Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

451.

FDs are the types of constraints that are based on______:

A. Key
B. Key revisited
C. Superset key
D. None of these
Answer» B. Key revisited
452.

The number of tuples in a relation is called it’s …………. While the number of attributes in a relation is called it’s ………………..

A. Degree, Cardinality
B. Cardinality, Degree
C. Rows, Columns
D. Columns, Rows
Answer» C. Rows, Columns
453.

The ..................... is essentially used to search for patterns in target string.

A. Like Predicate
B. Null Predicate
C. In Predicate
D. Out Predicate
Answer» B. Null Predicate
454.

The relational model is based on the concept that data is organized and stored in two-dimensionaltables called ……………………….

A. Fields
B. Records
C. Relations
D. Keys
Answer» D. Keys
455.

In                                the management of the password for the account can be handled outside of oracle such as operating system.

A. database authentication
B. operating system authentication
C. internal authentication
D. external authentication
Answer» C. internal authentication
456.

Using the              clause retains only one copy of such identical tuples.

A.
B. unique
C. not null
Answer» E.
457.

If needed to split a node or coalesce it with its siblings, or redistribute key values between siblings, the crabbing protocol locks the parent of the node in                           mode.

A. shared
B. exclusive
C. read only
D. none of the mentioned
Answer» C. read only
458.

The                                policy, allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk.

A. force
B. no-force
C. steal
D. no-steal
Answer» C. steal
459.

The simplest way of transferring control is for the old primary to receive                       from the old backup site.

A. undo logs
B. redo logs
C. primary logs
D. all of the mentioned
Answer» D. all of the mentioned
460.

The association role defines:

A. how tables are related in the database
B. the relationship between the class diagram and the tables in the database
C. the tables that each attribute is contained
D. which attribute is the table’s primary key
Answer» B. the relationship between the class diagram and the tables in the database
461.

refers to the ability of the system to recover committed transaction updates if either the system or the storage media fails.

A. isolation
B. atomicity
C. consistency
D. durability
Answer» E.
462.

What is ACID properties

A. Atomicity
B. Consistency
C. Isolation
D. All of the above
Answer» E.
463.

Which normal form is most desirable ?

A. DKNF
B. 3 NF
C. BCNF
D. 4 NF
Answer» C. BCNF
464.

Which of the following is a database element?

A. Data
B. Relationships
C. Constraints and Schema
D. All of the above
Answer» E.
465.

Any recursive view must be defined as the union of two subqueries: a                query that is nonrecursive and a                      query.

A. base, recursive
B. recursive, base
C. base, redundant
D. view, base
Answer» B. recursive, base
466.

Relational Algebra is

A. Data Definition Language .
B. Meta Language
C. Procedural query Language
D. None of the above
Answer» D. None of the above
467.

Two or more attributes that can be a key are called :

A. determinants
B. primary key
C. Composite key
D. foreign key
Answer» D. foreign key
468.

The                      function that does not create gaps in the ordering.

A. intense_rank()
B. continue_rank()
C. default_rank()
D. dense_rank()
Answer» E.
469.

………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations.

A. Entity Integrity Constraints
B. Referential Integrity Constraints
C. Domain Integrity Constraints
D. Key Constraints
Answer» C. Domain Integrity Constraints
470.

Which data model organizes the data in the form of tables and relations?

A. Relational Model
B. Hierarchical Model
C. Network Model
D. none of the above
Answer» B. Hierarchical Model
471.

Which command is used to add a column to an existing table?

A. Create
B. Update
C. Alter
D. None of these
Answer» D. None of these
472.

When the                      the backup site takes over processing and becomes the primary.

A. secondary fails
B. backup recovers
C. primary fails
D. none of the mentioned
Answer» D. none of the mentioned
473.

---------------- is used to retrieve tuples from the relation.

A. Create
B. Drop
C. Select
D. All of the above
Answer» D. All of the above
474.

Which is relation calculus:

A. Tuple relational calculus
B. Domain relational calculus
C. Both
D. None
Answer» D. None
475.

A _________ integrity constraint requires that the values appearing in specified attributesof any tuple in the referencing relation also appear in specified attributes of at least one tuple inthe referenced relation.

A. Referential
B. Referencing
C. Specific
D. Primary
Answer» B. Referencing
476.

provides option for entering SQL queries as execution time, rather than at the development stage.

