0% found this document useful (0 votes)
408 views

Database Management Systems

The document discusses key concepts related to databases and database management systems (DBMS). It covers topics such as data, databases, database schemas, database management systems, data definition languages, data manipulation languages, database administrators, database users, database architecture, data storage, data independence, database queries, and more. The document provides 70 multiple choice questions to test understanding of database terminology and concepts.

Uploaded by

shreeya Patil
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
408 views

Database Management Systems

The document discusses key concepts related to databases and database management systems (DBMS). It covers topics such as data, databases, database schemas, database management systems, data definition languages, data manipulation languages, database administrators, database users, database architecture, data storage, data independence, database queries, and more. The document provides 70 multiple choice questions to test understanding of database terminology and concepts.

Uploaded by

shreeya Patil
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 19

1. ______ is a collection of facts, such as values or measurements.

A. Data
B. information
C. things
D. items
ANSWER: A

2. A______ is a collection of related files that are usually integrated, linked or


cross-referenced to one another.
A. data
B. information
C. database
D. data field
ANSWER: C

3. A _________ is a set of software programs that allows users to create, edit and
update data in database files, and store and retrieve data from those database
files.
A. data base
B. data management system
C. database management system
D. office management system
ANSWER: C

4. In computer science, data that has several parts can be divided


into____________.
A. data
B. record
C. table
D. record
ANSWER: D

5. A ________is a way of organizing information on a computer, implemented by a set


of computer programs.
A. organized system
B. data system
C. database system
D. management system
ANSWER: C

6. DBMS stands for:


A. Database associated
B. Database administrator
C. Database application
D. Database management system
ANSWER: D

7. A database is a complex ______:


A. Data structure
B. Memory
C. Both
D. None
ANSWER: A

8. DBMS is to impose a logical and structured organization on:


A. Register
B. Data
C. Memory
D. None
ANSWER: B

9. ______is a collection of programs performing all necessary action associated


with a database.
A. Database associated
B. Database administrator
C. Database application
D. Database management system
ANSWER: D

10. ________is a collection of application programs that interacts with the


database along with DBMS.
A. A database system
B. A database application
C. Database administration
D. Data system
ANSWER: A

11. A _____view of data expresses the way a user thinks about data
A. Logical view
B. Physical view
C. Both
D. None
ANSWER: A

12. A physical view of data refers to the way data is handled at a_____ its storage
and retrieval.
A. High level
B. Low level
C. Medium level
D. All of these
ANSWER: B

13. The overall description of a database is called______


A. Data definition
B. Data manipulation
C. Data integrity
D. Database schema
ANSWER: D

14. DDL stand for:


A. Data definition language
B. Data description languages
C. Data design languages
D. Database dictionary languages
ANSWER: A

15. The DDL is used to specify the_____:


A. Conceptual schemas
B. Internal schemas
C. Both
D. None
ANSWER: A

16. The SDL is used to specify the_______:


A. Conceptual schemas
B. Internal schemas
C. Both
D. None
ANSWER: B

17. DML stands for:


A. Data description languages
B. Data design languages
C. Database dictionary languages
D. Data manipulation languages
ANSWER: D

18. Which is used for data retrieval from the database?


A. DDL
B. DML
C. SDL
D. VDL
ANSWER: B

19. What are the types of DML?


A. Low Level
B. High Level
C. Conceptual Level
D. All of these
ANSWER: D

20. Which is requires a user to specify what data is needed and how to get it?
A. Low Level
B. Procedural DML
C. Both
D. None
ANSWER: C

21. The programming languages is called:


A. Sublanguages
B. Host laguages
C. VDDL
D. DDL
ANSWER: B

22. How many levels of abstraction in DBMS?


A. 2
B. 3
C. 4
D. 5
ANSWER: B

23. Which are the types of data independence?


A. Physical
B. Logical
C. Both
D. None of these
ANSWER: C

24. Which are the types of physical DBMS architecture can be split ?
A. Back end
B. Front end
C. both
D. None
ANSWER: C

25. Data are stored in________ as database.


A. Data files
B. Data dictionary
C. Database
D. Data administrator
ANSWER: A

26. Minimal data redundancy means improved _________.


A. Data independence
B. Data consistency
C. Data integration
D. Data sharing
ANSWER: B

27. Who access the database occasionally and have different needs each time?
A. Native users
B. Casual users
C. Sophisticated users
D. All of these
ANSWER: B

28. Who interact with the system without writing a program?


A. Native users
B. Casual users
C. Sophisticated users
D. All of these
ANSWER: C

29. Who interact with the system by invoking one of the permanent application
program?
A. Native users
B. Casual users
C. Sophisticated users
D. All of these
ANSWER: A

30. The main interface that a native user uses is a form interface using___:
A. DDL
B. GUI
C. OLAP
D. DML
ANSWER: B

31. ____ is a translates into low-level instruction that a query processor


understands.
A. DBA
B. DBMS
C. DBS
D. DDL
ANSWER: D

32. Retrieval of data is done by using a ____.


A. Stack
B. Query
C. Linked list
D. All of these
ANSWER: B

33. DML is a languages by which user accesses or manipulates the ________.


A. Data model
B. Data consistency
C. Data integration
D. Data sharing
ANSWER: A

34. Which is the central component of the DBMS software that can also be termed as
the database control system?
A. Data consistency
B. Data integration
C. Data sharing
D. Data manager
ANSWER: D

35. Which is stored information about description of data in the database?


A. Data files
B. Data dictionary
C. Database
D. Database administrator
ANSWER: B

36. After conversion of high level queries into low level commands for file access
and is called compiled_____.
A. DDL
B. DML
C. SDL
D. VDL
ANSWER: B

37. Which is installs, configures, troubleshoots and maintains a database system?


A. DBA
B. DDL
C. DML
D. SDL
ANSWER: A

38. SQL stands for:


A. System query language
B. Structured query language
C. Sets query languages
D. None of these
ANSWER: B

39. _______ level describe a part of database


A. physical
B. logical
C. view
D. abstraction
ANSWER: C

40. PDF stands for:


A. Physical data format
B. Portable document format
C. Physical document format
D. Portable data format
ANSWER: B

41. XML stands for:


A. Xtensible markup languages
B. Xtensible memory languages
C. Both
D. None
ANSWER: A

42. BLOB stands for:


A. Binary languages Objects
B. Bit large Objects
C. Binary low objects
D. Binary large objects
ANSWER: D

43. Which is refers to the collection of related data values or items called
fields?
A. Record
B. Record blocking
C. Fixed-length record
D. Variable-length record
ANSWER: A

44. _________ is the records in the file are of different sizes.


A. Record blocking
B. Fixed-length record
C. Variable-length record
D. None of these
ANSWER: C

45. _____is a collection of all occurrences of similar types of records.


A. Data
B. Data item
C. File
D. All of these
ANSWER: C

46. Which contain information about a file needed by system programs for accessing
file records?
A. File blocks
B. File operations
C. File headers
D. None of these
ANSWER: C

47. _____ take into account only such records that are valid.
A. Algorithm
B. Searching algorithm
C. Flow chart
D. All of these
ANSWER: B

48. ______ is vital for ensuring the most efficient access of files and records.
A. File blocks
B. File operations
C. File headers
D. File organization
ANSWER: D

49. The field which is used to order the file is referred to as ________.
A. Sorted field
B. Ordering field
C. Both
D. None
ANSWER: B

50. ______ is another name given to data integration when use in the management
context.
A. EII
B. IEI
C. GUI
D. SUI
ANSWER: A

51. Transaction properties are


A. commit
B. Rollback
C. ACID
D. none
ANSWER: C

52. Which are the accepted ways for modeling such correspondence?
A. LAV
B. GAV
C. Both
D. None
ANSWER: C

53. CDI stands for:


A. Computer data input
B. Code data input
C. Computer data integration
D. Computer data information
ANSWER: C

54. How many structure used in ontology based on data integration application are
explained?
A. 1
B. 2
C. 3
D. 4
ANSWER: C

55. ______ is the commercial application of data integration.


A. EII
B. IEI
C. GUI
D. SUI
ANSWER: A

56. In computer science, __________ is logical connection between two entities.


A. mapping
B. network
C. wireless
D. wire
ANSWER: A

57. In SQL, the command(s) is (are) used to create an index for a table or cluster
A. CREATE INDEX
B. SET INDEX TO FILE
C. MODIFY INDEX
D. All of the above
ANSWER: A

58. Information can be transferred between the DBMS and a


A. spreadsheet program
B. word processor program
C. graphics program
D. all of the above
ANSWER: D

59. In SQL, which command(s) is(are) used to recompile a stored function?


A. SET FUNCTION
B. SET STORED FUNCTION
C. ALTER FUNCTION
D. All of the above
ANSWER: C

60. Administrate supervision of database activities is the responsibility of the


A. Database administrator
B. DP Manager
C. DB Manager
D. DP administration
ANSWER: A

61. In SQL, which of the following is not a data definition language commands?
A. RENAME
B. REVOKE
C. GRANT
D. UPDATE
ANSWER: D

