DBMS MCQ Final
DBMS MCQ Final
UNIT-1
1) Which of the following is generally used for performing tasks like creating the
structure of the relations, deleting relation?
a. DML(Data Manipulation Language)
b. Query
c. Relational Schema
d. DDL(Data Definition Language)
2) Which of the following provides the ability to query information from the
database and insert tuples into, delete tuples from, and modify tuples in the database?
a. DML(Data Manipulation Language)
b. DDL(Data Definition Language)
c. Query
d. Relational Schema
Answer: D
5) Which of the following provides the ability to query information from the
database and insert tuples into, delete tuples from, and modify tuples in the database?
a. DML(Data Manipulation Language)
b. DDL(Data Definition Language)
c. Query
d. Relational Schema
Answer: A
6) The given Query can also be replaced with_______:
1. SELECT name, course_id
2. FROM instructor, teaches
3. WHERE instructor_ID= teaches_ID;
Answer: B
7) Which one of the following given statements possibly contains the error?
a. select * from emp where empid = 10003;
b. select empid from emp where empid = 10006;
c. select empid from emp;
d. select empid where empid = 1009 and Lastname = 'GELLER';
8) Ready the Query carefully:
1. SELECT emp_name
2. FROM department
3. WHERE dept_name LIKE ' _____ Computer Science';
In the above-given Query, which of the following can be placed in the Query's blank
portion to select the "dept_name" that also contains Computer Science as its ending
string?
a. &
b. _
c. %
d. $
12). In case of any shut down during transaction before commit which of the
following statement is done automatically ?
A. View
B. Commit
C. Rollback
D. Flashback
13) The term "TCL" stands for_____.
a) Ternary Control Language
b) Transmission Control Language
c) Transaction Central Language
d) Transaction Control Language
14) Which one of the following commands is used for removing (or deleting) a
relation forms the SQL database?
a. Delete
b. Drop
c. Remove
d. All of the above
15). Which of the following makes the transaction permanent in the database ?
A. View
B. Commit
C. Rollback
D. Flashback
16). A system is in a ______ state if there exists a set of transactions such that every
transaction in the set is waiting for another transaction in the set.
A. Idle
B. Waiting
C. Deadlock
D. Ready
17). In order to undo the work of transaction after last commit which one should be
used ?
A. View
B. Commit
C. Rollback
D. Flashback
18). In order to maintain the consistency during transactions database provides
A. Commit
B. Atomic
C. Flashback
D. Retain
19). When transaction Ti requests a data item currently held by Tj , Ti is allowed to
wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ).
Otherwise, Tj is rolled back (Tj is wounded by Ti ). This is
A. Wait-die
B. Wait-wound
C. Wound-wait
D. Wait
20). The deadlock state can be changed back to stable state by using _____________
statement.
A. Commit
B. Rollback
C. Savepoint
D. Deadlock
21). When transaction Ti requests a data item currently held by Tj , Ti is allowed to
wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj ).
Otherwise, Ti is rolled back (dies). This is
A. Wait-die
B. Wait-wound
C. Wound-wait
D. Wait
22). A deadlock exists in the system if and only if the wait-for graph contains a
___________.
A. Cycle
B. Direction
C. Bi-direction
D. Rotation
23). Which refers to a property of computer to run several operation simultaneously
and possible as computers await response of each other
a) Concurrency
b) Deadlock
c) Backup
d) Recovery
24). Which of the following is a procedure for acquiring the necessary locks for a
transaction where all necessary locks are acquired before any are released?
a) Record controller
b) Exclusive lock
c) Authorization rule
d) Two phase lock
25). Which one of the following is a failure to a system
a) Boot crash
b) Read failure
c) Transaction failure
d) All of the mentioned
26). If a transaction does not modify the database until it has committed, it is said to
use the ___________ technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
27). The ____________ scheme uses a page table containing pointers to all pages;
the page table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
28). A __________ is a special kind of a store procedure that executes in response to
certain action on the table like insertion, deletion or updation of data.
