bscit-1 DBMS and SQL SERVER
DBMS and SQL SERVER
PART A
Q1. SQL commands can be divided into following categories:
a. Data Definition Language (DDL)
b. Data Manipulation Language (DML)
c. Transaction Control language (TCL)
d. All of the above
Q2. Command is used to remove the table from the database.
a. Delete Table
b. Remove Table
c. Drop table
d. None of the above
Q3. Function that are the DDL statements which are used to compute some simple function of the set of values in a particular column of a table.
a. Arithmetic function
b. Value function
c. Aggregate function
d. None of the above
Q4. _________ is a complex search criteria in the where clause.
a. Count
b. Predicate
c. GroupBy
d. None of the above
Q5 SQL provides three very useful operators that are generally used with subqueries.
a. ANY
b. ALL
c. EXISTS
d. All of the above
Q6.The operator that returns rows that are unique to the first query result and which are not in the subsequent query is:
a. UNION
b. INTERSECT
c. MINUS
d. None of the above
Q7. _________ are virtual tables which is essentially a logical window on real tables.
a. Stored Procedures
b. Indexes
c. Views
d. Both a and c
Q8. Files that keep track of location of each row or group of rows in the table.
a. Indexes
b. Synonyms
c. Partitions
d. None of the above.
Q9.________ model is based on the concept that data is organized and stored in two-dimensional tables called relations.
a. Hierarchical
b. Relational
c. Network
d. None of the above
Q10. Choose the data access control from below
a. COMMIT
b. Rollback
c. Both a and b
d. None of the above
Q11.The rows of a relation are called ___ and Number of column in a relation is called________
a Tuple,degree
b. Attribute,degree
c. Tuple,Cardinality
d. Attribute,Cardinality
Q12. Choose the Axioms for functional dependencies:
i. Reflexivity
ii. Pseudotransitivity
iii. Decomposition
iv. Augmentation
v. Transitivity
vi. Union
a. i,iv and v
b. ii,iii,iv and vi
c. i,ii and vi
d. All of the above
Q13. ‘Select INSTR (‘MANIPAL UNIVERSITY’,’I”,1,3) from DUAL’ returns
a. 4
b. 9
c. 16
d. 15
PART B
Q1. SQL Server 2005 version(s) is/are:
a. Enterprise Edition
b. Standard Edition
c. Developer Edition
d. Workgroup Edition
e. Express Edition
f. Mobile Edition
g. All of the above
Q2. State True/False:
i . All The primary databases has the extension of *.mdf by default.
ii. Transaction log is used for recording your transaction.
iii.SQL Client cannot be run Windows 2000 Server.
iv. The Model database is used as the template for all databases created on a system.
a. i-T,ii-T,iii-F,iv-T
b. i-F,ii-F,iii-T,iv-T
c. i-T,ii-F,iii-F,iv-T
d. i-F,ii-T,iii-F,iv-T
Q3. _____ symbol is SQL indicates that all attributes of the relation are to be retrieved
a. *
b. @
c. σ
d. π
Q4. The size of transaction log file of a primary file of database is:
a. 2 KB
b. 1 MB
c. 100 KB
d. None of the above
Q5. Which are not SQL Server Data types from the following:
a Tinyint,Smallint
b. VarBinary,Varchar
c. Float,Unsigned int
d. None of the above
Q6.______ is used to defined a local variable and assigned an initial value with a _______ statement.
a, Dim,SET
b. DECLARE,SET
c. Public,Private
d. None of the above
Q7.Microsoft SQL Server uses following operator categories:
i. Unary Operator
ii. String Operator
iii. Address Operator
iv. Logical Operator
v. Comparison Operator
vi. Assignment Operator
a. ii,iv,v and vi
b. i,iii,v and vi
c. i,ii,iv,v and vi
d. All of the above
Q8. We cannot apply _______
function to char datatypes.
a. avg()
b. substring()
c. Rank()
d. None of the above
Q9. Transact-SQL contain language elements that control the flow of logic within scripts.
a. BEGIN..END block
b. WHILE…constructs
c. IF…ELSE block
d. DO…WHILE Loop Block
Q10. ___________statement run statements compared of character strings within Transact-SQL batch of character strings within Transact-SQL batch.
a. EXECUTE
b. BEGIN
c. START
d. None of the above
Q11. Transactions are prefaced with BEGIN Transaction statement and terminated with a _________ TRANSACTION or __________ TRANSACTION.
a. START,END
b. BEGIN,END
c. COMMIT,ROLLBACK
d. None of the above
Q12. The _________________ joins two tables with a common column in which each is usually the primary key.
a. MERGE
b. NATURAL JOIN
c. EQUI JOIN
d. None of the above
Q13.The __________ symbol is used to denote an OUTER JOIN in a query.
a. &
b. /
c. +
d. None of the above
Q14. Select A.LAST_NAME, B.LAST_NAME, A.FIRST_NAME from EMPLOYEE_TBL A ,EMPLOYEE_TBL B where A.LAST_NAME = B.LAST_NAME;
The preceeding SQL Statement returns :
a. Employee’s first name and last name for all the employees with the same last name from the EMPLOYEE_TBL.
b. Employee’s last name for all the employees with the same first name from the EMPLOYEE_TBL.
c. Employee’s last name for all the employees from EMPLOYEE_TBL.
d. None of the above.
Q15.SQL table describes the constraints types:-
i DEFAULT
ii. CHECK
iii.UNIQUE
iv. FOREIGN KEY
a i,iii and iv
b. i,ii and iv
c. ii, iii and iv
d. All of the above
Q16. User can disable constraints only on:-
i FOREIGN
ii UNIQUE
iii. CHECK
iv. PRIMARY
a. i and iii
b. ii and iv
c. i and iv
d. None of the above
Q17 __________reflect the Physical ordering of rows in a table.
a. Partioning
b. Views
c. Clustered Indexes
d. None of the above
Q18 Data integrity falls into categories:
a Entity Integrity
b.Domain Integrity
c. Referential Integrity
d. All of the above
Q. 19 What is the RDBMS terminology for a row?
a. Tuple
b. Relation
c. Attribute
d. Domain
Q. 20 Which of the following is a valid Database user?
a. DBA
b. Network Administrator
c. Application developer and Administrator
d. All of the above
Q. 21 Which of the following is column constraint?
a. NOT NULL
b. Primary key or UNIQUE
c. CHECK constraint
d. All of the above
Q.22 All candidate keys other than primary keys are called _____
a. Secondary Key
b. Primary Key
c. Eligible Keys
d. None of the above
Q. 23The _____ predicate is used to determine whether the result of a table contains duplicate rows
a. Distinct
b. Unique
c. NULL
d. None of the above
Q.24 The _____ module of transaction model is responsible for
a. Buffer manager
b. Recovery manager
c. Transaction manager
d. None of the above
Q. 25 The number of tuples in a relation is called its _____ while the number of attributes in a relation is called its _____ a. Cardinality, degree
