The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
The ability to modify the internal schema without causing any change to external schema is
A.
Physical Data independence
B.
Logical Data independence
C.
External Data independence
D.
None of these
Correct Answer
A. pHysical Data independence
Explanation Physical data independence refers to the ability to modify the internal schema of a database without affecting the external schema or the way data is accessed and manipulated by users or applications. This means that changes to the physical storage structures, such as adding or removing indexes or reorganizing data, can be made without requiring any modifications to the external schema. Logical data independence, on the other hand, refers to the ability to modify the conceptual schema without impacting the external schema. External data independence refers to the ability to modify the external schema without affecting the way data is stored internally. None of these options fully align with the given explanation, therefore, the correct answer is Physical Data Independence.
Rate this question:
2.
A relation R(A,b,C,D,E) has the following set of dependenciesF: A->BC, C->D, D->B, B->E,A->E. The decomposition of R: R1=(A,B,C), R2=(C,D), R3=(B,D,E) is
A.
Lossless and dependency preserving
B.
Lossless but not dependency preserving
C.
Not lossless but dependency preserving
D.
Neither Lossless nor dependency preserving
Correct Answer
B. Lossless but not dependency preserving
Explanation The decomposition of R into R1, R2, and R3 is lossless because all the attributes of R are preserved in the decomposition. However, it is not dependency preserving because the dependency A->BC is lost in the decomposition. In R1, we only have A, B, and C, but not D or E which are dependent on A. Therefore, the correct answer is "Lossless but not dependency preserving."
Rate this question:
3.
Consider a relation Student with attributes class, section, Roll, name ,address. For any sec, class and roll there is only one address and for one address there is only one name. The highest normal form in which the table is
A.
1 NF
B.
2 NF
C.
3 NF
D.
BCNF
Correct Answer
B. 2 NF
Explanation The given relation Student has attributes class, section, Roll, name, and address. It is mentioned that for any section, class, and roll, there is only one address, and for one address, there is only one name. This indicates a functional dependency between the attributes.
In the 2nd Normal Form (2NF), the relation should be in 1NF and there should be no partial dependencies. Since the given relation satisfies these conditions, it can be considered to be in 2NF.
Rate this question:
4.
Consider the following schedule S with three transactions S: R1(B); R3(C); R1(A); W2(A); W1(A); W2(B); W3(A); W1(B); W3(B); W3(C).Which of the following is TRUE w.r.t the above schedule
A.
It is conflict serializable with sequence
B.
It is conflict serializable with sequence
C.
It is view serializable but not conflict serializable
D.
It is neither conflict serializable nor view serializable
Correct Answer
C. It is view serializable but not conflict serializable
Explanation The given schedule is view serializable because it can be transformed into an equivalent serial schedule by preserving the order of read and write operations on each data item. However, it is not conflict serializable because there is a conflict between transactions T1 and T2, where T1 writes to data item A and T2 reads from the same data item.
Rate this question:
5.
If every attribute is a candidate key then the table is in
A.
1NF
B.
2NF
C.
3NF
D.
BCNF
Correct Answer
D. BCNF
Explanation If every attribute in a table is a candidate key, it means that each attribute uniquely identifies a tuple in the table. This implies that there are no partial dependencies or functional dependencies on any subset of attributes. Therefore, the table is in Boyce-Codd Normal Form (BCNF), which is a higher level of normalization than 1NF, 2NF, and 3NF. In BCNF, all non-trivial functional dependencies are eliminated, ensuring that the table is free from redundancy and anomalies.
Rate this question:
6.
What should be the condition for total participation of the entity in a relation
A.
Maximum cardinality should be one
B.
Minimum cardinality should be zero
C.
Minimum cardinality should be one
D.
None of these
Correct Answer
C. Minimum cardinality should be one
Explanation The condition for total participation of an entity in a relation is that the minimum cardinality should be one. This means that every entity in the relation must be associated with at least one instance of another entity. If the minimum cardinality is set to zero, it would allow for the possibility of an entity not being associated with any other entity in the relation, which would not fulfill the condition of total participation. Therefore, the correct answer is that the minimum cardinality should be one.
Rate this question:
7.
In the top down database design approach which of the following is taken as input?
