Monday, October 27, 2014

DBA QUIZ 2

1.In statistical databases aggregate queries are not allowed.

Select one:
True
False {correct}

aggregate queries (SUM, COUNT, AVG, STDEV, etc.) are allowed.

2.Generating DDL statements from Conceptual model is known as Forward Engineering.

Select one:
True  {correct}
False

3.Every XML document must be associated with a DTD or XML Schema

Select one:
True
False {correct}

4.Checkpointing resolves deadlock situation effectively.

Select one:
True
False {correct}

5.We can have utmost one clustering Index on a table.

Select one:
True  { correct }
False

6.Which of the UML diagrams can be used for modeling database, in place of ER diagrams?

Select one:
a. Class {correct}
b. Activity
c. Use-case
d. Component

7.If in an indexing scheme, index records are created for only few key values that are seen in the data records,  it is known as__

Select one:
a. Sparse Index {correct}
b. Light Index
c. Shallow Index
d. Dense Index

8.If a transaction reaches partial commit state it can not be rolled back.

Select one:
True
False {correct}

9.The first record of each block in Primary indexing is called as-

Select one:
a. Block Record
b. Prime Record
c. Index Record
d. Anchor Record {correct}

10.XQuery uses FOR, LET, FROM, RESULT clauses in its statements.

Select one:
True
False {correct}

as FROM is not part of clause

11.In a B- tree record pointers are found at
Select one:
a. Only at root
b. Any level {correct}
c. Only at Intermediate level
d. Only at leaf level

B-tree, pointers to data records exist at all levels of the tree

12.Discretionary Access Control scheme classifies users and data objects in to categories.

Select one:
True
False { correct }

it happens in Mandatory Access Control.

13.Shadow paging is the technique used for ____

Select one:
a. Page transferring from Disk to RAM
b. Database Recovery {correct}
c. Data Integrity
d. Deadlock resolution

14.In Timestamp-based concurrency control,  when a transaction issues a Write request on data item A, the we must only look at  Write Timestamp of A; and we can ignore the Read Timestamp of A.
Select one:
True
False {correct}

15.Deadlock situation can be predicted by ___

Select one:
a. wait-for graph {correct}
b. Mutual graph
c. Lock graph
d. Sharing graph

16.In a m-way search tree, if each node contains maximum of m children, the minimum number of  keys is  in any internal node is  m-1.
Select one:
True
False {correct}


17.XQuery statements use XPath syntax. 

Select one:
True  {correct}
False

18.As per the heuristics used in query optimization, a cartesian product operation with a subsequent selection operation can be replaced by a grouping operation.

Select one:
True
False {correct}

Replace CARTESIAN PRODUCT and SELECT with JOIN operations .

19.The property of Conflict Serializability of a concurrent schedule can be tested using __ 

Select one:
a. Schedule graph
b. Serial graph
c. Query graph
d. Precedence graph {correct}

20.The old value of the data item is necessary in case of immediate modification scheme in Database Recovery

Select one:
True {correct}
False

21.Clustering Index is built on __ field.

Select one:
a. non-ordering key
b. Ordering non-key {correct}
c. Ordering key
d. non-ordering non-key

22.The timestamp-based concurrency control protocols use two-phase locking scheme.

Select one:
True
False {correct}

23.Serializability can be implemented using-
Select one:
a. Paging
b. Serializing
c. Checkpointing
d. Locks {correct}

24.The indexing scheme whose search key does not specify the sequential order of the file is-

Select one:
a. Secondary index  {correct}    
b. Unordered Index
c. Dense Index
d. Primary index        

25.The Concurrent execution of transactions can increase__
Select one:
a. Throughput {correct}
b. Integrity
c. Mutual exclusion
d. Consistency

6 comments:

  1. Hi,

    First of all. Thanks for sharing.

    Can you please explain a bit more for the 16th question.
    16.In a m-way search tree, if each node contains maximum of m children, the minimum number of keys is in any internal node is m-1.
    Select one:
    True
    False {correct}

    How is this false? I had thought it is True

    ReplyDelete
    Replies
    1. Each node can have at most m−1 keys. with m children but here questions states m-1 minimum keys which is false.

      refer wikipedia for more clearity.
      http://en.wikipedia.org/wiki/B-tree

      Delete
  2. i think answer for Q 12 is true ...... DAC mechanisms control access based entirely on the identities of users and objec..............thats what http://fas.org/irp/nsa/rainbow/tg003.htm.................. says

    ReplyDelete
  3. Did you know that you can make dollars by locking special areas of your blog or website?
    Simply open an account on AdWorkMedia and use their Content Locking widget.

    ReplyDelete