

MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
51. |
scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk. |
A. | fuzzy logic |
B. | checkpoints |
C. | fuzzy-checkpoint |
D. | logical checkpoint |
Answer» D. logical checkpoint | |
52. |
A domain is atomic if elements of the domain are considered to be units. |
A. | different |
B. | indivisbile |
C. | constant |
D. | divisible |
Answer» C. constant | |
53. |
If a node is locked in then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks. |
A. | intention lock modes |
B. | intention-shared-exclusive mode |
C. | intention-exclusive (ix) mode |
D. | intention-shared (is) mode |
Answer» D. intention-shared (is) mode | |
54. |
Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the field of the page. |
A. | lsn |
B. | readlsn |
C. | pagelsn |
D. | redolsn |
Answer» D. redolsn | |
55. |
State true or false: If a relation consists of a foreign key, then it is called a referencedrelation of the foreign key dependency. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» C. none | |
56. |
The different classes of relations created by the technique for preventing modification anomaliesare called: |
A. | Normal forms. |
B. | Referential integrity constraints. |
C. | Functional dependencies. |
D. | None of the above |
Answer» B. Referential integrity constraints. | |
57. |
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a mechanism. |
A. | row-level authorization |
B. | column-level authentication |
C. | row-type authentication |
D. | authorization security |
Answer» B. column-level authentication | |
58. |
To access information from a database, you need a ___________ |
A. | EIS |
B. | DBMS |
C. | MIS |
D. | None of the above |
Answer» C. MIS | |
59. |
A .................. normal form, normalization will be needed where all attributes in a relation tuple arenot functionally dependent only on the key attribute. |
A. | First |
B. | Second |
C. | Third |
D. | Fourth |
Answer» D. Fourth | |
60. |
Optical disk systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand. |
A. | tape storage |
B. | jukebox |
C. | flash memory |
D. | all of the mentioned |
Answer» C. flash memory | |
61. |
In a relation between the entities the type and condition of the relation should be specified. That is called as attribute. |
A. | desciptive |
B. | derived |
C. | recursive |
D. | relative |
Answer» B. derived | |
62. |
Which, if any, of the two queries above will correctly (in SQL2) get the desired set ofemployee ID’s? |
A. | Both I and II |
B. | I only |
C. | II only |
D. | Neither I nor I |
Answer» B. I only | |
63. |
is a contiguous group of |
A. | instance |
B. | segment |
C. | database |
D. | dictionary |
Answer» D. dictionary | |
64. |
The operation of moving from finer- granularity data to a coarser granularity (by means of aggregation) is called a |
A. | rollup |
B. | drill down |
C. | dicing |
D. | pivoting |
Answer» B. drill down | |
65. |
The name of the system database that contains descriptions of data in the database is |
A. | Data dictionary |
B. | Metadata |
C. | Table |
D. | None of these |
Answer» C. Table | |
66. |
The subset of super key is a candidate key under what condition ? |
A. | No proper subset is a super key |
B. | All subsets are super keys |
C. | Subset is a super key |
D. | Each subset is a super key |
Answer» D. Each subset is a super key | |
67. |
How many levels of abstraction in DBMS: |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» C. 4 | |
68. |
What is the default order of Order by clause? |
A. | Descending |
B. | Ascending |
C. | Random |
D. | None of the above |
Answer» C. Random | |
69. |
A in a table represents a relationship among a set of values. |
A. | column |
B. | key |
C. | row |
D. | entry |
Answer» D. entry | |
70. |
The candidate key is that you choose to identify each row uniquely is called …………….. |
A. | Alternate Key |
B. | Primary Key |
C. | Foreign Key |
D. | None of the above |
Answer» C. Foreign Key | |
71. |
A hash function must meet ________ criteriA:) |
A. | Two |
B. | Three |
C. | Four |
D. | None of the mentioned |
Answer» C. Four | |
72. |
There are _________ number of Normal forms that has been defined |
A. | 5 |
B. | 6 |
C. | 4 |
D. | 3 |
Answer» C. 4 | |
73. |
Pick entities from the following:I. vendor II. student III. attends IV. km/hour |
A. | i, ii, iii |
B. | i, ii, iv |
C. | i and ii |
D. | iii and iv |
Answer» D. iii and iv | |
74. |
Consider a relation R(A,B,C,D,E) with the following functional dependencies:ABC -> DE andD -> AB The number of superkeys of R is: |
A. | 2 |
B. | 7 |
C. | 10 |
D. | 12 |
Answer» D. 12 | |
75. |
is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
A. | encryption |
B. | data mining |
C. | internet security |
D. | architectural security |
Answer» B. data mining | |
76. |
An operation is said to be if executing it several times in a row gives the same result as executing it once. |
A. | idempotent |
B. | changed |
C. | repetitive |
D. | all of the above |
Answer» B. changed | |
77. |
This statement fails when executed: CREATE OR REPLACE TRI GGER CALC_TEAM_AVG AFTER I NSERT ON PLAYER BEGIN INSERT INTO PLAYER_BATSTAT ( PLAYER_I D, SEASON_YEAR, AT_BATS, HI TS) VALUES ( : NEW. I D, 1 997, 0, 0) ; END; To which type must you convert the trigger to correct the error? |
A. | Row |
B. | Statement |
C. | ORACLE FORM trigger |
D. | Before |
Answer» B. Statement | |
78. |
View the Exhibit and examine the data in the EMPLOYEES tables. Evaluate the following SQL statement: SELECT employee_id, department_id FROM employees WHERE department_id= 50 ORDER BY department_id UNION SELECT employee_id, department_id FROM employees WHERE department_id= 90 UNION SELECT employee_id, department_id FROM employees WHERE department_id= 10; What would be the outcome of the above SQL statement? |
