MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 801. |
Database security helps organizations to protect data from |
| A. | internal users |
| B. | external users |
| C. | non-external users |
| D. | non internal users |
| Answer» C. non-external users | |
| 802. |
Optimization basically related to the Rewrite module is termed as |
| A. | semantic query optimization |
| B. | global query optimization |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. global query optimization | |
| 803. |
Which is the duplication of computer operations and routine backups to combat any unforeseen problems: |
| A. | concurrency |
| B. | deadlock |
| C. | backup |
| D. | recovery |
| Answer» E. | |
| 804. |
Which is a duplicate copy of a ï¬le program that is stored on a different storage media than the original location: |
| A. | concurrency |
| B. | deadlock |
| C. | backup |
| D. | recovery |
| Answer» D. recovery | |
| 805. |
Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other: |
| A. | concurrency |
| B. | deadlock |
| C. | backup |
| D. | recovery |
| Answer» C. backup | |
| 806. |
Which is the process of breaking a relation into multiple relations: |
| A. | functional dependency |
| B. | database modeling |
| C. | normalization |
| D. | decomposition |
| Answer» E. | |
| 807. |
E.F.Codd developed the normalization process in the which early: |
| A. | 1969 |
| B. | 1970 |
| C. | 1971 |
| D. | 1972 |
| Answer» C. 1971 | |
| 808. |
Who developed the normalization process: |
| A. | e.f. codd |
| B. | f.f. codd |
| C. | e.e. codd |
| D. | none of the mentioned |
| Answer» B. f.f. codd | |
| 809. |
How many types of insertion anomalies: |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 810. |
The database design prevents some data from being represented due to |
| A. | deletion anomalies |
| B. | insertion anomalies |
| C. | update anomaly |
| D. | none of the mentioned |
| Answer» C. update anomaly | |
| 811. |
McFadden has deï¬ned normalization in his which book |
| A. | database modern management |
| B. | management database of modern |
| C. | modern database management |
| D. | database management |
| Answer» D. database management | |
| 812. |
                         allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement. |
| A. | procedure |
| B. | trigger |
| C. | curser |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 813. |
Which s essential a business problem not a data problem: |
| A. | data |
| B. | database |
| C. | database design |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 814. |
                         is a special type of stored procedure that is automatically invoked whenever the data in the table is modiï¬ed. |
| A. | procedure |
| B. | trigger |
| C. | curser |
| D. | none of the mentioned |
| Answer» C. curser | |
| 815. |
Which of the following is not the function of client? |
| A. | compile queries |
| B. | query optimization |
| C. | receive queries |
| D. | result formatting and presentation |
| Answer» C. receive queries | |
| 816. |
                             requires that data should be made available to only authorized users. |
| A. | data integrity |
| B. | privacy |
| C. | security |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 817. |
The                                  is essentially used to search for patterns in target string. |
| A. | like predicate |
| B. | null predicate |
| C. | in predicate |
| D. | out predicate |
| Answer» B. null predicate | |
| 818. |
                         is a combination of two of more attributes used as a primary key |
| A. | composite key |
| B. | alternate key |
| C. | candidate key |
| D. | foreign key |
| Answer» B. alternate key | |
| 819. |
                               joins are SQL server default |
| A. | outer |
| B. | inner |
| C. | equi |
| D. | none of the mentioned |
| Answer» C. equi | |
| 820. |
Which of the following is not a state in transaction? |
| A. | active |
| B. | terminated |
| C. | aborted |
| D. | partially committed |
| Answer» C. aborted | |
| 821. |
               means that data used during the execution of a transaction cannot be used by a second transaction until the ï¬rst one is completed. |
| A. | serializability |
| B. | atomicity |
| C. | isolation |
| D. | time stamping |
| Answer» D. time stamping | |
| 822. |
Which of the following is an atomic sequence of database actions? |
| A. | transaction |
| B. | concurrency |
| C. | relations |
| D. | all of the mentioned |
| Answer» B. concurrency | |
| 823. |
When the transaction ï¬nishes the ï¬nal statement the transaction enters into |
| A. | active state |
| B. | committed state |
| C. | partially committed state |
| D. | abort state |
| Answer» D. abort state | |
| 824. |
Each modiï¬cation done in database transaction are ï¬rst recorded into the |
| A. | harddrive |
| B. | log |
| C. | disk |
| D. | datamart |
| Answer» C. disk | |
| 825. |
The name of the transaction ï¬le shall be provided by the operator and the ï¬le that contains the edited transactions ready for execution shall be called |
| A. | batch. exe |
| B. | trans. exe |
| C. | opt. exe |
| D. | edit.exe |
| Answer» D. edit.exe | |
| 826. |
If an transaction is performed in a database and committed, the changes are taken to the previous state of transaction by |
| A. | flashback |
| B. | rollback |
| C. | both flashback and rollback |
| D. | cannot be done |
| Answer» E. | |
| 827. |