a) Procedures
b) Triggers
c) Functions
d) None of the mentioned
29). What are the after triggers?
a) Triggers generated after a particular operation
A. Table
D. Records
A. data item
B. data type
C. value
D. variable
A. data item
A. Secondary key
B. Alternate key
C. Unique key
D. Primary key
D. Primary key
A. random file
B. direct file
C. attribute
D. tuple
C. attribute
5) In the relational modes, cardinality is termed as
A. Number of tuples
B. Number of attributes
C. Number of tables
D. Number of constraints
A. Number of tuples
6) The .........is used for creating and destroying table, indexes and other forms of structures.
A. Conceptual view
B. Internal view
C. External view
D. Physical view
A. Conceptual view
8) The .............refers to the way data is organized in and accessible from DBMS.
A. database hierarchy
B. data organization
C. data sharing
D. data model
D. data model
9) Architecture of the database can be viewed as
A. two levels
B. four levels
C. three levels
D. one level
C. three levels
A. Atul kahate
B. James Gossling
C. EF Codd
D. Dennies Rithchie
C. EF Codd
A. Tuples
B. Attributes
C. Tables
D. Rows
C. Tables
12) When the values in one or more attributes being used as a foreign key must exist in another set of
one or more attributes in another table, we have created a(n) ........
A. transitive dependency
B. insertion anomaly
D. normal form
A. physical level
B. logical level
C. conceptual level
D. view level
D. view level
A. tables
B. rows
C. relations
D. attributes
D. attributes
A. data file
B. data record
C. menu
D. bank
B. data record
16)is, a table have more than one set of attributes that could be chosen as the key
A. foreign key
B. integrity key
C. relationship
D. candidate key
D. candidate key
17) The database environment has all of the following components except.
A. users
B. separate files
C. database
D. database administrator
A. users
A. Restrict
B. Project
C. Union
D. Divide
B. Project
19) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
D. sub schema
20)is a condition specified on a database schema and restricts the data that can be stored in an
instance of the database.
A. Key Constraint
B. Check Constraint
D. integrity constraint
B. Check Constraint
21.A relational database developer refers to a record as
A. a criteria
B. a relation
C. a tuple
D. an attribute
C. a tuple
A. TOTAL
B. COUNT
C. ADD
D. SUM
B. COUNT
A. schema
C. data domain
D. independence
D. both B and C
D. both B and C
A. schema
B. application program
D. code
A. schema
A. primary key
B. secondary key
C. foreign key
C. foreign key
A. DDL
B. TCL
C. DCL
D. DML
D. DML
A. Data independence
C. Neither A nor B
D. Both A and B
D. Both A and B
A. alter
B. update
C. set
D. create
A. alter
A. tuple
B. relation
C. attribute
D. degree
A. tuple
A. create
B. insert
C. alter
D. update
D. update
34.To pass on granted privileges to other user the ........ clause is used
A. create option
B. grant option
C. update option
D. select option
B. grant option
A. attribute
B. degree
C. tuple
D. domain
D. domain
B. number of tables
C. functional dependency
D. normalizing
C. functional dependency
38.A............. represents the number of entities to which another entity can be associated
A. mapping cardinality
B. table
C. schema
D. information
A. mapping cardinality
A. composite key
B. candidate key
C. foreign key
D. super key
D. super key
Unit-3
1) The language that requires a user to specify the data to be retrieved without specifying exactly how
to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
B. Non-Procedural DML
A. HLL
B. DML
C. DDL
D. DCL
C. DDL
4) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
D. sub schema
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
B. Data elements in the database can be modified by changing the data dictionary.
A. Groups
B. Table
C. Attributes
D. Switchboards
C. Attributes
A. External
B. Internal
C. Physical
D. Conceptual
A. External
9) Which are the two ways in which entities can participate in a relationship?
