Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

401.

With SQL, how do you select all the records from a table named “Persons” where the valueof the column “FirstName” ends with an “a”?

A. SELECT * FROM Persons WHERE FirstName=’a’
B. SELECT * FROM Persons WHERE FirstName LIKE ‘a%’
C. SELECT * FROM Persons WHERE FirstName LIKE ‘%a’
D. SELECT * FROM Persons WHERE FirstName=’%a%’
Answer» D. SELECT * FROM Persons WHERE FirstName=’%a%’
402.

In ordered indices the file containing the records is sequentially ordered, a___________ is an index whose search key also defines the sequential order of the file.

A. Clustered index
B. Structured index
C. Unstructured index
D. Nonclustered index
Answer» B. Structured index
403.

Which is a bottom-up approach to database design that design by examining the relationshipbetween attributes:

A. Functional dependency
B. Database modeling
C. Normalization
D. Decomposition
Answer» D. Decomposition
404.

Who interact with the system by invoking one of the permanent application program:

A. Naïve users
B. Casual users
C. Sophisticated user
D. All of these
Answer» B. Casual users
405.

Which key is referencing a primary key in a table:

A. Primary key
B. Candidate key
C. Foreign key
D. All of these
Answer» D. All of these
406.

is the smallest unit of allocation in an Oracle database.

A. database
B. instance
C. tablespace
D. database block
Answer» E.
407.

A domain is atomic if elements of the domain are considered to be ____________units.

A. Different
B. Indivisbile
C. Constant
D. Divisible
Answer» C. Constant
408.

rollback requires the system to maintain additional information about the state of all the running transactions.

A. total
B. partial
C. time
D. commit
Answer» C. time
409.

joins are SQL server default

A. outer
B. inner
C. equi
D. none of the mentioned
Answer» C. equi
410.

When a program is abnormally terminated, the equivalent of a ____ commandoccurs.

A. COMMIT
B. ROLLBACK
C. QUIT
D. EXIT
Answer» B. ROLLBACK
411.

An attribute in a relation is a foreign key if the                key from one relation is used as an attribute in that relation.

A. candidate
B. primary
C. super
D. sub
Answer» C. super
412.

For select operation the                  appear in the subscript and the                         argument appears in the paranthesis after the sigma.

A. predicates, relation
B. relation, predicates
C. operation, predicates
D. relation, operation
Answer» B. relation, predicates
413.

In magnetic disk                  stores information on a sector magnetically as reversals of the direction of magnetization of the magnetic material.

A. read–write head
B. read-assemble head
C. head–disk assemblies
D. disk arm
Answer» E.
414.

State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key.

A. i-true, ii-false
B. i-false, ii-true
C. i-true, ii-true
D. i-false, ii-false
Answer» D. i-false, ii-false
415.

In a                          the system scans each file block and tests all records to see whether they satisfy the selection condition.

A. index search
B. linear search
C. file scan
D. access paths
Answer» C. file scan
416.

If                        are not obtained in undo operation it will cause problem in undo- phase.

A. higher-level lock
B. lower-level lock
C. read only lock
D. read write
Answer» C. read only lock
417.

The relation employee(ID,name,street,Credit,street,city,salary) is decomposed intoemployee1 (ID, name)employee2 (name, street, city, salary) This type of decomposition is called

A. Lossless decomposition
B. Lossless-join decomposition
C. All of the mentioned
D. None of the mentioned
Answer» E.
418.

Which is a procedural extension of Oracle- SQL that offers language constructs similar tothose in imperative programming languages?

A. PQL
B. Advanced SQL
C. PL/SQL
D. SQL
Answer» D. SQL
419.

A relation Schema R is in ……….. if it is in 3NF and satisfies an additional constant thatfor every FD X->A. X must be a candidate key.

A. 1 NF
B. 2 NF
C. 3 NF
D. BCNF
Answer» E.
420.

Thus a _______ of course data gives the values of all attributes, such as title anddepartment, of all courses at a particular point in time.

A. Instance
B. Snapshot
C. Both Instance and Snapshot
D. All of the mentioned
Answer» C. Both Instance and Snapshot
421.

The OLD and NEW qualifiers can be used in which type of trigger?

A. Row level DML trigger
B. Row level system trigger
C. Statement level DML trigger
D. Row level application trigger
Answer» B. Row level system trigger
422.

Which of the following creates a temporary relation for the query on which it is defined?

A. with
B. from
C. where
D. select
Answer» B. from
423.

Which is the central component of the DBMS software that can also be termed as the database controlsystem?

A. Data consistency
B. Data integration
C. Data sharing
D. Data manager
Answer» E.
424.

In the                        scheme, a transaction that wants to update the database first creates a complete copy of the database.

A. shadow copy
B. shadow paging
C. update log records
D. all of the mentioned
Answer» B. shadow paging
425.

The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’),

A. 6789
B. 2345
C. 1234
D. 456789
Answer» C. 1234
426.

starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.

