Ticker

6/recent/ticker-posts

header

AKU(Bihar Engineering University) dbms 5th semester previous paper solution 2020

 AKU(Bihar Engineering University) dbms 5th semester previous paper solution 2020

Q1. The way a particular application views the data from the data base that the application uses is a :

A. module

B. relational model

C. schema

D. subschema

E. None of the above

Answer: Option D


q2  .  A relational database developer refers to a record as

A) a relationB) an attribute
C) a criteriaD) a tuple


Answer:   D) a tuple

Q3.  

    

Key to represent relationship between tables is called

A. foreign key

B. primary key

C. Secondary kay

D. none of the above

Answer: Option A(Foreign key)



Q4. It is better to use files than a DBMS when there are _____.
a. sringent real-time requrements
b. multiple users wish to access the data
c. complex relationships among data 
d. all of them

Correct answer is b--> Multiple users wish to access the data

Q5.  Which of the following are five built-in functions provided by SQL?
   a. SUM, AVG, MIN, MAX, NAME 
   b.  COUNT, SUM, AVG, MAX, MIN
   c. SUM, AVG, MULT, DIV, MIN
   d.  SUM, AVG, MIN, MAX, MULT

Correct answer is b

Q6.  A B-tree of order 4 and of height 3 will have a maximum of _______ keys.
  •                       a)
    255
  •                b)
    63
  • c)127
  • d)
    188
Correct answer is option 'A'. Can you explain this answer?
A B-tree of order m of height h will have the maximum number of keys when all nodes are completely filled. So, the B-tree will have n = (mh+1 – 1) keys in this situation. So, required number of maximum keys = 43+1 – 1 = 256 – 1 = 255.
   

Q 7.  
           Consider the following action:                       Transaction…..
          Commit;
          Rollback;
         What does Rollback do?
A. Undoes the transactions before commit
 B. Redoes the transactions before commit
 C. Clears all transactions
 D. No action


Correct Answer is D> No action





Q.

Which of the following is used to get back all the transactions back after rollback?

    A.commit
    B.rollback
    C.flashback
    D.redo
Answer» C. flashback





Q.

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.


A.cross-site scoring scripting
B.cross-site request forgery
C.two-factor authentication
D.cross-site scripting
 
     Correct answer is B.

Q9. _______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. 
    (a) OpenID 
    (b) Single-site system 
    (c) Security Assertion Markup Language (SAML) 
    (d) Virtual Private Database (VPD)

   Correct answer is d. Virtual Private Database(vpd)





एक टिप्पणी भेजें

0 टिप्पणियाँ