Database Management MCQs

Database Management MCQs

These Database Management multiple-choice questions and their answers will help you strengthen your grip on the subject of Database Management. You can prepare for an upcoming exam or job interview with these 70+ Database Management MCQs.
So scroll down and start answering.

1: An ODMG object model cannot use exceptions for reporting errors.

A.   True

B.   False

2:

Data dictionary can be used for which of the following options?

1. For f‌inding the location of the data.

2. For f‌inding the size of the storage disk.

3. For finding the owner of the data.


A.  

Only1 and 2

B.  

Only1 and 3

C.  

Only 2 and 3

D.  

1. 2 and 3

3:

Which of the following inference rules for functional dependencies are correct?

1. |fA> BandA>C,thenA> BC

2. lfA>BC,thenA>BandA>C

3. |fA> B and DB>C,then DA>C

4.lfA>BandC>D.thenAC>BD


A.  

Only1, 2 and 3 

B.  

Only 1, 2 and 4  

C.   Only 2, 3 and 4

D.  

All of them 

4: Which of the following statements is incorrect?

A.   DKNF (Domain! Key normal form) avoids non-temporal anomalies.

B.   Fifth normal form is a special case of DKNF (Domain/ Key normal form)

C.   It is always a dependency-preserving transformation to convert/transform a higher normal form to DKNF (Domain! Key normal form).

D.   Third normal form is a special case of DKNF (Domain/ Key normal form).

5: Which of the following RAID levels is widely used to store log f‌iles in a database system?

A.   RAID 0

B.   RAID 1

C.   RAID 2

D.   RAID 3

6: Which of the following statements correctly describes a transitive dependency?

A.   A dependency in which the value of a non-key column is dependent on the value of another non-key column.

B.   A dependency in which a table can be created by joining multiple tables such that it has subsets of the attributes of each table.

C.   A dependency in which a non-key attribute of a table is dependent on the table's primary key.

D.   A dependency in which one attribute value is potentially a "multivalued fact" about another and the attributes are independent of each other.

7: What do you mean by backflushing in the construction of a data warehouse?

A.   The process of reformatting of data.

B.   The process of returning cleaned data back to the source.

C.   The process of reloading data into the warehouse.

8:

Data dictionary can be used for which of the following options?

1. For f‌inding the location of the data.

2. For f‌inding the size of the storage disk.

3. For f‌inding the owner of the data.

A.  

Only1 and 2

B.  

Only1 and 3

9: What is the use of the TRUNCATE command in SQL?

A.   It is used to remove a table from a database.

B.   It is used to remove data from a table. but data can be rolled back.

C.   It is used to remove data permanently from the table so that it cannot be rolled back.

D.   It is used to remove constraints from a table.

10: Any user-defined Object in an Object model that is not a type of collection object is called a/an _.

A.   atomic object

B.   extended object

C.   inherited object

D.   factory object

11: In a database, transactions follow ACID properties. Which of the following are these properties?

A.   Atomicity, Concurrency, Integrity, Durability

B.   Atomicity, Consistency, Isolation. Durability

C.   Atomicity, Consistency. Integrity. Durability

D.   Atomicity, Concurrency, Independent, Durability

12: Which of the following levels of the data-storage virtualization technology involves bit-level striping with dedicated Hamming-code parity?

A.   RAID 1

B.   RAID 2

C.   RAID 3

D.   RAID 6

13: Which of the following access control policies ensures a high degree of protection from malicious attacks?

A.   DAC policies

B.   MAC policies

C.   Both DAc and MAC policies

14: An Object-oriented database stores persistent object(s) that is/are not shared among multiple applications or programs, in a permanent storage.

A.   True

B.   False

15: Object Query Language (OOL) is based on which of the following data models?

A.   RDBMS

B.   ER

C.   ODMG

D.   ODBC

16: Which of the following statements about a distributed database is false?

A.   All transactions in a distributed database follow the ACID properties.

B.   Transactions in a distributed database are reliable.

C.   A distributed database is modular.

D.   No additional software is required to implement the distributed database.

17:

Which of the following syntaxes are used for inserting data into a table?

(1) INSERT INTO table_name

VALUES (value1,value2, value3,...);

(2) INSERT INTO table_name (columnl. column2. column3,...)

VALUES (valuel. value2. valueB....);

(3) INSERT INTO table_name1 [(column1, column2, column3, .....) ]

SELECT column1.column2.co|umn3.

