cs403 mega file-spring-12api.ning.com/files/.../cs403finaltermmcqsbydr.tariqhanif.pdf · using a...

29
Page 1 Final Term FINALTERM EXAMINATION Spring 2012 CS403- Database Management Systems (Session - 1) 1. The property of ____ enables an entity subtype to hold the properties of its super type. Null Constraint Integrity Inheritance Uniqueness 2. Which of the following most certainly implies the need for an entire table to implement? A binary relationship 40 A ternary relationship A recursive relationship An identifying relationship 3. “A shared collection of logically related data” is known as Database 10 File Processing System Program and Data Interdependence DBMS 4. On magnetic media, data is stored in ______________

Upload: hoanghuong

Post on 20-Mar-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1

Final Term

FINALTERM EXAMINATION

Spring 2012

CS403- Database Management Systems (Session - 1)

1. The property of ____ enables an entity subtype to hold the properties of its super type.

Null Constraint

Integrity

Inheritance

Uniqueness

2. Which of the following most certainly implies the need for an entire table to implement?

A binary relationship 40

A ternary relationship

A recursive relationship

An identifying relationship

3. “A shared collection of logically related data” is known as

Database 10

File Processing System

Program and Data Interdependence

DBMS

4. On magnetic media, data is stored in ______________

Page 2

Final Term

Text

Images

Binary format 40

Tables

5. Which of the following is one of the purposes of using DDL commands?

inserting records into databases

updating records into databases

manipulating databases

creating and destroying databases 196

6. _________ is used to create and destroy database and database objects

ERD

DCL

DDL 196

DML

7. Which of the following is used to add or drop columns in an existing table?

ALTER 206

HAVING

SELECT

THEN

8. The ____ constraint specifies whether each entity supertype occurrence must also be a member of at its

one subtype.

Total completeness 103

Specialization

Uniqueness

Inheritance

9. Which of the following is a correct way to implement many-to-many cardinality in a binary relationship

while designing tables?

Page 3

Final Term

Using a third table with the keys from both the tables forming the composite primary key of third

table. 143

By splitting the data into five tables with primary key and foreign key relationships.

By splitting the data into five tables with primary key and foreign key relationships.

By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key).

10. Which of the following is INCORRECT regarding De-normalization?

It is the process of attempting optimization of Database.

It is a technique to move from lower to higher normal forms of database modeling. 187

In this process, it is required to add redundant data.

It enhances the performance of DB.

11. Hash Partitioning is applied on _______.

Rows

Columns

Algorthim 189

Attributes

12. _____________ is used to sort the result set in ascending or descending order

Group by Clause

From Clause

Where Clause

Order by Clause 220

13. Which of the following SQL Function does not use input parameter?

LOWER

UPPER

LEN

CURRENT_TIME 221

14. “Select * from STUDENT, DEPARTMENT” is an example of

Cartesian Join 225

Page 4

Final Term

Inner Join

Outer Join

Full Outer Join

15. Which of the following is not a DDL Command?

Create table

Alter table

Insert into 202 insert into a sql command

Create database

16. Which of the following commands is used to drop the table named STUDENT?

DROP TABLE STUDENT 208

TABLE STUDENT DROP

TABLE DROP STUDENT

STUDENT TABLE DROP

17. Which of the following is the correct syntax for SELECT statement?

SELECT column_name(s) FROM table_name 211

SELECT FROM table_name column_name(s)

FROM SELECT column_name(s) table_name

FROM table_name SELECT column_name(s)

18. Which of the following specifies the tables, which we access in the query?

SELECT Clause

FROM Clause 212

WHERE Clause

ORDER BY Clause

19. Procedure of finding the size of Cartesian Product is _____

The number of columns in the first table multiplied by the number of rows in the second table.

Page 5

Final Term

The number of rows in the first table multiplied by the number of columns in the first table.

The number of rows in the first table multiplied by the number of rows in the second

table. 224

The number of columns in the first table multiplied by the number of columns in the second table

20. Which of the following is not a type of user interface?

Graphical User Interface (GUI)

Forms

Database Schema 240

Text based Interface

21. ________ is an example of volatile memory.

RAM

ROM

FLASH MEMORY 256

CPU

22.Which of the following is the correct way of removing the Index called branchNoIndex?

