Skip to main content

CS403 Database Management Systems Finalterm MCQ's (Solved)


Recent Final Term Papers MCQ’s
CS403 – Database Management Systems
 Solved by Abdul Fahd MCS-3rd ~ Momie MCS-4th ~ Saif BSCS-4th

1. Which of the following is true about NOT NULL constraint?
Enforce domain integrity.
Limit the values that can be placed in a column.
Prevents any actions that would destroy links between tables with the corresponding data values (correct)
Enforces the uniqueness of the values in a set of columns.

2. Which of the following constraints enforces Referential Integrity?
FOREIGN KEY
CHECK
PRIMARY KEY
SECONDARY KEY                    (correct)         //Referential integrity > Secondary key

3. An Entity is
defined when the database is physically constructed in DBMS
a specific type such as an integer, text, date, logical etc
defined by DBMS
basic building block of the E-R data model                        (correct)

4. _____________ is also known as Community View of Database.
External Schema
Conceptual Schema              (correct)
User views
Internal Schema

5. On magnetic media, data is stored in ______________
Text
Images
Binary format                        (correct)
Tables

6. SQL is an _____________ standard computer language
ANSI                (correct)
General
Cold fusion
Interactive

7. Which of the following is one of the purposes of using DDL commands?
Inserting records into databases
Updating records into databases
Manipulating databases
creating and destroying databases                         (correct)

8. _________ is used to create and destroy database and database objects
DDL page                    196                  (correct)
DML
DCL
ERD

9.___________ is used to read, write, and remove the data from a database
SQL                  page194                      (correct)
ERD
ANSI
Data Model

10. Which of the following gives all the fields from employee table named as EMP?
select * from EMP                 (correct)
select emp* from EMP
select emp_id where EMP
select * where EMP

11. Which of the following statements are Data Definition Language commands?
GRANT
GRANT
INSERT                        196                  (correct)
UPDATE

12. The ER- data model is an example of:
Physical database design
Logical database design
Relational database design
Conceptual database design                        (correct)

13. Consider two sets A and B. A contains 3 elements and B contains 4. How many elements do their
Cartesian product contains?
12                    (correct)
9
16
7

14. Identify the factor which enforces a relation in 3NF?
Relation is in 2nd NF and every non-key attribute is fully functionally dependent on primary key.
Relation is in 2nd NF and every non-key attribute is transitive dependent on super key.
The domain of attribute may include multiple values.
Relation is in 2nd NF and every non-key attribute is non-transitively dependent on primary key. (correct)

15. In 1st Normal Form, we remove _____
Repeating Groups page                    (correct)
Transitive Dependency
Functional Dependency
Multi-valued Dependency

16. Which of the following is INCORRECT regarding De-normalization?
It is the process of attempting optimization of Database.
It is a technique to move from lower to higher normal forms of database modeling   page 187
In this process, it is required to add redundant data.
It enhances the performance of DB.

17. “Select * from STUDENT, DEPARTMENT” is an example of.
Cartesian Join                        (correct)
Inner Join
Outer Join
Full Outer Join

18. Which of the following is not a DDL Command?
Create table
Alter table
Insert into                  (correct)
Create database

19. Which of the following commands is used to TRUNCATE the table named STUDENT?
TRUNCATE TABLE STUDENT              (correct)
TABLE TRUNCATE STUDENT
TABLE STUDENT TRUNCATE
STUDENT TABLE TRUNCATE

20. Suppose there are 5 rows and 4 columns in TABLE1 and 6 rows and 7 columns in TABLE2; what is
the size of the Cartesian product incase of CROSS JOIN between these two tables?
30                    (correct)         RxC
35
24
28

21. Which of the following is not a feature of effective interface?
Effective interfaces can require more work to implement
An effective user interface minimizes the time users require to learn and implement the system
It helps users to accomplish their tasks and otherwise gets out of the way
An effective interface imposes its requirements on users                        (correct)

22. Which of the following is not correct about input forms?
Provide an easy, effective, efficient way to enter data into a table
Especially useful when the person entering the data is not familiar with the inner workings
Provide different controls to add data into the tables
One input forms can populate one table at a time                       (correct)

23. ______ is a control that presents a set of choices from which a user can select one or more items;
items can be text, graphics, or both.
Button                        page 243                     (correct)
List box
Text input

