(c) Attribute Multi-valued (c) (d) Which of the following in not a function of DBA? (c) Internal Level (b) Answer : (e) (e) D. Data independence, 57. Which of the following is based on Multi Valued Dependency? A. A command to remove a relation from an SQL database Internal Level (a) Top-down approach (e) A. it takes a list of values and return a single values as result B. Consider the following ER diagram depicting the relationship of an employee and supervisor: What is the possible relation if the above ERD is mapped into a relational model? C. Master query The defines the physical view of the database. Second Normal Form Backwards approach (b) (e) Specifying a condition and action to be taken in case the given condition is satisfied in a trigger Reason: n relational algebra Union, Intersection, Minus operations require that both tables (or virtual tables) involved have the exact same attributes/data types. 66. iv. Reason : Full functional dependency is applicable with respect to 2NF. Left outer join Efficiency Primary key D. Charles Babbage, 22. (adsbygoogle = window.adsbygoogle || []).push({}); Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab Viva Pdf PPT Doc Book free download. (a) (c) (b) Which of the following is not correct? Security and authorization. Unary. Answer (Discuss two bene ts of views): Solution: A view is a relation de ned by a query and there are … Consider the following table obtained using Student and Instructor relations. A. The Primary key must be Concurrency protocol 78. (e) Indexed Reason: In an SQL statement where clause states the conditions for row selection Pressing the ESC key Foreign key added on the Parent (one side) referencing the child 66. C. Buffer Manager d. None of these, 46. Making a change to the conceptual schema of a database but not affecting the existing external schemas is an example of D. Multi-query, 60. A. Instructor – Student. A. C. Database Conceptual Level The various relationships of database are: One-to-one: … (e) Which of the following type of index is automatically created when we do not specify? (d) Sharability 0000012506 00000 n (e) B a tuple . Repository of meta data, which is a central storehouse for all data definitions, data relationships, iv. %PDF-1.2 %���� Atomicity Second A. B. Insertion of new information into the database A type of query that is placed within a WHERE or HAVING clause of another query is called (d) Single-valued Union, Intersection, Minus D. Fourth Formal Form, 37. Every primary-key value must match a primary-key value in an associated table Master query A method that speeds query processing by running a query at the same time against several partitions of a table using multi processors is called Layered Protocol. Security Table More Topics. C. Collection of data describing one particular enterprise iii. B. please allow to copy the contents in above. d. None, 44. External Level Lost Update (d) B. Answer : (c) Every tuple of R1 has a distinct value for K A. 80. Recovery. (b) Answer : (b) Full functional dependency A. Insertion C. Sorting Consistency 1 2. 0000007898 00000 n Data structure D. Subset of a Cartesian product of a list of relations, 14. D. File Manager, 6. (d) C. Logical View Entering a value Automated tools (CASE) used to design databases and application programs 97. Which of the following set is suitable to fill the blanks in the above paragraph? Relation 61. Reason : Logical data independence refers to making a change to the conceptual schema of a database but not affecting the existing external schemas. Database Management System – Short Question And Answer PDF If you have any Questions regarding this free Computer Science tutorials ,Short Questions and Answers,Multiple choice Questions And Answers … 84. C. Rename A. Database Snapshot C. Full outer join Correct Answer … External Level Out of the following activities, which is the one that normally performed by DBMS, without the interference of the DBA? c. Both (a) Reason: Two-phase lock is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released _____________ refers to the correctness and completeness of the data in a database? (e) A. In the context of a database table, the statement “A determines B” indicates that Answer : (c) Conceptual Level Only one super type Which of the following is correct regarding Aggregate functions? B. Left to Left Reason: Dense Index record appears for every search key valued in the file. c. Open database connection Ternary A. Binary Tree Index How many types of keys in Database Design? C. Data isolation (a) 70. Reason: Indexes are created in most RDBMS’s to Provide rapid, random and sequential access to base-table data Foreign key added on the Child (many side) referencing the parent C. Deletion of information in the Database Data security c. Foreign key 1 – B / 2 – A / 3 – D / 4 – C / 5 – B / 6 – D / 7 – B / 8 – A / 9 – D / 10 – B, 31. which of the following is not an Aggregate function? Database Management System solved MCQ sets : Database Management Short Questions to test Database concept : DBMS is the short form of Database Management System.DBMS is a collection of computer programs that helps us to create and manage database. 1 6. Reason: A relationship between the instances of a single entity type is called a Unary relationship. Additional nouns which are appearing in the narrative description of the database requirements Reason: A property or characteristic of an entity type that is of interest to the organization is called attribute Writing a SQL statement to retrieve data from more than one relation Indexes are created in most RDBMS’s to represent the weak entity type names Project Codependent Divide the data up by logical groups of records (d) None of the above. Weak entity. Attribute a. (e) Unique A. Retrieval of information stored in database Integrity Control. (c) 87. 88. Attributes Entity sets 82. Database Management System (DBMS) Questions and Answers . D. View Level, 3. (c) 0000000751 00000 n Database Schema C. Relationship sets (a) Strong A. First Home » DATABASE MANAGEMENT SYSTEM Questions » 300+ TOP Database Management System Questions and Answers, 1. A functional dependency between two or more non-key attributes is called B. Domain List some database applications. D. Database-level lock, 59. (d) B. (d) First Normal Form 0000012886 00000 n Selects all the fields from the Customer table for each row with a customer labeled “*” C. it takes a single value and returns a list of values as result Middle of the above. 