All Mcqs
All Mcqs
All Mcqs
1. Which of the following enables us to view data from a table based on specific criterion.
a. Form
b. Query
c. Macro
d. Report
2. Which of the following is example of object based logical model?
a. Relational Model
b. Hierarchical Model
c. Network Model
d. Entity Relational Model
3. The attribute name could be structured as an attribute consisting of first name, middle initial,
and last name. This type of attribute is called
a. Simple attribute
b. Composite attribute
c. Multivalued attribute
d. Derived attribute
4. Data integrity means:
a. Providing first access to stored data
b. Ensuring correctness and consistency of data
c. Providing data sharing
d. None of the above
5. The select project, and rename operations are called_______.
a. Binary operations
b. Ternary operations
c. Unary operations
d. None of the above
6. What is ACID properties of Transactions?
a. Atomicity, Consistency, Isolation, Database
b. Atomicity, Consistency, Isolation, Durability
c. Atomicity, Consistency, Inconsistent, Durability
d. Automatically, Concurrency, Isolation, Durability
7. Functional Dependencies are the types of constraints that are based on_____.
a. Key
b. Key revisited
c. Superset key
d. None of the mentioned
8. Relation R1 has 10 tuples and 5 attributes. Relation R2 has 0 tuples and 7 attributes. When a
CROSS JOIN is achieved between R1 and R2, how many tuples would the resultant set have?
a. 28
b. 10
c. 0
d. 35
9. Which are the join types in join condition:
a. Cross join
b. Natural join
c. Join with USING clause
d. All of the mentioned
10. There are two functional dependencies with the same set of attributes on the left side of the
arrow:
A->BC
A->B
This can be combined as
a. A->BC
b. A->B
c. B->C
d. None of the mentioned
11. If you were collecting and storing information about your music collection a (n) ______
a. Relation
b. Entity
c. Instance
d. Attribute
12. In Database design Data model that is widely used is
a. Semistructured data model
b. Object-based Data model
c. Relational model
d. Entity-Relational model
A. Entities
B. Rows
C. Attributes
D. Tables
2. The database design prevents some data from being stored due to _______.
A. Deletion anomalies
B. Insertion anomalies
C. Update anomalies
D. Selection anomalies
3. If one attribute is determinant of second, which in turn is determinant of third, then the relation
cannot be:
A. Well-structured
B. 1NF
C. 2NF
D. 3NF
5. In order to maintain transactional integrity and database consistency, what technology does a DBMS
deploy?
a) Triggers
b) Pointers
c) Locks
d) Cursors
6. A lock that allows concurrent transactions to access different rows of the same table is known as a
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock
7. Which of the following are introduced to reduce the overheads caused by the log-based recovery?
a) Checkpoints
b) Indices
c) Deadlocks
d) Locks
8. Which of the following is the block that is not permitted to be written back to the disk?
a) Dead code
b) Read only
c) Pinned
d) Zapped
9. Designers use which of the following to tune the performance of systems to support time-critical
operations?
a) Denormalization
b) Redundant optimization
c) Optimization
d) Realization
10. 10. Thus a _______ of course data gives the values of all attributes, such as title and department, of
all courses at a particular point in time.
a) Instance
b) Snapshot
c) Both Instance and Snapshot
d) All of the mentioned.
3. Foreign key is the one in which the ________ of one relation is referenced in another relation.
a) Foreign key
b) Primary key
c) References
d) Check constraint
4. Domain constraints, functional dependency and referential integrity are special forms of _________
a) Foreign key
b) Primary key
c) Assertion
d) Referential constraint
9. Which of the following is used to denote the selection operation in relational algebra?
a) Pi
b) Sigma
c) Lambda
d) Omega
10.The ___________ operation, denoted by −, allows us to find tuples that are in one relation but are
not in another.
a) Union
b) Set-difference
c) Difference
d) Intersection
a. Relational
b. Object-Relational
c. Network
d. All of these
a. Data redundancy
b. Independence
c. Flexibility
d. Data Integrity
3. Which is the type of data independence:
a. C
b. C++
c. SQL
d. None of these
a. Database designer
b. Database analyst
c. Database Administrator
d. Database manager
a. Internal level
b. External Level
c. Conceptual Level
d. All of these
8. Internal level has:
a. Query Language
b. Database Manager
c. File manager
d. All of these
a. Attributes
b. Entity
c. Tuples
d. Relations
1. The objective of database management system include:
a) Database Integrity
b) Data Integration
c) Availability
d) All of above
2. For each attribute of relation, there is a set of permitted values, called the
a) Domain of the attribute
b) Relation of the attribute
c) Set of the attribute
d) Schema of the attribute
3. Which of the following represents a collection of concepts that are used to describe the
structure of a database?
a) Data warehouse
b) Data model
c) Data structure
d) Data type
4. The most commonly used database model in current database model in current database
development is:
a) Relational
b) Hierarchical
c) Network
d) Object-oriented
5. Duplicate data in multiple data file is:
a) Data redundancy
b) Data multiplication
c) Data Integration
d) None of these
6. A virtual table that is constructed from other tables is called
a) Table
b) View
c) Relation
d) Tuple
7. SQL is used for:
a) Data definition
b) Data manipulation
c) Data control
d) All of these
8. A table should have
a) Primary key
b) Secondary key
c) Composite key
d) Sort key
9. A key is:
a) A field that identifies a record
b) The most important field in a record
c) The first field of a relation
d) The last field of a relation
10. Which of the following describe the primary key?
a) It must unique
b) It helps in indexing of a large database
c) It makes sorting quicker
d) All of these
11. A table in which the foreign key is found is called
a) Parent table
b) Dependent table
c) View
d) Tuple
12. Which of the following defines the nature of the relationship?
a) Modality
b) Decision type
c) Both a & b
d) None of these
13. A relationship between countries and capitals is an example relationship
a) One-to-One
b) One-to-Many
c) Many-to-Many
d) Many-to-One
14. Which of the following are anomalies that can be caused by redundancy in tables?
a) Insertion
b) Deletion
c) Modification
d) All of these
15. A constraint between two attributes is called
a) Functional Relation
b) Attribute Relation
c) Functional Dependency
d) Functional relation constraint
Q1: The specify duplicate retention we can use the keyword in place of distinct which is ,
a) Select distinct
b) Duplicate
c) Whole
d) All
Answer: D
Q2: If the tuples are satisfying the where predicate then they are placed into groups by the
a) Having clause
b) Group by clause
c) Like clause
d) Distinct clause
Answer: B
Q3: SQL standard says that the sum operator should ignore an input of
a) 0s
b) 1s
c) Null value
d) Stings
Answer: C
Q4: Which of the following gives a logical structure of the database graphically?
a) Entity-relationship diagram
b) Entity diagram
c) Database diagram
d) Architectural representation
Answer: A
Answer: D
A) SQL : 1998
B) SQL: 1999
C) SQL: 2000
D) SQL: 2001
Answer: B
Q7: The exist construct returns as a true value if the argument subquery is
a) Empty
b) Not empty
c) Exist
d) Not exist
Answer: B
Q8: If a transaction has obtained a __________ lock, it can read but cannot write on the item
a) Shared mode
b) Exclusive mode
c) Read only mode
d) Write only mode
Answer: A
Q9: A transaction can proceed only after the concurrency control manager ________ the lock
to the transaction
a) Grants
b) Requests
c) Allocates
d) None of the mentioned
Answer: A
Q10: The protocol that indicates when a transaction may lock and unlock each of the data
items is called as __________
a) locking protocol
b) unlocking protocol
c) Granting protocol
d) Conflict protocol
Answer: A
Condition using keys and FDs of a relation to certify whether a relation schema is in a particular form is
called :
1. Normal form
2. Concurrency
3. Transaction Management
4. Deadlock Detection
ANS(1)
A logical unit of unit of work that must be either entirely completed or aborted no intermediate states
are acceptable is
1. Concurrency
2. Transaction Management
3. Deadlock Detection
4. Normal form
ANS(2)
The technique used to protect data when multiple users are accessing same data concurrently is known
as:
1. Concurrency
2. Transaction Management
3. Deadlock Detection
4. Normal form
ANS(1)
4
Database security is:
ANS(1)
1. Critical data
2. Confidential data
3. Both a and b
4. None of these
ANS(3)
ANS(4)
ANS(2)
8
ANS(1)
ANS(4)
10
ANS(3)
11
Purpose-translate the logical description of data into the technical specifications for storing and
retrieving data is
1. Physical database design
2. Logical database design
3. Both 1 and 2
4. Security
ANS(3)
12
ANS(2)
13
Transforming normalized relations into non normalized physical record specifications is:
1. Denormalization
2. Normalization
3. Both 1 and 2
4. None of these
ANS(1)
14
Denormalization can:
ANS(1)
15
1. The DBMS will generally maintain a number of buffers in main memory that hold database disk
blocks
2. The DBMS don’t maintain a number of buffers in main memory that hold database disk blocks
3. Both 1 and 2
4. None of these
ANS(1)
16
ANS(3)
17
1. One mode
2. Two modes
3. Three modes
4. Four modes
ANS(2)
18
20
1. Sequential
2. Indexed
3. Hashed
4. All of these
ANS(4)
1) The data model which describes how the data is actually stored is :
a) internal model
b) external model
c) logical model
d) none of these
2) The scheme for hierarchical database is :
A) a tree
B) a graph
C) a B-tree
A) Unify
B) Ingress
C) IDMS
A) Object-oriented model
B) Relational model
C) Entity-relationship model
A) schema
B) subschema
C) virtual table
6) Choose the DBMS, which supports full-fledged client server application development ?
