adv. dbms mcq

47
Advance database management system. Subject code:-mca 3020 Unit 1 Comparison between Diferent Databases 1.___________ is considered the most significant resource of any orga A.information B.Data. C.storage D.release 2. A__________is very significant resource, it requires tough, protec softare that can collect and utilize it fast. A.information B.Data. C.storage D.release !. An organization comprising a database system usually includes a pe ____________ A.system administrator. B.database administrator. C.office administrator. D.oracle administrator. ". #he operational data$s responsibility is handled by ___________. A.system administrator. B.database administrator. C.office administrator. D.oracle administrator %.&nstallation of databases is responsblity of ______________. A.system administrator. B.database administrator. C.office administrator. D.oracle administrator '.configuaration of databases is responsibility of______________. A.system administrator. B.database administrator. C.office administrator. D.oracle administrator (.#he )toring data in an outmoded method can be averted in __________ A.databases *.tables C.record D.ro +.______________process results in asting storage area. A.redundancy *. atomicity C. fle ibility. D.integrity. -.)ecurity guidelines are defined by D* ) to use the ________. A.information *.storage C.dataD.record

Upload: nirali

Post on 03-Nov-2015

48 views

Category:

Documents


0 download

DESCRIPTION

mcq

TRANSCRIPT

Advance database management system. Subject code:-mca 3020

Unit 1 Comparison between Different Databases 1.___________ is considered the most significant resource of any organization.A.information B.Data. C.storage D.release2. A__________is very significant resource, it requires tough, protected and easily obtainable software that can collect and utilize it fast.A.information B.Data. C.storage D.release3. An organization comprising a database system usually includes a person called as ____________A.system administrator. B.database administrator. C.office administrator. D.oracle administrator.4. The operational datas responsibility is handled by ___________.A.system administrator. B.database administrator. C.office administrator. D.oracle administrator 5.Installation of databases is responsblity of ______________.A.system administrator. B.database administrator. C.office administrator. D.oracle administrator6.configuaration of databases is responsibility of______________.A.system administrator. B.database administrator. C.office administrator. D.oracle administrator7.The Storing data in an outmoded method can be averted in ___________.A.databases B.tables C.record D.row8.______________process results in wasting storage area.A.redundancy B. atomicity C. flexibility. D.integrity.9.Security guidelines are defined by DBMS to use the ________.A.information B.storage C.data D.record10.By providing security database can be accssed only by doing suitable __________.A.accsess B.login C.retrival D.release.11.Dbms can offer simultaneous __________ of numerous parts included in database.A.retrival B.execution C.login D.accsess.12.Databases __________specify that there should be accurate data.A.redundancy B.integrity C.atomicity D.flexibility13.Two entries having some variation that propose to display the same information is considered as an example showing ______________.A.deficiency of integrity B.efficiency of integrity C.redundancy of integrity D.flexibility of integrity.14.___________constraints can be defined and applied means of DBMS.A.integrity B.redundancy. C.flexibility D.atomicity..15.Dbms include suitable backup in the situation of __________.A.hang B.faliure C.crash D.restore16.__________can straightforwardly have an interaction with database by means of user interface which is offered by Dbms.A.server B.client C. client-server D.multiplexer!7.The process of ___________the representation of data is significant for replacing data or moving data among systems.A.replacing B.normalizing C. standardizing. D.Moving 18.The database can be utilized as stable ___________of application objects,database as well as structure of database.A.warehouse B.mining C.replication D.fragmentation.19.Database can store a _______object of languages.A.simple B.complicated C.regrous D.difficult20.To bulid up the programs related to client utility,the effort needed ________significantly with databases.A.increases B.decreases C.proportional D.varies21.People can have interact with data available in database through various _________.A.The clients can inspect the outcomes or even collect and store the results in _____or _______Format.A.excel or word . B.pdf and word C.pdf and excel D.rar and pdf22.The commands that can be issued against database by clients are known as___________.A.queries. B.sequence C.view D.cursor23.For ad-hoc querying the knowledge of _______language is needed on the client part.A.syntax B.query C.cursor D.syntax24.A ___________interface is utilized to consent the request of the clients such as to enter ,modify or delete data.A.graphical user25.____________ includes programming logic which is essential to execute the requirement of the clients.A.design logic B.business logic C.development logic D.application logic26.The machine which is utilized for running user interface is considered as ______.A.server B.client C.desktop D.program27.The machine which is utilized for running DBMS and includes a databse is considered as the ___________ of database.A.server B.client C.desktop D.program28.The __________databases are prepared for assisting one client.A.two tier B.personal c.multi tier D.business29.In _________databases users cannot easily distribute the dta between all databases.A.personal B.two-tier C.multi-tier D.business30.The ____________databases are mostly utilized by small-scale organization where the requirement of sharing data with someone else is negligible.. A.personal B.two-tier C.multi-tier D.business31.If there are numerous circumstances when the clients or work group want the data to be distributed and used for sharing data is the creation of ___________ client-server databases.A.one-tier B.two-tier C.three-tier D.multi-tier32.All computers uses a particular application providing user interface and business logic by which __________of data is performed.A.retrival B.manipulationC.accsess D..release33.Applications that are required to assist numerous users are built by means of the ____________Architecture.A.single B.two C.three D.multi34.To carry out the transaction of business which are requested by clients the required business logic is included in the __________________ layer..A.presentation B.application C.network D.physical35.application such as crm and scm system also relay on _________for data warehousing.A.database. B.table C.record D.sequence36.The _______database is designed for the utilization of whole organization.A.enterprise application B.two-tier C.multi-tier D.single-tier.37.The requirement of informstion from various branches and divisions are successfully supported by an ___________database.A.one tier B.two-tier C.multi-tier D.enterprise38.In ___________user can work with the data used in the past.A.data warehouses. B.data mining c.enterprise application D.business logic.39.The size of personal databse is __________mb.A.one B.two C.three D.four 40.The size of Two-tier database is __________mb.A.5-10 B.5-100 C.5-20 D.5-30\41.The size of three-tier database is_________mb.A.5-100 B.100-1000 C.20-100 D.20-100042.The size of Erp database is ______mb.A.10-100 B.>100 C.5-100 D.100-100043.Dbms provides permission to several users to make use of ________databases simultaneously.A.one B.two C.three d.several44.Servers ofdatabases are commited system that carry ______databases.A.two-tier B.real c.three tier D.multi-tier.45.In________model we organize data into structure which appear as a tree.A.hierarchical data B.relational c.network D. object..46.A_________ is represented by a node available in structure which appears as tree.A.record B.table C .field D.column47._________ has a simple design process since data usually consists of hierarchical relationship A.simplicity. B.integrity C.security D.relationship

48.Implementing _____________ database is quite difficult since it is based on the datas physical warehousing.

A.tree B.heirarchical C.client-server D.two-tier

49.moving a part of data from one position to the other position needs you to modify _______ accessing application related to that data which is complicated to perform. A.one B.two C.every D.no

50._________ model was invented by Charles Bachman.A.heirarchical model B.network model C.client-server model D.one-tier model

51.CODASYL stands for _____________.A.Confidence on Data Systems Languages B. Conference on Data Systems Languages

c.Conference on Data Software Languages D.Complicated on Data Systems Languages

52.Turbo IMAGE, IDMS, RDM Embedded ,RDM Server are example of _______model.. A.heirarchical model B.network model C.client-server model D.one-tier model

53._________ model makes use of a mathematical relation concept.

A.heirarchical model B.network model C.client-server model D.relational model

54.The relations ______ is based on how many attributes exists in respective relation schemaA.schema B.degree C.feild D.record

55.In _______model classes, objects, in addition to inheritance are straight forwardly assisted in database schemas as well as query languageA.A.heirarchical model B.network model C.client-server model D.object-relational model

56.________permits the developers of software to incorporate their individual types in addition to methods and these can be used in the DBMS.A.ORDBMS B.OODBMS C.DBMS D.RDBMS

57._______ type of database is also known as object oriented database.A.Object database B.relational database C.network database D.heirarchical database

58._________ are carried out using navigational interfaces instead of declarative on.A.ORDBMSB.OODBMS C.DBMS D.RDBMS

59._________ DBMS have the capability to support numerous clients.A.one-tier B.client-server C.centralized D.distributed

60.The ___________purpose DBMS are planned and constructed for a particular applicationA.general B.special C.single D.multiple

61.OLTP stands for ___________.A. online transaction processing systemsB.order transaction processing systemsC.online transaction processing software D.online truncation processing systems

62.In ___________database stores the data in storage devices located in one place.A.one-tier B.client-server C.centralized D.distributed

63.In ________ databse stores the data in storage devices located in different Geographical area.A.one-tier B.client-server C.centralizedD.distributed

64.In _______ databse data is administrated by a central DBMS.

A.one-tier B.client-server C.centralizedD.distributed

65. .In _______ databse data is administrated by number of servers.A.one-tier B.client-server C.centralizedD.distributed

66._________is more secure compare to distributed database.

A.one-tier B.client-server C.centralizedD.relational

Unit:-2RDBMS and SQL

66.The two most common query languages available are ______and________with RDBMS.A.sql B.qbe C.C++ D.java

67.______ was developed in mid 70s at IBM research simultaneously with the development of SQL.A.sql B.qbe C.C++ D.java

68.________is a standard relational database language used for creation, deletion and modification of database tablesA.sqlB.qbe C.C++ D.java

69._________ uses SELECT, INSERT, DELETE and UPDATE command to modify the data.A.DDL B.DCL C.DML D.sql

70._________ language is used to define the structure of the table.

A.DDL B.DCL C.DML D.sql

71.__________ are the actions that are run by DBMS whenever some event related to the database occurs.

A.sequence B.cursor C.trigger D.procedure

72.With _________ feature of SQL, users can execute the queries at run-time

A.compile time. B.run-time C.loading time D.linking-time

73.DBMS maintains the data ________ to avoid the wrong information to enter indatabase.

A.integrity B.reduncdancy C.consistancy D.atomicity.

74.The condition of integrity constraints are defined on database __________.A.table B.record C.field D.schema

75. When database instance fulfils all the integrity constraints -defined on thedatabase schema, it is then known as ______ instanceA.single B.legal C.bad D.multiple

76.When all rows in the column have unique identifier it means each row isdifferent from other it is known as _________ integrity.A.relational B.entity C.referencial D.primary

77._________ integrity is placing aprimary key (PK) constraint on particular column.A.relational B.entity C.referencial D.primary

78.The________ of a relational table uniquely identifies each record in theTableA.reference key B.primary key c.candidate key D.comopsite key

79.In database language a ________ is group of allowed values for a columnA.domain B.record C.feild D.data

80.________ integrity is also called 'attribute' integrity.A.domain B.record C.feild D.data

81.__________integrity is formed with the combination of Primary Key (PK) andForeign Key (FK).

A.relational B.entity C.referencial D.primary

82.__________ key is a column or even a group of columns in a tablethat accept its values from the primary key (PK) from another table.A.foreign keyB.primary key c.candidate key D.comopsite key

83.To preserve the ________integrity, the foreign key in the 'child' table can only take values that are inthe primary key of 'parent' table.A.relational B.entity C.referencial D.primary

84.______ command is used to insert record in tableA.insert B.update C.delete D.alter

85._______ command is used to delete row from the tableA.insert B.update C.delete D.alter

86._________ command is used to deletes all the information of a droppedrelation from database

A.drop B.update C.delete D.alter

87._______ command deletes the complete database schema whichcontains tables, domains and other elements.A.restrict B.cascade C.drop D.alter

88.________ command deletes the database schema if it does not containany element or else the command will be terminated.A.restrictB.cascade C.drop D.alter

89.________ command adds attributes to an existing relation.A.drop B.update C.delete D.alter

90._______command is used To select data in rows and columns from one or more tablesA.drop B.alter c.select D.update

91._________command is used to lock a table or view, limiting access to it by other usersA.select B.lock C.log D.exit

92.An ________ is used to retrieve all columns from the tableA.@ B.&C.* D.$

93.A Subprogram that returns a value is known as _________A.functions B.array C.string D.pointer

94.________ function contains a column name and returns the countof tupple in that column.a.SUM b.COUNT c.AVG d.DISTINCT

95.When __________command is used then it willreturn only the COUNT of unique tupple or distinct values of the column.a.SUM b.COUNT c.AVG d.DISTINCT

96._____ function is written with column name and gives the sum of alltupples present in that column.a.SUM b.COUNT c.AVG d.DISTINCT

97.____ function or Average function is written with column name andreturns the AVG value of that columna.SUM b.COUNT c.AVGd.DISTINCT

98._____function or Maximum value function written with columnname returns the maximum value present in that column.a.SUM b.COUNT c.MAXd.MIN

99.______function or Minimum value function written with column namereturns the minimum value present in that columna.SUM b.COUNT c.MAXd.MIN

100.________ clause is utilised with the group functions for retrieving the datawhich is grouped according to one or more columns.a.HAVINGB.GROUP BY C.MAX d.MIN

101._________ command is used for updating a single value without updating allthe values in tupple

A.drop B.update C.delete D.alter

102.A ______ is a subschema in which logical tables are generated from more thanone base table.

A.view B.sequence C.cursor D.trigger

103._______ language is thelanguage in which the SQl queries are embedded.A.query B.programming C.host D.sql

104.__________ can be used in thehost program to determine the place for inserting the special variable by the pre-processor.A.create B.update C.sql include D.insert

105.The______ is used for identifying a query in an open statement andalso helps in query evaluationA.view B.sequence C.cursor D.trigger

106.When any error occurs in the execution of SQL query then the error report isstored inside a special variable. These special variables are called as ___________.A .SQL conference -area variablesB. SQL communication-against variablesC. SQL communication-area variablesD. Standard communication-area variables

107.The ________ statement is another embedded SQL statement, which is used fordeleting the temporary relation that stores the query result.A.close B.open C.end D.exec

108.The __________unit of database processing is defined by mechanism providedby transaction processing.A.logical B.physical C.sequential D.random

109.The term _______ defines those properties that must be related with transactions in order that the reliability of the database is assured.A.logical B.database C.ACID D.adress

110.The __________ property of a transaction makes sure that either every operation isexecuted in a successful manner or none of them is executed at all.atomicityconsistancy C.intigrity D.durability

111.The _________ property requires that the database integrity rules must be obeyed properly.atomicityconsistancy C.intigrity D.durability

112.The ________ property provides assurance that all transactions are executed independently.atomicityconsistancyC.isolation D.durability

113.When a transaction is completed successfully, _______ propertymakes sure that the changes performed in the database are saved inthe physical database.atomicityconsistancy C.isolationD.durability

114.SQL offers the concurrency control for the execution of a transaction via aData Control Language which can also be called as __________.A.sql dml. B.sql dcl C.sql dll D.sql

115.On the execution of _________ statement, every modification doneby the related transaction until now is made constantA.rollback B.commit C.save D.exit

116.On the execution of ________ statement, every changeperformed since the preceding COMMIT statement is rejected.

A.rollback B.commit C.save D.exit

117.__________ condition arises when a transaction reads data written by a concurrent uncommitted transaction.A.Dirty readB.Non-repeatableread c.Phantom read D.exit read

118._______ condition is caused by a transaction which reads data again and finds that data has been modified by committed write operation of some other transaction.A.Dirty readB.Non-repeatableread c.Phantom read D.exit read

119.________ condition arises when a transaction executes a query again it had previously executed and gets rows different f rom what it got earlierA.Dirty readB.Non-repeatablereadc.Phantom read D.exit read

120.In _________ isolation the transactions are forced to execute sequentially.A.Serialisable B.Read committed c.Read un-committed D.write

121._________ SQL permits to create and submit SQL queries dynamically or runtime.A.static B.dynamic C.relational d.object-oriented

Unit:-3Normalisation

122.Two attributes A and B in any relation R are said to possess a ________ if for each distinct value of A, there is only one value of attribute B associated with it.A.functionaly associated B.functionaly dependent C.independet D.associative

123.FD is symbolically represented as_____________.A .A--B B.B--A C.AB D.b->A

124._____ attributes depends on the PK (primary key) attribute.A.foreign key B.Non-key C.composit key D.candidate key

125.___________of a relational schema (R) consists of replacement of the relation schema by two or more relational schemas all of which contains a subset of the attributes of R.A.relation B.decomposition C.function D.composition

126.___________ decomposition, when the parts ofthe table can be joined back again without adding more tuples added to thedatabase relation.A.loosless joinB.tight-join C.flexible-join D.scalar join

127.If the data values stored in a relation are _________, then the database is said topossess redundancy.A.unique B.repeated C.acsses D.less

128.Database containing multiple copies of the ______ data result in wastage of expensive storage space.A.unique B.same C.more D.less

129.If there is any type of disagreement between data items in a database, then it is referred to as ___________.A.atonicity. B.redundancy C.inconsistancy D.consistancy

130.When a person tries to update the redundant database, then it results in_________anomalies.A.update B.insertion C.alter D.delete

131._______ is another type of update anomaly which occurs when inconsistencies arise due to the removal of record from a relation.A.update B.insertion C.alter D.deletion.

132.when an attributes value for a particular record needs to be modified, then this change must be done in all the occurrences of the record. Otherwise, it results in_______ anomaly.A.update B.insertion C.alter D.modification

132.__________comprises of various set of rules which are used to make sure that the database relations are fully normalised by listing the functional dependencies and decomposing them into smaller, efficient tables.A.dbms B.normalization C.generalization D.specialization

133.Normalisation technique is established on the idea of _______ forms.A.consistant B.normal C.general D.special

134.A table is said to be in a specific normal form if it fulfils a particular set of ______ which are defined for that normal formA.value B.feild C.constraint D.record

135.E.F. Codd and R. Boyce presented a more substantial definitionof third Normal Form known as___________normal form.A.first B.second C.BCNF D.third

136.In ______normal form all the columns in the table must be composed of atomic values.A.first B.second C.BCNF D.third

137.A column is said to be _______ if the values are indivisible units.A.atomic B.uniqu C.consistant D.perfact

138.Any attribute (column) is said to be _______ dependentif its value can be determined by any one or more attributes of the primary key, but not all.A.fully B.partially c.automatic D.functionally

139.In the ______ normal form objective is to resolve transitivedependencies.A.first B.second C.third D.fourth

140.A _______ dependency arises between two attributes when any non-key attribute is functionally dependent on some other non-key column which is in turn functionally dependent on the primary key.A.partially B.full C.transitive D.functional

141.BCNF stands for ______A. Boyce-Codd normal Form B.Better -Codd normal FormC.Boyce-Correct normal Form D.Bee-Codd normal Form

142.every relation which is in BCNFform is also in ____normal form.A.first B.secondC.third D.fourth

143.The essential condition for a relational schema R to be in BCNF is thatwhenever any nontrivial FD XA holds in R, then X must be a _______ key of R.

A.primary B.composit c.candidate D.supar

144._____normal form allows decomposing a relation into three or more relations.A.first B.second C.third D.fifth

145.The join dependency is more general form of________dependency.A.single-value B.multi-valuedC.transitive D.functional

146.A relation should be in ______ normal form if and only if all join dependency in the table is connoted by candidate keys of the relation.A.first B.secondC.fifth D.fourth

147.Normalisation and database design are two closely ______ terms.A.integrated B.sequential C.random D.direct

148.Relations are referred as _______.A.record B.table c.schema D.database

149.Attributes are referred as ___________.A.record B.table c.schemaD.column

150.Normalisation is implemented to preserve data ______________.A.consistancy B.redundancy C.integrity D.inconsistancy

151.During the normalisation process, you need to decompose database tablesinto _______ tables.A.smaller B.few C.large D.few

152.________ is the process of converting higher normal forms to lower normal forms with the objective of getting faster access to database.A.normalization B.decompositionC.composition D.generalization

153.In_______ technique the records are summarised in some summary columnsthereby reducing the number of records stored in a table.A.summary data B.duplicate data c.consistant data D.redundant data

154.__________ Fragmentation is another denormalisation technique in which the database table is split by rowsA.vertical B.horizonatal C.normalize D.special

155._______ fragmentation breaks tables/relations by columns.A.vertical B.horizonatal C.normalize D.special

Unit-4:-Query Optimisation

156.___________ provides various algorithms for implementing the different types ofrelational operations that appear in a query execution strategy.

A.dbms B.oodbms C.rdbms D.ddbms

157._________is one of the primary algorithms used in query processingA.sorting B.searching C.insertion D.deleting .

158.___________is used to reorder data into a new desired sequenceA.sorting B.searching C.insertion D.deleting

159.Internal sorting uses __________ memory so it is fast but also expensiveA.primary B.main C.cache. D.secondary

160.external sorting is slow and cheaper as it uses __________ storage devices.A.primary B.main C.cache. D.secondary

161.Sortmerge strategy divides the main file into sub-files of smaller size termed as_________.A.sort B.run C.merge D.execute

162.The number of initial runs and the size of a run (nR) are governed by the numberof ________ and available ___________.

A.no.of blocks,buffer space B.no.of space,no of blockC.no. of size,buffer space Dno of run,buffer space.

163.The number of runs that can be merged together in each pass is termed as the degree of ____________.

A.merging B.sorting C.sequencing D.searching

164.The worst case performance comes with minimum value of dM as ____________.A.1 B.2 C.3 D.4

165._________ operation performs the task of retrieving the desired records from the database.A.update B.retrive C.delete D.select

166.If they scan entire file and then retrieve the records satisfying theuser defined condition they are termed as________scans.

A.index B.file C.sequential D.random

167.if the search algorithm carries an index, then that search is termed as ________ scan..A.index B.file C.sequential D.random

168._________scan retrieves all the records from the file andchecks whether the attribute values qualify the criteria or not.A.index B.file C.linear D.random

169.______ search is faster and more efficient than the linear search has the search space is reduced to half in each comparison.A.index B.fileC.linearD.binary

170.If the query checks for equality between the key attribute and the primary index then __________search might be used.A.index B.binary C.search D.hash

171.________ operation is used to join two database tables/relations.A.hash B.avg C.join D.sum

172.In ________join If an hash key or index is there for any one of the two join attributes retrieve each and every record t in X,

A.nested loop B.single loop C.sort-merge D.hash join.

173.Among the following Set operations the _________operation is most costly.

A.UNION, B.INTERSECTION, C.SET DIFFERENCE D.CARTESIAN PRODUCT

174Set operations like UNION, INTERSECTION and SET DIFFERENCE canbe applicable only to ________ compatible relations

A.union B.intersection C.set difference D.cartesian product.

175.____________ Functions are functions that provide mathematical operations.A.hash B.agrgregate C.intersect D.set difference.

176.The _____ function returns the average value of a numeric column.A.avg B.sum C.max D.min

177.The_________ function returns the largest value of the selected column.A.avg B.sum C.max D.min

178.The ________ function returns the smallest value of the selected column

A.avg B.sum C.maxD.min

179.The ________ function returns the total sum of a numeric columnA.avg B.sum C.maxD.min

180.The __________statement is used in conjunction with the aggregate functions togroup the result-set by one or more columns..A.having B.where C.group by D.select

181.heuristics means a good idea to make _______ decisionA.best B.worst C.unique D.multiple

182._________ can be defined as rules governed from common sense rather than from an exhaustive methodologyA.query B.heuristic C.aggregate D.optimization

183.The basic heuristic rule says that before applying _________operation or any other binary operation, SELECT and PROJECT operations must be applied.A.intersect B.union C.join D.cartesian product

184.Query ________ represents relational calculus expression.A.tree B.graph C.key D.root

185.A query _______ is employed to represent relational algebra expressionsA.tree B.graph C.key D.root

186.f two operations produce same result they are said to be __________.A.iquivalent B.iniquivalent C.integrated D.universal

187.For the conversion of this tree into an execution plan, which are not therequirements of the optimiser:?A.index search for the SELECT operation Btable scan as access method for EMPLOYEE,C.nested loop join algorithm for JOIN D.sequential search for select operation.

188.Materialised (stored) evolution specifies that the result of operations can bestored as _________ relation.A.permenant B.temporary C.local D.global

189.Semantic query optimisation is a technique to modify one query into another query by using the _________ database constraints.A.object-oriented B.relational Ccentralized D.distributed.

190.If u want to retrieves the names of employees who earn more than theirSupervisors then the query will be______________.

A. Select E.LNAME, M.LNAME FROM EMPLOYEE AS E, EMPLOYEE AS MWHERE E.SUPERNO=M.ENO AND E.SALARY>M>SALARY

B.Select * FROM EMPLOYEE AS E, EMPLOYEE AS MWHERE E.SUPERNO=M.ENO AND E.SALARY>M>SALARY

C.Select E.LNAME, M.LNAMEFROM EMPLOYEE AS E, EMPLOYEE AS MWHERE SUPERNO=ENO AND E.SALARY>M>SALARY

D.Select E.LNAME, M.LNAME FROM EMPLOYEE AS E, EMPLOYEE AS MWHERE E.SUPERNO=M.ENO AND SALARY>M.SALARY

191.____________ technique can be used for framing proficientalgorithms for problems like view/index selection, query result caching andmaintenance.A.semantic query optimization B.Multi-query optimaization.B.single query optimaization D.query execution

192._______ algorithm is a cost-based heuristic algorithm.A.A.semantic query optimization B.greedyC.single query optimaization D.query execution

193.A greedy strategy works in a _______ mannerA.bootom-up B.top-downC.centralized D.left-right.

194._________ lookup firstly starts executing the outer query and when outerrows are generated then it invokes the sub-queryA.forward B.reverse C.center D.top

195._______ lookup starts with the sub-query and processes one sub-query row at one time..

A.forward B.reverse C.center D.top

196.________ is defined as a set of rows which is used to encode thechanges to a specific base table.A.semantic data B.centralize data C.delta stream D.gama stream

197._________ operator is considered as a side-effecting operatorA.stream deletion B.stream creator C.stream updater D.stream selector

198.A________ database is a database that can be connected to by a mobile computing device over a mobile network..A.cell B.mobile c.network D.centralized

199._________ refers to the procedure for selecting the best execution strategy amongst the various options availableA.semantic query optimization B.query optimaization.B.single query optimaization D.query execution

200.Heuristics approach to query optimisation uses _______ and algebraic techniques to improve the efficiency of query executionA.heuristic rules. B.algebraic rules C.semantic rules D.query rules.

Unit:-5Query Execution

201.Physical query strategy is made from _________A.relation B.operand C.operator Dfunction.

202.The principal methods for execution of the operations of relationalalgebra are; scanning, hashing, sorting, and indexing are the major approaches.State true or false

We can use the index not only to get all the tuples of the relation itindexes, but also _________ .

A.to get only those tuples that have a specific value

204.When iterators are used, many operations become _______A.activeB.passive C.inactive D.iactive

205_________operationsrequire neither an entire relation, nor a large part of it, in memory at onceA.Full-relation, binary operations B.Tuple-at-a-time, unaryC. Fill-relation, unary operationsD. Fill-relation, binary operations

206.The__________ one-argument operations need to consider all or most of the tuples in memory at once.A.Full-relation, binary operationsB.Tuple-at-a-time, unaryC. Fill-relation, unary operationsD. Fill-relation, binary operations

207.One benefit of a nested-loop join is that it fits well into an _____ structure.a.tuple b.iterator c.relation d.record

208._______ will initialize a main-memory structure to represent a set oftuples of R.a.R.close() B.R.open() C.R.getnext() D.r.return()

209.________ will release the memorya.R.close() B.R.open() C.R.getnext() D.r.return()

210.In __________algorithm two passes are usually enough, even for very large relationsA.one pass B.two pass C.three pass D.four pass

211.A relation is said to be _______ if its tuples are packed into the least blocks that can possibly hold those tuplesA.bulk B.clustured c.non-clustured D.mix-clustured

212.It is the responsibility of the ______ to let processes get the memory that they need for reduction of the delayed and unsatisfiable requests.a.buffer manager b.cache memory c.primary memory D.rom

213.Buffer management architectures are broadly divided into______ main categories:A.one B.two c.three d.four

214.In most of the relational database management system, the buffer manager controls_____ memory directlya.buffer manager b.cache memory c.main memory D.rom

215.The buffer manager allocates buffers in _______ memory.a.virtual b.cache memory c.main memory D.rom

216.parallel computers all have some communications facility for passing information among __________.A.memory B.processors C.buffer d.monitor

217.In _________each processor has access to all the memory of all the processors.a.shared memory B.shared processor C.shared nothing D.shared all

218.NUMA stands for__________.A.non uniform memory access B.no-uniform memory accessC.non universal memory access D.non uni memory axise

219.In_________architecture, every processor has its own memory, which is not accessible directly from other processorsA. shared memory B.shared processor C.Shared Disk: D.shared nothing

220.________ manage the potentially competing requests fromdifferent processors.A.disk controller B.shared processor C.shared memory D.shared nothing

221.In___________architecture all processors have their own memory and theirown disk or disks,A. shared memory B.shared processor C.Shared Disk:D.shared nothing

222.The shared-nothing architecture is the most commonly used architecture for___________database systems.A.high-performanceB.low-performance c.average performance D.central performance

223.One of the chief heuristic rules is that before applying the JOIN or other binary operations, one must apply _________ and ________operations.A.select,unionB.select.project C.project,union D.join,select

224.The basic outline of a Heuristic Algebraic Optimization Algorithm is given below.1. Break up any SELECT operations by means of conjunctive operationsinto a cascade of SELECT operations.2. Move each and every SELECT operation as far down the query tree asis allowed by the attributes which are involved in the select condition.

A.both are false B.both are trueC.statement 1 only true D.statement 2 only true

225.External Sorting is the essential algorithm for implementation of _______operation.A.data B.query C.relational D.hashing

226.The ________ operation is one of the lengthiest operations in query processingA.select B.project C.join D.union

227.The_________ operation is especially quite expensive.A.project B.select C.join D.Cartesian product

228.The ________ operations when applied to an entire table, can be computed by a table scan or else by using an appropriate index.A.aggregate B.sum C.relational D.average

229. ________ blocks which contain the tuples of R are known tothe system.a.index-scan B.Table-scan C.row scan D.column scan.

230.In ________algorithm Data from the operand relations is read intomain memory and processed in some way written out to disk againA.one pass B.two pass c.three pass d.multi-pass

Unit 6 Adaptive Query Processing and Query Evaluation

231.query processing process known asA.query execution B.eddy. C.query optimization D.query evalution

232.We can merge the execution as well as an optimisation phase of query processing by combining eddies with suitable _______ algorithms.A.select B.join C.project D.union

233.The purpose of the addition of an eddy is to control various ______ in a query.A.operand B.operator c.relation D.set

234.The eddy maintains a_______ queue of all tuples that require processing.A.priority B.order C.inorder D.preorder

235.______is a sharednothing parallel query processing framework. It adjusts dynamically to any fluctuations in workload and performance.A.river B.eddy C.process D.shared memory

236.In the hash ripple diagram,the arrival rate of one relation is _______ times faster than the other.A.two B.three C.four D.multi

237.A _______ can be used to robustly produce near-record performance on I/O intensivebenchmarks such as hash joins and parallel sorting.A.eddy B.river C .process D.instruction

238.River is essentially ________threaded.A.single B.double C.multi D.triple

239.The participating operators of an eddy are encapsulated by the ________.A.merging B.sorting C.searching D.sheduling

240.A fixed-sized buffer of tuples that is to be processed by one or more operators is maintained by an eddy __________.A.river B.process C.component D.algorithm

241.Eddies derive their name from the ________ data flowing within a riverA.sequential B.circular C.single D.multiple.

