Database Systems Mcq's 150 Marked
Database Systems Mcq's 150 Marked
2. Which of the three schemas used to represents how users view the database?
(a) internal (b) external (c) implementation (d) conceptual
4. Transaction of various DML statements into the lower-level file system commands is done
by_____
(c) (Cabin_no, Phone) and (Cabin_no, Room_no) are the candidate keys.
(d) (Room_no, Phone) and (Room_no, Cabin_no) are the candidate keys.
7. Which one of the following uniquely identifies the elements in the relation?
(a) secondary key (b) primary key (c) composite key (d) foreign key
8. Find the ID, name, dept name, salary for instructors whose salary is greater than $80,000?
Based on the above question, which of the following query is correct?
(a)Э t ∈ r (Q(t))
(b){t | Э s ε instructor (t[ID] = s[ID]∧ s[salary] > 80000)}
(c) {t | Э s ε instructor (s[ID]∧ s[salary] > 80000)}
(d) {t | t ε instructor ∧ t[salary] > 80000}
9. Which of the following symbol is used in the place of except?
(a) domain value (b) tuple value (c) domain attributes (d) domain r
23. Domain constraints, functional dependency and referential integrity are special form
_________
(a) Foreign key (b) Primary key (c) Assertion (d) Referential constraint
24. The language used in application programs to request data from the DBMS is referred to as
the ________.
26. The actual content in the database at a particular point is called ____
(a) Schema (b) Attribute (c) Parameter (d) Instance
29. _________manages the allocation of space on disk storage and the data structures used to
represent information stored on disk.
(a) File manager (b) Buffer manger (c) Transaction manager` (d) Integrity manager
30. A tuple is also known as a(n) __________
(a) table (b) relation (c) row (d) field
UNIT II
31. What is the use of the symbol '*' in select statement?
(a) display all attributes in a relation (b) display all row in a relation
(c) display based on condition (d) display specific column
34. ______ matches any values that start with “J" and ends with “y"
(a) Specify what tablewe are selecting (b) Specify the column to be selected
(c) specify range for search condition (d) specific values
(a) union (b) union all (c) intersect (d) except all
38. To list all cities whose humidity is 89, Which one of the following query is correct?
48. An entity type whose existence depends on another entity type is called _________ entity
(a) Strong (b) Weak (c) Dependent (d) Variant
49. A person name, birthday and social security number are all examples of ______.
(a) Entities (b) Attributes (c) Relationships (d) Descriptors
52. A _____ attribute need not be physically stored within the database
(a)Single valued (b) Derived (c) Multi valued (d) Composite
53. If an entity can exist apart from one or more related entities it is said to be_____independent.
(a) Existence (b) Relationship (c) Business (d) Weak
UNIT III
63. The attribute on the left-hand side of the arrow In a functional dependency is _____.
(a) Candidate key (b) Determinant (c) Foreign key (d) Primary key
64. A relation is in 2NF if it is in 1NF and all its non-key attributes are _____.
(a) Dependent on part of the primary key (b) Dependent on the entire primary key
(c) Independent of the primary key (d) Independent of any other relation
91. A___________ is an indirect functional dependency, one in which X→Z only by virtue of
X→Y and Y→Z.
(a) multi-valued dependencies (b) join dependency
(c) trivial functional dependency (d) transitive dependencies
UNIT IV
92. Which RAID type doesn’t use parity for data protection?
(a) RAID 1 (b) RAID 4 (c) RAID 6 (d) RAID 5
96. Which of the following raid levels provides maximum usable disk space?
(a) RAID 1 (b) RAID 0 (c) RAID 5 (d) RAID 6
98. When one disk fails in a RAID 5 array with a hot spare, which one of the following
statements is true?
