DBMS MCQ-3

image_pdfimage_print

1)Each block of B tress of order ‘n’ can have
a)n-1 key values, and n pointers
b)n+1 key values, and n pointers
c)n key values, and n+1 pointers
d)Cannot be determined

2)Which normal form is considered adequate for relational database design?
a)2NF
b)3NF
c)4NF
d)BCNF

3)The concept of locking can be used to solve the problems of 
a)Lost Updates
b)Uncommited dependency
c)Inconsistent data
d)All of the above

4)When the number of buckets or the bucket address range changes with file, it is called 
a)Hashing
b)Extendable Hashing
c)Inverted index Hashing
d)None of the above

5)Blocking factor is applicable for ………….. organization
a)Spanned
b)Un-spanned
c)Both
d)None

6)A correlate sub-query always executes in
a)Top-Bottom
b)Bottom-Top
c)Top-Bottom-Top
d)None of these

7)Access time in B+ trees 
a)Varies
b)Constant
c)Cannot say
d)Both a and b

8)The five aggregation operations in SQL is 
a)SUM, AVG, IN ALL, ANY
b)SUM, AVG, MIN, MAX, DISTINCT
c)SUM, AVG, MIN,MAX,COUNT
d)SUM, AVG,IN, DISTINCT,COUNT

9)Deadlock in database system is an example of…
a)User error
b)Consistency error
c)System error
d)None of these

10)Which language is used to define the integrity constraints?
a)DDL
b)DML
c)DCL
d)None of these

Answers:
1)a
2)b
3)d
4)b
5)b
6)c
7)b
8)c
9)c
10)a