MT0034 DBMS SQL Server 310 MSci IT Sem 1

Embed Size (px)

Citation preview

Model Question Paper Subject Code: MT0034 Subject Name: DBMS & SQL Server Credits: 4 Part A (One mark questions) Marks: 140

1. DBMS is a collection of ________ that enables user to create and maintain a database. A) keys B) Translators C) program D) Language Activity 2.Processed data is called_______ A) Raw data B) Information C) Useful data D) Source 3. DFD stands for A) Data Flow Document B) Data File Diagram C) Data Flow Diagram

D) None of the above 4. _______ defines the structure of a relation which consists of a fixed set of attribute-domain pairs A) Instance B) Schema C) program D) Super Key 5. _____________approach reduces time and effort required for design and lesser risk in database management. A) Single global database B) Top-down approach C) Multiple database D) None of the above 6. The one guidelines to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid / reduce the redundancy. D) An entity should not have attributes. 7. ____________is used to determine whether the result of a table contains duplicate rows. A) Unique predicate B) Like predicate

C) Null predicate D) In predicate 8. DCL stands for A) Data Control Language B) Data Console Language C) Data Control Level D) Direct Control Level 9. ____________is a complex search criteria in the where clause. A) Substring B) Drop Table C) Predict D) Predicate 10. Reflexivity property says that X A) subset of X B) null set of X C) super set of Y D) subset of Y 11. In the __________mode any record in the file can be accessed at random. A) sequential access B) random access C) standard access Y is true if Y is_______.

D) source access 12. 4NF stands for A) Fourth Negative File B) Fourth Normal Fraction C) Fourth Normal Form D) Fourth Normal File 13. Select the wrong statement from the following. A) The normalization step consists of first identifying fields within a composite attribute as individual attributes. B) If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called BCNF is needed. C) A file is a collection of records and a record contains values for single field. D) Non-Homogeneous file: Where file holds instances of many different record types. 14. IMS introduced the concept of Virtual record to effectively deal with ______relationships. A) n:n B) m1:m C) m:n D) m,n1 15. Which one of the following contains description of columns defined for tables; contains relation id, column name, type length, offset, etc. A) RELTAB B) COLTAB

C) INDTAB D) COLBAT 16. HDAM stands for A) Higher Direct Access Method B) Hierarchical Direct Access Method C) Hierarchical Division Access Method D) High Definition Access Method 17.__________ allows definitions and query language statements to be entered; query results are formatted and displayed. A) Schema Processor B) Query Processor C) Terminal Interface D) None of the above 18. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data-item. This is referred to as A) Data security B) Domain access C) Data control D) Domain integrity 19. _________________involves definition of security and access control policies. A) Physical Security B) Human Factor

C) Administrative controls D) None of the above 20. Centralizing the integrity checking directly under the DBMS ________duplication and ensures the consistency and validity of the database. A) increases B) skips C) does not reduce D) reduces 21. ___________defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity. A) Column B) Constraint C) Index D) Trigger 22. The relational model is based on the concept that data is organized and stored in two-dimensional tables called__________. A) fields B) records C) relations D) keys 23. _________________first proposed the process of normalization. A) Edgar. W

B) Edward Stephen C) Edgar F. Codd D) Edward Codd 24. An outstanding functionality of SQL is its support for automatic _________to the target data. A) programming B) functioning C) navigation D) notification 25. ______________is a read-only database that contains system objects that are included with SQL Server 2005. A) Resource Database B) Master Database C) Model Database D) msdb Database 26. Select the wrong statement from the following. A) Clients are PCs or workstations on which users run applications. B) SNA Server does not link IBM environments running the systems Network Architecture protocol with PC based networks. C) Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. D) Any user on the network can store files on the server.