DROP INDEX branchNoIndex; 207

APPEND INDEX branchNoIndex;

REMOVE INDEX branchNoIndex;

DEL INDEX branchNoIndex;

23. Which of the following is incorrect regarding Indexes?

It can not be created on composite attributes.

Index can be defined even when there is no data in the table.

It support Range selections.

It can be created using ‘Create Index’ statement 273

24. Which of the following is NOT a part of Deadlock Resolution?

Choose a victim

Page 6

Final Term

A message is passed to the victim and depending on the system the transaction may or may not be started

again automatically. Picking a list of all previously completed transactions and undoing all the updates. Page 323

Rollback `victim' transaction and restart it. 25. A Table can have ___________ clustered index (es).

Only one 275 Only two More than two Only three 26. Which of the following is true about the views?

View can only show few attributes of a table View can not be used for retrieving data View can not be used as security mechanisms We can customize the order of the table fields through Views page280

27. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the

columns?

CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284

SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT

SELECT * FROM STUDENT TO ST_LIST 28. __________ must identify a record in the table, uniquely.

Key 260

SQL Statement Index Hash Algorithm 29. ___________ manages mass storage devices like hard disks and tape drive.

Index

Operating System 261

RAID Sequential File Access 30. A perfect hash function map a key to distinct location having search time _________.

O(1) 266

O(n) O(n+1) O(n-1) 31. Which of the following is not the property of Transaction?

Atomicity Consistency

Page 7

Final Term

Redundancy 291 Durability 32. Dead Lock can be prevented by giving each transaction a ___________.

Name

Clustered Index Cartesian Join

Priority 299

33. While recovering data, which of the following files does a Recovery Manager examines at first?

Clustered Index

Log file 303 Data dictionary Metadata 34. Which of the following serves as reference point in the log file?

Constraints

Relations

Check points 304 Relationships 35. -------------- occurs when multiple users want to update same object at the same time.

Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308

36. After execution of “commit” statement, ____________ is updated first.

Database Buffer 303

Clustered-Index Non-Clustered Index Application Program 37. It is not necessary for any super type entity to have its entire instance set to be associated with any of the

subtype entity, is called as ______________.

Partial Completeness 103 Disjoint Overlap

Complete Overlap

Total Completeness 38. R X θ S, If R and S are relations and θ is a ______.

Table Name

Page 8

Final Term

Attributes

Primary Key

Condition 158 39. If D --> E, F then D --> E and D --> F.

This inference rules is called as _______.

Transitivity Additive

Projectivity 166 Augmentation 40. Which of the following constraints enforces Entity Integrity?

PRIMARY KEY FOREIGN KEY CHECK

NOT NULL 134

FINALTERM EXAMINATION

Spring 2012

CS403- Database Management Systems (Session - 1)

1. Which of the following most certainly implies the need for an entire table to implement?

A binary relationship 140

A ternary relationship

A recursive relationship

An identifying relationship

2. “Database System” is the combination of_________________.

Database and DBMS

Database and Data

Data and Information

Operating System and Database

3. End User directly interact with _______________

External Schema 42

Page 9

Final Term

Conceptual Schema

Internal Schema

Core of Database Architecture

4. _____________ is also known as Community View of Database.

External Schema

Conceptual Schema 37

User views

Internal Schema

5. On magnetic media, data is stored in ______________

Text

Images

Binary format 40

Tables

6. _____________ contains data about all the Databases in DBMS.

Data Dictionary page64.

Schema

Cross Reference Matrix

Conceptual Data Model

7.In which of the following situations, Clustering is suitable:

Frequently updating

Relatively static page192.

Frequently deletion

Relatively dynamic

8. SQL is an _____________ standard computer language

ANSI 193

Page 10

Final Term

General

Cold fusion

Interactive

9. Which of the following statements creates a database named COMPANY.

CREATE DATABASE COMPANY 202

CREATE DB company

ADD DATABASE company

CREATE company DATABASE

10. ___________ is used to read, write, and remove the data from a database

SQL 194.

ERD

ANSI

Data Model

11. Which of the following is used to add or drop columns in an existing table?

ALTER 206

HAVING

SELECT

THEN

12. Which of the following SQL keywords is not used with DDL statements?

Table 234

Update

Create

Create

13. Which of the following statements are DML commands?

ALTER

Page 11

Final Term

CREATE

INSERT

GRANT page 200.

