UGC NET STUDY MATERIALS

DBMS

QUIZ QUESTION OF : DBMS



=======================================================
                                                     UNIT=1
=======================================================
Question 1


He/ She defines the database schema, Interacts continuously with users, defines integrity and security checks, defines procedures for backup and recovery.

 a. End User

b. Naive User

c. DBA

d. None
=======================================================
Question 2

 The way a particular application views the data from the database that the application uses is a __________

 a. Module

b. Relational Model

c. Subschema

d. Schema
=======================================================
Question 3

 The _______ contains the data definition of the application; the ______ evaluates the different implementations of a query and chooses the best among them.
a. Data Dictionary, Query Optimizer

b. Data Manipulation, Data Integrity

c. Data Recovery, Data Concurrency

d. Data Definition, Data Manipulation
=======================================================
Question 4

 The database administrator is in effect the coordinator between the ________ and the ________

 a. Application programs; database

b. Database; users

c. DBMS; database

d. Application programs; users
=======================================================
Question 5

Which of the following is not true about traditional approach to information processing?

. a. It is file oriented

b. It is inflexible

c. There is a common sharing of data among various applications

d. Programs are dependent on files
=======================================================
                                                             UNIT=3
=======================================================



 A ______ key is all those set of attributes which can uniquely identify a row. However, any subset of these set of attributes would not identify a row uniquely.

 a. Foreign

b. Candidate

c. Sub

d. Primary
=======================================================
Question 2

 Delete/Update all the references successively or in a cascaded fashion and finally delete/update the parent record. The related concept is called ____________

 a. Deletion

b. Updation

c. Cascade Deletion

d. Cascade Insertion
=======================================================
Question 3

The following query is an example of _______ join. SELECT e1.employee_id, e1.manager_id, e2.employee_id FROM employees e1, employees e2 WHERE e1.manager_id(+)= e2.employee_id;

a. Equi

b. Non-Equi

c. Self

d. Outer
=======================================================
Question 4

 The Join operation retrieves all rows from the left-side (of the join operator) table. If there are corresponding or related rows in the right-side table, the correspondence will be shown. Otherwise, columns of the right-side table will take null values. The type of join discussed here corresponds to ____________.

a. Inner Join

b. Outer Join

c. Right Outer Join

d. Left Outer Join
=======================================================
Question 5

 The number of tuples in a relation is called __________ of a relation.

 a. Cardinality

b. Degree

c. Tuple

d. Key
=======================================================
                                                          UNIT=4
=======================================================
Question 1

 The client may communicate with a _________ (a web server, transaction processing monitor, or the like), which in turn uses a protocol to proxy the communication between the client and the DBMS.

 a. File Server

b. Database Server

c. Middle-Tier Server

d. Proxy Server
=======================================================
Question 2

The example given below corresponds to _______ view of a database system. "A department head may only be interested in the departmental finances and student enrolments but not the library information".

 a. Conceptual

b. External

c. Internal

d. None
=======================================================
Question 3

The tables are called _______ because they store data about the relationships between the rows of data.

 a. Integrated

b. Self Describing

c. Metadata

d. Knowledge Discovery
=======================================================
Question 4

 The _________ is the knowledge derived from data.

 a. Database

b. Information

c. Table

d. Data Dictionary
=======================================================
Question 5

 There can be a change in database structure without changing the programs accessing them. It is achieved through the use of external views. Each program accesses data through an external view. The change to the database structure should be such that a required field should not be removed from it. All the above statements correspond to the concept of ____________

 a. Data Independence

b. Data Dependence

c. Self-Reference

d. Referential Integrity
=======================================================
                                                          UNIT=6                              
=======================================================
Question 1

 Any thing that may have an independent existence and about which we intend to collect data is called _______.

a. Entity Set

b. Data

c. Entity

d. Relation
=======================================================
Question 2

Consider the following entities: Doctor Medicine Prescription Patient The above entities form a __________ relationship type.

 a. Binary

b. Tertiary

c. n-ary

d. None
=======================================================
Question 3

In this, user requirements are gathered together and a database is designed which meets these requirements as closely as possible. This step called ____ level design is independent of an individual DBMS.

a. Information

b. Data

c. Logical

d. Physical
=======================================================
                                                        UNIT=7
=======================================================
Question 1


Account Level Choose... MODIFY privileges on R: This gives the account the capability to modify tuples of R. SELECT (retrieval or read) privilege on R: Gives the account retrieval privilege. At this level, the DBA can control the privilege to access each individual relation or view in the database. At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.

Relation (or Table) Level Choose... MODIFY privileges on R: This gives the account the capability to modify tuples of R. SELECT (retrieval or read) privilege on R: Gives the account retrieval privilege. At this level, the DBA can control the privilege to access each individual relation or view in the database. At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.

Select (Retrieval or Read) Choose... MODIFY privileges on R: This gives the account the capability to modify tuples of R. SELECT (retrieval or read) privilege on R: Gives the account retrieval privilege. At this level, the DBA can control the privilege to access each individual relation or view in the database. At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.

