Database: Management System

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

Database Management System

1. State true or false.


i) Select operator is not a unary operator.
ii) Project operator chooses subset of attributes or columns of a relation.

A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
_____________________________________________________________________________________
2. …………… database is used as template for all databases created.
A) Master
B) Model
C) Tempdb
D) None of the above
_____________________________________________________________________________________
3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be
assigned to each data items. This is referred to as
A) Data Security
B) Domain access
C) Data Control
D) Domain Integrity
_____________________________________________________________________________________
4. ………………….. operator is basically a join followed by a project on the attributes of first relation.
A) Join
B) Semi-Join
C) Full Join
D) Inner Join
_____________________________________________________________________________________
5. Which of the following is not a binary operator in relational algebra?
A) Join
B) Semi-Join
C) Assignment
D) Project
_____________________________________________________________________________________
6. Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the
consistency and validity of the database.
A) Increases
B) Skips
C) Does not reduce
D) Reduces
_____________________________________________________________________________________
7. Which of the following is/are the DDL statements?
A) Create
B) Drop
C) Alter
D) All of the above
_____________________________________________________________________________________
8. In snapshot, …………………. clause tells oracle how long to wait between refreshes.
A) Complete
B) Force
C) Next
D) Refresh
_____________________________________________________________________________________
9. ……………… defines rules regarding the values allowed in columns and is the standard mechanism for
enforcing database integrity.
A) Column
B) Constraint
C) Index
D) Trigger
_____________________________________________________________________________________
10. For like predicate which of the following is true.
i) % matches zero of more characters.
ii) _ matches exactly one character.

A) i-only
B) ii-only
C) Both of them
D) None of them
_____________________________________________________________________________________
11. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in
a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
A) All of the above
_____________________________________________________________________________________
12. In SQL, the CREATE TABLESPACE is used
A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data
files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
D) All of the above
_____________________________________________________________________________________
13. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
_____________________________________________________________________________________
14. Which of the following is TRUE for the System Variable $date$?
A) Can be assigned to a global variable.
B) Can be assigned to any field only during design time.
C) Can be assigned to any variable or field during run time.
D) Can be assigned to a local variable.
_____________________________________________________________________________________
15. What are the different events in Triggers?
A) Define, Create
B) Drop, Comment
C) Insert, Update, Delete
D) Select, Commit
_____________________________________________________________________________________
16. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?
A) Data Definition Language
B) Data Manipulation Language
C) Data Described Language
D) Data Retrieval Language
_____________________________________________________________________________________
17. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints
A) 6789
B) 2345
C) 1234
D) 456789
_____________________________________________________________________________________
18. Which of the following SQL command can be used to modify existing data in a database table?
A) MODIFY
B) UPDATE
C) CHANGE
D) NEW
_____________________________________________________________________________________
19. When SQL statements are embedded inside 3GL, we call such a program as ..........
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
_____________________________________________________________________________________
20. ................ provides option for entering SQL queries as execution time, rather than at the development
stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL
_____________________________________________________________________________________
21) The RDBMS terminology for a row is
A. tuple
B. relation
C. attribute
D. degree
_____________________________________________________________________________________
22) To change column value in a table the ......... command can be used.
A. create
B. insert
C. alter
D. update
_____________________________________________________________________________________
23) The full form of DDL is
A. Dynamic Data Language
B. Detailed Data Language
C. Data Definition Language
D. Data Derivation Language
_____________________________________________________________________________________
24) To pass on granted privileges to other user the ...... clause is used
A. create option
B. grant option
C. update option
D. select option
_____________________________________________________________________________________
25) A set of possible data values is called
A. attribute
B. degree
C. tuple
D. domain
_____________________________________________________________________________________
26) ......... is critical in formulating database design.
A. row column order
B. number of tables
C. functional dependency
D. normalizing
_____________________________________________________________________________________
27) A primary key if combined with a foreign key creates
A. Parent-Child relationship between the tables that connect them
B. Many to many relationship between the tables that connect them
C. Network model between the tables that connect them
D. None of the above
_____________________________________________________________________________________
28) A ............. represents the number of entities to which another entity can be associated
A. mapping cardinality
B. table
C. schema
D. information
_____________________________________________________________________________________
29) Which two files are used during operation of the DBMS
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
_____________________________________________________________________________________
30) A ........... is a set of column that identifies every row in a table.
A. composite key
B. candidate key
C. foreign key
D. super key
_____________________________________________________________________________________
31. The relational model is based on the concept that data is organized and stored in two-dimensional tables
called …….
A) Fields
B) Records
C) Relations
D) Keys
_____________________________________________________________________________________
32. ……………….. contains information that defines valid values that are stored in a column or data type.
A) View
B) Rule
C) Index
D) Default
_____________________________________________________________________________________
33. Which of the syntax is correct for insert statement?
i) insert into <table_name> values <list of values>
ii) insert into <table_name> (column list) values <list of values>