A. analysis pass
B. redo pass
C. undo pass
D. none of the mentioned
Answer» C. undo pass
427.

The DBMS utility, ____________ allows to reconstruct the correct state of database fromthe backup and history of transactions.

A. Backup
B. Recovery
C. Monitoring
D. Data loading
Answer» C. Monitoring
428.

A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» C. security assertion markup language (saml)
429.

Suppose now that R(A,B:) and S(A,B:) are two relations with r and s tuples, respectively(again, not necessarily distinct). If m is the number of (not necessarily distinct) tuples in theresult of the SQL query: R intersect S; Then which of the following is the most restrictive, correct condition on the value of m?

A. m = min(r,s)
B. 0 <= m <= r + s
C. min(r,s) <= m <= max(r,s)
D. 0 <= m <= min(r,s)
Answer» E.
430.

is a sequence of zero or more characters enclosed by single quotes.

A. integers literal
B. string literal
C. string units
D. string label
Answer» C. string units
431.

A DBMS uses a transaction ____ to keep track of all transactions that update thedatabase

A. log
B. table
C. block
D. Statement
Answer» B. table
432.

Which of the following is the default trigger that is created using the CREATETRIGGER command?

A. Row level Trigger
B. Statement level Trigger
C. BEFORE Trigger
D. AFTER Trigger
Answer» C. BEFORE Trigger
433.

Third normal form is inadequate in situation where the relation

A. Has multiple candidate keys
B. Has candidate keys that are composite
C. Has overlapped candidate keys
D. None of the above
Answer» B. Has candidate keys that are composite
434.

The relation EMPDT1 is defined with attributes empcode(unique), name, street, city, state, and pincode. For any pincode, there is only one city and state. Also, for any given street, city and state, there is just one pincode. In normalization terms EMPDT1 is a relation in

A. 1nf only
B. 2nf and hence also in 1nf
C. 3nf and hence also in 2nf and 1nf
D. bcnf and hence also in 3nf, 2nf and 1nf
Answer» C. 3nf and hence also in 2nf and 1nf
435.

___________ is stored only in the Master database.

A. Database-scoped Dynamic Management View
B. Complex View
C. Catalog View
D. None of the mentioned
Answer» E.
436.

How many types of keys in relation database design:

A. Primary key
B. Candidate key
C. Foreign key
D. All of these
Answer» E.
437.

Which of the syntax is correct for insert statement?i) insert into values ii) insert into (column list) values

A. i-only
B. ii-only
C. Both of them
D. None of them
Answer» D. None of them
438.

DBA stands for:

A. Database maintenance
B. Database administrator
C. Database backup
D. Database designer
Answer» C. Database backup
439.

Which datatype is not allowed in the definition of PL/SQL record?

A. A Collection
B. A Scalar
C. Both A & B
D. None of the above
Answer» B. A Scalar
440.

The ____ statement is used to end a successful transaction.

A. COMMIT
B. DONE
C. END
D. QUIT
Answer» B. DONE
441.

A concurrency-control policy such as this one leads to              performance since it forces transactions to wait for preceding transactions to finish before they can start.

A. good
B. average
C. poor
D. unstable
Answer» D. unstable
442.

Statement 1: A tuple is a row in a relation Statement 2: Existence of multiple foreign keys in a same relation is possible

A. Both the statements are true
B. Statement 1 is correct but Statement 2 is false
C. Statement 1 is false but Statement 2 is correct
D. Both the statements are false
Answer» B. Statement 1 is correct but Statement 2 is false
443.

Representations such as the in the dept year relation, with one column for each value of an attribute, are called _______ they are widely used in spreadsheets and reports and in data analysis tools.

A. Cross-tabs
B. Snapshot
C. Both Cross-tabs and Snapshot
D. All of the mentioned
Answer» B. Snapshot
444.

The deadlock state can be changed back to stable state by using                             statement.

A. commit
B. rollback
C. savepoint
D. deadlock
Answer» C. savepoint
445.

The number of entities associated in relationship is called as it’s.....................

A. Cardinality
B. Degree
C. Tuples
D. Entity
Answer» C. Tuples
446.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» D. cross-site scoring scripting
447.

frees the space occupied by a block as soon as the final tuple of that block has been processed.

A. replacement strategy
B. forced strategy
C. toss immediate strategy
D. most recently used
Answer» D. most recently used
448.

A            is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.

A. rows
B. key
C. attribute
D. fields
Answer» C. attribute
449.

What is the syntax to load data into the database? (Consider D as the database and a, b, cas datA:)

A. enter into D (a, b, C:);
B. insert into D values (a, b, C:);
C. insert into D (a, b, C:);
D. insert (a, b, C:) values into D;
Answer» C. insert into D (a, b, C:);
450.

DML is a language by which user accesses or manipulates the ________:

A. Data model
B. Data consistency
C. Data integration
D. Data sharing
Answer» B. Data consistency