Recent
Final
Term
Papers MCQ’s
|
CS403 – Database Management Systems
Solved by Abdul
Fahd MCS-3rd ~ Momie
MCS-4th ~ Saif BSCS-4th
|
1. Which of the following
is true about NOT NULL constraint?
Enforce domain integrity.
Limit the values that can
be placed in a column.
Prevents
any actions that would destroy links between tables with the corresponding data
values (correct)
Enforces the uniqueness of
the values in a set of columns.
2. Which of the following
constraints enforces Referential Integrity?
FOREIGN KEY
CHECK
PRIMARY KEY
SECONDARY
KEY (correct) //Referential
integrity > Secondary key
3. An Entity is
defined when the database
is physically constructed in DBMS
a specific type such as an
integer, text, date, logical etc
defined by DBMS
basic
building block of the E-R data model (correct)
4. _____________ is also
known as Community View of Database.
External Schema
Conceptual
Schema (correct)
User views
Internal Schema
5. On magnetic media, data
is stored in ______________
Text
Images
Binary
format (correct)
Tables
6. SQL is an _____________
standard computer language
ANSI (correct)
General
Cold fusion
Interactive
7. Which of the following
is one of the purposes of using DDL commands?
Inserting records into
databases
Updating records into
databases
Manipulating databases
creating
and destroying databases (correct)
8. _________ is used to
create and destroy database and database objects
DDL
page 196 (correct)
DML
DCL
ERD
9.___________ is used to
read, write, and remove the data from a database
SQL page194 (correct)
ERD
ANSI
Data Model
10. Which of the following
gives all the fields from employee table named as EMP?
select
* from EMP (correct)
select emp* from EMP
select emp_id where EMP
select * where EMP
11. Which of the following
statements are Data Definition Language commands?
GRANT
GRANT
INSERT
196 (correct)
UPDATE
12. The ER- data model is
an example of:
Physical database design
Logical database design
Relational database design
Conceptual
database design (correct)
13. Consider two sets A
and B. A contains 3 elements and B contains 4. How many elements do their
Cartesian product
contains?
12 (correct)
9
16
7
14. Identify the factor
which enforces a relation in 3NF?
Relation is in 2nd NF and
every non-key attribute is fully functionally dependent on primary key.
Relation is in 2nd NF and
every non-key attribute is transitive dependent on super key.
The domain of attribute
may include multiple values.
Relation
is in 2nd NF and every non-key attribute is non-transitively dependent on
primary key. (correct)
15. In 1st Normal Form, we
remove _____
Repeating
Groups page (correct)
Transitive Dependency
Functional Dependency
Multi-valued Dependency
16. Which of the following
is INCORRECT regarding De-normalization?
It is the process of
attempting optimization of Database.
It is
a technique to move from lower to higher normal forms of database modeling page 187
In this process, it is
required to add redundant data.
It enhances the
performance of DB.
17. “Select * from
STUDENT, DEPARTMENT” is an example of.
Cartesian
Join (correct)
Inner Join
Outer Join
Full Outer Join
18. Which of the following
is not a DDL Command?
Create table
Alter table
Insert
into (correct)
Create database
19. Which of the following
commands is used to TRUNCATE the table named STUDENT?
TRUNCATE
TABLE STUDENT (correct)
TABLE TRUNCATE STUDENT
TABLE STUDENT TRUNCATE
STUDENT TABLE TRUNCATE
20. Suppose there are 5
rows and 4 columns in TABLE1 and 6 rows and 7 columns in TABLE2; what is
the size of the Cartesian
product incase of CROSS JOIN between these two tables?
30 (correct) RxC
35
24
28
21. Which of the following
is not a feature of effective interface?
Effective interfaces can
require more work to implement
An effective user
interface minimizes the time users require to learn and implement the system
It helps users to
accomplish their tasks and otherwise gets out of the way
An
effective interface imposes its requirements on users (correct)
22. Which of the following
is not correct about input forms?
Provide an easy,
effective, efficient way to enter data into a table
Especially useful when the
person entering the data is not familiar with the inner workings
Provide different controls
to add data into the tables
One
input forms can populate one table at a time (correct)
23. ______ is a control
that presents a set of choices from which a user can select one or more items;
items can be text,
graphics, or both.
Button
page 243 (correct)
List box
Text input
4. The main memory of a
computer system is also known as
ROM
RAM (correct)
PROM
Hard disk
25. ________ is not a
feature of hash access Report.
indexes
to search or maintain (correct)
Very fast direct access
Inefficient sequential
access
Use when direct access is
needed, but sequential access is not
26. ________ is
disadvantage of chaining technique to handle the collisions.
Unlimited Number of
elements
Fast re-hashing
Overhead
of multiple linked lists (correct)
Maximum number of elements
must be known
27. _______ is advantage
of Re-Hashing technique to handle the collisions.
Collisions don’t use
primary table space
Unlimited number of
elements
Fast
access through use of main table space (correct)
Overhead of multiple
linked lists
28. Which of the following
is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the
victim and depending on the system the transaction may or may not be
started again
automatically.
Picking
a list of all previously completed transactions and undoing all the updates. (correct)
Rollback `victim'
transaction and restart it.
29. Which of the following
is true about the views?
View can only show few
attributes of a table
View can not be used for
retrieving data
View can not be used as
security mechanisms
We
can customize the order of the table fields through Views (correct)
30. Which of the following
is not a type of VIEWS?
Materialized View
Simple Views
Complex View
Cross
Reference View (correct)
31. A file with ______
records, with sequential access file, an average of _______ key comparisons are
necessary.
10000, 5500
10000,
5000 (correct)
10000, 4500
10000, 500
32. A perfect hash
function map a key to distinct location having search time _________.
O(1) (correct)
O(n)
O(n+1)
O(n-1)
33. Which of following is
INCORRECT about “Materialized Views”?
These are suitable in
“Data Warehouses”.
These
are schema objects which can be use to summaries the data. (correct)
They can not be
partitioned.
Their existence is
transparent to SQL applications and users.
34. ____________ is used
to detect the dead lock.
Wait-for
graph (correct)
Cross Reference Matrix
Inner Join
Clustered Index
35. Wait-for graph is
maintained by __________
Lock
manager (correct)
Index Manager
View Manager
Constraint Manager
36. Which of the following
serves as reference point in the log file?
Constraints
Relations
Check
points (correct)
Relationships
37. -------------- occurs
when multiple users want to update same object at the same time.
Lost
Update Problem (correct)
Uncommitted Update Problem
Inconsistent Analysis
Problem
Lost of Joins Problem
38. After execution of
“commit” statement, ____________ is updated first.
Database
Buffer (correct)
Clustered-Index
Non-Clustered Index
Application Program
39. To select the range
while creating Indexes, the operator that is not used is _____.
Equals
to (==). (correct)
Less than (<)
And (&&)
Between
40. Which of the following
constraints enforces Entity Integrity?
PRIMARY
KEY (correct)
FOREIGN KEY
CHECK
NOT NULL
1. The property of ____
enables an entity subtype to hold the properties of its super type.
Null Constraint
Integrity
Inheritance (correct)
Uniqueness
2. Which of the following
most certainly implies the need for an entire table to implement?
A binary relationship 40
A
ternary relationship (correct)
A recursive relationship
An identifying
relationship
3. “A shared collection of
logically related data” is known as
Database
(correct)
File Processing System
Program and Data
Interdependence
DBMS
4. On magnetic media, data
is stored in ______________
Text
Images
Binary
format (correct)
Tables
5. Which of the following
is one of the purposes of using DDL commands?
inserting records into
databases
updating records into
databases
manipulating databases
creating
and destroying databases 196 (correct)
6. _________ is used to
create and destroy database and database objects
ERD
DCL
DDL (correct)
DML
7. Which of the following
is used to add or drop columns in an existing table?
ALTER
206 (correct)
HAVING
SELECT
THEN
8. The ____ constraint
specifies whether each entity super type occurrence must also be a member of at
its one subtype.
