Quiznetik

DataBase Management System (DBMS) | Set 9

1. is a sequence of zero or more characters enclosed by single quotes.

Correct : B. string literal

2. In                                the management of the password for the account can be handled outside of oracle such as operating system.

Correct : B. operating system authentication

3. In                                  of Oracle, the database administrator creates a user account in the database for each user who needs access.

Correct : A. database authentication

4. Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A. Which of the following form a transaction?

Correct : C. both 1 and 2 individually

5. A transaction is delimited by statements (or function calls) of the form

Correct : A. begin transaction and end transaction

6. Identify the characteristics of transactions

Correct : D. all of the mentioned

7. Which of the following has “all-or-none” property?

Correct : A. atomicity

8. The property of a transaction that persists all the crashes is

Correct : B. durability

9. states that only valid data will be written to the database.

Correct : A. consistency

10. Transaction processing is associated with everything below except

Correct : C. confirming an action or triggering a response

11. The Oracle RDBMS uses the           statement to declare a new transaction start and its properties.

Correct : B. set transaction

12. means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

Correct : D. isolation

13. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?

Correct : B. create schema

14. In SQL, the CREATE TABLESPACE is used

Correct : A. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace

15. Which character function can be used to return a specified portion of a character string?

Correct : C. substr

16. Which of the following is TRUE for the System Variable $date$?

Correct : B. can be assigned to any field only during design time

17. What are the different events in Triggers?

Correct : C. insert, update, delete

18. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?

Correct : A. data definition language

19. The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’),

Correct : B. 2345

20. Which of the following SQL command can be used to modify existing data in a database table?

Correct : B. update

21. provides option for entering SQL queries as execution time, rather than at the development stage.

Correct : D. dynamic sql

22. The storage structure which do not survive system crashes are

Correct : A. volatile storage

23. For a transaction to be durable, its changes need to be written to                  storage.

Correct : C. stable storage

24. The unit of storage that can store one are more records in a hash file organization are

Correct : A. buckets

25. A              file system is software that enables multiple computers to share file storage while maintaining consistent space allocation and file content.

Correct : D. cluster

26. A file produced by a spreadsheet

Correct : A. is generally stored on disk in an ascii text format

27. SDL means

Correct : B. storage definition language

28. The process of saving information onto secondary storage devices is referred to as

Correct : C. writing

29. If an transaction is performed in a database and committed, the changes are taken to the previous state of transaction by

Correct : D. cannot be done

30. Each modification done in database transaction are first recorded into the

Correct : B. log

31. When the transaction finishes the final statement the transaction enters into

Correct : C. partially committed state

32. The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready for execution shall be called

Correct : C. opt. exe

33. Which of the following is an atomic sequence of database actions?

Correct : A. transaction

34. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called

Correct : D. inconsistent state

35. means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

Correct : C. isolation

36. Which of the following is not a state in transaction?

Correct : B. terminated

37. joins are SQL server default

Correct : B. inner

38. The                                  is essentially used to search for patterns in target string.

Correct : A. like predicate

39. is a combination of two of more attributes used as a primary key

Correct : A. composite key

40. Which of the following is not the function of client?

Correct : B. query optimization

41. is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.

Correct : B. trigger

42. requires that data should be made available to only authorized users.

Correct : C. security

43. allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.

Correct : C. curser

44. Which s essential a business problem not a data problem:

Correct : C. database design

45. McFadden has defined normalization in his which book

Correct : C. modern database management

46. The database design prevents some data from being represented due to

Correct : B. insertion anomalies

47. How many types of insertion anomalies:

Correct : B. 2

48. Who developed the normalization process:

Correct : A. e.f. codd

49. E.F.Codd developed the normalization process in the which early:

Correct : B. 1970

50. Which is the process of breaking a relation into multiple relations:

Correct : D. decomposition

51. Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:

Correct : B. deadlock

52. Which is a duplicate copy of a file program that is stored on a different storage media than the original location:

Correct : C. backup

53. Which is the duplication of computer operations and routine backups to combat any unforeseen problems:

Correct : D. recovery

54. Optimization basically related to the Rewrite module is termed as

Correct : A. semantic query optimization

55. Database security helps organizations to protect data from

Correct : B. external users

56. Copying files to secondary or specific devices is known as

Correct : B. backup

57. Which are types of recovery control techniques:

Correct : C. all of the mentioned

58. Which server can join the indexes when only multiple indexes combined can cover the query:

Correct : A. sql

59. In concurrency control policy the lock is obtained on

Correct : A. entire database

60. A concurrency-control policy such as this one leads to              performance since it forces transactions to wait for preceding transactions to finish before they can start.