A) i-only
B) ii-only
C) Both of them
D) None of them
_____________________________________________________________________________________
34. ………………. First proposed the process of normalization.
A) Edgar. W
B) Edgar F. Codd
C) Edward Stephen
D) Edward Codd
_____________________________________________________________________________________
35. For using a specific database …………… command is used.
A) use database
B) database name use
C) Both A &B
D) None of them
_____________________________________________________________________________________
36. Which of the following is not comparison operator?
A) <>
B) <
C) =<
D) >=
_____________________________________________________________________________________
37. An outstanding functionality of SQL is its support for automatic ………… to the target data.
A) programming
B) functioning
C) navigation
D) notification
_____________________________________________________________________________________
38. ………………… is a special type of integrity constraint that relates two relations & maintains consistency
across the relations.
A) Entity Integrity Constraints
B) Referential Integrity Constraints
C) Domain Integrity Constraints
D) Domain Constraints
E) Key Constraints
_____________________________________________________________________________________
39. ……………..specifies a search condition for a group or an aggregate.
A) GROUP BY Clause
B) HAVING Clause
C) FROM Clause
D) WHERE Clause
_____________________________________________________________________________________
40. Drop Table cannot be used to drop a table referenced by a …………… constraint.
A) Local Key
B) Primary Key
C) Composite Key
D) Foreign Key
_____________________________________________________________________________________
41. Reflexivity property says that X - Y is true if Y is ………………….
A) Subset of X
B) Null set of X
C) Super set of Y
D) Subset of Y
_____________________________________________________________________________________
42. Anything that affects the database schema is a part of
A) DML
B) DCL
C) DDL
D) All of the above
_____________________________________________________________________________________
43. An instance of a relation is a time varying set of ………………….
A) Tuples
B) Rows
C) Both of them
D) None of them
_____________________________________________________________________________________
44. In the ………………… mode any record in the file can be accessed at random
A) Sequential access
B) Random access
C) Standard access
D) Source access
_____________________________________________________________________________________
45. Which can be used to delete all the rows if a table?
A) Delete * from table_name
B) Delete from table_name
C) Delete table_name
D) all rows cannot be deleted at a time.
_____________________________________________________________________________________
46. Which if the following is not the type of data integrity.
A) Key integrity
B) Domain integrity
C) Entity integrity
D) Referential integrity
_____________________________________________________________________________________
47. 4NF stands for ..
A) Fourth Normal File
B) Fourth Normal Form
C) Fourth Normal Fraction
D) Fourth Negative File
_____________________________________________________________________________________
48. A ……………… allows to make copies of the database periodically to help in the cases of crashes &
disasters.
A) Recovery utility
B) Backup Utility
C) Monitoring utility
D) Data loading utility
_____________________________________________________________________________________
49. ………………. Allows definitions and query language statements to be entered; query results are formatted
and displayed.
A) Schema Processor
B) Query Processor
C) Terminal Interface
D) None of the above
_____________________________________________________________________________________
50. The main task carried out in the …………… is to remove repeating attributes to separate tables.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Fourth Normal Form
_____________________________________________________________________________________
51. ............... joins are SQL server default
A) Outer
B) Inner
C) Equi
D) None of the above
_____________________________________________________________________________________
52. The ..................... is essentially used to search for patterns in target string.
A) Like Predicate
B) Null Predicate
C) In Predicate
D) Out Predicate
_____________________________________________________________________________________
53. Which of the following is/are the Database server functions?
i) Data management ii) Transaction management
iii) Compile queries iv) Query optimization

A) i, ii, and iv only


B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii, and iv
_____________________________________________________________________________________
54. To delete a database ................... command is used
A) delete database database_name
B) Delete database_name
C) drop database database_name
D) drop database_name
_____________________________________________________________________________________
55. .............. is a combination of two of more attributes used as a primary key
A) Composite Key
B) Alternate Key
C) Candidate Key
D) Foreign Key
_____________________________________________________________________________________
56. Which of the following is not the function of client?
A) Compile queries
B) Query optimization
C) Receive queries
D) Result formatting and presentation
_____________________________________________________________________________________
57. ............. is a special type of stored procedure that is automatically invoked whenever the data in the
table is modified.
A) Procedure
B) Trigger
C) Curser
D) None of the above
_____________________________________________________________________________________
58. ................. requires that data should be made available to only authorized users.
A) Data integrity
B) Privacy
C) Security
D) None of the above
_____________________________________________________________________________________
59. Some of the utilities of DBMS are .............
i) Loading ii) Backup iii) File organization iv) Process Organization

A) i, ii, and iv only


B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii, and iv
_____________________________________________________________________________________
60. ................. allows individual row operation to be performed on a given result set or on the generated by
a selected by a selected statement.
A) Procedure
B) Trigger
C) Curser
D) None of above
_____________________________________________________________________________________
61. DBMS is a collection of …………. that enables user to create and maintain a database.
A) Keys
B) Translators
C) Program
D) Language Activity
_____________________________________________________________________________________
62. In a relational schema, each tuple is divided into fields called
A) Relations
B) Domains
C) Queries
D) All of the above
_____________________________________________________________________________________
63. In an ER model, ……………. is described in the database by storing its data.
A) Entity
B) Attribute
C) Relationship
D) Notation
_____________________________________________________________________________________
64. DFD stands for
A) Data Flow Document
B) Data File Diagram
C) Data Flow Diagram
D) Non of the above
_____________________________________________________________________________________
65. A top-to-bottom relationship among the items in a database is established by a
A) Hierarchical schema
B) Network schema
C) Relational Schema
D) All of the above
_____________________________________________________________________________________
66. ……………… table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
_____________________________________________________________________________________
67. …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
A) Instance
B) Schema
c) Program
D) Super Key
_____________________________________________________________________________________
68. ……………… clause is an additional filter that is applied to the result.
A) Select
B) Group-by
C) Having
D) Order by
_____________________________________________________________________________________
69. A logical schema
A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above
_____________________________________________________________________________________
70. ………………… is a full form of SQL.
A) Standard query language
B) Sequential query language
C) Structured query language
D) Server side query language
_____________________________________________________________________________________
71) A relational database developer refers to a record as
A. a criteria
B. a relation
C. a tuple
D. an attribute
_____________________________________________________________________________________
72) .......... keyword is used to find the number of values in a column.
A. TOTAL
B. COUNT
C. ADD
D. SUM
_____________________________________________________________________________________
73) An advantage of the database management approach is
A. data is dependent on programs
B. data redundancy increases
C. data is integrated and can be accessed by multiple programs
D. none of the above
_____________________________________________________________________________________
74) The collection of information stored in a database at a particular moment is called as ......
A. schema
B. instance of the database
C. data domain
D. independence
_____________________________________________________________________________________
75) Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data
C. programs are not dependent on the logical attributes of data
D. both B and C
_____________________________________________________________________________________
76) A ......... is used to define overall design of the database
A. schema
B. application program
C. data definition language
D. code
_____________________________________________________________________________________
77) Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
_____________________________________________________________________________________
78) Grant and revoke are ....... statements.
A. DDL
B. TCL
C. DCL
D. DML
_____________________________________________________________________________________
79) DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A nor B
D. Both A and B
_____________________________________________________________________________________
80) .......... command can be used to modify a column in a table
A. alter
B. update
C. set
D. create
_____________________________________________________________________________________
81. The candidate key is that you choose to identify each row uniquely is called ……………..
A) Alternate Key
B) Primary Key
C) Foreign Key
D) None of the above
_____________________________________________________________________________________
82. …………….. is used to determine whether of a table contains duplicate rows.
A) Unique predicate
B) Like Predicate
C) Null predicate
D) In predicate
_____________________________________________________________________________________
83. To eliminate duplicate rows ……………… is used
A) NODUPLICATE
B) ELIMINATE
C) DISTINCT
D) None of these
_____________________________________________________________________________________
84. State true or false
i) A candidate key is a minimal super key.
ii) A candidate key can also refer to as surrogate key.

