Computer General knowledge for all competitive exam like ibps,ssc,mppsc,vyapam,RRB. Don't forget to follow our website to get notifications on your email
Q.1 The cost of reading and writing temporary files
while evaluating a query can be reduced
by
(A) building indices (B) pipelining
(C) join ordering (D) none of the
above
Ans: (B)
Q.2 A transaction is in __________ state after the
final statement has been executed.
(A) partially committed (B) active
(C) committed (D) none of the above
Ans: (C)
Q.3 In multiple granularity of locks SIX lock is
compatible with
(A) IX (B) IS
(C) S (D) SIX
Ans: (B)
Q.4 The statement that is executed automatically by
the system as a side effect of the
modification of the
database is
(A) backup (B) assertion
(C) recovery (D) trigger
Ans: (D)
Q. 5 The normal form that is not necessarily
dependency preserving is
(A) 2NF (B) 3NF
(C) BCNF (D) 4NF
Ans: (A)
Q.6 A functional dependency of the form x ® y is trivial if
www.gkstudies.in
(A) y Í x (B) y Ì x
(C) x Í y (D) x Ì y
Ans: (A)
Q.7 The normalization was first proposed by
______________.
(A) Code (B) Codd
(C) Boyce Codd (D) Boyce
Ans: (B)
Q.8 The division operator divides a dividend A of
degree m+n by a divisor relation B of
degree n and produces a
result of degree
(A) m – 1 (B) m + 1
(C) m * m (D) m
Ans: (D)
Q.9 Which of the following is not a characteristic
of a relational database model?
(A) Table (B) Tree like structure
(C) Complex logical relationship (D) Records
Ans: (B)
Q.10 Assume transaction A holds a shared lock R. If
transaction B also requests for a shared
lock on R.
(A) It will result in a deadlock situation.
(B) It will immediately be rejected.
(C) It will immediately be granted.
(D) It will be granted as soon as it is released by
A .
Ans: (C)
Q.11 In E-R Diagram total participation is
represented by
(A) double lines (B) Dashed lines
(C) single line (D) Triangle
Ans: (A)
Q.12 The FD A ® B , DB ® C implies
(A) DA ® C (B) A ® C
(C) B ® A (D) DB ® A
Ans: (A)
Q.13 The graphical representation of a query is
________.
(A) B-Tree (B) graph
(C) Query Tree (D) directed graph
www.gkstudies.in
Ans: (C)
Q.14 Union operator is a :
(A) Unary Operator (B) Ternary
Operator
(C) Binary Operator (D) Not an
operator
Ans: (C)
Q.15 Relations produced from an E-R model will always
be
(A) First normal form. (B) Second
normal form.
(C) Third normal form. (D) Fourth
normal form.
Ans: (A)
Q.16 Manager salary details are hidden from the
employee .This is
(A) Conceptual level data hiding.
(B) External level data hiding.
(C) Physical level data hiding.
(D) None of these.
Ans: (A)
Q.17 Which of the following is true for network
structure?
(A) It is a physical representation of the data.
(B) It allows many to many relationship.
(C) It is conceptually simple.
(D) It will be the dominant database of the future.
Ans: (A)
Q.18 Which two files are used during operation of the
DBMS?
(A) Query languages and utilities
(B) DML and query language
(C) Data dictionary and transaction log
(D) Data dictionary and query language
Ans: (C )
Q.19 A list consists of last names, first names, addresses
and pin codes. If all people in the
list have the same last
name and same pin code a useful key would be
(A) the pin code
(B) the last name
(C) the compound key first name and last name
(D) Tr from next page
Ans: (C )
Q.20 In b-tree the number of keys in each node is
____ than the number of its children.
(A) one less (B) same
(C) one more (D) half
www.gkstudies.in
Ans: (A)
Q.21 The drawback of shadow paging technique are
(A) Commit overhead (B) Data
fragmentation
(C) Garbage collection (D) All of
these
Ans: (D)
Q.22 Which normal form is considered adequate for
normal relational database design?
(A) 2NF (B) NF
(C) 4NF (D) 3NF
Ans: (D)
Q.23 Which of the following addressing modes permits
relocation without any change over
in the code?
(A) Indirect addressing (B) Indexed
addressing
(C) PC relative addressing (D) Base
register addressing
Ans: (B)
Q.24 In a multi-user database, if two users wish to
update the same record at the same time,
they are prevented from
doing so by
(A) jamming (B) password
(C) documentation (D) record lock
Ans: (D)
Q.25 The values of the attribute describes a
particular_____________
(A) Entity set (B) File
(C) Entity instance (D) Organization
Ans: (C)
Q.26 Which of the following relational algebraic
operations is not from set theory?
(A) Union (B) Intersection
(C) Cartesian Product (D) Select
Ans: (D)
Q.27 Which of the following ensures the atomicity of
the transaction?
