CS MCQ Questions

Objective Questions on the Database Management System set-8

Pinterest LinkedIn Tumblr Reddit WhatsApp
Here are the collections of solved objective questions on the database management system. You will find MCQ questions about the fundamental of DBMS, relational DBMS, and database normalization.

1. ………………………. is a powerful language for working with RDBMS.
A) Embedded Programs
B) Dynamic Programs
C) Query Language
D) Static Language Programs

2. The file in DBMS is called as ……………… in RDBMS.
A) console
B) schema
C) table
D) object

3. In …………………, we have a strict parent-child relationship only.
A) hierarchical databases.
B) network databases
C) object-oriented databases
D) relational databases

4. Which normal form is considered adequate for relational database design?
A) 2 NF
B) 3 NF
C) 4 NF
D) BCNF

5. What operator tests the column for the absence of data?
A) IS NULL operator
B) ASSIGNMENT operator
C) LIKE operator
D) NOT operator

6. Which is a proper subset designed to support views belonging to different classes of users in order to hide or protect information?
A) Schema
B) Sub-schema
C) Non-schema
D) Non-sub schema

7. Which contains information about a file needed by system programs for accessing file records?
A) File blocks
B) File operators
C) File headers
D) None of these

8. A ……………….. DBMS distributes data processing tasks between the workstation and network server.
A) Network
B) Relational
C) Client-Server
D) Hierarchical

9. The ……………….. refers to the way data is organized in and accessible from DBMS.
A) database hierarchy
B) data organization
C) data sharing
D) data model

10. …………….. is a statement that is executed automatically by the system.
A) trigger
B) assertion
C) durability
D) integrity constraint

We have created a quiz including Objective Questions on the database management system. Please take this quiz to test your knowledge on DBMS fundamentals.

Quiz for Fundamentals of DBMS

 

