Adv. Dbms MCQ
Adv. Dbms MCQ
Adv. Dbms MCQ
B.Data.
C.storage
D.release
2. A__________is very significant resource, it requires tough, protected and easily obtainable
software that can collect and utilize it fast.
A.information
B.Data.
C.storage
D.release
B.database administrator.
C.office administrator.
D.oracle
B.database administrator.
C.office administrator.
D.oracle
B.database administrator.
C.office administrator.
D.oracle
B.database administrator.
C.office administrator.
C.record
D.row
B.storage C.data
D.record
D.oracle
10.By providing security database can be accssed only by doing suitable __________.
A.accsess B.login C.retrival
D.release.
B.execution C.login
D.accsess.
B.integrity
C.atomicity D.flexibility
13.Two entries having some variation that propose to display the same information is considered
as an example showing ______________.
A.deficiency of integrity B.efficiency of integrity C.redundancy of integrity D.flexibility of
integrity.
14.___________constraints can be defined and applied means of DBMS.
A.integrity
B.redundancy.
C.flexibility
D.atomicity..
B.faliure C.crash
D.restore
B.client
C. client-server D.multiplexer
B.normalizing
C. standardizing. D.Moving
B.mining
C.replication
D.fragmentation.
A.simple B.complicated
C.regrous D.difficult
20.To bulid up the programs related to client utility,the effort needed ________significantly with
databases.
A.increases B.decreases
C.proportional D.varies
21.People can have interact with data available in database through various _________.
A.The clients can inspect the outcomes or even collect and store the results in _____or _______
Format.
A.excel or word
22.The commands that can be issued against database by clients are known as___________.
A.queries.
B.sequence
C.view
D.cursor
23.For ad-hoc querying the knowledge of _______language is needed on the client part.
A.syntax
B.query
C.cursor
D.syntax
24.A ___________interface is utilized to consent the request of the clients such as to enter
,modify or delete data.
A.graphical user
25.____________ includes programming logic which is essential to execute the requirement of
the clients.
A.design logic
B.business logic
C.development logic
D.application logic
26.The machine which is utilized for running user interface is considered as ______.
A.server
B.client
C.desktop
D.program
27.The machine which is utilized for running DBMS and includes a databse is considered as the
___________ of database.
A.server B.client
C.desktop
D.program
29.In _________databases users cannot easily distribute the dta between all databases.
A.personal
B.two-tier C.multi-tier
D.business
C.multi-tier
D.business
31.If there are numerous circumstances when the clients or work group want the data to be
distributed and used for sharing data is the creation of ___________ client-server databases.
A.one-tier
B.two-tier
C.three-tier D.multi-tier
32.All computers uses a particular application providing user interface and business logic by
which __________of data is performed.
A.retrival
B.manipulationC.accsess D..release
33.Applications that are required to assist numerous users are built by means of the
____________
Architecture.
A.single B.two
C.three D.multi
34.To carry out the transaction of business which are requested by clients the required business
logic is included in the __________________ layer..
A.presentation
B.application
C.network
D.physical
35.application such as crm and scm system also relay on _________for data warehousing.
A.database. B.table C.record
D.sequence
C.multi-tier D.single-tier.
37.The requirement of informstion from various branches and divisions are successfully
supported by an ___________database.
A.one tier B.two-tier C.multi-tier D.enterprise
38.In ___________user can work with the data used in the past.
B.two C.three
D.four
B.5-100
C.5-20
D.5-30\
B.100-1000
C.20-100
D.20-1000
B.>100
C.5-100 D.100-1000
B.two
C.three d.several
B.table
C .field
D.column
47._________ has a simple design process since data usually consists of hierarchical relationship
A.simplicity.
B.integrity
C.security
D.relationship
B.heirarchical
C.client-server
D.two-tier
49.moving a part of data from one position to the other position needs you to modify _______
accessing application related to that data which is complicated to perform.
A.one
B.two
C.every
D.no
50._________ model was invented by Charles Bachman.
A.heirarchical model B.network model C.client-server model
D.one-tier model
52.Turbo IMAGE, IDMS, RDM Embedded ,RDM Server are example of _______model..
