DBMS Bits-2
DBMS Bits-2
A Committed
B. Aborted
C. Rolled back
D. Failed
A. Commit
B. Atomic
C. Flashback
D. Retain
3. In order to undo the work of transaction after last commit which one should be used ?
A. View
B. Commit
C. Rollback
D. Flashback
Atomicity
Inconsistency
Isolation
Durability
8. The scheme that controls the interaction between executing transactions is called as _____
a) Concurrency control scheme
b) Multiprogramming scheme
c) Serialization scheme
d) Schedule scheme
10. A transaction that has not been completed successfully is called as _______
a) Compensating transaction
b) Aborted transaction
c) Active transaction
a) Recovery system
b) Atomic system
d) Compiler system
a) Atomicity
b) Consistency
c) Durability
16. The set of ________ in a precedence graph consists of all the transactions participating in
the schedule
a) Vertices
b) Edges
c) Directions
d) None of the mentioned
17. A ___________of the transactions can be obtained by finding a linear order consistent with
the partial order of the precedence graph.
a) Serializability order
b) Direction graph
c) Precedence graph
d) Scheduling scheme
18. State true or false: If I = read(Q) and J = read(Q) then the order of I and J does not matter.
a) True
b) False
22. If a transaction has obtained a __________ lock, it can read but cannot write on the item
a) Shared mode
b) Exclusive mode
c) Read only mode
d) Write only mode
23. A transaction can proceed only after the concurrency control manager ________ the lock to
the transaction
a) Grants
b) Requests
c) Allocates
d) None of the mentioned
24. If a transaction can be granted a lock on an item immediately in spite of the presence of
another mode, then the two modes are said to be ________
a) Concurrent
b) Equivalent
c) Compatible
d) Executable
25. State true or false: It is not necessarily desirable for a transaction to unlock a data item
immediately after its final access
a) True
b) False
26. The situation where no transaction can proceed with normal execution is known as
________
a) Road block
b) Deadlock
c) Execution halt
d) Abortion
27. The protocol that indicates when a transaction may lock and unlock each of the data items is
called as __________
a) Locking protocol
b) Unlocking protocol
c) Granting protocol
d) Conflict protocol
28. If a transaction Ti may never make progress, then the transaction is said to be ____________
a) Deadlocked
b) Starved
c) Committed
d) Rolled back
29. If a transaction may obtain locks but may not release any locks then it is in _______ phase
a) Growing phase
b) Shrinking phase
c) Deadlock phase
d) Starved phase
36. A ________ ensures that any conflicting read and write operations are executed in
timestamp order
a) Organizational protocol
b) Timestamp ordering protocol
c) Timestamp execution protocol
d) 802-11 protocol
37. State true or false: The Thomas write rule has a greater potential concurrency than the
timestamp ordering protocol
a) True
b) False
38. In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and
TS(Ti)<W-timestamp(Q), then
a) Read operation is executed
b) Read operation is rejected
c) Write operation is executed
d) Write operation is rejected
39. The _________ requires each transaction executes in two or three different phases in its
lifetime
a) Validation protocol
b) Timestamp protocol
c) Deadlock protocol
d) View protocol
40. During the _________ phase the validation test is applied to the transaction
a) Read phase
b) Validation phase
c) Write phase
d) None of the mentioned
41 Which of the following timestamps is used to record the time when a transaction has finished
its read phase?
a) Start(i)
b) Validation(i)
c) Finish(i)
d) Write(i)
42. State true or false: We determine the serializability order of validation protocol by the
validation ordering technique
True
b) False
1. If the database modifications occur while the transaction is still active, the transaction is said
to use the __________ modification technique
a) Deferred
b) Immediate
c) More than one of the mentioned
d) None of the mentioned
13. ARIES uses a ___________ to identify log records, and stores it in database pages.
a. Log sequence
number
b. Log number
c. Lock number
d. Sequence
13. _____________ is used to minimize unnecessary redos during recovery.
Dirty page table
b. Page table
c. Dirty redo
d. All of the mentioned
14. __________ scheme that records only information about dirty pages and associated information
and does not even require of writing dirty pages to disk.
Fuzzy
logic
b. Checkpoints
c. Fuzzy-checkpoint
d. Logical checkpoint
15. Whenever an update operation occurs on a page, the operation stores the LSN of its log record
in the _______ field of the page.
