Sunteți pe pagina 1din 18

Chapter 1.

Overview of Relational DBMS


Exercises
Multiple Choice Questions
(i) Relational data model is a
1. Formal model
2. Non-formal model
3. Semi-formal model
4. None of the above.
(ii) The degree of a relation is
1. The total number of candidate keys in the relation
2. The total number of attributes in the relation
3. The total number of tuples in the relation
4. None of the above.
(iii) The cardinality of a relation represents
1. The total number of attributes in the relation
2. The total number of tuples in the relation
3. The total number of super keys in the relation
4. None of the above.
(iv) Which of the following statements is false?
1. A relation can have more than one candidate keys
2. A relation can have only one primary key
3. A relation can have several super keys
4. None of the above
5. All of the above.
(v) Null value represents
1. Zero value
2. Blank value
3. Undefined value
4. None of the above.
(vi) Entity integrity constraint stipulates that
1. For each attribute there must be a set of permitted values
2. The value of each attribute in a primary key must be not null
3. All of the above
4. None of the above.
(vii) Which of the following statements is false?
1. Primary keys are candidate keys
2. Alternate keys are candidate keys
3. Candidate keys are super keys
4. None of the above.
(viii) Which of the following is a trivial functional dependency?
1. X → Y
2. Y → X
3. XY → Y
4. None of the above.
(ix) Tuples selection based on predicate is done by using
1. Selection operation
2. Projection operation
3. Cartesian Product
4. All of the above
(x) Which of the following statements is true?
1. An equi-join is a theta join
2. A natural join is an equi-join
3. A natural join is a theta join
4. All of the above.
(xi) Which of the following statements is true?
1. A semijoin operation requires no join attribute
2. A semijoin operation reduces the size of the resultant relation compared to a join operation
3. A semijoin operation in not applicable for centralized DBMS
4. None of the above.
(xii) Which of the following anomalies occurs owing to referential integrity constraints?
1. Repetition anomaly
2. Insertion anomaly
3. Deletion anomaly
4. All of the above.
(xiii) In a relation R, a multi-valued dependency of the form X ↠ Y is called trivial multi-
valued dependency if
1. Y ⊂ X and X ∪ Y = R
2. Y ⊂ X or X ∪ Y = R
3. All of the above
4. None of the above.
(xiv) Which of the following the statement is true?
1. A left outer join retrieves tuples from both relations that match the join attribute value only.
2. A left outer join retrieves tuples from both relations that match the join attribute value and
unmatched tuples from both relations.
3. A left outer join retrieves tuples from both the relations that match the join attribute value
and unmatched tuples from the left relation.
4. A left outer join retrieves tuples from both the relations that match the join attribute value
and unmatched tuples from the right relation.
(xv) Which of the following statements is true?
1. If X ↠ Y, then X → Y
2. If X ↠ Y, then X ↛ Y
3. If X ↠ Y, then X ⊂ Y
4. If X ↠ Y, then Y ↠ X.

Chapter 2. Review of Database Systems


Exercises
Multiple Choice Questions
(i) Shared memory is
1. Loosely coupled architecture
2. Tightly coupled architecture
3. Both a and b
4. None of the above
. (ii) Shared-nothing is also known as
1. Clusters
2. Massively parallel processing system
3. Both a and b
4. None of the above.
(iii) NUMA (non-uniform memory architecture) is
1. Shared-memory architecture
2. Shared-disk architecture
3. Shared-nothing architecture
4. Hierarchical architecture.
(iv) Symmetric multiprocessing (SMP) is used in
1. Shared-memory architecture
2. Shared-disk architecture
3. Shared-nothing architecture
4. Hierarchical architecture.
(v) Which of the following statements is true?
1. Data partitioning is a major drawback of parallel processing systems
2. Data partitioning is applicable for centralized databases
3. Data partitioning is beneficial for I/O parallelism
4. All of the above
. (vi) Hash function is used in
1. Range partitioning
2. Round-robin
3. Both in range partitioning and round robin
4. None of the above.
(vii) A point query retrieves the tuples from a relation
1. Based on a particular attribute value within a given range
2. Based on the primary key value of the relation
3. Based on a particular attribute value
4. All of the above.
(viii) Even distribution of tuples across disks is ensured by
1. Hash partitioning technique
2. Range partitioning technique
3. Round-robin partitioning technique
4. All of the above.
(ix) A range query retrieves the tuples from a relation
1. Based on a particular attribute value within a given range
2. Based on the primary key value of the relation
3. Based on the value of a particular attribute
4. None of the above.
(x) Which of the following statements is false?
1. Speedup and scaleup is associated with parallel processing systems
2. Speedup and scaleup is associated with distributed processing systems
3. Speed-up and scale-up is associated with centralized databases
4. Both a. and b.

Chapter 3. Distributed Database Concepts


Exercises
Multiple Choice Questions
(i)Which of the following is a component of a distributed DBMS?
1. Server
2. Client
3. Network
4. All of the above.
(ii) Which of the following is a function of a distributed DBMS?
1. Distributed query processing
2. Replicated data management
3. Distributed data recovery
4. All of these.
(iii) Local autonomy means
1. Local query will be processed locally
2. Local data will be accessed by local site only
3. Local DBA is sole authority of local data
4. Each site is a DBMS in its own right.
(iv) A transaction processor is responsible for
1. Receiving and processing only local applications’ data requests
2. Receiving and processing only remote applications’ data requests
3. Receiving and processing both local and remote applications’ data requests
4. None of the above.
(v) Which of the following statements is true?
1. In a heterogeneous distributed DBMS, each site must have a different DBMS product
// In a heterogeneous distributed database system, sites may run different DBMS products
2. In a heterogeneous distributed DBMS, at least more than half of the sites must have different
DBMS products
3. In a heterogeneous distributed DBMS, at least two sites must have different DBMS products
4. None of the above.
(vi) Location independence represents
1. Users are aware of the location of the data
2. Users are unaware of the location of the data
3. Users are aware of the physical names of database objects
4. None of the above.
(vii) Which of the following statements is true?
1. Network independence indicates that a distributed DBMS cannot work on a variety of
disparate communication networks
2. Network independence indicates that a distributed DBMS can work only in a homogeneous
network environment
3. Network independence indicates that a distributed DBMS can work on a variety of disparate
communication networks
4. All of the above
5. None of the above.
(viii) Which of the following refers to the operation of copying and maintaining database
objects in multiple physical databases belonging to a distributed system?
1. Backup
2. Recovery
3. Replication
4. All of these.
(ix) In a heterogeneous distributed DBMS
1. Two different sites can use different DBMS products, but data model must be the same
2. Two different sites can use different data model, but DBMS product must be the same
3. Two different sites can use both different DBMS products and different data models
4. Two different sites can use different DBMS products but database languages must be same.
(x) Which of the following is true?
1. Global applications access only remote data
2. Global applications access only local data
3. Global applications can access both local and remote data
4. All of the above.
(xi) Which of the following is not a benefit of site autonomy?
1. A global catalog is not necessary to access local data
2. Nodes can upgrade software independently
3. Administrators can recover from isolated system failures independently
4. There is no need for backup and recovery.
(xii) Which of the following statements is true?
1. Remote data accessing and distributed database are the same
2. Remote data accessing and parallel database are the same
3. Remote data accessing and distributed processing are the same
4. All of the above
5. None of the above.
(xiii) Which of the following statements is correct?
1. In a homogeneous DDBMS, all sites must have same operating system and same DBMS
2. In a homogeneous DDBMS, all sites must have the same DBMS, but operating system may be
different
3. All of the above
4. None of the above.
(xiv) Which of the following statements is false?
1. A transaction manager is responsible for receiving and processing both local and remote
applications’ data requests
2. A data processor stores and retrieves data located at that site
3. The DM and the TM both have the same responsibility
4. None of the above.

Chapter 4. Overview of Computer Networking


Exercises
Multiple Choice Questions
(i) Which of the following statements is correct?
1. In a point-to-point network one common communication channel is shared by all nodes
2. In a broadcast network, there is a dedicated connection between each pair of nodes
3. In a point-to-point network, there is a dedicated connection between each pair of nodes
4. All of the above.
(ii) An enterprise network is
1. A LAN owned by a particular organization
2. A WAN owned by a particular organization
3. A MAN owned by a particular organization
4. All of the above
5. None of the above.
(iii) Which of the following statements is true?
1. In ring topology all connections are established via a central hub
2. In bus topology there is a dedicated connection between each pair of nodes
3. In star topology there is a dedicated connection with neighboring nodes
4. In star topology each connection is made via a central hub.
(iv) Which of the following statements is false?
1. In tree topology there may be more than one hub
2. In mesh topology there is a dedicated connection between each pair of nodes
3. In ring topology, there is a dedicated connection with each neighboring node
4. None of these
5. All of these.
(v) Multi-casting is a special type of
1. Point-to-point network
2. Broadcasting network
3. Uni-casting network
4. None of the above.
(vi) Token is used in
1. Bus topology
2. Star topology
3. Tree topology
4. Ring topology.
(vii) Backbone is used in
1. Bus topology
2. Star topology
3. Mesh topology
4. Ring topology.
(viii) The total number of communication links with n nodes in a mesh topology is
1. n * n
2. 2n
3. n * (n – 1)/2
4. None of these.
(ix) In the OSI model, the communication subnet consists of
1. Application layer, network layer and physical layer
2. Session layer, application layer and presentation layer
3. Network layer, data link layer and physical layer
4. Application layer, network layer and data link layer.
(x) Which of the following statements is incorrect?
1. The network layer is responsible for delivery of packets
2. The data link layer provides user interfaces
3. The physical layer deals with the mechanical and electrical specifications of the interface and
the communication medium
4. The transport layer is responsible for delivery of messages.
(xi) The key elements of a network protocol are
1. Syntax, network topology and network category
2. Syntax, semantics and timing
3. Semantics, network topology and network category
4. Timing, network topology and syntax.
(xii) Which of the following protocols is not routable?
1. SPX/IPX
2. TCP/IP
3. NetBIOS
4. None of these.
(xiii) Which of the following statements is true?
1. IP address is 48 bits long
2. IP address is 16 bits long
3. IP address is 24 bits long
4. IP address is 32 bits long.
(xiv) Sockets is the name of a
1. Secure communication channel
2. Network protocol
3. The package of subroutines that provide access to TCP/IP
4. None of these.
(xv) On the Internet, services are provided by
1. Web sites
2. Web browsers
3. Web pages
4. None of these.
(xvi) Which of the following services is provided by NetBIOS protocol?
1. Naming services
2. Datagram services
3. Session Services
4. All of these.
(xvii) Which of the following statements is false?
1. URL represents the unique address of each resource on the Internet
2. A web site is a collection of several wed pages
3. Web servers are not physically distributed
4. None of these.
(xviii) WML is
1. WAP Manipulation Language
2. WAP Markup Language
3. Wireless Manipulation Language
4. Wireless Markup Language.

