Database Administator MCQ
Database Administator MCQ
Database Administator MCQ
Options:
A) Locking
B) Primary Key
C) Integrity constraints
D) Tuning
Options:
A) Authentication method
B) Password for database authentication
C) Default table spaces for permanent and temporary data storage
D) All of the options
Options:
A) Constraints
B) user account a space usage quota
C) Security
D) Reference
Options:
A) Roll
B) Schema
C) Database
D) Privileges
Options:
A) Rolls
B) Schema
C) Tables
D) Constraints
Options:
A) Installation
B) Configuration
C) Modification
D) Updation
Options:
A) Normal Account
B) Administrative accounts
C) User account
D) Locked Account
Options:
A) Space
B) Database
C) Rolls
D) Schema
Options:
A) Triggers
B) Queries
C) Procedure
D) Commands
Options:
A) System
B) Roles
C) SQL
D) Commands
Options:
A) Database
B) Table
C) schema objects
D) Procedure
Options:
A) creating users and granting privileges;
B) creating and granting roles;
C) creating, modifying, and deleting schema objects in any schema
D) All of the options
Options:
A) SYSDBA
B) SYSOPER
C) SYSUSER
D) None of the options
Options:
A) SYS
B) DBA
C) OPER
D) Normal
Options:
A) CREATE TABLE
B) CREATE VIEW
C) CREATE CONSTRAINTS
D) CREATE SEQUENCE
Options:
A) primary key
B) Foreign Key
C) Unique Key
D) Not Null
Options:
A) Primary Key Violation
B) referential integrity
C) Security Violation
D) Null Violation
Options:
A) σα = t1[K] (r2)
B) t2’[α] ∈ ΠK (r1)
C) t1[K] = t2[α]
D) σα = t1[K] (r2)
Options:
A) A constraint name must be provided when using the WITH CHECK OPTION clause
B) View columns that are the result of derived values must be given a column alias
C) When the view already exists, using the OR REPLACE option require the re-granting of the
object privileges previously granted on the view
D) All of the options
Options:
A) σα = t1[K] (r2)
B) t2’[α] ∈ ΠK (r1)
C) t1[K] = t2[α]
D) σα = t1[K] (r2)
Options:
A) σα = t1[K] (r2)
B) t2’[α] ∈ ΠK (r1)
C) t1[K] = t2[α]
D) σα = t1[K] (r2)
Options:
A) Table
B) View
C) Trigger
D) Database
Options:
A) the database administrator
B) The user
C) Database
D) None of the options
Options:
A) Database Access
B) Database Integrity
C) Database security
D) Database updation
Options:
A) Database
B) Tables
C) View
D) Roles
Options:
A) An audit trail
B) A back up
C) A commit
D) A roll back
Options:
A) Security
B) Integrity
C) Roll management
D) Performance Tuning
Options:
A) Write privilege
B) readprivilege.
C) Update Privilege
D) Delete Privilege
Options:
A) Data Control Language
B) Data manipulation Language
C) Data Definition Language
D) Procedures
Options:
A) Resource authorization
B) Index authorization
C) Alteration authorization
D) Drop authorization
Options:
A) Integrity Constraints
B) Referential Constraint
C) CHECK constraint
D) Unique Constraint
Options:
A) Assertion
B) SQL
C) Schema
D) Object
Options:
A) User
B) Roll
C) Database
D) Index
Options:
A) View
B) Table
C) Database
D) Procedure
Options:
A) foreign keys
B) Primary Key
C) Unique Key
D) Null constraint
Options:
A) Constraints
B) Indices
C) Tables
D) References
Options:
A) Null
B) Alphabetic
C) Numeric
D) Alphanumeric
Options:
A) Resource authorization
B) Index authorization
C) Alteration authorization
D) Drop authorization
Options:
A) a foreign key
B) a unique key
C) A primary key
D) None of the options
Options:
A) Triggers
B) Procedures
C) SQL
D) Tables
Options:
A) Create Schema
B) Create User
C) Create Database
D) Create Table
Options:
A) Tuples
B) Rows
C) Constraints
D) Schema
Options:
A) SYS
B) DBA
C) User
D) Public
Options:
A) Creator
B) SYSDBA
C) SYSOPER
D) Creator and SYSDBA
Options:
A) Recovery Management Component.
B) Transaction Management Component
C) Concurrency Control Component
D) User Management
Options:
A) Atomicity
B) Consistency
C) Isolation
D) Durability
Options:
A) Atomicity
B) Consistency
C) Isolation
D) Durability
Options:
A) Atomicity
B) Consistency
C) Isolation
D) Durability
Options:
A) Atomicity
B) Consistency
C) Isolation
D) Durability
Options:
A) Recovery Management Component.
B) Transaction Management Component
C) Concurrency Control Component
D) User Management
Options:
A) Recovery Management Component.
B) Transaction Management Component
C) Concurrency Control Component
D) User Management Component
Options:
A) Shadow Copy
B) Replicate
C) Mirror Image
D) None of the options
Options:
A) To ensure data integrity when updates occur to the database in a multiuser environment
B) To ensure data integrity when updates occur to the database in a single-user environment
C) To ensure data integrity while reading data occurs to the database in a multiuser environment
D) To ensure data integrity while reading data occurs to the database in a single-user environment
Options:
A) Transaction recovery
B) Forward Rollback
C) Cascading rollback
D) Error recovery
Options:
A) Cascading rollback
B) cascade less schedule
C) Cascading commit
D) Cascading backup
Options:
A) Cascading rollback
B) cascade less schedule
C) Cascading commit
D) Cascading backup
Options:
A) Backup and recovery
B) Transaction control
C) Performance tuning
D) concurrency-control schemes
Options:
A) Rollback
B) Commit
C) Exit
D) Save point
Options:
A) Backup and recovery
B) Transaction control
C) Performance tuning
D) concurrency-control schemes
Options:
A) The recovery-management component
B) Transaction control
C) Performance tuning
D) concurrency-control schemes
Options:
A) Ti cannot read, and cannot write, Q
B) Ti can read, but cannot write, Q
C) Ti can read, but can write, Q
D) Ti can read, but cannot read, Q
Options:
A) Ti cannot read, and cannot write, Q
B) Ti can read, but cannot write, Q
C) Ti can both read and write Q
D) Ti can read, but cannot read, Q
Options:
A) Transacation Protocol
B) Backup and recovery protocol
C) Performance Tuning Protocol
D) locking protocol
Options:
A) Schedules
B) Transactions
C) Rollbacks
D) Commit
Options:
A) a conflicting mode
B) A transaction mode
C) A recovery mode
D) All of the options
Options:
A) Execution phase
B) Growing phase
C) Shrinking phase
D) Recovery phase
Options:
A) Execution phase
B) Growing phase
C) Shrinking phase
D) Recovery phase
Options:
A) Stored
B) Recover
C) Rollback
D) Commits
Options:
A) Normal two-phase locking protocol
B) strict two-phase locking protocol
C) rigorous two-phase locking protocol
D) Lazy two-phase locking protocol
Options:
A) Normal two-phase locking protocol
B) strict two-phase locking protocol
C) rigorous two-phase locking protocol
D) Lazy two-phase locking protocol
Options:
A) two-phase locking protocol
B) Locking Protocol
C) Transaction Protocol
D) Timestamp-Based Protocols
Options:
A) intention-shared (IS) mode
B) intention-exclusive (IX) mode
C) shared and intention-exclusive (SIX) mode
D) All of the options
Options:
A) intention-shared (IS) mode
B) intention-exclusive (IX) mode
C) shared and intention-exclusive (SIX) mode
D) All of the options
Options:
A) intention-shared (IS) mode
B) intention-exclusive (IX) mode
C) shared and intention-exclusive (SIX) mode
D) All of the options
Options:
A) deadlock prevention
B) deadlock detection
C) deadlock recovery
D) None of the options
Options:
A) deadlock prevention
B) deadlock detection
C) deadlock recovery
D) None of the options
Options:
A) Transaction failure
B) System crash
C) Disk failure
D) Network Failure
Options:
A) Log
B) Backup
C) Transaction
D) Locks
Options:
A) Immediate Database Modification
B) deferred-modification technique
C) Checkpoints
D) Shadow Paging
Options:
A) Transitive
B) Commutative
C) idempotent
D) Identity
Options:
A) Immediate Database Modification
B) deferred-modification technique
C) Checkpoints
D) Shadow Paging
Options:
A) Immediate Database Modification
B) deferred-modification technique
C) Checkpoints
D) Shadow Paging
Options:
A) Immediate Database Modification
B) deferred-modification technique
C) Checkpoints
D) Shadow Paging
Options:
A) Commit
B) roll back
C) Update
D) Delete
Options:
A) Server processes
B) Lock manager process
C) Database writer process
D) All of the options
Options:
A) Page shipping
B) Locking
C) Data caching
D) Lock caching
Options:
A) Throughput
B) Response Time
C) Error Recover
D) Failure Transaction Recovery
Options:
A) Access types
B) Access time
C) Insertion time
D) All of the options
Options:
A) Primary Index
B) Dense index
C) Sparse index
D) Secondary Index
Options:
A) Primary Index
B) Dense index
C) Sparse index
D) Secondary Index
Options:
A) Primary Index
B) Dense index
C) Sparse index
D) Secondary Index
Options:
A) Primary Index
B) Dense index
C) Sparse index
D) Secondary Index
Options:
A) Primary Index
B) Dense index
C) Sparse index
D) B+-tree index
Options:
A) Primary
B) Secondary
C) Hash Index
D) B+-tree index
Options:
A) Master
B) Model
C) Both Master and Model
D) Root