0% found this document useful (0 votes)
13 views

DBMS MCQs

The document contains multiple-choice questions (MCQs) related to Database Management Systems (DBMS), covering topics such as the definition of DBMS, types of data stored, functions, features, and components of DBMS. It also includes questions on SQL commands, integrity constraints, and database design principles. Each question is followed by the correct answer and an explanation for clarity.

Uploaded by

mafzaal270031
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

DBMS MCQs

The document contains multiple-choice questions (MCQs) related to Database Management Systems (DBMS), covering topics such as the definition of DBMS, types of data stored, functions, features, and components of DBMS. It also includes questions on SQL commands, integrity constraints, and database design principles. Each question is followed by the correct answer and an explanation for clarity.

Uploaded by

mafzaal270031
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Computer DBMS MCQs

1. What is the full form of DBMS? Answer: b


Explanation: Charles Bachman along with his
a) Data of Binary Management System team invented the first DBMS known as
b) Database Management System Integrated Data Store (IDS).
c) Database Management Service 5. Which type of data can be stored in the
d) Data Backup Management System database?

Answer: b a) Image oriented data


Explanation: DBMS is abbreviated as Database b) Text, files containing data
Management System. Database Management c) Data in the form of audio or video
System stores the data and allows authorized d) All of the above
users to manipulate and modify the data.
2. What is a database? Answer: d
Explanation: The reason for creating the database
a) Organized collection of information that management system was to store large data and
cannot be accessed, updated, and these data can be of any form image, text, audio,
managed or video files, etc. DBMS allows the users to store
b) Collection of data or information and access the data of any format.
without organizing advertisement
c) Organized collection of data or 6. In which of the following formats data is
information that can be accessed, stored in the database management
updated, and managed system?
d) Organized collection of data that cannot
be updated a) Image
b) Text
Answer: c c) Table
Explanation: It is defined as an organized d) Graph
collection of data or information for easy access,
updating, and management in a computer. Answer: c
3. What is DBMS? Explanation: The data is stored in a table format
intended to manage the storage of data and
a) DBMS is a collection of queries manipulate stored data to generate information.
b) DBMS is a high-level language 7. Which of the following is not a type of
c) DBMS is a programming language database?
d) DBMS stores, modifies and retrieves
data a) Hierarchical
b) Network
Answer: d c) Distributed
Explanation: DBMS is nothing but a storehouse d) Decentralized
wherein the authorized user can create a
database to store, modify or retrieve the Answer: d
organized data in the table. It can be modified or Explanation: Different types are:
retrieved by users who have access to DBMS only. 1) Centralized
4. Who created the first DBMS? 2) Distributed
3) Relational
a) Edgar Frank Codd 4) NoSQL
b) Charles Bachman 5) Cloud
c) Charles Babbage 6) Object-oriented
d) Sharon B. Codd 7) Hierarchical
8) Network
8. Which of the following is not an example Answer: b
of DBMS? Explanation: The important features are:
1) Provides backup for the data stored by the user
a) MySQL and the user can retrieve the data whenever
b) Microsoft Acess required.
c) IBM DB2 2) Provides User-interface to access the data.
d) Google 3) Only authorized users can access the stored
data.
Answer: d 4) Data is stored in one central location but
Explanation: MySQL, Microsoft Access, IBM DB2 multiple authorized users can access the data.
are database management systems while Google 11. Which of the following is not a function of
is a search engine. MySQL is a Linux-based the database?
database management system, Microsoft Access
is a tool that is a part of Microsoft Office used to a) Managing stored data
store data, IBM DB2 is a database management b) Manipulating data
system developed by IBM. Google’s Bigtable is the c) Security for stored data
database that runs Google’s Internet search, d) Analysing code
Google Maps, YouTube, Gmail, and other
products. Answer: d
9. Which of the following is not a feature of Explanation: It allows authorized users to update,
DBMS? store, manipulate, or access data. Since data is
stored in table format it is easy to access the data
a) Minimum Duplication and Redundancy and perform the required functions. It also
of Data removes duplicate and redundant data.
b) High Level of Security 12. Which of the following is a function of the
c) Single-user Access only DBMS?
d) Support ACID Property
a) Storing data
Answer: c b) Providing multi-users access control
Explanation: Single-user Access only” is not a c) Data Integrity
feature of DBMS. DBMS allows multiple users to d) All of the above
access and manipulate the database concurrently.
It provides mechanisms to handle concurrent Answer: d
access and ensure data consistency and integrity Explanation: The purpose of creating DBMS was
among multiple users. to store the data. The data stored in the database
The important features of a database management system can be can accessed by
management system are: multiple users if the access is provided. The data
• Minimum Duplication and Redundancy of stored will be accurate and complete hence
Data providing data integrity.
• High Level of Security 13. Which of the following is a component of
• Mulitple-user Access the DBMS?
• Support ACID Property
a) Data
10. Which of the following is a feature of the b) Data Languages
database? c) Data Manager
d) All of the above
a) No-backup for the data stored
b) User interface provided Answer: d
c) Lack of Authentication Explanation: The components of DBMS are as
d) Store data in multiple locations follows:
1) Hardware: Like a hard drive, monitor, etc.
2) Software: Provides a user interface
Page 2 of 9
3) Data Manager: Manages operations of DBMS.
4) Data: The collection of information on the DB is a) Referential
known as data. b) Primary
5) Data Languages: Languages like DDL, DML, c) Referencing
DAL, and DCL allow to perform operations like d) Specific
creating, modifying, storing, or retrieving data.
14. Which of the following is known as a set Answer: a
of entities of the same type that share Explanation: Consider 2 relations r1 and r2. r1
same properties, or attributes? may include among its attributes the primary key
of relation r2. This attribute is called a foreign key
a) Relation set from r1, referencing r2. The relation r1 is also
b) Tuples called the referencing relation of the foreign key
c) Entity set dependency, and r2 is called the referenced
d) Entity Relation model relation of the foreign key.
17. _____________ is a hardware component
Answer: c that is most important for the operation of
Explanation: In the actual world, an entity is a a database management system.
distinct “thing” or “object” from all other objects.
For example: Each employee of an organization is a) Microphone
an entity. b) High speed, large capacity disk to store
15. What is information about data called? data
a) Hyper data c) High-resolution video display
b) Tera data d) Printer
c) Meta data
d) Relations Answer: b
Explanation: Since all the data are stored in form
Answer: c of memory in the disk, a high speed, and large-
Explanation: Information about data is known as capacity disk is required for the operation of the
Metadata. Metadata describes the data in detail database management system.
by providing additional information like type, 18. The DBMS acts as an interface between
length of the data, etc. Metadata helps the user ________________ and
to understand the data. ________________ of an enterprise-class
15. What does an RDBMS consist of? system.

a) Collection of Records a) Data and the DBMS


b) Collection of Keys b) Application and SQL
c) Collection of Tables c) Database application and the database
d) Collection of Fields d) The user and the software

Answer: c Answer: c
Explanation: It consists of a collection of tables Explanation: A database management system is
i.e., the data is organized in tabular format. The an application that acts as an interface between
columns of the relation are known as Fields and the user and the database. The user interacts
rows of the relation are known as Records. with the application to access data.
Constraints in a relation are known as Keys. 19. The ability to query data, as well as insert,
16. The values appearing in given attributes of delete, and alter tuples, is offered by
any tuple in the referencing relation must ____________
likewise occur in specified attributes of at
least one tuple in the referenced relation, a) TCL (Transaction Control Language)
according to _____________________ b) DCL (Data Control Language)
integrity constraint. c) DDL (Data Definition Langauge)

Page 3 of 9
d) DML (Data Manipulation Langauge) entity set. Owner entity set is another name for
it.
Answer: d 23. Which of the following command is
Explanation: A query is a request for data or correct to delete the values in the relation
information. Relational Schema is the design and teaches?
structure of the relation. DDL consists of
commands that help in modifying. DML performs a) Delete from teaches;
the change in the values of the relation. b) Delete from teaches where Id =’Null’;
20. ______________ is a set of one or more c) Remove table teaches;
attributes taken collectively to uniquely d) Drop table teaches;
identify a record.
Answer: a
a) Primary Key Explanation: To delete the entries from the table
b) Foreign key Delete from table command should be used.
c) Super key 24. Procedural language among the following
d) Candidate key is __________