A) i-true, ii-false
B) i-false, ii-true
C) i-true, ii-true
D) i-false, ii-false
_____________________________________________________________________________________
85. DCL stands for
A) Data Control Language
B) Data Console Language
C) Data Console Level
D) Data Control Level
_____________________________________________________________________________________
86. …………………… is the process of organizing data into related tables.
A) Normalization
B) Generalization
C) Specialization
D) None of the above
_____________________________________________________________________________________
87. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which
are part of some another entity.
A) Weak entity
B) Strong entity
C) Non attributes entity
D) Dependent entity
_____________________________________________________________________________________
88. …………….. is the complex search criteria in the where clause.
A) Sub string
B) Drop Table
C) Predict
D) Predicate
_____________________________________________________________________________________
89. ………………… is preferred method for enforcing data integrity
A) Constraints
B) Stored Procedure
C) Triggers
D) Cursors
_____________________________________________________________________________________
90. The number of tuples in a relation is called its …………. While the number of attributes in a relation is
called it’s ………………..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
_____________________________________________________________________________________
91) The language that requires a user to specify the data to be retrieved without specifying exactly how to
get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
_____________________________________________________________________________________
92) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
_____________________________________________________________________________________
93) The database schema is written in
A. HLL
B. DML
C. DDL
D. DCL
_____________________________________________________________________________________
94) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
_____________________________________________________________________________________
95) The relational model feature is that there
A. is no need for primary key data
B. is much more data independence than some other database models
C. are explicit relationships among records.
D. are tables with many dimensions
_____________________________________________________________________________________
96) Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
_____________________________________________________________________________________
97) Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
_____________________________________________________________________________________
98) Which database level is closest to the users?
A. External
B. Internal
C. Physical
D. Conceptual
_____________________________________________________________________________________
99) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
_____________________________________________________________________________________
100) ........ data type can store unstructured data
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
_____________________________________________________________________________________

101. ............................ is the powerful language for working with RDBMS.


A) Embedded Programs
B) Dynamic Programs
C) Query Language
D) Static Language Programs
_____________________________________________________________________________________
102. The file in DBMS is called as .................. in RDBMS.
A) console
B) schema
C) table
D) object
_____________________________________________________________________________________
103. In ..................... , we have a strict parent-child relationship only.
A) hierarchical databases.
B) network databases
C) object oriented databases
D) relational databases
_____________________________________________________________________________________
104. Which normal form is considered adequate for relational database design?
A) 2 NF
B) 3 NF
C) 4 NF
D) BCNF
_____________________________________________________________________________________
105. What operator tests column for the absence of data?
A) IS NULL operator
B) ASSIGNMENT operator
C) LIKE operator
D) NOT operator
_____________________________________________________________________________________
106. Which is proper subset designed to support views belonging to different classes of users in order to hide
or protect information.
A) Schema
B) Sub-schema
C) Non-schema
D) Non-sub schema
_____________________________________________________________________________________
107. Which contain information about a file needed by system programs for accessing file records?
A) File blocks
B) File operators
C) File headers
D) None of these
_____________________________________________________________________________________
108. A .................... DBMS distributes data processing tasks between the workstation and network server.
A) Network
B) Relational
C) Client Server
D) Hierarchical
_____________________________________________________________________________________
109. The .................... refers to the way data is organized in and accessible from DBMS.
A) database hierarchy
B) data organization
C) data sharing
D) data model
_____________________________________________________________________________________
110. ................. is a statement that is executed automatically by the system.
A) trigger
B) assertion
C) durability
D) integrity constraint
_____________________________________________________________________________________
111. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in
a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
A) All of the above
_____________________________________________________________________________________
112. In SQL, the CREATE TABLESPACE is used
A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data
files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
D) All of the above
_____________________________________________________________________________________
113. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
_____________________________________________________________________________________
114. Which of the following is TRUE for the System Variable $date$?
A) Can be assigned to a global variable.
B) Can be assigned to any field only during design time.
C) Can be assigned to any variable or field during run time.
D) Can be assigned to a local variable.
_____________________________________________________________________________________
115. What are the different events in Triggers?
A) Define, Create
B) Drop, Comment
C) Insert, Update, Delete
D) Select, Commit
_____________________________________________________________________________________
116. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?
A) Data Definition Language
B) Data Manipulation Language
C) Data Described Language
D) Data Retrieval Language
_____________________________________________________________________________________
117. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints
A) 6789
B) 2345
C) 1234
D) 456789
_____________________________________________________________________________________
118. Which of the following SQL command can be used to modify existing data in a database table?
A) MODIFY
B) UPDATE
C) CHANGE
D) NEW
_____________________________________________________________________________________
119. When SQL statements are embedded inside 3GL, we call such a program as ..........
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
_____________________________________________________________________________________
120. ................ provides option for entering SQL queries as execution time, rather than at the development
stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL

DBMS-Basic SQL Queries


1. DML is provided for
A) Description of logical structure of database
B) Addition of new structure in the database system.
C) Manipulation & processing of database
D) Definition of physical structure of database system
_____________________________________________________________________________________
2.'AS' clause is used in SQL for
A) Selection operation
B) Rename Operation
C) Join operation
D) Projection Operation
_____________________________________________________________________________________
3. Count function in SQL returns the number of
A) values
B) distinct values
C) groups
D) columns
_____________________________________________________________________________________
4. The statement in SQL which allows to change the definition of a table is
A) Alter
B) Update
C) Cteate
D) Select
_____________________________________________________________________________________
5. Which of the following is correct.
A) A SQL query automatically eliminates duplicates
B) SQL permits attribute names to be repeated in the same relation
C) A SQL query will not work if there are no indexes on the relations
D) None of the above
_____________________________________________________________________________________
6. Which of the following operation is used if we are interested in only certain columns of a table?
A) PROJECTION
B) SELECTION
C) UNION
D) JOIN
_____________________________________________________________________________________
7. Which of the following is a legal expression in SQL?
A) SELECT NULL FROM EMPLOYEE;
B) SELECT NAME FROM EMPLOYEE;
C) SELECT NAME FROM EMPLOYEE WHERE SALARY=NULL;
D) None of the above
_____________________________________________________________________________________
8. Which of the following is a valid SQL type?
A) CHARACTER
B) NUMERIC
C) FLOAT
D) All of the above
_____________________________________________________________________________________
9. Which command is used to select distinct subject (SUB) from the table (BOOK)?
A) SELECT ALL FROM BOOK
B) SELECT DISTINCT SUB FROM BOOK
C) SELECT SUB FROM BOOK
D) All of the above
_____________________________________________________________________________________
10. In SQL, which of the following is not a data definition language commands?
A) RENAME
B) REVOKE
C) GRANT
D) UPDATE
_____________________________________________________________________________________

1. Which of the following query is correct for using comparison operators in SQL?
A) SELECT sname, coursename FROM studentinfo WHERE age>50 and <80;
B) SELECT sname, coursename FROM studentinfo WHERE age>50 and age <80;
C) SELECT sname, coursename FROM studentinfo WHERE age>50 and WHERE age<80;
D) None of the above
_____________________________________________________________________________________
2.How to select all data from studentinfo table starting the name from letter 'r'?
A) SELECT * FROM studentinfo WHERE sname LIKE 'r%';
B) SELECT * FROM studentinfo WHERE sname LIKE '%r%';
C) SELECT * FROM studentinfo WHERE sname LIKE '%r';
D) SELECT * FROM studentinfo WHERE sname LIKE '_r%';
_____________________________________________________________________________________
3. Which of the following SQL query is correct for selecting the name of staffs from 'tblstaff' table where
salary is 15,000 or 25,000?
A) SELECT sname from tblstaff WHERE salary IN (15000, 25000);
B) SELECT sname from tblstaff WHERE salary BETWEEN 15000 AND 25000;
C) Both A and B
D) None of the above
_____________________________________________________________________________________
4. The SELECT statement, that retrieves all the columns from empinfo table name starting with d to p is
..........................
A) SELECT ALL FROM empinfo WHERE ename like '[d-p]%';
B) SELECT * FROM empinfo WHERE ename is '[d-p]%';
C) SELECT * FROM empinfo WHERE ename like '[p-d]%';
D) SELECT * FROM empinfo WHERE ename like '[d-p]%';
_____________________________________________________________________________________
5. Select a query that retrieves all of the unique countries from the student table?
A) SELECT DISTINCT coursename FROM studentinfo;
B) SELECT UNIQUE coursename FROM studentinfo;
C) SELECT DISTINCT coursename FROM TABLE studentinfo;
D) SELECT INDIVIDUAL coursename FROM studentinfo;
_____________________________________________________________________________________
6. Which query is used for sorting data that retrieves the all the fields from empinfo table and listed them in
the ascending order?
A) SELECT * FROM empinfo ORDER BY age;
B) SELECT * FROM empinfo ORDER age;
C) SELECT * FROM empinfo ORDER BY COLUMN age;
D) SELECT * FROM empinfo SORT BY age;
_____________________________________________________________________________________
7. Select the right statement to insert values to the stdinfo table.
A) INSERT VALUES ("15", "Hari Thapa", 45, 5000) INTO stdinfo;
B) INSERT VALUES INTO stdinfo ("15", "Hari Thapa", 45, 5000);
C) INSERT stdinfo VALUES ("15", "Hari Thapa", 45, 5000);
D) INSERT INTO stdinfo VALUES ("15", "Hari Thapa", 45, 5000);
_____________________________________________________________________________________
8. How to Delete records from studentinfo table with name of student 'Hari Prasad'?
A) DELETE FROM TABLE studentinfo WHERE sname='Hari Prasad';
B) DELETE FROM studentinfo WHERE sname='Hari Prasad';
C) DELETE FROM studentinfo WHERE COLUMN sname='Hari Prasad';
D) DELETE FROM studentinfo WHERE sname LIKE 'Hari Prasad';
_____________________________________________________________________________________
9. Constraint checking can be disabled in existing ............. and .............. constraints so that any data you
modify or add to the table is not checked against the constraint.
A) CHECK, FOREIGN KEY
B) DELETE, FOREIGN KEY
C) CHECK, PRIMARY KEY
D) PRIMARY KEY, FOREIGN KEY
_____________________________________________________________________________________
10. ..................... joins two or more tables based on a specified column value not equaling a specified column
value in another table.
A) OUTER JOIN
B) NATURAL JOIN
C) NON-EQUIJOIN
D) EQUIJOIN
MCQ of PL/SQL and Oracle With Answer set -2

1. ....................... are used to recreate if trigger already exists.


A) Cursor
B) Trigger
C) Keywords
D) Replace

2. .............................. is used to define code that is executed / fired when certain actions or event occur.
A) Cursor
B) Trigger
C) Keywords
D) Replace

3. ................. provide a way for your program to select multiple rows of data from the database and then
process each row individually.
A) PL/SQL Cursors
B) PL/SQL Trigger
C) PL/SQL Select
D) PL/SQL Process

4. ........................... cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands.
A) Implicit
B) Explicit
C) Internal
D) External

5. ......................... cursors are declared and used by the user to process multiple row, returned by SELECT
statement.
A) Implicit
B) Explicit
C) Internal
D) External

6. ....................... contain a pointer that keeps track of current row being accessed, which enables your
program to process the rows at a time.
A) Tracker
B) Cursor
C) Accesser
D) Trigger

7. ....................... a cursor enables you to define the cursor and assign a name to it.
A) Declearing
B) Stating
C) Extracting
D) Importing

8. In ................... the cursor advances to the next row in the active set each time the fetch command is
executed.
A) recreating process
B) redefining process
C) iterative process
D) None of the above

9. A ......................... is a database object that groups logically related PL/SQL types, objects and
subprograms.
A) Module
B) Package
C) Body
D) Name
_____________________________________________________________________________________
10. In the PL/SQL, the package specification contains ....................... declarations.
A) Public
B) Private
C) Friend
D) Protected
_____________________________________________________________________________________

Solved MCQ of PL/SQL and Oracle set-1

1. ........................ is a procedural extension of Oracle - SQL that offers language constructs similar to those in
imperative programming languages.
A) SQL
B) PL/SQL
C) Advanced SQL
D) PQL

2. .................... combines the data manipulating power of SQL with the data processing power of Procedural
languages.
A) PL/SQL
B) SQL
C) Advanced SQL
D) PQL

3. ................... has made PL/SQL code run faster without requiring any additional work on the part of the
programmer.
A) SQL Server
B) My SQL
C) Oracle
D) SQL Lite

4. A line of PL/SQL text contains groups of characters known as .......................


A) Lexical Units
B) Literals
C) Textual Units
D) Identifiers

5. We use ........................ name PL/SQL program objects and units.


A) Lexical Units
B) Literals
C) Delimiters
D) Identifiers

6. A .................... is an explicit numeric, character, string or Boolean value not represented by an identifier.
A) Comments
B) Literals
C) Delimiters
D) Identifiers

7. If no header is specified, the block is said to be an ...................... PL/SQL block.


A) Strong
B) Weak
C) Empty
D) Anonymous

8. ............. is a sequence of zero or more characters enclosed by single quotes.


A) Integers literal
B) String literal
C) String units
D) String label

9. In ........................, the management of the password for the account can be handled outside of oracle such
as operating system.
A) Database Authentication
B) Operating System Authentication
C) Internal Authentication
D) External Authentication

10. In ............................ of Oracle, the database administrator creates a user account in the database for
each user who needs access.
A) Database Authentication
B) Operating System Authentication
C) Internal Authentication
D) External Authentication

Solved MCQ of SQL Server set-1

1. ........................ is the full form of SQL.


A) Standard Query Language
B) Sequential Query Language
C) Structured Query Language
D) Server Side Query Language

2. SQL Server 2005 NOT includes the following system database .............
A) tempdb Database
B) Master Database
C) Model Database
D) sqldb Database

3. SQL Server stores index information in the ..................... system table.


A) sysindexes
B) systemindexes
C) sysind
D) sysindexes

4. ..................... is a read-only database that contains system objects that are included with SQL Server 2005.
A) Resource Database
B) Master Database
C) Model Database
D) msdb Database

5. The SQL Server services includes .....................


A) SQL server agent
B) Microsoft distribution transaction coordinator
C) Both a & b
D) None of the above

6. ...................... is a utility to capture a continuous record of server activity and provide auditing capability.
A) SQL server profile
B) SQL server service manager
C) SQL server setup
D) SQL server wizard

7. The query used to remove all references for the pubs and news pubs databases from the system tables is
..........................
A) DROP DATABASE pubs, newpubs;
B) DELETE DATABASE pubs, newpubs;
C) REMOVE DATABASE pubs, newpubs;
D) DROP DATABASE pubs and newpubs;

8. ...................... clause specifies the groups into which output rows are to be placed and, if aggregate
functions are included in the SELECT clause.
A) ORDER BY
B) GROUP
C) GROUP BY
D) GROUP IN

9. .................. are predefined and maintained SQL Server where users cannot assign or directly change the
values.
A) Local Variables
B) Global Variables
C) Assigned Variables
D) Direct Variables

10. Microsoft SQL Server NOT uses which of the following operator category?
A) Bitwise Operator
B) Unary Operator
C) Logical Operator
D) Real Operator

Solved MCQ on Database Backup and Recovery in DBMS set-1

1) Which of the following is not a recovery technique?


A. Deferred update
B. Immediate update
C. Two-phase commit
D. Recovery management

2)Checkpoints are a part of


A. Recovery measures
B. Security measures
C. Concurrency measures
D. Authorization measures

3) ....... deals with soft errors, such as power failures.


A. system recovery
B. media recovery
C. database recovery
D. failure recovery

4) ........... is an essential part of any backup system.


A. Filter
B. Recovery
C. Security
D. Scalability

5) Media recovery deals with ...........


A. disk errors
B. hard errors
C. system errors
D. power failures

6) For a backup/restore system, ............. is a prerequisite for service in a enterprise.


A. Filter
B. Recovery
C. Security
D. Scalability

7) Failure recovery and media recovery fall under ........