A.heirarchical model B.network model C.client-server model
D.one-tier model
53._________ model makes use of a mathematical relation concept.
A.heirarchical model B.network model
C.client-server model
D.relational model
54.The relations ______ is based on how many attributes exists in respective relation schema
A.schema B.degree C.feild D.record
55.In _______model classes, objects, in addition to inheritance are straight forwardly assisted in
database schemas as well as query language
A.A.heirarchical model B.network model C.client-server model
D.object-relational
model
56.________permits the developers of software to incorporate their individual types in addition
to methods and these can be used in the DBMS.
A.ORDBMS
B.OODBMS
C.DBMS
D.RDBMS
57._______ type of database is also known as object oriented database.
A.Object database B.relational database C.network database D.heirarchical database
58._________ are carried out using navigational interfaces instead of declarative on.
A.ORDBMSB.OODBMS
C.DBMS
D.RDBMS
59._________ DBMS have the capability to support numerous clients.
A.one-tier B.client-server C.centralized D.distributed
60.The ___________purpose DBMS are planned and constructed for a particular application
A.general
B.special
C.single
D.multiple
C.centralizedD.distributed
C.centralizedD.relational
B.DCL
C.DML
D.sql
71.__________ are the actions that are run by DBMS whenever some event related to the
database occurs.
A.sequence
B.cursor
C.trigger
D.procedure
72.With _________ feature of SQL, users can execute the queries at run-time
A.compile time. B.run-time
73.DBMS maintains the data ________ to avoid the wrong information to enter in
database.
A.integrity
B.entity C.referencial
D.primary
B.update
C.delete
D.alter
C.delete
D.alter
102.A ______ is a subschema in which logical tables are generated from more than
one base table.
A.view
B.sequence C.cursor
D.trigger
makes sure that the changes performed in the database are saved in
the physical database.
atomicityconsistancy
C.isolationD.durability
114.SQL offers the concurrency control for the execution of a transaction via a
Data Control Language which can also be called as __________.
A.sql dml. B.sql dcl C.sql dll D.sql
115.On the execution of _________ statement, every modification done
by the related transaction until now is made constant
A.rollback B.commit C.save D.exit
116.On the execution of ________ statement, every change
performed since the preceding COMMIT statement is rejected.
A.rollback B.commit C.save D.exit
117.__________ condition arises when a transaction reads data written by a concurrent
uncommitted transaction.
A.Dirty readB.Non-repeatableread
c.Phantom read D.exit read
118._______ condition is caused by a transaction which reads data again and finds that data has
been modified by committed write operation of some other transaction.
A.Dirty readB.Non-repeatableread
c.Phantom read D.exit read
119.________ condition arises when a transaction executes a query again it had previously
executed and gets rows different f rom what it got earlier
A.Dirty readB.Non-repeatablereadc.Phantom read D.exit read
120.In _________ isolation the transactions are forced to execute sequentially.
A.Serialisable B.Read committed c.Read un-committed D.write
121._________ SQL permits to create and submit SQL queries dynamically or run
time.
A.static B.dynamic C.relational d.object-oriented
Unit:-3Normalisation
122.Two attributes A and B in any relation R are said to possess a ________ if for each distinct
value of A, there is only one value of attribute B associated with it.
A.functionaly associated B.functionaly dependent C.independet
D.associative
A.dbms
B.normalization
C.generalization D.specialization
Unit-4:-Query Optimisation
156.___________ provides various algorithms for implementing the different types of
relational operations that appear in a query execution strategy.
A.dbms
B.oodbms
C.rdbms
D.ddbms
163.The number of runs that can be merged together in each pass is termed as the degree of
____________.
A.merging
B.sorting
C.sequencing
D.searching
165._________ operation performs the task of retrieving the desired records from the database.
A.update B.retrive C.delete
D.select
166.If they scan entire file and then retrieve the records satisfying the
user defined condition they are termed as________scans.
A.index
B.file
C.sequential D.random
167.if the search algorithm carries an index, then that search is termed as ________ scan..
