DBMS-subject-wise
Question 1 |
5 | |
4 | |
3 | |
10 |
File contains 1 million records
Order of the B+ tree = Number of ptrs per node = p = 100
Maximum number of nodes = ?
So, Consider Minimum Fill factor in order to find Maximum number of nodes to be accessed
Minimum ptrs per node = ⌈p/2⌉ = 50
Number of Node in last level = 106/50 = 2 * 104
Number of Nodes in 2nd last level= 2*104/50 =400
Number of Nodes in 3rd last level= 400/50 =8
Number of Nodes in 4th last level= 8/50 =1
The maximum number of nodes to be accessed = Number of B+ tree levels = 4
Question 2 |
Primary index | |
Clusters index | |
Secondary index | |
Secondary non-key index |
option(A) : Primary index is maintain for the anchor value of block i,e 1 key value per block maintained in Index file.
option(B) : Clustering index is basically mixed sort of Indexing i,e Dense as it is maintained for unique value (key) and Sparse as it is not maintained for every value.
option(C) : Secondary index is usually dense because Secondary Index is maintained for every key value.
option(D) : There will be repetition of values in Non-Key, So there will be index only for 1 of the repeated values. Since we left some of the values so it is not dense index
Question 3 |
If X is deleted, then Y is also deleted | |
If Y is deleted, then X is also deleted | |
If Y is deleted, then X is not deleted | |
None of the above |
-When a tuple from the dominant is deleted then the related tuple from the sub-ordinate also deleted
Question 4 |
- <word> ::= <letter> | <letter><pairlet> | <letter><pairdig>
- <pairlet> ::= <letter><letter> | <pairlet><letter><letter>
- <pairdig> ::= <digit><digit> | <pairdig><digit><digit>
- <letter> ::= a | b | c | ... | y | z
- <digit> ::= 0 | 1 | 2 | ... | 9
I. pick
II. picks
III. c44
I, II and III | |
I and II only | |
I and III only | |
II and III only |
<Letter> represents a single letter;
<digit> represent a single digit;
<pairdig> two <digit>, or a recursive <pairdig> and two <digit>, in fact, indicates the even number <digit>, i.e. even figures ;
Similarly, <pairlet> is an even number of letters. So <word> may be: a letter, letters odd or even number of digits and a letter. So the second and third are correct
Question 5 |

According to the data shown in the table, which of the following could be a candidate key of the table ?
{Last Name} | |
{Room} | |
{Shift} | |
{Room, Shift} |
- CANDIDATE KEY must contain unique values
- CANDIDATE KEY may have multiple attributes
- CANDIDATE KEY Must not contain null values
- CANDIDATE KEY should contain minimum fields to ensure uniqueness
- CANDIDATE KEY Uniquely identify each record in a table
option(B) : Room having duplicate values. So, we can't say that Room is Candidate key. Example 33 value is repeated
option(C) : Shift also having duplicate values as morning is repeated.
option(D) : "Room+shift" having no duplicate values. Every tuple is unique. we can uniquely identify any tuple in a table using Room+shift column
So, option(D) is candidate key
Question 6 |
a → c
b → d
The relation is in
First normal form but not in second normal form | |
Second normal form but not in third normal form | |
Third normal form | |
None of the above |
Checking the FD's :
a→c (Prime derives Non-Prime.)
b→d (Prime derives Non-Prime.)
Prime attribute { a,b}
non prime attribute {c,d}.
Since all a,b,c,d are atomic so the relation is in 1NF.
The relation will be in 2NF if every Non Prime attribute is fully functional dependent on KEY.
Here {c,d } are not fully functionally dependent, rather they are partially dependent so, it is not in 2NF.
Hence, this relation is in 1NF but not in 2NF
Question 7 |
Students : (Roll number, Name, Date of birth)
Courses: (Course number, Course name, instructor)
Grades: (Roll number, Course number, Grade)
SELECT DISTINCT Name
FROM Students, Courses, Grades
WHERE Students.Roll_number = Grades.Roll_number
AND Courses.Instructor =Sriram
AND Courses.Course_number = Grades.Course_number
AND Grades.Grade = A
Which of the following sets is computed by the above query?
Names of Students who have got an A grade in all courses taught by Sriram | |
Names of Students who have got an A grade in all courses | |
Names of Students who have got an A grade in at least one of the courses taught by Sriram | |
None of the above |
Courses: (Course number, Course name, instructor)
Grades: (Roll number, Course number, Grade)
Distinct name is to be selected, where
1. Name of the student is selected on the basis of the grade.
2. Instructor of the course in Sriram
3. Courses selected on the basis of grade.
4. Grade should be A.
The Query results a names of the students who have got an A grade in at least one of the courses taught by Sriram.
Question 8 |
SELECT DISTINCT w, x
FROM R, S
Is guaranteed to be the same as R, if
R has no duplicates and S is non-empty | |
R and S have no duplicates | |
S has no duplicates and R is non-empty | |
R and S have the same number of tuples |
-The query selects all attributes of R. Since we have distinct in query, result can be equal to R only if R doesn’t have duplicates. If S is empty RXS becomes empty, so S must be non empty.
Option(A):R has no duplicates and S is non-empty
Incase If R has duplicates in that case due to DISTINC keyword in query will eliminate duplicates in FINAL result and the results in query !=R
So, R cannot have duplicate values
Incase Relation "S" is Empty then RXS becomes empty So, Relation "S" must be non-empty
Option(B): R and S have no duplicates
Assume Relation ''S' is Empty which has no duplicate values then RXS becomes empty So, Relation "S" must be non-empty
Option(C) : S has no duplicates and R is non-empty
S has no duplicate means we can relation "S" as Empty which is discussed in option(B)
Option(D) : R and S have the same number of tuples
Incase If R has duplicates in that case due to DISTINC keyword in query will eliminate duplicates in FINAL result So results in query !=R which is discussed in option(A)
Question 9 |
Physical Data Independence | |
Logical Data Independence | |
Both (a) and (b) | |
None of the above |
Physical data independence :- if changes are made in the physical storage of schema then it will not affect the logical schema of the database.
Logical data independence :- if any changes are made in the conceptual schema then it will not affect external schema or the view level of the database.
Question 10 |
X is functionally dependent on Y | |
X is not functionally dependent on any subset of Y | |
Both (a) and (b) | |
None of these |
- X is functionally dependent on Y and
- X is not functionally dependent on any subset of Y.


Question 11 |
S=r1(A); r2(B) ; w2(A); w1(B)
Which of the following is true?
Allowed under basic timestamp protocol. | |
Not allowed under basic timestamp protocols because T1 is rolled back | |
Not allowed under basic timestamp protocols because T2 is rolled back | |
None of these |
Question 12 |
CASCADE & MVD | |
GRANT & REVOKE | |
QUE & QUIST | |
None of these |
It consists of only three commands: GRANT, REVOKE, and DENY.
GRANT :It allow specified users to perform specified tasks.
REVOKE : Revoke to cancel previously granted or denied permissions.
Question 13 |
Avg | |
Select | |
Ordered by | |
Distinct |
1) MIN
2) MAX
3) AVG
4) COUNT
5) SUM
Avg is an aggregate function returns the average of a group of elements.
Syntax:
SELECT AVG(column_name) FROM table_name;
Question 14 |
Schema | |
Subschema | |
Virtual table | |
None of these |
- Schema is the physical arrangement of the data as it appears in the DBMS.
- Sub-schema is the logical view of the data as it appears to the application program.
Question 15 |
Project | |
Join | |
Extract | |
Substitute |
- To extract a specified row in a table select operation is used
- Project operator is denoted by ∏ symbol and it is used to extract specified columns (or attributes) from a table (or relation).
- BY default project operation removes duplicate data
Question 16 |
Two (or more) candidate keys | |
Two candidate keys and composite | |
The candidate key overlap | |
Two mutually exclusive foreign keys |
- We say A relation is in Boyce–Codd Normal Form (BCNF) if all attributes which are determinants are also candidate keys in every relation.
- Transformation into Boyce–Codd Normal Form (BCNF) deals with the problem of overlapping keys and there is no problem with 2 or more Candidate keys .
Question 17 |
Ensures serializability | |
Prevents Deadlock | |
Detects Deadlock | |
Recover from Deadlock |
Question 18 |
Field names | |
Field Formats | |
Field Types | |
All of these |
- A data dictionary is a file or a set of files that contains a database's metadata. The data dictionary contains records about other objects in the database, such as data ownership, data relationships to other objects, and other data.
- The data dictionary is a crucial component of any relational database.
- Data dictionary will identify
-Field name
-Field format
-Field types
Question 19 |
Timestamp ordering | |
2 Phase Locking | |
Both (a) and (b) | |
None of the above |
- In Basic 2 phase locking there is a chance for deadlock and starvation but ensure serializability
- Strict 2PL ensure serializability and recoverability but deadlock and starvation possible
- Conservative 2PL ensure serializability and no deadlock but starvation possible
- Time stamp ordering ensure serializability and no deadlock and avoid starvation by using wait-die and wound -wait scheme
Question 20 |
Atomicity, consistency, isolation, database | |
Atomicity, consistency, isolation, durability | |
Atomicity, consistency, integrity, durability | |
Atomicity, consistency, integrity, database |
Question 21 |

What is the output of the following SQL query?
select count(*) from
((select Employee, Department from Overtime_allowance) as S
natural join
(select Department, OT_allowance from Overtime_allowance)
as T);
16 | |
4 | |
8 | |
None of the above |
For example consider the below two tables :
Student Table
Roll_No Name
1 Arya
2 Bindu
3 Cherry
Another table
Marks Table
Roll_No Marks
2 70
3 50
4 85
Query
SELECT *
FROM Student S NATURAL JOIN Marks M;
Output
Roll_No Name Marks
2 Bindu 70
3 Cherry 50
Coming to the question :
Given table
Overtime_allowance
Employee | Department | OT_allowance |
RAMA | Mechanical | 5000 |
GOPI | Electrical | 2000 |
SINDHU | Computer | 4000 |
MAHESH | Civil | 1500 |
Given query :
select count(*) from
((select Employee, Department from Overtime_allowance) as S
natural join
(select Department, OT_allowance from Overtime_allowance) as T);
Inner query will executed first
(select Employee, Department from Overtime_allowance) as S
natural join (select Department, OT_allowance from Overtime_allowance) as T)
Table S Table T Employee Department Department OT_allowance Rama Mechanical Mechanical 5000 Gopi Electrical Electrical 2000 Sindhu Computer Computer 4000 Mahesh Civil Civil 1500
Now when we apply natural join on S and T, it matches for the common attribute(Department) in both tables and outputs the common tuples.
Department | OT_allowance |
Mechanical | 5000 |
Electrical | 2000 |
Computer | 4000 |
Civil | 1500 |
Final query : outer query will be executed now
select count(*) from
((select Employee, Department from Overtime_allowance) as S
natural join
(select Department, OT_allowance from Overtime_allowance) as T);
Output : 4
Natural join will return the table with 4 tuples.
Therefore, the correct option is (B)
Question 22 |
Double ellipse | |
Dashed ellipse | |
Squared ellipse | |
An ellipse with attribute name underlined |

Question 23 |
5 | |
4 | |
1 | |
2 |
-Insertion of new key is leading to insertion of new node at all 4 levels
-In worst case root node will also be broken into 2 parts.
-Maximum number of nodes that could be created are 5 because tree will be increased with 1 more level
Question 24 |
A cartesian product of two relations followed by a selection | |
A cartesian product of two relations | |
A union of two relations followed by cartesian product of the two relations | |
A union of two relations |
- Join is a combination of a Cartesian product followed by a selection process.
- A Join statement is used to combine rows from 2 or more tables based on the selection of common field between them
- Different types of Joins are :
-RIGHT JOIN
-FULL JOIN
-INNER JOIN
-LEFT JOIN
Question 25 |

SELECT S.rating, AVG(S.age) AS average
FROM Sailors S
Where S.age >= 18
GROUP BY S.rating
HAVING 1 < (SELECT COUNT(*) FROM Sailors S2 where S.rating = S2.rating)
The number of rows returned is
6 | |
5 | |
4 | |
3 |
All the tuples with age less than 18 will be eliminated.

Step 3 : GROUP BY S.rating
Group By the remaining tuples after eliminated in step1 will be grouped according to rating

After this, all the group-by tuples having their count more than 1 will be selected and their ratings and average age will be given as output.

