Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

651.

Which of the following is the structure of the Database?

A. table
B. none of these
C. schema
D. relation
Answer» D. relation
652.

Which of the following is based on Multi Valued Dependency?

A. third
B. fourth
C. first
D. second
Answer» C. first
653.

How many types of keys in Database Design?

A. foreign key
B. all of the options
C. candidate key
D. primary key
Answer» C. candidate key
654.

In DBMS, FD stands for _______

A. facilitate data
B. functional data
C. facilitate dependency
D. functional dependency
Answer» E.
655.

In precedence of set operators the expression is evaluated from:

A. left to right
B. right to left
C. left to left
D. right to right
Answer» B. right to left
656.

Which SQL Query is use to remove a table and all its data from the database?

A. none of these
B. drop table
C. create table
D. alter table
Answer» C. create table
657.

Which of the following is an unary operation?

A. selection operation
B. primitive operation
C. projection operation
D. generalized selection
Answer» E.
658.

ODBC stands for ______

A. none of above
B. open database connection
C. offline database connection
D. oriented database connection
Answer» C. offline database connection
659.

Which of the following option is use to retrieval of data?

A. stack
B. data structure
C. linked list
D. query
Answer» E.
660.

Which of the following in true regarding Referential Integrity?

A. every primary-key value must match a primary-key value in an associated table
B. every primary-key value must match a foreign-key value in an associated table
C. every foreign-key value must match a foreign-key value in an associated table
D. every foreign-key value must match a primary-key value in an associated table
Answer» E.
661.

Data Manipulation Language (DML) is not to

A. insertion of new information into the database
B. modification of information in the database
C. create information table in the database
D. deletion of information in the database
Answer» D. deletion of information in the database
662.

UML is stands for

A. universal modeling language
B. united modeling language
C. uni modeling language
D. unified modeling language
Answer» E.
663.

Database locking concept is used to solve the problem of

A. inconsistent data
B. all of the options
C. lost update
D. uncommitted dependency
Answer» C. lost update
664.

If every non-key attribute is functionally dependent on the primary key, the relation will be in

A. fourth formal form
B. third normal form
C. first normal form
D. second normal form
Answer» C. first normal form
665.

What is ACID properties of Transactions?

A. atomicity, consistency, isolation, database
B. automatically, concurrency, isolation, durability
C. atomicity, consistency, isolation, durability
D. atomicity, consistency, inconsistent, durability
Answer» D. atomicity, consistency, inconsistent, durability
666.

The attribute that can be divided into other attributes is called

A. composite attribute
B. derived attribute
C. simple attribute
D. multi-valued attribute
Answer» B. derived attribute
667.

A command to remove a relation from an SQL database

A. delete table
B. erase table
C. alter table
D. drop table
Answer» E.
668.

Which of the following is correct regarding Aggregate functions?

A. it takes a single value and returns a single value as result
B. it takes a list of values and return a single values as result
C. it takes a list of values and return a list of values as result
D. it takes a single value and returns a list of values as result
Answer» C. it takes a list of values and return a list of values as result
669.

Which of the following is not binary operation?

A. union
B. set difference
C. cartesian product
D. project
Answer» E.
670.

Snapshot of the data in the database at a given instant of time is called

A. database instance
B. all of the options
C. database schema
D. database snapshot
Answer» B. all of the options
671.

Which of the following is not Unary operation?

A. rename
B. union
C. select
D. project
Answer» C. select
672.

Logical design of database is called

A. all of the options
B. database schema
C. database instance
D. database snapshot
Answer» C. database instance
673.

Which of the following is true regarding Null Value?

A. null<0
B. null=0
C. null<>0
D. null>0
Answer» D. null>0
674.

Set of premitted values of each attribute is called

A. tuple
B. schema
C. domain
D. relation
Answer» D. relation
675.

Which of the following in not Outer join?

A. left outer join
B. full outer join
C. all of the options
D. right outer join
Answer» D. right outer join
676.

Which of the following is not Modification of the Database

A. updating
B. sorting
C. deletion
D. insertion
Answer» C. deletion
677.

Minimal Superkeys are called

A. schema keys
B. attribute keys
C. candidate keys
D. domain keys
Answer» D. domain keys
678.

_______ allow us to identify uniquely a tuple in the relation.

A. schema
B. superkey
C. domain
D. attribute
Answer» C. domain
679.

Column header is refer as

A. table
B. domain
C. attributes
D. relation
Answer» D. relation
680.

A Database Management System (DBMS) is

A. collection of interrelated data
B. collection of data describing one particular enterprise
C. all of the options
D. collection of programs to access data
Answer» D. collection of programs to access data
681.

Which of the following in not a function of DBA?

A. network maintenance
B. schema definition
C. authorization for data access
D. routine maintenance
Answer» B. schema definition
682.

Which of the following is a Data Model?

A. entity relationship model
B. object based data model
C. all of the options are correct
D. relational data model
Answer» D. relational data model
683.

Which of the following is Database Language?

A. data definition language
B. data manipulation language
C. data query language
D. all of the options
Answer» E.
684.

Which of the following is not an Schema?

A. logical schema
B. physical schema
C. database schema
D. critical schema
Answer» E.
685.

Data Manipulation Language enables users to

A. retrieval of information stored in database
B. insertion of new information into the database
C. deletion of information from the database
D. all the options are correct
Answer» E.
686.

Which of the following is not a Storage Manager Component?

A. transaction manager
B. logical manager
C. file manager
D. buffer manager
Answer» C. file manager
687.

In an Entity Relationship Diagram Rectangles represents

A. tables
B. attributes
C. database
D. entity sets
Answer» E.
688.

Disadvantages of File systems to store data is:

A. data isolation
B. data redundancy and inconsistency
C. difficulty in accessing data
D. all options are correct
Answer» E.
689.

Which of the following is not a level of data abstraction?

A. view level
B. physical level
C. logical level
D. critical level
Answer» E.
690.

A Database Management System (DBMS) is:

A. collection of data describing one particular enterprise
B. collection of programs to access data
C. all options are correct
D. collection of interrelated data
Answer» D. collection of interrelated data
691.

A relational database consists of a collection of

A. keys
B. records
C. tables
D. fields
Answer» D. fields
692.

If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is

A. one safe
B. two safe
C. two-very safe
D. very safe
Answer» C. two-very safe
693.

A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is

A. one safe
B. two safe
C. two-very safe
D. very safe
Answer» D. very safe
694.

A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is

A. one safe
B. two safe
C. two-very safe
D. very safe
Answer» B. two safe
695.

A                                configuration can make takeover by the backup site almost instantaneous.

A. hot-spare
B. remote
C. direct
D. spare
Answer» E.
696.

The time to process the remote backup can be reduced by

A. flags
B. breakpoints
C. redo points
D. checkpoints
Answer» E.
697.

The simplest way of transferring control is for the old primary to receive                       from the old backup site.

A. undo logs
B. redo logs
C. primary logs
D. all of the mentioned
Answer» D. all of the mentioned
698.

When the                      the backup site takes over processing and becomes the primary.

A. secondary fails
B. backup recovers
C. primary fails
D. none of the mentioned
Answer» D. none of the mentioned
699.

The remote backup site is sometimes also called the

A. primary site
B. secondary site
C. tertiary site
D. none of the mentioned
Answer» C. tertiary site
700.

If                        are not obtained in undo operation it will cause problem in undo- phase.

A. higher-level lock
B. lower-level lock
C. read only lock
D. read write
Answer» C. read only lock