A.index B.file C.sequential D.random
168._________scan retrieves all the records from the file and
checks whether the attribute values qualify the criteria or not.
A.index B.file C.linear D.random
169.______ search is faster and more efficient than the linear search has the search space is
reduced to half in each comparison
.A.index B.fileC.linearD.binary
170.If the query checks for equality between the key attribute and the primary index then
__________search might be used.
A.index B.binary C.search D.hash
171.________ operation is used to join two database tables/relations.
A.hash
B.avg C.join D.sum
172.In ________join If an hash key or index is there for any one of the two join attributes
retrieve each and every record t in X,
A.nested loop
D.CARTESIAN PRODUCT
B.intersection
B.sum C.maxD.min
A.forward
B.reverse C.center
D.top
195._______ lookup starts with the sub-query and processes one sub-query row at one time..
A.forward B.reverse C.center
D.top
Unit:-5
Query Execution
201.Physical query strategy is made from _________
A.relation B.operand C.operator Dfunction.
202.The principal methods for execution of the operations of relationalalgebra are; scanning,
hashing, sorting, and indexing are the major approaches.
State true or false
We
can use the index not only to get all the tuples of the relation it
indexes, but also _________ .
A.to get only those tuples that have a specific value
216.parallel computers all have some communications facility for passing information among
__________.
A.memory B.processors C.buffer d.monitor
217.In _________each processor has access to all the memory of all the processors.
a.shared memory B.shared processor C.shared nothing D.shared all
218.NUMA stands for__________.
A.non uniform memory access B.no-uniform memory access
C.non universal memory access D.non uni memory axise
219.In_________architecture, every processor has its own memory, which is not accessible
directly from other processors
A. shared memory
B.shared processor
C.Shared Disk:
D.shared nothing
220.________ manage the potentially competing requests from
different processors.
A.disk controller B.shared processor C.shared memory D.shared nothing
221.In___________architecture all processors have their own memory and their
own disk or disks,
A. shared memory
B.shared processor
C.Shared Disk:D.shared nothing
222.The shared-nothing architecture is the most commonly used architecture for
___________database systems.
A.high-performanceB.low-performance c.average performance D.central performance
223.One of the chief heuristic rules is that before applying the JOIN or other binary operations,
one must apply _________ and ________operations.
A.select,unionB.select.project C.project,union
D.join,select
224.The basic outline of a Heuristic Algebraic Optimization Algorithm is given below.
1. Break up any SELECT operations by means of conjunctive operations
into a cascade of SELECT operations.
2. Move each and every SELECT operation as far down the query tree as
is allowed by the attributes which are involved in the select condition.
A.both are false B.both are true
C.statement 1 only true D.statement 2 only true
D.query evalution
232.We can merge the execution as well as an optimisation phase of query processing by
combining eddies with suitable _______ algorithms.
A.select B.join C.project D.union
233.The purpose of the addition of an eddy is to control various ______ in a query.
A.operand B.operator c.relation D.set
234.The eddy maintains a_______ queue of all tuples that require processing.
A.priority B.order C.inorder D.preorder
235.______is a sharednothing parallel query processing framework. It adjusts dynamically to
any fluctuations in workload and performance.
A.river
B.eddy
C.process
D.shared memory
236.In the hash ripple diagram,the arrival rate of one relation is _______ times faster than the
other.
A.two B.three C.four D.multi
237.A _______ can be used to robustly produce near-record performance on I/O intensive
benchmarks such as hash joins and parallel sorting.
A.eddy B.river C .process D.instruction
238.River is essentially ________threaded.
A.single B.double C.multi D.triple
239.The participating operators of an eddy are encapsulated by the ________.
A.merging
B.sorting
C.searching
D.sheduling
240.A fixed-sized buffer of tuples that is to be processed by one or more operators is maintained
by an eddy __________.
A.river
B.process C.component
D.algorithm
241.Eddies derive their name from the ________ data flowing within a river
A.sequential
B.circular
C.single D.multiple.
