MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk. |
| A. | fuzzy logic |
| B. | checkpoints |
| C. | fuzzy-checkpoint |
| D. | logical checkpoint |
| Answer» D. logical checkpoint | |
| 52. |
A domain is atomic if elements of the domain are considered to be units. |
| A. | different |
| B. | indivisbile |
| C. | constant |
| D. | divisible |
| Answer» C. constant | |
| 53. |
If a node is locked in then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks. |
| A. | intention lock modes |
| B. | intention-shared-exclusive mode |
| C. | intention-exclusive (ix) mode |
| D. | intention-shared (is) mode |
| Answer» D. intention-shared (is) mode | |
| 54. |
Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the field of the page. |
| A. | lsn |
| B. | readlsn |
| C. | pagelsn |
| D. | redolsn |
| Answer» D. redolsn | |
| 55. |
State true or false: If a relation consists of a foreign key, then it is called a referencedrelation of the foreign key dependency. |
| A. | True |
| B. | False |
| C. | none |
| D. | all |
| Answer» C. none | |
| 56. |
The different classes of relations created by the technique for preventing modification anomaliesare called: |
| A. | Normal forms. |
| B. | Referential integrity constraints. |
| C. | Functional dependencies. |
| D. | None of the above |
| Answer» B. Referential integrity constraints. | |
| 57. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism. |
| A. | row-level authorization |
| B. | column-level authentication |
| C. | row-type authentication |
| D. | authorization security |
| Answer» B. column-level authentication | |
| 58. |
To access information from a database, you need a ___________ |
| A. | EIS |
| B. | DBMS |
| C. | MIS |
| D. | None of the above |
| Answer» C. MIS | |
| 59. |
A .................. normal form, normalization will be needed where all attributes in a relation tuple arenot functionally dependent only on the key attribute. |
| A. | First |
| B. | Second |
| C. | Third |
| D. | Fourth |
| Answer» D. Fourth | |
| 60. |
Optical disk systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand. |
| A. | tape storage |
| B. | jukebox |
| C. | flash memory |
| D. | all of the mentioned |
| Answer» C. flash memory | |
| 61. |
In a relation between the entities the type and condition of the relation should be specified. That is called as attribute. |
| A. | desciptive |
| B. | derived |
| C. | recursive |
| D. | relative |
| Answer» B. derived | |
| 62. |
Which, if any, of the two queries above will correctly (in SQL2) get the desired set ofemployee ID’s? |
| A. | Both I and II |
| B. | I only |
| C. | II only |
| D. | Neither I nor I |
| Answer» B. I only | |
| 63. |
is a contiguous group of |
| A. | instance |
| B. | segment |
| C. | database |
| D. | dictionary |
| Answer» D. dictionary | |
| 64. |
The operation of moving from finer- granularity data to a coarser granularity (by means of aggregation) is called a |
| A. | rollup |
| B. | drill down |
| C. | dicing |
| D. | pivoting |
| Answer» B. drill down | |
| 65. |
The name of the system database that contains descriptions of data in the database is |
| A. | Data dictionary |
| B. | Metadata |
| C. | Table |
| D. | None of these |
| Answer» C. Table | |
| 66. |
The subset of super key is a candidate key under what condition ? |
| A. | No proper subset is a super key |
| B. | All subsets are super keys |
| C. | Subset is a super key |
| D. | Each subset is a super key |
| Answer» D. Each subset is a super key | |
| 67. |
How many levels of abstraction in DBMS: |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |
| 68. |
What is the default order of Order by clause? |
| A. | Descending |
| B. | Ascending |
| C. | Random |
| D. | None of the above |
| Answer» C. Random | |
| 69. |
A in a table represents a relationship among a set of values. |
| A. | column |
| B. | key |
| C. | row |
| D. | entry |
| Answer» D. entry | |
| 70. |
The candidate key is that you choose to identify each row uniquely is called …………….. |
