All Mcqs

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

MCQ’S

1. Which of the following enables us to view data from a table based on specific criterion.
a. Form
b. Query
c. Macro
d. Report
2. Which of the following is example of object based logical model?
a. Relational Model
b. Hierarchical Model
c. Network Model
d. Entity Relational Model
3. The attribute name could be structured as an attribute consisting of first name, middle initial,
and last name. This type of attribute is called
a. Simple attribute
b. Composite attribute
c. Multivalued attribute
d. Derived attribute
4. Data integrity means:
a. Providing first access to stored data
b. Ensuring correctness and consistency of data
c. Providing data sharing
d. None of the above
5. The select project, and rename operations are called_______.
a. Binary operations
b. Ternary operations
c. Unary operations
d. None of the above
6. What is ACID properties of Transactions?
a. Atomicity, Consistency, Isolation, Database
b. Atomicity, Consistency, Isolation, Durability
c. Atomicity, Consistency, Inconsistent, Durability
d. Automatically, Concurrency, Isolation, Durability
7. Functional Dependencies are the types of constraints that are based on_____.
a. Key
b. Key revisited
c. Superset key
d. None of the mentioned
8. Relation R1 has 10 tuples and 5 attributes. Relation R2 has 0 tuples and 7 attributes. When a
CROSS JOIN is achieved between R1 and R2, how many tuples would the resultant set have?
a. 28
b. 10
c. 0
d. 35
9. Which are the join types in join condition:
a. Cross join
b. Natural join
c. Join with USING clause
d. All of the mentioned
10. There are two functional dependencies with the same set of attributes on the left side of the
arrow:
A->BC
A->B
This can be combined as
a. A->BC
b. A->B
c. B->C
d. None of the mentioned
11. If you were collecting and storing information about your music collection a (n) ______
a. Relation
b. Entity
c. Instance
d. Attribute
12. In Database design Data model that is widely used is
a. Semistructured data model
b. Object-based Data model
c. Relational model
d. Entity-Relational model

1. A functional dependency is a relationship between or among

A. Entities
B. Rows
C. Attributes
D. Tables

2. The database design prevents some data from being stored due to _______.

A. Deletion anomalies
B. Insertion anomalies
C. Update anomalies
D. Selection anomalies
3. If one attribute is determinant of second, which in turn is determinant of third, then the relation
cannot be:
A. Well-structured
B. 1NF
C. 2NF
D. 3NF

4.Choose the correct processing technique for the given statements.


Identify correlation between salary structure and policies sold made by Insurance agents in an
organization.
A. OLTP
B. OLAP
C. OLAM
D. None of the above

5. In order to maintain transactional integrity and database consistency, what technology does a DBMS
deploy?
a) Triggers
b) Pointers
c) Locks
d) Cursors
6. A lock that allows concurrent transactions to access different rows of the same table is known as a
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock

7. Which of the following are introduced to reduce the overheads caused by the log-based recovery?
a) Checkpoints
b) Indices
c) Deadlocks
d) Locks

8. Which of the following is the block that is not permitted to be written back to the disk?
a) Dead code
b) Read only
c) Pinned
d) Zapped

9. Designers use which of the following to tune the performance of systems to support time-critical
operations?
a) Denormalization
b) Redundant optimization
c) Optimization
d) Realization

10. 10. Thus a _______ of course data gives the values of all attributes, such as title and department, of
all courses at a particular point in time.
a) Instance
b) Snapshot
c) Both Instance and Snapshot
d) All of the mentioned.

1. To include integrity constraint in an existing relation use :


a) Create table
b) Modify table
c) Alter table
d) Drop table

2. Which of the following is not an integrity constraint?


a) Not null
b) Positive
c) Unique
d) Check ‘predicate’

3. Foreign key is the one in which the ________ of one relation is referenced in another relation.
a) Foreign key
b) Primary key
c) References
d) Check constraint

4. Domain constraints, functional dependency and referential integrity are special forms of _________
a) Foreign key
b) Primary key
c) Assertion
d) Referential constraint

5. Which of the following is the right syntax for the assertion?


a) Create assertion ‘assertion-name’ check ‘predicate’;
b) Create assertion check ‘predicate’ ‘assertion-name’;
c) Create assertions ‘predicates’;
d) All of the mentioned