242.A tuple entering an eddy is related with ______ bits and a tuple descriptor containing a vector of _______ bits.A.Done,ready B.ready,done C.exit,enter D.enter,exit

243.An eddy _____ the Done bits, and sets the Ready bits suitably when it receives a tuple from one of its inputs.A.one B.flush C.zeroes D.hash

244._______ operators produce output tuples that match to combinations of input tuples.A.relational B.binary C.comparison D.unary

245.A ______ buffer of tuples that is to be processed by one or more operators is maintained by an eddy component.A.variable-size B.fixed-size c.block-size D.zero-size

246.There are two issues which affect the overhead of barriers in a plan. They are: a) the gap between arrival times of the two inputs at thebarrier; B) the frequency of barriers. A.both are true. B.both are false C.a is true D.b is true

247.In order to allow changing rates for each input,______joins were designedA.hash B.inner C.outer D.ripple

248._______ selects a plan to accomplish a query using available statisticsA.execution B.senthesizer C.optimizer D.selector

249._______ executes the plan to get query results.A.executor B.senthesizer C.optimizer D.selector

250.A ________ keeps the statistics utilised by the optimiser.A.statistic tracker B.executor C.senthesizer D.optimizer

251.________ systems are also known by "self-tuning or "dynamic" systems.A.eddy B.adaptive C.ready d.process

252.The query processing system is said to be adaptive if it has _____features.A.one B.two c.three d.four

253.The feedback required in an adaptive system is solution to its _______.A.effectiveness B.correctness C.execution D.atomicity

254.Adaptive data query and processing is essentially used by data grids to offer better _________to users and applications in spite of dynamically changing resources andenvironments.A.resources B.planing C.process D.quality of service

255.Adaptive query processing has been utilised to detect and correct ______ errors due to wrong statistics or simplified cost metrics.A.execution B.senthesizer C.optimizer D.selector

256._______ are frequent in the busty performance of servers and networks in wide-area environmentsA. Variabilities B.consistancy C.redundancy d.atomicity

257.______ utilises intervals over query cost estimates,rather than specifying the estimates for single.A. Error-aware optimisation B.Enter-aware optimisation c.Error-aware operation D.Error-award optimization

258.Query plans ______ can be symbolised as trees and are algebraexpressions.A.optimizer B.selector C.iterator D.executor

259.Merging techniques are used by all sorting in ______ database systems.A.relational B.object-oriented C.real D.centralized

260._____ proceeds in divide stage and the combine stage.A.search B.sort C.merge D.insert

261.Hash table overflow occurs if the data in hash table is ________than main memoryA.smaller B.larger C.equal D.not equal

262.______scans can be made quickly with read-aheadA.index B.hash C.file D.key

263.Advantages of disk accessa) It is not possible to scan an index without ever retrieving records, i.e. if justsalary values are needed and the index is on salary.b) Multiple indices can be joined to satisfy query requirements, even ifnone of the indices is enough by itself

A.only one a is true B.only b is true C.both are true D.both are false

264.______of pipelined query processing operators during flight is the basic challenge of run-time re-optimisationA.preorder B.inorder C.reorder D.postorder

265.A query evaluation plan contains an extended _____algebra tree.A.relational B.symbolic C.relative D.conditional

Unit:7 Concurrancy control serializibility

266.A _____is used by the transaction to reject data access to other transactions and thus avoid inaccurate updatesA.deadlock B.serialize C.lock D.commit

267._______ Locks just prevent other transactions from editing (writing to) the data itemA.read B.write C.exclusive D.dead

268.The _________lock is followed by a transaction if all lock requests occur prior to the first unlock operation inside the transactionA.one-phase B.two-phase C.read D.write

269. In case of_________ phase, all necessary locks are attained by a transaction without releasing data. A.growing B.shrinking C.read D.write

270.In case of ______ phase, all locks are released by a transaction. A.growing B.shrinking C.read D.write

271.The rules followed in case of two phases locking protocol are given below

Two transactions cannot comprise inconsistent locks

2.No unlock operation can be performed before a lock operation in the similar transaction. A.both are false B.both are true C.1 is true D.2 is true

272. In case of Row-level shared locks, various users are permitted by shared locks to _______data, but no user is permitted to change that data

A.write B.read C.update D.share

273.In ________ lock only one user is permitted to update a specific part of dataA.shared B.exclusive C.write D.read

274.______locks, at all times, are considered as row-level locks. A.shared B.exclusive C.write D.update

275.Update locks are said to be comparable to _______ locks.A.shared B.exclusive C.write D.update

276.Transactions with unexpected read write locks can make use of_______Locks

A.shared B.upgrading C.write D.update

277._______ Locks are utilised for incrementing & decrementing stored values A.shared B.increment C.write D.update

278.The _____ table signifies a relation that relates database elements with information regarding locking

A.log B.hash C.lock D.increment

279._______ approach grants longest waiting request. It does not provide starvation. A.fcfs B.fsfc C.fifo D.lifo

280.in_________If there is a U lock waiting for upgrading an X lock, grant that first. A.upgrading priority B.read C.write D.exclusive

281.The warning protocol is used to handle locks on a ______ of database elements.A.relation B.hierarchy C.centralized D.distributed

282._____signifies intention to request an S lock A.IX B.Is C.ID D.Iz

283.______ signifies intention to request an X lock. A.IX B.Is C.ID D.Iz

284.If ______ transactions are proposed to read or write a sub element, an I lock is provided to both of them.A.one B.two C.three D.many

285.The purpose of concurrency control is to guarantee the transactions serialisability in the environment of a______ database.A.single-user B.multi-user C.double-user D.triple-user

286.A ______ timestamp is updated when the data of the object is changed.A.read B.updateC.write D.exit

287.In ______ phase, the serialisability of the schedule is verified by contrasting RS(T) and WS(T) to the read / write sets of the simultaneous transactions. A.read B.write C.validate d.start

288._______ is a set of transactions that have initiated, but have not still accomplished their validation stage. A.read B.write C.validated.start

289._______ is a set of transactions that have completed validation, but not still accomplished their write stage A.read B.write C.vaL d.start

290._____ is a set of transactions that have accomplished all the phases

A.read B.write C.vaL D.FIN

291.Database ________ is concerned with the restoring of the database to an accurate state in the occurrence of a failureA.consistancy B.recovery C.duplicasy D.atomicity

292.In case of differential backup, only the ____ variations that are performed on the database are copied. A.first B.second C.third D.last

293. A transaction log backup method is used to back up the transaction log operations that are not shown in a _______backup copy of the database A.preceeding B.successiding C .first D.last

294..Write-ahead protocol makes sure that transaction logs are always written _______ any database data that are really updated. A.after B.before C.first D.last

295.______ is considered as a temporary storage part available in primary memory. A.buffer B.register C.cache D.main memory

296.________ is an operation where all the updated buffers are written to the disk by the DBMS. A.database checkpoint B.buffer C.lock D.fin

297.When deferred write or deferred update is used by the recovery process, the transaction operations do not update the _______ database instantlyA.centralize B.distributed C.logical D.physical

298. The term Database Element points to various _______ in the database.A.relation B.attribute C.entity D.element

Unit:-8 Transaction processing

299.A clear solution to the issue of maintaining locks in a distributed database is considered as _________lockingA.centralized B.symbolic C.relative D.conditional

300..Primary-copy locking method includes _______ the function of the lock site.A.centralized B.symbolic C.relative D.distributing

301.Local transactions control ________ database system. A.global B.local C.centralized D.distributed

302 Global transactions control __________database system. A.single B.multiple C.double D.global

303.Global data cannot be accessed by ______ transactions.A.global B.local C.centralized D.distributed

304.A _____ transaction is the one that is permitted too much time to hold locks, and that particular lock is needed by another transaction.A.small B.long c.single D.double