A.
Entity
B.
Relations
C.
ER Diagrams
D.
Attributes
Correct Answer
A. Entity
Explanation In the top-down database design approach, the input taken is the entity. This means that the design process starts by identifying the main entities or objects that need to be represented in the database. These entities are the key elements that the database will store information about. By focusing on the entities first, the design process can then move on to defining the relationships between these entities, creating ER diagrams, and determining the attributes or properties of each entity.
Rate this question:
8.
Tuple relational calculus is a
A.
Procedural Language
B.
Materialized language
C.
Non-procedural language
D.
None
Correct Answer
C. Non-procedural language
Explanation Tuple relational calculus is a non-procedural language because it specifies what data is needed without specifying how to retrieve it. It focuses on the logical representation of the desired data and leaves the implementation details to the database management system. This allows for a more declarative and abstract approach to querying and manipulating data, making it easier for users to express their requirements without having to worry about the specific steps to achieve them.
Rate this question:
9.
Which of the following scenarios may lead to an irrecoverable error in a database system?
A.
A transaction writes a data item after it is read by an uncommitted transaction
B.
A transaction reads a data item after it is read by an uncommitted transaction
C.
A transaction reads a data item after it is written by a committed transaction
D.
A transaction reads a data item after it is written by an uncommitted transaction
Correct Answer
D. A transaction reads a data item after it is written by an uncommitted transaction
Explanation When a transaction reads a data item after it is written by an uncommitted transaction, it may lead to an irrecoverable error in a database system. This is because the uncommitted transaction's changes are not yet finalized and may be rolled back. If the subsequent transaction reads the data item before the changes are committed, it may retrieve incorrect or inconsistent data, leading to an irrecoverable error in the system.
Rate this question:
10.
R is a relational schema R(ABC), F ={A->BC,B->C,AB->C } is a set of functional dependencies. The canonical cover will be
A.
A->BC, B->C
B.
A->BC, AB->C
C.
A->BC, A->B
D.
A->B, B->C
Correct Answer
D. A->B, B->C
Explanation The given set of functional dependencies F can be simplified to the canonical cover A->B, B->C. This means that attribute A determines attribute B, and attribute B determines attribute C. This is the simplest form of the functional dependencies that still preserves all the dependencies in the original set.
Rate this question:
11.
Which privilege is required to create a database?
A.
SYSDBA
B.
DBA
C.
SYSOPER
D.
RESOURCE
Correct Answer
A. SYSDBA
Explanation To create a database, the privilege required is SYSDBA. SYSDBA is a powerful privilege that allows a user to perform administrative tasks, including creating and managing databases, as well as performing backup and recovery operations. This privilege is typically granted to database administrators who need full control over the database system. DBA and SYSOPER privileges do not have the necessary permissions to create a database. RESOURCE privilege is a lower level privilege that grants the ability to create and manage schema objects within a database, but not to create a database itself.
Rate this question:
12.
Which of the following is not a binary operator in relational algebra?
A.
Join
B.
Semi Join
C.
Assignment
D.
Project
Correct Answer
D. Project
Explanation The correct answer is "Project." In relational algebra, a binary operator is an operation that takes two relations as input and produces a new relation as output. Join and Semi Join are examples of binary operators as they combine two relations based on a common attribute. However, Project is a unary operator as it only operates on a single relation and selects specific attributes to be included in the resulting relation. Assignment is not a binary operator, but rather a concept used in programming or database management systems to assign values to variables or attributes.
Rate this question:
13.
The developer issues the following statement:CREATE OR REPLACE TRIGGER soccer_fans_snacks_02 BEFORE DELETE ONSOCCER_FANSBEGINDELETE FROM soccer_fans_snacksWHERE fan_id = :old.fan_id;END;Why will trigger creation fail?
A.
The row trigger does not properly reference the old value in
FAN_ID.
B.
The statement trigger should have been defined as a row trigger.
C.
The statement trigger fires after the delete statement is
processed.
D.
The row trigger does not properly define the associated table
Correct Answer
B. The statement trigger should have been defined as a row trigger.
Explanation The trigger creation will fail because the statement trigger should have been defined as a row trigger.
Rate this question:
14.