| A. | Alternate Key |
| B. | Primary Key |
| C. | Foreign Key |
| D. | None of the above |
| Answer» C. Foreign Key | |
| 71. |
A hash function must meet ________ criteriA:) |
| A. | Two |
| B. | Three |
| C. | Four |
| D. | None of the mentioned |
| Answer» C. Four | |
| 72. |
There are _________ number of Normal forms that has been defined |
| A. | 5 |
| B. | 6 |
| C. | 4 |
| D. | 3 |
| Answer» C. 4 | |
| 73. |
Pick entities from the following:I. vendor II. student III. attends IV. km/hour |
| A. | i, ii, iii |
| B. | i, ii, iv |
| C. | i and ii |
| D. | iii and iv |
| Answer» D. iii and iv | |
| 74. |
Consider a relation R(A,B,C,D,E) with the following functional dependencies:ABC -> DE andD -> AB The number of superkeys of R is: |
| A. | 2 |
| B. | 7 |
| C. | 10 |
| D. | 12 |
| Answer» D. 12 | |
| 75. |
is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
| A. | encryption |
| B. | data mining |
| C. | internet security |
| D. | architectural security |
| Answer» B. data mining | |
| 76. |
An operation is said to be if executing it several times in a row gives the same result as executing it once. |
| A. | idempotent |
| B. | changed |
| C. | repetitive |
| D. | all of the above |
| Answer» B. changed | |
| 77. |
This statement fails when executed: CREATE OR REPLACE TRI GGER CALC_TEAM_AVG AFTER I NSERT ON PLAYER BEGIN INSERT INTO PLAYER_BATSTAT ( PLAYER_I D, SEASON_YEAR, AT_BATS, HI TS) VALUES ( : NEW. I D, 1 997, 0, 0) ; END; To which type must you convert the trigger to correct the error? |
| A. | Row |
| B. | Statement |
| C. | ORACLE FORM trigger |
| D. | Before |
| Answer» B. Statement | |
| 78. |
View the Exhibit and examine the data in the EMPLOYEES tables. Evaluate the following SQL statement: SELECT employee_id, department_id FROM employees WHERE department_id= 50 ORDER BY department_id UNION SELECT employee_id, department_id FROM employees WHERE department_id= 90 UNION SELECT employee_id, department_id FROM employees WHERE department_id= 10; What would be the outcome of the above SQL statement? |
| A. | The statement would execute successfully and display all the rows in the ascending order ofDEPARTMENT_ID. |
| B. | The statement would execute successfully but it will ignore the ORDER BY clause and display the rows in random order. |
| C. | The statement would not execute because the positional notation instead of the column name should be used with the ORDER BY clause. |
| D. | The statement would not execute because the ORDER BY clause should appear only at the end of the SQL statement, that is, in the last SELECT statement. |
| Answer» E. | |
| 79. |
is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory. |
| A. | flash memory |
| B. | disk |
| C. | main memory |
| D. | secondary memory |
| Answer» B. disk | |
| 80. |
………………… is a special type of integrity constraint that relates two relations & maintainsconsistency across the relations. |
| A. | Entity Integrity Constraints |
| B. | Referential Integrity Constraints |
| C. | Domain Integrity Constraints |
| D. | Key Constraints |
| Answer» C. Domain Integrity Constraints | |
| 81. |
If every non-key attribute is functionally dependent on the primary key, then therelation will be in: |
| A. | First normal form |
| B. | Second normal form |
| C. | Third normal form |
| D. | Fourth normal form |
| Answer» D. Fourth normal form | |
| 82. |
Which question corresponds best to the following query?SELECT CID, CDUR - 1,' = PRICE' FROM COURSES ORDER BY 2 |
| A. | Select three columns from the COURSES table, of which the third one has a constantvalue, i.e. “ = PRICE”. Leave an empty line after every second line. |
| B. | Select two columns from the COURSES table, the second one gets as title “ =PRICE”.Sort the data according to the second column, in ascending order. |
| C. | Select three columns from the COURSES table, of which the third one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order. |