1. A table can have only one
2. Which of the following is/are the DDL statements?
3. Which one of the following statements is false?
4. Which of the following defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity?
5. Which of the following is the preferred method for enforcing data integrity?
6. What is the full form of DDL in Database Management System?
7. Which database level is closest to the users?
8. If a table has more than one set of attributes that could be chosen as the key, it is called
9. Which of the following enables users to create and maintain a database?
10. Which of the following are used during the operation of the DBMS?
11. DBMS helps to achieve
12. Which of the following databases contains data assisting day-to-day activities of the organization?
13. Which candidate key allows you to uniquely identify each row?
14. Who proposed the process of normalization in DBMS at first?
15. Which of the following clauses specifies a search condition for a group or an aggregate?
16. Which of the following contains information that defines valid values that are stored in a column or data type?
17. Which command is used for entering the specific database?
18. The database schema is written in which of the following languages?
19. Which of the following entity does not have a distinguishing attribute if its own and most are dependent entities?
20. Which character function can be used to return a specified portion of a character string?
21. What is an advantage of the database management approach?
22. What is a set of columns that identifies every row in a table?
23. Which of the following is not a characteristic of a relational database model?
24. Which of the following is used to define the overall design of the database?
25. Data independence means
26. What language requires a user to specify the data to be retrieved without specifying exactly how to get it?
27. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction?
28. Which of the following is a preferred method for enforcing data integrity?
29. What are the different events in Triggers?
30. Which of the following is a utility to capture a continuous record of server activity and provide auditing capability?
31. Which of the following files are used during the operation of the DBMS?
32. What is a set of possible data values?
33. Which table store information about the database or about the system?
34. What is the number of tuples in a relation?
35. Which normal form is considered adequate for relational database design?
36. What is the feature of the relational model?
37. Which of the following databases has only a strict parent-child relationship?
38. Which database is used as a template for all databases created?
39. Which statement is executed automatically by the system?
40. Which of the following is the complex search criteria in the where clause?
41. Which keyword is used to find the number of values in a column?
42. What is a full form of SQL?
43. Which of the following are the ways in which entities can participate in a relationship?
44. In a snapshot, which clause tells Oracle how long to wait between refreshes?
45. In a relational model, relations are also called
46. Which clause is an additional filter that is applied to the result?
47. Which of the following are the properties of entities?
48. Which of the following components is NOT included in the database environment?
49. Which of the following SQL commands can be used to modify existing data in a database table?
50. Which data type can store unstructured data?
51. What is the full form of HSAM?
52. What is the view of total database content?
53. In an ER model, which is described in the database by storing its data.
54. Which of the following is critical in formulating database design?
55. Which of the following operators is basically a join followed by a project on the attributes of the first relation?
56. Grant and revoke are which of the following statements?
57. What is a logical schema?
58. Which of the following is used to determine whether a table contains duplicate rows?
59. Which of the following is a condition specified on a database schema and restricts the data that can be stored in an instance of the database?
60. Data items grouped together for storage purposes is called a
61. Which of the following commands can be used to modify a column in a table?
62. Which of the following is an outstanding functionality of SQL that supports automatic selection of the target data?
63. Which key is a minimal superkey that can also refer to a surrogate key?
64. The key to represent the relationship between tables is called
65. Which command can be used to change a column value in a table?
66. What represents the number of entities to which another entity can be associated?
67. Which of the following is not a binary operator in relational algebra?
68. In a relational schema, each tuple is divided into fields called
69. What defines the structure of a relation that consists of a fixed set of attribute-domain pairs?
70. DCL stands for
71. Which contains information about a file needed by system programs for accessing file records?
72. What is the way a particular application views the data from the database that the application uses?
73. A relational database developer refers to a record as
74. What is the collection of information stored in a database at a particular moment?
75. What is a special type of integrity constraint that relates two relations & maintains consistency across the relations?
76. Which of the following is TRUE for the system variable "date"?
77. Which of the following has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data item?
78. What operator tests the column for the absence of data?
79. A top-to-bottom relationship among the items in a database is established by a
80. Which of the following is not a logical database structure?
81. Which is a proper subset designed to support views belonging to different classes of users in order to hide or protect information?
82. In SQL, the CREATE TABLESPACE is used
83. Which of the following clauses is used to pass on granted privileges to other users?
84. Which of the following is a way a particular application views the data from the database that the application uses?
85. In the relational modes, cardinality is also called
86. Which of the following provides an option for entering SQL queries as execution time, rather than at the development stage?
87. What is the process of organizing data into related tables?
88. Which of the following keys is used to eliminate duplicate rows?
89. What will be created if a primary key is combined with a foreign key?
90. DFD stands for

 

Answers:

1. ………………………. is a powerful language for working with RDBMS.
C) Query Language

2. The file in DBMS is called as ……………… in RDBMS.
C) table

3. In …………………, we have a strict parent-child relationship only.
A) hierarchical databases.

4. Which normal form is considered adequate for relational database design?
B) 3 NF

5. What operator tests the column for the absence of data?
A) IS NULL operator

6. Which is a proper subset designed to support views belonging to different classes of users in order to hide or protect information?
B) Sub-schema

7. Which contains information about a file needed by system programs for accessing file records?
C) File headers

8. A ……………….. DBMS distributes data processing tasks between the workstation and network server.
C) Client-Server

9. The ……………….. refers to the way data is organized in and accessible from a DBMS.
D) data model

10. …………….. is a statement that is executed automatically by the system.
A) trigger

Read Next: MCQ on Fundamental of Database Management System (DBMS) set-9

We have created a video on YouTube including a solved MCQ on the database management system. Please watch the video and subscribe to our channel to get more videos on DBMS.

Subscribe to Our YouTube Channel to Get Latest Videos on IT Tutorials, MCQs and Quizzes.
Author

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 12 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.

Write A Comment

Pin It

Protected by Security by CleanTalk and CleanTalk Anti-Spam