You are on page 1of 13

Page 270

1. Which of the following is the advantage of installing database system?


a) Simple and easy in data backup
b) Difficult to share data between operations
c) Consistency cannot be maintained
d) Impact on program because of change in data format is large

2. Which of the following is the correct description about database models?


a) Database models are divided according to the form of managing data
b) There are only three models in database model
c) It’s not necessary to create database model before using database
d) None of the others

3. Which of the following is the correct description about database?


a) Database is not necessary for business operations in order to be streamlined
b) Business operations cannot be represented from the standpoint of information using
database
c) The data is saved in database for each program
d) None of the others

4. Which of the following is a benefit that can be expected by installing a database system?
a) Mitigation of code design activity
b) Reduction of duplicate data
c) High-speed data transfer
d) Dynamic access to data

5. Which of the following is an appropriate explanation of the relational database?


a) Data is viewed as a two-dimensional table to users. Relation between records is
associated by using the values of items in each record.
b) Relation between records is represented by using a one-to-many relationship of parent
and child.


 
c) Relation between records is represented with the network structure.
d) None of the others

6. When designing a database, which of the following is used for the purpose of organizing and
representing the relation of data?
a) E-R diagram
b) Arrow diagram
c) Gantt chart
d) Flowchart

7. Among the descriptions concerning database models, which of the following is an appropriate
explanation of the network model?
a) It consists of two or more data files located at different sites on a computer network.
b) It presents information in two-dimensional tables with rows and columns.
c) Its records are organized into a tree structure.
d) Its records can have multiple parent records and multiple child records

8. Which of the following is a database design that consists of multiple tables, with rows and
columns that are linked together through matching data stored in each table?
a) Hierarchical database
b) Network database
c) None of the others
d) Relational database

9. Which of the following is a purpose of using a database management system?


a) To enable users to access data even when there is no OS available
b) To eliminate the need for backups created in preparation for disk failures
c) To encrypt data to be transmitted over a network
d) To enable multiple users to share information while maintaining data integrity


 
10. Which of the following is the most appropriate method for restricting the content of database
to display in accordance with the needs of each user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data

11. Which of the following is the most appropriate method for displaying the content of database
to a limited extent in accordance with each user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data

12. The response time of an inventory management system that uses a relational database has
recently become slow. An investigation reveals that when the system was initially created,
there was no problem with response time, and after that, insertion and deletion of product data
was repeatedly performed on the database. Which of the following is the most effective way
to improve the response time of the database?
a) Upgrading the CPU of the database server
b) Extending the index area of the database
c) Defragmenting the database
d) Increasing the number of hard disks that store the database

13. On a standalone PC, sequential access to a database is taking longer to process than before.
When the number of records remains almost unchanged, which of the following can be
considered to be the cause?
a) Unnecessary records, such as already deleted data, are read.
b) Data has been added and deleted many times, so the record area in the database file is
fragmented.
c) Access takes longer as free space in the database has increased.


 
d) Because of hardware deterioration, data transmission between the hard disk and the
processor has become slower.

14. Which of the following is the process that is executed periodically to prevent reducing the
access efficiency of the database?
a) Recovery Process
b) Log Management
c) Reorganization
d) Access Control

15. Which of the following the correct description about the key points of table design?
a) No iterative data
b) The registered information can be saved only once in database’s table
c) The information obtained by calculation is not saved in a table
d) All of the others

Page 274
16. In a relational database, which of the following is the appropriate purpose for defining a foreign
key?
a) To prevent fragmentation in the record storage area due to the repeated deletion and
insertion of records
b) To provide a constraint to maintain referential consistency between the records of related
tables
c) To restore as many records as possible when they are damaged by failure, based on the
mutual relationship between tables
d) To speed up the searching and updating of related tables by storing them closer together

17. In an SQL statement, which of the following is a constraint that is specified with FOREIGN
KEY and REFERENCES?
a) Unique constraint
b) Not null constraint


 
c) Key constraint
d) Referential constraint

18. In a relational database table, which of the following is a column or a combination of columns
whose values are defined by the primary key of another table in order to maintain referential
integrity in the database?
a) Candidate key
b) Foreign key
c) Super key
d) Primary key

