Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

101.

Consider attributes ID , CITY and NAME . Which one of this can be considered as a super key ?

A. NAME
B. ID
C. CITY
D. CITY , ID
Answer» C. CITY
102.

Which CREATE TABLE statement is valid?

A. CREATE TABLE ord_details (ord_no NUMBER(2) PRIMARY KEY, item_no NUMBER(3) PRIMARY KEY, ord_date date NOT NULL); 50
B. CREATE TABLE ord_details (ord_no NUMBER(2) UNIQUE, NOT NULL, item_no NUMBER(3), ord_date date DEFAULT SYSDATE NOT NULL);
C. CREATE TABLE ord_details (ord_no NUMBER(2) , item_no NUMBER(3), ord_date date DEFAULT NOT NULL, CONSTRAINT ord_uq UNIQUE (ord_no), CONSTRAINT ord_pk PRIMARY KEY (ord_no));
D. CREATE TABLE ord_details (ord_no NUMBER(2), item_no NUMBER(3), ord_date date DEFAULT SYSDATE NOT NULL, CONSTRAINT ord_pk PRIMARY KEY (ord_no, item_no));
Answer» E.
103.

In which of the following cases will the RDBMS specify a default value for the columnif there are no values for it?

A. NOT NULL WITH DEFAULT
B. COLUMN DEFAULT
C. NOT NULL UNIUE
D. None of the above
Answer» D. None of the above
104.

allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.

A. procedure
B. trigger
C. curser
D. none of the mentioned
Answer» D. none of the mentioned
105.

In the SQL Cursor, which attribute is TRUE when a cursor has some remaining rows to fetch, and FALSE when a cursor has no rows left to fetch?

A. %ROWCOUNT
B. %FOUND
C. %NOTFOUND
D. %ISOPEN
Answer» C. %NOTFOUND
106.

The                      requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

A. validation protocol
B. validation-based protocol
C. timestamp protocol
D. timestamp-ordering protocol
Answer» B. validation-based protocol
107.

using a log record sets the data item specified in the log record to the old value.

A. deferred-modification
B. late-modification
C. immediate-modification
D. undo
Answer» E.
108.

The application program typically communicates with a database server, through                        or other protocols, in order to get or store data.

A. jdbc
B. odbc
C. all of the mentioned
D. none of the mentioned
Answer» D. none of the mentioned
109.

…………….. is the complex search criteria in the where clause.

A. Substring
B. Drop Table
C. Predict
D. Predicate
Answer» E.
110.

Consider attributes ID, CITY and NAME. Which one of this can be considered as a superkey?

A. NAME
B. ID
C. CITY
D. CITY, ID
Answer» C. CITY
111.

4NF is designed to cope with:

A. Transitive dependency
B. Join dependency
C. Multi valued dependency
D. None of these
Answer» D. None of these
112.

The normal form which satisfies multivalued dependencies and which is in BCNF is

A. 4 NF
B. 3 NF
C. 2 NF
D. All of the mentioned
Answer» B. 3 NF
113.

What does a COMMIT statement do to a CURSOR?

A. Open the Cursor
B. Fetch the Cursor
C. Close the Cursor
D. None of the above
Answer» E.
114.

Which of the following is TRUE? (1) Host variables are declared anywhere in the program (2) Host variables are declared in the DECLARE section

A. Only 1 is TRUE
B. Only 2 is TRUE
C. Both 1 & 2are TRUE
D. Both are FALSE
Answer» C. Both 1 & 2are TRUE
115.

Drop Table cannot be used to drop a table referenced by a …………… constraint.

A. Local Key
B. Primary Key
C. Composite Key
D. Foreign Key
Answer» E.
116.

An abstraction concept for building composite object from their component object is called:

A. Specialization
B. Normalization
C. Generalization
D. Aggregation
Answer» E.
117.

Aggregate functions are functions that take a                        as input and return a single value.

A. collection of values
B. single value
C. aggregate value
D. both collection of values & single value
Answer» B. single value
118.

……………… clause is an additional filter that is applied to the result.

A. Select
B. Group-by
C. Having
D. Order by
Answer» D. Order by
119.

System catalog is a system-created database that describes:

A. Database objects
B. Data dictionary information
C. User access information
D. All of these
Answer» E.
120.

Which property ensures that each functional dependency is represented in some individual relations resulting after decomposition?

A. Dependency preservation property
B. Fully Functional dependency
C. Lossless Join
D. None of the above
Answer» B. Fully Functional dependency
121.

In which ways two tables may be related:

A. One-one
B. One-many
C. Many-many
D. All of these
Answer» E.
122.

What is refined data?

A. Knowledge
B. Information
C. Statistics
D. None of the above
Answer» C. Statistics
123.

Incase the indices values are larger, index is created for these values of the index. Thisis called

A. Pointed index
B. Sequential index
C. Multilevel index
D. Multiple index
Answer» D. Multiple index
124.

In a relational database a referential integrity constraint can be specified with the helpof

A. primary key
B. foreign key
C. secondary key
D. none of the above
Answer» C. secondary key
125.

Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:

A. 1NF
B. 2NF
C. 3NF
D. All of these
Answer» B. 2NF
126.

The function that an entity plays in a relationship is called that entity’s _____________

A. Participation
B. Position
C. Role
D. Instance
Answer» D. Instance
127.

Dedicated server configuration is

A. One server process – Many user processes
B. Many server processes – One user process
C. One server process – One user process
D. Many server processes – Many user processes
Answer» D. Many server processes – Many user processes
128.

