cs403 mega file-spring-12api.ning.com/files/.../cs403finaltermmcqsbydr.tariqhanif.pdf · using a...
TRANSCRIPT
Page 1
Final Term
FINALTERM EXAMINATION
Spring 2012
CS403- Database Management Systems (Session - 1)
1. The property of ____ enables an entity subtype to hold the properties of its super type.
Null Constraint
Integrity
Inheritance
Uniqueness
2. Which of the following most certainly implies the need for an entire table to implement?
A binary relationship 40
A ternary relationship
A recursive relationship
An identifying relationship
3. “A shared collection of logically related data” is known as
Database 10
File Processing System
Program and Data Interdependence
DBMS
4. On magnetic media, data is stored in ______________
Page 2
Final Term
Text
Images
Binary format 40
Tables
5. Which of the following is one of the purposes of using DDL commands?
inserting records into databases
updating records into databases
manipulating databases
creating and destroying databases 196
6. _________ is used to create and destroy database and database objects
ERD
DCL
DDL 196
DML
7. Which of the following is used to add or drop columns in an existing table?
ALTER 206
HAVING
SELECT
THEN
8. The ____ constraint specifies whether each entity supertype occurrence must also be a member of at its
one subtype.
Total completeness 103
Specialization
Uniqueness
Inheritance
9. Which of the following is a correct way to implement many-to-many cardinality in a binary relationship
while designing tables?
Page 3
Final Term
Using a third table with the keys from both the tables forming the composite primary key of third
table. 143
By splitting the data into five tables with primary key and foreign key relationships.
By splitting the data into five tables with primary key and foreign key relationships.
By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key).
10. Which of the following is INCORRECT regarding De-normalization?
It is the process of attempting optimization of Database.
It is a technique to move from lower to higher normal forms of database modeling. 187
In this process, it is required to add redundant data.
It enhances the performance of DB.
11. Hash Partitioning is applied on _______.
Rows
Columns
Algorthim 189
Attributes
12. _____________ is used to sort the result set in ascending or descending order
Group by Clause
From Clause
Where Clause
Order by Clause 220
13. Which of the following SQL Function does not use input parameter?
LOWER
UPPER
LEN
CURRENT_TIME 221
14. “Select * from STUDENT, DEPARTMENT” is an example of
Cartesian Join 225
Page 4
Final Term
Inner Join
Outer Join
Full Outer Join
15. Which of the following is not a DDL Command?
Create table
Alter table
Insert into 202 insert into a sql command
Create database
16. Which of the following commands is used to drop the table named STUDENT?
DROP TABLE STUDENT 208
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP
17. Which of the following is the correct syntax for SELECT statement?
SELECT column_name(s) FROM table_name 211
SELECT FROM table_name column_name(s)
FROM SELECT column_name(s) table_name
FROM table_name SELECT column_name(s)
18. Which of the following specifies the tables, which we access in the query?
SELECT Clause
FROM Clause 212
WHERE Clause
ORDER BY Clause
19. Procedure of finding the size of Cartesian Product is _____
The number of columns in the first table multiplied by the number of rows in the second table.
Page 5
Final Term
The number of rows in the first table multiplied by the number of columns in the first table.
The number of rows in the first table multiplied by the number of rows in the second
table. 224
The number of columns in the first table multiplied by the number of columns in the second table
20. Which of the following is not a type of user interface?
Graphical User Interface (GUI)
Forms
Database Schema 240
Text based Interface
21. ________ is an example of volatile memory.
RAM
ROM
FLASH MEMORY 256
CPU
22.Which of the following is the correct way of removing the Index called branchNoIndex?
DROP INDEX branchNoIndex; 207
APPEND INDEX branchNoIndex;
REMOVE INDEX branchNoIndex;
DEL INDEX branchNoIndex;
23. Which of the following is incorrect regarding Indexes?
It can not be created on composite attributes.
Index can be defined even when there is no data in the table.
It support Range selections.
