MCQs > Admin Support > Database Management MCQs > Basic Database Management MCQs

Basic Database Management MCQ

1. The ____ macro action will move the focus to a specific control.

Answer

Correct Answer: GoToControl

Note: This Question is unanswered, help us to find answer for this one

2. A struct is a(n) ____________________, not a declaration.

Answer

Correct Answer: Definition

Note: This Question is unanswered, help us to find answer for this one

3. ________ problems are encountered when removing data with transitive dependencies.

Answer

Correct Answer: Deletion

Note: This Question is unanswered, help us to find answer for this one

4. ________ tools and techniques process data and do statistical analysis for insight and discovery.

Answer

Correct Answer: Business intelligence

Note: This Question is unanswered, help us to find answer for this one

5. 1nf, 2nf, and 3nf are ____.

Answer

Correct Answer: Normalization stages

Note: This Question is unanswered, help us to find answer for this one

6. A(n) ____ is the equivalent of a field in a file system.

Answer

Correct Answer: Attribute

Note: This Question is unanswered, help us to find answer for this one

7. To normalize a data structure, you apply the ______________________ in sequence.

Answer

Correct Answer: Normal forms

Note: This Question is unanswered, help us to find answer for this one

8. To make changes to existing data in a table, you would use the ____ command.

Answer

Correct Answer: UPDATE

Note: This Question is unanswered, help us to find answer for this one

9. The index key can have multiple attributes, this is called a(n) ____________________ index.

Answer

Correct Answer: Composite

Note: This Question is unanswered, help us to find answer for this one

10. A ________ view is materialized when referenced.

Answer

Correct Answer: Dynamic

Note: This Question is unanswered, help us to find answer for this one

11. The ________ states that no primary key attribute may be null.

Answer

Correct Answer: Entity integrity rule

Note: This Question is unanswered, help us to find answer for this one

12. When a subquery is used, ____ is(are) evaluated first.

Answer

Correct Answer: The subquery query

Note: This Question is unanswered, help us to find answer for this one

13. The field ______ defines the maximum number of characters a field can contain.

Answer

Correct Answer: Size

Note: This Question is unanswered, help us to find answer for this one

14. The catalog is maintained by ____.

Answer

Correct Answer: The DBMS

Note: This Question is unanswered, help us to find answer for this one

15. Only one ____ constraint can exist for each table.

Answer

Correct Answer: PRIMARY KEY

Note: This Question is unanswered, help us to find answer for this one

16. Information in the data dictionary is called: _______________

Answer

Correct Answer: Metadata

Note: This Question is unanswered, help us to find answer for this one

17. In the data hierarchy, the smallest element is the _____.

Answer

Correct Answer: Bit

Note: This Question is unanswered, help us to find answer for this one

18. If b (an attribute) is functionally dependent on a, we can also say that ____.

Answer

Correct Answer: A functionally determines B

Note: This Question is unanswered, help us to find answer for this one

19. Data that are never physically altered once they are added to the store are called ________ data.

Answer

Correct Answer: Periodic

Note: This Question is unanswered, help us to find answer for this one

20. An entity cluster is formed by combining multiple interrelated entities into ____.

Answer

Correct Answer: A single abstract entity object

Note: This Question is unanswered, help us to find answer for this one

21. A star schema contains both fact and ________ tables.

Answer

Correct Answer: Dimension

Note: This Question is unanswered, help us to find answer for this one

22. A ________ is the smallest component in the computer system data hierarchy.

Answer

Correct Answer: Bit

Note: This Question is unanswered, help us to find answer for this one

23. A ____ is a column in a table that describes a characteristic about a record.

Answer

Correct Answer: Field

Note: This Question is unanswered, help us to find answer for this one

24. ________ involves standardizing the format of data retrieved from different systems.

Answer

Correct Answer: Data cleansing

Note: This Question is unanswered, help us to find answer for this one

25. ____ yields better performance.

Answer

Correct Answer: Denormalization

Note: This Question is unanswered, help us to find answer for this one

26.

Consider the schema R = (ABCD) and the functional dependencies A -> B, B -> C, C -> D and D -> A. Let R = (R1 and R2) be a decomposition, such that R1 {'1 R2 = cp. The decomposition is in .

Answer

Correct Answer:

both 2NF and 3NF


Note: This Question is unanswered, help us to find answer for this one

27. The hash address space in static hashing is not always the same.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

28. Concurrency control is used .

Answer

Correct Answer: for preserving the integrity of the database

Note: This Question is unanswered, help us to find answer for this one

29.

Choose the incorrect statements about an object identif‌ier (01D)?

