Explore topic-wise MCQs in Computer Science.

This section includes 155 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

101.

There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?

A. Data storage system
B. Database management system (DBMS)
C. Batch processing system
D. Data communication package
Answer» C. Batch processing system
102.

Embedded pointer provide

A. a secondary access path
B. a physical record key
C. an inverted index
D. All of the above
Answer» B. a physical record key
103.

Which two files are used during operation of the DBMS?

A. query language and utilities
B. data manipulation language and query language
C. data dictionary and transaction log
D. data dictionary and query language
Answer» D. data dictionary and query language
104.

To have a file hold a list, it is necessary to

A. identify the records in the list
B. identify the name, width and type of the fields of each record.
C. decide which fields will be used as sort or index keys
D. All of the above
Answer» E.
105.

An-owner-member set in the CODASYL specifications may have

A. only one owner but many owner occurrences
B. only one member but many member occurrence
C. more than one member but only one occurrence per member
D. All of the above
Answer» B. only one member but many member occurrence
106.

A computer file can be best described as

A. a single data item
B. a general collection of data items
C. an orderly collection of data items
D. a random collection of data items
Answer» D. a random collection of data items
107.

In order to use a DBMS, it is important to understand

A. the physical schema
B. all sub-schemas that the system supports
C. one subschema
D. both (a) and (b)
Answer» D. both (a) and (b)
108.

Data encryption techniques are particularly useful for

A. reducing storage space requirements
B. improving data integrity
C. protecting data in data communication systems
D. All of the above
Answer» D. All of the above
109.

Sophisticated report generators can

A. print row-oriented reports
B. perform arithmetic operations
C. selectively retrieve and print portions of a list
D. All of the above
Answer» E.
110.

The PROJECT command will create new table that has

A. more fields than the original table
B. more rows than the original table
C. both (a) and (b)
D. all the fields of master table
Answer» E.
111.

In a relational schema, each tuple is divided into fields called

A. Relations
B. Domains
C. Queries
D. All of the above
Answer» C. Queries
112.

In SQL, which command(s) is(are) used to enable/disable a database trigger?

A. MODIFY USER
B. CHANGE USER
C. ALTER TRIGGER
D. All of the above
Answer» D. All of the above
113.

Data item characteristics that are important in data management include

A. punctuation
B. language
C. spelling
D. width
Answer» E.
114.

In SQL, the CREATE TABLESPACE is used

A. to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace
B. to create a database trigger
C. to add/rename data files, to change storage
D. All of the above
Answer» B. to create a database trigger
115.

In SQL, which command(s) is(are) used to create a synonym for a schema object?

A. CREATE SCHEMA
B. CREATE SYNONYM
C. CREATE SAME
D. All of the above
Answer» C. CREATE SAME
116.

A number of related records that are treated as a unit is called

A. file
B. field
C. data
D. batch
Answer» B. field
117.

If a calculation is embedded in a form

A. the result of the calculations are stored with the form
B. the calculations are stored with the form
C. the result of the calculations are printed in report
D. All of the above
Answer» C. the result of the calculations are printed in report
118.

A multiple-form file management system

A. lets you define different forms for different operations
B. lets you create a look-up form with an associated read-only password to prevent access by unauthorized users
C. both (a) and (b)
D. allow you to entry data in all the forms
Answer» D. allow you to entry data in all the forms
119.

The designer of a form includes

A. filed designators
B. prompts
C. data
D. both (a) and (b)
Answer» E.
120.

A good query system

A. can accept English language commands
B. allows non-programmers to access information stored in a database
C. can be accessed only by data processing professionals
D. both (a) and (b)
Answer» C. can be accessed only by data processing professionals
121.

Which of the following is not true of the traditional approach to information processing?

A. There is common sharing of data among the various applications
B. It is file-oriented
C. Programs are dependent on the files
D. It is inflexible
Answer» B. It is file-oriented
122.

A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be

A. the pin code
B. the last name
C. a compound key consisting of the first name and the last name
D. All of the above
Answer» D. All of the above
123.

Information can be transferred between the DBMS and a

A. spreadsheet program
B. word processor program
C. graphics program
D. All of the above
Answer» E.
124.

In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?