6. Dates must be specified in the format


a) mm/dd/yy
b) yyyy/mm/dd
c) dd/mm/yy
d) yy/dd/mm

7. The user defined data type can be created using


a) Create datatype
b) Create data
c) Create definetype
d) Create type

8. Which of the following is used to store movie and image files?


a) Clob
b) Blob
c) Binary
d) Image

9. Which of the following is used to denote the selection operation in relational algebra?
a) Pi
b) Sigma
c) Lambda
d) Omega

10.The ___________ operation, denoted by −, allows us to find tuples that are in one relation but are
not in another.
a) Union
b) Set-difference
c) Difference
d) Intersection

1. Which is the data model

a. Relational
b. Object-Relational
c. Network
d. All of these

2. Which is not the feature of database:

a. Data redundancy
b. Independence
c. Flexibility
d. Data Integrity
3. Which is the type of data independence:

a. Physical data independence


b. Logical data independence
c. Both
d. None of these

4. Which is the advantage of database:

a. Prevents Data redundancy


b. Restricts unauthorized access
c. Persistent storage
d. Backup and recovery
e. Integrity Constraints
f. All of these

5. Which is the database language:

a. C
b. C++
c. SQL
d. None of these

6. Which person is responsible for overall activities for database:

a. Database designer
b. Database analyst
c. Database Administrator
d. Database manager

7. Which level of database is viewed by user:

a. Internal level
b. External Level
c. Conceptual Level
d. All of these
8. Internal level has:

a. Individual Users View of the database


b. Community view of the database
c. Physical Representation of the database
d. All of these

9. Which is the component of database management system:

a. Query Language
b. Database Manager
c. File manager
d. All of these

10. In database records are called:

a. Attributes
b. Entity
c. Tuples
d. Relations
1. The objective of database management system include:
a) Database Integrity
b) Data Integration
c) Availability
d) All of above
2. For each attribute of relation, there is a set of permitted values, called the
a) Domain of the attribute
b) Relation of the attribute
c) Set of the attribute
d) Schema of the attribute
3. Which of the following represents a collection of concepts that are used to describe the
structure of a database?
a) Data warehouse
b) Data model
c) Data structure
d) Data type
4. The most commonly used database model in current database model in current database
development is:
a) Relational
b) Hierarchical
c) Network
d) Object-oriented
5. Duplicate data in multiple data file is:
a) Data redundancy
b) Data multiplication
c) Data Integration
d) None of these
6. A virtual table that is constructed from other tables is called
a) Table
b) View
c) Relation
d) Tuple
7. SQL is used for:
a) Data definition
b) Data manipulation
c) Data control
d) All of these
8. A table should have
a) Primary key
b) Secondary key
c) Composite key
d) Sort key
9. A key is:
a) A field that identifies a record
b) The most important field in a record
c) The first field of a relation
d) The last field of a relation
10. Which of the following describe the primary key?
a) It must unique
b) It helps in indexing of a large database
c) It makes sorting quicker
d) All of these
11. A table in which the foreign key is found is called
a) Parent table
b) Dependent table
c) View
d) Tuple
12. Which of the following defines the nature of the relationship?
a) Modality
b) Decision type
c) Both a & b
d) None of these
13. A relationship between countries and capitals is an example relationship
a) One-to-One
b) One-to-Many
c) Many-to-Many
d) Many-to-One
14. Which of the following are anomalies that can be caused by redundancy in tables?
a) Insertion
b) Deletion
c) Modification
d) All of these
15. A constraint between two attributes is called
a) Functional Relation
b) Attribute Relation
c) Functional Dependency
d) Functional relation constraint

1) Which of the following is not a level of data abstraction?


(a) View Level
(b) Critical Level correct
(c) Logical Level wrong
(d) Physical Level
2) Which of the following is Database Language?
(a) Data Manipulation Language
(b) Data Definition Language
(c) Query Language
(d) All of the above correct

3) Course (course id, sec_ id, semester)


