Explore topic-wise MCQs in Engineering.

This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.

901.

An entity instance of a subtype represents the same entity instance of a supertype.

A. True
B. False
Answer» B. False
902.

An ERD that has had the entities clustered will display more entities.

A. True
B. False
Answer» C.
903.

Total specialization is represented by double lines between the supertype and subtype on an EER.

A. True
B. False
Answer» B. False
904.

Data descriptions are stored in a central location called the depository.

A. True
B. False
Answer» C.
905.

Stored representations of objects and events that have meaning and importance in the user's environment are known as a database.

A. True
B. False
Answer» C.
906.

Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally.

A. True
B. False
Answer» B. False
907.

Incorrect data is easy to detect.

A. True
B. False
Answer» C.
908.

With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users.

A. True
B. False
Answer» C.
909.

A disaster recovery plan does not need to include the shipment of database backups to other sites.

A. True
B. False
Answer» C.
910.

Databases are not the property of a single function or individual within the organization.

A. True
B. False
Answer» B. False
911.

Data modeling and database design are key responsibilities of data and data base administration.

A. True
B. False
Answer» B. False
912.

Information repositories are replacing data dictionaries in many organizations.

A. True
B. False
Answer» B. False
913.

Queries that do full table scans should be avoided.

A. True
B. False
Answer» B. False
914.

The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.

A. True
B. False
Answer» B. False
915.

Another name for multimedia data is unstructured data.

A. True
B. False
Answer» B. False
916.

The most common source of database failures in an organization is the failure to implement a strong database administration function.

A. True
B. False
Answer» B. False
917.

The primary mechanism for providing context for data is metadata.

A. True
B. False
Answer» B. False
918.

A workgroup typically comprises between 25 and 100 persons.

A. True
B. False
Answer» C.
919.

The source of the data is sometimes called the system of record.

A. True
B. False
Answer» B. False
920.

Data quality problems currently cost U.S. businesses some $60 million each year (Hudica, 2003).

A. True
B. False
Answer» C.
921.

Stand-alone databases exhibit many of the same advantages common to file processing systems.

A. True
B. False
Answer» C.
922.

The database approach requires additional costs and risks.

A. True
B. False
Answer» B. False
923.

Data scrubbing can help upgrade data quality; it is not a long-term solution to the data quality problem.

A. True
B. False
Answer» B. False
924.

Every key used to join the fact table with a dimensional table should be a surrogate key.

A. True
B. False
Answer» B. False
925.

Derived data are detailed, current data intended to be the single, authoritative source for all decision support applications.

A. True
B. False
Answer» C.
926.

Joining is the process of partitioning data according to predefined criteria.

A. True
B. False
Answer» C.
927.

The role of the ETL process is to identify erroneous data and to fix them.

A. True
B. False
Answer» C.
928.

Data in the data warehouse are loaded and refreshed from operational systems.

A. True
B. False
Answer» B. False
929.

Star schema is suited to online transaction processing, and therefore is generally used in operational systems, operational data stores, or an EDW.

A. True
B. False
Answer» C.
930.

Periodic data are data that are physically altered once added to the store.

A. True
B. False
Answer» C.
931.

A transaction log shows before and after images of records that have been modified by transactions.

A. True
B. False
Answer» C.
932.

The greatest threat to business security is often internal rather than external.

A. True
B. False
Answer» B. False
933.

Authorization tables contain highly sensitive data and should be protected by stringent security rules.

A. True
B. False
Answer» B. False
934.

An enterprise data model is a relational model that shows the high-level entities for the organization and associations among those entities.

A. True
B. False
Answer» C.
935.

Independent data marts are often created because an organization focuses on a series of short-term business objectives.

A. True
B. False
Answer» B. False
936.

Data in operational systems are typically fragmented and inconsistent.

A. True
B. False
Answer» B. False
937.

Most operational systems are based on the use of transient data.

A. True
B. False
Answer» B. False
938.

Two basic constructs to link one piece of data with another piece of data: sequential storage and pointers.

A. True
B. False
Answer» B. False
939.

Denormalization and clustering can work well to minimize data access time for small records.

A. True
B. False
Answer» B. False
940.

The presentation logic component is responsible for formatting and presenting data on the user's screen or other output device, and for managing user input from a keyboard or other input device.

A. True
B. False
Answer» B. False
941.

Every time attribute A appears, it is matched with the same value of attribute B, but not the same value of attribute C. Therefore, it is true that:

A. A B.
B. A C.
C. A (B,C).
D. (B,C) A.
Answer» B. A C.
942.

Scalar aggregate are multiple values returned from an SQL query that includes an aggregate function.

A. True
B. False
Answer» C.
943.

A relation is considered a:

A. Column.
B. one-dimensional table.
C. two-dimensional table.
D. three-dimensional table.
Answer» D. three-dimensional table.
944.

The different classes of relations created by the technique for preventing modification anomalies are called:

A. normal forms.
B. referential integrity constraints.
C. functional dependencies.
D. None of the above is correct.
Answer» B. referential integrity constraints.
945.

A primary key is a composite key that was selected to be the main identifier for the relation.

A. True
B. False
Answer» C.
946.

The EXISTS keyword will be true if:

A. any row in the subquery meets the condition only.
B. all rows in the subquery fail the condition only.
C. both of these two conditions are met.
D. neither of these two conditions is met.
Answer» B. all rows in the subquery fail the condition only.
947.

The use of the double NOT EXISTS can be used to find rows that do not match some specified condition.

A. True
B. False
Answer» B. False
948.

When two transactions are being processed against the database at the same time they are termed concurrent transactions.

A. True
B. False
Answer» B. False
949.

The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B.

A. True
B. False
Answer» C.
950.

The JVM (Java virtual machine) interprets Java bytecode at run time.

A. True
B. False
Answer» B. False