Final Exam (DBMS Srm)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Srmdbms
S
Srmdbms
Community Contributor
Quizzes Created: 1 | Total Attempts: 265
Questions: 30 | Attempts: 265

SettingsSettingsSettings
Online Exam Quizzes & Trivia

Final Exam for DBMS SRM.
All the best :)


Questions and Answers
  • 1. 

    The ability to modify the internal schema without causing any change to external schema is

    • A.

      Physical Data independence

    • B.

      Logical Data independence

    • C.

      External Data independence

    • D.

      None of these

    Correct Answer
    A. pHysical Data independence
    Explanation
    Physical data independence refers to the ability to modify the internal schema of a database without affecting the external schema or the way data is accessed and manipulated by users or applications. This means that changes to the physical storage structures, such as adding or removing indexes or reorganizing data, can be made without requiring any modifications to the external schema. Logical data independence, on the other hand, refers to the ability to modify the conceptual schema without impacting the external schema. External data independence refers to the ability to modify the external schema without affecting the way data is stored internally. None of these options fully align with the given explanation, therefore, the correct answer is Physical Data Independence.

    Rate this question:

  • 2. 

    A relation R(A,b,C,D,E) has the following set of dependenciesF: A->BC, C->D, D->B, B->E,A->E. The decomposition of R: R1=(A,B,C), R2=(C,D), R3=(B,D,E) is 

    • A.

      Lossless and dependency preserving

    • B.

      Lossless but not dependency preserving

    • C.

      Not lossless but dependency preserving

    • D.

      Neither Lossless nor dependency preserving

    Correct Answer
    B. Lossless but not dependency preserving
    Explanation
    The decomposition of R into R1, R2, and R3 is lossless because all the attributes of R are preserved in the decomposition. However, it is not dependency preserving because the dependency A->BC is lost in the decomposition. In R1, we only have A, B, and C, but not D or E which are dependent on A. Therefore, the correct answer is "Lossless but not dependency preserving."

    Rate this question:

  • 3. 

    Consider a relation Student with attributes  class, section, Roll, name ,address. For any sec, class and roll there is only one address and for one address there is only one name. The highest normal form in which the table is 

    • A.

      1 NF

    • B.

      2 NF

    • C.

      3 NF

    • D.

      BCNF

    Correct Answer
    B. 2 NF
    Explanation
    The given relation Student has attributes class, section, Roll, name, and address. It is mentioned that for any section, class, and roll, there is only one address, and for one address, there is only one name. This indicates a functional dependency between the attributes.

    In the 2nd Normal Form (2NF), the relation should be in 1NF and there should be no partial dependencies. Since the given relation satisfies these conditions, it can be considered to be in 2NF.

    Rate this question:

  • 4. 

    Consider the following schedule S with three transactions         S: R1(B); R3(C); R1(A); W2(A); W1(A); W2(B); W3(A); W1(B); W3(B); W3(C).Which of the following is TRUE w.r.t the above schedule

    • A.

      It is conflict serializable with sequence

    • B.

      It is conflict serializable with sequence

    • C.

      It is view serializable but not conflict serializable

    • D.

      It is neither conflict serializable nor view serializable

    Correct Answer
    C. It is view serializable but not conflict serializable
    Explanation
    The given schedule is view serializable because it can be transformed into an equivalent serial schedule by preserving the order of read and write operations on each data item. However, it is not conflict serializable because there is a conflict between transactions T1 and T2, where T1 writes to data item A and T2 reads from the same data item.

    Rate this question:

  • 5. 

    If every attribute is a candidate key then the table is in

    • A.

      1NF

    • B.

      2NF

    • C.

      3NF

    • D.

      BCNF

    Correct Answer
    D. BCNF
    Explanation
    If every attribute in a table is a candidate key, it means that each attribute uniquely identifies a tuple in the table. This implies that there are no partial dependencies or functional dependencies on any subset of attributes. Therefore, the table is in Boyce-Codd Normal Form (BCNF), which is a higher level of normalization than 1NF, 2NF, and 3NF. In BCNF, all non-trivial functional dependencies are eliminated, ensuring that the table is free from redundancy and anomalies.

    Rate this question:

  • 6. 

    What should be the condition for total participation of the entity in a relation

    • A.

      Maximum cardinality should be one

    • B.

      Minimum cardinality should be zero

    • C.

      Minimum cardinality should be one

    • D.

      None of these

    Correct Answer
    C. Minimum cardinality should be one
    Explanation
    The condition for total participation of an entity in a relation is that the minimum cardinality should be one. This means that every entity in the relation must be associated with at least one instance of another entity. If the minimum cardinality is set to zero, it would allow for the possibility of an entity not being associated with any other entity in the relation, which would not fulfill the condition of total participation. Therefore, the correct answer is that the minimum cardinality should be one.