Question 26 |
Customers(custid, name, gender, rating)
The rating value is an integer in the range 1 to 5 and only two values (male and female) are recorded for gender.
Consider the query “how many male customers have a rating of 5”?
The best indexing mechanism appropriate for the query is
Linear hashing | |
Extendible hashing | |
B+ Tree | |
Bit-mapped hashing |
- Best indexing mechanism appropriate for the given query is Bit-mapped index.
- To record gender(Male and Female) of customer we require only 2 bits 0 and 1
- we can implement it using Bit-mapped indexing.
Question 27 |
Replace | |
Join | |
Change | |
Update |
Join :
- Join is a combination of a Cartesian product followed by a selection process.
- A Join statement is used to combine rows from 2 or more tables based on the selection of common field between them
Change : There is no change command in SQL
Question 28 |
Accessed by only one user | |
Modified by users with the correct password | |
Used to hide sensitive information | |
Updated by more than one user |
Question 29 |
Transaction log | |
Query language | |
Report writer | |
Data manipulation language |
- A transaction log is a sequential record of all changes made to the database while the actual data is contained in a separate file.
- The transaction log contains enough information to undo all changes made to the data file as part of any individual transaction
Question 30 |
Null Integrity | |
Referential Integrity | |
Domain Integrity | |
Null and Domain Integrity |
- A FOREIGN KEY is a column or columns that references a column (most often the primary key) of another table
- The primary purpose of FOREIGN KEYs is to maintain Referential Integrity (RI).
Question 31 |
A transaction writes a data item after it is read by an uncommitted transaction | |
A transaction reads a data item after it is read by an uncommitted transaction | |
A transaction reads a data item after it is written bya committed transaction | |
A transaction reads a data item after it is written by an uncommitted transaction |
Option B is also fine as no write operation is involved.
Option C is a normal operation.
Option D Reading uncommitted data is called as dirty read. If transaction reads uncommitted data and commits before the transaction that writes data item leads to non-recoverable schedule if and if transaction that writes data item rolled back
Question 32 |
M + n & 0 | |
Mn & 0 | |
M + n & | m – n | | |
Mn & m + n |


Question 33 |
Consider the following four operations R and S.
I. Insert into R
II. Insert into S
III. Delete from R
IV. Delete from S
Which of the following can cause a violation of the referential integrity constraint above?
Both I and IV | |
Both II and III | |
All of these | |
None of these |

- Insert into R will not cause any violation.
- Insert into S may cause violation if any value is inserted into d of S, which value is not in a of R.
- Delete from S will not cause any violation.
- Delete from R may cause violation because for the deleted entry in R there may be referenced entry in the relation S
Question 34 |
select title
from book as B
where (select count(*)
from book as T
where T.price>B.price)<5
Titles of the four most expensive books | |
Title of the fifth most inexpensive book | |
Title of the fifth most expensive book | |
Titles of the five most expensive books |

- For the 1st book (B.price = 65) Inner query gives count =6 (75,85,95,105,115,125).
- For the 2nd book (B.price = 75) Inner query gives count =5 (85,95,105,115,125).
- For the 3rd book (B.price = 85) Inner query gives count =4 (95,105,115,125).
- For the 4th book (B.price = 95) Inner query gives count =3 (105,115,125).
- For the 5th book (B.price = 105) Inner query gives count =2 (115,125).
- For the 6th book (B.price = 115) Inner query gives count =1 (125).
- For the 7th book (B.price = 125) Inner query gives count =0.
Source : BtechOnline
Question 35 |
Avoiding data inconsistency | |
Being able to construct query easily | |
Being able to access data efficiently | |
All of the above |
Goals for the design of the logical scheme include
- Avoiding data inconsistency
- Being able to construct query easily
- Being able to access data efficiently
Question 36 |
employee (name, salary, dept-no), and
department (dept-no, dept-name,address)
Which of the following queries cannot be expressed using the basic relational algebra operations (σ, π, x, -, ∪, p)
Department address of every employee | |
Employees whose name is the same as their department name | |
The sum of all employees’ salaries | |
All employees of a given department |
Question 37 |
Statement that enables to start any DBMS | |
Statement that is executed by the user when debugging an application program | |
The condition that the system tests for the validity of the database user | |
Statement that is executed automatically by the system as a side effect of a modification of the database |
A database Trigger is executed automatically in response to certain events on a particular table or view in a database.
Question 38 |
63 | |
64 | |
67 | |
68 |
Block size = 1K bytes = 1024 bytes
Data record pointer r = 7 bytes
Value field V= 9 bytes
Block pointer P= 6 bytes
order of the leaf node = ?
Let order of leaf = m
r*m + V*m + p <= 1024
7m + 9m + 6 <= 1024
16m <= 1024-6
16m <= 1018
m =< 63
Question 39 |
Non-key and ordering | |
Non-key and non-ordering | |
Key and ordering | |
Key and non-ordering |
- It is defined as an ordered data file.
- The data file is ordered on a key field.
- The key field is generally the primary key of the relation.
Secondary Index(Dense)
- This index may be generated from a field which is a candidate key and has a unique value in every record, or a non-key with duplicate values.
Clustering Index(Sparse)
- This index is defined on an ordered data file.
- The data file is ordered on a non-key field.
Question 40 |
Quick sort | |
Insertion sort | |
Selection sort | |
Heap sort |
It works on greedy approach and takes O(n) swaps to sort the array of n elements
Number of swaps : Worst case scenario
- Quick sort = O(n2)
- Insertion sort = О(n2)
- Selection sort = O(n)
- Heap sort = O(n logn)
Best Case : No swaps required as all elements are properly arranged
Worst Case : n-1 swaps required
Question 41 |

T1 − T2 − T3 | |
T3 − T1 − T2 | |
T2 − T1 − T3 | |
T1 − T3 − T2 |


There are no Loop's So it is conflict serializable
And Serial schedule will is T3-T1-T2
Question 42 |
Relational Database Management System | |
Hierarchical | |
Object Oriented Database Management System | |
Network |
- Object Oriented Systems(OODBMS) provide support for maintaining several versions of the same object.
- An old version of an object in OODBMS that represents a tested and verified design should be retained until the new version is tested and verified.
Question 43 |
First Normal Form | |
Second Normal Form | |
Third Normal Form | |
Third Normal Form |
Functional Dependency:
The attribute B is fully functionally dependent on the attribute A if each value of A determines one and only one value of B.
Example: EMP_EID → EMP_NAME
In this case, the attribute EMP_EID is known as the determinant attribute and the attribute EMP_NAME is known as the dependent attribute.
Question 44 |
Reflexive, Augmentation and Decomposition | |
Transitive, Augmentation and Reflexive | |
Augmentation, Transitive, Reflexive and Decomposition | |
Reflexive, Transitive and Decomposition |
Armstrong's Axioms are most basic inference rules. These are 3 rules:
- Reflexivity: If Y is a subset of X, then X → Y
- Augmentation: If X → Y, then XZ → YZ
- Transitivity: If X → Y and Y → Z, then X → Z
- Union: If X → Y and X → Z, then X → YZ
- Decomposition: If X → YZ, then X → Y and X → Z
- Pseudo transitivity: If X → Y and WY → Z, then WX → Z
- Composition: If X → Y and Z → W, then XZ → YW
Question 45 |
Serializable | |
Repeated Read | |
Committed Read | |
Uncommitted Read |
- Read Uncommitted – Read Uncommitted is the lowest isolation level. In this level, one transaction may read not yet committed changes made by other transaction, thereby allowing dirty reads. In this level, transactions are not isolated from each other.
- Read Committed – This isolation level guarantees that any data read is committed at the moment it is read. Thus it does not allows dirty read. The transaction holds a read or write lock on the current row, and thus prevent other transactions from reading, updating or deleting it.
- Repeatable Read – This is the most restrictive isolation level. The transaction holds read locks on all rows it references and writes locks on all rows it inserts, updates, or deletes. Since other transaction cannot read, update or delete these rows, consequently it avoids non-repeatable read.
- Serializable – This is the Highest isolation level. A serializable execution is guaranteed to be serializable. Serializable execution is defined to be an execution of operations in which concurrently executing transactions appears to be serially executing.
Question 46 |
- Suppliers (sid:integer, sname:string, sadress:string)
- Parts (pid:integer, pname:string, pcolor:string)
- Catalog (sid:integer, pid:integer, pcost:real)
( SELECT Catalog.pid
from Suppliers, Catalog
WHERE Suppliers.sid = Catalog.pid )
MINUS
( SELECT Catalog.pid
from Suppliers, Catalog
WHERE Suppliers.sname <> 'sachin'
and
Suppliers.sid = Catalog.sid)
Pid of Parts supplied by all except sachin | |
Pid of Parts supplied only by sachin | |
Pid of Parts available in catalog supplied by sachin | |
Pid of Parts available in catalogs supplied by all except sachin |
(SELECT Catalog.pid from Suppliers, Catalog
WHERE Suppliers.sid = Catalog.pid)
We are getting pids for all which are supplied.
step 2:
(SELECT Catalog.pid from Suppliers, Catalog
WHERE Suppliers.sname <> 'sachin' and Suppliers.sid = Catalog.sid)
we are getting pids for all parts which are supplied by any other supplier other than Sachin.
step 3:
When we perform MINUS [All pids – pids(all others except sachin) = We get only sachin]
step 4:
We get the pids which are supplied by only Sachin
NOTE : MINUS operator will return only those rows which are unique in only first SELECT query and not those rows which are common to both first and second SELECT queries.
Question 47 |
ISBN → Title
ISBN → Publisher
Publisher → Address
First Normal Form | |
Second Normal Form | |
Third Normal Form | |
BCNF |
- Given relation is in 1NF because All attribute in the given functional dependencies are atomic values
- Candidate key = ISBN
- A relation is in 2NF if every non-prime attribute of the relation is dependent on the whole of every candidate key. So the given dependencies satisfies the 2NF
- 3NF : Address which is Transitively dependent on ISBN . Hence Transitive dependency exists .
- So the given relation is in 2NF and not in 3NF
Question 48 |
Pleaf = 51 & p = 46 | |
Pleaf= 47 & p = 52 | |
Pleaf= 46 & p = 50 | |
Pleaf = 52 & p = 47 |
Record pointer = 10 bytes
Block pointer = 8 bytes
Block size = 1 KB
For Leaf node
Let order of leaf be 'n'
size of search key * n + record pointer * n + block pointer <=1024
12*n + 10*n+8 <=1024
12n + 10n+8 <=1024
22n+8 <=1024
22n <=1024-8
22n <=1016
n<=1016/22
n=46
For Non-Leaf Node
size of search key * n + block pointer * (n+1) <=1024
12*n + 8*n+8 <=1024
20n+8<=1024
20n <=1024-8
20n <=1016
n=50
∴order of leaf node(p) = 46
∴order of non-leaf node(pleaf) = 50
Question 49 |
Hashed file | |
B-Tree file | |
Indexed file | |
Sequential file |
Hash File Organization is a file organization technique where a hash function is used to compute the address of a record. It uses the value of an attribute or set of attributes as input and gives the location (page/block/bucket) where the record can be stored.
Question 50 |
A secondary access path | |
A physical record key | |
An inverted index | |
A prime key |
Question 51 |
A line which loops back on to the same table | |
A small open diamond at the end of a line connecting two tables | |
A small closed diamond at the end of a line connecting two tables | |
A small closed triangle at the end of a line connecting two tables |
Aggregation is a special form of association
Composition is a special form of aggregation.

Question 52 |

First Normal Form | |
Second Normal Form | |
Third Normal Form but not BCNF | |
Third Normal Form but BCNF |
AB -> CDE
C -> B
Candidate keys = AB,AC
So, The given relation is in 3NF but not BCNF because "C" is not a super key
Question 53 |
Preserves dependency but cannot perform lossless join | |
Preserves dependency and performs lossless join | |
Does not perform dependency and cannot perform lossless join | |
Does not preserve dependency but perform lossless join |
R(A, B, C, D) is decomposed into R1 (A, B) and R2(C, D) and there are only two FDs A -> B and C -> D. So, the decomposition is dependency preserving
- R1 (A, B) is covered A -> B
- R2(C, D) is covered C -> D
Lossless-Join Decomposition:
Decomposition of R into R1 and R2 is a lossless-join decomposition if at least one of the following functional dependencies are in F+ (Closure of functional dependencies)
R1 ∩ R2 → R1
OR
R1 ∩ R2 → R2
In the given relation R(A, B, C, D) is decomposed into R1 (A, B) and R2(C, D), and R1 ∩ R2 is empty. So, the decomposition is not lossless
Question 54 |
A→ (B,C) | |
A → B, A→→ C | |
A→ B, C→→A | |
A→→B, B→ C |
→→ represents multivalue dependency
A → B means that the values of B are determined by the value of A
A→→ C means for A ,C has more than one value.
Example for multivalue dependency
A C
1 5
1 6
we have multiple value of c but c does not have multiple values for a . so we cannot say c->>a but we can say a->>c. and question is saying c can take different value not a .
Question 55 |
Inner Join | |
Outer Join | |
Semi Join | |
Anti Join |
The INNER JOIN selects all rows from both the tables as long as the condition satisfies. INNER JOIN will create the result-set by combining all rows from both the tables where the condition satisfies i.e value of the common field will be same.
Question 56 |
SELECT title FROM book AS B WHERE( SELECT COUNT(*) FROM book AS T WHERE T.price > B.price ) < 7
Titles of the six most expensive books. | |
Title of the sixth most expensive books. | |
Titles of the seven most expensive books. | |
Title of the seventh most expensive books. |
Question 57 |
Collision | |
Root | |
Foreign Key | |
Records |
- The data is organize in a tree structure where the nodes represent the records and the branches of the tree represent the fields.
- Since the data is organized in a tree structure, the parent node has the links to its child nodes.
- If we want to search a record, we have to traverse the tree from the root through all its parent nodes to reach the specific record. Thus, searching for a record is very time consuming.
- Hashing function is used to locate the root.
Question 58 |
1 NF | |
2 NF | |
3 NF | |
4 NF |
Question 59 |
Consider the following schedules involving two transactions.
S1: r1(X) ; r1(Y) ; r2(X) ; r2(Y) ; w2(Y) ; w1(X) S2: r1(X) ; r2(X) ; r2(Y) ; w2(Y) ; r1(Y) ; w1(X)
Which one of the following statements is correct with respect to above ?
Both S1 and S2 are conflict serializable. | |
Both S1 and S2 are not conflict serializable. | |
S1 is conflict serializable and S2 is not conflict serializable. | |
S1 is not conflict serializable and S2 is conflict serializable. |

