Post No 40 Cloud Computing

Cloud Computing 

1. _________ computing refers to applications and services that run on a distributed network using virtualized resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel


Answer: b
Explanation: Cloud Computing applications are accessed by common Internet protocols and networking standards.
2. Point out the wrong statement :
a) The massive scale of cloud computing systems was enabled by the popularization of the Internet
b) Soft computing represents a real paradigm shift in the way in which systems are deployed
c) Cloud computing makes the long-held dream of utility computing possible with a pay-as-you-go, infinitely scalable, universally available system
d) All of the mentioned


Answer: b
Explanation: Cloud Computing is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted from the user.
3. ________ as a utility is a dream that dates from the beginning of the computing industry itself.
a) Model
b) Computing
c) Software
d) All of the mentioned


Answer: b
Explanation: Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility.
4. Which of the following is essential concept related to Cloud ?
a) Reliability
b) Productivity
c) Abstraction
d) All of the mentioned


Answer: c
Explanation: Cloud computing abstracts the details of system implementation from users and developers.
5. Point out the wrong statement :
a) All applications benefit from deployment in the cloud
b) With cloud computing, you can start very small and become big very fast
c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary
d) None of the mentioned


Answer: a
Explanation: Issues with latency, transaction control, and in particular security and regulatory compliance are of particular concern.
6. Which of the following cloud concept is related to pooling and sharing of resources ?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned


Answer: c
Explanation: Applications run on physical systems that aren’t specified, data is stored in locations that are unknown, administration of systems is outsourced to others, and access by users is ubiquitous.
7. ________ has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned


Answer: a
Explanation: The Internet offers abstraction, runs using the same set of protocols and standards, and uses the same applications and operating systems.
8. Which of the following can be identified as cloud ?
a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned


Answer: c
Explanation: When an intranet becomes large enough that a diagram no longer wishes to differentiate between individual physical systems, the intranet too becomes identified as a cloud.
9. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.
a) real
b) virtual
c) cloud
d) none of the mentioned


Answer: b
Explanation: Cloud Computing is a new model for provisioning resources, for staging applications, and for platform-independent user access to services.
10. Which of the following is Cloud Platform by Amazon ?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned


Answer: b
Explanation: One of the most successful cloud-based businesses is Amazon Web Services, which is an Infrastructure as a Service offering that lets you rent virtual computers on Amazon’s own infrastructure.

Post Id 39

1. The normal form which satisfies multivalued dependencies and which is in BCNF is
a) 4 NF
b) 3 NF
c) 2 NF
d) All of the mentioned


Answer: a
Explanation: Fourth normal form is more restrictive than BCNF.
2. Which of the following is a tuple-generating dependencies ?
a) Functional dependency
b) Equality-generating dependencies
c) Multivalued dependencies
d) Non-functional dependency


Answer: c
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
3. The main task carried out in the __________ is to remove repeating attributes to separate tables.
a) First Normal Form
b) Second Normal Form
c) Third Normal Form
d) Fourth Normal Form


Answer: a
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
4. Which of the normal form is based on multivalued dependencies ?
a) First
b) Second
c) Third
d) Fourth


Answer: d
Explanation: Multivalued dependencies, do not rule out the existence of certain tuples. Instead, they require that other tuples of a certain form be present in the relation.
5. Which forms has a relation that possesses data about an individual entity?
a) 2NF
b) 3NF
c) 4NF
d) 5NF


Answer: c
Explanation: A Table is in 4NF if and only if, for every one of its non-trivial multivalued dependencies X \twoheadrightarrow Y, X is a superkey—that is, X is either a candidate key or a superset thereof.
6. If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from one of the following sources.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) Both A many-to-many relationship set and A multivalued attribute of an entity set


Answer: d
Explanation: For a many-to-many relationship set each related entity set has its own schema and there is an additional schema for the relationship set. For a multivalued attribute, a separate schema is created consisting of that attribute and the primary key of the entity set.
7. Which of the following has each related entity set has its own schema and there is an additional schema for the relationship set?
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) None of the mentioned


Answer: a
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.
8. In which of the following , a separate schema is created consisting of that attribute and the primary key of the entity set.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) None of the mentioned


Answer: b
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.
9. Fifth Normal form is concerned with
a) Functional dependency
b) Multivalued dependency
c) Join dependency
d) Domain-key


Answer: c
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.
10. In 2NF
a) No functional dependencies (FDs) exist
b) No multivalued dependencies (MVDs) exist
c) No partial FDs exist
d) No partial MVDs exist


Answer: c
Explanation: If a multivalued dependency holds and is not implied by the corresponding functional dependency, it usually arises from this source.