Chapter 5. Distributed Database Design


Exercises
Multiple choice questions
(i) Which of the following statements is true?
1. Top-down approach is not suitable if the database design starts from the beginning.
2. Bottom-up approach is suitable for the database design that is designed from the beginning.
3. Bottom-up approach deals with the integration of existing database systems.
4. None of these.
(ii) Which of the following is not a data allocation strategy?
1. Partitioned
2. Centralized
3. Replication
4. None of these.
(iii) Which of the following refers to the fact that the command used to perform a task is
independent of the
location of the data and the location of the system where the command is used?
1. Naming transparency
2. Fragmentation transparency
3. Location transparency
4. All of these.
(iv) Which of the following is not a benefit of data fragmentation?
1. Parallelism
2. Security
3. Concurrency
4. Integrity
(v) Which of the following is an objective of data distribution in the distributed system?
1. Locality of reference
2. Availability and reliability
3. Communication cost
4. All of these.
(vi) Preservation of functional dependency is ensured by which of the correctness rules of
fragmentation?
1. Disjointness
2. Reconstruction
3. Completeness
4. All of these.
(vii) Which of the following statements is true?
1. Horizontal fragments are subsets of tuples
2. Vertical fragments are subsets of attributes
3. Mixed fragments are subsets of a combination of tuples and attributes.
4. All of these
5. None of these.
(viii) Bond Energy algorithm is used for
1. Horizontal fragmentation
2. Vertical fragmentation
3. Mixed fragmentation
4. Derived fragmentation.
(ix) Which of the following statements is false?
1. Mixed fragments are vertical fragments of horizontal fragments
2. Mixed fragments are horizontal fragments of vertical fragments
3. Derived fragments are horizontal fragments of horizontal fragments
4. None of these.
(x) Which of the following statements is correct?
1. A minimal predicate is the conjunction of simple predicates, which is complete and relevant.
2. A set of predicates is complete if and only if any two tuples in the same fragment are
referenced with the same probability by any transaction
3. A predicate is relevant if there is at least one transaction that accesses the resulting
fragments differently
4. All of these.
(xi) Which of the following techniques is not used for vertical fragmentation?
1. Grouping
2. Splitting
3. Clustering
4. None of these.
(xii) Which transparency is provided if users are unaware about the names of database
objects?
1. Location transparency
2. Naming transparency
3. Local mapping transparency
4. Replication transparency
(xiii) Clustering represents
1. Storing common data in one place
2. Storing different types of data in one place
3. Storing different types of data in different places
4. Storing common data in different places.
(xiv) Which of the following statements is correct?
1. Local mapping transparency is level 1 transparency (Fragmentation transparency is at 1 level
location transparency is at level 2 and local mapping is at 3 level)
2. Replication transparency is level 3 transparency
3. Location transparency is level 1 transparency
4. None of these.
(xv) Which of the following statements is true?
1. DBMS transparency is provided by homogeneous distributed DBMS
2. DBMS transparency is provided by heterogeneous distributed DBMS
3. DBMS transparency is provided by both homogeneous and heterogeneous distributed DBMS
4. DBMS transparency is not provided by either of homogeneous or heterogeneous DBMS.

Chapter 6. Distributed DBMS Architecture


Exercises
Multiple Choice Questions
(i) Which of the following computing models is used by distributed database systems?
1. Mainframe computing model
2. Disconnect, personal computing model
3. Client/server computing model
4. None of these.
(ii) Which of the following is not a property of a server?
1. Active (Master)
2. Waiting for requests
3. On request serves clients and sends reply
4. None of these.
(iii) Which of the following is not a property of a client?
1. Active (Master)
2. Sending requests
3. Waits until reply arrives
4. None of these.
(iv) Which of the following statements is correct?
1. A heavy client complicates the server code
2. A heavy client simplifies the client code
3. A heavy client simplifies the server code
4. None of these.
(v) A thin client
1. Simplifies the server code
2. Complicates the client code
3. Complicates the server code
4. Simplifies both client and server codes.
(vi) In DDBMSs, distributed physical data independence is provided by
1. Local conceptual schema
2. Local external schema
3. Global conceptual schema
4. Local mapping schema.
(vii) In DDBMSs, distributed logical data independence is provided by
1. Local conceptual schema
2. Global external schema
3. Global conceptual schema
4. Local mapping schema.
(viii) Which of the following statements is correct?
1. There is no local user in a federated MDBS
2. There is no global user in a non-federated MDBS
3. There is no local user in a non-federated MDBS
4. None of these.
(ix) Which of the following statements is incorrect?
1. An MDBS provides DBMS transparency
2. An MDBS provides complete autonomy to individual database systems
3. An MDBS controls multiple gateways
4. All of the above
5. None of the above.
(x) Which of the following statements is true?
1. A loosely coupled FMDBS has no global conceptual schema
2. A tightly coupled FMDBS has no global external schema
3. A loosely coupled FMDBS has no local external schema
4. A tightly coupled FMDBS has no local conceptual schema.
(xi) In peer-to-peer architecture
1. Each node has the client functionality
2. Each node has the same capability
3. Each node has the client functionality as well as server functionality
4. Both b. and c.
(xii) Which of the following schema is used in federated MDBS?
1. Component schema
2. Federated schema
3. Export schema
4. All of these
5. None of these.

S-ar putea să vă placă și