4. The main memory of a computer system is also known as
ROM
RAM                (correct)
PROM
Hard disk

25. ________ is not a feature of hash access Report.
indexes to search or maintain                      (correct)
Very fast direct access
Inefficient sequential access
Use when direct access is needed, but sequential access is not

26. ________ is disadvantage of chaining technique to handle the collisions.
Unlimited Number of elements
Fast re-hashing
Overhead of multiple linked lists                 (correct)
Maximum number of elements must be known

27. _______ is advantage of Re-Hashing technique to handle the collisions.
Collisions don’t use primary table space
Unlimited number of elements
Fast access through use of main table space                      (correct)
Overhead of multiple linked lists

28. Which of the following is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the victim and depending on the system the transaction may or may not be
started again automatically.
Picking a list of all previously completed transactions and undoing all the updates.   (correct)
Rollback `victim' transaction and restart it.

29. Which of the following is true about the views?
View can only show few attributes of a table
View can not be used for retrieving data
View can not be used as security mechanisms
We can customize the order of the table fields through Views               (correct)

30. Which of the following is not a type of VIEWS?
Materialized View
Simple Views
Complex View
Cross Reference View                        (correct)

31. A file with ______ records, with sequential access file, an average of _______ key comparisons are
necessary.
10000, 5500
10000, 5000                (correct)
10000, 4500
10000, 500

32. A perfect hash function map a key to distinct location having search time _________.
O(1)                 (correct)
O(n)
O(n+1)
O(n-1)

33. Which of following is INCORRECT about “Materialized Views”?
These are suitable in “Data Warehouses”.
These are schema objects which can be use to summaries the data.                  (correct)
They can not be partitioned.
Their existence is transparent to SQL applications and users.

34. ____________ is used to detect the dead lock.
Wait-for graph                       (correct)
Cross Reference Matrix
Inner Join
Clustered Index

35. Wait-for graph is maintained by __________
Lock manager                        (correct)
Index Manager
View Manager
Constraint Manager

36. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points              (correct)
Relationships

37. -------------- occurs when multiple users want to update same object at the same time.
Lost Update Problem                        (correct)
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem

38. After execution of “commit” statement, ____________ is updated first.
Database Buffer                     (correct)
Clustered-Index
Non-Clustered Index
Application Program

39. To select the range while creating Indexes, the operator that is not used is _____.
Equals to (==).                        (correct)
Less than (<)
And (&&)
Between

40. Which of the following constraints enforces Entity Integrity?
PRIMARY KEY             (correct)
FOREIGN KEY
CHECK
NOT NULL

1. The property of ____ enables an entity subtype to hold the properties of its super type.
Null Constraint
Integrity
Inheritance                 (correct)
Uniqueness

2. Which of the following most certainly implies the need for an entire table to implement?
A binary relationship 40
A ternary relationship                      (correct)
A recursive relationship
An identifying relationship

3. “A shared collection of logically related data” is known as
Database                    (correct)
File Processing System
Program and Data Interdependence
DBMS

4. On magnetic media, data is stored in ______________
Text
Images
Binary format                        (correct)
Tables

5. Which of the following is one of the purposes of using DDL commands?
inserting records into databases
updating records into databases
manipulating databases
creating and destroying databases                         196                  (correct)

6. _________ is used to create and destroy database and database objects
ERD
DCL
DDL                 (correct)
DML

7. Which of the following is used to add or drop columns in an existing table?
ALTER              206                  (correct)
HAVING
SELECT
THEN

8. The ____ constraint specifies whether each entity super type occurrence must also be a member of at its one subtype.
Total completeness               (correct)
Specialization
Uniqueness
Inheritance

9. Which of the following is a correct way to implement many-to-many cardinality in a binary relationship while designing tables?
Using a third table with the keys from both the tables forming the composite primary key of third
table.              (correct)
By splitting the data into five tables with primary key and foreign key relationships.
By splitting the data into five tables with primary key and foreign key relationships.
By creating three tables and linking them without PK (Primary Key) and FK (Foreign Key).

10. Which of the following is INCORRECT regarding De-normalization?
It is the process of attempting optimization of Database.
It is a technique to move from lower to higher normal forms of database modeling. (correct)
In this process, it is required to add redundant data.
It enhances the performance of DB.

