Explore topic-wise MCQs in Database.

This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.

1.

Incorrect data is easy to detect.

A. 1
B.
Answer» C.
2.

Queries that do full table scans should be avoided.

A. 1
B.
Answer» B.
3.

Data modeling and database design are key responsibilities of data and data base administration.

A. 1
B.
Answer» B.
4.

Mirrored databases are almost always provided in high-availability systems.

A. 1
B.
Answer» B.
5.

The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.

A. 1
B.
Answer» B.
6.

With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.

A. 1
B.
Answer» C.
7.

Databases are not the property of a single function or individual within the organization.

A. 1
B.
Answer» B.
8.

A disaster recovery plan does not need to include the shipment of database backups to other sites.

A. 1
B.
Answer» C.
9.

Concurrency control is important for which of the following reasons?

A. To ensure data integrity when updates occur to the database in a multiuser environment
B. To ensure data integrity when updates occur to the database in a single-user environment
C. To ensure data integrity while reading data occurs to the database in a multiuser environment
D. To ensure data integrity while reading data occurs to the database in a single-user environment
Answer» B. To ensure data integrity when updates occur to the database in a single-user environment
10.

Information repositories are replacing data dictionaries in many organizations.

A. 1
B.
C. 1
D.
Answer» B.
11.

Failure to control confidentiality may lead to loss of competitiveness.

A. 1
B.
Answer» B.
12.

Which of the following could cause data to be unavailable?

A. Data becoming lost or inaccurate
B. The database server
C. Planned database maintenance activities
D. All of the above.
Answer» E.
13.

The greatest threat to business security is often internal rather than external.

A. 1
B.
Answer» B.
14.

Which of the following is the preferred way to recover a database after a system failure?

A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Answer» D. Reprocess transactions
15.

Performance analysis and tuning is which of the following?

A. Undertaken one time at the time of a DBMS installation
B. Undertaken one time at the time of the implementation of a new application
C. Undertaken as an ongoing part of the backup of a database
D. Undertaken as an ongoing part of managing a database
Answer» E.
16.

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

A. 1
B.
Answer» B.
17.

A data warehouse administrator is concerned with which of the following?

A. The time to make a decision but not the typical roles of a database administrator
B. The time to make a decision and the typical roles of a database administrator
C. The typical roles of a data administrator and redesigning existing applications
D. The typical roles of a database administrator and redesigning existing applications
Answer» C. The typical roles of a data administrator and redesigning existing applications
18.

Locking may cause which of the following problems?

A. Erroneous updates
B. Deadlock
C. Versioning
D. All of the above.
Answer» C. Versioning
19.

Which of the following is true concerning open-source DBMS?

A. Is free or nearly free database software whose source code is publicly available
B. Is free or nearly free database software whose source code is not publicly available
C. Is not competitive against PC-oriented packages and is fully SQL compliant
D. Is competitive against PC-oriented packages and is not fully SQL compliant
Answer» B. Is free or nearly free database software whose source code is not publicly available
20.

A shared lock allows which of the following types of transactions to occur?

A. Delete
B. Insert
C. Read
D. Update
Answer» D. Update
21.

Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.

A. 1
B.
C. 1
D.
Answer» B.
22.

A transaction log shows before and after images of records that have been modified by transactions.

A. 1
B.
Answer» C.
23.

Which of the following is part of an administrative policy to secure a database?

A. Authentication policies
B. Limiting particular areas within a building to only authorized people
C. Ensure appropriate responses rates are in external maintenance agreements
D. All of the above.
Answer» E.
24.

Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?

A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Answer» B. Rollforward
25.

To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.

A. 1
B.
C. 1
D.
Answer» B.
26.

The transaction log includes which of the following?

A. The before-image of a record
B. The after-image of a record
C. The before and after-image of a record
D. The essential data of the record
Answer» E.
27.

A traditional data administrator performs which of the following roles?

A. Tune database performance
B. Establish backup and recovery procedures
C. Resolve data ownership issues
D. Protect the security of the database.
Answer» D. Protect the security of the database.
28.

If both data and database administration exist in an organization, the database administrator is responsible for which of the following?

A. Data modeling
B. Database design
C. Metadata
D. All of the above.
Answer» C. Metadata
29.

Backward recovery is which of the following?

A. Where the before-images are applied to the database
B. Where the after-images are applied to the database
C. Where the after-images and before-images are applied to the database
D. Switching to an existing copy of the database
Answer» B. Where the after-images are applied to the database
30.

Poor data administration can lead to which of the following?

A. A single definition of the same data entity
B. Familiarity with existing data
C. Missing data elements
D. All of the above.
Answer» D. All of the above.