b. Rows, columns
c. Super key, primary key
d. None of the above
Q. 26 In a relational database a referential integrity constraint can be specified with the help of _____
a. Primary Key
b. Foreign Key
c. Secondary Key
d. None of the above
Q. 27 Collection of information stored in a database at a particular moment is _____
a. View
b. Schema
c. Instance
d. None of the above
Q. 28 E-R Model uses this symbol to represent weak entity set.
a. Dotted Rectangle
b. Diamond
c. Doubly outlined Rectangle
d. None of the above
Q. 29 This is an authorization command for SQL
a. Access
b. Grant
c. Allow
d. None of the above
Q. 30 Key to represent relationship between tables is called
a. Primary Key
b. Secondary Key
c. Foreign Key
d. None of the above
Q. 31 The data model which describes how the data is actually stored is
a. Internal Model
b. External Model
c. Logical Model
d. None of the above
Q. 32 If entity X is existence – dependent on entity Y then X is said to be
a. Subordinate entity
b. Dominate entity
c. Primary entity
d. Secondary entity
Q. 33 The principal means of identifying entities within an entity set, in a relational database is
a. Tuple
b. Pointer
c. Primary Key
d. Record
Q. 34 Model based on user’s requirement is
a. Logical Model
b. Conceptual Model
c. Physical Model
d. None of the above
Q. 35 A field in a column of a table is called
a. Database
b. Attribute
c. Tuple
d. Data
Q. 36 Data are
a. Row facts and figures
b. Electronic representation of figures
c. Information
d. None of the above
Q. 37 Which one of these is not aggregate function in SQL
a. AVG
b. SUM
c. SELECT
d. None of the above
PART C
Q. 1_____ is a Cartesian product followed by selection
a. Join
b. Cartesian product
c. Divide
d. Difference
Q. 2 _____ operator is useful when the query involves the word all.
a. Join
b. Divide
c. Union
d. None of the above
Q. 3 ‘ALTER Table’ command is a
a. DDL statement
b. DML statement
c. DCL statement
d. None of the above
Q. 4_____ are virtual tables which is essentially a logical window on real table
a. Relations
b. Views
c. Predicates
d. None of above
Q.5 According to argumentation property, If X → Y is true, then _____ is also true
a. y is subset of x
b. x is subset of y
c. xz → yz
d. None of the above
Q. 6 According to pseudo transitivity property, If X→Y and WY → Z are given then ______ is true
a. XW → Z
b. X → WZ
c. XZ → WY
d. None of the above
Q. 7 Normalization reduces____
a. Errors
b. Records
c. Redundancy
d. None of the above
Q. 8 Rotational delay is required to locate
a. a cylinder
b. a drive
c. a directory
d. a block
Q. 9 A ____ permits random access on some field in the record
a. Indexed files
b. Sequential files
c. Hashed files
d. None of the above
Q. 10 The process of finding a good query plan is called ____
a. Query evaluation
b. Query processing
c. Query execution
d. Query optimization
PART D
Q. 1 Match the following
i. Scheduler a. Uses page replacement policy
ii. Buffer Manger
b. Implement start, commit
iii. Recovery Manager c. Uses locking
iv. Transaction Manger d. Forward transaction to scheduler
Q. 2 In ______ all records colliding at position l are linked by pointers and ___ finds an alternate place with respect to
hashed value I by using an appropriate increment.
a. Division Method
b. Chaining Method
c. Multiplicative Method
d. Open Addressing Method
Q. 3 Match the following
Q. 4 BCNF is needed when
a. If one composite key is dependent an other composite key
b. If one attribute of composite key is dependent on an attribute of other composite key
c. If one attribute is dependent on composite key
d. None of the above
Q. 5 Match the following
Q. 6 Match the following
i. Domain Integrity a. Primary Key
ii. Referential Integrity b. Foreign Key
iii. Entity Integrity c. Domains
A. i-b,2-c,3-a
B. i-c,2-b,3-a
C. i-a,2-b,3-c
D. none
Q7. A group of similar information or data, which is inherent to an organization is called an __________.
a. Records
b. Entity
c. Database
d. None of the above
Q8. The operation of a relation X, produces Y,such that Y contains only selected attributes of X. Such an operation is:
a. Projection
b. Union
c. Intersection
d. Difference
Q9.The primary key index does not allow ____________ data in a field.
a. select
b. Attribute
c. Duplicate
d. None of the above
Q10. This is an authorization command of SQL.
a. Access
b. Allow
c. Grant
d. None of the above
Q11. What is true about a View?
a. It is definition of a restricted portion
of the database.
b. It can always be updated like any other table.
c. It is the means for implementing integrity constraints.
d. None of the above
Q12. The smallest piece of meaningful information in a file is called ________.
a. Row
b. Key
c. Field
d. All of the above
Q13. The maximum number of nonclustered indexed that can be created per table is.