FROM table_name2 [WHERE condition];


A.  

Only (1) and (2)

B.  

Only (1) and (3)

C.  

Only (2) and (3)

D.  

All of them.

18:

Which Of the given figures represents a weak entity as used in Entity-Relationship (ER) diagrams?

A.  

Figure 1 

B.  

Figure 2   

C.  

Figure 3

D.  

Figure 4

19: A tablespace is divided into .

A.   tracks

B.   extents

C.   segments

D.   blocks

20:

Consider a relation "Book" with the following structure:

book_id (Primary key)

book_name

book_title

date_of_issue

Which of the following relational algebra operations will return all the entries of book_id and book_title from the relation "Book“?


A.  

book_id. book_title (Book)  

B.  

 book_id. book_title (Book)  

C.  

 book_id. book_title (Book)

D.  

 book_id. book_title (Book) 

21:

The index in which the search key defines an order that is dissimilar from the sequential order of the file is known as index.


A.  

primary 

B.  

secondary 

C.  

clustering

22: Which of the following statements is false?

A.   In an object database (ODB) design. relationships among records/tuples are def‌ined by attributes with similar values.

B.   In a relational database (RDB) design, built-in constructs do not occur for inheritance.

C.   In an object database (ODB) design. it is strictly required to def‌ine the Operations in the design phase.

D.   In an object database (ODB) design. it is strictly required to def‌ine the Operations in the design phase.

23:

A covert channel permits the transfer of information in such a way that it violates the system's security policy.

A.   True

B.   False

24: Which of the following options is defined as the tendency to change the internal schema without affecting the conceptual schema?

A.   Performance monitoring

B.   Logical data independence

C.   Relationship inheritance

D.   Physical data independence

25: Which of the following levels of a data storage virtualization technology involves block-level striping with distributed parity?

A.   RAID 0

B.   RAID1

C.   RAID 3

D.   RAID 5

26: Which one of the given options is not a component of a storage manager in a database management system?

A.   Logical manager

B.   File manager

C.   Buffer manager

D.   Transaction manager

27:

State whether the following statement is true or false:

A database table must have only one primary key and one super key.


A.  

True 

B.  

False 

28:

Which of the following attributes is represented by the entity-relationship (E-R) diagram given in the image?

A.  

Composite attribute  

B.  

Derived attribute

C.  

Key attribute

D.  

Multivalued attribute

29:

Suppose there are two relations: R1 and R2. If C1 and C2 are the selection conditions, and A1 and A2 are the attributes of the relation R1, then which of the given query transformations are correct?

1. 0C1 (0C1 (R1)) -> 0C2 (0C2 (R1))

2. 0C1 (nA1 (R1)) -> nAl (0C1 (R1))

3. 0C1 (R1 U R2) -> 0C1 (R1) U 0C1 (R2)


A.  

Only 1 and 2

B.  

Only1 and 3

C.  

Only 2 and 3

D.  

1. 2 and 3

30:

Which of the following database security mechanisms is used to enforce multilevel security by classifying users and data into various security levels?

1. Mandatory security mechanisms

2. Discretionary security mechanisms


A.  

Only1 

B.  

Only 2


C.  

 Both 1 and 2

31: Which of the given options is targeted and focused on a single subset of an organization?

A.   Enterprise-wide data warehouses

B.   Data marts

C.   Virtual data warehouses

32: Consider a table named "Account," having the following fields.

A.   account_no

B.   customer_name

C.   dateofbirth

D.   pancard_no

E.   address

F.   balance

33:

Which of the following relational algebra expressions represents the query that will f‌ind names of customers having an account balance of over Rs. 5.000?


A.  

 customer_name (o balance>5000 (Account))

B.  

customer_name (o balance>5000 (Account))

C.  

customer_name (n balance>5000 (Account))

34:

In which of the following areas data-mining technology can be applied?

1. Marketing

2. Finance

3. Manufacturing

4. Healthcare


A.  

Only1 and 3 

B.  

Only 2 and 3

C.  

Only 1. 2 and 3

D.  

All the given areas 

35:

Consider a table titled "Employee" having the following attributes:

Employeeld (Primary key)

EmployeeName

Salary

Department

Which of the following correlated SQL queries will return Employeeld. EmployeeName, Salary and Department of all the employees whose salary is more than the average salary of employees in their respective departments?


A.  