Here the course_ id, sec_ id and semester are __________ and course is a _________ ?
(a) Tuple, Attributes
(b) Relations, Attribute
(c) Tuple, Relation
(d) Attributes, Relation
4) A Database Management System (DBMS) is?
(a) Collection of programs to access data
(b) Collection of data describing one particular enterprise
(c) Collection of interrelated data
(d) All of the above
5) In an Entity-Relationship Diagram Rectangles represents?
(a) Entity sets
(b) Table
(c) Database
(d) Attributes
6) The term _______ is used to refer to a row?
(a) Tuple
(b) Instance
(c) Filed
(d) Attribute
7) Which of the following is a Data Model?
(a) All of the above
(b) Entity-Relationship model
(c) Object-Based data model
(d) Relational data model
8) A ________ in a table represents a relationship among a set of values?
(a) Column
(b) Row
(c) Entry
(d) Key
9) For each attribute of a relation, there is a set of permitted values, called the ________ of that
attribute?
(a) Domain
(b) Relation
(c) Set
(d) Schema
10) Which of the following in not a function of DBA?
(a) Authorization for data access
(b) Authorization for data access
(c) Network Maintenance
Schema Definition

Q1: The specify duplicate retention we can use the keyword in place of distinct which is ,

a) Select distinct
b) Duplicate
c) Whole
d) All
Answer: D

Q2: If the tuples are satisfying the where predicate then they are placed into groups by the

a) Having clause
b) Group by clause
c) Like clause
d) Distinct clause
Answer: B

Q3: SQL standard says that the sum operator should ignore an input of

a) 0s
b) 1s
c) Null value
d) Stings
Answer: C
Q4: Which of the following gives a logical structure of the database graphically?
a) Entity-relationship diagram
b) Entity diagram
c) Database diagram
d) Architectural representation

Answer: A

Q5: The entity relationship set is represented in E-R diagram as


a) Double diamonds
b) Undivided rectangles
c) Dashed lines
d) Diamond

Answer: D

Q6: The wit cause was introduced in

A) SQL : 1998
B) SQL: 1999
C) SQL: 2000
D) SQL: 2001

Answer: B

Q7: The exist construct returns as a true value if the argument subquery is

a) Empty
b) Not empty
c) Exist
d) Not exist
Answer: B

Q8: If a transaction has obtained a __________ lock, it can read but cannot write on the item
a) Shared mode
b) Exclusive mode
c) Read only mode
d) Write only mode

Answer: A

Q9: A transaction can proceed only after the concurrency control manager ________ the lock
to the transaction
a) Grants
b) Requests
c) Allocates
d) None of the mentioned
Answer: A

Q10: The protocol that indicates when a transaction may lock and unlock each of the data
items is called as __________
a) locking protocol
b) unlocking protocol
c) Granting protocol
d) Conflict protocol

Answer: A

1. Design is concerned mainly with …….?


(a) Base relation (b) physical relation (c) user relation (d) None
2. A functional dependency is a relationship between or among?
(a) Entities (b) Rows (c) Attributes (d) Columns
3. The database design prevents some data from begins stored due to
(a) Deletion anomalies (c) Insertion anomalies
(b) Update anomalies (d) Selection anomalies
4. If one attribute is determinant of second, which in turn is determinant of
third, then the relation cannot be:
(a) Well-structured (b)1NF (c) 2NF (d) 3NF
5. Third normal form is inadequate in situation where the relation?
(a) Has multiple candidate keys
(b) Has candidate keys that are composite
(c) Has overlapped candidate keys
(d) None of the above
6. A protocol that ensures the system will never enter a deadlock state is called
(a) Deadlock detection (c) Deadlock elimination
(b) Deadlock recovery (d) Deadlock prevention
7. An approach named lock timeouts is used for:
(a) Deadlock detection (c) Deadlock elimination
(b) Deadlock prevention (d) Deadlock recovery
8. A system must deal with the deadlocks that are not prevented by using
schemas of:
(a) Validation (b) deadlock detection (c) deadlock recovery (d) Both A and B
9. Which of the following is the property of transactions?
(a) Isolation (b) durability (c) Atomicity (d) All of the above
10.A transaction that has not been completed successfully is called as
(a) Aborted transaction (c) Active transaction
Partially committed transaction (d) None of the above

Condition using keys and FDs of a relation to certify whether a relation schema is in a particular form is
called :

1. Normal form
2. Concurrency
3. Transaction Management
4. Deadlock Detection
ANS(1)

A logical unit of unit of work that must be either entirely completed or aborted no intermediate states
are acceptable is

1. Concurrency
2. Transaction Management
3. Deadlock Detection
4. Normal form
ANS(2)

The technique used to protect data when multiple users are accessing same data concurrently is known
as:

1. Concurrency
2. Transaction Management
3. Deadlock Detection
4. Normal form

ANS(1)

4
Database security is:

1. Protection from malicious attempts to steal or modify data


2. Giving access to more than one user
3. Unauthorized access
4. Deadlock Detection

ANS(1)

Goal of database security is to protect your______ from unauthorized access.

