Database Management System MCQs

Database Management System MCQs

These Database Management System multiple-choice questions and their answers will help you strengthen your grip on the subject of Database Management System. You can prepare for an upcoming exam or job interview with these Database Management System MCQs.
So scroll down and start answering.

1: Data Manipulation Language (DML) is not to

A.   Create information table in the Database

B.   Deletion of information in the Database

C.   Insertion of new information into the Database

D.   Modification of information in the Database

2: Report generators are used to

A.   Retrieve information from files

B.   None of these

C.   Both retrieve information from files and answer queries

D.   Store data input by a user

E.   Answer queries

3: Database locking concept is used to solve the problem of?

A.   Lost Update

B.   Inconsistent Data

C.   All of these

D.   Uncommitted Dependency

4: The Primary key must be

A.   Option Non Null or Unique

B.   UNIQUE

C.   Non Null

D.   Option Non Null and Unique

5: Administrate supervision of database activities is the responsibility of the

A.   DP Manager

B.   DB Manager

C.   Database Administrator

D.   None of these

E.   DP administration

6: In SQL, which of the following is not a data definition language commands?

A.   GRANT

B.   Revoke

C.   RENAME

D.   UPDATE

E.   None of these

7: Snapshot of the dta in the database at a given instant of time is called

A.   Database Instance

B.   Database Schema

C.   Database Snapshot

D.   All of these

8: A command that lets you change one or more fields in a record is

A.   INSERT

B.   Modify

C.   Look-up

D.   All of these

E.   None of these

9: What is ACID properties of Transactions?

A.   Atomicity, Consistency, Isolation, Durability

B.   Atomicity, Consistency, Inconsistent, Durability

C.   Atomicity, Consistency, Isolation, Database

D.   Automatically, Concurrency, Isolation, Durability

10: Data integrity control

A.   All of these

B.   Requires the use of passwords to prohibit unauthorized access to the file

C.   Is used to set upper and lower limits on numeric data

D.   None of these

E.   Has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files

11: A command to remove a relation from an SQL database

A.   Drop table < table name >

B.   Erase table < table name >

C.   Alter table < table name >

D.   Delete table < table name >

12: In DBMS FD stands for _______

A.   Functional dependency

B.   Functional data

C.   Facilitate dependency

D.   Facilitate data

13: The attribute that can be divided into other attributes is called

A.   Simple Attribute

B.   Derived Attribute

C.   Multi-valued Attribute

D.   Composite Attribute

14: How many types of keys in Database Design?

A.   Foreign key

B.   All of these

C.   Candidate key

D.   Primary key

15: Which of the following in true regarding Null Value?

A.   Null < 0

B.   Null > 0

C.   Null = 0

D.   Null < > 0

16: A _____ DBMS distributes data processing tasks between the workstation and a network server.

A.   Hierarchical

B.   Relational

C.   Network

D.   Client server

E.   None of these

17: In SQL, which command(s) is(are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction?

A.   None of these

B.   CREATE SCHEMA

C.   All of these

D.   CREATE CLUSTER

E.   CREATE PACKAGE

18: If every non-key attribute is functionally dependent on the primary key, the relation will be in

A.   Third Normal Form

B.   Fourth Formal Form

C.   Second Normal Form

D.   First Normal Form

19: Which of the following is not a level of data abstraction?

A.   View Level

B.   Logical Level

C.   Physical Level

D.   Critical Level

20: Which of the following in true regarding Referential Integrity?

A.   Every primary-key value must match a primary-key value in an associated table

B.   Every foreign-key value must match a foreign-key value in an associated table

C.   Every primary-key value must match a foreign-key value in an associated table

D.   Every foreign-key value must match a primary-key value in an associated table

21: ____ is used to reveal the meaning of data.

A.   Relationship

B.   Information

C.   Composite

D.   Unstructured

22: ______ databases are the most frequently used electronic databases.

A.   Flat-file

B.   Object-oriented

C.   Multidimensional

D.   Relational

23: ________ databases are the most commonly used electronic databases.

A.   Flat-file

B.   Object-oriented

C.   Multidimensional

D.   Relational

24: ________ involves searching for patterns and relationships among data.

A.   Data mining

B.   Data marting

C.   Data processing

D.   Knowledge management

E.   Data warehousing

25: ________ is used to ensure that data is organized most efficiently in a database.

A.   Artificial intelligence

B.   Centralization

C.   Relational

D.   Normalization

26: _________ maintains information about various types of objects, events, people, and places.

A.   Web analytics

B.   Infographics

C.   Database

D.   Classification

27: __________ are the most commonly used database clients.

A.   Operational

B.   Incorrect

C.   Browsers

D.   Primary key

28: A ____ database supports data distributed across several different sites.

A.   Desktop

B.   Workgroup

C.   Distributed

D.   Enterprise

29: A ____ is a program that lets computer users create and access a collection of organized data.

A.   Database management system

B.   Data warehouse

C.   Database

D.   Management system

30: A ______ is the highest level of data hierarchy.

A.   Bits

B.   Character

C.   Database

A.   Database

B.   Spreadsheet

C.   Memo

D.   Macro

A.   Database

B.   Spreadsheet

C.   Memo

D.   Macro

33: A ________ is a highly structured collection of data values organized into separate tables.

A.   False

B.   Database

C.   Data cube

D.   Timeline

A.   Field

B.   Table

C.   Primary Key

D.   Report

35: A consistent database is ____.

A.   One in which all tables have foreign keys

B.   One in which all data integrity constraints are satisfied

C.   One in which all data integrity constraints are not satisfied

36: A data ____ table describes the fields you plan to maintain in a table.

A.   Dialog box

B.   Two or four

C.   Definition

D.   Contains

37: A database administrator (dba) is responsible for _____.

A.   True

B.   Used for analytical purposes.

C.   Hierarchy

D.   Developing recovery procedures in case data is lost or corrupted

38: A distributed _____ can reference several different local or remote data processing sites.

A.   Request

B.   Site

C.   Data location

D.   Transaction

39: A(n) ____ synonym is used by others to access an individual's database objects.

A.   PUBLIC

B.   CURRVAL

C.   PUBLCI

D.   PRIVATE

40: A(n) ______ is an item that contains data, as well as the actions that read or process the data.

A.   Attribute

B.   Table

C.   Object

D.   Field

41: After a dbms detects a deadlock, the ____ should break the deadlock.

A.   First user

B.   Second user

C.   Database administrator

D.   DBMS

42: An attribute is also referred to as a ________.

A.   Field

B.   Data mart

C.   False

D.   True

43: An electronic storage file where firms keep customer information is known as a(n) ________.

A.   Database

B.   Worksheet

C.   Program

44: An entity that exists to implement a many-to-many relationship is called a(n) ____.

A.   Weak entity

B.   Minimum

C.   Composite entity

D.   Independent entity

45: Another name for a composite entity is a(n) _____ entity.

A.   Bridge

B.   False

C.   Attribute

D.   Unique

46: Another term for a database row is a(n) ________.

A.   Attribute

B.   Primary key

C.   Hadoop

D.   Record

47: As part of a dbms, a(n) _________ documents information about a database.

A.   Data cleansing

B.   Data mining

C.   Data warehouse

D.   Data dictionary

48: Big data analytics is usually associated with ________ services.

A.   Decision support

B.   Data warehouse

C.   Office support

D.   Management information

49: A ____ is a group of interrelated files.

A.   False

B.   The System Development Life Cycle

C.   True

D.   Database

50: Browser-based applications ________.

A.   Support querying using graphics

B.   Process queries using C++

C.   Are thick-client applications

D.   Can only display static content

51: Columns that are keys to different tables than the ones in which they reside are called ________.

A.   Database design

B.   Foreign keys

C.   Attributes

D.   Relationship

52: Compared with character-based formats, a _____ offers a more efficient storage method.

A.   Decimal

B.   Unary

C.   Tertiary

D.   Binary

53: Complete categories are represented by ____ line(s) below the category symbol.

A.   Two

B.   Maximum

C.   False

D.   True

54: Constraints on the minimum number of entities in a relationship are called ________ cardinalities.

A.   Entity

B.   Minimum

C.   True

D.   Attributes

55: Design view is used to ____ a table.

A.   Cannot be undeleted with the Undo command.

B.   Click the Build button in the Input Mask property box for the desired field

C.   Limit To List property box to Yes.

D.   Create or modify the structure of

56: Each attribute of an entity becomes a(n) ________ of a table.

A.   The key contains a lengthy text field

B.   Primary key

C.   Required

D.   Column

57: Each category of information in a database is called a(n) ____.

A.   Data file

B.   Attribute

C.   Convenience

D.   Ecommerce

58: Each table _____ represents an attribute.

A.   Column

B.   Row

C.   Dimension

D.   Value

A.   Inner

B.   True

C.   Index

D.   Null

60: Fields that contain numbers that are not used in calculations should be set to ________.

A.   Short text

B.   Long text

C.   Text

61: File ______ refers to the procedures that keep data current.

A.   Maintenance

B.   Attribute

C.   Multimedia database

D.   Default

62: From a structural point of view, 3nf is better than _____.

A.   1NF

B.   3NF

C.   4NF

D.   BCNF

E.   3NF and BCNF

63: Granularity refers to ____.

A.   The size of a table

B.   The level of detail represented by the values stored in a table's row

C.   The number of attributes in a table

D.   The number of rows in a table

64: If a primary key combines two or more fields, then it is called a _____.

A.   Candidate key

B.   Foreign key

C.   Composite key

D.   Dedicated key

65: In a client/server system, users access the database through ____.

A.   Servers

B.   Clients

C.   None of these

A.   False

B.   Field

C.   True

D.   File

67: In a database, a table is formally referred to as a ________.

