Home

1000+ DBMS Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
Answer : C
2. Relations produced from an E-R model will always be
A. First normal form.
B. Second normal form.
C. Third normal form.
D. Fourth normal form.
Answer : A
3. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
A. distinct values
B. cannot have NULL
C. both (A) & (B)
D. same as primary key
Answer : C
4. Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)
B. (iv) only
C. (i) and (iv)
D. (ii) and (iii)
Answer : D
5. Which of the following is a reason to model data?
A. Understand each user's perspective of data
B. Understand the data itself irrespective of the physical representation
C. Understand the use of data across application areas
D. All of the above
Answer : D
6. It is an abstraction through which relationships are treated as higher level entities
A. Generalization.
B. Specialization.
C. Aggregation.
D. Inheritance.
Answer : C
7. A logical schema
A. is the entire database
B. Describes how data is actually stored on disk.
C. is a standard way of organizing information into accessible parts.
D. All of the above
Answer : C
8. The ______ key of a relation is the attribute (column) or collection of attributes, which uniquely identify a given tuple.
A. Primary
B. Foreign
C. Candidate
D. Alternate
Answer : A
9. DFD stands for
A. Data Flow Document
B. Data File Diagram
C. Data Flow Diagram
D. Non of the above
Answer : C
10. The drawback of shadow paging technique are
A. Commit overhead
B. Data fragmentation
C. Garbage collection
D. All of these
Answer : D
11. In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect :
A. Operationally, if Y is deleted, so is X
B. existence is dependent on Y.
C. Operationally, if X is deleted, so is Y.
D. Operationally, if X is deleted, & remains the same.
Answer : C
12. Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.
D. None of these.
Answer : A
13. In multiple granularity of locks SIX lock is compatible with
A. IX
B. IS
C. S
D. SIX
Answer : B
14. Which of the following is not a logical database structure?
A. Chain
B. Network
C. Tree
D. Relational
Answer : A
15. ______is a preferred method for enforcing data integrity
A. Constraints
B. Triggers
C. Stored procedure
D. Cursors
Answer : A
16. The set of all values that can be taken by the attribute is called as _______ of the attribute.
A. Tuple
B. Cardinality
C. Degree
D. Domain
Answer : D
17. Isolation of the transactions is ensured by
A. Transaction management
B. Application programmer
C. Concurrency control
D. Recovery management
Answer : C
18. The graphical representation of a query is .
A. B-Tree
B. graph
C. Query Tree
D. directed graph
Answer : C
19. _____ First proposed the process of normalization.
A. Edgar. W
B. Edward Stephen
C. Edgar F. Codd
D. Edward Codd
Answer : C
20. Which of the following aggregate functions does not ignore nulls in its results?.
A. COUNT .
B. COUNT (*)
C. MAX
D. MIN
Answer : B
21. Which normal form is considered adequate for normal relational database design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
Answer : D
22. The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint.
B. Index.
C. Integrity constraint.
D. Functional dependency.
Answer : A
23. A ______ module is typically designed so that it will run on a user workstation or personal computer.
A. Software
B. Server
C. Program
D. Client
Answer : D
24. _____ database is used to provide statistical information or summaries of values based on various criteria.
A. Statistical
B. Mathematical
C. Normalized
D. Un normalized
Answer : A
25. What will be the number of columns and rows respectively obtained for the operation, A- B, if A B are Base union compatible and all the rows of a are common to B? Assume A has 4 columns and 10 rows; and B has 4 columns and 15 rows
A. 4,0
B. 0,0
C. 4,5
D. 8,5
Answer : A
26. Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common because it is non volatile.