It can be created using ‘Create Index’ statement 273
24. Which of the following is NOT a part of Deadlock Resolution?
Choose a victim
Page 6
Final Term
A message is passed to the victim and depending on the system the transaction may or may not be started
again automatically. Picking a list of all previously completed transactions and undoing all the updates. Page 323
Rollback `victim' transaction and restart it. 25. A Table can have ___________ clustered index (es).
Only one 275 Only two More than two Only three 26. Which of the following is true about the views?
View can only show few attributes of a table View can not be used for retrieving data View can not be used as security mechanisms We can customize the order of the table fields through Views page280
27. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the
columns?
CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284
SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT
SELECT * FROM STUDENT TO ST_LIST 28. __________ must identify a record in the table, uniquely.
Key 260
SQL Statement Index Hash Algorithm 29. ___________ manages mass storage devices like hard disks and tape drive.
Index
Operating System 261
RAID Sequential File Access 30. A perfect hash function map a key to distinct location having search time _________.
O(1) 266
O(n) O(n+1) O(n-1) 31. Which of the following is not the property of Transaction?
Atomicity Consistency
Page 7
Final Term
Redundancy 291 Durability 32. Dead Lock can be prevented by giving each transaction a ___________.
Name
Clustered Index Cartesian Join
Priority 299
33. While recovering data, which of the following files does a Recovery Manager examines at first?
Clustered Index
Log file 303 Data dictionary Metadata 34. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points 304 Relationships 35. -------------- occurs when multiple users want to update same object at the same time.
Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308
36. After execution of “commit” statement, ____________ is updated first.
Database Buffer 303
Clustered-Index Non-Clustered Index Application Program 37. It is not necessary for any super type entity to have its entire instance set to be associated with any of the
subtype entity, is called as ______________.
Partial Completeness 103 Disjoint Overlap
Complete Overlap
Total Completeness 38. R X θ S, If R and S are relations and θ is a ______.
Table Name
Page 8
Final Term
Attributes
Primary Key
Condition 158 39. If D --> E, F then D --> E and D --> F.
This inference rules is called as _______.
Transitivity Additive
Projectivity 166 Augmentation 40. Which of the following constraints enforces Entity Integrity?
PRIMARY KEY FOREIGN KEY CHECK
NOT NULL 134
FINALTERM EXAMINATION
Spring 2012
CS403- Database Management Systems (Session - 1)
1. Which of the following most certainly implies the need for an entire table to implement?
A binary relationship 140
A ternary relationship
A recursive relationship
An identifying relationship
2. “Database System” is the combination of_________________.
Database and DBMS
Database and Data
Data and Information
Operating System and Database
3. End User directly interact with _______________
External Schema 42
Page 9
Final Term
Conceptual Schema
Internal Schema
Core of Database Architecture
4. _____________ is also known as Community View of Database.
External Schema
Conceptual Schema 37
User views
Internal Schema
5. On magnetic media, data is stored in ______________
Text
Images
Binary format 40
Tables
6. _____________ contains data about all the Databases in DBMS.
Data Dictionary page64.
Schema
Cross Reference Matrix
Conceptual Data Model
7.In which of the following situations, Clustering is suitable:
Frequently updating
Relatively static page192.
Frequently deletion
Relatively dynamic
8. SQL is an _____________ standard computer language
ANSI 193
Page 10
Final Term
General
Cold fusion
Interactive
9. Which of the following statements creates a database named COMPANY.
CREATE DATABASE COMPANY 202
CREATE DB company
ADD DATABASE company
CREATE company DATABASE
10. ___________ is used to read, write, and remove the data from a database
SQL 194.
ERD
ANSI
Data Model
11. Which of the following is used to add or drop columns in an existing table?
ALTER 206
HAVING
SELECT
THEN
12. Which of the following SQL keywords is not used with DDL statements?
Table 234
Update
Create
Create
13. Which of the following statements are DML commands?
ALTER
Page 11
Final Term
CREATE
INSERT
GRANT page 200.