Total
completeness (correct)
Specialization
Uniqueness
Inheritance
9. Which of the following
is a correct way to implement many-to-many cardinality in a binary relationship
while designing tables?
Using
a third table with the keys from both the tables forming the composite primary
key of third
table.
(correct)
By splitting the data into
five tables with primary key and foreign key relationships.
By splitting the data into
five tables with primary key and foreign key relationships.
By creating three tables
and linking them without PK (Primary Key) and FK (Foreign Key).
10. Which of the following
is INCORRECT regarding De-normalization?
It is the process of
attempting optimization of Database.
It is
a technique to move from lower to higher normal forms of database modeling. (correct)
In this process, it is
required to add redundant data.
It enhances the performance
of DB.
11. Hash Partitioning is
applied on _______.
Rows
Columns
Algorthim
(correct)
Attributes
12. _____________ is used
to sort the result set in ascending or descending order
Group by Clause
From Clause
Where Clause
Order
by Clause 220 (correct)
13. Which of the following
SQL Function does not use input parameter?
LOWER
UPPER
LEN
CURRENT_TIME
221 (correct)
14. “Select * from
STUDENT, DEPARTMENT” is an example of
Cartesian
Join 225 (correct)
Inner Join
Outer Join
Full Outer Join
15. Which of the following
is not a DDL Command?
Create table
Alter table
Insert
into (correct)
Create database
16. Which of the following
commands is used to drop the table named STUDENT?
DROP
TABLE STUDENT (correct)
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP
17. Which of the following
is the correct syntax for SELECT statement?
SELECT
column_name(s) FROM table_name (correct)
SELECT FROM table_name
column_name(s)
FROM SELECT column_name(s)
table_name
FROM table_name SELECT
column_name(s)
18. Which of the following
specifies the tables, which we access in the query?
SELECT
Clause 212 (correct)
FROM Clause
WHERE Clause
ORDER BY Clause
19. Procedure of finding
the size of Cartesian Product is _____
The number of columns in
the first table multiplied by the number of rows in the second table.
The number of rows in the
first table multiplied by the number of columns in the first table.
The
number of rows in the first table multiplied by the number of rows in the
second
table.
(correct) RxC
The number of columns in
the first table multiplied by the number of columns in the second table
20. Which of the following
is not a type of user interface?
Graphical User Interface
(GUI)
Forms
Database
Schema 240 (correct)
Text based Interface
21. ________ is an example
of volatile memory.
RAM …> RAM is a volatile memory (correct)
ROM
FLASH MEMORY
CPU
22.Which of the following
is the correct way of removing the Index called branchNoIndex?
DROP
INDEX branchNoIndex; (correct)
APPEND INDEX
branchNoIndex;
REMOVE INDEX
branchNoIndex;
DEL INDEX branchNoIndex;
23. Which of the following
is incorrect regarding Indexes?
It
can not be created on composite attributes. (correct) //it can be created..
Index can be defined even
when there is no data in the table.
It support Range
selections.
It can be created using
‘Create Index’ statement
24. Which of the following
is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the
victim and depending on the system the transaction may or may not be started again
automatically.
Picking
a list of all previously completed transactions and undoing all the updates. Page 323 (correct)
Rollback `victim'
transaction and restart it.
25. A Table can have
___________ clustered index (es).
Only
one (correct)
Only two
More than two
Only three
26. Which of the following
is true about the views?
View can only show few
attributes of a table
View can not be used for
retrieving data
View can not be used as
security mechanisms
We
can customize the order of the table fields through Views (correct)
27. Which of the following
Command creates a view named ST-LIST on STUDENT table to show all the
columns?
CREATE
VIEW ST_LIST AS SELECT * FROM STUDENT 284 (correct)
SELECT * FROM STUDENT VIEW
ST_LIST
CREATE ST_LIST VIEW AS
STUDENT
SELECT * FROM STUDENT TO
ST_LIST
28. __________ must
identify a record in the table, uniquely.
Key (correct)
SQL Statement
Index
Hash Algorithm
29. ___________ manages
mass storage devices like hard disks and tape drive.
