91. | How to express that some person keeps animals as pets ?
![]() |
a. | A |
b. | B |
c. | C |
d. | D |
View Answer Report Discuss Too Difficult! |
Answer: (a).A
|
92. | Manager's salary details are hidden from the employee. This is called as |
a. | Conceptual level data hiding |
b. | Physical level data hiding |
c. | External level data hiding |
d. | Local level data hiding |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).External level data hiding
|
93. | Which of the following statements is false ? |
a. | Any relation with two attributes is in BCNF. |
b. | A relation in which every key has only one attribute is in 2NF. |
c. | A prime attribute can be transitively dependent on a key in 3NF relation. |
d. | A prime attribute can be transitively dependent on a key in BCNF relation. |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).A prime attribute can be transitively dependent on a key in BCNF relation.
|
94. | A clustering index is created when ................ |
a. | primary key is declared and ordered |
b. | no key ordered |
c. | foreign key ordered |
d. | there is no key and no order |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).primary key is declared and ordered
|
95. | Let R ={A, B, C, D, E, F} be a relation schema with the following dependencies C→F,E→A,EC→D,A→B
Which of the following is a key for R ? |
a. | CD |
b. | EC |
c. | AE |
d. | AC |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).EC
|
96. | Match the following:
List-I List-II a. DDL i. LOCK TABLE b. DML ii. COMMIT c. TCL iii. Natural Difference d. BINARY Operation iv. REVOKE Codes: a b c d |
a. | ii i iii iv |
b. | i ii iv iii |
c. | iii ii i iv |
d. | iv i ii iii |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).iv i ii iii
|
97. | The student marks should not be greater than 100. This is |
a. | Integrity constraint |
b. | Referential constraint |
c. | Over-defined constraint |
d. | Feasible constraint |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Integrity constraint
|
98. | Consider the following ER diagram. The minimum number of tables required to represent M, N, P, R1, R2 is
![]() |
a. | 2 |
b. | 3 |
c. | 4 |
d. | 5 |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).2
|
99. | Usage of Preemption and Transaction Rollback prevents .................. |
a. | Unauthorised usage of data file |
b. | Deadlock situation |
c. | Data manipulation |
d. | File pre-emption |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Deadlock situation
|
100. | Views are useful for ................. unwanted information, and for collecting together information from more than one relation into a single view. |
a. | Hiding |
b. | Deleting |
c. | Highlighting |
d. | All of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Hiding
|