11. Hash Partitioning is applied on _______.
Rows
Columns
Algorthim                   (correct)
Attributes

12. _____________ is used to sort the result set in ascending or descending order
Group by Clause
From Clause
Where Clause
Order by Clause                     220                  (correct)

13. Which of the following SQL Function does not use input parameter?
LOWER
UPPER
LEN
CURRENT_TIME                      221                  (correct)

14. “Select * from STUDENT, DEPARTMENT” is an example of
Cartesian Join                        225                  (correct)
Inner Join
Outer Join
Full Outer Join

15. Which of the following is not a DDL Command?
Create table
Alter table
Insert into                  (correct)
Create database

16. Which of the following commands is used to drop the table named STUDENT?
DROP TABLE STUDENT                      (correct)
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP

17. Which of the following is the correct syntax for SELECT statement?
SELECT column_name(s) FROM table_name                      (correct)
SELECT FROM table_name column_name(s)
FROM SELECT column_name(s) table_name
FROM table_name SELECT column_name(s)

18. Which of the following specifies the tables, which we access in the query?
SELECT Clause                        212                  (correct)
FROM Clause
WHERE Clause
ORDER BY Clause

19. Procedure of finding the size of Cartesian Product is _____
The number of columns in the first table multiplied by the number of rows in the second table.
The number of rows in the first table multiplied by the number of columns in the first table.
The number of rows in the first table multiplied by the number of rows in the second
table.              (correct)         RxC
The number of columns in the first table multiplied by the number of columns in the second table

20. Which of the following is not a type of user interface?
Graphical User Interface (GUI)
Forms
Database Schema                  240                  (correct)
Text based Interface

21. ________ is an example of volatile memory.
RAM                …> RAM is a volatile memory                       (correct)
ROM
FLASH MEMORY
CPU

22.Which of the following is the correct way of removing the Index called branchNoIndex?
DROP INDEX branchNoIndex;                       (correct)
APPEND INDEX branchNoIndex;
REMOVE INDEX branchNoIndex;
DEL INDEX branchNoIndex;

23. Which of the following is incorrect regarding Indexes?
It can not be created on composite attributes.                 (correct)         //it can be created..
Index can be defined even when there is no data in the table.
It support Range selections.
It can be created using ‘Create Index’ statement

24. Which of the following is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the victim and depending on the system the transaction may or may not be started again automatically.
Picking a list of all previously completed transactions and undoing all the updates.   Page 323 (correct)
Rollback `victim' transaction and restart it.

25. A Table can have ___________ clustered index (es).
Only one                     (correct)
Only two
More than two
Only three

26. Which of the following is true about the views?
View can only show few attributes of a table
View can not be used for retrieving data
View can not be used as security mechanisms
We can customize the order of the table fields through Views               (correct)

27. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the
columns?
CREATE VIEW ST_LIST AS SELECT * FROM STUDENT                      284                  (correct)
SELECT * FROM STUDENT VIEW ST_LIST
CREATE ST_LIST VIEW AS STUDENT
SELECT * FROM STUDENT TO ST_LIST

28. __________ must identify a record in the table, uniquely.
Key                  (correct)
SQL Statement
Index
Hash Algorithm

29. ___________ manages mass storage devices like hard disks and tape drive.
Index
Operating System                  (correct)
RAID
Sequential File Access

30. A perfect hash function map a key to distinct location having search time _________.
O(1)                 (correct)
O(n)
O(n+1)
O(n-1)

31. Which of the following is not the property of Transaction?
Atomicity
Consistency
Redundancy               291                  (correct)
Durability

32. Dead Lock can be prevented by giving each transaction a ___________.
Name
Clustered Index
Cartesian Join
Priority                       299                  (correct)

33. While recovering data, which of the following files does a Recovery Manager examines at first?
Clustered Index
Log file                        (correct)
Data dictionary
Metadata

34. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points              (correct)
Relationships

35. -------------- occurs when multiple users want to update same object at the same time.
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem
Lost Update Problem                        308                  (correct)

36. After execution of “commit” statement, ____________ is updated first.
Database Buffer                     (correct)
Clustered-Index
Non-Clustered Index
Application Program
37. It is not necessary for any super type entity to have its entire instance set to be associated with any of the subtype entity, is called as ______________.
Partial Completeness                        103                  (correct)
Disjoint Overlap
Complete Overlap
Total Completeness

