Home

1000+ DBMS Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. ______is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
A. Domain Integrity Constraints
B. Referential Integrity Constraints
C. Domain Constraints
D. Entity Integrity Constraints
Answer : B
2. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
A. left outer join
B. right outer join
C. full outer join
D. inner join
Answer : D
3. The normal form that is not necessarily dependency preserving is
A. 2NF
B. 3NF
C. BCNF
D. 4NF
Answer : A
4. If both the functional dependencies : X�Y and Y�X hold for two attributes X and Y then the relationship between X and Y is
A. M:N
B. M:1
C.
D. 1:M
Answer : C
5. Tree structures are used to store data in
A. Network model.
B. Relational model.
C. Hierarchical model.
D. File based system.
Answer : C
6. An outstanding functionality of SQL is its support for automatic_____ to the target data.
A. programming
B. navigation
C. functioning
D. notification
Answer : B
7. Given the following relation S(SNO,SNAME,CITY) write a query to update the value of CITY to KANPUR for the supplier S1.
A. UPDATE S CITY = KANPUR WHERE SNO=S1
B. UPDATE S SET CITY = KANPUR FOR SNO=S1
C. UPDATE S SET CITY = KANPUR WHERE SNO=S1
D. UPDATE S RENAME CITY = KANPUR WHERE SNO=S1
Answer : C
8. Protection of data from unauthorized Disclosure results in loss of _______
A. Integrity
B. Availability
C. Confidentiality
D. Discretionary Security
Answer : C
9. A logical schema
A. is the entire database
B. Describes how data is actually stored on disk.
C. is a standard way of organizing information into accessible parts.
D. All of the above
Answer : C
10. The graphical representation of a query is .
A. B-Tree
B. graph
C. Query Tree
D. directed graph
Answer : C
11. _____ command can be used to modify a column in a table
A. alter
B. update
C. set
D. create
Answer : A
12. The normalization was first proposed by .
A. Code
B. Codd
C. Boyce Codd
D. Boyce
Answer : B
13. The fact that all employees of a particular organization should not have salaries more than $10000 is a _____ constraint.
A. Schema
B. Tuple
C. Domain
D. Relational
Answer : C
14. When an E-R diagram is mapped to tables, the representation is redundant for
A. weak entity sets
B. weak relationship sets
C. strong entity sets
D. strong relationship sets
Answer : B
15. Employees in a company are each assigned their own office, i.e. for each employee there exists a unique office and for each office there exists a unique employee; This statement is an example of ____ type of relation.
A. 1:1
B. 1: Many
C. Many: One
D. Many : Many
Answer : A
16. Relationships among relationships can be represented in an-E-R model using
A. Aggregation
B. Association
C. Weak entity sets
D. Weak relationship sets
Answer : A
17. Processed data is called _____
A. Raw data
B. Source
C. Information
D. Useful data
Answer : C
18. Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
Answer : C
19. A _____ is used to define overall design of the database
A. code
B. data definition language
C. application program
D. schema
Answer : D
20. The ______ indexes are forced to store only record IDs in the data structure and require at least one additional I/O Operation to retrieve the actual record.
A. Clustered
B. Hashed
C. Un-clustered
D. Collision
Answer : C
21. The data models defined by ANSI/SPARC architecture are
A. Conceptual, physical and internal
B. Conceptual, view and external
C. Logical, physical and internal
D. Logical, physical and view
Answer : D
22. Which of the following is not a characteristic of a relational database model?
A. Table
B. Tree like structure
C. Complex logical relationship
D. Records
Answer : B
23. In 2NF
A. No functional dependencies (FDs) exist.
B. No multivalued dependencies (MVDs) exist.
C. No partial FDs exis.
D. No partial MVDs exist.
Answer : C
24. A ____ key specifies a uniqueness constraint that no two distinct tuples in any state r of relation R can have the same value for super key.
A. Sub
B. Parent
C. Candidate
D. Super
Answer : D
25. The transactions like adding an employee, enrolling a student in a course are examples of _______
A. Logical
B. Physical
C. None
D. Theoretical
Answer : A
26. By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0) or one (1).
A. Vulcanizing
B. Galvanizing
C. Magnetizing
D. Passing UV rays
Answer : C
27. _____ database is used to provide statistical information or summaries of values based on various criteria.
A. Statistical
B. Mathematical
C. Normalized
D. Un normalized
Answer : A
28. ______is a preferred method for enforcing data integrity
A. Constraints
B. Triggers
C. Stored procedure
D. Cursors
Answer : A
29. Which of the following is not a property of transactions?
A. Atomicity
B. Concurrency
C. Isolation
D. Durability
Answer : B
30. Which of the following is true for network structure?
A. It is a physical representation of the data.
B. It allows many to many relationship.
C. It is conceptually simple.
D. It will be the dominant database of the future.
Answer : A
31. Data items grouped together for storage purposes are called a
A. record
B. string
C. title
D. list
Answer : A
32. Relations produced from an E-R model will always be
A. First normal form.
B. Second normal form.
C. Third normal form.
D. Fourth normal form.
Answer : A
33. Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Answer : D
34. Maximum height of a B+ tree of order m with n key values is
A. Logm(n)
B. (m+n)/2
C. Logm/2(m+n)
D. None of these
Answer : D
35. DBMS is a collection of _____ that enables user to create and maintain a database.
A. Keys
B. Program
C. Translators
D. Language Activity
Answer : B
36. Which of the following is not a consequence of concurrent operations?
A. Lost update problem.
B. Update anomaly.
C. Unrepeatable read.
D. Dirty read.
Answer : B
37. The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree
A. m - 1
B. m + 1
C. m * m
D. m
Answer : D
38. Dependency preservation is not guaranteed in
A. BCNF
B. 3NF
C. PJNF
D. DKNF
Answer : A
39. Which of the following relational algebra operations do not require the participating tables to be union-compatible?
A. Union
B. Intersection
C. Difference
D. Join
Answer : D
40. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data
C. programs are not dependent on the logical attributes of data
D. both B and C
Answer : D
41. The default level of consistency in SQL is
A. repeatable read
B. read committed
C. read uncommitted
D. serializable
Answer : D
42. In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect :
A. Operationally, if Y is deleted, so is X
B. existence is dependent on Y.
C. Operationally, if X is deleted, so is Y.
D. Operationally, if X is deleted, & remains the same.
Answer : C
43. _____ is a utility to capture a continuous record of server activity and provide auditing capability.
A. SQL server Profile
B. SQL server wizard.
C. SQL server service manager
D. SQL server setup
Answer : C
44. In an ER model,_____ is described in the database by storing its data.
A. Entity
B. Attribute
C. Relationship
D. Notation
Answer : A
45. Which of the following is not a recovery technique?
A. Deferred update
B. Immediate update
C. Two-phase commit
D. Shadow paging
Answer : C
46. ………………… approach reduces time and effort required for design and lesser risk in database management.
A. Single global database
B. Multiple databases
C. Top-down approach
D. None of the above
Answer : B
47. operator is used to compare a value to a list of literals values that have been specified.
A. Like
B. COMPARE
C. BETWEEN
D. IN
Answer : A
48. The statement that is executed automatically by the system as a side effect of the modification of the database is
A. backup
B. assertion
C. recovery
D. trigger
Answer : D
49. Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)
B. (iv) only
C. (i) and (iv)
D. (ii) and (iii)
Answer : D
50. Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.
D. None of these.
Answer : A

Sharing is caring