27. SOAP stands for A) Single Object Access Protocol B) Simple Object Access Procedure C) System Object Access Protocol D) Simple Object Access Protocol 28. MS SQL Server and Sybase/ASE both communicate over networks using an applicationlevel protocol called ____________________ A) MS SQL Server B) Tabular Data Set C) SQL-92 D) Tabular Data Stream 29. The Configuration Manager tool is a ______________________application that consolidates the settings involving the services and network information for SQL Server. A) Microsoft Management Console

B) Microsoft Management Control

C) Microsoft window manager

D) Microsoft Enterprise Manager

30. Pick the wrong statement from the following.

A) T-SQL mainly adds additional syntax for use in stored procedures, and affects the syntax of transaction support B) Developer Edition is licensed for use as a development and test system, but not as a production server. C) Standard Edition is developed for medium-sized organizations. D) SQL Server 2005 supports the Banyan VINES Sequenced Packet protocol, Multiprotocol, AppleTalk, or NWLink IPX/SPX network protocols. 31. Express Edition is available only in ______version. A) 16 bit B) 32 bit C) 64bit D) 8 bit 32. Pick the correct statement from the following A) Secondary files hold all of the data that fit in the primary data file. B) Devices are operating system files used to store databases, transaction logs and their backups. C) When a database is expanded, the new space is not immediately made available to either the data or transaction log file, depending on which file was expanded. D) A file can be a member of more than one filegroup. 33. DROP TABLE cannot be used to drop a table referenced by a ____________constraint. A) Local key B) Primary key C) Composite key

D) FOREIGN KEY 34. Which of the following statements is wrong. A) You can use one CREATE DATABASE statement to create a database and the files that store the database. B) Databases devices are not stored on disk files. C) If the transaction log is not set up to expand automatically, the transaction log can run out of space if certain types of activity occur in the database. D) The filegroup is an administrative mechanism for grouping files within the database. 35. Pick the wrong statement from the following A) The SELECT statement retrieves rows by specifying the columns of interest, the scope (the set of files) for the search, and the search criteria. B) When you use more than one logical operator in a statement SQL Server evaluates the NOT operator first, followed by the AND operator, and then the OR operator. C) The string concatenation operator allows string concatenation with the additional sign (*), which is also known as the string concatenation operator. D) To build a statement dynamically, you use the EXECUTE statement with a series or string literals and variables that are resolved at execution time. 36. ____________ specifies a search condition for a group or an aggregate. A) GROUP BY Clause B) HAVING Clause C) FROM_Clause D) WHERE_Clause 37. ______________are predefined and maintained SQL Server and users cannot assign or directly change the values.

A) Global variables B) Local variables C) Integer variables D) Floating variables 38. The advantage of a view is A) Installation B) Operation C) No data integrity D) Security 39. Which of the following statement is false. A) Query simplicity and structural simplicity are the disadvantages of a view. B) Using the DROP VIEW statement a view can be dropped from a database. C) One of the characteristics of a Trigger is that it cannot return data to the user. D) Managed application is one of the types of application of .NET framework. 40. _____________Returns a user-defined error message and sets a system flag to record that an error has occurred. A) ROWGUIDCOL B) RAISERROR C) IDENTITY D) PRINT

Part B (Two mark questions)41. Data maintenance involves _____ and _______ the data from the storage. A) Inserting ,deleting B) Swapping, deleting C) Inserting, Setting D) None of the above 42. In case of large organisations, ER models shall be____ and ______ A) Small,simple B) large, complex. C) Small, complex. D) None of the above 43. A database design should be ______and ______the redundancy. A) Unambiguous, reduce B) ambiguous, reduce C) ambiguous, increase D) difficult, increase 44. SQL is based on both____ and._______ A) rational algebra, relational arithmetic B) relational arithmetic, relational calculus C) relational algebra, relational calculus D) relational sets, rational calculus

45. _____and ______ pertain to dependent privileges. A) Strict, Cascade. B) Resist, Actual C) Restrict, Cascade D) Resist, Cascade, 46. When file records are of ______, it is easy to calculate ______ of a field within the Record and access the field value. A) Variable length, offset B) Fixed length, offset C) Standard length, offset D) Fixed length, index 47. An indexed-sequential file facilitates both __________and ______access on one key field. A) Sequential, indirect B) Random, indirect C) Sequential, direct D) Random, direct 48. The HDBMS, like many other database systems, uses a ______based record manager for storing the data. On the Netware environment, this record manager is the package called________. A) B-tree, Betrieve B) B-tree, CISAM