Post Id 38

1. DML is provided for
A) Description of logical structure of database

B) Addition of new structure in the database system.



C) Manipulation & processing of database

D) Definition of physical structure of database system

2.’AS’ clause is used in SQL for

A) Selection operation

B) Rename Operation

C) Join operation

D) Projection Operation

3. Count function in SQL returns the number of

A) values

B) distinct values

C) groups

D) columns

4. The statement in SQL which allows to change the definition of a table is

A) Alter

B) Update

C) Cteate

D) Select

5. Which of the following is correct.

A) A SQL query automatically eliminates duplicates

B) SQL permits attribute names to be repeated in the same relation

C) A SQL query will not work if there are no indexes on the relations

D) None of the above

6. Which of the following operation is used if we are interested in only certain columns of a table?

A) PROJECTION

B) SELECTION

C) UNION

D) JOIN

7. Which of the following is a legal expression in SQL?

A) SELECT NULL FROM EMPLOYEE;

B) SELECT NAME FROM EMPLOYEE;

C) SELECT NAME FROM EMPLOYEE WHERE SALARY=NULL;

D) None of the above

8. Which of the following is a valid SQL type?

A) CHARACTER

B) NUMERIC

C) FLOAT

D) All of the above

9. Which command is used to select distinct subject (SUB) from the table (BOOK)?

A) SELECT ALL FROM BOOK

B) SELECT DISTINCT SUB FROM BOOK

C) SELECT SUB FROM BOOK

D) All of the above

10. In SQL, which of the following is not a data definition language commands?

A) RENAME

B) REVOKE

C) GRANT

D) UPDATE


Answers:

1.
C) Manipulation & processing of database

2.
B) Rename Operation

3.
A) values


4.
A) Alter

5.

D) None of the above

6.
A) PROJECTION

7. 
B) SELECT NAME FROM EMPLOYEE;

8.
D) All of the above

9.
B) SELECT DISTINCT SUB FROM BOOK

10.
D) UPDATE 

Post Id 37

1. DML is provided for
A) Description of logical structure of database

B) Addition of new structure in the database system.



C) Manipulation & processing of database

D) Definition of physical structure of database system

2.’AS’ clause is used in SQL for

A) Selection operation

B) Rename Operation

C) Join operation

D) Projection Operation

3. Count function in SQL returns the number of

A) values

B) distinct values

C) groups

D) columns

4. The statement in SQL which allows to change the definition of a table is

A) Alter

B) Update

C) Cteate

D) Select

5. Which of the following is correct.

A) A SQL query automatically eliminates duplicates

B) SQL permits attribute names to be repeated in the same relation

C) A SQL query will not work if there are no indexes on the relations

D) None of the above

6. Which of the following operation is used if we are interested in only certain columns of a table?

A) PROJECTION

B) SELECTION

C) UNION

D) JOIN

7. Which of the following is a legal expression in SQL?

A) SELECT NULL FROM EMPLOYEE;

B) SELECT NAME FROM EMPLOYEE;

C) SELECT NAME FROM EMPLOYEE WHERE SALARY=NULL;

D) None of the above

8. Which of the following is a valid SQL type?

A) CHARACTER

B) NUMERIC

C) FLOAT

D) All of the above

9. Which command is used to select distinct subject (SUB) from the table (BOOK)?

A) SELECT ALL FROM BOOK

B) SELECT DISTINCT SUB FROM BOOK

C) SELECT SUB FROM BOOK

D) All of the above

10. In SQL, which of the following is not a data definition language commands?

A) RENAME

B) REVOKE

C) GRANT

D) UPDATE


Answers:

1.
C) Manipulation & processing of database

2.
B) Rename Operation

3.
A) values


4.
A) Alter

5.

D) None of the above

6.
A) PROJECTION

7.
B) SELECT NAME FROM EMPLOYEE;

8.
D) All of the above

9.
B) SELECT DISTINCT SUB FROM BOOK

10.
D) UPDATE 

Post No 36

1. A ………………… specifies the actions needed to remove the drawbacks in the current design of database.
A) 1 NF

B) 2 NF

C) 3 NF

D) Normal form

2. A relation is in ……………………… if an attribute of a composite key is dependent on an attribute of other composite key.

A) 2NF

B) 3NF

C) BCNF

D) 1NF

3. Fifth Normal form is concerned with

A) Functional dependency

B) Multivalued dependency

C) Join dependency

D) Domain key

4. A table is in the ………………….. if only candidate keys are the determinants.

A) functional dependency

B) transitive dependency

C) 4 NF

D) BCNF

5. In 2NF

A) No functional dependencies exist.

