TRB-CS-VIP ONLINE COACHING CENTER ( TEST-3) *RDBMS Fundamentals*
TRB-CS-VIP ONLINE COACHING CENTER ( TEST-3) *RDBMS Fundamentals*
Quiz
- Redundancy is dangerous as it is a potential threat to data
- Integrity
- Consistency
- Both (a) and (b)
- Sufficiency
- Who is more concerned about the conceptual level of the DBMS
- The Systems programmer
- The end user
- Client
- DBA
- An Attribute of one table matching the primary key of another table is called as
- Candidate key
- Foreign key
- Secondary key
- Composite
- If a relation is in BCNF, then it is also in
- 1NF
- 2NF
- 3NF
- All of the above
- The way a particular application views the data from the database that the application uses is a
- Schema
- Sub Schema
- Relational Model
- Module
- Locking can be used for:
- Lost Update
- Uncommitted dependency
- Inconsistent data
- All of the above
- In relation Model Column is referred to as :
- Attribute
- Entity
- Degree
- Tuple
- ER Model Comes under
- Record based logical Model
- Object based logical Model
- Physical data Model
- All of above
- Which of following is the problem of file management system? (a) Lack of data independence(b) Data redundancy(c) Update (d) all Periodically adding, changing, & Deleting file records is called file
- Restructuring
- Upgrading
- Renewing
- Updating
- Which of the following is a relational database
- DAL
- FoxPro
- dbase-IV
- 4th Dimensions
- The Index consists of :
- A list of keys
- Pointers to the master list
- Both (a) & (b)
- None of the above
- Report generators are used to
- Store data input by a user
- retrieve information from files
- Answer queries
- Both (b) & (c)
- In a relational schema, each tuple is divided into fields called :
- Relations
- Domains
- Queries
- None of above
- The set of permitted values for each attribute is called its :
- Attribute range
- Attribute set
- Group
- Domain
- A DBMS consists of application programs called :
- TOTAL
- BPL
- AUTOFLOW
- FORTRAN
- A locked file can be :
- is used to hide sensitive information
- is used to hide sensitive information
- Accessed by only one user
- None
- Transaction X holds a shared lock R. if transaction Y requests for a shared lock on R :
- Immediately Granted
- Immediately rejected
- Granted as is released by X
- result in deadlock situation
- Command used to select only one copy of each set of duplicable rows :
- Select Unique
- Select Different
- Select Distant
- None
- Which of following is the characteristics of a relational database model?
- Tables
- records
- Complex logical relationship
- All of these
- Which command is used to remove rows from a table?
- Delete
- Remove
- Both (a) & (b)
- Truncate
- Which command is used to remove a table or index from the database in SQL?
- Drop table
- Delete Table
- Erase Table
- None of above
- A report generator is used to :
- Data Entry
- Update files
- Print files on paper
- None
- The modify operation is likely to be done after :
- Insert
- Look-up
- Delete
- None of above
- The database environment has all of the following components except :
- Separate files
- Database
- Users
- DBA
- If every non key attribute is functionally dependent on the primary key, then the relation will be in :
- 1NF
- 2NF
- 3NF
- 4NF
கருத்துகள் இல்லை:
கருத்துரையிடுக