These Data Modeling multiple-choice questions and their answers will help you strengthen your grip on the subject of Data Modeling. You can prepare for an upcoming exam or job interview with these 60+ Data Modeling MCQs.
So scroll down and start answering.
A. Backend
B. Front-end
C. Client
D. Gateway
E. Database Server
A. Query
B. Trigger
C. Assertion
D. Domain
E. Aggregation
A. Segment
B. Schema
C. Set
D. Database record
E. Query
A. Fragmented Pages
B. Pages Pointed by pointers
C. Garbage
D. Current Pages
E. Inconsistent Pages
A. Non-compatibility of lock modes
B. Compatibility of lock modes
C. Long Programs
D. Looping
E. Other problems
A. Schema
B. Entity
C. Subschema
D. Relation
E. Domain
A. Is required only for on-line systems
B. Increases the operator's work
C. Can be used only by computer professionals
D. Presents options and allows the user to make selections
E. Helpful in backup procedures
A. DDL
B. DML
C. Data Dictionary
D. Data language
E. Relational Algebra
A. Encoding
B. Encryption
C. Huffman Coding
D. Differential Compression
E. Hierarchic Coding
A. Atomicity
B. Consistency
C. Isolation
D. Durability
E. Security
A. Audit
B. Reliability
C. Security
D. All of the above
E. None of the above
A. 1 million MB
B. 1 million GB
C. 1 million bytes
D. 1 million KB
E. 1 billion bytes
A. Normalization
B. Data Security
C. Query Processing
D. Data Manipulation
E. Data Independence
A. Storage level
B. Physical level
C. File level
D. Conceptual level
E. Logical level
A. Generalization
B. Conventional Database
C. Normalization
D. Encapsulation
E. Aggregation
A. Integrated
B. Shared
C. Exclusive
D. Unique
E. Persistent
A. Data Definition
B. Data Dictionary
C. Data Manipulation
D. Database
E. Data handling Â
A. Roots
B. Nodes
C. Children
D. Leaves
E. Twins
A. Can read
B. Can Write
C. Read and Write Q
D. Read but cannot write Q
E. Cannot read but write Q
A. Reduce the size of tables so that less memory is required
B. Make the query processing faster
C. Avoid logical inconsistencies from operations
D. Make the data secure from unauthorized users
E. Make query easier
A. Causes horizontal fragmentation
B. Causes vertical fragmentation
C. May produce duplicate tuples
D. Causes vertical and horizontal fragmentation
A. Collision resolution technique
B. Recovery technique
C. Transaction processing technique
D. Used for deadlock detection
E. Query technique Â
A. Generalization
B. Aggregation
C. Encapsulation
D. Normalization
E. Database Â
A. Data Mining
B. Data Security
C. Data Integrity
D. Data Warehousing
E. Data Dictionary
A. View
B. Instance
C. Schema
D. Domain
E. Relation
A. Largest that executes write(Q) successfully
B. Smallest that executes write(Q) successfully
C. Largest that executes read(Q) successfully
D. Smallest that executes read(Q) successfully
E. Average Time
A. Unique Key
B. Alternate Key
C. Foreign Key
D. Secondary Key
E. Null Key
A. Abort
B. Commit
C. Redo
D. Execute
E. Be Partially Committed
A. Installation Cost
B. Communication Cost
C. Availability Cost
D. Network Cost
E. Coordination Cost
A. Programs
B. Tables
C. Actions
D. Inquiries
E. Auditing
A. Atomicity
B. Consistency
C. Isolation
D. Durability
E. Recovery
A. 1 NF
B. 2 NF
C. 3 NF
D. 4 NF
E. 5 NF
A. Operational managers make unstructured decisions
B. Middle level managers undertake long range planning
C. As the management level goes up the hierarchy, information becomes more and more summarized
D. Operational Level is the lowest level
E. None of the above
A. Starving
B. Blocking
C. Deadlock
D. Deadlining
E. Splitting
A. Atomicity
B. Consistency
C. Isolation
D. Implementation
E. Durability
A. Functionally Dependent
B. Mutually Independent
C. Fully Functionally Dependent
D. Mutually Dependent
E. Normalized
A. Shrinking
B. Growing
C. Granting
D. Processing
E. Cascading
A. System Failure
B. Power Failure
C. Hardware Failure
D. Computer Failure
E. Software Failure
A. Simple
B. Composite
C. Mixed
D. Irrelevant Key
E. Null Key
A. Bachman
B. Watson
C. Chen
D. Codd
E. Gates
A. Atomicity
B. Consistency
C. Durability
D. Processing
A. Data Mining
B. Data Warehousing
C. Data Security
D. Data Redundancy
E. Data Designing
A. Extendable
B. Linear
C. Addressable
D. Serial
E. Indexing
A. Decide information content of a database
B. Decide storage structure and access strategy
C. Define various security checks
D. Define various authorization checks
E. All of the above
A. Committed
B. Aborted
C. Failed
D. Partially Committed
E. Active
A. On Line
B. Real time
C. Batch
D. Serial
E. Sequential
A. A technique according to which attributes and methods of an object are defined as a single entity
B. Ability of methods to operate on objects of more than one class
C. A method that enables us to derive new classes from existing ones
D. A branch of mathematical logic
E. A technique of query processing
A. 1 NF
B. 2 NF
C. 3 NF
D. 4 NF
E. 5 NF
A. Data Mining
B. Data Updation
C. Data Integrity
D. Data Validation
E. Data Definition
A. A query language
B. A machine language
C. A low level language
D. A middle level language
E. A high level language