MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
While inserting the record into the index, if the search-key value does not appear in theindex. |
| A. | The system adds a pointer to the new record in the index entry |
| B. | The system places the record being inserted after the other records with the same searchkey values |
| C. | The system inserts an index entry with the search-key value in the index at the appropriate position |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 152. |
The is that part of main memory available for storage of copies of disk blocks. |
| A. | buffer |
| B. | catalog |
| C. | storage |
| D. | secondary storage |
| Answer» B. catalog | |
| 153. |
Which of the following attribute of implicit cursor always evaluates to false? |
| A. | %FOUND |
| B. | %OPEN |
| C. | %NOTFOUND |
| D. | %ROWCOUNT |
| Answer» C. %NOTFOUND | |
| 154. |
Which of the following function is used to find the column count of the particular resultset? |
| A. | getmetadata() |
| B. | metadata() |
| C. | getcolumn() |
| D. | get count() |
| Answer» B. metadata() | |
| 155. |
HTTP defines two ways in which values entered by a user at the browser can be sent to the Web server. The method encodes the values as part of the URL. |
| A. | post |
| B. | get |
| C. | read |
| D. | argument |
| Answer» C. read | |
| 156. |
Every weak entity set can be converted into a strong entity set by: |
| A. | using generalization |
| B. | adding appropriate attributes |
| C. | using aggregation |
| D. | none of the above |
| Answer» C. using aggregation | |
| 157. |
The entity set person is classified as student and employee. This process is called |
| A. | generalization |
| B. | specialization |
| C. | inheritance |
| D. | constraint generalization |
| Answer» C. inheritance | |
| 158. |
Database __________ , which is the logical design of the database, and the database _______,which is a snapshot of the data in the database at a given instant in time. |
| A. | Instance, Schema |
| B. | Relation, Schema |
| C. | Relation, Domain |
| D. | Schema, Instance |
| Answer» E. | |
| 159. |
In which of the following, a separate schema is created consisting of that attribute and theprimary key of the entity set. |
| A. | A many-to-many relationship set |
| B. | A multivalued attribute of an entity set |
| C. | A one-to-many relationship set |
| D. | All of the mentioned |
| Answer» C. A one-to-many relationship set | |
| 160. |
Cartesian product in relational algebra is |
| A. | a Unary operator. |
| B. | a Binary operator. |
| C. | a Ternary operator |
| D. | not defined |
| Answer» C. a Ternary operator | |
| 161. |
n which of the following, a separate schema is created consisting of that attribute andthe primary key of the entity set. |
| A. | A many-to-many relationship set |
| B. | A multivalued attribute of an entity set |
| C. | A one-to-many relationship set |
| D. | None of the mentioned |
| Answer» C. A one-to-many relationship set | |
| 162. |
According to the ANSI SQL standard, when does a transaction begin? |
| A. | with use of the START command |
| B. | when the first SQL statement is encountered |
| C. | with the BEGIN command |
| D. | with the BEGIN TRANSACTION command |
| Answer» C. with the BEGIN command | |
| 163. |
Object based logical model(s) are used to describe data at - [Select Appropriate Option(s)] |
| A. | View Level |
| B. | Logical Level |
| C. | Physical Level |
| D. | None of these |
| Answer» D. None of these | |
| 164. |
Inst_dept (ID, name, salary, dept name, building, budget) is decomposed intoinstructor (ID, name, dept name, salary) department (dept name, building, budget) This comes under |
| A. | Lossy-join decomposition |
| B. | Lossy decomposition |
| C. | Lossless-join decomposition |
| D. | Both Lossy and Lossy-join decomposition |
| Answer» E. | |
| 165. |
Which forms every non-prime attribute is fully dependent functionally on the candidatekey of a relational schema: |
| A. | 1NF |
| B. | 2NF |
| C. | 3NF |
| D. | 5NF |
| Answer» C. 3NF | |
