DBI 202 LAX

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

............... database is used as template for all databases created. A) Master B) Model C) Tempdb D) None of the above

B) Model

............. contains data assisting day to day activities of the organization. A) Control database B) Operational database C) Strategic database D) Sequential database

B) Operational database

Which of the following is not the function of client? A) Compile queries B) Query optimization C) Receive queries D) Result formatting and presentation

B) Query optimization

In the ..................... mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access

B) Random access

..................... is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints C) Domain Integrity Constraints D) Domain Constraints E) Key Constraints

B) Referential.....Constraints

................. is a utility to capture a continuous record of server activity and provide auditing capability. A) SQL server Profile B) SQL server service manager C) SQL server setup D) SQL server wizard.

B) SQL server service manager

..............defines the structure of a relation which consists of a fixed set of attribute-domain pairs. A) Instance B) Schema C) Program D) Super Key

B) Schema

....................... operator is basically a join followed by a project on the attributes of first relation. A) Join B) Semi-Join C) Full Join D) Inner Join

B) Semi-Join

To eliminate duplicate rows .................. is used A) NODUPLICATE B) ELIMINATE C) DISTINCT D) None of these

C. DISTINCT

The full form of DDL is A. Dynamic Data Language B. Detailed Data Language C. Data Definition Language D. Data Derivation Language

C. Data Definition Language

Which is proper subset designed to support views belonging to different classes of users in order to hide or protect information. A) Schema B) Sub-schema C) Non-schema D) Non-sub schema

B) Sub-schema

Which database level is closest to the users? A. External B. Internal C. Physical D. Conceptual

A. External

Processed data is called .................... A) Raw data B) Information C) Useful data D) Source

B) Information

........................ is the process of organizing data into related tables. A) Normalization B) Generalization C) Specialization D) None of the above

A. Normalization

............... joins are SQL server default A) Outer B) Inner C) Equi D) None of the above

B) Inner

The file in DBMS is called as .................. in RDBMS. A) console B) schema C) table D) object

C) table

In the relational modes, cardinality is termed as A. Number of tuples B. Number of attributes C. Number of tables D. Number of constraints

A. Number of tuples

Which of the following are the properties of entities? A. Groups B. Table C. Attributes D. Switchboards

C. Attributes

Grant and revoke are ....... statements. A. DDL B. TCL C. DCL D. DML

C. DCL

4NF stands for .. A) Fourth Normal File B) Fourth Normal Form C) Fourth Normal Fraction D) Fourth Negative File

B) Fourth Normal Form

The database schema is written in A. HLL B. DML C. DDL D. DCL

C. DDL

.................specifies a search condition for a group or an aggregate. A) GROUP BY Clause B) HAVING Clause C) FROM Clause D) WHERE Clause

B) HAVING Clause

DCL stands for A) Data Control Language B) Data Console Language C) Data Console Level D) Data Control Level

A. Data Control Language

Which of the following is not a logical database structure? A) Chain B) Network C) Tree D) Relational

A) Chain

.............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key

A) Composite Key

................ is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors

A) Constraints

Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables? A) Data Definition Language B) Data Manipulation Language C) Data Described Language D) Data Retrieval Language

A) Data Definition Language

Which can be used to delete all the rows if a table? A) Delete * from table_name B) Delete from table_name C) Delete table_name D) all rows cannot be deleted at a time.

A) Delete * from table_name

In an ER model, ................ is described in the database by storing its data. A) Entity B) Attribute C) Relationship D) Notation

A) Entity

HSAM stands for .......... A) Hierarchic Sequential Access Method B) Hierarchic Standard Access Method C) Hierarchic Sequential and Method D) Hierarchic Standard and Method

A) Hierarchic Sequential Access Method

A top-to-bottom relationship among the items in a database is established by a A) Hierarchical schema B) Network schema C) Relational Schema D) All of the above

A) Hierarchical schema

What operator tests column for the absence of data? A) IS NULL operator B) ASSIGNMENT operator C) LIKE operator D) NOT operator

A) IS NULL operator

Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity

A) Key integrity

The ..................... is essentially used to search for patterns in target string. A) Like Predicate B) Null Predicate C) In Predicate D) Out Predicate

A) Like Predicate

Reflexivity property says that X - Y is true if Y is ...................... A) Subset of X B) Null set of X C) Super set of Y D) Subset of Y

A) Subset of X

In ..................... , we have a strict parent-child relationship only. A) hierarchical databases. B) network databases C) object oriented databases D) relational databases

A) hierarchical databases.