A. transaction recovery
B. database recovery
C. system recovery
D. value recovery

8) The .......... consists of the various applications and database that play a role in a backup and recovery
strategy.
A. Recovery Manager environment
B. Recovery Manager suit
C. Recovery Manager file
D. Recovery Manager database

9) In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None

10) A ........... is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalogue?
A. recovery procedure
B. recovery block
C. stored block
D. stored script
11) In log based recovery, the log is sequence of .........
A. filter
B. records
C. blocks
D. numbers

12) The enrolling of a database in a recovery catalogue is called .........


A. set up
B. registration
C. start up
D. enrolment

13) .......... is an alternative of log based recovery.


A. Disk recovery
B. Shadow paging
C. Dish shadowing
D. Crash recovery

14) Most backup and recovery commands in ........... are executed by server sessions.
A. Backup Manager
B. Recovery Manager
C. Backup and Recovery Manager
D. Database Manager

15) ........ systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID

16) An ......... is an exact copy of a single datafile, archived redo log file, or control file.
A. image copy
B. datafile copy
C. copy log
D. control copy

17) .......... known as memory-style error correcting-code(ECC) organization, employs parity bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4

18) The remote backup site is sometimes called the .......... site.
A. primary
B. secondary
C. ternary
D. None of the above

19) EXP command is used ...........


A. to take Backup of the Oracle Database
B. to import data from the exported dump file
C. to create Rollback segments
D. to create Schedule.

20) The simplest approach to introducing redundancy is to duplicate every disk is called .....
A. mirroring
B. imaging
C. copying
D. All of the above

Fundamental of DBMS set-10

1) Which of the following is not a characteristic of a relational database model?


A. Table
B. Tree like structure
C. Complex logical relationship
D. Records

2) Field is otherwise called as ......... of the record


A. data item
B. data type
C. value
D. variable

3) A table can have only one


A. Secondary key
B. Alternate key
C. Unique key
D. Primary key

4) A field can be called as ........... in relation context.


A. random file
B. direct file
C. attribute
D. tuple

5) In the relational modes, cardinality is termed as


A. Number of tuples
B. Number of attributes
C. Number of tables
D. Number of constraints

6) The ........ is used for creating and destroying table, indexes and other forms of structures.
A. data manipulation language
B. data control language
C. transaction control language
D. data definition language

7) The view of total database content is


A. Conceptual view
B. Internal view
C. External view
D. Physical view

8) The ............ refers to the way data is organized in and accessible from DBMS.
A. database hierarchy
B. data organization
C. data sharing
D. data model

9) Architecture of the database can be viewed as


A. two levels
B. four levels
C. three levels
D. one level

10) ........ introduced the relational database rules.


A. Atul kahate
B. James Gossling
C. EF Codd
D. Dennies Rithchie

11) In a relational model, relations are termed as


A. Tuples
B. Attributes
C. Tables
D. Rows

12) When the values in one or more attributes being used as a foreign key must exist in another set of one or
more attributes in another table, we have created a(n) ........
A. transitive dependency
B. insertion anomaly
C. referential integrity constraint
D. normal form
13) In the architecture of a database system external level is the
A. physical level
B. logical level
C. conceptual level
D. view level

14) A functional dependency is a relationship between or among .......


A. tables
B. rows
C. relations
D. attributes

15) Related fields in a database are grouped to form a


A. data file
B. data record
C. menu
D. bank

16) .......... is, a table have more than one set of attributes that could be chosen as the key
A. foreign key
B. integrity key
C. relationship
D. candidate key

17) The database environment has all of the following components except.
A. users
B. separate files
C. database
D. database administrator

18) The operation of eliminating columns in a table done by ........ operation.


A. Restrict
B. Project
C. Union
D. Divide

19) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema

20) ....... is a condition specified on a database schema and restricts the data that can be stored in an
instance of the database.
A. Key Constraint
B. Check Constraint
C. Foreign key constraint
D. integrity constraint

