Explore topic-wise MCQs in Engineering.

This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.

401.

A database application can perform which of the following activities?

A. Add records
B. Read records
C. Update records
D. All of the above.
Answer» E.
402.

An enterprise data model is:

A. a graphical model that shows the high-level entities for an organization.
B. a graphical model that shows all entities for an organization.
C. a non-graphical model that shows the high-level entities for an organization.
D. a non-graphical model that shows the all entities for an organization.
Answer» B. a graphical model that shows all entities for an organization.
403.

Which of the following is true concerning Web services standards?

A. Led by only one group.
B. Helped by cooperation between companies.
C. Not necessary at this time.
D. Important so that the web can flourish.
Answer» E.
404.

Common Gateway Interface (CGI) is which of the following?

A. An interface that accepts and returns data that may be written in SQL.
B. An interface that accepts and returns data that may be written in any language that produces an executable file.
C. A small program that executes within another application and is stored on the server.
D. A small program that executes within another application and is stored on the client.
Answer» C. A small program that executes within another application and is stored on the server.
405.

Features of XML include which of the following?

A. The tags are used to describe the appearance of the content.
B. Addresses the structuring and manipulation of the data involved.
C. Governs the display of information in a Web browser.
D. All of the above.
Answer» C. Governs the display of information in a Web browser.
406.

What is Hypertext Transfer Protocol (HTTP)?

A. The protocol to copy files between computers
B. The transfer protocol to transfer Web pages to a browser
C. The database access protocol for SQL statements
D. The hardware/software protocol that limits access to company data
Answer» C. The database access protocol for SQL statements
407.

Which of the following is the original purpose of SQL?

A. To specify the syntax and semantics of SQL data definition language
B. To specify the syntax and semantics of SQL manipulation language
C. To define the data structures
D. All of the above.
Answer» E.
408.

The primary key is selected from the:

A. composite keys.
B. determinants.
C. candidate keys.
D. foreign keys.
Answer» D. foreign keys.
409.

If attributes A and B determine attribute C, then it is also true that:

A. A C.
B. B C.
C. (A,B) is a composite determinant.
D. C is a determinant.
Answer» D. C is a determinant.
410.

Which of the following refers to an entity in which the identifier of one entity includes the identifier of another entity?

A. Weak entity
B. Strong entity
C. ID-dependent entity
D. ID-independent entity
Answer» D. ID-independent entity
411.

Which of the following refers to the SQL Server transaction isolation level which places and holds locks on all rows that are read?

A. REPEATABLE READ
B. SERIALIZABLE
C. READ COMMITTED
D. READ UNCOMMITTED
Answer» B. SERIALIZABLE
412.

A supertype/subtype hierarchy is which of the following?

A. Each subtype has only one attribute.
B. Each supertype has only one attribute.
C. Each subtype has only one supertype.
D. Each supertype has only one subtype.
Answer» D. Each supertype has only one subtype.
413.

Which of the three possible types of triggers does SQL Server support?

A. INSTEAD OF only
B. AFTER only
C. BEFORE only
D. INSTEAD OF and AFTER only
Answer» E.
414.

Which of the following data constraints would be used to specify that the value of a cell in one column must be less than the value of a cell in another column in the same row of the same table?

A. A domain constraint
B. A range constraint
C. An intrarelation constraint
D. An interrelation constraint
Answer» D. An interrelation constraint
415.

The entity integrity rule states that:

A. no primary key attribute may be null.
B. no primary key can be composite.
C. no primary key may be unique.
D. no primary key may be equal to a value in a foreign key.
Answer» B. no primary key can be composite.
416.

What SQL structure is used to limit column values of a table?

A. The LIMIT constraint
B. The CHECK constraint
C. The VALUE constraint
D. None of the above is correct.
Answer» C. The VALUE constraint
417.

Which one of the following symbols is not used in an ERD?

A. Rectangle
B. Oval
C. Diamond
D. Circle
Answer» E.
418.

When an entity instance must be a member of only one subtype, it is which of the following?

A. Disjoint with total specialization
B. Disjoint with partial specialization
C. Overlap with total specialization
D. Overlap with partial specialization
Answer» B. Disjoint with partial specialization
419.

What is not true about XSLT?

A. XSLT is a declarative transformation language.
B. XSLT uses a set of rules that govern how a document is to be materialized is created.
C. XSLT uses a set of procedures that specify how a document is to be programmed.
D. XSLT is used to transform the input document into another document.
Answer» D. XSLT is used to transform the input document into another document.
420.

One popular classification technique in Business Intelligence (BI) reporting is ________ .

A. cluster analysis only
B. regression analysis only
C. RFM analysis only
D. both cluster analysis and regression analysis
Answer» D. both cluster analysis and regression analysis
421.

If attribute A determines both attributes B and C, then it is also true that:

A. A B.
B. B A.
C. C A.
D. (B,C) A.
Answer» B. B A.
422.

You have run an SQL statement that asked the DBMS to display data in a table named USER_TABLES. The results include columns of data labeled "TableName," "NumberOfColumns" and "PrimaryKey." You are looking at ________ .