(a) No I/O can continue
(b) Reads continue from hot spare, but writes fail
(c) Both reads and writes can continue
(d) Array must be shut down immediately for replacing the failed disk
99. Primary, indexes, secondary indexes and cluster indexes are all types of
(a) ordered indexes (b) unordered indexes (c) linear indexes (d) relative search indexes
100. The physical location of a record is determined by a mathematical formula that transformsa
file key into a record location is:
(a) B-tree file (b) hashed file (c) indexed file (d) sequence file
101. The hashing technique which allocates fixed number of buckets is classified as
(a) dynamic hashing (b) static hashing (c) external hashing (d) internal hashing
102. The kind of hashing technique in which a directory of having addresses 2d is maintained is
called___
(a) dynamic hashing (b)extendible hashing
(c) non extendible hashing (d) static hashing
103. The index which has an entry for every key value is classified as
(a) linear index (b) dense index (c) sparse index (d) cluster index
104. The special node in the tree structure which has many child nodes and one parent node is
called___
(a) descendant nodes (b) root node (c) leaf node (d) search node
105. The tree structure diagram in which the pointers of data are stored at the leaf nodes of
diagram is classified as
(a) B tree (b) B+ tree (c) B2 tree (d) B*tree
106. In tree structure, the node which is free of child nodes is called
(a) descendant nodes (b) root node (c) leaf node (d) search node
107. The time it takes to find a particular data item is called as ___________
(a) Insertion time (b) Deletion time (c) Time overhead (d) Access time
108. If an index entry appears for only some of the search key values in the file, it is called as
________
(a) linear index (b) dense index (c) sparse index (d) cluster index
(a) internal node (b) external node (c) middle node (d) primary node
110. Some buckets are assigned more records than the others which causes bucket overflow, this
condition is called as ________
(a) bucket sufficiency(b) bucket insufficiency (c) bucket skew (d) bucket normalcy
112. A hash function h defined h(key) = key mod 7, with linear probing, is used to insert the
keys 44, 45, 79, 55, 91, 18, 63 into a table indexed from 0 to 6. What will be the location of
key18?
(a) 3 (b) 4 (c) 5 (d) 6
113. A B-tree of order m has maximum of _____________ children
(a) m (b) m+1 (c) m-1 (d) m/2
114. The deleted records thus form a linked list, which is often referred to as a ______
(a) end of record (b) ordered list (c) unordered list (d) free list
115. Which is the best file organization when data is frequently added or deleted from a file?
(a) Sequential (b) Direct (c) Index sequential (d) inverted
116. At the beginning of the file, we allocate a certain number of bytes as a______
(a) reserved space (b) list representation (c) file header (d) pointers
117. In byte string representation. A special end of record symbol is ______
118. Indices whose search key specifies an order different from the sequential order of the file
are called __________
(a) index record (b) cluster indices (c) primary indices (d) secondary indices
119. The non-leaf nodes of the B+ tree form a _________index on the leaf node.
(a) dense (b) sparse (c) skew (d) direct
120. A tree in which every distance from root of the tree to a leaf of the tree is of the same length
is called_______
(a) unbalanced tree (b) balanced tree (c) structured tree (d) binary tree
121. In a B tree, if a node containing K keys always also contain ______ pointers
(a) K-1 (b) K (c) K+1 (d) 2K
122. If a bucket is full, to use the next bucket that has space such a policy is called_______
(a) skew (b) hash index (c) dynamic hashing (d) linear probing
UNIT V
123.A transaction that has not been completed successfully is called as _______
(a) Compensating transaction (b) Aborted transaction
(c) Active transaction (d) Partially committed transaction
124. The execution sequences in concurrency control are termed as ________
(a) Serials (b) Schedules (c) Organizations (d) Time tables
125. The scheme that controls the interaction between executing transactions is called as _____
(a) Concurrency control scheme (b) Multiprogramming scheme
(c) Serialization scheme (d) Schedule scheme
126. If a schedule S can be transformed into a schedule S’ by a series of swaps of non-conflicting
instructions, then S and S’ are
(a) Non conflict equivalent (b) Equal(c) Conflict equivalent (d) Isolation equivalent
