MCQOPTIONS
Saved Bookmarks
This section includes 175 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Which of the following retains duplicate rows in the result of a query or in an Aggregate expression? |
| A. | ALL |
| B. | DISTINCT |
| C. | PRIOR |
| D. | None of the above |
| Answer» B. DISTINCT | |
| 102. |
Which, if any, of the two queries above will correctly (in SQL2) get the desired set of employee ID s? |
| A. | Both I and II |
| B. | I only |
| C. | II only |
| D. | Neither I nor I |
| Answer» B. I only | |
| 103. |
Which of the following is the operation that is used if we are interested in only certain attributes or columns of a table? |
| A. | SELECT |
| B. | PROJECT |
| C. | UNION |
| D. | JOIN |
| Answer» C. UNION | |
| 104. |
Which collection types is also known as index-by tables, lets you look up elements Using arbitrary numbers and strings for subscript values? |
| A. | Associative arrays |
| B. | Nested tables |
| C. | Varrays |
| D. | None of the above |
| Answer» B. Nested tables | |
| 105. |
Which of the following is the formal process for deciding which attributes should be grouped together in a relation? |
| A. | Normalization |
| B. | Performance Tuning |
| C. | Optimization |
| D. | None of the above |
| Answer» B. Performance Tuning | |
| 106. |
Which is the central component of the DBMS software that can also be termed as the database control system? |
| A. | Data consistency |
| B. | Data integration |
| C. | Data sharing |
| D. | Data manager |
| Answer» E. | |
| 107. |
The three basic techniques to control deadlocks are: deadlock ____, deadlock detection, and deadlock avoidance. |
| A. | prevention |
| B. | prohibition |
| C. | rollback |
| D. | Commits |
| Answer» B. prohibition | |
| 108. |
Large collection of les are called |
| A. | fields |
| B. | records |
| C. | database |
| D. | sectors |
| Answer» D. sectors | |
| 109. |
Some of the utilities of DBMS are ............. i) Transaction ii) Backup iii) File organization iv) Process Organization |
| A. | i, ii, and iv only |
| B. | i, ii and iii only |
| C. | ii, iii and iv only |
| D. | All i, ii, iii, and iv |
| Answer» D. All i, ii, iii, and iv | |
| 110. |
For like predicate which of the following is true. i) % matches zero of more characters. ii) _ matches exactly one character. |
| A. | i-only |
| B. | ii-only |
| C. | Both of them |
| D. | None of them |
| Answer» D. None of them | |
| 111. |
Which of the following specifies a boolean expression that must be true for the trigger to fire? |
| A. | Trigger Action |
| B. | Triggering Event |
| C. | Trigger Restriction |
| D. | None of the above |
| Answer» D. None of the above | |
| 112. |
Which is incorporated to create an appropriate physical database that is transformed by a logical data model: |
| A. | SDL |
| B. | VDL |
| C. | Both |
| D. | None |
| Answer» E. | |
| 113. |
Which of the following is not a relational algebraic operation that is developed specifically for the relational databases? |
| A. | SELECT |
| B. | UNION |
| C. | JOIN |
| D. | PROJECT |
| Answer» C. JOIN | |
| 114. |
What separates the physical aspects of data storage from the logical aspects of data representation? |
| A. | Data |
| B. | Schema |
| C. | Constraints |
| D. | Relationships |
| Answer» E. | |
| 115. |
Which rules are defined in relational models they from as an essential part of any relation database: |
| A. | Integrity rules |
| B. | Database |
| C. | Record |
| D. | Memory |
| Answer» B. Database | |
| 116. |
Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM? |
| A. | IDMS |
| B. | DB2 |
| C. | dBase-II |
| D. | R:base |
| Answer» C. dBase-II | |
| 117. |
The different classes of relations created by the technique for preventing modification anomalies are called: |
| A. | Normal forms. |
| B. | Referential integrity constraints. |
| C. | Functional dependencies. |
| D. | None of the above |
| Answer» B. Referential integrity constraints. | |
| 118. |
Which is a duplicate copy of a file program that is stored on a different storage media than the original location: |
| A. | Concurrency |
| B. | Deadlock |
| C. | Backup |
| D. | Recovery |
| Answer» D. Recovery | |
| 119. |
The different classes of relations created by the technique for preventing modification anomalies are called: |
| A. | normal forms. |
| B. | referential integrity constraints. |
| C. | functional dependencies. |
| D. | None of the above is correct. |
| Answer» B. referential integrity constraints. | |
| 120. |
Which of the following trigger will be executed before modifying each row affected by the triggering statement? |
| A. | Before Statement Trigger |
| B. | After Row Trigger |
| C. | Before Row Trigger |
| D. | None of the above |
| Answer» D. None of the above | |
| 121. |
Thus a _______ of course data gives the values of all attributes, such as title and department, of all courses at a particular point in time. |
| A. | Instance |
| B. | Snapshot |
| C. | Both Instance and Snapshot |
| D. | All of the mentioned |
| Answer» C. Both Instance and Snapshot | |
| 122. |
The ______ is the one in which the primary key of one relation is used as a normal Attribute in another relation . |
| A. | Referential relation |
| B. | Referencing relation |
| C. | Referenced relation |
| D. | Referred relation |
| Answer» C. Referenced relation | |
| 123. |
Which forms simplifies and ensures that there are minimal data aggregates and repetitive groups: |
| A. | 1NF |
| B. | 2NF |
| C. | 3NF |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 124. |
A domain is atomic if elements of the domain are considered to be ____________ units. |
| A. | Different |
| B. | Indivisbile |
| C. | Constant |
| D. | Divisible |
| Answer» C. Constant | |
| 125. |
The main task carried out in the __________ is to remove repeating attributes to separate tables. |
| A. | First Normal Form |
| B. | Second Normal Form |
| C. | Third Normal Form |
| D. | Fourth Normal Form |
| Answer» B. Second Normal Form | |
| 126. |
A relation Schema R is in .. if it is in 3NF and satisfies an additional constant thatfor every FD X->A. X must be a candidate key. |
| A. | 1 NF |
| B. | 2 NF |
| C. | 3 NF |
| D. | BCNF |
| Answer» E. | |
| 127. |
PL/SQL has two types of subprograms, procedures and functions. Which subprogram isused to compute a value? |
| A. | Procedure |
| B. | Function |
| C. | Both A & B |
| D. | None of the above |
| Answer» C. Both A & B | |
| 128. |
In which of the following cases will the RDBMS specify a default value for the column if there are no values for it? |
| A. | NOT NULL WITH DEFAULT |
| B. | COLUMN DEFAULT |
| C. | NOT NULL UNIUE |
| D. | None of the above |
| Answer» D. None of the above | |
| 129. |
Consider attributes ID , CITY and NAME . Which one of this can be considered as a super key ? |
| A. | NAME |
| B. | ID |
| C. | CITY |
| D. | CITY , ID |
| Answer» C. CITY | |
| 130. |
Consequently R.Boyce-Codd jointly launched powerful definition for the third normal form called______: |
| A. | Boyce-Codd normal form |
| B. | First normal form |
| C. | Second normal form |
| D. | All of these |
| Answer» B. First normal form | |
| 131. |
A lock that allows concurrent transactions to access di erent rows of the same table is known as a |
| A. | database-level lock |
| B. | table-level lock |
| C. | page-level lock |
| D. | row-level lock |
| Answer» E. | |
| 132. |
Which of the following hardware component is the most important to the operation of a database management system? |
| A. | High resolution video display |
| B. | Printer |
| C. | High speed, large capacity disk |
| D. | Mouse |
| Answer» D. Mouse | |
| 133. |
An application where only one user accesses the database at a given time is an example of a(n) ________ . |
| A. | single-user database application |
| B. | multiuser database application |
| C. | e-commerce database application |
| D. | data mining database application |
| Answer» B. multiuser database application | |
| 134. |
Suppose the user finds the usage of room number and phone number in a relational schema there is confusion.This is reduced by |
| A. | Unique-role assumption |
| B. | Unique-key assignment |
| C. | Role intergral assignment |
| D. | None of the mentioned |
| Answer» B. Unique-key assignment | |
| 135. |
A (n) .. is an attribute in a relation that serves as a primary key of another relation in the same. |
| A. | Composite key |
| B. | Foreign key |
| C. | Identifier key |
| D. | Primary key |
| Answer» D. Primary key | |
| 136. |
____ ensures that once transaction changes are done, they cannot be undone or lost, even in the event of a system failure. |
| A. | Atomicity |
| B. | Consistency |
| C. | Durability |
| D. | Isolation |
| Answer» D. Isolation | |
| 137. |
What is the type of Oracle backup in which all uncommitted changes have been removed from the datafiles? |
| A. | Full backup |
| B. | Consistent backup |
| C. | Inconsistent backup |
| D. | Differential backup |
| Answer» C. Inconsistent backup | |
| 138. |
What term is used to refer to a specific record in your music database; for instance; information stored about a specific album? |
| A. | Relation |
| B. | Instance |
| C. | Table |
| D. | Column |
| Answer» C. Table | |
| 139. |
Although the ____ locking approach improves the availability of data, its management requires high overhead. |
| A. | database-level |
| B. | table-level |
| C. | page-level |
| D. | row-level |
| Answer» E. | |
| 140. |
If you were collecting and storing information about your music collection, an album would be considered a(n) _____ |
| A. | Relation |
| B. | Entity |
| C. | Instance |
| D. | Attribute |
| Answer» C. Instance | |
| 141. |
.. contains information that defines valid values that are stored in a column or data type. |
| A. | View |
| B. | Rule |
| C. | Index |
| D. | Default |
| Answer» D. Default | |
| 142. |
In a(n) ____ backup of the database, only the last modifications to the database are copied. |
| A. | full |
| B. | incomplete |
| C. | differential |
| D. | transaction log |
| Answer» D. transaction log | |
| 143. |
Which of the following is not a relational algebraic operation that is not form the set theory? |
| A. | UNION |
| B. | INTERSECTION |
| C. | CARTESIAN PRODUCT |
| D. | SELECT |
| Answer» E. | |
| 144. |
Which of the following is the default trigger that is created using the CREATE TRIGGER command? |
| A. | Row level Trigger |
| B. | Statement level Trigger |
| C. | BEFORE Trigger |
| D. | AFTER Trigger |
| Answer» C. BEFORE Trigger | |
| 145. |
Which of the following constitutes a basic set of operations for manipulating relational data? |
| A. | Predicate calculus |
| B. | Relational algebra |
| C. | Relational calculus |
| D. | None of the above |
| Answer» C. Relational calculus | |
| 146. |
Empdt1(empcode, name, street, city, state, pincode). For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in |
| A. | 1 NF only |
| B. | 2 NF and hence also in 1 NF |
| C. | 3NF and hence also in 2NF and 1NF |
| D. | BCNF and hence also in 3NF, 2NF and 1NF |
| Answer» C. 3NF and hence also in 2NF and 1NF | |
| 147. |
Which of the following schemas defines the stored data structures in terms of the database model used? |
| A. | External |
| B. | Conceptual |
| C. | Internal |
| D. | None of these |
| Answer» C. Internal | |
| 148. |
Which of the following clause specifies the table or tables from where the data has to be retrieved? |
| A. | Where |
| B. | Table |
| C. | From |
| D. | None of these |
| Answer» D. None of these | |
| 149. |
The relational model is based on the concept that data is organized and stored in two-dimensional tables called . |
| A. | Fields |
| B. | Records |
| C. | Relations |
| D. | Keys |
| Answer» D. Keys | |
| 150. |
Which of the following is the clause that makes a singleton SELECT different from the normal SELECT? |
| A. | WHERE |
| B. | INTO |
| C. | IN |
| D. | None of the above |
| Answer» C. IN | |