Relational-databases

Question 1
Consider the following table in a relational database
A
{Last Name}
B
{Room}
C
{Shift}
D
{Room, Shift}
       Database-Management-System       Relational-databases       ISRO-2018
Question 1 Explanation: 
→ Candidate means uniquely identified key.
→ In the above table, Room having duplicate values. So, we can’t say room is candidate key
→ The last name also having duplicates. So, we can’t say the last name is candidate key.
→ Shift also having duplicate keys, so we can’t say shift also a candidate key.
→ Combining Room and Shift we can say that candidate key.
Question 2
Which commands are used to control access over objects in relational database?
A
CASCADE & MVD
B
GRANT & REVOKE
C
QUE & QUIST
D
None of these
       Database-Management-System       Relational-databases       ISRO-2007
Question 2 Explanation: 
DCL(Data Control Language) includes commands such as GRANT and REVOKE which mainly deals with the rights, permissions and other controls of the database system.
Examples of DCL commands:
GRANT-gives user’s access privileges to database.
REVOKE-withdraw user’s access privileges given by using the GRANT command.
Question 3
What does the data dictionary identify?
A
Field names
B
Field Formats
C
Field Types
D
All of these
       Database-Management-System       Relational-databases       ISRO-2017 May
Question 3 Explanation: 
→ A data dictionary(or) metadata repository, as defined in the IBM Dictionary of Computing, is a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format".
→ Oracle defines it as a collection of tables with metadata. The term can have one of several closely related meanings pertaining to databases and database management systems (DBMS)
1. A document describing a database or collection of databases
2. An integral component of a DBMS that is required to determine its structure
3. A piece of middleware that extends or supplants the native data dictionary of a DBMS
Question 4
Embedded pointer provides
A
A secondary access path
B
A physical record key
C
An inverted index
D
A primary key
       Data-Structures       Relational-databases       ISRO CS 2008
Question 4 Explanation: 

1. To understand how pointers and their associated data elements are allocated in Microsoft RPC, you have to differentiate between top-level pointers and embedded pointers

2. Top-level pointers are those that are specified as the names of parameters in function prototypes. Top-level pointers and their referents are always allocated on the server.

3. Embedded pointers are pointers that are embedded in data structures such as arrays, structures, and unions. When embedded pointers only write output to a buffer and are null on input, the server application can change their values to non-null. In this case, the client stubs allocate new memory for this data.

4. If the embedded pointer is not null on the client before the call, the stubs do not allocate memory on the client on return. Instead, the stubs attempt to write the memory associated with the embedded pointer into the existing memory on the client associated with that pointer, overwriting the data already there.
Question 5

Database systems that store each relation in a separate operating system file may use the operating system’s authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is false ?

A
The administrator enjoys more control on the grant option.
B
It is difficult to differentiate among the update, delete and insert authorizations.
C
Cannot store more than one relation in a file.
D
Operations on the database are speeded up as the authorization procedure is carried out at the operating system level.
       Database-Management-System       Relational-databases       UGC-NET JUNE Paper-2
Question 5 Explanation: 
When the Database system will store each relation in seperate operating system file then it will become difficult for the administrator to differentiate among the update, delete and insert authorizations and also to keep track of grant options becomes difficult which is a overhead.
So, option 1 is clearly false and option 2 is true.
Option 3: In question it is mentioned that each relation is stored in a separate operating system file.
So, option 3 is true.
Option 4 : Since for each relation there is a seperate operating system file which may use the operating system’s authorization scheme.
So, Operations on the database are speeded up as the authorization procedure is carried out at the operating system level.
Question 6

Let R1(a,b,c) and R2(x,y,z) be two relations in which a is the foreign key of R1 that refers to the primary key of R2 . Consider following four options.

    (a) Insert into R1
    (b) Insert into R2
    (c) Delete from R1
    (d) Delete from R2

Which of the following is correct about the referential integrity constraint with respect to above ?