14. The ____ constraint specifies whether each entity supertype occurrence must also be a member of at its

one subtype.

Total completeness 103

Specialization

Uniqueness

Inheritance

15. Which of the following is not a DDL Command?

Create table

Alter table

Insert into 202 insert into a SQL command

Create database

16. Which of the following commands is used to drop the table named STUDENT?

DROP TABLE STUDENT 208

TABLE STUDENT DROP

TABLE DROP STUDENT

STUDENT TABLE DROP

17.If a relation contains single Key, the relation is automatically in _______.

1NF

2NF169

3NF

4NF

18.Which of the following is not a type of user interface?

Graphical User Interface (GUI)

Page 12

Final Term

Forms

Database Schema 240

Text based Interface

19. Which of the following is not related with Browser based forms development?

HTML

ASP

Front Page

Dev C 241

20. Which of the following is the activity, which is not performed during the development of application

programs?

Data input programs

Editing

Display

Data Collection 238

21. Which of the following is not correct about input forms?

Provide an easy, effective, efficient way to enter data into a table

Especially useful when the person entering the data is not familiar with the inner workings

Provide different controls to add data into the tables

One input forms can populate one table at a time 246

22. _______ is a control that users click to perform an action.

Input form 246

Report

Button

Text box

23. ________ is disadvantage of chaining technique to handle the collisions.

Unlimited Number of elements

Page 13

Final Term

Fast re-hashing

Overhead of multiple linked lists 269

Maximum number of elements must be known

24. What is the impact of setting multiple indexes for the same key?

Multiple indexes for the same key can not be set

It increases efficiency 263

It decreases efficiency

It will increase complexity as the access time will be increased

25. Which of the following is the correct way of removing the Index called branchNoIndex?

DROP INDEX branchNoIndex; 207

APPEND INDEX branchNoIndex;

REMOVE INDEX branchNoIndex;

DEL INDEX branchNoIndex;

26. Which of the following is NOT a part of Deadlock Resolution?

Choose a victim

A message is passed to the victim and depending on the system the transaction may or may not be started

again automatically.

Picking a list of all previously completed transactions and undoing all the

updates. 323

Rollback `victim' transaction and restart it.

27. Which of the following is true regarding Index?

Index can only be created for a single table in database 262

Index can maximum be created for two tables in database

Index can only be created, when a database has at least 3 tables

Index can be created for every table in the database

28. Which of the following is not a type of VIEWS?

Materialized View

Page 14

Final Term

Simple Views

Complex View

Cross Reference View 283

29. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the

columns?

CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284

SELECT * FROM STUDENT VIEW ST_LIST

CREATE ST_LIST VIEW AS STUDENT

SELECT * FROM STUDENT TO ST_LIST

30. __________ must identify a record in the table, uniquely.

Hash Algorithm

Key 260

SQL Statement

Index

31. ___________ manages mass storage devices like hard disks and tape drive.

Index

Operating System 261

RAID

Sequential File Access

32.A file with ______ records, with sequential access file, an average of _______ key comparisons are

necessary.

10000, 5500

10000, 5000 262

10000, 4500

10000, 500

33. A perfect hash function map a key to distinct location having search time _________.

O(1) 266

Page 15

Final Term

O(n)

O(n+1)

O(n-1)

34. Dead Lock can be prevented by giving each transaction a ___________.

Name

Clustered Index

Cartesian Join

Priority 299

35. Wait-for graph is maintained by __________

Lock manager 300

Index Manager

View Manager

Constraint Manager

36. Which of the following serves as reference point in the log file?

Constraints

Relations

Check points 304

Relationships

37. -------------- occurs when multiple users want to update same object at the same time.

Uncommitted Update Problem

Inconsistent Analysis Problem

Lost of Joins Problem

Lost Update Problem 308

38. After execution of “commit” statement, ____________ is updated first.

Database Buffer 303

Page 16

Final Term

Clustered-Index

Non-Clustered Index

Application Program

39. _______________ are called participants, when enrolled in a relationship.