    Rate this question:

  • 7. 

     In the top down database design approach which of the following is taken as input?

    • A.

      Entity

    • B.

      Relations

    • C.

      ER Diagrams

    • D.

      Attributes

    Correct Answer
    A. Entity
    Explanation
    In the top-down database design approach, the input taken is the entity. This means that the design process starts by identifying the main entities or objects that need to be represented in the database. These entities are the key elements that the database will store information about. By focusing on the entities first, the design process can then move on to defining the relationships between these entities, creating ER diagrams, and determining the attributes or properties of each entity.

    Rate this question:

  • 8. 

    Tuple relational calculus is a

    • A.

      Procedural Language

    • B.

      Materialized language

    • C.

      Non-procedural language

    • D.

      None

    Correct Answer
    C. Non-procedural language
    Explanation
    Tuple relational calculus is a non-procedural language because it specifies what data is needed without specifying how to retrieve it. It focuses on the logical representation of the desired data and leaves the implementation details to the database management system. This allows for a more declarative and abstract approach to querying and manipulating data, making it easier for users to express their requirements without having to worry about the specific steps to achieve them.

    Rate this question:

  • 9. 

    Which of the following scenarios may lead to an irrecoverable error in a database system?

    • A.

      A transaction writes a data item after it is read by an uncommitted transaction

    • B.

      A transaction reads a data item after it is read by an uncommitted transaction

    • C.

      A transaction reads a data item after it is written by a committed transaction

    • D.

      A transaction reads a data item after it is written by an uncommitted transaction

    Correct Answer
    D. A transaction reads a data item after it is written by an uncommitted transaction
    Explanation
    When a transaction reads a data item after it is written by an uncommitted transaction, it may lead to an irrecoverable error in a database system. This is because the uncommitted transaction's changes are not yet finalized and may be rolled back. If the subsequent transaction reads the data item before the changes are committed, it may retrieve incorrect or inconsistent data, leading to an irrecoverable error in the system.

    Rate this question:

  • 10. 

    R is a relational schema R(ABC), F ={A->BC,B->C,AB->C } is a set of functional dependencies. The canonical cover will be 

    • A.

      A->BC, B->C

    • B.

      A->BC, AB->C

    • C.

      A->BC, A->B

    • D.

      A->B, B->C

    Correct Answer
    D. A->B, B->C
    Explanation
    The given set of functional dependencies F can be simplified to the canonical cover A->B, B->C. This means that attribute A determines attribute B, and attribute B determines attribute C. This is the simplest form of the functional dependencies that still preserves all the dependencies in the original set.

    Rate this question:

  • 11. 

    Which privilege is required to create a database?

    • A.

      SYSDBA

    • B.

      DBA

    • C.

      SYSOPER

    • D.

      RESOURCE

    Correct Answer
    A. SYSDBA
    Explanation
    To create a database, the privilege required is SYSDBA. SYSDBA is a powerful privilege that allows a user to perform administrative tasks, including creating and managing databases, as well as performing backup and recovery operations. This privilege is typically granted to database administrators who need full control over the database system. DBA and SYSOPER privileges do not have the necessary permissions to create a database. RESOURCE privilege is a lower level privilege that grants the ability to create and manage schema objects within a database, but not to create a database itself.

    Rate this question:

  • 12. 

    Which of the following is not a binary operator in relational algebra?

    • A.

      Join

    • B.

      Semi Join

    • C.

      Assignment

    • D.

      Project

    Correct Answer
    D. Project
    Explanation
    The correct answer is "Project." In relational algebra, a binary operator is an operation that takes two relations as input and produces a new relation as output. Join and Semi Join are examples of binary operators as they combine two relations based on a common attribute. However, Project is a unary operator as it only operates on a single relation and selects specific attributes to be included in the resulting relation. Assignment is not a binary operator, but rather a concept used in programming or database management systems to assign values to variables or attributes.

    Rate this question:

  • 13. 

    The developer issues the following statement:CREATE OR REPLACE TRIGGER soccer_fans_snacks_02 BEFORE DELETE ONSOCCER_FANSBEGINDELETE FROM soccer_fans_snacksWHERE fan_id = :old.fan_id;END;Why will trigger creation fail?

    • A.

      The row trigger does not properly reference the old value in FAN_ID.

    • B.

      The statement trigger should have been defined as a row trigger.

    • C.

      The statement trigger fires after the delete statement is processed.

    • D.