62. Data encryption techniques are particularly useful for


A. reducing storage space requirements
B. improving data integrity
C. protecting data in data communication systems
D. All of the above
ANSWER: C

63. A logical schema


A. is the entire database
B. is a standard way of organizing information into accessible parts
C. describes how data is actually stored on disk
D. All of the above
ANSWER: B

64. Queries to a database


A. are written in English
B. can use aggregate functions like SUM and COUNT
C. both (a) and (b)
D. All of the above
ANSWER: B

65. A field used to identify a record is called as a ____________.


A. key
B. column
C. pointer
D. index
ANSWER: A

66. A field that can identify a record uniquely is called as _________ of the
record.
A. foreign key
B. super key
C. primary key
D. candidate key
ANSWER: C

67. ______________ means multiple copies of the same data items.


A. Data reduction
B. Data integrity
C. Data consistency
D. Data redundancy
ANSWER: D

68. The most important change brought about by DBMS is that the ___________.
A. programs interact with the data files directly
B. programs no longer interact with the data files directly
C. programs interact with the data files indirectly
D. program interact with the master files
ANSWER: B

69. The __________ knows the details of the data storage.


A. decision support system analyst.
B. database administrator
C. database manger
D. transaction manger
ANSWER: B

70. _____________ is the language for working with RDBMS.


A. Embedded SQL
B. Dynamic SQL
C. Structured QL
D. Static SQL
ANSWER: C

71. The ___________ is a logical unit of work.


A. query
B. transaction
C. database
D. statement
ANSWER: B

72. In _____________, one or more users/programs attempt to access the same data at
the same time.
A. concurrency.
B. transaction control.
C. locking
D. two phase locking
ANSWER: A

73. The _______________ employs parent-child relationships as well as child parent


relationships.
A. hierarchical databases
B. network databases.
C. relation databases
D. databases
ANSWER: B

74. Relational databases relate data items purely based on their _________.
A. key
B. value
C. constraints
D. concurrency
ANSWER: B

75. The file in DBMS is called as _________ in RDBMS.


A. console
B. schema.
C. table.
D. objects.
ANSWER: C

76. The ______________ is used for creating and destroying tables, indexes and
other forms of structures.
A. data manipulation language.
B. data control language.
C. transaction control language.
D. data definition language.
ANSWER: D

77. ___________ can be used to retrieve data from multiple tables.


A. Embedded SQL
B. Dynamic SQL
C. Joins
D. Views
ANSWER: C

78. The _____________ of a database presents the view that the end users have.
A. conceptual view
B. external view
C. internal view
D. non conceptual view
ANSWER: B

79. Internal view provides information regarding the _______________.


A. dataqbase
B. organization of the database.
C. data without technology
D. data with integrity
ANSWER: B

80. The ______________ describes the data without stress on any technology or
programming language.
A. external view
B. internal view
C. conceptual view
D. view
ANSWER: C

81. Commit and rollback are related to ______________.


A. data integrity
B. data consistency
C. data sharing
D. data security
ANSWER: B

82. Data is processed using _____________.


A. data definition language
B. data manipulation language
C. data control language
D. transaction control language
ANSWER: B

83. In ___________, we have a strict parent-child relationship only.


A. hierarchical databases
B. network databases
C. object oriented databases
D. relational databases
ANSWER: A

84. The __________ feature of DBMS frees the users and programmers from the
responsibility of knowing the physical details of data.
A. logical view
B. . physical view
C. data independence
D. data dependency
ANSWER: C

85. Old applications can use old or new data. New applications can use old or new
data. This feature is called as ______________.
A. data redundancy
B. data sharing
C. data consistency
D. transaction
ANSWER: B

86. The ____________ refers to the way data is organized in and accessible from
DBMS.
A. database hierarchy
B. data organization
C. data sharing
D. data model
ANSWER: D

87. _____________ introduced the relational databases


A. Atul Kahate.
B. James Gossling.
C. EF Codd.
D. Dennies Rithchie.
ANSWER: C

88. The different classes of relations created by the technique for preventing
modification anomalies are called-------------------.
A. normal forms
B. referential integrity constraints
C. functional dependencies
D. transient dependencies.
ANSWER: A

