Cs403 Solved Mcqs Final Term by Junaid
Cs403 Solved Mcqs Final Term by Junaid
CS403-Database GROUP
Management System
Solved MCQS for Final terms papers
Solved by JUNAID MALIK and Team
AL-JUNAID INSTITUTE GROUP
a. Memory buffer
b. EPROM
c. ROM
d. Hard disk
3. Browser Based & Non-Browser/Simple are two different types of .a.
Forms
b. Language
c. Interface
d. Programs
4. Which of the following is incorrect about alter table statement?
a. Cannot be used to modify type or size of an existing column
b. Can be used to delete a column
c. Cannot be used to create a new table
d. Can be used to add column in the existing table
5. What does the abbreviation DBMS stand for?
a. Database management software
b. Data borrowing and movement software
c. Digital base mapping system d.
Database management system
6. Suppose we have two tables T1 and T2, Tuples of T1 that do not match some row in T2
will not appear in
a. Outer joinb.
Inner join
c. Both I and II
d. None of the above
7. Value of a function in SQL is always determined by the input parameters a.
True
b. False
AL-JUNAID INSTITUTE GROUP
8. Which of the following is true about creating database in MS Access?
a. First we will run MS Access and select New option from the file. Next it will askthe
name of database.
b. After running MS Access, create database option is selected directly
c. Go to the tool option of MS Access and select create Database option with
suitable name
d. Click on the file menu, select database option and then click it
9. In SQL queries, while creating tables or relations in database, key columns may be
specified by
a. Null
b. Not Null
c. Data Type
d. None of the above
10. In SQl, which command is used to modify the rows of tables.a.
UPDATE
b. INSERT
c. BROWSE
d. APPEND
11. Which of the following is one of the purposes of using DDL commands?
a. Inserting records into databases
b. Updating records into databases
c. Manipulating databases
d. Creating and destroying databases
12. The should be user friendly. Data integrity must be ensured and checks can be
applied within the tables.
a. Input forms
b. Computer language
c. Application programming
d. Database
13. A memory cache, sometimes called a cache store or .
a. ROM
b. DROMc.
RAM
d. Hard disk
14. According to his/her level of knowledge/understanding, how many types of users are there
?
a. Three
b. Four
c. Six d.
Two
AL-JUNAID INSTITUTE GROUP
15. DML does not used to:
a. Add new rows to tables
b. Retrieve rows from table
c. Modify the rows of tablesd.
Alter a table definition
16. Which of the following prevents duplicate values to be displayed as a result of an SQL
statement?
a. DISTINCT
b. DELETE
c. UPDATE
d. ALTER
17. GRANT belongs to which type of SQL commands classification
a. DML
b. DDLc.
DCL
d. DQL
18. user interface is preferred over _ user interface with respect to user.
a. Easy to understand, efficient
b. Hard to understand, efficientc.
Easy to understand, effective
d. Hard to understand, effective
19. Which of the following is not true regarding clustering?
a. It increases the efficiency since related records are placed close to each other
b. Clustering makes records, difficult to access
c. Suitable to relatively static situations
d. It is a process, which means to place records from different tables to place in
adjacent physical locations
20. The condition allows to retrieve values within a specific range.
a. AND
b. LIKE
c. BETWEEN
d. FROM
21. WORM Stands for .
a. Write on. Read memoryb.
Write-once, read-many
c. Write only memory
d. Read only memory
AL-JUNAID INSTITUTE GROUP
22. Identify the language which is used to specify database schema.
a. DCL
b. DMLc.
DDL
d. None of the above
23. At which design level de-normalization will take place.
a. Conceptual design
b. Logical design c.
Physical design
d. All of the above
24. The keyword is used in SELECT statement to return different values.
a. LIKE
b. IN
c. DISTINCT
d. WHERE
25. “It should be user friendly and user must not search for required buttons or text boxes”
this statement is about .
a. Application program b.
User friendly interface
c. Language
d. System program
26. Which of the flowing clauses allows to sort the records in result set?
a. Where
b. Order By
c. From
d. Having
27. Data manipulation language (DML) is the set of commands used to maintain and query a
database including updating, inserting, modifying and retrieving data.
a. True
b. False
28. The function helps reduce the need to use multiple OR conditions.
a. Likeb.
IN
c. AND
d. BETWEEN
29. Correct statement for creating table in Microsoft SQL server is:a.
CREATE TABLE Customer
(SID integer PRIMARY KEY,
Last_Name varchar(30),
b. CREATE TABLE Customer(SID
AL-JUNAID INSTITUTE GROUP
integer,
Last_Name varchar(30),
► Data processing
► Authorization service
► The results of using a view are not permanently stored in the database Google
► Activates Triggers.
► is DML Command.
78. Which of the following is the correct way to find out the size of cartesian product incase of
CROSS JOIN?
► the number of columns in the first table multiplied by the number of columns in the second table.
► the number of columns in the first table multiplied by the number of rows in the second table.
► the number of rows in the first table multiplied by the number of columns in the first table.
► the number of rows in the first table multiplied by the number of rows in the second table. Google
79. Suppose there are 8 rows and 4 columns in TABLE1 and 3 rows and 4 columns in TABLE2; what
is the size of the cartesian product incase of CROSS JOIN between these two tables?
► 24 Google
► 32
► 12
► 16
► atomicity
► consistency
► durability
► It is not possible to left out the data which is not required for a specific view. (Page 280)
► A database view displays one or more database records on the same page.
► Views are generally used to focus the perception each user has of the database.
AL-JUNAID INSTITUTE GROUP
81. Each course section is assigned a particular faculty member, and each course section
corresponds to a particular course. Conceptually, what is the relationship between faculty and
course (not course section).
► 1:1
► 1:M
► M:M Conceptual
► Ternary
82. Which of the following is used to add or drop columns in an existing table?
► HAVING
► SELECT
► THEN
83. Which of the following is a correct way of selecting all the columns from a table called
PERSONS?
► Track overflows and file overflow areas can not be ensured. (Page 264)
85. Consider the given relations Student and Instructor as given below. Please note that Fname and
Lname also denote the First Name and Last Name respectively. Which of the following
statements is correct with respect to the two relations given above?
► The two relations are not union-compatible since their attribute names differ. (Page 152)
► The two relations are union-compatible since they have the same type of tuples.
AL-JUNAID INSTITUTE GROUP
► The set operations such as CARTESIAN PRODUCT and DIVISION can be pplied on these two relations.
► To find out the students who are not instructors, it is necessary to perform the operation Student ÷
Instructor.
86. Which of the following serves as a milestone or reference point in the log file?
► Constraints
► Relations
87. Which of the following are the general activities, which are performed during the development
of application programs?
► Editing
► Display
88. Browser based forms are developed in the following tools EXCEPT
► HTML
► Scripting language
► Front Page
► CD ROM
► WORM
► Erasable Optical
► Frequently updating
AL-JUNAID INSTITUTE GROUP
► Relatively static (Page 192)
► Relatively deletion
► Relatively dynamic
91. Only one type of constraint can be enforced in any table by CREATE command
► True
► Fast re-hashing
92. Consider the following relation R and its sample data. (Consider that these are the only tuples
for the given relation) Which of the following statements is NOT correct?
► The functional dependency (EmpNo, ProjNo) -> DeptNo holds over R. conceptual
► a coherent set of similar objects that we want to store data on (e.g. STUDENT, COURSE, CAR) Google
► hyperlink
► primary key
► superkey
AL-JUNAID INSTITUTE GROUP
95. You can’t modify more than one table at a time through a view.
► True Google
► False
96. Which of the following is one of the purposes of using DML commands?
► Creating databases
► Destroying databases
► Index
► Metadata
► Data
98. IN function helps reduce the need to use multiple AND conditions.
► True
► false conceptual
► De-normalization is a technique to move from lower to higher normal forms of database modeling
(Page 187)
100. Which of the following gives all the fields from employee table named as EMP?
101. Which of the following types of partitioning reduces the chances of unbalanced
partitions?
