{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

MI0025-DBMS-_Key - MBA Third Semester Model Question...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
MBA Third Semester Model Question Paper -2009 Database Management Systems (DBMS) (2 Credits) Question Number 1 to 20 -1 mark Question. Question Number 21 to 31-2 Marks Question. Question Number 32 to 38 - 4 Marks Question. Answer KEY Q.N o. Statement and Options Correct Answer Section 1 A __________ is complex set of software programs that controls the organization, storage & retrieval of data in a database. a. Repository b. DBMS c. Software d. Program b 1.1 2 A major drawback of the static hashing is that address space is ________. a. dynamic b. fixed c. variable d .collide b 3.8 3 Third normal form is based on the concept of ________________ a. functional dependency b. full functional dependency c. semi functional dependency d. transitive dependency d 9.3.1 4 In _______________ Data can be accessed by users at other remote sites through the distributed database management system software. a. Transparency b. Data sharing c. Easier expansion b 13.1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
d. Data tracing 5 ________________ is known as UNDO/REDO algorithm. a. Immediate update b. deferred update c. the redo logs d. rolled back a 12.4 6 These are Design Driven a. Database Management Systems b. Management Information Systems c. Centralized systems d. File systems d 1.4 7 Whenever a record is larger than a block, we must use a _____________ organisation. a. Spanned b. unspanned c. sequential d. random access. a 3.4 8 ______________ is one of the major factor s in database Management. a. Integrity b. Security c. Consistency d. Concurrency b 14.1 9 Only retrieving of data is called a. retrieve transaction b. write transaction c. read only transaction. d. read & write transaction c 10.2 10 If many of the attributes do not take any values, we insert _____________ values. a. Data b. NULL c. attribute d. Schema B 9.2 11 The ________________ differs from the tuple calculas in the type of variables used in formulas. a. Relational calculas b. Relational algebra c. Domain calculas d. Tuple calculas c 7.3
Background image of page 2
12 _____________ is a pointer to s disk block a. second field b. first field c. clustering index d. secondary index a 4.2 13 For each attribute there is a set of permitted values called the ___________ of that attribute a. domain b. value c. atomic value d. schema a 6.1 14 The ______________ are used to alter the database tables.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}