Which of the following is/are the Database server functions? i) Data management ii) Transaction management iii) Compile queries iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv

A) i, ii, and iv only

Data items grouped together for storage purposes are called a A) record B) title C) list D) string

A) record

In SQL, the CREATE TABLESPACE is used A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace. B) to create a database trigger. C) to add/rename data files, to change storage D) All of the above

A) to create a place in the database for storage of scheme objects..........

................. is a statement that is executed automatically by the system. A) trigger B) assertion C) durability D) integrity constraint

A) trigger

For using a specific database ............... command is used. A) use database B) database name use C) Both A &B D) None of them

A) use database

The view of total database content is A. Conceptual view B. Internal view C. External view D. Physical view

A. Conceptual view

..................... is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors

A. Constraints

A primary key if combined with a foreign key creates A. Parent-Child relationship between the tables that connect them B. Many to many relationship between the tables that connect them C. Network model between the tables that connect them D. None of the above

A. Parent-Child relationship between the tables that connect them

........ data type can store unstructured data A. RAW B. CHAR C. NUMERIC D. VARCHAR

A. RAW

................. is used to determine whether of a table contains duplicate rows. A) Unique predicate B) Like Predicate C) Null predicate D) In predicate

A. Unique predicate

A ................... Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity. A) Weak entity B) Strong entity C) Non attributes entity D) Dependent entity

A. Weak entity

.......... command can be used to modify a column in a table A. alter B. update C. set D. create

A. alter

Field is otherwise called as ......... of the record A. data item B. data type C. value D. variable

A. data item

A ............. represents the number of entities to which another entity can be associated A. mapping cardinality B. table C. schema D. information

A. mapping cardinality

A ......... is used to define overall design of the database A. schema B. application program C. data definition language D. code

A. schema

The RDBMS terminology for a row is A. tuple B. relation C. attribute D. degree

A. tuple

The database environment has all of the following components except. A. users B. separate files C. database D. database administrator

A. users

The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints A) 6789 B) 2345 C) 1234 D) 456789

B) 2345

Which normal form is considered adequate for relational database design? A) 2 NF B) 3 NF C) 4 NF D) BCNF

B) 3 NF

A .................. allows to make copies of the database periodically to help in the cases of crashes & disasters. A) Recovery utility B) Backup Utility C) Monitoring utility D) Data loading utility

B) Backup Utility

In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction? A) CREATE PACKAGE B) CREATE SCHEMA C) CREATE CLUSTER D) All of the above

B) CREATE SCHEMA

Which of the following is TRUE for the System Variable $date$? A) Can be assigned to a global variable. B) Can be assigned to any field only during design time. C) Can be assigned to any variable or field during run time. D) Can be assigned to a local variable.

B) Can be assigned to any field only during design time.

.................. defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity. A) Column B) Constraint C) Index D) Trigger

B) Constraint

In a relational schema, each tuple is divided into fields called A) Relations B) Domains C) Queries D) All of the above

B) Domains

................... First proposed the process of normalization. A) Edgar. W B) Edgar F. Codd C) Edward Stephen D) Edward Codd

B) Edgar F. Codd

............. is a special type of stored procedure that is automatically invoked whenever the data in the table is modified. A) Procedure B) Trigger C) Curser D) None of the above

B) Trigger

Which of the following SQL command can be used to modify existing data in a database table? A) MODIFY B) UPDATE C) CHANGE D) NEW

B) UPDATE

Some of the utilities of DBMS are ............. i) Loading ii) Backup iii) File organization iv) Process Organization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv

B) i, ii and iii only

A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above

B) is a standard .. accessible parts.

.......... keyword is used to find the number of values in a column. A. TOTAL B. COUNT C. ADD D. SUM

B. COUNT

The number of tuples in a relation is called its ............. While the number of attributes in a relation is called it's .................... A) Degree, Cardinality B) Cardinality, Degree C) Rows, Columns D) Columns, Rows

B. Cardinality, Degree

....... is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. A. Key Constraint B. Check Constraint C. Foreign key constraint D. integrity constraint

B. Check Constraint

Which one of the following statements is false? A. The data dictionary is normally maintained by the database administrator B. Data elements in the database can be modified by changing the data dictionary. C. The data dictionary contains the name and description of each data element. D. The data dictionary is a tool used exclusively by the database administrator.