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
A. RAW
12.As per equivalence rules for query transformation, selection operation distributes over
A. Union
B. Intersection
C. Set difference
A. inner join
B. full outer join
inner join
14.Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Select
15.An entity set that does not have sufficient attributes to form a primary key is a
A. not Null
B. Null
D. any value
not Null
17.A logical schema
D. both A and C
18.Which of the operations constitute a basic set of operations for manipulating relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
Relational algebra
A. Child
B. Owner
C. Dominant
A. Network Model
Network Model
21.A file manipulation command that extracts some of the records from a file is called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
SELECT
A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Triangle
Dashed ellipse
A. Cartesian Product
A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Diamond
Diamond
A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Triangle
Triangle
A. Join
B. Self Join
C. Outer Join
D. Equi Join
Self Join
27.means multiple copies of the same data items.
A. Data reduction
B. Data integrity
C. Data consistency
D. Data redundancy
Data redundancy
A. data consistency
B. data inconsistency
C. data integrity
D. data duplication
data inconsistency
29.The ............returns row after combining two tables based on common values.
A. difference
B. product
C. join
D. union
join
A. entity integrity
B. database constraints
C. referential integrity
D. cardinality
database constraints
unit-4
A. Deferred update
B. Immediate update
C. Two-phase commit
D. Recovery management
C. Two-phase commit
A. Recovery measures
B. Security measures
C. Concurrency measures
D. Authorization measures
A. Recovery measures
A. system recovery
B. media recovery
C. database recovery
D. failure recovery
D. failure recovery
A. Filter
B. Recovery
C. Security
D. Scalability
C. Security
A. disk errors
B. hard errors
C. system errors
D. power failures
A. disk errors
A. Filter
B. Recovery
C. Security
D. Scalability
D. Scalability
7.Failure recovery and media recovery fall under ........
A. transaction recovery
B. database recovery
C. system recovery
D. value recovery
C. system recovery
8.The ............consists of the various applications and database that play a role in a backup and recovery
strategy.
9.In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None
B. Recovery
10.A............. is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalog.
A. recovery procedure
B. recovery block
C. stored block
D. stored script
D. stored script
A. filter
B. records
C. blocks
D. numbers
B. records
A. setup
B. registration
C. startup
D. enrollment
B. registration
13.is an alternative of log based recovery.
A. Disk recovery
B. Shadow paging
C. Dish shadowing
D. Crash recovery
B. Shadow paging
14.Most backup and recovery commands in .............. are executed by server sessions.
A. Backup Manager
B. Recovery Manager
D. Database Manager
B. Recovery Manager
15.systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID
D. RAID
16.An ............. is an exact copy of a single data file, archived redo log file, or control file.
A. image copy
C. copy log
D. control copy
A. image copy
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4
B. RAID level 2
A. primary
B. secondary
C. ternary
D. to create Schedule
20.The simplest approach to introducing redundancy is to duplicate every disk is called .....
A. mirroring
B. imaging
C. copying
A. mirroring
21) If the transaction is rolled back, all the database changes made inside the transaction are ......
A. made permanent
B. made temporary
D. undone
D. undone
A. Atomicity
B. Concurrency
C. Isolation
D. Durability
B. Concurrency
C. isolation monitor
D. transaction log
A. transaction processing monitor
A. committed
B. rolled back
C. partially committed
D. Aborted
A. committed
25.means that a transaction must execute exactly once completely or not at all.
A. durability
B. consistency
C. atomicity
D. isolation
C. atomicity
26.Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R
27.means that when it ends, a transaction must leave the database in a consistent state.
A. Data isolation
B. Data duration
C. Data consistency
D. Data non-reputability
C. Data consistency
A. utilization
B. execution rate
c. throughput
D. atomicity
c. throughput
B. Application Programmer
1means that a transaction must make its changes permanent to the database ends.
A. isolation
B. locking
C. durability
D. consistency
C. durability
2.Throughput means
A. isolate transactions
B. transaction recovery
C. system recovery
D. media recovery
B. transaction recovery
4.The part of a database management system which ensures that the data remains in a consistent state
is
B. buffer manager
C. transaction manager
D. file manager
C. transaction manager
A. commit
D. locking
A. read mode
B. exclusive mode
C. shared mode
D. write mode
B. exclusive mode
A. Transaction management
B. Application programmer
C. Concurrency control
D. Recovery management
C. Concurrency control
9.In dirty read problem.......