      The row trigger does not properly define the associated table

    Correct Answer
    B. The statement trigger should have been defined as a row trigger.
    Explanation
    The trigger creation will fail because the statement trigger should have been defined as a row trigger.

    Rate this question:

  • 14. 

    The SELECT statement, that retrieves all the columns from empinfo table name starting with d to p is 

    • A.

      SELECT ALL FROM empinfo WHERE ename like '[d-p]%';

    • B.

      SELECT * FROM empinfo WHERE ename is '[d-p]%';

    • C.

      SELECT * FROM empinfo WHERE ename like '[p-d]%';

    • D.

      SELECT * FROM empinfo WHERE ename like '[d-p]%';

    Correct Answer
    D. SELECT * FROM empinfo WHERE ename like '[d-p]%';
    Explanation
    The correct answer is "SELECT * FROM empinfo WHERE ename like '[d-p]%';". This query uses the LIKE operator with a pattern '[d-p]%' to retrieve all the rows from the empinfo table where the ename column starts with any letter from 'd' to 'p'. The '%' wildcard is used to match any characters after the specified pattern.

    Rate this question:

  • 15. 

    The main task carried out in the …………… is to remove repeating attributes to separate tables.

    • A.

      First Normal Form

    • B.

      Second Normal Form

    • C.

      Third Normal Form

    • D.

      Fourth Normal Form

    Correct Answer
    D. Fourth Normal Form
    Explanation
    The main task carried out in the Fourth Normal Form is to remove repeating attributes to separate tables. This is done to eliminate redundancy and improve data integrity. By separating repeating attributes into their own tables, we can ensure that each table represents a single entity and that there is no data duplication. This normalization form helps to maintain data consistency and allows for more efficient data storage and retrieval.

    Rate this question:

  • 16. 

    Which statement is true about views?

    • A.

      A view can be created as a join on two or more tables.

    • B.

      A view cannot have an ORDER BY clause in the SELECT statement.

    • C.

      A view cannot be created with a GROUP BY clause in the SELECT statement

    • D.

      A view must have aliases defined for the column names in the SELECT statement

    Correct Answer
    A. A view can be created as a join on two or more tables.
    Explanation
    A view can be created as a join on two or more tables. This means that when creating a view, it is possible to combine data from multiple tables by specifying the necessary join conditions. This allows for a more efficient and organized way of retrieving and manipulating data from multiple tables, as the view can be treated as a single virtual table. By using views, complex queries involving multiple tables can be simplified and reused.

    Rate this question:

  • 17. 

    Evaluate this SQL statement:SELECT employee_id, e.department_id, department_name, salary FROM employees e, departments d WHERE e.department_id = d.department_id;Which SQL statement is equivalent to the above SQL statement?

    • A.

      SELECT employee_id, department_id, department_name, salary FROM employees WHERE department_id IN (SELECT department_id FROM departments);

    • B.

      SELECT employee_id, department_id, department_name, salary FROM employees NATURAL JOIN departments;

    • C.

      SELECT employee_id, d.department_id, department_name, salary FROM employees e JOIN departments d ON e.department_id = d.department_id;

    • D.

      SELECT employee_id, department_id, department_name, salary FROM employees JOIN departments USING (e.department_id, d.department_id);

    Correct Answer
    C. SELECT employee_id, d.department_id, department_name, salary FROM employees e JOIN departments d ON e.department_id = d.department_id;
    Explanation
    The correct answer is: SELECT employee_id, d.department_id, department_name, salary FROM employees e JOIN departments d ON e.department_id = d.department_id;

    This SQL statement is equivalent to the original statement because it uses the JOIN keyword to combine the "employees" and "departments" tables based on the "department_id" column. It also selects the necessary columns: employee_id, department_id, department_name, and salary. The alias "e" is used for the "employees" table and "d" is used for the "departments" table. This statement ensures that only the rows with matching department IDs are included in the result.

    Rate this question:

  • 18. 

    Evaluate this SQL statement:SELECT e.EMPLOYEE_ID,e.LAST_NAME,e.DEPARTMENT_ID, d.DEPARTMENT_NAME FROM EMP e, DEPARTMENT d WHERE e.DEPARTMENT_ID = d.DEPARTMENT_ID;In the statement, which capabilities of a SELECT statement are performed?

    • A.

      Selection, projection, join

    • B.

      Difference, projection, join

    • C.

      Selection, intersection, join

    • D.

      Intersection, projection, join

    • E.

      Difference, projection, product

    Correct Answer
    A. Selection, projection, join
    Explanation
    The given SQL statement performs selection, projection, and join capabilities of a SELECT statement.