242.A tuple entering an eddy is related with ______ bits and a tuple descriptor containing a
vector of _______ bits.
A.Done,ready
B.ready,done C.exit,enter D.enter,exit
243.An eddy _____ the Done bits, and sets the Ready bits suitably when it receives a tuple from
one of its inputs.
A.one
B.flush C.zeroes D.hash
244._______ operators produce output tuples that match to combinations of input tuples.
A.relational B.binary
C.comparison D.unary
245.A ______ buffer of tuples that is to be processed by one or more operators is maintained by
an eddy component.
A.variable-size B.fixed-size
c.block-size D.zero-size
246.There are two issues which affect the overhead of barriers in a plan. They are:
a) the gap between arrival times of the two inputs at the
barrier; B) the frequency of barriers.
A.both are true. B.both are false C.a is true D.b is true
247.In order to allow changing rates for each input,______joins were designed
A.hash
B.inner
C.outer
D.ripple
264.______of pipelined query processing operators during flight is the basic challenge of runtime re-optimisation
A.preorder
B.inorder C.reorder
D.postorder
265.A query evaluation plan contains an extended _____algebra tree.
A.relational B.symbolic C.relative D.conditional
279._______ approach grants longest waiting request. It does not provide starvation.
A.fcfs
B.fsfc C.fifo D.lifo
280.in_________If there is a U lock waiting for upgrading an X lock, grant that first.
A.upgrading priority B.read C.write D.exclusive
281.The warning protocol is used to handle locks on a ______ of database elements.
A.relation
B.hierarchy
C.centralized
D.distributed
291.Database ________ is concerned with the restoring of the database to an accurate state in the
occurrence of a failure
A.consistancy B.recovery C.duplicasy D.atomicity
292.In case of differential backup, only the ____ variations that are performed on the database
are copied.
A.first B.second C.third D.last
293. A transaction log backup method is used to back up the transaction log operations that are
not shown in a _______backup copy of the database
A.preceeding B.successiding C .first D.last
294..Write-ahead protocol makes sure that transaction logs are always written _______ any
database data that are really updated.
A.after B.before C.first D.last
295.______ is considered as a temporary storage part available in primary memory.
A.buffer B.register C.cache D.main memory
296.________ is an operation where all the updated buffers are written to the disk by the DBMS.
A.database checkpoint B.buffer C.lock D.fin
297.When deferred write or deferred update is used by the recovery process, the transaction
operations do not update the _______ database instantly
A.centralize B.distributed C.logical D.physical
298. The term Database Element points to various _______ in the database.
A.relation B.attribute C.entity D.element
Unit:-8 Transaction processing
299.A clear solution to the issue of maintaining locks in a distributed database is considered as
_________locking
A.centralized B.symbolic C.relative D.conditional
300..Primary-copy locking method includes _______ the function of the lock site.
A.centralized B.symbolic C.relative D.distributing
301.Local transactions control ________ database system.
A.global B.local C.centralized D.distributed
302 Global transactions control __________database system.
A.single B.multiple C.double D.global
303.Global data cannot be accessed by ______ transactions.
A.global B.local C.centralized D.distributed
304.A _____ transaction is the one that is permitted too much time to hold locks, and that
particular lock is needed by another transaction.
A.small B.long
c.single
D.double
308. Performing lock on a resource is one of the methods that are used to _______transactions.
A.sequence B.parallel C.serialize D.recover
309.The __________is used to create the order which implements the operations
inside simultaneous transactions.
B.shrinking
C.logging D.commit
316 A series of operations comprising database operations that is atomic with regard to
concurrency and recovery is calleda___________
A.recoveribility B.serializibility C.transaction D.maintanability
Unit 9 Parallel Database Architectures for Parallel Databases
317.A ________database can be defined as a database that run multiple instances to "share" a
single physical database.
A.single B.distributed C.parallel D.centralized
318.There are numerous advantages of parallel database technology
1. Increased throughput
2. Decreased response time
3. Ability to process an extremely large number of transactions
A.all are trueB.only one is true C.only 2 is true D.only three is true
319.state true false.Speedup=Time_Original/Time_Parallel
320.Scale up means to process a larger number of jobs in the ______ time period.