10.A transaction can do only read operation and not write operation on a data item when it acquires
....... lock.
A. read mode
B. exclusive mode
C. shared mode
D. write mode
C. shared mode
1) In the ............ , one transaction inserts a row in the table while the other transaction is half way
through its browsing of table.
ans D
D. maintaining data
ans C
A. locking
B. transaction monitor
C. transaction serializability
ans
A. read
B. write
C. read and write
D. update
ans
5.If a transaction obtains a shared lock on a row, it means that the transaction wants to that row.
A. write
B. insert
C. execute
D. read
ans D
6.The node where the distributed transaction originates is called the .......
A. local coordinator
B. starting coordinator
C. global coordinator
D. originating node
ans C
7.If a transaction obtains an exclusive lock on a row, it means that the transaction wants to .............that
row.
A. select
B. update
C. view
D. read
ans B
8.If a transaction acquires exclusive lock, then it can perform ............. operation.
A. read
B. write
D. update
ans C
9.is a specific concurrency problem wherein two transactions depend on each other for
something.
C. deadlock
D. locking
ans C
10.If a database server is referenced in a distributed transaction, the value of its commit point strength
determines which role it plays in the .........
C. transaction locking
D. checkpoints
ans A
11.Transaction.............ensures that the transaction are being executed successfully.
A. concurrency
B. consistency
C. serialisability
D. non serialiasability
ans C
12.The situation in which a transaction holds a data item and waits for the release of data item held by
some other transaction, which in turn waits for another transaction, is called .......
A. serialiable schedule
B. process waiting
C. concurrency
D. deadlock
ans D
C. transaction locking
D. checkpoints
14.The global coordinator forgets about the transaction phase is called .........
A. Prepare phase
B. Commit phase
C. Forget phase
D. Global phase
Ans A
15.In two phase commit, ............. coordinates the synchronization of the commit or rollback operations.
A. database manager
B. central coordinator
C. participants
ans B
A. shrinking phase
B. growing phase
C. running phase
D. initial phase
ans B
A. processing monitor
B. transaction monitor
C. TP monitor
D. Monitor
Ans C
18.After the nodes are prepared, the distributed transaction is said to be ......
A. in-doubt
B. in-prepared
C. prepared transaction
D. in-node
ans A
A. transaction control
B. chained transaction
C. nested transaction
D. calling transaction
ans B
A. shrinking phase
B. growing phase
C. running phase
D. initial phase
ans A
21.A mechanism which ensures that simultaneous execution of more than one transaction does not lead to
any database inconsistencies is called ................. mechanism.
A. transaction control
B. transaction management
C. concurrency parallelism
D. concurrency control
Ans D
22.The transaction wants only to read the data item of mode is called as .......
A. Exclusive Mode
B. Shared Mode
C. Inclusive Mode
D. Unshared Mode
Ans B
A. non-serial schedule
B. serial schedule
C. schedule
D. interleaved schedule
Ans C
24.is program or set of program that interacts with the database at some point in its execution.
A. A database system
B. A database application
C. Both
D. none
Ans B
A. recovery management
B. concurrency control
C. storage management
D. query evaluation engine
Ans A
26.The activity of ensuring atomicity in the presence of Transaction aborts is called ..........
A. transaction control
B. transaction management
C. transaction recovery
D. concurrency control
E. Ans C
27.A is a set of rules that state when a transaction may lock or unlock each of the data items in
the database
A. concurrency control
B. transaction control
C. validation control
D. locking protocol
Ans D
28.is a collection of programs performing all necessary action associated with a database.
A. Database associated
B. Database administrator
C. Database application
Ans D
29.Which protocol permits release of exclusive locks only at the end of transaction?
Ans B
A. database control
B. transaction management
C. transaction recovery
D. database recovery
Ans D