A. | The statement would execute successfully and display all the rows in the ascending order ofDEPARTMENT_ID. |
B. | The statement would execute successfully but it will ignore the ORDER BY clause and display the rows in random order. |
C. | The statement would not execute because the positional notation instead of the column name should be used with the ORDER BY clause. |
D. | The statement would not execute because the ORDER BY clause should appear only at the end of the SQL statement, that is, in the last SELECT statement. |
Answer» E. | |
79. |
is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory. |
A. | flash memory |
B. | disk |
C. | main memory |
D. | secondary memory |
Answer» B. disk | |
80. |
………………… is a special type of integrity constraint that relates two relations & maintainsconsistency across the relations. |
A. | Entity Integrity Constraints |
B. | Referential Integrity Constraints |
C. | Domain Integrity Constraints |
D. | Key Constraints |
Answer» C. Domain Integrity Constraints | |
81. |
If every non-key attribute is functionally dependent on the primary key, then therelation will be in: |
A. | First normal form |
B. | Second normal form |
C. | Third normal form |
D. | Fourth normal form |
Answer» D. Fourth normal form | |
82. |
Which question corresponds best to the following query?SELECT CID, CDUR - 1,' = PRICE' FROM COURSES ORDER BY 2 |
A. | Select three columns from the COURSES table, of which the third one has a constantvalue, i.e. “ = PRICE”. Leave an empty line after every second line. |
B. | Select two columns from the COURSES table, the second one gets as title “ =PRICE”.Sort the data according to the second column, in ascending order. |
C. | Select three columns from the COURSES table, of which the third one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order. |
D. | Select two columns from the COURSES table, of which the second one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order |
Answer» D. Select two columns from the COURSES table, of which the second one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order | |
83. |
Which of the following is not a Schema? |
A. | Database Schema |
B. | Physical Schema |
C. | Critical Schema |
D. | Logical Schema |
Answer» D. Logical Schema | |
84. |
The attribute name could be structured as an attribute consisting of first name, middleinitial, and last name. This type of attribute is called |
A. | Simple attribute |
B. | Composite attribute |
C. | Multivalued attribute |
D. | Derived attribute |
Answer» C. Multivalued attribute | |
85. |
What defines a view or views of the database for particular users? |
A. | Internal schema |
B. | External schema |
C. | Conceptual schema |
D. | None of the above |
Answer» C. Conceptual schema | |
86. |
One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values canbe assigned to each data items. This is referred to as |
A. | Data Security |
B. | Domain access |
C. | Data Control |
D. | Domain Integrity |
Answer» E. | |
87. |
Which of the following has “all-or-none” property? |
A. | atomicity |
B. | durability |
C. | isolation |
D. | all of the mentioned |
Answer» B. durability | |
88. |
Which of the following is a comparison operator? |
A. | 0 |
B. | LIKE |
C. | BETWEEN |
D. | All of the above |
Answer» E. | |
89. |
ACID properties of transactions are |
A. | Atomicity |
B. | Consistency |
C. | Isolation |
D. | Durability |
Answer» E. | |
90. |
Which of the following is the preferred way to recover a database after a transactionin progress terminates abnormally? |
A. | Rollback |
B. | Rollforward |
C. | Switch to duplicate database |
D. | Reprocess transactions |
Answer» B. Rollforward | |
91. |
A ________ is a logical grouping of database objects, usually to facilitate security,performance, or the availability of database objects such as tables and indexes. |
A. | Tablespace |
B. | Segments |
C. | Extents |
D. | Blocks |
Answer» B. Segments | |
92. |
allows the algorithm to execute more quickly by performing CPU activity in parallel with I/O activity. |
A. | buffering |
B. | double buffering |
C. | multiple buffering |
D. | double reading |
Answer» B. double buffering | |
93. |
…………… database is used as template for all databases created. |
A. | Master |
B. | Model |
C. | Tempdb |
D. | None of the above |
Answer» C. Tempdb | |
94. |
will undo all statements up to commit? |
A. | transaction |
B. | flashback |
C. | rollback |
D. | abort |
Answer» D. abort | |
95. |
The database is partitioned into fixed- length storage units called |
A. | parts |
B. | blocks |
C. | reads |
D. | build |
Answer» C. reads | |
96. |
Which of the following has each related entity set has its own schema and there is anadditional schema for the relationship set? |
A. | A many-to-many relationship set |
B. | A multivalued attribute of an entity set |
C. | A one-to-many relationship set |
D. | None of the mentioned |
Answer» B. A multivalued attribute of an entity set | |
97. |
In the above teaches relation ” Select * from teaches where Year = ‘2010’” displays how many rows? |
A. | 2 |
B. | 4 |
C. | 5 |
D. | 1 |
Answer» B. 4 | |
98. |
In attacks, the attacker manages to get an application to execute an SQL query created by the attacker. |
A. | sql injection |
B. | sql |
C. | direct |
D. | application |
Answer» B. sql | |
99. |
If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent. |
A. | atomicity |
B. | consistency |
C. | isolation |
D. | Durability |
Answer» D. Durability | |
100. |
Which of the following is not an executable statement? |
A. | DECLARE |
B. | OPEN |
C. | FECTH |
D. | CLOSE |
Answer» B. OPEN | |