0

Advanced DBMS (UGC/NET)

Description: DBMS
Number of Questions: 15
Created by:
Tags: DBMS Data Base Management Systems
Attempted 0/15 Correct 0 Score 0

Which of the following normal forms in DBMS is the one in which a table contains no partial dependencies?

  1. 1NF

  2. 2NF

  3. 3NF

  4. 4NF

  5. BCNF


Correct Option: B
Explanation:

This normal form in DBMS is the one in which a table contains no partial dependencies.

Which of the following terms in DBMS refers to the replacement of relation schema by two or more relational schemas, all of which contain a subset of the attributes of the relation?

  1. Redundancy

  2. Decomposition

  3. Update anomalies

  4. Normalisation

  5. Functional dependency


Correct Option: B
Explanation:

This term in DBMS refers to the replacement of the relation schema by two or more relational schemas, all of which contain a subset of the attributes of the relation.

Which of the following terms is defined as a set of rows that encode the changes made to a specific base table?

  1. Query tree

  2. Delta stream

  3. Greedy algorithm

  4. Query optimisation

  5. Mobile database system


Correct Option: B
Explanation:

This term is defined as a set of rows that encode the changes made to a specific base table.

Which of the following operations in DBMS is the one in which data from the operand relations is read into the main memory and processed in some way out to the disk, and read again from the disk to complete the operation?

  1. NUMA

  2. Scanning tables

  3. Shared disk

  4. Two-pass alogorithm

  5. Table scan


Correct Option: D
Explanation:

This operation in DBMS is the one in which data from the operand relations is read into the main memory and processed in some way out to disk, and read again from the disk to complete the operation.

Which of the following forms of parallelism relates to the capacity to break up a query into various parts across various partitions of a partitioned database which may be on one single machine or several machines?

  1. Inter-partition parallelism

  2. Intra-partition parallelism

  3. Shared nothing architecture

  4. Degree of parallelism

  5. Parallel I/O


Correct Option: A
Explanation:

This form of parallelism relates to the capacity to break up a query into various parts across various partitions of a partitioned database which may be on one single machine or several machines.

Which of the following tasks in Traditional Query Processing refers to selecting a plan to accomplish a query using available statistics?

  1. Execution

  2. Statistics tracking

  3. Optimisation

  4. Ripple join

  5. Eddy


Correct Option: C
Explanation:

This task in Traditional Query Processing refers to selecting a plan to accomplish a query using available statistics.

Which of the following approaches in OODBMS architecture is the one in which the client processes of OODBMS have an interaction with a network file service for reading and writing database pages?

  1. Object server approach

  2. Page server approach

  3. File server approach

  4. Object clustering

  5. Heterogeneous operation


Correct Option: C
Explanation:

This approach in OODBMS architecture is the one in which the client processes of OODBMS have an interaction with a network file service for reading and writing database pages.

Which of the following DBMS software modules verify parse queries, DML retrieval statements and database update statements and also check the catalog to verify whether all the schema names referenced in these statements are valid?

  1. DDL compilers

  2. Query and DML compilers

  3. Query and DML optimiser

  4. Authorisation and security checking

  5. Query and DML parser


Correct Option: E
Explanation:

Query and DML parser verify parse queries, DML retrieval statements and database update statements and also check the catalog to verify whether all the schema names referenced in these statements are valid.

Which of the following phases in locking scheduler is the one in which all locks are released by a transaction and one cannot attain any new lock?

  1. Growing phase

  2. Shrinking phase

  3. Commit phase

  4. Update lock

  5. Increment lock


Correct Option: B
Explanation:

This phase in a locking scheduler is the one in which all locks are released by a transaction and one cannot attain any new lock.

Which of the following components of distributed database management system should be there with every data requesting workstation so as to receive and process the request for data, both local and remote?

  1. Workstations

  2. Network hardware and software

  3. Data processor

  4. Transaction processor

  5. Replicated data management


Correct Option: D
Explanation:

This component of distributed database management system should be there with every data requesting workstation so as to receive and process the request for data, both local and remote.

Which of the following types of indexing requires that the ordering field of the data file have a distinct value for each record?

  1. Primary index

  2. Clustering index

  3. Secondary index

  4. Multilevel index

  5. Dense index


Correct Option: B
Explanation:

This type of indexing requires that the ordering field of the data file have a distinct value for each record.

Which of the following components in E-R notation describes the entity to which it is associated and is particularly used to classify any entity?

  1. Relationship

  2. Entity

  3. Cardinality

  4. Attribute

  5. Degree


Correct Option: D
Explanation:

This component in E-R notation describes the entity to which it is associated and is particularly used to classify any entity.

Which of the following views in Three Schema Architecture is the information model of the enterprise and contains the view of the whole enterprise without any concern for the physical implementation?

  1. External view

  2. Conceptual view

  3. Internal view

  4. Physical view

  5. Users view


Correct Option: B
Explanation:

This view in Three Schema Architecture is the information model of the enterprise and contains the view of the whole enterprise without any concern for the physical implementation.

Which of the following techniques used for denormalisation is the one in which the database table is split by rows, due to which the number of records per table will be reduced?

  1. Duplicate data

  2. Summary data

  3. Horizontal partitioning

  4. Vertical fragmentation

  5. Normalisation


Correct Option: C
Explanation:

This technique used for denormalisation is the one in which the database table is split by rows, due to which the number of records per table will be reduced.

Which of the following losses in database refers to making objects non-available to a human user or a program to which they have a legitimate right?

  1. Loss of integrity

  2. Loss of availability

  3. Loss of confidentiality

  4. Loss of data

  5. Loss of information


Correct Option: B
Explanation:

This type of loss in database refers to making objects non-available to a human user or a program to which they have a legitimate right.

- Hide questions