Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

151.

While inserting the record into the index, if the search-key value does not appear in theindex.

A. The system adds a pointer to the new record in the index entry
B. The system places the record being inserted after the other records with the same searchkey values
C. The system inserts an index entry with the search-key value in the index at the appropriate position
D. None of the mentioned
Answer» D. None of the mentioned
152.

The                is that part of main memory available for storage of copies of disk blocks.

A. buffer
B. catalog
C. storage
D. secondary storage
Answer» B. catalog
153.

Which of the following attribute of implicit cursor always evaluates to false?

A. %FOUND
B. %OPEN
C. %NOTFOUND
D. %ROWCOUNT
Answer» C. %NOTFOUND
154.

Which of the following function is used to find the column count of the particular resultset?

A. getmetadata()
B. metadata()
C. getcolumn()
D. get count()
Answer» B. metadata()
155.

HTTP defines two ways in which values entered by a user at the browser can be sent to the Web server. The            method encodes the values as part of the URL.

A. post
B. get
C. read
D. argument
Answer» C. read
156.

Every weak entity set can be converted into a strong entity set by:

A. using generalization
B. adding appropriate attributes
C. using aggregation
D. none of the above
Answer» C. using aggregation
157.

The entity set person is classified as student and employee. This process is called

A. generalization
B. specialization
C. inheritance
D. constraint generalization
Answer» C. inheritance
158.

Database __________ , which is the logical design of the database, and the database _______,which is a snapshot of the data in the database at a given instant in time.

A. Instance, Schema
B. Relation, Schema
C. Relation, Domain
D. Schema, Instance
Answer» E.
159.

In which of the following, a separate schema is created consisting of that attribute and theprimary key of the entity set.

A. A many-to-many relationship set
B. A multivalued attribute of an entity set
C. A one-to-many relationship set
D. All of the mentioned
Answer» C. A one-to-many relationship set
160.

Cartesian product in relational algebra is

A. a Unary operator.
B. a Binary operator.
C. a Ternary operator
D. not defined
Answer» C. a Ternary operator
161.

n which of the following, a separate schema is created consisting of that attribute andthe primary key of the entity set.

A. A many-to-many relationship set
B. A multivalued attribute of an entity set
C. A one-to-many relationship set
D. None of the mentioned
Answer» C. A one-to-many relationship set
162.

According to the ANSI SQL standard, when does a transaction begin?

A. with use of the START command
B. when the first SQL statement is encountered
C. with the BEGIN command
D. with the BEGIN TRANSACTION command
Answer» C. with the BEGIN command
163.

Object based logical model(s) are used to describe data at - [Select Appropriate Option(s)]

A. View Level
B. Logical Level
C. Physical Level
D. None of these
Answer» D. None of these
164.

Inst_dept (ID, name, salary, dept name, building, budget) is decomposed intoinstructor (ID, name, dept name, salary) department (dept name, building, budget) This comes under

A. Lossy-join decomposition
B. Lossy decomposition
C. Lossless-join decomposition
D. Both Lossy and Lossy-join decomposition
Answer» E.
165.

Which forms every non-prime attribute is fully dependent functionally on the candidatekey of a relational schema:

A. 1NF
B. 2NF
C. 3NF
D. 5NF
Answer» C. 3NF
166.

In an object-oriented model, one object can access data of another object by passing:

A. Instance variable
B. Message
C. Variable
D. None of these
Answer» C. Variable
167.

____ means that the data used during the execution of a transaction cannot beused by a second transaction until the first one is completed.

A. Atomicity
B. Consistency
C. Durability
D. Isolation
Answer» E.
168.

Empdt1(empcode, name, street, city, state, pincode).For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in

A. 1 NF only
B. 2 NF and hence also in 1 NF
C. 3NF and hence also in 2NF and 1NF
D. BCNF and hence also in 3NF, 2NF and 1NF
Answer» C. 3NF and hence also in 2NF and 1NF
169.

Following is the type of metadata:

A. Operational
B. EDW
C. Data mart
D. All of these
Answer» E.
170.

In SQL the spaces at the end of the string are removed by                function.

A. upper
B. string
C. trim
D. lower
Answer» D. lower
171.

Which command enables alteration the data stored in existing records:

A. Create command
B. Update command
C. Deletion command
D. All of these
Answer» C. Deletion command
172.

In a(n) ____ backup of the database, only the last modifications to the databaseare copied.

A. full
B. incomplete
C. differential
D. transaction log
Answer» D. transaction log
173.

Which of the following can be used to supplement declarative referential integrity, to enforce complex business rules or to audit changes to data?

A. Synonyms
B. Tables
C. Triggers
D. None of the above
Answer» D. None of the above
174.

For a transaction to be durable, its changes need to be written to                  storage.

A. volatile storage
B. non-volatile storage
C. stable storage
D. dynamic storage
Answer» D. dynamic storage
175.

Which of the following SQL standard support triggers?