38. R X θ S, If R and S are relations and θ is a ______.
Table Name
Attributes
Primary Key
Condition                   (correct)

39. If D --> E, F then D --> E and D --> F.
This inference rules is called as _______.
Transitivity
Additive
Projectivity                (correct)
Augmentation

40. Which of the following constraints enforces Entity Integrity?
PRIMARY KEY (correct) // A primary key enforce entity integrity and a secondary enforce referential.
FOREIGN KEY
CHECK
NOT NULL

1. Which of the following most certainly implies the need for an entire table to implement?
A binary relationship
A ternary relationship                      (correct)
A recursive relationship
An identifying relationship

2. “Database System” is the combination of_________________.
Database and DBMS              (correct)
Database and Data
Data and Information
Operating System and Database

3. End User directly interact with _______________
External Schema                    page: 35                      (correct)
Conceptual Schema
Internal Schema
Core of Database Architecture

4. _____________ is also known as Community View of Database.
External Schema
Conceptual Schema              (correct)
User views
Internal Schema

5. On magnetic media, data is stored in ______________
Text
Images
Binary format                        (correct)
Tables

6. _____________ contains data about all the Databases in DBMS.
Data Dictionary                     (correct)
Schema
Cross Reference Matrix
Conceptual Data Model

7.In which of the following situations, Clustering is suitable:
Frequently updating
Relatively static                     (correct)
Frequently deletion
Relatively dynamic

8. SQL is an _____________ standard computer language
ANSI                (correct)
General
Cold fusion
Interactive

9. Which of the following statements creates a database named COMPANY.
CREATE DATABASE COMPANY                     (correct)
CREATE DB company
ADD DATABASE company
CREATE company DATABASE

10. ___________ is used to read, write, and remove the data from a database
SQL                  194                  (correct)
ERD
ANSI
Data Model

11. Which of the following is used to add or drop columns in an existing table?
ALTER              (correct)
HAVING
SELECT
THEN

12. Which of the following SQL keywords is not used with DDL statements?
Table               234                  (correct)
Update
Create
Create

13. Which of the following statements are DML commands?
ALTER
CREATE
INSERT
GRANT                        (correct)

14. The ____ constraint specifies whether each entity supertype occurrence must also be a member of at its one subtype.
Total completeness               (correct)
Specialization
Uniqueness
Inheritance

15. Which of the following is not a DDL Command?
Create table
Alter table
Insert into                  (correct)
Create database

16. Which of the following commands is used to drop the table named STUDENT?
DROP TABLE STUDENT                      208                  (correct)
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP

17.If a relation contains single Key, the relation is automatically in _______.
1NF
2NF                  (correct)
3NF
4NF

18.Which of the following is not a type of user interface?
Graphical User Interface (GUI)
Forms
Database Schema                  (correct)
Text based Interface

19. Which of the following is not related with Browser based forms development?
HTML
ASP
Front Page
Dev C              (correct)

20. Which of the following is the activity, which is not performed during the development of application
programs?
Data input programs
Editing
Display
Data Collection                      (correct)

21. Which of the following is not correct about input forms?
Provide an easy, effective, efficient way to enter data into a table
Especially useful when the person entering the data is not familiar with the inner workings
Provide different controls to add data into the tables
One input forms can populate one table at a time                       (correct)

22. _______ is a control that users click to perform an action.
Input form
Report
Button                        (correct)
Text box

23. ________ is disadvantage of chaining technique to handle the collisions.
Unlimited Number of elements
Fast re-hashing
Overhead of multiple linked lists                 (correct)
Maximum number of elements must be known

24. What is the impact of setting multiple indexes for the same key?
Multiple indexes for the same key can not be set
It increases efficiency                        (correct)
It decreases efficiency
It will increase complexity as the access time will be increased

25. Which of the following is the correct way of removing the Index called branchNoIndex?
DROP INDEX branchNoIndex;                       (correct)
APPEND INDEX branchNoIndex;
REMOVE INDEX branchNoIndex;
DEL INDEX branchNoIndex;

26. Which of the following is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the victim and depending on the system the transaction may or may not be started again automatically.
Picking a list of all previously completed transactions and undoing all the updates.
Rollback `victim' transaction and restart it.