C) A-tree, CISAM D) A-tree, Betrieve

49. Which of the following statements is false? A) Terminal Interface allows definitions and query language statements to be entered; query results are formatted and displayed. B) In process model the DBMS runs as one operating system (OS) process for each transaction. C) When a query is submitted by the user, it is first translated into an internal representation by the processor translator. D) System R is an experimental database system that was developed at IBM AImaden Research Centre in the 1970's. 50. Which of the following statements is true? A) Integrity constraints ensure that any properly authorized access, alteration, deletion, or insertion of the data in the database does not change the consistency and validity of the data. B) The value of information not depends on what the information is used for. C) Authorization means implementation of policies, goals, terms control policies of the organization expressed as a set of attributes. D) The privacy lock is a double value, which is specified in the schema description. 51. Which of the following statements are true? i. Rule contains information that defines valid values that are stored in a column or data type. ii. In a relational model, each row in a table should be unique

iii. The first normal form (1NF) basically states that an attribute can only store three values. iv. Second normal form (2NF) describes full functional dependency on the secondary key and data.

A) i,ii and iv B) i and iii C) ii and iv D) i and ii 52. Which of the following statements is false? A) SQL Server can send email using Microsoft exchange Server or other messaging application programming interface (MAPI) compliant providers. B) Client-server architectures are sometimes called four-tier architectures. C) Notifications are delivered through a SQL Service Broker queue that applications can poll, and use activation services or blocking statements that return whenever the notifications are available D) Database API is an interface used by an application to send requests to SQL Server and to process results returned by SQL Server. 53. Which of the following statements are wrong i. During installation, the Setup program requires you to select either a licensing mode or sublicensing user mode and then to accept the terms or the license rules and conditions. ii. The default installation path for the program and data files is D:\Program Files\microsoft\ sql server2005\ iii. If SQL Server is installed in a stand-alone environment, you can use the Local System account for the SQL Server services.

iv. Missing components that are required by SQL Server 2005 features are detected by the SQL Server Component Update, which installs, for example, .NET Framework 2.0, Microsoft SQL Native Client, and Setup support files.

A) i and iii B) i and ii C) ii and iv D) i ,ii and iii 54. Which of the following network protocols are supported by Stand-alone named and default instances. a. Shared Memory and SPP. b. Shared Memory, Named Pipes c. TCP/IP and VIA d. Shadow Memory ,Named Pipes and TCP/IP e. Named Pipes, TCP/IP and Virtual memory A) a, b and e B) Both b and c C) Only d D) a, d and e 55. SQL Server allocated space to databases in units _____continuous pages called allocation units. Each allocation unit is _____________in size. A) 256, 512 K or 0.5 MB B) 1024, 512 K or 0.5 MB

C) 1024 , 256K or 0.2 MB D) 256, 1024 K or 50 MB 56. SQL Server implements the CREATE DATABASE statement in two steps. Select them from the following. 1. SQL Server uses a copy of the model database to initialize the database and its meta data. 2. SQL Server/client 2008 uses a database to initialize the meta data first. 3. SQL Server copy data file then Specifies that a database is attached from an existing set of operating system files. 4. SQL Server then fills the rest of the database with empty pages, except for pages that have internal data recording how the space is used in the database. 5. SQL Server then fills the the database with empty pages, except for pages that have external data recording how the space is used in the database. A) 2 and 5 B) 1 and 4 C) 3 and 5 D) 2 and 3 57. Constraint checking can be disabled on existing _________and ____________constraints so that any data you modify or add to the table is not checked against the constraint. A) CHECK, FOREIGN KEY B) DELETE, FOREIGN KEY C) CHECK, PRIMARY KEY D) PRIMARY KEY, FOREIGN KEY