A. RAM
B. Flash
C. Hard Disk
D. Secondary
Answer : B
27. The keyword to eliminate duplicate rows from the query result in SQL is
A. DISTINCT
B. NO DUPLICATE
C. UNIQUE
D. None of the above
Answer : C
28. Which of the following ensures the atomicity of the transaction?
A. Transaction management component of DBMS
B. Application Programmer
C. Concurrency control component of DBMS
D. Recovery management component of DBMS
Answer : A
29. The clause alter table in SQL can be used to
A. add an attribute
B. delete an attribute
C. alter the default values of an attribute
D. all of the above
Answer : D
30. A _____ is used to define overall design of the database
A. code
B. data definition language
C. application program
D. schema
Answer : D
31. The fact that information in the data warehouse changes far less often and may be regarded as non-real-time with periodic updating; This implies that data warehouses are _______
A. Volatile
B. Non - Volatile
C. Logical
D. Physical
Answer : B
32. The _____ category includes storage media that can be operated on directly by the computers central processing unit.
A. Primary storage
B. Secondary Storage
C. All
D. Tertiary Storage
Answer : A
33. The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is
A. Procedural DML.
B. Non-Procedural DML.
C. Procedural DDL.
D. Non-Procedural DDL.
Answer : B
34. _____ is a utility to capture a continuous record of server activity and provide auditing capability.
A. SQL server Profile
B. SQL server wizard.
C. SQL server service manager
D. SQL server setup
Answer : C
35. ………………… approach reduces time and effort required for design and lesser risk in database management.
A. Single global database
B. Multiple databases
C. Top-down approach
D. None of the above
Answer : B
36. The values of the attribute describes a particular
A. Entity set
B. File
C. Entity instance
D. Organization
Answer : C
37. The transactions like adding an employee, enrolling a student in a course are examples of _______
A. Logical
B. Physical
C. None
D. Theoretical
Answer : A
38. A list consists of last names, first names, addresses and pin codes. If all people in the list have the same last name and same pin code a useful key would be
A. the pin code
B. the last name
C. the compound key first name and last name
D. Tr from next page
Answer : C
39. Cascading rollback is avoided in all protocol except
A. strict two-phase locking protocol.
B. tree locking protocol
C. two-phase locking protocol
D. validation based protocol.
Answer : D
40. The metadata is created by the
A. DML compiler
B. DML pre-processor
C. DDL interpreter
D. Query interpreter
Answer : C
41. According to the levels of abstraction, the schema at the intermediate level is called
A. Logical schema.
B. Physical schema.
C. Subschema.
D. None of the above.
Answer : D
42. Which of the following is not a consequence of non-normalized database?
A. Update Anomaly
B. Insertion Anomaly
C. Redundancy
D. Lost update problem
Answer : D
43. Relational Algebra is
A. Data Definition Language .
B. Meta Language
C. Procedural query Language
D. None of the above
Answer : C
44. The _______ is a set of programs to use and / or modify this data.
A. DBMS
B. System
C. Program
D. Software
Answer : A
45. As per equivalence rules for query transformation, selection operation distributes over
A. Union.
B. Set difference.
C. Intersection.
D. All of the above.
Answer : D
46. _____is a full form of SQL.
A. Standard uery language
B. Sequential query language
C. Structured query language
D. Server side query language
Answer : C
47. What is data integrity?
A. It is the data contained in database that is non redundant.
B. It is the data contained in database that is accurate and consistent.
C. It is the data contained in database that is secured.
D. It is the data contained in database that is shared.
Answer : B
48. In an ER model,_____ is described in the database by storing its data.
A. Entity
B. Attribute
C. Relationship
D. Notation
Answer : A
49. The ______ language consists of SQL statements for operating on the data (insert, Modify, Delete) in tables that already exist.
A. Data Manipulation
B. Data Definition
C. Data Control
D. None
Answer : A
50. Change Staff table by removing default of Assistant for position column
A. ALTER TABLE Staff ALTER position DROP DEFAULT;
B. ALTER TABLE Staff ALTER position DEFAULT;
C. ALTER TABLE Staff ALTER DROP DEFAULT;
D. MODIFY Staff ALTER position DROP DEFAULT;
Answer : A

Sharing is caring