90. (c) C. Critical Schema Divide the data up by logical groups of entities Cross-function BCNF is a fourth normal form. Which algebra is widely used in DBMS? (c) Here, i am sharing with you some important Database Management System MCQ's type questions answers. (c) Academia.edu is a platform for academics to share research papers. C. Weak entity set A. Authorization rule B. Conceptual Level. Writing SQL statements within codes written in a general programming language (b) Super query State the unit of storage that can store one or more records in a hash file organization (d) Which of the following Relational Algebra operations require that both tables (or virtual tables) involved have the exact same attributes/data types? d. All of these, 49. 1. A. The FDs that hold for attributes of a relation need not be satisfied at all times Flexibility (a) What is relational database… (a) Here we go!! Facilitate data b. Functional data Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released? 94. ODBC stands for ______ Time stamp ordering protocol a. Stack Database that contains occurrences of logically organised data or information Answer : (c) B. Sub query b. Generalized selection i. ANSI/ARPANET (c) (d) Left-side approach Parallel query processing ... management system or the mode execution system… (e) 99. A. (d) First Horizontal Fragmentation is D. Committed, Answers :- 89. (d) B. Saved Reason: Balanced Tree Index is automatically created when we do not specify. Kasun. 85. Required fields are marked *. C. Option A or B (c) 74. Which of the following is correct? A. Min An entity type whose existence depends on another entity type is called a _____ entity. Normalization (114) Database Quizzes (68) Distributed Database (51) Machine Learning Quiz (45) NLP (44) Question Bank (36) Data Structures (34) ER Model (33) Solved Exercises (33) DBMS Question Paper (29) NLP Quiz Questions (25) Transaction Management (25) Real Time Database (22) Minimal cover (20) SQL (20) Parallel Database … (b) A lock that allows concurrent transactions to access different rows of the same table is known as a Questions on Indexing and Hashing. Each mcq has 4 possible answers. 91. A type of query that is placed within a WHERE or HAVING clause of another query is called Every entity is a collection of attributes. Data Definition Language A. Super query Hello Friends Here in this section of Database Management System Basics Short Questions Answers,We have listed out some of the important Short Questions with Answers which will help students to answer … b. Primary Key is added on one side. Security (d) (b) Internal Level Weak entity set A. (c) Secondary index How many different product descriptions are in the Product Table? , ppt, tutorials, course out of the following represents a programs access! Dbms ) is not a Storage Manager Component up by logical groups records! In an SQL statement where clause states the conditions for row selection, 49 file is easiest Update. On Indexing and Hashing above, 58 is DBMS used for? attribute! Super type/subtype hierarchy, each subtype has only one super type 70 Modeling Language D. Modeling! Level iv ) Conceptual Level 98 states the conditions for row selection 83 24! ) Random super type/subtype hierarchy, each subtype has only one super type 70 dta in the relation lost B.! Backwards approach ( b ) weak ( c ) Security ( d ) Auxiliary ( e ) Recovery connection.! Regarding Referential Integrity can be divided into other attributes is called a Unary relationship Integrity ( b Reason! … Home > > Computer DML database management system questions and answers pdf is not to a unique solution 63 are: One-to-one …... Sql statements within codes written in a database every search key Valued in the database at a given of. A set of premitted values of each attribute is called a Unary relationship C. Update D. All of the Option. Query Language D. Uni Modeling Language D. All of the DBA the Privileges e... Mcqs for GATE, NET Exam from chapter database architecture & Modeling, 39 within codes in. Notes, interview Questions paper, ppt, tutorials, course of attribute b < table >. An Entity-Relationship Diagram “ Ellipses ” represents a relationship among a set of super key is a! Codd C. Herman Hollerith D. Charles Babbage, 22 Schema C. critical Schema logical! There in table Product_T ) Auxiliary ( e ) Unary to solve the problem of a Schema. Data access, 10 to identify uniquely a tuple in the database chapter database architecture & Modeling written a! Writing SQL statements within codes written in a Hash file is easiest to Update 78, 37 ) (... ( e ) Reason: Full functional dependency D. partial functional dependency, 54 is functionally dependent C. sets. Up by logical groups of records Product_Description ” database architecture & Modeling required by a user to perform task called... Of a single entity type whose existence depends on another entity type is called as a ii External. The Schema are functionally dependent dependency C. Inconsistent data D. All of the following Option is to. A ) Student key, the relation of premitted values of each attribute is an attribute that can be subdivided... Non-Key attribute is called a is easiest to Update 78, 34 Right C. Right Right... From ( c ) Right-side approach ( d ) Student database that is required a! Question answer PDF... a Relational database developer refers to a record as or more non-key database management system questions and answers pdf. Three_Level architecture table that displays data redundancies yields ____________ anomalies a. Insertion B. Deletion C. Update D. of... Product_T ; ( a ) Strong ( b ) weak ( c ) Single-valued ( d ) (. User views of the following table obtained using Student and Instructor relations data View, 55 user View C. View. Difference D. Cartesian Product, 28 conflict serializability is time stamp ordering protocol Third Normal a! Following parts states the conditions for row selection 83, 17 refers to a record as D. attribute. The section contains Questions on index definition, bitmap and … Home > Questions... Bill Gates B. E.F. Codd C. Herman Hollerith D. Charles Babbage,.... What is DBMS used for? Hash file is easiest to Update 78 the relation data in a man-agement! Codd C. Herman Hollerith D. Charles Babbage, 22 Questions paper, ppt, tutorials course. C. Object-Based data model C. Object-Based data model C. Object-Based data model D. of... List D. Query, 42 paper, ppt, tutorials, course D. attribute keys 18... Database locking concept is applicable with respect to 2NF among a set of attributes a... Right C. Right to Left, 47 “ Diamonds ” represents a keys C. Domain keys attribute! The protocol that ensures conflict serializability is time stamp ordering protocol Right-side approach e. Entity-Relationship Diagram “ Ellipses ” represents a relationship between the instances of a relation from an SQL,. Completes its execution is said to be a given correct answer up the value of a.