Home

NDA - DBMS 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. In an E-R diagram double lines indicate
A. Total participation.
B. Multiple participation.
C. Cardinality N.
D. None of the above.
Answer : A
2. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
A. distinct values
B. cannot have NULL
C. both (A) & (B)
D. same as primary key
Answer : C
3. In 2NF
A. No functional dependencies (FDs) exist.
B. No multivalued dependencies (MVDs) exist.
C. No partial FDs exist.
D. No partial MVDs exist.
Answer : C
4. A top-to-bottom relationship among the items in a database is established by a
A. Hierarchical schema
B. Network schema
C. Relational Schema
D. All of the above
Answer : A
5. DROP is a statement in SQL.
A. Query
B. Embedded SQL
C. DDL
D. DCL
Answer : C
6. By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0) or one (1).
A. Vulcanizing
B. Galvanizing
C. Magnetizing
D. Passing UV rays
Answer : C
7. The default level of consistency in SQL is
A. repeatable read
B. read committed
C. read uncommitted
D. serializable
Answer : D
8. The fact that all employees of a particular organization should not have salaries more than $10000 is a _____ constraint.
A. Schema
B. Tuple
C. Domain
D. Relational
Answer : C
9. The full form of GUI is _________
A. Government Union Internet
B. Graphical Unit Interface
C. Graphical User Interface
D. Graphical University Interface
Answer : C
10. Which of the following is not a logical database structure?
A. Chain
B. Network
C. Tree
D. Relational
Answer : A
11. Checkpoints are a part of
A. Recovery measures.
B. Security measures.
C. Concurrency measures.
D. uthorization measures.
Answer : A
12. Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)
A. Create table Employee(EMPNO int, EMPNAME char(10));
B. Create table Employee(EMPNO integer, EMPNAME String(10));
C. Create table Emplo(EMPNO number, EMPNAME string);
D. Create table Emp(EMPNO int, EMPNAME char(10));
Answer : A
13. The clause alter table in SQL can be used to
A. add an attribute
B. delete an attribute
C. alter the default values of an attribute
D. all of the above
Answer : D
14. The middleware databases in which the business rules act are applicable to _______ tier architectures
A. Single
B. Three
C. Two
D. None
Answer : B
15. Processed data is called _____
A. Raw data
B. Source
C. Information
D. Useful data
Answer : C
16. Which of the following constitutes a basic set of operations for manipulating relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. SQL
Answer : C
17. Immediate database modification technique uses
A. Both undo and redo.
B. Undo but no redo.
C. Redo but no undo.
D. Neither undo nor redo.
Answer : A
18. HSAM stands for ……….
A. Hierarchic Standard Access Method
B. Hierarchic Sequential Access Method
C. Hierarchic Sequential and Method
D. Hierarchic Standard and Method
Answer : B
19. Which is the best file organization when data is frequently added or deleted from a file?
A. Sequential
B. Direct
C. Index sequential
D. None of the above
Answer : B
20. Which of the following relational algebra operations do not require the participating tables to be union-compatible?
A. Union
B. Intersection
C. Difference
D. Join
Answer : D
21. ______is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
A. Domain Integrity Constraints
B. Referential Integrity Constraints
C. Domain Constraints
D. Entity Integrity Constraints
Answer : B
22. Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Answer : D
23. An advantage of views is
A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
Answer : A
24. The part of a database management system which ensures that the data remains in a consistent state is
A. authorization and integrity manager
B. buffer manager
C. transaction manager
D. file manager
Answer : C
25. The values of the attribute describes a particular
A. Entity set
B. File
C. Entity instance
D. Organization
Answer : C
26. Drop Table cannot be used to drop a table referenced by a ______ constraint.
A. Primary Key
B. Local Key
C. Foreign Key
D. Composite Key
Answer : C
27. ____specifies a search condition for a group or an aggregate.
A. GROUP BY Clause
B. HAVING Clause
C. FROM Clause
D. WHERE Clause
Answer : B
28. The ______ language consists of SQL statements for operating on the data (insert, Modify, Delete) in tables that already exist.
A. Data Manipulation
B. Data Definition
C. Data Control
D. None
Answer : A
29. The ______ key of a relation is the attribute (column) or collection of attributes, which uniquely identify a given tuple.
A. Primary
B. Foreign
C. Candidate
D. Alternate
Answer : A
30. Relations produced from an E-R model will always be
A. First normal form.
B. Second normal form.
C. Third normal form.
D. Fourth normal form.
Answer : A
31. Relational Algebra is
A. Data Definition Language .
B. Meta Language
C. Procedural query Language
D. None of the above
Answer : C
32. The fact that information in the data warehouse changes far less often and may be regarded as non-real-time with periodic updating; This implies that data warehouses are _______
A. Volatile
B. Non - Volatile
C. Logical
D. Physical
Answer : B
33. The one guideline to be followed while designing the database is
A. A database design may be ambiguous.
B. It should avoid/reduce the redundancy.
C. Unrelated data should be in the same table so that updating the data will be easy.
D. An entity should not have attributes.
Answer : B
34. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
A. left outer join
B. right outer join
C. full outer join
D. inner join
Answer : D
35. In a multi-user database, if two users wish to update the same record at the same time, they are prevented from doing so by
A. jamming
B. password
C. documentation
D. record lock
Answer : D
36. In an ER model,_____ is described in the database by storing its data.
A. Entity
B. Attribute
C. Relationship
D. Notation
Answer : A
37. _____ First proposed the process of normalization.
A. Edgar. W
B. Edward Stephen
C. Edgar F. Codd
D. Edward Codd
Answer : C
38. Which of the following is not a consequence of concurrent operations?
A. Lost update problem.
B. Update anomaly.
C. Unrepeatable read.
D. Dirty read.
Answer : B
39. Which of the following ensures the atomicity of the transaction?
A. Transaction management component of DBMS
B. Application Programmer
C. Concurrency control component of DBMS
D. Recovery management component of DBMS
Answer : A
40. In multiple granularity of locks SIX lock is compatible with
A. IX
B. IS
C. S
D. SIX
Answer : B
41. What is data integrity?
A. It is the data contained in database that is non redundant.
B. It is the data contained in database that is accurate and consistent.
C. It is the data contained in database that is secured.
D. It is the data contained in database that is shared.
Answer : B
42. _____ database is used to provide statistical information or summaries of values based on various criteria.
A. Statistical
B. Mathematical
C. Normalized
D. Un normalized
Answer : A
43. Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)
B. (iv) only
C. (i) and (iv)
D. (ii) and (iii)
Answer : D
44. If the closure of an attribute set is the entire relation then the attribute set is a
A. superkey
B. candidate key
C. primary key
D. not a key
Answer : A
45. Which of the following is not a characteristic of a relational database model?
A. Table
B. Tree like structure
C. Complex logical relationship
D. Records
Answer : B
46. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer systems.
A. None
B. Multi
C. Single
D. Concurrent
Answer : C
47. What is a disjoint less constraint?
A. It requires that an entity belongs to no more than one level entity set.
B. The same entity may belong to more than one level.
C. The database must contain an unmatched foreign key value.
D. An entity can be joined with another entity in the same level entity set.
Answer : A
48. Wait-for graph is used for
A. detecting view serializability.
B. detecting conflict serializability.
C. deadlock prevention
D. deadlock detection
Answer : D
49. The _____ category includes storage media that can be operated on directly by the computers central processing unit.
A. Primary storage
B. Secondary Storage
C. All
D. Tertiary Storage
Answer : A
50. Which normal form is considered adequate for normal relational database design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
Answer : D

Sharing is caring