A. user data.
B. metadata
C. A report
D. indexes
Answer» C. A report
423.

A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

A. forward only.
B. static.
C. keyset.
D. dynamic.
Answer» C. keyset.
424.

A transaction for which all committed changes are permanent is called:

A. atomic.
B. consistent.
C. isolated.
D. durable.
Answer» E.
425.

A shared database should:

A. be accurate and available.
B. provide for backup and recovery.
C. be secure.
D. All of the above.
Answer» E.
426.

The three-schema components include all, but:

A. internal schema.
B. conceptual schema.
C. programming schema.
D. external schema.
Answer» D. external schema.
427.

When mapping a supertype/subtype relationship which of the following is true?

A. The supertype primary key is assigned to each subtype.
B. The subtype primary key is assigned to each supertype.
C. There is no link between the supertype/subtype entities.
D. There is no primary key/foreign key relationship between a supertype/subtype.
Answer» B. The subtype primary key is assigned to each supertype.
428.

A server-side extension is needed to do what?

A. Allow a request from a client to access the database.
B. Allow a request from a client to access a HTML-formatted page.
C. Allow a request from a client to access Web pages.
D. All of the above.
Answer» B. Allow a request from a client to access a HTML-formatted page.
429.

Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet?

A. Both TCP and IP are needed.
B. TCP is needed but IP is not needed.
C. TCP is not needed but IP is needed.
D. Neither TCP and IP are needed.
Answer» B. TCP is needed but IP is not needed.
430.

Which of the following situation requires the use of ID-dependent entities?

A. Association relationships only
B. Multivalued attributes only
C. Archetype/instance relationships only
D. All of the above use ID dependent entities
Answer» E.
431.

The ODBC core API consists of which of the following functions?

A. Commit or rollback transactions only
B. Connect to data sources with driver-specific information only
C. Connect to data sources only
D. Both 1 and 3 above are in the OBDC core API.
Answer» E.
432.

What standard, protocol or language was generalized to become a standard protocol for sending messages of any type, using any protocol?

A. SOAP
B. SGML
C. SQL
D. ADO
Answer» B. SGML
433.

In the relational model, relationships between relations or tables are created by using:

A. composite keys.
B. determinants.
C. candidate keys.
D. foreign keys.
Answer» E.
434.

The HAVING clause does which of the following?

A. Acts like a WHERE clause but is used for groups rather than rows.
B. Acts like a WHERE clause but is used for rows rather than columns.
C. Acts like a WHERE clause but is used for columns rather than groups.
D. Acts EXACTLY like a WHERE clause.
Answer» B. Acts like a WHERE clause but is used for rows rather than columns.
435.

Which is not true about surrogate keys?

A. They are short.
B. They are fixed.
C. They have meaning to the user.
D. They are numeric.
Answer» D. They are numeric.
436.

A database design may be based on existing data.

A. True
B. False
Answer» B. False
437.

The result of a SQL SELECT statement is a(n) ________ .

A. report
B. form
C. file
D. table
Answer» E.
438.

To sort the results of a query use:

A. SORT BY.
B. GROUP BY.
C. ORDER BY.
D. None of the above is correct.
Answer» D. None of the above is correct.
439.

SQL is:

A. a programming language.
B. an operating system.
C. a data sublanguage.
D. a DBMS.
Answer» D. a DBMS.
440.

A relation in this form is free of all modification anomalies.

A. First normal form
B. Second normal form
C. Third normal form
D. Domain/key normal form
Answer» E.
441.

A view is which of the following?

A. A virtual table that can be accessed via SQL commands
B. A virtual table that cannot be accessed via SQL commands
C. A base table that can be accessed via SQL commands
D. A base table that cannot be accessed via SQL commands
Answer» B. A virtual table that cannot be accessed via SQL commands
442.

When assessing the table structure of an acquired set of tables with data, determining foreign keys is (part of) the:

A. first step.
B. second step.
C. third step.
D. fourth step.
Answer» C. third step.
443.

For every relationship, how many possible types of actions are there when enforcing minimum cardinalities?

A. Two
B. Three
C. Four
D. Six
Answer» E.
444.

Which of the following is valid SQL for an Index?

A. CREATE INDEX ID;
B. CHANGE INDEX ID;
C. ADD INDEX ID;
D. REMOVE INDEX ID;
Answer» B. CHANGE INDEX ID;
445.

An attribute that names or identifies entity instances is a(n):

A. entity.
B. attribute.
C. identifier.
D. relationship.
Answer» D. relationship.
446.

Each entity is represented as a(n):

A. tuple.
B. table.
C. attribute.
D. file.
Answer» C. attribute.
447.

In a 1:1 relationship, the primary key placement is arbitrary.

A. True
B. False
Answer» B. False
448.

Before any changes to database structure are attempted one should first:

A. clearly understand the current structure and contents of the database only.
B. test any changes on a test database only.
C. create a complete backup of the operational database only.
D. All of the above should be done.
Answer» E.
449.

Changing cardinalities in a database is:

A. a common database design task.
B. a rare database design task, but does occur.
C. a database design task that never occurs.
D. is impossible to do, so a new database must be constructed and the data moved into it.
Answer» B. a rare database design task, but does occur.
450.

For every relationship, how many possible sets of minimum cardinalities are there?

A. Two
B. Three
C. Four
D. Six
Answer» D. Six