Database Management System and Design


1. The ascending order of a data hierarchy is:
a. bit-byte-record-field-file-database
b. byte-bit-field-record-file-database
c. bit-byte-field-record-file-database
d. bit-byte-file-record-field-database
_____________________________________________________________________________________
2. Which of the following is true of a network structure?
a. t is a physical representation of the data
b. It allows a many-to-many relationship
c. It is conceptually simple
d. It will be dominant data base of the future
_____________________________________________________________________________________
3. Which of the following is a problem of file management system?
a. difficult to update
b. lack of data independence
c. data redundancy
d. program dependence
e. all of above
_____________________________________________________________________________________
4. One data dictionary software package is called
a. DB/DC dictionary
b. TOTAL
c. ACCESS
d. Datapac
e. Data Manager
_____________________________________________________________________________________
5. The function of a database is ...
a. to check all input data
b. to check all spelling
c. to collect and organize input data
d. to output data
_____________________________________________________________________________________
6. What is the language used by most of the DBMSs for helping their users to access data?
a. High level language
b. SQL
c. Query Language
d. 4GL
_____________________________________________________________________________________
7. The model for a record management system might be
a. handwritten list
b. a Rolodex card file
c. a business form
d. all of above
_____________________________________________________________________________________
8. Primitive operations common to all record management system include
a. print
b. sort
c. look-up
d. all of above
_____________________________________________________________________________________
9. In a large DBMS
a. each user can "see" only a small part of the entire database
b. each subschema contains every field in the logical schema
c. each user can access every subschema
_____________________________________________________________________________________
10. Information can be transferred between the DBMS and a
a. spreadsheet program
b. word processor program
c. graphics program
d. all of the above
_____________________________________________________________________________________
11. Which of the following fields in a student file can be used as a primary key?
a. class
b. Social Security Number
c. GPA
d. Major
_____________________________________________________________________________________
12. Which of the following is not an advantage of the database approach?
a. Elimination of data redundancy
b. Ability of associate deleted data
c. increased security
d. program/data independence
e. all of the above
_____________________________________________________________________________________
13. Which of the following contains a complete record of all activity that affected the contents of a database
during a certain period of time?
a. report writer
b. query language
c. data manipulation language
d. transaction log
e. none of the above
_____________________________________________________________________________________
14. In the DBMS approach, application programs perform the
a. storage function
b. processing functions
c. access control
d. all of the above
e. none of the above
_____________________________________________________________________________________
15. A set of programs that handle a firm's database responsibilities is called
a. database management system (DBMS)
b. database processing system (DBPS)
c. data management system (DMS)
d. all of above
_____________________________________________________________________________________
16. Which is the make given to the database management system which is able to handle full text data,
image data, audio and video?
a. full media
b. graphics media
c. multimedia
d. hypertext
_____________________________________________________________________________________
17. A record management system
a. can handle many files of information at a time
b. can be used to extract information stored in a computer file
c. always uses a list as its model
d. both a and b
_____________________________________________________________________________________
18. A command that lets you change one or more fields in a record is
a. insert
b. modify
c. lookup
d. none of above
_____________________________________________________________________________________
19. A transparent DBMS
a. can not hide sensitive information from users
b. keeps its logical structure hidden from users
c. keeps its physical structure hidden from users
d. both b and c
_____________________________________________________________________________________
20. A file produced by a spreadsheet
a. is generally stored on disk in an ASCII text format
b. can be used as is by the DBMS
c. both a and b
d. none of the above
_____________________________________________________________________________________
21. Which of the following is not true of the traditional approach to information processing?
a. there is common sharing of data among the various applications
b. it is file oriented
c. programs are dependent on the file
d. it is inflexible
e. all of the above are true
_____________________________________________________________________________________
22. Which of the following hardware component is the most important to the operation of database
management system?
a. high resolution video display
b. printer
c. high speed, large capacity disk
d. plotter
e. mouse
_____________________________________________________________________________________
23. Generalized database management system do not retrieve data to meet routine request
a. true
b. false
_____________________________________________________________________________________
24. Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is available
c. only a few transactions are involved
d. all of the above
e. none of the above
_____________________________________________________________________________________ 25.
Large collection of files is called
a. fields
b. records
c. database
d. sectors
_____________________________________________________________________________________
26. Which of the following is not a relational database?
a. dBase IV
b. 4th Dimension
c. FoxPro
d. Reflex
_____________________________________________________________________________________
27. In order to use a record management system
a. you need to understand the low level details of how information is stored
b. you need to understand the model the record management system uses
c. bothers a and b
d. none of the above
_____________________________________________________________________________________
28. Sort/Report generators
a. are faster than index/report generators
b. require more disk space than indexed/report generators
c. do not need to sort before generating report
d. both a and b
_____________________________________________________________________________________
29. If a piece of data is stored in two places in the database, then
a. storage space is wasted
b. changing the data in one spot will cause data inconsistency
c. in can be more easily accessed
d. both and b
_____________________________________________________________________________________
30. An audit trail
a. is used to make backup copies
b. is the recorded history of operations performed on a file
c. can be used to restore lost information
d. none of the aobve
_____________________________________________________________________________________
31. The relational database environment has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database
_____________________________________________________________________________________
32. Database management systems are intended to
a. eliminate data redundancy
b. establish relationship among records in different files
c. manage file access
d. maintain data integrity
e. all of the above
_____________________________________________________________________________________
33. One approach to standardization storing of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above
_____________________________________________________________________________________
34. The language used application programs to request data from the DBMS is
referred to as the
a. DML
b. DDL
c. query language
d. any of the above
e. none of the above
_____________________________________________________________________________________
35. The highest level in the hierarchy of data organization is called
a. data bank
b. data base
c. data file
d. data record
_____________________________________________________________________________________
36. Choose the RDBMS which supports full-fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress
_____________________________________________________________________________________
37. Report generators are used to
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c
_____________________________________________________________________________________
38. A form defined
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above
_____________________________________________________________________________________
39. A top-to-bottom relationship among the items in a database is established by a
a. hierarchical schema
b. network schema
c. relational schema
d. all of the above
_____________________________________________________________________________________
40. The management information system (MIS) structure with one main computer system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure
_____________________________________________________________________________________
41. The database administration function includes
Application programming
Computer operations management
Database access planning
All of the above
_____________________________________________________________________________________
42. Goals for the design of the logical schema include
Being able to access data efficiently
Being able to construct queries easily
Avoiding data in consistency
All of the above