Index
Operating
System (correct)
RAID
Sequential File Access
30. A perfect hash
function map a key to distinct location having search time _________.
O(1) (correct)
O(n)
O(n+1)
O(n-1)
31. Which of the following
is not the property of Transaction?
Atomicity
Consistency
Redundancy
291 (correct)
Durability
32. Dead Lock can be
prevented by giving each transaction a ___________.
Name
Clustered Index
Cartesian Join
Priority
299 (correct)
33. While recovering data,
which of the following files does a Recovery Manager examines at first?
Clustered Index
Log
file (correct)
Data dictionary
Metadata
34. Which of the following
serves as reference point in the log file?
Constraints
Relations
Check
points (correct)
Relationships
35. -------------- occurs
when multiple users want to update same object at the same time.
Uncommitted Update Problem
Inconsistent Analysis
Problem
Lost of Joins Problem
Lost
Update Problem 308 (correct)
36. After execution of
“commit” statement, ____________ is updated first.
Database
Buffer (correct)
Clustered-Index
Non-Clustered Index
Application Program
37. It is not necessary
for any super type entity to have its entire instance set to be associated with
any of the subtype entity, is called as ______________.
Partial
Completeness 103 (correct)
Disjoint Overlap
Complete Overlap
Total Completeness
38. R X θ S, If R and S are relations and θ is a ______.
Table Name
Attributes
Primary Key
Condition
(correct)
39. If D --> E, F then
D --> E and D --> F.
This inference rules is
called as _______.
Transitivity
Additive
Projectivity
(correct)
Augmentation
40. Which of the following
constraints enforces Entity Integrity?
PRIMARY
KEY (correct) // A primary key enforce
entity integrity and a secondary enforce referential.
FOREIGN KEY
CHECK
NOT NULL
1. Which of the following
most certainly implies the need for an entire table to implement?
A binary relationship
A
ternary relationship (correct)
A recursive relationship
An identifying
relationship
2. “Database System” is
the combination of_________________.
Database
and DBMS (correct)
Database and Data
Data and Information
Operating System and
Database
3. End User directly
interact with _______________
External
Schema page: 35 (correct)
Conceptual Schema
Internal Schema
Core of Database
Architecture
4. _____________ is also
known as Community View of Database.
External Schema
Conceptual
Schema (correct)
User views
Internal Schema
5. On magnetic media, data
is stored in ______________
Text
Images
Binary
format (correct)
Tables
6. _____________ contains
data about all the Databases in DBMS.
Data
Dictionary (correct)
Schema
Cross Reference Matrix
Conceptual Data Model
7.In which of the
following situations, Clustering is suitable:
Frequently updating
Relatively
static (correct)
Frequently deletion
Relatively dynamic
8. SQL is an _____________
standard computer language
ANSI (correct)
General
Cold fusion
Interactive
9. Which of the following
statements creates a database named COMPANY.
CREATE
DATABASE COMPANY (correct)
CREATE DB company
ADD DATABASE company
CREATE company DATABASE
10. ___________ is used to
read, write, and remove the data from a database
SQL 194 (correct)
ERD
ANSI
Data Model
11. Which of the following
is used to add or drop columns in an existing table?
ALTER
(correct)
HAVING
SELECT
THEN
12. Which of the following
SQL keywords is not used with DDL statements?
Table
234 (correct)
Update
Create
Create
13. Which of the following
statements are DML commands?
ALTER
CREATE
INSERT
GRANT
(correct)
14. The ____ constraint
specifies whether each entity supertype occurrence must also be a member of at
its one subtype.
Total
completeness (correct)
Specialization
Uniqueness
Inheritance
15. Which of the following
is not a DDL Command?
Create table
Alter table
Insert
into (correct)
Create database
16. Which of the following
commands is used to drop the table named STUDENT?
DROP
TABLE STUDENT 208 (correct)
TABLE STUDENT DROP
TABLE DROP STUDENT
STUDENT TABLE DROP
17.If a relation contains
single Key, the relation is automatically in _______.
1NF
2NF (correct)
3NF
4NF
18.Which of the following
is not a type of user interface?
