Database Management System Quick Study Episode- 03

Test your knowledge now with our Online Quizzes, Q&A and MCQs! Database Management System Quick Study Episode- 03. Take part in an interactive quiz experience with our online quizzes, Q&A and MCQs. Try it out now Online Quiz, Q&A & MCQ.

Table of Contents

1. Which of the following is not a characteristic of a relational database model?

a. Table
b. Tree like structure
c. Complex logical relationship
d. Records
View Answer
b. Tree like structure

2. Field is otherwise called as ……… of the record

a. data item
b. data type
c. value
d. variable
View Answer
a. data item

3. A table can have only one

a. Secondary key
b. Alternate key
c. Unique key
d. Primary key
View Answer
d. Primary key

4. A field can be called as ……….. in relation context.

a. random file
b. direct file
c. attribute
d. tuple
View Answer
c. attribute

5. In the relational modes, cardinality is termed as

a. Number of tuples
b. Number of attributes
c. Number of tables
d. Number of constraints
View Answer
a. Number of tuples

6. The …….. is used for creating and destroying table, indexes and other forms of structures.

a. data manipulation language
b. data control language
c. transaction control language
d. data definition language
View Answer
d. data definition language

7. The view of total database content is

a. Conceptual view
b. Internal view
c. External view
d. Physical view
View Answer
a. Conceptual view

8. The ………… refers to the way data is organized in and accessible from DBMS.

a. database hierarchy
b. data organization
c. data sharing
d. data model
View Answer
d. data model

9. Architecture of the database can be viewed as

a. two levels
b. four levels
c. three levels
d. one level
View Answer
c. three levels

10. …….. introduced the relational database rules.

a. Atul kahate
b. James Gossling
c. EF Codd
d. Dennies Rithchie
View Answer
c. EF Codd

11. In a relational model, relations are termed as

a. Tuples
b. Attributes
c. Tables
d. Rows
View Answer
c. Tables

12. When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n) ……..

a. transitive dependency
b. insertion anomaly
c. referential integrity constraint
d. normal form
View Answer
c. referential integrity constraint

13. In the architecture of a database system external level is the

a. physical level
b. logical level
c. conceptual level
d. view level
View Answer
d. view level

14. A functional dependency is a relationship between or among …….

a. tables
b. rows
c. relations
d. attributes
View Answer
d. attributes

15. Related fields in a database are grouped to form a

a. data file
b. data record
c. menu
d. bank
View Answer
b. data record

16. ………. is, a table have more than one set of attributes that could be chosen as the key

a. foreign key
b. integrity key
c. relationship
d. candidate key
View Answer
d. candidate key

17. The database environment has all of the following components except.

a. users
b. separate files
c. database
d. database administrator
View Answer
a. users

18. The operation of eliminating columns in a table done by …….. operation.

a. Restrict
b. Project
c. Union
d. Divide
View Answer
b. Project

19. The way a particular application views the data from the database that the application uses is a

a. module
b. relational model
c. schema
d. sub schema
View Answer
d. sub schema

20. ……. is a condition specified on a database schema and restricts the data that can be stored in an instance of the database.

a. Key Constraint
b. Check Constraint
c. Foreign key constraint
d. integrity constraint
View Answer
b. Check Constraint

21. A relational database developer refers to a record as

a. a criteria
b. a relation
c. a tuple
d. an attribute
View Answer
c. a tuple

22. ………. keyword is used to find the number of values in a column.

a. TOTAL
b. COUNT
c. ADD
d. SUM
View Answer
b. COUNT

23. An advantage of the database management approach is

a. data is dependent on programs
b. data redundancy increases
c. data is integrated and can be accessed by multiple programs
d. none of the above
View Answer
c. data is integrated and can be accessed by multiple programs

24. The collection of information stored in a database at a particular moment is called as ……

a. schema
b. instance of the database
c. data domain
d. independence
View Answer
b. instance of the database

25. Data independence means

a. data is defined separately and not included in programs.
b. programs are not dependent on the physical attributes of data
c. programs are not dependent on the logical attributes of data
d. both B and C
View Answer
d. both B and C