    - Selection: It filters the rows from the EMP and DEPARTMENT tables based on the condition e.DEPARTMENT_ID = d.DEPARTMENT_ID, selecting only the rows where the department IDs match.
    - Projection: It selects specific columns from the EMP and DEPARTMENT tables, namely e.EMPLOYEE_ID, e.LAST_NAME, e.DEPARTMENT_ID, and d.DEPARTMENT_NAME.
    - Join: It combines the rows from both tables based on the common department ID column, creating a result set that includes data from both tables.

    Rate this question:

  • 19. 

    In which three cases would you use the USING clause? (Choose three.)

    • A.

      You want to create a nonequijoin.

    • B.

      The tables to be joined have multiple NULL columns

    • C.

      The tables to be joined have columns of the same name and different data types

    • D.

      The tables to be joined have columns with the same name and compatible data types

    • E.

      You want to use a NATURAL join, but you want to restrict the number of columns in the join condition

    Correct Answer(s)
    C. The tables to be joined have columns of the same name and different data types
    D. The tables to be joined have columns with the same name and compatible data types
    E. You want to use a NATURAL join, but you want to restrict the number of columns in the join condition
    Explanation
    The USING clause is used in three cases:
    1) When the tables to be joined have columns of the same name but different data types.
    2) When the tables to be joined have columns with the same name and compatible data types.
    3) When you want to use a NATURAL join, but you want to restrict the number of columns in the join condition.

    Rate this question:

  • 20. 

    In which two cases would you use an outer join? (Choose two.)

    • A.

      The tables being joined have NOT NULL columns.

    • B.

      The tables being joined have only matched data.

    • C.

      The columns being joined have NULL values.

    • D.

      The tables being joined have only unmatched data

    • E.

      The tables being joined have both matched and unmatched data

    • F.

      Only when the tables have a primary key/foreign key relationship

    Correct Answer(s)
    C. The columns being joined have NULL values.
    E. The tables being joined have both matched and unmatched data
    Explanation
    An outer join is used when the columns being joined have NULL values and when the tables being joined have both matched and unmatched data. In an outer join, all the rows from one table are included in the result set, even if there is no match in the other table. This allows for the inclusion of NULL values and both matched and unmatched data in the output.

    Rate this question:

  • 21. 

    A surrogate key is similar to...

    • A.

      Primary key

    • B.

      Artificial key

    • C.

      Foreign key

    • D.

      None of the above

    Correct Answer
    B. Artificial key
    Explanation
    A surrogate key is similar to an artificial key because it is a unique identifier that is created solely for the purpose of identifying records in a database. Like an artificial key, a surrogate key does not have any inherent meaning or relationship to the data it represents. It is typically generated automatically by the database system and helps to ensure data integrity and improve performance in database operations.

    Rate this question:

  • 22. 

    Which one will be violated, if the primary key value is null in the new tuple...

    • A.

      Key constraint

    • B.

      Entity integrity

    • C.

      Referential integrity

    • D.

      Domain constraint

    Correct Answer
    B. Entity integrity
    Explanation
    Entity integrity refers to the rule that states that the primary key of a table must have a unique value and cannot be null. In other words, every record in a table must have a valid and unique identifier. If the primary key value is null in a new tuple, it violates the entity integrity constraint because it means that the record does not have a valid identifier.

    Rate this question:

  • 23. 

    An insert operation may violate...

    • A.

      Key constraint and Domain constraint

    • B.

      Referential integrity and Entity integrity

    • C.

      only Entity integrity

    • D.

      All 4 constraints

    Correct Answer
    D. All 4 constraints
    Explanation
    The correct answer is "All 4 constraints." An insert operation may violate all four constraints, which include key constraint, domain constraint, referential integrity, and entity integrity. The key constraint ensures that each record in a table has a unique identifier, and violating this constraint would result in duplicate keys. The domain constraint defines the valid values for a column, and violating this constraint would mean inserting an invalid value. Referential integrity ensures that relationships between tables are maintained, and violating this constraint would result in inserting a foreign key that does not exist in the referenced table. Lastly, entity integrity ensures that each record in a table has a unique primary key value, and violating this constraint would mean inserting a duplicate primary key.

    Rate this question:

  • 24. 

    A delete operation may violate...

    • A.

      Key constraint

    • B.

      Entity integrity

    • C.

      Referential integrity

    • D.

      None of the above

    Correct Answer
    C. Referential integrity
    Explanation
    Referential integrity ensures that relationships between tables in a database are maintained accurately. When a delete operation is performed, it may violate referential integrity if it removes a record that is referenced by another table. This means that a record cannot be deleted if it is being referenced by another table, as it would result in orphaned records or broken relationships. Therefore, the correct answer is referential integrity.

