MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 301. |
SQL outputs a single table known as the ______: |
| A. | View |
| B. | Column |
| C. | Tablespace |
| D. | Result set |
| Answer» E. | |
| 302. |
………………… is a full form of SQL. |
| A. | Standard query language |
| B. | Sequential query language |
| C. | Structured query language |
| D. | Server side query language |
| Answer» D. Server side query language | |
| 303. |
Which of the following does not affect the size of the SGA? |
| A. | Database buffer |
| B. | Redolog buffer |
| C. | Stored procedure |
| D. | Shared pool |
| Answer» D. Shared pool | |
| 304. |
requires that data should be made available to only authorized users. |
| A. | data integrity |
| B. | privacy |
| C. | security |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 305. |
Data Redundancy increases the cost of storing and retrieving data. |
| A. | False |
| B. | True |
| C. | none |
| D. | all |
| Answer» C. none | |
| 306. |
The data in the database at a particular moment in time is called a ________________ |
| A. | Database state |
| B. | Valid state |
| C. | Initial state |
| D. | Empty state |
| Answer» B. Valid state | |
| 307. |
Instead of locking index leaf nodes in a two-phase manner, some index concurrency- control schemes use on individual key values, allowing other key values to be inserted or deleted from the same leaf. |
| A. | b+ tree locking |
| B. | link level locking |
| C. | key-value locking |
| D. | next value locking |
| Answer» D. next value locking | |
| 308. |
The overall description of a database is called______: |
| A. | Data definition |
| B. | Data manipulation |
| C. | Data integrity |
| D. | Database schema |
| Answer» E. | |
| 309. |
A on an attribute of a relation is a data structure that allows the database system to find those tuples in the relation that have a specified value for that attribute efficiently, without scanning through all the tuples of the relation. |
| A. | index |
| B. | reference |
| C. | assertion |
| D. | timestamp |
| Answer» B. reference | |
| 310. |
Triggers enabled or disabled |
| A. | can be |
| B. | cannot be |
| C. | ought to be |
| D. | always |
| Answer» B. cannot be | |
| 311. |
In which the database can be restored up to the last consistent state after the system failure: |
| A. | Backup |
| B. | Recovery |
| C. | Both |
| D. | None |
| Answer» C. Both | |
| 312. |
Which of the following is not correct about an Exception? |
| A. | Raised automatically / Explicitly in response to an ORACLE_ERROR |
| B. | An exception will be raised when an error occurs in that block |
| C. | Process terminates after completion of error sequence. |
| D. | A Procedure or Sequence of statements may be processed. |
| Answer» D. A Procedure or Sequence of statements may be processed. | |
| 313. |
In the PL/SQL block below, how many rows will be inserted in the messages table? DECLARE v_start_salesNUMBER := 2; v_end_sales NUMBER := 100; BEGIN FOR i IN v_start_sales..v_end_sales LOOP INSERT INTO messages(msgid) VALUES v_start_sales; END LOOP; END; |
| A. | 0 |
| B. | 99 |
| C. | 1 |
| D. | 100 |
| Answer» C. 1 | |
| 314. |
Which is a DBMS keeps back-up copies of the database: |
| A. | Backup |
| B. | Recovery |
| C. | Both |
| D. | None |
| Answer» B. Recovery | |
| 315. |
Which collection types is also known as index-by tables, lets you look up elements Using arbitrary numbers and strings for subscript values? |
| A. | Associative arrays |
| B. | Nested tables |
| C. | Varrays |
| D. | None of the above |
| Answer» B. Nested tables | |
| 316. |
………………. first proposed the process of normalization. |
| A. | Edgar. W |
| B. | Edgar F. Codd |
| C. | Edward Stephen |
| D. | Edward Codd |
| Answer» C. Edward Stephen | |
| 317. |
Suppose the user finds the usage of room number and phone number in a relationalschema there is confusion.This is reduced by |
| A. | Unique-role assumption |
| B. | Unique-key assignment |
| C. | Role intergral assignment |
| D. | None of the mentioned |
| Answer» B. Unique-key assignment | |
| 318. |
The keyword is used to access attributes of preceding tables or subqueries in the from clause. |
| A. | in |
| B. | lateral |
| C. | having |
| D. | with |
| Answer» C. having | |
| 319. |
___________ is the collection of memory structures and Oracle background processesthat operates against an Oracle database. |
| A. | Database |
| B. | Instance |
| C. | Tablespace |
| D. | Segment |
| Answer» C. Tablespace | |
| 320. |
SQL applies predicates in the clause after groups have been formed, so aggregate functions may be used. |
| A. | group by |
| B. | with |
| C. | where |
| D. | having |
| Answer» C. where | |
| 321. |
Relational schemas and other metadata about relations are stored in a structure calledthe ____________ |
| A. | Metadata |
| B. | Catalog |
| C. | Log |
| D. | Data Dictionary |
| Answer» E. | |
| 322. |
DBMS periodically suspends all processing and synchronizes its files and journals through the use of |
| A. | checkpoint facility |
| B. | backup facility |
| C. | recovery manager |
| D. | database change log |
| Answer» B. backup facility | |
| 323. |
The is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on. |
| A. | openid |
| B. | sign-on system |
| C. | security assertion markup language (saml) |
| D. | virtual private database (vpd) |
| Answer» D. virtual private database (vpd) | |
| 324. |
In the relational modes, cardinality is termed as: |
| A. | Number of tuples. |
| B. | Number of attributes. |
| C. | Number of tables. |
| D. | Number of constraints. |
| Answer» B. Number of attributes. | |
| 325. |
………………….. operator is basically a join followed by a project on the attributes of first relation. |
