MCQOPTIONS
Saved Bookmarks
This section includes 99 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Consider the following relational schemes for a library database:Assume {Author, Title} is the key for both schemes. Which of the following statements is true? |
| A. | Both Book and Collection are in BCNF |
| B. | Both Book and Collection are in 3NF only |
| C. | Book is in 2NF and Collection is in 3NF |
| D. | Both Book and Collection are in 2NF only |
| Answer» D. Both Book and Collection are in 2NF only | |
| 2. |
Which of the following fixed database roles can add or remove user IDs? |
| A. | db_accessadmin |
| B. | db_securityadmin |
| C. | db_setupadmin |
| D. | db_sysadmin |
| Answer» B. db_securityadmin | |
| 3. |
A view whose contents are computed and stored is called as _______ |
| A. | Storage view |
| B. | Backup view |
| C. | Materialized view |
| D. | Advanced view |
| Answer» D. Advanced view | |
| 4. |
The process of replacing a nested query with a query with a join is known as _________ |
| A. | Correlation |
| B. | Decorrelation |
| C. | Cache handling |
| D. | Join replacement |
| Answer» C. Cache handling | |
| 5. |
The size of a _____ is simply V(A,r) where r is the relation and A is a distinct value |
| A. | Projection |
| B. | Outer join |
| C. | Aggregation |
| D. | Inner join |
| Answer» D. Inner join | |
| 6. |
By default sql server has ___________ isolation level |
| A. | READ COMMITTED |
| B. | READ UNCOMMITTED |
| C. | SERIALIZABLE |
| D. | REPEATABLE READ |
| Answer» B. READ UNCOMMITTED | |
| 7. |
Which of the following operations is associative |
| A. | Set union |
| B. | Set intersection |
| C. | Set difference |
| D. | Theta join |
| Answer» E. | |
| 8. |
State true or false: Estimation of the size of the result of a join is not possible |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 9. |
Ensuring isolation property is the responsibility of the |
| A. | Recovery-management component of the DBMS |
| B. | Concurrency-control component of the DBMS |
| C. | Transaction-management component of the DBMS |
| D. | Buffer management component in DBMS |
| Answer» C. Transaction-management component of the DBMS | |
| 10. |
_______________ is a procedural extension of Oracle – SQL that offers language constructs similar to those in imperative programming languages. |
| A. | SQL |
| B. | PL/SQL |
| C. | Advanced SQL |
| D. | PQL |
| Answer» C. Advanced SQL | |
| 11. |
A table can be logically connected to another table by defining a |
| A. | Super key |
| B. | Candidate key |
| C. | Primary key |
| D. | Unique key |
| Answer» D. Unique key | |
| 12. |
Which utilities can we used to export data from sql server to a text file? |
| A. | DTS export wizard |
| B. | BCP |
| C. | ISQL |
| D. | DTS export wizard and BCP |
| Answer» E. | |
| 13. |
Conjunctive selection using one index. This is |
| A. | A10 |
| B. | A7 |
| C. | A9 |
| D. | A6 |
| Answer» C. A9 | |
| 14. |
Stored procedures are safe from SQL injection attacks |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 15. |
Which operation are allowed in a join view: |
| A. | UPDATE |
| B. | INSERT |
| C. | DELETE |
| D. | All of the mentioned |
| Answer» E. | |
| 16. |
Which of the following connection type supports application role permissions and password encryption? |
| A. | OLE DB |
| B. | DBLib |
| C. | ODBC |
| D. | OLE DB and ODBC |
| Answer» E. | |
| 17. |
Which product is returned in a join query have no join condition: |
| A. | Equijoins |
| B. | Cartesian |
| C. | Both Equijoins and Cartesian |
| D. | None of the mentioned |
| Answer» C. Both Equijoins and Cartesian | |
| 18. |
Set of definitions that are used to specify schema are expressed using __________. |
| A. | Java |
| B. | Fortran |
| C. | DML |
| D. | DDL |
| Answer» E. | |
| 19. |
Which of the following language is used to specify database Schema ? |
| A. | Data Management Language |
| B. | Data Manupulation Language |
| C. | Data Development Language |
| D. | Data Definition Language |
| Answer» E. | |
| 20. |
DDL Stands for ___________. |
| A. | Data Definition Language |
| B. | Database Design Language |
| C. | Database Development Language |
| D. | None of these |
| Answer» B. Database Design Language | |
| 21. |
Result of Compilation of DDL statement is stored in special file called as _________. |
| A. | Data Dictionary |
| B. | Symbol Table |
| C. | Database File |
| D. | Database Schema File |
| Answer» B. Symbol Table | |
| 22. |
Which of the following is used at the end of the view to reject the tuples which do not satisfy the condition in where clause ? |
| A. | With |
| B. | Check |
| C. | With check |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 23. |
The function which causes the retrieval of any kind of data from database is considered as |
| A. | key |
| B. | query |
| C. | structure |
| D. | storing cycle |
| Answer» C. structure | |
| 24. |
One of the module in the database management system which is responsible for choosing efficient execution plan considering queries is considered as |
| A. | index and glossary optimization |
| B. | query processing and optimization |
| C. | structural optimization |
| D. | content optimization |
| Answer» C. structural optimization | |
| 25. |
The specification given to database management system regarding the data whether it is string, integers or special characters is classified as |
| A. | type of data stored |
| B. | type of query asked |
| C. | type of structure developed |
| D. | sequence of data cycle |
| Answer» B. type of query asked | |
| 26. |
________ is a portion of DML that involves information retrieval. |
| A. | Programming Language |
| B. | Procedural Language |
| C. | OOP Language |
| D. | Query Language |
| Answer» E. | |
| 27. |
Data Dictionary contain one of the following entity inside it, Guess the answer. |
| A. | Associated Data |
| B. | Important Data |
| C. | Meta Data |
| D. | Duplicate Data |
| Answer» D. Duplicate Data | |
| 28. |
Sorting of relations that do not fit in memory is called as _______ |
| A. | Internal sorting |
| B. | External sorting |
| C. | Overflow sorting |
| D. | Overload sorting |
| Answer» C. Overflow sorting | |
| 29. |
State true or false: Join is an inherently blocking operation |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 30. |
The concept which checks the syntax of query whether is written according to the rules of grammar is classified as |
| A. | query graph |
| B. | query tree |
| C. | scanner |
| D. | parser |
| Answer» E. | |
| 31. |
In sort merge strategy, the small sub files sorted are called |
| A. | runs |
| B. | folders |
| C. | blocks |
| D. | indexes |
| Answer» B. folders | |
| 32. |
A relational algebra operation annotated with instructions on how to evaluate it is called _______ |
| A. | Evaluation algebra |
| B. | Evaluation plan |
| C. | Evaluation primitive |
| D. | Evaluation engine |
| Answer» D. Evaluation engine | |
| 33. |
Which of the following are steps in query processing? |
| A. | Parsing and translation |
| B. | Optimization |
| C. | Evaluation |
| D. | All of the mentioned |
| Answer» E. | |
| 34. |
In ________________ of Oracle, the database administrator creates a user account in the database for each user who needs access. |
| A. | Database Authentication |
| B. | Operating System Authentication |
| C. | Internal Authentication |
| D. | External Authentication |
| Answer» B. Operating System Authentication | |
| 35. |
_________________ is a sequence of zero or more characters enclosed by single quotes. |
| A. | Integers literal |
| B. | String literal |
| C. | String units |
| D. | String label |
| Answer» C. String units | |
| 36. |
The representation of the query in the form of data structure is classified as |
| A. | query graph |
| B. | query tree |
| C. | scanner tree |
| D. | parser tree |
| Answer» C. scanner tree | |
| 37. |
In _______________ the management of the password for the account can be handled outside of oracle such as operating system. |
| A. | Database Authentication |
| B. | Operating System Authentication |
| C. | Internal Authentication |
| D. | External Authentication |
| Answer» C. Internal Authentication | |
| 38. |
The ___ algorithm scans each index for pointers to tuples that satisfy an individual condition. |
| A. | A2 |
| B. | A4 |
| C. | A9 |
| D. | A6 |
| Answer» D. A6 | |
| 39. |
The strategy can retrieve a single record if the equality condition is on a key;multiple records may be retrieved if the indexing field is not a key is |
| A. | A2 |
| B. | A4 |
| C. | A5 |
| D. | A6 |
| Answer» C. A5 | |
| 40. |
The lowest level operator to access data in query processing is _______ |
| A. | File scan |
| B. | File manipulation |
| C. | File handling |
| D. | File organization |
| Answer» B. File manipulation | |
| 41. |
Which feature converts row data to column for better analytical view? |
| A. | Views |
| B. | Join |
| C. | Pivot |
| D. | Trigger |
| Answer» D. Trigger | |
| 42. |
The representation of the queries in the form of data structure graph is classified as |
| A. | scanner tree |
| B. | parser tree |
| C. | query graph |
| D. | query tree |
| Answer» D. query tree | |
| 43. |
In external sorting, the number of runs that can be merged in every pass are called |
| A. | degree of merging |
| B. | degree of passing |
| C. | degree of sorting |
| D. | degree of runs |
| Answer» B. degree of passing | |
| 44. |
The applications that are used for weather information or the collection of maps for geographical information is classified as |
| A. | scientific applications |
| B. | logical applications |
| C. | tracking applications |
| D. | spatial applications |
| Answer» E. | |
| 45. |
The usage of operations with the help of arguments without considering the structure of operation implementation is classified as |
| A. | program operation independence |
| B. | program operation dependence |
| C. | interface implementation independence |
| D. | program structural independence |
| Answer» B. program operation dependence | |
| 46. |
Data Dictionary is also called as _____________. |
| A. | Hash Table |
| B. | Symbol Table |
| C. | System Catalog |
| D. | None of these |
| Answer» D. None of these | |
| 47. |
If access paths are available on all the conditions of a disjunctive selection, each index is scanned for pointers to tuples that satisfy the individual condition. This is satisfied by |
| A. | A10 |
| B. | A7 |
| C. | A9 |
| D. | A6 |
| Answer» B. A7 | |
| 48. |
State true or false: Hybrid hash join is partially pipelined on the probe relation |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 49. |
A selection of the form satisfying the intersection of all records satisfying individual simple conditions is |
| A. | Conjunctive selection |
| B. | Disjunctive selection |
| C. | Negation |
| D. | None of the mentioned |
| Answer» B. Disjunctive selection | |
| 50. |
DML Stands for _____________. |
| A. | Data Management Language |
| B. | Database Markup Language |
| C. | Data Manipulation Language |
| D. | None of these |
| Answer» D. None of these | |