Question 60 |
For a database relation R(a, b, c, d) where the domains of a, b, c and d include only atomic values, and only the following functional dependencies and those that can be inferred from them hold :
- a → c
- b → d
The relation is in
First normal form but not in second normal form | |
Second normal form but not in third normal form | |
Third normal form | |
BCNF |
Question 61 |
A many-to-one relationship exists between entity sets r1 and r2. How will it be represented using functional dependencies if Pk(r) denotes the primary key attribute of relation r?
Pk(r1) → Pk(r2) | |
Pk(r2) → Pk(r1) | |
Pk(r2) → Pk(r1) and Pk(r1) → Pk(r2) | |
Pk(r2) → Pk(r1) or Pk(r1) → Pk(r2) |
Let two relations be
R1(Student with pk SId)
R2(Department with pk DId)
NOTE :
SId can uniquely identify DId but DId can not uniquely identify the SId.
Thus,pk(R1) -> pk(R2)
Using Student ID(SID) we can unique identify Department(DID) but using DID we can find the student uniquely because one department have many students
Question 62 |
Database systems that store each relation in a separate operating system file may use the operating system’s authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is false ?
The administrator enjoys more control on the grant option. | |
It is difficult to differentiate among the update, delete and insert authorizations. | |
Cannot store more than one relation in a file. | |
Operations on the database are speeded up as the authorization procedure is carried out at the operating system level. |
Question 63 |
Let R1(a,b,c) and R2(x,y,z) be two relations in which a is the foreign key of R1 that refers to the primary key of R2 . Consider following four options.
- (a) Insert into R1
- (b) Insert into R2
- (c) Delete from R1
- (d) Delete from R2
Which of the following is correct about the referential integrity constraint with respect to above ?
Operations (a) and (b) will cause violation. | |
Operations (b) and (c) will cause violation. | |
Operations (c) and (d) will cause violation. | |
Operations (d) and (a) will cause violation. |
R1(a,b,c) and R2(x,y,z)
Let us say "a" is the foreign key of R1 that refers to "x" primary key of R2
- Insert into R1 operation will take place there will be inconsistency in the database, since it has a foreign key which refers to the primary key of R2
- Insert into R2 Can not cause violation
- Delete from R1 Can not cause violation.
- Delete from R2 Can cause violation if we delete any value of x in R2, then the value referred by a in R1 should also be deleted.
Question 64 |
6 | |
8 | |
9 | |
12 |
Given n = 4.
So, Possible Superkeys = 24-1 = 8
Possible Superkeys = X, XW, XZ, XY, XZW, XYW, XYZ, XYZW
Question 65 |
(1) Lossless, dependency preserving decomposition into 3NF is always possible
(2) Any relation with two attributes is in BCNF
(1) | |
(2) | |
(1) and (2) | |
None of these |
- Lossless, dependency-preserving decomposition into 3NF is always possible - TRUE
IN 3NF it is possible to satisfy both lossless and dependency preserving. i.e., for any relation there always exist a decomposition to 3NF, which is guaranteed to satisfy both the given properties. - Any relation with two attributes is in BCNF. - TRUE
Question 66 |
(1) Number of child pointers in a B/ B+ tree node is always equal to number of keys in it plus one.
(2) B/B+ tree is defined by a term minimum depends on hard disk block size, key and address sizes.
(1) | |
(1) and (2) | |
(2) | |
None of these |
- TRUE - Number of child pointers in a B/B+ tree node is always equal to number of keys in it plus one
- TRUE - B/B+ tree is defined by a term minimum depends on hard disk block size, key and address sizes.
Question 67 |

The set of all tuples that must be additionally deleted to preserve referential integrity when the tuple (3,4) is deleted is:
(4,3) and (6,4) | |
(2,4) and (7,2) | |
(3,2) and (9,5) | |
(3,4),(4,3) and (6,4) |
- Given X is a primary key and Y is foreign key on deleting (3,4), all the foreign key occurrences of 3 will also be deleted (4,3).
- Now 4 is also deleted which was also primary key in (4,3), its corresponding foreign key occurrences will also be deleted (2,4) and (6,4).
- NOW 2 and 6 are also deleted, so their foreign key occurrences also deleted (5,2),(7,2).
- Similarly 5 and 7 foreign key occurrences will also be deleted (9,5).
Question 68 |
Inconsistency | |
Consistency | |
Atomicity | |
Isolation |

Question 69 |
A → B
B → C
D → E
E → D
F → G
F → H
(E,F) → I
The relation (E,D,A,B) is :
2 NF | |
3 NF | |
BCNF | |
None of the above |
Functional Dependencies
A→B
B→C
D→E
E→D
F→G
F→H
(E,F)→l
(AD)+ ={A,B,D,E}
(AE)+ ={A,B,D,E}
So (AD) & (AE) are candidate keys for this relation R(E,D,A,B)
Given relation is in 1NF because it contains an atomic values.
There exists PARTIAL DEPENDENCY
A -> B
D -> E
E -> D
So the relation not in 2NF
Question 70 |
Zero | |
More than one | |
One | |
All of the above |
- Multiplicity defines how many objects participate in a relationship and it is the number of instances of one class related to one instance of the other class.
- For each association and aggregation, there are two multiplicity decisions to make, one for each end of the relationship.
- Multiplicity is represented as a number and a * is used to represent a multiplicity of many.
Question 71 |
First normal form | |
Second normal form | |
Fourth normal form | |
Third normal form |
Transitive Functional
- When an indirect relationship causes functional dependency it is called Transitive Dependency.
- If P -> Q and Q -> R is true, then P-> R is a transitive dependence
- A transitive dependency can only occur in a relation of three of more attributes
Question 72 |
Set intersection | |
Assignment | |
Natural Join | |
None of the above |
- Select
- Project
- Union
- Set difference,
- Rename
- Cartesian product
Question 73 |
Composite keys | |
Determinants | |
Candidate keys | |
Foreign keys |
- CANDIDATE KEY is a set of attributes that uniquely identify tuples(rows) in a table.
- Candidate Key is a super key with no repeated attributes
- Each Table have one or more candidate keys
- Primary key should be selected from the candidate keys.
- Every table must have at least a single candidate key.
- Each table can have multiple candidate keys but only a single primary key
Question 74 |
Top right side | |
Down left side | |
Left hand side | |
Right hand side |
A →B
A is determinant, B is dependent
Dependent It is displayed on the right side of the functional dependency diagram.
Determinant It is displayed on the left side of the functional dependency diagram.
Question 75 |
PreparedStatement | |
Parameterized Statement | |
ParameterizedStatement and CallableStatement | |
All kinds of Statements |
- PreparedStatement interface extends the Statement interface.
- It represents a precompiled SQL statement which can be executed multiple times.
- This accepts parameterized SQL quires and you can pass 0 or more parameters to this query.
- Initially, this statement uses place holders “?” instead of parameters, later on, you can pass arguments to these dynamically using the setXXX() methods of the PreparedStatement interface.
Question 76 |
Set intersection | |
Natural Join | |
Assignment | |
None of the above |
- Select
- Project
- Union
- Set difference
- Rename
- Cartesian product
Question 77 |
BCNF is stricter than 3NF | |
Lossless,dependency preserving decomposition into BCNF is always possible | |
Lossless,dependency preserving decomposition into 3NF is always possible | |
Any relation with two attributes is BCNF |
- True : BCNF is stricter than 3NF
- False Lossless, dependency-preserving decomposition into BCNF is always possible
It is not always possible to decompose a table in BCNF and preserve dependencies. - True Lossless, dependency-preserving decomposition into 3NF is always possible
- True Any relation with two attributes is in BCNF
Question 78 |
Dependency preserving | |
Not dependency preserving | |
Need be dependency preserving | |
None of these |
Let take an example Relation R (V, W, X, Y, Z), with functional dependencies
- V,W -> X
- Y,Z -> X
- W -> Y
Note : Redundancies are sometimes still present in a BCNF relation as it is not always possible to eliminate them completely.
Question 79 |
Y ⊆ x | |
Y ⊂ x | |
X ⊆ y | |
X ⊂ y and y ⊂ x |
-If RHS of a functional dependency is a subset of LHS, then it is called as a trivial functional dependency.
Let us take an examples of trivial functional dependencies are
- XY → X
- XY → Y
- XY → XY
Question 80 |
Parent child relationship between the tables that connect them | |
Many-to-many relationship between the tables that connect them | |
Network model between the tables connect them | |
None of these |
Question 81 |
Not in 2 NF | |
In 2 NF but not in 3 NF | |
In 3 NF not in 2 NF | |
In both 2NF and 3 NF |
S→T
T→U
U→V
V→S.
Candidate keys are S,T,U and V.
All attributes are Candidate keys
All attributes are Prime Attributes So, given relation R is 3NF and BCNF
R1(S,T) { S→T ,T →S} ∩ R2(U,V){ U → V , V → U} = Ø
R1∩R2 = Ø means there is no common attribute in R1 and R2. This makes the decomposition lossy
Decomposition in BCNF but dependency not preserved.
Question 82 |
Scripted | |
Encoded | |
Encrypted | |
Summary |
Question 83 |
Consider the following tables (relations):

Primary keys in the tables are shown using Underline. Now, Consider the following query:
SELECT S.Name, Sum (P.Marks) FROM Students S, Performance P WHERE S.Roll-No = P.Roll-No GROUP BY S.NameThe number of rows returned by the above query is
3 | |
2 | |
0 | |
1 |

Question 84 |
A process to upgrade the quality of data after it is moved into a data warehouse | |
A process to upgrade the quality of data before it is moved into a data warehouse | |
A process to lead the data in the warehouse and to create the necessary indexes | |
A process to reject data from the data warehouse and to create necessary indexes |
- Data scrubbing is also called as data cleansing it is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.
- By using data scrubbing tool can save a database administrator a significant amount of time and can be less costly than fixing errors manually.
Question 85 |
Consider the schema R = (A, B, C, D, E, F) on which the following functional dependencies hold :
A ➝ B B,C ➝ D E ➝ C D ➝ AWhat are the candidate keys of R ?
AEF, BEF and DEF | |
AEF, BEF and BCF | |
AE and BE | |
AE, BE and DE |
Algorithm to find Closure Set
- Step1: Equate an attribute or attributes to X for which closure needs to be identified.
- Step2: Take each FD (functional dependency) one by one and check whether the left side of FD is available in X, if yes then add the right side attributes to X if it is not available.
- Step3: Repeat step 2 as many times as possible to cover all FD's.
- Step4: After no more attributes can be added to X declare it as the closure set.
Closure of BEF, i.e. BEF+ = {ABCDEF}
Closure of DEF, i.e. DEF+ = {ABCDEF}
So AEF, BEF and DEF are candidate keys So, option(A) is correct.
Question 86 |
Consider the following sequence of two transactions on a bank account(A) with initial balance 20,000 that transfers 5,000 to another account (B) and then apply 10% interest.
- (i) T1 start
(ii) T1 A old=20000 new 15,000
(iii) T1 B old=12000 new=17000
(iv) T1 commit
(v) T2 start
(vi) T2 A old=15000 new=16500
(vii) T2 commit
Suppose the database system crashes out just before log record (vii) is written. When the system is restricted, which one statement is true of the recovery process ?
We can apply redo and undo operation in arbitrary order because they are idempotent. | |
We must redo log record (vi) to set A to 16,500. | |
We must undo log record (vi) to set A to 16,500 and then redo log record (ii) and (iii). | |
We need not redo records (ii) and (iii) because transaction T1 has committed. |
Checkpoint : Checkpoint is a mechanism where all the previous logs are removed from the system and stored permanently in a storage disk. Checkpoint declares a point before which the DBMS was in consistent state, and all the transactions were committed.
Recovery : When a system with concurrent transactions crashes and recovers, it behaves in the following manner?
⇒ The recovery system reads the logs backwards from the end to the last checkpoint.
⇒ It maintains two lists, an undo-list and a redo-list.
⇒ If the recovery system sees a log with and or just, it puts the transaction in the redo-list.
⇒ If the recovery system sees a log with but no commits or abort log found, it puts the transaction in undo-list.
All the transactions in the undo-list are then undone and their logs are removed. All the transactions in the redo-list and their previous logs are removed and then redone before saving their logs.
Question 87 |
Key and ordering | |
Key and non-ordering | |
Non-key and ordering | |
Non-key and non-ordering |
- It is defined as an ordered data file.
- The data file is ordered on a key field.
- The key field is generally the primary key of the relation.
Secondary Index(Dense)
- This index may be generated from a field which is a candidate key and has a unique value in every record, or a non-key with duplicate values.
Clustering Index(Sparse)
- This index is defined on an ordered data file.
- The data file is ordered on a non-key field.
Question 88 |
Update table | |
Remove table | |
Delete table | |
Drop table |
- UPDATE a DML command is used to update the data or row in the table
- DELETE is a DML command and is used to remove tuples/records from a relation/table.
- DROP is a DDL command and is used to remove the whole structure of the relation. we can delete a table/relation
Question 89 |
Database relations have a large number of records | |
Database relations are sorted on the primary key | |
B+-trees require less memory than binary search trees | |
Data transfer from disks is in blocks |
- B+ tree is a balanced Tree and it can store multiple keys in each node of a B+ tree so that tree height is small
- Where BST where each node contains only one key, So height of BST would be more than height of B+ tree
- Thus, disk can transfer data in blocks when B+ tree is used for indexing database relations.
Question 90 |
1: r1(X); r2(X); w1(X); r3(X); w2(X)
2: r2(X); r1(X); w2(X); r3(X); w1(X)
3: r3(X); r2(X); r1(X); w2(X); w1(X)
4: r2(X); w2(X); r3(X); r1(X); w1(X)
1 | |
2 | |
3 | |
4 |
option (D) is the only graph will be acyclic remaining all are cyclic

Question 91 |
The data type and the length | |
The NULL value rejection | |
The allowable values, through techniques like constraints or rules | |
Default value |
A domain defines the possible values of an attribute. Domain Integrity rules govern these values. In a database system, the domain integrity is defined by:
- The datatype and the length
- The NULL value acceptance
- The allowable values, through techniques like constraints or rules
- The default value
Question 92 |
Triggers | |
Cursors | |
Locks | |
Pointers |
Question 93 |
3 and 4 | |
2 and 5 | |
2 and 4 | |
3 and 5 |
Maximum number of keys can have is 5
Order is Key(5)+1=6
Minimum number of children that a node can have is ceil(6/2) = 3.
Therefore, Minimum number of keys that a node can have becomes 2 i.e (3-1)
Question 94 |
Composite keys | |
Foreign keys | |
Candidate keys | |
Alternate keys |
- CANDIDATE KEY is a set of attributes that uniquely identify tuples in a table. Candidate Key is a super key with no repeated attributes. A super key with no redundant attribute is known as candidate key
- PRIMARY KEY should be selected from the candidate keys. Every table must have at least a single candidate key. A table can have multiple candidate keys but only a single primary key.
Question 95 |
Row lock | |
Page lock | |
Table lock | |
Attribute lock |

Question 96 |
Lexer parser generator | |
Syntactic parser generator | |
Tokenizer parser generator | |
SQL DML parser generator |
- SQL Parser parses a SQL query in a string field.
- When parsing a query the processor generates fields based on the fields defined in the SQL query and specifies the CRUD operation, table, and schema information in record header attributes.
- SQL DML Parser generator is used for SQL query parsing
- In addition to syntactic validation the parser can also perform a semantic validation
Question 97 |
Proving whether a promotivate recursive function is turing computable or not | |
Proving whether a primitive recursive function is a total function or not | |
Generating primitive recursive functions | |
Generating partial recursive functions |
Reference : https://planetmath.org/boundedminimization
Question 98 |
Synchronize access to local resources | |
Synchronize access to global resources | |
Are used to avoid local locks | |
Prevent access to global resources |
- Holding a lock is how one thread tells other threads: “I am updating this thing, So don’t touch it right now.”
- Global locks synchronize access to global resource
Question 99 |
Relations | |
Domains | |
Queries | |
None of these |
- In a relational schema, each tuple is divided into fields called Domains .
- In a relational model, each attribute carries a domain of its own.
- A domain refers to the set of unique values used to define that attribute and will act as a "model" set of values.
- These values, being unique to that attribute are referred to as "atomic values".
- A domain is a set of acceptable values that a column is allowed to store
- The rule for determining the domain boundary may be as simple as a data type with an enumerated list of values.
Question 100 |
Integrity constraint | |
Referential constraint | |
Over-defined constraint | |
Feasible constraint |
Question 101 |
{ t | t ∈ r ⋀ ( t[A]=10 ⋀ t[B]=20 ) } is
Σ (A=10 v B=20) (r) | |
Σ (A=10) (r) Uσ ( B=20) (r) | |
Σ (A=10) (r) ∩ σ ( B=20) (r) | |
Σ (A=10) (r) - σ ( B=20) (r) |
option(A) : Incorrect
Select tuples having A=10 or B=20
option(B) : Incorrect
Select tuples having A=10 or we can select tuples having B=20
option(C) : Correct
Select tuples having A=10 and tuples having B=20
(Tuples having A=10)∩( Tuples having B=20) Which is equal to (Tuples having A=10 and B=20).
Question 102 |
C→ F, E→ A, EC→ D, A→ B
Which of the following is a key for R?
CD | |
EC | |
AE | |
AC |
{CD}+={CDF}
{EC}+={ABCDEF}
{AE}+={ABE}
{AC}+={ABCF}
EC is the key So, Option(B) is Correct
Question 103 |
- a→ c
- b→ d
First normal form but not in second normal form | |
Second normal form but not in third normal form | |
Third normal form | |
None of these |
Question 104 |
(i) Size of each record = 3200 bytes.
(ii) Access time of D = 10 m secs.
(iii) Data transfer rate of D = 800 x 103 bytes/sec
(iv) CPU time to process each record = 3 m secs.
What is the elapsed time of P if records of F are organized using a blocking factor of 2(i.e. each block on D contains two records of F) and P uses one buffer?
12sec | |
14sec | |
17sec | |
21sec |
∴ Elapsed time=(Time taken to transfer Z records in one access +Processing time of two records) x 500
= [(10 + 4 + 4) + 3 + 3] x 500m sec
= [(18) + 6] x 500m sec
= 12 sec.
Question 105 |
Refers to data using physical addresses | |
Cannot interface with high-level programming language | |
Is used to define the physical characteristics of each record | |
None of these |
Question 106 |
Record | |
Field | |
File | |
Database |
- Relation or Table
- Tuple or Row or Record
- Attribute or column or filed
- Degree means Number of columns
- Cardinality means Number of rows
- Domain means data type(legal values)
Question 107 |
3 | |
4 | |
5 | |
6 |
Let take an example of inserting 10 keys from 1 to 10 which cause maximum split
Insertion of 3 keys
1 2 3
Insertion of 4th key 1st split will occur


Question 108 |
Scripted | |
Encoded | |
Encrypted | |
Summary |
Question 109 |
Consider the following tables (relations):

Primary keys in the tables are shown using Underline. Now, Consider the following query:
SELECT S.Name, Sum (P.Marks) FROM Students S, Performance P WHERE S.Roll-No = P.Roll-No GROUP BY S.NameThe number of rows returned by the above query is
3 | |
2 | |
0 | |
1 |

Question 110 |
A process to upgrade the quality of data after it is moved into a data warehouse | |
A process to upgrade the quality of data before it is moved into a data warehouse | |
A process to lead the data in the warehouse and to create the necessary indexes. | |
A process to reject data from the data warehouse and to create necessary indexes. |
- Data scrubbing is also called as data cleansing it is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.
- By using data scrubbing tool can save a database administrator a significant amount of time and can be less costly than fixing errors manually.
Question 111 |
A➝B
B,C➝D
E➝C
D➝A
What are the candidate keys of R ?
AEF, BEF and DEF | |
AEF, BEF and BCF | |
AE and BE | |
AE, BE and DE |
Algorithm to find Closure Set
- Step1: Equate an attribute or attributes to X for which closure needs to be identified.
- Step2: Take each FD (functional dependency) one by one and check whether the left side of FD is available in X, if yes then add the right side attributes to X if it is not available.
- Step3: Repeat step 2 as many times as possible to cover all FD's.
- Step4: After no more attributes can be added to X declare it as the closure set.
Closure of BEF, i.e. BEF+ = {ABCDEF}
Closure of DEF, i.e. DEF+ = {ABCDEF}
So AEF, BEF and DEF are candidate keys So, option(A) is correct.
Question 112 |
(i) T1 start
(ii) T1 A old=20000 new 15,000
(iii) T1 B old=12000 new=17000
(iv) T1 commit
(v) T2 start
(vi) T2 A old=15000 new=16500
(vii) T2 commit
Suppose the database system crashes out just before log record (vii) is written. When the system is restricted, which one statement is true of the recovery process ?
We can apply redo and undo operation in arbitrary order because they are idempotent. | |
We must redo log record (vi) to set A to 16,500. | |
We must undo log record (vi) to set A to 16,500 and then redo log record (ii) and (iii). | |
We need not redo records (ii) and (iii) because transaction T1 has committed. |
Checkpoint : Checkpoint is a mechanism where all the previous logs are removed from the system and stored permanently in a storage disk. Checkpoint declares a point before which the DBMS was in consistent state, and all the transactions were committed.
Recovery : When a system with concurrent transactions crashes and recovers, it behaves in the following manner?
⇒ The recovery system reads the logs backwards from the end to the last checkpoint.
⇒ It maintains two lists, an undo-list and a redo-list.
⇒ If the recovery system sees a log with and or just, it puts the transaction in the redo-list.
⇒ If the recovery system sees a log with but no commits or abort log found, it puts the transaction in undo-list.
All the transactions in the undo-list are then undone and their logs are removed. All the transactions in the redo-list and their previous logs are removed and then redone before saving their logs.
Question 113 |
Key and ordering | |
Key and non-ordering | |
Non-key and ordering | |
Non-key and non-ordering |
- It is defined as an ordered data file.
- The data file is ordered on a key field.
- The key field is generally the primary key of the relation.
Secondary Index(Dense)
- This index may be generated from a field which is a candidate key and has a unique value in every record, or a non-key with duplicate values.
Clustering Index(Sparse)
- This index is defined on an ordered data file.
- The data file is ordered on a non-key field.
Question 114 |
Update table | |
Remove table | |
Delete table | |
Drop table |
- UPDATE a DML command is used to update the data or row in the table
- DELETE is a DML command and is used to remove tuples/records from a relation/table.
- DROP is a DDL command and is used to remove the whole structure of the relation. we can delete a table/relation
Question 115 |
Normalized of data | |
Denomination of data | |
Isolation of data | |
Denormalized of data |
Normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly, update anomaly & deletion anomaly.
Following are the most commonly used normal forms:
- First normal form(1NF)
- Second normal form(2NF)
- Third normal form(3NF)
- Boyce & Codd normal form (BCNF)
Question 116 |
Referential rule | |
Inferential rule | |
Augmentation rule | |
Reflexive rule |

Question 117 |
FD is covered by E | |
E is covered by F | |
F is covered by E | |
F plus is covered by E |
- If every functional dependency in set E is also in closure of F means F+ ⊆ E+
- E cover F if every FD in F can be referred from E.
- E cover F if F+ ⊆ E+ (+ means closure)
- Every set of functional dependencies has a canonical cover
Question 118 |
A--> B | |
B<-- A | |
AB--> R | |
R<-- AB |
- Given a relation R, a set of attributes X in R is said to functionally determine another set of attributes Y, also in R, (written X → Y) if, and only if, each X value in R is associated with precisely one Y value in R; R is then said to satisfy the functional dependency X → Y.
- A functional dependency is denoted by an arrow "→". The functional dependency of X on Y is represented by X → Y.
- X → Y means X attribute we can derive attribute Y.
- The left side of FD is known as a determinant, the right side of the production is known as a dependent
Question 119 |
Primary key | |
Super key | |
Candidate key | |
Primary key |
- A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data.
- Candidate Key is a super key with no repeated attributes
- Each Table have one or more candidate keys
- Primary key should be selected from the candidate keys.
- Every table must have at least a single candidate key.
- Each table can have multiple candidate keys but only a single primary key
- Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key.
- A candidate key is the minimal subset of a super key.
- Candidate key of having "no redundant attributes" and being a "minimal representation of a tuple" in a relational database table
Question 120 |
~P1 V P2 | |
P1 V p2 | |
P1 ⋀ P2 | |
P1 ⋀ ~P2 |

Question 121 |
|R|<=|dom(A1)X dom(A2)..dom(An)| | |
|R|>=|dom(A1)X dom(A2)..dom(An)| | |
|R|=max(|dom(A1)|,|dom(A2)|,..|dom(An)|) | |
|R|=min(|dom(A1)|,|dom(A2)|,..|dom(An)|) |
- The term cardinality refers to the uniqueness of data values contained in a particular column (attribute) of a database table. The lower the cardinality, the more duplicated elements in a column.
- In the context of databases, cardinality refers to the uniqueness of data values contained in a column.
- Cardinality refers to a number. It gives the number of unique values that appear in the table for a particular column.
- cardinality of relation= multiplication of domain of each attribute
- ∣R∣ ≤ ∣ dom(A1)×dom(A2)…dom(An) ∣ For eg: you have a table called Person with column Gender. Gender column can have values either 'Male' or 'Female".
- Then the cardinality of Gender column is 2, since there are only two unique values that could possibly appear in that column – Male and Female.
Question 122 |
NOT will be evaluated first; AND will be evaluated second;OR willbe evaluated last | |
NOT will be evaluated first; OR will be evaluated second;AND willbe evaluated last | |
AND will be evaluated first; OR will be evaluated second;NOT willbe evaluated last | |
The order of occurrence determines the order of evaluation |

Question 123 |
Selection operation | |
Rename operation | |
Join Operation | |
Projection Operation |
An alias only exists for the duration of the query.
Example
SELECT StudentID AS ID, StudentName AS Student
FROM Student;
Question 124 |
Data file | |
Data record | |
Menu | |
Bank |
- Relation sometime called as Table
- Fields sometime called as columns or Attributes
- Rows sometime called as Records or Tuples
Question 125 |
Join | |
Self join | |
Outer join | |
Equi join |
- A table joined with itself is called self join
- Table must contain a column (call it X) that acts as the primary key and a different column (call it Y) that stores values that can be matched up with the values in Column X
Question 126 |
Mn | |
M+n | |
(m+n)/2 | |
2(m+n) |


Question 127 |

Person (NID, Name) | |
Qualification (NID, ExamID, QualifiedDate) | |
Exam (ExamID, NID, ExamName) | |
Exam (ExamID, ExamName) |
So we got 2 tables i.e.
One for Exam(ExamID, ExamName)
Another for Person(NID, Name)
Now problem is with relationship Entity Qualification, on which side we can add it, unfortunately we cannot add QualifiedDate in any of the two tables formed so we need to create a new table using Primary Key from both Entity Person and Entity Exam.
We obtain Qualification(NID, ExamID, QualifiedDate)
Question 128 |
1. T1 start
2. T1 B old=12000 new=10000
3. T1 M old=0 new=2000
4. T1 commit
5. T2 start
6. T2 B old=10000 new=10500
7. T2 commit
Suppose the database system crashes just before log record 7 is written. When the system is restarted, which one statement is true of the recovery procedure?
We must redo log record 6 to set B to 10500 | |
We must undo log record 6 to set B to 10000 and then redo log records 2 and 3. | |
We need not redo log records 2 and 3 because transaction T1 has committed | |
We can apply redo and undo operations in arbitrary order because they are idempotent. |
Refer this link for more information : https://academyera.com/ugc-net-cs-2018-dec-paper-2-transactions-2
Question 129 |
13n/30 | |
N/3 | |
N/10 | |
N/30 |
Database contains n records
Single block can hold either 3 records or 10 key pointers
By using Dene index
Total Number of blocks needed to store data file with "n" records = n/3
Total Number of blocks needed to store dense file index = n/10
Total blocks required to hold data and dense index= n/3 + n/10 = 13n/30 blocks.
Question 130 |
C→ F, E→ A, EC→ D, A→ B.
Which of the following is a key of R?
CD | |
EC | |
AE | |
AC |
{CD}+={CDF}
{EC}+={ABCDEF}
{AE}+={ABE}
{AC}+={ABCF}
EC is the key So, Option(B) is Correct
Question 131 |
Suppliers( sid:integer, sname:string, city:string, street:string )
Parts( pid:integer, pname:string, color:string)
Catalog( sid:integer, pid:integer, cost:real)
Consider the following relational query on the above database:
SELECT S.sname FROM Suppliers S WHERE S.sid NOT IN (SELECT C.sid FROM Catalog C WHERE C.pid NOT IN (SELECT P.pid FROM Parts P WHERE P.color <> 'blue'))Assume that relations corresponding to the above schema are not empty. Which one of the following is the correct interpretation of the above query?
Find the names of all suppliers who have supplied a non-blue part. | |
Find the names of all suppliers who have not supplied a non-blue part | |
Find the names of all suppliers who have supplied only non blue parts. | |
Find the names of all suppliers who have not supplied only non-blue parts. |
Above query select all non blue parts
SELECT C.sid FROM Catalog C WHERE C.pid NOT IN
Above query returns all suppliers who have supplied a blue part
SELECT S.sname
FROM Suppliers S
WHERE S.sid NOT IN
Above query returns suppliers who have not supplied any blue parts.
So, None of the options are matching.
Option(A): wrong, It may include who have supplied blue parts and may not include “null” parts.
Option(B): wrong because it returning other than any blue part.
Option(C): wrong as it does not select suppliers who have not supplied any parts which the given query does
Option(D): wrong
Reference : http://sqlfiddle.com/#!9/9ae12d/1/0
Question 132 |
Emp (Empcode, Name, Sex, Salary, Deptt)
A simple SQL query is executed as follows:
SELECT Deptt FROM Emp WHERE sex = 'M' GROUP by Dept Having avg(Salary) > {SELECT avg(Salary) FROM Emp }The output will be
Average salary of male employee is the average salary of the organization | |
Average salary of male employee is less than the average salary of the organization | |
Average salary of male employee is equal to the average salary of the organization | |
Average salary of male employee is more than the average salary of the organization |
Above query return Average salary of an employee in organization
Query 2: select deptName from Employee where sex = 'Male' GROUP by Dept Having avg (Salary)
Average salary of Male employee where grouped by department
Query 2 > Query 1
Average salary of male employee is more than the average salary of the organization
Question 133 |
K2 | |
K – 1 | |
K + 1 | |
K1/2 |
Question 134 |
D1⊕D2⊕…⊕Dn | |
D1xD2x…xDn | |
D1∪D2∪…∪Dn | |
D1∩D2∩…∩Dn |
Below are the steps for Logic between a relation and its domains.
- Given n domains are denoted by D1, D2, … Dn
- And r is a relation defined on these domains
- Then r ⊆ D1×D2×…×Dn

