Showing Page:
1/24
Database Management System MCQ (Multiple Choice
Questions)
Here are 50+ MCQs on Database Management System with logical answers
1. What is the full form of DBMS?
a) Data of Binary Management System
b) Database Management System
c) Database Management Service
d) Data Backup Management System
View Answer
Answer: b
Explanation: DBMS is abbreviated as Database Management System. Database Management System
stores the data and allows authorized users to manipulate and modify the data.
2. What is a database?
a) Organized collection of information that cannot be accessed, updated, and managed
b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and managed
d) Organized collection of data that cannot be updated
View Answer
Answer: c
Explanation: It is defined as an organized collection of data or information for easy access, updating, and
management in a computer.
Showing Page:
2/24
3. What is DBMS?
a) DBMS is a collection of queries
b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
View Answer
Answer: d
Explanation: DBMS is nothing but a storehouse wherein the authorized user can create a database to
store, modify or retrieve the organized data in the table. It can be modified or retrieved by users who
have access to DBMS only.
4. Who created the first DBMS?
a) Edgar Frank Codd
b) Charles Bachman
c) Charles Babbage
d) Sharon B. Codd
View Answer
Answer: b
Explanation: Charles Bachman along with his team invented the first DBMS known as Integrated Data
Store (IDS).
5. Which type of data can be stored in the database?
a) Image oriented data
b) Text, files containing data
c) Data in the form of audio or video
d) All of the above
Answer: d
Showing Page:
3/24
Explanation: The reason for creating the database management system was to store large data and
these data can be of any form image, text, audio, or video files, etc. DBMS allows the users to store and
access the data of any format
6. In which of the following formats data is stored in the database management system?
a) Image
b) Text
c) Table
d) Graph
View Answer
Answer: c
Explanation: The data is stored in a table format intended to manage the storage of data and manipulate
stored data to generate information.
7. Which of the following is not a type of database?
a) Hierarchical
b) Network
c) Distributed
d) Decentralized
View Answer
Answer: d
Explanation: Different types are:
1) Centralized
2) Distributed
3) Relational
4) NoSQL
5) Cloud
Showing Page:
4/24
6) Object-oriented
7) Hierarchical
8) Network
8. Which of the following is not an example of DBMS?
a) MySQL
b) Microsoft Acess
c) IBM DB2
d) Google
View Answer
Answer: d
Explanation: MySQL, Microsoft Access, IBM DB2 are database management systems while Google is a
search engine. MySQL is a Linux-based database management system, Microsoft Access is a tool that is a
part of Microsoft Office used to store data, IBM DB2 is a database management system developed by
IBM. Google’s Bigtable is the database that runs Google’s Internet search, Google Maps, YouTube, Gmail,
and other products.
9. Which of the following is a feature of DBMS?
a) Minimum Duplication and Redundancy of Data
b) High Level of Security
c) Single-user Access only
d) Support ACID Property
View Answer
Answer: c
Explanation: The important features of a database management system are:
1) Minimum Duplication and Redundancy of Data
2) High Level of Security
Showing Page:
5/24
3) Mulitple-user Access
4) Support ACID Property
10. Which of the following is a feature of the database?
a) No-backup for the data stored
b) User interface provided
c) Lack of Authentication
d) Store data in multiple locations
View Answer
Answer: b
Explanation: The important features are:
1) Provides backup for the data stored by the user and the user can retrieve the data whenever required.
2) Provides User-interface to access the data.
3) Only authorized users can access the stored data.
4) Data is stored in one central location but multiple authorized users can access the data.
11. Which of the following is not a function of the database?
a) Managing stored data
b) Manipulating data
c) Security for stored data
d) Analysing code
View Answer
Answer: d
Explanation: It allows authorized users to update, store, manipulate, or access data. Since data is stored
in table format it is easy to access the data and perform the required functions. It also removes
duplicate and redundant data.
Showing Page:
6/24
12. Which of the following is a function of the DBMS?
a) Storing data
b) Providing multi-users access control
c) Data Integrity
d) All of the above
View Answer
Answer: d
Explanation: The purpose of creating DBMS was to store the data. The data stored in the database
management system can be can accessed by multiple users if the access is provided. The data stored will
be accurate and complete hence providing data integrity.
13. Which of the following is a component of the DBMS?
a) Data
b) Data Languages
c) Data Manager
d) All of the above
View Answer
Answer: d
Explanation: The components of DBMS are as follows:
1) Hardware: Like a hard drive, monitor, etc.
2) Software: Provides a user interface
3) Data Manager: Manages operations of DBMS.
4) Data: The collection of information on the DB is known as data.
5) Data Languages: Languages like DDL, DML, DAL, and DCL allow to perform operations like creating,
modifying, storing, or retrieving data.
Showing Page:
7/24
14. Which of the following is known as a set of entities of the same type that share same properties, or
attributes?
a) Relation set
b) Tuples
c) Entity set
d) Entity Relation model
View Answer
Answer: c
Explanation: In the actual world, an entity is a distinct “thing” or “object” from all other objects. For
example: Each employee of an organization is an entity.
15. What is information about data called?
a) Hyper data
b) Tera data
c) Meta data
d) Relations
View Answer
Answer: c
Explanation: Information about data is known as Metadata. Metadata describes the data in detail by
providing additional information like type, length of the data, etc. Metadata helps the user to
understand the data.
16. What does an RDBMS consist of?
a) Collection of Records
b) Collection of Keys
c) Collection of Tables
d) Collection of Fields
Showing Page:
8/24
View Answer
Answer: c
Explanation: It consists of a collection of tables i.e., the data is organized in tabular format. The columns
of the relation are known as Fields and rows of the relation are known as fields. Constraints in a relation
are known as Keys.
17. The values appearing in given attributes of any tuple in the referencing relation must likewise occur
in specified attributes of at least one tuple in the referenced relation, according to
_____________________ integrity constraint.
a) Referential
b) Primary
c) Referencing
d) Specific
View Answer
Answer: a
Explanation: Consider 2 relations r1 and r2. r1 may include among its attributes the primary key of
relation r2. This attribute is called a foreign key from r1, referencing r2. The relation r1 is also called the
referencing relation of the foreign key dependency, and r2 is called the referenced relation of the
foreign key.
18. _____________ is a hardware component that is most important for the operation of a database
management system.
a) Microphone
b) High speed, large capacity disk to store data
c) High-resolution video display
d) Printer
View Answer
Answer: b
Showing Page:
9/24
Explanation: Since all the data are stored in form of memory in the disk, a high speed, and large-capacity
disk is required for the operation of the database management system.
19. The DBMS acts as an interface between ________________ and ________________ of an
enterprise-class system.
a) Data and the DBMS
b) Application and SQL
c) Database application and the database
d) The user and the software
View Answer
Answer: c
Explanation: A database management system is an application that acts as an interface between the
user and the database. The user interacts with the application to access data.
20. The ability to query data, as well as insert, delete, and alter tuples, is offered by ____________
a) TCL (Transaction Control Language)
b) DCL (Data Control Language)
c) DDL (Data Definition Langauge)
d) DML (Data Manipulation Langauge)
View Answer
Answer: d
Explanation: A query is a request for data or information. Relational Schema is the design and structure
of the relation. DDL consists of commands that help in modifying. DML performs the change in the
values of the relation.
21. ______________ is a set of one or more attributes taken collectively to uniquely identify a record.
a) Primary Key
b) Foreign key
Showing Page:
10/24
c) Super key
d) Candidate key
View Answer
Answer: c
Explanation: Foreign key creates a relationship between two relations. Super key is the superset of all
the keys in a relation. A candidate key is used to identify tuples in a relation.
22. Which command is used to remove a relation from an SQL?
a) Drop table
b) Delete
c) Purge
d) Remove
View Answer
Answer: a
Explanation: Delete command is used to delete the existing record from the table. The drop table
deletes the whole structure of the relation. Purge removes the table which cannot be obtained again.
23. Which of the following set should be associated with weak entity set for weak entity to be
meaningful?
a) Neighbour set
b) Strong entity set
c) Owner set
d) Identifying set
View Answer
Answer: d
Showing Page:
11/24
Explanation: Every weak entity must be linked to an identifying entity; in other words, the existence of
the weak entity set is contingent on the presence of the identifying entity set. The weak entity set that
the identifying entity set identifies is said to be owned by the identifying entity set. Owner entity set is
another name for it.
24. Which of the following command is correct to delete the values in the relation teaches?
a) Delete from teaches;
b) Delete from teaches where Id =’Null’;
c) Remove table teaches;
d) Drop table teaches;
View Answer
Answer: a
Explanation: To delete the entries from the table Delete from table command should be used.
25. Procedural language among the following is __________
a) Domain relational calculus
b) Tuple relational calculus
c) Relational algebra
d) Query language
View Answer
Answer: c
Explanation: Non-Procedural Languages are Domain relational calculus and Tuple relational calculus.
Relational algebra is a procedural language that takes input in the form of relation and output generated
is also a relation.
26. _________________ operations do not preserve non-matched tuples.
a) Left outer join
b) Inner join
Showing Page:
12/24
c) Natural join
d) Right outer join
View Answer
Answer: b
Explanation: Left outer join returns all the rows from the table that is on the left side and matching rows
on the right side of the join. Inner join returns all rows when there is at least one match in BOTH tables.
Natural join returns the common columns from the tables being joined. A right outer join returns all the
rows from the table that is on the right side and matching rows on the left side of the join.
27. Which forms have a relation that contains information about a single entity?
a) 4NF
b) 2NF
c) 5NF
d) 3NF
View Answer
Answer: a
Explanation: If and only if, for each of its non-trivial multivalued dependencies X \twoheadrightarrow Y,
a table is in 4NF. X is a superkeythat is, X is either a candidate key or a superset thereof.
28. The top level of the hierarchy consists of ______ each of which can contain _____.
a) Schemas, Catalogs
b) Schemas, Environment
c) Environment, Schemas
d) Catalogs, Schemas
View Answer
Answer: d
Showing Page:
13/24
Explanation: Schemas represent the logical configuration of the DBMS. Catalogs consist of metadata of
the objects and system settings used.
29. _______ indicates the maximum number of entities that can be involved in a relationship.
a) Greater Entity Count
b) Minimum cardinality
c) Maximum cardinality
d) ERD
View Answer
Answer: c
Explanation: The term cardinality refers to the uniqueness of data values included in a single column
(attribute) of a table in SQL (Structured Query Language).
30. The user IDs can be added or removed using which of the following fixed roles?
a) db_sysadmin
b) db_accessadmin
c) db_securityadmin
d) db_setupadmin
View Answer
31. Why the following statement is erroneous?
SELECT dept_name, ID, avg (salary)
FROM instructor
GROUP BY dept_name;
a) Dept_id should not be used in group by clause
b) Group by clause is not valid in this query
Showing Page:
14/24
c) Avg(salary) should not be selected
d) None
View Answer
Answer: a
Explanation: Any property that does not occur in the group by clause must only appear in an aggregate
function if it also appears in the select clause; otherwise, the query is considered incorrect.
32. The traditional storage of data organized by the customer, stored in separate folders in filing
cabinets is an example of ______________ type of ‘database’ management system.
a) Object-oriented database management system
b) Relational database management system
c) Network database management system
d) Hierarchical database management system
View Answer
Answer: d
Explanation: In an object-oriented database management system, the data is stored in the form of
objects. In a relational DBMS, the data is stored in the form of tables. Hierarchy is obtained by Parent-
Child Relationship. Parent-Child Relationship Type is basically a 1:N relationship.
33. After groups have been established, SQL applies predicates in the ___________ clause, allowing
aggregate functions to be used.
a) Where
b) Having
c) Group by
d) With
View Answer
Showing Page:
15/24
Answer: d
Explanation: The “with” clause was introduced to reduce the complexity of the queries which are
lengthy. The “with” clause allows you to define a temporary relation whose definition is only visible to
the query in which it appears.
34. Which of the following is not the utility of DBMS?
i) Backup ii) Loading iii) Process Organization iv) File organization
a) i, ii, and iv only
b) i, ii and iii only
c) i, iii and iv only
d) All i, ii, iii, and iv
View Answer
Answer: a
Explanation: Backup utility is used to create a copy of the db as a backup. Loading utility is used to load
existing file. File organization is used to relocate the files and create new access path. Processing is not
an utility.
35. What does a foreign key combined with a primary key create?
a) Network model between the tables that connect them
b) Parent-Child relationship between the tables that connects them
c) One to many relationship between the tables that connects them
d) All of the mentioned
View Answer
Answer: a
Explanation: Using the two relationships mother and father gives us a record of a child’s mother, even if
we don’t know who the father is; if the ternary connection parent is used, a null value is necessary. In
this scenario, binary relationship sets are preferred.
36. Which of the following is correct according to the technology deployed by DBMS?
Showing Page:
16/24
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency
View Answer
Answer: c
Explanation: Pointers are used to access data with great speed and accuracy. Consistency is maintained
using locks.
37. Which of the following is correct regarding the file produced by a spreadsheet?
a) can be used as it is by the DBMS
b) stored on disk in an ASCII text format
c) all of the mentioned
d) none of the mentioned
View Answer
Answer: a
Explanation: For updating the value in ASCII text format, a regular text file is used.
38. What is the function of the following command?
Delete from r where P;
a) Clears entries from relation
b) Deletes relation
c) Deletes particular tuple from relation
d) All of the mentioned
View Answer
Showing Page:
17/24
Answer: c
Explanation: In the command the P gives condition to delete a particular tuple.
39. ______ resembles Create view.
a) Create table . . . as
b) Create view as
c) Create table . . .like
d) With data
View Answer
Answer: a
Explanation: The ‘create table… as’ statement is similar to the ‘create view… as’ statement in that both
are defined with queries. The main distinction is that table contents are set when the table is built,
whereas view contents always reflect the current query result.
40. The query specifying the SQL view is said to be updatable if it meets which of the following
conditions?
a) select clause contains relation attribute names but not have expressions, aggregates, or distinct
specification
b) from clause has 1 relation
c) query does not have group by or having clause
d) All of the mentioned
View Answer
Answer: d
Explanation: To update the view in sql all the conditions must be satisfied.
41. When the “ROLLUP” operator for expression or columns within a “GROUP BY” clause is used?
a) Find the groups that make up the subtotal in a row
Showing Page:
18/24
b) Create group-wise grand totals for the groups indicated in a GROUP BY clause
c) Group expressions or columns specified in a GROUP BY clause in one direction, from right to left, for
computing the subtotals
d) To produce a cross-tabular report for computing subtotals by grouping phrases or columns given
within a GROUP BY clause in all available directions
View Answer
Answer: c
Explanation: A view can be thought of as a virtual table that gets its data from one or more table
columns.
42. Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
b) Concatenation
c) Relational-and
d) All of the mentioned
View Answer
Answer: b
Explanation: Concatenation in DBMS is used to join two or more table fields of the same table or
different tables. Example inst sec and student sec.
43. Which of the following is the subset of SQL commands used to manipulate Oracle Structures,
including tables?
a) Data Described Language
b) Data Retrieval Language
c) Data Manipulation Language
d) Data Definition Language
View Answer
Showing Page:
19/24
Answer: d
Explanation: DDLs are used to define schema and table characters and consist of commands that help in
modifying. DML performs the change in the values of the relation.
44. Which of the following functions construct histograms and use buckets for ranking?
a) Ntil()
b) Newtil()
c) Rank()
d) All of the mentioned
View Answer
Answer: a
Explanation: ntile(n) returns the number of the bucket in which each tuple is stored, with bucket
numbers beginning with 1.
45. __________ command is used in SQL to issue multiple CREATE TABLE, CREATE VIEW and GRANT
statements in a single transaction.
a) CREATE CLUSTER
b) CREATE PACKAGE
c) CREATE SCHEMA
d) All of the mentioned
View Answer
Answer: c
Explanation: A schema is a description of a system’s structure in a formal language supported by the
database management system, and it refers to data organization as a blueprint for how a db is built.
46. Which of the following key is required in to handle the data when the encryption is applied to the
data so that the unauthorised user cannot access the data?
Showing Page:
20/24
a) Primary key
b) Authorised key
c) Encryption key
d) Decryption key
View Answer
Answer: d
Explanation: The encryption key is used to encrypt the message. Even if the message is intercepted by
an enemy, the enemy will be unable to decrypt and interpret the message because he lacks the key.
47. Which of the following is known as the process of viewing cross-tab with a fixed value of one
attribute?
a) Dicing
b) Pivoting
c) Slicing
d) Both Pivoting and Dicing
View Answer
Answer: c
Explanation: Slice procedure takes one dimension from a cube and turns it into a new sub-cube. Dice
takes two or more dimensions from a cube and creates a new sub-cube from them.
48. For designing a normal RDBMS which of the following normal form is considered adequate?
a) 4NF
b) 3NF
c) 2NF
d) 5NF
View Answer
Showing Page:
21/24
Answer: b
Explanation: Because most 3NF tables are free of insertion, update, and deletion anomalies, an RDBMS
table is sometimes regarded as “normalized” if it is in the Third Normal Form.
49. Which of the following is popular for applications such as storage of log files in a database
management system since it offers the best write performance?
a) RAID level 0
b) RAID level 1
c) RAID level 2
d) RAID level 3
View Answer
Answer: b
Explanation: RAID level 0 refers to data stripping. RAID level 1 refers to disk mirroring with block striping.
RAID level 2 refers to bit-level stripping and RAID level 3 refers to byte-level striping with dedicated
parity.
50. Which of the following represents a query in the tuple relational calculus?
a) { }{P(t) | t }
b) {t | P(t)}
c) t | P() | t
d) All of the mentioned
View Answer
Answer: b
Explanation: A nonprocedural query language is the tuple relational calculus. It specifies the needed
information but does not provide a detailed strategy for obtaining it.
51. The oldest DB model is _______________
a) Network
Showing Page:
22/24
b) Physical
c) Hierarchical
d) Relational
View Answer
Answer: a
Explanation: Network model has data stored in a hierarchical network flow. In a relational DBMS, the
data is stored in the form of tables. Hierarchy is obtained by Parent-Child Relationship
52. Evaluate the statements issued by the DBA in the given sequence if OE and SCOTT are the users and
the ORDERS table is owned by OE.
CREATE ROLE r1;
GRANT SELECT, INSERT ON oe. orders TO r1;
GRANT r1 TO scott;
GRANT SELECT ON oe. orders TO scott;
REVOKE SELECT ON oe.orders FROM scott;
What would be the outcome after executing the statements?
a) The REVOKE statement would give an error because the SELECT privilege has been granted to the role
R1
b) The REVOKE statement would remove the SELECT privilege from SCOTT as well as from the role R1
c) SCOTT would be able to query the OE.ORDERS table
d) SCOTT would not be able to query the OE.ORDERS table
View Answer
Answer: c
Explanation: To perform operations on objects, the REVOKE statement is used to revoke rights from a
single user or role, or from all users.
Showing Page:
23/24
53. Which of the following establishes a top-to-bottom relationship among the items?
a) Relational schema
b) Network schema
c) Hierarchical schema
d) All of the mentioned
View Answer
Answer: c
Explanation: A data model in which the data is structured into a tree-like structure is known as a
hierarchical model. The structure allows information to be represented using parent-child relationships.
54. A major goal of the db system is to minimize the number of block transfers between the disk and
memory. Which of the following helps in achieving this goal?
a) Secondary storage
b) Storage
c) Catalog
d) Buffer
View Answer
Answer: d
Explanation: Every block has a copy on disc, however, the copy on the disc may be an earlier version of
the block than the version in the buffer.
55. What happens if a piece of data is stored in two places in the db?
a) Storage space is wasted & Changing the data in one spot will cause data inconsistency
b) In can be more easily accessed
c) Changing the data in one spot will cause data inconsistency
d) Storage space is wasted
View Answer
Showing Page:
24/24
Answer: a
Explanation: One of the main features of a database management system is minimum data duplication
and redundancy. Hence, is always consistent and so there is no duplication.
56. The logical design, and the snapshot of the data at a given instant in time is known as?
a) Instance & Relation
b) Relation & Schema
c) Domain & Schema
d) Schema & Instance
View Answer
Answer: d
Explanation: Instance is an instance of time, the relation is also known as table consists of data with
similar characteristics, Domain is the collection of values that an attribute can contain and schema is a
representation.

Unformatted Attachment Preview

Database Management System MCQ (Multiple Choice Questions) Here are 50+ MCQs on Database Management System with logical answers 1. What is the full form of DBMS? a) Data of Binary Management System b) Database Management System c) Database Management Service d) Data Backup Management System View Answer Answer: b Explanation: DBMS is abbreviated as Database Management System. Database Management System stores the data and allows authorized users to manipulate and modify the data. 2. What is a database? a) Organized collection of information that cannot be accessed, updated, and managed b) Collection of data or information without organizing c) Organized collection of data or information that can be accessed, updated, and managed d) Organized collection of data that cannot be updated View Answer Answer: c Explanation: It is defined as an organized collection of data or information for easy access, updating, and management in a computer. 3. What is DBMS? a) DBMS is a collection of queries b) DBMS is a high-level language c) DBMS is a programming language d) DBMS stores, modifies and retrieves data View Answer Answer: d Explanation: DBMS is nothing but a storehouse wherein the authorized user can create a database to store, modify or retrieve the organized data in the table. It can be modified or retrieved by users who have access to DBMS only. 4. Who created the first DBMS? a) Edgar Frank Codd b) Charles Bachman c) Charles Babbage d) Sharon B. Codd View Answer Answer: b Explanation: Charles Bachman along with his team invented the first DBMS known as Integrated Data Store (IDS). 5. Which type of data can be stored in the database? a) Image oriented data b) Text, files containing data c) Data in the form of audio or video d) All of the above Answer: d Explanation: The reason for creating the database management system was to store large data and these data can be of any form image, text, audio, or video files, etc. DBMS allows the users to store and access the data of any format 6. In which of the following formats data is stored in the database management system? a) Image b) Text c) Table d) Graph View Answer Answer: c Explanation: The data is stored in a table format intended to manage the storage of data and manipulate stored data to generate information. 7. Which of the following is not a type of database? a) Hierarchical b) Network c) Distributed d) Decentralized View Answer Answer: d Explanation: Different types are: 1) Centralized 2) Distributed 3) Relational 4) NoSQL 5) Cloud 6) Object-oriented 7) Hierarchical 8) Network 8. Which of the following is not an example of DBMS? a) MySQL b) Microsoft Acess c) IBM DB2 d) Google View Answer Answer: d Explanation: MySQL, Microsoft Access, IBM DB2 are database management systems while Google is a search engine. MySQL is a Linux-based database management system, Microsoft Access is a tool that is a part of Microsoft Office used to store data, IBM DB2 is a database management system developed by IBM. Google’s Bigtable is the database that runs Google’s Internet search, Google Maps, YouTube, Gmail, and other products. 9. Which of the following is a feature of DBMS? a) Minimum Duplication and Redundancy of Data b) High Level of Security c) Single-user Access only d) Support ACID Property View Answer Answer: c Explanation: The important features of a database management system are: 1) Minimum Duplication and Redundancy of Data 2) High Level of Security 3) Mulitple-user Access 4) Support ACID Property 10. Which of the following is a feature of the database? a) No-backup for the data stored b) User interface provided c) Lack of Authentication d) Store data in multiple locations View Answer Answer: b Explanation: The important features are: 1) Provides backup for the data stored by the user and the user can retrieve the data whenever required. 2) Provides User-interface to access the data. 3) Only authorized users can access the stored data. 4) Data is stored in one central location but multiple authorized users can access the data. 11. Which of the following is not a function of the database? a) Managing stored data b) Manipulating data c) Security for stored data d) Analysing code View Answer Answer: d Explanation: It allows authorized users to update, store, manipulate, or access data. Since data is stored in table format it is easy to access the data and perform the required functions. It also removes duplicate and redundant data. 12. Which of the following is a function of the DBMS? a) Storing data b) Providing multi-users access control c) Data Integrity d) All of the above View Answer Answer: d Explanation: The purpose of creating DBMS was to store the data. The data stored in the database management system can be can accessed by multiple users if the access is provided. The data stored will be accurate and complete hence providing data integrity. 13. Which of the following is a component of the DBMS? a) Data b) Data Languages c) Data Manager d) All of the above View Answer Answer: d Explanation: The components of DBMS are as follows: 1) Hardware: Like a hard drive, monitor, etc. 2) Software: Provides a user interface 3) Data Manager: Manages operations of DBMS. 4) Data: The collection of information on the DB is known as data. 5) Data Languages: Languages like DDL, DML, DAL, and DCL allow to perform operations like creating, modifying, storing, or retrieving data. 14. Which of the following is known as a set of entities of the same type that share same properties, or attributes? a) Relation set b) Tuples c) Entity set d) Entity Relation model View Answer Answer: c Explanation: In the actual world, an entity is a distinct “thing” or “object” from all other objects. For example: Each employee of an organization is an entity. 15. What is information about data called? a) Hyper data b) Tera data c) Meta data d) Relations View Answer Answer: c Explanation: Information about data is known as Metadata. Metadata describes the data in detail by providing additional information like type, length of the data, etc. Metadata helps the user to understand the data. 16. What does an RDBMS consist of? a) Collection of Records b) Collection of Keys c) Collection of Tables d) Collection of Fields View Answer Answer: c Explanation: It consists of a collection of tables i.e., the data is organized in tabular format. The columns of the relation are known as Fields and rows of the relation are known as fields. Constraints in a relation are known as Keys. 17. The values appearing in given attributes of any tuple in the referencing relation must likewise occur in specified attributes of at least one tuple in the referenced relation, according to _____________________ integrity constraint. a) Referential b) Primary c) Referencing d) Specific View Answer Answer: a Explanation: Consider 2 relations r1 and r2. r1 may include among its attributes the primary key of relation r2. This attribute is called a foreign key from r1, referencing r2. The relation r1 is also called the referencing relation of the foreign key dependency, and r2 is called the referenced relation of the foreign key. 18. _____________ is a hardware component that is most important for the operation of a database management system. a) Microphone b) High speed, large capacity disk to store data c) High-resolution video display d) Printer View Answer Answer: b Explanation: Since all the data are stored in form of memory in the disk, a high speed, and large-capacity disk is required for the operation of the database management system. 19. The DBMS acts as an interface between ________________ and ________________ of an enterprise-class system. a) Data and the DBMS b) Application and SQL c) Database application and the database d) The user and the software View Answer Answer: c Explanation: A database management system is an application that acts as an interface between the user and the database. The user interacts with the application to access data. 20. The ability to query data, as well as insert, delete, and alter tuples, is offered by ____________ a) TCL (Transaction Control Language) b) DCL (Data Control Language) c) DDL (Data Definition Langauge) d) DML (Data Manipulation Langauge) View Answer Answer: d Explanation: A query is a request for data or information. Relational Schema is the design and structure of the relation. DDL consists of commands that help in modifying. DML performs the change in the values of the relation. 21. ______________ is a set of one or more attributes taken collectively to uniquely identify a record. a) Primary Key b) Foreign key c) Super key d) Candidate key View Answer Answer: c Explanation: Foreign key creates a relationship between two relations. Super key is the superset of all the keys in a relation. A candidate key is used to identify tuples in a relation. 22. Which command is used to remove a relation from an SQL? a) Drop table b) Delete c) Purge d) Remove View Answer Answer: a Explanation: Delete command is used to delete the existing record from the table. The drop table deletes the whole structure of the relation. Purge removes the table which cannot be obtained again. 23. Which of the following set should be associated with weak entity set for weak entity to be meaningful? a) Neighbour set b) Strong entity set c) Owner set d) Identifying set View Answer Answer: d Explanation: Every weak entity must be linked to an identifying entity; in other words, the existence of the weak entity set is contingent on the presence of the identifying entity set. The weak entity set that the identifying entity set identifies is said to be owned by the identifying entity set. Owner entity set is another name for it. 24. Which of the following command is correct to delete the values in the relation teaches? a) Delete from teaches; b) Delete from teaches where Id =’Null’; c) Remove table teaches; d) Drop table teaches; View Answer Answer: a Explanation: To delete the entries from the table Delete from table command should be used. 25. Procedural language among the following is __________ a) Domain relational calculus b) Tuple relational calculus c) Relational algebra d) Query language View Answer Answer: c Explanation: Non-Procedural Languages are Domain relational calculus and Tuple relational calculus. Relational algebra is a procedural language that takes input in the form of relation and output generated is also a relation. 26. _________________ operations do not preserve non-matched tuples. a) Left outer join b) Inner join c) Natural join d) Right outer join View Answer Answer: b Explanation: Left outer join returns all the rows from the table that is on the left side and matching rows on the right side of the join. Inner join returns all rows when there is at least one match in BOTH tables. Natural join returns the common columns from the tables being joined. A right outer join returns all the rows from the table that is on the right side and matching rows on the left side of the join. 27. Which forms have a relation that contains information about a single entity? a) 4NF b) 2NF c) 5NF d) 3NF View Answer Answer: a Explanation: If and only if, for each of its non-trivial multivalued dependencies X \twoheadrightarrow Y, a table is in 4NF. X is a superkey—that is, X is either a candidate key or a superset thereof. 28. The top level of the hierarchy consists of ______ each of which can contain _____. a) Schemas, Catalogs b) Schemas, Environment c) Environment, Schemas d) Catalogs, Schemas View Answer Answer: d Explanation: Schemas represent the logical configuration of the DBMS. Catalogs consist of metadata of the objects and system settings used. 29. _______ indicates the maximum number of entities that can be involved in a relationship. a) Greater Entity Count b) Minimum cardinality c) Maximum cardinality d) ERD View Answer Answer: c Explanation: The term cardinality refers to the uniqueness of data values included in a single column (attribute) of a table in SQL (Structured Query Language). 30. The user IDs can be added or removed using which of the following fixed roles? a) db_sysadmin b) db_accessadmin c) db_securityadmin d) db_setupadmin View Answer 31. Why the following statement is erroneous? SELECT dept_name, ID, avg (salary) FROM instructor GROUP BY dept_name; a) Dept_id should not be used in group by clause b) Group by clause is not valid in this query c) Avg(salary) should not be selected d) None View Answer Answer: a Explanation: Any property that does not occur in the group by clause must only appear in an aggregate function if it also appears in the select clause; otherwise, the query is considered incorrect. 32. The traditional storage of data organized by the customer, stored in separate folders in filing cabinets is an example of ______________ type of ‘database’ management system. a) Object-oriented database management system b) Relational database management system c) Network database management system d) Hierarchical database management system View Answer Answer: d Explanation: In an object-oriented database management system, the data is stored in the form of objects. In a relational DBMS, the data is stored in the form of tables. Hierarchy is obtained by ParentChild Relationship. Parent-Child Relationship Type is basically a 1:N relationship. 33. After groups have been established, SQL applies predicates in the ___________ clause, allowing aggregate functions to be used. a) Where b) Having c) Group by d) With View Answer Answer: d Explanation: The “with” clause was introduced to reduce the complexity of the queries which are lengthy. The “with” clause allows you to define a temporary relation whose definition is only visible to the query in which it appears. 34. Which of the following is not the utility of DBMS? i) Backup ii) Loading iii) Process Organization iv) File organization a) i, ii, and iv only b) i, ii and iii only c) i, iii and iv only d) All i, ii, iii, and iv View Answer Answer: a Explanation: Backup utility is used to create a copy of the db as a backup. Loading utility is used to load existing file. File organization is used to relocate the files and create new access path. Processing is not an utility. 35. What does a foreign key combined with a primary key create? a) Network model between the tables that connect them b) Parent-Child relationship between the tables that connects them c) One to many relationship between the tables that connects them d) All of the mentioned View Answer Answer: a Explanation: Using the two relationships mother and father gives us a record of a child’s mother, even if we don’t know who the father is; if the ternary connection parent is used, a null value is necessary. In this scenario, binary relationship sets are preferred. 36. Which of the following is correct according to the technology deployed by DBMS? a) Pointers are used to maintain transactional integrity and consistency b) Cursors are used to maintain transactional integrity and consistency c) Locks are used to maintain transactional integrity and consistency d) Triggers are used to maintain transactional integrity and consistency View Answer Answer: c Explanation: Pointers are used to access data with great speed and accuracy. Consistency is maintained using locks. 37. Which of the following is correct regarding the file produced by a spreadsheet? a) can be used as it is by the DBMS b) stored on disk in an ASCII text format c) all of the mentioned d) none of the mentioned View Answer Answer: a Explanation: For updating the value in ASCII text format, a regular text file is used. 38. What is the function of the following command? Delete from r where P; a) Clears entries from relation b) Deletes relation c) Deletes particular tuple from relation d) All of the mentioned View Answer Answer: c Explanation: In the command the P gives condition to delete a particular tuple. 39. ______ resembles Create view. a) Create table . . . as b) Create view as c) Create table . . .like d) With data View Answer Answer: a Explanation: The ‘create table… as’ statement is similar to the ‘create view… as’ statement in that both are defined with queries. The main distinction is that table contents are set when the table is built, whereas view contents always reflect the current query result. 40. The query specifying the SQL view is said to be updatable if it meets which of the following conditions? a) select clause contains relation attribute names but not have expressions, aggregates, or distinct specification b) from clause has 1 relation c) query does not have group by or having clause d) All of the mentioned View Answer Answer: d Explanation: To update the view in sql all the conditions must be satisfied. 41. When the “ROLLUP” operator for expression or columns within a “GROUP BY” clause is used? a) Find the groups that make up the subtotal in a row b) Create group-wise grand totals for the groups indicated in a GROUP BY clause c) Group expressions or columns specified in a GROUP BY clause in one direction, from right to left, for computing the subtotals d) To produce a cross-tabular report for computing subtotals by grouping phrases or columns given within a GROUP BY clause in all available directions View Answer Answer: c Explanation: A view can be thought of as a virtual table that gets its data from one or more table columns. 