Database: Management System
Database: Management System
Database: Management System
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
_____________________________________________________________________________________
2. …………… database is used as template for all databases created.
A) Master
B) Model
C) Tempdb
D) None of the above
_____________________________________________________________________________________
3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be
assigned to each data items. This is referred to as
A) Data Security
B) Domain access
C) Data Control
D) Domain Integrity
_____________________________________________________________________________________
4. ………………….. operator is basically a join followed by a project on the attributes of first relation.
A) Join
B) Semi-Join
C) Full Join
D) Inner Join
_____________________________________________________________________________________
5. Which of the following is not a binary operator in relational algebra?
A) Join
B) Semi-Join
C) Assignment
D) Project
_____________________________________________________________________________________
6. Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the
consistency and validity of the database.
A) Increases
B) Skips
C) Does not reduce
D) Reduces
_____________________________________________________________________________________
7. Which of the following is/are the DDL statements?
A) Create
B) Drop
C) Alter
D) All of the above
_____________________________________________________________________________________
8. In snapshot, …………………. clause tells oracle how long to wait between refreshes.
A) Complete
B) Force
C) Next
D) Refresh
_____________________________________________________________________________________
9. ……………… defines rules regarding the values allowed in columns and is the standard mechanism for
enforcing database integrity.
A) Column
B) Constraint
C) Index
D) Trigger
_____________________________________________________________________________________
10. For like predicate which of the following is true.
i) % matches zero of more characters.
ii) _ matches exactly one character.
A) i-only
B) ii-only
C) Both of them
D) None of them
_____________________________________________________________________________________
11. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in
a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
A) All of the above
_____________________________________________________________________________________
12. In SQL, the CREATE TABLESPACE is used
A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data
files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
D) All of the above
_____________________________________________________________________________________
13. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
_____________________________________________________________________________________
14. Which of the following is TRUE for the System Variable $date$?
A) Can be assigned to a global variable.
B) Can be assigned to any field only during design time.
C) Can be assigned to any variable or field during run time.
D) Can be assigned to a local variable.
_____________________________________________________________________________________
15. What are the different events in Triggers?
A) Define, Create
B) Drop, Comment
C) Insert, Update, Delete
D) Select, Commit
_____________________________________________________________________________________
16. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?
A) Data Definition Language
B) Data Manipulation Language
C) Data Described Language
D) Data Retrieval Language
_____________________________________________________________________________________
17. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints
A) 6789
B) 2345
C) 1234
D) 456789
_____________________________________________________________________________________
18. Which of the following SQL command can be used to modify existing data in a database table?
A) MODIFY
B) UPDATE
C) CHANGE
D) NEW
_____________________________________________________________________________________
19. When SQL statements are embedded inside 3GL, we call such a program as ..........
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
_____________________________________________________________________________________
20. ................ provides option for entering SQL queries as execution time, rather than at the development
stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL
_____________________________________________________________________________________
21) The RDBMS terminology for a row is
A. tuple
B. relation
C. attribute
D. degree
_____________________________________________________________________________________
22) To change column value in a table the ......... command can be used.
A. create
B. insert
C. alter
D. update
_____________________________________________________________________________________
23) The full form of DDL is
A. Dynamic Data Language
B. Detailed Data Language
C. Data Definition Language
D. Data Derivation Language
_____________________________________________________________________________________
24) To pass on granted privileges to other user the ...... clause is used
A. create option
B. grant option
C. update option
D. select option
_____________________________________________________________________________________
25) A set of possible data values is called
A. attribute
B. degree
C. tuple
D. domain
_____________________________________________________________________________________
26) ......... is critical in formulating database design.
A. row column order
B. number of tables
C. functional dependency
D. normalizing
_____________________________________________________________________________________
27) A primary key if combined with a foreign key creates
A. Parent-Child relationship between the tables that connect them
B. Many to many relationship between the tables that connect them
C. Network model between the tables that connect them
D. None of the above
_____________________________________________________________________________________
28) A ............. represents the number of entities to which another entity can be associated
A. mapping cardinality
B. table
C. schema
D. information
_____________________________________________________________________________________
29) Which two files are used during operation of the DBMS
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
_____________________________________________________________________________________
30) A ........... is a set of column that identifies every row in a table.