89. Row is synonymous with the term------------------.


A. record.
B. relation
C. column
D. field
ANSWER: A

90. The primary key is selected from ---------------------------.


A. composite keys
B. determinants
C. candidate keys.
D. foreign key.
ANSWER: C

91. Which of the following is a group of one or more attributes that uniquely
identifies a row?
A. key
B. determinant.
C. tuple
D. relation
ANSWER: A

92. A relation is considered as ------------------------.


A. column
B. one-dimensional table
C. two-dimensional table
D. three-dimensional table
ANSWER: C

93. In the relational model, relationships between relations or tables are created
by using-------------.
A. composite keys.
B. determinants.
C. candidate keys
D. foreign keys.
ANSWER: D

94. A functional dependency is a relationship between or among--------------.


A. tables
B. relations
C. rows
D. attributes
ANSWER: D

95. An attribute is a(n)---------------------.


A. column of a table
B. two-dimensional table.
C. row of a table.
D. key of a table
ANSWER: A

96. If attribute A determines both attributes B and C, then it is also true


that------.
A. A → B
B. B → A
C. C → A
D. (B,C) → A
ANSWER: A

97. What is a trigger?


A. a piece of logic written in PL/SQL
B. executed at the arrival of a SQL*FORMS event.
C. logic written in PL/SQL and executed with SQL * FORMS event.
D. executed as a program
ANSWER: C

98. ------------ is a predicate expressing a condition that the database should


always satisfy.
A. trigger
B. referential integrity.
C. relationship.
D. assertion
ANSWER: D

99. ------------- is a statement that is executed automatically by the system.


A. trigger.
B. assertion.
C. durability.
D. integrity constraint.
ANSWER: A

100. ------------- are constraints on the set of legal relations.


A. domain dependency.
B. functional dependency.
C. canonical cover.
D. decomposition.
ANSWER: B

101. ---------------------is used to determine the value assigned to a bucket.


A. threshold.
B. hash function.
C. indexes.
D. ordered list.
ANSWER: B

102. ------------an index record appears for every search key value in the file.
A. sparse index.
B. tree.
C. dense index.
D. forest.
ANSWER: C

103. Indices with two or more levels are called--------------.


A. multiple indices.
B. single indices
C. hierarchical indices
D. multilevel indices
ANSWER: D

104. ------------ organizes the search keys with their associated pointers.
A. tree
B. nodes
C. buckets.
D. hash index
ANSWER: D

105. A Transaction ends


A. only when it is Committed.
B. only when it is Rolledback
C. when it is Committed or Rolledback
D. only when it is initialized
ANSWER: C

106. _______ keyword is used to eliminate the duplicates.


A. distinct
B. unique
C. union
D. intersect
ANSWER: A

107. _____________ is a query that has another query embedded within it.
A. sub query
B. structured query
C. nested query
D. sequence query
ANSWER: C

108. ____________ keyword is used to find the number of values in a column.


A. TOTAL
B. COUNT
C. ADD
D. SUM
ANSWER: B

109. Which of the following is not an aggregate operator?


A. MAX
B. MIN.
C. TOTAL.
D. AVG.
ANSWER: C

110. Which of the following is not an RDBMS?


A. Ms. Access.
B. Oracle 8i.
C. Ms Sql Server.
D. Informix.
ANSWER: A

111. _____________ command can be used to modify a column in a table.


A. alter
B. update
C. set
D. create
ANSWER: A

112. In SQL, which command(s) is(are) used to change a table's storage


characteristics?
A. ALTER TABLE
B. MODIFY TABLE
C. CHANGE TABLE
D. All of the above
ANSWER: A

113. In SQL, which of the following is not a data definition language commands?
A. RENAME
B. REVOKE
C. GRANT
D. UPDATE
ANSWER: D

114. In SQL, which command is used to select only one copy of each set of duplicate
rows
A. SELECT DISTINCT
B. SELECT UNIQUE
C. SELECT DIFFERENT
D. All of the above
ANSWER: A

115. Which command is used to select distinct subject (SUB) from the table (BOOK)?
A. SELECT ALL FROM BOOK
B. SELECT DISTINCT SUB FROM BOOK
C. SELECT SUB FROM BOOK
D. All of the above
ANSWER: B

116. ODBC stands for


A. Object Database Connectivity.
B. Oral Database Connectivity.
C. Oracle Database Connectivity.
D. Open Database Connectivity
ANSWER: D