B. Data elements in the database can be modified by changing the data dictionary.

The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is A. Procedural DML B. Non-Procedural DML C. Procedural DDL D. Non-Procedural DDL

B. Non-Procedural DML

The candidate key is that you choose to identify each row uniquely is called ................. A) Alternate Key B) Primary Key C) Foreign Key D) None of the above

B. Primary Key

The operation of eliminating columns in a table done by ........ operation. A. Restrict B. Project C. Union D. Divide

B. Project

Which are the two ways in which entities can participate in a relationship? A. Passive and active B. Total and partial C. Simple and Complex D. All of the above

B. Total and partial

Which of the following is not a characteristic of a relational database model? A. Table B. Tree like structure C. Complex logical relationship D. Records

B. Tree like structure

The ER model is meant to A. replace relational design B. be close to a users perception of the data C. enable low level descriptions of data D. enable detailed descriptions of data query processing

B. be close to a users perception of the data

Related fields in a database are grouped to form a A. data file B. data record C. menu D. bank

B. data record

To pass on granted privileges to other user the ...... clause is used A. create option B. grant option C. update option D. select option

B. grant option

The collection of information stored in a database at a particular moment is called as ...... A. schema B. instance of the database C. data domain D. independence

B. instance of the database

The relational model feature is that there A. is no need for primary key data B. is much more data independence than some other database models C. are explicit relationships among records. D. are tables with many dimensions

B. is much more data independence than some other database models

Which of the following is not comparison operator? A) <> B) < C) =< D) >=

C) =<

An instance of a relation is a time varying set of ...................... A) Tuples B) Rows C) Both of them D) None of them

C) Both of them

For like predicate which of the following is true. i) % matches zero of more characters. ii) _ matches exactly one character. A) i-only B) ii-only C) Both of them D) None of them

C) Both of them

Which of the syntax is correct for insert statement? i) insert into <table_name> values <list of values> ii) insert into <table_name> (column list) values <list of values> A) i-only B) ii-only C) Both of them D) None of them

C) Both of them

A .................... DBMS distributes data processing tasks between the workstation and network server. A) Network B) Relational C) Client Server D) Hierarchical

C) Client Server

................ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement. A) Procedure B) Trigger C) Curser D) None of above

C) Curser

Anything that affects the database schema is a part of A) DML B) DCL C) DDL D) All of the above

C) DDL

DFD stands for A) Data Flow Document B) Data File Diagram C) Data Flow Diagram D) Non of the above

C) Data Flow Diagram

Which contain information about a file needed by system programs for accessing file records? A) File blocks B) File operators C) File headers D) None of these

C) File headers

.................. clause is an additional filter that is applied to the result. A) Select B) Group-by C) Having D) Order by

C) Having

.................... contains information that defines valid values that are stored in a column or data type. A) View B) Rule C) Index D) Default

C) Index

What are the different events in Triggers? A) Define, Create B) Drop, Comment C) Insert, Update, Delete D) Select, Commit

C) Insert, Update, Delete

The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

C) It should avoid/reduce the redundancy.

..................... approach reduces time and effort required for design and lesser risk in database management. A) Single global database B) Top-down approach C) Multiple databases D) None of the above

C) Multiple databases

DBMS is a collection of .............. that enables user to create and maintain a database. A) Keys B) Translators C) Program D) Language Activity

C) Program

............................ is the powerful language for working with RDBMS. A) Embedded Programs B) Dynamic Programs C) Query Language D) Static Language Programs

C) Query Language

The relational model is based on the concept that data is organized and stored in two-dimensional tables called ............................ A) Fields B) Records C) Relations D) Keys

C) Relations

Which character function can be used to return a specified portion of a character string? A) INSTR B) SUBSTRING C) SUBSTR D) POS

C) SUBSTR

................. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

C) Security

..................... is a full form of SQL. A) Standard query language B) Sequential query language C) Structured query language D) Server side query language

C) Structured query language

.................. table store information about database or about the system. A) SQL B) Nested C) System D) None of these

C) System

................... Allows definitions and query language statements to be entered; query results are formatted and displayed. A) Schema Processor B) Query Processor C) Terminal Interface D) None of the above

C) Terminal Interface

To delete a database ................... command is used A) delete database database_name B) Delete database_name C) drop database database_name D) drop database_name

C) drop ....database_name

State true or false. i) Select operator is not a unary operator. ii) Project operator chooses subset of attributes or columns of a relation. A) i-True, ii-False B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

C) i-False, ii-True

An outstanding functionality of SQL is its support for automatic ............ to the target data. A) programming B) functioning C) navigation D) notification

C) navigation

Which two files are used during operation of the DBMS A. Query languages and utilities B. DML and query language C. Data dictionary and transaction log D. Data dictionary and query language

C. Data dictionary and transaction log

Which two files are used during operation of the DBMS? A. Query languages and utilities B. DML and query language C. Data dictionary and transaction log D. Data dictionary and query language

C. Data dictionary and transaction log

........ introduced the relational database rules. A. Atul kahate B. James Gossling C. EF Codd D. Dennies Rithchie

C. EF Codd

In a relational model, relations are termed as A. Tuples B. Attributes C. Tables D. Rows

C. Tables

A relational database developer refers to a record as A. a criteria B. a relation C. a tuple D. an attribute

C. a tuple

A field can be called as ........... in relation context. A. random file B. direct file C. attribute D. tuple

C. attribute

An advantage of the database management approach is A. data is dependent on programs B. data redundancy increases C. data is integrated and can be accessed by multiple programs D. none of the above

C. data is integrated and can be accessed by multiple programs

Key to represent relationship between tables is called A. primary key B. secondary key C. foreign key D. none of the above

C. foreign key

......... is critical in formulating database design. A. row column order B. number of tables C. functional dependency D. normalizing

C. functional dependency

State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key. A) i-true, ii-false B) i-false, ii-true C) i-true, ii-true D) i-false, ii-false

C. i-true, ii-true

When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n) ........ A. transitive dependency B. insertion anomaly C. referential integrity constraint D. normal form

C. referential integrity constraint

Architecture of the database can be viewed as A. two levels B. four levels C. three levels D. one level

C. three levels

Which of the following is/are the DDL statements? A) Create B) Drop C) Alter D) All of the above

D) All of the above

One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control D) Domain Integrity

D) Domain Integrity

................ provides option for entering SQL queries as execution time, rather than at the development stage. A) PL/SQL B) SQL*Plus C) SQL D) Dynamic SQL

D) Dynamic SQL

Drop Table cannot be used to drop a table referenced by a ............... constraint. A) Local Key B) Primary Key C) Composite Key D) Foreign Key

D) Foreign Key

The main task carried out in the ............... is to remove repeating attributes to separate tables. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Fourth Normal Form

D) Fourth Normal Form

Which of the following is not a binary operator in relational algebra? A) Join B) Semi-Join C) Assignment D) Project

D) Project

Centralizing the integrity checking directly under the DBMS .............. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

D) Reduces

In snapshot, ...................... clause tells oracle how long to wait between refreshes. A) Complete B) Force C) Next D) Refresh

D) Refresh

The .................... refers to the way data is organized in and accessible from DBMS. A) database hierarchy B) data organization C) data sharing D) data model

D) data model

When SQL statements are embedded inside 3GL, we call such a program as .......... A) nested query B) nested programming C) distinct query D) embedded SQL

D) embedded SQL

SQL server stores index information in the ............ system table A) syst indexes B) system indexes C) sysind D) sys indexes

D) sys indexes

DBMS helps achieve A. Data independence B. Centralized control of data C. Neither A nor B D. Both A and B

D. Both A and B

................. is the complex search criteria in the where clause. A) Sub string B) Drop Table C) Predict D) Predicate

D. Predicate

A table can have only one A. Secondary key B. Alternate key C. Unique key D. Primary key

D. Primary key

A functional dependency is a relationship between or among ....... A. tables B. rows C. relations D. attributes

D. attributes

Data independence means A. data is defined separately and not included in programs. B. programs are not dependent on the physical attributes of data C. programs are not dependent on the logical attributes of data D. both B and C

D. both B and C

......... is, a table have more than one set of attributes that could be chosen as the key A. foreign key B. integrity key C. relationship D. candidate key

D. candidate key

The ........ is used for creating and destroying table, indexes and other forms of structures. A. data manipulation language B. data control language C. transaction control language D. data definition language

D. data definition language

The ............ refers to the way data is organized in and accessible from DBMS. A. database hierarchy B. data organization C. data sharing D. data model

D. data model

A set of possible data values is called A. attribute B. degree C. tuple D. domain

D. domain

The way a particular application views the data from the database that the application uses is a A. module B. relational model C. schema D. sub schema

D. sub schema

The way a particular application views the data from the database that the application uses is a A. module B. relational model C. schema D. sub schema

D. sub schema

A ........... is a set of column that identifies every row in a table. A. composite key B. candidate key C. foreign key D. super key

D. super key

To change column value in a table the ......... command can be used. A. create B. insert C. alter D. update

D. update

In the architecture of a database system external level is the A. physical level B. logical level C. conceptual level D. view level

D. view level

Select the right answer. [A] All of the others [B] Tags in XML are text surrounded by triangular brackets (for example, <_>). [C] An XML tag can be a single tag with no matching closing tag (for example. <foo /> [D] Tags in XML comes in matching pairs, with an opening tag like <foo> and a matched closing tag like</foo>

[A] All of the others

Select the right statement [A] All of the others [B] Every constraint has a name. If we don't define constraint's name explicitly, then DBMS automatically generates a name for it [C] We can create constraint on a tuple as a whole. [D] We can create constraint on a single attribute

[A] All of the others

Choose the right statement [A] All of the others. [B] The syntax to remove a trigger is. DROP TRIGGER <trigger_name> [C] Use ALTER TRIGGER to change the definition of a trigger [D] You can remove a trigger by dropping it or by dropping the trigger table.