A. composite key
B. candidate key
C. foreign key
D. super key
_____________________________________________________________________________________
31. The relational model is based on the concept that data is organized and stored in two-dimensional tables
called …….
A) Fields
B) Records
C) Relations
D) Keys
_____________________________________________________________________________________
32. ……………….. contains information that defines valid values that are stored in a column or data type.
A) View
B) Rule
C) Index
D) Default
_____________________________________________________________________________________
33. Which of the syntax is correct for insert statement?
i) insert into <table_name> values <list of values>
ii) insert into <table_name> (column list) values <list of values>
A) i-only
B) ii-only
C) Both of them
D) None of them
_____________________________________________________________________________________
34. ………………. First proposed the process of normalization.
A) Edgar. W
B) Edgar F. Codd
C) Edward Stephen
D) Edward Codd
_____________________________________________________________________________________
35. For using a specific database …………… command is used.
A) use database
B) database name use
C) Both A &B
D) None of them
_____________________________________________________________________________________
36. Which of the following is not comparison operator?
A) <>
B) <
C) =<
D) >=
_____________________________________________________________________________________
37. An outstanding functionality of SQL is its support for automatic ………… to the target data.
A) programming
B) functioning
C) navigation
D) notification
_____________________________________________________________________________________
38. ………………… is a special type of integrity constraint that relates two relations & maintains consistency
across the relations.
A) Entity Integrity Constraints
B) Referential Integrity Constraints
C) Domain Integrity Constraints
D) Domain Constraints
E) Key Constraints
_____________________________________________________________________________________
39. ……………..specifies a search condition for a group or an aggregate.
A) GROUP BY Clause
B) HAVING Clause
C) FROM Clause
D) WHERE Clause
_____________________________________________________________________________________
40. Drop Table cannot be used to drop a table referenced by a …………… constraint.
A) Local Key
B) Primary Key
C) Composite Key
D) Foreign Key
_____________________________________________________________________________________
41. Reflexivity property says that X - Y is true if Y is ………………….
A) Subset of X
B) Null set of X
C) Super set of Y
D) Subset of Y
_____________________________________________________________________________________
42. Anything that affects the database schema is a part of
A) DML
B) DCL
C) DDL
D) All of the above
_____________________________________________________________________________________
43. An instance of a relation is a time varying set of ………………….
A) Tuples
B) Rows
C) Both of them
D) None of them
_____________________________________________________________________________________
44. In the ………………… mode any record in the file can be accessed at random
A) Sequential access
B) Random access
C) Standard access
D) Source access
_____________________________________________________________________________________
45. Which can be used to delete all the rows if a table?
A) Delete * from table_name
B) Delete from table_name
C) Delete table_name
D) all rows cannot be deleted at a time.
_____________________________________________________________________________________
46. Which if the following is not the type of data integrity.
A) Key integrity
B) Domain integrity
C) Entity integrity
D) Referential integrity
_____________________________________________________________________________________
47. 4NF stands for ..
A) Fourth Normal File
B) Fourth Normal Form
C) Fourth Normal Fraction
D) Fourth Negative File
_____________________________________________________________________________________
48. A ……………… allows to make copies of the database periodically to help in the cases of crashes &
disasters.
A) Recovery utility
B) Backup Utility
C) Monitoring utility
D) Data loading utility
_____________________________________________________________________________________
49. ………………. Allows definitions and query language statements to be entered; query results are formatted
and displayed.
