1. In the client server systems, the DBMS in the server is also known as:
2. A statement that is executed automatically by the system as a side effect of a modification to the database is:
3. In a DBMS, two record types and their relationship is called:
4. Each time a transaction commits the database, pages containing the old version of the data become inaccessible Such pages are considered:
5. Conflicts between instructions correspond to:
6. The term used to denote an overall chart of all the data item types and record types stored in a database is:
7. A menu driven system:
8. A catalogue of all the data types in the database is:
9. A character coding technique in which characters occur in the data with different frequencies is:
10. Which term refers to either all or none of the operations being reflected properly in the database?
11. Which of the following is not a part of SDLC?
12. A terabyte is:
13. Encapsulation implies:
14. The level of data abstraction which describes how the data is actually stored is:
15. To decompose a relation into several smaller relations without duplicity is:
16. The database that is a unification of several data files with any redundancy wholly or partially eliminated is:
17. A language that enables users to access or manipulate data is:
18. A tree is composed of a hierarchy of elements called:
19. If a transaction Ti has obtained a shared mode lock on item Q, then Ti:
20. Normal forms are used to:
21. Projection operator:
22. Shadow paging is:
23. Which one is used to create complex entities?
24. Finding relevant information from a large volume of data is called:
25. The collection of information stored in a database at a particular moment is called:
26. Which timestamp is denoted by the W-timestamp (Q) of a transaction?
27. The candidate key which is not a primary key is said to be:
28. Rollback causes the current transaction to:
29. The cost of physically linking the sites in the system is:
30. A Decision Table facilitates conditions to be related to:
31. Once a transaction commits, its update survives even if there is a subsequent system crash This is:
32. The concept of a Multivalued Dependency is to be found in:
33. Select the most appropriate statement from the following:
34. The two-phase commit protocol may introduce:
35. After a transaction completes successfully, the changes made to the database are reflected even if there are system failures This is referred to as:
36. If in relation r, values x and y are only dependent on the primary key and not on each other, then they are said to be:
37. A phase when a transaction may obtain locks but may not release any lock is:
38. Head Crash on the disk is:
39. A candidate key that involves more than one attribute is said to be:
40. Who gave the 12 rules for any RDBMS to be accepted as a full-fledged RDBMS?
41. Execution of a transaction in isolation preserves:
42. A repository of information gathered from multiple sources stored under a unified schema at a single site is:
43. Which one refers to the hashing in which the number of disk accesses needed to locate a specific record is never more than two?
44. The role of a DBA is to:
45. The state while a transaction is executing is:
46. The system that processes transactions as soon as they are entered is:
47. Polymorphism is defined as:
48. The concept of a joined dependency is related to:
49. Ensuring that the updates are correct even during the failure period is referred to as:
50. A language in which the user requests information from the database is:
51. A relation is in 3NF if and only if:
52. The major focus of system methods and procedures is to relate input data to a final output that is meaningful to the:
53. Which type of data access is done while using a stack?
54. What is not true about the primary key?
55. A weak entity is an entity that:
56. System implementation phase of SDLC entails:
57. The process of adjusting the storage of data to suit the popularity rating is:
58. Ellipses in an Entity Relationship Diagram represent a:
59. A ____, or requirements model, describes the information that a system must provide.
60. The two most common network access methods are ____ and token ring.
61. The type of information collected on the survey form that describes how data is updated is ____.
62. A(n) ____ relationship describes the connection or link between objects.
63. A(n) ____________________ in a hierarchical model is the equivalent of a record in a file system.