117. In the architecture of a database system external level is the


A. Physical level
B. Logical level
C. Conceptual level
D. View level
ANSWER: D

118. In an E-R diagram attributes are represented by


A. rectangle
B. Square
C. Ellipse
D. Triangle
ANSWER: C

119. A logical schema


A. Is the entire database
B. Is a standard way of organizing information into accessible parts?
C. Describes how data is actually stored on disk
D. Both (A) and (C)
ANSWER: A

120. The database environment has all of the following components except:
A. Users
B. Separate files
C. Database
D. Database administrator
ANSWER: A

121. In an E-R diagram an entity set is represent by a


A. Rectangle
B. Ellipse
C. Diamond box
D. Circle.
ANSWER: A

122. Which one of the following statements is false?


A. The data dictionary is normally maintained by the database administrator
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
ANSWER: B
123. A DBMS query language is designed to
A. Support end users who use English-like commands.
B. Support in the development of complex applications software.
C. Specify the structure of a database.
D. all of the above.
ANSWER: D

124. The statement in SQL which allows to change the definition of a table is
A. Alter
B. Update
C. Create
D. Select
ANSWER: A

125. Relational Algebra is


A. Data Definition Language
B. Meta Language
C. Procedural query Language
D. None of the above
ANSWER: C

126. Which of the following are the properties of entities?


A. Groups
B. Table
C. Attributes
D. Switchboards
ANSWER: C

127. Which of the following is a valid SQL type?


A. CHARACTER
B. NUMERIC
C. FLOAT
D. All of the above
ANSWER: D

128. Which of the following is an advantage of view?


A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
ANSWER: D

129. Which database level is closest to the users?


A. External
B. Internal
C. Physical
D. Conceptual
ANSWER: A

130. A set of possible data values is called


A. Attribute
B. Degree
C. Tuple
D. Domain
ANSWER: D

131. Which of the following is another name for weak entity?


A. Child
B. Owner
C. Dominant
D. All of the above
ANSWER: A

132. A data dictionary is a special file that contains:


A. The name of all fields in all files.
B. The width of all fields in all files.
C. The data type of all fields in all files.
D. All of the above.
ANSWER: D

133. _________ data type can store unstructured data


A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
ANSWER: A

134. ___________ helps solve concurrency problem.


A. locking
B. transaction monitor
C. transaction serializability
D. two phase commit
ANSWER: A

135. A transaction processing system is also called as ____________.


A. processing monitor
B. transaction monitor
C. TP monitor
D. monitor
ANSWER: C

136. The dirty read problem is also called ______________.


A. committed dependency problem
B. dependency problem
C. uncommitted dependency problem
D. rolledback dependency problem
ANSWER: C

137. The non-repeatable read problem is also called as ______________.


A. inconsistent analysis problem
B. consistent analysis problem
C. consistency read problem
D. transaction read problem
ANSWER: A

138. Any execution of a set of transactions is called as its__________.


A. non-serial schedule
B. serial schedule
C. schedule
D. interleaved schedule
ANSWER: C

139. All or none operations is also called as ____________.


A. performance
B. serializability
C. durability
D. atomicity
ANSWER: D
140. External level of DBMS is also called as _____________.
A. logical view
B. community user view
C. physical view
D. conceptual view
ANSWER: B

141. A table in RDMS is also called as ______________.


A. tuple
B. domain.
C. relation
D. projection
ANSWER: C

142. A _____________ in a RDBMS is called as tuple.


A. column
B. row
C. table
D. user
ANSWER: B

143. Attribute constraints specify _______.


A. a column is of specified type
B. instance of condition
C. two or more instance constraints
D. identification of records
ANSWER: A

144. A ________ is a set of column that identifies every row in a table.


A. composite key
B. candidate key
C. foreign key
D. super key
ANSWER: D

145. Composite key is made up of ___________.


A. one column
B. one super key
C. one foreign key
D. two or more columns
ANSWER: D

146. The _______ relationships allows two or more tables to be related to each
other.
A. alternate key
B. secondary key
C. foreign key
D. entity integrity
ANSWER: C

147. The ________ is a logical table derived from other tables.


A. view
B. database
C. cursor
D. derived table
ANSWER: A

148. The number of rows in a table is called as its ______.


A. uniqueness
B. dimension
C. degree
D. cardinality
ANSWER: C

149. The number of columns in a table is its _____.


A. degree
B. cardinality
C. relation
D. tuple
ANSWER: B

150. What command is used to get back the privileges offered by the GRANT command?
A. Grant
B. Revoke
C. Execute
D. Run
ANSWER: B

You might also like