Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Databases:
Recent questions tagged databases
1
votes
1
answer
2341
UGC NET CSE | December 2015 | Part 2 | Question: 14
Match the following database terms to their functions $:$ ... $\text{(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)}$
Match the following database terms to their functions $:$$\begin{array} {clcl} & \textbf{List – I} && \textbf{List – II} \\ \text{(a)} & \text{Normalization} & \te...
Sankaranarayanan P.N
2.1k
views
Sankaranarayanan P.N
asked
Aug 2, 2016
Databases
ugcnetcse-dec2015-paper2
databases
match-the-following
+
–
5
votes
1
answer
2342
UGC NET CSE | Junet 2015 | Part 3 | Question: 11
The relation schemas $R_1$ and $R_2$ form a Lossless join decomposition of $R$ if and only if $R_1 \cap R_2 \twoheadrightarrow (R_1-R_2)$ $R_1 \rightarrow R_2$ $R_1 \cap R_2 \twoheadrightarrow (R_2-R_1)$ $R_2 \rightarrow R_1 \cap R_2$ $\text{i and ii}$ happen $\text{i and iv}$ happen $\text{i and iii}$ happen $\text{ii and iii}$ happen
The relation schemas $R_1$ and $R_2$ form a Lossless join decomposition of $R$ if and only if$R_1 \cap R_2 \twoheadrightarrow (R_1-R_2)$$R_1 \rightarrow R_2$$R_1 \cap R_2...
go_editor
4.2k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper3
databases
decomposition
database-normalization
+
–
4
votes
2
answers
2343
UGC NET CSE | Junet 2015 | Part 3 | Question: 10
The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because Non_key attribute V_name is dependent on V_no which is part of composite key Non_key attribute V_name is dependent on Qty_sup Key attribute Qty_sup is dependent on primary key unit_price Key attribute V_ord_no is dependent on primary key unit_price
The RelationVendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF becauseNon_key attribute V_name is dependent on V_no which is part of composite keyNon_ke...
go_editor
3.4k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper3
databases
database-normalization
+
–
2
votes
1
answer
2344
UGC NET CSE | Junet 2015 | Part 3 | Question: 8
The STUDENT information in a university stored in the relation STUDENT (Name, SEX, Marks, DEPT_Name). COnsider the following SQL Query: SELECT DEPT_Name from STUDENT where SEX='M' group by DEPT_Name having avg(Marks)> ... the university The average marks of Male students is more than the average marks of male students in the university
The STUDENT information in a university stored in the relation STUDENT (Name, SEX, Marks, DEPT_Name). COnsider the following SQL Query:SELECT DEPT_Name from STUDENT where...
go_editor
3.1k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper3
sql
databases
+
–
6
votes
3
answers
2345
UGC NET CSE | Junet 2015 | Part 2 | Question: 49
Which of the following statements is false about weak entity set? Weak entities can be deleted automatically when their strong entity is deleted Weak entity set avoids the data duplication and consequent possible inconsistencies caused by ... a weak entity set are not partitioned according to their relationship with tuples with a strong entity set
Which of the following statements is false about weak entity set?Weak entities can be deleted automatically when their strong entity is deletedWeak entity set avoids the ...
go_editor
5.7k
views
go_editor
asked
Jul 31, 2016
Databases
ugcnetcse-june2015-paper2
er-diagram
databases
+
–
2
votes
2
answers
2346
UGC NET CSE | Junet 2015 | Part 2 | Question: 20
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as: Neighbour Set Strong Entity Set Owner Entity Set Weak Set
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as:Neighbour SetStrong...
go_editor
15.6k
views
go_editor
asked
Jul 30, 2016
Databases
ugcnetcse-june2015-paper2
databases
weak-entity
+
–
1
votes
1
answer
2347
UGC NET CSE | Junet 2015 | Part 2 | Question: 19
Database application were directly built on top of file system to overcome the following drawbacks of using file-systems: Data redundancy and inconsistency Difficulty in accessing data Data isolation Integrity problems $\text{i}$ $\text{i and iv}$ $\text{i, ii, and iii}$ $\text{i, ii, iii, and iv}$
Database application were directly built on top of file system to overcome the following drawbacks of using file-systems:Data redundancy and inconsistencyDifficulty in ac...
go_editor
4.7k
views
go_editor
asked
Jul 30, 2016
Databases
ugcnetcse-june2015-paper2
databases
file-system
+
–
1
votes
1
answer
2348
UGC NET CSE | Junet 2015 | Part 2 | Question: 18
Drop Table cannot be used to drop a Table referenced by _______ constraint Primary key Sub key Super key Foreign key a a, b and c d a and d
Drop Table cannot be used to drop a Table referenced by _______ constraintPrimary keySub keySuper keyForeign keyaa, b and cda and d
go_editor
2.6k
views
go_editor
asked
Jul 30, 2016
Databases
ugcnetcse-june2015-paper2
databases
sql
+
–
2
votes
1
answer
2349
UGC NET CSE | Junet 2015 | Part 2 | Question: 16
An Assertion is predicate expressing a condition we wish database to always satisfy. The correct syntax for Assertion is: CREATE ASSERTION 'ASSERTION Name' CHECK 'Predicate' CREATE ASSERTION 'ASSERTION Name' CREATE ASSERTION, CHECK 'Predicate' SELECT ASSERTION
An Assertion is predicate expressing a condition we wish database to always satisfy. The correct syntax for Assertion is:CREATE ASSERTION 'ASSERTION Name' CHECK 'Predicat...
go_editor
3.0k
views
go_editor
asked
Jul 30, 2016
Databases
ugcnetcse-june2015-paper2
databases
sql
+
–
3
votes
1
answer
2350
UGC NET CSE | December 2013 | Part 3 | Question: 60
Match the following $:$ ... $\text{a-i, b-iii, c-iv, d-ii}$ $\text{a-ii, b-iv, c-i, d-iii}$
Match the following $:$$\begin{array} {clcl} & \textbf{List – I} && \textbf{List – II} \\ \text{a.} & \text{Secondary Index} & \text{i.} & \text{Functional Depende...
go_editor
2.3k
views
go_editor
asked
Jul 29, 2016
Databases
ugcnetcse-dec2013-paper3
databases
+
–
3
votes
1
answer
2351
UGC NET CSE | December 2013 | Part 3 | Question: 59
Armstrong $(1974)$ ... $\text{a-ii, b-i, c-iii, d-iv}$ $\text{a-iv, b-iii, c-i, d-ii}$
Armstrong $(1974)$ proposed systematic approach to derive functional dependencies. Match the following w.r.t functional dependencies:$\begin{array}{} & \textbf{List-I} ...
go_editor
1.8k
views
go_editor
asked
Jul 29, 2016
Databases
ugcnetcse-dec2013-paper3
databases
database-normalization
+
–
3
votes
1
answer
2352
UGC NET CSE | December 2013 | Part 3 | Question: 58
Consider the table student (stuid, name, course, marks). Which one of the following two queries is correct to find the highest marks student in course 5? Q.1. Select S.stuid from student S where not exist (select * from student e where e course =' ... distinct marks from student S where s.course =5) Q.1 Q.2 Both Q.1 and Q.2 Neither Q.1 nor Q.2
Consider the table student (stuid, name, course, marks). Which one of the following two queries is correct to find the highest marks student in course 5?Q.1. Select S.stu...
go_editor
2.9k
views
go_editor
asked
Jul 29, 2016
Databases
ugcnetcse-dec2013-paper3
databases
sql
+
–
5
votes
2
answers
2353
UGC NET CSE | December 2013 | Part 3 | Question: 56
Consider the following schemas: Branch=(Branch-name, Assets, Branch-city) Customer = (Customer-name, Bank name, Customer-city) Borrow = (Branch-name, Loan number, Customer account-number) Deposit = (Branch-name, Account-number, Customer-name, ... $\sigma_{customer-name} (\pi_{balance > 10000^{(Borrow)}}$)
Consider the following schemas:Branch=(Branch-name, Assets, Branch-city)Customer = (Customer-name, Bank name, Customer-city)Borrow = (Branch-name, Loan number, Customer a...
go_editor
6.8k
views
go_editor
asked
Jul 29, 2016
Databases
ugcnetcse-dec2013-paper3
databases
relational-algebra
+
–
4
votes
1
answer
2354
UGC NET CSE | December 2013 | Part 3 | Question: 55
Consider the following ER diagram: The minimum number of tables required to represent $M, N, P, R_1, R_2$ is 2 3 4 5
Consider the following ER diagram:The minimum number of tables required to represent $M, N, P, R_1, R_2$ is2345
go_editor
2.5k
views
go_editor
asked
Jul 29, 2016
Databases
ugcnetcse-dec2013-paper3
databases
er-diagram
+
–
2
votes
2
answers
2355
UGC NET CSE | December 2014 | Part 3 | Question: 38
How to express that some person keeps animals as pets?
How to express that some person keeps animals as pets?
makhdoom ghaya
3.3k
views
makhdoom ghaya
asked
Jul 28, 2016
Databases
ugcnetcse-dec2014-paper3
databases
er-diagram
+
–
6
votes
2
answers
2356
UGC NET CSE | December 2014 | Part 3 | Question: 12
Which of the following is false ? Every binary relation is never be in $BCNF$. Every $BCNF$ relation is in $3NF$. $1 NF, 2 NF, 3 NF$ and $BCNF$ are based on functional dependencies. Multivalued Dependency $(MVD)$ is a special case of Join Dependency $(JD)$
Which of the following is false ? Every binary relation is never be in $BCNF$. Every $BCNF$ relation is in $3NF$. $1 NF, 2 NF, 3 NF$ and $BCNF$ are based on functional de...
makhdoom ghaya
5.3k
views
makhdoom ghaya
asked
Jul 25, 2016
Databases
ugcnetcse-dec2014-paper3
databases
database-normalization
+
–
4
votes
2
answers
2357
UGC NET CSE | December 2014 | Part 3 | Question: 10
Let $R = ABCDE$ is a relational scheme with functional dependency set $F = \left\{A \rightarrow B, B \rightarrow C, AC \rightarrow D\right\}$. The attribute closures of $A$ and $E$ are $ABCD, \phi$ $ABCD, E$ $\Phi, \phi$ $ABC, E$
Let $R = ABCDE$ is a relational scheme with functional dependency set $F = \left\{A \rightarrow B, B \rightarrow C, AC \rightarrow D\right\}$. The attribute closures of $...
makhdoom ghaya
2.7k
views
makhdoom ghaya
asked
Jul 25, 2016
Databases
ugcnetcse-dec2014-paper3
databases
database-normalization
+
–
2
votes
1
answer
2358
UGC NET CSE | December 2013 | Part 2 | Question: 15
Data Integrity control uses Upper and lower limits on numeric data Passwords to prohibit unauthorized access to files Data dictionary to keep the data Data dictionary to find last access data
Data Integrity control usesUpper and lower limits on numeric dataPasswords to prohibit unauthorized access to filesData dictionary to keep the dataData dictionary to find...
go_editor
3.9k
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-dec2013-paper2
databases
data-integrity
+
–
1
votes
1
answer
2359
UGC NET CSE | December 2013 | Part 2 | Question: 14
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. Entity Constraints Rules Keys
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual ...
go_editor
2.9k
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-dec2013-paper2
databases
cardinality-ratio
+
–
3
votes
1
answer
2360
UGC NET CSE | December 2013 | Part 2 | Question: 13
An E-R model includes An ER diagram portraying entity types. Attributes for each entity type. Relationships among entity types. Semantic integrity constrains that reflects the business rules about data not captured in the ER diagram I, II, III and IV I and IV I, II and IV I and III
An E-R model includesAn ER diagram portraying entity types.Attributes for each entity type.Relationships among entity types.Semantic integrity constrains that reflects th...
go_editor
2.6k
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-dec2013-paper2
databases
er-diagram
+
–
3
votes
2
answers
2361
UGC NET CSE | December 2013 | Part 2 | Question: 12
GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to 28-th record 27-th record 3-rd record 4-th record
GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to28-th record27-th record3-rd record4-th record
go_editor
2.8k
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-dec2013-paper2
databases
+
–
2
votes
1
answer
2362
UGC NET CSE | December 2014 | Part 3 | Question: 09
_________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information. Write-ahead log Check-pointing Log buffer Thomas
_________ rules used to limit the volume of log information that has to be handled and processed in the event of system failure involving the loss of volatile information...
makhdoom ghaya
3.2k
views
makhdoom ghaya
asked
Jul 24, 2016
Databases
ugcnetcse-dec2014-paper3
databases
transaction-and-concurrency
recovery-from-failure
+
–
4
votes
1
answer
2363
UGC NET CSE | December 2014 | Part 3 | Question: 08
Which of the following is correct ? I. Two phase locking is an optimistic protocol. II. Two phase locking is pessimistic protocol III. Time stamping is an optimistic protocol. IV. Time stamping is pessimistic protocol. $I$ and $III$ $II$ and $IV$ $I$ and $IV$ $II$ and $III$
Which of the following is correct ?I. Two phase locking is an optimistic protocol.II. Two phase locking is pessimistic protocolIII. Time stamping is an optimistic protoco...
makhdoom ghaya
4.0k
views
makhdoom ghaya
asked
Jul 24, 2016
Databases
ugcnetcse-dec2014-paper3
databases
transaction-and-concurrency
+
–
1
votes
2
answers
2364
UGC NET CSE | September 2013 | Part 3 | Question: 49
Match the following: a. i. One to One Relationship b. ii. Relationship c. iii. Many to Many Relationship d. iv. Many to One Relationship a-iii, b-iv, c-ii, d-i a-iv, b-iii, c-ii, d-i a-ii, b-iii, c-iv, d-i a-iii, b-iv, c-i, d-ii
Match the following:a. i. One to One Relationshipb. ii. Relationshipc. iii. Many to Many Relationshipd. iv. Many to One Relationship a-iii, b-iv, c-ii, d-ia-iv, b-iii, c...
go_editor
996
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-sep2013-paper3
databases
er-diagram
match-the-following
easy
+
–
2
votes
1
answer
2365
UGC NET CSE | September 2013 | Part 3 | Question: 48
Match the following $:$ ... $\text{(a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)}$
Match the following $:$$\begin{array}{} \text{(a)} & \text{Create} & \text{(i)} & \text{The ER model} \\ \text{(b)} & \text{Select} & \text{(ii)} & \text{Relationship m...
go_editor
2.2k
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-sep2013-paper3
databases
er-diagram
match-the-following
easy
+
–
2
votes
0
answers
2366
UGC NET CSE | September 2013 | Part 3 | Question: 47
Consider the following schemas: Branch_Schema = (branch_name, assets, city) Customer_Schema = (customer_name, street, city) Deposit_Schema = (branch_name, account_number, customer_name, balance) Borrow_Schema = (branch_name, loan_number, customer_name, amount) Which of the ... { t $\mid$ [?] $\in$ borrow(t(customer_name)[?] s[amount] > 12000}
Consider the following schemas:Branch_Schema = (branch_name, assets, city)Customer_Schema = (customer_name, street, city)Deposit_Schema = (branch_name, account_number, cu...
go_editor
1.0k
views
go_editor
asked
Jul 24, 2016
Databases
ugcnetcse-sep2013-paper3
databases
relational-calculus
+
–
1
votes
1
answer
2367
GateCseGroup
Here i was able to figure out all the attributes are prime attribute, so it will be in 3NF, How should i divide it for BCNF?
Here i was able to figure out all the attributes are prime attribute, so it will be in 3NF, How should i divide it for BCNF?
stblue
235
views
stblue
asked
Jul 23, 2016
Databases
databases
+
–
3
votes
2
answers
2368
UGC NET CSE | September 2013 | Part 3 | Question: 25
The SQL expression Select distinct T.branch_name from branch T, branch S where T.assets>S.assets and S.branch_city = Mumbai finds the names of All branches that have greater assets than some branch located in Mumbai All ... in Mumbai The branch that has greatest asset in Mumbai Any branch that has greater assets than any branch in Mumbai
The SQL expressionSelect distinct T.branch_name from branch T, branch S where T.assets>S.assets and S.branch_city = “Mumbai”finds the names ofAll branches that have g...
go_editor
4.4k
views
go_editor
asked
Jul 23, 2016
Databases
ugcnetcse-sep2013-paper3
databases
sql
+
–
2
votes
1
answer
2369
UGC NET CSE | September 2013 | Part 3 | Question: 24
____ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation. Logical Integrity Referential Integrity Domain Integrity Data Integrity
____ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.Logical I...
go_editor
5.0k
views
go_editor
asked
Jul 23, 2016
Databases
ugcnetcse-sep2013-paper3
databases
referential-integrity
+
–
1
votes
2
answers
2370
UGC NET CSE | September 2013 | Part 2 | Question: 43
Thoma’s-write rule is Two phase locking protocol Timestamp ordering protocol One phase locking protocol Sliding window protocol
Thoma’s-write rule isTwo phase locking protocolTimestamp ordering protocolOne phase locking protocolSliding window protocol
go_editor
1.5k
views
go_editor
asked
Jul 21, 2016
Databases
ugcnetsep2013ii
databases
transaction-and-concurrency
+
–
Page:
« prev
1
...
74
75
76
77
78
79
80
81
82
83
84
...
97
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register