| 166. |
In an object-oriented model, one object can access data of another object by passing: |
| A. | Instance variable |
| B. | Message |
| C. | Variable |
| D. | None of these |
| Answer» C. Variable | |
| 167. |
____ means that the data used during the execution of a transaction cannot beused by a second transaction until the first one is completed. |
| A. | Atomicity |
| B. | Consistency |
| C. | Durability |
| D. | Isolation |
| Answer» E. | |
| 168. |
Empdt1(empcode, name, street, city, state, pincode).For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in |
| A. | 1 NF only |
| B. | 2 NF and hence also in 1 NF |
| C. | 3NF and hence also in 2NF and 1NF |
| D. | BCNF and hence also in 3NF, 2NF and 1NF |
| Answer» C. 3NF and hence also in 2NF and 1NF | |
| 169. |
Following is the type of metadata: |
| A. | Operational |
| B. | EDW |
| C. | Data mart |
| D. | All of these |
| Answer» E. | |
| 170. |
In SQL the spaces at the end of the string are removed by function. |
| A. | upper |
| B. | string |
| C. | trim |
| D. | lower |
| Answer» D. lower | |
| 171. |
Which command enables alteration the data stored in existing records: |
| A. | Create command |
| B. | Update command |
| C. | Deletion command |
| D. | All of these |
| Answer» C. Deletion command | |
| 172. |
In a(n) ____ backup of the database, only the last modifications to the databaseare copied. |
| A. | full |
| B. | incomplete |
| C. | differential |
| D. | transaction log |
| Answer» D. transaction log | |
| 173. |
Which of the following can be used to supplement declarative referential integrity, to enforce complex business rules or to audit changes to data? |
| A. | Synonyms |
| B. | Tables |
| C. | Triggers |
| D. | None of the above |
| Answer» D. None of the above | |
| 174. |
For a transaction to be durable, its changes need to be written to storage. |
| A. | volatile storage |
| B. | non-volatile storage |
| C. | stable storage |
| D. | dynamic storage |
| Answer» D. dynamic storage | |
| 175. |
Which of the following SQL standard support triggers? |
| A. | SQL-89 |
| B. | SQL-2 |
| C. | SQL-3 |
| D. | SQL-4 |
| Answer» D. SQL-4 | |
| 176. |
Let us consider phone_number ,which can take single or several values . Treating phone_numberas an permits instructors to have several phone numbers (including zero) associated with them. |
| A. | entity |
| B. | attribute |
| C. | relation |
| D. | value |
| Answer» B. attribute | |
| 177. |
What is the process that is done to SQL before execution, to check for proper syntaxand to optimize the request called? |
| A. | Syntax checking |
| B. | Performance tuning |
| C. | Parsing |
| D. | Optimizing |
| Answer» D. Optimizing | |
| 178. |
Department (dept name, building, budget) and Employee (employee_id , name, deptname,salary) Here the dept_name attribute appears in both the relations .Here using common attributes in relation schema is one way of relating ___________ relations. |
| A. | Attributes of common |
| B. | Tuple of common |
| C. | Tuple of distinct |
| D. | Attributes of distinct |
| Answer» D. Attributes of distinct | |
| 179. |
The process of Normalization is |
| A. | Iterative |
| B. | Non-reversible |
| C. | Reversible |
| D. | None |
| Answer» B. Non-reversible | |
| 180. |
In an E-R diagram attributes are represented by |
| A. | rectangle. |
| B. | square. |
| C. | ellipse |
| D. | Triangle |
| Answer» D. Triangle | |
| 181. |
create table apartment(ownerID varchar (5), ownername varchar(25), floor numeric(4,0),primary key (ownerID:));Choose the correct option regarding the above statement |
| A. | The statement is syntactically wrong |
| B. | It creates a relation with three attributes ownerID, ownername, floor in which floor cannot be null. |
| C. | It creates a relation with three attributes ownerID, ownername, floor in which ownerID cannot be null. |
| D. | It creates a relation with three attributes ownerID, ownername, floor in which ownername must consist of at least 25 characters. |
