0% found this document useful (0 votes)
74 views9 pages

Mcqs in Dbms213

Uploaded by

Vinay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views9 pages

Mcqs in Dbms213

Uploaded by

Vinay Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Multiple Choice Questions

1) Which of the following relational algebra operations do not require the participating tables to be union-
compatible?
(a) Union
(b) Intersection
(c) Difference
(d) Join.

2 )Which of the following is not a property of transactions?


(a) Atomicity
(b) Concurrency
(c) Isolation
(d) Durability

3) Relational Algebra does not have


(a) Selection operator.
(b) Projection operator.
(c) Aggregation operators.
(d) Division operator.

4) Checkpoints are a part of


(a) Recovery measures.
(b) Security measures.
(c ) Concurrency measures.
(d) Authorization measures.

5) Tree structures are used to store data in


(a)Network model.
(b) Relational model.
(c) Hierarchical model. (
d) File based system.

6) The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is
(a) Procedural DML.
(b) Non-Procedural DML.
(c) Procedural DDL.
(d) Non-Procedural DDL.

7) What is Data dictionary?


a) View of a database
b) The state of a database at a particular time
c) The structure of a database
d) Stores information about tables, its fields and constraints

8) The term "FAT" is stands for_____


a) File Allocation Tree
b) File Allocation Table
c) File Allocation Graph
d) All of the above

9) Which of the following is correct according to the technology deployed by DBMS?


a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency

10) In which one of the following, the multiple lower entities are grouped (or combined) together
to form a single higher-level entity?
a) Specialization
b) Generalization
c) Aggregation
d) None of the above

11) Two Phase locking guarantee serializability, but it does not prevent deadlocks. 2PL has two
phases: growing and shrinking. Which of the following rules are used to govern 2PL protocol.
1) Two transaction can not have conflicting locks.
2) No unlock operation can precede a lock operation in the same direction
3) No data are affected until all locks are obtained, i.e., until the transaction is in its lock points.

a) 1 and 2 only
b) 2 only
c) 1 and 3 only
d) 1, 2 and 3

12) What is the structure of multivalued attribute?


a) Double oval
b) Dashed oval
c) Diamond
d) Rectangle

13) In the relational table, which of the following can also be represented by the term "attribute"?
a) Entity
b) Row
c) Column
d) Both B &C

14) Which one of the following commands is used to remove or delete a relation forms the SQL
database?
a) Delete
b Drop
c) Remove
d) All of the above

15) In Heap file organization records are inserted in which location?


a) At the end of the file
b) At the middle of the file
c) Starting position of the file
d) None of the above

16) Which of the following is NOT a characteristic of a DBMS?


a) Data redundancy
b) Data integrity
c) Data security
d) Data independence

17) Which of the following is the simplest and easiest type of file organization method?
a) B+ tree file organization
b) Sequential file organization
c) Direct file organization
d) Cluster file organization

18) What is the role of indexing in file organization method?


a) Inserting data is easy
b) Deleting data is easy
c) Searching data is easy
d) None of the above

19) In an ER diagram, what do entities represent?


a) Relationships between tables
b) Physical storage locations
c) Real-world objects or concepts
d) Database queries

20) The operator which is used to assign a new name to a relation is known as?
a) Selection
b) Projection
c) Rename
d) JOIN

21) To add a column named "Email" of type VARCHAR to an existing table named "Users,"
which SQL statement is correct?
a) ALTER TABLE Users ADD COLUMN Email VARCHAR
b) ALTER TABLE Users ADD Email VARCHAR
c) UPDATE TABLE Users ADD Email VARCHAR
d) INSERT INTO Users (Email) VALUES ('VARCHAR')

22) What is Candidate Key in a database?


a) Private key
b) Minimal superkey
c) Referential key
d) Public Key

23) What is ‘D’ stands for in ACID properties of a database?


a) Dependency
b) Durability
c) Diminutive
d) None of the above

24) What does 2NF states?


a) It must be in 1NF.
b) Every nonprime attributes should be fully functional dependent on candidate key
c) Both a) & b)
d) None of the above

25) What is the correct SQL syntax to return only distinct (different) values from the "Name"
column in the "Employees" table?
a) SELECT DISTINCT Name FROM Employees
b) SELECT UNIQUE Name FROM Employees
c) SELECT DIFFERENT Name FROM Employees
d) SELECT Name FROM Employees DISTINCT