A. SQL-89
B. SQL-2
C. SQL-3
D. SQL-4
Answer» D. SQL-4
176.

Let us consider phone_number ,which can take single or several values . Treating phone_numberas an                    permits instructors to have several phone numbers (including zero) associated with them.

A. entity
B. attribute
C. relation
D. value
Answer» B. attribute
177.

What is the process that is done to SQL before execution, to check for proper syntaxand to optimize the request called?

A. Syntax checking
B. Performance tuning
C. Parsing
D. Optimizing
Answer» D. Optimizing
178.

Department (dept name, building, budget) and Employee (employee_id , name, deptname,salary) Here the dept_name attribute appears in both the relations .Here using common attributes in relation schema is one way of relating ___________ relations.

A. Attributes of common
B. Tuple of common
C. Tuple of distinct
D. Attributes of distinct
Answer» D. Attributes of distinct
179.

The process of Normalization is

A. Iterative
B. Non-reversible
C. Reversible
D. None
Answer» B. Non-reversible
180.

In an E-R diagram attributes are represented by

A. rectangle.
B. square.
C. ellipse
D. Triangle
Answer» D. Triangle
181.

create table apartment(ownerID varchar (5), ownername varchar(25), floor numeric(4,0),primary key (ownerID:));Choose the correct option regarding the above statement

A. The statement is syntactically wrong
B. It creates a relation with three attributes ownerID, ownername, floor in which floor cannot be null.
C. It creates a relation with three attributes ownerID, ownername, floor in which ownerID cannot be null.
D. It creates a relation with three attributes ownerID, ownername, floor in which ownername must consist of at least 25 characters.
Answer» D. It creates a relation with three attributes ownerID, ownername, floor in which ownername must consist of at least 25 characters.
182.

A                  is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes.

A. tablespace
B. segments
C. extents
D. blocks
Answer» B. segments
183.

If we wish to grant a privilege and to allow the recipient to pass the privilege on to other users, we append the                      clause to the appropriate grant command.

A. with grant
B. grant user
C. grant pass privelege
D. with grant option
Answer» E.
184.

Deadlocks are possible only when one of the transactions wants to obtain a(n)____ lock on a data item.

A. binary
B. exclusive
C. shared
D. Complete
Answer» C. shared
185.

………………… is preferred method for enforcing data integrity

A. Constraints
B. Stored Procedure
C. Triggers
D. Cursors
Answer» B. Stored Procedure
186.

In contemporary databases, the top level of the hierarchy consists of              each of which can contain

A. catalogs, schemas
B. schemas, catalogs
C. environment, schemas
D. schemas, environment
Answer» B. schemas, catalogs
187.

This is not a date type in SQL Server 2000

A. Char
B. String
C. Bigint
D. Decimal
Answer» C. Bigint
188.

Which refers to a property of computer to run several operation simultaneouslyand possible as computers await response of each other:

A. Concurrency
B. Deadlock
C. Backup
D. Recovery
Answer» B. Deadlock
189.

Which of the following is the clause that makes a singleton SELECT different fromthe normal SELECT?

A. WHERE
B. INTO
C. IN
D. None of the above
Answer» C. IN
190.

Copying files to secondary or specific devices is known as

A. retrieve
B. backup
C. recovery
D. deadlock
Answer» C. recovery
191.

What does DML stand for?

A. Different Mode Level
B. Data Model Language
C. Data Mode Lane
D. Data Manipulation language
Answer» E.
192.

The Oracle RDBMS uses the           statement to declare a new transaction start and its properties.

A. begin
B. set transaction
C. begin transaction
D. commit
Answer» C. begin transaction
193.

The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID,ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T?

A. Equi-join
B. Natural join
C. Outer join
D. Cartesian join
Answer» E.
194.

Which calculus is based on specifying a number of tuple variables:

A. Tuple relation calculus
B. Domain relational calculus
C. Both
D. None
Answer» B. Domain relational calculus
195.

A search key containing more than one attribute is referred to as a                    search key.

A. simple
B. composite
C. compound
D. secondary
Answer» C. compound
196.

With multiple disks, we can improve the transfer rate as well by                        data across multiple disks.

A. striping
B. dividing
C. mirroring
D. dividing
Answer» B. dividing
197.

A                                configuration can make takeover by the backup site almost instantaneous.

A. hot-spare
B. remote
C. direct
D. spare
Answer» E.
198.

Centralizing the integrity checking directly under the DBMS ………….. duplication and ensures theconsistency and validity of the database.

A. Increases
B. Skips
C. Does not reduce
D. Reduces
Answer» E.
199.

In the process of decomposition is called as

A. Normalization
B. Generalization
C. Aggregation
D. Specalization
Answer» B. Generalization
200.

To eliminate duplicate rows ……………… is used

A. NODUPLICATE
B. ELIMINATE
C. DISTINCT
D. None of these
Answer» D. None of these