B) No multivalued dependencies exist.

C) No partial functional dependencies exist

D) No partial multivalued dependencies exist.


6. The normal form that is not necessarily dependency preserving is
A) 2NF

B) 3NF

C) BCNF

D) 4NF

7. The …………….. is related to the concept of multi-valued dependency.

A) fourth normal form

B) fifth normal form

C) boyce codd normal form

D) third normal form

8. Which normal form is considered adequate for normal relational database design?

A) 2NF

B) 5NF

C) 4NF

D) 3NF

9. Dependency preservation is not guaranteed in

A) BCNF

B) 3NF

C) 4NF

D) DKNF

10. A relation is ………………. if every field contains only atomic values that is, no lists or sets.

A) 1 NF

B) 2 NF

C) 3 NF

D) BCNF

Answers:
1.D) Normal form

2.B) 3NF

3.C) Join dependency

4.D) BCNF

5.C) No partial functional dependencies exist

6.A) 2NF

7.A) fourth normal form

8.D) 3NF

9.A) BCNF

10.A) 1 NF

post no 35 Algorithms for Decomposition


Database Questions and Answers – Algorithms for Decomposition

1. A relation is in ____________ if an attribute of a composite key is dependent on an attribute of other composite key.
a) 2NF
b) 3NF
c) BCNF
d) 1NF

Answer: b
Explanation: A relation is in 3 NF if an attribute of a composite key is dependent on an attribute of other composite key. (If an attribute of a composite key is dependent on an attribute of other composite key then the relation is not in BCNF, hence it has to be decomposed.).
2. What are the desirable properties of a decomposition
a) Partition constraint
b) Dependency preservation
c) Redundancy
d) Security

Answer: b
Explanation: Lossless join and dependency preserving are the two goals of the decomposition.
3. R (A,B,C,D) is a relation. Which of the following does not have a lossless join dependency preserving BCNF decomposition.
a) A-> B, B-> CD
b) A->B, B->C, C->D
c) AB->C, C->AD
d) A->BCD

Answer: d
Explanation: This relation gives a relation without any loss in the values.
Class (course id, title, dept name, credits, sec id, semester, YEAR, building, room NUMBER, capacity, TIME slot id)
The SET OF functional dependencies that we require TO hold ON class are:
course id->title, dept name, credits
building, room number->capacity
course id, sec id, semester, year->building, room NUMBER, TIME slot id
A candidate KEY FOR this schema IS {course id, sec id, semester, YEAR}
4. Consider the above conditions. Which of the following relation holds ?
a) Course id-> title, dept name, credits
b) Title-> dept name, credits
c) Dept name-> credits
d) Cannot be determined

Answer: a
Explanation: Here course id is not a superkey. Thus, class is not in BCNF.
5. The algorithm that takes a set of dependencies and adds one schema at a time, instead of decomposing the initial schema repeatedly is
a) BCNF algorithm
b) 2NF algorithm
c) 3NF synthesis algorithm
d) 1NF algorithm

Answer: c
Explanation: The result is not uniquely defined, since a set of functional dependencies can have more than one canonical cover, and, further, in some cases, the result of the algorithm depends on the order in which it considers the dependencies in Fc .
6. The functional dependency can be tested easily on the materialized view, using the constraints ____________.
a) Primary key
b) Null
c) Unique
d) Both Null and Unique

Answer: d
Explanation: Primary key contains both unique and not null constraints .
7. Which normal form is considered adequate for normal relational database design?
a) 2NF
b) 5NF
c) 4NF
d) 3NF

Answer: d
Explanation: A relational database table is often described as “normalized” if it is in the Third Normal Form because most of the 3NF tables are free of insertion, update, and deletion anomalies .
8. Relation R with an associated set of functional dependencies, F, is decomposed into BCNF. The redundancy (arising out of functional dependencies) in the resulting set of relations is
a) Zero
b) More than zero but less than that of an equivalent 3NF decomposition
c) Proportional to the size of F+
d) Indeterminate

Answer: b
Explanation: Redundancy in BCNF is low when compared to 3NF. For more details on BCNF .
9. A table has fields F1, F2, F3, F4, and F5, with the following functional dependencies:

F1->F3
F2->F4
(F1,F2)->F5
in terms of normalization, this table is in
a) 1NF
b) 2NF
c) 3NF
d) None of the mentioned

Answer: a
Explanation: Since the primary key is not given we have to derive the primary key of the table. Using the closure set of attributes we get the primary key as (F1,F2). From functional dependencies, “F1->F3, F2->F4”, we can see that there is partial functional dependency therefore it is not in 1NF. Hence the table is in 1NF.

