UNITY UNIVERSITY
: FUNDAMENTALS OF DATABASE MANAGEMENT SYSTEMS
______refers to the protection of data against accidental or intentional disclosure to
unauthorized persons, unauthorized modifications, or destruction.
A. Consistency B. Data Security
C. Accuracy D. Reliability
2. By databases, we mean the unification of several otherwise distinct data files
with any redundancy among those files partially or wholly eliminated
A. Consistent B. Duplicate
C. Integrated
3. A database is implemented through three general levels: internal, and external so as to
cater to the needs of its user.
D. None of the above
A. Physical
B. Logical
C. Conceptual
D. All of the above
4. A is a virtual table that does not really exist in its own right out is instead derived from one or
more underlying base tables,
A. Table
C. Logical vies D. View
B. Structure Schema
5. Within given relations, a set of one or more attributes having values that are uniquely within the
relationship and thus are able to uniquely identify that tuple is said to be the relation. __key of the
A. Foreign
C. Primary
D. Candidate
B. Candidate
_____is a system of rules that a DBMS uses to ensure that relationship between records in related
tables are valid and that users don't accidentally delete or change related data.
A. Referential Integrity B. Reference Integrity
C. Differential Integrity D. aone of the above
7. A is binary operation that allow us to combine certain selections and a Cartesian product
into one operation.
A. Natural B. Join
C. equi Join
D. All of the above
8. BCNF stands for
A. Basic Communicate Normal Form B. Binary Code Normal Form
C. Boyce-Codd Normal Form
D. All are correct
9. When the table is in the first normal form then data is in two-dimensional forms
A True
B. False
10. The database administration function includes
A. Application programming
B. Computer operations management
C. Database access planning
D. All of the above
11. The basic component of a file in a file system is a
A. Data item B. Field
C. Record
D. Tuple X
12. Database Management System is a____ system to facilitate the creation and maintenance of a
computerized database.
A. Physical B. Software
C. Hardware D. Knowledge
13. The E-R data model is based on a perception of the real world that consists of a set of basic
objects called
A. Classes
C. Objects
B. Entities
D. Attributes
14. The level is at the highest level of database abstraction where only those portions of the
database of concern to a user or application program are included.
A. External
C. Internal D. Physical
B. Conceptual
15. At level of database abstraction, all the database entities and the relationships among
them are included.
A. Physical B. Conceptual
C. External D. Internal
16. In data model, the objects are represented by record structures grouped in file structures.
A. Primitive B. Classic
C. Semantic
D. Network
17. A is a collection of tuples, each of which contains values for a fixed number of attributes.
A. Association
C. Aggregation
B. Relation
D. None of the above
18. is a set of principles concerned with how data is structured.
A. Data integrity
C. Data definition
B. Data manipulation
19. Data control is the fastest among the storage devices.
A. Cache
C. Flash memory
B. Main memory
Magnetic disk _____is a collection of relations with distinct relation names.
A. Domain B. Instance
C. Schema
D. Relational database
21. The main construct for representing data in the relational model is a
A. Attribute B. Relation
C. Tuple D. Domain
22. A is a column or a set of columns that refers to a primary key in the same table or
another table.
A. Primary key B. Foreign key
C. Candidate key D. Concatenated key
23. function is used to find the total of all the values in a column.
A. SUM
B. COUNT
C. ADD D. AVG
24. In SQL, which command is used to add a column/integrity constraint to a table?
A. ADD COLUMN
C. MODIFY TABLE
B. INSERT COLUMN
D. ALTER TABLE
25. Disadvantage of File systems to store data is
A. Data redundancy and inconsistency
B. Difficulty in accessing data
C. Data isolation
D. All of the above
26. A functional dependency between two or more non-key attribute is called C. Functional
dependency
A. Transitive dependency B. Partial transitive dependency
D. Partial functional dependency
27._____refers to the correctness and completeness of the data in a database?
A. Data security B. Data integrity
C. Data constraint D. Data independence
28. Which type of file is easiest to update?
A. Sequential
C. Indexed D. Clustered
B. Hashed
29. In an SQL statement, which of the following parts states the conditions for row
A. Select B. From
C. Ordered by
30. Which attribute type can be further subdivided to yield additional attributes.
D. Where
A. Composite B. Simple
C. Single valued
D. Derived
UN
ich one of the following is
A. Run-time overhead c
B. Run-time overhead o
C. The query is parsed, v
D. None
31. Which of the following statement is true about SQL?
A. It is a non-procedural language B. Is A Data Definition Language
C. Is a Data Manipulation Lang 'D. All Except A
32. Which of the following Relational Algebra operations require that both tables (or virtual tables)
involved have the exact same attribute/ data types?
