Você está na página 1de 8

1)\ Defining a Column Alias in SQL Statement, Requiresquotation marks if it contains spaces or special characters or is case sensitive.

A) Single B) Double C) Both A & B D) None of them

2) Conflicting-versions of the same data is called ---------------A) Data redundancy B) Data Inconsistency 3) Who is the main user of Metadata? A) Programmer A) Entity Integrity B) Application Software B) Referential integrity C) DBMS C) all of them D) Operating system D) None of them 4) -------------rule says primary key should not have null value C) Data Integrity D) Data Dependency

5) ---------------is the discipline that focuses on the proper generation, storage and retrieval of data. A) Database B) Data management 6) Which of them may contain null values? A) Super Key A) Join B) Primary Key B) Combine B) Super Key B) 01-AUG-06 B) 146 B) 146 C) 100 C) 100 D) 200 C) Data Warehouse C) Candidate Key C) Relate D) All of them D) Foreign Key

7) The process of combining two tables in a relational database is known as a -------------D) Construct D) None of them D) 01-JUL-05 D) None of them 8) ----------------------- is a minimal super key. A) Secondary Key A) 01-JUL-06 A) 145 A) 145 C) Candidate Key C) 01-JAN-06 9) TRUNC (12-JUL-06, YEAR) --------- ? 10) ROUND (145.923, -2) --------- ? 11) TRUNC (145.923, -2) --------- ?

12) MOD (500, 1500) --------- ? A) 3 B) 0 C) 500 D) All of them

13) Who is responsible for authorizing access to the database, for coordinating and monitoring its use? A) Database Designers C) End Users B) Database Administrators, D) Application Programmers

14) A collection of concepts that can be used to describe the structure of a database is called a A) Database B) DBMS C) Data model D) Data

15) A Structure of database using the given data model is called a A) Database B) Relation C) Schema D) all of them

16) You can use arithmetic operators in any clause of a SQL statement except the .clause. A) SELECT B) FROM C) WHERE D) None of them

17) Which of the following statements best describes the function of an entity relation model? A) An ER model is concerned primarily with a logical view of the data and secondly with the physical implementation B) An ER model is concerned primarily with a physical implementation of the data and secondly with the logical view C) An ER model provides a global view of the data and not the physical implementation D) An ER model is entirely concerned with modeling the physical implementation 18) ROUND (12-JUL-06, MONTH) --------- ? A) 12-JUL-06 B) 12-JUL-05 C) 01-AUG-06 D) None of them

19) In SQL statements, the IN comparison operator can be used with .data type A) Number B) Character C) Date D) All of them

20) Desirable properties of relational database design include A) Minimizing insertion/deletion anomalies C) Minimizing update anomalies 21) TRUNC (2645.9123, -3) --------- ? A) 1000 B) 2000 C) 2600 D) 2500 B) Minimizing redundancy D) All of them

22) You are sorting data in a table in your select statement in descending order. The column you are sorting on contains NULL records. Where will the NULL records appear?

A) At the beginning of the list B) At the end of the list C) In the middle of the list D) The same location they are listed in the unordered tab 23) You are defining a SQL statement to return a limited number of rows based on specific criteria. Which of the following choices identifies the clause you will use to define the search criteria? A) SELECT B) FROM C) WHERE D) ORDER BY

24) SQL was developed as an integral part of A) A hierarchical database C) A relational database 25) A Foreign Key is A) A field in a table that matches a key field in another table B) A field in a table that contains data that is also contained elsewhere in another table C) A key that consists of more than one field D) A field in a table that has the same name as a key field in another table 26) Relational database was introduced in the A) 1980 B) 1970 C) 1990 D) 1960 B) A data warehouse D) All of them

27) MOD (1500, 500) --------- ? A) 3 B) 0 C) 500 D) All of them

28) In database,--------------is a basic unit of storage; composed of rows and columns. A) Table B) View C) Index D) Data dictionary

29) Normalization -------------------------.data anomalies. A) Eliminates B) Increases C) Reduces D) None of them

30) To join n tables together, you need a minimum of ..join conditions. A) (n) B) (n-1) C) (n-2) D) (n)! E) None of them

31) A ----------------------is a dependency of one non primary key attribute on another non primary key attribute. A) Functional dependency C) Transitive dependency B) Partial dependency D) Non primary key dependency.

32) A table is in third normal form (3NF) if:---------------------------------------------A) It contains no partial dependencies. B) It contains no transitive dependencies. C) It is in second normal form (2NF) and it contains no partial dependencies. D) It is in second normal form (2NF) and it contains no transitive dependencies 33) Normalization represents a -------------------of the entities within the E-R diagram. A) Micro view B) Macro viewC) Simple view D) Complex view

34) A composite PRIMARY KEY constraint can be defined at -------------------------A) Column Level B) Table Level C) Database Level D) Both A &B

35) All constraints are stored in-------------------------------A) Database B) Transaction Log C) Data Dictionary D) None of them

36) Constraint can be create,------------------------------------A) At the same time as the table is created B) At the same time as the database is created C) After the table has been created D) Both A & C

E) Both A & B

37) NOT NULL constraint can be defined at --------------------------------A) Column Level B) Table Level C) Database Level D) Both A &B

38) Only one------------------------Key can be created for an each table A) PRIMARY B) FOREIGN C) UNIQUE D) None of them

