DBMS Question Bank
DBMS Question Bank
AUTONOMOUS INSTITUTION
R22(2023-24) – B. TECH II Year I Sem
2. Which of the following is the primary function of the conceptual level in a DBMS?
A) To define how data is stored on disk
B) To define the overall logical structure of the database
C) To create user-specific views of the database
D) To provide security and access control
3. Which of the following statements is true about file systems and DBMS?
A) File systems offer better data consistency than DBMS.
B) File systems are generally preferred over DBMS for managing large datasets.
C) DBMS supports data sharing and concurrency control, while file systems do not.
D) File systems offer better security features than DBMS
5. In an ER diagram, an attribute that uniquely identifies each entity in an entity set is called a:
A) Primary key
B) Foreign key
C) Unique key
D) Relationship key
8. An entity set that contains a set of attributes used to uniquely identify each entity in the set is said
to have:
A) Referential integrity
B) Key constraint
C) Domain constraint
D) Partial dependency
9. In database design, the process of mapping entities and relationships from a real-world scenario to
a conceptual schema is known as:
A) Logical modeling
B) Physical modeling
C) Data independence
D) Conceptual modeling
1. Outline key milestones in database history, the problems associated with file systems, and the
improvements that DBMS introduced.
2. Compare and Contrast file Systems with database system?
3. Describe the three levels of data abstraction in a DBMS and explain how they contribute to data
independence.
4. Define data independence in the context of a DBMS and discuss its significance. How do logical and
physical data independence differ?
5. Discuss about different types of Data models?
6. Explain different types of database users and write the functions of DBA?
7. Discuss about the Conceptual Design with the ER-Model?
8. Outline the steps from identifying entities and relationships to defining attributes and constraints in
an ER model.
9. Differentiate between relationships and relationships sets in an ER model and discuss how they are
represented in an ER diagram.
10.Discuss additional features of the ER-Models?
1. Explain the concept of a DBMS and analyze the limitations of file systems. Discuss how a DBMS
effectively addresses these challenges.
2. Explain the architecture of a DBMS in detail. Describe the role and interactions of each component,
including the storage layer, query processor, and transaction manager.
3. Illustrate how ER diagrams are used to represent database structure. Discuss the various symbols and
conventions used to represent entities, relationships, attributes, and constraints.
4. Describe the various components of an ER model and explain in detail how they are represented?"
5. Examine the additional features of the ER model, such as generalization, specialization, weak entities,
and aggregation. Discuss how these features enhance the flexibility of the ER model in database design.
UNIT-II
1-Mark Questions (20 Questions)
5. Which operation in SQL is used to permanently remove a table or view from a database?
A) DROP
B) DELETE
C) REMOVE
D) ALTER
6. Which relational algebra operation is used to combine tuples from two relations?
A) Union
B) Intersection
C) Projection
D) Selection
1. What does the following SQL query do? SELECT * FROM Students WHERE Age > 21;
A) Retrieves all columns from the Students table where Age is less than 21.
B) Retrieves all columns from the Students table where Age is greater than 21.
C) Retrieves only the Age column from the Students table.
D) Retrieves all students who are exactly 21 years old.
2. Which of the following SQL commands is used to combine results from two queries while excluding
the duplicate rows?
A) INTERSECT
B) UNION
C) EXCEPT
D) UNION ALL
3. In SQL, which of the following statements is used to return common rows between two queries?
A) UNION
B) INTERSECT
C) EXCEPT
D) JOIN
5. Which SQL operator is used to remove rows from the result of a query that appear in another
query's result?
A) UNION
B) INTERSECT
C) EXCEPT
D) SELECT
6. Which of the following SQL functions is used to count the number of rows returned by a query?
A) SUM()
B) COUNT()
C) AVG()
D) MAX()
E)
7. In the context of database normalization, which of the following is the main issue with a table that
has redundant data?