| Answer» D. It creates a relation with three attributes ownerID, ownername, floor in which ownername must consist of at least 25 characters. | |
| 182. |
A is a logical grouping of database objects, usually to facilitate security, performance, or the availability of database objects such as tables and indexes. |
| A. | tablespace |
| B. | segments |
| C. | extents |
| D. | blocks |
| Answer» B. segments | |
| 183. |
If we wish to grant a privilege and to allow the recipient to pass the privilege on to other users, we append the clause to the appropriate grant command. |
| A. | with grant |
| B. | grant user |
| C. | grant pass privelege |
| D. | with grant option |
| Answer» E. | |
| 184. |
Deadlocks are possible only when one of the transactions wants to obtain a(n)____ lock on a data item. |
| A. | binary |
| B. | exclusive |
| C. | shared |
| D. | Complete |
| Answer» C. shared | |
| 185. |
………………… is preferred method for enforcing data integrity |
| A. | Constraints |
| B. | Stored Procedure |
| C. | Triggers |
| D. | Cursors |
| Answer» B. Stored Procedure | |
| 186. |
In contemporary databases, the top level of the hierarchy consists of each of which can contain |
| A. | catalogs, schemas |
| B. | schemas, catalogs |
| C. | environment, schemas |
| D. | schemas, environment |
| Answer» B. schemas, catalogs | |
| 187. |
This is not a date type in SQL Server 2000 |
| A. | Char |
| B. | String |
| C. | Bigint |
| D. | Decimal |
| Answer» C. Bigint | |
| 188. |
Which refers to a property of computer to run several operation simultaneouslyand possible as computers await response of each other: |
| A. | Concurrency |
| B. | Deadlock |
| C. | Backup |
| D. | Recovery |
| Answer» B. Deadlock | |
| 189. |
Which of the following is the clause that makes a singleton SELECT different fromthe normal SELECT? |
| A. | WHERE |
| B. | INTO |
| C. | IN |
| D. | None of the above |
| Answer» C. IN | |
| 190. |
Copying files to secondary or specific devices is known as |
| A. | retrieve |
| B. | backup |
| C. | recovery |
| D. | deadlock |
| Answer» C. recovery | |
| 191. |
What does DML stand for? |
| A. | Different Mode Level |
| B. | Data Model Language |
| C. | Data Mode Lane |
| D. | Data Manipulation language |
| Answer» E. | |
| 192. |
The Oracle RDBMS uses the statement to declare a new transaction start and its properties. |
| A. | begin |
| B. | set transaction |
| C. | begin transaction |
| D. | commit |
| Answer» C. begin transaction | |
| 193. |
The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID,ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T? |
| A. | Equi-join |
| B. | Natural join |
| C. | Outer join |
| D. | Cartesian join |
| Answer» E. | |
| 194. |
Which calculus is based on specifying a number of tuple variables: |
| A. | Tuple relation calculus |
| B. | Domain relational calculus |
| C. | Both |
| D. | None |
| Answer» B. Domain relational calculus | |
| 195. |
A search key containing more than one attribute is referred to as a search key. |
| A. | simple |
| B. | composite |
| C. | compound |
| D. | secondary |
| Answer» C. compound | |
| 196. |
With multiple disks, we can improve the transfer rate as well by data across multiple disks. |
| A. | striping |
| B. | dividing |
| C. | mirroring |
| D. | dividing |
| Answer» B. dividing | |
| 197. |
A configuration can make takeover by the backup site almost instantaneous. |
| A. | hot-spare |
| B. | remote |
| C. | direct |
| D. | spare |
| Answer» E. | |
| 198. |
Centralizing the integrity checking directly under the DBMS ………….. duplication and ensures theconsistency and validity of the database. |
| A. | Increases |
| B. | Skips |
| C. | Does not reduce |
| D. | Reduces |
| Answer» E. | |
| 199. |
In the process of decomposition is called as |
| A. | Normalization |
| B. | Generalization |
| C. | Aggregation |
| D. | Specalization |
| Answer» B. Generalization | |
| 200. |
To eliminate duplicate rows ……………… is used |
| A. | NODUPLICATE |
| B. | ELIMINATE |
| C. | DISTINCT |
| D. | None of these |
| Answer» D. None of these | |