Correct : C. poor

61. are used to ensure that transactions access each data item in order of the transactions’          if their accesses conflict.

Correct : D. timestamps

62. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?

Correct : C. to create a grouping for expressions or columns specified within a group by clause in one direction, from right to left for calculating the subtotals

63. Which statement is true regarding external tables?

Correct : D. the create table as select statement can be used to unload data into regular table in the database from an external table

64. SNAPSHOT is used for (DBA)

Correct : D. dynamic data replication

65. Isolation of the transactions is ensured by

Correct : C. concurrency control

66. Which of the following statements is/are not true for SQL profiler?

Correct : C. check the performance of a stored procedure

67. Which of the following is the original purpose of SQL?

Correct : D. all of the mentioned

68. SQL can be used to:

Correct : D. all of the mentioned

69. A lock that allows concurrent transactions to access different rows of the same table is known as a

Correct : D. row-level lock

70. Which of the following are introduced to reduce the overheads caused by the log- based recovery?

Correct : A. checkpoints

71. Which of the following protocols ensures conflict serializability and safety from deadlocks?

Correct : B. time-stamp ordering protocol

72. Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other

Correct : A. concurrency

73. The          lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.

Correct : D. field-level

74. Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?

Correct : D. two phase lock

75. A system is in a              state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.

Correct : C. deadlock

76. The deadlock state can be changed back to stable state by using                             statement.

Correct : B. rollback

77. What are the ways of dealing with deadlock?

Correct : D. all of the mentioned

78. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This is

Correct : A. wait-die

79. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti). This is

Correct : C. wound-wait

80. The situation where the lock waits only for a specified amount of time for another lock to be released is

Correct : A. lock timeout

81. The deadlock in a set of a transaction can be determined by

Correct : A. read-only graph

82. A deadlock exists in the system if and only if the wait-for graph contains a

Correct : A. cycle

83. rollback requires the system to maintain additional information about the state of all the running transactions.

Correct : B. partial

84. If a node is locked in an intention mode, explicit locking is done at a lower level of the tree. This is called

Correct : A. intention lock modes

85. If a node is locked in                      explicit locking is being done at a lower level of the tree, but with only shared-mode locks.

Correct : A. intention lock modes

86. If a node is locked in                          then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks.

Correct : C. intention-exclusive (ix) mode

87. If a node is locked in                              the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with exclusive-mode locks.

Correct : B. shared and intention-exclusive (six) mode

88. The                      requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

Correct : A. validation protocol

89. denotes the largest timestamp of any transaction that executed write(Q) successfully.

Correct : A. w-timestamp(q)

90. The most recent version of standard SQL prescribed by the American National Standards Institute is

Correct : A. sql 2016

91. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is

Correct : B. is null

92. A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a

Correct : A. database-level lock

93. A condition that occurs when two transactions wait for each other to unlock data is known as a(n)

Correct : D. deadlock

94. The file organization which allows us to read records that would satisfy the join condition by using one block read is

Correct : C. clustering file organization

95. The extent of the database resource that is included with each lock is called the level of

Correct : B. granularity

96. DBMS periodically suspends all processing and synchronizes its files and journals through the use of

Correct : A. checkpoint facility

97. Snapshot isolation is used to give

Correct : D. transaction a snapshot of the database and database a snapshot of committed values in the transaction

98. Lost update problem is

Correct : A. second update overwrites the first

99. Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as

Correct : D. none of the mentioned

100. Which statements are correct regarding indexes?

Correct : D. all of the mentioned