INF503 FINAL EXAM

 1. Who is responsible for identifying data to be stored in the database and for choosing appropriate structures to represent and store

Data base designer

2. which of the following functions of database management system causes some data to be read and some data to be written into a database?

Transaction

3. which of the following DBMS processes stores data on some storage medium that is controlled by the DBMS

Constructing 

4. which of the following applications analyzes large amount of data to search for the occurrences of specific patterns or relationships ?

Data mining

5. during which of the following stages for ereating a database are further specifications provided for storing accessing the database ?

Physical Design

6. which model is also known as the CODASYL DBTG model?

Network Model

7.which of the following schema levels describes the structure of the whole database for a community of users ?

Conceptual Schema

8. in most relational DBMSs there is no specific language that performs the role of

SDL

9. which of the following languages specifies the internal schema?

SDL

10. which of the following data models in meant for computer specialists, not for end users ?

Physical

11. Which constraint specifies whether the existence of an entity depends on it being related to another entity via the relationship type?

Participation

12. In UML terminology, relationship types are called as _______.

associations

13. What attribute can be divided into smaller subparts, which represent more basic attributes with independent meanings?

Composite

14. What is the last phase of the database design process?

Physical Design

15. which of the following notations indicates a specialisation generalization with the disjoint constraint.

Blank Triangle

16. Which of the following classes define attribute and operations but does not have object corresponding to those classes

Abstract

17. which is the process of classifying the class of objects into more specialised subclasses.

Specialization

18. Which of the following is an Abstraction concept for building composite objects from their component objects.

Aggregation

19. which of the following constraints is expressed directly in the schemas of data model.

Explict

20. which of the following constraint states that no primary key value can be null.

Entity integrity

21. which of the following constraints is violated by delete operation.

Referential integrity

22. which of the following clauses identify the condition for selecting the tuples from the relations.

WHERE

23. Which of the following commands specifies a new relation by giving it a name and specifying its attributes and initial constraints.

Create table

24. Which of the following clauses lists the attributes to be retrieved.

Select

25. Which of the following joins is the default type of join in a joined table tuple exists in the other relation?

Inner

26. which of the following functions returns the number of tuples or values as specified in a query.

Count

27. which of the following strategies updates a view when needed by a view query.

Lazy update 

28. which of the following symbols denotes the select operator.

Sigma

29. which of the following operations comblines the results of two or more SELECT statements without including duplicates.

Union 

30. which of the following operations combines thee result of two SEELECT statements and returns only those results which belong to the first of result ?

Set difference

31. which of the following approaches is most preferred as it reduces the number of tables.

Foreign key

32. which steps of the algorithm for er to relational mapping involves the following approaches.

Mapping of binary 1.1 relationship types 

33. First step of er to relational mapping.

Mapping of regular entity types

34. which of the following approaches does not suffer from the impedance same as the database data types ?

Database programming language 

35. which statements in the SQL standard can be used to invoke stored procedure cither from an interactive interface or from embedded SQL or SQLJ.

Call

36. which of the following Java Technologies for database web programming are java objects.

Java servlets

37. which pear db library module must be loaded to use the database functions in a php program.

DB.php

38. PHP variable starts with a ___ sing.

$

39. which aspect of object specifies whether an object is a persistent object or transient object.

Life time

40. Which type of literal corresponds to the values of basic data types and is predefined.

Atomic

41. Which type of constructor creates a collection of key-value pairs, where the value of a key can be used to retrieve the corresponding value?.

Dictionary

42. BCNF was proposed as a simpler form of.

3nf

43. which normal form is based on concepts of multivalued dependencies.

4nf

44. the following Normal forms is violated when a relation has undesirable multivalued dependencies and hence can be use to identify and decompose such relation?.

4nf

45. Which of the following buffer replacement strategies works best for certain type of database needed util all the remaining blocks in the relation are processed?

MRU

46. which raid level use a single parity disk relying on the disk controller to figure out which disk has failed?

3

47. which of the following files keeps the records ordered by the value of a particular field.

Sorted

48. which of the following allocation techniques allocates file blocks to consecutive disc locks.

Contiguous 

49. what occurs when the hash field value of Record that is being inserted has to an address that already contains a different record?.

Collision

50. each node in a tree expect for a special node called a has one parent node and zero or more child nodes.

Root

51. which type of ordered single level index is specified on non ordering fields as additional access structures to improve performance of queries and transactions ?.

Secondary

52. which type of index facilitates querying on multiple keys and used for relations that contain a large number of rows.

Bitmap

53. which of the following methods ends the iteration after all tuples that can be generated have been generated ?

Closed()

54. In which of the following joins does the search stop as soon as the first match is found and the tuple form outer relation in selected?.

Semi join

55. Which search applies to any file but all the methods depend on having appropriate access path selection condition.

Linear

56. what will a transaction be called If database operation a transaction not update the data with but only retrieve data.

Read only

57. in which of the following states does a transaction execute its read and write operations?.

Active

58. which two phase locking protocol is a deadlock free protocol.

Conservative

59. which phase of concurrency control checks whether any of the translation of dates valid serializability.

validation

60. which of the following clocks is too restrictive for database concurrency control purposes?

Binary

61. deferred update is also known as the____.

NO-UNDO/REDO algorithm

62. which of the following is a specific recovery scheme used in many of IBM’s relational database products ?.

ARIES algorithm 

63. for which of the following checkpoint actions the fuzzy checkpoint technique coming to use overcome into use to overcome from the action

Suspend execution of transactions temporarily.

64. what reduces the contention for CPU and IO services and simultaneously reduces access delays involved in area networks?.

Data localization

65. which of the following transparencies is also known as the distribution or network transparency?.

Data organizaton

66. which autonomy implies that component DBS has ability to decide whether and how much to share its functionality and resources with other component DBS?.

Association

67. when injection attack attempts to add additional SQL statements to the existing SQL statements by exploiting a computer bug which is caused by processing invalid data.

Code injection 

68.An Administrator who is allowed change student information can update student grades without the instructor s permission.

Privilege abuse

 69. What type of risk will occur when an attacker floods the server with requests?.

Denial of service

70. Loss of Availability occurs when.

A.a user of prgoram cannot acess data objects who has legitimate right to those objects

71. which of the following control measures is handled by creating user accounts and passwords to control the login process by the DBMS?.

Acess control

Other Links:

Statistics Quiz


Networking Quiz


See other websites for quiz:

Check on QUIZLET


Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *