Test your knowledge now with our Online Quizzes, Q&A and MCQs! Database Management System Quick Study Episode- 03. Take part in an interactive quiz experience with our online quizzes, Q&A and MCQs. Try it out now Online Quiz, Q&A & MCQ.
1. Which of the following is not a characteristic of a relational database model?
a. Table
b. Tree like structure
c. Complex logical relationship
d. Records
View Answer
b. Tree like structure
2. Field is otherwise called as ……… of the record
a. data item
b. data type
c. value
d. variable
View Answer
a. data item
3. A table can have only one
a. Secondary key
b. Alternate key
c. Unique key
d. Primary key
View Answer
d. Primary key
4. A field can be called as ……….. in relation context.
a. random file
b. direct file
c. attribute
d. tuple
View Answer
c. attribute
5. In the relational modes, cardinality is termed as
a. Number of tuples
b. Number of attributes
c. Number of tables
d. Number of constraints
View Answer
a. Number of tuples
6. The …….. is used for creating and destroying table, indexes and other forms of structures.
a. data manipulation language
b. data control language
c. transaction control language
d. data definition language
View Answer
d. data definition language
7. The view of total database content is
a. Conceptual view
b. Internal view
c. External view
d. Physical view
View Answer
a. Conceptual view
8. The ………… refers to the way data is organized in and accessible from DBMS.
a. database hierarchy
b. data organization
c. data sharing
d. data model
View Answer
d. data model
9. Architecture of the database can be viewed as
a. two levels
b. four levels
c. three levels
d. one level
View Answer
c. three levels
10. …….. introduced the relational database rules.
a. Atul kahate
b. James Gossling
c. EF Codd
d. Dennies Rithchie
View Answer
c. EF Codd
11. In a relational model, relations are termed as
a. Tuples
b. Attributes
c. Tables
d. Rows
View Answer
c. Tables
12. When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n) ……..
a. transitive dependency
b. insertion anomaly
c. referential integrity constraint
d. normal form
View Answer
c. referential integrity constraint
13. In the architecture of a database system external level is the
a. physical level
b. logical level
c. conceptual level
d. view level
View Answer
d. view level
14. A functional dependency is a relationship between or among …….
a. tables
b. rows
c. relations
d. attributes
View Answer
d. attributes
15. Related fields in a database are grouped to form a
a. data file
b. data record
c. menu
d. bank
View Answer
b. data record
16. ………. is, a table have more than one set of attributes that could be chosen as the key
a. foreign key
b. integrity key
c. relationship
d. candidate key
View Answer
d. candidate key
17. The database environment has all of the following components except.
a. users
b. separate files
c. database
d. database administrator
View Answer
a. users
18. The operation of eliminating columns in a table done by …….. operation.
a. Restrict
b. Project
c. Union
d. Divide
View Answer
b. Project
19. The way a particular application views the data from the database that the application uses is a
a. module
b. relational model
c. schema
d. sub schema
View Answer
d. sub schema
20. ……. is a condition specified on a database schema and restricts the data that can be stored in an instance of the database.
a. Key Constraint
b. Check Constraint
c. Foreign key constraint
d. integrity constraint
View Answer
b. Check Constraint
21. A relational database developer refers to a record as
a. a criteria
b. a relation
c. a tuple
d. an attribute
View Answer
c. a tuple
22. ………. keyword is used to find the number of values in a column.
a. TOTAL
b. COUNT
c. ADD
d. SUM
View Answer
b. COUNT
23. An advantage of the database management approach is
a. data is dependent on programs
b. data redundancy increases
c. data is integrated and can be accessed by multiple programs
d. none of the above
View Answer
c. data is integrated and can be accessed by multiple programs
24. The collection of information stored in a database at a particular moment is called as ……
a. schema
b. instance of the database
c. data domain
d. independence
View Answer
b. instance of the database
25. Data independence means
a. data is defined separately and not included in programs.
b. programs are not dependent on the physical attributes of data
c. programs are not dependent on the logical attributes of data
d. both B and C
View Answer
d. both B and C
26. A ……… is used to define overall design of the database
a. schema
b. application program
c. data definition language
d. code
View Answer
a. schema
27. Key to represent relationship between tables is called
a. primary key
b. secondary key
c. foreign key
d. none of the above
View Answer
c. foreign key
29. DBMS helps achieve
a. Data independence
b. Centralized control of data
c. Neither A nor B
d. Both A and B
View Answer
d. Both A and B
30. ………. command can be used to modify a column in a table
a. alter
b. update
c. set
d. create
View Answer
a. alter
31. The RDBMS terminology for a row is
a. tuple
b. relation
c. attribute
d. degree
View Answer
a. tuple
32. To change column value in a table the ……… command can be used.
a. create
b. insert
c. alter
d. update
View Answer
d. update
33. The full form of DDL is
a. Dynamic Data Language
b. Detailed Data Language
c. Data Definition Language
d. Data Derivation Language
View Answer
c. Data Definition Language
34. To pass on granted privileges to other user the …… clause is used
a. create option
b. grant option
c. update option
d. select option
View Answer
b. grant option
35. A set of possible data values is called
a. attribute
b. degree
c. tuple
d. domain
View Answer
d. domain
36. ……… is critical in formulating database design.
a. row column order
b. number of tables
c. functional dependency
d. normalizing
View Answer
c. functional dependency
37. A primary key if combined with a foreign key creates
a. Parent-Child relationship between the tables that connect them
b. Many to many relationship between the tables that connect them
c. Network model between the tables that connect them
d. None of the above
View Answer
a. Parent-Child relationship between the tables that connect them
38. A …………. represents the number of entities to which another entity can be associated
a. mapping cardinality
b. table
c. schema
d. information
View Answer
a. mapping cardinality
39. Which two files are used during operation of the DBMS
a. Query languages and utilities
b. DML and query language
c. Data dictionary and transaction log
d. Data dictionary and query language
View Answer
c. Data dictionary and transaction log
40. A ……….. is a set of column that identifies every row in a table.
a. composite key
b. candidate key
c. foreign key
d. super key
View Answer
d. super key
41. The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is
a. Procedural DML
b. Non-Procedural DML
c. Procedural DDL
d. Non-Procedural DDL
View Answer
b. Non-Procedural DML
42. Which two files are used during operation of the DBMS?
a. Query languages and utilities
b. DML and query language
c. Data dictionary and transaction log
d. Data dictionary and query language
View Answer
c. Data dictionary and transaction log
44. The way a particular application views the data from the database that the application uses is a
a. module
b. relational model
c. schema
d. sub schema
View Answer
d. sub schema
45. The relational model feature is that there
a. is no need for primary key data
b. is much more data independence than some other database models
c. are explicit relationships among records.
d. are tables with many dimensions
View Answer
b. is much more data independence than some other database models
46. Which one of the following statements is false?
a. The data dictionary is normally maintained by the database administrator
b. Data elements in the database can be modified by changing the data dictionary.
c. The data dictionary contains the name and description of each data element.
d. The data dictionary is a tool used exclusively by the database administrator.
View Answer
b. Data elements in the database can be modified by changing the data dictionary.
47. Which of the following are the properties of entities?
a. Groups
b. Table
c. Attributes
d. Switchboards
View Answer
c. Attributes
48. Which database level is closest to the users?
a. External
b. Internal
c. Physical
d. Conceptual
View Answer
a. External
49. Which are the two ways in which entities can participate in a relationship?
a. Passive and active
b. Total and partial
c. Simple and Complex
d. All of the above
View Answer
b. Total and partial
51. What is a data integrity?
a. It is the data contained in database that is non redundant.
b. It is the data contained in database that is accurate and consistent.
c. It is the data contained in database that is secured.
d. It is the data contained in database that is shared.
View Answer
b. It is the data contained in database that is accurate and consistent.
52. As per equivalence rules for query transformation, selection operation distributes over
a. Union
b. Intersection
c. Set difference
d. All of the above
View Answer
d. All of the above
53. In SQL the word ‘natural’ can be used with
a. inner join
b. full outer join
c. right outer join
d. all of the above
View Answer
a. inner join
54. Which of the following relational algebraic operations is not from set theory?
a. Union
b. Intersection
c. Cartesian Product
d. Select
View Answer
d. Select
55. An entity set that does not have sufficient attributes to form a primary key is a
a. strong entity set
b. weak entity set
c. simple entity set
d. primary entity set
View Answer
b. weak entity set
56. In case of entity integrity, the primary key may be
a. not Null
b. Null
c. both Null and not Null
d. any value
View Answer
a. not Null
57. A logical schema
a. is the entire database.
b. is a standard way of organizing information into accessible parts.
c. describes how data is actually stored on disk
d. both A and C
View Answer
a. is the entire database.
58. Which of the operations constitute a basic set of operations for manipulating relational data?
a. Predicate calculus
b. Relational calculus
c. Relational algebra
d. None of the above
View Answer
c. Relational algebra
59. Which of the following is another name for weak entity?
a. Child
b. Owner
c. Dominant
d. All of the above
View Answer
a. Child
60. Which of the following is record based logical model?
a. Network Model
b. Object oriented model
c. E-R model
d. None of the above
View Answer
a. Network Model
61. A file manipulation command that extracts some of the records from a file is called
a. SELECT
b. PROJECT
c. JOIN
d. PRODUCT
View Answer
a. SELECT
62. In E-R Diagram derived attribute are represented by
a. Ellipse
b. Dashed ellipse
c. Rectangle
d. Triangle
View Answer
b. Dashed ellipse
63. The natural join is equal to
a. Cartesian Product
b. Combination of Union and Cartesian product
c. Combination of selection and Cartesian product
d. Combination of projection and Cartesian product
View Answer
d. Combination of projection and Cartesian product
64. In E-R diagram relationship type is represented by
a. Ellipse
b. Dashed ellipse
c. Rectangle
d. Diamond
View Answer
d. Diamond
65. In E-R diagram generalization is represented by
a. Ellipse
b. Dashed ellipse
c. Rectangle
d. Triangle
View Answer
d. Triangle
66. A table joined with itself is called
a. Join
b. Self Join
c. Outer Join
d. Equi Join
View Answer
b. Self Join
67. ……….. means multiple copies of the same data items.
a. Data reduction
b. Data integrity
c. Data consistency
d. Data redundancy
View Answer
d. Data redundancy
68. Different values for the same data item is referred to as …….
a. data consistency
b. data inconsistency
c. data integrity
d. data duplication
View Answer
b. data inconsistency
69. The ………. returns row after combining two tables based on common values.
a. difference
b. product
c. join
d. union
View Answer
c. join
70. The ………. can be used to ensure database integrity.
a. entity integrity
b. database constraints
c. referential integrity
d. cardinality
View Answer
b. database constraints
71. Which of the following is not a recovery technique?
a. Deferred update
b. Immediate update
c. Two-phase commit
d. Recovery management
View Answer
c. Two-phase commit
72. Checkpoints are a part of
a. Recovery measures
b. Security measures
c. Concurrency measures
d. Authorization measures
View Answer
a. Recovery measures
73. ……. deals with soft errors, such as power failures.
a. system recovery
b. media recovery
c. database recovery
d. failure recovery
View Answer
d. failure recovery
74. ……….. is an essential part of any backup system.
a. Filter
b. Recovery
c. Security
d. Scalability
View Answer
c. Security
75. Media recovery deals with ………..
a. disk errors
b. hard errors
c. system errors
d. power failures
View Answer
a. disk errors
76. For a backup/restore system, …………. is a prerequisite for service in a enterprise.
a. Filter
b. Recovery
c. Security
d. Scalability
View Answer
d. Scalability
77. Failure recovery and media recovery fall under ……..
a. transaction recovery
b. database recovery
c. system recovery
d. value recovery
View Answer
c. system recovery
78. The ………. consists of the various applications and database that play a role in a backup and recovery strategy.
a. Recovery Manager Environment
b. Recovery Manager Suit
c. Recovery Manager File
d. Recovery Manager Database
View Answer
a. Recovery Manager Environment
79. In which the database can be restored up to the last consistent state after the system failure?
a. Backup
b. Recovery
c. Both
d. None
View Answer
b. Recovery
80. A ……….. is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalog.
a. recovery procedure
b. recovery block
c. stored block
d. stored script
View Answer
d. stored script
81. In log based recovery, the log is sequence of ………
a. filter
b. records
c. blocks
d. numbers
View Answer
b. records
82. The enrolling of a database in a recovery catalog is called ………
a. setup
b. registration
c. startup
d. enrollment
View Answer
b. registration
83. ………. is an alternative of log based recovery.
a. Disk recovery
b. Shadow paging
c. Dish shadowing
d. Crash recovery
View Answer
b. Shadow paging
84. Most backup and recovery commands in ……….. are executed by server sessions.
a. Backup Manager
b. Recovery Manager
c. Backup and Recovery Manager
d. Database Manager
View Answer
b. Recovery Manager
85. …….. systems typically allows to replace failed disks without stopping access to the system.
a. RAM
b. RMAN
c. RAD
d. RAID
View Answer
d. RAID
86. An ……… is an exact copy of a single data file, archived redo log file, or control file.
a. image copy
b. data file copy
c. copy log
d. control copy
View Answer
a. image copy
87. ………. known as memory-style error correcting-code(ECC) organization, employs parity bits.
a. RAID level 1
b. RAID level 2
c. RAID level 3
d. RAID level 4
View Answer
b. RAID level 2
88. The remote backup site is sometimes called the ………. site.
a. primary
b. secondary
c. ternary
d. None of the above
View Answer
b. secondary
89. EXP command is used ………..
a. to take Backup of the Oracle Database
b. to import data from the exported dump file
c. to create Rollback segments
d. to create Schedule
View Answer
a. to take Backup of the Oracle Database
90. The simplest approach to introducing redundancy is to duplicate every disk is called …..
a. mirroring
b. imaging
c. copying
d. All of the above
View Answer
a. mirroring
91. If the transaction is rolled back, all the database changes made inside the transaction are ……
a. made permanent
b. made temporary
c. copied to the log
d. undone
View Answer
d. undone
92. Which of the following is not a property of transactions?
a. Atomicity
b. Concurrency
c. Isolation
d. Durability
View Answer
b. Concurrency
93. A ……… ensures that transactions are performed as expected.
a. transaction processing monitor
b. transaction procedure monitor
c. isolation monitor
d. transaction log
View Answer
a. transaction processing monitor
94. A transaction that completes its execution successfully is said to be …….
a. committed
b. rolled back
c. partially committed
d. Aborted
View Answer
a. committed
95. …….. means that a transaction must execute exactly once completely or not at all.
a. durability
b. consistency
c. atomicity
d. isolation
View Answer
c. atomicity
96. Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R
a. It will result in a deadlock situation
b. It will immediately be rejected
c. It will immediately be granted
d. It will be granted as soon as it is released by A
View Answer
c. It will immediately be granted
97. ……….. means that when it ends, a transaction must leave the database in a consistent state.
a. Data isolation
b. Data duration
c. Data consistency
d. Data non-reputability
View Answer
c. Data consistency
98. The number of transactions executed in a given amount of time is called ………
a. utilization
b. execution rate
c. throughput
d. atomicity
View Answer
c. throughput
99. Isolation means ……
a. transaction must not interfere with each other
b. transaction must interfere with each other
c. transaction must be in consistent state
d. transaction must be executed immediately
View Answer
a. transaction must not interfere with each other
100. Which of the following ensures the atomicity of the transaction?
a. Transaction management component of DBMS
b. Application Programmer
c. Concurrency control component of DBMS
d. Recovery management component of DBMS
View Answer
a. Transaction management component of DBMS