Answer: c a) Domain relational calculus


Explanation: Foreign key creates a relationship b) Tuple relational calculus
between two relations. Super key is the superset c) Relational algebra
of all the keys in a relation. A candidate key is d) Query language
used to identify tuples in a relation.
21. Which command is used to remove a Answer: c
relation from an SQL? Explanation: Non-Procedural Languages are
Domain relational calculus and Tuple relational
a) Drop table calculus. Relational algebra is a procedural
b) Delete language that takes input in the form of relation
c) Purge and output generated is also a relation.
d) Remove 25. _________________ operations do not
preserve non-matched tuples.
Answer: a
Explanation: Delete command is used to delete a) Left outer join
the existing record from the table. The drop table b) Inner join
deletes the whole structure of the relation. Purge c) Natural join
removes the table which cannot be obtained d) Right outer join
again.
22. Which of the following set should be Answer: b
associated with weak entity set for weak Explanation: Left outer join returns all the rows
entity to be meaningful? from the table that is on the left side and
matching rows on the right side of the join. Inner
a) Neighbour set join returns all rows when there is at least one
b) Strong entity set match in BOTH tables. Natural join returns the
c) Owner set common columns from the tables being joined. A
d) Identifying set right outer join returns all the rows from the table
that is on the right side and matching rows on the
Answer: d left side of the join.
Explanation: Every weak entity must be linked to 26. Which forms have a relation that contains
an identifying entity; in other words, the information about a single entity?
existence of the weak entity set is contingent on
the presence of the identifying entity set. The a) 4NF
weak entity set that the identifying entity set b) 2NF
identifies is said to be owned by the identifying c) 5NF
Page 4 of 9
d) 3NF suggests it involves granting or declining
permission to access the data ensuring security.
Answer: d 30. Why the following statement is
Explanation: A table is in its 3rd NF if it has erroneous?
already completed in 2NF, and non-key attributes
are not dependent on any non-key attributes. This SELECT dept_name, ID, avg (salary)
means that all non-key attributes must depend on FROM instructor
primary key. When a table represents a single GROUP BY dept_name;
entity, the primary key will identify the instance a) Dept_id should not be used in group by clause
row and all attributes in 3NF are dependent on b) Group by clause is not valid in this query
the primary key. So, the primary key in the 3th NF c) Avg(salary) should not be selected
captures the whole information of this single d) None
entity.
27. The top level of the hierarchy consists of Answer: a
______ each of which can contain _____. Explanation: Any property that does not occur in
the group by clause must only appear in an
a) Schemas, Catalogs aggregate function if it also appears in the select
b) Schemas, Environment clause; otherwise, the query is considered
c) Environment, Schemas incorrect.
d) Catalogs, Schemas 31. The traditional storage of data organized
by the customer, stored in separate
Answer: d folders in filing cabinets is an example of
Explanation: Schemas represent the logical ______________ type of ‘database’
configuration of the DBMS. Catalogs consist of management system.
metadata of the objects and system settings used.
28. _______ indicates the maximum number a) Object-oriented database management
of entities that can be involved in a system
relationship. b) Relational database management
system
a) Greater Entity Count c) Network database management system
b) Minimum cardinality d) Hierarchical database management
c) Maximum cardinality system
d) ERD
Answer: d
Answer: c Explanation: In an object-oriented database
Explanation: The term cardinality refers to the management system, the data is stored in the
uniqueness of data values included in a single form of objects. In a relational DBMS, the data is
column (attribute) of a table in SQL (Structured stored in the form of tables. Hierarchy is obtained
Query Language). by Parent-Child Relationship. Parent-Child
29. The user IDs can be added or removed Relationship Type is basically a 1:N relationship.
using which of the following fixed roles? 32. After groups have been established, SQL