a. 300
b. 100
c. 249
d. None of the above
Q14. Use __________ statement to remove an index on a table if the index is no longer useful.
a. Drop Index
b. Remove Index
c. Delete Index
d. None of the above
Q15. _________ is a block of code that constitutes a set of T-SQL statements that are activated in response to certain actions.
a. Views
b. Triggers
c. Tables
d. None of the above
Q16. The contents of a trigger can be modified by:
a. Dropping the trigger and recreating it.
b. Using the ALTER TRIGGER statement.
c. Using the UPDATE TRIGGER
Sstatement.
d. Only a and b
Q17.__________ is a database object that helps in accessing and manipulating data in given result set.
a. Stored procedure
b. Cursors
c. Views
d. None of the above
Q18. True or False
1. Foreign Key value should not be left Blank.
2. To eliminate duplicate tuples from the result of SQL query, the keyword UNIQUE is used.
3. JOIN creates a new database file by joining two or more database files.
4. If two sets of functional dependencies F and G are equivalent, then either F is a subset of G or G is subset of F.
5. An equijoin can be expressed using natural join and renaming operatiors.
a. 1-T, 2-T, 3-F, 4-F,5-T
b. 1-T, 2-F, 3-T, 4-F, 5-F
c. 1-T, 2-T, 3-T, 4-T, 5-F
d. 1-F, 2-F, 3-T,4-T, 5-T
Q19. In SQL-SERVER there is(are) Transact-SQL control-of –flow Keyword(s):
a. IF… ELSE
b. CONTINUE
c. BREAK
d. All of then above
Q20. Universal quantifier of relational calculus can be implements in SQL using the keyword.
a. NOT EXISTS
b. FOR ALL
c. EXISTS
d. None of the above
Q21. GRANT is a command from SQL type.
a. DDL
b. DCL
c. DML
d. None of the above
Q22. Which of the following is an aggregate function in SQL?
a. Union
b. Group By
c. Like
d. Max
Q23. Data about Data is normally termed as _____________.
a. Tuple
b. Cardinality
c. Meta Data
d. None of the above
Q24.If relation is in ___________, it is in 3rd Normal Form also.
a. 4th Normal Form
b. BCNF
c. Both a and b
d. None of the above
Q24. E-R model is used to describe _________ model.
a. Relational
b. Cardinality
c. Degree
d. None of the above
Q25. ____________ contains the structure of the database.
a. Data Model
b. Table
c. Data dictionary
d. None of the above
Q26.Complex entities can be constructed using the __________ operation.
a. Specialization
b. Aggregation
c. Generalization
d. None of the above
Q27.__________ represents relationship between the tables.
a. Foreign Key
b. Primary Key
c. Both a and b
d. None of the above
Q28. The level of data abstraction which describes how the data is actually stored is.
a. physical level
b. Storage level
c. Conceptual Level
d. View level
Q30. An association of several entities in an Entity-Relationship model is called
a. Tuple
b. Record
c. Relationship
d. Field
Q31. ________ is the process of grouping the data item elements in the tuple representing entities and their relationships.
a. E-R Modelling
b. Normalization
c. Indexing
d. None of the above
Q32.When all non-key attributes are dependent on the key attribute, it is called ____________ dependency.
a. Full
b. Partial
c. Join
d. None of the above
Q33. The number of entities to which another entity can be associated via a relationship set is expressed as
a. entity
b. Scheme
c. Cardinality
d. None of the above
Q34.The following entities/attributes in a relational database should not have null values.
a. Keys
b. variables
c. relations
d. All of the above
Q35. RDBMS supports the concepts of Null values.
a. TRUE
b. FALSE
Q36. All possible values of data items is called tuples.
a. TRUE
b. FALSE
Q37. The number of rows associated with the relations are called as the degree.