14. The ____ constraint specifies whether each entity supertype occurrence must also be a member of at its
one subtype.
Total completeness 103
Specialization
Uniqueness
Inheritance
15. Which of the following is not a DDL Command?
Create table
Alter table
Insert into 202 insert into a SQL command
Create database
16. Which of the following commands is used to drop the table named STUDENT?
DROP TABLE STUDENT 208
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP
17.If a relation contains single Key, the relation is automatically in _______.
1NF
2NF169
3NF
4NF
18.Which of the following is not a type of user interface?
Graphical User Interface (GUI)
Page 12
Final Term
Forms
Database Schema 240
Text based Interface
19. Which of the following is not related with Browser based forms development?
HTML
ASP
Front Page
Dev C 241
20. Which of the following is the activity, which is not performed during the development of application
programs?
Data input programs
Editing
Display
Data Collection 238
21. Which of the following is not correct about input forms?
Provide an easy, effective, efficient way to enter data into a table
Especially useful when the person entering the data is not familiar with the inner workings
Provide different controls to add data into the tables
One input forms can populate one table at a time 246
22. _______ is a control that users click to perform an action.
Input form 246
Report
Button
Text box
23. ________ is disadvantage of chaining technique to handle the collisions.
Unlimited Number of elements
Page 13
Final Term
Fast re-hashing
Overhead of multiple linked lists 269
Maximum number of elements must be known
24. What is the impact of setting multiple indexes for the same key?
Multiple indexes for the same key can not be set
It increases efficiency 263
It decreases efficiency
It will increase complexity as the access time will be increased
25. Which of the following is the correct way of removing the Index called branchNoIndex?
DROP INDEX branchNoIndex; 207
APPEND INDEX branchNoIndex;
REMOVE INDEX branchNoIndex;
DEL INDEX branchNoIndex;
26. Which of the following is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the victim and depending on the system the transaction may or may not be started
again automatically.
Picking a list of all previously completed transactions and undoing all the
updates. 323
Rollback `victim' transaction and restart it.
27. Which of the following is true regarding Index?
Index can only be created for a single table in database 262
Index can maximum be created for two tables in database
Index can only be created, when a database has at least 3 tables
Index can be created for every table in the database
28. Which of the following is not a type of VIEWS?
Materialized View
Page 14
Final Term
Simple Views
Complex View
Cross Reference View 283
29. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the
columns?
CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284
SELECT * FROM STUDENT VIEW ST_LIST
CREATE ST_LIST VIEW AS STUDENT
SELECT * FROM STUDENT TO ST_LIST
30. __________ must identify a record in the table, uniquely.
Hash Algorithm
Key 260
SQL Statement
Index
31. ___________ manages mass storage devices like hard disks and tape drive.
Index
Operating System 261
RAID
Sequential File Access
32.A file with ______ records, with sequential access file, an average of _______ key comparisons are
necessary.
10000, 5500
10000, 5000 262
10000, 4500
10000, 500
33. A perfect hash function map a key to distinct location having search time _________.
O(1) 266
Page 15
Final Term
O(n)
O(n+1)
O(n-1)
34. Dead Lock can be prevented by giving each transaction a ___________.
Name
Clustered Index
Cartesian Join
Priority 299
35. Wait-for graph is maintained by __________
Lock manager 300
Index Manager
View Manager
Constraint Manager
36. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points 304
Relationships
37. -------------- occurs when multiple users want to update same object at the same time.
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem
Lost Update Problem 308
38. After execution of “commit” statement, ____________ is updated first.
Database Buffer 303
Page 16
Final Term
Clustered-Index
Non-Clustered Index
Application Program
39. _______________ are called participants, when enrolled in a relationship.
Attributes
Relations
Entities 86
Keys
40. Which of the following constraints enforces Entity Integrity?
PRIMARY KEY
FOREIGN KEY
CHECK
NOT NULL 134
FINALTERM EXAMINATION
Spring 2012
CS403- Database Management Systems (Session - 2)
1. Which of the following is true about NOT NULL constraint?
Enforce domain integrity.