1. The value of an OlD is visible to an external user.

2. It is used by a system to identify Objects uniquely.

3. An OID cannot be assigned to variables in programs.


Answer

Correct Answer:

 Only1 and 2


Note: This Question is unanswered, help us to find answer for this one

30. Which of the following SOL queries will return the details of only those students who are enrolled in the "Cricket" club?

Answer

Correct Answer: SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName lN (SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = 'Cricket‘);

Note: This Question is unanswered, help us to find answer for this one

31. Which type of constraints are expressed by the application programs and not directly expressed in the schemas Of the data model?

Answer

Correct Answer: Semantic constraints

Note: This Question is unanswered, help us to find answer for this one

32.

Examine the below-given SQL statements applied on a table named, Employees and answer the following question.

1. SELECT Iast_name, salary, hire_date FROM EMPLOYEES ORDER BY salary DESC

2. SELECT Iast_name, salary. hire_date FROM EMPLOYEES ORDER BY 2 DESC

Which of the answer options is true?


Answer

Correct Answer:

The two statements produce identical results.


Note: This Question is unanswered, help us to find answer for this one

33.

Which of the following statements will be used to delete all the records from a table named, th?

1. DELETE from tb1;

2. DELETE ‘ from tb1;

3. DELETE tb1;


Answer

Correct Answer:

Only1 and 2 


Note: This Question is unanswered, help us to find answer for this one

34.

Consider a table titled "Employee" having the following attributes:

Employeeld (Primary key)

EmployeeName

Salary

Department

Which of the following correlated SQL queries will return Employeeld. EmployeeName, Salary and Department of all the employees whose salary is more than the average salary of employees in their respective departments?


Answer

Correct Answer:

SELECT Employeeld, EmployeeName, Salary, Department FROM Employee e WHERE Salary >

(SELECT AVG(SaIary) FROM Employee WHERE Department = e.Department);



Note: This Question is unanswered, help us to find answer for this one

35.

In which of the following areas data-mining technology can be applied?

1. Marketing

2. Finance

3. Manufacturing

4. Healthcare


Answer

Correct Answer:

All the given areas 


Note: This Question is unanswered, help us to find answer for this one

36. Consider a table named "Account," having the following fields.

Answer

Correct Answer: address

Note: This Question is unanswered, help us to find answer for this one

37.

A covert channel permits the transfer of information in such a way that it violates the system's security policy.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

38. Which of the following statements is false?

Answer

Correct Answer: In an object database (ODB) design. relationships among records/tuples are def‌ined by attributes with similar values.

Note: This Question is unanswered, help us to find answer for this one

39.

The index in which the search key defines an order that is dissimilar from the sequential order of the file is known as index.


Answer

Correct Answer:

secondary 


Note: This Question is unanswered, help us to find answer for this one

40. A tablespace is divided into .

Answer

Correct Answer: segments

Note: This Question is unanswered, help us to find answer for this one

41.

Which of the following syntaxes are used for inserting data into a table?

(1) INSERT INTO table_name

VALUES (value1,value2, value3,...);

(2) INSERT INTO table_name (columnl. column2. column3,...)

VALUES (valuel. value2. valueB....);

(3) INSERT INTO table_name1 [(column1, column2, column3, .....) ]

SELECT column1.column2.co|umn3.

FROM table_name2 [WHERE condition];


Answer

Correct Answer:

All of them.


Note: This Question is unanswered, help us to find answer for this one

42. Which of the following statements about a distributed database is false?

Answer

Correct Answer: No additional software is required to implement the distributed database.

Note: This Question is unanswered, help us to find answer for this one

43. Object Query Language (OOL) is based on which of the following data models?

Answer

Correct Answer: ODMG

Note: This Question is unanswered, help us to find answer for this one

44. Which of the following levels of the data-storage virtualization technology involves bit-level striping with dedicated Hamming-code parity?

Answer

Correct Answer: RAID 2

Note: This Question is unanswered, help us to find answer for this one

45. In a database, transactions follow ACID properties. Which of the following are these properties?

Answer

Correct Answer: Atomicity, Consistency, Isolation. Durability

Note: This Question is unanswered, help us to find answer for this one

46. Which of the following statements correctly describes a transitive dependency?

Answer

Correct Answer: A dependency in which the value of a non-key column is dependent on the value of another non-key column.

Note: This Question is unanswered, help us to find answer for this one

47. Which of the following RAID levels is widely used to store log f‌iles in a database system?

Answer

Correct Answer: RAID 1

Note: This Question is unanswered, help us to find answer for this one

48.

Data dictionary can be used for which of the following options?

1. For f‌inding the location of the data.

2. For f‌inding the size of the storage disk.

3. For finding the owner of the data.


Answer

Correct Answer:

Only1 and 3


Note: This Question is unanswered, help us to find answer for this one

49. An ODMG object model cannot use exceptions for reporting errors.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one