Attributes

Relations

Entities 86

Keys

40. Which of the following constraints enforces Entity Integrity?

PRIMARY KEY

FOREIGN KEY

CHECK

NOT NULL 134

FINALTERM EXAMINATION

Spring 2012

CS403- Database Management Systems (Session - 2)

1. Which of the following is true about NOT NULL constraint?

Enforce domain integrity.

Limit the values that can be placed in a column.

Prevents any actions that would destroy links between tables with the corresponding data values. 135

Enforces the uniqueness of the values in a set of columns.

2. Which of the following constraints enforces Referential Integrity?

FOREIGN KEY page134

CHECK

PRIMARY KEY

UNIQUE

3. An Entity is

defined when the database is physically constructed in DBMS

a specific type such as an integer, text, date, logical etc

defined by DBMS

basic building block of the E-R data model page71

4. _____________ is also known as Community View of Database.

External Schema

Conceptual Schema page37

Page 17

Final Term

User views

Internal Schema

5. On magnetic media, data is stored in ______________

Text

Images

Binary format

Tables

6. SQL is an _____________ standard computer language

ANSI

General

Cold fusion

Interactive

7. Which of the following is one of the purposes of using DDL commands?

Inserting records into databases

Updating records into databases

Manipulating databases

creating and destroying databases page 196

8. _________ is used to create and destroy database and database objects

DDL page 196

DML

DCL

ERD

9.___________ is used to read, write, and remove the data from a database

SQL page194

ERD

Page 18

Final Term

ANSI

Data Model

10. Which of the following gives all the fields from employee table named as EMP?

select * from EMP page224

select emp* from EMP

select emp_id where EMP

select * where EMP

11. Which of the following statements are Data Definition Language commands?

GRANT

GRANT

INSERT 196

UPDATE

12. The ER- data model is an example of:

Physical database design

Logical database design

Relational database design

Conceptual database design page 70

13. Consider two sets A and B. A contains 3 elements and B contains 4. How many elements do their

Cartesian product contains?

12 129

9

16

7

14. Identify the factor which enforces a relation in 3NF?

Relation is in 2nd NF and every non-key attribute is fully functionally dependent on primary key.

Relation is in 2nd NF and every non-key attribute is transitive dependent on super key.

The domain of attribute may include multiple values.

Relation is in 2nd NF and every non-key attribute is non-transitively dependent on primary key. 171

Page 19

Final Term

15. In 1st Normal Form, we remove _____

Repeating Groups page 167

Transitive Dependency

Functional Dependency

Multi-valued Dependency

16. Which of the following is INCORRECT regarding De-normalization?

It is the process of attempting optimization of Database.

It is a technique to move from lower to higher normal forms of database modeling page 187

In this process, it is required to add redundant data.

It enhances the performance of DB.

17. “Select * from STUDENT, DEPARTMENT” is an example of.

Cartesian Join page 224

Inner Join

Outer Join

Full Outer Join

18. Which of the following is not a DDL Command?

Create table

Alter table

Insert into

Create database page201

19. Which of the following commands is used to TRUNCATE the table named STUDENT?

TRUNCATE TABLE STUDENT page 207

TABLE TRUNCATE STUDENT

TABLE STUDENT TRUNCATE

STUDENT TABLE TRUNCATE

Page 20

Final Term

20. Suppose there are 5 rows and 4 columns in TABLE1 and 6 rows and 7 columns in TABLE2; what is

the size of the Cartesian product incase of CROSS JOIN between these two tables?

30

35

24

28

21. Which of the following is not a feature of effective interface?

Effective interfaces can require more work to implement

An effective user interface minimizes the time users require to learn and implement the system

It helps users to accomplish their tasks and otherwise gets out of the way

An effective interface imposes its requirements on users page 239

22. Which of the following is not correct about input forms?

Provide an easy, effective, efficient way to enter data into a table

Especially useful when the person entering the data is not familiar with the inner workings

Provide different controls to add data into the tables

One input forms can populate one table at a time page 246

23. ______ is a control that presents a set of choices from which a user can select one or more items;

items can be text, graphics, or both.

Button page 243

List box

Text input

4. The main memory of a computer system is also known as

ROM

RAM page256

PROM

Hard disk

Page 21

Final Term

25. ________ is not a feature of hash access Report.

indexes to search or maintain page266

Very fast direct access

Inefficient sequential access

Use when direct access is needed, but sequential access is not

26. ________ is disadvantage of chaining technique to handle the collisions.

