Users Also Read
Read MCQ's/Objective questions
MCQ's Search Engine
Important Question
ASP.NET
Basic Computer Knowledge
Basic of Linux/Unix
C Language
C# Programming
C++ Programming
Computer Graphics
Computer Hardware
Computer Networking
Computer Security - Cyber crime & Laws
Data Structures & Algorithms
Digital Computer Electronics
HTML
Important File Extensions
Imp. Shortcut Keys used in Computer
Internet, Web & Email
Java - Concepts and Its Programming
Language Processors
Management Information System (MIS)
MS Access
MS Excel
MS Word
Operating System
Oracle, SQL & PL/SQL
PHP Basic
Power Point
Programming Languages
Software Engineering
System Analysis and Design (SAD)
System software & compiler design
Tally
VB.NET
Visual Basic
Home⇒ Computer Engineering⇒ Database management system
1-Dont try to cram or spend more time here just read it fast and cover syllabus then practice MCQ's cheptor of same topic to check your progress. . |
2-Wrong options are also given but dont concentrate there, Right answer is in bold format. |
Q1 ⇒ Views are useful for _____ unwanted information, and for collecting together information from more than one relation into a single view. Hiding [other wrong options] [Discuss in forum] Deleting Highlighting All of the above |
Q2 ⇒ The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between Host program and DBMS [other wrong options] [Discuss in forum] DBMS & the Host record Host program and Host record Host program and Host language |
Q3 ⇒ Value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation. Referential Integrity [other wrong options] [Discuss in forum] Domain Integrity Data Integrity Logical Integrity |
Q4 ⇒ Manager&rsquos salary details are to be hidden from Employee Table. This Technique is called as External level Datahiding [other wrong options] [Discuss in forum] Physical level Datahiding Conceptual level Datahiding Logical level Datahiding |
Q5 ⇒ Referential integrity is directly related to Foreign key [other wrong options] [Discuss in forum] Candidate key Relation key Primary key |
Q6 ⇒ Tuple in relational algebra refers to: Row [other wrong options] [Discuss in forum] Column Relation Table |
Q7 ⇒ Which level of Abstraction describes what data are stored in the Database ? Logical level [other wrong options] [Discuss in forum] Abstraction level Physical level View level |
Q8 ⇒ Data items stored as grouped items is: Record [other wrong options] [Discuss in forum] Title list Strings List |
Q9 ⇒ Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee} Output Average salary of male employees in a department is more than average salary of the organization [other wrong options] [Discuss in forum] Average salary of employee more than average salary of the organization. Average salary of employee equal to average salary of the organization Average salary less than average salary of the organization. |
Q10 ⇒ Who is more concerned about the conceptual level of the DBMS DBA [other wrong options] [Discuss in forum] The Systems programmer The end user Client |
Q11 ⇒ Why do we go for Normalization of Data Bases? Avoid redundancy [other wrong options] [Discuss in forum] To prevent replication To avoid the repetitions To prevent fragmentation |
Q12 ⇒ The Index consists of : None of the above [other wrong options] [Discuss in forum] A list of keys Pointers to the master list Both (a) & (b) |
Q13 ⇒ Thoma’s-write rule is ______. Time stamp ordering protocol [other wrong options] [Discuss in forum] Sliding window protocol One phase locking protocol Two phase locking protocol |
Q14 ⇒ In an E-R diagram ellipses represents attributes [other wrong options] [Discuss in forum] Entity sets link in attributes & entity sets relationship among entity sets |
Q15 ⇒ Embedded pointers provide a secondary access path [other wrong options] [Discuss in forum] a physical record key an inverted index all of above |
Q16 ⇒ Third normal form is based on the concept of ______. Transitive Dependency [other wrong options] [Discuss in forum] Normal Dependency Closure Dependency Functional Dependency |
Q17 ⇒ Locking can be used for: All of the above [other wrong options] [Discuss in forum] Lost Update Uncommitted dependency Inconsistent data |
Q18 ⇒ An entry in a telephone book can be compared to a Record [other wrong options] [Discuss in forum] Database Field File |
Q19 ⇒ What is Granularity ? The size of data item [other wrong options] [Discuss in forum] The size of database The size of file The size of record |
Q20 ⇒ A DBMS consists of application programs called : BPL [other wrong options] [Discuss in forum] TOTAL AUTOFLOW FORTRAN |
Or |