MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Which of the following clause specifies the table or tables from where the data has tobe retrieved? |
| A. | Where |
| B. | Table |
| C. | From |
| D. | None of these |
| Answer» D. None of these | |
| 252. |
Which type of entity represents a logical generalization whose actual occurrence isrepresented by a second, associated entity? |
| A. | Supertype entity |
| B. | Subtype entity |
| C. | Archetype entity |
| D. | Instance entity |
| Answer» D. Instance entity | |
| 253. |
A file system is software that enables multiple computers to share file storage while maintaining consistent space allocation and file content. |
| A. | storage |
| B. | tertiary |
| C. | secondary |
| D. | cluster |
| Answer» E. | |
| 254. |
The layer, which provides a high-level view of data and actions on data. |
| A. | business logic |
| B. | presentation |
| C. | user interaction |
| D. | data access |
| Answer» B. presentation | |
| 255. |
Which of the following index is made up of more than one column? |
| A. | Composite index |
| B. | Clustered index |
| C. | Simple index |
| D. | None of the above |
| Answer» B. Clustered index | |
| 256. |
Which forms are based on the concept of functional dependency |
| A. | 1NF |
| B. | 2NF |
| C. | 3NF |
| D. | 4NF |
| Answer» D. 4NF | |
| 257. |
In a clustering index, the index record contains the search-key value and a pointer to the first data record with that search-key value and the rest of the records will be in the sequential pointers. |
| A. | dense |
| B. | sparse |
| C. | straight |
| D. | continuous |
| Answer» B. sparse | |
| 258. |
If you were collecting and storing information about your music collection, an albumwould be considered a(n) _____ |
| A. | Relation |
| B. | Entity |
| C. | Instance |
| D. | Attribute |
| Answer» C. Instance | |
| 259. |
A set of objects that share a common structure and a common behavior is called: |
| A. | Object |
| B. | Class |
| C. | Entity |
| D. | None of these |
| Answer» C. Entity | |
| 260. |
With SQL, how can you return all the records from a table named “Persons” sorteddescending by “FirstName”? |
| A. | SELECT * FROM Persons SORT BY ‘FirstName’ DESC |
| B. | SELECT * FROM Persons ORDER FirstName DESC |
| C. | SELECT * FROM Persons SORT ‘FirstName’ DESC |
| D. | SELECT * FROM Persons ORDER BY FirstName DESC |
| Answer» E. | |
| 261. |
An Oracle is a set of tables and views that are used as a read-only reference about the database. |
| A. | database dictionary |
| B. | dictionary table |
| C. | data dictionary |
| D. | dictionary |
| Answer» D. dictionary | |
| 262. |
................. requires that data should be made available to only authorized users. |
| A. | Data integrity |
| B. | Privacy |
| C. | Security |
| D. | None of the above |
| Answer» D. None of the above | |
| 263. |
If the state of the database no longer reflects a real state of the world that the databaseis supposed to capture, then such a state is called |
| A. | Consistent state |
| B. | Parallel state |
| C. | Durable state |
| D. | Inconsistent state |
| Answer» E. | |
| 264. |
can help us detect poor E- R design. |
| A. | database design process |
| B. | e-r design process |
| C. | relational scheme |
| D. | functional dependencies |
| Answer» E. | |
| 265. |
Some of the utilities of DBMS are .............i) Transaction ii) Backup iii) File organization iv) Process Organization |
| A. | i, ii, and iv only |
| B. | i, ii and iii only |
| C. | ii, iii and iv only |
| D. | All i, ii, iii, and iv |
| Answer» D. All i, ii, iii, and iv | |
| 266. |
Which are the types of physical DBMS architecture can be split : |
| A. | Back end |
| B. | Front end |
| C. | Both |
| D. | None |
| Answer» D. None | |
| 267. |
An ____________ consists of a search-key value and pointers to one or more recordswith that value as their search-key value. |
| A. | Index entry |
| B. | Index hash |
| C. | Index cluster |
| D. | Index map |
| Answer» B. Index hash | |
| 268. |
The ______ is the one in which the primary key of one relation is used as a normalattribute in another relation. |
| A. | Referential relation |
| B. | Referencing relation |
| C. | Referenced relation |
| D. | Referred relation |
| Answer» D. Referred relation | |
| 269. |
The condition allows a general predicate over the relations being joined. |
| A. | on |
| B. | using |
| C. | set |
| D. | where |
| Answer» B. using | |
| 270. |
denotes the largest timestamp of any transaction that executed write(Q) successfully. |
| A. | w-timestamp(q) |
| B. | r-timestamp(q) |
| C. | rw-timestamp(q) |
| D. | wr-timestamp(q) |
| Answer» B. r-timestamp(q) | |
| 271. |
A view of database that appears to an application program is known as: |
| A. | Schema |
| B. | Subschema |
| C. | virtual table |
| D. | none of the above |
| Answer» C. virtual table | |
| 272. |
Relations produced from an E-R model will always be in: |
| A. | First normal form |
| B. | Second normal form |
| C. | Third normal form |
| D. | Fourth normal form |
| Answer» D. Fourth normal form | |
| 273. |
The ____ lock allows concurrent transactions to access the same row as long asthey require the use of different fields within that row. |
| A. | table-level |
| B. | page-level |
| C. | row-level |
| D. | field-level |
| Answer» E. | |
| 274. |
A deadlock exists in the system if and only if the wait for graph: |
| A. | has a cycle in it |
| B. | has a path from first node to last node |
| C. | is a tree |
| D. | none of the above |
| Answer» B. has a path from first node to last node | |
| 275. |
What is the name of a trigger that initiates another trigger? |