[A] All of the others.

In SQL language, the command/statement that let you add an attribute to a relation is_ [A] Alter [B] None of the others [C] Insert [D] Update

[A] Alter

Suppose an updatable view ParamountMovies is associated with Movies relation. Choose a nght answer [A] Drop Movies relation also delete the view ParamountMovies [B] Drop ParamountMovies also delete Movies IC] An update on ParamountMovies is translated into Movies [D] None of the others

[A] Drop Movies relation also delete the view ParamountMovies

Choose an incorrect statement [A] None of the others [B] Database is created and maintained by a DMBS IC] Database is a collection of information that exists over a long opened of time [D] Database is a collection of data that is managed by a DBMS

[A] None of the others

In DTD. the main difference between PCDATA and CDATA is [A] PCDATA is text that will be parsed by a parser and tags inside the text will be treated as markup and entities will be expanded CDATA is text that will NOT be parsed by a parser and tags inside the text wil NOT be treated as markup and entities will not be expanded. [B] All of the others. [C] CDATA is used to assert something about the allowable content of elements where as PCDATA is used as a common type for attribute [D] There's no difference between PCDATA and CDATA.

[A] PCDATA is text that will be parsed by a parser and tags inside the text will be treated as markup and entities will be expanded CDATA is text that will NOT be parsed by a parser and tags inside the text wil NOT be treated as markup and entities will not be expanded.

Choose a wrong answer. [A] Relational algebra can express recursion. [B] Basic relational algebra can be expressed in Datalog rule(s). IC] Single Datalog rule can be expressed in relational algebra. [D] Datalog does not support bag operations.

[A] Relational algebra can express recursion.

Given the relation Employee(SSN. FNAME. LNAME. SALARY). Select the right query below to find the employee(s) who has the lowest salary in the company [A] SELECT LNAME. FNAME. SALARY FROM Employee WHERE SALARY IN (SELECT MIN(SALARY) FROM Employee) [B] SELECT LNAME. FNAME. SALARY FROM Employee WHERE SALARY >= ALL (SELECT SALARY FROM Employee) [C] SELECT LNAME. FNAME. SALARY FROM Employee WHERE SALARY < MAX (SELECT SALARY FROM Employee) [D] None of the others

[A] SELECT LNAME. FNAME. SALARY FROM Employee WHERE SALARY IN (SELECT MIN(SALARY) FROM Employee)

Which of the followings is true? [A] The Entity Relationship (ER) model represents the structure of data graphically [B] The ER model is a low level database design IC] The ER model represents the operation on data [D] All of the others

[A] The Entity Relationship (ER) model represents the structure of data graphically

When declaring foreign key constraint for relation A thai references relation B. the referenced attribute(s) of the relation B must be declare as_______ [A] UNIQUE or PRIMARY KEY [B] FOREIGN KEY [C] INDEX KEY [D] All of the others

[A] UNIQUE or PRIMARY KEY

The key for a weak entity set E is_ [A] Zero or more attributes of E and key attributes from supporting entity sets [B] The set of attributes of supporting relationships for E IC] The set of attributes of supporting entity sets [D] Zero or more attributes of E

[A] Zero or more attributes of E and key attributes from supporting entity sets

Data Definition language (DDL) is used to _ [A] declare database schemas [B] connect to database and query database [C] query database and modify the database [D] All of the others

[A] declare database schemas

Choose the right statement below to declare zero or one occurrence of an Element in DTD. [A] <"ELEMENT element-name (child-name?)> [B] <IELEMENT element-name (child-name+)> [C] <'ELEMENT element-name (child-name*)> [D] <IELEMENT element-name (child-name)>

[A] <"ELEMENT element-name (child-name?)>

Select the well-formed XML [A] All of the others [B] <? xml version = "1.0" ?> <MovieData> <Movie tiHe="StarWar*><Year>1997</Yearx/MovJe> </MovieData> [C] <? xml version - "1 0' ?> <MovieData> <Movie Me-'StarWaf*><Year>1997</Year></Movie> </Movies> [D] <? xml version = 1 0 7> <MovieData> <Movie trtle-"StarWar"><Year>1997</Movie></Year> </MovieData>

