KEMBAR78
Unity University | PDF | Database Transaction | Databases
0% found this document useful (0 votes)
27 views10 pages

Unity University

The document is a quiz on the fundamentals of database management systems, covering topics such as data security, database levels, relational algebra, and transaction properties. It includes multiple-choice questions that test knowledge on various concepts related to databases, such as normalization, SQL commands, and data integrity. The quiz serves as an educational tool for assessing understanding of database management principles.

Uploaded by

FOOTBALL NOW
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views10 pages

Unity University

The document is a quiz on the fundamentals of database management systems, covering topics such as data security, database levels, relational algebra, and transaction properties. It includes multiple-choice questions that test knowledge on various concepts related to databases, such as normalization, SQL commands, and data integrity. The quiz serves as an educational tool for assessing understanding of database management principles.

Uploaded by

FOOTBALL NOW
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

UNITY UNIVERSITY

: FUNDAMENTALS OF DATABASE MANAGEMENT SYSTEMS

______refers to the protection of data against accidental or intentional disclosure to

unauthorized persons, unauthorized modifications, or destruction.

A. Consistency B. Data Security

C. Accuracy D. Reliability

2. By databases, we mean the unification of several otherwise distinct data files

with any redundancy among those files partially or wholly eliminated

A. Consistent B. Duplicate

C. Integrated

3. A database is implemented through three general levels: internal, and external so as to

cater to the needs of its user.

D. None of the above

A. Physical

B. Logical

C. Conceptual

D. All of the above

4. A is a virtual table that does not really exist in its own right out is instead derived from one or
more underlying base tables,

A. Table

C. Logical vies D. View

B. Structure Schema

5. Within given relations, a set of one or more attributes having values that are uniquely within the
relationship and thus are able to uniquely identify that tuple is said to be the relation. __key of the

A. Foreign

C. Primary

D. Candidate

B. Candidate

_____is a system of rules that a DBMS uses to ensure that relationship between records in related
tables are valid and that users don't accidentally delete or change related data.

A. Referential Integrity B. Reference Integrity

C. Differential Integrity D. aone of the above


7. A is binary operation that allow us to combine certain selections and a Cartesian product

into one operation.

A. Natural B. Join
C. equi Join

D. All of the above

8. BCNF stands for

A. Basic Communicate Normal Form B. Binary Code Normal Form

C. Boyce-Codd Normal Form

D. All are correct

9. When the table is in the first normal form then data is in two-dimensional forms

A True

B. False

10. The database administration function includes

A. Application programming

B. Computer operations management

C. Database access planning

D. All of the above

11. The basic component of a file in a file system is a

A. Data item B. Field

C. Record

D. Tuple X

12. Database Management System is a____ system to facilitate the creation and maintenance of a

computerized database.

A. Physical B. Software

C. Hardware D. Knowledge

13. The E-R data model is based on a perception of the real world that consists of a set of basic

objects called
A. Classes
C. Objects

B. Entities

D. Attributes

14. The level is at the highest level of database abstraction where only those portions of the

database of concern to a user or application program are included.


A. External

C. Internal D. Physical

B. Conceptual

15. At level of database abstraction, all the database entities and the relationships among

them are included.

A. Physical B. Conceptual

C. External D. Internal

16. In data model, the objects are represented by record structures grouped in file structures.

A. Primitive B. Classic

C. Semantic

D. Network

17. A is a collection of tuples, each of which contains values for a fixed number of attributes.

A. Association

C. Aggregation

B. Relation

D. None of the above

18. is a set of principles concerned with how data is structured.

A. Data integrity

C. Data definition

B. Data manipulation

19. Data control is the fastest among the storage devices.

A. Cache

C. Flash memory

B. Main memory
Magnetic disk _____is a collection of relations with distinct relation names.

A. Domain B. Instance

C. Schema

D. Relational database
21. The main construct for representing data in the relational model is a

A. Attribute B. Relation

C. Tuple D. Domain

22. A is a column or a set of columns that refers to a primary key in the same table or

another table.

A. Primary key B. Foreign key

C. Candidate key D. Concatenated key

23. function is used to find the total of all the values in a column.
A. SUM

B. COUNT

C. ADD D. AVG

24. In SQL, which command is used to add a column/integrity constraint to a table?

A. ADD COLUMN

C. MODIFY TABLE

B. INSERT COLUMN

D. ALTER TABLE

25. Disadvantage of File systems to store data is

A. Data redundancy and inconsistency

B. Difficulty in accessing data

C. Data isolation

D. All of the above

26. A functional dependency between two or more non-key attribute is called C. Functional
dependency

A. Transitive dependency B. Partial transitive dependency

D. Partial functional dependency

27._____refers to the correctness and completeness of the data in a database?

A. Data security B. Data integrity

C. Data constraint D. Data independence


28. Which type of file is easiest to update?

A. Sequential

C. Indexed D. Clustered

B. Hashed

29. In an SQL statement, which of the following parts states the conditions for row

A. Select B. From

C. Ordered by

30. Which attribute type can be further subdivided to yield additional attributes.

D. Where

A. Composite B. Simple

C. Single valued

D. Derived

UN

ich one of the following is

A. Run-time overhead c

B. Run-time overhead o

C. The query is parsed, v

D. None

31. Which of the following statement is true about SQL?

A. It is a non-procedural language B. Is A Data Definition Language

C. Is a Data Manipulation Lang 'D. All Except A

32. Which of the following Relational Algebra operations require that both tables (or virtual tables)
involved have the exact same attribute/ data types?

