Dbms 1
Dbms 1
Dbms 1
STUDYBOOSTERS
ELEVATE YOUR EXAM GAME
Short Notes
Unit 1
P a g e 1 | 45
Unit 2
P a g e 2 | 45
Unit 3
1. Data Integrity Rules: Data integrity rules are used to ensure that data is accurate and
consistent. They include constraints such as primary key, foreign key, unique, and check
constraints.
2. Functional Dependency: Functional dependency is a relationship between two attributes in a
table, where one attribute determines the value of another attribute. It is used to ensure that
data is consistent and accurate.
3. Need for Normalization: Normalization is the process of organizing data in a database to
reduce redundancy and improve data consistency. It is needed to ensure data accuracy and
prevent data anomalies.
P a g e 3 | 45
Unit 4
P a g e 4 | 45
In summary, database transaction processing involves managing transactions to ensure that they are
executed correctly and reliably. Desirable properties of transactions include atomicity, consistency,
isolation, and durability. Schedules can be serial or concurrent, and serializability ensures that
concurrent schedules are equivalent to serial schedules. Concurrency control and recoverability are
important considerations in transaction processing.
Unit 5
P a g e 5 | 45
Unit 6
1. File Organizations and Types: File organization refers to the way data is stored in
a database file. Different types of file organizations include sequential, indexed,
and hashed. Sequential files store data in a sequential order, while indexed files
use an index to locate data. Hashed files use a hash function to determine where
data is stored.
2. Indexing and Types: Indexing is the process of creating an index to improve data
retrieval performance. Different types of indexing include B-tree indexing, bitmap
indexing, and hash indexing. B-tree indexing is commonly used in relational
databases, while bitmap indexing is used for data warehousing. Hash indexing is
used in hashed file organization.
3. Hashing and Techniques: Hashing is a technique used to map data to a location
in a file using a hash function. Different techniques for hashing include linear
probing, quadratic probing, and chaining. Linear probing and quadratic probing
involve searching for an empty slot in the file, while chaining involves storing
data in a linked list.
4. Introduction to Big Data: Big data refers to large and complex data sets that
cannot be processed using traditional data processing methods. Big data is
characterized by volume, variety, and velocity. Big data technologies, such as
Hadoop and Spark, are used to process and analyze big data.
5. NoSQL Systems: NoSQL systems are non-relational databases that are used to
store and manage unstructured or semi-structured data. NoSQL systems are
characterized by their scalability, high availability, and flexibility. Different types of
NoSQL systems include document-based, key-value, and column-family
databases.
P a g e 7 | 45
P a g e 8 | 45
a) A virtual table that is created from the data in one or more tables
b) A physical table that is created by the database system
c) A table that is used to store temporary data
d) None of the above
P a g e 10 | 45
P a g e 11 | 45
P a g e 12 | 45
P a g e 13 | 45
8. What is SQL?
a) A programming language used to manipulate data in a relational database
b) A query language used to retrieve and manipulate data in a relational database
c) A language used to design the structure of a relational database
d) None of the above
P a g e 14 | 45
P a g e 16 | 45
P a g e 17 | 45
2. Which of the following defines the relationship between two columns in a table?
a. Data integrity rule
b. Functional dependency
c. Normalization
d. Join dependency
5. Which normal form is achieved when a table is free from repeating groups?
a. First normal form
b. Second normal form
c. Third normal form
d. Boyce-Codd normal form
P a g e 18 | 45
11. Which of the following normal forms is based on the concept of a join dependency?
a. Third normal form
b. Boyce-Codd normal form
c. Fourth normal form
d. Fifth normal form
13. Which of the following is a requirement for a table to be in fifth normal form?
a. It must be in fourth normal form.
b. It must have a composite primary key.
P a g e 19 | 45
15. Which of the following is a reason for using a normalized database design?
a. To reduce data redundancy.
b. To improve query performance.
c. To ensure data integrity.
d. All of the above.
16. Which of the following is a requirement for a table to be in first normal form?
a. It must have a primary key.
b. It must not have repeating groups.
c. It must not have null values.
d. All of the above.
19. Which of the following normal forms is based on the concept of a functional
dependency?
a. First normal form
b. Second normal form
c. Third normal form
d. Fourth normal form
20. Which of the following is a reason for using a denormalized database design?
a. To improve query performance.
b. To reduce data redundancy.
c. To ensure data integrity.
d. All of the above.
P a g e 20 | 45
22. Which of the following normal forms is based on the concept of a partial dependency?
a. First normal form
b. Second normal form
c. Third normal form
d. Fourth normal form
25. Which of the following normal forms is based on the concept of a multivalued
dependency?
a. First normal form
b. Second normal form
c. Third normal form
d. Fourth normal form
29. Which of the following is a requirement for a table to be in second normal form?
a. It must have a composite primary key.
P a g e 21 | 45
30. Which of the following is a requirement for a table to be in third normal form?
a. It must be in second normal form.
b. It must have no partial dependencies.
c. It must have no transitive dependencies.
d. All of the above.
P a g e 22 | 45
P a g e 24 | 45
P a g e 25 | 45
P a g e 26 | 45
P a g e 27 | 45
P a g e 28 | 45
P a g e 29 | 45
P a g e 30 | 45
7. Which of the following flow control statements is used to iterate over a collection of
elements in programming?
a) if-else
b) switch-case
c) for loop
d) while loop
P a g e 31 | 45
P a g e 32 | 45
16. Which of the following flow control statements is used to execute a block of code
repeatedly in programming?
a) if-else statement
b) switch-case statement
c) for loop
d) while loop
P a g e 33 | 45
20. Which of the following is a commonly used flow control statement in programming?
a) CREATE statement
b) UPDATE statement
c) if-else statement
d) ALTER statement
P a g e 34 | 45
25. Which of the following flow control statements is used to exit a loop in
programming?
a) if-else statement
b) switch-case statement
c) break statement
d) continue statement
27. Which of the following is a commonly used flow control statement in programming?
a) ALTER statement
b) SELECT statement
c) DELETE statement
d) for loop
P a g e 35 | 45
33. Which of the following flow control statements is used to execute one of several
blocks of code in programming?
a) if-else statement
b) switch-case statement
c) for loop
d) while loop
35. Which of the following is not a commonly used programming construct in database
programming?
P a g e 36 | 45
38. Which of the following flow control statements is used to continue to the next
iteration of a loop in programming?
a) if-else statement
b) switch-case statement
c) break statement
d) continue statement
39. Which of the following is not a commonly used flow control statement in
programming?
a) if-else statement
b) switch-case statement
c) CREATE statement
d) while loop
P a g e 37 | 45
P a g e 39 | 45
P a g e 40 | 45
P a g e 41 | 45
P a g e 42 | 45
31. What are the different types of file organizations used in databases?
a) Sequential, indexed sequential, random
b) Sequential, indexed, hash
c) Sequential, random, binary
d) Sequential, indexed sequential, binary
P a g e 43 | 45
P a g e 44 | 45
P a g e 45 | 45