► Vertical
► List
► Range
102. While recovering data, which of the following files does a recovery manager examines at
first?
► A system file
► Data dictionary
► Metadata
► True
► False conceptual
105. Which of the following is NOT a component of a DFD? Select correct option:
► Dataflow
► Datastore
AL-JUNAID INSTITUTE GROUP
► External entities
106. Laser records data by burning microscopic holes in the surface of the disk with a
► Hard disk
► RAM
► Floppy disk
► Consistency
► Process based
► User friendly
109. Making a change to the conceptual schema of a database but not affecting the existing
external schemas is an example of
► Concurrency control
► Functional dependency
► Grant permission to Amali,only to retrieve data from Employee table and grant permission to Hiruni,
only to update the designation from Employee table.
AL-JUNAID INSTITUTE GROUP
► Grant permission to Hiruni in order to grant, select and update permission to Amali.
► Grant permission to Amali & Hiruni to update designation of employees in the Employee table
► Grant permission to Amali and Hiruni to update all data except designation in Employee table Click
here for detail
► Check
► Set Default
► Unique
► 2
► 3
► 5
► 1 (Page 275)
► is DDL Command.
► A denormalized data model is not the same as a data model that has not been normalized
117. Which of the following is incorrect with respect to indexed sequential files?
► Record in main file that precedes it is updated to contain a pointer to the new record
► The overflow is merged with the main file during a batch update
► Multiple indexes for the same key field cannot be setup (Page 264)
► creating databases
► destroying databases
► creating DB objects
► A logical record is concerned with efficient storage of information in the secondary storage devices.
Google
► Some physical organisations use pointers to record blocks to locate records on disk.
► The efficiency of a file system depends on how efficiently operations such as retrieve, insert, update,
delete may be performed on the information stored in the file.
121. Select the correct statement among the following on proper naming of schema
constructs:
► Entity type name applies to all the entities belonging to that entity type and therefore a plural name is
selected for entity type.
► In the narrative description of the database requirements, verbs tend to indicate the names of
relationship types. Google
► The nouns arising from a database requirement description can be considered as names of attributes.
► Additional nouns which are appearing in the narrative description of the database requirements
represent the weak entity type names.
► whether the existence of an entity depends on it being related to another entity via the relationship
type.
► the role that a participating entity from the entity type plays in each relationship instance.
► the constraints applicable in granting access to tables, columns and views in a database schema.
► When entity integrity rules are enforced, a tuple in one relation that refers to another relation must
refer to an existing tuple.
► ROM
► PROM
► Hard disk
126. _______ records data by burning microscopic holes in the surface of the disk with a laser.
► Hard disk
► RAM
► Floppy disk
128. Which of the following will be deleted relating to a table if you use TRUNCATE command?
AL-JUNAID INSTITUTE GROUP
► all rows in a table (Page 207) rep
► indexes
► constraints
130. What is the maximum limit of keys in context with Indexed sequential files?
► 7
► 1
► 235
131. Which of the given techniques is/are used to improve query performance in database?
132. _______ is a control that users click to perform an action, set or toggle a state, or set an
option.
► Text box
► Input form
AL-JUNAID INSTITUTE GROUP
► Report Google
133. _______is a control that enables users to select one option from an associated list; users
can also type an option.
► Button
► Text box
► Static area
► Hash partitioning
► List partitioning
► Vertical partitioning
135. ALTER TABLE exams ALTER COLUMN Q_description varchar(50) Syntax of ALTER TABLE is
NOT correct.
► True
► Data warehousing
► Decision support
► Mobile computing
► Database
► Data model
AL-JUNAID INSTITUTE GROUP
► Data
138. A superkey that does not contain a subset of attributes that is itself a superkey is called a
____.
► primary key
► superkey
► secondary key
139. A ____ relationship exists when an association is maintained within a single entity.
► ternary
► binary
► weak
140. Which of the following is NOT one of the ways of resolving deadlocks?
► Undoing all the updates made by the particular transaction which is the cause of deadlock.
