DBMS Practice Questions
DBMS Practice Questions
2. What is a database?
a) Organized collection of information that cannot be accessed, updated, and managed
b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and managed
d) Organized collection of data that cannot be updated
3. What is DBMS?
a) DBMS is a collection of queries
b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
6. In which of the following formats data is stored in the database management system?
a) Image
b) Text
c) Table
d) Graph
17. The values appearing in given attributes of any tuple in the referencing relation must
likewise occur in specified attributes of at least one tuple in the referenced relation,
according to _____________________ integrity constraint.
a) Referential
b) Primary
c) Referencing
d) Specific
18. _____________ is a hardware component that is most important for the operation of a
database management system.
a) Microphone
b) High speed, large capacity disk to store data
c) High-resolution video display
d) Printer
21. ______________ is a set of one or more attributes taken collectively to uniquely identify
a record.
a) Primary Key
b) Foreign key
c) Super key
d) Candidate key
23. Which of the following set should be associated with weak entity set for weak entity to
be meaningful?
a) Neighbour set
b) Strong entity set
c) Owner set
d) Identifying set
24. Which of the following command is correct to delete the values in the relation teaches?
a) Delete from teaches;
b) Delete from teaches where Id =’Null’;
c) Remove table teaches;
d) Drop table teaches;
27. Which forms have a relation that contains information about a single entity?
a) 4NF
b) 2NF
c) 5NF
d) 3NF
28. The top level of the hierarchy consists of ______ each of which can contain _____.
a) Schemas, Catalogs
b) Schemas, Environment
c) Environment, Schemas
d) Catalogs, Schemas
29. _______ indicates the maximum number of entities that can be involved in a
relationship.
a) Greater Entity Count
b) Minimum cardinality
c) Maximum cardinality
d) ERD
30. The user IDs can be added or removed using which of the following fixed roles?
a) db_sysadmin
b) db_accessadmin
c) db_securityadmin
d) db_setupadmin
33. After groups have been established, SQL applies predicates in the ___________ clause,
allowing aggregate functions to be used.
a) Where
b) Having
c) Group by
d) With
35. What does a foreign key combined with a primary key create?
a) Network model between the tables that connect them
b) Parent-Child relationship between the tables that connects them
c) One to many relationship between the tables that connects them
d) All of the mentioned
36. Which of the following is correct according to the technology deployed by DBMS?
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency
37. Which of the following is correct regarding the file produced by a spreadsheet?
a) can be used as it is by the DBMS
b) stored on disk in an ASCII text format
c) all of the mentioned
d) none of the mentioned
40. Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
b) Concatenation
c) Relational-and
d) All of the mentioned
41. Which of the following is the subset of SQL commands used to manipulate Oracle
Structures, including tables?
a) Data Described Language
b) Data Retrieval Language
c) Data Manipulation Language
d) Data Definition Language
42. __________ command is used in SQL to issue multiple CREATE TABLE, CREATE VIEW and
GRANT statements in a single transaction.
a) CREATE CLUSTER
b) CREATE PACKAGE
c) CREATE SCHEMA
d) All of the mentioned
43. For designing a normal RDBMS which of the following normal form is considered
adequate?
a) 4NF
b) 3NF
c) 2NF
d) 5NF
45. Which of the following establishes a top-to-bottom relationship among the items?
a) Relational schema
b) Network schema
c) Hierarchical schema
d) All of the mentioned
46. A major goal of the db system is to minimize the number of block transfers between the
disk and memory. Which of the following helps in achieving this goal?
a) Secondary storage
b) Storage
c) Catalog
d) Buffer
47. The logical design, and the snapshot of the data at a given instant in time is known as?
a) Instance & Relation
b) Relation & Schema
c) Domain & Schema
d) Schema & Instance
48. Which of the following gives a logical structure of the database graphically?
a) Entity-relationship diagram
b) Entity diagram
c) Database diagram
d) Architectural representation
52. We indicate roles in E-R diagrams by labeling the lines that connect ___________ to
__________
a) Diamond , diamond
b) Rectangle, diamond
c) Rectangle, rectangle
d) Diamond, rectangle
53. An entity set that does not have sufficient attributes to form a primary key is termed a
_________
a) Strong entity set
b) Variant set
c) Weak entity set
d) Variable set
54. For a weak entity set to be meaningful, it must be associated with another entity set,
called the
a) Identifying set
b) Owner set
c) Neighbour set
d) Strong entity set
56. If you were collecting and storing information about your music collection, an album
would be considered a(n) _____
a) Relation
b) Entity
c) Instance
d) Attribute
57. What term is used to refer to a specific record in your music database; for instance;
information stored about a specific album?
a) Relation
b) Instance
c) Table
d) Column
58. _____________ express the number of entities to which another entity can be
associated via a relationship set.
a) Mapping Cardinality
b) Relational Cardinality
c) Participation Constraints
d) None of the mentioned
59. An entity in A is associated with at most one entity in B, and an entity in B is associated
with at most one entity in A.This is called as
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one
60. An entity in A is associated with at most one entity in B. An entity in B, however, can be
associated with any number (zero or more) of entities in A.
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one
62. ______ is a special type of integrity constraint that relates two relations & maintains
consistency across the relations.
a) Entity Integrity Constraints
b) Referential Integrity Constraints
c) Domain Integrity Constraints
d) Domain Constraints
63. Which one of the following uniquely identifies the elements in the relation?
a) Secondary Key
b) Primary key
c) Foreign key
d) Composite key
64. Drop Table cannot be used to drop a table referenced by a _________ constraint.
a) Local Key
b) Primary Key
c) Composite Key
d) Foreign Key
67. A table on the many side of a one to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
b) Be in Third Normal Form (3NF)
c) Have a single attribute key
d) Have a composite key
70. Functional Dependencies are the types of constraints that are based on______
a) Key
b) Key revisited
c) Superset key
d) None of the mentioned
71. Which is a bottom-up approach to database design that design by examining the
relationship between attributes:
a) Functional dependency
b) Database modeling
c) Normalization
d) Decomposition
72. Which forms simplifies and ensures that there are minimal data aggregates and
repetitive groups:
a) 1NF
b) 2NF
c) 3NF
d) All of the mentioned
73. Which forms has a relation that possesses data about an individual entity:
a) 2NF
b) 3NF
c) 4NF
d) 5NF
76. The normal form which satisfies multivalued dependencies and which is in BCNF is
a) 4 NF
b) 3 NF
c) 2 NF
d) All of the mentioned
78. The main task carried out in the __________ is to remove repeating attributes to
separate tables.
a) First Normal Form
b) Second Normal Form
c) Third Normal Form
d) Fourth Normal Form
80. Which forms has a relation that possesses data about an individual entity?
a) 2NF
b) 3NF
c) 4NF
d) 5NF
81. If a multivalued dependency holds and is not implied by the corresponding functional
dependency, it usually arises from one of the following sources.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) Both A many-to-many relationship set and A multivalued attribute of an entity set
82. Which of the following has each related entity set has its own schema and there is an
additional schema for the relationship set?
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) None of the mentioned
83. In which of the following, a separate schema is created consisting of that attribute and
the primary key of the entity set.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) None of the mentioned
85. In 2NF
a) No functional dependencies (FDs) exist
b) No multivalued dependencies (MVDs) exist
c) No partial FDs exist
d) No partial MVDs exist
86. We can use the following three rules to find logically implied functional dependencies.
This collection of rules is called
a) Axioms
b) Armstrong’s axioms
c) Armstrong
d) Closure
89. Inst_dept (ID, name, salary, dept name, building, budget) is decomposed into
instructor (ID, name, dept name, salary)
department (dept name, building, budget)
This comes under
a) Lossy-join decomposition
b) Lossy decomposition
c) Lossless-join decomposition
d) Both Lossy and Lossy-join decomposition
90. There are two functional dependencies with the same set of attributes on the left side of
the arrow:
A->BC
A->B
This can be combined as
a) A->BC
b) A->B
c) B->C
d) None of the mentioned
92. A system is in a ______ state if there exists a set of transactions such that every
transaction in the set is waiting for another transaction in the set.
a) Idle
b) Waiting
c) Deadlock
d) Ready
93. The deadlock state can be changed back to stable state by using _____________
statement.
a) Commit
b) Rollback
c) Savepoint
d) Deadlock
95. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if
it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled
back (dies). This is
a) Wait-die
b) Wait-wound
c) Wound-wait
d) Wait
96. When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if
it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled
back (Tj is wounded by Ti). This is
a) Wait-die
b) Wait-wound
c) Wound-wait
d) Wait
97. The situation where the lock waits only for a specified amount of time for another lock
to be released is
a) Lock timeout
b) Wait-wound
c) Timeout
d) Wait
99. A deadlock exists in the system if and only if the wait-for graph contains a ___________
a) Cycle
b) Direction
c) Bi-direction
d) Rotation
100. __________ rollback requires the system to maintain additional information about the
state of all the running transactions.
a) Total
b) Partial
c) Time
d) Commit