a.TRUE
b. FALSE
Q38. File is the collection of all related
a. Database
b. Records
c. Fields
d. File
Q39. The set of all possible values of a data items is called
a. Domain
b. Tuples
c. Attributes
d. None of the above
PART A
Q1. SQL commands can be divided into following categories:
a. Data Definition Language (DDL)
b. Data Manipulation Language (DML)
c. Transaction Control language (TCL)
d. All of the above
Q2. Command is used to remove the table from the database.
a. Delete Table
b. Remove Table
c. Drop table
d. None of the above
Q3. Function that are the DDL statements which are used to compute some simple function of the set of values in a particular column of a table.
a. Arithmetic function
b. Value function
c. Aggregate function
d. None of the above
Q4. _________ is a complex search criteria in the where clause.
a. Count
b. Predicate
c. GroupBy
d. None of the above
Q5 SQL provides three very useful operators that are generally used with subqueries.
a. ANY
b. ALL
c. EXISTS
d. All of the above
Q6.The operator that returns rows that are unique to the first query result and which are not in the subsequent query is:
a. UNION
b. INTERSECT
c. MINUS
d. None of the above
Q7. _________ are virtual tables which is essentially a logical window on real tables.
a. Stored Procedures
b. Indexes
c. Views
d. Both a and c
Q8. Files that keep track of location of each row or group of rows in the table.
a. Indexes
b. Synonyms
c. Partitions
d. None of the above.
Q9.________ model is based on the concept that data is organized and stored in two-dimensional tables called relations.
a. Hierarchical
b. Relational
c. Network
d. None of the above
Q10. Choose the data access control from below
a. COMMIT
b. Rollback
c. Both a and b
d. None of the above
Q11.The rows of a relation are called ___ and Number of column in a relation is called________
a Tuple,degree
b. Attribute,degree
c. Tuple,Cardinality
d. Attribute,Cardinality
Q12. Choose the Axioms for functional dependencies:
i. Reflexivity
ii. Pseudotransitivity
iii. Decomposition
iv. Augmentation
v. Transitivity
vi. Union
a. i,iv and v
b. ii,iii,iv and vi
c. i,ii and vi
d. All of the above
Q13. ‘Select INSTR (‘MANIPAL UNIVERSITY’,’I”,1,3) from DUAL’ returns
a. 4
b. 9
c. 16
d. 15
PART B
Q1. SQL Server 2005 version(s) is/are:
a. Enterprise Edition
b. Standard Edition
c. Developer Edition
d. Workgroup Edition
e. Express Edition
f. Mobile Edition
g. All of the above
Q2. State True/False:
i . All The primary databases has the extension of *.mdf by default.
ii. Transaction log is used for recording your transaction.
iii.SQL Client cannot be run Windows 2000 Server.
iv. The Model database is used as the template for all databases created on a system.
a. i-T,ii-T,iii-F,iv-T
b. i-F,ii-F,iii-T,iv-T
c. i-T,ii-F,iii-F,iv-T
d. i-F,ii-T,iii-F,iv-T
Q3. _____ symbol is SQL indicates that all attributes of the relation are to be retrieved
a. *
b. @
c. σ
d. π
Q4. The size of transaction log file of a primary file of database is:
a. 2 KB
b. 1 MB
c. 100 KB
d. None of the above
Q5. Which are not SQL Server Data types from the following:
a Tinyint,Smallint
b. VarBinary,Varchar
c. Float,Unsigned int
d. None of the above
Q6.______ is used to defined a local variable and assigned an initial value with a _______ statement.
a, Dim,SET
b. DECLARE,SET
c. Public,Private
d. None of the above
Q7.Microsoft SQL Server uses following operator categories:
i. Unary Operator
ii. String Operator
iii. Address Operator
iv. Logical Operator
v. Comparison Operator
vi. Assignment Operator
a. ii,iv,v and vi
b. i,iii,v and vi
c. i,ii,iv,v and vi
d. All of the above
Q8. We cannot apply _______
function to char datatypes.
a. avg()
b. substring()
c. Rank()
d. None of the above
Q9. Transact-SQL contain language elements that control the flow of logic within scripts.