26. A ……… is used to define overall design of the database

a. schema
b. application program
c. data definition language
d. code
View Answer
a. schema

27. Key to represent relationship between tables is called

a. primary key
b. secondary key
c. foreign key
d. none of the above
View Answer
c. foreign key

28. Grant and revoke are ……. statements.

a. DDL
b. TCL
c. DCL
d. DML
View Answer
d. DML

29. DBMS helps achieve

a. Data independence
b. Centralized control of data
c. Neither A nor B
d. Both A and B
View Answer
d. Both A and B

30. ………. command can be used to modify a column in a table

a. alter
b. update
c. set
d. create
View Answer
a. alter

31. The RDBMS terminology for a row is

a. tuple
b. relation
c. attribute
d. degree
View Answer
a. tuple

32. To change column value in a table the ……… command can be used.

a. create
b. insert
c. alter
d. update
View Answer
d. update

33. The full form of DDL is

a. Dynamic Data Language
b. Detailed Data Language
c. Data Definition Language
d. Data Derivation Language
View Answer
c. Data Definition Language

34. To pass on granted privileges to other user the …… clause is used

a. create option
b. grant option
c. update option
d. select option
View Answer
b. grant option

35. A set of possible data values is called

a. attribute
b. degree
c. tuple
d. domain
View Answer
d. domain

36. ……… is critical in formulating database design.

a. row column order
b. number of tables
c. functional dependency
d. normalizing
View Answer
c. functional dependency

37. A primary key if combined with a foreign key creates

a. Parent-Child relationship between the tables that connect them
b. Many to many relationship between the tables that connect them
c. Network model between the tables that connect them
d. None of the above
View Answer
a. Parent-Child relationship between the tables that connect them

38. A …………. represents the number of entities to which another entity can be associated

a. mapping cardinality
b. table
c. schema
d. information
View Answer
a. mapping cardinality

39. Which two files are used during operation of the DBMS

a. Query languages and utilities
b. DML and query language
c. Data dictionary and transaction log
d. Data dictionary and query language
View Answer
c. Data dictionary and transaction log

40. A ……….. is a set of column that identifies every row in a table.

a. composite key
b. candidate key
c. foreign key
d. super key
View Answer
d. super key

41. The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is

a. Procedural DML
b. Non-Procedural DML
c. Procedural DDL
d. Non-Procedural DDL
View Answer
b. Non-Procedural DML

42. Which two files are used during operation of the DBMS?

a. Query languages and utilities
b. DML and query language
c. Data dictionary and transaction log
d. Data dictionary and query language
View Answer
c. Data dictionary and transaction log

43. The database schema is written in

a. HLL
b. DML
c. DDL
d. DCL
View Answer
c. DDL

44. The way a particular application views the data from the database that the application uses is a

a. module
b. relational model
c. schema
d. sub schema
View Answer
d. sub schema

45. The relational model feature is that there

a. is no need for primary key data
b. is much more data independence than some other database models
c. are explicit relationships among records.
d. are tables with many dimensions
View Answer
b. is much more data independence than some other database models

46. Which one of the following statements is false?

a. The data dictionary is normally maintained by the database administrator
b. Data elements in the database can be modified by changing the data dictionary.
c. The data dictionary contains the name and description of each data element.
d. The data dictionary is a tool used exclusively by the database administrator.
View Answer
b. Data elements in the database can be modified by changing the data dictionary.

47. Which of the following are the properties of entities?

a. Groups
b. Table
c. Attributes
d. Switchboards
View Answer
c. Attributes

48. Which database level is closest to the users?

a. External
b. Internal
c. Physical
d. Conceptual
View Answer
a. External

49. Which are the two ways in which entities can participate in a relationship?

a. Passive and active
b. Total and partial
c. Simple and Complex
d. All of the above
View Answer
b. Total and partial

50. …….. data type can store unstructured data

a. RAW
b. CHAR
c. NUMERIC
d. VARCHAR
View Answer
a. RAW

51. What is a data integrity?

a. It is the data contained in database that is non redundant.
b. It is the data contained in database that is accurate and consistent.
c. It is the data contained in database that is secured.
d. It is the data contained in database that is shared.
View Answer
b. It is the data contained in database that is accurate and consistent.

