MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 651. |
Which of the following is the structure of the Database? |
| A. | table |
| B. | none of these |
| C. | schema |
| D. | relation |
| Answer» D. relation | |
| 652. |
Which of the following is based on Multi Valued Dependency? |
| A. | third |
| B. | fourth |
| C. | first |
| D. | second |
| Answer» C. first | |
| 653. |
How many types of keys in Database Design? |
| A. | foreign key |
| B. | all of the options |
| C. | candidate key |
| D. | primary key |
| Answer» C. candidate key | |
| 654. |
In DBMS, FD stands for _______ |
| A. | facilitate data |
| B. | functional data |
| C. | facilitate dependency |
| D. | functional dependency |
| Answer» E. | |
| 655. |
In precedence of set operators the expression is evaluated from: |
| A. | left to right |
| B. | right to left |
| C. | left to left |
| D. | right to right |
| Answer» B. right to left | |
| 656. |
Which SQL Query is use to remove a table and all its data from the database? |
| A. | none of these |
| B. | drop table |
| C. | create table |
| D. | alter table |
| Answer» C. create table | |
| 657. |
Which of the following is an unary operation? |
| A. | selection operation |
| B. | primitive operation |
| C. | projection operation |
| D. | generalized selection |
| Answer» E. | |
| 658. |
ODBC stands for ______ |
| A. | none of above |
| B. | open database connection |
| C. | offline database connection |
| D. | oriented database connection |
| Answer» C. offline database connection | |
| 659. |
Which of the following option is use to retrieval of data? |
| A. | stack |
| B. | data structure |
| C. | linked list |
| D. | query |
| Answer» E. | |
| 660. |
Which of the following in true regarding Referential Integrity? |
| A. | every primary-key value must match a primary-key value in an associated table |
| B. | every primary-key value must match a foreign-key value in an associated table |
| C. | every foreign-key value must match a foreign-key value in an associated table |
| D. | every foreign-key value must match a primary-key value in an associated table |
| Answer» E. | |
| 661. |
Data Manipulation Language (DML) is not to |
| A. | insertion of new information into the database |
| B. | modification of information in the database |
| C. | create information table in the database |
| D. | deletion of information in the database |
| Answer» D. deletion of information in the database | |
| 662. |
UML is stands for |
| A. | universal modeling language |
| B. | united modeling language |
| C. | uni modeling language |
| D. | unified modeling language |
| Answer» E. | |
| 663. |
Database locking concept is used to solve the problem of |
| A. | inconsistent data |
| B. | all of the options |
| C. | lost update |
| D. | uncommitted dependency |
| Answer» C. lost update | |
| 664. |
If every non-key attribute is functionally dependent on the primary key, the relation will be in |
| A. | fourth formal form |
| B. | third normal form |
| C. | first normal form |
| D. | second normal form |
| Answer» C. first normal form | |
| 665. |
What is ACID properties of Transactions? |
| A. | atomicity, consistency, isolation, database |
| B. | automatically, concurrency, isolation, durability |
| C. | atomicity, consistency, isolation, durability |
| D. | atomicity, consistency, inconsistent, durability |
| Answer» D. atomicity, consistency, inconsistent, durability | |
| 666. |
The attribute that can be divided into other attributes is called |
| A. | composite attribute |
| B. | derived attribute |
| C. | simple attribute |
| D. | multi-valued attribute |
| Answer» B. derived attribute | |
| 667. |
A command to remove a relation from an SQL database |
| A. | delete table |
| B. | erase table |
| C. | alter table |
| D. | drop table |
| Answer» E. | |
| 668. |
Which of the following is correct regarding Aggregate functions? |
| A. | it takes a single value and returns a single value as result |
| B. | it takes a list of values and return a single values as result |
| C. | it takes a list of values and return a list of values as result |
| D. | it takes a single value and returns a list of values as result |
| Answer» C. it takes a list of values and return a list of values as result | |
| 669. |
Which of the following is not binary operation? |
| A. | union |
| B. | set difference |
| C. | cartesian product |
| D. | project |
| Answer» E. | |
| 670. |
Snapshot of the data in the database at a given instant of time is called |
| A. | database instance |
| B. | all of the options |
| C. | database schema |
| D. | database snapshot |
| Answer» B. all of the options | |
| 671. |
Which of the following is not Unary operation? |
| A. | rename |
| B. | union |
| C. | select |
| D. | project |
| Answer» C. select | |
| 672. |
Logical design of database is called |
| A. | all of the options |
| B. | database schema |
| C. | database instance |
| D. | database snapshot |
| Answer» C. database instance | |
| 673. |
Which of the following is true regarding Null Value? |
| A. | null<0 |
| B. | null=0 |
| C. | null<>0 |
| D. | null>0 |
| Answer» D. null>0 | |
| 674. |
Set of premitted values of each attribute is called |
| A. | tuple |
| B. | schema |