a. BEGIN..END block
b. WHILE…constructs
c. IF…ELSE block
d. DO…WHILE Loop Block
Q10. ___________statement run statements compared of character strings within Transact-SQL batch of character strings within Transact-SQL batch.
a. EXECUTE
b. BEGIN
c. START
d. None of the above
Q11. Transactions are prefaced with BEGIN Transaction statement and terminated with a _________ TRANSACTION or __________ TRANSACTION.
a. START,END
b. BEGIN,END
c. COMMIT,ROLLBACK
d. None of the above
Q12. The _________________ joins two tables with a common column in which each is usually the primary key.
a. MERGE
b. NATURAL JOIN
c. EQUI JOIN
d. None of the above
Q13.The __________ symbol is used to denote an OUTER JOIN in a query.
a. &
b. /
c. +
d. None of the above
Q14. Select A.LAST_NAME, B.LAST_NAME, A.FIRST_NAME from EMPLOYEE_TBL A ,EMPLOYEE_TBL B where A.LAST_NAME = B.LAST_NAME;
The preceeding SQL Statement returns :
a. Employee’s first name and last name for all the employees with the same last name from the EMPLOYEE_TBL.
b. Employee’s last name for all the employees with the same first name from the EMPLOYEE_TBL.
c. Employee’s last name for all the employees from EMPLOYEE_TBL.
d. None of the above.
Q15.SQL table describes the constraints types:-
i DEFAULT
ii. CHECK
iii.UNIQUE
iv. FOREIGN KEY
a i,iii and iv
b. i,ii and iv
c. ii, iii and iv
d. All of the above
Q16. User can disable constraints only on:-
i FOREIGN
ii UNIQUE
iii. CHECK
iv. PRIMARY
a. i and iii
b. ii and iv
c. i and iv
d. None of the above
Q17 __________reflect the Physical ordering of rows in a table.
a. Partioning
b. Views
c. Clustered Indexes
d. None of the above
Q18 Data integrity falls into categories:
a Entity Integrity
b.Domain Integrity
c. Referential Integrity
d. All of the above
Q. 19 What is the RDBMS terminology for a row?
a. Tuple
b. Relation
c. Attribute
d. Domain
Q. 20 Which of the following is a valid Database user?
a. DBA
b. Network Administrator
c. Application developer and Administrator
d. All of the above
Q. 21 Which of the following is column constraint?
a. NOT NULL
b. Primary key or UNIQUE
c. CHECK constraint
d. All of the above
Q.22 All candidate keys other than primary keys are called _____
a. Secondary Key
b. Primary Key
c. Eligible Keys
d. None of the above
Q. 23The _____ predicate is used to determine whether the result of a table contains duplicate rows
a. Distinct
b. Unique
c. NULL
d. None of the above
Q.24 The _____ module of transaction model is responsible for
a. Buffer manager
b. Recovery manager
c. Transaction manager
d. None of the above
Q. 25 The number of tuples in a relation is called its _____ while the number of attributes in a relation is called its _____ a. Cardinality, degree