305.Commercial 64-bit systems can sustain main memories of _______ of gigabytes.A.one B.two C.ten D.hundred

306.Performing locks on a resource is one of the methods that are used to ______transactions.A.concurrent B.serialize C.intermidiate D.single

307. _________describes the concurrent execution of several transactionsA. Serialisability B.recoveribility C.security D.maintanability

308. Performing lock on a resource is one of the methods that are used to _______transactions.A.sequence B.parallel C.serialize D.recover

309.The __________is used to create the order which implements the operations inside simultaneous transactions.A.sheduler B.lock C.deadlock D.readlock

310.__________ must be guaranteed to prevent inconsistency from transactions interfering with one another.A.Serialisability B.recoveribility C.security D.maintanability

311.The _______ lock is followed by a transaction if all lock requests occur prior to the first unlock operation inside the transaction.A.one-phase B.two-phase C.three-phase D.multi-phase

312. _________ locking defines the process of acquiring and giving up the locks.A.one-phase B.two-phase C.three-phase D.multi-phase

313..In case of _______ phase, all necessary locks are attained by a transaction without releasing data. A.growing B.shrinking C.logging D.commit

314. In case of _______ phase, all locks are released by a transaction. A.growing B.shrinking C.logging D.commit

314._________ is considered as interactive in which every transaction is processed as it takes placeA.Online transaction processing system

315._______signifies that data is not read by the commited transaction where the data is written by the commited transaction where the data is wriiten by terminated transaction.A.recoveribility B.serializibility C.transaction D.maintanability

316 A series of operations comprising database operations that is atomic with regard to concurrency and recovery is calleda___________A.recoveribility B.serializibility C.transaction D.maintanability

Unit 9 Parallel Database Architectures for Parallel Databases

317.A ________database can be defined as a database that run multiple instances to "share" a single physical database.A.single B.distributed C.parallel D.centralized

318.There are numerous advantages of parallel database technology1. Increased throughput 2. Decreased response time 3. Ability to process an extremely large number of transactions A.all are trueB.only one is true C.only 2 is true D.only three is true

319.state true false.Speedup=Time_Original/Time_Parallel

320.Scale up means to process a larger number of jobs in the ______ time period.A.same B.different C.original D.duplicate

321.state true or false.Scale up Volume_Parallel/Volume_Original

322.In a ______ parallelism approach, one operations output is streamed into the input of some other operator and these two operators can function simultaneously in seriesA.pipelined B.partitioned C.sequencial D.serial

323.In a _______parallelism approach, the input is partitioned between different processors & memories, and also the operator can often be divided into several autonomous operators each working on a part of the data.A.pipelined B.partitioned C.sequencial D.serial

324.In a _________multiprocessor architecture, several processors share storage disks and common memory with assistance of interconnected networkA.shared-disk B.shared-memory C.shared-processor D.shared-nothing.

325.In a ________architecture, each processor has its own personal memory besides one or more disk storage.A.shared-disk B.shared-memory C.shared-processor D.shared-nothing.

326.In ______ architecture, every processor has its own personal memory and only shares storage disks via an inter-connection network.A.shared-diskB.shared-memory C.shared-processor D.shared-nothing.

327._________of Query evaluation is done by using parallel optimisation methodologies for making repartitioning more competent.A.optimization B.evaluation C.atomicity D.consistancy

328.SMP stands for______A.symantic multiproceesor B.symmetric multiprocessor C.single multiprocessor D.symmetric machine

329.In _______ query processing, multiple processes together at the same time to handle one individual SQL statement.A.sequential B.parellel C.symmetric D.asymmetric

330.The basic unit of work in parallelism is called a ________.A.granule B.parellel C.sequential D.symmetric

331.The total servers allocated to one single operation are the __________for the operation.A.dencisty of parellism B.degree of parallism C.degree of parallel D.deployment of parallel

332.Operations that need the output of other operations are known as _________ operations.A.child B.parent C.derive D.base

333.it is essential that the child operations have been executed _______ the parent operations, as parent operation requires the output of child operations to consume.A.before B.after C.last D.second

334.The total quantity of parallel-execution servers that are linked with a single operation is known as the __________.A.dencisty of parellism B.degree of parallism C.degree of parallel D.deployment of parallel

335.This parallelism attempts to ________the time required to retrieve relations from disk by partitioning the relations on multiple disks.A.maximize B.minimize C.remove D.add

336.I/O parallelism is also referred to as__________.A.data partitioning. B.data parellism C.data security D.data recoverability

337.In horizontal partitioning, the tuples of a relation are distributed between several disks in a manner such that each tuple is on _____ disk.A.one B.two C.three D.multiple

338._________ features can help to significantly enhance data access and improve overall application performance.A.data partitioning. B.data parellism C.data security D.data recoverability

339.________ partitioning is best when all the applications want to access relation by scanning sequentially all of it on each and every query.A.data B.round-robinC.hash D.range

340.State true or false.Round robin technique is not suitable for sophisticated access of the relation.

341._______ Partitioning helps to avoid data skew i.e. data is evenly distributed across the disk.A.A.data B.round-robin C.hashD.range

342.In ____________partition the administrator chooses an attribute as the partitioning attribute and specifies attribute-values within a certain range to be placed on certain disk.A.A.data B.round-robin C.hash D.range

343._________ parallelism means executing different independent queries simultaneously on separate CPUs.A.intra-query B.inter-query C.extra-query D.intro-query

344.State true or false.Response times of individual transaction/queries are not much faster as compared to the transaction or queries that run in isolation.

345.In ______ parallelism a single large query is broken into a number of pieces (subtasks) and those subtasks are executed in parallel on multiple processorsA.intra-queryB.inter-query C.extra-query D.intro-query

346._______ parallelism relates to the capacity to break up a query into various parts across various partitions of a partitioned database which may be on one single machine or several machines.A.inter-partition B.intra-query C.inter-query D.intra-partition

347.In ________parallelism, the implementation of each single operation in query is parallelizedA.inter-operation B.intra-operation C.inter-query D.intra-query

348.In case of ________parallelism, the various operations in a query expression are implemented in parallel.A.inter-operation B.intra-operation C.inter-query D.intra-query

349.State true or false.Parallel processing of data from outside sources is required in order to manage large quantities of arriving data.

Unit 10 Object Oriented DBMS

350.The Object Oriented model or paradigm relies on the encapsulation of the data and code into one ______unit.A.single B.multiple C.dual D.triple

351.State true or false.The main benefit of the object oriented paradigm is the capability to modify an object definition without having an effect on the remaining system.

352.An _______ is considered as the unit of transfer from server to clientA.class B.object C.function D.string

353.In _____ approach, we consider page as the unit of transfer from server to client.A.file server B.index server C.page server D.client server

354.State true or false.A probable disadvantage of page server approach is that methods can be assessed only on the clientA.true

355.In ________ approach, the client processes of OODBMS have an interaction with a network file service for reading and writing database pages.A.file server B.index server C.page server D.client server

356.Object clustering can be defined as the capability for an application to offer information to the _______ DBMS.A.object-oriented B.centralized C.distributed D.real

357.An _______ of an object is maintained even when all or some values of variables or even definitions of methods vary with time.A.element B.attribute C.entity D.identity

358.______ signifies a user supplied name which is utilised for identity; A.nameB.valueC.built-in D.identity

359.______ signifies a value of data which is utilised for identityA.name B.value C.built-in D.identity

360.____signifies that an idea of identity is built (created) into programming languages or the data model or and it does not need any user supplied identifierA.name B.value C.built-in D.identity

361.Procedures are used to illustrate an objects behaviour and they are also known as __________.a.class B.object C.string D.function

362.___________ basically signifies hiding the data inside the object from the outside classesA.inheritance B.encapsulation C.data hiding D.polymorphism

363.A _________ model is defined as an organisation of the real world objects (entities), restrictions on them, and the relationships between the objects.A.relation B.data C.object D.inheritance

364.A _______ language is considered as a tangible syntax for a data modelA.sql B.database C.java D.php