Graphical User Interface
(GUI)
Forms
Database
Schema (correct)
Text based Interface
19. Which of the following
is not related with Browser based forms development?
HTML
ASP
Front Page
Dev C
(correct)
20. Which of the following
is the activity, which is not performed during the development of application
programs?
Data input programs
Editing
Display
Data
Collection (correct)
21. Which of the following
is not correct about input forms?
Provide an easy,
effective, efficient way to enter data into a table
Especially useful when the
person entering the data is not familiar with the inner workings
Provide different controls
to add data into the tables
One
input forms can populate one table at a time (correct)
22. _______ is a control
that users click to perform an action.
Input form
Report
Button (correct)
Text box
23. ________ is
disadvantage of chaining technique to handle the collisions.
Unlimited Number of
elements
Fast re-hashing
Overhead
of multiple linked lists (correct)
Maximum number of elements
must be known
24. What is the impact of
setting multiple indexes for the same key?
Multiple indexes for the
same key can not be set
It
increases efficiency (correct)
It decreases efficiency
It will increase
complexity as the access time will be increased
25. Which of the following
is the correct way of removing the Index called branchNoIndex?
DROP
INDEX branchNoIndex; (correct)
APPEND INDEX
branchNoIndex;
REMOVE INDEX
branchNoIndex;
DEL INDEX branchNoIndex;
26. Which of the following
is NOT a part of Deadlock Resolution?
Choose a victim
A message is passed to the
victim and depending on the system the transaction may or may not be started again
automatically.
Picking
a list of all previously completed transactions and undoing all the updates.
Rollback `victim'
transaction and restart it.
27. Which of the following
is true regarding Index?
Index
can only be created for a single table in database 262 (correct)
Index can maximum be
created for two tables in database
Index can only be created,
when a database has at least 3 tables
Index can be created for
every table in the database
28. Which of the following
is not a type of VIEWS?
Materialized View
Simple Views
Complex View
Cross
Reference View (correct)
29. Which of the following
Command creates a view named ST-LIST on STUDENT table to show all the
columns?
CREATE
VIEW ST_LIST AS SELECT * FROM STUDENT (correct)
SELECT * FROM STUDENT VIEW
ST_LIST
CREATE ST_LIST VIEW AS
STUDENT
SELECT * FROM STUDENT TO
ST_LIST
30. __________ must
identify a record in the table, uniquely.
Hash Algorithm
Key 260 (correct)
SQL Statement
Index
31. ___________ manages
mass storage devices like hard disks and tape drive.
Index
Operating
System (correct)
RAID
Sequential File Access
32.A file with ______
records, with sequential access file, an average of _______ key comparisons are
necessary.
10000, 5500
10000,
5000 (correct)
10000, 4500
10000, 500
33. A perfect hash
function map a key to distinct location having search time _________.
O(1) (correct)
O(n)
O(n+1)
O(n-1)
34. Dead Lock can be
prevented by giving each transaction a ___________.
Name
Clustered Index
Cartesian Join
Priority
(correct)
35. Wait-for graph is
maintained by __________
Lock
manager (correct)
Index Manager
View Manager
Constraint Manager
36. Which of the following
serves as reference point in the log file?
Constraints
Relations
Check
points (correct)
Relationships
37. -------------- occurs
when multiple users want to update same object at the same time.
Uncommitted Update Problem
Inconsistent Analysis
Problem
Lost of Joins Problem
Lost
Update Problem (correct)
38. After execution of
“commit” statement, ____________ is updated first.
Database
Buffer (correct)
Clustered-Index
Non-Clustered Index
Application Program
39. _______________ are
called participants, when enrolled in a relationship.
Attributes
Relations
Entities
(correct)
Keys
40. Which of the following
constraints enforces Entity Integrity?
PRIMARY
KEY (correct)
FOREIGN KEY
CHECK
NOT NULL
ya answer correct hain 100 precent ya apna toor per check krna ki zarort hai?
ReplyDeleteThankyou it help me alot to find the correct quiz
ReplyDeleteAlso check the this forum it help alot
https://vustudentspk.com/