Limit the values that can be placed in a column.
Prevents any actions that would destroy links between tables with the corresponding data values. 135
Enforces the uniqueness of the values in a set of columns.
2. Which of the following constraints enforces Referential Integrity?
FOREIGN KEY page134
CHECK
PRIMARY KEY
UNIQUE
3. An Entity is
defined when the database is physically constructed in DBMS
a specific type such as an integer, text, date, logical etc
defined by DBMS
basic building block of the E-R data model page71
4. _____________ is also known as Community View of Database.
External Schema
Conceptual Schema page37
Page 17
Final Term
User views
Internal Schema
5. On magnetic media, data is stored in ______________
Text
Images
Binary format
Tables
6. SQL is an _____________ standard computer language
ANSI
General
Cold fusion
Interactive
7. Which of the following is one of the purposes of using DDL commands?
Inserting records into databases
Updating records into databases
Manipulating databases
creating and destroying databases page 196
8. _________ is used to create and destroy database and database objects
DDL page 196
DML
DCL
ERD
9.___________ is used to read, write, and remove the data from a database
SQL page194
ERD
Page 18
Final Term
ANSI
Data Model
10. Which of the following gives all the fields from employee table named as EMP?
select * from EMP page224
select emp* from EMP
select emp_id where EMP
select * where EMP
11. Which of the following statements are Data Definition Language commands?
GRANT
GRANT
INSERT 196
UPDATE
12. The ER- data model is an example of:
Physical database design
Logical database design
Relational database design
Conceptual database design page 70
13. Consider two sets A and B. A contains 3 elements and B contains 4. How many elements do their
Cartesian product contains?
12 129
9
16
7
14. Identify the factor which enforces a relation in 3NF?
Relation is in 2nd NF and every non-key attribute is fully functionally dependent on primary key.
Relation is in 2nd NF and every non-key attribute is transitive dependent on super key.
The domain of attribute may include multiple values.
Relation is in 2nd NF and every non-key attribute is non-transitively dependent on primary key. 171
Page 19
Final Term
15. In 1st Normal Form, we remove _____
Repeating Groups page 167
Transitive Dependency
Functional Dependency
Multi-valued Dependency
16. Which of the following is INCORRECT regarding De-normalization?
It is the process of attempting optimization of Database.
It is a technique to move from lower to higher normal forms of database modeling page 187
In this process, it is required to add redundant data.
It enhances the performance of DB.
17. “Select * from STUDENT, DEPARTMENT” is an example of.
Cartesian Join page 224
Inner Join
Outer Join
Full Outer Join
18. Which of the following is not a DDL Command?
Create table
Alter table
Insert into
Create database page201
19. Which of the following commands is used to TRUNCATE the table named STUDENT?
TRUNCATE TABLE STUDENT page 207
TABLE TRUNCATE STUDENT
TABLE STUDENT TRUNCATE
STUDENT TABLE TRUNCATE
Page 20
Final Term
20. Suppose there are 5 rows and 4 columns in TABLE1 and 6 rows and 7 columns in TABLE2; what is
the size of the Cartesian product incase of CROSS JOIN between these two tables?
30
35
24
28
21. Which of the following is not a feature of effective interface?
Effective interfaces can require more work to implement
An effective user interface minimizes the time users require to learn and implement the system
It helps users to accomplish their tasks and otherwise gets out of the way
An effective interface imposes its requirements on users page 239
22. Which of the following is not correct about input forms?
Provide an easy, effective, efficient way to enter data into a table
Especially useful when the person entering the data is not familiar with the inner workings
Provide different controls to add data into the tables
One input forms can populate one table at a time page 246
23. ______ is a control that presents a set of choices from which a user can select one or more items;
items can be text, graphics, or both.
Button page 243
List box
Text input
4. The main memory of a computer system is also known as
ROM
RAM page256
PROM
Hard disk
Page 21
Final Term
25. ________ is not a feature of hash access Report.
indexes to search or maintain page266
Very fast direct access
Inefficient sequential access
Use when direct access is needed, but sequential access is not
26. ________ is disadvantage of chaining technique to handle the collisions.
