Explore topic-wise MCQs in Engineering.

This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.

51.

Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain:

A. GROUP BY.
B. WHERE.
C. ORDER BY.
D. FROM.
Answer» D. FROM.
52.

The size of a lock is called:

A. implicit lock.
B. lock granularity.
C. exclusive lock.
D. shared lock.
Answer» C. exclusive lock.
53.

Dirty read, nonrepeatable, and phantom reads are not possible in this instance.

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» E.
54.

A transaction in which either all of the database actions occur or none of them do is called:

A. atomic.
B. consistent.
C. isolated.
D. durable.
Answer» B. consistent.
55.

Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Answer» D. Consistent read
56.

Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?

A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Answer» B. Phantom read
57.

What is the overall responsibility of the DBA?

A. Facilitate the development and use of the database
B. Create and populate tables
C. Development, operation, and maintenance of the database and its applications
D. Both the first and third answers above are correct.
Answer» E.
58.

Locks placed by the DBMS are called ________ .

A. implicit locks
B. explicit locks
C. exclusive locks
D. shared locks
Answer» B. explicit locks
59.

Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» C. Repeatable read
60.

SQL Server 2000 stored procedures can:

A. never be kept within the database.
B. be kept within the database and invoked by application programs.
C. be stored on the users' computer.
D. support BEFORE, INSTEAD OF and AFTER types.
Answer» C. be stored on the users' computer.
61.

Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?

A. Forward only
B. Static
C. Keyset
D. Dynamic
Answer» D. Dynamic
62.

Which of the following refers to a cursor type where changes of any type and from any source are visible?

A. Forward only
B. Static
C. Keyset
D. Dynamic
Answer» E.
63.

Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» D. Serializable
64.

One solution to the multivalued dependency constraint problem is to:

A. split the relation into two relations, each with a single theme.
B. change the theme.
C. create a new theme.
D. add a composite key.
Answer» B. change the theme.
65.

Which type of SQL Server cursor concurrency places an update lock on a row when the row is read?

A. READ_ONLY
B. SCROLL_LOCK
C. OPTIMISTIC
D. READCOMMITTED
Answer» E.
66.

Which of the following is a way to create and modify tables using SQL Server?

A. Write SQL code using either CREATE or ALTER SQL statements only.
B. Use the graphical facilities of SQL Server Enterprise Manager only.
C. Both of the two methods above will work.
D. Neither of the two methods above will work.
Answer» D. Neither of the two methods above will work.
67.

With which type of SQL Server recovery model, is no logging done?

A. Differential recovery
B. Full recovery
C. Bulk-logged recovery
D. Simple recovery
Answer» E.
68.

With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data.

A. Nonclustered
B. Clustered
C. Primary
D. Secondary
Answer» B. Clustered
69.

With which type of SQL Server recovery model are all database changes logged?

A. Differential recovery
B. Full recovery
C. Simple recovery
D. Bulk-logged recovery
Answer» C. Simple recovery
70.

SQL Server program code that is executed after an SQL command has been processed is called a(n):

A. INSTEAD OF trigger.
B. BEFORE trigger.
C. AFTER trigger.
D. BEGIN trigger.
Answer» D. BEGIN trigger.
71.

With this type of SQL Server cursor concurrency no lock is obtained until the user updates the data.

A. READ_ONLY
B. SCROLL_LOCK
C. OPTIMISTIC
D. PESSIMISTIC
Answer» D. PESSIMISTIC
72.

With this type of index, the data are stored in the bottom level of the index and in the same order as that index.

A. Nonclustered
B. Clustered
C. Primary
D. Secondary
Answer» C. Primary
73.

Which of the following is a group of one or more attributes that uniquely identifies a row?

A. Key
B. Determinant
C. Tuple
D. Relation
Answer» B. Determinant
74.

In SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup?

A. Complete backup
B. Transaction Log
C. Differential backup
D. None of the above is correct.
Answer» D. None of the above is correct.
75.

When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n):

A. transitive dependency.
B. insertion anomaly.
C. referential integrity constraint.
D. normal form.
Answer» D. normal form.
76.

A functional dependency is a relationship between or among:

A. tables.
B. rows.
C. relations.
D. attributes.
Answer» E.
77.

For some relations, changing the data can have undesirable consequences called:

A. referential integrity constraints.
B. modification anomalies.
C. normal forms.
D. transitive dependencies.
Answer» C. normal forms.
78.