[B] <? xml version = "1.0" ?> <MovieData> <Movie tiHe="StarWar*><Year>1997</Yearx/MovJe> </MovieData>

Given a relation R(A.B.C.D). Which of the followings is trivial? [A] A->BCD [B] A->->BCD [C] A->AB [D] A->->AB

[B] A->->BCD

Choose a right answer. [A] A SOL environment is the framework under which data may exist and SQL operations on data may be executed [B] All of the others [C] Within a SQL environment are two special kinds of processes: SQL clients and SQL servers. [D] A SQL environment is a DBMS running at some installation.

[B] All of the others

Choose the right statement [A] XML Schema allows us to declare simple types, such as integer or float and even complex types [B] All of the others [C] XML schema provides us the ability to declare keys and foreign keys. [D] XML Schema is an alternative way to provide a schema for XML documents.

[B] All of the others

Which of the following statements is true? [A] in BCNF condition, the left side of every non trivial FD must be a super key. [B] All of the others [C] Any two-attribute relation is in BCNF [D] BCNF condition guarantees the anomalies do not exist

[B] All of the others

The binary relationship between classes in UML is called - [A] Relation [B] Association [C] Aggregation [D] Composition

[B] Association

_______authorizes access to database, coordinate, monitor its use, acquiring software, and hardware resources. [A] All of the others [B] Database administrator [C] Database designer [D] Database end-user

[B] Database administrator

To create a constraint (for example, referential integrity constraint) on a relation, the owner ofthe schema must have [A] UNDER privilege [B] REFERENCES privilege [C] UPDATE privilege [D] EXECUTE privilege

[B] REFERENCES privilege

Selecl Ihe right syntax for HAVING clause in SOL [A] SELECT <list of attributes> FROM <list of tables> WHERE <conditions on tuples> HAVING <conditions on groups> GROUP BY <list of attributes> [B] SELECT <list of attributes> FROM <list of tables> WHERE <conditions on tuples> GROUP BY <list of attributes> HAVING <conditions on groups> [C] SELECT < list of attributes> FROM < list of tables> HAVING <conditions on groups> WHERE <conditions on tuples> GROUP BY <list of attributes> [D] All of the others

[B] SELECT <list of attributes> FROM <list of tables> WHERE <conditions on tuples> GROUP BY <list of attributes> HAVING <conditions on groups>

Given the relation Employee(SSN. FNAME. LNAME. SALARY. DepartmentNo). Select the right query below to count the number of employees in each department [A] SELECT COUNTf) FROM Employee [B] SELECT DepartmentNo. COUNT(*) FROM Employee GROUP BY DepartmentNo [C] SELECT DepartmentNo. COUNT(*) FROM Employee [D] None of the others

[B] SELECT DepartmentNo. COUNT(*) FROM Employee GROUP BY DepartmentNo

The most useful index on a relation is an index on its key. This is because [A] The index on non key attribute(s) runs slower [B] The search operation based on the primary key is commonly used. [C] The index on non key attribute(s) makes update operations to the relation more complex and time-consuming [D] All of the others

[B] The search operation based on the primary key is commonly used.

Referential integrity Constraints control relationships between _. [A] operations of an object [B] tables in a database [C] attributes in a table [D] database instances

[B] tables in a database

Consider a relation with schema R(A, B. C. D) and FD's A-> B. A-> C. C -> D. Which ofthe following is the {A}+ ? [A] {A} [B] {A B C D} [C] {A. B. C} [D] {A.B}

[B] {A B C D}

Which of the following statements is true? [A] I3NF implies BCNF [B] Multi-valued Dependency (MVD) implies Fourth Normal form (4NF) [C] 4NF implies BCNF and BCNF implies 3NF [D] None of the others

[C] 4NF implies BCNF and BCNF implies 3NF

Exception handler in PSM is defined as follows: DECLARE <where to go next> HANDLER FOR condition list> <statement> The <where to go next> clause can be: [A] UNDO [B] EXIT [C] All of the others [D] CONTINUE

[C] All of the others

In PSM. the difference between 3 stored procedure and a function is that [A] A function has the return statement. [B] We can declare local variables in a function. [C] All of the others [D] Loops are not allowed in a function

[C] All of the others

Choose a right answer [A] When a privilege is granted, it cannot be revoked [B] Privileges cannot be granted on a view [C] An authorization ID may be granted privileges from others or may grve its privileges to others [D] All of the others

[C] An authorization ID may be granted privileges from others or may grve its privileges to others

A class in UML is similar to___ [A] A Relationship in E/R model [B] An attribute in E/R model [C] An entity set in E/R model [D] None of the others

[C] An entity set in E/R model

Select the right statement to declare MovieStar to be a relation whose tuples are of type StarType. Note; StarType is a user-defined type that has its definition as follows; CREATE TYPE StarType AS ( nameCHAR(30). address CHAR(IOO) }; [A] CREATE TABLE MovieStar (name StarType). PI CREATE TABLE MovieStar (name StarType PRIMARY KEY); [C] CREATE TABLE MovieStar OF StarType Q; [D] None of the others

[C] CREATE TABLE MovieStar OF StarType Q;

Given the relation Movies(title, year, length, genre. studioName). Select the right query to create a View with the titles and studio names of all movies that were produced in 1980 [A] CREATE VIEW OldMovies SELECT title. studioName FROM Movies WHERE year-1980 [B] CREATE VIEW OldMovies SELECT title, year FROM Movies WHERE year=1980 [C] CREATE VIEW OldMovies AS SELECT title. studioName FROM Movies WHERE year=1980 [D] None of the others

[C] CREATE VIEW OldMovies AS SELECT title. studioName FROM Movies WHERE year=1980

Schema-altering commands are known as......commands. [A] Data Manipulation Language [B] Data Controlling Language [C] Data Definition Language [D] None of the others

[C] Data Definition Language

Choose the right statement to grant the INSERT and SELECT privileges on table Movies to users torn' and jerry' [A] GRANT SELECT. INSERT on Movies [B] GRANT SELECT. INSERT on Movies TO torn, jerry CASCADE [C] GRANT SELECT. INSERT on Movies TO torn, jerry WITH GRANT OPTION [D] GRANT SELECT. INSERT on Movies TO ALL

[C] GRANT SELECT. INSERT on Movies TO torn, jerry WITH GRANT OPTION

Which of the following is NOT a standard aggregation operator? [A] SUM [B] AVG [C] GROUP [D] COUNT

[C] GROUP

Given relations Movies(title, year, length, genre. studioName. producer#). MovieExec(name. address. cert#). and Studio(name. address. presC#). Suppose we have the materialized view that finds the name - ofthe producer of a given movie as follows: CREATE MATERIALIZED VIEW MovieProd AS SELECT title, year, name FROM Movies. MovieExec WHERE producer# - cert# Which of the following modification will affect the MovieProd materialized view? [A] Insert a new tuple into Studio [B] Delete a tuple from Studio [C] Insert a new tuple into Movies or delete a tuple from Movies [D] None of the others

[C] Insert a new tuple into Movies or delete a tuple from Movies

The relational operator that yields all possible pairs of rows from two tables is known as a _ [A] Union [B] Selection [C] Product [D] Join

[C] Product

The result of (UNKNOWN OR TRUE) is [A] UNKNOWN [B] FALSE [C] TRUE [D] NULL

[C] TRUE

Given relation U(A, B, C) that has 2 tuples (1,2,3) and (4,5,6), and relation V(B(C, D) that has 2 tuples (2,3,10) and (2,3,11). Choose the right answer below; [A] None of the others. [B] The outer join of U and V is the relation R(A, B, C, D) that has 2 tuples (1.2, 3.10) and (1,2, 3,11). [C] The outer join of U and V is the relation R(A. B. C. D) that has 3 tuples (1.2.3.10) .(1.2.3.11) and (4.5.6. NULL). [D] The outer join of U and V is the relation R(A. B. C. D) that has only 1 tuple (NULL. 4.5.6).

[C] The outer join of U and V is the relation R(A. B. C. D) that has 3 tuples (1.2.3.10) .(1.2.3.11) and (4.5.6. NULL).

Which of the followings is part of data model? [A] Operations on the data [B] Constraints on the data [C] All of the others [D] Structure of the data

[C] All of the others

Choose right answer(s). [A] NULL value is unknown, inapplicable, or withheld [B] Comparisons with NULL values will return UNKNOWN [C] Arithmetic operators on NULL values will return a NULL value [D] All of orther

[D] All of orther

Select the right answer [A] An index is a data structure used to speed access to tuples of a relation, given values of one or more attributes [B] The key for index can be any attribute or set of attributes, and need not be the key ofthe relation [C] We can think of the indexas a binary search tree of (key, locations) pairs in which a key a is associated with a set of locations of the tuples [D] All of orther

