The document discusses various topics related to databases and data structures, including different types of indexes used in databases, data allocation methods, hashing techniques, data organization, record searching methods, and definitions of terms related to hashing such as collisions and buckets. It also covers topics like RAID levels, disk striping, and technologies used for optical disks. The questions provide multiple choice answers about these database, data structure, and storage-related concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
240 views
HASHING and RAID MCQ
The document discusses various topics related to databases and data structures, including different types of indexes used in databases, data allocation methods, hashing techniques, data organization, record searching methods, and definitions of terms related to hashing such as collisions and buckets. It also covers topics like RAID levels, disk striping, and technologies used for optical disks. The questions provide multiple choice answers about these database, data structure, and storage-related concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
1) In database management system, the types of data structures used in indexes:
a) hash data structures
b) tree data structures c) content and glossary structures d) both a and b Answer: (d) 2) The kind of allocation in which the file blocks contain the pointer to the next blocks of file is classified as: a) linked allocation(Chaining) b) indexed allocation c) header allocation d) contiguous allocation Answer: (a) 3) The hashing technique which allocates fixed number of buckets is classified as: a) dynamic hashing b) static hashing c) external hashing d) internal hashing Answer: (c) 4) The type of data organization which does not allow cross block boundaries is: a) unspanned organization b) spanned organization c) factor organization d) indexed organization Answer: (a) 5) The open addressing, multiple hashing and chaining are all the methods used for: a) multiple hashing resolution b) chaining resolution c) collision resolution d) address space resolution Answer: (c) 6) The record searching technique which is based on the blocks rather than records is called: a) tertiary search b) binary search c) ordinary search d) ternary search Answer: (b) 7) The type of organization in which the records are inserted at the end of stored file is classified as: a) pile file b) linear search file c) relative file d) external file Answer: (a) 8) The command in DBMS software which is used to locate records that fulfills the search condition is classified as: a) Find All command b) Find n c) Find Ordered command d) Reorganize command Answer: (a) 9) If h is any hashing function and is used to hash n keys in to a table of size m, where n<=m, the expected number of collisions involving a particular key x is: a) Less than 1 b) Less than n c) Less than m d) Less than n/2 Answer: (a) 10) What is the best definition of a collision in a hash table? a) Two entries are identical except for their keys b) Two entries with different data have the exact same key c) Two entries with different keys have the same exact hash value Answer: (b) 11) Which of the following scenarios leads to linear running time for a random search hit in a linear-probing hash table? a) All keys hash to same index b) All keys hash to different indices c) All keys hash to an even-numbered index Answer: (a) 12) The term ______ is used to denote a unit of storage that can store one or more records a) Basket b) Bucket c) Unit d) Set Answer: (b) 13) If K denotes the set of all the search key values, and B denotes the set of all bucket addresses, a function from K to B is called as __________ a) Bucket function b) Address function c) Hash function d) Search function Answer: (c) 14) What is a bucket overflow? a) When a bucket does not have enough space b) There are insufficient buckets c) When Bucket skew occurs d) All of the mentioned Answer: (d) 15) Overflow handling using a linked list of buckets is called as ____________ a) Bucket chaining b) Overflow chaining c) Bucket linking d) Overflow linking Answer: (b) 16) Which level of RAID refers to disk mirroring with block striping? a) RAID level 1 b) RAID level 2 c) RAID level 0 d) RAID level 3 Answer: (a) 17) Optical disk technology uses: a) Helical scanning b) DAT c) A laser beam d) RAID Answer: (d) 18) With multiple disks, we can improve the transfer rate as well by ___________ data across multiple disks a) Striping b) Dividing c) Mirroring d) Dividing Answer: (a) 19) Which one of the following is a Stripping technique? a) Byte level stripping b) Raid level stripping c) Disk level stripping d) Block level stripping Answer: (b) 20) Where performance and reliability are both important, RAID level ____ is used. a) 0 b) 1 c) 2 d) 0+1 Answer: (d) 21) ___________ is popular for applications such as storage of log files in a database system since it offers the best write performance. a) RAID level 1 b) RAID level 2 c) RAID level 0 d) RAID level 3 Answer: (a)