A
Operations (a) and (b) will cause violation.
B
Operations (b) and (c) will cause violation.
C
Operations (c) and (d) will cause violation.
D
Operations (d) and (a) will cause violation.
       Database-Management-System       Relational-databases       UGC-NET JUNE Paper-2
Question 6 Explanation: 
In case of referential integrity Insertion into table containing the foreign key and Deletion from table whose Primary key is referred can cause the violation.
Question 7
Related fields in a database are grouped to form a
A
data file
B
data record
C
menu
D
Bank
       Database-Management-System       Relational-databases       Nielit Scientist-B IT 22-07-2017
Question 7 Explanation: 
● In a database, a record (sometimes called a row) is a group of fields within a table that are relevant to a specific entity.
● For example, in a table called customer contact information, a row would likely contain fields such as: ID number, name, street address, city, telephone number and so on.
Question 8

The DELETE/FROM/WHERE command is used for removing one or more ___.

A
Attributes from a table(relation)
B
Tables from a database
C
Databases
D
Tuples from a table(relation)
       Database-Management-System       Relational-databases       JT(IT) 2018 PART-B Computer Science
Question 8 Explanation: 
DELETE/FROM/WHERE command is used for removing one or more tuples from a table(relation).
DROP command is used for dropping entire table.
Question 9
In an RDBMS relationships between tables are created by using
A
Alternate keys
B
Foreign keys
C
Candidate keys
D
Composite keys
       Database-Management-System       Relational-databases       KVS DEC-2013
Question 9 Explanation: 
● A foreign key is a field (or collection of fields) in one table that uniquely identifies a row of another table or the same table.
● In simpler words, the foreign key is defined in a second table, but it refers to the primary key or a unique key in the first table
Question 10
Concurrency control in RDBMS is important for which of the following reasons?
A
To ensure data integrity when reads occur to the database in a multi user environment
B
To ensure data integrity when updates occur to the database in a single user environment
C
To ensure data integrity when updates occur to the database in a multi user environment
D
To ensure data integrity when reads occur to the database in a single user environment
       Database-Management-System       Relational-databases       KVS DEC-2017
Question 10 Explanation: 
Concurrency control in RDBMS is important to ensure data integrity when updates(insert/delete/modify) occur to the database in a multi user environment
Question 11
Which of the following statements is false with respect to relational DBMS?
A
A disadvantage of highly normalized tables is that queries may require too many time consuming joins
B
Foreign key constraints are referential integrity constraints
C
A primary key uniquely identifies a row in a table
D
Nulls reduce space requirements in tables
       Database-Management-System       Relational-databases       KVS DEC-2017
Question 11 Explanation: 
Option A: True: depends upon the query, it will give the response
Option B & C: True: Foreign key constraints are referential integrity constraints. A primary key uniquely identifies a row in a table.
Option D: False: Null won’t reduce space requirements in tables.
Question 12
In a relational database model, cardinality of a relation means
A
The number of constraints
B
The number of tuples
C
The number of attributes
D
The number of tables
       Database-Management-System       Relational-databases       KVS DEC-2017
Question 12 Explanation: 
→ Cardinality of a relation means the number of tuples.
→ The degree of relationship (also known as cardinality) is the number of occurrences in one entity which are associated (or linked) to the number of occurrences in another.
There are three degrees of relationship, known as:
1. one-to-one (1:1)
2. one-to-many (1:M)
3. many-to-many (M:N)
Question 13
Conceptual level, Internal level and external level are three components of the three level RDBMS architecture Which of the following is not a part of the conceptual level?
A
Storage dependent details
B
Entities,attributes and relationships
C
Constraints
D
Semantic information
       Database-Management-System       Relational-databases       KVS DEC-2017
Question 13 Explanation: 
Three levels of database architecture:
1. Physical Level
2. Conceptual Level
3. External Level