58. Which of the following are the facts and guidelines to be considered when creating a clustered index?1. Each table can have only one clustered index. 2. The average size of a clustered index is about 50 percent of the table size. However,

clustered index size is fixed on the size of the indexed column.3. The physical row order of the table and the order of rows in the index are the same. Rows

are sorted into a sequenced order and maintained in that order.4. Uniqueness of key values is not required to be maintained explicitly, with the UNIQUE

keyword, or implicitly, using an internal unique identifier.5. Uniqueness of key values is maintained explicitly, with the UNIQUE keyword, or implicitly,

using an internal unique identifier. Unique identifiers are internal to SQL Server, and therefore are not accessible to the user. A) 2 and 5 B) 1, 3 and 5 C) 1, 3 and 4 D) 2 and 3 59. ________ and _________ are the Transact-SQL control-of-flow key words. A) CONTINUE, STOP B) BREAK, STOP C) CONTINUE, WHILE D) WHILE, GOING TO 60. Which of the following are false statements? 1. A view can derive its data from the temporary tables.

2. In the case of a non-indexed view, the portions of the view necessary to solve the query are materialized at run time. 3. A trigger can also be interpreted as a special kind of stored procedure that is executed whenever an action, such as data modification, takes place. 4. The .NET Framework is a collection of services and classes 5. An INSERT trigger can be primarily used to perform an action such as a DML operation on another table view. A) 2 and 5 B) 1, 3 and 4 C) 1 and 5 D) 2 and 3

Part C (Four mark questions)61. Match the following a) Database b) DDL c) DFD d) Keys A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii ,d-iv D) a-i, b-iii, c-iv, d-ii i. illustrates data process activities ii. Conceptual schema iii. Maintain data integrity iv. General purpose software

62. State true (T) or false (F) a) Data is raw fact or figures or entity. b) Before storing the data it must be verified for any modification. c) The library card catalog is an example of a database that may be created and maintained manually. d) The data definition facilities are same at the conceptual and external schema levels. A) a-T ,b- T, c-F ,d-F B) a-F, b-F, c-T, d-T C) a-T, b-F, c-F, d-T D) a-T, b- F, c-T, d-F 63. Match the following. a) Relational algebra b) Rows of a relation c) Select d) Join A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii ,d-iv D) a-i, b-iii, c-iv, d-ii 64. State true (T) or false (F) a) In a relational model, Candidate Key is used to identify tuples in a relation uniquely. i. Procedural language ii. Binary operator iii. Tuples iv. Unary operator

b) Improper database planning will result in loss of data interrelationship, repeatability of data, etc. c) The extended ER model allows us to create super-class and sub-class. d) Multiple database results from total systems approach where requirements of entire organisation and business functions are inter-related. A) a-T, b-F, c-T, d-F B) a-T, b-F, c-F, d-F C) a-T, b-F, c-F, d-T D) a-F, b-T, c-T, d-F 65. Match the following a) Create b) Not Null c) Predicates d) Outer join A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii ,d-iv D) a-i, b-iii, c-iv, d-ii 66. Match the following a) Master file b) Reference file c) Hashed file d) Sequential file i. Contains operational data ii. For intermediate results of operations iii. Contains Semi-permanent data iv. Permits random access on some fields i. constraint ii. DDL statement iii. Operator iv. Complex search criteria

A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii ,d-iv D) a-i, b-iii, c-iv, d-ii 67. State whether the following statements are true (T) or false (F) a) The database will consist of occurrences of the record types defined in the schema, which are linked as per the definition of the links. b) The data encryption language provides a set of commands for insert, delete, modify and retrieval of records and programs. c) The simplest mechanism for evaluating a relational algebra query tree is to do a post-order traversal of the tree, and evaluate each operator as it is visited. d) Cost Based Optimizers transform relational algebra query tree into the final tree by repeatedly applying a set of transformations on the initial tree which yield better results most of the time but not always. A) a-T b-F c-T d-F B) a-F, b-F c-F, d-T C) a-F b-T c-F, d-T D) a-T b-T, c-F d-F 68. State whether the following statements are True(T) or False(F) as related to the Characteristics of a computer provided information a. It must be accurate. The worst criticism of some information systems is that the information is accurate. b. It must be designed according to the needs of the user. c. It must be irrelevant to what you require at that time.

