Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

251.

Which of the following clause specifies the table or tables from where the data has tobe retrieved?

A. Where
B. Table
C. From
D. None of these
Answer» D. None of these
252.

Which type of entity represents a logical generalization whose actual occurrence isrepresented by a second, associated entity?

A. Supertype entity
B. Subtype entity
C. Archetype entity
D. Instance entity
Answer» D. Instance entity
253.

A              file system is software that enables multiple computers to share file storage while maintaining consistent space allocation and file content.

A. storage
B. tertiary
C. secondary
D. cluster
Answer» E.
254.

The                            layer, which provides a high-level view of data and actions on data.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» B. presentation
255.

Which of the following index is made up of more than one column?

A. Composite index
B. Clustered index
C. Simple index
D. None of the above
Answer» B. Clustered index
256.

Which forms are based on the concept of functional dependency

A. 1NF
B. 2NF
C. 3NF
D. 4NF
Answer» D. 4NF
257.

In a                clustering index, the index record contains the search-key value and a pointer to the first data record with that search-key value and the rest of the records will be in the sequential pointers.

A. dense
B. sparse
C. straight
D. continuous
Answer» B. sparse
258.

If you were collecting and storing information about your music collection, an albumwould be considered a(n) _____

A. Relation
B. Entity
C. Instance
D. Attribute
Answer» C. Instance
259.

A set of objects that share a common structure and a common behavior is called:

A. Object
B. Class
C. Entity
D. None of these
Answer» C. Entity
260.

With SQL, how can you return all the records from a table named “Persons” sorteddescending by “FirstName”?

A. SELECT * FROM Persons SORT BY ‘FirstName’ DESC
B. SELECT * FROM Persons ORDER FirstName DESC
C. SELECT * FROM Persons SORT ‘FirstName’ DESC
D. SELECT * FROM Persons ORDER BY FirstName DESC
Answer» E.
261.

An Oracle                      is a set of tables and views that are used as a read-only reference about the database.

A. database dictionary
B. dictionary table
C. data dictionary
D. dictionary
Answer» D. dictionary
262.

................. requires that data should be made available to only authorized users.

A. Data integrity
B. Privacy
C. Security
D. None of the above
Answer» D. None of the above
263.

If the state of the database no longer reflects a real state of the world that the databaseis supposed to capture, then such a state is called

A. Consistent state
B. Parallel state
C. Durable state
D. Inconsistent state
Answer» E.
264.

can help us detect poor E- R design.

A. database design process
B. e-r design process
C. relational scheme
D. functional dependencies
Answer» E.
265.

Some of the utilities of DBMS are .............i) Transaction ii) Backup iii) File organization iv) Process Organization

A. i, ii, and iv only
B. i, ii and iii only
C. ii, iii and iv only
D. All i, ii, iii, and iv
Answer» D. All i, ii, iii, and iv
266.

Which are the types of physical DBMS architecture can be split :

A. Back end
B. Front end
C. Both
D. None
Answer» D. None
267.

An ____________ consists of a search-key value and pointers to one or more recordswith that value as their search-key value.

A. Index entry
B. Index hash
C. Index cluster
D. Index map
Answer» B. Index hash
268.

The ______ is the one in which the primary key of one relation is used as a normalattribute in another relation.

A. Referential relation
B. Referencing relation
C. Referenced relation
D. Referred relation
Answer» D. Referred relation
269.

The        condition allows a general predicate over the relations being joined.

A. on
B. using
C. set
D. where
Answer» B. using
270.

denotes the largest timestamp of any transaction that executed write(Q) successfully.

A. w-timestamp(q)
B. r-timestamp(q)
C. rw-timestamp(q)
D. wr-timestamp(q)
Answer» B. r-timestamp(q)
271.

A view of database that appears to an application program is known as:

A. Schema
B. Subschema
C. virtual table
D. none of the above
Answer» C. virtual table
272.

Relations produced from an E-R model will always be in:

A. First normal form
B. Second normal form
C. Third normal form
D. Fourth normal form
Answer» D. Fourth normal form
273.

The ____ lock allows concurrent transactions to access the same row as long asthey require the use of different fields within that row.

A. table-level
B. page-level
C. row-level
D. field-level
Answer» E.
274.

A deadlock exists in the system if and only if the wait for graph:

A. has a cycle in it
B. has a path from first node to last node
C. is a tree
D. none of the above
Answer» B. has a path from first node to last node
275.