A) dBASEIV
B) Oracle 7.1
C) FoxPro 2.1
D) Ingress
A) Hierarchical schema
B) Network schema
C) Relational schema
A) view
B) schema
C) instance
A) query optimizer
B) DBA
C) parser
A) Root
B) Collisions
C) Primary key
D) Duplicate records
MCQS of DATABASE:
Qno1: In the relational model, cardinality is termed as:
Ans: A
(B)Non-procedural language.
(D)High-level language.
Ans: B
(B)Rename operation.
(C)Join operation.
(D)Projection operation.
Ans: B
(A)HLL.
(B)DML.
(C)DDL.
(D)DCL.
Ans: C
(A)Values.
(B)Distinct values.
(C)Groups.
(D)Columns.
Ans: A
(B) Tuples.
(C) Domain.
(D) Field.
Ans: D
Qno7: Which mode in data item can be both read as well as written?
(A)Exclusive mode.
(B)Shared mode.
(D)None of these
Ans: A
(D)None of these.
Ans: A
Qno9: A group of task in which single task is the minimum processing unit which cannot be
divided further.
(A)Consistency.
(B)Atomicity.
(C)Isolation.
(D)Transaction.
Ans: D
Qno10: The basic database access operations that a transaction can include are as follows:
(B)Write_item(X).
(C)Read_item(X).
(D)None of these.
Ans: A
(B)Keys, FDs.
(D)None of these.
Ans: B
(D)None of these.
Ans: B
(D)None of these.
Ans: A
Qno14: A collection of interrelated records is called a
(A) Database
(B) Spreadsheet
(A) DDL
(B) DML
(C) DCL
(D) TCL
Ans: D
Qno16: The method of file organization in which data records in a file are arranged
in a specified order according to key field is known as the
(A) Database
(B) Filters
(C) Objects
Ans: A
(B) Each sub schema contains every field in the logical schema
(C) Each user can “see” only a small part of the entire database
Ans : C
DBMS MCQS
1_One reason for null values in tuple
a) Y determine X
b) Y determine Z 3
c) X determine Y
d) X determine Z
a) Intermediate state
b) Aborted state 1
c) Completed state
d)
a) Batch processing
b) Run time processing
c) Logical processing a
d) Terminal processing
a) They conflict
b) They don’t conflict
c) Only one is completed b
d) Neither is completed
1) Reads
2) Writes
3) Inserts 4
4) All of the above
a) A constant
b) A operator
c) A relation c
d) None of these
a) A command
b) An algorithm
c) A statement b
d) Nothing
a) User password
b) System control
c) Security level
d) User identity d
a) Transaction
b) Commit a
c) Rollback
d) Flashback
20_Denormalize can
a) Damage data
b) Manage data d
c) Improve performance
d) Reintroduce anomalies
21_General Serializability
a) Easy to determine
b) Hard to determine
c) Order is not important
d) Schedule is always correct b
2: In a LIKE clause, you can ask for any 6 letter value by writing:
A. Perl, PHP or Java B. Some sort of client program to access the databases
7. Which of these commands will delete a table called XXX if you have appropriate authority:
C. Should be used to choose the database you want to use once you’ve connected to MySQL
B. You use MySQL in a live application and not just for evaluation
14. To remove duplicate rows from the result set of a SELECT use the following keyword:
a) NO DUPLICATE b) UNIQUE
c) DISTINCT d) None of the above
15. In a LIKE clause, you can could ask for any value ending in “qpt” by writing
a) mysql_drop_database b) mysql_drop_entiredb
c) mysql_drop_db d) mysql_drop_dbase
17. 39. Primary Key does allow the Null Values. where as in Unique key doesn’t accept the Null values.
True or False ?
a) False
b) True
18. 40. How much character are allowed to create database name?
a) 55 b) 72 c) 64 d) 40
20. 47. Which clause is used to sort the result of SELECT statement?
10. The ________ clause is used to list the attributes desired in the result of a query.
a) Where
b) Select
c) From
d) Distinct