365.Entity of any real world is known as an _______.A.class B.object C.function D.string

366.A _______includes a set of all objects, which share the same group of methods and attributes A.class B.object C.function D.string

367.This includes deriving a new class (which is known as subclass) from a current class (which is known as superclass). A.inheritanceB.encapsulation C.data hiding D.polymorphism

368._________ are considered as the paths utilised to carry out navigation-based data access.A.relationshipB.encapsulation C.data hiding D.polymorphism

.369.Object identifiers can uniquely identify _______.A.classB.object C.function D.string370.An _______ is used to illustrate the behaviour or ability of a class without performing to a specific implementationA.classB.object C.function D.interface

371._______ symbolises an agreement between a supplier and its users, which defines what's needed from every implementer.A.classB.object C.function D.interface

372.If one or more interfaces are implemented by a class, a separation from a class name is provided between those interfaces by a _______.A.semicolon B.colon C.coma D.asterisk

373.We can define the class hierarchy in___________A.pseudo-code

374.We use the keyword _____ to signify that one class is considered as a specialisation of another class.A.having B.has a C.isa D.groupby

375.State true or false.The concept of substitutability is considered as a significant loss of inheritance in object oriented systems.Ans:-false

376.The capability of class to inherit the variables and methods from numerous superclasses is known as_______inheritance.

A.multilevel B.multiple C.single D.dual

377._______ data is defined as the data that continue to occur even after program that generated it, has finished.A.in-persistant B.consistant C.persistant D.inconsistant

378.A programming language which is expanded by means of constructs to manage _______data is known as a persistent programming language.A.in-persistant B.consistant C.persistant D.inconsistant

379.State true or falsePersistent programming language is influential; however, it is easy to make mistakes that can harm the database. Ans:-true.

380.________graph is a directed graph with no directed cycles. It is formed by a collection of vertices and directed edges, each edge linking one vertex to another A.directed acyclic B.directed cyclic C.indirect graph D.direct graph

Unit 11 Distributed Databases

381.A database that physically resides entirely on one machine under a single DBMS is known as ________database management system.A.global B.localC.distributed D.centralize

382.Database management system that resides entirely on a machine different from that of the user connected through a network is known as ________database.A.global B.localC.distributed D.remote

383.The entire database is controlled by a single site and hence is known as _______ Database SystemA.global B.local C.distributed D.centralized

384.A multiple-source and multiple-location database is called ________ databaseA.global B.localC.distributed D.centralized

385.______ is the cost of connecting the sites physically in system. A.connecting cost B.installation cost C.site cost D.physical cost

386.______is a Cost of time required and total expenditure to transmit a message from site A to site BA.installation cost B.connecting cost C.communication cost D.physical cost

387._______ means the frequency of failures in link or sites A.consistancy B.recoveribilityC.relaibility D.durability

388._______meansThe level at which data could be accessed in spite of the malfunction of some sites or links.A.consistancy B.recoveribilityC.relaibilityD.availability

389._______means The ability to track data distribution, replication and fragmentation by enlarging the DDBMS catalogue.A.tracking of data B.security of data C.recoveribility of data D.relaibility of data

390._______processing means the capability to transmit queries and access remote sites between different sites via communication network.A.Distributed query B.centralized queryC.object-oriented D.real

391.state true or falseReplicated data management means The capability to choose which copy of one copied data to access and to sustain the reliability of copy of replicated data. True.

392.In _____Distributed transactions should be carried out with adequate security management of data and the access/authorisation rights of usersA.security B.reliability C.consistancy D.recoveribility

393.state true falseReplicated data management means capability to choose which copy of one copied data to access and to sustain the reliability of copy of replicated data. true

394.state true false.Distributed database recovery means The capability to recover data from case-by-case crashes and from different types of malfunctions, for example; breakdown of communication link.Ans;-true.

395.state true or false.Each workstation should have essential hardware and software that allow them to establish a network with other components on the distributed database system Ans:-true.

396.________ Processor is also called Transaction Manager (TM) or Application Processor (AP). A.transaction B.centralize C.distributed D.real

397.________ is a software component on every computer in the distributed database system.A.transaction B.centralize C.distributedD.data processor

398.When the database technology is the same at each of the locations and the data at the several locations are also compatible, that data is known as _______database

A.hetrogenous B.homogenous C.centralized D.distributed

399.In _______ DDBMS, every one of the site might manage different types of DBMS A.hetrogenousB.homogenous C.centralized D.distributed

400.________means System keeps several copies of data, stored at various sites, for quick retrieval fault tolerance. A.fragmentation B.replication C.inheritance D.polymorphism

401.In _______Relation is divided into various fragments stored at separate sites A.fragmentation B.replicationC.inheritance D.polymorphism

402. Relation is divided into various ________.A.part B.fragment C.subpart D.function

403.Vertical fragmentation is similar as __________.A.inheritance B.decomposition C.polymorphism D.fragmentation

404._______ fragmentation of a relation or a table can be acquired by dividing the table into a number of sub-tables having disjoint columns.A.vertical B.horizontal C.sequential D.serial

405.In _______fragmentation a relation can also be fragmented both vertically and horizontally. A.verticalB.horizontal C.sequentialD.mix

406.Replication comes in helpful, when you want to improve the _______ of dataA.recoverability B.accessibility C.reliability D.serializibility

407. If various sites are linked to one another, then the user at a site might access data that is present at some other site this is known as ________.A.space independence B.data independence C.physical independence D.netindependence

408.In the ________interface the end users are free to have interfaces of their own choice at their sites .A.centralize B.distributed C.user-friendlyD.object-oriented

409. It is more costly and also tough to implement a distributed database system as compared to _______local database.A.centralize B.distributed C.user-friendly D.object-oriented

410.The updation of data on more than two networked computer systems is termed as a ________transactionA.centralize B.distributedC.user-friendly D.object-oriented

411._________ managers handle constant data and perform in collaboration with Distributed Transaction Coordinator (DTC) to guarantee isolation & atomicity to the application.A.database B.resource C.system D.oracle

412. Commit protocols are utilised to make sure _______ across sitesA.atomicity B.durability C.consistancy D.redundancy

413. When a site is unsuccessful or fails and then you restart, it has to perform ________ for all transactions that it has not yet committed suitably.A.redundacny B.recovery C.security D.consistancy

414. Two phase commit is one transaction protocol intended for those complexities that happen with ___________ resource managers A.centralized B.distributed Csingle D.parallel

415.________ transaction manager with two phase commit protocol uses a coordinator to handle individual resource managers. A.centralized B.distributed Csingle D.parallel

416. In ______ pages, entries are planned by identifier or name and intended for forward lookup to locate more about entryA.yellow B.red C.white D.black

417. In _______ pages, entries are designed/planned by properties to locate entries matching particular requirementsA.yellow B.red C.white D.black

418. In ddbms _________features the database is located at various sites or that there are many users accessing the data at the same time is not known to the users. A.security B.consistancy C.transparancy D.atomicity

419.___________ transparancy feature permits one distributed database to be treated as a single (albeit logical) database. A.distributed B.transaction C.faliure D. Heterogeneity 420. ___________ transparancy feature permits a transaction to be executed either completely or not at all just as in case of a local database system. A.distributed B.transaction C.faliure D. Heterogeneity 421. _________feature permits the distributed database to continue to be operational even if there is a failure at some nodes. A.distributed B.transaction C.faliure D. Heterogeneity

422. In _________transparency The fact that the constituent databases are of different types; that the hardware systems are of different types etc. are not known to the users due to this feature of the DDBMS A.distributed B.transaction C.faliure D. Heterogeneity

423. __________ transparency permits a physically dispersed database to be managed as though it were a centralised database.A.distribution B.transaction C.faliure D. Heterogeneity

424._______ transparency resides when the user should recognise the database fragment names but have no need to declare at which locations these fragments are situated.

A.distribution B.transaction C.faliure D.location

Unit 12 Object Relational and Extended Relational Databases

425. State true or false.The main advantage of object relational data model arises from the concept of reuse and sharing.