What is the name of a trigger that initiates another trigger?

A. Triggering Trigger
B. Automatic Initiation Trigger
C. Cascading Trigger
D. None of the above
Answer» D. None of the above
276.

Which forms simplifies and ensures that there are minimal data aggregates and repetitivegroups:

A. 1NF
B. 2NF
C. 3NF
D. All of the mentioned
Answer» D. All of the mentioned
277.

The                    provides a set of operations that take one or more relations as input and return a relation as an output.

A. schematic representation
B. relational algebra
C. scheme diagram
D. relation flow
Answer» C. scheme diagram
278.

In RDBMS, Data is presented as a collection of ............

A. Table
B. Attributes
C. Relations
D. Entities
Answer» D. Entities
279.

Which of the following specifies a boolean expression that must be true for the triggerto fire?

A. Trigger Action
B. Triggering Event
C. Trigger Restriction
D. None of the above
Answer» D. None of the above
280.

Which of the following index can occur only one per table?

A. Distinct index
B. Unique index
C. Simple index
D. Clustered index
Answer» C. Simple index
281.

Which of the following schemas does define a view or views of the database forparticular users?

A. Internal schema
B. Conceptual schema
C. Physical schema
D. External schema
Answer» E.
282.

How many bytes does each character in the UTF8 encoding take up?

A. 1
B. 2
C. 3
D. All mentioned above
Answer» E.
283.

.............. is a combination of two of more attributes used as a primary key

A. Composite Key
B. Alternate Key
C. Candidate Key
D. Foreign Key
Answer» B. Alternate Key
284.

Which is refers to a stalemate situation due to which no further progress ispossible as computer await response of each other:

A. Concurrency
B. Deadlock
C. Backup
D. Recovery
Answer» C. Backup
285.

Which of the following is not correct about User_DefinedExceptions ?

A. Must be declared
B. Must be raised explicitly
C. Raised automatically in response to an Oracle error
D. None of the above
Answer» D. None of the above
286.

The time for repositioning the arm is called the                  and it increases with the distance that the arm must move.

A. access time
B. average seek time
C. seek time
D. rotational latency time
Answer» D. rotational latency time
287.

is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» C. cross-site scripting
288.

A ………………. does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.

A. Weak entity
B. Strong entity
C. Non attributes entity
D. Dependent entity
Answer» B. Strong entity
289.

Breadth First Search is used in

A. binary trees
B. stacks
C. graphs
D. all of the mentioned
Answer» D. all of the mentioned
290.

The relation with the attribute which is the primary key is referenced in another relation.The relation which has the attribute as a primary key is called ______________

A. Referential relation
B. Referencing relation
C. Referenced relation
D. Referred relation
Answer» D. Referred relation
291.

A                  is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys.

A. schema diagram
B. relational algebra
C. database diagram
D. schema flow
Answer» B. relational algebra
292.

The following are components of a database except ________

A. user data
B. Metadata
C. Reports
D. Indexes
Answer» D. Indexes
293.

In a                    the system makes repeated requests for tuples from the operation at the top of the pipeline.

A. demand-driven pipeline
B. producer-driven pipeline
C. demand pipeline
D. all of the mentioned
Answer» B. producer-driven pipeline
294.

partitions data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk.

A. block interleaved parity
B. block interleaved distributed parity
C. bit parity
D. bit interleaved parity
Answer» C. bit parity
295.

A                                    index is the one which satisfies all the columns requested in the query without performing further lookup into the clustered index.

A. clustered
B. non clustered
C. covering
D. b-tree
Answer» D. b-tree
296.

The SQL command to creating a table is:

A. Make table
B. Alter table
C. Create table
D. Define table
Answer» D. Define table
297.

Which are the dependencies types:

A. Full functional dependency
B. Partial dependency
C. Trivial functional dependency
D. All of these
Answer» E.
298.

The          lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.

A. table-level
B. page-level
C. row-level
D. field-level
Answer» E.
299.

A relation is said to be in BCNF when

A. it has overlapping composite keys
B. it has no composite keys
C. it has no multivalued dependencies
D. it has no overlapping composite keys which have related attributes
Answer» E.
300.

The                            is essentially used to search for patterns in target string.

A. like predicate
B. null predicate
C. in predicate
D. out predicate
Answer» B. null predicate