| A. | Join |
| B. | Semi-Join |
| C. | Full Join |
| D. | Inner Join |
| Answer» C. Full Join | |
| 326. |
dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re- create the database. |
| A. | archival |
| B. | fuzzy |
| C. | sql |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 327. |
There are “record-once” versions of the compact disk and digital video disk, which can be written only once; such disks are also called disks. |
| A. | write-once, read-many (worm) |
| B. | cd-r |
| C. | dvd-w |
| D. | cd-rom |
| Answer» B. cd-r | |
| 328. |
ARIES supports operations, which are physical in that the affected page is physically identified, but can be logical within the page. |
| A. | physiological redo |
| B. | physiological undo |
| C. | logical redo |
| D. | logical undo |
| Answer» B. physiological undo | |
| 329. |
In a _______ clustering index, the index record contains the search-key value and apointer to the first data record with that search-key value and the rest of the records will be inthe sequential pointers. |
| A. | Dense |
| B. | Sparse |
| C. | Straight |
| D. | Continuous |
| Answer» B. Sparse | |
| 330. |
Encryption of small values, such as identifiers or names, is made complicated by the possibility of |
| A. | dictionary attacks |
| B. | database attacks |
| C. | minor attacks |
| D. | random attacks |
| Answer» B. database attacks | |
| 331. |
A (n) …………….. is an attribute in a relation that serves as a primary key of another relation in the same. |
| A. | Composite key |
| B. | Foreign key |
| C. | Identifier key |
| D. | Primary key |
| Answer» D. Primary key | |
| 332. |
A integrity constraint requires that the values appearing in specified attributes of any tuple in the referencing relation also appear in specified attributes of at least one tuple in the referenced relation. |
| A. | referential |
| B. | referencing |
| C. | specific |
| D. | primary |
| Answer» B. referencing | |
| 333. |
Which of the following terms does refer to the correctness and completeness of the datain a database? |
| A. | Data security |
| B. | Data constraint |
| C. | Data independence |
| D. | Data integrity |
| Answer» E. | |
| 334. |
An Oracle __________ is a set of tables and views that are used as a read-onlyreference about the database. |
| A. | Database dictionary |
| B. | Dictionary table |
| C. | Data dictionary |
| D. | Dictionary |
| Answer» D. Dictionary | |
| 335. |
Which function is used to find the count of distinct departments? |
| A. | dist |
| B. | distinct |
| C. | count |
| D. | count,dist |
| Answer» B. distinct | |
| 336. |
The relation changes can be got back using command |
| A. | flashback |
| B. | purge |
| C. | delete |
| D. | getback |
| Answer» B. purge | |
| 337. |
states that only valid data will be written to the database. |
| A. | consistency |
| B. | atomicity |
| C. | durability |
| D. | isolation |
| Answer» B. atomicity | |
| 338. |
Which is the person responsible for overall control f the database system: |
| A. | DDL |
| B. | DBMS |
| C. | DBA |
| D. | SDL |
| Answer» D. SDL | |
| 339. |
…………….. is used to determine whether of a table contains duplicate rows. |
| A. | Unique predicate |
| B. | Like Predicate |
| C. | Null predicate |
| D. | In predicate |
| Answer» B. Like Predicate | |
| 340. |
This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “EntityRelationship Diagrams”. 1. Which of the following gives a logical structure of the database graphically? |
| A. | Entity-relationship diagram |
| B. | Entity diagram |
| C. | Database diagram |
| D. | Architectural representation |
| Answer» B. Entity diagram | |
| 341. |
............... joins are SQL server default |
| A. | Outer |
| B. | Inner |
| C. | Equi |
| D. | None of the above |
| Answer» C. Equi | |
| 342. |
The DML is called: |
| A. | Sublanguages |
| B. | Host languages |
| C. | VDL |
| D. | DDL |
| Answer» B. Host languages | |
| 343. |
For using a specific database …………… command is used. |
| A. | Use database |
| B. | <Database name> use |
| C. | Both A &B |
| D. | None of them |
| Answer» B. <Database name> use | |
| 344. |
DA stands for: |
| A. | Data administrator |
| B. | Database active |
| C. | Define application |
| D. | All of these |
| Answer» B. Database active | |
| 345. |
means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. |
| A. | serializability |
| B. | atomicity |
| C. | isolation |
| D. | time stamping |
| Answer» D. time stamping | |
| 346. |
Which of the following is a structure that provides faster access to the rows of a tablebased on the values of one or more columns? |
| A. | Table |
| B. | View |
| C. | Index |
| D. | None of the above |
| Answer» D. None of the above | |
| 347. |
__________ is a contiguous group of blocks allocated for use as part of a table, index,and so forth. |
| A. | Tablespace |
| B. | Segment |
| C. | Extent |
| D. | Block |
| Answer» D. Block | |
| 348. |
Which are the not features of a DBMS which provide a number of advantages for data management: |
| A. | DML |
| B. | DDL |
| C. | SDL |
| D. | None of these |
| Answer» E. | |
| 349. |
If a multivalued dependency holds and is not implied by the corresponding functionaldependency, it usually arises from one of the following sources. |
| A. | A many-to-many relationship set |
| B. | A multivalued attribute of an entity set |
| C. | A one-to-many relationship set |
| D. | Both A many-to-many relationship set and A multivalued attribute of an entity set |
| Answer» E. | |
| 350. |
Which of the following trigger is executed once for each row in a transaction? |
| A. | Row-level Triggers |
| B. | Statement-level Triggers |
| C. | Repetitive Triggers |
| D. | All of the above |
| Answer» B. Statement-level Triggers | |