LS
b. ReadLSN
c. PageLSN
d. RedoLSN
16. There are special redo-only log records generated during transaction rollback, called
_________ in ARIES.
a) Compensation log records
b) Read log records
c) Page log records
d) Redo log records
17. __________ starts from a position determined during analysis, and performs a redo,
repeating history, to bring the database to a state it was in before the crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned
18. Remote backup system must be _________ with the primary site.
a) Synchronised
b) Separated
c) Connected
d) Detached but related
20. A transaction commits as soon as its commit log record is written to stable storage at the
primary site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe
21. A transaction commits as soon as its commit log record is written to stable storage at the
primary and the backup site. This is
a) One Safe
b) Two Safe
c) Two-very Safe
d) Very Safe
a. Delete
b. Update
c. Sort Key
d. Index
31. The queries used to find all records with search key values in a particular range are known as
________
a) Gap queries
b) Graph queries
c) Range queries
d) None of the mentioned
32. Statement 1: Insertion of record might require the change in position of the initial nodes.
Statement 2: Deletion of records might require the change in position of the initial nodes.
a) Both the statements are true
b) Statement 1 is true but statement 2 is false
c) Statement 2 is true but statement 1 is false
d) Both the statements are false
33. In a __________ , we obtain the address of the disk block containing a desired record
directly by computing a function on the search key value of the record
a) Hash file organization
b) Hash index organization
c) Hashing address
d) None of the mentioned
36. The space overhead in dynamic hashing is ________ than that of static hashing
a) More
b) Less
c) Equal
d) None of the mentioned
37. Hash structures are not the best choice for which of the following?
a) A search key on which individual point queries are likely
b) A search key which is invalid
c) A search key on which range queries are likely
d) A search key on which multi-level queries are likely
Cluster 3&4
Because of the calculus expression, the relational calculus is considered as
A. Procedural Language B. Non- Procedural Language
C. Structural Language D. Functional Language.
Find the ID, name, dept name, salary for instructors whose salary is greater than 80,000 .
a) {t | t ε instructor ∧ t[salary] > 80000}
b) Э t ∈ r (Q(t))
c) {t | Э s ε instructor (t[ID] = s[ID]∧ s[salary] > 80000)}
d) None
which of the following uses a domain variable that can on values from an attribute domain ,rathaer that
values for an entire tuple.?
A) Tuple Relational Calculus
B) Domain relational Calculus
C) Relational algebra
D) Tuple Algebra
Query By Example is based on _____________
A) Relational algebra
B) Tuple Relational Calculus
C)Domain Relational Calculus
D) NONE of the above
The value of the atom which evaluates either condition is 'True' or 'False' for particular combination of
tuples is classified as
A) Insertion value
B) union value
C) Truth value
D) deny value
The types of Quantifiers are
A) universal Quantifiers
B) Existential quamtifier
C) Local quantifiers
D) both a and b
The expression used in relational calculus to specify request of retrieval is clasified as
A) declarative expression
B) procedural expression
C) structural expression
D) functional expression
which of the following statement is 'True' to find the names of sailors whoose age is lessthan 60
A) select snames from sailors where age <60
B) select snames from sailors where age is <60
C) select snames from sailors where age lessthan 60
D)NONE
Consider a “CUSTOMERS” database table having a column “CITY” filled with all the names of Indian
cities (in capital letters). The SQL statement that finds all cities that have “GAR” somewhere in its
name, is:
A) Select * from customers where city = ‘%GAR%’;
B) Select * from customers where city = ‘$GAR$’;
C) Select * from customers where city like ‘%GAR%’;
D) Select * from customers where city as ‘%GAR’;
Which statement is used to get all data from the student table whose name starts with p?
A. SELECT * FROM student WHERE name LIKE '%p%';
B. SELECT * FROM student WHERE name LIKE 'p%';
C. SELECT * FROM student WHERE name LIKE '_p%';
D. SELECT * FROM student WHERE name LIKE '%p';
Which type of JOIN is used to returns rows that do not have matching values?
A. Natural JOIN
B. Outer JOIN
C. EQUI JOIN
D. All of the above
A sub query is the form of a select statement enclosed in paranthesis. It can't have
A) an order by clause
B) a union clause
C) Both
D) none
A natural join eliminates the redundant column data in the results set that an equi join produces
A) 'True' B) 'False'
An outer join can be done between
A) only two tables
B) only three tables
C) any number of tables
D) None
which of the following is 'True'
I. The WHERE clause searches the rows after they are grouped by using 'GROUP BY ' Clause
II. The GROUP BY clause collects rows that met the WHERE clause search conditions and
places those rows into a group for each unique value in the GROUP BY clause.
III.Omitting the GROUP BY clause creates a single roup for the whole table.