The SELECT statement, that retrieves all the columns from empinfo table name starting with d to p is
A.
SELECT ALL FROM empinfo WHERE ename like '[d-p]%';
B.
SELECT * FROM empinfo WHERE ename is '[d-p]%';
C.
SELECT * FROM empinfo WHERE ename like '[p-d]%';
D.
SELECT * FROM empinfo WHERE ename like '[d-p]%';
Correct Answer
D. SELECT * FROM empinfo WHERE ename like '[d-p]%';
Explanation The correct answer is "SELECT * FROM empinfo WHERE ename like '[d-p]%';". This query uses the LIKE operator with a pattern '[d-p]%' to retrieve all the rows from the empinfo table where the ename column starts with any letter from 'd' to 'p'. The '%' wildcard is used to match any characters after the specified pattern.
Rate this question:
15.
The main task carried out in the …………… is to remove repeating attributes to separate tables.
A.
First Normal Form
B.
Second Normal Form
C.
Third Normal Form
D.
Fourth Normal Form
Correct Answer
D. Fourth Normal Form
Explanation The main task carried out in the Fourth Normal Form is to remove repeating attributes to separate tables. This is done to eliminate redundancy and improve data integrity. By separating repeating attributes into their own tables, we can ensure that each table represents a single entity and that there is no data duplication. This normalization form helps to maintain data consistency and allows for more efficient data storage and retrieval.
Rate this question:
16.
Which statement is true about views?
A.
A view can be created as a join on two or more tables.
B.
A view cannot have an ORDER BY clause in the SELECT statement.
C.
A view cannot be created with a GROUP BY clause in the SELECT statement
D.
A view must have aliases defined for the column names in the SELECT statement
Correct Answer
A. A view can be created as a join on two or more tables.
Explanation A view can be created as a join on two or more tables. This means that when creating a view, it is possible to combine data from multiple tables by specifying the necessary join conditions. This allows for a more efficient and organized way of retrieving and manipulating data from multiple tables, as the view can be treated as a single virtual table. By using views, complex queries involving multiple tables can be simplified and reused.
Rate this question:
17.
Evaluate this SQL statement:SELECT employee_id, e.department_id, department_name, salary FROM employees e, departments d WHERE e.department_id = d.department_id;Which SQL statement is equivalent to the above SQL statement?
A.
SELECT employee_id, department_id, department_name, salary FROM employees WHERE department_id IN (SELECT department_id FROM departments);
B.
SELECT employee_id, department_id, department_name, salary FROM employees NATURAL JOIN departments;
C.
SELECT employee_id, d.department_id, department_name, salary FROM employees e JOIN departments d ON e.department_id = d.department_id;
D.
SELECT employee_id, department_id, department_name, salary FROM employees JOIN departments USING (e.department_id, d.department_id);
Correct Answer
C. SELECT employee_id, d.department_id, department_name, salary FROM employees e JOIN departments d ON e.department_id = d.department_id;
Explanation The correct answer is: SELECT employee_id, d.department_id, department_name, salary FROM employees e JOIN departments d ON e.department_id = d.department_id;
This SQL statement is equivalent to the original statement because it uses the JOIN keyword to combine the "employees" and "departments" tables based on the "department_id" column. It also selects the necessary columns: employee_id, department_id, department_name, and salary. The alias "e" is used for the "employees" table and "d" is used for the "departments" table. This statement ensures that only the rows with matching department IDs are included in the result.
Rate this question:
18.
Evaluate this SQL statement:SELECT e.EMPLOYEE_ID,e.LAST_NAME,e.DEPARTMENT_ID, d.DEPARTMENT_NAME FROM EMP e, DEPARTMENT d WHERE e.DEPARTMENT_ID = d.DEPARTMENT_ID;In the statement, which capabilities of a SELECT statement are performed?
A.
Selection, projection, join
B.
Difference, projection, join
C.
Selection, intersection, join
D.
Intersection, projection, join
E.
Difference, projection, product
Correct Answer
A. Selection, projection, join
Explanation The given SQL statement performs selection, projection, and join capabilities of a SELECT statement.
- Selection: It filters the rows from the EMP and DEPARTMENT tables based on the condition e.DEPARTMENT_ID = d.DEPARTMENT_ID, selecting only the rows where the department IDs match.