Unlimited Number of elements
Fast re-hashing
Fast re-hashing
Overhead of multiple linked lists page269
Maximum number of elements must be known
27. _______ is advantage of Re-Hashing technique to handle the collisions.
Collisions don’t use primary table space
Unlimited number of elements
Fast access through use of main table space page 269
Overhead of multiple linked lists
28. Which of the following is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the victim and depending on the system the transaction may or may not be
started again automatically.
Picking a list of all previously completed transactions and undoing all the updates. Page 323
Rollback `victim' transaction and restart it.
29. Which of the following is true about the views?
View can only show few attributes of a table
View can not be used for retrieving data
View can not be used as security mechanisms
We can customize the order of the table fields through Views page280
Page 22
Final Term
30. Which of the following is not a type of VIEWS?
Materialized View
Simple Views
Complex View
Cross Reference View page283
31. A file with ______ records, with sequential access file, an average of _______ key comparisons are
necessary.
10000, 5500
10000, 5000 page 262
10000, 4500
10000, 500
32. A perfect hash function map a key to distinct location having search time _________.
O(1) page 266
O(n)
O(n+1)
O(n-1)
33. Which of following is INCORRECT about “Materialized Views”?
These are suitable in “Data Warehouses”.
These are schema objects which can be use to summaries the data. Page 291
They can not be partitioned.
Their existence is transparent to SQL applications and users.
34. ____________ is used to detect the dead lock.
Wait-for graph page 320
Cross Reference Matrix
Inner Join
Clustered Index
Page 23
Final Term
35. Wait-for graph is maintained by __________
Lock manager page 320
Index Manager
View Manager
Constraint Manager
36. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points page 304
Relationships
37. -------------- occurs when multiple users want to update same object at the same time.
Lost Update Problem page 308
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem
38. After execution of “commit” statement, ____________ is updated first.
Database Buffer page 303
Clustered-Index
Non-Clustered Index
Application Program
39. To select the range while creating Indexes, the operator that is not used is _____.
Equals to (==).
Less than (<)
And (&&)
Between
Page 24
Final Term
40. DBA is responsible for _____________
Monitoring Disk Space
Database Backup page25
Managing Print Jobs
Development of Database Application Programs
FINALTERM EXAMINATION
Spring 2012
CS403- Database Management Systems
1. Maximum Cardinality shows that how many ________ of one entity can be placed in another
relation at most.
Keys Instances 91 page Attributes Relationships 2. “A shared collection of logically related data” is known as
Database page 10 File Processing System
Program and Data Interdependence DBMS 3. Metadata is also known as _________ for the real world data.
Attribute Schema 23 Entity Relation 4. _________ provides the change transparency between Conceptual and External level.
Physical Data Independence 45 Concurrency Control Logical Data Independence Functional Dependency 5. User rights information is stored in _________ .
Conceptual Database A user accessible Catalog 46 Logical Database Buffer
Page 25
Final Term
6. Which of the following types of partitioning reduces the chances of unbalanced partitions?
Vertical List Hash 189 Range 7. In which of the following situations, Clustering is suitable:
Frequently updating Relatively static 192 Frequently deletion Relatively dynamic 8. Vertical partitioning is done on the basis of
Attributes 191
Rows Clustering Replication 09. Which of the following is one of the purposes of using DML commands?
Creating databases Destroying databases Inserting data in tables 196 Create table 10. _________ is used to create and destroy database and database objects
ERD DCL DDL 196 DML 11. ___________ is used to read, write, and remove the data from a database
SQL 196 ERD ANSI Data Model 12. Which of the following gives all the fields from employee table named as EMP?
select * from EMP select emp* from EMP select emp_id where EMP select * where EMP 13. Which of the following SQL keywords is not used with DDL statements?
