Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
100

Desktop databases are oriented toward single-user application. The following are the examples of it, except : (CLO 1)

A. Microsoft Access

B. FoxPro

C. Lotus

D. DocMaker Pro


D. DocMaker Pro

100

Identify the relation key that uniquely defines each row in a table.

A. Foreign Key

B. Candidate Key

C. Primary Key

D. Composite Key

C. Primary Key

100

identify the correct term for a number of entities to which another entity can be associated via a relationship set. 

A. Schema

B. Attributes

C. Cardinality

D. Entity


C. Cardinality

100

Identify the subset of SQL commands that were used to manipulate Oracle Database structures, including tables.

A. Data Definition Language (DDL)

B. Data Manipulation Language (DML)

C. Database Management System (DBMS)

D. Structured Query Language (SQL)


A. Data Definition Language (DDL)

100

Two modes of locking a data item, are termed as 'shared' and ___________

A. Composite

B. Compatible

C. Exclusive

D. Linear

C. Exclusive

200
The DBMS is the software that interacts with the ____________ and the database.

A. user's application programs

B. user's system programs

C. user's system database

D. none of the above

A. user's application programs

200

Choose the correct symbol of PROJECT in the Relational Algebra.

A. ^

B. X

C. ∏

D. σ

C. ∏

200

The entity relationship set is represented in E-R diagram as ______________

A. Double diamonds

B. Undivided rectangles

C. Dashed lines

D. Diamond

D. Diamond

200

Which operator performs pattern matching?

A. BETWEEN

B. LIKE

C. EXISTS

D. None of the above

B. LIKE
200

Two-phase locking does not ensure freedom from ____________.

A. Obtain Locks

B. Release Locks

C. New Locks

D. Deadlocks

D. Deadlocks

300

The database environment has all of the following components except:

A. Users

B. Separate files

C. Database

D. Database administrator

B. Separate files

300

Relational Algebra is a __________ query language that takes two relation as input and produces another relation as output of the query.

A Relational

B Structural

C Procedural

D Fundamental

C Procedural

300

Consider a directed line(->) from the relationship set advisor to both entity sets instructor and student. This indicates _________ cardinality

A One to many

B One to one

C Many to many

D Many to one

B One to one

300

In SQL, which command(s) is(are) used to change a table's storage characteristics?

A. ALTER TABLE

B. MODIFY TABLE

C. CHANGE TABLE

D. ALL OF THE ABOVE

A. ALTER TABLE

300

Ensuring atomicity and durability properties is a. responsibility of the ___________

A. Recovery manager

B. Buffer manager

C. Transaction manager

D. File manager

A. Recovery manager

400

An advantage of the database management approach is ________________

A. Data is dependent on programs 

B. Data redundancy increases. 

C. Data is integrated and can be accessed by multiple programs. 

D. None of the above

C. Data is integrated and can be accessed by multiple programs. 

400

When primary key is null of new tuple then constraint violated is _______________________

A. null integrity constraint

B. primary integrity constraint

C. secondary integrity constraint

D. entity integrity constraint

D. entity integrity constraint

400

An entity set that does not have sufficient attributes to form a primary key is termed a __________

A. Strong entity set

B. Variant set

C. Weak entity set

D. Variable set

C. Weak entity set

400

In SQL, which command is used to SELECT only one copy of each set of duplicable rows?

A. SELECT DISTINCT

B. SELECT UNIQUE

C. SELECT DIFFERENT

D. All of the above

A. SELECT DISTINCT

400

………. helps solve concurrency problem.

A. locking

B. transaction monitor

C. transaction serializability

D. two phase commit

A. locking

500

The property / properties of a database is / are :

A. It is an integrated collection of logically related records. 

B. It consolidates separate files into a common pool of data records. 

C. Data stored in a database is independent of the application programs using it 

D. All of the above

D. All of the above

500

When foreign key refers to a tuple which does not exists in subjected relation then constraint violated is __________________

A. modify integrity

B. referential integrity

C. entity integrity

D. insert integrity

B. referential integrity

500
Which one is NOT TRUE?


A. A relation is in BCNF if it is in 4NF

B. BCNF is stricter than 3NF

C. A relation is in BCNF if ever determinate of the relation is a candidate key

D. All of the above

D. All of the above

500

Table Employee has 10 records. It has a non-NULL SALARY column which is also UNIQUE.

The SQL statement

SELECT COUNT(*) FROM Employee WHERE SALARY > ANY (SELECT SALARY FROM EMPLOYEE);

prints

A. 10 

B. 9 

C. 5 

D. 0

B. 9 

500

The situation in which a transaction holds a data item and waits for the release of data item held by some other transaction, which in turn waits for another transaction, is called …….

A. serialiable schedule

B. process waiting

C. concurrency

D. deadlock

D. deadlock

M
e
n
u