A.   Matrix

B.   Field

C.   Record

D.   Relation

68: In a database, the term ________ is synonymous with a category of information.

A.   Matrix

B.   Field

C.   Record

D.   Relation

69: In a database, when data items disagree with one another, it leads to a(n) ________.

A.   Processing the database

B.   Data that describe data

C.   Data integrity problem

D.   Lists involve data with multiple themes

70: In a file oriented information system a security file ____

A.   Is a temporary file created by an information system for a single task

B.   Is created and saved for backup and recovery purposes

C.   Is performed on two or more fields to ensure that they are consistent or reasonable when considered together

D.   Identifies values that are questionable, but not necessarily wrong

71: In a file-oriented information system, a work file ____.

A.   Stores relatively permanent data about an entity

B.   Logical Design

C.   Is a temporary file created by an information system for a single task

D.   Is created and saved for backup and recovery purposes

72: In a general sense, ____________ refers to all the non-hardware components of a digital device.

A.   Software

B.   Technology

C.   Computer

D.   None of these

73: In a student database, a column called lastname would be an example of a(n) _____________.

A.   Attribute

B.   Relationship

C.   File

D.   Record

74: In a student database, a good key field for a record would be a ______

A.   Importing

B.   Student ID#.

C.   Columns

D.   Voice/video

75: In comparison with a flat file system, _____ in a database.

A.   Storage space is reduced

B.   Programs and data are interdependent

C.   Complex requests cannot be handled easily

D.   Data redundancy is introduced

76: In database systems, a _____ refers to a list of data.

A.   File

B.   Column

C.   Field

D.   Row

E.   Record

77: In indexed storage, when a file is created, the pointers in the index block are all set to ____.

A.   Working

B.   Relative

C.   Null

D.   Is truncated

78: In the accompanying figure, any field that serves as a primary key is called a _____.

A.   Candidate key

B.   Foreign key

C.   Combination key

79: In the sql language, the ________ statement is used to make table definitions.

A.   Create index

B.   Create table

C.   Create session

D.   Select

80: In the world of databases, a(n) ____ refers to a collection of data fields.

A.   CREATE *

B.   Record *

C.   Related *

D.   Database

81: In this text, boyce-codd normal form is the same as ____.

A.   First normal form

B.   Inconsistent data

C.   Concatenation

D.   Third normal form

82: Individual database tables are often referred to as ____.

A.   Attributes

B.   Front end

C.   Maintenance

D.   Flat Files

83: Insert into is an example of ________ code.

A.   DDL

B.   DML

C.   DCL

D.   DNL

84: Lock ____ indicates the level of lock use.

A.   Granularity

B.   Atomicity

C.   Page-level

D.   Deadlock

85: Many programs today use ______ on a webpage as their front end.

A.   True

B.   False

C.   Forms

D.   Field

86: Metadata are ________.

A.   Error logs of databases

B.   Data that are encrypted

C.   Data that describe data

D.   Codes used for server-side processing

87: Microsoft access can best be described as ____ software.

A.   Objects

B.   [Shift][Tab]

C.   Autonumber

D.   Database

88: Most decision-support data are based on historical data obtained from ____.

A.   Operational databases

B.   Data warehouses

C.   Enterprise databases

89: Most designers consider the bcnf as a special case of the ____.

A.   3NF

B.   Candidate

C.   3NF

D.   1NF

90: Odbc works on the _____ operating system.

A.   DataAdapter

B.   ActiveX

C.   Command

D.   Windows

91: One column of a table in a relational database is called a(n) ____.

A.   Tuple​

B.   Table

C.   Primary key

D.   Attribute

92: One of the important properties of a column is whether or not it is ________.

A.   Creating a foreign key

B.   Required

C.   Primary key

D.   Improve performance

93: Opening a(n) ________ file creates a file on disk and allows the program to write data to it.

A.   In

B.   Out

C.   Output

D.   Input

E.   None of the above

94: Potential problems in the design of a relational database are known as ____.

A.   ​primary key

B.   Update anomalies

C.   Repeating groups

D.   Nonkey attribute

95: Rather than deleting old data, it can be moved to a data __________.

A.   False

B.   True

C.   Dashboard

D.   Archive

96: Reducing redundant data helps improve the _____ of the database.

A.   Accuracy

B.   Look and feel

C.   Formatting

D.   Speed

97: Referential integrity is normally enforced by the ____.

A.   Pplication programmer

B.   Database management system

C.   Operating system

D.   User

98: Relational databases represent relationships using ________.

A.   Foreign keys

B.   File systems

C.   Metadata

D.   Primary keys

99: Relational tables need to be ______________ to help avoid duplicate data.

A.   Attribute

B.   Referential

C.   Data mining

D.   Normalized

100: Some attributes are classified as ____.

A.   Simple

B.   Defined

C.   Complex

D.   Grouped