1. Critical data
2. Confidential data
3. Both a and b
4. None of these

ANS(3)

Which option is a security pearl

1. Back up key files


2. Use good passwords
3. Use encryption on sensitive data
4. All of them

ANS(4)

Uses the concepts of FDs, primary key:

1. First normal form


2. Second normal form
3. Third normal form
4. None of these

ANS(2)
8

Considered to be a part of the definition of relation:

1. First normal form


2. Second normal form
3. Third normal form
4. None of these

ANS(1)

Which statement is true

1. Every 2NF relation is in 1NF


2. Every 3NF relation is in 2NF
3. Every BCNF relation is in 3NF
4. All of these

ANS(4)

10

What is field design

1. Choosing data type


2. Coding, compression, encryption
3. Both 1 and 2
4. None of these

ANS(3)

11

Purpose-translate the logical description of data into the technical specifications for storing and
retrieving data is
1. Physical database design
2. Logical database design
3. Both 1 and 2
4. Security

ANS(3)

12

Field is defined as:

1. Largest unit of application data recognized by system software


2. Smallest unit of application data recognized by system software
3. Both 1 and 2
4. None of these

ANS(2)

13

Transforming normalized relations into non normalized physical record specifications is:

1. Denormalization
2. Normalization
3. Both 1 and 2
4. None of these

ANS(1)

14

Denormalization can:

1. Increase chance of errors and inconsistencies


2. Decrease chance of error and inconsistencies
3. None of these
4. Both 1 and 2

ANS(1)
15

Which statement is true

1. The DBMS will generally maintain a number of buffers in main memory that hold database disk
blocks
2. The DBMS don’t maintain a number of buffers in main memory that hold database disk blocks
3. Both 1 and 2
4. None of these

ANS(1)

16

Functional dependencies are used to

1. Specify formal measures of the “goodness” of relational designs


2. Define normal forms for relations
3. Both 1 and 2
4. None of these

ANS(3)

17

Data items can be locked in how many modes

1. One mode
2. Two modes
3. Three modes
4. Four modes

ANS(2)

18

Rules for using indexes

1. Use on larger tables


2. Use on smaller tables
3. Both 1 and 2
4. None of these
ANS(1)

20

Types of file organizations

1. Sequential
2. Indexed
3. Hashed
4. All of these

ANS(4)

1) The data model which describes how the data is actually stored is :
a) internal model
b) external model
c) logical model
d) none of these
2) The scheme for hierarchical database is :

A) a tree

B) a graph

C) a B-tree

D) none of the above

3) Which one is an example for network database ?

A) Unify

B) Ingress

C) IDMS

D) None of the above

4) One of the following is a valid record-based data model :

A) Object-oriented model

B) Relational model
C) Entity-relationship model

D) None of the above

5) A view of database that appears to an application program is known as :

A) schema

B) subschema

C) virtual table

D) none of the above

6) Choose the DBMS, which supports full-fledged client server application development ?

A) dBASEIV

B) Oracle 7.1

C) FoxPro 2.1

D) Ingress

7) A top-to-bottom relationship among the items in a database is established by a :

A) Hierarchical schema

B) Network schema

C) Relational schema

D) All of the above

8) Collection of information stored in a database at a particular moment is :

A) view

B) schema

C) instance

D) none of the above

9) The syntax of a user query is verified by :

A) query optimizer
B) DBA

C) parser

D) none of the above

10) In a hierarchical database, a hashing function is used to locate the :

A) Root

B) Collisions

C) Primary key

D) Duplicate records

Q1. Choose the Correct Option i.e. A, B, C, D.