39) You can --------constraint by using the MODIFY clause in ALTER TABLE statement. A) Modify B) Add NOT NULL C) Both A & B D) None of them

40) The first normal form (1NF) describes the tabular format in which:---------------------A) All the key attributes are defined. B) There are no repeating groups in the table. C) All attributes are dependent on the primary key. D) All of the above 41) Advantage of Locking Algorithm in concurrent execution of DB Transactions is-----A) Deadlock B) Concurrency C) Consistency D) None of the above

42) -----------------------is a process for assigning attributes to entities. A) Normalization B) Fragmentation C) Denormalization E) None of them

43) Normalization ------------------------data redundancies. A) Eliminates B) Increases C) Reduces D) None of them

44) Normalization is ------------------------------------------------------------------------A) A process whereby the design of a table (relation) is decomposed into more tables that more precisely fit the relational model B) The process of ensuring that a relational database has at least two tables in it. C) A process whereby a limit is put on the number of fields a record can contain D) The process of ensuring that each table has a key 45) Dependency based on only a part of a composite primary key is called-----------------A) Functional dependency C) Transitive dependency B) Partial dependency D) Primary key dependency

46) A table is in second normal form (2NF) if:--------------------------------------A) It includes no partial dependencies. B) It includes no transitive dependencies. C) It is in first normal form (1NF) and it includes no partial dependencies. D) It is in first normal form (1NF) and it includes no transitive dependencies 47) ----------------------is a logically represents subsets of data from one or more tables. A) Sequence B) View C) Index D) Data Dictionary

48) BCNF stands for---------------------------------------------------------------------A) Biased-Code Normal Form C) Boyce-Codd Normal Form B) Base-Coded Normal Form D) Base-Conversion Normal Forum

49) The E-R diagram provides ---------------------------------- of an organizations data requirements and operations. A) Micro view B) Macro view C) Simple view D) Complex view

50) SQL is a ----------------------------------language. A) Procedural B) Non procedural C) Object oriented D) Relational.

51) In SQL statements, the user specifies------must be done, but not--------it is to be done. A) Why, What B) What, How C) Why, How D) How, What

DDBS
1) . Parallelism results from the ability to execute multiple queries at same time. A) Inter-Query B) Intra-Query C) All of them D) None of them

2) .Parallelism is achieved by breaking up a single query into a number of sub queries each of which is executed at a different site, accessing a different part of the distributed databases. A) Inter-Query B) Intra-Query C) All of them D) None of them

3) ---------------------is the software system that permits the management of the distributed databases and make the distribution transparent to the users. A) Distributed Database B) DBMS C) Distributed DBMS D) All of them

4) In------------- nesting transaction, commitment of sub transaction is conditional upon the commitment of the parent transaction. A) Open B) Closed C) Workflow D) None of them

5) The most important objective of the database technology is----------, not --------------. A) Integration, Centralization C) All of them B) Centralization, Integration D) None of them

6) The ----------------regulates the execution of operations for two or more conflicting transactions. A) Transaction Manager Manager B) Scheduler C) DBMS D) Lock

7) The------------------------establishes the order in which the operations within concurrent transactions are executed. A) Transaction Manager B) Scheduler C) DBMS D) Lock Manager

8) Reasons to use views are:-------------------------------------A) B) To restrict database access and to make complex queries easy To allow data independence and to present different views of the same data C) Both A & B D) None of them

9) Transaction properties are------------------------------------A) B) C) D) Acidity, concurrency, independence, dependability Atomicity, consistency, isolation, durability Acidity, concurrency, isolation, durability Atomicity, consistency, independence, dependability

10) ..is a system (set of programs) that is used to store, retrieve and manipulate data in a database. A) Transaction Manager C) DBMS B) Query Processor D) All of them

11) In multi user DBMS, Concurrent execution of transactions is controlled by A) Transaction Manager C) Scheduler B) Query Processor D) None of them

12) In Serial Schedule of transactions, Concurrency level is---------------------------A) 10 % B) 25 % C) 0 % D) 100 %

13) Disadvantage of Locking Algorithm in concurrent execution of DB Transactions is A) Deadlock them B) Concurrency C) Consistency D) None of

14) .is a virtual relation, defined as the result of a query on base relation, but not materialized like a base relation which is stored in the database. A) Fragment B) Table C) Snapshot D) None of them 15) a conceptual framework whose purpose is to divide standardization work into manageable pieces and to show at a general level how these pieces are related with each other is called a. a. b. c. d. internal schema External Schema Conceptual Schema Reference Model

16) The condition that requires all the values of multiple copies of every data item to converge to the same value is called.. e. f. g. h. Reliability Mutual Consistency Availability All of the above

17) The information needed for distribution design can be divided into four catagories (1)Inforamtion , (2) Inforamtion , (3) Inforamtion , (4) Inforamtion. Database, Application , Network , Computer System a. Application , Network , fragment, security b. All of the above c. None of the above 19) Number of tuples of the relation that would be accessed by a user query specified according to a given minterm predicate is called a i. j. k. l. Simple predicate Minterm predicate Minterm selectivity Access frequency

20 . If the total number of simple predicates in pr is 4, there arepossible minterm predicates that can be defined on it. a. b. c. d. 4 8 16 32

Data Security includes two aspects:.and.. m. n. o. p. Data Protection , Authorization Control Data Protection , Data Detection All of the above None of the above

Você também pode gostar