1. A domain is ______ if elements of the domain are considered to be indivisible units.
a) Atomic
b) Subatomic
c) Substructure
d) Subset
2. Identify the composite attributes
a) Salary
b) Credits
c) Section_id
d) None of the mentioned
3. Consider the relation given below and ind the maximum normal form applicable to them
1. R(A, B) with productions { A –> B }
2. R(A, B) with productions { B –> A }
3 R(A, B) with productions {A —> B, B –> A }
4 R(A, B, C) with productions {A –>B, B –> A, AB –> C }
a) 1, 2 and 3 are in 3NF and 4 is in BCNF
b) 1 and 2 are in BCNF and 3 and 4 are in 3NF
c) All are in 3NF
d) All are in BCNF
4. Which one is based on multi-valued dependency:
a) First
b) Second
c) Third
d) Fourth
5. If a relation is in BCNF, then it is also in
a) 1 NF
b) 2 NF
c) 3 NF
d) All of the mentioned
6. If every non-key attribute is functionally depedent primary key, then the relation will be in
a) First normal form
b) Second normal form
c) Third form
d) Fourth normal form
7. If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called _____ is needed.
a) DKNF
b) BCNF
c) Fourth
d) Third
8. The term for information that describes what type of data is available in a database is:
a) Data dictionary
b) data repository
c) Index data
d) Metadata
9. A data type that creates unique numbers for key columns in Microsoft Access is:
a) Autonumber
b) Boolean
c) Sequential key
d) Sequential number
10. A dependency exist between two columns when
a) Together they constitute a composite key for the table
b) Knowing the value in one column determines the value stored in another column
c) The table is in 3NF
d) Together they constitute a foreign key
11. _______________ joins are SQL server default
a) Outer
b) Inner
c) Equi
d) None of the Mentioned
12. The ________________ is essentially used to search for patterns in target string.
a) Like Predicate
b) Null Predicate
c) In Predicate
d) Out Predicate
13. Which of the following is/are the Database server functions?
i) Data management ii) Transaction management
iii) Compile queries iv) Query optimization
a) i, ii, and iv only
b) i, ii and iii only
c) ii, iii and iv only
d) All i, ii, iii, and iv
14. To delete a database ___________ command is used
a) Delete database database_name
b) Delete database_name
c) drop database database_name
d) drop database_name
15. ____________ is a combination of two of more attributes used as a primary key
a) Composite Key
b) Alternate Key
c) Candidate Key
d) Foreign Key
16. Which of the following is not the function of client?
a) Compile queries
b) Query optimization
c) Receive queries
d) Result formatting and presentation
17. ____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.
a) Procedure
b) Trigger
c) Curser
d) None of the Mentioned
18. ______________ requires that data should be made available to only authorized users.
a) Data integrity
b) Privacy
c) Security
d) None of the Mentioned
19. Some of the utilities of DBMS are _____________
i) Loading ii) Backup iii) File organization iv) Process Organization
a) i, ii, and iv only
b) i, ii and iii only
c) ii, iii and iv only
d) All i, ii, iii, and iv
20. ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.
a) Procedure
b) Trigger
c) Curser
d) None of the Mentioned
21. _____________, express the number of entities to which another entity can be associated via a relationship set.
a) Mapping Cardinality
b) Relational Cardinality
c) Participation Constraints
d) None of the mentioned
22. An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A.This is called as
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one
23. An entity in A is associated with at most one entity in B. An entity in B, however, can be associated with any number (zero or more) of entities in A.
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one
24. Data integrity constraints are used to:
a) Control who is allowed access to the data
b) Ensure that duplicate records are not entered into the table
c) Improve the quality of data entered for a specific property
d) Prevent users from changing the values stored in the table
25. Establishing limits on allowable property values, and specifying a set of acceptable, predefined options that can be assigned to a property are examples of:
a) Attributes
b) Data integrity constraints
c) Method constraints
d) Referential integrity constraints
26. Which of the following can be addressed by enforcing a referential integrity constraint?
a) All phone numbers must include the area code
b) Certain fields are required (such as the email address, or phone number) before the record is accepted
c) Information on the customer must be known before anything can be sold to that customer
d) Then entering an order quantity, the user must input a number and not some text (i.e., 12 rather than ‘a dozen’)
27. ______ is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
a) Entity Integrity Constraints
b) Referential Integrity Constraints
c) Domain Integrity Constraints
d) Domain Constraints
28. Which one of the following uniquely identifies the elements in the relation?
a) Secondary Key
b) Primary key
c) Foreign key
d) Composite key
29. Drop Table cannot be used to drop a table referenced by a _________ constraint.
a) Local Key
b) Primary Key
c) Composite Key
d) Foreign Key
30. ____________ is preferred method for enforcing data integrity
a) Constraints
b) Stored Procedure
c) Triggers
d) Cursors
Answers
1-a | 2-d | 3-d | 4-d | 5-d |
6-b | 7-b | 8-d | 9-a | 10-a |
11-b | 12-a | 13-a | 14-c | 15-a |
16-b | 17-b | 18-c | 19-b | 20-c |
21-a | 22-b | 23-d | 24-c | 25-b |
26-c | 27-b | 28-b | 29-d | 30-a |