KTU Comprehensive Viva Model Questions | CS352 S6 CSE | Model-2

KTU COMPREHENSIVE EXAMRedundancy is dangerous as it is a potential threat to data *
Integrity
Consistency
Sufficiency
None
Other:

Who is more concerned about the conceptual level of the DBMS *
DBA
The end user
The Systems programmer
Client
Other:

An Attribute of one table matching the primary key of another table is called as *
Foreign key
Secondary key
Candidate key
Composite
Other:

If a relation is in BCNF, then it is also in *
1NF
2NF
3NF
all of above
Other:

The way a particular application views the data from the database that the application uses is a *
Module
Relational Model
Schema
Sub Schema
Other:

Locking can be used for: *
Deadlock
Lost Update
Uncommitted dependency
Inconsistent data
Other:

In relation Model Column is referred to as : *
Tuple
Entity
Degree
Attribute
Other:

ER Model Comes under *
Physical data Model
Record based logical Model
Object based logical Model
All of above
Other:

Which of the following is the problem of file management system? (a) Lack of data independence (b) Data redundancy (c) Update (d) all Periodically adding, changing, & Deleting file records is called file *
Updating
Upgrading
Restructuring
Renewing
Other:

Which of the following is a relational database *
4th Dimensions
FoxPro
dbase-IV
All of the above
Other:

The Index consists of : *
A list of keys
Pointers to the master list
Both (a) & (b)
None of above
Other:

Report generators are used to *
Store data input by a user
retrieve information from files
Answer queries
Both (b) & (c)
Other:

In a relational schema, each tuple is divided into fields called : *
Relations
Domains
Queries
None of above
Other:

The set of permitted values for each attribute is called its : *
Attribute set
Attribute range
Domain
Group
Other:

A DBMS consists of application programs called : *
FORTRAN
AUTOFLOW
BPL
TOTAL
Other:

A locked file can be : *
Accessed by only one user
modified by user with correct password
is used to hide sensitive information
None
Other:

Transaction X holds a shared lock R. if transaction Y requests for a shared lock on R : *
result in deadlock situation
Immediately Granted
Immediately rejected
Granted as is released by X
Other:

command used to select only one copy of each set of duplicable rows : *
Select Distant
Select Unique
Select Different
None
Other:

Which of following is the characteristics of a relational database model? *
Tables
Treelike Structure
Complex logical relationship
records
Other:

Which command is used to remove rows from a table? *
Delete
Remove
Truncate
Both (a) & (b)
Other:

Which command is used to remove a table or index from the database in SQL? *
Delete Table
Drop table
Erase Table
None of above
Other:

A report generator is used to : *
Update files
Print files on paper
Data Entry
None
Other:

The modify operation is likely to be done after : *
Delete
Look-up
Insert
None of above
Other:

The database environment has all of the following components except : *
Users
Separate files
Database
DBA
Other:

If every non key attribute is functionally dependent on the primary key, then the relation will be in : *
1NF
2NF
3NF
4NF
Other:

Director s Salary details are hidden from the employee, that is : *
Conceptual level Hiding
Physical level data Hiding
External level data hiding
None of above
Other:

Which of the following is record based logical model(s)? *
Network Model
object oriented model
Relational Model
E-R Model
Other:

The distinguishable parts of a record are called *
Data
files
fields
All of above
Other:

Embedded pointers provide *
An inverted index
a secondary access path
a physical record key
all of above
Other:

Which database handles full text data, image, audio and video? *
Transaction database
Graphics database
Video on demand database
Multimedia database
Other:

A data dictionary does not provide information about *
Where data is located
who owns it
size of disk storage device
How the data is used
Other:

Data item characteristics that are important in data management include *
Width
language
spelling
all of above
Other:

A schema describes *
Record & files
data elements
record relationships
all of the above
Other:

Data security threat include *
Privacy invasion
hardware failure
Fraudulent manipulation of data
all of above
Other:

Which language is used by most of dbms s for helping their users to access data? *
4GL
SQL
Query languages
HLL
Other:

Which of the following is at highest level in the hierarchy of data organization? *
Data Record
data File
Database
Data Bank
Other:


The logical data structure with one to many relationship is a *
Network
Tree
Chain
All of above
Other:

An entry in a telephone book can be compared to a *
Database
File
Record
Field
Other:

A __________ is an ordered collection of objects. *
Relation
Function
Set
Proposition
Other:

The set O of odd positive integers less than 10 can be expressed by _____________ *
a) {1, 2, 3}
b) {1, 3, 5, 7, 9}
c) {1, 2, 5, 9}
d) {1, 5, 7, 9, 11}
Other:

Power set of empty set has exactly _________ subset. *
1
2
0
3
Other:

What is the Cartesian product of A = {1, 2} and B = {a, b}? *
a) {(1, a), (1, b), (2, a), (b, b)}
b) {(1, 1), (2, 2), (a, a), (b, b)}
c) {(1, a), (2, a), (1, b), (2, b)}
d) {(1, 1), (a, a), (2, a), (1, b)}
Other:

The Cartesian Product B x A is equal to the Cartesian product A x B. Is it True or False? *
True
False
Other:

What is the cardinality of the set of odd positive integers less than 10? *
10
5
3
20
Other:

Which of the following two sets are equal? *
a) A = {1, 2} and B = {1}
b) A = {1, 2} and B = {1, 2, 3}
c) A = {1, 2, 3} and B = {2, 1, 3}
d) A = {1, 2, 4} and B = {1, 2, 3}
Other:

The set of positive integers is _____________ *
a) Infinite
b) Finite
c) Subset
d) Empty
Other:

What is the Cardinality of the Power set of the set {0, 1, 2}. *
8
6
7
9
Other:

The members of the set S = {x | x is the square of an integer and x < 100} is ________________ *
a) {0, 2, 4, 5, 9, 58, 49, 56, 99, 12}
b) {0, 1, 4, 9, 16, 25, 36, 49, 64, 81}
c) {1, 4, 9, 16, 25, 36, 64, 81, 85, 99}
d) {0, 1, 4, 9, 16, 25, 36, 49, 64, 121}
Other:

{x: x is an integer neither positive nor negative} is *
a) Empty set
b) Non- empty set
c) Finite set
d) Both b and c
Other:

{x: x is a real number between 1 and 2} is an *
a) Infinite set
b) Finite set
c) Empty set
d) None of the mentioned
Other:


EmoticonEmoticon