Data Modeling MCQs

Data Modeling MCQs

These Data Modeling multiple-choice questions and their answers will help you strengthen your grip on the subject of Data Modeling. You can prepare for an upcoming exam or job interview with these 60+ Data Modeling MCQs.
So scroll down and start answering.

1: In the client server systems, the DBMS in the server is also known as

A.   Backend

B.   Front-end

C.   Client

D.   Gateway

E.   Database Server

2: A statement that is executed automatically by the system as a side effect of a modification to the database is:

A.   Query

B.   Trigger

C.   Assertion

D.   Domain

E.   Aggregation

3: In a DBMS, two record types and their relationship is called:

A.   Segment

B.   Schema

C.   Set

D.   Database record

E.   Query

4: Each time a transaction commits the database, pages containing the old version of the data become inaccessible Such pages are considered

A.   Fragmented Pages

B.   Pages Pointed by pointers

C.   Garbage

D.   Current Pages

E.   Inconsistent Pages

5: Conflicts between instructions correspond to

A.   Non-compatibility of lock modes

B.   Compatibility of lock modes

C.   Long Programs

D.   Looping

E.   Other problems

6: The term used to denote an overall chart of all the data item types and record types stored in a database is:

A.   Schema

B.   Entity

C.   Subschema

D.   Relation

E.   Domain

7: A menu driven system:

A.   Is required only for on-line systems

B.   Increases the operator's work

C.   Can be used only by computer professionals

D.   Presents options and allows the user to make selections

E.   Helpful in backup procedures

8: A catalogue of all the data types in the database is:

A.   DDL

B.   DML

C.   Data Dictionary

D.   Data language

E.   Relational Algebra

9: A character coding technique in which characters occur in the data with different frequencies is:

A.   Encoding

B.   Encryption

C.   Huffman Coding

D.   Differential Compression

E.   Hierarchic Coding

10: Which of the following terms refers to either all or none of the operations being reflected properly in the database?

A.   Atomicity

B.   Consistency

C.   Isolation

D.   Durability

E.   Security

11: Which of the following is not a part of SDLC?

A.   Audit

B.   Reliability

C.   Security

D.   All of the above

E.   None of the above

12: A terabyte is:

A.   1 million MB

B.   1 million GB

C.   1 million bytes

D.   1 million KB

E.   1 billion bytes

13: Encapsulation implies:

A.   Normalization

B.   Data Security

C.   Query Processing

D.   Data Manipulation

E.   Data Independence

14: The level of data abstraction which describes how the data is actually stored is:

A.   Storage level

B.   Physical level

C.   File level

D.   Conceptual level

E.   Logical level

15: To decompose a relation into several smaller relations without duplicity is

A.   Generalization

B.   Conventional Database

C.   Normalization

D.   Encapsulation

E.   Aggregation

16: The database that is a unification of several data files with any redundancy wholly or partially eliminated is

A.   Integrated

B.   Shared

C.   Exclusive

D.   Unique

E.   Persistent

17: A language that enables users to access or manipulate data is:

A.   Data Definition

B.   Data Dictionary

C.   Data Manipulation

D.   Database

E.   Data handling  

18: A tree is composed of a hierarchy of elements called:

A.   Roots

B.   Nodes

C.   Children

D.   Leaves

E.   Twins

19: If a transaction Ti has obtained a shared mode lock on item Q, then Ti:

A.   Can read

B.   Can Write

C.   Read and Write Q

D.   Read but cannot write Q

E.   Cannot read but write Q

20: Normal forms are used to

A.   Reduce the size of tables so that less memory is required

B.   Make the query processing faster

C.   Avoid logical inconsistencies from operations

D.   Make the data secure from unauthorized users

E.   Make query easier

21: Projection operator

A.   Causes horizontal fragmentation

B.   Causes vertical fragmentation

C.   May produce duplicate tuples

D.   Causes vertical and horizontal fragmentation

22: Shadow paging is:

A.   Collision resolution technique

B.   Recovery technique

C.   Transaction processing technique

D.   Used for deadlock detection

E.   Query technique  

23: Which of the following is used to create complex entities?

A.   Generalization

B.   Aggregation

C.   Encapsulation

D.   Normalization

E.   Database  

24: Finding relevant information from a large volume of data is called:

A.   Data Mining

B.   Data Security

C.   Data Integrity

D.   Data Warehousing

E.   Data Dictionary

25: The collection of information stored in a database at a particular moment is called:

A.   View

B.   Instance

C.   Schema

D.   Domain

E.   Relation

26: Which timestamp is denoted by the W-timestamp (Q) of a transaction?