In                                index instead of storing all the columns for a record together, each column is stored separately with all other rows in an index.

A. clustered
B. column store
C. non clustered
D. row store
Answer» C. non clustered
129.

Find the names of these cities with temperature and condition whose condition is neithersunny nor cloudy.

A. SELECT city, temperature, condition FROM weather WHERE condition NOT IN (‘sunny’, ‘cloudy’)
B. SELECT city, temperature, condition FROM weather WHERE condition NOT BETWEEN (‘sunny’, ‘cloudy’)
C. SELECT city, temperature, condition FROM weather WHERE condition IN (‘sunny’, ‘cloudy’)
D. SELECT city, temperature, condition FROM weather WHERE condition BETWEEN (‘sunny’, ‘cloudy’);
Answer» B. SELECT city, temperature, condition FROM weather WHERE condition NOT BETWEEN (‘sunny’, ‘cloudy’)
130.

Which of the following command makes the updates performed by the transactionpermanent in the database?

A. ROLLBACK
B. COMMIT
C. TRUNCATE
D. DELETE
Answer» C. TRUNCATE
131.

…………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

A. Instance
B. Schema
C. Program
D. Super Key
Answer» C. Program
132.

In the                      phase, the system replays updates of all transactions by scanning the log forward from the last checkpoint.

A. repeating
B. redo
C. replay
D. undo
Answer» C. replay
133.

If a transaction does not modify the database until it has committed, it is said to use the                        technique.

A. deferred-modification
B. late-modification
C. immediate-modification
D. undo
Answer» B. late-modification
134.

combines the data manipulating power of SQL with the data processing power of Procedural languages.

A. pl/sql
B. sql
C. advanced sql
D. pql
Answer» B. sql
135.

The CREATE TRIGGER statement is used to create the trigger. THE _____ clause specifies the table name on which the trigger is to be attached. The ______ specifies that this is an AFTERINSERT trigger.

A. for insert, on
B. On, for insert
C. For, insert
D. Both a and c
Answer» C. For, insert
136.

A(n)                    can be used to preserve the integrity of a document or a message.

A. message digest
B. message summary
C. encrypted message
D. none of the mentioned
Answer» D. none of the mentioned
137.

Which of the following is not Armstrong’s Axiom?

A. Reflexivity rule
B. Transitivity rule
C. Pseudotransitivity rule
D. Augmentation rule
Answer» D. Augmentation rule
138.

If an entity appears in only one relationship then it is

A. a 1:1 relationship
B. a 1:N relationship
C. a N:1 relationship
D. a N:M relationship
Answer» B. a 1:N relationship
139.

A database is divided into logical storage units called as

A. Tables
B. Records
C. Tablespaces
D. None of the above
Answer» D. None of the above
140.

Which of the information is not redundant.

A. name
B. mobile
C. account-no
D. address
Answer» D. address
141.

Which of the following has each related entity set has its own schema and there is anadditional schema for the relationship set.

A. A many-to-many relationship set
B. A multivalued attribute of an entity set
C. A one-to-many relationship set
D. All of the mentioned
Answer» B. A multivalued attribute of an entity set
142.

In query processing, the                        is the lowest-level operator to access data.

A. index search
B. linear search
C. file scan
D. access paths
Answer» D. access paths
143.

A search key containing more than one attribute is referred to as a _________ searchkey.

A. Simple
B. Composite
C. Compound
D. Secondary
Answer» C. Compound
144.

In an ER model, ……………. is described in the database by storing its data.

A. Entity
B. Attribute
C. Relationship
D. Notation
Answer» B. Attribute
145.

The space factor when determining the efficiency of an algorithm is measured by

A. counting the maximum memory needed by the algorithm
B. counting the minimum memory needed by the algorithm
C. counting the average memory needed by the algorithm
D. counting the maximum disk space needed by the algorithm
Answer» B. counting the minimum memory needed by the algorithm
146.

All transactions are controlled and executed by the DBMS (subject to somelimitations) to guarantee database ____.

A. integrity
B. uniqueness
C. consistency
D. Design
Answer» B. uniqueness
147.

Which forms has a relation that possesses data about an individual entity:

A. 2NF
B. 3NF
C. 4NF
D. 5NF
Answer» D. 5NF
148.

is popular for applications such as storage of log files in a database system since it offers the best write performance.

A. raid level 1
B. raid level 2
C. raid level 0
D. raid level 3
Answer» B. raid level 2
149.

The               operation performs a set union of two “similarly structured” tables

A. union
B. join
C. product
D. intersect
Answer» B. join
150.

Which is incorporated to create an appropriate physical database that is transformed by a logical datamodel:

A. SDL
B. VDL
C. Both
D. None
Answer» E.