A) I & II are 'True' B) I & III are 'True'
C) II & III are 'True' D) All are 'True'
SELECT COUNT('Constatnt Value') From employees
A) return the number of rows in employees
B) return '0'(ZERO)
C) return '1'(ONE)
D) return number of rows which have the constant value
SELECT first_name, last_name FROM customer EXCEPT
SELECT first_name, last_name FROm employees
A) Lists all the customers that are employees
B) Lists all employees that are customers
C) List all the customers
D) Lists all the customers that are not also employees
Consider a schema R(A,B,C,D) and functional dependencies A->B and C->D. Then the
decomposition of R into R1(AB) and R2(CD) is
A. dependency preserving and lossless join
B. lossless join but not dependency preserving
C. dependency preserving but not lossless join
D. not dependency preserving and not lossless join
The set of attributes X will be fully functionally dependent on the set of attributes Y if the
following conditions are satisfied.
A). X is functionally dependent on Y
B). X is not functionally dependent on any subset of Y
C). Both (A) and (B)
D). None of these
Suppose the following functional dependencies hold on a relation U with attributes P,Q,R,S, and
T:
P -> QR
RS -> T
Which of the following functional dependencies can not be inferred from the above functional
dependencies?
A. PS -> T
B. R -> T
C. P -> R
D. PS -> Q
Let R = ABCDE is a relational scheme with functional dependency set F = {A -> B, B -> C, AC ->
D}. The attribute closures of A and E are
A. ABCD, φ
B. ABCD, E
C. Φ, φ
D. ABC, E
Which of the following FD can’t be implied from FD set: {A->B, A->BC, C->D} ?
A. A->C
B. B->D
C. BC->D
D. All of the above
Let x, y, z, a, b, c be the attributes of an entity set E. If {x}, {x,y}, {a,b}, {a,b,c}, {x,y,z} are
superkeys then which of the following are the candidate keys?
A. {x,y} and {a,b}
B. {x} and {a,b}
C. {x,y,z} and {a,b,c}
D. {z} and {c}
Which of the following is not Armstrong’s Axiom?
a) Reflexivity rule
b) Transitivity rule
c) Pseudotransitivity rule
d) Augmentation rule
A -> B
B -> C
BC -> A
A -> D
E -> A
D -> E
Which of the following is not a key?
a) A
b) E
c) B, C
d) D
There are two functional dependencies with the same set of attributes on the left side of the
arrow:
A->BC
A->B
This can be combined as
a) A->BC
b) A->B
c) B->C
d) None of the mentioned
What are the desirable properties of a decomposition
a) Partition constraint
b) Dependency preservation
c) Redundancy
d) Security
___________ are the anomalies caused by redundancy
A)updation, insertion anomalies
B) deletion and update anomalies
C) only insertion anomaly
D) updation, insertion and deletion anomalies\
In the Reflexive rule, the 'True' dependecies generated are classified as
A)trivial
B) non trivial
C) inferntial
D) functional
The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is
A) 5
B) 6
C)7
D)8
Consider a relational table R that is in 3NF, but not in BCNF. Which one of the following
statements is 'True' ?
(A) R has a nontrivial functional dependency X→A, where X is not a superkey and A is a prime
attribute
(B) R has a nontrivial functional dependency X→A, where X is not a superkey and A is a non-
prime attribute and X is not a proper subset of any key
(C) R has a nontrivial functional dependency X→A, where X is not a superkey and A is a non-
prime attribute and X is a proper subset of some key
(D) A cell in R holds a set instead of an atomic value
Select the ''False'' statement from the following statements about Normal Forms:
A. Lossless preserving decomposition into 3NF is always possible
B. Lossless preserving decomposition into BCNF is always possible
C. Any Relation with two attributes is in BCNF
D. BCNF is stronger than 3NF
The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because:
A. Non_key attribute V_name is dependent on V_no which is part of composite key
B. Non_key attribute V_name is dependent on Qty_sup
C. Key attribute Qty_sup is dependent on primary_key unit price
D. Key attribute V_ord_no is dependent on primary_key unit price
The best normal form of relation scheme R(A, B, C, D) along with the set of functional
dependencies F = {AB → C, AB → D, C → A, D → B} is
A. Boyce-Codd Normal form
B. Third Normal form
C. Second Normal form
D. First Normal form
Which normal form is considered adequate for normal relational database design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
In RDBMS, different classes of relations are created using __________ technique to prevent
modification anomalies.
A. Functional Dependencies
B. Data integrity
C. Referential integrity
D. Normal Forms
A table has fields Fl, F2, F3, F4, F5 with the following functional dependencies F1 -> F3 , F2->
F4, (F1 F2) ->F5. In terms of Normalization, this table is in
A. 1 NF
B. 2 NF
C. 3 NF
D. none
The normal form which satisfies multivalued dependencies and which is in BCNF is
a) 4 NF
b) 3 NF
c) 2 NF
d) All of the mentioned
Which of the following is a tuple-generating dependencies?
a) Functional dependency
b) Equality-generating dependencies
c) Multivalued dependencies
d) Non-functional dependency