A. Join, Projection, Restriction B. Multiplication and division
C. Union, intersection, Minus
D. Minus, Multiplication, intersection
33. A type of optimization which arises from the fact that all information required to select an
optimum strategy is not up to date. 'A. Heuristic optimization
C. Dynamic optimization
B. Semantic optimization
D. Static optimization
34. Suppose we have a transaction that is intended to transfer money from one bank account to
another and the programmer makes an error in the transaction logic and debits one account but
credits the wrong account by 55,000 br. Which kind of problem can occur?
A. Incorrect analysis problem B. B. Multiple update problem
C. Un committed dependency problem
D. Inconsistency problem
35. In order to re-correct the above problem (Qn. 34) by a new transaction which type of lock
must be acquired?
A. Read Lock B. Write Lock
C. Read and Write Lock
D. No lock required
36. In the case given above (Qn. 34) which type of transactional property is being violated?
A. Atomicity
C. Durability
B. Consistency
D. A and B
37. An apparently successfully completed update operation by one user can be overridden by
another user such a problem is known as A. Lost update problem B. Multiple update problem
C. Un committed dependency problem
D. A and B
38. Which one of the following is not among the four phases of query processing.
A. Execution
B. Optimization
C. Code generation
D. None
39.Which one of the following is not true about Static Query optimization?
A. Run-time overhead of query processing is eliminated.
B. Run-time overhead of query processing will be lower.
C. The query is parsed, validated, and optimized once.
D. None
40.relies on the user's understanding of both the underlying database schema and the distribution of
the data stored within the table.
A. Heuristic optimization B. Syntactical optimization
C. Systematic Optimization D. Cost based optimization
41. The cost of executing a query includes all of the following except one.
A. Computation cost
C. Communication cost
B. Memory usage cost
D. None
42. A problem that occur when a transaction reads several values from the database but a second
transaction updates some of them during the execution of the first is
A. Incorrect analysis problem B. Multiple update problem
C. Un committed dependency problem
D. Inconsistency problem
43. The order of a transaction is important if and only if: A. Two transactions are only read a data
item
B. When two transactions either read or write completely separate data item
C. If one transaction writes a data item and another reads the same data item
D. All
44. When the transaction has done all its normal execution time and the database is being restored
to the consistent state prior to the start of the transaction.
A. Un committed transaction B. Failed transaction
C. Aborted transaction D. Committed transaction
45. Among the following one is to find non-serial schedules that allow transactions to execute
concurrently without interfering with one another and there by producing a database state.
A. Recoverability
C. Serializability D. Schedule
B. Recoverable schedule
46.____is the assumption that in a data modification attack, unauthorized party in the network
intercepts data in transit and changes part of the data item before retransmitting it.
A. Data Tampering
B. Modification Attack
C. Theft D. All
47. Which of the following replacement strategy could be used to enforce transact
their effect and leave a space in the buffer?
A. Force policy B. LIFO
C. LRU
D. A &C
one or more computers
system.
57.
48. A synchronization point in between the database and the transaction log file is known as
A. Execution point
C. Optimization point
'B. Check point
D. None
49. The cost of processing a query is usually dominated by
A. The number of Query
B. Execution time
C. The number of users "D. All
50.
is the process of transforming a query written in a high level language in to a correct and efficient
execution strategy expressed in low-level language and execute it and retrieve the required data.
A. Transforming Query B. Query Optimization
C. Query Processing D. Query by example
51. In reality, multiple transactions are executed concurrently by the database system, but the
system guarantees that each transaction is unaware of other transactions executing concurrently
in the system.
A. Atomicity B. Consistency
'C. Isolation
D. Durability
52. All Operations of the transaction are reflected properly in the database system or none.
A. Isolation
C. Consistency
B. ACID property
D. None
53. When the transaction has rolled back and the database is being restored to the consistent state
prior to the start of the transaction.
A. Un committed transaction
C. Aborted transaction
B. Failed transaction
D. Committed transaction
54.
is the size of the data item chosen as the unit of protection by a concurrency control program.
A. Dead lock B. Growing phase
C. Granularity X
D. Recoverability
55.
access control is the ability to hide portions of the database, so that access to the data doesn't
become an all-or-nothing proposition.
A. Integrity
B. Secured storage
C. Procedural
D. Granular
56. database systems have been used in a variety of application domains including scientific
modeling, financial analysis, decision support, language analysis, parsing, and various applications of
bill-of-materials and path problems.
A. Parallel databases B. Multidimensional databases
C. Deductive database
57.
D. Spatial database
system is the one in which both data and transaction processing are divided between one or more
computers connected by a network, each computer playing a specific role in the
system.
A. Active systems
B. Parallel systems
C. Multimedia systems
D. Distributed systems
58. Which one of the following operator of the relational algebra is considered as unary operator? A.
Cartesian product
B. Set Difference
C. Projection D. A &B
59. Data are not altered on the database system by unauthorized user is
A. Integrity
C. Isolation
B. Consistency
D. Durability
60. Which one of the following indicates the assumptions of the optimists view about concurrent
execution? A. Conflict among transactions occurs always
B. No conflict at all
C. Conflict occurs rarely
D. All