426. Some of the important characteristics of object relational databases are

1.Nested relations 2. Complex types and object-orientation 3. Querying with complex typesA.only 1 is true B.only 2 is true C.only 3 is true D.all are true

427. ______ acts as a framework into which specialised software modules can be embedded. A.ordbms B.oodbms C.dbms D.rdbms

428. The type constructors are also known as __________types.A.function B.structure C.user-defined D.string

429. A working group composed of ___________ representatives of the OODBMS vendors established ODMG-93 standard.A.one B.two C.three D.five

430. ______language defines how to formulate a database schema (the structure of a database). It is neutral to programming languages. A.object model B.Object definition C.relation D.semantic

431. ________ determines how the various objects are represented for exchanging them between different OODBMS.

A. Object interchange format B.object model B.Object definition D.relation

432. The ability to store, retrieve and modify persistent objects in Smalltalk is provided by the _______Smalltalk binding.A.obmg B.ocmd C.Odmg D.odmc

433. ANSI and ISO have developed a new SQL standard as ________.A.sql5 B.sql3 C.sql2 D.sql

434. Each SQL3 table has a predefined column called as________ that contains row identifiers which can be used as values in other rows. A. IDENTITY B.attribute C.entity D.key

435. State true or false Caching avoids the expenditure of referring to disk every time the page is accessed.Ans:-true.

436. The _________has the right to read more data from pages in memory, every time a single execution of the embedded logic is completed.A.ordbms B.oodbms C.dbms D.rdbms

437.___________is a template index structure based on B+ trees, which allows most of the tree index structures invented so far to be implemented with only a few lines of user-defined ADT code.a. Generalised Search Tree b.BINARY SEARCH tree C.relation tree D.mst

438. 15. Which one of the following is the easiest to use? (a) ORDBMS (b) OODBMS (c) RDBMS (d) DBMS

429.Out of RDBMS, OODBMS and ORDBMS, which has got the best performance? (a) ORDBMS (b) OODBMS (c) RDBMS (d) DBMS

439. A combination of an atomic data type and its associated methods is called an ________ type.A.abstract data B.user-defined C.function D.structure

440. The_________ method used to store, find and retrieve the data from a database. A.find B.retirive C.search D.access441.________ Generally used to store multimedia data such as video, images and audio. It stores data in binary format only A. Character Large Object B.Binary Large Object C.string large object D.array large object

442.__________ is used for documents or large strings that use the database character. It stores this string data in the database character set format.A. Character Large Object B.Binary Large Object C.string large object D.array large object

UNIT :-13 XML Query Processing

443. ________ is turning out to be the most significant new standard used for the representation of data and exchange on the World Wide Web.A.html B.Dhtml C.javascript D.XML

444. XML-QL syntax comprises _______ sections, one of which is a WHERE clause and a second one is a CONSTRUCT clause.A.one B.two C.three D.four

445 In _______clause the first part is known as the search string, and the other part is known as ORDER-BY clause which is used optionally.A.select B.having C.group by D.where

446. The _______ clause provides permission to arrange the data retrieved in the variables.

A.order-by B.having C.group by D.where

447. The _______ clause is a necessary clause that provides the file name of the XML file. It can be a single file name included in quotes.A.order-by B.having C.group by D.In

448. The ________section provides permission to state a pattern for output.

A.order-by B.having C.group by D.construct

449.______is considered as an early query language used for semi structured data.A.sql B.plsql C.oracle D.lorel

450. Lorel language makes use of the ________as the data model for semi structured data.A. OEM (Object Exchange Model) B.oam C.odm D.omd

451. State true or false.The drawback of Lorel language is that it is dependent on OQL parserAns:-true

452. Quilt is considered as a functional language where you can represent a query as ________.A.statement B.relation C.expression D.block

453. Quilt expressions include seven major forms. They are:

1.path expressions

2.conditional expressions

3 variable bindings

A.only 1 is true B.only 2 is true C.only 3 is true D.all are true.

454. ______ assesses to the group of nodes in 'a' that takes place previous to some node in 'b'. (A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b.

455. _________assesses to the group of nodes in 'a' that are also located in 'b'.(A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b.

456.__________assesses the group of nodes in 'a' that takes place after some node in 'b' (A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b.

457._________ assesses to the set of nodes in 'a' that are also not located in 'b'.(A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b

458. ____is another XML query language which makes use of path expressions.

A.sql B.oracle C.Xql D.plsql

459. XSL stands for__________.A.Extensible Stylesheet Language B. Extensible Set Language C Extended Stylesheet Language D. Extensible Shape Language

460________ is an XML query language which is generated for XML data sources.A.XQuery B.LQuery C.SQuery D.ZQuery

461. The XQuerys body comprises of any or all of the following expression:1.Literals and variables 2.Path expressions 3. Predicates A.only 1 is true B.only 2 is true C.only 3 is true D.all are true.

462.The full form of FLWOR is___________.A.FOR LET WHERE ORDER BY and RETURN B. FOR LEAST WHERE ORDER BY and RETURN C. FOR LET WHERE ORDER BY and RECORD463.State true false. Relational scheme is divided into scheme-oblivious and scheme conscious method.A.true.

464. _______is also a labelling method which is executed in SQL serverA.ORDPATHS

465.______is a language designed to recognise parts of XML documents, to query the data of XML.A.xquery B.Xpath C.Xml D.Xql

466. ________ is considered as one of the XML data management system by means of an RDBMS.A.xquery B.Xpath C.Xml D.Xtron

467. A query processor BEA/XQRL executes relational scheme by means of _______ A.xquery B.Xpath C.Xml D.Xql

468. The function of a ___________is to take out the querys high level abstraction and its procedural assessment into a group of low-level operations.A.query processor B.query simulator C.query optimization D.query handler

Unit 14 Database Application

469.________ database do not form two visible classes, but they rather define two ends of database rule languages.A.active B.relational C.object C.central

470. _______ can be defined as a method which specifies various active rules.A.sequence B.cursor C.trigger D.procedure

471. DB2, Oracle, and MS SQL Server are considered as the__________ relational databases.A.commercial B.herarchical C.centralised D.distributed

472. STARBURST document makes use of the following keywords1.INSERTED 2. DELETED 3. NEW-UPDATEDA.all are true B.1 is true C.2 is true D.3 is true.

473. The model which is utilised to state active database rules is known as_________Model.A.Event-Condition-Associate(ECA) B. Event-Criteria-Action (ECA) model.C. Event-base-Action (EBA) . D. Event-Condition-Action (ECA).474._______ is a relational model database server developed by IBM.A.sql B.DB2 C.oracle D.pl/sql

475. What does the CREATE TRIGGER statement states? a) trigger name b) trigger class c) trigger function d) trigger variable 476 . Events ____________ by the rule action that automatically identifies A.triggered

477.Temporal databases are used to record __________data.

A.time-referenced B.relational C.object-oriented D.distributed

478.A _________ database stores data with respect to valid time. A.rollback B.historical C.bitemporal D.temporal

479._________ database stores data with respect to transaction time. A.rollback B.historical C.bitemporal D.temporal

480.A ________ database stores data with respect to both valid time and transaction time.A.rollback B.historical C.bitemporal D.temporal

481.A ________database store only a single state of the real world, usually the most recent state in the context of both valid time and transaction time

482. A _______database stores the history of data with respect to both valid time and transaction time.A.rollback B.historical C.TimeDB D. snapshot

483. Multimedia databases facilitate the users to store as well as generate query for retrieving _________information.A.multimedia B.audio C.video D.graphic

484. The _______ database management system comprises of open source system.A.multimedia B.audio C.video D.graphic

485. Video database management method is used to take care of ____________ storage hierarchies. A.extended B.internal C.external D.static

486. In Video database management, the database ____________ and the streaming zone are split by the buffer pool.

A.Buffer zone B.cache C.memory D.secondary

487. Which processing is used by VDBMS video pre-processing toolkit to partition raw video?

a) Semantic based query processing b) Distributed query processing c) Both d) None of the above