- Projection: It selects specific columns from the EMP and DEPARTMENT tables, namely e.EMPLOYEE_ID, e.LAST_NAME, e.DEPARTMENT_ID, and d.DEPARTMENT_NAME.
- Join: It combines the rows from both tables based on the common department ID column, creating a result set that includes data from both tables.
Rate this question:
19.
In which three cases would you use the USING clause? (Choose three.)
A.
You want to create a nonequijoin.
B.
The tables to be joined have multiple NULL columns
C.
The tables to be joined have columns of the same name and different
data types
D.
The tables to be joined have columns with the same name and
compatible data types
E.
You want to use a NATURAL join, but you want to restrict the
number of columns in the join condition
Correct Answer(s)
C. The tables to be joined have columns of the same name and different
data types D. The tables to be joined have columns with the same name and
compatible data types E. You want to use a NATURAL join, but you want to restrict the
number of columns in the join condition
Explanation The USING clause is used in three cases:
1) When the tables to be joined have columns of the same name but different data types.
2) When the tables to be joined have columns with the same name and compatible data types.
3) When you want to use a NATURAL join, but you want to restrict the number of columns in the join condition.
Rate this question:
20.
In which two cases would you use an outer join? (Choose two.)
A.
The tables being joined have NOT NULL columns.
B.
The tables being joined have only matched data.
C.
The columns being joined have NULL values.
D.
The tables being joined have only unmatched data
E.
The tables being joined have both matched and unmatched data
F.
Only when the tables have a primary key/foreign key relationship
Correct Answer(s)
C. The columns being joined have NULL values. E. The tables being joined have both matched and unmatched data
Explanation An outer join is used when the columns being joined have NULL values and when the tables being joined have both matched and unmatched data. In an outer join, all the rows from one table are included in the result set, even if there is no match in the other table. This allows for the inclusion of NULL values and both matched and unmatched data in the output.
Rate this question:
21.
A surrogate key is similar to...
A.
Primary key
B.
Artificial key
C.
Foreign key
D.
None of the above
Correct Answer
B. Artificial key
Explanation A surrogate key is similar to an artificial key because it is a unique identifier that is created solely for the purpose of identifying records in a database. Like an artificial key, a surrogate key does not have any inherent meaning or relationship to the data it represents. It is typically generated automatically by the database system and helps to ensure data integrity and improve performance in database operations.
Rate this question:
22.
Which one will be violated, if the primary key value is null in the new tuple...
A.
Key constraint
B.
Entity integrity
C.
Referential integrity
D.
Domain constraint
Correct Answer
B. Entity integrity
Explanation Entity integrity refers to the rule that states that the primary key of a table must have a unique value and cannot be null. In other words, every record in a table must have a valid and unique identifier. If the primary key value is null in a new tuple, it violates the entity integrity constraint because it means that the record does not have a valid identifier.
Rate this question:
23.
An insert operation may violate...
A.
Key constraint and Domain constraint
B.
Referential integrity and Entity integrity
C.
only Entity integrity
D.
All 4 constraints
Correct Answer
D. All 4 constraints
Explanation The correct answer is "All 4 constraints." An insert operation may violate all four constraints, which include key constraint, domain constraint, referential integrity, and entity integrity. The key constraint ensures that each record in a table has a unique identifier, and violating this constraint would result in duplicate keys. The domain constraint defines the valid values for a column, and violating this constraint would mean inserting an invalid value. Referential integrity ensures that relationships between tables are maintained, and violating this constraint would result in inserting a foreign key that does not exist in the referenced table. Lastly, entity integrity ensures that each record in a table has a unique primary key value, and violating this constraint would mean inserting a duplicate primary key.
Rate this question:
24.
A delete operation may violate...
A.
Key constraint
B.
Entity integrity
C.
Referential integrity
D.
None of the above
Correct Answer
C. Referential integrity
Explanation Referential integrity ensures that relationships between tables in a database are maintained accurately. When a delete operation is performed, it may violate referential integrity if it removes a record that is referenced by another table. This means that a record cannot be deleted if it is being referenced by another table, as it would result in orphaned records or broken relationships. Therefore, the correct answer is referential integrity.