Question 135 |
127 | |
255 | |
256 | |
It is variable |
Question 136 |
R1(A,B) | |
R4(A,B,C,D,E) | |
R3(A,B,C,D) | |
R2(A,B,C) |
For example 2 attributes A and B
If we have a functional dependency as A->B then A must be the Super key.
(OR)
If we have a functional dependency as B->A then B must be the Super key.
(OR)
{ A->b, B->a} Then Both Keys will be super keys
Question 137 |
Attributes from a table(relation) | |
Tables from a database | |
Databases | |
Tuples from a table(relation) |
DROP command is used to drop the entire table(schema) from the database
Question 138 |
Secondary key | |
Super key | |
Foreign key | |
Primary key |
X should be FOREIGN KEY
Y should be Primary Key
Question 139 |
(i) Secondary index cannot be defined on key attribute values
(ii) In B+ tree indexing the non-leaf nodes contain the actual data pointers
(i)-False, (ii)-True | |
(i)-True, (ii)-True | |
(i)-False, (ii)-False | |
(i)-True, (ii)-False |
Secondary Index : Secondary index may be generated from a field which is a candidate key and has a unique value in every record, or a non-key with duplicate values.
Clustering Index : Clustering index is defined on an ordered data file. The data file is ordered on a non-key field.
Internal node in B+ tree
-Internal node of the B+ tree can contain at least n/2 record pointers except the root node.
-At most, an internal node of the tree contains n pointers.
leaf node in B+ tree
-leaf node of the B+ tree can contain at least n/2 record pointers and n/2 key values.
-At most, a leaf node contains n record pointer and n key values.
-Every leaf node of the B+ tree contains one block pointer P to point to next leaf node.
Question 140 |
R1 → R2 | |
R2 → R1 | |
R1 ∩ R2 → R1 or R1 ∩ R2 → R2 | |
R1 U R2 → R1 R1 U R2 → R2 |
R1 ∩ R2 → R2 or R1 ∩ R2 → R2-R1
Decomposition should be lossless if and only if there exist a common attribute between the decomposed relation which is either a candidate key or key attribute in any of the decomposed tables
Question 141 |
- A → c
- B → d
1 normal form but not in 2 normal form | |
2 normal form but not in 3 normal form | |
3 normal form | |
None of these |
Question 142 |
Aggregate Computation | |
Multiplication | |
Finding transitive closure | |
All of the above |
- Aggregate is a function and to collection of values to generate a single result.( sum(), avg(),max(),min(),any(),count())
- Relational algebra can not preform the Multiplication ( Cartesian product) and Aggregate function
- Transitive closure is an operation on relation tables that is not expressible in relational algebra. Transitive closure is an operation on directed graphs where the output is a graph with direct connections between nodes only when there is a path between those nodes in the input graph.
Question 143 |
Wait-die | |
Wait-wound | |
Wound-Wait | |
Wait |

Question 144 |
Result in deadlock situation | |
Immediately be granted | |
Immediately be rejected | |
Be granted as soon as it is released by A |
- Shared locks exist when two transactions are granted read access.
- One transaction gets the shared lock on data and when the second transaction requests the same data it is also given a shared lock.
- Both transactions are in a read-only mode, updating the data is not allowed until the shared lock is released.
- There is no conflict with the shared lock because nothing is being updated.
- Shared locks last as long as they need to last; it depends on the level of the transaction that holds the lock
- Transaction hold shared lock on data item A .
- So any number of transaction can read that the data from the requesting item using shared locking
- So transaction B request will immediately granted
Question 145 |
SELECT DISTINCT w, x
FROM R, S
Is guaranteed to be the same as R, if
R has no duplicates and S is non empty | |
R and S have no duplicates | |
S has no duplicates and R is non empty | |
R and S has the same number of tuples |
-The query selects all attributes of R. Since we have distinct in query, result can be equal to R only if R doesn’t have duplicates. If S is empty RXS becomes empty, so S must be non empty.
Option(A):R has no duplicates and S is non-empty
Incase If R has duplicates in that case due to DISTINC keyword in query will eliminate duplicates in FINAL result and the results in query !=R
So, R cannot have duplicate values
Incase Relation "S" is Empty then RXS becomes empty So, Relation "S" must be non-empty
Option(B): R and S have no duplicates
Assume Relation ''S' is Empty which has no duplicate values then RXS becomes empty So, Relation "S" must be non-empty
Option(C) : S has no duplicates and R is non-empty
S has no duplicate means we can relation "S" as Empty which is discussed in option(B)
Option(D) : R and S have the same number of tuples
Incase If R has duplicates in that case due to DISTINC keyword in query will eliminate duplicates in FINAL result So results in query !=R which is discussed in option(A)
Question 146 |
S1: 3NF decomposition is always lossless join and dependency preserving
S2: 3NF decomposition is always lossless join but may or may not be dependency preserving
S3: BCNF decomposition is always lossless join and dependency preserving
S4: BCNF decomposition is always lossless join but may or may not be dependency preserving
Only S1 | |
Only S4 | |
Boh S1 and S4 | |
Both S2 and S3 |
- 3NF decomposition is always lossless join and dependency preserving. -TRUE
- 3NF decomposition is always lossless join but may or may not be dependency preserving. -False
- BCNF decomposition is always lossless join and dependency preserving.-False
- BCNF decomposition is always lossless join but may or may not be dependency preserving. -TRUE
Question 147 |
Should release all the locks only at beginning of transaction | |
Should release exclusive locks only after the commit operation | |
Should acquire all the exclusive locks at beginning of transaction | |
Should acquire all the locks at beginning of transaction |
Question 148 |
Every relation in 3NF is also in BCNF | |
A relation R is in 3NF if every non prime attributes of R is fully functionally dependent on every key of R | |
Every relation in BCNF is also in 3NF | |
No relation can be in both BCNF and 3NF |
Question 149 |
F={A → CE, B → D, AE → D},
Identify the highest normal form satisfied by the relation R
2NF | |
BCNF | |
3NF | |
1NF |
AB+ ={A,B,C,D,E}
Candidate key is = AB
Prime Attributes or Key Attributes ={A,B}
Non-Prime Attributes or No-Key Attributes={C,D,E}
B→D is a partial dependency,
Functional dependency B→D violates 2NF requirement
∴ The highest normal form satisfied by the relation is 1NF
Question 150 |
Maximum cardinality should be one | |
Minimum cardinality should be one | |
Minimum cardinality should be zero | |
None of the options |
-Minimum = 1
-Maximum =N
Partial Participation
-Minimum = 0
-Maximum =N
Question 151 |
2NF | |
BCNF | |
3NF | |
1NF |
A→BC
C→D
A+={A,B,C,D}
Candidate Key = A
Prime Attribute or Key Attribute = {A}
Nom-Prime Attribute or Non-Key Attribute = {B C D}
Satisfies the 1NF because of Atomic
C→D following the Transitive dependency so it is not 3NF
Satisfies the 2NF because there is no Partial dependency
Question 152 |
Natural join, outer join | |
Outer join, natural join | |
Left outer join, right outer join | |
Left outer join, natural join |
Question 153 |
F={ A→ B, A→ C, CG→ H, B→ H, G→ F},
which dependency is logically implied?
AC→ H | |
C→ H | |
G→ H | |
A→ H |
A→ B
A→ C
CG→ H
B→ H
G→ F
A→ B and B→ H By using Transitive dependency we can imply A→ H
Question 154 |

(Ename, SSn, EAddr, Dept.No, Dept.Name, Dept.Manager, SSn)
Which of the following is (are) invalid operation(s)?
a) Inserting an employee without name and address
b) Inserting an employee with only SSn
c) Inserting a department with no employee
d) Inserting an employee without SSn
(a) | |
(d) | |
(c) and (d) | |
(b) and (c) |
Question 155 |
Data aggregation | |
Extraction of data | |
Compression of data | |
Cleaning of data |
Data cleansing or data cleaning is the process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data. Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting.
Source : https://en.wikipedia.org/wiki/Data_cleansing
Question 156 |
(a) An SQL query can contain HAVING clause only if it has GROUP BY clause.
(b) In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE.
Which of the following is correct?
(a) and (b) are true | |
(a) is true, (b) is false | |
(a) is false, (b) is true | |
(a) and (b) both are false |
(B) :In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE. - False
The order of execution of Clauses: FROM > WHERE > GROUP BY > HAVING > DISTINCT > SELECT > ORDER BY

Question 157 |
Candidate, primary | |
Foreign,primary | |
Primary,foreign | |
Foreign,superkey |
- Referential integrity ensures that the values for a set of attributes in one relation must also appear the same for the particular set attributes in another relation.
- FOREIGN KEY constraints enforce referential integrity which essentially says that if column value X refers to column value Y, then column value Y must exist.
--X should be FOREIGN KEY
--Y should be Primary Key - Entity integrity constraint ensures that the primary key attribute in a relation, should not accept a null value. This is because the primary key attribute value uniquely defines an entity in a relation. So, it being null would not work.
Question 158 |
Data definition languages is used by DBA and database designers to define schemas | |
Storage definition language is used to specify the internal schema. | |
Storage definition language is used to insert,delete and update data | |
Data definition languages is used to retrieve data from the database |
--Data Manipulation Language(DML) is used to insert, delete and update data
Question 159 |

Which of the following functional dependencies hold?
{AB} → D and D → A | |
{AB → D and B → D | |
{AB} → C and B → C | |
{AB} → D and A → D |

Question 160 |
SELECT DISTINCT w, x
FROM R, S
Is guaranteed to be the same as R, if
R has no duplicates and S is non empty | |
R and S have no duplicates | |
S has no duplicates and R is non empty | |
R and S has the same number of tuples |
-The query selects all attributes of R. Since we have distinct in query, result can be equal to R only if R doesn’t have duplicates. If S is empty RXS becomes empty, so S must be non empty.
Option(A):R has no duplicates and S is non-empty
Incase If R has duplicates in that case due to DISTINC keyword in query will eliminate duplicates in FINAL result and the results in query !=R
So, R cannot have duplicate values
Incase Relation "S" is Empty then RXS becomes empty So, Relation "S" must be non-empty
Option(B): R and S have no duplicates
Assume Relation ''S' is Empty which has no duplicate values then RXS becomes empty So, Relation "S" must be non-empty
Option(C) : S has no duplicates and R is non-empty
S has no duplicate means we can relation "S" as Empty which is discussed in option(B)
Option(D) : R and S have the same number of tuples
Incase If R has duplicates in that case due to DISTINC keyword in query will eliminate duplicates in FINAL result So results in query !=R which is discussed in option(A)
Question 161 |
Dotted rectangle | |
Diamond | |
Doubly outlined rectangle | |
None of these |
- Weak entity is an entity that cannot be uniquely identified by its attributes alone
- Weak entity must use a foreign key in conjunction with its attributes to create a primary key
- Foreign key is typically a primary key of an entity it is related to
- Weak entity doesn't have primary key

Question 162 |
A total recursive function is also a partial recursive function | |
A partial recursive function is also a total recursive function | |
A partial recursive function is also a primitive recursive function | |
None of the above |
- An equivalent definition states that a partial recursive function is one that can be computed by a Turing machine.
- A total recursive function is a partial recursive function that is defined for every input.
- Every primitive recursive function is total recursive, but not all total recursive functions are primitive recursive.
- Primitive recursive functions are a class of functions that are defined using composition and primitive recursion
- They are a strict subset of those p-recursive functions (also called partial recursive functions) which are also total functions.
- Primitive recursive functions form an important building block on the way to a full formalization of computability.
Question 163 |
Result in deadlock situation | |
Immediately be granted | |
Immediately be rejected | |
Be granted as soon as it is released by A |
- Shared locks exist when two transactions are granted read access.
- One transaction gets the shared lock on data and when the second transaction requests the same data it is also given a shared lock.
- Both transactions are in a read-only mode, updating the data is not allowed until the shared lock is released.
- There is no conflict with the shared lock because nothing is being updated.
- Shared locks last as long as they need to last; it depends on the level of the transaction that holds the lock
- Transaction hold shared lock on data item A .
- So any number of transaction can read that the data from the requesting item using shared locking
- So transaction B request will immediately granted
Question 164 |
The SQL statement
SELECT COUNT(*) FROM Employee WHERE SALARY > ANY (SELECT SALARY FROM EMPLOYEE);
10 | |
9 | |
5 | |
0 |
(=, >, <, <=, >=, <>).
Employee table has 10 records and each value in non-NULL SALARY column is unique i.e different. So, in that 10 records one of the record will be minimum which cannot be greater than any nine value of the salary column. Hence the condition
WHERE SALARY > ANY (SELECT SALARY FROM employee)
will be true nine times. So, the COUNT(*) outputs 9.
Question 165 |
Wait-die | |
Wait-wound | |
Wound-Wait | |
Wait |

