0

Database Management System

Description: Database Fundamentals
Number of Questions: 20
Created by:
Tags: Database Fundamentals General Awareness and Computer Applications Computer Applications (New) BBA / BBS / BCA
Attempted 0/20 Correct 0 Score 0

The union of primary keys of the related entity sets becomes a _________.

  1. candidate key

  2. super key

  3. composite key

  4. primary key

  5. foreign key


Correct Option: B
Explanation:

Super key is the union of a set of attribute which are primary key.

A directed graph which represents the deadlocks is called __________.

  1. wait for graph

  2. cyclic graph

  3. schema

  4. tree

  5. B-tree


Correct Option: A
Explanation:

Cycle in wait for graph confirms the deadlock.

The syntax of a user query is verified by __________.

  1. parser

  2. DBA

  3. query optimizer

  4. translator

  5. compiler


Correct Option: A
Explanation:

Parsing is the technique for syntax analysis.

A block that is not permitted to be written back to a disc is called _______.

  1. zapped

  2. deleted code

  3. dead code

  4. pinned

  5. stopped


Correct Option: A
Explanation:

In foxpro environment, record marked for deletion gets confirmly deleted through ZAP command.

QUEL is a query language of which of the following databases?

  1. DB II

  2. Ingress

  3. Oracle

  4. SQL

  5. MySQL


Correct Option: A
Explanation:

QUEL is a part of DB II.

________ produces the relation that has attributes of R1 and R2.

  1. Cartesian product

  2. Difference

  3. Intersection

  4. Union

  5. Productivity


Correct Option: A
Explanation:

All the attributes of all involved relation are combined in cartesian product.

Collection of information stored in a database as a particular moment is _________.

  1. schema

  2. view

  3. table

  4. instance

  5. relation


Correct Option: D
Explanation:

Structure of a database at a particular time is instance.

The file organization that provides very fast access to any arbitrary record of a file is _______.

  1. unordered file

  2. ordered file

  3. structured file

  4. hashed file

  5. non structured file


Correct Option: D
Explanation:

Hash file is used for efficient searching.

A host language is a _________.

  1. storage definition language

  2. query language

  3. the DML embedded in the general purpose language

  4. always an object oriented language

  5. always a non-procedural language


Correct Option: C
Explanation:

A host language is the DML embedded in the general purpose language.

Which is a desirable property of a transaction?

  1. Automaticity

  2. Consistancy

  3. ACID

  4. Isolation

  5. Durability


Correct Option: C
Explanation:

ACID means atomicity, consistency, isolation,  and durability.Atomicity requires that each transaction is "all or nothing": if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged. An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes. To the outside world, a committed transaction appears (by its effects on the database) to be indivisible ("atomThe consistency property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules, including but not limited to constraints, cascades, triggers, and any combination thereof. This does not guarantee correctness of the transaction in all ways the application programmer might have wanted (that is the responsibility of application-level code) but merely that any programming errors do not violate any defined rules.ic"), and an aborted transaction does not happen.The consistency property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules, including but not limited to constraints, cascades, triggers, and any combination thereof. This does not guarantee correctness of the transaction in all ways the application programmer might have wanted (that is the responsibility of application-level code) but merely that any programming errors do not violate any defined rules.The isolation property ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other. Providing isolation is the main goal of concurrency control. Depending on concurrency control method, the effects of an incomplete transaction might not even be visible to another transaction.Durability means that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors. In a relational database, for instance, once a group of SQL statements execute, the results need to be stored permanently (even if the database crashes immediately thereafter). To defend against power loss, transactions (or their effects) must be recorded in a non-volatile memory.

A primary key _________.

  1. uniquely identifies the data in a row

  2. is also referred to as composite key

  3. is a unique identifier in a column

  4. must be accompanied by a corresponding foreign key

  5. is always a super key


Correct Option: A
Explanation:

Yes, it is correct by defination.

Which of the following is a property of an entity?

  1. Table

  2. Group

  3. Attribute

  4. DBMS

  5. Row


Correct Option: C
Explanation:

An attribute means property of data.

DBA stands for _______.

  1. Database Administrator

  2. Database Access

  3. Data Bank Administrator

  4. Data Bank Access

  5. Database Authority


Correct Option: A
Explanation:

DBA stands for Database administrator

Prevention of access to the database by unauthorized users is referred to as _______.

  1. integrity

  2. reliability

  3. productivity

  4. security

  5. duplicacy


Correct Option: D
Explanation:

It is incorrect.

Between the users and the database itself, a DBMS acts as a/an ________.

  1. barrier

  2. interface

  3. referee

  4. obstacle

  5. guide


Correct Option: B
Explanation:

Interface is the means of interaction.

Duplicate data is referred to as _______.

  1. accurate data

  2. redundant data

  3. related data

  4. grouped data

  5. null data


Correct Option: B
Explanation:

Redundancy means duplicate/repeated data.

One common approach of preventing deadlocks, before beginning an update is ________.

  1. lock the DBMS

  2. lock the database

  3. lock one row

  4. lock one column

  5. lock a relation


Correct Option: B
Explanation:

Lock will make it non-shareable.

Which of the following DBMS supports full-fledged client server application development?

  1. Dbase iv

  2. Oracle 7.1

  3. SQL

  4. Ingress

  5. Foxpro 2.1


Correct Option: B
Explanation:

Oracle is client server application development.

The level of data abstraction, which describes how data is actually stored is _________.

  1. physical level

  2. logical level

  3. conceptual level

  4. view

  5. file level


Correct Option: A
Explanation:

It shows how data is actually stored.

In a hierarchical database, a hashing function is used to locate the ___________.

  1. root

  2. collision

  3. primary key

  4. composite key

  5. duplicate record


Correct Option: A
Explanation:

Hash value points to the element exactly using index.

- Hide questions