A. Join, Projection, Restriction B. Multiplication and division

C. Union, intersection, Minus

D. Minus, Multiplication, intersection

33. A type of optimization which arises from the fact that all information required to select an

optimum strategy is not up to date. 'A. Heuristic optimization

C. Dynamic optimization

B. Semantic optimization

D. Static optimization
34. Suppose we have a transaction that is intended to transfer money from one bank account to
another and the programmer makes an error in the transaction logic and debits one account but
credits the wrong account by 55,000 br. Which kind of problem can occur?

A. Incorrect analysis problem B. B. Multiple update problem

C. Un committed dependency problem

D. Inconsistency problem

35. In order to re-correct the above problem (Qn. 34) by a new transaction which type of lock

must be acquired?

A. Read Lock B. Write Lock

C. Read and Write Lock

D. No lock required

36. In the case given above (Qn. 34) which type of transactional property is being violated?

A. Atomicity

C. Durability

B. Consistency

D. A and B

37. An apparently successfully completed update operation by one user can be overridden by

another user such a problem is known as A. Lost update problem B. Multiple update problem

C. Un committed dependency problem

D. A and B

38. Which one of the following is not among the four phases of query processing.

A. Execution

B. Optimization

C. Code generation

D. None

39.Which one of the following is not true about Static Query optimization?

A. Run-time overhead of query processing is eliminated.


B. Run-time overhead of query processing will be lower.

C. The query is parsed, validated, and optimized once.

D. None
40.relies on the user's understanding of both the underlying database schema and the distribution of
the data stored within the table.

A. Heuristic optimization B. Syntactical optimization

C. Systematic Optimization D. Cost based optimization

41. The cost of executing a query includes all of the following except one.

A. Computation cost

C. Communication cost

B. Memory usage cost

D. None

42. A problem that occur when a transaction reads several values from the database but a second

transaction updates some of them during the execution of the first is

A. Incorrect analysis problem B. Multiple update problem

C. Un committed dependency problem

D. Inconsistency problem

43. The order of a transaction is important if and only if: A. Two transactions are only read a data
item

B. When two transactions either read or write completely separate data item

C. If one transaction writes a data item and another reads the same data item

D. All

44. When the transaction has done all its normal execution time and the database is being restored
to the consistent state prior to the start of the transaction.

A. Un committed transaction B. Failed transaction

C. Aborted transaction D. Committed transaction

45. Among the following one is to find non-serial schedules that allow transactions to execute
concurrently without interfering with one another and there by producing a database state.

A. Recoverability

C. Serializability D. Schedule

B. Recoverable schedule

46.____is the assumption that in a data modification attack, unauthorized party in the network
intercepts data in transit and changes part of the data item before retransmitting it.

A. Data Tampering

B. Modification Attack

C. Theft D. All
47. Which of the following replacement strategy could be used to enforce transact

their effect and leave a space in the buffer?

A. Force policy B. LIFO

C. LRU

D. A &C

one or more computers

system.

57.

48. A synchronization point in between the database and the transaction log file is known as

A. Execution point

C. Optimization point

'B. Check point

D. None

49. The cost of processing a query is usually dominated by

A. The number of Query

B. Execution time

C. The number of users "D. All

50.

is the process of transforming a query written in a high level language in to a correct and efficient
execution strategy expressed in low-level language and execute it and retrieve the required data.

A. Transforming Query B. Query Optimization

C. Query Processing D. Query by example

51. In reality, multiple transactions are executed concurrently by the database system, but the
system guarantees that each transaction is unaware of other transactions executing concurrently

in the system.

A. Atomicity B. Consistency

'C. Isolation

D. Durability

52. All Operations of the transaction are reflected properly in the database system or none.

A. Isolation

C. Consistency
B. ACID property

D. None

53. When the transaction has rolled back and the database is being restored to the consistent state
prior to the start of the transaction.

A. Un committed transaction

C. Aborted transaction

B. Failed transaction

D. Committed transaction

54.

is the size of the data item chosen as the unit of protection by a concurrency control program.

A. Dead lock B. Growing phase

C. Granularity X

D. Recoverability

55.

access control is the ability to hide portions of the database, so that access to the data doesn't
become an all-or-nothing proposition.

A. Integrity

B. Secured storage

C. Procedural

D. Granular

56. database systems have been used in a variety of application domains including scientific
modeling, financial analysis, decision support, language analysis, parsing, and various applications of
bill-of-materials and path problems.

A. Parallel databases B. Multidimensional databases

C. Deductive database

57.

D. Spatial database

system is the one in which both data and transaction processing are divided between one or more
computers connected by a network, each computer playing a specific role in the

system.

A. Active systems

B. Parallel systems
C. Multimedia systems

D. Distributed systems

58. Which one of the following operator of the relational algebra is considered as unary operator? A.
Cartesian product

B. Set Difference

C. Projection D. A &B

59. Data are not altered on the database system by unauthorized user is

A. Integrity

C. Isolation

B. Consistency

D. Durability

60. Which one of the following indicates the assumptions of the optimists view about concurrent

execution? A. Conflict among transactions occurs always

B. No conflict at all

C. Conflict occurs rarely

D. All

You might also like