Home

CEED - DBMS 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. _____ database is used to provide statistical information or summaries of values based on various criteria.
A. Statistical
B. Mathematical
C. Normalized
D. Un normalized
Answer : A
2. In SQL the statement select * from R, S is equivalent to
A. Select * from R natural join S.
B. Select * from R cross join S.
C. Select * from R union join S.
D. Select * from R inner join S.
Answer : B
3. An outstanding functionality of SQL is its support for automatic_____ to the target data.
A. programming
B. navigation
C. functioning
D. notification
Answer : B
4. Relations produced from an E-R model will always be
A. First normal form.
B. Second normal form.
C. Third normal form.
D. Fourth normal form.
Answer : A
5. In b-tree the number of keys in each node is than the number of its children.
A. one less
B. same
C. one more
D. half
Answer : A
6. Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Answer : D
7. It is an abstraction through which relationships are treated as higher level entities
A. Generalization.
B. Specialization.
C. Aggregation.
D. Inheritance.
Answer : C
8. The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint.
B. Index.
C. Integrity constraint.
D. Functional dependency.
Answer : A
9. Cascading rollback is avoided in all protocol except
A. strict two-phase locking protocol.
B. tree locking protocol
C. two-phase locking protocol
D. validation based protocol.
Answer : D
10. Shadow paging has
A. no redo
B. no undo
C. redo but no undo
D. neither redo nor undo
Answer : A
11. A ____ key specifies a uniqueness constraint that no two distinct tuples in any state r of relation R can have the same value for super key.
A. Sub
B. Parent
C. Candidate
D. Super
Answer : D
12. What is a disjoint less constraint?
A. It requires that an entity belongs to no more than one level entity set.
B. The same entity may belong to more than one level.
C. The database must contain an unmatched foreign key value.
D. An entity can be joined with another entity in the same level entity set.
Answer : A
13. The ______ indexes are forced to store only record IDs in the data structure and require at least one additional I/O Operation to retrieve the actual record.
A. Clustered
B. Hashed
C. Un-clustered
D. Collision
Answer : C
14. Maximum height of a B+ tree of order m with n key values is
A. Logm(n)
B. (m+n)/2
C. Logm/2(m+n)
D. None of these
Answer : D
15. The part of a database management system which ensures that the data remains in a consistent state is
A. authorization and integrity manager
B. buffer manager
C. transaction manager
D. file manager
Answer : C
16. Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
Answer : C
17. Isolation of the transactions is ensured by
A. Transaction management
B. Application programmer
C. Concurrency control
D. Recovery management
Answer : C
18. An advantage of the database management approach is
A. data redundancy increases
B. data is dependent on programs
C. data is integrated and can be accessed by multiple programs
D. none of the above
Answer : C
19. Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.
D. None of these.
Answer : A
20. A logical schema
A. is the entire database
B. Describes how data is actually stored on disk.
C. is a standard way of organizing information into accessible parts.
D. All of the above
Answer : C
21. What is data integrity?
A. It is the data contained in database that is non redundant.
B. It is the data contained in database that is accurate and consistent.
C. It is the data contained in database that is secured.
D. It is the data contained in database that is shared.
Answer : B
22. Protection of data from unauthorized Disclosure results in loss of _______
A. Integrity
B. Availability
C. Confidentiality
D. Discretionary Security
Answer : C
23. _____ is a utility to capture a continuous record of server activity and provide auditing capability.
A. SQL server Profile
B. SQL server wizard.
C. SQL server service manager
D. SQL server setup
Answer : C
24. DBMS is a collection of _____ that enables user to create and maintain a database.
A. Keys
B. Program
C. Translators
D. Language Activity
Answer : B
25. Precedence graphs help to find a
A. Serializable schedule.
B. Recoverable schedule.
C. Deadlock free schedule.
D. Cascadeless schedule.
Answer : A
26. A list consists of last names, first names, addresses and pin codes. If all people in the list have the same last name and same pin code a useful key would be
A. the pin code
B. the last name
C. the compound key first name and last name
D. Tr from next page
Answer : C
27. Which of the following is not a consequence of concurrent operations?
A. Lost update problem.
B. Update anomaly.
C. Unrepeatable read.
D. Dirty read.
Answer : B
28. In SQL, testing whether a subquery is empty is done using
A. DISTINCT
B. UNIQUE
C. NULL
D. EXISTS
Answer : D
29. The collection of information stored in a database at a particular moment is called as ......
A. schema
B. instance of the database
C. data domain
D. independence
Answer : B
30. The one guideline to be followed while designing the database is
A. A database design may be ambiguous.
B. It should avoid/reduce the redundancy.
C. Unrelated data should be in the same table so that updating the data will be easy.
D. An entity should not have attributes.
Answer : B
31. _____is a full form of SQL.
A. Standard query language
B. Sequential query language
C. Structured query language
D. Server side query language
Answer : C
32. The data in the database at a particular moment of time is called the _______
A. Snapshot
B. Dynaset
C. Stateless
D. Stateful
Answer : A
33. A table can have only one
A. Secondary key
B. Alternate key
C. Unique key
D. Primary key
Answer : D
34. Dependency preservation is not guaranteed in
A. BCNF
B. 3NF
C. PJNF
D. DKNF
Answer : A
35. When an E-R diagram is mapped to tables, the representation is redundant for
A. weak entity sets
B. weak relationship sets
C. strong entity sets
D. strong relationship sets
Answer : B
36. operator is used to compare a value to a list of literals values that have been specified.
A. Like
B. COMPARE
C. BETWEEN
D. IN
Answer : A
37. Which of the following ensures the atomicity of the transaction?
A. Transaction management component of DBMS
B. Application Programmer
C. Concurrency control component of DBMS
D. Recovery management component of DBMS
Answer : A
38. _____ command can be used to modify a column in a table
A. alter
B. update
C. set
D. create
Answer : A
39. ______is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
A. Domain Integrity Constraints
B. Referential Integrity Constraints
C. Domain Constraints
D. Entity Integrity Constraints
Answer : B
40. A top-to-bottom relationship among the items in a database is established by a
A. Hierarchical schema
B. Network schema
C. Relational Schema
D. All of the above
Answer : A
41. The metadata is created by the
A. DML compiler
B. DML pre-processor
C. DDL interpreter
D. Query interpreter
Answer : C
42. The clause alter table in SQL can be used to
A. add an attribute
B. delete an attribute
C. alter the default values of an attribute
D. all of the above
Answer : D
43. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer systems.
A. None
B. Multi
C. Single
D. Concurrent
Answer : C
44. If both the functional dependencies : X�Y and Y�X hold for two attributes X and Y then the relationship between X and Y is
A. M:N
B. M:1
C.
D. 1:M
Answer : C
45. Immediate database modification technique uses
A. Both undo and redo.
B. Undo but no redo.
C. Redo but no undo.
D. Neither undo nor redo.
Answer : A
46. A relational database developer refers to a record as
A. an attribute
B. a tuple
C. a criteria
D. a relation
Answer : B
47. A transaction is in state after the final statement has been executed.
A. partially committed
B. active
C. committed
D. none of the above
Answer : C
48. Whenever two independent one-to-many relationships are mixed in the same relation, a __________ arises.
A. Functional dependency
B. Multi-valued dependency
C. Transitive dependency
D. Partial dependency
Answer : B
49. A data type or format is specified for each _________
A. Relation
B. Tuple
C. Database
D. Domain
Answer : B
50. A _____ is a logical unit of database processing that includes one or more data access operations that can include insertion, deletion, modification or retrieval operations.
A. Database
B. Data
C. Transaction
D. Record
Answer : C

Sharing is caring