42. Which of the following is the best way to represent the attributes in a large db? a) Dot representation b) Concatenation c) Relational-and d) All of the mentioned View Answer Answer: b Explanation: Concatenation in DBMS is used to join two or more table fields of the same table or different tables. Example inst sec and student sec. 43. Which of the following is the subset of SQL commands used to manipulate Oracle Structures, including tables? a) Data Described Language b) Data Retrieval Language c) Data Manipulation Language d) Data Definition Language View Answer Answer: d Explanation: DDLs are used to define schema and table characters and consist of commands that help in modifying. DML performs the change in the values of the relation. 44. Which of the following functions construct histograms and use buckets for ranking? a) Ntil() b) Newtil() c) Rank() d) All of the mentioned View Answer Answer: a Explanation: ntile(n) returns the number of the bucket in which each tuple is stored, with bucket numbers beginning with 1. 45. __________ command is used in SQL to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction. a) CREATE CLUSTER b) CREATE PACKAGE c) CREATE SCHEMA d) All of the mentioned View Answer Answer: c Explanation: A schema is a description of a system’s structure in a formal language supported by the database management system, and it refers to data organization as a blueprint for how a db is built. 46. Which of the following key is required in to handle the data when the encryption is applied to the data so that the unauthorised user cannot access the data? a) Primary key b) Authorised key c) Encryption key d) Decryption key View Answer Answer: d Explanation: The encryption key is used to encrypt the message. Even if the message is intercepted by an enemy, the enemy will be unable to decrypt and interpret the message because he lacks the key. 47. Which of the following is known as the process of viewing cross-tab with a fixed value of one attribute? a) Dicing b) Pivoting c) Slicing d) Both Pivoting and Dicing View Answer Answer: c Explanation: Slice procedure takes one dimension from a cube and turns it into a new sub-cube. Dice takes two or more dimensions from a cube and creates a new sub-cube from them. 48. For designing a normal RDBMS which of the following normal form is considered adequate? a) 4NF b) 3NF c) 2NF d) 5NF View Answer Answer: b Explanation: Because most 3NF tables are free of insertion, update, and deletion anomalies, an RDBMS table is sometimes regarded as “normalized” if it is in the Third Normal Form. 49. Which of the following is popular for applications such as storage of log files in a database management system since it offers the best write performance? a) RAID level 0 b) RAID level 1 c) RAID level 2 d) RAID level 3 View Answer Answer: b Explanation: RAID level 0 refers to data stripping. RAID level 1 refers to disk mirroring with block striping. RAID level 2 refers to bit-level stripping and RAID level 3 refers to byte-level striping with dedicated parity. 50. Which of the following represents a query in the tuple relational calculus? a) { }{P(t) | t } b) {t | P(t)} c) t | P() | t d) All of the mentioned View Answer Answer: b Explanation: A nonprocedural query language is the tuple relational calculus. It specifies the needed information but does not provide a detailed strategy for obtaining it. 51. The oldest DB model is _______________ a) Network b) Physical c) Hierarchical d) Relational View Answer Answer: a Explanation: Network model has data stored in a hierarchical network flow. In a relational DBMS, the data is stored in the form of tables. Hierarchy is obtained by Parent-Child Relationship 52. Evaluate the statements issued by the DBA in the given sequence if OE and SCOTT are the users and the ORDERS table is owned by OE. CREATE ROLE r1; GRANT SELECT, INSERT ON oe. orders TO r1; GRANT r1 TO scott; GRANT SELECT ON oe. orders TO scott; REVOKE SELECT ON oe.orders FROM scott; What would be the outcome after executing the statements? a) The REVOKE statement would give an error because the SELECT privilege has been granted to the role R1 b) The REVOKE statement would remove the SELECT privilege from SCOTT as well as from the role R1 c) SCOTT would be able to query the OE.ORDERS table d) SCOTT would not be able to query the OE.ORDERS table View Answer Answer: c Explanation: To perform operations on objects, the REVOKE statement is used to revoke rights from a single user or role, or from all users. 53. Which of the following establishes a top-to-bottom relationship among the items? a) Relational schema b) Network schema c) Hierarchical schema d) All of the mentioned View Answer Answer: c Explanation: A data model in which the data is structured into a tree-like structure is known as a hierarchical model. The structure allows information to be represented using parent-child relationships. 54. A major goal of the db system is to minimize the number of block transfers between the disk and memory. Which of the following helps in achieving this goal? a) Secondary storage b) Storage c) Catalog d) Buffer View Answer Answer: d Explanation: Every block has a copy on disc, however, the copy on the disc may be an earlier version of the block than the version in the buffer. 55. What happens if a piece of data is stored in two places in the db? a) Storage space is wasted & Changing the data in one spot will cause data inconsistency b) In can be more easily accessed c) Changing the data in one spot will cause data inconsistency d) Storage space is wasted View Answer Answer: a Explanation: One of the main features of a database management system is minimum data duplication and redundancy. Hence, is always consistent and so there is no duplication. 56. The logical design, and the snapshot of the data at a given instant in time is known as? a) Instance & Relation b) Relation & Schema c) Domain & Schema d) Schema & Instance View Answer Answer: d Explanation: Instance is an instance of time, the relation is also known as table consists of data with similar characteristics, Domain is the collection of values that an attribute can contain and schema is a representation. Name: Description: ...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4