A) Loss of integrity
B) High storage requirement
C) Inefficient queries
D) All of the above
8. Which of the following normal forms addresses the problem of partial dependency in a relational
schema?
A) First Normal Form (1NF)
B) Second Normal Form (2NF)
C) Third Normal Form (3NF)
D) Boyce-Codd Normal Form (BCNF)
11. Which SQL operator combines the result sets of two queries and removes duplicate rows?
12. What does the INTERSECT operator in SQL do?
13. How does the EXCEPT operator in SQL differ from the UNION operator?
14. What is the purpose of the COUNT() function in SQL?
15. In SQL, what is the result of a comparison between a value and NULL?
16. Define a foreign key constraint in SQL.
17. What is the role of a trigger in an SQL database?
18. Which normal form resolves the issue of partial dependency in relational schemas?
19. Explain the concept of lossless join decomposition in database design.
20. Which normal form is designed to eliminate transitive dependencies in a relational schema?
1. Explain the different types of SQL operators, including UNION, INTERSECT, and EXCEPT, with
examples.
2. What are nested queries in SQL? Explain how they are used with an example.
3. Discuss the role of aggregation operators in SQL and provide examples of their usage.
4. Explain the significance of handling NULL values in SQL. How do you query for NULL values in a
database?
5. Define complex integrity constraints in SQL. Provide examples of primary key, foreign key, and
check constraints.
6. What are triggers in SQL? Discuss how they contribute to maintaining data integrity in an active
database.
7. Discuss the problems caused by redundancy in databases and how schema refinement addresses
these issues.
8. Explain the concepts of First, Second, and Third Normal Forms (1NF, 2NF, and 3NF) with examples.
9. What is Boyce-Codd Normal Form (BCNF)? How does it differ from Third Normal Form (3NF)?
10. What is Lossless Join Decomposition? Explain its significance with an example.
1. Discuss schema refinement in databases, focusing on redundancy issues and how functional
dependencies and normal forms address them.
2. Compare 1NF, 2NF, and 3NF with examples to explain how they handle redundancy and dependency
issues.
3. Explain BCNF and how it differs from 3NF. Provide an example of a relation that needs
decomposition to BCNF.
4. What are SQL triggers? Discuss their role in enforcing business rules and data integrity with
examples.
5. Explain the usage of UNION, INTERSECT, and EXCEPT in SQL. Provide examples and highlight
their differences.
UNIT-IV
1-Mark Questions (20 Questions)
2. What property of a transaction ensures that either all operations are completed, or none
are?
A) Durability
B) Isolation
C) Atomicity
D) Consistency
4. What ensures that a transaction’s changes are permanent in the database after it commits?
A) Serializability
B) Isolation
C) Durability
D) Recoverability
5. In lock-based protocols, which type of lock allows both read and write operations?
A) Shared Lock
B) Exclusive Lock
C) Read Lock
D) Write Lock
9. In multiple granularities locking, which lock mode is used to lock a node explicitly for both read
and write operations?
A) Shared Lock (S)
B) Exclusive Lock (X)
C) Intention-Exclusive Lock (IX)
D) Intention-Shared Lock (IS)
10. Which of the following is true about validation-based protocols?
A) They use locks to prevent conflicts.
B) They validate transactions before they are executed.
C) They validate transactions at the end of their execution.
D) They rely on timestamps for conflict resolution.
5. Which index structure uses a hash function to map keys to data locations?
A) B+ Trees
B) ISAM
C) Hash-based indexing
D) Clustered index
6. What is the main advantage of B+ Trees over Binary Search Trees for indexing?
A) Supports dynamic indexing
B) Reduces redundancy
C) Requires less memory
D) Simplifies transaction processing
9. Which file organization is best for searching data based on a range of values?
A) Heap file organization
B) Hash-based indexing
C) Sequential file organization
D) Indexed file organization
10. What does the term "fan-out" in a B+ Tree refers to?
A) The number of child pointers per node
B) The height of the tree
C) The number of leaf nodes
D) The size of each node