0

Database Concepts (UGC/NET)

Description: Database
Number of Questions: 15
Created by:
Tags: Database Data Base Management Systems
Attempted 0/15 Correct 0 Score 0

Which of the following program variables in DBMS software program is used to copy the current record from the buffer to a program variable in the user program?

  1. Open

  2. Reset

  3. Find

  4. Read

  5. Delete


Correct Option: D
Explanation:

 copy the current record from the buffer to a program variable in the user program in short means to retrieve the data, so, to retrieve the data, read command is used in DBMS software program.

Which of the following levels of RAID uses a single parity disk relying on the disk controller to give information about which disk has been failed?

  1. RAID level 0

  2. RAID level 2

  3. RAID level 1

  4. RAID level 3

  5. RAID level 4


Correct Option: D
Explanation:

 in RAID Level 3, Byte-level striping with dedicated parity is done.

Which of the following terms in parallel database refers to the total number of parallel execution servers for a single operation?

  1. Intra-query parallelism

  2. Shared disk architecture

  3. Degree of parallelism

  4. Range partitioning

  5. Data partitioning


Correct Option: C
Explanation:

The degree of parallelism (DOP) indicates how many operations can be or are being simultaneously executed by a computer. It is especially useful for describing the performance of parallel programs and multi-processor systems.

The type of join in relation algebra used to join a table to itself if the table were two tables and temporarily renaming at least one table in the SQL statement is called

  1. inner join

  2. left join

  3. full join

  4. self join

  5. cartesian join


Correct Option: D
Explanation:

This type of join in relation algebra is used to join a table to itself if the table were two tables and temporarily renaming at least one table in the SQL statement.

Which of the following objects in relational data model is/are a basic unit of data consisting of rows and columns having name, datatype and width information specified at the time of creation?

  1. Views

  2. Synonyms

  3. Tables

  4. Sequence

  5. Indices


Correct Option: C
Explanation:

 Table is the basic unit of relational data model, that when is created, consists of rows, columns, datatype, name of the table, width information specified.

Which of the following costs in query execution is the cost pertaining to the number of memory buffers needed during query execution?

  1. Memory usage cost

  2. Storage cost

  3. Computation cost

  4. Communication cost

  5. Access cost


Correct Option: A
Explanation:

 Memory usage cost is the cost pertaining to the number of memory buffers needed during query execution.

Which of the following is a process of converting higher normal forms to lower normal forms with the objective of getting faster access to a database?

  1. Normalisation

  2. Denormalisation

  3. Horizontal fragmentation

  4. Partial dependency

  5. BCNF


Correct Option: B
Explanation:

 Denormalisation is the process, in which the higher level databases are converted to the lower level databases.

The situation in internal hashing when the hash field value of a record that is being inserted hashes to an address that already contains a different record is called

  1. open addressing

  2. chaining

  3. multiple hashing

  4. collision

  5. address space


Correct Option: D
Explanation:

Collision occurs in internal hashing, when the hash field value of a record that is being inserted hashes to an address that already contains a different record.

Which of the following types of characteristics for transaction recovery states that the transaction operations do not update the physical database instantly?

  1. Deferred update

  2. Write ahead protocol

  3. Write-through

  4. Database buffers

  5. Cascading rollback


Correct Option: A
Explanation:

This type of characteristic for transaction recovery states that the transaction operations do not update the physical database instantly.

Which of the following terms in DBMS is considered as complex in multi-database systems due to the supposition of autonomy?

  1. Work flow systems

  2. Global read protocol

  3. Transaction management

  4. Local read protocol

  5. Recoverability


Correct Option: C
Explanation:

This term in DBMS is considered as complex in multi-database systems due to the supposition of autonomy.

Which of the following approaches in OODBMS architecture is the one in which the client processes of OODBMS have an interaction with a network file service for reading and writing database pages?

  1. File server approach

  2. Page server approach

  3. Object server approach

  4. Distributed Client-Server approach

  5. Object clustering


Correct Option: A
Explanation:

This approach in OODBMS architecture is the one in which the client processes of OODBMS have an interaction with a network file service for reading and writing database pages.

Which of the following integrity constraints in database is also called attribute integrity that allows size values, right data type and null status, etc?

  1. Referential integrity

  2. Domain integrity

  3. Entity integrity

  4. Trigger

  5. DDL


Correct Option: B
Explanation:

This integrity constraint in database is also called attribute integrity that allows size values, right data type and null status, etc.

In which of the following phases in execution of transaction is the serialisability of the schedule verified by contrasting read and write sets of transactions to the read/write sets of simultaneous transactions?

  1. Read

  2. Write

  3. Validate

  4. Start

  5. Fin


Correct Option: C
Explanation:

In this phase in execution of transaction, the serialisability of the schedule is verified by contrasting read and write sets of transactions to the read/write sets of simultaneous transactions.

Which of the following locks in DBMS are also known as row-level locks where the client uses the row by means of the SELECT FOR UPDATE statement?

  1. Exclusive locks

  2. Update locks

  3. Shared locks

  4. Upgrading locks

  5. Increment locks


Correct Option: B
Explanation:

Update locks statement is used when transactions with unexpected read write locks are to be used.

Which of the following terms in OODBMS is considered as the unit of transfer from server to client?

  1. Class

  2. Attributes

  3. Object

  4. Inheritance

  5. Encapsulation


Correct Option: C
Explanation:

This term in OODBMS is considered as the unit of transfer from server to client.

- Hide questions