[D] All of orther

Select the right answer [A] Virtual views do not exist physically [B] Virtual views are defined by an expression like a query [C] Virtual views can be queried and can even be modified [D] All of other

[D] All of other

Choose a right answer [A] The object-relational model is the extension of the relation model with new features such as structured types, methods, identifiers for tuples, and references [B] Object-relation model allows a non-atomic type that can be a relation schema which is called nested relation [C] In object-relational model, the type of an attribute can be a reference to a tuple with a given schema or a set of references to tuples with a given schema [D] All of the others

[D] All of the others

Choose the right answer [A] A User-Defined Type (UDT) in SQL can be the type of a table [B] A UDT can be the type of an attribute belonging to some table [C] The form of UDT definition is: CREATE TYPE T AS (<primitive type | attribute declarations>) [D] All of the others

[D] All of the others

Choose the right statement [A] Sub-queries return a single constant this constant can be compared with another value in a WHERE clause; [B] Sub-queries return relations, that can be used in WHERE clause [C] Sub-queries can appear in FROM clauses, followed by a tuple variable [D] All of the others

[D] All of the others

Four characteristics of transactions are [A] None of the others [B] Read uncommitted, Read committed, Repeatable read, Serializable [C] Atomicity. Isolation. Concurrency. Durability [D] Atomicity. Isolation. Consistency. Durability

[D] Atomicity. Isolation. Consistency. Durability

Given relations R(A.B) and S(B.C.D). The result of natural join of the relations R and S has [A] Only two attributes R B and SB [B] None of the others [C] Only attribute B [D] Attributes A B. C. D

[D] Attributes A B. C. D

Consider a relation with schema R(A, B, CD) and FD's BC-> D, D-> A, A-> B. Which of the following is the key of R? [A] BD [B] D [C] AB [D] BC

[D] BC

Select the valid query to declare the foreign key presC# of the relation Studiolname. address. presC#) that references the cert of the relation MovieExeclname. address. cert#. netWorth): [A] All of the others. [B] CREATE TABLE Studio (name CHAR(30) PRIMARY KEY. address VARCHAR(256). presC# INT FOREIGN KEY): [C] CREATE TABLE Studio (name CHAR(30) PRIMARY KEY. address VARCHAR(256). presC# INT UNIQUE KEY REFERENCES MovieExec): [D] CREATE TABLE Studio (name CHAR(30) PRIMARY KEY. address VARCHAR(256). presC# INT REFERENCES Movie Exec (cert#));

[D] CREATE TABLE Studio (name CHAR(30) PRIMARY KEY. address VARCHAR(256). presC# INT REFERENCES Movie Exec (cert#));

The ER Diagram uses three principle element types: [A] Entity sets. Constraints, and Relationships [B] Entity sets. Attributes and Constraints IC] Attributes. Constraints, and Relationships [D] Entity sets. Attributes, and Relationships

[D] Entity sets. Attributes, and Relationships

In Java Database Connectivity (JDBC). before we can execute SQL statements), we need to _ [A] Create a cursor. [B] Create an environment [C] Create a description. [D] Establish a connection to the database and create statement(s)

[D] Establish a connection to the database and create statement(s)

In the three-tier architecture, the database tier's function is to [A] All of the others. [B] Execute the business logic of the organization operating the database. [C] Manage the interactions with the user. [D] Execute queries that are requested from the application tier.

[D] Execute queries that are requested from the application tier.

Consider the Dalalog rule H(xy) <- Sfx. y) AND x > 2 AND y < 6. Relation S(x y) has 3 tuples (2.3). (3.5). and (4.6). What is about H? [A] H has a tuple (2.3) [B] H has 3 tuples (2.3) and (3.5) and (4.6) [C] H has 2 tuples (2.3) and (3.5) [D] H has a tuple (3.5)

[D] H has a tuple (3.5)

Choose the right statement [A] The action associated with the trigger executes no matter what the condition is hold or not [B] Triggering events do not support INSERT and DELETE. [C] All of the others. [D] When the trigger is awakened, it tests a condition. If the condition is satisfied, the action associated with the trigger is executed.

[D] When the trigger is awakened, it tests a condition. If the condition is satisfied, the action associated with the trigger is executed.

Which of following is never used as a data model' [A] Hierarchical data model [B] Relational data model [C] Tree-based data model [D] Graph-based data model [E] None of the others

[E] None of the others


Set pelajaran terkait

EC-Council Certified Encryption Specialist (ECES)

View Set

Understanding Business Chapter 17: Understanding Accounting and Business Information

View Set

Einstein's Special Theory of Relativity

View Set

chapter 3 review (legal aspects)

View Set