52. As per equivalence rules for query transformation, selection operation distributes over

a. Union
b. Intersection
c. Set difference
d. All of the above
View Answer
d. All of the above

53. In SQL the word ‘natural’ can be used with

a. inner join
b. full outer join
c. right outer join
d. all of the above
View Answer
a. inner join

54. Which of the following relational algebraic operations is not from set theory?

a. Union
b. Intersection
c. Cartesian Product
d. Select
View Answer
d. Select

55. An entity set that does not have sufficient attributes to form a primary key is a

a. strong entity set
b. weak entity set
c. simple entity set
d. primary entity set
View Answer
b. weak entity set

56. In case of entity integrity, the primary key may be

a. not Null
b. Null
c. both Null and not Null
d. any value
View Answer
a. not Null

57. A logical schema

a. is the entire database.
b. is a standard way of organizing information into accessible parts.
c. describes how data is actually stored on disk
d. both A and C
View Answer
a. is the entire database.

58. Which of the operations constitute a basic set of operations for manipulating relational data?

a. Predicate calculus
b. Relational calculus
c. Relational algebra
d. None of the above
View Answer
c. Relational algebra

59. Which of the following is another name for weak entity?

a. Child
b. Owner
c. Dominant
d. All of the above
View Answer
a. Child

60. Which of the following is record based logical model?

a. Network Model
b. Object oriented model
c. E-R model
d. None of the above
View Answer
a. Network Model

61. A file manipulation command that extracts some of the records from a file is called

a. SELECT
b. PROJECT
c. JOIN
d. PRODUCT
View Answer
a. SELECT

62. In E-R Diagram derived attribute are represented by

a. Ellipse
b. Dashed ellipse
c. Rectangle
d. Triangle
View Answer
b. Dashed ellipse

63. The natural join is equal to

a. Cartesian Product
b. Combination of Union and Cartesian product
c. Combination of selection and Cartesian product
d. Combination of projection and Cartesian product
View Answer
d. Combination of projection and Cartesian product

64. In E-R diagram relationship type is represented by

a. Ellipse
b. Dashed ellipse
c. Rectangle
d. Diamond
View Answer
d. Diamond

65. In E-R diagram generalization is represented by

a. Ellipse
b. Dashed ellipse
c. Rectangle
d. Triangle
View Answer
d. Triangle

66. A table joined with itself is called

a. Join
b. Self Join
c. Outer Join
d. Equi Join
View Answer
b. Self Join

67. ……….. means multiple copies of the same data items.

a. Data reduction
b. Data integrity
c. Data consistency
d. Data redundancy
View Answer
d. Data redundancy

68. Different values for the same data item is referred to as …….

a. data consistency
b. data inconsistency
c. data integrity
d. data duplication
View Answer
b. data inconsistency

69. The ………. returns row after combining two tables based on common values.

a. difference
b. product
c. join
d. union
View Answer
c. join

70. The ………. can be used to ensure database integrity.

a. entity integrity
b. database constraints
c. referential integrity
d. cardinality
View Answer
b. database constraints

71. Which of the following is not a recovery technique?

a. Deferred update
b. Immediate update
c. Two-phase commit
d. Recovery management
View Answer
c. Two-phase commit

72. Checkpoints are a part of

a. Recovery measures
b. Security measures
c. Concurrency measures
d. Authorization measures
View Answer
a. Recovery measures

73. ……. deals with soft errors, such as power failures.

a. system recovery
b. media recovery
c. database recovery
d. failure recovery
View Answer
d. failure recovery

74. ……….. is an essential part of any backup system.

a. Filter
b. Recovery
c. Security
d. Scalability
View Answer
c. Security

75. Media recovery deals with ………..

a. disk errors
b. hard errors
c. system errors
d. power failures
View Answer
a. disk errors

76. For a backup/restore system, …………. is a prerequisite for service in a enterprise.

a. Filter
b. Recovery
c. Security
d. Scalability
View Answer
d. Scalability

77. Failure recovery and media recovery fall under ……..

a. transaction recovery
b. database recovery
c. system recovery
d. value recovery
View Answer
c. system recovery

78. The ………. consists of the various applications and database that play a role in a backup and recovery strategy.

a. Recovery Manager Environment
b. Recovery Manager Suit
c. Recovery Manager File
d. Recovery Manager Database
View Answer
a. Recovery Manager Environment

79. In which the database can be restored up to the last consistent state after the system failure?

a. Backup
b. Recovery
c. Both
d. None
View Answer
b. Recovery

80. A ……….. is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalog.

a. recovery procedure
b. recovery block
c. stored block
d. stored script
View Answer
d. stored script

81. In log based recovery, the log is sequence of ………

a. filter
b. records
c. blocks
d. numbers
View Answer
b. records

82. The enrolling of a database in a recovery catalog is called ………

a. setup
b. registration
c. startup
d. enrollment
View Answer
b. registration

83. ………. is an alternative of log based recovery.

a. Disk recovery
b. Shadow paging
c. Dish shadowing
d. Crash recovery
View Answer
b. Shadow paging

84. Most backup and recovery commands in ……….. are executed by server sessions.

a. Backup Manager
b. Recovery Manager
c. Backup and Recovery Manager
d. Database Manager
View Answer
b. Recovery Manager

85. …….. systems typically allows to replace failed disks without stopping access to the system.

a. RAM
b. RMAN
c. RAD
d. RAID
View Answer
d. RAID

86. An ……… is an exact copy of a single data file, archived redo log file, or control file.

a. image copy
b. data file copy
c. copy log
d. control copy
View Answer
a. image copy

87. ………. known as memory-style error correcting-code(ECC) organization, employs parity bits.

a. RAID level 1
b. RAID level 2
c. RAID level 3
d. RAID level 4
View Answer
b. RAID level 2

88. The remote backup site is sometimes called the ………. site.

a. primary
b. secondary
c. ternary
d. None of the above
View Answer
b. secondary

89. EXP command is used ………..

a. to take Backup of the Oracle Database
b. to import data from the exported dump file
c. to create Rollback segments
d. to create Schedule
View Answer
a. to take Backup of the Oracle Database

90. The simplest approach to introducing redundancy is to duplicate every disk is called …..

a. mirroring
b. imaging
c. copying
d. All of the above
View Answer
a. mirroring

91. If the transaction is rolled back, all the database changes made inside the transaction are ……

a. made permanent
b. made temporary
c. copied to the log
d. undone
View Answer
d. undone

92. Which of the following is not a property of transactions?

a. Atomicity
b. Concurrency
c. Isolation
d. Durability
View Answer
b. Concurrency

93. A ……… ensures that transactions are performed as expected.

a. transaction processing monitor
b. transaction procedure monitor
c. isolation monitor
d. transaction log
View Answer
a. transaction processing monitor

94. A transaction that completes its execution successfully is said to be …….

a. committed
b. rolled back
c. partially committed
d. Aborted
View Answer
a. committed

95. …….. means that a transaction must execute exactly once completely or not at all.

a. durability
b. consistency
c. atomicity
d. isolation
View Answer
c. atomicity

96. Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R

a. It will result in a deadlock situation
b. It will immediately be rejected
c. It will immediately be granted
d. It will be granted as soon as it is released by A
View Answer
c. It will immediately be granted

97. ……….. means that when it ends, a transaction must leave the database in a consistent state.

a. Data isolation
b. Data duration
c. Data consistency
d. Data non-reputability
View Answer
c. Data consistency

98. The number of transactions executed in a given amount of time is called ………

a. utilization
b. execution rate
c. throughput
d. atomicity
View Answer
c. throughput

99. Isolation means ……

a. transaction must not interfere with each other
b. transaction must interfere with each other
c. transaction must be in consistent state
d. transaction must be executed immediately
View Answer
a. transaction must not interfere with each other

100. Which of the following ensures the atomicity of the transaction?

a. Transaction management component of DBMS
b. Application Programmer
c. Concurrency control component of DBMS
d. Recovery management component of DBMS
View Answer
a. Transaction management component of DBMS

Leave a Comment