| C. | domain |
| D. | relation |
| Answer» D. relation | |
| 675. |
Which of the following in not Outer join? |
| A. | left outer join |
| B. | full outer join |
| C. | all of the options |
| D. | right outer join |
| Answer» D. right outer join | |
| 676. |
Which of the following is not Modification of the Database |
| A. | updating |
| B. | sorting |
| C. | deletion |
| D. | insertion |
| Answer» C. deletion | |
| 677. |
Minimal Superkeys are called |
| A. | schema keys |
| B. | attribute keys |
| C. | candidate keys |
| D. | domain keys |
| Answer» D. domain keys | |
| 678. |
_______ allow us to identify uniquely a tuple in the relation. |
| A. | schema |
| B. | superkey |
| C. | domain |
| D. | attribute |
| Answer» C. domain | |
| 679. |
Column header is refer as |
| A. | table |
| B. | domain |
| C. | attributes |
| D. | relation |
| Answer» D. relation | |
| 680. |
A Database Management System (DBMS) is |
| A. | collection of interrelated data |
| B. | collection of data describing one particular enterprise |
| C. | all of the options |
| D. | collection of programs to access data |
| Answer» D. collection of programs to access data | |
| 681. |
Which of the following in not a function of DBA? |
| A. | network maintenance |
| B. | schema definition |
| C. | authorization for data access |
| D. | routine maintenance |
| Answer» B. schema definition | |
| 682. |
Which of the following is a Data Model? |
| A. | entity relationship model |
| B. | object based data model |
| C. | all of the options are correct |
| D. | relational data model |
| Answer» D. relational data model | |
| 683. |
Which of the following is Database Language? |
| A. | data definition language |
| B. | data manipulation language |
| C. | data query language |
| D. | all of the options |
| Answer» E. | |
| 684. |
Which of the following is not an Schema? |
| A. | logical schema |
| B. | physical schema |
| C. | database schema |
| D. | critical schema |
| Answer» E. | |
| 685. |
Data Manipulation Language enables users to |
| A. | retrieval of information stored in database |
| B. | insertion of new information into the database |
| C. | deletion of information from the database |
| D. | all the options are correct |
| Answer» E. | |
| 686. |
Which of the following is not a Storage Manager Component? |
| A. | transaction manager |
| B. | logical manager |
| C. | file manager |
| D. | buffer manager |
| Answer» C. file manager | |
| 687. |
In an Entity Relationship Diagram Rectangles represents |
| A. | tables |
| B. | attributes |
| C. | database |
| D. | entity sets |
| Answer» E. | |
| 688. |
Disadvantages of File systems to store data is: |
| A. | data isolation |
| B. | data redundancy and inconsistency |
| C. | difficulty in accessing data |
| D. | all options are correct |
| Answer» E. | |
| 689. |
Which of the following is not a level of data abstraction? |
| A. | view level |
| B. | physical level |
| C. | logical level |
| D. | critical level |
| Answer» E. | |
| 690. |
A Database Management System (DBMS) is: |
| A. | collection of data describing one particular enterprise |
| B. | collection of programs to access data |
| C. | all options are correct |
| D. | collection of interrelated data |
| Answer» D. collection of interrelated data | |
| 691. |
A relational database consists of a collection of |
| A. | keys |
| B. | records |
| C. | tables |
| D. | fields |
| Answer» D. fields | |
| 692. |
If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is |
| A. | one safe |
| B. | two safe |
| C. | two-very safe |
| D. | very safe |
| Answer» C. two-very safe | |
| 693. |
A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site. This is |
| A. | one safe |
| B. | two safe |
| C. | two-very safe |
| D. | very safe |
| Answer» D. very safe | |
| 694. |
A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is |
| A. | one safe |
| B. | two safe |
| C. | two-very safe |
| D. | very safe |
| Answer» B. two safe | |
| 695. |
A                                conï¬guration can make takeover by the backup site almost instantaneous. |
| A. | hot-spare |
| B. | remote |
| C. | direct |
| D. | spare |
| Answer» E. | |
| 696. |
The time to process the remote backup can be reduced by |
| A. | flags |
| B. | breakpoints |
| C. | redo points |
| D. | checkpoints |
| Answer» E. | |
| 697. |
The simplest way of transferring control is for the old primary to receive                      from the old backup site. |
| A. | undo logs |
| B. | redo logs |
| C. | primary logs |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 698. |
When the                      the backup site takes over processing and becomes the primary. |
| A. | secondary fails |
| B. | backup recovers |
| C. | primary fails |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 699. |
The remote backup site is sometimes also called the |
| A. | primary site |
| B. | secondary site |
| C. | tertiary site |
| D. | none of the mentioned |
| Answer» C. tertiary site | |
| 700. |
If                        are not obtained in undo operation it will cause problem in undo- phase. |
| A. | higher-level lock |
| B. | lower-level lock |
| C. | read only lock |
| D. | read write |
| Answer» C. read only lock | |