These Database Management multiple-choice questions and their answers will help you strengthen your grip on the subject of Database Management. You can prepare for an upcoming exam or job interview with these 70+ Database Management MCQs.
So scroll down and start answering.
A. True
B. False
Data dictionary can be used for which of the following options?
1. For finding the location of the data.
2. For finding the size of the storage disk.
3. For finding the owner of the data.
A.
Only1 and 2
B.
Only1 and 3
C.
Only 2 and 3
D.
1. 2 and 3
Which of the following inference rules for functional dependencies are correct?
1. |fA> BandA>C,thenA> BC
2. lfA>BC,thenA>BandA>C
3. |fA> B and DB>C,then DA>C
4.lfA>BandC>D.thenAC>BD
A.
Only1, 2 and 3
B.
Only 1, 2 and 4
C. Only 2, 3 and 4
D.
All of them
A. DKNF (Domain! Key normal form) avoids non-temporal anomalies.
B. Fifth normal form is a special case of DKNF (Domain/ Key normal form)
C. It is always a dependency-preserving transformation to convert/transform a higher normal form to DKNF (Domain! Key normal form).
D. Third normal form is a special case of DKNF (Domain/ Key normal form).
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
A. A dependency in which the value of a non-key column is dependent on the value of another non-key column.
B. A dependency in which a table can be created by joining multiple tables such that it has subsets of the attributes of each table.
C. A dependency in which a non-key attribute of a table is dependent on the table's primary key.
D. A dependency in which one attribute value is potentially a "multivalued fact" about another and the attributes are independent of each other.
A. The process of reformatting of data.
B. The process of returning cleaned data back to the source.
C. The process of reloading data into the warehouse.
Data dictionary can be used for which of the following options?
1. For finding the location of the data.
2. For finding the size of the storage disk.
3. For finding the owner of the data.
A.
Only1 and 2
B.
Only1 and 3
A. It is used to remove a table from a database.
B. It is used to remove data from a table. but data can be rolled back.
C. It is used to remove data permanently from the table so that it cannot be rolled back.
D. It is used to remove constraints from a table.
A. atomic object
B. extended object
C. inherited object
D. factory object
A. Atomicity, Concurrency, Integrity, Durability
B. Atomicity, Consistency, Isolation. Durability
C. Atomicity, Consistency. Integrity. Durability
D. Atomicity, Concurrency, Independent, Durability
A. RAID 1
B. RAID 2
C. RAID 3
D. RAID 6
A. DAC policies
B. MAC policies
C. Both DAc and MAC policies
A. True
B. False
A. RDBMS
B. ER
C. ODMG
D. ODBC
A. All transactions in a distributed database follow the ACID properties.
B. Transactions in a distributed database are reliable.
C. A distributed database is modular.
D. No additional software is required to implement the distributed database.
Which of the following syntaxes are used for inserting data into a table?
(1) INSERT INTO table_name
VALUES (value1,value2, value3,...);
(2) INSERT INTO table_name (columnl. column2. column3,...)
VALUES (valuel. value2. valueB....);
(3) INSERT INTO table_name1 [(column1, column2, column3, .....) ]
SELECT column1.column2.co|umn3.
FROM table_name2 [WHERE condition];
A.
Only (1) and (2)
B.
Only (1) and (3)
C.
Only (2) and (3)
D.
All of them.
A.
Figure 1
B.
Figure 2
C.
Figure 3
D.
Figure 4
A. tracks
B. extents
C. segments
D. blocks
Consider a relation "Book" with the following structure:
book_id (Primary key)
book_name
book_title
date_of_issue
Which of the following relational algebra operations will return all the entries of book_id and book_title from the relation "Book“?
A.
book_id. book_title (Book)
B.
book_id. book_title (Book)
C.
book_id. book_title (Book)
D.
book_id. book_title (Book)
The index in which the search key defines an order that is dissimilar from the sequential order of the file is known as index.
A.
primary
B.
secondary
C.
clustering
A. In an object database (ODB) design. relationships among records/tuples are defined by attributes with similar values.
B. In a relational database (RDB) design, built-in constructs do not occur for inheritance.
C. In an object database (ODB) design. it is strictly required to define the Operations in the design phase.
D. In an object database (ODB) design. it is strictly required to define the Operations in the design phase.
A covert channel permits the transfer of information in such a way that it violates the system's security policy.
A. True
B. False
A. Performance monitoring
B. Logical data independence
C. Relationship inheritance
D. Physical data independence
A. RAID 0
B. RAID1
C. RAID 3
D. RAID 5
A. Logical manager
B. File manager
C. Buffer manager
D. Transaction manager
State whether the following statement is true or false:
A database table must have only one primary key and one super key.
A.
True
B.
False
A.
Composite attribute
B.
Derived attribute
C.
Key attribute
D.
