Database Administration MCQs

Database Administration MCQs

Try to answer these 20 Database Administration MCQs and check your understanding of the Database Administration subject.
Scroll down and let's begin!

1: Which of the following is part of an administrative policy to secure a database?

A.   All of these

B.   Ensure appropriate responses rates are in external maintenance agreements

C.   Authentication policies

D.   Limiting particular areas within a building to only authorized people

2: Constraints are

A.   A way of organising data in a table

B.   Precompiled queries that are stored in the database

C.   A way of providing a different perspective on data stored in the database

D.   A way of checking that inserted values are within an acceptable range

E.   Default values for fields that have not been filled in

3: An extent is a block of .... pages

A.   2

B.   10

C.   8

D.   4

E.   6

4: A default object is?

A.   A stored procedure that activates when data is added, edited or deleted from a table

B.   A set of T-SQL statements designed to perform a set task similar to a macro

C.   An object assigned to a column which defines a value to be used if nothing is entered

D.   An object assigned to a column which defines how data can be added

5: Poor data administration can lead to which of the following?

A.   Missing data elements

B.   A single definition of the same data entity

C.   Familiarity with existing data

D.   All of these

6: What does RDBMS stand for?

A.   Relational Database Micro System

B.   Relational Database, Microsoft

C.   Rational Database Management System

D.   Relational Database Management System

7: If both data and database administration exist in an organization, the database administrator is responsible for which of the following?

A.   All of these

B.   Database design

C.   Metadata

D.   Data Modeling

8: We prevent a user from updating a table by:

A.   Blocking the table

B.   Granting a right

C.   Revoking a right

D.   Blocking the columns

9: Mirrored databases are almost always provided in high-availability systems.

A.   True

B.   False

10: The ability to do an action on a table is called

A.   A token

B.   A password

C.   A right

D.   An action

11: Failure to control confidentiality may lead to loss of competitiveness.

A.   False

B.   True

12: Which of the following could cause data to be unavailable?

A.   Data becoming lost or inaccurate

B.   Planned database maintenance activities

C.   All of these

D.   The database server

13: A torn page is where

A.   A database object is split between 2 pages

B.   Part of the page has become corrupt

C.   Part of the page is not contiguously written to disk

D.   Part of the page is not written to disk

14: Performance analysis and tuning is which of the following?

A.   Undertaken as an ongoing part of managing a database

B.   Undertaken one time at the time of a DBMS installation

C.   Undertaken as an ongoing part of the backup of a database

D.   Undertaken one time at the time of the implementation of a new application

15: A traditional data administrator performs which of the following roles?

A.   Establish backup and recovery procedures

B.   Resolve data ownership issues

C.   Protect the security of the database.

D.   Tune Database Performance

16: _____ are used to control the behavior or interactivity of the field in database objects.

A.   Field size

B.   Field properties

C.   Remove the filter

D.   Primary key field

17: A ____ is responsible for maintaining a large, multiuser system.

A.   Software engineer

B.   System administrator

C.   Vice president of information systems

18: Management of classified data includes its storage and _________.

A.   Systems-specific

B.   Risk identification

C.   Distribution, portability, and destruction (All of the above)

D.   Disadvantage

19: One of the important functions of a dbms is to provide the necessary tools for ________.

A.   Administering the database

B.   Storing data types such as images, audio, and videos in organizations

C.   Application programs

D.   Administration

20: A data administrator is also known as a(n) _____.

A.   Data security officer

B.   Systems administrator

C.   Information resource manager

D.   Information engineering officer

21: Unix allows permissions to be assigned to ________.

A.   The account that owns the file or directory

B.   A group associated with the directory

C.   Everyone else

D.   All of the above

22: The ____ establishes the naming conventions for tables, fields, and indexes in the data dictionary.

A.   ​users


C.   ​DBA

D.   Programmers.

23: Flat, raised, sunken, etched, shadowed, and chiseled are options for the ____ control property.

A.   Ribbon

B.   Special Effect

C.   Shift

D.   Multiple