| D. | Select two columns from the COURSES table, of which the second one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order |
| Answer» D. Select two columns from the COURSES table, of which the second one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order | |
| 83. |
Which of the following is not a Schema? |
| A. | Database Schema |
| B. | Physical Schema |
| C. | Critical Schema |
| D. | Logical Schema |
| Answer» D. Logical Schema | |
| 84. |
The attribute name could be structured as an attribute consisting of first name, middleinitial, and last name. This type of attribute is called |
| A. | Simple attribute |
| B. | Composite attribute |
| C. | Multivalued attribute |
| D. | Derived attribute |
| Answer» C. Multivalued attribute | |
| 85. |
What defines a view or views of the database for particular users? |
| A. | Internal schema |
| B. | External schema |
| C. | Conceptual schema |
| D. | None of the above |
| Answer» C. Conceptual schema | |
| 86. |
One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values canbe assigned to each data items. This is referred to as |
| A. | Data Security |
| B. | Domain access |
| C. | Data Control |
| D. | Domain Integrity |
| Answer» E. | |
| 87. |
Which of the following has “all-or-none” property? |
| A. | atomicity |
| B. | durability |
| C. | isolation |
| D. | all of the mentioned |
| Answer» B. durability | |
| 88. |
Which of the following is a comparison operator? |
| A. | 0 |
| B. | LIKE |
| C. | BETWEEN |
| D. | All of the above |
| Answer» E. | |
| 89. |
ACID properties of transactions are |
| A. | Atomicity |
| B. | Consistency |
| C. | Isolation |
| D. | Durability |
| Answer» E. | |
| 90. |
Which of the following is the preferred way to recover a database after a transactionin progress terminates abnormally? |
| A. | Rollback |
| B. | Rollforward |
| C. | Switch to duplicate database |
| D. | Reprocess transactions |
| Answer» B. Rollforward | |
| 91. |
A ________ is a logical grouping of database objects, usually to facilitate security,performance, or the availability of database objects such as tables and indexes. |
| A. | Tablespace |
| B. | Segments |
| C. | Extents |
| D. | Blocks |
| Answer» B. Segments | |
| 92. |
allows the algorithm to execute more quickly by performing CPU activity in parallel with I/O activity. |
| A. | buffering |
| B. | double buffering |
| C. | multiple buffering |
| D. | double reading |
| Answer» B. double buffering | |
| 93. |
…………… database is used as template for all databases created. |
| A. | Master |
| B. | Model |
| C. | Tempdb |
| D. | None of the above |
| Answer» C. Tempdb | |
| 94. |
will undo all statements up to commit? |
| A. | transaction |
| B. | flashback |
| C. | rollback |
| D. | abort |
| Answer» D. abort | |
| 95. |
The database is partitioned into fixed- length storage units called |
| A. | parts |
| B. | blocks |
| C. | reads |
| D. | build |
| Answer» C. reads | |
| 96. |
Which of the following has each related entity set has its own schema and there is anadditional schema for the relationship set? |
| A. | A many-to-many relationship set |
| B. | A multivalued attribute of an entity set |
| C. | A one-to-many relationship set |
| D. | None of the mentioned |
| Answer» B. A multivalued attribute of an entity set | |
| 97. |
In the above teaches relation ” Select * from teaches where Year = ‘2010’” displays how many rows? |
| A. | 2 |
| B. | 4 |
| C. | 5 |
| D. | 1 |
| Answer» B. 4 | |
| 98. |
In attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
| A. | sql injection |
| B. | sql |
| C. | direct |
| D. | application |
| Answer» B. sql | |
| 99. |
If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent. |
| A. | atomicity |
| B. | consistency |
| C. | isolation |
| D. | Durability |
| Answer» D. Durability | |
| 100. |
Which of the following is not an executable statement? |
| A. | DECLARE |
| B. | OPEN |
| C. | FECTH |
| D. | CLOSE |
| Answer» B. OPEN | |