19. In database, foreign key is used for which of the following purpose.
a) Searching data from a different table
b) Distinguishing a particular row in the table from another row
c) High-speed search of data
d) All of the others

20. Which of the following is the correct description of defining index?


a) Creating the index makes the database search faster
b) Consistency can be maintained by creating the index
c) Creating the index is for distinguishing a particular row in the table from another row
d) None of the others

Page 275
21. Which of the following is about creating Mnemonic code in code design?
a) a method of assigning some kind of meaning by using character strings as code
b) a method of assigning numbers for each group after dividing into groups
c) a method of assigning consecutive numbers from the beginning
d) a method of assigning some kind of meaning to digits of the code


 
Page 276
22. Which of the following is an appropriate normalization form (NF) used in a relational database
in which every non-prime attribute must be dependent only on the primary key, and no non-
prime attribute is dependent on another non-prime attribute?
a) 1NF
b) 2NF
c) 3NF
d) None of the others

23. Which of the following is an appropriate method used to remove data redundancy in relational
database systems?
a) Entity-relationship
b) Functional dependency
c) Hierarchical
d) Normalization

24. Unnormalized form can be known by which of the following description.


a) There is duplication of data
b) Contradiction or inconsistency of data can easily occur
c) It is difficult to manage data correctly
d) All of the others

25. Which of the following is an appropriate effect obtained through the normalization of data in
a relational database?
a) Securing of data compatibility between different types of computers
b) Improvement of storage efficiency through data compression
c) Elimination of redundancy and inconsistency of data
d) Omission of backups that are necessary in preparation for the failure of devices storing data


 
26. Which of the following effect is obtained by normalizing the tables of a relational database?
a) The number of disk accesses for data update is reduced by compiling frequently used data
in the same table.
b) Data inconsistency due to data update is prevented by eliminating data duplication.
c) The usage efficiency of the main memory is improved by making the size of the tables
uniform.
d) Response time for queries is shortened by reducing the number of tables

Page 277 to 279


27. Which of the following is an appropriate description concerning the primary key of a relational
database?
a) NULL can be set only in one (1) record to a value of a field selected as a primary key.
b) Any values in a field selected as a primary key cannot be updated.
c) A field selected as a primary key cannot be referenced as the foreign key of another table.
d) A combination of multiple fields can be selected as a primary key.

28. Which of the following is an appropriate description concerning foreign keys in a relational
database?
a) A property held by the foreign key is called a unique constraint.
b) Duplicate values cannot be set in the fields that are set as foreign keys.
c) Multiple foreign keys can be defined in a single table.
d) Multiple fields cannot be collectively set as a single foreign key.

Page 280
29. There is a system for entering and managing orders from customers. Sequential order number
is printed on each order form in the order of arrival unless the form has any mistakes such as
missing information. Before the order form shown below is entered into the system, which of
the following should be checked so as not to enter duplicated order data?


 
a) Customer code
b) Product code
c) Order number
d) Order date

30. Which of the following is the relational operation that extracts only the rows of a product
whose price is 10 dollars or more, from the “Product” table of the relational database shown
below?

a) Join
b) Projection
c) Selection
d) Union

31. When the order records shown below are entered in the system where each order number must
be uniquely assigned, which of the following is the appropriate method for searching the order
master file containing all of the past order records, and for checking the uniqueness of the order
number?

a) Duplicate check
b) Format check
c) Limit check
d) Logical check


 
32. In a company which has its offices dispersed in several buildings, it is decided to construct a
relational database to manage the locations where PCs are installed. “Asset” table, “Room”
table, and “Building” table are created, and these tables are linked. When new data is entered,
data in the table to be referenced should exist beforehand. Which of the following is the
appropriate sequence of entering data into each table? Note that the underlined items in each
table indicate the primary keys or the foreign keys.

a) “Asset” table → “Building” table → “Room” table


b) “Building” table → “Room” table → “Asset” table
c) “Room” table → “Asset” table → “Building” table
d) “Room” table → “Building” table → “Asset” table

33. There are “Sales”, “Customer” and “Product” tables in a relational database. Among lists A
through C, which of the following contains all and only the lists that can be created from the
data in these tables? Here, a solid underlined part represents a primary key, and a dotted
underlined part represents a foreign key.