Question 166 |

Select avg(salary) from EMP whose grade=”E4”; | |
Select avg(salary) from EMP having grade=”E4”; | |
Select avg(salary) from EMP group by grade where grade=”E4”; | |
Select avg(salary) from EMP group by grade having grade=”E4”; |
Select avg(salary) from EMP group by grade having grade=”E4”;
→Having Clause is basically like the aggregate function with the GROUP BY clause.
→HAVING clause is used instead of WHERE with aggregate functions.
→While the GROUP BY Clause groups rows that have the same values into summary rows.
→The having clause is always used after the group By clause.
Syntax :
SELECT column__name
FROM table__name
WHERE condition
GROUP BY column__name
HAVING condition
ORDER BY column__name
Option(A) : "Whose" Invalid
Option(B) : Having clause is always used after the group By clause.
Option(C): Incorrect Syntax "Where" should come after "From" clause
Option(D):Correct
Question 167 |
Select fields from dual where table=”MANAGER”; | |
Select field_names, datatype from dual where table_name=”MANAGER”; | |
Desc MANAGER; | |
Select description from dual where table_name=”MANAGER” |
DESCRIBE or DESC command is used to describe the structure of a table.
It provides the list of column definitions for specified table
You can use either DESC or DESCRIBE statement. both are Case-Insensitive
Syntax
DESCRIBE table_name;
OR
DESC table_name;
Question 168 |
Select statement used in the view definition cannot include ORDER BY clause | |
A view derives its data from the base tables(s) | |
A view is updatable if it has been defined from a single relation | |
A view contains a copy of the data |
- View is defined based on one and only one table.
- View must include the PRIMARY KEY of the table based upon which the view has been created.
- View should not have any field made out of aggregate functions.
- View must not have any DISTINCT clause in its definition.
- View must not have any GROUP BY or HAVING clause in its definition.
- View must not have any SUBQUERIES in its definitions.
- If the view you want to update is based upon another view, the later should be updatable.
- Any of the selected output fields (of the view) must not use constants, strings or value expressions.
Question 169 |
MODIFY TABLE | |
EDIT TABLE | |
ALTER TABLE | |
ALTER COLUMNS |
ALTER TABLE table_name
ADD [COLUMN] column_definition;
In the above statement
→At First, specify the table name to which you want to add the new column.
→At Second, specify the column definition after the ADD COLUMN clause.
Question 170 |
3NF | |
2NF | |
4NF | |
5NF |
-Each table cell should contain a single value.
-Each record needs to be unique.
Second Normal Form
-A relation R is in 2NF if and only if it is in 1NF
-There no partial dependencies
Third Normal Form
-A relation R is in 3NF if and only if it is in 2NF
-There is no transitive functional dependencies
BCNF
-A relation R is in BCNF if and only if it is in 3NF
-A relation is in BCNF if every functional dependency A → B and A is the super key of the given relation
4NF
-A relation R is in 4NF if and only if it is in BCNF.
-There is no multi-valued dependency.
Question 171 |
Alternate keys | |
Foreign keys | |
Candidate keys | |
Composite keys |

Question 172 |
Active | |
Passive | |
Dormant | |
Hyperactive |
- A program is a passive entity. It is a sequence of instructions to be executed on a computer to perform particular task
- A process is a active entity. It is an instance of a computer program
Question 173 |
Two-level model | |
Many to one model | |
One to one model | |
Many to many model |
- Many to Many model multiplexes any number of user threads onto an equal or smaller number of kernel threads, combining the best features of the one-to-one and many-to-one models.
- Users have no restrictions on the number of threads created.
- Blocking kernel system calls do not block the entire process.
- Processes can be split across multiple processors.
- Individual processes may be allocated variable numbers of kernel threads, depending on the number of CPUs present and other factors.

Question 174 |
A 4NF is more immune against logical inconsistencies than a 3NF table. | |
A 3NF table will have fewer anomalies than a 2NF table | |
A 3NF table is more vulnerable than a 2NF table | |
A database is said to be in 3NF if all its tables are in 3NF |
-Each table cell should contain a single value.
-Each record needs to be unique.
Second Normal Form
-A relation R is in 2NF if and only if it is in 1NF
-There no partial dependencies
Third Normal Form
-A relation R is in 3NF if and only if it is in 2NF
-There is no transitive functional dependencies
BCNF
-A relation R is in BCNF if and only if it is in 3NF
-A relation is in BCNF if every functional dependency A → B and A is the super key of the given relation
4NF
-A relation R is in 4NF if and only if it is in BCNF.
-There is no multi-valued dependency.
Question 175 |
All save points marked after the save points to which you rollbacked, are erased | |
It does not free any resources held by the transaction | |
The save point to which you rollback is not erased | |
The Rollback statement will erase all data modifications made from the start of the transaction to the savepoint |
ROLLBACK command is transactional command used to undo transactions that have not already been saved to the database. ROLLBACK command can only be used to undo transactions since the last COMMIT or ROLLBACK command was issued.
Syntax :
ROLLBACK
SAVEPOINT Command
A SAVEPOINT is a point in a transaction when you can roll the transaction back to a certain point without rolling back the entire transaction.
Syntax
SAVEPOINT SAVEPOINT_NAME ;
Above command serves only in the creation of a SAVEPOINT among all the transactional statements. The ROLLBACK command is used to undo a group of transactions.
Syntax for rolling back to a SAVEPOINT is as shown below :
ROLLBACK TO SAVEPOINT_NAME;
Refer this link for more information : https://www.tutorialspoint.com/sql/sql-transactions.htm
Question 176 |
6 | |
2 | |
3 | |
5 |


Question 177 |
SELECT customer_name, telephone FROM customers WHERE city IN('Jaipur','Delhi','Agra');
The cusomer_name of all customers who are not living IN Jaipur,Delhi OR Agra | |
The customer_name and telephone of all customers | |
The customer_name and telephone of all customers living IN either Jaipur, Delhi OR Agra | |
The customer_name and telephone of all customers living IN Jaipur,Delhi AND Agra |
-SQL IN condition reduces the need for multiple OR conditions in sql statements
WHERE city IN('Jaipur' , 'Delhi' , 'Agra' ) ;
Which is same as
WHERE city ='Jaipur' OR city ='Delhi' OR city ='Agra' ;
Question 178 |
(i) To achieve physical data independence
(ii) To remove data anomalies (insertion, update, delete, anomalies)
(iii) To save space on disk.
(i),(ii) and (iii) | |
(i) and (ii) | |
(i) and (iii) | |
(ii) and (iii) |
- Greater overall database organization
- To remove data anomalies(insertion/update/delete anomalies)
- Reduction of redundant data
- To save space on disk (it is happened because of avoiding redundancy)
- Data consistency within the database
- A much more flexible database design
Question 179 |

what are the violated by the above table?
Relationship integrity | |
Referential integrity only | |
Entity and domain integrities | |
Referential and domain integrities |

Question 180 |
Rollback | |
Commit | |
Select | |
Savepoint |
-COMMIT − to save the changes.
-ROLLBACK − to roll back the changes.
-SAVEPOINT − creates points within the groups of transactions in which to ROLLBACK.
-SET TRANSACTION − Places a name on a transaction.
DML Commands (Data Manipulation Language Commands)
-INSERT – is used to insert data into a table.
-UPDATE – is used to update existing data within a table.
-DELETE – is used to delete records from a database table.
DQL Commands (Data Query Language Commands) :
-SELECT – is used to retrieve data from the a database.
DCL Commands (Data Control Language Commands) :
-GRANT -Gives user’s access privileges to database.
-REVOKE - withdraw user’s access privileges given by using the GRANT command.
DDL Commands (Data Definition Language Commands) :
-CREATE – is used to create the database or its objects (like table, index, function, views, store procedure and triggers).
-DROP – is used to delete objects from the database.
-ALTER-is used to alter the structure of the database.
-TRUNCATE–is used to remove all records from a table, including all spaces allocated for the records are removed.
-COMMENT –is used to add comments to the data dictionary.
-RENAME –is used to rename an object existing in the database.
Question 181 |
To ensure data integrity when reads occur to the database in a multi user environment | |
To ensure data integrity when updates occur to the database in a single user environment | |
To ensure data integrity when updates occur to the database in a multi user environment | |
To ensure data integrity when reads occur to the database in a single user environment |
Question 182 |
A disadvantage of highly normalized tables is that queries may require too many time consuming joins | |
Foreign key constraints are referential integrity constraints | |
A primary key uniquely identifies a row in a table | |
Nulls reduce space requirements in tables |
True -Foreign key constraints are referential integrity constraints
True -A primary key uniquely identifies a row in a table
False- Nulls reduce space requirements in tables
Question 183 |
Operational database | |
OLAP | |
OLTP | |
OLAP and OLTP |

Question 184 |
Euro-conversion | |
Hyper-marketing | |
Cyber-Selling | |
E-Commerce |
Example : Flipkart.com,Amazon.com,RentAcenter.com
Question 185 |
Primary entity set | |
Strong entity set | |
Weak entity set | |
Simple entity set |


Question 186 |
Cartesian product always | |
Combination of union and filtered cartesian product | |
Combination of selection and filtered cartesian product | |
Combination of projection and filtered cartesian product |
- Natural join is used to join two relations having any number of attributes. It is denoted by a symbol ( ⨝). It is the combination of projection and filtered cartesian product.
- Projection to remove duplicate attributes in the resultant relation( common column will be present twice in cartesian product) and Filtering with match on common column.
Question 187 |
SELECT COUNT (*) FROM persons | |
SELECT COUNT () FROM persons | |
SELECT COLUMN () FROM persons | |
SELECT COLUMN (*) FROM Persons |

Question 188 |
The number of constraints | |
The number of tuples | |
The number of attributes | |
The number of tables |

Question 189 |
Storage dependent details | |
Entities,attributes and relationships | |
Constraints | |
Semantic information |



Question 190 |
Inter storage area | |
Buffer | |
Staging area | |
Virtual memory |
- A staging area, or landing zone, is an intermediate storage area used for data processing during the extract, transform and load (ETL) process.
- The data staging area sits between the data source(s) and the data target(s), which are often data warehouses, data marts, or other data repositories.
- Data staging areas are often transient in nature, with their contents being erased prior to running an ETL process or immediately following successful completion of an ETL process.
- There are staging area architectures, however, which are designed to hold data for extended periods of time for archival or troubleshooting purposes.
Question 191 |
Economics of quantity | |
Economics occuring quantity | |
Economics over quantity | |
Economics order quantity |
- EOQ stands for Economic Order Quantity
- EOQ refers to the ideal order quantity a company should purchase in order to minimize its inventory costs, such as holding costs, shortage costs, and order costs.
- EOQ is necessarily used in inventory management, which is the oversight of the ordering, storing, and use of a company's inventory.
- Inventory management is tasked with calculating the number of units a company should add to its inventory with each batch order to reduce the total costs of its inventory.
Question 192 |
Update table | |
Alter table | |
Change table | |
Add table |
To add attributes to an existing relation ALTER TABLE commands is used
In order to add a new column to an existing table in SQL, we can use the ALTER TABLE ADD COLUMN command as follows
ALTER TABLE table_name
ADD [COLUMN] column_definition;
In the above statement
→At First, specify the table name to which you want to add the new column.
→At Second, specify the column definition after the ADD COLUMN clause.
Question 193 |
Table | |
Query | |
View | |
Joined relations |
Any relation that is not of the conceptual model but is made visible to a user as a “virtual relation” is called a view.
Question 194 |
Atomicity | |
Consistency | |
Isolation | |
Durability |
Question 195 |
{ t|t ∈ loan ∧ t[amount] > 1200} gives:
The loan_number, branch_name and amount for loans over $1200 | |
The loan_number for each loan of an amount greater than $1200 | |
The branch_name for each loan of an amount greater than $1200 | |
The amount for each loan of an amount greater than $1200 |

Question 196 |
Deadlock | |
Starvation | |
Conflict | |
Lock failure |
Question 197 |
Dimensions and data marts | |
Dimensions and facts | |
Facts and data marts | |
Dimensions and detained facts |
Refer this link for more information : https://www.kimballgroup.com/1999/12/the-matrix/
Question 198 |

( Ename, SSn, Addr, Dept_No, Dept_Name, Dept_Manager_SSN )
Following operations are performed:
a.Insert a record of department with no employee
b.Delete the last employee of the department
c.Update the department name for department #5
Which of the following will lead to complete loss of information about a department?
Only b | |
Only c | |
A and b | |
B and c |
→ Deleting one Employee details leads to department details of particular employee is not available
Question 199 |
A. Whenever two tuples t1 and t2 in R have t1(X)=t2(X) then t1(Y)=t2(Y)
B. Whenever two tuples t1 and t2 in R have t1(Y)=t2(Y) then t1(X)=t2(X)
A and b | |
Only a | |
Only b | |
Neither a nor b |
Question 200 |
Database schema, database instance | |
Database relation,attribute | |
Attribute domain, attribute value | |
Database schema, attribute domain |
→Instance is snapshot of data in the database at a point in time.
→Instance is an instance of time and schema is a representation.
Question 201 |
Functional dependency | |
Domain Integrity rules | |
Referential Integrity rules | |
Entity Integrity rules |
→A functional dependency (FD) is a relationship between two attributes attribute Y is functionally dependent on attribute X (usually the PK), if for every valid instance of X, that value of X uniquely determines the value of Y. This relationship is indicated by the representation below :
X —> Y
Left side of the above FD diagram is called the determinant
Right side is the dependent.
Question 202 |
a) An SQL query can contain HAVING clause only if it has GROUP BY clause
b) Not all attributes used in the GROUP BY clause need to appear in the SELECT clause
Which of the following is correct?
Both a and b are true | |
Both a and b are false | |
A is true, b is false | |
B is true, a is false |
But correct answer is a) is False b) True