The process of saving information onto secondary storage devices is referred to as |
| A. | backing up |
| B. | restoring |
| C. | writing |
| D. | reading |
| Answer» D. reading | |
| 828. |
SDL means |
| A. | storage discrete language |
| B. | storage deï¬nition language |
| C. | storage deï¬nition localisation |
| D. | storage discrete localisation |
| Answer» C. storage deï¬nition localisation | |
| 829. |
A ï¬le produced by a spreadsheet |
| A. | is generally stored on disk in an ascii text format |
| B. | can be used as is by the dbms |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. can be used as is by the dbms | |
| 830. |
A              ï¬le system is software that enables multiple computers to share ï¬le storage while maintaining consistent space allocation and ï¬le content. |
| A. | storage |
| B. | tertiary |
| C. | secondary |
| D. | cluster |
| Answer» E. | |
| 831. |
The unit of storage that can store one are more records in a hash ï¬le organization are |
| A. | buckets |
| B. | disk pages |
| C. | blocks |
| D. | nodes |
| Answer» B. disk pages | |
| 832. |
For a transaction to be durable, its changes need to be written to                  storage. |
| A. | volatile storage |
| B. | non-volatile storage |
| C. | stable storage |
| D. | dynamic storage |
| Answer» D. dynamic storage | |
| 833. |
The storage structure which do not survive system crashes are |
| A. | volatile storage |
| B. | non-volatile storage |
| C. | stable storage |
| D. | dynamic storage |
| Answer» B. non-volatile storage | |
| 834. |
Which of the following SQL command can be used to modify existing data in a database table? |
| A. | modify |
| B. | update |
| C. | change |
| D. | new |
| Answer» C. change | |
| 835. |
                               provides option for entering SQL queries as execution time, rather than at the development stage. |
| A. | pl/sql |
| B. | sql*plus |
| C. | sql |
| D. | dynamic sql |
| Answer» E. | |
| 836. |
The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), |
| A. | 6789 |
| B. | 2345 |
| C. | 1234 |
| D. | 456789 |
| Answer» C. 1234 | |
| 837. |
Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables? |
| A. | data deï¬nition language |
| B. | data manipulation language |
| C. | data described language |
| D. | data retrieval language |
| Answer» B. data manipulation language | |
| 838. |
What are the different events in Triggers? |
| A. | deï¬ne, create |
| B. | drop, comment |
| C. | insert, update, delete |
| D. | select, commit |
| Answer» D. select, commit | |
| 839. |
Which of the following is TRUE for the System Variable $date$? |
| A. | can be assigned to a global variable |
| B. | can be assigned to any ï¬eld only during design time |
| C. | can be assigned to any variable or ï¬eld during run time |
| D. | can be assigned to a local variable |
| Answer» C. can be assigned to any variable or ï¬eld during run time | |
| 840. |
Which character function can be used to return a speciï¬ed portion of a character string? |
| A. | instr |
| B. | substring |
| C. | substr |
| D. | pos |
| Answer» D. pos | |
| 841. |
In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction? |
| A. | create package |
| B. | create schema |
| C. | create cluster |
| D. | all of the mentioned |
| Answer» C. create cluster | |
| 842. |
         means that the data used during the execution of a transaction cannot be used by a second transaction until the ï¬rst one is completed. |
| A. | consistency |
| B. | atomicity |
| C. | durability |
| D. | isolation |
| Answer» E. | |
| 843. |
The Oracle RDBMS uses the          statement to declare a new transaction start and its properties. |
| A. | begin |
| B. | set transaction |
| C. | begin transaction |
| D. | commit |
| Answer» C. begin transaction | |
| 844. |
In SQL, the CREATE TABLESPACE is used |
| A. | to create a place in the database for storage of scheme objects, rollback segments, and naming the data ï¬les to comprise the tablespace |
| B. | to create a database trigger |
| C. | to add/rename data ï¬les, to change storage |
| D. | all of the mentioned |
| Answer» B. to create a database trigger | |
| 845. |
Transaction processing is associated with everything below except |
| A. | producing detail summary or exception reports |
| B. | recording a business activity |
| C. | conï¬rming an action or triggering a response |
| D. | maintaining a data |
| Answer» D. maintaining a data | |
| 846. |
                     states that only valid data will be written to the database. |
| A. | consistency |
| B. | atomicity |
| C. | durability |
| D. | isolation |
| Answer» B. atomicity | |
| 847. |
The property of a transaction that persists all the crashes is |
| A. | atomicity |
| B. | durability |
| C. | isolation |
| D. | all of the mentioned |
| Answer» C. isolation | |
| 848. |
Which of the following has “all-or-none†property? |
| A. | atomicity |
| B. | durability |
| C. | isolation |
| D. | all of the mentioned |
| Answer» B. durability | |
| 849. |
A transaction is delimited by statements (or function calls) of the form |
| A. | begin transaction and end transaction |
| B. | start transaction and stop transaction |
| C. | get transaction and post transaction |
| D. | read transaction and write transaction |
| Answer» B. start transaction and stop transaction | |
| 850. |
Identify the characteristics of transactions |
| A. | atomicity |
| B. | durability |
| C. | isolation |
| D. | all of the mentioned |
| Answer» E. | |