A.same B.different C.original D.duplicate
321.state true or false.Scale up Volume_Parallel/Volume_Original
322.In a ______ parallelism approach, one operations output is streamed into the input of some
other operator and these two operators can function simultaneously in series
A.pipelined B.partitioned C.sequencial D.serial
323.In a _______parallelism approach, the input is partitioned between different processors &
memories, and also the operator can often be divided into several autonomous operators each
working on a part of the data.
A.pipelined B.partitioned C.sequencial D.serial
324.In a _________multiprocessor architecture, several processors share storage disks and
common memory with assistance of interconnected network
A.shared-disk B.shared-memory C.shared-processor D.shared-nothing.
325.In a ________architecture, each processor has its own personal memory besides one or more
disk storage.
A.shared-disk B.shared-memory C.shared-processor D.shared-nothing.
326.In ______ architecture, every processor has its own personal memory and only shares
storage disks via an inter-connection network.
338._________ features can help to significantly enhance data access and improve overall
application performance.
A.data partitioning. B.data parellism C.data security D.data recoverability
339.________ partitioning is best when all the applications want to access relation by scanning
sequentially all of it on each and every query.
A.data B.round-robinC.hash D.range
340.State true or false.Round robin technique is not suitable for sophisticated access of the
relation.
341._______ Partitioning helps to avoid data skew i.e. data is evenly distributed across the disk.
A.A.data B.round-robin C.hashD.range
342.In ____________partition the administrator chooses an attribute as the partitioning attribute
and specifies attribute-values within a certain range to be placed on certain disk.
A.A.data B.round-robin C.hash D.range
343._________ parallelism means executing different independent queries simultaneously on
separate CPUs.
A.intra-query B.inter-query C.extra-query D.intro-query
344.State true or false.Response times of individual transaction/queries are not much faster as
compared to the transaction or queries that run in isolation.
345.In ______ parallelism a single large query is broken into a number of pieces (subtasks) and
those subtasks are executed in parallel on multiple processors
A.intra-queryB.inter-query C.extra-query D.intro-query
346._______ parallelism relates to the capacity to break up a query into various parts across
various partitions of a partitioned database which may be on one single machine or several
machines.
A.inter-partition B.intra-query C.inter-query D.intra-partition
347.In ________parallelism, the implementation of each single operation in query is parallelized
A.inter-operation B.intra-operation C.inter-query D.intra-query
348.In case of ________parallelism, the various operations in a query expression are
implemented in parallel.
A.inter-operation B.intra-operation C.inter-query D.intra-query
349.State true or false.Parallel processing of data from outside sources is required in order to
manage large quantities of arriving data.
__________.
a.class B.object C.string D.function
362.___________ basically signifies hiding the data inside the object from the outside classes
A.inheritance B.encapsulation C.data hiding D.polymorphism
363.A _________ model is defined as an organisation of the real world objects (entities),
restrictions on them, and the relationships between the objects.
A.relation B.data
C.object D.inheritance
364.A _______ language is considered as a tangible syntax for a data model
A.sql B.database C.java D.php
365.Entity of any real world is known as an _______.
A.class B.object C.function D.string
366.A _______includes a set of all objects, which share the same group of methods and
attributes
A.class B.object C.function D.string
367.This includes deriving a new class (which is known as subclass) from a current class (which
is known as superclass).
A.inheritanceB.encapsulation C.data hiding D.polymorphism
368._________ are considered as the paths utilised to carry out navigation-based data access.
A.relationshipB.encapsulation C.data hiding D.polymorphism
.369.Object identifiers can uniquely identify _______.
A.classB.object C.function D.string
370.An _______ is used to illustrate the behaviour or ability of a class without performing to a
specific implementation
A.classB.object C.function D.interface
371._______ symbolises an agreement between a supplier and its users, which defines what's
needed from every implementer.
A.classB.object C.function D.interface
372.If one or more interfaces are implemented by a class, a separation from a class name is
provided between those interfaces by a _______.