► A message is passed to the victim and depending on the system the transaction may or may not be
started again automatically.
► Picking a list of all previously completed transactions and undoing all the updates. (Page 323)
141. Which of the following statements are Data Definition Language command?
► INSERT
► UPDATE
► GRANT Google
► TRUNCATE
► 2
► 3
► 5
AL-JUNAID INSTITUTE GROUP
► 1 (Page 275) rep
143. Suppose there are 4 rows and 3 columns in TABLE1 and 6 rows and 5 columns in TABLE2;
what is the size of the Cartesian product incase of CROSS JOIN between these two tables?
► 20
► 18
► 15
145. Which of the following is one of the purposes of using DDL commands?
► manipulating databases
► CREATE DB company
► It decreases efficiency
148. Consider a transaction which includes following operations Z= Z + 10 Write Z ... Suppose
that the value of Z after addition and the execution of this operation is 17. Now against the
write operation the entry made in the log file will be What does Z reflects in the above entry?
► Object value
► A set of database operations that are processed partly (Page 291) rep
► Especially useful when the person entering the data is not familiar with the inner workings
► One input forms can populate one table at a time (Page 246)
► RAM Google
AL-JUNAID INSTITUTE GROUP
► ROM
► Flash memory
► CPU26
152. Which of following is NOT generally the aim of data partitioning and placement of data?
► Reduce Workload
► Balance Workload
153. Which of the following is Advantage of Re-Hashing technique to handle the collisions?
154. Materialized views and Indexes are NOT similar by the following way(s).
► They must be refreshed when the data in their master tables changes.
155. Select 'NORTH', CUSTOMER From CUST_DTLS Where REGION = 'N' Order By CUSTOMER
Union Select 'EAST', CUSTOMER From CUST_DTLS Where REGION = 'E' Order By CUSTOMER The
above statement:
► Database
► Data model
► Data
157. Who is responsible for authorizing access to the database, for coordinating and
monitoring its use ?
► Database Designers
► End Users
► Application Programmers
158. A super key that does not contain a subset of attributes that is itself a super key is called a
____.
► primary key
► superkey
► secondary key
159. A ____ entity has a primary key that is partially or totally derived from the parent entity in
the relationship.
► strong
► weak Google
► business
► relationship
160. Which of the following SQL keywords is not used with DDL statements?
► Table
► Update Google
► Create
AL-JUNAID INSTITUTE GROUP
► Alter 28
161. Identify the constraint that limits the values that can be placed in a column.
► NOT NULL
► CHECK Google
► FOREIGN KEY
► UNIQUE
162. Suppose there are 8 rows and 4 columns in TABLE1 and 3 rows and 4 coulmns in TABLE2;
what is the size of the cartesian product incase of CROSS JOIN between these two tables?
► 24 Google
► 32
► 12
► 16
163. Suppose there are 4 fields in a table named WORKER (Id, first_name, last_name,
joining_year). Which of the following gives all the information of the workers who have joined
after 1965?
164. Which of the following enforces a relation into 1st normal form?
► The domain of attribute must include only atomic values. (Page 167)
► user friendly
► consistency
► process based29
168. A relation (from the relational database model) consists of a set of tuples, which implies
that
► Relational model supports multi-valued attributes whose values can be represented in sets.
► for any two tuples, the values associated with all of their attributes may be the same.
► for any two tuples, the values associated with one or more of their attributes must differ. Google
169. The information regarding ‘views’ and ‘Integrity constraints’ are found in
► System Catalog
► Data Dictionary
AL-JUNAID INSTITUTE GROUP
► Indexes
► improve the performance of SQL execution when they are used for query rewrites
► Forms
► Text based
172. In SQL queries, while creating tables or relations in database, key columns may be
specified by
► Data type
► Null
► Owner
173. The ____ constraint specifies whether each entity supertype occurrence must also be a
member of at least one subtype.
► specialization Google
► uniqueness
► inheritance
► completeness
174. In a conceptual model for a university, what type of relationship exists between Grade and
Student entities?
