0% found this document useful (0 votes)
4 views2 pages

1-25 DBMS Basics

The document provides a comprehensive overview of Database Management Systems (DBMS), covering fundamental concepts such as keys, normalization, SQL queries, and advanced DBMS concepts. It includes true/false statements that clarify essential principles related to database management, design, and operations. Key topics include data integrity, transaction management, and the importance of normalization in reducing redundancy.

Uploaded by

ridmoon40318
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

1-25 DBMS Basics

The document provides a comprehensive overview of Database Management Systems (DBMS), covering fundamental concepts such as keys, normalization, SQL queries, and advanced DBMS concepts. It includes true/false statements that clarify essential principles related to database management, design, and operations. Key topics include data integrity, transaction management, and the importance of normalization in reducing redundancy.

Uploaded by

ridmoon40318
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

1-25: DBMS Basics

1. A Database Management System (DBMS) is software that manages databases.


(True)
2. A primary key can contain duplicate values. (False)
3. Data redundancy is minimized in a relational database. (True)
4. SQL stands for Structured Query Language. (True)
5. A foreign key must always refer to the primary key of another table. (True)
6. A view in SQL is a virtual table. (True)
7. Relational databases use tables to store data. (True)
8. The term "atomicity" refers to the ability to execute multiple operations
simultaneously. (False)
9. A DBMS provides better security compared to a traditional file system. (True)
10. In a relational database, rows are also known as attributes. (False)
11. The ACID properties ensure reliable database transactions. (True)
12. Normalization reduces data redundancy. (True)
13. An entity is a real-world object represented in a database. (True)
14. Primary keys can contain NULL values. (False)
15. DDL stands for Data Definition Language. (True)
16. The ER model represents the logical structure of a database. (True)
17. Indexing improves data retrieval speed. (True)
18. SQL is case-sensitive. (False)
19. Data integrity ensures data accuracy and consistency. (True)
20. A transaction is a single unit of work in a database. (True)
21. Secondary indexes cannot be created in a database. (False)
22. A table without a primary key is always normalized. (False)
23. The DELETE command removes all rows from a table. (False)
24. Referential integrity ensures foreign key values must match primary key
values. (True)
25. The ALTER command modifies database schema. (True)
________________________________________
26-50: SQL and Queries
26. The SELECT statement is used to retrieve data from a database. (True)
27. The WHERE clause is used to filter records. (True)
28. SQL supports aggregate functions like COUNT, AVG, and SUM. (True)
29. The UPDATE command changes the structure of a table. (False)
30. The LIKE operator is used for pattern matching. (True)
31. A subquery is a query inside another query. (True)
32. SQL allows combining multiple tables using the JOIN operation. (True)
33. INNER JOIN returns all records from both tables. (False)
34. The UNION operator combines duplicate rows. (False)
35. The DISTINCT keyword removes duplicate rows from query results. (True)
36. An alias renames a table or column temporarily. (True)
37. The GROUP BY clause is used to group rows based on column values. (True)
38. HAVING and WHERE clauses perform the same function. (False)
39. The ORDER BY clause sorts query results. (True)
40. The IN operator allows checking if a value matches a list of values. (True)
41. A correlated subquery is executed once for the entire query. (False)
42. Transactions in SQL can be rolled back. (True)
43. SQL supports both implicit and explicit joins. (True)
44. The TRUNCATE command deletes specific rows from a table. (False)
45. The INSERT statement adds new records to a table. (True)
46. SQL supports multiple data types, including INT, VARCHAR, and DATE. (True)
47. NULL and zero mean the same thing in SQL. (False)
48. LEFT JOIN returns all records from the left table and matching records from
the right table. (True)
49. SQL functions can be used to perform calculations on data. (True)
50. SQL constraints enforce rules on data in a table. (True)
________________________________________
51-75: Database Design & Normalization
51. Normalization organizes data to reduce redundancy. (True)
52. First Normal Form (1NF) allows duplicate rows. (False)
53. Second Normal Form (2NF) requires a table to be in 1NF. (True)
54. Third Normal Form (3NF) eliminates transitive dependencies. (True)
55. Denormalization improves query performance. (True)
56. Functional dependency exists when one attribute determines another. (True)
57. Boyce-Codd Normal Form (BCNF) is stricter than 3NF. (True)
58. A composite key is made up of multiple attributes. (True)
59. Partial dependency violates 2NF. (True)
60. A candidate key is a potential primary key. (True)
61. Multivalued dependencies appear in 4NF. (True)
62. A surrogate key is a system-generated identifier. (True)
63. Anomalies can occur if a database is not normalized. (True)
64. The star schema is commonly used in data warehouses. (True)
65. Every relation must have a primary key. (True)
66. Data redundancy improves database efficiency. (False)
67. Functional dependencies are essential for normalization. (True)
68. A weak entity depends on a strong entity. (True)
69. 5NF deals with join dependencies. (True)
70. Redundant data can lead to inconsistencies. (True)
71. A relation is in 2NF if it is in 1NF and has no partial dependencies. (True)
72. Primary keys must always be numeric. (False)
73. ER diagrams represent entities and their relationships. (True)
74. Composite attributes are allowed in 1NF. (False)
75. Foreign keys ensure referential integrity. (True)
________________________________________
76-100: Advanced DBMS Concepts
76. A database trigger is an event-driven action. (True)
77. Distributed databases are stored in a single location. (False)
78. Data warehouses store historical data for analysis. (True)
79. OLTP systems focus on transaction processing. (True)
80. Deadlocks can occur in concurrent transactions. (True)
81. Sharding is a method of horizontal database partitioning. (True)
82. Log-based recovery uses transaction logs for restoration. (True)
83. A lock prevents simultaneous access to data. (True)
84. Indexing always slows down data retrieval. (False)
85. NoSQL databases are schema-free. (True)
86. A checkpoint is a snapshot of database activity. (True)
87. SQL injection is a database security threat. (True)
88. XML databases store structured data. (True)
89. Data replication ensures availability and redundancy. (True)
90. Temporal databases store time-based data. (True)
91. Isolation prevents transaction interference. (True)
92. Log-based recovery ensures data consistency. (True)
93. Cursors enable row-by-row data processing. (True)
94. Materialized views store query results physically. (True)
95. DBMS supports both hierarchical and relational models. (True)
96. Parallel databases process queries across multiple processors. (True)
97. Consistency in ACID ensures valid data states. (True)
98. SQL is only used for relational databases. (False)
99. Data mining extracts patterns from large datasets. (True)
100. In DBMS, schemas define database structure. (True)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy