Quiznetik

DataBase Management System (DBMS) | Set 10

1. A non-correlated subquery can be defined as

Correct : D. a set of one or more sequential queries in which generally the result of the inner query is used as the search value in the outer query

2. Which statement is true regarding synonyms?

Correct : C. a public synonym and a private synonym can exist with the same name for the same table

3. The method of access that uses key transformation is called as

Correct : B. hash

4. Why do we need concurrency control on B+ trees ?

Correct : C. to maintain accuracy of index

5. How many techniques are available to control concurrency on B+ trees?

Correct : D. none of the mentioned

6. In crabbing protocol locking

Correct : A. goes down the tree and back up

7. The deadlock can be handled by

Correct : B. restarting the search after releasing the lock

8. In crabbing protocol, the lock obtained on the root node is in                    mode.

Correct : A. shared

9. If needed to split a node or coalesce it with its siblings, or redistribute key values between siblings, the crabbing protocol locks the parent of the node in                           mode.

Correct : B. exclusive

10. Instead of locking index leaf nodes in a two-phase manner, some index concurrency- control schemes use                        on individual key values, allowing other key values to be inserted or deleted from the same leaf.

Correct : C. key-value locking

11. The recovery scheme must also provide

Correct : A. high availability

12. Which one of the following is a failure to a system

Correct : C. transaction failure

13. The system has entered an undesirable state (for example, deadlock), as a result of which a transaction cannot continue with its normal execution. This is

Correct : C. logical error

14. The transaction can no longer continue with its normal execution because of some internal condition, such as bad input, data not found, overflow, or resource limit exceeded. This is

Correct : C. logical error

15. The assumption that hardware errors and bugs in the software bring the system to a halt, but do not corrupt the nonvolatile storage contents, is known as the

Correct : D. fail-stop assumption

16. The database is partitioned into fixed- length storage units called

Correct : B. blocks

17. The log is a sequence of                     recording all the update activities in the database.

Correct : A. log records

18. In the                        scheme, a transaction that wants to update the database first creates a complete copy of the database.

Correct : A. shadow copy

19. The                          scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.

Correct : B. shadow paging

20. If a transaction does not modify the database until it has committed, it is said to use the                        technique.

Correct : A. deferred-modification

21. using a log record sets the data item specified in the log record to the old value.

Correct : D. undo

22. In the                      phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.

Correct : B. redo

23. The actions which are played in the order while recording it is called                               history.

Correct : A. repeating

24. A special redo-only log record < Ti, Xj, V1> is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called

Correct : C. compensation log records

25. In order to reduce the overhead in retrieving the records from the storage space we use

Correct : B. log buffer

26. Writing the buffered log to                      is sometimes referred to as a log force.

Correct : D. disk

27. The                                policy, allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk.

Correct : B. no-force

28. policy allows multiple updates to accumulate on a block before it is output to stable storage, which can reduce the number of output operations greatly for frequently updated blocks.

Correct : B. no-force

29. The                        policy, allows the system to write modified blocks to disk even if the transactions that made those modifications have not all committed.

Correct : C. steal

30. The                                      contains a list of blocks that have been updated in the database buffer.

Correct : C. dirty block

31. The silicon chips used for data processing are called

Correct : D. prom chips

32. Which of the following is used for manufacturing chips?

Correct : D. semiconductor

33. What was the name of the first commercially available microprocessor chip?

Correct : C. intel 4004

34. The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as

Correct : D. magnetic bubble memory

35. The ALU of a computer normally contains a number of high speed storage element called

Correct : B. registers

36. A dump of the database contents is also referred to as an                            dump.

Correct : A. archival

37. dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re- create the database.

Correct : C. sql

38. dump schemes have been developed that allow transactions to be active while the dump is in progress.

Correct : B. fuzzy

39. ARIES uses a                        to identify log records, and stores it in database pages.

Correct : B. log number

40. ARIES supports                        operations, which are physical in that the affected page is physically identified, but can be logical within the page.

Correct : A. physiological redo

41. is used to minimize unnecessary redos during recovery.

Correct : A. dirty page table

42. scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.

Correct : C. fuzzy-checkpoint

43. Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the                field of the page.

Correct : C. pagelsn

44. The                                      contains a list of pages that have been updated in the database buffer.

Correct : A. dirty page table

45. determines which transactions to undo, which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.

Correct : A. analysis pass

46. starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.

Correct : B. redo pass

47. rolls back all transactions that were incomplete at the time of crash.

Correct : C. undo pass

48. Which lock should be obtained to prevent a concurrent transaction from executing a conflicting read, insert or delete operation on the same key value.

Correct : A. higher-level lock

49. Once the lower-level lock is released, the operation cannot be undone by using the old values of updated data items, and must instead be undone by executing a compensating operation; such an operation is called

Correct : A. logical operation

50. Which of the following is used for undo operations alone?

Correct : A. logical logging

51. Redo operations are performed exclusively using

Correct : D. both physical logging and physical log records

52. An operation is said to be                      if executing it several times in a row gives the same result as executing it once.

Correct : A. idempotent

53. Immediate database modification technique uses

Correct : A. both undo and redo

54. Shadow paging has

Correct : A. no redo

55. For correct behaviour during recovery, undo and redo operation must be

Correct : C. idempotent

56. If                        are not obtained in undo operation it will cause problem in undo- phase.

Correct : B. lower-level lock

57. The remote backup site is sometimes also called the

Correct : B. secondary site

58. The backup is taken by

Correct : C. sending all log records from primary site to the remote backup site

59. When the                      the backup site takes over processing and becomes the primary.

Correct : C. primary fails

60. The simplest way of transferring control is for the old primary to receive                       from the old backup site.

Correct : C. primary logs

61. The time to process the remote backup can be reduced by

Correct : D. checkpoints

62. A                                configuration can make takeover by the backup site almost instantaneous.

Correct : D. spare

63. A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is

Correct : A. one safe

64. A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is

Correct : C. two-very safe

65. If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is

Correct : B. two safe

66. A Database Management System (DBMS) is

Correct : D. All of the above

67. Which of the following is not a Schema?

Correct : C. Critical Schema

68. The number of entities associated in relationship is called as it’s.....................

Correct : B. Degree

69. The DBMS utility...................... allows reconstructing the correct state of database from the backup and history of transactions.

Correct : B. Recovery

70. In the........... Normal form, a composite attribute is converted to individual attributes.

Correct : A. First

71. In RDBMS, Data is presented as a collection of............

Correct : C. Relations

72. A .................. normal form, normalization will be needed where all attributes in a relation tuple are not functionally dependent only on the key attribute.

Correct : C. Third

73. To select all columns from the table the syntax is:

Correct : B. Select * from table_name

74. If an attribute of a composite key is dependent on an attribute of the other composite key, normalization called ................ is needed.

Correct : B. BCNF

75. Identify the criteria for designing database from the point of view of user

Correct : D. All of the above

76. The ............ operator preserves unmatched rows of the relations being joined.

Correct : B. Outer join

77. Which are the not user in End-user:

Correct : D. All of these

78. DBMS is a collection of ………….. that enables user to create and maintain a database.

Correct : C. Programs

79. In a relational schema, each tuple is divided into fields called

Correct : B. Domains

80. In an ER model, ……………. is described in the database by storing its data.

Correct : A. Entity

81. DFD stands for

Correct : C. Data Flow Diagram

82. A top-to-bottom relationship among the items in a database is established by a

Correct : A. Hierarchical schema

83. ……………… table store information about database or about the system.

Correct : C. System

84. …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

Correct : B. Schema

85. ……………… clause is an additional filter that is applied to the result.

Correct : C. Having

86. A logical schema

Correct : B. is a standard way of organizing information into accessible parts.

87. ………………… is a full form of SQL.

Correct : C. Structured query language

88. The candidate key is that you choose to identify each row uniquely is called ……………..

Correct : B. Primary Key

89. …………….. is used to determine whether of a table contains duplicate rows.

Correct : A. Unique predicate

90. To eliminate duplicate rows ……………… is used

Correct : C. DISTINCT

91. State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key.

Correct : C. i-true, ii-true

92. DCL stands for

Correct : A. Data Control Language

93. …………………… is the process of organizing data into related tables.

Correct : A. Normalization

94. A ………………. does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.

Correct : A. Weak entity

95. …………….. is the complex search criteria in the where clause.

Correct : D. Predicate

96. ………………… is preferred method for enforcing data integrity

Correct : A. Constraints

97. The number of tuples in a relation is called it’s …………. While the number of attributes in a relation is called it’s ………………..

Correct : B. Cardinality, Degree

98. State true or false. i) Select operator is not a unary operator. ii) Project operator chooses subset of attributes or columns of a relation.

Correct : C. i-False, ii-True

99. …………… database is used as template for all databases created.

Correct : B. Model

100. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as

Correct : D. Domain Integrity