Database Management System – Set 2 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Database Management System – Set 2 Dear ! This is Database Management System – Set 2 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) The keyboard to eliminate duplicate rows from the query results in SQL is DISTINCT NO DUPLICATE UNIQUE None 2 / 50 2) Which two files are used during operation of the DBMS ? Query language and utilities DML and query language Data dictionary and transaction log data dictionary and query language 3 / 50 3) In an Entity-Relationship Diagram Rectangles represents Entity sets Attributes Database Tables 4 / 50 4) Which of the following constitutes a basic set of operations for manipulating relational data ? Predicate calculus Relational calculus Relational algebra SQL 5 / 50 5) What is data integrity? It is the data contained in database that is non- redundant It is the data contained in database that is accurate and consistent. It is the data contained in database that is secured It is the data contained in database that is shared 6 / 50 6) For each attribute of a relation, there is a set permitted values , called the ———— of that attribute. Domain Relation Set Schema 7 / 50 7) The minimal set of super key is called Primary key Secondary key Candidate key Foreign key 8 / 50 8) Union operator is a : Unary operator Ternary operator Binary Operator Not an operator 9 / 50 9) The part of a database management system which ensures that the data remains in a consistent state is authorization and integrity manager buffer manager transaction manager file manager 10 / 50 10) The statement that is executed automatically by the system as a side effect of the modification of the database is Backup Assertion Recovery Trigger 11 / 50 11) A Database Management System (DBMS) is Collection of interrelated data Collection of programs to access data Collection of data describing one particular enterprise All of these 12 / 50 12) Data Manipulation Language enables users to Retrieval of information stored in database Insertion of new information into the database Deletion of information from the database All of these 13 / 50 13) The data models defined by ANSI/SPARC architecture are Conceptual, physical and internal Conceptual, view and external Logical, physical and internal Logical, physical and view 14 / 50 14) Column header is refer as Table Relation Attributes Domain 15 / 50 15) The graphical representation of a query is ………. B- Tree Graph Query Tree Directed graphs 16 / 50 16) Relations produced from an E-R model will always be First normal form Second normal form Third normal form Fourth normal form 17 / 50 17) Which of the following is not a recovery technique ? Deferred update Immediate update Two-phase commit Shadow paging 18 / 50 18) A relational is an ………….. if an attribute of a composite key is dependent on an attribute of other composite key . 2NF 3NF BCNF 1NF 19 / 50 19) Which of the following is not a level of data abstraction ? Physical level Critical level Logical level View level 20 / 50 20) The value of the attribute describes a particular ……………………… Entity set File Entity instance Organization 21 / 50 21) Isolation of the transaction is ensured by Transaction management Application programmer Concurrency control Recovery manay 22 / 50 22) Which of the following is true for network structure? It is a physical representation of the data It allows many to many relationships It is conceptual simple It will be the dominant database of the future 23 / 50 23) Which of the following is a Data Model ? Entity – Relationship model Relational data model Object – Based data model All of these 24 / 50 24) Dependency preservation is not guaranteed in BCNF 3NF PJNF DKNF 25 / 50 25) A table can have only one Secondary key Alternative key Unique key Primary key 26 / 50 26) The clause in SQL that specifies that the query results should be sorted in ascending or descending order based on the value of one or more columns is View Order by Group by Having 27 / 50 27) Which of the following aggregate functions does not ignore nulls in its results? COUNT COUNT (*) MAX MIN 28 / 50 28) Wait-for graph is used for detecting view serializability detecting conflict serializability deadlock prevention deadlock detection 29 / 50 29) If the closure of an attribute set is the entire relation then the attribute set is a Superkey Candidate key Primary key Not a key 30 / 50 30) Manager salary details are hidden from the employee . This is Conceptual level data hiding External level data hiding Physical level data hiding None of these 31 / 50 31) Which of the following is not a storage Manager Component ? Transaction Manager Logical Manager Buffer Manager File Manager 32 / 50 32) Disadvantages of File systems to store is : Data redundancy and inconsistency Difficulty in accessing data Data isolation All of these 33 / 50 33) Which of the following represents a relationships among a set of values Row Table Field Column 34 / 50 34) Operator is used to compare a value to a list of literals values that have been specified Like COMPARE BETWEEN IN 35 / 50 35) DROP is a …………. statement in sql. Query Embedded SQL DDL DCL 36 / 50 36) Dependency preservation is not guaranteed in BCNF 3NF PJNF DKNF 37 / 50 37) Which is the best file organization when data is frequently added or deleted from a file? Sequential Direct Index sequential None of the above 38 / 50 38) The default level of consistency in SQL is Repeatable read Read committed Read uncommitted Serializable 39 / 50 39) An advantage of view is Data security Derived columns Hiding of complex queries All of these 40 / 50 40) A table can have only one Secondary key Alternate key Unique key Primary key 41 / 50 41) The clause alter table in SQL can be used to add an attribute delete an attribute alter the default values of an attribute all of these 42 / 50 42) Tree structures are used to store data in Network model Relational model Hierarchical model File based system 43 / 50 43) Which of the following is not an schema ? Database Schema Physical Schema Critical Schema Logical Schema 44 / 50 44) Relationships among relationships can be represented in an E-R model using Aggregation Association Weak entity sets Weak relationship sets 45 / 50 45) Isolation of the transaction is ensured by Transaction management Application programmer Concurrency control Recovery management 46 / 50 46) Which of the following is not a characteristic of a relational database model ? Table Tree like structure Complex logical relationships Records 47 / 50 47) Which normal form is considered adequate for normal relational database design ? 2NF 5NF 4NF 3NF 48 / 50 48) A list consists of last names , first names , addresses and pin codes. if all people in the list have the same last name and same pin code a useful key would be The pin code the last name the compound key first name and last name from next page 49 / 50 49) In a multi-user database , if two users wish to update the same record at the same time , they are prevented from doing so by Jamming Password Documentation record lock 50 / 50 50) The normalization was first proposed by …………. Code Codd Boyce Codd Boyce Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback