Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

An entity instance of a subtype represents the same entity instance of a supertype.

A. True
B. False
Answer» B. False
2.

An ERD that has had the entities clustered will display more entities.

A. True
B. False
Answer» C.
3.

Total specialization is represented by double lines between the supertype and subtype on an EER.

A. True
B. False
Answer» B. False
4.

Data descriptions are stored in a central location called the depository.

A. True
B. False
Answer» C.
5.

Stored representations of objects and events that have meaning and importance in the user's environment are known as a database.

A. True
B. False
Answer» C.
6.

Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.

A. True
B. False
Answer» B. False
7.

Incorrect data is easy to detect.

A. True
B. False
Answer» C.
8.

With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.

A. True
B. False
Answer» C.
9.

A disaster recovery plan does not need to include the shipment of database backups to other sites.

A. True
B. False
Answer» C.
10.

Databases are not the property of a single function or individual within the organization.

A. True
B. False
Answer» B. False
11.

Data modeling and database design are key responsibilities of data and data base administration.

A. True
B. False
Answer» B. False
12.

Information repositories are replacing data dictionaries in many organizations.

A. True
B. False
Answer» B. False
13.

Queries that do full table scans should be avoided.

A. True
B. False
Answer» B. False
14.

The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.

A. True
B. False
Answer» B. False
15.

Another name for multimedia data is unstructured data.

A. True
B. False
Answer» B. False
16.

The most common source of database failures in an organization is the failure to implement a strong database administration function.

A. True
B. False
Answer» B. False
17.

The primary mechanism for providing context for data is metadata.

A. True
B. False
Answer» B. False
18.

A workgroup typically comprises between 25 and 100 persons.

A. True
B. False
Answer» C.
19.

The source of the data is sometimes called the system of record.

A. True
B. False
Answer» B. False
20.

Data quality problems currently cost U.S. businesses some $60 million each year (Hudica, 2003).

A. True
B. False
Answer» C.
21.

Stand-alone databases exhibit many of the same advantages common to file processing systems.

A. True
B. False
Answer» C.
22.

The database approach requires additional costs and risks.

A. True
B. False
Answer» B. False
23.

Data scrubbing can help upgrade data quality; it is not a long-term solution to the data quality problem.

A. True
B. False
Answer» B. False
24.

Every key used to join the fact table with a dimensional table should be a surrogate key.

A. True
B. False
Answer» B. False
25.

Derived data are detailed, current data intended to be the single, authoritative source for all decision support applications.

A. True
B. False
Answer» C.
26.

Joining is the process of partitioning data according to predefined criteria.

A. True
B. False
Answer» C.
27.

The role of the ETL process is to identify erroneous data and to fix them.

A. True
B. False
Answer» C.
28.

Data in the data warehouse are loaded and refreshed from operational systems.

A. True
B. False
Answer» B. False
29.

Star schema is suited to online transaction processing, and therefore is generally used in operational systems, operational data stores, or an EDW.

A. True
B. False
Answer» C.
30.

Periodic data are data that are physically altered once added to the store.

A. True
B. False
Answer» C.
31.

A transaction log shows before and after images of records that have been modified by transactions.

A. True
B. False
Answer» C.
32.

The greatest threat to business security is often internal rather than external.

A. True
B. False
Answer» B. False
33.

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

A. True
B. False
Answer» B. False
34.

An enterprise data model is a relational model that shows the high-level entities for the organization and associations among those entities.

A. True
B. False
Answer» C.
35.

Independent data marts are often created because an organization focuses on a series of short-term business objectives.

A. True
B. False
Answer» B. False
36.

Data in operational systems are typically fragmented and inconsistent.

A. True
B. False
Answer» B. False
37.

Most operational systems are based on the use of transient data.

A. True
B. False
Answer» B. False
38.

Two basic constructs to link one piece of data with another piece of data: sequential storage and pointers.

A. True
B. False
Answer» B. False
39.

Denormalization and clustering can work well to minimize data access time for small records.

A. True
B. False
Answer» B. False
40.

The presentation logic component is responsible for formatting and presenting data on the user's screen or other output device, and for managing user input from a keyboard or other input device.

A. True
B. False
Answer» B. False
41.

Every time attribute A appears, it is matched with the same value of attribute B, but not the same value of attribute C. Therefore, it is true that:

A. A B.
B. A C.
C. A (B,C).
D. (B,C) A.
Answer» B. A C.
42.

Scalar aggregate are multiple values returned from an SQL query that includes an aggregate function.

A. True
B. False
Answer» C.
43.

A relation is considered a:

A. Column.
B. one-dimensional table.
C. two-dimensional table.
D. three-dimensional table.
Answer» D. three-dimensional table.
44.

The different classes of relations created by the technique for preventing modification anomalies are called:

A. normal forms.
B. referential integrity constraints.
C. functional dependencies.
D. None of the above is correct.
Answer» B. referential integrity constraints.
45.

A primary key is a composite key that was selected to be the main identifier for the relation.

A. True
B. False
Answer» C.
46.

The EXISTS keyword will be true if:

A. any row in the subquery meets the condition only.
B. all rows in the subquery fail the condition only.
C. both of these two conditions are met.
D. neither of these two conditions is met.
Answer» B. all rows in the subquery fail the condition only.
47.

The use of the double NOT EXISTS can be used to find rows that do not match some specified condition.

A. True
B. False
Answer» B. False
48.

When two transactions are being processed against the database at the same time they are termed concurrent transactions.

A. True
B. False
Answer» B. False
49.

The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B.

A. True
B. False
Answer» C.
50.

The JVM (Java virtual machine) interprets Java bytecode at run time.

A. True
B. False
Answer» B. False