 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 99 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Consider the following relational schemes for a library database:Assume {Author, Title} is the key for both schemes. Which of the following statements is true? | 
| A. | Both Book and Collection are in BCNF | 
| B. | Both Book and Collection are in 3NF only | 
| C. | Book is in 2NF and Collection is in 3NF | 
| D. | Both Book and Collection are in 2NF only | 
| Answer» D. Both Book and Collection are in 2NF only | |
| 2. | Which of the following fixed database roles can add or remove user IDs? | 
| A. | db_accessadmin | 
| B. | db_securityadmin | 
| C. | db_setupadmin | 
| D. | db_sysadmin | 
| Answer» B. db_securityadmin | |
| 3. | A view whose contents are computed and stored is called as _______ | 
| A. | Storage view | 
| B. | Backup view | 
| C. | Materialized view | 
| D. | Advanced view | 
| Answer» D. Advanced view | |
| 4. | The process of replacing a nested query with a query with a join is known as _________ | 
| A. | Correlation | 
| B. | Decorrelation | 
| C. | Cache handling | 
| D. | Join replacement | 
| Answer» C. Cache handling | |
| 5. | The size of a _____ is simply V(A,r) where r is the relation and A is a distinct value | 
| A. | Projection | 
| B. | Outer join | 
| C. | Aggregation | 
| D. | Inner join | 
| Answer» D. Inner join | |
| 6. | By default sql server has ___________ isolation level | 
| A. | READ COMMITTED | 
| B. | READ UNCOMMITTED | 
| C. | SERIALIZABLE | 
| D. | REPEATABLE READ | 
| Answer» B. READ UNCOMMITTED | |
| 7. | Which of the following operations is associative | 
| A. | Set union | 
| B. | Set intersection | 
| C. | Set difference | 
| D. | Theta join | 
| Answer» E. | |
| 8. | State true or false: Estimation of the size of the result of a join is not possible | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» C. May be | |
| 9. | Ensuring isolation property is the responsibility of the | 
| A. | Recovery-management component of the DBMS | 
| B. | Concurrency-control component of the DBMS | 
| C. | Transaction-management component of the DBMS | 
| D. | Buffer management component in DBMS | 
| Answer» C. Transaction-management component of the DBMS | |
| 10. | _______________ is a procedural extension of Oracle – SQL that offers language constructs similar to those in imperative programming languages. | 
| A. | SQL | 
| B. | PL/SQL | 
| C. | Advanced SQL | 
| D. | PQL | 
| Answer» C. Advanced SQL | |
| 11. | A table can be logically connected to another table by defining a | 
| A. | Super key | 
| B. | Candidate key | 
| C. | Primary key | 
| D. | Unique key | 
| Answer» D. Unique key | |
| 12. | Which utilities can we used to export data from sql server to a text file? | 
| A. | DTS export wizard | 
| B. | BCP | 
| C. | ISQL | 
| D. | DTS export wizard and BCP | 
| Answer» E. | |
| 13. | Conjunctive selection using one index. This is | 
| A. | A10 | 
| B. | A7 | 
| C. | A9 | 
| D. | A6 | 
| Answer» C. A9 | |
| 14. | Stored procedures are safe from SQL injection attacks | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» B. False | |
| 15. | Which operation are allowed in a join view: | 
| A. | UPDATE | 
| B. | INSERT | 
| C. | DELETE | 
| D. | All of the mentioned | 
| Answer» E. | |
| 16. | Which of the following connection type supports application role permissions and password encryption? | 
| A. | OLE DB | 
| B. | DBLib | 
| C. | ODBC | 
| D. | OLE DB and ODBC | 
| Answer» E. | |
| 17. | Which product is returned in a join query have no join condition: | 
| A. | Equijoins | 
| B. | Cartesian | 
| C. | Both Equijoins and Cartesian | 
| D. | None of the mentioned | 
| Answer» C. Both Equijoins and Cartesian | |
| 18. | Set of definitions that are used to specify schema are expressed using __________. | 
| A. | Java | 
| B. | Fortran | 
| C. | DML | 
| D. | DDL | 
| Answer» E. | |
| 19. | Which of the following language is used to specify database Schema ? | 
| A. | Data Management Language | 
| B. | Data Manupulation Language | 
| C. | Data Development Language | 
| D. | Data Definition Language | 
| Answer» E. | |
| 20. | DDL Stands for ___________. | 
| A. | Data Definition Language | 
| B. | Database Design Language | 
| C. | Database Development Language | 
| D. | None of these | 
| Answer» B. Database Design Language | |
| 21. | Result of Compilation of DDL statement is stored in special file called as _________. | 
| A. | Data Dictionary | 
| B. | Symbol Table | 
| C. | Database File | 
| D. | Database Schema File | 
| Answer» B. Symbol Table | |
| 22. | Which of the following is used at the end of the view to reject the tuples which do not satisfy the condition in where clause ? | 
| A. | With | 
| B. | Check | 
| C. | With check | 
| D. | All of the mentioned | 
| Answer» D. All of the mentioned | |
| 23. | The function which causes the retrieval of any kind of data from database is considered as | 
| A. | key | 
| B. | query | 
| C. | structure | 
| D. | storing cycle | 
| Answer» C. structure | |
| 24. | One of the module in the database management system which is responsible for choosing efficient execution plan considering queries is considered as | 
| A. | index and glossary optimization | 
| B. | query processing and optimization | 
| C. | structural optimization | 
| D. | content optimization | 
| Answer» C. structural optimization | |
| 25. | The specification given to database management system regarding the data whether it is string, integers or special characters is classified as | 
| A. | type of data stored | 
| B. | type of query asked | 
| C. | type of structure developed | 
| D. | sequence of data cycle | 
| Answer» B. type of query asked | |
| 26. | ________ is a portion of DML that involves information retrieval. | 
| A. | Programming Language | 
| B. | Procedural Language | 
| C. | OOP Language | 
| D. | Query Language | 
| Answer» E. | |
| 27. | Data Dictionary contain one of the following entity inside it, Guess the answer. | 
| A. | Associated Data | 
| B. | Important Data | 
| C. | Meta Data | 
| D. | Duplicate Data | 
| Answer» D. Duplicate Data | |
| 28. | Sorting of relations that do not fit in memory is called as _______ | 
| A. | Internal sorting | 
| B. | External sorting | 
| C. | Overflow sorting | 
| D. | Overload sorting | 
| Answer» C. Overflow sorting | |
| 29. | State true or false: Join is an inherently blocking operation | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» C. May be | |
| 30. | The concept which checks the syntax of query whether is written according to the rules of grammar is classified as | 
| A. | query graph | 
| B. | query tree | 
| C. | scanner | 
| D. | parser | 
| Answer» E. | |
| 31. | In sort merge strategy, the small sub files sorted are called | 
| A. | runs | 
| B. | folders | 
| C. | blocks | 
| D. | indexes | 
| Answer» B. folders | |
| 32. | A relational algebra operation annotated with instructions on how to evaluate it is called _______ | 
| A. | Evaluation algebra | 
| B. | Evaluation plan | 
| C. | Evaluation primitive | 
| D. | Evaluation engine | 
| Answer» D. Evaluation engine | |
| 33. | Which of the following are steps in query processing? | 
| A. | Parsing and translation | 
| B. | Optimization | 
| C. | Evaluation | 
| D. | All of the mentioned | 
| Answer» E. | |
| 34. | In ________________ of Oracle, the database administrator creates a user account in the database for each user who needs access. | 
| A. | Database Authentication | 
| B. | Operating System Authentication | 
| C. | Internal Authentication | 
| D. | External Authentication | 
| Answer» B. Operating System Authentication | |
| 35. | _________________ is a sequence of zero or more characters enclosed by single quotes. | 
| A. | Integers literal | 
| B. | String literal | 
| C. | String units | 
| D. | String label | 
| Answer» C. String units | |
| 36. | The representation of the query in the form of data structure is classified as | 
| A. | query graph | 
| B. | query tree | 
| C. | scanner tree | 
| D. | parser tree | 
| Answer» C. scanner tree | |
| 37. | In _______________ the management of the password for the account can be handled outside of oracle such as operating system. | 
| A. | Database Authentication | 
| B. | Operating System Authentication | 
| C. | Internal Authentication | 
| D. | External Authentication | 
| Answer» C. Internal Authentication | |
| 38. | The ___ algorithm scans each index for pointers to tuples that satisfy an individual condition. | 
| A. | A2 | 
| B. | A4 | 
| C. | A9 | 
| D. | A6 | 
| Answer» D. A6 | |
| 39. | The strategy can retrieve a single record if the equality condition is on a key;multiple records may be retrieved if the indexing field is not a key is | 
| A. | A2 | 
| B. | A4 | 
| C. | A5 | 
| D. | A6 | 
| Answer» C. A5 | |
| 40. | The lowest level operator to access data in query processing is _______ | 
| A. | File scan | 
| B. | File manipulation | 
| C. | File handling | 
| D. | File organization | 
| Answer» B. File manipulation | |
| 41. | Which feature converts row data to column for better analytical view? | 
| A. | Views | 
| B. | Join | 
| C. | Pivot | 
| D. | Trigger | 
| Answer» D. Trigger | |
| 42. | The representation of the queries in the form of data structure graph is classified as | 
| A. | scanner tree | 
| B. | parser tree | 
| C. | query graph | 
| D. | query tree | 
| Answer» D. query tree | |
| 43. | In external sorting, the number of runs that can be merged in every pass are called | 
| A. | degree of merging | 
| B. | degree of passing | 
| C. | degree of sorting | 
| D. | degree of runs | 
| Answer» B. degree of passing | |
| 44. | The applications that are used for weather information or the collection of maps for geographical information is classified as | 
| A. | scientific applications | 
| B. | logical applications | 
| C. | tracking applications | 
| D. | spatial applications | 
| Answer» E. | |
| 45. | The usage of operations with the help of arguments without considering the structure of operation implementation is classified as | 
| A. | program operation independence | 
| B. | program operation dependence | 
| C. | interface implementation independence | 
| D. | program structural independence | 
| Answer» B. program operation dependence | |
| 46. | Data Dictionary is also called as _____________. | 
| A. | Hash Table | 
| B. | Symbol Table | 
| C. | System Catalog | 
| D. | None of these | 
| Answer» D. None of these | |
| 47. | If access paths are available on all the conditions of a disjunctive selection, each index is scanned for pointers to tuples that satisfy the individual condition. This is satisfied by | 
| A. | A10 | 
| B. | A7 | 
| C. | A9 | 
| D. | A6 | 
| Answer» B. A7 | |
| 48. | State true or false: Hybrid hash join is partially pipelined on the probe relation | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» B. False | |
| 49. | A selection of the form satisfying the intersection of all records satisfying individual simple conditions is | 
| A. | Conjunctive selection | 
| B. | Disjunctive selection | 
| C. | Negation | 
| D. | None of the mentioned | 
| Answer» B. Disjunctive selection | |
| 50. | DML Stands for _____________. | 
| A. | Data Management Language | 
| B. | Database Markup Language | 
| C. | Data Manipulation Language | 
| D. | None of these | 
| Answer» D. None of these | |