► 1:1
► 1:M Google
AL-JUNAID INSTITUTE GROUP
► M:M
► Ternary
175. ______ is a control that presents a set of choices from which a user can select one or
more items; items can be text, graphics, or both.
► Text input
► Report
► Button
176. _______is a control that enables users to select one option from an associated list; users
can also
► Button
► Text box
► Static area
► Atomicity
► Isolation
► Durability
178. Which of the following is the correct way of removing the Index called branchNoIndex?
► Any given database has exactly one conceptual schema and one physical schema, but it may have
several external schemas.
181. Which of the following SQL commands deletes a record of an employee with the
employee_id 12345, from a table named PERSON.
182. ► Normalization is a formal technique that can be used only at the starting phase of the
database design.
► The process of normalization through decomposition must achieve the lossless join property at any
cost whereas the dependency reservation property is sometimes sacrificed.
AL-JUNAID INSTITUTE GROUP
► The process of normalization through decomposition must achieve the dependency reservation
property at any cost whereas the lossless join property is sometimes sacrificed Google
► Non-transitive dependency
► Partial dependency
► Transitive dependency
► It is not possible to left out the data which is not required for a specific view. (Page 280)
► A database view displays one or more database records on the same page.
► is DDL Command.
186. Which of the following statements are Data Manipulation Language command?
► INSERT Google
► GRANT
► TRUNCATE
► CREAT
► Materialized View
AL-JUNAID INSTITUTE GROUP
► Simple Views
► Complex View
188. A file with ______ records, with sequential access file, an average of _______ key
comparisons are
necessary.
► 10000, 5500
► 10000, 4500
► 10000, 500
189. A perfect hash function map a key to distinct location having search time _________.
► O(n)
► O(n+1)
► O(n-1)
194. To select the range while creating Indexes, the operator that is not used is _____.
Equals to (==). google
Less than (<)
And (&&)
Between
196. The property of ____ enables an entity subtype to hold the properties of its super type.
Null Constraint
Integrity
Inheritance google
Uniqueness
197. Which of the following most certainly implies the need for an entire table to implement?
A binary relationship
A ternary relationship google
A recursive relationship
An identifying relationship
AL-JUNAID INSTITUTE GROUP
198. “A shared collection of logically related data” is known as
Database Page no 10
File Processing System
Program and Data Interdependence
DBMS
200. Which of the following is one of the purposes of using DDL commands?
inserting records into databases
updating records into databases
manipulating databases
creating and destroying databases google
201. _________ is used to create and destroy database and database objects
ERD
DCL
DDL google
DML
202. The ____ constraint specifies whether each entity super type occurrence must also be a
member of at its one subtype.
Total completeness Google
Specialization
Uniqueness
Inheritance
203. Which of the following is a correct way to implement many-to-many cardinality in a binary
relationship while designing tables?
AL-JUNAID INSTITUTE GROUP
Using a third table with the keys from both the tables forming the composite primary key of third
Table. Google
By splitting the data into five tables with primary key and foreign key relationships.
By splitting the data into five tables with primary key and foreign key relationships.
By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key).
206. _____________ is used to sort the result set in ascending or descending order
Group by Clause
From Clause
Where Clause
Order by Clause Page no 220
207. Which of the following SQL Function does not use input parameter?
LOWER
UPPER
LEN
CURRENT_TIME Page no 221
210. Which of the following is the correct syntax for SELECT statement?
SELECT column_name(s) FROM table_name Conceptual
SELECT FROM table_name column_name(s)
FROM SELECT column_name(s) table_name
FROM table_name SELECT column_name(s)
211. Which of the following specifies the tables, which we access in the query?
SELECT Clause page no 212
FROM Clause
WHERE Clause
ORDER BY Clause
The number of columns in the first table multiplied by the number of rows in the second table.
The number of rows in the first table multiplied by the number of columns in the first table.
The number of rows in the first table multiplied by the number of rows in the second table.