Question 203 |
a) In aggregation function duplicates are useful
b) Duplicate elimination is expensive
c) memory chips are cheap and large these days, and can accommodate large number of tuples
Which of the following is/are correct?
A and b | |
B and c | |
Only b | |
Only c |
- SQL automatically does not remove duplicates like relational algebra projection we have to remove it explicitly by using DISTINCT Keyword.
- "ALL" causes an aggregate function to consider all values, including all duplicates.
- Removing duplicate tuples is costly operation in which we need to access all the tuples in order to find the duplicate records
Question 204 |

SQL query- INSERT INTO DEPT(Dname, Dnum, Mgr_SSn) VALUES (Dept2,3,Mgr3)
Is rejected because of
Duplication of department name | |
Incorrect Mgr_SSN | |
Violation of referential Integrity | |
Violation of entity integrity |
- Dnum which is common attribute in both DEPT and DEPT_LOC Table
- Assume Dnum is Foreign Key in DEPT Table and Primary Key in DEPT_LOC Table
- Dnum in DEPT Table referring to Dnum in DEPT_LOC Table
- Inserting a new row in the DEPT table gives some null entries in the DEPT_LOC Table which is violation of referential integrity
Example
Inserting (Dept4,4,Mgr4 ) hear Dnum=4 in DEPT table gives some null entries in the DEPT_LOC Table because Dnum=4 entry not exist
Question 205 |
(a) A ‘view’ is a special stored procedure executed when certain event occurs.
(b) A ‘view’ is a virtual table, which occurs after executing a pre-compiled query.
code:
Only (a) is true | |
Only (b) is true | |
Both (a) and (b) are true | |
Neither (a) nor (b) are true |
Syntax to create a sql view :
CREATE VIEW view_name
AS
SELECT column_list
FROM table_name [WHERE condition];
view_name is the name of the VIEW.
SELECT statement is used to define the columns and rows that you want to display in the view
Question 206 |
SELECT | |
CREATE | |
AVG | |
MODIFY |
1) MIN
2) MAX
3) AVG
4) COUNT
5) SUM
Avg is an aggregate function returns the average of a group of elements.
Syntax:
SELECT AVG(column_name) FROM table_name;
Question 207 |
A. Entity Integrity |
1. Enforces some specific business rule that do not fall into entity or domain |
B. Domain integrity |
2. Rows can’t be deleted which are used by other records |
C. Referential Integrity |
3. Enforces valid entries for a column |
D. User defined Integrity |
4. No duplicate rows in a table |

(a)-(iii), (b)-(iv), (c)-(i), (d)-(ii) | |
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i) | |
(a)-(iv), (b)-(ii), (c)-(iii), (d)-(i) | |
(a)-(ii), (b)-(iii), (c)-(iv), (d)-(i) |
Domain Integrity : Enforces Valid entries for a column. All columns in a relational database must be declared upon a defined domain
Referential integrity :Rows can’t be deleted which are used by another record
User defined Integrity : Enforces some specific business rule that do not fall into entity or domain means we cannot delete records in Parent table(PK) before deleting the records from the child table(FK).
Question 208 |
Functional Dependencies | |
Data integrity | |
Referential integrity | |
Normal forms |
- Functional dependency is a constraint that describes the relationship between attributes in a relation.
- Data integrity refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.
- Referential integrity is a relational database concept, which states that table relationships must always be consistent.
- Normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly, update anomaly and deletion anomaly. 1NF, 2NF, 3NF and BCNF are types of normal forms.
Question 209 |
LOOK-UP | |
INSERT | |
MODIFY | |
CHANGE |

Question 210 |
K-Mean method | |
Self Organizing feature map method | |
K-nearest neighbor method | |
Agglomerative method |
Clustering analysis can be done on the basis of features where we try to find subgroups of samples based on features or on the basis of samples where we try to find subgroups of features based on samples
- k-means clustering is a method of vector quantization, originally from signal processing, that is popular for cluster analysis in data mining.
- Self-Organizing Map Self Organizing Map (SOM) provides a data visualization technique. SOM also represents clustering concept by grouping similar data together.
- k-nearest neighbors algorithm (k-NN) is a non-parametric method used for classification and regression.
- Agglomerative hierarchical clustering is a bottom-up clustering method where clusters have sub-clusters, which in turn have sub-clusters, etc.
Question 211 |
20,20 | |
3,20 | |
3,4 | |
20,4 |
- CHAR and VARCHAR types are declared with a length that indicates the maximum number of characters you want to store. For example : CHAR(20) can hold up to 20 characters.
- varchar will acquire the exact memory of attribute and it varies from tuple to tuple while char will acquire memory space which is define at the time of table creation it is fixed
- VARCHAR(20) can also hold up to 20 characters but if character is less it will take less space
- varchar(20) ‘Ram’ will take 3 and ‘Sita’ will take 20 character space in memory.
Question 212 |
Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints ?
(A) An instructor Id. No. cannot be null, provided Instructor Id No. being primary key.
(B) No two citizens have same Adhar-Id.
(C) Budget of a company must be zero.
(A), (B) and (C) are true. | |
(A) false, (B) and (C) are true. | |
(A) and (B) are true; (C) false. | |
(A), (B) and (C) are false |
Option(A) : True
- Primary key does not allow Null values
- The PRIMARY KEY integrity constraint guarantees that both of the following are true: No two rows of a table have duplicate values in the specified column or set of columns.
- In simple words two NULL values are not considered as equal.
- This is the reason why Primary Key can’t have NULL values as they are not compared with any other value.
Aadhar number is identification number for citizens in India so it must be unique across India consider as it as primary key So primary does not allow null values
Option(C) : False
Budget of a company must be zero - We can't say or it is not necessarily be true
Question 213 |
R1 and R2 are two relationship between M and N, where as
R1 is one-to-many and R2 is many-to-many.
The minimum number of tables required to represent M, N, R1 and R2 in the relational model are _______.
4 | |
6 | |
7 | |
3 |
R1 is one-to-many(No separate Table is required) = 0
R2 is many-many So, it requires one separate table = 1
Total Number of tables = 3
Question 214 |
Dependency preserving but not lossless join | |
Dependency preserving and lossless join | |
Lossless join but not dependency preserving | |
Neither dependency preserving nor lossless join. |
Question 215 |
16 | |
63 | |
64 | |
68 | |
None |
***This question is excluded from evaluation**
Given data,
Key size = 14 bytes,
Child pointer = 7 bytes,
Block Size= 1 Kilobytes,
Assume order of B+ tree = ‘n’.
Block size >= (n – 1) * key size + n * child pointer
1038 >= (n – 1) * 14 + n * 7
1038>= 14 * n – 14 + 7 * n
1038>= 14n – 14 + 7n
1038 >= 21n – 14
1038>= 21n
n <= 1038 / 21
n <= 49.42
Question 216 |
Datamining | |
Data warehousing | |
DBMS | |
Data mirroring |
- The term data mining refers loosely to the process of semi automatically analyzing large databases to find useful patterns. Like knowledge discovery in artificial intelligence (also called machine learning).
- In general terms, “Mining” is the process of extraction of some valuable material from the earth e.g. coal mining, diamond mining etc.
- The term “Data Mining” refers to the extraction of us, “Data Mining” refers to the extraction of useful information from a bulk of data or data warehouses
Question 217 |
DDL | |
DML | |
DBA | |
Schema |
Question 218 |
Reducing the number of joins required to satisfy a query. | |
Eliminating uncontrolled redundancy of data stored in the database. | |
Eliminating number of anomalies that could otherwise occur with inserts and deletes. | |
Ensuring that functional dependencies are enforced. |
- Relational database schema normalization is for eliminating uncontrolled redundancy of data stored in the database.
- Relational database schema normalization is for eliminating number of anomalies that could otherwise occur with inserts and deletes.
- Relational database schema normalization is for ensuring that functional dependencies are enforced.
Question 219 |
(a) NULL values can be used to opt a tuple out of enforcement of a foreign key.
(b) Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in BCNF.
(c) The difference between the project operator (Π) in relational algebra and the SELECT keyword in SQL is that if the resulting table/set has more than one occurrences of the same tuple, then Π will return only one of them, while SQL SELECT will return all.
One can determine that:
(a) and (b) are true. | |
(a) and (b) are true | |
(b) and (c) are true | |
(a), (b) and (c) are true |
True - Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in BCNF.
True - The difference between the project operator (Π) in relational algebra and the SELECT keyword in SQL is that if the resulting table/set has more than one occurrences of the same tuple, then Π will return only one of them, while SQL SELECT will return all.
Question 220 |

I only | |
I and II only | |
II only | |
I, II and III |

Question 221 |
SELECT A FROM R; | |
SELECT A, COUNT(*) FROM R; | |
SELECT A, COUNT(*) FROM R GROUP BY A; | |
SELECT A, B, COUNT(*) FROM R GROUP BY A, B; |
- SELECT A FROM R -legal query
- SELECT A, COUNT(*) FROM R; Illegal query
Aggregate functions can't be used without "Group By" clause.
It is Legal Query SELECT A, COUNT(*) if it is grouped by A. - SELECT A, COUNT(*) FROM R GROUP BY A; - legal query
- SELECT A, B, COUNT(*) FROM R GROUP BY A, B; -legal query
Question 222 |
Data mining | |
Web mining | |
Data warehouse | |
Database Management System |
- “Subject-Oriented”: Contrary to what many people believe when first hearing the term, a data warehouse does not have to be one monolithic repository of all your data. A data warehouse can be used to store and analyze data on a specific subject.
- “Integrated” : One of the key features of data warehouses is that they store and leverage data from multiple different sources.
- “Time variant” : Data warehouses are the home of historical data. You can pull up data from a specific time period, be that 3 months or 3 years ago. Data warehouses often also contain detailed temporal data, showing changes to a dataset. For example, if you’re using your data warehouse to store key customer metrics, you can not only see a customer’s current address or recent purchase history, but all data previously associated with this customer & how it’s changed over time.
- “Non-volatile” : The data contained within a data warehouse is not subject to change.
Question 223 |
Data | |
Information | |
Decision Tree | |
Database |
- In Data mining, classification rules are extracted from decision Tree.
- A decision tree can be used to visually and explicitly represent decisions and decision making.
- In data mining, a decision tree describes data but not decisions; rather the resulting classification tree can be an input for decision making.
- A tree is built by splitting the source set, constituting the root node of the tree, into subsets which constitute the successor children.
- The splitting is based on a set of splitting rules based on classification features. This process is repeated on each derived subset in a recursive manner called recursive partitioning.
Question 224 |
STRING | |
COBWEB | |
CORBA | |
OLAD |
- COBWEB is an incremental system for hierarchical conceptual clustering.
- COBWEB incrementally organizes observations into a classification tree. Each node in a classification tree represents a class (concept) and is labeled by a probabilistic concept that summarizes the attribute-value distributions of objects classified under the node.
- This classification tree can be used to predict missing attributes or the class of a new object
- COBWEB incrementally organizes observations into a classification tree. Each node in a classification tree represents a class (concept) and is labeled by a probabilistic concept that summarizes the attribute-value distributions of objects classified under the node.
- This classification tree can be used to predict missing attributes or the class of a new object
Question 225 |
Referential integrity | |
Multi-valued dependency | |
Entity Integrity | |
Functional dependency |
The primary key or part of it in any relation can not be null
Referential integrity rule :
Referential integrity states that table relationships must always be consistent that a foreign key can be either null or it can have those values which are present in the primary key with which it is related
Multi-valued dependency :
Multi-valued dependency is a full constraint between two sets of attributes in a relation
Functional dependency :
Functional dependency is a relationship that exists when one attribute uniquely determines another attribute.
Question 226 |
I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database.
II. E-R diagrams are useful to logically model concepts.
III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well.
IV. SQL is a procedural language.
I and IV only | |
III and IV only | |
I, II and III only | |
II, III and IV only |
Statement 2 : False
ER diagram is used for conceptual modelling not logical modelling
Statement 3 : False
update anomaly is concerned with related information
Statement 3 : False
SQL is non procedure language
what is difference between conceptual modelling and logical modelling ?
Refer : https://stackoverflow.com/questions/4279089/what-is-the-difference-between-logical-data-model-and-conceptual-data-model
Question 227 |
To allow duplicate tuples in the table by filling the primary key column(s) with NULL. | |
To avoid confusion with actual legitimate data values like 0 (zero) for integer columns and ’’ (the empty string) for string columns. | |
To leave columns in a tuple marked as ’’unknown’’ when the actual value is unknown. | |
To fill a column in a tuple when that column does not really ”exist” for that particular tuple. |
- Null is not equal to any value, it cannot be used as a primary key
- A PRIMARY KEY column is equivalent to UNIQUE and NOT NULL
- PRIMARY KEY should be UNIQUE because a primary key identifies rows in a table so 2 different row should not have the same key.
- Sometimes column of a row not require any value in that case we can use NULL values. So, In option(B),(C),(D) we can use null values in the relation
Question 228 |
C1 : drop table R;
C2 : delete from R;
Which of the following statements is TRUE ?
I. Both C1 and C2 delete the schema for R.
II. C2 retains relation R, but deletes all tuples in R.
III. C1 deletes not only all tuples of R, but also the schema for R.
I only | |
I and II only | |
II and III only | |
I, II and III |
-Delete command in sql removes tuples from the relation but retain the schema of table in database.
So, option(C) is correct
Question 229 |