(A) Transaction management component of DBMS
(B) Application Programmer
(C) Concurrency control component of DBMS
(D) Recovery management component of DBMS
Ans: (A)
Q.28 If both the functional dependencies : X®Y and Y®X hold for two attributes X and Y
then the relationship
between X and Y is
www.gkstudies.in
(A) M:N (B) M:1
(C) 1:1 (D) 1:M
Ans: (C)
Q.29 What will be the number of columns and rows
respectively obtained for the operation, AB,
if A B are Base union
compatible and all the rows of a are common to B? Assume A
has 4 columns and 10
rows; and B has 4 columns and 1 rows
(A) 4,0 (B) 0,0
(C) 4, (D) 3,
Ans: (A)
Q.30 For correct behaviour during recovery, undo and
redo operation must be
(A) Commutative (B) Associative
(C) idempotent (D) distributive
Ans: (C)
Q.31 Which of the following is not a consequence of
non-normalized database?
(A) Update Anomaly (B) Insertion
Anomaly
(C) Redundancy (D) Lost update
problem
Ans: (D)
Q.32 Which of the following is true for relational
calculus?
(A) "x(P(x))º¬($x)(¬P(x)) (B) "x(P(x))º¬($x)(P(x))
(C) "x(P(x))º($x)(¬P(x)) (D) "x(P(x))º($x)(P(x))
Ans: (A)
Q.33 The part of a database management system which
ensures that the data remains in a
consistent state is
(A) authorization and integrity manager
(B) buffer manager
(C) transaction manager
(D) file manager
Ans: (C)
Q.34 Relationships among relationships can be
represented in an-E-R model using
(A) Aggregation (B) Association
(C) Weak entity sets (D) Weak
relationship sets
Ans: (A)
Q.35 In tuple relational calculus P1 AND P2 is
equivalent to
(A) (¬P1OR¬P2). (B) ¬(P1OR¬P2).
(C) ¬(¬P1OR P2). (D) ¬(¬P1OR ¬P2).
www.gkstudies.in
Ans: (D)
Q.36 If a®b holds then so does
(A) ga®gb (B) a®®gb
(C) both (A) and (B) (D) None of
the above
Ans: (A)
Q.37 Cascading rollback is avoided in all protocol
except
(A) strict two-phase locking protocol.
(B) tree locking protocol
(C) two-phase locking protocol
(D) validation based protocol.
Ans: (D)
Q. 38 Wait-for graph is used for
(A) detecting view serializability. (B) detecting
conflict serializability.
(C) deadlock prevention (D) deadlock
detection
Ans: (D)
Q.39 The expression sq1(E1_q2E2) is the same as
(A) E1 _q1^ q2E2 (B) sq1 E1^sq2 E2
(C) E1 _q1_ q2E2 (D) None of the above
Ans: (A)
Q.40 The clause alter table in SQL
can be used to
(A) add an attribute
(B) delete an attribute
(C) alter the default values of an attribute
(D) all of the above
Ans: (D)
Q. 41 The data models defined by ANSI/SPARC
architecture are
(A) Conceptual, physical and internal
(B) Conceptual, view and external
(C) Logical, physical and internal
(D) Logical, physical and view
Ans: (D)
Q.42 Whenever two independent one-to-many
relationships are mixed in the same relation, a
_______ arises.
(A) Functional dependency (B) Multi-valued
dependency
(C) Transitive dependency (D) Partial
dependency
www.gkstudies.in
Ans:(B)
Q.43 A table can have only one
(A) Secondary key (B) Alternate key
(C) Unique key (D) Primary key
Ans: (D)
Q.44 Dependency preservation is not guaranteed in
(A) BCNF (B) 3NF
(C) PJNF (D) DKNF
Ans: (A)
Q.45 Which is the best file organization when data is
frequently added or deleted from a file?
(A) Sequential (B) Direct
(C) Index sequential (D) None of
the above
Ans: (B)
Q.46 Which of the following constitutes a basic set
of operations for manipulating relational
data?
(A) Predicate calculus (B) Relational
calculus
(C) Relational algebra (D) SQL
Ans: (C)
Q.47 An advantage of views is
(A) Data security (B) Derived
columns
(C) Hiding of complex queries (D) All
of the above
Ans: (A)
Q.48 Which of the following is not a recovery
technique?
(A) Deferred update (B) Immediate
update
(C) Two-phase commit (D) Shadow
paging
Ans: (C)
Q.49 Isolation of the transactions is ensured by
(A) Transaction management (B) Application
programmer
(C) Concurrency control (D) Recovery
management
Ans: (C)
Q.50 _______ operator is used to compare a value to a
list of literals values that have been
specified.
(A) Like (B) COMPARE
(C) BETWEEN (D) IN
Ans: (A)
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें