Mcqs Database
Mcqs Database
Mcqs Database
A) Keys
B) Translators
C) Program
D) Language Activity
Ads by optAd360
6. ……………… table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
9. A logical schema
A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above
Answers:
1. C) Program
2. B) Domains
3. A) Entity
4. C) Data Flow Diagram
5. A) Hierarchical schema
6. C) System
7. B) Schema
Ads by optAd360
8. C) Having
9. B) is a standard .. accessible parts.
10. C) Structured query language
11) C. a tuple
12) B. COUNT
13) C. data is integrated and can be accessed by multiple programs
14) B. instance of the database
15) D. both B and C
16) A. schema
17) C. foreign key
18) C. DCL
19) D. Both A and B
20) A. alter
Read Next: Solved
Set 2
1. The candidate key is that you choose to identify each row uniquely is called ……………..
A) Alternate Key
B) Primary Key
C) Foreign Key
D) None of the above
2. …………….. is used to determine whether a table contains duplicate rows.
A) Unique predicate
B) Like Predicate
C) Null predicate
D) In predicate
7. A ………………. does not have a distinguishing attribute if its own and most are dependent
entities, which are part of some another entity.
A) Weak entity
B) Strong entity
C) Non-attributes entity
D) Dependent entity
B) Stored Procedure
C) Triggers
D) Cursors
10. The number of tuples in a relation is called its …………. While the number of attributes in a
relation is called it’s ………………..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
11) The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
12) Which two files are used during the operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
A. HLL
B. DML
C. DDL
D. DCL
14) The way a particular application views the data from the database that the application
uses is a
A. module
B. relational model
C. schema
D. subschema
B. Table
C. Attributes
D. Switchboards
18) Which database level is closest to the users?
A. External
B. Internal
C. Physical
D. Conceptual
19) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
Answers:
1. B. Primary Key
2. A. Unique predicate
3. C. DISTINCT
4. C. i-true, ii-true
5. A. Data Control Language
6. A. Normalization
7. A. Weak entity
8. D. Predicate
9. A. Constraints
10. B. Cardinality, Degree
11. B. Non-Procedural DML
12.C. Data dictionary and transaction log
13. C. DDL
14. D. subschema
15. B. is much more data independence than some other database models
16. B. Data elements in the database can be modified by changing the data dictionary.
17. C. Attributes
18. A. External
19. B. Total and partial
20. A. RAW
Set 3
1. State true or false.
i) The select operator is not a unary operator.
Ads by optAd360
3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid
values can be assigned to each data item. This is referred to as
A) Data Security
B) Domain access
C) Data Control
D) Domain Integrity
4. ………………….. operator is basically a join followed by a project on the attributes of the first
relation.
A) Join
B) Semi-Join
C) Full Join
D) Inner Join
8. In snapshot, …………………. clause tells oracle how long to wait between refreshes.
A) Complete
B) Force
C) Next
D) Refresh
9. ……………… defines rules regarding the values allowed in columns and is the standard
mechanism for enforcing database integrity.
A) Column
B) Constraint
C) Index
D) Trigger
ANSWERS:
1. C) i-False, ii-True
2. B) Model
3. D) Domain Integrity
4. B) Semi-Join
5. D) Project
6. D) Reduces
7. D) All of the above
8. D) Refresh
9. B) Constraint
10. C) Both of them
Set 4
1. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and
GRANT statements in a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
D) All of the above
2. In SQL, the CREATE TABLESPACE is used
A) to create a place in the database for storage of scheme objects, rollback segments, and
naming the data files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
D) All of the above
3. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
4. Which of the following is TRUE for the System Variable $date$?
A) Can be assigned to a global variable.
B) Can be assigned to any field only during design time.
C) Can be assigned to any variable or field during run time.
D) Can be assigned to a local variable.
A) Define, Create
B) Drop, Comment
C) Insert, Update, Delete
D) Select, Commit
6. Which is the subset of SQL commands used to manipulate Oracle Database Structures,
including tables?
A) Data Definition Language
B) Data Manipulation Language
C) Data Described Language
D) Data Retrieval Language
7. The SQL statement SELECT SUBSTR(‘123456789’, INSTR(‘abcabcabc’,’b’), 4) FROM
EMP; prints
A) 6789
B) 2345
C) 1234
D) 456789
8. Which of the following SQL command can be used to modify existing data in a database
table?
A) MODIFY
B) UPDATE
C) CHANGE
D) NEW
9. When SQL statements are embedded inside 3GL, we call such a program as ……….
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
10. ……………. provides option for entering SQL queries as execution time, rather than at the
development stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL
11) The RDBMS terminology for a row is
A. tuple
B. relation
C. attribute
D. degree
12) To change column value in a table the ……… command can be used.
A. create
B. insert
C. alter
D. update
19) Which two files are used during operation of the DBMS
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
Table of Contents
ANSWERS:
1. B) CREATE SCHEMA
2. A) to create a place in the database for storage of scheme objects……….
3. C) SUBSTR
4. B) Can be assigned to any field only during design time.
5. C) Insert, Update, Delete
6. A) Data Definition Language
7. B) 2345
8. B) UPDATE
9. D) embedded SQL
10.D) Dynamic SQL
11) A. tuple
12) D. update
13) C. Data Definition Language
14) B. grant option
15) D. domain
16) C. functional dependency
17) A. Parent-Child relationship between the tables that connect them
18) A. mapping cardinality
19) C. Data dictionary and transaction log
20) D. super key
Set 5
1. The relational model is based on the concept that data is organized and stored in two-
dimensional tables called ……………………….
A) Fields
B) Records
C) Relations
D) Keys
2. ……………….. contains information that defines valid values that are stored in a column or
data type.
A) View
B) Rule
C) Index
D) Default
A) i-only
B) ii-only
C) Both of them
D) None of them
D) Edward Codd
5. For using a specific database …………… command is used.
A) use database
B) database name use
C) Both A &B
D) None of them
A) <>
B) <
C) =<
D) >=
7. An outstanding functionality of SQL is its support for automatic ………… to the target data.
A) programming
B) functioning
C) navigation
D) notification
8. ………………… is a special type of integrity constraint that relates two relations & maintains
consistency across the relations.
Ads by optAd360
A) Entity Integrity Constraints
B) Referential Integrity Constraints
C) Domain Integrity Constraints
D) Domain Constraints
E) Key Constraints
A) GROUP BY Clause
B) HAVING Clause
C) FROM Clause
D) WHERE Clause
10. Drop Table cannot be used to drop a table referenced by a …………… constraint.
A) Local Key
B) Primary Key
C) Composite Key
D) Foreign Key
Table of Contents
ANSWERS:
1. C) Relations
2. C) Index
3. C) Both of them
4. B) Edgar F. Codd
5. A) use database
6. C) =<
7. C) navigation
8. B) Referential…..Constraints
9. B) HAVING Clause
10. D) Foreign Key
Set 6
1. Processed data is called ………………..
A) Raw data
B) Information
C) Useful data
D) Source
2. …………….. is a utility to capture a continuous record of server activity and provide auditing
capability.
A) SQL Server Profile
B) SQL server service manager
C) SQL server setup
D) SQL server wizard.
5. ………………… approach reduces time and effort required for design and lesser risk in
database management.
A) Single global database
B) Top-down approach
C) Multiple databases
Answers:
1. B) Information
2. B) SQL server service manager
3. A) record
4. B) Operational database
5. C) Multiple databases
6. A) Hierarchic Sequential Access Method
7. D) sys indexes
8. C) It should avoid/reduce the redundancy.
9. A) Chain
10. A) Constraints
Set 8
1. ………………………. is a powerful language for working with RDBMS.
A) Embedded Programs
B) Dynamic Programs
C) Query Language
Ads by optAd360
6. Which is a proper subset designed to support views belonging to different classes of users
in order to hide or protect information?
A) Schema
B) Sub-schema
C) Non-schema
D) Non-sub schema
7. Which contains information about a file needed by system programs for accessing file
records?
A) File blocks
B) File operators
C) File headers
D) None of these
8. A ……………….. DBMS distributes data processing tasks between the workstation and
network server.
A) Network
B) Relational
C) Client-Server
D) Hierarchical
9. The ……………….. refers to the way data is organized in and accessible from DBMS.
A) database hierarchy
B) data organization
C) data sharing
D) data model
6. Which is a proper subset designed to support views belonging to different classes of users
in order to hide or protect information?
B) Sub-schema
7. Which contains information about a file needed by system programs for accessing file
records?
C) File headers
8. A ……………….. DBMS distributes data processing tasks between the workstation and
network server.
C) Client-Server
9. The ……………….. refers to the way data is organized in and accessible from DBMS.
D) data model
Set 9
1) Which of the following is not a characteristic of a relational database model?
A. Table
B. Tree-like structure
C. Complex logical relationship
D. Records
2) Field is otherwise called as ……… of the record
A. data item
B. data type
C. value
D. variable
6) The …….. is used for creating and destroying table, indexes and other forms of structures.
A. data manipulation language
B. data control language
C. transaction control language
D. data definition language
8) The ………… refers to the way data is organized in and accessible from DBMS.
A. database hierarchy
B. data organization
C. data sharing
D. data model
Ads by optAd360
A. Atul kahate
B. James Gossling
C. EF Codd
D. Dennies Rithchie
11) In a relational model, relations are termed as
A. Tuples
B. Attributes
C. Tables
D. Rows
12) When the values in one or more attributes being used as a foreign key must exist in
another set of one or more attributes in another table, we have created a(n) ……..
A. transitive dependency
B. insertion anomaly
C. referential integrity constraint
D. normal form
Ads by optAd360
A. tables
B. rows
C. relations
D. attributes
15) Related fields in a database are grouped to form a
A. data file
B. data record
C. menu
D. bank
16) ………. is, a table have more than one set of attributes that could be chosen as the key
A. foreign key
B. integrity key
C. relationship
D. candidate key
17) The database environment has all of the components except the following.
A. users
B. separate files
C. database
D. database administrator
B. Project
C. Union
D. Divide
19) The way a particular application views the data from the database that the application
uses is a
A. module
B. relational model
C. schema
D. subschema
20) ……. is a condition specified on a database schema and restricts the data that can be
stored in an instance of the database.
A. Key Constraint
B. Check Constraint
C. Foreign key constraint
D. integrity constraint
Answers:
1) B. Tree-like structure
2) A. data item
3) D. Primary key
4) C. attribute
5) A. Number of tuples
6) D. data definition language
7) A. Conceptual view
8) D. data model
9) C. three levels
10) C. EF Codd
11) C. Tables
12) C. referential integrity constraint
13) D. view level
14) D. attributes
15) B. data record
16) D. candidate key
17) A. users
18) B. Project
19) D. subschema
20) B. Check Constraint
Set 10
ANSWERS:
1. A ………………… specifies the actions needed to remove the drawbacks in the current design
of a database.
D) Normal form
5. In 2NF
C) No partial functional dependencies exist
Ads by optAd360
6. The normal form that is not necessarily dependency preserving is
A) 2NF
7. The …………….. is related to the concept of multi-valued dependency.
A) fourth normal form
8. Which normal form is considered adequate for normal relational database design?
D) 3NF
10. A relation is ………………. if every field contains only atomic values that are, no lists or sets.
A) 1 NF