) Flashback c
What is ACID properties of Transactions?
a)Atomicity, Consistency, Isolation, Database
b)Atomicity, Consistency, Isolation, Durability
c)Atomicity, Consistency, Inconsistent, Durability
d)Automatically, Concurrency, Isolation, Durability
76 b

A system is in a ______ state if there exists a set of transactions such that


every transaction in the set is waiting for another transaction in the set.
a) Idle b) waiting
77 c) Ready d) Deadlock d
A transaction completes its execution is said to be
a)Saved
b)Loaded
c)Rolled
d)Committed
78 d
A transaction may not always complete its execution successfully. Such a
transaction is termed
a)Aborted
b)Terminated
c)Closed
d)All of the mentioned
79 a
Locking may cause which of the following problems?
a)Erroneous updates
b)Deadlock
c)Versioning
d)All of the above.
80 b
In database management system, the executing process or executing program
which considers the updating or reading of records stored in database is called
a)conceptualization
b)execution
c)implementation
d)transaction
81 d
Execution of translation in isolation preserves the _________ of a database
a)Atomicity
b)Consistency
c)Durability
d)All of the mentioned
82 b
Which of the following is not a property of a transaction?

a)Atomicity

b)Simplicity
83 b
X is read from a database and stored in a buffer in main memory with the ___
operation.
A. Read
B. Write
C. Commit
84 D. Rollback A

Which of the following is an operation of transactions?


A. Read
B. Write
C. Commit
85 D. All of the above D

An operation is part of a transaction if it is ___ related.


A. Logically
B. Analytically
C. Reasonably
86 D. None A
Writing the data from the buffer back to the database is accomplished by
using the _____ operation.
A. Read
B. Write
C. Commit
87 D. Rollback B
In a database, prior to and after a transaction, properties are used to ensure
___.
A. Consistency
B. Redundancy
C. Latency
88 D. Anonymity A

All changes made in a transaction are ___ once it commits.


A. Visible
B. Not Visible
C. Broken
89 D. Not Broken A
What is TRUE about Consistency?
A. As a result of integrity constraints, the database remains consistent before
and after the transaction.
B. In most cases, a database remains either in its previous stable state or in a
new stable state following the execution of a transaction.
C. Every transaction undergoes a consistent database instance, which is the
consistent property of databases.
90 D. All of the above D
What is TRUE about Isolation?
A. By using the data used during a transaction, the second transaction will not
be able to use it until the first has been executed.
B. The data item X cannot be accessed by any other transaction T2 until the
transaction T1 is completed and the data item X is used by the transaction T1.
C. It enforced the isolation property via its concurrency control subsystem.
91 D. All of the above D

What is TRUE about atomicity?


A. The transaction cannot be partially completed, since there is no midway.
B. In each transaction, either the entire transaction is executed or it is not.
C. Both A and B
92 D. None of the above C

When dealing with database transactions, there is often a need for multiple
users to use a database to perform different operations. In this case, ___ of
the database occurs.
A. Concurrent Connection
B. Concurrent Reduction
C. Concurrent Execution
93 D. Concurrent Revolution C
During simultaneous execution, each operation should be performed
interleaved with the others, ensuring that there is no interference with the
other operations. This maintains a database ___.
A. Consistency
B. Redundancy
C. Concurrency
94 D. None C
What is TRUE about Durability?
A. The failure of the system or an error in a transaction cannot cause them to
be lost.
B. A consistent state is reached when a transaction is completed.
C. System failures cannot lead to the loss of that consistent state.
95 D. All of the above D
The concurrency ___ allows us to maintain the concurrency of the database.
A. Protocols
B. Controls
C. Control Protocols
96 D. None C

What is the Dirty Read Problem also known as?


A. W-W Conflict
B. W-R Conflict
C. R-R Conflict
97 D. None B

You might also like