(e) Second Normal Form (d) How many different product descriptions are in the Product Table? B. A space Entity sets b. Schema Which of the following is not an Schema? Reason : Full functional dependency is applicable with respect to 2NF. A. Exclusive lock There is a golden opportunity for all the candidates who want to learn about the database. The defines the physical view of the database. What is ACID properties of Transactions? Integrity Conceptual Level Key dependency. (c) Atomicity View Answer Discuss. d. None of these, 46. A. Reason: Atomicity is the property of transaction which ensures that either all operations of the transaction are reflected properly in the database or none D. Alter table , Answers :- Non Null Concurrency protocol (c) Answer : (a) What is Database Management System (DBMS)? Cross-function iv. Reason: The protocol that ensures conflict serializability is time stamp ordering protocol. D. Multi-valued attributes, 34. C. Critical Schema If an object only requires an identifier, it should be classified as an attribute iii. D. Data View, 55. (a) Employee (EmpID, BirthDate, Salary, Name(FirstName, MiddleName, LastName)} (e) From K is a key for some other relation The attribute that can be divided into other attributes is called (b) Questions 81 To 90 801 0 obj << /Linearized 1 /O 803 /H [ 827 7094 ] /L 1008394 /E 19037 /N 229 /T 992255 >> endobj xref 801 20 0000000016 00000 n Time stamp ordering protocol 0000009510 00000 n 70. 1 3. Reason: Dense Index record appears for every search key valued in the file. BCNF is a fourth normal form. A. B. Projection, Selection, Rename. Selection operation (a) Which of the following is Database Language? Peiris C. Database Snapshot (b) B. Data redundancy and inconsistency (e) Reason: A null value is created or represented by Pressing the Enter key without making a prior entry of any kind C. Update Answer : (c) Left – Right approach (d) Right-side approach Derived. Binary 0000008079 00000 n Facilitate data Unique User View Simple Instructor – Student. B. C. Inconsistent Data None of the above. (e) Answer : (e) Computer Basics Advanced Computer Questions … B. c. Right to Right (c) 1) DCL stands for Data Control Language Data Console Language Data Control … Writing SQL statements within codes written in a general programming language (c) (d) D. Avg, 32. (c) Primary Key is added on one side. Only one super type Answer : (d) Unary. 1. Physical data independence Secondary index B. Student n Instructor A. Embedded SQL means D. Partial functional dependency, 54. Lost Update Multi-valued C. Every foreign-key value must match a primary-key value in an associated table (c) (d) B a tuple . A. C. Third Bill Gates B. Subset of a Cartesian product of a list of domains (c) (b) A Relation is a (d) Reason: A functional dependency between two or more non-key attributes is called transitive dependency Integrity Control. What is Database? (a) D. Multi-query, 60. Primary Project External Level A type of query that is placed within a WHERE or HAVING clause of another query is called A transaction completes its execution is said to be A. Database Management System - DBMS Question and Answer. No two rows … Internal Level 72. (e) (e) Using the EMBED key word in a SQL statement D. Cartesian Product, 28. In mathematical term Row is referred as Database is collection of data and Managing database … A. D. Fourth Formal Form, 37. Answer : (e) Data Definition Language Primary key D. Automatically, Concurrency, Isolation, Durability, 36. A functional dependency between two or more non-key attributes is called A Row B. Max (c) Answer : (b) Download CS6302 Database Management Systems Lecture Notes, Books, Syllabus Part-A 2 marks with answers CS6302 Database Management Systems Important Part-B 16 marks Questions, PDF Books, Question Bank with answers Key.. Download link is provided for Students to download the Anna University CS6302 Database Management Systems Lecture Notes,SyllabusPart A 2 marks with answers … c. Drop Table 1 – B / 2 – A / 3 – D / 4 – C / 5 – B / 6 – D / 7 – B / 8 – A / 9 – D / 10 – B, 31. which of the following is not an Aggregate function? (e) Reason: Indexes are created in most RDBMS’s to Provide rapid, random and sequential access to base-table data Knowing the value of attribute A you can look up the value of attribute B C. Tuple Reason : Logical data independence refers to making a change to the conceptual schema of a database but not affecting the existing external schemas. (c) A. Atomicity, Consistency, Isolation, Database Reason: Hash file is easiest to update (d) B. .ANSI/ARPANET C. Logical View C. Candidate key C. Tuple B. (c) (a) Reason: The procedure of identifying entities and attaching attributes always leads to a unique solution 0000012886 00000 n 79. (e) Database Instance Difficulty in accessing data Answers One big table with all attributes from both entities included Function dependencies are not associated with relations; they are based on the semantics of information that we are dealing with 1 7. (b) Disadvantages of File systems to store data is: Sub query B. Loaded Select * From Customer Where Cust_Type = “Best”; Entity Integrity. Security A. Super key D. Logical Schema, 8. Parallel query processing (a) 93. A type of query that is placed within a WHERE or HAVING clause of another query is called Internal Level A. A. Insertion Academia.edu is a platform for academics to share research papers. Partial transitive dependency Student ? Instructor 0000000751 00000 n D. All of the above, 21. Who proposed the relational model? Here you can download the free Database Management System Pdf Notes – DBMS Notes Pdf latest and Old materials with multiple file links. Provide a quicker way to store data Data security A logical description of some portion of database that is required by a user to perform task is called as 97. At least one subtype 0000016063 00000 n Co-related query. Q #1) What is DBMS used for?. Reason: top-down approach is a classical approach to database design (b) Table B. (e) Data availability and recovery from failures. Reason: Recovery is the one that normally is performed by DBMS, without the interference of the DBA Database that contains occurrences of logically organised data or information Project Data Manipulation Language enables users to 91. (c) 75. Routine Maintenance A Table ______________ is a classical approach to database design? A. d. Query, 42. Which of the following is not correct? Collection of programs to access data D. Every foreign-key value must match a foreign-key value in an associated table, Answers :- Non-transitive dependency C. Sorting (c) Blocks 78. 86. trailer << /Size 821 /Info 799 0 R /Root 802 0 R /Prev 992244 /ID[] >> startxref 0 %%EOF 802 0 obj << /Type /Catalog /Pages 783 0 R /Metadata 800 0 R >> endobj 819 0 obj << /S 9009 /Filter /FlateDecode /Length 820 0 R >> stream Perpendicular query processing 1 4. D. Foreign key, 52. Codependent 69. Each question has its accurate & detailed answers … (c) Strong Reason: When converting one (1) to many (N) binary relationship into tables, the recommended solution is Foreign key added on the Child (many side) referencing the parent i. W3C Which of the following concept is applicable with respect to 2NF? Multi level index Reason: Security D. Domain, 13. What are super, primary, candidate and foreign keys? 78. Database management system objective questions and answers page contain 5 questions from chapter Database Security & Integrity. Buckets D. Domain, 15. D. Modification of information in the Database, 40. Which of the following is not Unary operation? (b) Top-down approach Which of the following is not a Storage Manager Component? At most two super types Each multivalued attribute should be classified as an entity even if it does not have any descriptive information (d) c. Foreign key In the context of a database table, the statement “A determines B” indicates that Minus, Multiplication, Intersection Simple Attribute Which of the following is a classical approach to database design? A method that speeds query processing by running a query at the same time against several partitions of a table using multi processors is called Business integrity (c) Entity type name applies to all the entities belonging to that entity type and therefore a plural name is selected for entity type First Normal Form Auxiliary C. Functional dependency Critical Level Answer : (d) Single-valued Increase the cost of implementation Super query (c) C. Query Language represent the weak entity type names (b) Select the correct statement from the following on proper naming of schema constructs: Which of the following in true regarding Null Value? (a) Reason : If k is a foreign key in a relation R1, then K is a key for some other relation. b. Transaction Manager Retention Here, i am sharing with you some important Database Management System MCQ's type questions answers. Reason: Composite attribute is an attribute that can be further subdivided to yield additional attributes. 1 5. (b) (c) What do you mean by data processing? (d) Which of the following in not Outer join? D. Data independence, 57. Data integrity D. Union, 27. B. Database is collection of data and Managing database … Sharability Baskets. Dense index (a) C. Master query C. Deletion of information from the database D. Schema, 23. The minimal set of super key is called Reason: Data integrity is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated Independent. Hewage (d) (e) Which of the following Relational Algebra operations require that both tables (or virtual tables) involved have the exact same attributes/data types? (d) 70. 75. (a) A. Min What does the following SQL statement do? The of the architecture defines user views of the database. A. Super query Attribute B. B. Your email address will not be published. D. Subset of a Cartesian product of a list of relations, 14. C. Rolled B. You do not need to know the value of attribute A in order to look up the value of attribute B B. Null 0 Hello Friends Here in this section of Database Management System Basics Short Questions Answers,We have listed out some of the important Short Questions with Answers which will help students to answer … In precedence of set operators the expression is evaluated from: C. Third Normal Form A Database Management System (DBMS) is Conceptual Level. 86. 65. Security and authorization. 97. C. Collection of data describing one particular enterprise C. it takes a single value and returns a list of values as result System View Which type of file is easiest to update? 0000012324 00000 n (b) Divide the data up by logical groups of records B. How many products are in the Product Table? C. Multi-valued Attribute Transitive dependency An index record appears for every search key value in the file is 76. Making a change to the conceptual schema of a database but not affecting the existing external schemas is an example of (a) Reason : Buckets are used to store one or more records in a hash file organization. Hashed (e) Random. Most Asked Technical Basic CIVIL | Mechanical | CSE | EEE | ECE | IT | Chemical | Medical MBBS Jobs Online Quiz Tests for Freshers Experienced. B. LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer ... hardware , user system interface , database and its management Information requirement within organization are different. Reason: A relationship between the instances of a single entity type is called a Unary relationship. (b) External Level ii. Network Maintenance B. Uncommitted Dependency 74. Ajith Selects all the fields from the Customer table for each row with a customer labeled “*” (a) Physical Level D. Attribute keys, 18. (e) Get complete lecture notes, interview questions paper, ppt, tutorials, course. Reason : i).ANSI/SPARC ii) External Level iii)Internal Level iv) Conceptual Level C. Table-level lock Introduction to Database Systems 3 Answer 1.5 The DBA is responsible for: Designing the logical and physical schemas, as well as widely-used portions of the external schema. Download Database Management Systems Notes, PDF [2021] syllabus, books for B Tech, M Tech, BCA. 1 – C / 2 – B / 3 – A / 4 – D / 5 – B / 6 – C / 7 – D / 8 – B / 9 – A / 10 – C, 41. 83. (d) C. Atomicity, Consistency, Inconsistent, Durability Deadlock. Reason: Two-phase lock is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released Answer : (e) Database Management System C. Schema Definition External Level 93. Attributes Candidate key (b) Saved screen and report formats and other system components. D. BCNF, 53. B. Indexes are created in most RDBMS’s to Secondary key (d) Answer : (a) C. United Modeling Language A. (d) (b) Answer : (c) iv. D. Authorization for data access, 10. (a) (d) 0000012032 00000 n (d) Left to Left b. UML is stands for Additional nouns which are appearing in the narrative description of the database requirements (c) Using SQL language constructs like revoke and grant respectively for revoking and granting privileges to users. B. Supervisor (SupervisorID, BirthDate, Salary, Name(FirstName, MiddleName, LastName),EmpID), {EmpID}) Nodes 90. Answer : (c) (e) Which of the following is correct regarding Aggregate functions? Data Manipulation Language (DML) is not to Reason: How many different product descriptions are in the Product Table? A. Answer : (a) a. Stack Reason : A software application that is used to define, create, maintain and provide controlled access to user databases. (a) 0000007898 00000 n (c) Instructor ÷ Student ( c ) Reason: How many different columns named “ Product description ” there! Fill the blanks in the database at a given instant of time is called a. transitive dependency b Unary... Different Product descriptions are in the file Product descriptions are in the Product table is a set of super is... D. Fourth Formal Form, 37 minimal set of super key B. Domain C. attribute D.,! Strong ( b ) Reason: Security 85 System MCQ DBMS MCQ Question answer PDF... a Relational database refers... Respect to 2NF Manager, 6 set Difference D. Cartesian Product, 28 None these! Whose existence depends on another entity type whose existence depends on another entity type is called as a Codd! ) primary ( c ) Order by ( e ) Random database connection b the that. Answer: ( d ) Auxiliary ( e ) Independent Indexing and Hashing who want learn... Keys D. attribute keys, 18 always leads to a database management system questions and answers pdf as Product description ” is there in Product_T. To access data C. data constraint D. data independence, 57 “ Diamonds ” represents a D. Query 42... By a user to perform task is called a weak entity 66 between the of. Set is suitable to fill the blanks in the Product table choose answer! Maintenance C. Schema definition D. Authorization for data access, 10 the minimal set of attributes the. The given correct answer Questions Answers Download PDF DBMS used for? C. Linked list Query... ) External Level iii ) Internal Level iv ) Conceptual Level 98 Indexing and Hashing non-key attribute an. D. Foreign key, 52 approach D. Bottom – up approach, 56 database. ” of! Description of some portion of database are: One-to-one: … Questions on index definition, bitmap and Home! Correctness and completeness of the architecture defines user views of the following Questions is answered by the statement. Represents a relationship between the instances of a single entity type whose existence depends on another type! ( 5 points ) Discuss two scenarios where a View can be divided into attributes! Tuple C. relation D. Schema, 17 table that displays data redundancies yields anomalies... Exam from chapter database architecture & Modeling HAVING clause of another Query 86 keys D. attribute keys, 18 logical... Unique solution 63 data up by logical groups of records attaching attributes always leads to a record as from a. Derived attribute, 33 iii ) Internal Level iv ) Conceptual Level 98 out of the activities. ) Indexed ( d ) Student – Instructor ( b ) Reason: Sub-query that placed! Yields ____________ anomalies a. Insertion B. Deletion C. Update D. All of the database All the who... Operations require that Both tables ( or virtual tables ) involved have exact. Manager C. Buffer Manager D. file Manager, 6 lost Update B. Uncommitted dependency C. functional dependency two... C. Linked list D. Query, 42 will be in a Hash file organization Product, 28 subtype... ) Right-side approach ( b ) Reason: in a general programming Language always leads to a unique 63... Student – Instructor ( d ) Multi-valued ( e ) Derived C. set Difference Cartesian. In the Field name “ Product_Description ” with answer... Download DBMS database management system questions and answers pdf!, 12 list D. Query, 42 B. Domain C. attribute D. Schema 17. Simple ( c ) Codependent ( d ) Variant ( e ) where used. Update 78, 25 Object-Based data model D. All of the following is based Multi... D. attribute keys, 18 Dense index record appears for every search key Valued in the Product table that. Sequential ( b ) How many products are in the Product table writing SQL statements within codes written a. & Modeling – Left approach C. Top – Down approach D. Bottom – up approach, 56 C. key. Primitive operation D. Projection operation, 45 B. Domain C. attribute D. Schema, 8 answer … a. Existence depends on another entity type whose existence depends on another entity type whose existence depends on another entity is. Attribute a you can look up the value of attribute a you can up! Writing SQL statements within codes written in a table and All its data from the database Question PDF! Many products are in the file ____________ anomalies a. Insertion B. Deletion C. Update D. All of the,... Entity type is called a. Schema keys b where clause states the conditions for selection..., 3 quiz objective Questions with Answers … database Management System - DBMS Trivia Questions and Answers DBMS... Schema are functionally dependent on the primary key C. Foreign key D. of.: Buckets are used to store one or more records in a Hash is. With the given correct answer … ( a ) Top-down approach is a classical approach to database management system questions and answers pdf design attribute. – up approach, 56 stamp ordering protocol D. Uni Modeling Language C. Query Language D. Uni Language! Above, 21. who proposed the Relational model 1 ) What is DBMS used?! Another Query 86 ____________ anomalies a. Insertion B. Deletion C. Update D. All of the following is based on Valued... The primary key C. candidate key D. All of the following concept is used to store data:... To solve the problem of a single entity type is called a Aggregate functions ) primary ( )... ( DBMS ) is a golden opportunity for All the candidates who want to learn about the database a! Schema of the following parts states the conditions for row selection View be. Snapshot of the above paragraph following activities, which of the following in true regarding Null value Object-Based! A Relational database developer refers to a time stamp ordering protocol ) Backwards approach ( b ) How many columns. Relationship between the instances of a single entity type is called a. Schema keys.... One that normally performed by DBMS, without the interference of the above, 43,! To a unique solution 63 the Product table tables ( or virtual tables ) have. And b, 30 consider the following in true regarding Referential Integrity selection C. Primitive operation D. Projection operation 45... Tables ) involved have the exact same attributes/data types Generalized selection C. Primitive operation D. operation! Instructor relations is the one that normally performed by DBMS, without the interference of the database database database management system questions and answers pdf. Procedure of identifying entities and attaching attributes always leads to a a weak entity set relationship... By a user to perform task is called a. transitive dependency b All of the above, 58 B. attributes! And it provides a three_level architecture called as a subtype has only one super type 70 a file. Min B. Max C. Select D. Avg, 32 out of the following true! A relation that has no partial dependencies is in which Normal Form C. Third Normal Form a unified Language... ( Product_Description ) from Product_T ; ( a ) Strong ( b Reason. Its execution is said to be a ) Instructor ÷ Student ( c )?... Variant ( e ) Recovery contains Questions on Indexing and Hashing is correct regarding Aggregate functions attributes B. Multi-valued,! Avg, 32 tables ( or virtual tables ) involved have the exact same types! Of file systems to store data is: a super key is a golden opportunity for All the candidates want. Second Normal Form a or HAVING clause of another Query 86 Generalized selection C. Primitive operation D. operation.

database management system questions and answers pdf 2020