DBMS MCQs
DBMS MCQs
DBMS MCQs
6) The ........ is used for creating and destroying table, indexes and other forms of structures.
A. data manipulation language
B. data control language
C. transaction control language
D. data definition language
8) The ............ refers to the way data is organized in and accessible from DBMS.
A. database hierarchy
B. data organization
C. data sharing
D. data model
12) When the values in one or more attributes being used as a foreign key must exist in another set of
one or more attributes in another table, we have created a(n) ........
A. transitive dependency
B. insertion anomaly
C. referential integrity constraint
D. normal form
16) .......... is, a table have more than one set of attributes that could be chosen as the key
A. foreign key
B. integrity key
C. relationship
D. candidate key
17) The database environment has all of the following components except.
A. users
B. separate files
C. database
D. database administrator
19) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
20) ....... is a condition specified on a database schema and restricts the data that can be stored in an
instance of the database.
A. Key Constraint
B. Check Constraint
C. Foreign key constraint
D. integrity constraint
Answers:
1) B. Tree like structure
2) A. data item
3) D. Primary key
4) C. attribute
5) A. Number of tuples
6) D. data definition language
7) A. Conceptual view
8) D. data model
9) C. three levels
10) C. EF Codd
11) C. Tables
12) C. referential integrity constraint
13) D. view level
14) D. attributes
15) B. data record
16) D. candidate key
17) A. users
18) B. Project
19) D. sub schema
20) B. Check Constraint
set-2
1) A relational database developer refers to a record as
A. a criteria
B. a relation
C. a tuple
D. an attribute
Answers:
1) C. a tuple
2) B. COUNT
3) C. data is integrated and can be accessed by multiple programs
4) B. instance of the database
5) D. both B and C
6) A. schema
7) C. foreign key
8) D. DML
9) D. Both A and B
10) A. alter
set-3
8) A ............. represents the number of entities to which another entity can be associated
A. mapping cardinality
B. table
C. schema
Answers:
1) A. tuple
2) D. update
3) C. Data Definition Language
4) B. grant option
5) D. domain
6) C. functional dependency
7) A. Parent-Child relationship between the tables that connect them
8) A. mapping cardinality
9) C. Data dictionary and transaction log
10) D. super key
set-4
1) The language that requires a user to specify the data to be retrieved without specifying exactly how
to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
4) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
Get More DBMS MCQs From http://www.siteforinfotech.com/p/dbms-mcq-sets.html
9) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
Answers:
1) B. Non-Procedural DML
2) C. Data dictionary and transaction log
3) C. DDL
4) D. sub schema
5) B. is much more data independence than some other database models
6) B. Data elements in the database can be modified by changing the data dictionary.
7) C. Attributes
8) A. External
9) B. Total and partial
10) A. RAW
2) As per equivalence rules for query transformation, selection operation distributes over
A. Union
B. Intersection
C. Set difference
D. All of the above
4) Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
5) An entity set that does not have sufficient attributes to form a primary key is a
A. strong entity set
B. weak entity set
C. simple entity set
D. primary entity set
7) A logical schema
A. is the entire database.
B. is a standard way of organizing information into accessible parts.
C. describes how data is actually stored on disk
D. both A and C
8) Which of the operations constitute a basic set of operations for manipulating relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. None of the above
11) A file manipulation command that extracts some of the records from a file is called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
18) Different values for the same data item is referred to as .......
A. data consistency
B. data inconsistency
C. data integrity
D. data duplication
19) The .......... returns row after combining two tables based on common values.
A. difference
B. product
C. join
D. union
Answers:
1) B. It is the data contained in database that is accurate and consistent.
2) All of the above
3) A. inner join
4) D. Select
5) B. weak entity set
6) A. not Null
7) A. is the entire database.
8) C. Relational algebra
9) Child
10) A. Network Model
11) A. SELECT
12) B. Dashed ellipse
13) D. Combination of projection and Cartesian product
14) D. Diamond
15) D. Triangle
16) B. Self Join
17) D. Data redundancy
18) B. data inconsistency
19) C. join
20) B. database constraints
1) C. Two-phase commit
2) A. Recovery measures
4) C. Security
5) A. disk errors
6) D. Scalability
7) C. system recovery
8) The .......... consists of the various applications and database that play a role in a backup and recovery
strategy.
A. Recovery Manager Environment
B. Recovery Manager Suit
C. Recovery Manager File
D. Recovery Manager Database
9) In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None
9) B. Recovery
10) A ........... is a block of Recovery Manager(RMAN)job commands that is stored in the recovery catalog.
A. recovery procedure
B. recovery block
C. stored block
D. stored script
11) B. records
12) B. registration
14) Most backup and recovery commands in ........... are executed by server sessions.
A. Backup Manager
B. Recovery Manager
C. Backup and Recovery Manager
D. Database Manager
15) ........ systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID
15) D. RAID
16) An ......... is an exact copy of a single data file, archived redo log file, or control file.
A. image copy
B. data file copy
C. copy log
D. control copy
17) .......... known as memory-style error correcting-code(ECC) organization, employs parity bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4
18) The remote backup site is sometimes called the .......... site.
A. primary
B. secondary
C. ternary
D. None of the above
20) The simplest approach to introducing redundancy is to duplicate every disk is called .....
A. mirroring
B. imaging
C. copying
D. All of the above
20) A. mirroring
Related Posts
1) If the transaction is rolled back, all the database changes made inside the transaction are ......
A. made permanent
B. made temporary
C. copied to the log
D. undone
1) D. undone
2) B. Concurrency
4) A. committed
5) ........ means that a transaction must execute exactly once completely or not at all.
A. durability
B. consistency
C. atomicity
D. isolation
5) C. atomicity
6) Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R
A. It will result in a deadlock situation
B. It will immediately be rejected
C. It will immediately be granted
D. It will be granted as soon as it is released by A
7) C. Data consistency
8) c. throughput
11) ........ means that a transaction must make its changes permanent to the database ends.
A. isolation
B. locking
C. durability
D. consistency
11) C. durability
14) The part of a database management system which ensures that the data remains in a consistent
state is
A. authorization and integrity manager
B. buffer manager
C. transaction manager
D. file manager
15) ......... protocol is used to perform multiple transactions that execute on different database.
A. commit
B. two phase lock
C. two phase commit
D. locking
16) A transaction can do read and write operation on a data item when it acquires ......
A. read mode
B. exclusive mode
C. shared mode
D. write mode
20) A transaction can do only read operation and not write operation on a data item when it acquires
....... lock.
A. read mode
B. exclusive mode
C. shared mode
D. write mode
1) In the ............, one transaction inserts a row in the table while the other transaction is half way
through its browsing of table.
A. transaction read problem
B. one way read problem
C. serial read problem
D. phantom read problem
2) Transaction processing is associated with everything below except.
A. producing detail, summery, or exception reports
B. recording a business activity
C. confirming an action or triggering a response
D. maintaining data
6) The node where the distributed transaction originates is called the .......
A. local coordinator
B. starting coordinator
C. global coordinator
D. originating node
7) If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ....... that
row.
A. select
B. update
C. view
D. read
10) If a database server is referenced in a distributed transaction, the value of its commit point strength
determines which role it plays in the .........
A. two phase commit
B. two phase locking
C. transaction locking
D. checkpoints
11) Transaction .......... ensures that the transaction are being executed successfully.
A. concurrency
B. consistency
C. serialisability
D. non serialiasability
12) The situation in which a transaction holds a data item and waits for the release of data item held by
some other transaction, which in turn waits for another transaction, is called .......
A. serialiable schedule
B. process waiting
C. concurrency
D. deadlock
14) The global coordinator forgets about the transaction phase is called .........
A. Prepare phase
B. Commit phase
C. Forget phase
D. Global phase
15) In two phase commit, .......... coordinates the synchronization of the commit or rollback operations.
A. database manager
B. central coordinator
C. participants
D. concurrency control manager
18) After the nodes are prepared, the distributed transaction is said to be ......
A. in-doubt
B. in-prepared
C. prepared transaction
D. in-node
Related Posts
1) A mechanism which ensures that simultaneous execution of more than one transaction does not lead
to any database inconsistencies is called ....... mechanism.
A. transaction control
B. transaction management
C. concurrency parallelism
D. concurrency control
2) The transaction wants only to read the data item of mode is called as .......
A. Exclusive Mode
B. Shared Mode
C. Inclusive Mode
D. Unshared Mode
4) ............ is program or set of program that interacts with the database at some point in its execution.
A. A database system
B. A database application
C. Both
D. none
Get More DBMS MCQs From http://www.siteforinfotech.com/p/dbms-mcq-sets.html
6) The activity of ensuring atomicity in the presence of Transaction aborts is called ..........
A. transaction control
B. transaction management
C. transaction recovery
D. concurrency control
7) A .............is a set of rules that state when a transaction may lock or unlock each of the data items in
the database
A. concurrency control
B. transaction control
C. validation control
D. locking protocol
9) Which protocol permits release of exclusive locks only at the end of transaction?
A. Graph based protocol
B. Strict two phase locking protocol
C. Two phase locking protocol
D. Rigorous Two phase locking protocol
11) Which protocol allows a transaction to lock a new data item only if that transaction has not yet
unlocked data item?
A. Graph based protocol.
B. Strict two phase locking protocol
C. Two phase locking protocol
D. Timestamp ordering scheme
12) .......... is a collection of application programs that interacts with the database along with DBMS.
A. A database system
B. A database application
C. Database administration
D. Data system
13) ........ ensures that once transaction completes successfully, the results of the operations become
permanent.
A. serializability
B. synchronizability
C. atomicity
D. durability
14) A ....... contains information for undoing or redoing all the actions performed by the transactions.
A. savepoint
B. log
C. node
D. commit_point
15) A ............. is a unit of program execution that accesses and possibly updates various data items.
A. DBMS
B. monitor
C. transaction
D. transistor
16) Transaction is an action used to perform some manipulation on data stored in the ........
A. Memory
B. Record
C. Database
D. All of these
18) The two possible communication errors are, Lost messages and .......
