Home

1000+ DBMS Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. HSAM stands for ……….
A. Hierarchic Standard Access Method
B. Hierarchic Sequential Access Method
C. Hierarchic Sequential and Method
D. Hierarchic Standard and Method
Answer : B
2. The part of a database management system which ensures that the data remains in a consistent state is
A. authorization and integrity manager
B. buffer manager
C. transaction manager
D. file manager
Answer : C
3. The fact that all employees of a particular organization should not have salaries more than $10000 is a _____ constraint.
A. Schema
B. Tuple
C. Domain
D. Relational
Answer : C
4. A table can have only one
A. Secondary key
B. Alternate key
C. Unique key
D. Primary key
Answer : D
5. In SQL the word natural can be used with
A. inner join
B. full outer join
C. right outer join
D. all of the above
Answer : A
6. The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint.
B. Index.
C. Integrity constraint.
D. Functional dependency.
Answer : A
7. A transaction is in state after the final statement has been executed.
A. partially committed
B. active
C. committed
D. none of the above
Answer : C
8. Whenever two independent one-to-many relationships are mixed in the same relation, a __________ arises.
A. Functional dependency
B. Multi-valued dependency
C. Transitive dependency
D. Partial dependency
Answer : B
9. Which normal form is considered adequate for normal relational database design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
Answer : D
10. The default level of consistency in SQL is
A. repeatable read
B. read committed
C. read uncommitted
D. serializable
Answer : D
11. Which of the following addressing modes permits relocation without any change over in the code?
A. Indirect addressing
B. Indexed addressing
C. PC relative addressing
D. Base register addressing
Answer : B
12. Which of the following statement on the view concept in SQL is invalid?
A. All views are not updateable
B. The views may be referenced in an SQL statement whenever tables are referenced.
C. The views are instantiated at the time they are referenced and not when they are defined.
D. The definition of a view should not have GROUP BY clause in it.
Answer : D
13. DBMS is a collection of _____ that enables user to create and maintain a database.
A. Keys
B. Program
C. Translators
D. Language Activity
Answer : B
14. ____ table store information about database or about the system.
A. SQL
B. System
C. Nested
D. None of these
Answer : B
15. The keyword to eliminate duplicate rows from the query result in SQL is
A. DISTINCT
B. NO DUPLICATE
C. UNIQUE
D. None of the above
Answer : C
16. The _____ category includes storage media that can be operated on directly by the computers central processing unit.
A. Primary storage
B. Secondary Storage
C. All
D. Tertiary Storage
Answer : A
17. The normal form that is not necessarily dependency preserving is
A. 2NF
B. 3NF
C. BCNF
D. 4NF
Answer : A
18. Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are
A. m+n and 0
B. m+n and |m-n|
C. mn and 0
D. mn and m+n
Answer : C
19. Relationships among relationships can be represented in an-E-R model using
A. Aggregation
B. Association
C. Weak entity sets
D. Weak relationship sets
Answer : A
20. It is an abstraction through which relationships are treated as higher level entities
A. Generalization.
B. Specialization.
C. Aggregation.
D. Inheritance.
Answer : C
21. The fact that information in the data warehouse changes far less often and may be regarded as non-real-time with periodic updating; This implies that data warehouses are _______
A. Volatile
B. Non - Volatile
C. Logical
D. Physical
Answer : B
22. Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Answer : D
23. _____ command can be used to modify a column in a table A. alter
B. update
C. set
D. create
Answer : A
24. In a multi-user database, if two users wish to update the same record at the same time, they are prevented from doing so by
A. jamming
B. password
C. documentation
D. record lock
Answer : D
25. If a transaction T has obtained an exclusive lock on item Q, then T can
A. read Q
B. write Q
C. both read and write Q
D. write Q but not read Q
Answer : C
26. _____is a full form of SQL.
A. Standard query language
B. Sequential query language
C. Structured query language
D. Server side query language
Answer : C
27. In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect :
A. Operationally, if Y is deleted, so is X
B. existence is dependent on Y.
C. Operationally, if X is deleted, so is Y.
D. Operationally, if X is deleted, & remains the same.
Answer : C
28. Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
Answer : C
29. What is a disjoint less constraint?
A. It requires that an entity belongs to no more than one level entity set.
B. The same entity may belong to more than one level.
C. The database must contain an unmatched foreign key value.
D. An entity can be joined with another entity in the same level entity set.
Answer : A
30. An outstanding functionality of SQL is its support for automatic_____ to the target data.
A. programming
B. navigation
C. functioning
D. notification
Answer : B
31. Which one is true statement :
A. With finer degree of granularity of locking a high degree of concurrency is possible.
B. Locking prevents non-serializable schedules.
C. Locking cannot take place at field level.
D. An exclusive lock on data item X is granted even if a shared lock is already held on X.
Answer : A
32. Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only
B. ii-only
C. Both of them
D. None of them
Answer : C
33. ______is a preferred method for enforcing data integrity
A. Constraints
B. Triggers
C. Stored procedure
D. Cursors
Answer : A
34. ______contains information that defines valid values that are stored in a column or data type.
A. Default
B. Index
C. Rule
D. View
Answer : B
35. Checkpoints are a part of
A. Recovery measures.
B. Security measures.
C. Concurrency measures.
D. uthorization measures.
Answer : A
36. If an entity can belong to only one lower level entity then the constraint is
A. disjoint
B. partial
C. overlapping
D. single
Answer : B
37. For using a specific database …………… command is used.
A. use database
B. database name use
C. Both A & B
D. None of them
Answer : A
38. The ______ key of a relation is the attribute (column) or collection of attributes, which uniquely identify a given tuple.
A. Primary
B. Foreign
C. Candidate
D. Alternate
Answer : A
39. A _____ is used to define overall design of the database
A. code
B. data definition language
C. application program
D. schema
Answer : D
40. _____clause is an additional filter that is applied to the result.
A. Select
B. Order by
C. Group-by
D. Having
Answer : D
41. Isolation of the transactions is ensured by
A. Transaction management
B. Application programmer
C. Concurrency control
D. Recovery management
Answer : C
42. Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
Answer : C
43. Which of the following is not a consequence of non-normalized database?
A. Update Anomaly
B. Insertion Anomaly
C. Redundancy
D. Lost update problem
Answer : D
44. An advantage of views is
A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
Answer : A
45. _______ product was acquired by Informix, integrated into its RDBMS and introduced as the Informix Universal Server an ORDBMS.
A. Star
B. llustar
C. SQL
D. Cygnus
Answer : B
46. The one guideline t be followed while designing the database is
A. A database design may be ambiguous.
B. It should avoid/reduce the redundancy.
C. Unrelated data should be in the same table so that updating the data will be easy.
D. An entity should not have attributes.
Answer : B
47. If both the functional dependencies : X�Y and Y�X hold for two attributes X and Y then the relationship between X and Y is
A. M:N
B. M:1
C.
D. 1:M
Answer : C
48. The concept of mapping of ______ entity types is the concept in which the for each strong entity type E in the ER schema, create a relation R that includes all the simple attributes of E.
A. Regular
B. Irregular
C. None
D. Weak
Answer : A
49. Tree structures are used to store data in
A. Network model.
B. Relational model.
C. Hierarchical model.
D. File based system.
Answer : C
50. In multiple granularity of locks SIX lock is compatible with
A. IX
B. IS
C. S
D. SIX
Answer : B

Sharing is caring