MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 451. |
FDs are the types of constraints that are based on______: |
| A. | Key |
| B. | Key revisited |
| C. | Superset key |
| D. | None of these |
| Answer» B. Key revisited | |
| 452. |
The number of tuples in a relation is called it’s …………. While the number of attributes in a relation is called it’s ……………….. |
| A. | Degree, Cardinality |
| B. | Cardinality, Degree |
| C. | Rows, Columns |
| D. | Columns, Rows |
| Answer» C. Rows, Columns | |
| 453. |
The ..................... is essentially used to search for patterns in target string. |
| A. | Like Predicate |
| B. | Null Predicate |
| C. | In Predicate |
| D. | Out Predicate |
| Answer» B. Null Predicate | |
| 454. |
The relational model is based on the concept that data is organized and stored in two-dimensionaltables called ………………………. |
| A. | Fields |
| B. | Records |
| C. | Relations |
| D. | Keys |
| Answer» D. Keys | |
| 455. |
In the management of the password for the account can be handled outside of oracle such as operating system. |
| A. | database authentication |
| B. | operating system authentication |
| C. | internal authentication |
| D. | external authentication |
| Answer» C. internal authentication | |
| 456. |
Using the clause retains only one copy of such identical tuples. |
| A. | |
| B. | unique |
| C. | not null |
| Answer» E. | |
| 457. |
If needed to split a node or coalesce it with its siblings, or redistribute key values between siblings, the crabbing protocol locks the parent of the node in mode. |
| A. | shared |
| B. | exclusive |
| C. | read only |
| D. | none of the mentioned |
| Answer» C. read only | |
| 458. |
The policy, allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk. |
| A. | force |
| B. | no-force |
| C. | steal |
| D. | no-steal |
| Answer» C. steal | |
| 459. |
The simplest way of transferring control is for the old primary to receive from the old backup site. |
| A. | undo logs |
| B. | redo logs |
| C. | primary logs |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 460. |
The association role defines: |
| A. | how tables are related in the database |
| B. | the relationship between the class diagram and the tables in the database |
| C. | the tables that each attribute is contained |
| D. | which attribute is the table’s primary key |
| Answer» B. the relationship between the class diagram and the tables in the database | |
| 461. |
refers to the ability of the system to recover committed transaction updates if either the system or the storage media fails. |
| A. | isolation |
| B. | atomicity |
| C. | consistency |
| D. | durability |
| Answer» E. | |
| 462. |
What is ACID properties |
| A. | Atomicity |
| B. | Consistency |
| C. | Isolation |
| D. | All of the above |
| Answer» E. | |
| 463. |
Which normal form is most desirable ? |
| A. | DKNF |
| B. | 3 NF |
| C. | BCNF |
| D. | 4 NF |
| Answer» C. BCNF | |
| 464. |
Which of the following is a database element? |
| A. | Data |
| B. | Relationships |
| C. | Constraints and Schema |
| D. | All of the above |
| Answer» E. | |
| 465. |
Any recursive view must be defined as the union of two subqueries: a query that is nonrecursive and a query. |
| A. | base, recursive |
| B. | recursive, base |
| C. | base, redundant |
| D. | view, base |
| Answer» B. recursive, base | |
| 466. |
Relational Algebra is |
| A. | Data Definition Language . |
| B. | Meta Language |
| C. | Procedural query Language |
| D. | None of the above |
| Answer» D. None of the above | |
| 467. |
Two or more attributes that can be a key are called : |
| A. | determinants |
| B. | primary key |
| C. | Composite key |
| D. | foreign key |
| Answer» D. foreign key | |
| 468. |
The function that does not create gaps in the ordering. |
| A. | intense_rank() |
| B. | continue_rank() |
| C. | default_rank() |
| D. | dense_rank() |
| Answer» E. | |
| 469. |
………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. |
| A. | Entity Integrity Constraints |
| B. | Referential Integrity Constraints |
| C. | Domain Integrity Constraints |
| D. | Key Constraints |
| Answer» C. Domain Integrity Constraints | |
| 470. |
Which data model organizes the data in the form of tables and relations? |
| A. | Relational Model |
| B. | Hierarchical Model |
| C. | Network Model |
| D. | none of the above |
| Answer» B. Hierarchical Model | |
| 471. |
Which command is used to add a column to an existing table? |
| A. | Create |
| B. | Update |
| C. | Alter |
| D. | None of these |
| Answer» D. None of these | |
| 472. |
When the the backup site takes over processing and becomes the primary. |
| A. | secondary fails |
| B. | backup recovers |
| C. | primary fails |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 473. |
---------------- is used to retrieve tuples from the relation. |
| A. | Create |
| B. | Drop |
| C. | Select |
| D. | All of the above |
| Answer» D. All of the above | |
| 474. |
Which is relation calculus: |
| A. | Tuple relational calculus |
| B. | Domain relational calculus |
| C. | Both |
| D. | None |
| Answer» D. None | |
| 475. |
A _________ integrity constraint requires that the values appearing in specified attributesof any tuple in the referencing relation also appear in specified attributes of at least one tuple inthe referenced relation. |
| A. | Referential |
| B. | Referencing |
| C. | Specific |
| D. | Primary |
| Answer» B. Referencing | |
| 476. |