A.semicolon B.colon C.coma D.asterisk
373.We can define the class hierarchy in___________
A.pseudo-code
374.We use the keyword _____ to signify that one class is considered as a specialisation of
another class.
A.having B.has a C.isa D.groupby
375.State true or false.The concept of substitutability is considered as a significant loss of
inheritance in object oriented systems.
Ans:-false
376.The capability of class to inherit the variables and methods from numerous superclasses is
known as_______inheritance.
A.multilevel B.multiple C.single D.dual
377._______ data is defined as the data that continue to occur even after program that generated
it, has finished.
A.in-persistant B.consistant C.persistant D.inconsistant
378.A programming language which is expanded by means of constructs to manage _______data
is known as a persistent programming language.
A.in-persistant B.consistant C.persistant D.inconsistant
379.State true or false
Persistent
383.The entire database is controlled by a single site and hence is known as _______ Database
System
A.global B.local C.distributed D.centralized
384.A multiple-source and multiple-location database is called ________ database
A.global B.localC.distributed D.centralized
385.______ is the cost of connecting the sites physically in system.
A.connecting cost B.installation cost C.site cost D.physical cost
386.______is a Cost of time required and total expenditure to transmit a message from site A to
site B
A.installation cost B.connecting cost C.communication cost D.physical cost
387._______ means the frequency of failures in link or sites
A.consistancy B.recoveribilityC.relaibility D.durability
388._______meansThe level at which data could be accessed in spite of the malfunction of some
sites or links.
A.consistancy B.recoveribilityC.relaibilityD.availability
389._______means The ability to track data distribution, replication and fragmentation by
enlarging the DDBMS catalogue.
A.tracking of data B.security of data C.recoveribility of data D.relaibility of data
390._______processing means the capability to transmit queries and access remote sites between
different sites via communication network.
A.Distributed query B.centralized queryC.object-oriented D.real
391.state true or falseReplicated data management means The capability to choose which copy
of one copied data to access and to sustain the reliability of copy of replicated data.
True.
392.In _____Distributed transactions should be carried out with adequate security management
of data and the access/authorisation rights of users
A.security B.reliability C.consistancy D.recoveribility
393.state true falseReplicated data management means capability to choose which copy of one
copied data to access and to sustain the reliability of copy of replicated data.
true
394.state true false.Distributed database recovery means The capability to recover data from
case-by-case crashes and from different types of malfunctions, for example; breakdown of
communication link.
Ans;-true.
395.state true or false.
Each workstation should have essential hardware and software that allow them to establish a
network with other components on the distributed database system
Ans:-true.
396.________ Processor is also called Transaction Manager (TM) or Application Processor
(AP).
A.transaction B.centralize C.distributed D.real
397.________ is a software component on every computer in the distributed database system.
A.transaction B.centralize C.distributedD.data processor
398.When the database technology is the same at each of the locations and the data at the several
locations are also compatible, that data is known as _______database
A.hetrogenous B.homogenous
C.centralized
D.distributed
399.In _______ DDBMS, every one of the site might manage different types of DBMS
A.hetrogenousB.homogenous C.centralized D.distributed
400.________means System keeps several copies of data, stored at various sites, for quick
retrieval fault tolerance.
A.fragmentation B.replication C.inheritance D.polymorphism
401.In _______Relation is divided into various fragments stored at separate sites
A.fragmentation B.replicationC.inheritance D.polymorphism
402. Relation is divided into various ________.
A.part B.fragment C.subpart D.function
403.Vertical fragmentation is similar as __________.
A.inheritance B.decomposition C.polymorphism D.fragmentation
404._______ fragmentation of a relation or a table can be acquired by dividing the table into a
number of sub-tables having disjoint columns.
A.vertical B.horizontal C.sequential D.serial
405.In _______fragmentation a relation can also be fragmented both vertically and horizontally.
A.verticalB.horizontal C.sequentialD.mix
406.Replication comes in helpful, when you want to improve the _______ of data
A.recoverability B.accessibility C.reliability D.serializibility
407. If various sites are linked to one another, then the user at a site might access data that is
present at some other site this is known as ________.