_____________________________________________________________________________________
43. The logical data structure with one to many relationship is a
Network
Chain
Tree
All of these
_____________________________________________________________________________________
44. E-R model uses this symbol to represent weak entity set
Dotted rectangle
Diamond
Doubly outlined rectangle
None of these
_____________________________________________________________________________________
45. The problem that occurs when one transaction updates a database item and then the transaction fails for
some reason is ________.
Temporary Select Problem
Temporary Modify Problem
Dirty Read Problem
None
_____________________________________________________________________________________
46. A data model is a collection of conceptual tools for describing
Data and data relationships
Data semantics and consistency constraints
Data, data relationship, data semantics and consistency constraints
None of the above
_____________________________________________________________________________________
47. In SQL, which command is used to select data in rows and column from one or more tables?
Choose
Select
List
Browse
_____________________________________________________________________________________
48. In a B tree of order 5, the following keys are inserted as follows : 7, 8, 1, 4, 13, 20, 2, 6 and 5. How many
elements are present in the root of the tree ?
1
2
3
4
_____________________________________________________________________________________
49. An entity relationship diagram is a tool to represent
Data model
Process model
Event model
Customer model
_____________________________________________________________________________________
50. SET concept is used in
Network Model
Hierarchical Model
Relational Model
None of these
_____________________________________________________________________________________
51. The method of access which uses key transformation is known as
Direct
Hash
Random
Sequential
_____________________________________________________________________________________
52. Which of the following operation is used if we are interested in only certain columns of a table?
Projection
Selection
Union
Join
_____________________________________________________________________________________
53. If a relation scheme is in BCNF then it is also in
1NF
4NF
3NF
None of these
_____________________________________________________________________________________
54. In a Hierarchical model records are organized as
Graph
List
Links
Tree
_____________________________________________________________________________________
55. The DBMS that is most difficult to use is ________ .
Microsoft s SQL Server
Microsoft s Access
IBM s DB2
Oracle Corporation’s Oracle
_____________________________________________________________________________________
56. A computer file contains several records. What does each record contain?
Bytes
Words
Fields
Database
_____________________________________________________________________________________
57. Which of the following is not a consequence of concurrent operations?
Lost update problem
Update anomaly
Unrepeatable read
Dirty read
_____________________________________________________________________________________
58. The way a particular application views the data from the database that the application uses is a
Module
Relational model
Schema
Sub schema
_____________________________________________________________________________________
59. There exists a construct which returns a value ‘true’ if the argument subquery is:
empty
non-empty
in error
none of the above
_____________________________________________________________________________________
60. How many primitive operators of relation algebra as proposed by codd
2
3
4
6
_____________________________________________________________________________________
61. Which of the following relational algebra operations do not require the participating tables to be union
compatible?
Union
Intersection
Difference
Join
_____________________________________________________________________________________
62. A table joined with itself is called
Join
Self Join
Outer Join
Equi Join
_____________________________________________________________________________________
63. _______is a program or set of program that interacts with the database at some point in its execution
A database system
A database application
Both
None
_____________________________________________________________________________________
64. Match the following :
I. 2 NF (a) transitive dependencies eliminated
II. 3 NF (b) multivalued attribute removed
III. 4 NF (c) contain no partial functional dependencies
IV. 5 NF (d) contains no join dependency
Codes ( I II III IV )
(a) (c) (b) (d)
(d) (a) (b) (c)
(c) (d) (a) (b)
(d) (b) (a) (c)
_____________________________________________________________________________________
65. Cartesian product in relational algebra is
Unary operator
Binary operator
Ternary operator
not defined
_____________________________________________________________________________________
66. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
Distinct values
Cannot have NULL
Both (A) & (B)
Same as primary key
_____________________________________________________________________________________
67. Which are the two ways in which entities can participate in a relationship?
Passive and active
Total and partial
Simple and Complex
All of the above
_____________________________________________________________________________________
68. Goals for the design of the logical schema include
Avoiding data inconsistency
Being able to construct queries easily
Being able to access data efficiently
All of the above
_____________________________________________________________________________________
69. Table is synonymous with the term
Record
Relation
Column
Field
_____________________________________________________________________________________
70. The file organization that provides very fast access to any arbitrary record of a file is
Ordered file
Unordered file
Hashed file
B tree
_____________________________________________________________________________________
71. An entity set that does not have sufficient attributes to form a primary key is a
Strong entity set
Weak entity set
Simple entity set
Primary entity set
_____________________________________________________________________________________
72. Key to represent relationship between tables is called
Primary key
Secondary Key
Foreign Key
None of these
_____________________________________________________________________________________
73. NULL is
The same as 0 for integer
The same as blank for character
The same as 0 for integer and blank for character
Not a value
_____________________________________________________________________________________
74. In E-R Diagram derived attribute are represented by
Ellipse
Dashed ellipse
Rectangle
Triangle
_____________________________________________________________________________________
75. A hash table has space for 75 records, then the probability of collision before the table is 6% full.
.15
.20
.25
.30
_____________________________________________________________________________________
76. The result of the UNION operation between R1 and R2 is a relation that includes
All the tuples of R1
All the tuples of R2
All the tuples of R1 and R2
All the tuples of R1 and R2 which have common columns
_____________________________________________________________________________________
77. An index is clustered, if
it is on a set of fields that form a candidate key
it is on a set of fields that include the primary key.
the data records of the file are organized in the same order as the data entries of the index.
the data records of the file are organized not in the same order as the data entries of the index.
_____________________________________________________________________________________
78. The basic variants of time-stampbased method of concurrency control are
Total time stamp-ordering
Partial time stamp ordering
Multiversion Time stamp ordering
All of the above
_____________________________________________________________________________________
79. Shadow paging has
No redo
No undo
Redo but no undo
Neither redo nor undo
_____________________________________________________________________________________
80. Which construct in SQL is used to test whether a subquery has any tuples in its result?
UNIQUE
EXISTS
GROUP BY
EXCEPT
_____________________________________________________________________________________
81. The rule that a value of a foreign key must appear as a value of some specific table is called a
Referential constraint
Index
Integrity constraint
Functional dependency
_____________________________________________________________________________________
82. In an E-R diagram an entity set is representing by a
Rectangle
Ellipse
Diamond box
Circle
_____________________________________________________________________________________
83. An entity instance is a single occurrence of on
Entity type
Relational type
Entity and relationship type
None of these
_____________________________________________________________________________________
84. Relational Algebra is
Data Definition Language
Meta Language
Procedural query Language
None of the above
_____________________________________________________________________________________
85. Which of the following is a valid SQL type?
Character
Numeric
Float
All of the above
_____________________________________________________________________________________
86. ODBC stands for
Object Database Connectivity
Oral Database Connectivity
Oracle Database Connectivity
Open Database Connectivity
_____________________________________________________________________________________
87. The relational model feature is that there
Is no need for primary key data?
Is much more data independence than some other database models.
Are explicit relationships among records.
Are tables with many dimensions?
_____________________________________________________________________________________
89. Multivalued dependency among attribute is checked at which level?
2NF
3NF
4NF
5NF
_____________________________________________________________________________________
90. The database schema is written in
HLL
DML
DDL
DCL

You might also like