26) What is the goal of normalization in database design?


a) To reduce data redundancy and ensure data integrity
b) To increase database size
c) To make database security more complex
d) To speed up query processing

27) What is the number of tuples of a relation known as?


a) Column
b) Entity
c) Cardinality
d) Dependency

28) The values appearing in given attributes of any tuple in the referencing relation must
likewise occur in specified attributes of at least one tuple in the referenced relation, according to
_________ integrity constraint.
a) Referential
b) Primary
c) Referencing
d) Specific

29) Which one of the following refers to the copies of the same data (or information) occupying
the memory space at multiple places.
a) Data Inconsistency
b) Data Independency
c) Data Redundancy
d) Data Security

30) After groups have been established, SQL applies predicates in the ___________ clause,
allowing aggregate functions to be used.
a) Where
b) Having
c) Group by
d) With

31) What is the symbolic structure of Weak Entity?


a) Rectangle
b Circle
c) Oval shape
d) ) Double rectangle

32) Which operation is used to extract specified columns from a table?


a) Project
b) Join
c) Extract
d) Substitute

33) in which type of file organization method, records are inserted at the end of the file?
a) Heap file organization
b) Hash file organization
c) Index sequential file organization
d) B+ tree file organization

34) In Index sequential file organization method records are stored in the file using which key?
a) Primary Key
b) Foreign Key
c) Composite Key
d) Candidate Key

35) Which of the following refers to the number of attributes in a relation?


a) Degree
b) Row
c) Column
D) All of the above

36) Which of the following commands is used to save any transaction permanently into the
database?
a) Commit
b) Rollback
c) Savepoint
d) None of the above

37) Projection Operator is used for which purpose?


a) Return rows
b) Return columns
c) Returns a cell only
d) None of the above

38) ACID stand for ?


a) Automatic - Ceiling In Database
b) Atomicity Contained In Database
c) Atomicity Consistency, Isolation Durability
d) None of the above

40) Which of the following refers collection of the information stored in a database at a specific
time?
a) Independence
b) Instance of the database
c) Schema
d) Data domain

41) What is Super Key in a database?


a) Superset of a candidate key
b) Subset of a candidate key
c) Referential key
d) Public Key
42) Multivalued dependency is a case of which normal form?
a) 1st
b) 2nd
c) 3rd
d) 4th

43) Which of the following is a top-down approach in which the entity's higher level can be divided
into two lower sub-entities?
a) Aggregation
b) Generalization
c) Specialization
d) All of the above

44) Which one of the following commands is used to modify a column inside a table?
a) Drop
b) Update
c) Alter
d) Set

45) Which normal form contains the concept of transitive dependency?


a) 4th NF
b) 1st NF
c) 2nd NF
d) 3rd NF

46) Dr.E.F. Codd represented.......rules that a database must obey if it has to be considered truly
relational.
a) 10
b) 15
c) 14
d) 12

46) ........ is a bottom-up approach in which two lower level entities combine to form a higher
level entity.
a) Aggregation
b) Specialization
c) Generalization
d) None of the above

47) An entity set that does not have sufficient attributes to form a primary key, is a ……
a) Primary entity set
b) Weak entity set
c) Strong entity set
d) None of the above

48) Which of the following is not a type of database?


a) Hierarchical
b) Relational
c) Network
d) Transition

49) In a relational database, each tuple is divided into fieldscalled


a) Relations
b) Domains
c) Queries
d) None of the above

50) In SQL, which command is used to update existing row in a table?


a) Insert
b) Delete
c) Update
d) None of the above

51) In SQL, TCL stands for


a) Transmission Control Language
b) Transaction Central Language
c) Ternary Control Language
d) Transaction Control Language

52) operator is used to display a record if either the first condition or the second condition is
true.
a) AND
b) OR
c) Both (A) & (B)
d) None of the above

53) Which of the following is standard interactive and programming language for getting
information from and updating a database.
a) SQL
b) PHP
c) ASP
d) None of the above
54) ………….. is the process of organizing data into related tables.
a) Generalization
b) Normalization
c) Specialization
d) None of the above

55) .Each modification done in database transaction are first recorded into the
a) Hard Drive
b) Disk
c) Log File
d) Data Mart

You might also like