The number of columns in the first table multiplied by the number of columns in the second table
218. Which of the following Command creates a view named ST-LIST on STUDENT table to
show all the columns?
CREATE VIEW ST_LIST AS SELECT * FROM STUDENT page no 284
SELECT * FROM STUDENT VIEW ST_LIST
CREATE ST_LIST VIEW AS STUDENT
SELECT * FROM STUDENT TO ST_LIST
220. ___________ manages mass storage devices like hard disks and tape drive.
Index
Operating System Google
RAID
Sequential File Access
222. While recovering data, which of the following files does a Recovery Manager examines at
first?
Clustered Index
Log file Google
Data dictionary
Metadata
223. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points Google
Relationships
224. -------------- occurs when multiple users want to update same object at the same time.
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem
Lost Update Problem page no308
AL-JUNAID INSTITUTE GROUP
225. It is not necessary for any super type entity to have its entire instance set to be associated
with any of the subtype entity, is called as ______________.
Partial Completeness page no 103
Disjoint Overlap
Complete Overlap
Total Completeness
Transitivity
Additive
Projectivity conceptual
Augmentation
229. Which of the following most certainly implies the need for an entire table to implement?
A binary relationship
A ternary relationship Google
A recursive relationship
An identifying relationship
230. “Database System” is the combination of_________________.
Database and DBMS Google
Database and Data
Data and Information
Operating System and Database
AL-JUNAID INSTITUTE GROUP
231. End User directly interact with _______________
External Schema page: 35
Conceptual Schema
Internal Schema
Core of Database Architecture
232. _____________ is also known as Community View of Database.
External Schema
Conceptual Schema Google
User views
Internal Schema
233. _____________ contains data about all the Databases in DBMS.
Data Dictionary Google
Schema
Cross Reference Matrix
Conceptual Data Model
234. In which of the following situations, Clustering is suitable:
Frequently updating
Relatively static Google
Frequently deletion
Relatively dynamic
235. SQL is an _____________ standard computer language
ANSI Google
General
Cold fusion
Interactive
236. Which of the following statements creates a database named COMPANY.
CREATE DATABASE COMPANY Google
CREATE DB company
ADD DATABASE company
CREATE company DATABASE
237. ___________ is used to read, write, and remove the data from a database
SQL Page 194
ERD
ANSI
Data Model
238. Which of the following SQL keywords is not used with DDL statements?
Table page no 234
Update
Create
Create
239. Which of the following statements are DML commands?
ALTER
CREATE
AL-JUNAID INSTITUTE GROUP
INSERT
GRANT google
240. The ____ constraint specifies whether each entity supertype occurrence must also be a
member of at its one subtype.
Total completeness google
Specialization
Uniqueness
Inheritance
241. Which of the following commands is used to drop the table named STUDENT?
DROP TABLE STUDENT Page no 208
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP
242. If a relation contains single Key, the relation is automatically in _______.
1NF
2NF google
3NF
4NF
243. Which of the following is not a type of user interface?
Graphical User Interface (GUI)
Forms
Database Schema google
Text based Interface
244. Which of the following is not related with Browser based forms development?
HTML
ASP
Front Page
Dev C Conceptual
245. Which of the following is the activity, which is not performed during the development of
application
programs?
249. What is the impact of setting multiple indexes for the same key?
Multiple indexes for the same key can not be set
It increases efficiency google
It decreases efficiency
It will increase complexity as the access time will be increased
252. Which of the following Command creates a view named ST-LIST on STUDENT table to
show all the
columns?
254. ___________ manages mass storage devices like hard disks and tape drive.
Index
Operating System google
RAID
Sequential File Access
257. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points google
Relationships
258. -------------- occurs when multiple users want to update same object at the same time.
AL-JUNAID INSTITUTE GROUP
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem
Lost Update Problem google
259. _______________ are called participants, when enrolled in a relationship.
Attributes
Relations
Entities google
Keys
260. Which of the following constraints enforces Entity Integrity?
PRIMARY KEY google
FOREIGN KEY
CHECK
NOT NULL