d. It must be timely. Often it must be given in response to a users request. A) a-T, b-F, c-T, d-F B) a-F, b-F, c-F, d-T C) a-F, b-T, c-F, d-T D) a-T, b-T, c-F, d-F 69. State whether the following statements are True (T) or False (F) as related to the Characteristics of a Database Management System. a. b. c. d. It represents complex relationships between data. Keeps a tight control of data manipulation. Enforces user-defined rules to ensure the integrity of table data. Has a decentralized data dictionary for the storage of information pertaining to data and its cancellation. A) a-T, b-F, c-T, d-F B) a-F, b-F, c-F, d-T C) a-F, b-T, c-F, d-T D) a-T, b-T, c-F, d-F 70. Match the following a) Non-normalized database b) Edgar F. Codd c) Rissanen's theorem d) Relational model A) a-iv, b-ii, c-i, d-iii i. Three normal forms ii. Vulnerable to data anomalies iii. Set theory. iv. Applicable on multi-valued dependencies.

B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii, d-iv D) a-i, b-iii, c-iv, d-ii 71. Match the following a) Database API b) ODBC c) SAC d) XML A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-ii, b-i, c-iii, d-iv D) a-i, b-iii, c-iv, d-ii 72. Match the following a) TDS b) SQLCMD c) d) Mobile Edition INI i. Query tool ii. Compact database iii. Protocol iv. File i. Application ii. Interface iii. Tool iv. Format

A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii, d-iv D) a-i, b-iii, c-iv, d-ii 73. State whether the following statements are True (T) or False (F).

a.

When creating a database, it is important to understand how it stores data so that you can

calculate and specify the amount of disk space to allocate for the database. b. If the system fails, Microsoft SQL Server automatic recovery process uses the transaction

log to roll forward all committed transactions and roll back any incomplete transactions. c. Use secondary database files to place data files on separate physical disks when disk

striping capabilities or RAID systems are used. d. Any database published for transactional replication, or published or subscribed to merge

replication can be dropped. A) a-T, b-F, c-T, d-F B) a-F, b-F, c-F, d-T C) a-F, b-T, c-F, d-T D) a-T, b-T, c-F, d-F 74. Match the following Logical operators with their meaning. a) AND b) BETWEEN c) OR d) EXISTS A) a-iv, b-ii, c-i, d-iii B) a-ii, b-i, c-iv, d-iii C) a-iii, b-i, c-ii, d-iv D) a-i, b-iii, c-iv, d-ii 75. State True (T) or False (F) i. View is a SQL query that is permanently stored in the database and assigned a name. i) TRUE if either Boolean expression is TRUE. ii) TRUE if the operand is within a range. iii) TRUE if a sub query contains any rows. iv) TRUE if both Boolean expressions are TRUE

ii. A trigger can also be interpreted as a special kind of stored procedure that is executed whenever an action, such as data modification, takes place. iii. A trigger cannot be used to ensure and enforce business rules and data integrity. iv. Static cursors detect all changes but consume fewer resources while scrolling, although they make the lightest use of tempdb. A) i- T, ii-T, iii- F, iv-F B) i- T, ii-F, iii- F, iv-T C) i- F, ii-T, iii- F, iv-T D) i- T, ii-T, iii- F, iv-T

Part - A Q. No. 1C 2B 3C 4B 5C 6C 7A 8A 9D 10 A 11 B 12 C 13 C 14 C 15 B 16 B 17 C 18 D 19 C 20 D Ans. Key Q. No. 21 B 22 C 23 C 24 C 25 A 26 B 27 D 28 D 29 A 30 D 31 B 32 B 33 D 34 B 35 C 36 B 37 A 38 D 39 A 40 B Ans. Key Q. No.

Part - B Ans. Key Q. No.

Part - C Ans. Key 61 A 62 D 63 D 64 D 65 B 66 D 67 A 68 C 69 A 70 B 71 C 72 C 73 D 74 A 75 A

41 A 42 B 43 A 44 C 45 C 46 B 47 C 48 A 49 C 50 A 51 D 52 B 53 B 54 B 55 A 56 B 57 A 58 B 59 C 60 C