An attribute is a(n):

A. column of a table.
B. two dimensional table.
C. row of a table.
D. key of a table.
Answer» B. two dimensional table.
79.

The advantage of optimistic locking is that:

A. the lock is obtained only after the transaction has processed.
B. the lock is obtained before the transaction has processed.
C. the lock never needs to be obtained.
D. transactions that are best suited are those with a lot of activity.
Answer» B. the lock is obtained before the transaction has processed.
80.

A tuple is a(n):

A. column of a table.
B. two dimensional table.
C. row of a table.
D. key of a table.
Answer» D. key of a table.
81.

Table is synonymous with the term:

A. record.
B. relation.
C. column.
D. field.
Answer» C. column.
82.

Which of the following is not a restriction for a table to be a relation?

A. The cells of the table must contain a single value.
B. All of the entries in any column must be of the same kind.
C. The columns must be ordered.
D. No two rows in a table may be identical.
Answer» D. No two rows in a table may be identical.
83.

A key:

A. must always be composed of two or more columns.
B. can only be one column.
C. identifies a row.
D. identifies a column.
Answer» D. identifies a column.
84.

When using the SQL INSERT statement:

A. rows can be modified according to criteria only.
B. rows cannot be copied in mass from one table to another only.
C. rows can be inserted into a table only one at a time only.
D. rows can either be inserted into a table one at a time or in groups.
Answer» E.
85.

What is not an advantage of stored procedures?

A. Greater security
B. SQL can be optimized
C. Code sharing
D. Increased network traffic
Answer» E.
86.

A reason for using an SQL view to hide columns is:

A. to simplify a result only.
B. to prevent the display of sensitive data only.
C. to accomplish both of the above.
D. None of the above are reasons for using an SQL view.
Answer» D. None of the above are reasons for using an SQL view.
87.

The SQL ALTER statement can be used to:

A. change the table structure.
B. change the table data.
C. add rows to the table.
D. delete rows from the table.
Answer» B. change the table data.
88.

To update an SQL view, the DBMS must be able to associate the column(s) to be updated with:

A. a particular column in a particular underlying table.
B. a particular column in a particular row.
C. a particular row in a particular underlying table.
D. None of the above is correct.
Answer» D. None of the above is correct.
89.

Which of the following is NOT a type of SQL constraint?

A. PRIMARY KEY
B. FOREIGN KEY
C. ALTERNATE KEY
D. UNIQUE
Answer» D. UNIQUE
90.

A ________ is a program that performs some common action on database data and that is stored in the database.

A. trigger
B. stored procedure
C. pseudofile
D. None of the above is correct.
Answer» C. pseudofile
91.

For what purposes are views used?

A. To hide columns only
B. To hide rows only
C. To hide complicated SQL statements only
D. All of the above are uses for SQL views.
Answer» E.
92.

Which type of entity is related to two or more associated entities that each contain specialized attributes that apply to some but not all of the instances of the entity?

A. Supertype entity
B. Subtype entity
C. Archetype entity
D. Instance entity
Answer» B. Subtype entity
93.

In which of the following is a single-entity instance of one type of related to a single-entity instance of another type?

A. One-to-One Relationship
B. One-to-Many Relationship
C. Many-to-Many Relationship
D. Composite Relationship
Answer» B. One-to-Many Relationship
94.

Entities can be associated with one another in which of the following?

A. Entities
B. Attributes
C. Identifiers
D. Relationships
Answer» E.
95.

Properties that describe the characteristics of entities are called:

A. entities.
B. attributes.
C. identifiers.
D. relationships.
Answer» C. identifiers.
96.

The strictest transaction isolation level provided by SQL Server is called:

A. REPEATABLE READ.
B. SERIALIZABLE.
C. READ COMMITTED.
D. READ UNCOMMITTED.
Answer» C. READ COMMITTED.
97.

In which of the following can many entity instances of one type be related to many entity instances of another type?

A. One-to-One Relationship
B. One-to-Many Relationship
C. Many-to-Many Relationship
D. Composite Relationship
Answer» D. Composite Relationship
98.

SQL Server program code that is executed instead of an SQL command that needs to be processed is called a(n):

A. INSTEAD OF trigger.
B. BEFORE trigger.
C. AFTER trigger.
D. BEGIN trigger.
Answer» B. BEFORE trigger.
99.

Which of the following locks the item from change but not from read?

A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
Answer» E.
100.

In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» B. Read uncommitted