A. pl/sql
B. sql*plus
C. sql
D. dynamic sql
Answer» E.
477.

Which of the following can initiate a trigger?

A. INSERT
B. UPDATE
C. DELETE
D. All of the above
Answer» E.
478.

Which rules are defined in relational models they from as an essential part of any relationdatabase:

A. Integrity rules
B. Database
C. Record
D. Memory
Answer» B. Database
479.

In which model of database data is stored in tables:

A. Network model
B. Relational model
C. Hierarchical model
D. None of these
Answer» C. Hierarchical model
480.

A physical data models are used to

A. Specify overall logical structure of the database
B. Describe data and its relationships
C. Higher-level description of storage structure and access mechanism
D. All of these
Answer» E.
481.

When the values in one or more attributes being used as a foreign key must exist in another set ofone or more attributes in another table, we have created a(n):

A. Transitive dependency
B. Insertion anomaly.
C. Referential integrity constraint.
D. Normal form
Answer» D. Normal form
482.

Indices whose search key specifies an order different from the sequential order of the file are called                        indices.

A. nonclustered
B. secondary
C. all of the mentioned
D. none of the mentioned
Answer» D. none of the mentioned
483.

rolls back all transactions that were incomplete at the time of crash.

A. analysis pass
B. redo pass
C. undo pass
D. none of the mentioned
Answer» D. none of the mentioned
484.

Writing the buffered log to                      is sometimes referred to as a log force.

A. memory
B. backup
C. redo memory
D. disk
Answer» E.
485.

Consider a hash table of size seven, with starting index zero, and a hash function (3x + 4)mod7. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Note that ‘_’ denotes an empty location in the table.

A. 8, _, _, _, _, _, 10
B. 1, 8, 10, _, _, _, 3
C. 1, _, _, _, _, _,3
D. 1, 10, 8, _, _, _, 3
Answer» C. 1, _, _, _, _, _,3
486.

Retrieval of data is done by using a ____:

A. Stack
B. Query
C. Linked list
D. All of these
Answer» C. Linked list
487.

……………… table store information about database or about the system.

A. SQL
B. Nested
C. System
D. None of these
Answer» D. None of these
488.

To remove a relation from an SQL database, we use the              command.

A. delete
B. purge
C. remove
D. drop table
Answer» E.
489.

Each operation in a demand-driven pipeline can be implemented as an          that provides the following functions: open(), next(), and close().

A. demand
B. pipeline
C. iterator
D. all of the mentioned
Answer» D. all of the mentioned
490.

is the time from when a read or write request is issued to when data transfer begins.

A. access time
B. average seek time
C. seek time
D. rotational latency time
Answer» B. average seek time
491.

Thus a                of course data gives the values of all attributes, such as title and department, of all courses at a particular point in time.

A. instance
B. snapshot
C. both instance and snapshot
D. all of the mentioned
Answer» C. both instance and snapshot
492.

……………… defines rules regarding the values allowed in columns and is the standard mechanismfor enforcing database integrity.

A. Column
B. Constraint
C. Index
D. Trigger
Answer» C. Index
493.

A                                        is an explicit numeric, character, string or Boolean value not represented by an identifier.

A. comments
B. literals
C. delimiters
D. identifiers
Answer» C. delimiters
494.

What defines how and where data are organized in physical data storage?

A. Internal schema
B. External schema
C. Conceptual schema
D. None of the above
Answer» B. External schema
495.

____ ensures that once transaction changes are done, they cannot be undone orlost, even in the event of a system failure.

A. Atomicity
B. Consistency
C. Durability
D. Isolation
Answer» D. Isolation
496.

is used to minimize unnecessary redos during recovery.

A. dirty page table
B. page table
C. dirty redo
D. all of the mentioned
Answer» B. page table
497.

Which mapping exists between the external and conceptual levels:

A. Conceptual
B. External
C. Both
D. None
Answer» D. None
498.

is a combination of two of more attributes used as a primary key

A. composite key
B. alternate key
C. candidate key
D. foreign key
Answer» B. alternate key
499.

If there are n tuples in the partition and the rank of the tuple is r, then its                  is defined as (r −1)/(n−1).

A. ntil()
B. cum_rank
C. percent_rank
D. rank()
Answer» D. rank()
500.

By relation cardinality we mean

A. number of items in a relationship
B. number of relationships in which an entity can appear
C. number of items in an entity
D. number of entity sets which may be related to a given entity
Answer» C. number of items in an entity