Database Set 5 (30 mcqs)

1. In the __________ normal form, a composite attribute is converted to individual attributes.
A) First
B) Second
C) Third
D) Fourth

2. A table on the many side of a one to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
b) Be in Third Normal Form (3NF)
c) Have a single attribute key
d) Have a composite key

3. Tables in second normal form (2NF):
a) Eliminate all hidden dependencies
b) Eliminate the possibility of a insertion anomalies
c) Have a composite key
d) Have all non key fields depend on the whole primary key

4. Which-one ofthe following statements about normal forms is FALSE?
a) BCNF is stricter than 3 NF
b) Lossless, dependency -preserving decomposition into 3 NF is always possible
c) Loss less, dependency – preserving decomposition into BCNF is always possible
d) Any relation with two attributes is BCNF

5. Functional Dependencies are the types of constraints that are based on______
a) Key
b) Key revisited
c) Superset key
d) None of these

6. Which is a bottom-up approach to database design that design by examining the relationship between attributes:
a) Functional dependency
b) Database modeling
c) Normalization
d) Decomposition

7. Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:
a) 1NF
b) 2NF
c) 3NF
d) All of the mentioned
8. Which forms has a relation that possesses data about an individual entity:
a) 2NF
b) 3NF
c) 4NF
d) 5NF

9. Which forms are based on the concept of functional dependency:
a) 1NF
b) 2NF
c) 3NF
d) 4NF

10. Empdt1(empcode, name, street, city, state,pincode).
For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in
a) 1 NF only
b) 2 NF and hence also in 1 NF
c) 3NF and hence also in 2NF and 1NF
d) BCNF and hence also in 3NF, 2NF and 1NF

11. ARIES uses a ___________ to identify log records, and stores it in database pages.
a) Log sequence number
b) Log number
c) Lock number
d) Sequence

12. ARIES supports ___________ operations, which are physical in that the affected page is physically identified, but can be logical within the page.
a) Physiological redo
b) Physiological undo
c) Logical redo
d) Logical undo

13. ______________ is used to minimize unnecessary redos during recovery.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned

14. __________ scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.
a) Fuzzy logic
b) Checkpoints
c) Fuzzy-checkpoint
d) Logical checkpoint

15. Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the _______ field of the page.
a) LSN
b) ReadLSN
c) PageLSN
d) RedoLSN

16. There are special redo-only log records generated during transaction rollback, called _________ in ARIES.
a) Compensation log records
b) Read log records
c) Page log records
d) Redo log records

17. The __________________ contains a list of pages that have been updated in the database buffer.
a) Dirty page table
b) Page table
c) Dirty redo
d) All of the mentioned

18. ___________ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned

19. __________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned

20. ______________ rolls back all transactions that were incomplete at the time of crash.
a) Analysis pass
b) Redo pass
c) Undo pass
d) None of the mentioned

21. The Java __________ specification defines an application programming interface for communication between the Web server and the application program.
a) Servlet
b) Server
c) Program
d) Randomize

22. The doGet() method in the example extracts values of the parameter’s type and number by using __________
a) request.getParameter()
b) request.setParameter()
c) responce.getParameter()
d) responce.getAttribute()

23. How many JDBC driver types does Sun define?
a) One
b) Two
c) Three
d) Four

24. Which JDBC driver Type(s) can be used in either applet or servlet code?
a) Both Type 1 and Type 2
b) Both Type 1 and Type 3
c) Both Type 3 and Type 4
d) Type 4 only

25. What MySQL property is used to create a surrogate key in MySQL?
d) None of the mentioned

26. A JSP is transformed into a(n):
a) Java applet
b) Java servlet
c) Either 1 or 2 above
d) Neither 1 nor 2 above

27. Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge?
a) Type 1
b) Type 2
c) Type 3
d) Type 4

28. What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?
a) VBScript only
b) Jscript only
c) Java only
d) All of the above are supported

29. What is bytecode?
a) Machine-specific code
b) Java code
c) Machine-independent code
d) None of the above is correct

30. Where is metadata stored in MySQL?
a) In the MySQL database metadata
b) In the MySQL database metasql
c) In the MySQL database mysql
d) None of the mentioned

1-a 2-d 3-a 4-c 5-a
6-c 7-c 8-c 9-c 10-b
11-b 12-a 13-a 14-c 15-c
16-a 17-a 18-a 19-b 20-c
21-a 22-a 23-d 24-c 25-c
26-b 27-a 28-c 29-c 30-c
Spread the love

Leave a Comment

Your email address will not be published. Required fields are marked *