I : {B}
II : {B, C}
III : {A, D}
IV : {C, D}
If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2 ), then which of the above could not be the candidate key for the database table ?
I and III only | |
III and IV only | |
II only | |
I only |
B → { A, C, D }
A,D → {A, B, C, D}
C,D → {A, B, C, D}
B,C → {A, B, C, D}
We can simply say B alone is the candidate key because in the table "B" Attribute all rows are unique (b1,b2,b3) Hence {B} is the candidate key
[A,D] and [C,D] are the candidate keys but [B,C] is not candidate key.
[B] is a Candidate key so [B,C] is super key, not the candidate key of the given relation
Hence {B, C} cannot be a candidate key in the above database table
Question 230 |
(A) Business intelligence and Data warehousing is used for forecasting and Data mining.
(B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.
Which one of the following options is correct ?
(A) is true, (B) is false. | |
Both (A) and (B) are true. | |
(A) is false, (B) is true. | |
Both (A) and (B) are false. |
- Business intelligence(BI) and data warehousing have different goals. While they are connected and cannot function without each other, BI is mainly focused on generating business insights, whether operational or strategic efficiency such as product positioning and pricing to goals, profitability, sales performance, forecasting, strategic directions, and priorities on a broader level.
- The point is to access, explore, and analyze measurable aspects of a business.
- A Data Warehouse (DWH) has its significance in storing all the company’s data (from one or several sources) in a single place. In a nutshell, BI systems and tools make use of data warehouse while data warehouse acts as a foundation for business intelligence.
Question 231 |
(A) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which one of the following options is correct ?
(A) is true, (B) is false. | |
(A) is false, (B) is true. | |
Both (A) and (B) are false. | |
Both (A) and (B) are true. |
- Data scrubbing is also called as data cleansing it is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.
- By using data scrubbing tool can save a database administrator a significant amount of time and can be less costly than fixing errors manually.
- Data scrubbing is a process to upgrade the quality of data, before it is moved into Data warehouse.
Question 232 |
Select * from customers where city = ‘%GAR%’; | |
Select * from customers where city = ‘$GAR$’; | |
Select * from customers where city like ‘%GAR%’; | |
Select * from customers where city as ‘%GAR’; |

Question 233 |
List - I List - II (a) Normalization (i) Enforces match of primary key to foreign key (b) Data Dictionary (ii) Reduces data redundancy in a database (c) Referential Integrity (iii) Defines view(s) of the database for particular user(s) (d) External Schema (iv) Contains metadata describing database structure

Code :
(iv)(iii)(i)(ii) | |
(ii)(iv)(i)(iii) | |
(ii)(iv)(iii)(i) | |
(iv)(iii)(ii)(i) |
- Normalization reduces data redundancy in a database
- Data Dictionary contains metadata describing database structure defines view(s) of the database for particular user(s)
- Referential Integrity enforces match of primary key to foreign key
- External Schema defines view(s) of the database for particular user(s)
Question 234 |
A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) | |
A value given to a particular attribute (e.g. height - 230 cm) | |
A thing that we wish to collect data about zero or more, possibly real world examples of it may exist | |
A template for a group of things with the same set of characteristics that may exist in the real world |
Refer this link for more information : https://msdn.microsoft.com/en-us/library/ee382837(v=vs.110).aspx
Question 235 |
Indexes | |
User Data | |
Application Metadata | |
Data Dictionary |
- Indexes are special lookup tables that the database search engine can use to speed up data retrieval
- An index is a pointer to data in a table. An index in a database is very similar to an index in the back of a book.
- Simply we can say that an index is a pointer to data in a table which increases the accessibility in a book or databases, we can easily access any information with the help of index.
Question 236 |
F = {AD → E, BE → F, B → C, AF → G}
Which of the following is a candidate key ?
A | |
AB | |
ABC | |
ABD |
From the options
[A]+ = {A}
[AB]+ = {ABC}
[ABC ]+ = {ABC}
[ABD ]+ = {ABCDEFG}
{ABD} is the candidate key.
Question 237 |
OLTP | |
OLAP | |
Data System | |
Market System |

Question 238 |
The Top - Down View | |
Data Warehouse View | |
Datasource View | |
Business Query View |
- Top down view allows selection of the relevant information necessary for the data warehouse
- Data-source view exposes the information being captured, stored, and managed by operational systems
- Data warehouse view consists of fact tables and dimension tables
- Business query view sees the perspectives of data in the warehouse from the view of end-user
Question 239 |
CREATE ASSERTION ‘ASSERTION Name’ CHECK ‘Predicate’ | |
CREATE ASSERTION ‘ASSERTION Name’ | |
CREATE ASSERTION, CHECK Predicate | |
SELECT ASSERTION |
Question 240 |
(a) 2-Phase Locking
(b) Timestamp ordering
Both (a) and (b) | |
(a) only | |
(b) only | |
Neither (a) nor (b) |
- In Basic 2 phase locking there is a chance for deadlock and starvation but ensure serializability
- Strict 2PL ensure serializability and recoverability but deadlock and starvation possible
- Conservative 2PL ensure serializability and no deadlock but starvation possible
- Time stamp ordering ensure serializability and no deadlock and avoid starvation by using wait-die and wound -wait scheme
Question 241 |
(a)Primary key
(b)Sub key
(c)Super key
(d)Foreign key
(a) | |
(a), (b) and (c) | |
(d) | |
(a) and (d) |
Question 242 |
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
(a) | |
(a) and (d) | |
(a), (b) and (c) | |
(a), (b), (c) and (d) |
- Data redundancy and inconsistency Redundancy is the concept of repetition of data i.e. each data may have more than a single copy. We can overcome over it with the help of Normalization
- Difficulty in accessing Data can be overcome by different type of queries i.e. procedural and non procedural queries.
- Data isolation can be removed by join etc.
- Integrity problems Integrity Constraints are the compulsory conditions which should be satisfied by every data value present in the relational table at any instance of time to ensure that the database consists of only meaningful and relevant data. There are four types of integrity constraints:
- Domain Constraints : Every attribute should have values within its defined domain.
- Key Constraints : There should be a primary key for every relational table.
- Entity Integrity Constraints : No NULL values should be there for the Primary Keys.
- Referential Integrity Constraints : In relational model, when two tables are related to each other with the help of some common attributes, the value of referencing attribute should be present in the referenced attribute else it should be NULL.
Question 243 |
Neighbour Set | |
Strong Entity Set | |
Owner Entity Set | |
Weak Set |

Question 244 |
Weak entities can be deleted automatically when their strong entity is deleted. | |
Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the key of the strong entity. | |
A weak entity set has no primary keys unless attributes of the strong entity set on which it depends are included | |
Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set. |
option(B) : True
option(C) : True
option(D) : False because Tuples in a weak entity set are partitioned according to their relationship with tuples in a strong entity set.

Question 245 |
(i) Entities
(ii) The relationship among entities
(iii) The attributes of the entities
Then
(i) and (iii) | |
(i) and (ii) | |
(ii) and (iii) | |
None of the above |
1. Entity
2. Attribute
3. Relationship

Question 246 |
Strong entity | |
Relationship | |
Weak entity | |
E - R |
- weak entity is an entity that cannot be uniquely identified by its attributes alone; therefore, it must use a foreign key in conjunction with its attributes to create a primary key.
- The foreign key is typically a primary key of an entity it is related to
- In entity relationship diagrams (ER diagrams), a weak entity set is indicated by a bold (or double-lined) rectangle (the entity) connected by a bold (or double-lined) type arrow to a bold (or double-lined) diamond (the relationship).
- This type of relationship is called an identifying relationship
- An identifying relationship is one where the primary key is populated to the child weak entity as a primary key in that entity.


Question 247 |
A. 2 NF - (i) Transitive dependencies eliminated B. 3 NF - (ii) Multivalued attribute removed C. 4 NF -(iii) Contain no partial functional dependencies D. 5 NF - (iv) Contains no join dependency

Code :
I-a, ii-c, iii-b, iv-d | |
I-d, ii-c, iii-a, iv-b | |
I-d, ii-c, iii-b, iv-a | |
I-a, ii-b, iii-c, iv-d | |
I-(c), II-(a), III-(b), IV-(d) |
-Each table cell should contain a single value.
-Each record needs to be unique.
Second Normal Form
-A relation R is in 2NF if and only if it is in 1NF
-There no partial dependencies
Third Normal Form
-A relation R is in 3NF if and only if it is in 2NF
-There is no transitive functional dependencies
BCNF
-A relation R is in BCNF if and only if it is in 3NF
-A relation is in BCNF if every functional dependency A → B and A is the super key of the given relation
4NF
-A relation R is in 4NF if and only if it is in BCNF.
-There is no multi-valued dependency.
5NF
-A relation R is in 5NF if and only if it satisfies following conditions:
--R should be in 4NF (no multi-valued dependency exists).
--It cannot undergo lossless decomposition (join dependency)
Question 248 |
Data elements | |
Records and files | |
Record relationship | |
All of the above |
- In a relational database The overall design of the database is called database schema.
- Schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, XML schemas, and other elements.
Question 249 |
Relations | |
Domains | |
Queries | |
All the above |
- In a relational schema, each tuple is divided into fields called Domains .
- In a relational model, each attribute carries a domain of its own.
- A domain refers to the set of unique values used to define that attribute and will act as a "model" set of values.
- These values, being unique to that attribute are referred to as "atomic values".
- A domain is a set of acceptable values that a column is allowed to store
- The rule for determining the domain boundary may be as simple as a data type with an enumerated list of values.
Question 250 |
Accessed by only one user | |
Modified by users with the correct password | |
Is used to hide sensitive information | |
Both (B) and (C) |
Question 251 |
Data model | |
Process model | |
Event model | |
Customer model |
Question 252 |
2 NF | |
3 NF | |
4 NF | |
5 NF |
-Each table cell should contain a single value.
-Each record needs to be unique.
Second Normal Form
-A relation R is in 2NF if and only if it is in 1NF
-There no partial dependencies
Third Normal Form
-A relation R is in 3NF if and only if it is in 2NF
-There is no transitive functional dependencies
BCNF
-A relation R is in BCNF if and only if it is in 3NF
-A relation is in BCNF if every functional dependency A → B and A is the super key of the given relation
4NF
-A relation R is in 4NF if and only if it is in BCNF.
-There is no multi-valued dependency.
5NF
-A relation R is in 5NF if and only if it satisfies following conditions:
--R should be in 4NF (no multi-valued dependency exists).
--It cannot undergo lossless decomposition (join dependency)
Question 253 |
Schema | |
View | |
Query | |
Data Dictionary |
- View is a logical portion of a database which is needed by some users
- The logical database view is how the data appear to the user to be stored.
- This view represents the structure that the user must interface with in order to extract data from the database
- A view in database returns a portion of database based on condition given in the sql query.
- View of a database gives the updated data stored in the database
- A view return a virtual view of database, it can join and simply multiple tables into a single virtual table
Question 254 |
All the updates are done first but the entries are made in the log file later | |
All the log files entries are made first but the actual updates are done later | |
Every update is done first followed by a writing on the log file | |
Changes in the views are deferred till a query asks for a view |

Question 255 |
Hierarchical data model suffers from data independence | |
Network model suffers from data independence | |
Relational model suffers only from logical data independence | |
Relational model suffers only from physical data independence |
-
- Hierarchical data model suffers from data independence - True
- Network model suffers from data independence - True
- Relational model suffers only from logical data independence - False
- Relational model suffers only from physical data independence - True
Question 256 |
A concurrency mechanism that is not deadlock free | |
A recovery protocol used for restoring a database after a crash | |
Any update to the system log done in 2-phases | |
Not effective in Database |
The Two-Phase Locking protocol(2PL) allows each transaction to make a lock or unlock request in two steps:
Growing Phase
In this phase transaction may obtain locks but may not release any locks.
Shrinking Phase
In this phase, a transaction may release locks but not obtain any new lock
2PL protocol offers serializability but it is is not deadlock free
Question 257 |
F =, {A →B,AD →C,B→F,A →E}
Which of the following is candidate key?
A | |
AC | |
AD | |
None of these |
Attribute A and D are not present in the RHS(Right hand Side) of any given functional dependencies. So, every key should include AD to be a candidate key
[AD]+ ={A, B, C, D, E, F}
In all the options . option(C) contains AD none of the options contains AD so option(C) is correct one
So, AD is the candidate key
Question 258 |
Database reads more than writes | |
Writes are more than reads | |
It does not matter as it is good in both the situations | |
There are only writes |


Question 259 |
2 - phase locking protocol suffers from dead locks | |
Time - Stamp protocol suffers from more abort | |
Time stamp protocol suffers from cascading rollbacks where as 2 - phase locking protocol do not | |
None of these |
- 2-phase locking protocol suffer from dead lock.
- Time stamp protocol suffer from more aborts because suffer from cascading rollback
- Time stamp protocol is not recoverable and can lead to cascading rollback
- In 2 Phase Locking protocol Cascading roll-back is possible. We can use strict two-phase locking to avoid Cascading roll-back .
- In strict two-phase locking protocol a transaction must hold all its exclusive locks till it commits/aborts.
- Rigorous two-phase locking is even stricter: here all locks are held till commit/abort. In this protocol transactions can be serialized in the order in which they commit.
Question 260 |
DML | |
Subschema DLL | |
Schema DLL | |
All of these |

Question 261 |
Customers who have no account in any of the branches in Delhi. | |
Customers who have an account at all branches in Delhi. | |
Customers who have an account in at least one branch in Delhi. | |
Customers who have only joint account in any one branch in Delhi |
- Division operator is used when we have to evaluate queries which contain the keyword ALL
- Division identify the attribute values from relation that are found to be paired with all of the values from the other relation.
- As multiplication is to division in arithmetic, Cartesian Product (×) is to Division in relational algebra.
- Division is the opposite of Cartesian Product:
Question 262 |
I. Implementation of self-join is possible in SQL with table alias.
II. Outer-join operation is basic operation in relational algebra.
III. Natural join and outer join operations are equivalent.
I and II are correct. | |