Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is the structure of the Database?

A. table
B. none of these
C. schema
D. relation
Answer» D. relation
2.

Which of the following is based on Multi Valued Dependency?

A. third
B. fourth
C. first
D. second
Answer» C. first
3.

How many types of keys in Database Design?

A. foreign key
B. all of the options
C. candidate key
D. primary key
Answer» C. candidate key
4.

In DBMS, FD stands for _______

A. facilitate data
B. functional data
C. facilitate dependency
D. functional dependency
Answer» E.
5.

In precedence of set operators the expression is evaluated from:

A. left to right
B. right to left
C. left to left
D. right to right
Answer» B. right to left
6.

Which SQL Query is use to remove a table and all its data from the database?

A. none of these
B. drop table
C. create table
D. alter table
Answer» C. create table
7.

Which of the following is an unary operation?

A. selection operation
B. primitive operation
C. projection operation
D. generalized selection
Answer» E.
8.

ODBC stands for ______

A. none of above
B. open database connection
C. offline database connection
D. oriented database connection
Answer» C. offline database connection
9.

Which of the following option is use to retrieval of data?

A. stack
B. data structure
C. linked list
D. query
Answer» E.
10.

Which of the following in true regarding Referential Integrity?

A. every primary-key value must match a primary-key value in an associated table
B. every primary-key value must match a foreign-key value in an associated table
C. every foreign-key value must match a foreign-key value in an associated table
D. every foreign-key value must match a primary-key value in an associated table
Answer» E.
11.

Data Manipulation Language (DML) is not to

A. insertion of new information into the database
B. modification of information in the database
C. create information table in the database
D. deletion of information in the database
Answer» D. deletion of information in the database
12.

UML is stands for

A. universal modeling language
B. united modeling language
C. uni modeling language
D. unified modeling language
Answer» E.
13.

Database locking concept is used to solve the problem of

A. inconsistent data
B. all of the options
C. lost update
D. uncommitted dependency
Answer» C. lost update
14.

If every non-key attribute is functionally dependent on the primary key, the relation will be in

A. fourth formal form
B. third normal form
C. first normal form
D. second normal form
Answer» C. first normal form
15.

What is ACID properties of Transactions?

A. atomicity, consistency, isolation, database
B. automatically, concurrency, isolation, durability
C. atomicity, consistency, isolation, durability
D. atomicity, consistency, inconsistent, durability
Answer» D. atomicity, consistency, inconsistent, durability
16.

The attribute that can be divided into other attributes is called

A. composite attribute
B. derived attribute
C. simple attribute
D. multi-valued attribute
Answer» B. derived attribute
17.

A command to remove a relation from an SQL database

A. delete table
B. erase table
C. alter table
D. drop table
Answer» E.
18.

Which of the following is correct regarding Aggregate functions?

A. it takes a single value and returns a single value as result
B. it takes a list of values and return a single values as result
C. it takes a list of values and return a list of values as result
D. it takes a single value and returns a list of values as result
Answer» C. it takes a list of values and return a list of values as result
19.

Which of the following is not binary operation?

A. union
B. set difference
C. cartesian product
D. project
Answer» E.
20.

Snapshot of the data in the database at a given instant of time is called

A. database instance
B. all of the options
C. database schema
D. database snapshot
Answer» B. all of the options
21.

Which of the following is not Unary operation?

A. rename
B. union
C. select
D. project
Answer» C. select
22.

Logical design of database is called

A. all of the options
B. database schema
C. database instance
D. database snapshot
Answer» C. database instance
23.

Which of the following is true regarding Null Value?

A. null<0
B. null=0
C. null<>0
D. null>0
Answer» D. null>0
24.

Set of premitted values of each attribute is called

A. tuple
B. schema
C. domain
D. relation
Answer» D. relation
25.

Which of the following in not Outer join?

A. left outer join
B. full outer join
C. all of the options
D. right outer join
Answer» D. right outer join
26.

Which of the following is not Modification of the Database

A. updating
B. sorting
C. deletion
D. insertion
Answer» C. deletion
27.

Minimal Superkeys are called

A. schema keys
B. attribute keys
C. candidate keys
D. domain keys
Answer» D. domain keys
28.

_______ allow us to identify uniquely a tuple in the relation.

A. schema
B. superkey
C. domain
D. attribute
Answer» C. domain
29.

Column header is refer as

A. table
B. domain
C. attributes
D. relation
Answer» D. relation
30.

A Database Management System (DBMS) is

A. collection of interrelated data
B. collection of data describing one particular enterprise
C. all of the options
D. collection of programs to access data
Answer» D. collection of programs to access data
31.

Which of the following in not a function of DBA?

A. network maintenance
B. schema definition
C. authorization for data access
D. routine maintenance
Answer» B. schema definition
32.

Which of the following is a Data Model?

A. entity relationship model
B. object based data model
C. all of the options are correct
D. relational data model
Answer» D. relational data model
33.

Which of the following is Database Language?

A. data definition language
B. data manipulation language
C. data query language
D. all of the options
Answer» E.
34.

Which of the following is not an Schema?

A. logical schema
B. physical schema
C. database schema
D. critical schema
Answer» E.
35.

Data Manipulation Language enables users to

A. retrieval of information stored in database
B. insertion of new information into the database
C. deletion of information from the database
D. all the options are correct
Answer» E.
36.

Which of the following is not a Storage Manager Component?

A. transaction manager
B. logical manager
C. file manager
D. buffer manager
Answer» C. file manager
37.

In an Entity Relationship Diagram Rectangles represents

A. tables
B. attributes
C. database
D. entity sets
Answer» E.
38.

Disadvantages of File systems to store data is:

A. data isolation
B. data redundancy and inconsistency
C. difficulty in accessing data
D. all options are correct
Answer» E.
39.

Which of the following is not a level of data abstraction?

A. view level
B. physical level
C. logical level
D. critical level
Answer» E.
40.

A Database Management System (DBMS) is:

A. collection of data describing one particular enterprise
B. collection of programs to access data
C. all options are correct
D. collection of interrelated data
Answer» D. collection of interrelated data
41.

A relational database consists of a collection of

A. keys
B. records
C. tables
D. fields
Answer» D. fields
42.

If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is

A. one safe
B. two safe
C. two-very safe
D. very safe
Answer» C. two-very safe
43.

A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is

A. one safe
B. two safe
C. two-very safe
D. very safe
Answer» D. very safe
44.

A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is

A. one safe
B. two safe
C. two-very safe
D. very safe
Answer» B. two safe
45.

A                                configuration can make takeover by the backup site almost instantaneous.

A. hot-spare
B. remote
C. direct
D. spare
Answer» E.
46.

The time to process the remote backup can be reduced by

A. flags
B. breakpoints
C. redo points
D. checkpoints
Answer» E.
47.

The simplest way of transferring control is for the old primary to receive                       from the old backup site.

A. undo logs
B. redo logs
C. primary logs
D. all of the mentioned
Answer» D. all of the mentioned
48.

When the                      the backup site takes over processing and becomes the primary.

A. secondary fails
B. backup recovers
C. primary fails
D. none of the mentioned
Answer» D. none of the mentioned
49.

The remote backup site is sometimes also called the

A. primary site
B. secondary site
C. tertiary site
D. none of the mentioned
Answer» C. tertiary site
50.

If                        are not obtained in undo operation it will cause problem in undo- phase.

A. higher-level lock
B. lower-level lock
C. read only lock
D. read write
Answer» C. read only lock