A The list of customers who bought more than a certain amount of money during a certain
period in the past


 
B The list of products that were out of stock in the previous month
C The ranking list for sales amount by product in the previous month
a) A, B
b) A, B, C
c) A, C
d) B, C

34. The “Purchase_list” table in a relational database manages the purchases of products. This
table should be normalized and divided into a “Purchase” table and a “Product” table. Which
of the following is the most appropriate field that should be contained in common in the two
divided tables? Here, each purchase includes only one product, and can be uniquely identified
by Purchase_number. Also, each product can be uniquely identified by Product_number.

a) Purchase_number
b) Payment_method
c) Product_number
d) Product_name

35. The “Sales Details” table and the “Products” table are managed in a relational database. What
is the total number of notebooks sold?

a) 40

10 
 
b) 80
c) 120
d) 200

36. In the operation of a relational database, which of the following is an appropriate explanation
of projection?
a) From two or more sets of tables, the sets that match conditions are combined together to
create a new table.
b) Only specific columns are extracted from a table.
c) The query result of a table and the query result of another table are combined together and
set in one table.
d) The rows that match specific conditions are extracted from a table.

Page 281,282
37. In a system environment where several users have access to a database simultaneously, a new
user tries to view a data record while another user is updating the same record. In order to
assure data integrity in such circumstances, which of the following is an appropriate control
method that should be used in the DBMS?
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating process
d) Canceling the updating process to permit the new user to view the last record

38. In a DBMS, when multiple transaction programs update the same database simultaneously,
which of the following is a technology that is used to prevent logical contradictions?
a) Exclusive control
b) Integrity constraint
c) Normalization
d) Reorganization

11 
 
39. Which of the following is an appropriate description of the lock operation that is used for the
concurrency control of a transaction?
a) For a resource on which a shared lock is acquired, the acquisition of a new shared lock by
another transaction is permitted.
b) For a resource on which a shared lock is acquired, the acquisition of a new exclusive lock
by another transaction is permitted.
c) For a resource on which an exclusive lock is acquired, the acquisition of a new shared lock
by another transaction is permitted.
d) For a resource on which an exclusive lock is acquired, the acquisition of a new exclusive
lock by another transaction is permitted.

40. Which of the following is an appropriate description of locks?


a) For a resource on which transaction T1 has acquired an exclusive lock, transaction T2 can
acquire an exclusive, but not a shared, lock.
b) For a resource on which transaction T1 has acquired an exclusive lock, transaction T2 can
acquire either an exclusive or a shared lock.
c) For a resource on which transaction T1 has acquired a shared lock, transaction T2 can
acquire a shared, but not an exclusive, lock.
d) For a resource on which transaction T1 has acquired a shared lock, transaction T2 can
acquire either a shared or an exclusive lock.

Page 283
41. Which of the following is correct about deadlock?
a) It is not possible to completely stop the occurrence of deadlock.
b) it is possible to reduce the instances of its occurrence by limiting the scope of locking
c) it is possible to reduce the instances of its occurrence by determining the sequence of data
access.
d) All of the others

Page 284
42. Which of the following is an appropriate description of a rollback in transaction processing?

12 
 
a) When a transaction attempts to update shared data, it prohibits another transaction from
updating that data.
b) When a transaction has been successfully processed, it commits an update to the database.
c) When a transaction has not been successfully processed for some reason, it reverts the
database to the state that was present before the transaction was started.
d) It combines multiple tables into one (1) table by using mutually related columns as keys.

43. Which of the following is a file where values before and after an update of the database are
written and saved as the update history of the database?
a) Backup file
b) Checkpoint file
c) Dump file
d) Log file

44. Which of the following can change the deadlock state of the transaction back to the normal
state?
a) Commit
b) Drop
c) Rollback
d) Roll Forward

13 
 

You might also like