→ Mapping is the process of transforming request response between various database levels of architecture.
→ Mapping is not good for small database, because it takes more time.
→ In External / Conceptual mapping, DBMS transforms a request on an external schema against the conceptual schema.
→ In Conceptual / Internal mapping, it is necessary to transform the request from the conceptual to internal levels.
1. Physical Level
Physical level describes the physical storage structure of data in database.It is also known as Internal Level. This level is very close to physical storage of data. At lowest level, it is stored in the form of bits with the physical addresses on the secondary storage device. At highest level, it can be viewed in the form of files.The internal schema defines the various stored data types. It uses a physical data model.
2. Conceptual Level
Conceptual level describes the structure of the whole database for a group of users. It is also called as the data model. Conceptual schema is a representation of the entire content of the database. These schema contains all the information to build relevant external records. It hides the internal details of physical storage.
3. External Level
External level is related to the data which is viewed by individual end users. This level includes a no. of user views or external schemas. This level is closest to the user. External view describes the segment of the database that is required for a particular user group and hides the rest of the database from that user group.
Question 14
Match the following with respect to RDBMS :
A
(a)-(iii), (b)-(iv), (c)-(i), (d)-(ii)
B
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
C
(a)-(iv), (b)-(ii), (c)-(iii), (d)-(i)
D
(a)-(ii), (b)-(iii), (c)-(iv), (d)-(i)
       Database-Management-System       Relational-databases       UGC NET CS 2017 Nov- paper-2
Question 14 Explanation: 
→ Entity Integrity won’t support duplicate rows in a table
→ Domain Integrity enforces valid entries for a column
→ Referential integrity rows can’t be deleted which are used by other records
→ User defined integrity enforces some specific business rule that do not fall into entity or domain
Question 15
In RDBMS, different classes of relations are created using __________ technique to prevent modification anomalies.
A
Functional Dependencies
B
Data integrity
C
Referential integrity
D
Normal forms
       Database-Management-System       Relational-databases       UGC NET CS 2017 Nov- paper-2
Question 15 Explanation: 
Normal forms in order to reduce data redundancy and improve data integrity. Normal forms to prevent modification anomalies.
Example anomalies:
1. Insertion anomaly
2. Deletion and Updation anomaly
Question 16
________ refers loosely to the process of semi-automatically analyzing large databases to find useful patterns.
A
Datamining
B
Data warehousing
C
DBMS
D
Data mirroring
       Database-Management-System       Relational-databases       UGC NET CS 2017 Jan -paper-2
Question 16 Explanation: 
→ Data mining refers loosely to the process of semi-automatically analyzing large databases to find useful patterns.
→ Data mining is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
→ Data mining is the analysis step of the "knowledge discovery in databases" process, or KDD
Question 17
Relational database schema normalization is NOT for:
A
reducing the number of joins required to satisfy a query.
B
eliminating uncontrolled redundancy of data stored in the database.
C
eliminating number of anomalies that could otherwise occur with inserts and deletes.
D
ensuring that functional dependencies are enforced.
       Database-Management-System       Relational-databases       UGC NET CS 2016 Aug- paper-2
Question 17 Explanation: 
→ There are many small Relational database schema in the database system. If we want to execute a query then it may require multiple relation access.
→ So to avoid this one solution is to have only one big relation so that number of relation access can be reduced.
→ This solution leads to redundancy of data stored in database and various inert, delete, update anomalies. So the solution of these problems is Normalisation using functional dependency. So option B,C,D are clearly correct according to above explanation.
→ ​ Option A​ is not correct because normalisation does not reduce the number of joins required to satisfy a query it only tries to eliminate redundancy and anomalous using functional dependency.
Question 18
Consider the following statements regarding relational database model:
(a) NULL values can be used to opt a tuple out of enforcement of a foreign key.
(b) Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in BCNF.
(c) The difference between the project operator (Π) in relational algebra and the SELECT keyword in SQL is that if the resulting table/set has more than one occurrences of the same tuple, then Π will return only one of them, while SQL SELECT will return all.
One can determine that:
A
(a) and (b) are true.
B
(a) and (b) are true
C
(b) and (c) are true
D
(a), (b) and (c) are true
       Database-Management-System       Relational-databases       UGC NET CS 2016 Aug- paper-2
Question 18 Explanation: 
Option(A) is correct. ​ NULL values can be used to opt a tuple out of enforcement of a foreign key.