1. Functional Dependencies are the types of constraints that are based on ___________
a. Key
b. Key revisited
c. Superset Key
d. None of the Mentioned
2. Which form has a relation that processes data about an individual entity
a. 2NF
b. 3NF
c. 4NF
d. 5NF
3. The database design prevents some data from being stored due to___________.
a. Deletion anomalies
b. Insertion anomalies
c. Update anomalies
d. Selection anomalies
4. A protocol that ensures the system will never enter a deadlock state is called
a. Deadlock detection
b. Deadlock elimination
c. Deadlock prevention
d. Deadlock recovery
5. The system must deal with the deadlocks that are not prevented by using schemes of
a. Validation
b. Deadlock detection
c. Deadlock recovery
d. Both a and b
6. Which of the following is not a transaction state?
a. Active
b. Compensated
c. Partially Committed
d. Failed
7. The “all-or-none” property is commonly known as
a. Isolation
b. Durability
c. Atomicity
d. None of the above
8. To ensure deadlock prevention, we can use the preemption approach and
a. Rollbacks
b. Timestamping
c. Cascading
d. Validating
9. Which SQL function is used to count the number of rows in a SQL query?
a. COUNT ()
b. Number ()
c. SUM ()
d. COUNT (*)
10. A transaction is made to wait until all __________ locks held on the item are released.
a. Compatible
b. Incompatible
c. Concurrent
d. Equivalent

MCQS of DATABASE:
Qno1: In the relational model, cardinality is termed as:

(A)A number of tuples.

(B)A number of attributes.

(C)A number of tables.

(D)A number of Constraints.

Ans: A

Qno2: Relational calculus is a:


(A)Procedural language.

(B)Non-procedural language.

(C)Data definition language.

(D)High-level language.

Ans: B

Qno3:’AS’ clause is used in SQL for:

(A) Selection operation.

(B)Rename operation.

(C)Join operation.

(D)Projection operation.

Ans: B

Qno4: The database schema is written in:

(A)HLL.

(B)DML.

(C)DDL.

(D)DCL.

Ans: C

Qno5: Count Function in SQL returns the number of:

(A)Values.

(B)Distinct values.

(C)Groups.

(D)Columns.

Ans: A

Qno6: Smallest unit of application data recognized by system software.


(A) Attributes.

(B) Tuples.

(C) Domain.

(D) Field.

Ans: D

Qno7: Which mode in data item can be both read as well as written?

(A)Exclusive mode.

(B)Shared mode.

(C) Complex mode.

(D)None of these

Ans: A

Qno8: Two transactions only read a data item.

(A)Do not conflict and order is not important.

(B)Conflict and order is important.

(C)Do not conflict order is important.

(D)None of these.

Ans: A

Qno9: A group of task in which single task is the minimum processing unit which cannot be
divided further.

(A)Consistency.

(B)Atomicity.

(C)Isolation.

(D)Transaction.

Ans: D
Qno10: The basic database access operations that a transaction can include are as follows:

(A)Read item(X), Write_item(X).

(B)Write_item(X).

(C)Read_item(X).

(D)None of these.

Ans: A

Qno11:2NF, 3NF, BCNF based on _ and _ of a relation schema.

(A) Primary keys, FDs.

(B)Keys, FDs.

(C)Foreign keys, FDs.

(D)None of these.

Ans: B

Qno12: Third normal form present is:

(A)Non-transitive functional dependency.

(B) Transitive functional dependency.

(C)Fully functional dependency.

(D)None of these.

Ans: B

Qno13: BCNF abbreviation in database is:

(A)Boyce-Codd Normal Form.

(B)Basic-Codd Normal Form.

(C)Byce-Codd normal form.

(D)None of these.

Ans: A
Qno14: A collection of interrelated records is called a

(A) Database

(B) Spreadsheet

(C) Management information system

(D) Text file


Ans: A

Qno15: ROLLBACK in a database is ____ statement.

(A) DDL

(B) DML

(C) DCL

(D) TCL
Ans: D

Qno16: The method of file organization in which data records in a file are arranged
in a specified order according to key field is known as the

(A) Sequential access method

(B) Queuing method

(C) Predetermined method

(D) Direct access method


Ans: A

Qno17: Unlike filters queries can be saved as in a database.