A) Schema Processor
B) Query Processor
C) Terminal Interface
D) None of the above
_____________________________________________________________________________________
50. The main task carried out in the …………… is to remove repeating attributes to separate tables.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Fourth Normal Form
_____________________________________________________________________________________
51. ............... joins are SQL server default
A) Outer
B) Inner
C) Equi
D) None of the above
_____________________________________________________________________________________
52. The ..................... is essentially used to search for patterns in target string.
A) Like Predicate
B) Null Predicate
C) In Predicate
D) Out Predicate
_____________________________________________________________________________________
53. Which of the following is/are the Database server functions?
i) Data management ii) Transaction management
iii) Compile queries iv) Query optimization
A) i-true, ii-false
B) i-false, ii-true
C) i-true, ii-true
D) i-false, ii-false
_____________________________________________________________________________________
85. DCL stands for
A) Data Control Language
B) Data Console Language
C) Data Console Level
D) Data Control Level
_____________________________________________________________________________________
86. …………………… is the process of organizing data into related tables.
A) Normalization
B) Generalization
C) Specialization
D) None of the above
_____________________________________________________________________________________
87. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which
are part of some another entity.
A) Weak entity
B) Strong entity
C) Non attributes entity
D) Dependent entity
_____________________________________________________________________________________
88. …………….. is the complex search criteria in the where clause.
A) Sub string
B) Drop Table
C) Predict
D) Predicate
_____________________________________________________________________________________
89. ………………… is preferred method for enforcing data integrity
A) Constraints
B) Stored Procedure
C) Triggers
D) Cursors
_____________________________________________________________________________________
90. The number of tuples in a relation is called its …………. While the number of attributes in a relation is
called it’s ………………..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
_____________________________________________________________________________________
91) The language that requires a user to specify the data to be retrieved without specifying exactly how to
get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
_____________________________________________________________________________________
92) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
_____________________________________________________________________________________
93) The database schema is written in
A. HLL
B. DML
C. DDL
D. DCL
_____________________________________________________________________________________
94) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
_____________________________________________________________________________________
95) The relational model feature is that there
A. is no need for primary key data
B. is much more data independence than some other database models
C. are explicit relationships among records.
D. are tables with many dimensions
_____________________________________________________________________________________
96) Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
_____________________________________________________________________________________
97) Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
_____________________________________________________________________________________
98) Which database level is closest to the users?
A. External
B. Internal
C. Physical
D. Conceptual
_____________________________________________________________________________________
99) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
_____________________________________________________________________________________
100) ........ data type can store unstructured data
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
_____________________________________________________________________________________
1. Which of the following query is correct for using comparison operators in SQL?
A) SELECT sname, coursename FROM studentinfo WHERE age>50 and <80;
B) SELECT sname, coursename FROM studentinfo WHERE age>50 and age <80;
C) SELECT sname, coursename FROM studentinfo WHERE age>50 and WHERE age<80;
D) None of the above
_____________________________________________________________________________________
2.How to select all data from studentinfo table starting the name from letter 'r'?
A) SELECT * FROM studentinfo WHERE sname LIKE 'r%';
B) SELECT * FROM studentinfo WHERE sname LIKE '%r%';
C) SELECT * FROM studentinfo WHERE sname LIKE '%r';
D) SELECT * FROM studentinfo WHERE sname LIKE '_r%';
_____________________________________________________________________________________
3. Which of the following SQL query is correct for selecting the name of staffs from 'tblstaff' table where
salary is 15,000 or 25,000?
A) SELECT sname from tblstaff WHERE salary IN (15000, 25000);
B) SELECT sname from tblstaff WHERE salary BETWEEN 15000 AND 25000;
C) Both A and B
D) None of the above
_____________________________________________________________________________________
4. The SELECT statement, that retrieves all the columns from empinfo table name starting with d to p is
..........................
A) SELECT ALL FROM empinfo WHERE ename like '[d-p]%';
B) SELECT * FROM empinfo WHERE ename is '[d-p]%';
C) SELECT * FROM empinfo WHERE ename like '[p-d]%';
D) SELECT * FROM empinfo WHERE ename like '[d-p]%';
_____________________________________________________________________________________
5. Select a query that retrieves all of the unique countries from the student table?
A) SELECT DISTINCT coursename FROM studentinfo;
B) SELECT UNIQUE coursename FROM studentinfo;
C) SELECT DISTINCT coursename FROM TABLE studentinfo;
D) SELECT INDIVIDUAL coursename FROM studentinfo;
_____________________________________________________________________________________
6. Which query is used for sorting data that retrieves the all the fields from empinfo table and listed them in
the ascending order?