SELECT Employeeld, EmployeeName, Salary, Department FROM Employee e WHERE Salary >

(SELECT AVG(Salary) FROM Employee WHERE Salary = e.Department); 


B.  

SELECT Employeeld, EmployeeName, Salary, Department FROM Employee WHERE Salary >

(SELECT AVERAGE(SaIary) FROM Employee WHERE Department = Department); 


C.  

SELECT Employeeld, EmployeeName, Salary, Department FROM Employee WHERE Salary >

(SELECT AVG(Salary) FROM Employee WHERE Department = Department);


D.  

SELECT Employeeld, EmployeeName, Salary, Department FROM Employee e WHERE Salary >

(SELECT AVG(SaIary) FROM Employee WHERE Department = e.Department);


36:

Which of the following statements will be used to delete all the records from a table named, th?

1. DELETE from tb1;

2. DELETE ‘ from tb1;

3. DELETE tb1;


A.  

Only1 and 2 

B.  

Only1 and 3

C.  

Only 2 and 3

D.  

All 1, 2 and 3

37:

Examine the below-given SQL statements applied on a table named, Employees and answer the following question.

1. SELECT Iast_name, salary, hire_date FROM EMPLOYEES ORDER BY salary DESC

2. SELECT Iast_name, salary. hire_date FROM EMPLOYEES ORDER BY 2 DESC

Which of the answer options is true?


A.  

The two statements produce identical results.

B.  

The second statement returns an error.

C.  

There is no need to specify DESC because the results are sorted in a descending order by default


38: How can a timestamp be implemented in a database?

A.   By a system clock only.

B.   By a thread-safe shared counter only.

C.   Either by system clock. or by thread-safe shared counter. or by both together.

D.   Neither by system clock nor by thread-safe shared counter.

39: Which of the following is NOT the correct syntax to write the REVOKE statement that is used to revoke a privilege on a table named, Employee from user2?

A.   REVOKE DELETE ON Employee FROM user2;

B.   REVOKE DELETE ON TABLE Employee FROM user2;

C.   REVOKE DELETE ON Employee FROM PUBLIC;

D.   REVOKE FROM user2 DELETE ON Employee;

40: Which type of constraints are expressed by the application programs and not directly expressed in the schemas Of the data model?

A.   Implicit constraints

B.   Explicit constraints

C.   Semantic constraints

41: Consider a table titled "StudentDetails“ having the following attributes:

A.   Rollno {Primary key)

B.   StudentName

C.   ClubEnrolled

42: Which of the following SOL queries will return the details of only those students who are enrolled in the "Cricket" club?

A.   SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName LIKE (SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = 'Cricket‘);

B.   SELECT Rollno AND StudentName FROM StudentDetails WHERE StudentName IN SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = Cricket;

C.   SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName lN (SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = 'Cricket‘);

D.   SELECT Rollno, StudentName FROM StudentDetails WHERE StudentName lN SELECT StudentName FROM StudentDetails WHERE ClubEnrolled = Cricket

43:

Choose the incorrect statements about an object identif‌ier (01D)?

1. The value of an OlD is visible to an external user.

2. It is used by a system to identify Objects uniquely.

3. An OID cannot be assigned to variables in programs.


A.  

 Only1 and 2

B.  

Only1 and 3

C.  

Only 2 and 3

D.  

All 1, 2 and 3

44: Database normalization is used to .

A.   improve the security of a database

B.   minimize redundancy

C.   improve eff‌iciency of a database

D.   reduce errors in a database

45: Which of the following relations is also called a snapshot relation?

A.   Temporal relation

B.   Bitemporal relation

C.   Nontemporal relation

46: Which of the following indexes in databases is usually dense?

A.   Primary index

B.   Clustering index

C.   Secondary index

D.   Both primary and secondary indexes

47: What is the order of execution of operations during a pessimistic concurrency control technique?

A.   Read. Compute. Validate. Write

B.   Compute, Validate, Read, Write

C.   Validate. Read. Compute. Write

D.   Validate. compute. Read. Write

48: Concurrency control is used .

A.   for providing security to the database

B.   for database indexing.

C.   for preserving the integrity of the database

49: A database system without concurrency control may cause:

A.   Dirty read problem

B.   Phantom read problem

C.   Lost update problem

D.   Missing and double read problem caused by row updates

E.   All of the above problems

50: The hash address space in static hashing is not always the same.

A.   True

B.   False