A.space independence B.data independence
C.physical independence
D.netindependence
408.In the ________interface the end users are free to have interfaces of their own choice at their
sites .
A.centralize B.distributed C.user-friendlyD.object-oriented
409. It is more costly and also tough to implement a distributed database system as compared to
_______local database.
A.centralize B.distributed C.user-friendly D.object-oriented
410.The updation of data on more than two networked computer systems is termed as a
________transaction
A.centralize B.distributedC.user-friendly D.object-oriented
411._________ managers handle constant data and perform in collaboration with Distributed
Transaction Coordinator (DTC) to guarantee isolation & atomicity to the application.
A.database
B.resource
C.system D.oracle
412. Commit protocols are utilised to make sure _______ across sites
A.atomicity B.durability C.consistancy D.redundancy
413. When a site is unsuccessful or fails and then you restart, it has to perform ________ for all
transactions that it has not yet committed suitably.
A.redundacny B.recovery C.security D.consistancy
414. Two phase commit is one transaction protocol intended for those complexities that happen
with ___________ resource managers
A.centralized B.distributed Csingle D.parallel
415.________ transaction manager with two phase commit protocol uses a coordinator to handle
individual resource managers
. A.centralized B.distributed Csingle D.parallel
416. In ______ pages, entries are planned by identifier or name and intended for forward lookup
to locate more about entry
A.yellow
B.red
C.white
D.black
417. In _______ pages, entries are designed/planned by properties to locate entries matching
particular requirements
A.yellow B.red C.white D.black
418. In ddbms _________features the database is located at various sites or that there are many
users accessing the data at the same time is not known to the users.
A.security B.consistancy C.transparancy
D.atomicity
B.transaction C.faliure
D.location
432. The ability to store, retrieve and modify persistent objects in Smalltalk is provided by the
_______Smalltalk binding.
A.obmg B.ocmd C.Odmg D.odmc
433. ANSI and ISO have developed a new SQL standard as ________.
A.sql5 B.sql3 C.sql2 D.sql
434. Each SQL3 table has a predefined column called as________ that contains row identifiers
which can be used as values in other rows.
A. IDENTITY B.attribute C.entity D.key
435. State true or false
Caching avoids the expenditure of referring to disk every time the page is accessed.
Ans:-true.
436. The _________has the right to read more data from pages in memory, every time a single
execution of the embedded logic is completed.
A.ordbms B.oodbms C.dbms D.rdbms
437.___________is a template index structure based on B+ trees, which allows most of the tree
index structures invented so far to be implemented with only a few lines of user-defined ADT
code.
a. Generalised Search Tree b.BINARY SEARCH tree C.relation tree D.mst
438. 15. Which one of the following is the easiest to use?
(a) ORDBMS (b) OODBMS (c) RDBMS (d) DBMS
429.Out of RDBMS, OODBMS and ORDBMS, which has got the best performance?
(a) ORDBMS (b) OODBMS (c) RDBMS (d) DBMS
439. A combination of an atomic data type and its associated methods is called an ________
type.
A.abstract data B.user-defined C.function D.structure
440. The_________ method used to store, find and retrieve the data from a database.
A.find B.retirive C.search D.access
441.________ Generally used to store multimedia data such as video, images and audio. It stores
data in binary format only
A. Character Large Object B.Binary Large Object C.string large object D.array large object
442.__________ is used for documents or large strings that use the database character. It stores
this string data in the database character set format.
A. Character Large Object B.Binary Large Object C.string large object D.array large object
UNIT :-13 XML Query Processing
443. ________ is turning out to be the most significant new standard used for the representation
of data and exchange on the World Wide Web.
A.html B.Dhtml C.javascript D.XML
444. XML-QL syntax comprises _______ sections, one of which is a WHERE clause and a
second one is a CONSTRUCT clause.
A.one B.two C.three D.four
445 In _______clause the first part is known as the search string, and the other part is known as
ORDER-BY clause which is used optionally.
