Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

51.

scheme that records only information about dirty pages and associated information and does not even require of writing dirty pages to disk.

A. fuzzy logic
B. checkpoints
C. fuzzy-checkpoint
D. logical checkpoint
Answer» D. logical checkpoint
52.

A domain is atomic if elements of the domain are considered to be                           units.

A. different
B. indivisbile
C. constant
D. divisible
Answer» C. constant
53.

If a node is locked in                          then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks.

A. intention lock modes
B. intention-shared-exclusive mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» D. intention-shared (is) mode
54.

Whenever an update operation occurs on a page, the operation stores the LSN of its log record in the                field of the page.

A. lsn
B. readlsn
C. pagelsn
D. redolsn
Answer» D. redolsn
55.

State true or false: If a relation consists of a foreign key, then it is called a referencedrelation of the foreign key dependency.

A. True
B. False
C. none
D. all
Answer» C. none
56.

The different classes of relations created by the technique for preventing modification anomaliesare called:

A. Normal forms.
B. Referential integrity constraints.
C. Functional dependencies.
D. None of the above
Answer» B. Referential integrity constraints.
57.

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.

A. row-level authorization
B. column-level authentication
C. row-type authentication
D. authorization security
Answer» B. column-level authentication
58.

To access information from a database, you need a ___________

A. EIS
B. DBMS
C. MIS
D. None of the above
Answer» C. MIS
59.

A .................. normal form, normalization will be needed where all attributes in a relation tuple arenot functionally dependent only on the key attribute.

A. First
B. Second
C. Third
D. Fourth
Answer» D. Fourth
60.

Optical disk                systems contain a few drives and numerous disks that can be loaded into one of the drives automatically (by a robot arm) on demand.

A. tape storage
B. jukebox
C. flash memory
D. all of the mentioned
Answer» C. flash memory
61.

In a relation between the entities the type and condition of the relation should be specified. That is called as            attribute.

A. desciptive
B. derived
C. recursive
D. relative
Answer» B. derived
62.

Which, if any, of the two queries above will correctly (in SQL2) get the desired set ofemployee ID’s?

A. Both I and II
B. I only
C. II only
D. Neither I nor I
Answer» B. I only
63.

is a contiguous group of

A. instance
B. segment
C. database
D. dictionary
Answer» D. dictionary
64.

The operation of moving from finer- granularity data to a coarser granularity (by means of aggregation) is called a

A. rollup
B. drill down
C. dicing
D. pivoting
Answer» B. drill down
65.

The name of the system database that contains descriptions of data in the database is

A. Data dictionary
B. Metadata
C. Table
D. None of these
Answer» C. Table
66.

The subset of super key is a candidate key under what condition ?

A. No proper subset is a super key
B. All subsets are super keys
C. Subset is a super key
D. Each subset is a super key
Answer» D. Each subset is a super key
67.

How many levels of abstraction in DBMS:

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
68.

What is the default order of Order by clause?

A. Descending
B. Ascending
C. Random
D. None of the above
Answer» C. Random
69.

A                  in a table represents a relationship among a set of values.

A. column
B. key
C. row
D. entry
Answer» D. entry
70.

The candidate key is that you choose to identify each row uniquely is called ……………..

A. Alternate Key
B. Primary Key
C. Foreign Key
D. None of the above
Answer» C. Foreign Key
71.

A hash function must meet ________ criteriA:)

A. Two
B. Three
C. Four
D. None of the mentioned
Answer» C. Four
72.

There are _________ number of Normal forms that has been defined

A. 5
B. 6
C. 4
D. 3
Answer» C. 4
73.

Pick entities from the following:I. vendor II. student III. attends IV. km/hour

A. i, ii, iii
B. i, ii, iv
C. i and ii
D. iii and iv
Answer» D. iii and iv
74.

Consider a relation R(A,B,C,D,E) with the following functional dependencies:ABC -> DE andD -> AB The number of superkeys of R is:

A. 2
B. 7
C. 10
D. 12
Answer» D. 12
75.

is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

A. encryption
B. data mining
C. internet security
D. architectural security
Answer» B. data mining
76.

An operation is said to be                      if executing it several times in a row gives the same result as executing it once.

A. idempotent
B. changed
C. repetitive
D. all of the above
Answer» B. changed
77.

This statement fails when executed: CREATE OR REPLACE TRI GGER CALC_TEAM_AVG AFTER I NSERT ON PLAYER BEGIN INSERT INTO PLAYER_BATSTAT ( PLAYER_I D, SEASON_YEAR, AT_BATS, HI TS) VALUES ( : NEW. I D, 1 997, 0, 0) ; END; To which type must you convert the trigger to correct the error?