Rate this question:
25.
If transaction 'A' sees the effects of transaction 'B', and 'B' then aborts, then 'A' also gets aborted then this schedulehaving only two transactions A and B will be..
A.
Serializable
B.
recoverable
C.
Cascadeless
D.
None of the above
Correct Answer
B. recoverable
Explanation If transaction 'A' sees the effects of transaction 'B', it means that 'A' reads data that has been modified by 'B'. If 'B' then aborts, it means that its changes are rolled back and not committed. In this case, if 'A' were to continue and commit its changes, it would lead to an inconsistent state because it has already seen the effects of 'B' which are now being rolled back. To maintain recoverability, where a transaction can be rolled back if needed, 'A' also needs to be aborted in this scenario. Therefore, the schedule is recoverable.
Rate this question:
26.
Cascadelessness can be ensured by..
A.
Allowing transactions to only read committed data.
B.
Allowing transactions to only read their own version of data
C.
Both of the above
D.
None of the above
Correct Answer
C. Both of the above
Explanation Cascadelessness refers to the property in database systems where a transaction's read operations are not affected by any uncommitted changes made by other transactions. By allowing transactions to only read committed data, it ensures that any changes made by other transactions are already finalized and will not be rolled back. Similarly, by allowing transactions to only read their own version of data, it ensures that the transaction is isolated from any uncommitted changes made by other transactions. Therefore, both of these approaches ensure cascadelessness by preventing the reading of uncommitted data.
Rate this question:
27.
Precedence graph can be used to test....
A.
Conflict serializability
B.
View serializability
C.
Both of the above
D.
None
Correct Answer
A. Conflict serializability
Explanation Precedence graph can be used to test conflict serializability. Conflict serializability is a property of a schedule in a database system, which ensures that the final result of executing concurrent transactions is equivalent to the result of executing them in some serial order. Precedence graph helps in determining if there is any conflict between the operations of different transactions in a schedule, by representing the transactions as nodes and the conflicts as edges in the graph. Therefore, the correct answer is conflict serializability.
Rate this question:
28.
Which operation can lead to the phantom phenomenon..
A.
Delete
B.
Insert
C.
Read
D.
None of the above
Correct Answer
B. Insert
Explanation The phantom phenomenon refers to a situation in which a query in a database returns extra rows that do not actually exist. This can occur when an insert operation is performed concurrently with a query. If the query is executed before the insert operation is completed, it may not be aware of the newly inserted rows, leading to the phantom phenomenon. Therefore, the correct answer is "Insert" as it is the operation that can cause this phenomenon.
Rate this question:
29.
Consider the following graph-based locking protocol that allows only exclusive lock modes, and that operates on data graphs that are in the form of a rooted directed acyclic graph.• A transaction can lock any vertex first.• To lock any other vertex, the transaction must have visited all the parents of that vertex, and must be holding a lock on one of the parents of the vertex.this scheme ensures..
A.
Serializability
B.
Deadlock freedom
C.
Both of the above
D.
None of the above
Correct Answer
C. Both of the above
Explanation This graph-based locking protocol ensures both serializability and deadlock freedom. Serializability is achieved because the protocol enforces a strict order of locking vertices, ensuring that conflicting operations do not occur simultaneously. Deadlock freedom is guaranteed because the protocol requires a transaction to visit all the parents of a vertex before locking it, preventing cycles in the locking order and avoiding potential deadlocks. Therefore, both properties are ensured by this locking protocol.
Rate this question:
30.
Concept of shadow paging is used to to ensure..
A.
Durability
B.
Recoverability
C.
cacadelessness
D.
Atomicity
Correct Answer
D. Atomicity
Explanation The concept of shadow paging is used to ensure atomicity. Shadow paging is a technique used in database systems to provide transaction atomicity. It involves creating a duplicate copy of the database before any modifications are made. This duplicate copy, known as a shadow page, allows for the changes to be made in isolation without affecting the original database. If a transaction fails or is aborted, the changes made in the shadow page can simply be discarded, ensuring that the original database remains unchanged. This ensures that transactions are either fully completed or fully rolled back, maintaining the atomicity property.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.