

MCQOPTIONS
Saved Bookmarks
This section includes 175 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
101. |
Which of the following retains duplicate rows in the result of a query or in an Aggregate expression? |
A. | ALL |
B. | DISTINCT |
C. | PRIOR |
D. | None of the above |
Answer» B. DISTINCT | |
102. |
Which, if any, of the two queries above will correctly (in SQL2) get the desired set of employee ID s? |
A. | Both I and II |
B. | I only |
C. | II only |
D. | Neither I nor I |
Answer» B. I only | |
103. |
Which of the following is the operation that is used if we are interested in only certain attributes or columns of a table? |
A. | SELECT |
B. | PROJECT |
C. | UNION |
D. | JOIN |
Answer» C. UNION | |
104. |
Which collection types is also known as index-by tables, lets you look up elements Using arbitrary numbers and strings for subscript values? |
A. | Associative arrays |
B. | Nested tables |
C. | Varrays |
D. | None of the above |
Answer» B. Nested tables | |
105. |
Which of the following is the formal process for deciding which attributes should be grouped together in a relation? |
A. | Normalization |
B. | Performance Tuning |
C. | Optimization |
D. | None of the above |
Answer» B. Performance Tuning | |
106. |
Which is the central component of the DBMS software that can also be termed as the database control system? |
A. | Data consistency |
B. | Data integration |
C. | Data sharing |
D. | Data manager |
Answer» E. | |
107. |
The three basic techniques to control deadlocks are: deadlock ____, deadlock detection, and deadlock avoidance. |
A. | prevention |
B. | prohibition |
C. | rollback |
D. | Commits |
Answer» B. prohibition | |
108. |
Large collection of les are called |
A. | fields |
B. | records |
C. | database |
D. | sectors |
Answer» D. sectors | |
109. |
Some of the utilities of DBMS are ............. i) Transaction ii) Backup iii) File organization iv) Process Organization |
A. | i, ii, and iv only |
B. | i, ii and iii only |
C. | ii, iii and iv only |
D. | All i, ii, iii, and iv |
Answer» D. All i, ii, iii, and iv | |
110. |
For like predicate which of the following is true. i) % matches zero of more characters. ii) _ matches exactly one character. |
A. | i-only |
B. | ii-only |
C. | Both of them |
D. | None of them |
Answer» D. None of them | |
111. |
Which of the following specifies a boolean expression that must be true for the trigger to fire? |
A. | Trigger Action |
B. | Triggering Event |
C. | Trigger Restriction |
D. | None of the above |
Answer» D. None of the above | |
112. |
Which is incorporated to create an appropriate physical database that is transformed by a logical data model: |
A. | SDL |
B. | VDL |
C. | Both |
D. | None |
Answer» E. | |
113. |
Which of the following is not a relational algebraic operation that is developed specifically for the relational databases? |
A. | SELECT |
B. | UNION |
C. | JOIN |
D. | PROJECT |
Answer» C. JOIN | |
114. |
What separates the physical aspects of data storage from the logical aspects of data representation? |
A. | Data |
B. | Schema |
C. | Constraints |
D. | Relationships |
Answer» E. | |
115. |
Which rules are defined in relational models they from as an essential part of any relation database: |
A. | Integrity rules |
B. | Database |
C. | Record |
D. | Memory |
Answer» B. Database | |
116. |
Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM? |
A. | IDMS |
B. | DB2 |
C. | dBase-II |
D. | R:base |
Answer» C. dBase-II | |
117. |
The different classes of relations created by the technique for preventing modification anomalies are called: |
A. | Normal forms. |
B. | Referential integrity constraints. |
C. | Functional dependencies. |
D. | None of the above |
Answer» B. Referential integrity constraints. | |
118. |
Which is a duplicate copy of a file program that is stored on a different storage media than the original location: |
A. | Concurrency |
B. | Deadlock |
C. | Backup |
D. | Recovery |
Answer» D. Recovery | |
119. |
The different classes of relations created by the technique for preventing modification anomalies are called: |
A. | normal forms. |
B. | referential integrity constraints. |
C. | functional dependencies. |
D. | None of the above is correct. |
Answer» B. referential integrity constraints. | |
120. |
Which of the following trigger will be executed before modifying each row affected by the triggering statement? |
A. | Before Statement Trigger |
B. | After Row Trigger |
C. | Before Row Trigger |
D. | None of the above |
Answer» D. None of the above | |
121. |
Thus a _______ of course data gives the values of all attributes, such as title and department, of all courses at a particular point in time. |
A. | Instance |
B. | Snapshot |
C. | Both Instance and Snapshot |
D. | All of the mentioned |
Answer» C. Both Instance and Snapshot | |
122. |
The ______ is the one in which the primary key of one relation is used as a normal Attribute in another relation . |
A. | Referential relation |
B. | Referencing relation |
C. | Referenced relation |
D. | Referred relation |
Answer» C. Referenced relation | |
123. |
Which forms simplifies and ensures that there are minimal data aggregates and repetitive groups: |
A. | 1NF |
B. | 2NF |
C. | 3NF |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
124. |
A domain is atomic if elements of the domain are considered to be ____________ units. |
A. | Different |
B. | Indivisbile |
C. | Constant |
D. | Divisible |
Answer» C. Constant | |
125. |
The main task carried out in the __________ is to remove repeating attributes to separate tables. |
A. | First Normal Form |
B. | Second Normal Form |
C. | Third Normal Form |
D. | Fourth Normal Form |
