

MCQOPTIONS
Saved Bookmarks
This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
101. |
Consider attributes ID , CITY and NAME . Which one of this can be considered as a super key ? |
A. | NAME |
B. | ID |
C. | CITY |
D. | CITY , ID |
Answer» C. CITY | |
102. |
Which CREATE TABLE statement is valid? |
A. | CREATE TABLE ord_details (ord_no NUMBER(2) PRIMARY KEY, item_no NUMBER(3) PRIMARY KEY, ord_date date NOT NULL); 50 |
B. | CREATE TABLE ord_details (ord_no NUMBER(2) UNIQUE, NOT NULL, item_no NUMBER(3), ord_date date DEFAULT SYSDATE NOT NULL); |
C. | CREATE TABLE ord_details (ord_no NUMBER(2) , item_no NUMBER(3), ord_date date DEFAULT NOT NULL, CONSTRAINT ord_uq UNIQUE (ord_no), CONSTRAINT ord_pk PRIMARY KEY (ord_no)); |
D. | CREATE TABLE ord_details (ord_no NUMBER(2), item_no NUMBER(3), ord_date date DEFAULT SYSDATE NOT NULL, CONSTRAINT ord_pk PRIMARY KEY (ord_no, item_no)); |
Answer» E. | |
103. |
In which of the following cases will the RDBMS specify a default value for the columnif there are no values for it? |
A. | NOT NULL WITH DEFAULT |
B. | COLUMN DEFAULT |
C. | NOT NULL UNIUE |
D. | None of the above |
Answer» D. None of the above | |
104. |
allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement. |
A. | procedure |
B. | trigger |
C. | curser |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
105. |
In the SQL Cursor, which attribute is TRUE when a cursor has some remaining rows to fetch, and FALSE when a cursor has no rows left to fetch? |
A. | %ROWCOUNT |
B. | %FOUND |
C. | %NOTFOUND |
D. | %ISOPEN |
Answer» C. %NOTFOUND | |
106. |
The requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction. |
A. | validation protocol |
B. | validation-based protocol |
C. | timestamp protocol |
D. | timestamp-ordering protocol |
Answer» B. validation-based protocol | |
107. |
using a log record sets the data item specified in the log record to the old value. |
A. | deferred-modification |
B. | late-modification |
C. | immediate-modification |
D. | undo |
Answer» E. | |
108. |
The application program typically communicates with a database server, through or other protocols, in order to get or store data. |
A. | jdbc |
B. | odbc |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
109. |
…………….. is the complex search criteria in the where clause. |
A. | Substring |
B. | Drop Table |
C. | Predict |
D. | Predicate |
Answer» E. | |
110. |
Consider attributes ID, CITY and NAME. Which one of this can be considered as a superkey? |
A. | NAME |
B. | ID |
C. | CITY |
D. | CITY, ID |
Answer» C. CITY | |
111. |
4NF is designed to cope with: |
A. | Transitive dependency |
B. | Join dependency |
C. | Multi valued dependency |
D. | None of these |
Answer» D. None of these | |
112. |
The normal form which satisfies multivalued dependencies and which is in BCNF is |
A. | 4 NF |
B. | 3 NF |
C. | 2 NF |
D. | All of the mentioned |
Answer» B. 3 NF | |
113. |
What does a COMMIT statement do to a CURSOR? |
A. | Open the Cursor |
B. | Fetch the Cursor |
C. | Close the Cursor |
D. | None of the above |
Answer» E. | |
114. |
Which of the following is TRUE? (1) Host variables are declared anywhere in the program (2) Host variables are declared in the DECLARE section |
A. | Only 1 is TRUE |
B. | Only 2 is TRUE |
C. | Both 1 & 2are TRUE |
D. | Both are FALSE |
Answer» C. Both 1 & 2are TRUE | |
115. |
Drop Table cannot be used to drop a table referenced by a …………… constraint. |
A. | Local Key |
B. | Primary Key |
C. | Composite Key |
D. | Foreign Key |
Answer» E. | |
116. |
An abstraction concept for building composite object from their component object is called: |
A. | Specialization |
B. | Normalization |
C. | Generalization |
D. | Aggregation |
Answer» E. | |
117. |
Aggregate functions are functions that take a as input and return a single value. |
A. | collection of values |
B. | single value |
C. | aggregate value |
D. | both collection of values & single value |
Answer» B. single value | |
118. |
……………… clause is an additional filter that is applied to the result. |
A. | Select |
B. | Group-by |
C. | Having |
D. | Order by |
Answer» D. Order by | |
119. |
System catalog is a system-created database that describes: |
A. | Database objects |
B. | Data dictionary information |
C. | User access information |
D. | All of these |
Answer» E. | |
120. |
Which property ensures that each functional dependency is represented in some individual relations resulting after decomposition? |
A. | Dependency preservation property |
B. | Fully Functional dependency |
C. | Lossless Join |
D. | None of the above |
Answer» B. Fully Functional dependency | |
121. |
In which ways two tables may be related: |
A. | One-one |
B. | One-many |
C. | Many-many |
D. | All of these |
Answer» E. | |
122. |
What is refined data? |
A. | Knowledge |
B. | Information |
C. | Statistics |
D. | None of the above |
Answer» C. Statistics | |
123. |
Incase the indices values are larger, index is created for these values of the index. Thisis called |
A. | Pointed index |
B. | Sequential index |
C. | Multilevel index |
D. | Multiple index |
Answer» D. Multiple index | |
124. |
In a relational database a referential integrity constraint can be specified with the helpof |
A. | primary key |
B. | foreign key |
C. | secondary key |
D. | none of the above |
Answer» C. secondary key | |
125. |
Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups: |
A. | 1NF |
B. | 2NF |
C. | 3NF |
D. | All of these |
Answer» B. 2NF | |
126. |
The function that an entity plays in a relationship is called that entity’s _____________ |
A. | Participation |
B. | Position |
C. | Role |
D. | Instance |
Answer» D. Instance | |
127. |
Dedicated server configuration is |
A. | One server process – Many user processes |
B. | Many server processes – One user process |
C. | One server process – One user process |
D. | Many server processes – Many user processes |
Answer» D. Many server processes – Many user processes | |
128. |
In index instead of storing all the columns for a record together, each column is stored separately with all other rows in an index. |
A. | clustered |
B. | column store |
C. | non clustered |
D. | row store |
Answer» C. non clustered | |
129. |
Find the names of these cities with temperature and condition whose condition is neithersunny nor cloudy. |
A. | SELECT city, temperature, condition FROM weather WHERE condition NOT IN (‘sunny’, ‘cloudy’) |
B. | SELECT city, temperature, condition FROM weather WHERE condition NOT BETWEEN (‘sunny’, ‘cloudy’) |
C. | SELECT city, temperature, condition FROM weather WHERE condition IN (‘sunny’, ‘cloudy’) |
D. | SELECT city, temperature, condition FROM weather WHERE condition BETWEEN (‘sunny’, ‘cloudy’); |
Answer» B. SELECT city, temperature, condition FROM weather WHERE condition NOT BETWEEN (‘sunny’, ‘cloudy’) | |
130. |
Which of the following command makes the updates performed by the transactionpermanent in the database? |
A. | ROLLBACK |
B. | COMMIT |
C. | TRUNCATE |
D. | DELETE |
Answer» C. TRUNCATE | |
131. |
…………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs. |
A. | Instance |
B. | Schema |
C. | Program |
D. | Super Key |
Answer» C. Program | |
132. |
In the phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint. |
A. | repeating |
B. | redo |
C. | replay |
D. | undo |
Answer» C. replay | |
133. |
If a transaction does not modify the database until it has committed, it is said to use the technique. |
A. | deferred-modification |
B. | late-modification |
C. | immediate-modification |
D. | undo |
Answer» B. late-modification | |
134. |
combines the data manipulating power of SQL with the data processing power of Procedural languages. |
A. | pl/sql |
B. | sql |
C. | advanced sql |
D. | pql |
Answer» B. sql | |
135. |
The CREATE TRIGGER statement is used to create the trigger. THE _____ clause specifies the table name on which the trigger is to be attached. The ______ specifies that this is an AFTERINSERT trigger. |
A. | for insert, on |
B. | On, for insert |
C. | For, insert |
D. | Both a and c |
Answer» C. For, insert | |
136. |
A(n) can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
137. |
Which of the following is not Armstrong’s Axiom? |
A. | Reflexivity rule |
B. | Transitivity rule |
C. | Pseudotransitivity rule |
D. | Augmentation rule |
Answer» D. Augmentation rule | |
138. |
If an entity appears in only one relationship then it is |
A. | a 1:1 relationship |
B. | a 1:N relationship |
C. | a N:1 relationship |
D. | a N:M relationship |
Answer» B. a 1:N relationship | |
139. |
A database is divided into logical storage units called as |
A. | Tables |
B. | Records |
C. | Tablespaces |
D. | None of the above |
Answer» D. None of the above | |
140. |
Which of the information is not redundant. |
A. | name |
B. | mobile |
C. | account-no |
D. | address |
Answer» D. address | |
141. |
Which of the following has each related entity set has its own schema and there is anadditional schema for the relationship set. |
A. | A many-to-many relationship set |
B. | A multivalued attribute of an entity set |
C. | A one-to-many relationship set |
D. | All of the mentioned |
Answer» B. A multivalued attribute of an entity set | |
142. |
In query processing, the is the lowest-level operator to access data. |
A. | index search |
B. | linear search |
C. | file scan |
D. | access paths |
Answer» D. access paths | |
143. |
A search key containing more than one attribute is referred to as a _________ searchkey. |
A. | Simple |
B. | Composite |
C. | Compound |
D. | Secondary |
Answer» C. Compound | |
144. |
In an ER model, ……………. is described in the database by storing its data. |
A. | Entity |
B. | Attribute |
C. | Relationship |
D. | Notation |
Answer» B. Attribute | |
145. |
The space factor when determining the efficiency of an algorithm is measured by |
A. | counting the maximum memory needed by the algorithm |
B. | counting the minimum memory needed by the algorithm |
C. | counting the average memory needed by the algorithm |
D. | counting the maximum disk space needed by the algorithm |
Answer» B. counting the minimum memory needed by the algorithm | |
146. |
All transactions are controlled and executed by the DBMS (subject to somelimitations) to guarantee database ____. |
A. | integrity |
B. | uniqueness |
C. | consistency |
D. | Design |
Answer» B. uniqueness | |
147. |
Which forms has a relation that possesses data about an individual entity: |
A. | 2NF |
B. | 3NF |
C. | 4NF |
D. | 5NF |
Answer» D. 5NF | |
148. |
is popular for applications such as storage of log files in a database system since it offers the best write performance. |
A. | raid level 1 |
B. | raid level 2 |
C. | raid level 0 |
D. | raid level 3 |
Answer» B. raid level 2 | |
149. |
The operation performs a set union of two “similarly structured” tables |
A. | union |
B. | join |
C. | product |
D. | intersect |
Answer» B. join | |
150. |
Which is incorporated to create an appropriate physical database that is transformed by a logical datamodel: |
A. | SDL |
B. | VDL |
C. | Both |
D. | None |
Answer» E. | |