applies predicates in the ___________
a) db_sysadmin clause, allowing aggregate functions to be
b) db_accessadmin used.
c) db_securityadmin
d) db_setupadmin a) Where
b) Having
Answer: b c) Group by
Explanation: Along with security, as the name d) With
suggests the db_accessadmin role also handles
access. db_sysadmin refers to the system Answer: b
administrator. db_securityadmin as the name Explanation: In SQL, after grouping data using the
Page 5 of 9
GROUP BY clause, the HAVING clause is used to great speed and accuracy. Consistency is
filter the groups based on specific conditions. It maintained using locks.
allows the use of aggregate functions and selects 36. Which of the following is correct regarding
only the groups that satisfy the given criteria. the file produced by a spreadsheet?
33. Which of the following is not the utility of
DBMS? a) can be used as it is by the DBMS
b) stored on disk in an ASCII text format
a) Backup c) all of the mentioned
b) Data Loading d) none of the mentioned
c) Process Organization
d) File organization Answer: a
Explanation: For updating the value in ASCII text
Answer: c format, a regular text file is used.
Explanation: Backup utility is used to create a 37. What is the function of the following
copy of the db as a backup. Loading utility is used command?
to load existing file. File organization is used to
relocate the files and create new access path. Delete from r where P;
Processing is not an utility. a) Clears entries from relation
34. What does a foreign key combined with a b) Deletes relation
primary key create? c) Deletes particular tuple from relation
d) All of the mentioned
a) Network model between the tables that
connect them Answer: c
b) Parent-Child relationship between the Explanation: In the command the P gives
tables that connects them condition to delete a particular tuple.
c) One to many relationship between the 38. ______ resembles Create view.
tables that connects them
d) All of the mentioned a) Create table . . . as
b) Create view as
Answer: b c) Create table . . .like
Explanation: When the foreign key of one table d) With data
references the primary key of another table, the
foreign key creates a parent-child relationship. Answer: a
The table containing the primary key is Explanation: The ‘create table… as’ statement is
considered the parent table where as the table similar to the ‘create view… as’ statement in that
containing the foreign key is considered the child both are defined with queries. The main
table. distinction is that table contents are set when the
35. Which of the following is correct table is built, whereas view contents always
according to the technology deployed by reflect the current query result.
DBMS? 39. The query specifying the SQL view is said
to be updatable if it meets which of the
a) Pointers are used to maintain following
transactional integrity and consistency conditions?
b) Cursors are used to maintain a) select clause contains relation attribute
transactional integrity and consistency names but not have expressions,
c) Locks are used to maintain aggregates, or distinct specification
transactional integrity and consistency b) from clause has 1 relation
d) Triggers are used to maintain c) query does not have group by or having
transactional integrity and consistency clause
d) All of the mentioned
Answer: c
Explanation: Pointers are used to access data with
Page 6 of 9
Answer: d
Explanation: To update the view in sql all the a) Ntil()
conditions must be satisfied. b) Newtil()
40. When the “ROLLUP” operator for c) Rank()
expression or columns within a “GROUP d) All of the mentioned
BY” clause is used?
Answer: a
a) Find the groups that make up the Explanation: ntile(n) returns the number of the
subtotal in a row bucket in which each tuple is stored, with bucket
b) Create group-wise grand totals for the numbers beginning with 1.
groups indicated in a GROUP BY clause 44. __________ command is used in SQL to
c) Group expressions or columns issue multiple CREATE TABLE, CREATE
specified in a GROUP BY clause in one VIEW and GRANT statements in a single
direction, from right to left, for transaction.
computing the subtotals
d) To produce a cross-tabular report for a) CREATE CLUSTER
computing subtotals by grouping phrases b) CREATE PACKAGE
or columns given within a GROUP BY c) CREATE SCHEMA
clause in all available directions d) All of the mentioned