Answer» B. Second Normal Form | |
126. |
A relation Schema R is in .. if it is in 3NF and satisfies an additional constant thatfor every FD X->A. X must be a candidate key. |
A. | 1 NF |
B. | 2 NF |
C. | 3 NF |
D. | BCNF |
Answer» E. | |
127. |
PL/SQL has two types of subprograms, procedures and functions. Which subprogram isused to compute a value? |
A. | Procedure |
B. | Function |
C. | Both A & B |
D. | None of the above |
Answer» C. Both A & B | |
128. |
In which of the following cases will the RDBMS specify a default value for the column if there are no values for it? |
A. | NOT NULL WITH DEFAULT |
B. | COLUMN DEFAULT |
C. | NOT NULL UNIUE |
D. | None of the above |
Answer» D. None of the above | |
129. |
Consider attributes ID , CITY and NAME . Which one of this can be considered as a super key ? |
A. | NAME |
B. | ID |
C. | CITY |
D. | CITY , ID |
Answer» C. CITY | |
130. |
Consequently R.Boyce-Codd jointly launched powerful definition for the third normal form called______: |
A. | Boyce-Codd normal form |
B. | First normal form |
C. | Second normal form |
D. | All of these |
Answer» B. First normal form | |
131. |
A lock that allows concurrent transactions to access di erent rows of the same table is known as a |
A. | database-level lock |
B. | table-level lock |
C. | page-level lock |
D. | row-level lock |
Answer» E. | |
132. |
Which of the following hardware component is the most important to the operation of a database management system? |
A. | High resolution video display |
B. | Printer |
C. | High speed, large capacity disk |
D. | Mouse |
Answer» D. Mouse | |
133. |
An application where only one user accesses the database at a given time is an example of a(n) ________ . |
A. | single-user database application |
B. | multiuser database application |
C. | e-commerce database application |
D. | data mining database application |
Answer» B. multiuser database application | |
134. |
Suppose the user finds the usage of room number and phone number in a relational schema there is confusion.This is reduced by |
A. | Unique-role assumption |
B. | Unique-key assignment |
C. | Role intergral assignment |
D. | None of the mentioned |
Answer» B. Unique-key assignment | |
135. |
A (n) .. is an attribute in a relation that serves as a primary key of another relation in the same. |
A. | Composite key |
B. | Foreign key |
C. | Identifier key |
D. | Primary key |
Answer» D. Primary key | |
136. |
____ ensures that once transaction changes are done, they cannot be undone or lost, even in the event of a system failure. |
A. | Atomicity |
B. | Consistency |
C. | Durability |
D. | Isolation |
Answer» D. Isolation | |
137. |
What is the type of Oracle backup in which all uncommitted changes have been removed from the datafiles? |
A. | Full backup |
B. | Consistent backup |
C. | Inconsistent backup |
D. | Differential backup |
Answer» C. Inconsistent backup | |
138. |
What term is used to refer to a specific record in your music database; for instance; information stored about a specific album? |
A. | Relation |
B. | Instance |
C. | Table |
D. | Column |
Answer» C. Table | |
139. |
Although the ____ locking approach improves the availability of data, its management requires high overhead. |
A. | database-level |
B. | table-level |
C. | page-level |
D. | row-level |
Answer» E. | |
140. |
If you were collecting and storing information about your music collection, an album would be considered a(n) _____ |
A. | Relation |
B. | Entity |
C. | Instance |
D. | Attribute |
Answer» C. Instance | |
141. |
.. contains information that defines valid values that are stored in a column or data type. |
A. | View |
B. | Rule |
C. | Index |
D. | Default |
Answer» D. Default | |
142. |
In a(n) ____ backup of the database, only the last modifications to the database are copied. |
A. | full |
B. | incomplete |
C. | differential |
D. | transaction log |
Answer» D. transaction log | |
143. |
Which of the following is not a relational algebraic operation that is not form the set theory? |
A. | UNION |
B. | INTERSECTION |
C. | CARTESIAN PRODUCT |
D. | SELECT |
Answer» E. | |
144. |
Which of the following is the default trigger that is created using the CREATE TRIGGER command? |
A. | Row level Trigger |
B. | Statement level Trigger |
C. | BEFORE Trigger |
D. | AFTER Trigger |
Answer» C. BEFORE Trigger | |
145. |
Which of the following constitutes a basic set of operations for manipulating relational data? |
A. | Predicate calculus |
B. | Relational algebra |
C. | Relational calculus |
D. | None of the above |
Answer» C. Relational calculus | |
146. |
Empdt1(empcode, name, street, city, state, pincode). For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in |
A. | 1 NF only |
B. | 2 NF and hence also in 1 NF |
C. | 3NF and hence also in 2NF and 1NF |
D. | BCNF and hence also in 3NF, 2NF and 1NF |
Answer» C. 3NF and hence also in 2NF and 1NF | |
147. |
Which of the following schemas defines the stored data structures in terms of the database model used? |
A. | External |
B. | Conceptual |
C. | Internal |
D. | None of these |
Answer» C. Internal | |
148. |
Which of the following clause specifies the table or tables from where the data has to be retrieved? |
A. | Where |
B. | Table |
C. | From |
D. | None of these |
Answer» D. None of these | |
149. |
The relational model is based on the concept that data is organized and stored in two-dimensional tables called . |
A. | Fields |
B. | Records |
C. | Relations |
D. | Keys |
Answer» D. Keys | |
150. |
Which of the following is the clause that makes a singleton SELECT different from the normal SELECT? |
A. | WHERE |
B. | INTO |
C. | IN |
D. | None of the above |
Answer» C. IN | |