A. Row
B. Statement
C. ORACLE FORM trigger
D. Before
Answer» B. Statement
78.

View the Exhibit and examine the data in the EMPLOYEES tables. Evaluate the following SQL statement: SELECT employee_id, department_id FROM employees WHERE department_id= 50 ORDER BY department_id UNION SELECT employee_id, department_id FROM employees WHERE department_id= 90 UNION SELECT employee_id, department_id FROM employees WHERE department_id= 10; What would be the outcome of the above SQL statement?

A. The statement would execute successfully and display all the rows in the ascending order ofDEPARTMENT_ID.
B. The statement would execute successfully but it will ignore the ORDER BY clause and display the rows in random order.
C. The statement would not execute because the positional notation instead of the column name should be used with the ORDER BY clause.
D. The statement would not execute because the ORDER BY clause should appear only at the end of the SQL statement, that is, in the last SELECT statement.
Answer» E.
79.

is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.

A. flash memory
B. disk
C. main memory
D. secondary memory
Answer» B. disk
80.

………………… is a special type of integrity constraint that relates two relations & maintainsconsistency across the relations.

A. Entity Integrity Constraints
B. Referential Integrity Constraints
C. Domain Integrity Constraints
D. Key Constraints
Answer» C. Domain Integrity Constraints
81.

If every non-key attribute is functionally dependent on the primary key, then therelation will be in:

A. First normal form
B. Second normal form
C. Third normal form
D. Fourth normal form
Answer» D. Fourth normal form
82.

Which question corresponds best to the following query?SELECT CID, CDUR - 1,' = PRICE' FROM COURSES ORDER BY 2

A. Select three columns from the COURSES table, of which the third one has a constantvalue, i.e. “ = PRICE”. Leave an empty line after every second line.
B. Select two columns from the COURSES table, the second one gets as title “ =PRICE”.Sort the data according to the second column, in ascending order.
C. Select three columns from the COURSES table, of which the third one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order.
D. Select two columns from the COURSES table, of which the second one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order
Answer» D. Select two columns from the COURSES table, of which the second one has a constantvalue, i.e. “ = PRICE”. Sort the data according to the second column, in ascending order
83.

Which of the following is not a Schema?

A. Database Schema
B. Physical Schema
C. Critical Schema
D. Logical Schema
Answer» D. Logical Schema
84.

The attribute name could be structured as an attribute consisting of first name, middleinitial, and last name. This type of attribute is called

A. Simple attribute
B. Composite attribute
C. Multivalued attribute
D. Derived attribute
Answer» C. Multivalued attribute
85.

What defines a view or views of the database for particular users?

A. Internal schema
B. External schema
C. Conceptual schema
D. None of the above
Answer» C. Conceptual schema
86.

One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values canbe assigned to each data items. This is referred to as

A. Data Security
B. Domain access
C. Data Control
D. Domain Integrity
Answer» E.
87.

Which of the following has “all-or-none” property?

A. atomicity
B. durability
C. isolation
D. all of the mentioned
Answer» B. durability
88.

Which of the following is a comparison operator?

A. 0
B. LIKE
C. BETWEEN
D. All of the above
Answer» E.
89.

ACID properties of transactions are

A. Atomicity
B. Consistency
C. Isolation
D. Durability
Answer» E.
90.

Which of the following is the preferred way to recover a database after a transactionin progress terminates abnormally?

A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Answer» B. Rollforward
91.

A ________ is a logical grouping of database objects, usually to facilitate security,performance, or the availability of database objects such as tables and indexes.

A. Tablespace
B. Segments
C. Extents
D. Blocks
Answer» B. Segments
92.

allows the algorithm to execute more quickly by performing CPU activity in parallel with I/O activity.

A. buffering
B. double buffering
C. multiple buffering
D. double reading
Answer» B. double buffering
93.

…………… database is used as template for all databases created.

A. Master
B. Model
C. Tempdb
D. None of the above
Answer» C. Tempdb
94.

will undo all statements up to commit?

A. transaction
B. flashback
C. rollback
D. abort
Answer» D. abort
95.

The database is partitioned into fixed- length storage units called

A. parts
B. blocks
C. reads
D. build
Answer» C. reads
96.

Which of the following has each related entity set has its own schema and there is anadditional schema for the relationship set?

A. A many-to-many relationship set
B. A multivalued attribute of an entity set
C. A one-to-many relationship set
D. None of the mentioned
Answer» B. A multivalued attribute of an entity set
97.

In the above teaches relation ” Select * from teaches where Year = ‘2010’” displays how many rows?

A. 2
B. 4
C. 5
D. 1
Answer» B. 4
98.

In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. sql injection
B. sql
C. direct
D. application
Answer» B. sql
99.

If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent.

A. atomicity
B. consistency
C. isolation
D. Durability
Answer» D. Durability
100.

Which of the following is not an executable statement?

A. DECLARE
B. OPEN
C. FECTH
D. CLOSE
Answer» B. OPEN