Unlimited Number of elements

Fast re-hashing

Fast re-hashing

Overhead of multiple linked lists page269

Maximum number of elements must be known

27. _______ is advantage of Re-Hashing technique to handle the collisions.

Collisions don’t use primary table space

Unlimited number of elements

Fast access through use of main table space page 269

Overhead of multiple linked lists

28. Which of the following is NOT a part of Deadlock Resolution?

Choose a victim

A message is passed to the victim and depending on the system the transaction may or may not be

started again automatically.

Picking a list of all previously completed transactions and undoing all the updates. Page 323

Rollback `victim' transaction and restart it.

29. Which of the following is true about the views?

View can only show few attributes of a table

View can not be used for retrieving data

View can not be used as security mechanisms

We can customize the order of the table fields through Views page280

Page 22

Final Term

30. Which of the following is not a type of VIEWS?

Materialized View

Simple Views

Complex View

Cross Reference View page283

31. A file with ______ records, with sequential access file, an average of _______ key comparisons are

necessary.

10000, 5500

10000, 5000 page 262

10000, 4500

10000, 500

32. A perfect hash function map a key to distinct location having search time _________.

O(1) page 266

O(n)

O(n+1)

O(n-1)

33. Which of following is INCORRECT about “Materialized Views”?

These are suitable in “Data Warehouses”.

These are schema objects which can be use to summaries the data. Page 291

They can not be partitioned.

Their existence is transparent to SQL applications and users.

34. ____________ is used to detect the dead lock.

Wait-for graph page 320

Cross Reference Matrix

Inner Join

Clustered Index

Page 23

Final Term

35. Wait-for graph is maintained by __________

Lock manager page 320

Index Manager

View Manager

Constraint Manager

36. Which of the following serves as reference point in the log file?

Constraints

Relations

Check points page 304

Relationships

37. -------------- occurs when multiple users want to update same object at the same time.

Lost Update Problem page 308

Uncommitted Update Problem

Inconsistent Analysis Problem

Lost of Joins Problem

38. After execution of “commit” statement, ____________ is updated first.

Database Buffer page 303

Clustered-Index

Non-Clustered Index

Application Program

39. To select the range while creating Indexes, the operator that is not used is _____.

Equals to (==).

Less than (<)

And (&&)

Between

Page 24

Final Term

40. DBA is responsible for _____________

Monitoring Disk Space

Database Backup page25

Managing Print Jobs

Development of Database Application Programs

FINALTERM EXAMINATION

Spring 2012

CS403- Database Management Systems

1. Maximum Cardinality shows that how many ________ of one entity can be placed in another

relation at most.

Keys Instances 91 page Attributes Relationships 2. “A shared collection of logically related data” is known as

Database page 10 File Processing System

Program and Data Interdependence DBMS 3. Metadata is also known as _________ for the real world data.

Attribute Schema 23 Entity Relation 4. _________ provides the change transparency between Conceptual and External level.

Physical Data Independence 45 Concurrency Control Logical Data Independence Functional Dependency 5. User rights information is stored in _________ .

Conceptual Database A user accessible Catalog 46 Logical Database Buffer

Page 25

Final Term

6. Which of the following types of partitioning reduces the chances of unbalanced partitions?

Vertical List Hash 189 Range 7. In which of the following situations, Clustering is suitable:

Frequently updating Relatively static 192 Frequently deletion Relatively dynamic 8. Vertical partitioning is done on the basis of

Attributes 191

Rows Clustering Replication 09. Which of the following is one of the purposes of using DML commands?

Creating databases Destroying databases Inserting data in tables 196 Create table 10. _________ is used to create and destroy database and database objects

ERD DCL DDL 196 DML 11. ___________ is used to read, write, and remove the data from a database

SQL 196 ERD ANSI Data Model 12. Which of the following gives all the fields from employee table named as EMP?

select * from EMP select emp* from EMP select emp_id where EMP select * where EMP 13. Which of the following SQL keywords is not used with DDL statements?

Table Update 234 Create Alter

Page 26

Final Term

14. Which of the following statements are Data Definition Language command?

INSERT 196

GRANT

ALTER UPDATE 15. Which of the following is true about relational table?