Table Update 234 Create Alter
Page 26
Final Term
14. Which of the following statements are Data Definition Language command?
INSERT 196
GRANT
ALTER UPDATE 15. Which of the following is true about relational table?
The sequence of columns is significant. The sequence of rows is significant. Contains only derived attributes. Contains only derived attributes. 16. If W, X, Y and Z are attributes of a relation, which of the following inference rules for
functional dependencies is correct?
If X Y then Y -> X If X -> Y then (X, Z) -> (Y,W) If X -> Y,Z then X -> Y If (X, Z) -> Y then X -> Y and Z -> Y 17. _____________ is used to sort the result set in ascending or descending order
From Clause Where Clause Order by Clause 220 Group by Clause 18. Which of the following commands is used to drop the table named STUDENT?
DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 19. Which of the following is NOT a feature of a good interface?
data structure based user friendly consistency process based 243 20. Which of the following is the activity, which is not performed during the development of
application programs?
Data input programs Editing Display Data Collection 238
Page 27
Final Term
21. _______ is a control that users click to perform an action.
Input form 246 Report Button Text box 22. ________ is an example of non-volatile memory.
SRAM Cache Memory Flash memory 256 DRAM 23. ________ is an example of volatile memory.
RAM ROM Flash memory 256 CPU 24. What is the impact of setting multiple indexes for the same key?
Multiple indexes for the same key can not be set It increases efficiency 263 It decreases efficiency It will increase complexity as the access time will be increased 25. Which of the following is incorrect regarding Indexes?
It can not be created on composite attributes. Index can be defined even when there is no data in the table. It supports Range selections. It can be created using ‘Create Index’ statement. 273 26. Which of the following SQL Command will DROP a view named “STUDENT”
DROP VIEW STUDENT 288 DROP FROM STUDENT VIEW DELETE STUDENT FROM VIEW DELETE ALL STUDENT VIEW 27. Which of the following is NOT CORRECT Regarding VIEWS?
VIEWS can be used to interact with the database. 281
Through VIEWS users can focus on their interested data. VIEW can show one or more records from a database. VIEW cannot be updated VIEW cannot be updated CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST
Page 28
Final Term
29. Which of the following command shows all the columns from “PRODUCT-VIEW?”
SELECT * FROM PRODUCT-VIEW 286 SELECT PRODUCT-VIEW SHOW ALL PRODUCT-VIEW PRODUCT-VIEW SELECT 30. __________ must identify a record in the table, uniquely.
Hash Algorithm Key 260 SQL Statement Index 31. A file with ______ records, with sequential access file, an average of _______ key comparisons
are necessary.
10000, 5500 10000, 5000 262 10000, 4500 10000, 500 32. Which of the following is INCORRECT about “Database Transaction”?
It can only end in one way, which is ROLLBACK 295 It must preserve the consistency of the database. It must follow the ACID properties. It is seen by the DBMS as a list of actions. 33. Which of the following is not a feature of “Database Transaction”?
Users should be able to regard the execution of each transaction as atomic. It must follow the ACID properties. Either all actions of a Transaction are carried out or none are. Transaction always affects the every other concurrent transaction. 294 34. ____________ is used to detect the dead lock.
Wait-for graph 320 Cross Reference Matrix Inner Join Clustered Index 35. While recovering data, which of the following files does a Recovery Manager examines at first?
Clustered Index Log file 303 Data dictionary Metadata
Page 29
Final Term
36. -------------- occurs when multiple users want to update same object at the same time.
Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 37. After execution of “commit” statement, ____________ is updated first.
Database Buffer 303 Clustered-Index Non-Clustered Index Application Program 38.. It is not necessary for any super type entity to have its entire instance set to be associated with
any of the subtype entity, is called as ______________.
Partial Completeness 103 Disjoint Overlap Complete Overlap Total Completeness 39. _____________ is an abstraction of a relationship.
Relationship Type 85 Relationship Name Relation Type Relation Name 40. DBA is not responsible for _____________
Monitoring Disk Space Database Backup Managing Print Jobs Development of Database Application Programs 29