A. ZIP
B. PACK
C. COMMIT
D. SAVE
Answer» D. SAVE
125.

The main idea behind computer files is that it is convenient to

A. arrange them
B. store information together
C. create them
D. access them
Answer» C. create them
126.

The logical data structure with a one-to-many relationship is a :

A. network
B. tree
C. chain
D. relational
Answer» C. chain
127.

The highest level in the hierarchy of data organization is called

A. data bank
B. database
C. data file
D. data record
Answer» C. data file
128.

A report form

A. appears on the computer monitor during data entry
B. is used during report generation to format data
C. both (a) and (b)
D. All of the above
Answer» C. both (a) and (b)
129.

A database management system might consist of application programs and a software package called

A. FORTRAN
B. AUTOFLOW
C. BPL
D. TOTAL
Answer» D. TOTAL
130.

What is the language used by most of the DBMSs for helping their users to access data?

A. High level language
B. Query language
C. SQL
D. 4GL
Answer» C. SQL
131.

What is the name given to the database management system which is able to handle full text data, image data, audio and video?

A. Full media
B. Graphics media
C. Multimedia
D. Hypertext
Answer» D. Hypertext
132.

Which command is used to remove an index from the database in SQL?

A. DELETE INDEX
B. DROP INDEX
C. REMOVE INDEX
D. ROLL BACK INDEX
Answer» C. REMOVE INDEX
133.

Periodically adding, changing and deleting file records is called file

A. Updating
B. upgrading
C. restructuring
D. renewing
Answer» B. upgrading
134.

If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it.

A. Delete
B. Update
C. Sort Key
D. Index
Answer» E.
135.

The model for a _____ resembles the hierarchical model in many respects.

A. Network database
B. Relational database
C. Distributed database
D. Hierarchical database
Answer» B. Relational database
136.

Which of the following is true of a network structure?

A. It is a physical representation of the data
B. It allows a many-to-many relationship
C. It is conceptually simple
D. It will be the dominant data base of the future
Answer» C. It is conceptually simple
137.

A _____ DBMS distributes data processing tasks between the workstation and a network server.

A. Network
B. Relational
C. Client Server
D. Hierarchical
Answer» D. Hierarchical
138.

A data dictionary is a special file that contains

A. the names of all fields in all files
B. the data types of all fields in all files
C. the widths of all fields in all files
D. All of the above
Answer» E.
139.

When using a database management system, the first thing that you must do is to

A. create a database file
B. activate file editor
C. load the software into your micro¬computer
D. keep a floppy disk in readiness
Answer» D. keep a floppy disk in readiness
140.

A database management system

A. allows simultaneous access to multiple files
B. can do more than a record management system
C. is a collection of programs for managing data in a single file
D. both (a) and (b)
Answer» E.
141.

When you have finished entering information into a form

A. the template is written to the data file
B. the contents of the form are written to the data file
C. the contents of the form can be printed
D. All of the above
Answer» C. the contents of the form can be printed
142.

In SQL, which command is used to select data in rows and column from one or more tables?

A. CHOOSE
B. SELECT
C. LIST
D. BROWSE
Answer» C. LIST
143.

Each of data files has a _____ that describe the way the data is stored in the file.

A. File structure
B. Records
C. Fields
D. Database
Answer» B. Records
144.

The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain?

A. Bits
B. Characters
C. Data field
D. Schema
Answer» D. Schema
145.

Primitive operations common to all record management systems include

A. Print
B. Sort
C. Look-up
D. All of the above
Answer» D. All of the above
146.

In SQL, GRANT command is used to

A. allow user to access databases
B. allow user to create databases
C. grant system privileges, roles, and object privileges to uses and roles
D. choose auditing for specific SQL commands
Answer» D. choose auditing for specific SQL commands
147.

If you want to group the records in the abc database, you could use the Jobcode as the _____.

A. Delete
B. Update
C. Sort Key
D. Index
Answer» D. Index
148.

Sort/report generators

A. are faster than index/report generators
B. require more disk space than index/report generators
C. do not need to sort before generating a report
D. both (a) and (b)
Answer» C. do not need to sort before generating a report
149.

Data security threats include

A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above
Answer» C. fraudulent manipulation of data
150.

Which command is used to remove a table from the database in SQL?

A. DELETE TABLE
B. DROP TABLE
C. ERASE TABLE
D. UNATTACH TABLE
Answer» C. ERASE TABLE