b. Rows, columns
c. Super key, primary key
d. None of the above
Q. 26 In a relational database a referential integrity constraint can be specified with the help of _____
a. Primary Key
b. Foreign Key
c. Secondary Key
d. None of the above
Q. 27 Collection of information stored in a database at a particular moment is _____
a. View
b. Schema
c. Instance
d. None of the above
Q. 28 E-R Model uses this symbol to represent weak entity set.
a. Dotted Rectangle
b. Diamond
c. Doubly outlined Rectangle
d. None of the above
Q. 29 This is an authorization command for SQL
a. Access
b. Grant
c. Allow
d. None of the above
Q. 30 Key to represent relationship between tables is called
a. Primary Key
b. Secondary Key
c. Foreign Key
d. None of the above
Q. 31 The data model which describes how the data is actually stored is
a. Internal Model
b. External Model
c. Logical Model
d. None of the above
Q. 32 If entity X is existence – dependent on entity Y then X is said to be
a. Subordinate entity
b. Dominate entity
c. Primary entity
d. Secondary entity
Q. 33 The principal means of identifying entities within an entity set, in a relational database is
a. Tuple
b. Pointer
c. Primary Key
d. Record
Q. 34 Model based on user’s requirement is
a. Logical Model
b. Conceptual Model
c. Physical Model
d. None of the above
Q. 35 A field in a column of a table is called
a. Database
b. Attribute
c. Tuple
d. Data
Q. 36 Data are
a. Row facts and figures
b. Electronic representation of figures
c. Information
d. None of the above
Q. 37 Which one of these is not aggregate function in SQL
a. AVG
b. SUM
c. SELECT
d. None of the above
PART C
Q. 1_____ is a Cartesian product followed by selection
a. Join
b. Cartesian product
c. Divide
d. Difference
Q. 2 _____ operator is useful when the query involves the word all.
a. Join
b. Divide
c. Union
d. None of the above
Q. 3 ‘ALTER Table’ command is a
a. DDL statement
b. DML statement
c. DCL statement
d. None of the above
Q. 4_____ are virtual tables which is essentially a logical window on real table
a. Relations
b. Views
c. Predicates
d. None of above
Q.5 According to argumentation property, If X → Y is true, then _____ is also true
a. y is subset of x
b. x is subset of y
c. xz → yz
d. None of the above
Q. 6 According to pseudo transitivity property, If X→Y and WY → Z are given then ______ is true
a. XW → Z
b. X → WZ
c. XZ → WY
d. None of the above
Q. 7 Normalization reduces____
a. Errors
b. Records
c. Redundancy
d. None of the above
Q. 8 Rotational delay is required to locate
a. a cylinder
b. a drive
c. a directory
d. a block
Q. 9 A ____ permits random access on some field in the record
a. Indexed files
b. Sequential files
c. Hashed files
d. None of the above
Q. 10 The process of finding a good query plan is called ____
a. Query evaluation
b. Query processing
c. Query execution
d. Query optimization
PART D
Q. 1 Match the following
i. Scheduler a. Uses page replacement policy
ii. Buffer Manger
b. Implement start, commit
iii. Recovery Manager c. Uses locking
iv. Transaction Manger d. Forward transaction to scheduler
Q. 2 In ______ all records colliding at position l are linked by pointers and ___ finds an alternate place with respect to
hashed value I by using an appropriate increment.
a. Division Method
b. Chaining Method
c. Multiplicative Method
d. Open Addressing Method
Q. 3 Match the following
Q. 4 BCNF is needed when
a. If one composite key is dependent an other composite key
b. If one attribute of composite key is dependent on an attribute of other composite key
c. If one attribute is dependent on composite key
d. None of the above
Q. 5 Match the following
Q. 6 Match the following
i. Domain Integrity a. Primary Key
ii. Referential Integrity b. Foreign Key
iii. Entity Integrity c. Domains
A. i-b,2-c,3-a
B. i-c,2-b,3-a
C. i-a,2-b,3-c
D. none
Q7. A group of similar information or data, which is inherent to an organization is called an __________.
a. Records
b. Entity
c. Database
d. None of the above
Q8. The operation of a relation X, produces Y,such that Y contains only selected attributes of X. Such an operation is:
a. Projection
b. Union
c. Intersection
d. Difference
Q9.The primary key index does not allow ____________ data in a field.
a. select
b. Attribute
c. Duplicate
d. None of the above
Q10. This is an authorization command of SQL.
a. Access
b. Allow
c. Grant
d. None of the above
Q11. What is true about a View?
a. It is definition of a restricted portion
of the database.
b. It can always be updated like any other table.
c. It is the means for implementing integrity constraints.
d. None of the above
Q12. The smallest piece of meaningful information in a file is called ________.
a. Row
b. Key
c. Field
d. All of the above
Q13. The maximum number of nonclustered indexed that can be created per table is.