A. Network Partitions
B. Lost acknowledgement
C. Timeout
D. log error
19) The only way to undo the effects of a committed transaction is to execute a .......
A. committed transaction
B. compensating transaction
C. supplementary transaction
D. update query
20) In .........., one or more users/programs attempt to access the same data at the same time.
A. concurrency
B. transaction control
C. locking
D. two phase locking
Related Posts
3) For committing a transaction, the DBMS might discard all the records.
A. after image
B. before image
C. log
D. redo log
4) A sophisticated locking mechanism known as 2-phase locking which includes Growing phase and .......
A. Shrinking Phase
B. Release phase
5) A Transaction ends
A. only when it is Committed
B. only when it is Rolled back
C. when it is Committed or Rolled back
D. only when it is initialized
6) In .........., each transaction there is a first phase during which new lock are acquired.
A. Shrinking Phase
B. Release phase
C. Commit phase
D. Growing Phase
8) The transactions are always ......... if it always locks a data item in shared mode before reading it.
A. well formed
B. well distributed
10) If a distributed transactions are well-formed and 2-phasedlocked, then ................ is the correct
locking mechanism in distributed transaction as well as in centralized databases.
A. two phase locking
B. three phase locking
C. transaction locking
D. well-formed locking
11) ......... property will check whether all the operation of a transaction completed or none.
A. Atomicity
B. Consistency
C. Isolation
D. Durability
12) The total ordering of operations across groups ensures ...........of transactions.
A. serializability
B. synchronizability
C. atomicity
13) In which state, the transaction will wait for the final statement has been executed?
A. Active
B. Failed
C. Aborted
D. partially committed
16) The ............is responsible for ensuring correct execution in the presence of failures.
A. Database Manager
B. Transaction Manager
17) A distributed transaction can be ............. if queries are issued at one or more nodes.
A. fully read-only
B. partially read-only
C. fully read-write
D. partially read-write
18) The distributed transaction can be completely read-only and the transaction is started with a ..........
READ ONLY statement.
A. DISTRIBUTED_TRANSACTIONS
B. TRANSACTION
C. SET TRANSACTION
D. READ TRANSACTION
19) The initialization parameter ................. controls the number of possible distributed transactions in
which a given instance can concurrently participate, both as a client and a server.
A. DISTRIBUTED_TRANSACTIONS
B. TRANSACTION
C. SET TRANSACTION
D. CONTROL TRANSACTION
20) A database administrator can manually force the COMMIT or ROLLBACK of a local ............
distributed transaction.
A. in-force
B. in-doubt
C. in-local
D. in-manual
Related Posts
4) The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint
B. Index
C. Integrity constraint
D. Functional dependency
11) If an entity can belong to only one lower level entity then the constraint is
A. disjoint
B. partial
C. overlapping
D. single
15) Which of the following constitutes a basic set of operations for manipulating relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. SQL
20) E-R model uses this symbol to represent weak entity set?
A. Dotted rectangle
B. Diamond
C. Doubly outlined rectangle
D. None of these
Related Posts
2) The keyword to eliminate duplicate rows from the query result in SQL is.
A. DISTINCT
B. NO DUPLICATE
C. UNIQUE
D. None of the above
3) Which of the following aggregate function does not ignore nulls in its results?
A. COUNT
B. COUNT(*)
C. MAX
D. MIN
5) ................ operator is used to compare a value to a list of literals values that have been specified.
A. Like
B. Compare
C. Between
D. In
6) The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. VDL
D. SDL
13) The ............ operator is used to compare the value to a list of literals values that that have been
specified.
A. BETWEEN
B. ANY
C) IN
D) ALL
14) ............ function divides one numeric expression by another and returns the remainder.
A. POWER
B. MOD
C. ROUND
D. REMAINDER
15) A data manipulation command the combines the record from one or more tables is called.
A) SELECT
B. PROJECT
C. JOIN
D. PRODUCT
Related Posts
4) Any SQL statement inside an embedded SQL program must be inside the boundaries of ....
A. EXE SQL and END
B. EXEC SQL and END
C. EXEC and END-EXEC
D. EXEC SQL and END-EXEC
6) ........ accepts multiple rows a SQL query, stores them and hands over them one by one to the 3GL
program.
A. database program
B. database cursor
C. database object
D. database constraints
10) Which of the following operations need the participating relations to be union compatible?
A. UNION
B. INTERSECTION
C. DIFFERENCE
D. All of the above
11) ........ is a virtual table that draws its data from the result of an SQL SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
12) In SQL, which of the following is not a data definition language commands?
A. RENAME
B. REVOKE
C. GRANT
D. UPDATE
13) In SQL, which command(s) is(are) used to change a table's storage characteristics?
14) Which command will delete all data from a table and will not write to the rollback segment?
A. DROP
B. DELETE
C. CASCADE
D. TRUNCATE
18) Which of the following SQL commands can be used to add data to a database table?
A. ADD
B. UPDATE
C. APPEND
D. INSERT
20) .......... provides option for entering SQL queries at execution time, rather than at the development
stage.
A. PL/SQL
B. SQL * Plus
C. SQL
D. Dynamic SQL
Related Posts