A) SELECT * FROM empinfo ORDER BY age;
B) SELECT * FROM empinfo ORDER age;
C) SELECT * FROM empinfo ORDER BY COLUMN age;
D) SELECT * FROM empinfo SORT BY age;
_____________________________________________________________________________________
7. Select the right statement to insert values to the stdinfo table.
A) INSERT VALUES ("15", "Hari Thapa", 45, 5000) INTO stdinfo;
B) INSERT VALUES INTO stdinfo ("15", "Hari Thapa", 45, 5000);
C) INSERT stdinfo VALUES ("15", "Hari Thapa", 45, 5000);
D) INSERT INTO stdinfo VALUES ("15", "Hari Thapa", 45, 5000);
_____________________________________________________________________________________
8. How to Delete records from studentinfo table with name of student 'Hari Prasad'?
A) DELETE FROM TABLE studentinfo WHERE sname='Hari Prasad';
B) DELETE FROM studentinfo WHERE sname='Hari Prasad';
C) DELETE FROM studentinfo WHERE COLUMN sname='Hari Prasad';
D) DELETE FROM studentinfo WHERE sname LIKE 'Hari Prasad';
_____________________________________________________________________________________
9. Constraint checking can be disabled in existing ............. and .............. constraints so that any data you
modify or add to the table is not checked against the constraint.
A) CHECK, FOREIGN KEY
B) DELETE, FOREIGN KEY
C) CHECK, PRIMARY KEY
D) PRIMARY KEY, FOREIGN KEY
_____________________________________________________________________________________
10. ..................... joins two or more tables based on a specified column value not equaling a specified column
value in another table.
A) OUTER JOIN
B) NATURAL JOIN
C) NON-EQUIJOIN
D) EQUIJOIN
MCQ of PL/SQL and Oracle With Answer set -2
2. .............................. is used to define code that is executed / fired when certain actions or event occur.
A) Cursor
B) Trigger
C) Keywords
D) Replace
3. ................. provide a way for your program to select multiple rows of data from the database and then
process each row individually.
A) PL/SQL Cursors
B) PL/SQL Trigger
C) PL/SQL Select
D) PL/SQL Process
4. ........................... cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands.
A) Implicit
B) Explicit
C) Internal
D) External
5. ......................... cursors are declared and used by the user to process multiple row, returned by SELECT
statement.
A) Implicit
B) Explicit
C) Internal
D) External
6. ....................... contain a pointer that keeps track of current row being accessed, which enables your
program to process the rows at a time.
A) Tracker
B) Cursor
C) Accesser
D) Trigger
7. ....................... a cursor enables you to define the cursor and assign a name to it.
A) Declearing
B) Stating
C) Extracting
D) Importing
8. In ................... the cursor advances to the next row in the active set each time the fetch command is
executed.
A) recreating process
B) redefining process
C) iterative process
D) None of the above
9. A ......................... is a database object that groups logically related PL/SQL types, objects and
subprograms.
A) Module
B) Package
C) Body
D) Name
_____________________________________________________________________________________
10. In the PL/SQL, the package specification contains ....................... declarations.
A) Public
B) Private
C) Friend
D) Protected
_____________________________________________________________________________________
1. ........................ is a procedural extension of Oracle - SQL that offers language constructs similar to those in
imperative programming languages.
A) SQL
B) PL/SQL
C) Advanced SQL
D) PQL
2. .................... combines the data manipulating power of SQL with the data processing power of Procedural
languages.
A) PL/SQL
B) SQL
C) Advanced SQL
D) PQL
3. ................... has made PL/SQL code run faster without requiring any additional work on the part of the
programmer.