(A) Database

(B) Filters
(C) Objects

(D) Any of the above


Ans: C

Qno18: External database is

(A) Database created using DBMS package

(B) Database created in MS-Word

(C) Database created in EXCEL

(D) All of the above

Ans: A

Qno19: A network schema

(A) Stores data in tables

(B) restricts the structure to a one -to-many relationship

(C) Permits many -to-many relationships

(D) None of these


Ans: C

Qno20: In a large DBMS

(A) Each user can access every sub schema

(B) Each sub schema contains every field in the logical schema

(C) Each user can “see” only a small part of the entire database

(D) all of these

Ans : C
DBMS MCQS
1_One reason for null values in tuple

a) Attribute not applicable


b) Attribute is deleted 1
c) Tuples is deleted
d) Value is missing

2_What are used to define normal form for relations

a) Functional dependencies and keys


b) Attributes in the column 1
c) Tuples in the column
d) Semantics of attributes

3_If K is a key of R, then K functionally

a) Determines all attributes in k


b) Determine all attributes in R 2
c) Show values of FDs
d) All of the above

4_If Y is a subset of X then

a) Y determine X
b) Y determine Z 3
c) X determine Y
d) X determine Z

5_Prime attributes are

a) Member of foreign key


b) Member of composite key 4
c) Member of alternative key
d) Member of primary key

6_To convert data in third normal form data must be in

a) First normal form

b) Second normal form 3

c) First and second normal form

d) Third normal form


7_BCNF stand for

a) Binary_ Code Normal Form


b) Basic _Code Normal Form
c) Boyce –Codd Normal Form 3
d) Basic – Casual Normal Form

8_Which state is not accepted in transaction

a) Intermediate state
b) Aborted state 1
c) Completed state
d)

9_In transaction a single task is the minimum processing unit which

a) Which can be divided further


b) Which can be divided further or not c
c) Which cannot be divided further
d) Can be divided in two tasks further

10_Which one is the type of TPS

a) Batch processing
b) Run time processing
c) Logical processing a
d) Terminal processing

11_If two transactions only read a data item then

a) They conflict
b) They don’t conflict
c) Only one is completed b
d) Neither is completed

12_Database operations are

1) Reads
2) Writes
3) Inserts 4
4) All of the above

13_ what Is X in r(X)?

a) A constant
b) A operator
c) A relation c
d) None of these

14_ when deadlock is detected

a) All transactions will have to rolled back


b) Some transactions will have to rolled back
c) Only one transaction is roll back b
d) Neither transaction is roll back

15_For deadlock detection, the system must provide

a) A command
b) An algorithm
c) A statement b
d) Nothing

16_Authentication is the process of recognizing

a) User password
b) System control
c) Security level
d) User identity d

17_If there is no security to database then what happened?

A) Data will be easily corrupted


B) Anyone can access your data
C) You can lose your files d
D) All of the above

18_A_____ consists of a sequence of query and /or update statements.

a) Transaction
b) Commit a
c) Rollback
d) Flashback

19_Selecting a data type involves which of the following?

a) Maximize storage space


b) Represent most values
c) Improve data integrity c
d) All of the above

20_Denormalize can
a) Damage data
b) Manage data d
c) Improve performance
d) Reintroduce anomalies

21_General Serializability

a) Easy to determine
b) Hard to determine
c) Order is not important
d) Schedule is always correct b

1. A database can be best described as a?

A. Collection of data B. Collection of related tables

C. Collection of tables D. Collection of views

2: In a LIKE clause, you can ask for any 6 letter value by writing:

A. LIKE ______ (that’s six underscore characters) B. LIKE .{6}

C. LIKE ?????? D. LIKE ^.{6}$

3. The “father” of MySQL is ______.

A. Michael Widenius B. Bill Joy C. Bill Gates D. Stephanie Wall

4. To use MySQL on your computer, you’ll need

A. Perl, PHP or Java B. Some sort of client program to access the databases

C. A Browser D. FTP and Telnet

5. Which of these is not a valid name for a column

A. Far B. Near C. To D. From

6. Which of the following can add a row to a table?

A. Alter B. Add C. Insert D. Create

7. Which of these commands will delete a table called XXX if you have appropriate authority:

A. DROP XXX B. DELETE XXX WHERE confirm = “YES”


C. DROP XXX WHERE confirm = “YES” D. DROP TABLE XXX

8. The USE command

A. Is a pseudonym for the SELECT command

B. Has been deprecated and should be avoided for security reasons

C. Should be used to choose the database you want to use once you’ve connected to MySQL

D. Is used to load code from another file

9. MySQL runs on which operating systems?

A. Unix and Linux only B. Linux and Mac OS-X only

C. Unix, Linux, Windows and others D. Any operating system at all

10. 16: Which of the following is NOT supported by MySQL

A. Temporary (Hash) Tables B. Table Joining

C. Stored Procedures D. Regular Expression Matching

11. You are required to buy a license for MySQL if

A. If you use it for longer than 30 days

B. You use MySQL in a live application and not just for evaluation

C. You incorporate it into a product that you sell

D. You use it on a publicly accessible site

12. Which of the following is NOT available in MySQL:

A. REVOKE B. FETCH C. LIKE D. JOIN

13. Which of the following is available in MySQL:

A. CREATE VIEW B. CREATE SCHEMA

C. CREATE TRIGGER D. CREATE DATABASE

14. To remove duplicate rows from the result set of a SELECT use the following keyword:

a) NO DUPLICATE b) UNIQUE
c) DISTINCT d) None of the above

15. In a LIKE clause, you can could ask for any value ending in “qpt” by writing

a) LIKE %qpt b) LIKE *ton c) LIKE ton$ d) LIKE ^.*ton$

16. Which of the following is used to delete an entire MYSQL database?

a) mysql_drop_database b) mysql_drop_entiredb

c) mysql_drop_db d) mysql_drop_dbase

17. 39. Primary Key does allow the Null Values. where as in Unique key doesn’t accept the Null values.
True or False ?

a) False

b) True

18. 40. How much character are allowed to create database name?

a) 55 b) 72 c) 64 d) 40

19. 44. Which of the following is NOT available in MySQL?

A. REVOKE B. FETCH C. LIKE D. JOIN

20. 47. Which clause is used to sort the result of SELECT statement?

A. SORT BY B. ORDER BY C. ARRENGE BY D. None of the above

1. What are the different view to present a Table?


a) Datasheet View
b) Design View
c) Pivot Table View
d) All of Above
2. Which of the following enables us to view data from a table based on a specific criterion
a) Form
b) Query
c) Macro
d) Report
3. What do you mean by one to many relationships between Teacher and Class table?
a) One class may have many teachers
b) One teacher can have many classes
c) Many classes may have many teachers
d) Many teachers may have many classes
4. It is used to establish an association between related tables.
a) Line
b) Relationship
c) Primary Key
d) Records
5. This key that uniquely identifies each record is called
a) Primary Key
b) Key Record
c) Unique Key
d) Field Name

6. Two tables can be linked with relationship to _____


a) Ensure data entry
b) Ensure data integrity
c) Create Primary Key
d) Ensure Foreign Key

7. In a database Table, each category of information Is called __________


a) Tuple b) Field c) Record d) All of Above

8. The overall description of a database is called______.


a) Data integrity b) Data manipulation c) Database schema d) Data definition
9. To remove a relation from an SQL database, we use the ______ command.
a) Delete
b) Purge
c) Remove
d) Drop table

10. The ________ clause is used to list the attributes desired in the result of a query.
a) Where
b) Select
c) From
d) Distinct

1) If one attribute is determinant of second, which in turn is determinant of


third, then the relation cannot be:
a) 1NF b) 2NF c) 3NF d) Well-Structured
2) Collections of operations that form a single logical unit of work are
called;
a) Network b) Units c) Views d) Transaction
3) Which of the following is not a property of a transaction?
a) Simplicity b) Atomicity c) Isolation d) Durability
4) A protocol that requires that each transaction must issue lock and unlock
request in two phases is called;
a) Bi-Lock Locking b) Two Phase c) Lock-Point d) Two Level
protocol locking protocol Locking Protocol locking protocol
5) Which of the following statement is not correct for serializability of
transactions;
a) In a serial b) In non-serial c) A non-serial d) Every
schedule, each schedule, we schedule may not schedule is
transaction is allow the two always result in an serializable.
independent of transactions to incorrect outcome
others overlap their
execution.
6) Which of the following is the least secure method of authentication?
a) keycard b) password c) Retina pattern d) fingerprint
7) Denormalization produces a---normal form;
a) Higher b) Slower c) Upper d) Lower
8) A part of main memory for storing the copies of disk blocks in available
storage is referred as;
a) cluster b) Buffer  c) Loader d) Prescrubber
9) To change the value of a customer’s discount from 3 to 5, what command
do we need to use;
a) SELECT b) INSERT c) UPDATE d) ALIAS
10) Four DML commands
a) CREATE, ALTER, b) INSERT, c) INSERT, d) CREATE,
DELETE, SELECT UPDATE, DROP, UPDATE, DELETE, UPDATE, DELETE,
SELECT SELECT SELECT

You might also like