Option(B) is correct. ​ Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in BCNF.
Option (C) is correct because the main difference between Project operator and SELECT keyword is that SELECT keyword will return Duplicate values if the exist in the result of a query but Project Operator Do not return Duplicate values if the exist in the result of the query.
Question 19
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
A
Referential integrity
B
Multi-valued dependency
C
Entity Integrity
D
Functional dependency
       Database-Management-System       Relational-databases       UGC NET CS 2016 July- paper-2
Question 19 Explanation: 
→ The constraint that no key attribute (column) may be NULL is referred to as Entity Integrity.
→ ​ Referential integrity​ to hold in a relational database, any column in a base table that is declared a foreign key can only contain either null values or values from a parent table's primary key or a candidate key.
→ A ​ multivalued dependency​ exists when there are at least three attributes (like X,Y and Z) in a relation and for a value of X there is a well defined set of values of Y and a well defined set of values of Z. However, the set of values of Y is independent of set Z and vice versa.
→ A ​ functional dependency​ is a constraint between two sets of attributes in a relation from a database. In other words, functional dependency is a constraint that describes the relationship between attributes in a relation.
Question 20
Which of the following statement(s) is/are FALSE in the context of Relational DBMS ?
I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database.
II. E-R diagrams are useful to logically model concepts.
III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well.
IV. SQL is a procedural language.
A
I and IV only
B
III and IV only
C
I, II and III only
D
II, III and IV only
       Database-Management-System       Relational-databases       UGC NET CS 2016 July- paper-2
Question 20 Explanation: 
Statement-I is TRUE because a VIEW of a table allows you to display updated version of the particular subset of the data in a database. A VIEW is a virtual table based on the result set of SQL statement.
Statement-II is FALSE because E-R diagram useful to Conceptually model concepts.
Statement-III is FALSE because update anomaly is a data inconsistency results from partial update or data redundancy.
Statement-IV is FALSE because SQL is not a procedural language. A language is procedural when we call procedures( like functions, subroutine) but in SQL we don't do any such calls.
Question 21
In a relational database model, NULL values can be used for all but which one of the following ?
A
To allow duplicate tuples in the table by filling the primary key column(s) with NULL.
B
To avoid confusion with actual legitimate data values like 0 (zero) for integer columns and ’’ (the empty string) for string columns.
C
To leave columns in a tuple marked as ’’unknown’’ when the actual value is unknown.
D
To fill a column in a tuple when that column does not really ”exist” for that particular tuple.
       Database-Management-System       Relational-databases       UGC NET CS 2016 July- paper-2
Question 21 Explanation: 
→ NULL values are used in a relation when the value of column of a particular row is either Unknown or does Not Exist.
→ Sometimes the a column of a row does not contain any value or may have zero value in that case also NULL values are used to avoid any kind of confusion regarding the values of the column. So, Option (B),(C) and (D) are the cases when NULL values are used in a relation.
Option(A) is incorrect because Primary key of a relation is a key which uniquely identify each tuple of a relation so it can't have NULL values.
Question 22
Which statement is false regarding data independence ?
A
Hierarchical data model suffers from data independence
B
Network model suffers from data independence
C
Relational model suffers only from logical data independence
D
Relational model suffers only from physical data independence
       Database-Management-System       Relational-databases       UGC NET CS 2006 Dec-paper-2
Question 22 Explanation: 
TRUE: Hierarchical data model suffers from data independence
TRUE: Network model suffers from data independence
FLASE: Relational model suffers only from logical data independence
TRUE: Relational model suffers only from physical data independence
Question 23
If D1,D2, .. ..Dn are domains in a relational model, then the relation is a table, which is a subset of
A
D1+D2+ … +Dn
B
D1×D2× … ×Dn
C
D1∪D2∪ … ∪Dn
D
D1–D2– … –Dn
       Database-Management-System       Relational-databases       UGC NET CS 2013 June-paper-2
Question 23 Explanation: 
In D1,D2,..,Dn are domains in a relational model, then the relation is a table, which s a subset of D1xD2x..xDn
Question 24
Which one is correct w.r.t. RDBMS ?
A
primary key ⊆ super key ⊆ candidate key
B
primary key ⊆ candidate key ⊆ super key
C
super key ⊆ candidate key ⊆ primary key
D
super key ⊆ primary key ⊆ candidate key
       Database-Management-System       Relational-databases       UGC NET CS 2017 Jan- paper-3
Question 24 Explanation: 

There are 24 questions to complete.
PHP Code Snippets Powered By : XYZScripts.com