Multivalued attribute
Suppose there are two relations: R1 and R2. If C1 and C2 are the selection conditions, and A1 and A2 are the attributes of the relation R1, then which of the given query transformations are correct?
1. 0C1 (0C1 (R1)) -> 0C2 (0C2 (R1))
2. 0C1 (nA1 (R1)) -> nAl (0C1 (R1))
3. 0C1 (R1 U R2) -> 0C1 (R1) U 0C1 (R2)
A.
Only 1 and 2
B.
Only1 and 3
C.
Only 2 and 3
D.
1. 2 and 3
Which of the following database security mechanisms is used to enforce multilevel security by classifying users and data into various security levels?
1. Mandatory security mechanisms
2. Discretionary security mechanisms
A.
Only1
B.
Only 2
C.
Both 1 and 2
A. Enterprise-wide data warehouses
B. Data marts
C. Virtual data warehouses
A. account_no
B. customer_name
C. dateofbirth
D. pancard_no
E. address
F. balance
Which of the following relational algebra expressions represents the query that will find names of customers having an account balance of over Rs. 5.000?
A.
customer_name (o balance>5000 (Account))
B.
customer_name (o balance>5000 (Account))
C.
customer_name (n balance>5000 (Account))
In which of the following areas data-mining technology can be applied?
1. Marketing
2. Finance
3. Manufacturing
4. Healthcare
A.
Only1 and 3
B.
Only 2 and 3
C.
Only 1. 2 and 3
D.
All the given areas
A.
SELECT Employeeld, EmployeeName, Salary, Department FROM Employee e WHERE Salary >
(SELECT AVG(Salary) FROM Employee WHERE Salary = e.Department);
B.
SELECT Employeeld, EmployeeName, Salary, Department FROM Employee WHERE Salary >
(SELECT AVERAGE(SaIary) FROM Employee WHERE Department = Department);
C.
SELECT Employeeld, EmployeeName, Salary, Department FROM Employee WHERE Salary >
(SELECT AVG(Salary) FROM Employee WHERE Department = Department);
D.
SELECT Employeeld, EmployeeName, Salary, Department FROM Employee e WHERE Salary >
(SELECT AVG(SaIary) FROM Employee WHERE Department = e.Department);
Which of the following statements will be used to delete all the records from a table named, th?
1. DELETE from tb1;
2. DELETE ‘ from tb1;
3. DELETE tb1;
A.
Only1 and 2
B.
Only1 and 3
C.
Only 2 and 3
D.
All 1, 2 and 3
Examine the below-given SQL statements applied on a table named, Employees and answer the following question.
1. SELECT Iast_name, salary, hire_date FROM EMPLOYEES ORDER BY salary DESC
2. SELECT Iast_name, salary. hire_date FROM EMPLOYEES ORDER BY 2 DESC
Which of the answer options is true?
A.
The two statements produce identical results.
B.
The second statement returns an error.
C.
There is no need to specify DESC because the results are sorted in a descending order by default
A. By a system clock only.
B. By a thread-safe shared counter only.
C. Either by system clock. or by thread-safe shared counter. or by both together.
D. Neither by system clock nor by thread-safe shared counter.
A. REVOKE DELETE ON Employee FROM user2;
B. REVOKE DELETE ON TABLE Employee FROM user2;
C. REVOKE DELETE ON Employee FROM PUBLIC;
D. REVOKE FROM user2 DELETE ON Employee;
A. Implicit constraints
B. Explicit constraints
C. Semantic constraints
A. Rollno {Primary key)
B. StudentName
C. ClubEnrolled
A. SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName LIKE (SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = 'Cricket‘);
B. SELECT Rollno AND StudentName FROM StudentDetails WHERE StudentName IN SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = Cricket;
C. SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName lN (SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = 'Cricket‘);
D. SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName lN SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = Cricket
Choose the incorrect statements about an object identifier (01D)?
1. The value of an OlD is visible to an external user.
2. It is used by a system to identify Objects uniquely.
3. An OID cannot be assigned to variables in programs.
A.
Only1 and 2
B.
Only1 and 3
C.
Only 2 and 3
D.
All 1, 2 and 3
A. improve the security of a database
B. minimize redundancy
C. improve efficiency of a database
D. reduce errors in a database
A. Temporal relation
B. Bitemporal relation
C. Nontemporal relation
A. Primary index
B. Clustering index
C. Secondary index
D. Both primary and secondary indexes
A. Read. Compute. Validate. Write
B. Compute, Validate, Read, Write
C. Validate. Read. Compute. Write
D. Validate. compute. Read. Write
A. for providing security to the database
B. for database indexing.
C. for preserving the integrity of the database
A. Dirty read problem
B. Phantom read problem
C. Lost update problem
D. Missing and double read problem caused by row updates
E. All of the above problems
A. True
B. False