Answer: c Answer: c
Explanation: A view can be thought of as a virtual Explanation: A schema is a description of a
table that gets its data from one or more table system’s structure in a formal language supported
columns. by the database management system, and it
41. Which of the following is the best way to refers to data organization as a blueprint for how
represent the attributes in a large db? a db is built.
45. Which of the following key is required in
a) Dot representation to handle the data when the encryption is
b) Concatenation applied to the data so that the
c) Relational-and unauthorised user cannot access the
d) All of the mentioned data?

Answer: b a) Primary key


Explanation: Concatenation in DBMS is used to b) Authorised key
join two or more table fields of the same table or c) Encryption key
different tables. Example inst sec and student sec. d) Decryption key
42. Which of the following is the subset of
SQL commands used to manipulate Oracle Answer: c
Structures, including tables? Explanation: The encryption key is used to
encrypt the message. Even if the message is
a) Data Described Language intercepted by an enemy, the enemy will be
b) Data Retrieval Language unable to decrypt and interpret the message
c) Data Manipulation Language because he lacks the key.
d) Data Definition Language 46. Which of the following is known as the
process of viewing cross-tab with a fixed
Answer: d value of one attribute?
Explanation: DDLs are used to define schema and
table characters and consist of commands that a) Dicing
help in modifying. DML performs the change in b) Pivoting
the values of the relation. c) Slicing
43. Which of the following functions construct d) Both Pivoting and Dicing
histograms and use buckets for ranking?
Page 7 of 9
Answer: c c) Hierarchical
Explanation: Slice procedure takes one dimension d) Relational
from a cube and turns it into a new sub-cube.
Dice takes two or more dimensions from a cube Answer: c
and creates a new sub-cube from them. Explanation: Hierarchical database model was
47. For designing a normal RDBMS which of developed by IBM in the early 1960s. It had
the following normal form is considered Parent-Child Relationship.
adequate? 51. Evaluate the statements issued by the DBA
in the given sequence if OE and SCOTT are
a) 4NF the users and the ORDERS table is owned
b) 3NF by OE.
c) 2NF
d) 5NF CREATE ROLE r1;
GRANT SELECT, INSERT ON oe.orders TO r1;
Answer: b GRANT r1 TO scott;
Explanation: Because most 3NF tables are free of GRANT SELECT ON oe.orders TO scott;
insertion, update, and deletion anomalies, an REVOKE SELECT ON oe.orders FROM scott;
RDBMS table is sometimes regarded as What would be the outcome after executing the
“normalized” if it is in the Third Normal Form. statements?
48. Which of the following is popular for a) The REVOKE statement would give an error
applications such as storage of log files in because the SELECT privilege has been granted to
a database management system since it the role r1
offers the best write performance? b) The REVOKE statement would remove the
SELECT privilege from SCOTT as well as from the
a) RAID level 0 role r1
b) RAID level 1 c) SCOTT would be able to query the OE.ORDERS
c) RAID level 2 table
d) RAID level 3 d) SCOTT would not be able to query the
OE.ORDERS table
Answer: b
Explanation: RAID level 0 refers to data stripping. Answer: c
RAID level 1 refers to disk mirroring with block Explanation: To perform operations on objects,
striping. RAID level 2 refers to bit-level stripping the REVOKE statement is used to revoke rights
and RAID level 3 refers to byte-level striping with from a single user or role, or from all users. After
dedicated parity. revocation, SCOTT still has the r1 role with SELECT
49. Which of the following represents a query and INSERT privilege on the OE.ORDERS table. So,
in the tuple relational calculus? SCOTT will still be able to query the OE.ORDERS
table.
a) { }{P(t) | t } 52. Which of the following establishes a top-
b) {t | P(t)} to-bottom relationship among the items?
c) t | P() | t
d) All of the mentioned a) Relational schema
b) Network schema
Answer: b c) Hierarchical schema
Explanation: A nonprocedural query language is d) All of the mentioned
the tuple relational calculus. It specifies the
needed information but does not provide a Answer: c
detailed strategy for obtaining it. Explanation: A data model in which the data is
50. The oldest DB model is _______________ structured into a tree-like structure is known as a
hierarchical model. The structure allows
a) Network information to be represented using parent-child
b) Physical relationships.
Page 8 of 9
53. A major goal of the db system is to
minimize the number of block transfers
between the disk and memory. Which of
the following helps in achieving this goal?

a) Secondary storage
b) Storage
c) Catalog
d) Buffer

Answer: d
Explanation: Every block has a copy on disc,
however, the copy on the disc may be an earlier
version of the block than the version in the buffer.
55. What happens if a piece of data is stored in
two places in the db?
a) Storage space is wasted & Changing the data
in one spot will cause data inconsistency
b) In can be more easily accessed
c) Changing the data in one spot will cause data
inconsistency
d) Storage space is wasted

Answer: a
Explanation: One of the main features of a
database management system is minimum data
duplication and redundancy. Hence, is always
consistent and so there is no duplication.
56. The logical design, and the snapshot of the
data at a given instant in time is known as?

a) Instance & Relation


b) Relation & Schema
c) Domain & Schema
d) Schema & Instance

Answer: d
Explanation: Instance is an instance of time, the
relation is also known as table consists of data
with similar characteristics, Domain is the
collection of values that an attribute can contain
and schema is a representation.

Page 9 of 9

You might also like