Top 1000+ Solved DataBase Management System (DBMS) MCQ Questions Answer
Q. In a the system makes repeated requests for tuples from the operation at the top of the pipeline.
a. demand-driven pipeline
b. producer-driven pipeline
c. demand pipeline
d. all of the mentioned
Q. In a operations do not wait for requests to produce tuples, but instead generate the tuples eagerly.
a. demand-driven pipeline
b. producer-driven pipeline
c. demand pipeline
d. all of the mentioned
Q. Each operation in a demand-driven pipeline can be implemented as an that provides the following functions: open(), next(), and close().
a. demand
b. pipeline
c. iterator
d. all of the mentioned
Q. The iterator maintains the of its execution in between calls so that successive next() requests receive successive result tuples.
a. state
b. transition
c. rate
d. block
Q. Tuples are generated in producer-driven pipelining, they are generated on demand, in demand- driven pipelining.
a. lazily, eagerly
b. eagerly, lazily
c. slowly, eagerly
d. eagerly, slowly
Q. Which of the following is/are false for RAW mode of FOR XML?
a. xmlschema option does not returns an in-line xsd schema
b. binary base32 returns the binary data in base32-encoded format
c. each row in the query result is transformed into an xml element
d. none of the mentioned
Q. refers to the ability of the system to recover committed transaction updates if either the system or the storage media fails.
a. isolation
b. atomicity
c. consistency
d. durability
Q. You have a column that will only contain values from 0 to 256. What is the most economical data type to use for the column?
a. tinyint
b. smallint
c. int
d. decimal(1)
Q. Problems occurs if we don’t implement a proper locking strategy
a. dirty reads
b. phantom reads
c. lost updates
d. unrepeatable reads
Q. Which of the following pair of regular
a. 1(01)* and (10)*1
b. x(xx)* and (xx)*x
c. (ab)* and a*b*
d. x+ and x*x+
Q. Which feature converts row data to a column for better analytical view?
a. views
b. join
c. pivot
d. trigger
Q. Stored procedures are safe from SQL injection attacks
a. true
b. false
c. depends on the result
d. always safe
Q. Which of the following connection type supports application role permissions and password encryption?
a. ole db
b. dblib
c. odbc
d. ole db and odbc
Q. Consider a schema R(A, B, C, D) and functional dependencies A -> B and C -> D. Then the decomposition of R into R1 (A, B) and R2(C, D) is
a. dependency preserving and lossless join
b. lossless join but not dependency preserving
c. dependency preserving but not lossless join
d. not dependency preserving and not lossless join
Q. Which one of the following statements about normal forms is FALSE?
a. bcnf is stricter than 3nf
b. lossless, dependency-preserving decomposition into 3nf is always possible
c. lossless, dependency-preserving decomposition into bcnf is always possible
d. any relation with two attributes is in bcnf