MCQOPTIONS
Saved Bookmarks
This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 851. |
Relationships cannot have attributes. |
| A. | True |
| B. | False |
| Answer» C. | |
| 852. |
Business rules and policies are universal. |
| A. | True |
| B. | False |
| Answer» C. | |
| 853. |
An enterprise key is a primary key whose value is unique for a given relation. |
| A. | True |
| B. | False |
| Answer» C. | |
| 854. |
A composite attribute does not get mapped into a relation. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 855. |
A relation is a two-dimensional table. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 856. |
Weak entities do not get mapped into a relation. |
| A. | True |
| B. | False |
| Answer» C. | |
| 857. |
Database administration refers to a function that applies to the entire organization. |
| A. | True |
| B. | False |
| Answer» C. | |
| 858. |
The transaction log contains a copy of every database record (or page) after it has changed. These records are called before images. |
| A. | True |
| B. | False |
| Answer» C. | |
| 859. |
A primary key may be null. |
| A. | True |
| B. | False |
| Answer» C. | |
| 860. |
The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 861. |
A phantom read occurs when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction. |
| A. | True |
| B. | False |
| Answer» C. | |
| 862. |
A transaction is a series of actions to be taken on the database so that either all of them are performed successfully or none of them are performed at all. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 863. |
Two transactions that run concurrently and generate results that are consistent with the results that would have occurred if they had run separately are referred to as serializable transactions. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 864. |
A point of synchronization between the database and the transaction log is generally referred to as a stop point. |
| A. | True |
| B. | False |
| Answer» C. | |
| 865. |
An exclusive lock locks the item from change but not from read. |
| A. | True |
| B. | False |
| Answer» C. | |
| 866. |
When one transaction reads a changed record that has not been committed to the database a filthy read occurs. |
| A. | True |
| B. | False |
| Answer» C. | |
| 867. |
The size of a lock is referred to as lock sizing. |
| A. | True |
| B. | False |
| Answer» C. | |
| 868. |
Locks placed by command are implicit locks. |
| A. | True |
| B. | False |
| Answer» C. | |
| 869. |
Locks placed by the DBMS are explicit locks. |
| A. | True |
| B. | False |
| Answer» C. | |
| 870. |
In optimistic locking, the assumption is made that conflict will occur. |
| A. | True |
| B. | False |
| Answer» C. | |
| 871. |
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 872. |
Failure to control confidentiality may lead to loss of competitiveness. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 873. |
Resource locking is a process to prevent multiple applications from obtaining copies of the same record when the record is about to be changed. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 874. |
The overall responsibility of the DBA is to facilitate the development and use of the database. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 875. |
The size of the lock is referred to as the lock granularity. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 876. |
A durable transaction is one in which all committed changes are permanent. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 877. |
An ACID transaction is one that is atomic, consistent isolated, and durable. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 878. |
Both status data and event data can be stored in a database. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 879. |
Static extract is used for ongoing warehouse maintenance. |
| A. | True |
| B. | False |
| Answer» C. | |
| 880. |
A SQL view is a virtual table that is constructed from other tables or views. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 881. |
There are three SQL data modification operations: insert, modify and delete. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 882. |
SQL statements can be embedded in triggers, stored procedures, and program code. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 883. |
Three types of triggers are: BEFORE, AFTER and EXCEPTION. |
| A. | True |
| B. | False |
| Answer» C. | |
| 884. |
A view that contains a computed column can be easily updated. |
| A. | True |
| B. | False |
| Answer» C. | |
| 885. |
A trigger is a stored program that is attached to a database. |
| A. | True |
| B. | False |
| Answer» C. | |
| 886. |
When a foreign key column is created without a corresponding foreign key constraint, we have created a "casual relationship" between the two tables. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 887. |
Views can be used to show the results of computed columns. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 888. |
A benefit of using a stored procedure is that it can be distributed to client computers. |
| A. | True |
| B. | False |
| Answer» C. | |
| 889. |
A stored procedure is a program that performs some common action on database data and is stored in the database. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 890. |
SQL Server does not support the BEFORE trigger. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 891. |
A updatable view has its own data. |
| A. | True |
| B. | False |
| Answer» C. | |
| 892. |
The SQL DELETE statement is used to delete both the table structure and table data. |
| A. | True |
| B. | False |
| Answer» C. | |
| 893. |
Common types of SQL CHECK constraints include range checks and limiting columns values. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 894. |
If any required (NOT NULL) columns are missing from the view, the view cannot be used for inserting new data. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 895. |
Generalization is the process of defining more general entity types from a set of more specialized entity types. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 896. |
It is appropriate to use a supertype/subtype relationship when there are attributes that apply to some of the instances of an entity type. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 897. |
Action assertions have traditionally been implemented within an application program. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 898. |
An entity cluster is a set of one or more entity types and associated relationships. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 899. |
Overlapping and disjoint subtypes have different approaches on how the subtype discriminator is applied. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 900. |
A supertype is an entity type that shares common attributes or relationships distinct from other subgroupings. |
| A. | True |
| B. | False |
| Answer» C. | |