127. If a transaction may obtain locks but may not release any locks then it is in _______ phase
(a) Growing phase (b) Shrinking phase (c) Deadlock phase (d) Starved phase
129. The default timestamp ordering protocol generates schedules that are
(a) Recoverable (b) Non-recoverable (c) Starving (d) cascading
130. In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and
TS(Ti)<W-timestamp(Q), then
(a) Read operation is executed (b) Read operation is rejected
(c) Write operation is executed (d) Write operation is rejected
132. The unique identifier of the transaction that performed the write operation is called as
(a) Transaction identifier (b) Data-item identifier (c) Old value (d) New value
133. Which of the following is not a recovery technique?
(a) deferred update (b) immediate update
(c) two-phase commit (d)shadow paging
134. Cascading rollback is avoided in all protocol except _________
(a) strict two-phase locking protocol (b) tree locking protocol
(c) two-phase locking protocol (d) validation based protocol
135. Assume transaction A holds a shared lock R. If transaction B also requests for a sharedlock
on R
(a) it will result in a deadlock situation. (b) it will immediately be rejected.
(c) it will immediately be granted. (d) it will be granted as soon as it is released
136. Immediate database modification technique uses ______
(a) both undo and redo (b) undo but no redo.
(c)redo but no undo. (d) neither undo nor redo.
137. Which of the following has “all-or-none” property?
(a) Atomicity (b) Durability (c) Isolation (d) All of the mentioned
138. Each modification done in database transaction are first recorded into the ________
(a) Hard-drive (b) Log (c) Disk (d) Datamart
139. _______ means that data used during the execution of a transaction cannot be used by a
second transaction until the first one is completed.
(a) Serializability (b) Atomicity (c) Isolation (d) Time stamping
140. For correct behavior during recovery, undo and redo operation must be
(a) Commutative (b) Associative (c) Idempotent (d) Distributive
141. In a two-phase locking protocol, a transaction release locks in_____ phase.
(a) shrinking phase (b) growing phase (c) running phase (d)initial phase
142. If a transaction acquires exclusive lock, then it can perform ________ operation.
(a) read (b) write (c)read and write (d) update
143. ______ helps solve concurrency problem.
(a) locking (b) transaction monitor (c) transaction serializability (d) two-phase commit
144. In log-based recovery, the log is a sequence of………….
(a) filter (b) records (c) blocks (d) numbers
145. If a transaction obtains an exclusive lock on a row, it means that the transaction wants to
_____that row.
(a) select (b) update (c) view (d) read
146. In which state, the transaction will wait for the final statement has been executed?
(a) Active (b) Failed (c) Aborted (d) partially committed
147. The phenomenon in which one failure leads to a series of transaction rollbacks is called as
________
(a) Cascading rollback (b) Cascade less rollback (c) Cascade cause (d) rollback
148. If the transaction can no longer continue with its normal execution because of some internal
condition, it is called as a _________
(a) Logical error (b) System error (c) System crash (d) runtime error
149. A logical counter is _________ after a new timestamp has been assigned
(a) Incremented (b) Decremented (c) Doubled (d) Remains the same
152. Which of the following timestamps is used to record the time when a database has
completed its write operation?
(a) Start(i) (b) Validation(i) (c) Finish(i) (d) Write(i)
ANSWER WITH EXPANSION
2 (b) external
3. (d) instance
4. (b)storage manger
5. (c) (Cabin_no, Phone) and (Cabin_no, Room_no) are the candidate keys.
6. (a) Foreign
9. (c) ¬
10 (d) ∀ t ε r (Q(t))
14. (b)Set-difference
39. (d) on
61. (c) An attribute or group of attributes that can be the primary key
76. (b) C → D
77. (a) γα → γβ
84. (a) A → B
90 (b) Decomposition
97. (b) 2
112. (c) 5
113. (a) m
117. (a)
128. (a) The largest timestamp of any transaction that can execute write(Q) successfully
150. (b) The largest timestamp of any transaction that can execute read(Q) successfully