A) SQL Server
B) My SQL
C) Oracle
D) SQL Lite
6. A .................... is an explicit numeric, character, string or Boolean value not represented by an identifier.
A) Comments
B) Literals
C) Delimiters
D) Identifiers
9. In ........................, the management of the password for the account can be handled outside of oracle such
as operating system.
A) Database Authentication
B) Operating System Authentication
C) Internal Authentication
D) External Authentication
10. In ............................ of Oracle, the database administrator creates a user account in the database for
each user who needs access.
A) Database Authentication
B) Operating System Authentication
C) Internal Authentication
D) External Authentication
2. SQL Server 2005 NOT includes the following system database .............
A) tempdb Database
B) Master Database
C) Model Database
D) sqldb Database
4. ..................... is a read-only database that contains system objects that are included with SQL Server 2005.
A) Resource Database
B) Master Database
C) Model Database
D) msdb Database
6. ...................... is a utility to capture a continuous record of server activity and provide auditing capability.
A) SQL server profile
B) SQL server service manager
C) SQL server setup
D) SQL server wizard
7. The query used to remove all references for the pubs and news pubs databases from the system tables is
..........................
A) DROP DATABASE pubs, newpubs;
B) DELETE DATABASE pubs, newpubs;
C) REMOVE DATABASE pubs, newpubs;
D) DROP DATABASE pubs and newpubs;
8. ...................... clause specifies the groups into which output rows are to be placed and, if aggregate
functions are included in the SELECT clause.
A) ORDER BY
B) GROUP
C) GROUP BY
D) GROUP IN
9. .................. are predefined and maintained SQL Server where users cannot assign or directly change the
values.
A) Local Variables
B) Global Variables
C) Assigned Variables
D) Direct Variables
10. Microsoft SQL Server NOT uses which of the following operator category?
A) Bitwise Operator
B) Unary Operator
C) Logical Operator
D) Real Operator
8) The .......... consists of the various applications and database that play a role in a backup and recovery
strategy.
A. Recovery Manager environment
B. Recovery Manager suit
C. Recovery Manager file
D. Recovery Manager database
9) In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None
10) A ........... is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalogue?
A. recovery procedure
B. recovery block
C. stored block
D. stored script
11) In log based recovery, the log is sequence of .........
A. filter
B. records
C. blocks
D. numbers
14) Most backup and recovery commands in ........... are executed by server sessions.
A. Backup Manager
B. Recovery Manager
C. Backup and Recovery Manager
D. Database Manager
15) ........ systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID
16) An ......... is an exact copy of a single datafile, archived redo log file, or control file.
A. image copy
B. datafile copy
C. copy log
D. control copy
17) .......... known as memory-style error correcting-code(ECC) organization, employs parity bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4
18) The remote backup site is sometimes called the .......... site.
A. primary
B. secondary
C. ternary
D. None of the above
20) The simplest approach to introducing redundancy is to duplicate every disk is called .....
A. mirroring
B. imaging
C. copying
D. All of the above
6) The ........ is used for creating and destroying table, indexes and other forms of structures.
A. data manipulation language
B. data control language
C. transaction control language
D. data definition language
8) The ............ refers to the way data is organized in and accessible from DBMS.
A. database hierarchy
B. data organization
C. data sharing
D. data model
12) When the values in one or more attributes being used as a foreign key must exist in another set of one or
more attributes in another table, we have created a(n) ........
A. transitive dependency
B. insertion anomaly
C. referential integrity constraint
D. normal form
13) In the architecture of a database system external level is the
A. physical level
B. logical level
C. conceptual level
D. view level
16) .......... is, a table have more than one set of attributes that could be chosen as the key
A. foreign key
B. integrity key
C. relationship
D. candidate key
17) The database environment has all of the following components except.
A. users
B. separate files
C. database
D. database administrator
19) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
20) ....... is a condition specified on a database schema and restricts the data that can be stored in an
instance of the database.
A. Key Constraint
B. Check Constraint
C. Foreign key constraint
D. integrity constraint