a. 300
b. 100
c. 249
d. None of the above
Q14. Use __________ statement to remove an index on a table if the index is no longer useful.
a. Drop Index
b. Remove Index
c. Delete Index
d. None of the above
Q15. _________ is a block of code that constitutes a set of T-SQL statements that are activated in response to certain actions.
a. Views
b. Triggers
c. Tables
d. None of the above
Q16. The contents of a trigger can be modified by:
a. Dropping the trigger and recreating it.
b. Using the ALTER TRIGGER statement.
c. Using the UPDATE TRIGGER
Sstatement.
d. Only a and b
Q17.__________ is a database object that helps in accessing and manipulating data in given result set.
a. Stored procedure
b. Cursors
c. Views
d. None of the above
Q18. True or False
1. Foreign Key value should not be left Blank.
2. To eliminate duplicate tuples from the result of SQL query, the keyword UNIQUE is used.
3. JOIN creates a new database file by joining two or more database files.
4. If two sets of functional dependencies F and G are equivalent, then either F is a subset of G or G is subset of F.
5. An equijoin can be expressed using natural join and renaming operatiors.
a. 1-T, 2-T, 3-F, 4-F,5-T
b. 1-T, 2-F, 3-T, 4-F, 5-F
c. 1-T, 2-T, 3-T, 4-T, 5-F
d. 1-F, 2-F, 3-T,4-T, 5-T
Q19. In SQL-SERVER there is(are) Transact-SQL control-of –flow Keyword(s):
a. IF… ELSE
b. CONTINUE
c. BREAK
d. All of then above
Q20. Universal quantifier of relational calculus can be implements in SQL using the keyword.
a. NOT EXISTS
b. FOR ALL
c. EXISTS
d. None of the above
Q21. GRANT is a command from SQL type.
a. DDL
b. DCL
c. DML
d. None of the above
Q22. Which of the following is an aggregate function in SQL?
a. Union
b. Group By
c. Like
d. Max
Q23. Data about Data is normally termed as _____________.
a. Tuple
b. Cardinality
c. Meta Data
d. None of the above
Q24.If relation is in ___________, it is in 3rd Normal Form also.
a. 4th Normal Form
b. BCNF
c. Both a and b
d. None of the above
Q24. E-R model is used to describe _________ model.
a. Relational
b. Cardinality
c. Degree
d. None of the above
Q25. ____________ contains the structure of the database.
a. Data Model
b. Table
c. Data dictionary
d. None of the above
Q26.Complex entities can be constructed using the __________ operation.
a. Specialization
b. Aggregation
c. Generalization
d. None of the above
Q27.__________ represents relationship between the tables.
a. Foreign Key
b. Primary Key
c. Both a and b
d. None of the above
Q28. The level of data abstraction which describes how the data is actually stored is.
a. physical level
b. Storage level
c. Conceptual Level
d. View level
Q30. An association of several entities in an Entity-Relationship model is called
a. Tuple
b. Record
c. Relationship
d. Field
Q31. ________ is the process of grouping the data item elements in the tuple representing entities and their relationships.
a. E-R Modelling
b. Normalization
c. Indexing
d. None of the above
Q32.When all non-key attributes are dependent on the key attribute, it is called ____________ dependency.
a. Full
b. Partial
c. Join
d. None of the above
Q33. The number of entities to which another entity can be associated via a relationship set is expressed as
a. entity
b. Scheme
c. Cardinality
d. None of the above
Q34.The following entities/attributes in a relational database should not have null values.
a. Keys
b. variables
c. relations
d. All of the above
Q35. RDBMS supports the concepts of Null values.
a. TRUE
b. FALSE
Q36. All possible values of data items is called tuples.
a. TRUE
b. FALSE
Q37. The number of rows associated with the relations are called as the degree.
a.TRUE
b. FALSE
Q38. File is the collection of all related
a. Database
b. Records
c. Fields
d. File
Q39. The set of all possible values of a data items is called
a. Domain
b. Tuples
c. Attributes
d. None of the above
Comments
Post a Comment