    Rate this question:

  • 25. 

     If transaction 'A' sees the effects of transaction 'B', and 'B' then aborts, then 'A' also gets aborted then this schedulehaving only two transactions A and B will be..

    • A.

      Serializable

    • B.

      recoverable

    • C.

      Cascadeless

    • D.

      None of the above

    Correct Answer
    B. recoverable
    Explanation
    If transaction 'A' sees the effects of transaction 'B', it means that 'A' reads data that has been modified by 'B'. If 'B' then aborts, it means that its changes are rolled back and not committed. In this case, if 'A' were to continue and commit its changes, it would lead to an inconsistent state because it has already seen the effects of 'B' which are now being rolled back. To maintain recoverability, where a transaction can be rolled back if needed, 'A' also needs to be aborted in this scenario. Therefore, the schedule is recoverable.

    Rate this question:

  • 26. 

    Cascadelessness can be ensured by..

    • A.

      Allowing transactions to only read committed data.

    • B.

      Allowing transactions to only read their own version of data

    • C.

      Both of the above

    • D.

      None of the above

    Correct Answer
    C. Both of the above
    Explanation
    Cascadelessness refers to the property in database systems where a transaction's read operations are not affected by any uncommitted changes made by other transactions. By allowing transactions to only read committed data, it ensures that any changes made by other transactions are already finalized and will not be rolled back. Similarly, by allowing transactions to only read their own version of data, it ensures that the transaction is isolated from any uncommitted changes made by other transactions. Therefore, both of these approaches ensure cascadelessness by preventing the reading of uncommitted data.

    Rate this question:

  • 27. 

    Precedence graph can be used to test....

    • A.

      Conflict serializability

    • B.

      View serializability

    • C.

      Both of the above

    • D.

      None

    Correct Answer
    A. Conflict serializability
    Explanation
    Precedence graph can be used to test conflict serializability. Conflict serializability is a property of a schedule in a database system, which ensures that the final result of executing concurrent transactions is equivalent to the result of executing them in some serial order. Precedence graph helps in determining if there is any conflict between the operations of different transactions in a schedule, by representing the transactions as nodes and the conflicts as edges in the graph. Therefore, the correct answer is conflict serializability.

    Rate this question:

  • 28. 

    Which operation can lead to the phantom phenomenon..

    • A.

      Delete

    • B.

      Insert

    • C.

      Read

    • D.

      None of the above

    Correct Answer
    B. Insert
    Explanation
    The phantom phenomenon refers to a situation in which a query in a database returns extra rows that do not actually exist. This can occur when an insert operation is performed concurrently with a query. If the query is executed before the insert operation is completed, it may not be aware of the newly inserted rows, leading to the phantom phenomenon. Therefore, the correct answer is "Insert" as it is the operation that can cause this phenomenon.

    Rate this question:

  • 29. 

    Consider the following graph-based locking protocol that allows only exclusive lock modes, and that operates on data graphs that are in the form of a rooted directed acyclic graph.• A transaction can lock any vertex first.• To lock any other vertex, the transaction must have visited all the parents of that vertex, and must be holding a lock on one of the parents of the vertex.this scheme ensures..

    • A.

      Serializability

    • B.

      Deadlock freedom

    • C.

      Both of the above

    • D.

      None of the above

    Correct Answer
    C. Both of the above
    Explanation
    This graph-based locking protocol ensures both serializability and deadlock freedom. Serializability is achieved because the protocol enforces a strict order of locking vertices, ensuring that conflicting operations do not occur simultaneously. Deadlock freedom is guaranteed because the protocol requires a transaction to visit all the parents of a vertex before locking it, preventing cycles in the locking order and avoiding potential deadlocks. Therefore, both properties are ensured by this locking protocol.

    Rate this question:

  • 30. 

    Concept of shadow paging is used to to ensure..

    • A.

      Durability

    • B.

      Recoverability

    • C.

      cacadelessness

    • D.

      Atomicity

    Correct Answer
    D. Atomicity
    Explanation
    The concept of shadow paging is used to ensure atomicity. Shadow paging is a technique used in database systems to provide transaction atomicity. It involves creating a duplicate copy of the database before any modifications are made. This duplicate copy, known as a shadow page, allows for the changes to be made in isolation without affecting the original database. If a transaction fails or is aborted, the changes made in the shadow page can simply be discarded, ensuring that the original database remains unchanged. This ensures that transactions are either fully completed or fully rolled back, maintaining the atomicity property.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 20, 2014
    Quiz Created by
    Srmdbms

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.