Home

1000+ DBMS MCQ for ESIC [Solved]

Thursday 9th of March 2023

Sharing is caring

1. For correct behaviour during recovery, undo and redo operation must be
A. Commutative
B. Associative
C. idempotent
D. distributive
Answer : C
2. An advantage of the database management approach is
A. data redundancy increases
B. data is dependent on programs
C. data is integrated and can be accessed by multiple programs
D. none of the above
Answer : C
3. Which normal form is considered adequate for normal relational database design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
Answer : D
4. _____ database is used to provide statistical information or summaries of values based on various criteria.
A. Statistical
B. Mathematical
C. Normalized
D. Un normalized
Answer : A
5. The concept of mapping of ______ entity types is the concept in which the for each strong entity type E in the ER schema, create a relation R that includes all the simple attributes of E.
A. Regular
B. Irregular
C. None
D. Weak
Answer : A
6. The size of a data item is called its _______, which can be a field of some record or may be a larger unit such as a record.
A. Similarity
B. Granularity
C. Dimensionality
D. Arity
Answer : B
7. A relational database developer refers to a record as
A. an attribute
B. a tuple
C. a criteria
D. a relation
Answer : B
8. Relational Algebra does not have
A. Selection operator.
B. Projection operator.
C. Aggregation operators.
D. Division operator.
Answer : C
9. DBMS is a collection of _____ that enables user to create and maintain a database.
A. Keys
B. Program
C. Translators
D. Language Activity
Answer : B
10. Wait-for graph is used for
A. detecting view serializability.
B. detecting conflict serializability.
C. deadlock prevention
D. deadlock detection
Answer : D
11. The normal form that is not necessarily dependency preserving is
A. 2NF
B. 3NF
C. BCNF
D. 4NF
Answer : A
12. Which of the following constitutes a basic set of operations for manipulating relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. SQL
Answer : C
13. Which of the following statement on the view concept in SQL is invalid?
A. All views are not updateable
B. The views may be referenced in an SQL statement whenever tables are referenced.
C. The views are instantiated at the time they are referenced and not when they are defined.
D. The definition of a view should not have GROUP BY clause in it.
Answer : D
14. For using a specific database …………… command is used.
A. use database
B. database name use
C. Both A & B
D. None of them
Answer : A
15. Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common because it is non volatile.
A. RAM
B. Flash
C. Hard Disk
D. Secondary
Answer : B
16. The middleware databases in which the business rules act are applicable to _______ tier architectures
A. Single
B. Three
C. Two
D. None
Answer : B
17. Change Staff table by removing default of Assistant for position column
A. ALTER TABLE Staff ALTER position DROP DEFAULT;
B. ALTER TABLE Staff ALTER position DEFAULT;
C. ALTER TABLE Staff ALTER DROP DEFAULT;
D. MODIFY Staff ALTER position DROP DEFAULT;
Answer : A
18. The clause alter table in SQL can be used to
A. add an attribute
B. delete an attribute
C. alter the default values of an attribute
D. all of the above
Answer : D
19. The default level of consistency in SQL is
A. repeatable read
B. read committed
C. read uncommitted
D. serializable
Answer : D
20. In E-R Diagram total participation is represented by
A. Double lines
B. Single line
C. Dashed lines
D. Triangle
Answer : A
21. The values of the attribute describes a particular
A. Entity set
B. File
C. Entity instance
D. Organization
Answer : C
22. An outstanding functionality of SQL is its support for automatic_____ to the target data.
A. programming
B. navigation
C. functioning
D. notification
Answer : B
23. A _____ is used to define overall design of the database
A. code
B. data definition language
C. pplication program
D. schema
Answer : D
24. Which of the following ensures the atomicity of the transaction?
A. Transaction management component of DBMS
B. Application Programmer
C. Concurrency control component of DBMS
D. Recovery management component of DBMS
Answer : A
25. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
A. left outer join
B. right outer join
C. full outer join
D. inner join
Answer : D
26. Precedence graphs help to find a
A. Serializable schedule.
B. Recoverable schedule.
C. Deadlock free schedule.
D. Cascadeless schedule.
Answer : A
27. What is data integrity?
A. It is the data contained in database that is non redundant.
B. It is the data contained in database that is accurate and consistent.
C. It is the data contained in database that is secured.
D. It is the data contained in database that is shared.
Answer : B
28. The part of a database management system which ensures that the data remains in a consistent state is
A. authorization and integrity manager
B. buffer manager
C. transaction manager
D. file manager
Answer : C
29. Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.
D. None of these.
Answer : A
30. The drawback of shadow paging technique are
A. Commit overhead
B. Data fragmentation
C. Garbage collection
D. All of these
Answer : D
31. Processed data is called _____
A. Raw data
B. Source
C. Information
D. Useful data
Answer : C
32. Dependency preservation is not guaranteed in
A. BCNF
B. 3NF
C. PJNF
D. DKNF
Answer : A
33. _____clause is an additional filter that is applied to the result.
A. Select
B. Order by
C. Group-by
D. Having
Answer : D
34. _______ product was acquired by Informix, integrated into its RDBMS and introduced as the Informix Universal Server an ORDBMS.
A. Star
B. llustar
C. SQL
D. Cygnus
Answer : B
35. The transactions like adding an employee, enrolling a student in a course are examples of _______
A. Logical
B. Physical
C. None
D. Theoretical
Answer : A
36. Immediate database modification technique uses
A. Both undo and redo.
B. Undo but no redo.
C. Redo but no undo.
D. Neither undo nor redo.
Answer : A
37. Which of the following is not a recovery technique?
A. Deferred update
B. Immediate update
C. Two-phase commit
D. Shadow paging
Answer : C
38. Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)
A. Create table Employee(EMPNO int, EMPNAME char(10));
B. Create table Employee(EMPNO integer, EMPNAME String(10));
C. Create table Emplo(EMPNO number, EMPNAME string);
D. Create table Emp(EMPNO int, EMPNAME char(10));
Answer : A
39. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
A. distinct values
B. cannot have NULL
C. both (A) & (B)
D. same as primary key
Answer : C
40. In an ER model,_____ is described in the database by storing its data.
A. Entity
B. Attribute
C. Relationship
D. Notation
Answer : A
41. An advantage of views is
A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
Answer : A
42. Union operator is a :
A. Unary Operator
B. Ternary Operator
C. Binary Operator
D. Not an operator
Answer : C
43. Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are
A. m+n and 0
B. m+n and |m-n|
C. mn and 0
D. mn and m+n
Answer : C
44. A weak entity has an ______ dependency on its owner entity, which can be used for both ON UPDATE and ON DELETE.
A. Direct
B. Indirect
C. Existence
D. No
Answer : C
45. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer systems.
A. None
B. Multi
C. Single
D. Concurrent
Answer : C
46. In an ER diagram the ___shape specifies the Attibute and a ____ shape specifies the primary key attribute.
A. Oval; An oval with an underlined attribute
B. Circle; A circle with bolded attribute inside it
C. Diamond; Abolded attribute
D. Square; An attribute within the square
Answer : A
47. Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Answer : D
48. Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)
B. (iv) only
C. (i) and (iv)
D. (ii) and (iii)
Answer : D
49. Isolation of the transactions is ensured by
A. Transaction management
B. Application programmer
C. Concurrency control
D. Recovery management
Answer : C
50. If an entity can belong to only one lower level entity then the constraint is
A. disjoint
B. partial
C. overlapping
D. single
Answer : B

Sharing is caring