27. Which of the following is true regarding Index?
Index can only be created for a single table in database 262                  (correct)
Index can maximum be created for two tables in database
Index can only be created, when a database has at least 3 tables
Index can be created for every table in the database

28. Which of the following is not a type of VIEWS?
Materialized View
Simple Views
Complex View
Cross Reference View                        (correct)

29. Which of the following Command creates a view named ST-LIST on STUDENT table to show all the
columns?
CREATE VIEW ST_LIST AS SELECT * FROM STUDENT                      (correct)
SELECT * FROM STUDENT VIEW ST_LIST
CREATE ST_LIST VIEW AS STUDENT
SELECT * FROM STUDENT TO ST_LIST

30. __________ must identify a record in the table, uniquely.
Hash Algorithm
Key                  260                  (correct)
SQL Statement
Index

31. ___________ manages mass storage devices like hard disks and tape drive.
Index
Operating System                  (correct)
RAID
Sequential File Access

32.A file with ______ records, with sequential access file, an average of _______ key comparisons are
necessary.
10000, 5500
10000, 5000                (correct)
10000, 4500
10000, 500

33. A perfect hash function map a key to distinct location having search time _________.
O(1)                 (correct)
O(n)
O(n+1)
O(n-1)

34. Dead Lock can be prevented by giving each transaction a ___________.
Name
Clustered Index
Cartesian Join
Priority                       (correct)

35. Wait-for graph is maintained by __________
Lock manager                        (correct)
Index Manager
View Manager
Constraint Manager

36. Which of the following serves as reference point in the log file?
Constraints
Relations
Check points              (correct)
Relationships

37. -------------- occurs when multiple users want to update same object at the same time.
Uncommitted Update Problem
Inconsistent Analysis Problem
Lost of Joins Problem
Lost Update Problem                        (correct)

38. After execution of “commit” statement, ____________ is updated first.
Database Buffer                     (correct)
Clustered-Index
Non-Clustered Index
Application Program

39. _______________ are called participants, when enrolled in a relationship.
Attributes
Relations
Entities                       (correct)
Keys

40. Which of the following constraints enforces Entity Integrity?
PRIMARY KEY             (correct)
FOREIGN KEY
CHECK
NOT NULL


Comments

  1. ya answer correct hain 100 precent ya apna toor per check krna ki zarort hai?

    ReplyDelete
  2. Thankyou it help me alot to find the correct quiz

    Also check the this forum it help alot

    https://vustudentspk.com/

    ReplyDelete

Post a Comment

Please give us your feedback & help us to improve this site.

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end user Not being an accommodating person Isolating IT support people from business users Training the users with dummy data and considering it success             

CS502 Quiz No.4 File 3

There is relationship between number of back edges and number of cycles in DFS Select correct option: Both are equal. Cycles are half of back edges.   Cycles are one fourth of back edges. There is no relationship between back edges and number of cycles .         (Correct) In strong components algorithm, the form of graph is used in which all the vertices of original graph G have been reversed in direction. Select correct option: True                 (Correct)   False In Kruskal's algorithm, the next edge is added to viable set A, if its adding does not induce a/an __________ . Select correct option: Vertex Edge   Cycle               (Correct)   Tree For undirected graph, there is no distinction between forward and back edges. Select correct option: True                 (Correct)   False You have an adjacency list for G, what is the time complexity to compute Graph transpose G^T ? Select correct option: (V+E)             (Corre

CS301 Quiz No.2 Shared by Tayyeba

Binary search algorithm can not be applied to ____ Select correct option: sorted linked list sorted binary trees        ok sorted linear array pointer array During in-order traversal using recursive calls, if we found a node is NULL. It means this node will satisfy following condition. Select correct option: It will not have left child        ok It will not have right child It will not have both left and right children None of given options Identify the data structure which allows deletions at both ends of the list but insertion at only one end. Select correct option: Input-restricted deque Output-restricted deque Priority queues        ok A BST generated from the data in ascending order is ____________. Select correct option: Linear Nonlinear Balanced        ok Un sorted In a program a reference variable, say x, can be declared as Select correct option: int &x ;        ok int *x ; int x ; None of the given options he depth of a complete bina