Modify Choose... MODIFY privileges on R: This gives the account the capability to modify tuples of R. SELECT (retrieval or read) privilege on R: Gives the account retrieval privilege. At this level, the DBA can control the privilege to access each individual relation or view in the database. At this level, the DBA specifies the particular privileges that each account holds independently of the relations in the database.
=======================================================
Question 2

Channels that are pathways for information to flow implicitly in ways that violate the security policy of an organization are called ______ channels.

a. Covert

b. Flow

c. Data

d. Information
=======================================================
Question 3

 DBA-privileged commands include commands for ______ and ______ privileges to individual accounts, users, or user groups and for performing the following types of actions.

 a. giving; taking

b. accounts; users

c. users; user groups

d. granting; revoking
=======================================================
Question 4

If any tampering with the database is suspected, a database audit is performed, which consists of reviewing the log to examine all ______ and ______ are applied to the database during a certain time period.

 a. operations; validations

b. accesses; operations

c. permissions; relations

d. grants; revokes
=======================================================
Question 5

______ refers to the requirement that information be protected from improper modification.

 a. Data integrity

b. Entity Integrity

c. Relational Integrity

d. Database Integrity
=======================================================
                                       UNIT=8
=======================================================
Question 1


 Match the following with respect to Knowledge discovery in Data Mining:

Choose one answer. a. Association rules->These rules correlate the presence of a set of items with another range of values for another set of variables.

b. Classification hierarchies->The goal is to work from an existing set of events or transactions to create a hierarchy of classes.

c. Sequential patterns->A sequence of actions or events is sought.

d. Clustering->A given population of events or items can be partitioned (segmente

e. into sets of "similar" elements.
=======================================================
Question 2

 The goal of _______ is to place records into groups, such that records in a group are similar to each other and dissimilar to records in other groups. The groups are usually __________.

 a. Classification; Grouping

b. Grouping; Clustering

c. Clustering; Disjoint

d. Disjoint; Classification
=======================================================
Question 3

 The ___________ is an ORDBMS that combines relational and object database technologies from two previously existing products: Informix and Ilustra.

 a. Informix universal server

b. Oracle database server

c. MS-Access Database

d. MySQL database server
=======================================================
Question 4

______ knowledge deduces new information based on applying pre-specified logical rules of deduction on the given data. Data mining addresses ____ knowledge, which discovers new rules and patterns from the supplied data.

 a. Deductive; Inductive

b. Inductive; Responsive

c. Responsive; Inductive

d. Erroneous; Deductive
=======================================================
Question 5

 _________ can be applied to operational databases with individual transactions.

 a. Data Division

b. Data Multiplexing

c. Data Mining

d. Data Warehousing
=======================================================
                                             UNIT=9
=======================================================
Question 1


 In_________, a subset of tuples from the Cartesian product of the relations in the 'from' clause that satisfy the qualification are selected.

 a. horizontal selection

b. vertical projection

c. horizontal projection

d. vertical selection
=======================================================
Question 2

 Most components of an SQL statement are case insensitive, except for ____ data.

a. integer

b. character

c. literal character

d. float
=======================================================
Question 3

The ______ join includes rows that are unmatched in both tables and unmatched columns are filled with ____.

 a. left outer, integer values

b. Full outer, NULLs

c. right outer, zeros

d. left outer, undefined values
=======================================================
                                                  UNIT=10
=======================================================
Question 1


 Match the following:

read committed transactions Choose... Any changes or effects that the transaction may have applied to the database must be undone. Perform distributed transactions with servers that do not support serializable transactions A transaction rereads data it has previously read and finds that another committed transaction has modified or deleted the data. A transaction re-runs a query returning a set of rows that satisfies a search condition and finds that another committed transaction has inserted additional rows that satisfy the condition.

Non-repeatable (fuzzy) reads Choose... Any changes or effects that the transaction may have applied to the database must be undone. Perform distributed transactions with servers that do not support serializable transactions A transaction rereads data it has previously read and finds that another committed transaction has modified or deleted the data. A transaction re-runs a query returning a set of rows that satisfies a search condition and finds that another committed transaction has inserted additional rows that satisfy the condition.

Phantom reads Choose... Any changes or effects that the transaction may have applied to the database must be undone. Perform distributed transactions with servers that do not support serializable transactions A transaction rereads data it has previously read and finds that another committed transaction has modified or deleted the data. A transaction re-runs a query returning a set of rows that satisfies a search condition and finds that another committed transaction has inserted additional rows that satisfy the condition.

Rollback Choose... Any changes or effects that the transaction may have applied to the database must be undone. Perform distributed transactions with servers that do not support serializable transactions A transaction rereads data it has previously read and finds that another committed transaction has modified or deleted the data. A transaction re-runs a query returning a set of rows that satisfies a search condition and finds that another committed transaction has inserted additional rows that satisfy the condition.
=======================================================
Question 2

The basic unit of data transfer from disk to main memory is ________.

a. two blocks

b. two bytes

c. one Kilobyte

d. one block
=======================================================
The ____ Database automatically detects deadlock situations and resolves them by ____ back one of the statements involved in the deadlock, thereby releasing one set of the conflicting row locks.

 a. MySQL; committing

b. Oracle; rolling

c. SQL Server; rolling

d. MS- Access; updating

=======================================================
Question 4

 The _____ property of a transaction guarantees to application writers that two concurrent transactions will not see each other's in-flight (not yet-committed) updates.
a. Atomicity

b. Consistency

c. Isolation

d. Durability
=======================================================
Question 5

 _____ prevents visibility of transient database states, and ____ ensures correctness of data that is visible.

 a. lagging; maintenance

b. locking; logging

c. logging; locking

d. lagging; locking
=======================================================
=======================================================

Popular Posts

Recent Posts