provides option for entering SQL queries as execution time, rather than at the development stage. |
| A. | pl/sql |
| B. | sql*plus |
| C. | sql |
| D. | dynamic sql |
| Answer» E. | |
| 477. |
Which of the following can initiate a trigger? |
| A. | INSERT |
| B. | UPDATE |
| C. | DELETE |
| D. | All of the above |
| Answer» E. | |
| 478. |
Which rules are defined in relational models they from as an essential part of any relationdatabase: |
| A. | Integrity rules |
| B. | Database |
| C. | Record |
| D. | Memory |
| Answer» B. Database | |
| 479. |
In which model of database data is stored in tables: |
| A. | Network model |
| B. | Relational model |
| C. | Hierarchical model |
| D. | None of these |
| Answer» C. Hierarchical model | |
| 480. |
A physical data models are used to |
| A. | Specify overall logical structure of the database |
| B. | Describe data and its relationships |
| C. | Higher-level description of storage structure and access mechanism |
| D. | All of these |
| Answer» E. | |
| 481. |
When the values in one or more attributes being used as a foreign key must exist in another set ofone or more attributes in another table, we have created a(n): |
| A. | Transitive dependency |
| B. | Insertion anomaly. |
| C. | Referential integrity constraint. |
| D. | Normal form |
| Answer» D. Normal form | |
| 482. |
Indices whose search key specifies an order different from the sequential order of the file are called indices. |
| A. | nonclustered |
| B. | secondary |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 483. |
rolls back all transactions that were incomplete at the time of crash. |
| A. | analysis pass |
| B. | redo pass |
| C. | undo pass |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 484. |
Writing the buffered log to is sometimes referred to as a log force. |
| A. | memory |
| B. | backup |
| C. | redo memory |
| D. | disk |
| Answer» E. | |
| 485. |
Consider a hash table of size seven, with starting index zero, and a hash function (3x + 4)mod7. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Note that ‘_’ denotes an empty location in the table. |
| A. | 8, _, _, _, _, _, 10 |
| B. | 1, 8, 10, _, _, _, 3 |
| C. | 1, _, _, _, _, _,3 |
| D. | 1, 10, 8, _, _, _, 3 |
| Answer» C. 1, _, _, _, _, _,3 | |
| 486. |
Retrieval of data is done by using a ____: |
| A. | Stack |
| B. | Query |
| C. | Linked list |
| D. | All of these |
| Answer» C. Linked list | |
| 487. |
……………… table store information about database or about the system. |
| A. | SQL |
| B. | Nested |
| C. | System |
| D. | None of these |
| Answer» D. None of these | |
| 488. |
To remove a relation from an SQL database, we use the command. |
| A. | delete |
| B. | purge |
| C. | remove |
| D. | drop table |
| Answer» E. | |
| 489. |
Each operation in a demand-driven pipeline can be implemented as an that provides the following functions: open(), next(), and close(). |
| A. | demand |
| B. | pipeline |
| C. | iterator |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 490. |
is the time from when a read or write request is issued to when data transfer begins. |
| A. | access time |
| B. | average seek time |
| C. | seek time |
| D. | rotational latency time |
| Answer» B. average seek time | |
| 491. |
Thus a of course data gives the values of all attributes, such as title and department, of all courses at a particular point in time. |
| A. | instance |
| B. | snapshot |
| C. | both instance and snapshot |
| D. | all of the mentioned |
| Answer» C. both instance and snapshot | |
| 492. |
……………… defines rules regarding the values allowed in columns and is the standard mechanismfor enforcing database integrity. |
| A. | Column |
| B. | Constraint |
| C. | Index |
| D. | Trigger |
| Answer» C. Index | |
| 493. |
A is an explicit numeric, character, string or Boolean value not represented by an identifier. |
| A. | comments |
| B. | literals |
| C. | delimiters |
| D. | identifiers |
| Answer» C. delimiters | |
| 494. |
What defines how and where data are organized in physical data storage? |
| A. | Internal schema |
| B. | External schema |
| C. | Conceptual schema |
| D. | None of the above |
| Answer» B. External schema | |
| 495. |
____ ensures that once transaction changes are done, they cannot be undone orlost, even in the event of a system failure. |
| A. | Atomicity |
| B. | Consistency |
| C. | Durability |
| D. | Isolation |
| Answer» D. Isolation | |
| 496. |
is used to minimize unnecessary redos during recovery. |
| A. | dirty page table |
| B. | page table |
| C. | dirty redo |
| D. | all of the mentioned |
| Answer» B. page table | |
| 497. |
Which mapping exists between the external and conceptual levels: |
| A. | Conceptual |
| B. | External |
| C. | Both |
| D. | None |
| Answer» D. None | |
| 498. |
is a combination of two of more attributes used as a primary key |
| A. | composite key |
| B. | alternate key |
| C. | candidate key |
| D. | foreign key |
| Answer» B. alternate key | |
| 499. |
If there are n tuples in the partition and the rank of the tuple is r, then its is defined as (r −1)/(n−1). |
| A. | ntil() |
| B. | cum_rank |
| C. | percent_rank |
| D. | rank() |
| Answer» D. rank() | |
| 500. |
By relation cardinality we mean |
| A. | number of items in a relationship |
| B. | number of relationships in which an entity can appear |
| C. | number of items in an entity |
| D. | number of entity sets which may be related to a given entity |
| Answer» C. number of items in an entity | |