| A. | Triggering Trigger |
| B. | Automatic Initiation Trigger |
| C. | Cascading Trigger |
| D. | None of the above |
| Answer» D. None of the above | |
| 276. |
Which forms simplifies and ensures that there are minimal data aggregates and repetitivegroups: |
| A. | 1NF |
| B. | 2NF |
| C. | 3NF |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 277. |
The provides a set of operations that take one or more relations as input and return a relation as an output. |
| A. | schematic representation |
| B. | relational algebra |
| C. | scheme diagram |
| D. | relation flow |
| Answer» C. scheme diagram | |
| 278. |
In RDBMS, Data is presented as a collection of ............ |
| A. | Table |
| B. | Attributes |
| C. | Relations |
| D. | Entities |
| Answer» D. Entities | |
| 279. |
Which of the following specifies a boolean expression that must be true for the triggerto fire? |
| A. | Trigger Action |
| B. | Triggering Event |
| C. | Trigger Restriction |
| D. | None of the above |
| Answer» D. None of the above | |
| 280. |
Which of the following index can occur only one per table? |
| A. | Distinct index |
| B. | Unique index |
| C. | Simple index |
| D. | Clustered index |
| Answer» C. Simple index | |
| 281. |
Which of the following schemas does define a view or views of the database forparticular users? |
| A. | Internal schema |
| B. | Conceptual schema |
| C. | Physical schema |
| D. | External schema |
| Answer» E. | |
| 282. |
How many bytes does each character in the UTF8 encoding take up? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | All mentioned above |
| Answer» E. | |
| 283. |
.............. is a combination of two of more attributes used as a primary key |
| A. | Composite Key |
| B. | Alternate Key |
| C. | Candidate Key |
| D. | Foreign Key |
| Answer» B. Alternate Key | |
| 284. |
Which is refers to a stalemate situation due to which no further progress ispossible as computer await response of each other: |
| A. | Concurrency |
| B. | Deadlock |
| C. | Backup |
| D. | Recovery |
| Answer» C. Backup | |
| 285. |
Which of the following is not correct about User_DefinedExceptions ? |
| A. | Must be declared |
| B. | Must be raised explicitly |
| C. | Raised automatically in response to an Oracle error |
| D. | None of the above |
| Answer» D. None of the above | |
| 286. |
The time for repositioning the arm is called the and it increases with the distance that the arm must move. |
| A. | access time |
| B. | average seek time |
| C. | seek time |
| D. | rotational latency time |
| Answer» D. rotational latency time | |
| 287. |
is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
| A. | two-factor authentication |
| B. | cross-site request forgery |
| C. | cross-site scripting |
| D. | cross-site scoring scripting |
| Answer» C. cross-site scripting | |
| 288. |
A ………………. does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity. |
| A. | Weak entity |
| B. | Strong entity |
| C. | Non attributes entity |
| D. | Dependent entity |
| Answer» B. Strong entity | |
| 289. |
Breadth First Search is used in |
| A. | binary trees |
| B. | stacks |
| C. | graphs |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 290. |
The relation with the attribute which is the primary key is referenced in another relation.The relation which has the attribute as a primary key is called ______________ |
| A. | Referential relation |
| B. | Referencing relation |
| C. | Referenced relation |
| D. | Referred relation |
| Answer» D. Referred relation | |
| 291. |
A is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys. |
| A. | schema diagram |
| B. | relational algebra |
| C. | database diagram |
| D. | schema flow |
| Answer» B. relational algebra | |
| 292. |
The following are components of a database except ________ |
| A. | user data |
| B. | Metadata |
| C. | Reports |
| D. | Indexes |
| Answer» D. Indexes | |
| 293. |
In a the system makes repeated requests for tuples from the operation at the top of the pipeline. |
| A. | demand-driven pipeline |
| B. | producer-driven pipeline |
| C. | demand pipeline |
| D. | all of the mentioned |
| Answer» B. producer-driven pipeline | |
| 294. |
partitions data and parity among all N+1 disks, instead of storing data in N-disks and parity in one disk. |
| A. | block interleaved parity |
| B. | block interleaved distributed parity |
| C. | bit parity |
| D. | bit interleaved parity |
| Answer» C. bit parity | |
| 295. |
A index is the one which satisfies all the columns requested in the query without performing further lookup into the clustered index. |
| A. | clustered |
| B. | non clustered |
| C. | covering |
| D. | b-tree |
| Answer» D. b-tree | |
| 296. |
The SQL command to creating a table is: |
| A. | Make table |
| B. | Alter table |
| C. | Create table |
| D. | Define table |
| Answer» D. Define table | |
| 297. |
Which are the dependencies types: |
| A. | Full functional dependency |
| B. | Partial dependency |
| C. | Trivial functional dependency |
| D. | All of these |
| Answer» E. | |
| 298. |
The lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row. |
| A. | table-level |
| B. | page-level |
| C. | row-level |
| D. | field-level |
| Answer» E. | |
| 299. |
A relation is said to be in BCNF when |
| A. | it has overlapping composite keys |
| B. | it has no composite keys |
| C. | it has no multivalued dependencies |
| D. | it has no overlapping composite keys which have related attributes |
| Answer» E. | |
| 300. |
The is essentially used to search for patterns in target string. |
| A. | like predicate |
| B. | null predicate |
| C. | in predicate |
| D. | out predicate |
| Answer» B. null predicate | |