A.select B.having C.group by D.where
446. The _______ clause provides permission to arrange the data retrieved in the variables.
A.order-by B.having C.group by D.where
447. The _______ clause is a necessary clause that provides the file name of the XML file. It can
be a single file name included in quotes.
A.order-by B.having C.group by D.In
448. The ________section provides permission to state a pattern for output.
A.order-by B.having C.group by D.construct
449.______is considered as an early query language used for semi structured data.
A.sql B.plsql C.oracle D.lorel
450. Lorel language makes use of the ________as the data model for semi structured data.
A. OEM (Object Exchange Model) B.oam C.odm D.omd
451. State true or false.The drawback of Lorel language is that it is dependent on OQL parser
Ans:-true
452. Quilt is considered as a functional language where you can represent a query as ________.
A.statement B.relation C.expression D.block
453. Quilt expressions include seven major forms. They are:
1.path expressions
2.conditional expressions
3 variable bindings
A.only 1 is true B.only 2 is true C.only 3 is true D.all are true.
454. ______ assesses to the group of nodes in 'a' that takes place previous to some node in 'b'.
(A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b.
455. _________assesses to the group of nodes in 'a' that are also located in 'b'.
(A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b.
456.__________assesses the group of nodes in 'a' that takes place after some node in 'b'
(A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b.
457._________ assesses to the set of nodes in 'a' that are also not located in 'b'.
(A).a BEFORE b (B). a after b.. (C).a INTERSECT b (D). a EXCEPT b
458. ____is another XML query language which makes use of path expressions.
A.sql B.oracle C.Xql D.plsql
459. XSL stands for__________.
A.Extensible Stylesheet Language
C Extended Stylesheet Language
460________ is an XML query language which is generated for XML data sources.
A.XQuery B.LQuery C.SQuery D.ZQuery
461. The XQuerys body comprises of any or all of the following expression:
1.Literals and variables
2.Path expressions
3. Predicates
A.only 1 is true B.only 2 is true C.only 3 is true D.all are true.
462.The full form of FLWOR is___________.
A.FOR LET WHERE ORDER BY and RETURN
B. FOR LEAST WHERE ORDER BY
and RETURN C. FOR LET WHERE ORDER BY and RECORD
463.State true false. Relational scheme is divided into scheme-oblivious and
scheme conscious method.
A.true.
464. _______is also a labelling method which is executed in SQL server
A.ORDPATHS
465.______is a language designed to recognise parts of XML documents, to query the data of
XML.
A.xquery B.Xpath C.Xml D.Xql
466. ________ is considered as one of the XML data management system by means of an
RDBMS.
A.xquery B.Xpath C.Xml D.Xtron
467. A query processor BEA/XQRL executes relational scheme by means of _______
A.xquery B.Xpath C.Xml D.Xql
468. The function of a ___________is to take out the querys high level abstraction and its
procedural assessment into a group of low-level operations.
A.query processor B.query simulator C.query optimization D.query handler
Unit 14 Database Application
469.________ database do not form two visible classes, but they rather define two ends of
database rule languages.
A.active B.relational C.object C.central
470. _______ can be defined as a method which specifies various active rules.
A.sequence B.cursor C.trigger D.procedure
471. DB2, Oracle, and MS SQL Server are considered as the__________ relational databases.
A.commercial B.herarchical C.centralised D.distributed
472. STARBURST document makes use of the following keywords
1.INSERTED 2. DELETED 3. NEW-UPDATED
A.all are true B.1 is true C.2 is true D.3 is true.
473. The model which is utilised to state active database rules is known as_________
Model.
A.Event-Condition-Associate(ECA) B. Event-Criteria-Action (ECA) model.
C. Event-base-Action (EBA) . D. Event-Condition-Action (ECA).
474._______ is a relational model database server developed by IBM.
A.sql B.DB2 C.oracle D.pl/sql
475. What does the CREATE TRIGGER statement states?
a) trigger name b) trigger class c) trigger function d) trigger variable
487. Which processing is used by VDBMS video pre-processing toolkit to partition raw video?
a) Semantic based query processing b) Distributed query processing
c) Both
d) None of the above