A.   Largest that executes write(Q) successfully

B.   Smallest that executes write(Q) successfully

C.   Largest that executes read(Q) successfully

D.   Smallest that executes read(Q) successfully

E.   Average Time

27: The candidate key which is not a primary key is said to be:

A.   Unique Key

B.   Alternate Key

C.   Foreign Key

D.   Secondary Key

E.   Null Key

28: Rollback causes the current transaction to:

A.   Abort

B.   Commit

C.   Redo

D.   Execute

E.   Be Partially Committed

29: The cost of physically linking the sites in the system is:

A.   Installation Cost

B.   Communication Cost

C.   Availability Cost

D.   Network Cost

E.   Coordination Cost

A.   Programs

B.   Tables

C.   Actions

D.   Inquiries

E.   Auditing

31: Once a transaction commits, its update survives even if there is a subsequent system crash This is:

A.   Atomicity

B.   Consistency

C.   Isolation

D.   Durability

E.   Recovery

32: The concept of a Multivalued Dependency is to be found in:

A.   1 NF

B.   2 NF

C.   3 NF

D.   4 NF

E.   5 NF

33: Select the most appropriate statement from the following:

A.   Operational managers make unstructured decisions

B.   Middle level managers undertake long range planning

C.   As the management level goes up the hierarchy, information becomes more and more summarized

D.   Operational Level is the lowest level

E.   None of the above

34: The two-phase commit protocol may introduce:

A.   Starving

B.   Blocking

C.   Deadlock

D.   Deadlining

E.   Splitting

35: After a transaction completes successfully, the changes made to the database are reflected even if there are system failures This is referred to as:

A.   Atomicity

B.   Consistency

C.   Isolation

D.   Implementation

E.   Durability

36: If in relation r, values x and y are only dependent on the primary key and not on each other, then they are said to be:

A.   Functionally Dependent

B.   Mutually Independent

C.   Fully Functionally Dependent

D.   Mutually Dependent

E.   Normalized

37: A phase when a transaction may obtain locks but may not release any lock is:

A.   Shrinking

B.   Growing

C.   Granting

D.   Processing

E.   Cascading

38: Head Crash on the disk is:

A.   System Failure

B.   Power Failure

C.   Hardware Failure

D.   Computer Failure

E.   Software Failure

39: A candidate key that involves more than one attribute is said to be:

A.   Simple

B.   Composite

C.   Mixed

D.   Irrelevant Key

E.   Null Key

40: Who gave the 12 rules for any RDBMS to be accepted as a full-fledged RDBMS?

A.   Bachman

B.   Watson

C.   Chen

D.   Codd

E.   Gates

41: Execution of a transaction in isolation preserves:

A.   Atomicity

B.   Consistency

C.   Durability

D.   Processing

42: A repository of information gathered from multiple sources stored under a unified schema at a single site is

A.   Data Mining

B.   Data Warehousing

C.   Data Security

D.   Data Redundancy

E.   Data Designing

43: Which of the following refers to the hashing in which the number of disk accesses needed to locate a specific record is never more than two?

A.   Extendable

B.   Linear

C.   Addressable

D.   Serial

E.   Indexing

44: The role of a DBA is to:

A.   Decide information content of a database

B.   Decide storage structure and access strategy

C.   Define various security checks

D.   Define various authorization checks

E.   All of the above

45: The state while a transaction is executing is:

A.   Committed

B.   Aborted

C.   Failed

D.   Partially Committed

E.   Active

46: The system that processes transactions as soon as they are entered is

A.   On Line

B.   Real time

C.   Batch

D.   Serial

E.   Sequential

47: Polymorphism is defined as:

A.   A technique according to which attributes and methods of an object are defined as a single entity

B.   Ability of methods to operate on objects of more than one class

C.   A method that enables us to derive new classes from existing ones

D.   A branch of mathematical logic

E.   A technique of query processing

A.   1 NF

B.   2 NF

C.   3 NF

D.   4 NF

E.   5 NF

49: Ensuring that the updates are correct even during the failure period is referred to as

A.   Data Mining

B.   Data Updation

C.   Data Integrity

D.   Data Validation

E.   Data Definition

50: A language in which the user requests information from the database is

A.   A query language

B.   A machine language

C.   A low level language

D.   A middle level language

E.   A high level language