10. Let R(A,B,C,D,E,P,G) be a relational schema in which the following FDs are known to hold:

AB->CD
DE->P
C->E
P->C
B->G
The relation schema R is
a) in BCNF
b) in 3NF, but not in BCNF
c) in 2NF, but not in 3NF
d) not in 2NF


Answer: d
Explanation: From the closure set of attributes we can see that the key for the relation is AB. The FD B->G is a partial dependency, hence it is not in 2NF.

Post No 34 Functional-Dependency

Database Questions and Answers – Functional-Dependency

1. We can use the following three rules to find logically implied functional dependencies. This collection of rules is calleda) Axiomsb) Armstrong’s axiomsc) Armstrongd) Closure
Answer: bExplanation: By applying these rules repeatedly, we can find all of F+, given F.2. Which of the following is not a Armstrong’s Axiom ?a) Reflexivity ruleb) Transitivity rulec) Pseudotransitivity ruled) Augmentation rule

Answer: cExplanation: It is possible to use Armstrong’s axioms to prove that Pseudotransitivity rule is sound.3. The relation employee(ID,name,street,Credit,street,city,salary) is decomposed into
employee1 (ID, name)employee2 (name, street, city, salary)This type of decomposition is calleda) Lossless decompositionb) Lossless-join decompositionc) Both a and bd) None of the mentioned

Answer: dExplanation: Lossy-join decomposition is the decomposition used here .4. Inst_dept (ID, name, salary, dept name, building, budget) is decomposed into
instructor (ID, name, dept name, salary)department (dept name, building, budget)This comes undera) Lossy-join decompositionb) Lossy decompositionc) Lossless-join decompositiond) Both a and b

Answer: dExplanation: Lossy-join decomposition is the decomposition used here .5. There are two functional dependencies with the same set of attributes on the left side of the arrow:A->BCA->BThis can be combined asa) A->BCb) A->Bc) B->Cd) None of the mentioned

Answer: aExplanation: This can be computed as the canonical cover .6. Consider a relation R(A,B,C,D,E) with the following functional dependencies:
ABC -> DE andD -> ABThe number of superkeys of R is:a) 2b) 7c) 10d) 12

Answer: cExplanation: A superkey is a combination of columns that uniquely identifies any row within a relational database management system (RDBMS) table.7. Suppose we wish to find the ID’s of the employees that are managed by people who are managed by the employee with ID 123. Here are two possible queries:
I.SELECT ee.empID  FROM Emps ee, Emps ff  WHERE ee.mgrID = ff.empID AND ff.mgrID = 123;II.SELECT empID  FROM Emps   WHERE mgrID IN  (SELECT empID FROM Emps WHERE mgrID = 123);Which, if any, of the two queries above will correctly (in SQL2) get the desired set of employee ID’s?a) Both I and IIb) I onlyc) II onlyd) Neither I nor I

Answer: aExplanation: The query can be satisfied by any of the two options.8. Suppose relation R(A,B) currently has tuples {(1,2), (1,3), (3,4)} and relation S(B,C) currently has {(2,5), (4,6), (7,8)}. Then the number of tuples in the result of the SQL query:
<i>SELECT * FROM R NATURAL OUTER JOIN S; </i>IS:a) 2b) 4c) 6d) None of the mentioned

Answer: aExplanation: The SQL NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with same name of associate tables will appear once only.9. Suppose now that R(A,B) and S(A,B) are two relations with r and s tuples, respectively (again, not necessarily distinct). If m is the number of (not necessarily distinct) tuples in the result of the SQL query:
R intersect S;
Then which of the following is the most restrictive, correct condition on the value of m?
(a) m = min(r,s)(b) 0 <= m <= r + s(c) min(r,s) <= m <= max(r,s)(d) 0 <= m <= min(r,s)

Answer: dExplanation: The value of m must lie between the min value of r and s and 0.10. Suppose relation R(A,B,C,D,E) has the following functional dependencies:
A -> BB -> CBC -> AA -> DE -> AD -> EWhich of the following is not a key?a) Ab) Ec) B,Cd) D

Answer: cExplanation: Here the keys are not formed by B and C.