The sequence of columns is significant. The sequence of rows is significant. Contains only derived attributes. Contains only derived attributes. 16. If W, X, Y and Z are attributes of a relation, which of the following inference rules for

functional dependencies is correct?

If X Y then Y -> X If X -> Y then (X, Z) -> (Y,W) If X -> Y,Z then X -> Y If (X, Z) -> Y then X -> Y and Z -> Y 17. _____________ is used to sort the result set in ascending or descending order

From Clause Where Clause Order by Clause 220 Group by Clause 18. Which of the following commands is used to drop the table named STUDENT?

DROP TABLE STUDENT 208 TABLE STUDENT DROP TABLE DROP STUDENT STUDENT TABLE DROP 19. Which of the following is NOT a feature of a good interface?

data structure based user friendly consistency process based 243 20. Which of the following is the activity, which is not performed during the development of

application programs?

Data input programs Editing Display Data Collection 238

Page 27

Final Term

21. _______ is a control that users click to perform an action.

Input form 246 Report Button Text box 22. ________ is an example of non-volatile memory.

SRAM Cache Memory Flash memory 256 DRAM 23. ________ is an example of volatile memory.

RAM ROM Flash memory 256 CPU 24. What is the impact of setting multiple indexes for the same key?

Multiple indexes for the same key can not be set It increases efficiency 263 It decreases efficiency It will increase complexity as the access time will be increased 25. Which of the following is incorrect regarding Indexes?

It can not be created on composite attributes. Index can be defined even when there is no data in the table. It supports Range selections. It can be created using ‘Create Index’ statement. 273 26. Which of the following SQL Command will DROP a view named “STUDENT”

DROP VIEW STUDENT 288 DROP FROM STUDENT VIEW DELETE STUDENT FROM VIEW DELETE ALL STUDENT VIEW 27. Which of the following is NOT CORRECT Regarding VIEWS?

VIEWS can be used to interact with the database. 281

Through VIEWS users can focus on their interested data. VIEW can show one or more records from a database. VIEW cannot be updated VIEW cannot be updated CREATE VIEW ST_LIST AS SELECT * FROM STUDENT 284 SELECT * FROM STUDENT VIEW ST_LIST CREATE ST_LIST VIEW AS STUDENT SELECT * FROM STUDENT TO ST_LIST

Page 28

Final Term

29. Which of the following command shows all the columns from “PRODUCT-VIEW?”

SELECT * FROM PRODUCT-VIEW 286 SELECT PRODUCT-VIEW SHOW ALL PRODUCT-VIEW PRODUCT-VIEW SELECT 30. __________ must identify a record in the table, uniquely.

Hash Algorithm Key 260 SQL Statement Index 31. A file with ______ records, with sequential access file, an average of _______ key comparisons

are necessary.

10000, 5500 10000, 5000 262 10000, 4500 10000, 500 32. Which of the following is INCORRECT about “Database Transaction”?

It can only end in one way, which is ROLLBACK 295 It must preserve the consistency of the database. It must follow the ACID properties. It is seen by the DBMS as a list of actions. 33. Which of the following is not a feature of “Database Transaction”?

Users should be able to regard the execution of each transaction as atomic. It must follow the ACID properties. Either all actions of a Transaction are carried out or none are. Transaction always affects the every other concurrent transaction. 294 34. ____________ is used to detect the dead lock.

Wait-for graph 320 Cross Reference Matrix Inner Join Clustered Index 35. While recovering data, which of the following files does a Recovery Manager examines at first?

Clustered Index Log file 303 Data dictionary Metadata

Page 29

Final Term

36. -------------- occurs when multiple users want to update same object at the same time.

Uncommitted Update Problem Inconsistent Analysis Problem Lost of Joins Problem Lost Update Problem 308 37. After execution of “commit” statement, ____________ is updated first.

Database Buffer 303 Clustered-Index Non-Clustered Index Application Program 38.. It is not necessary for any super type entity to have its entire instance set to be associated with

any of the subtype entity, is called as ______________.

Partial Completeness 103 Disjoint Overlap Complete Overlap Total Completeness 39. _____________ is an abstraction of a relationship.

Relationship Type 85 Relationship Name Relation Type Relation Name 40. DBA is not responsible for _____________

Monitoring Disk Space Database Backup Managing Print Jobs Development of Database Application Programs 29