0

DBMS

Description: Free Online DBMS Test for Placement and GATE Examination
Number of Questions: 50
Created by:
Tags: DBMS DBMS Database Computer Science Question GATE Question Data Structure Databases Programming and Data Structures
Attempted 0/50 Correct 0 Score 0

A director's salary details are hidden from the employee. This process is called

  1. conceptual level hiding

  2. physical level data hiding

  3. external level data hiding

  4. none of these


Correct Option: C

In a multi-user database, if two users wish to update the same record at the same time, they are prevented by

  1. jamming

  2. password

  3. documentation

  4. record lock


Correct Option: D

Data security threat includes

  1. privacy invasion

  2. hardware failure

  3. fraudulent manipulation of data

  4. all of above


Correct Option: A

A locked file can be

  1. accessed by only one user

  2. modified by user with correct password

  3. used to hide sensitive information

  4. none of these


Correct Option: A

Locking can be used for

  1. deadlock

  2. lost update

  3. uncommitted dependency

  4. inconsistent data


Correct Option: B

Transaction X holds a shared lock R. What happens if transaction Y requests for a shared lock on R?

  1. Results in deadlock situation

  2. Immediately granted

  3. Immediately rejected

  4. Granted as is released by X


Correct Option: B

Which command is used to remove rows from a table?

  1. Delete

  2. Remove

  3. Truncate

  4. Both (1) and (3)


Correct Option: D

Which of the following is the characteristic of a relational database model?

  1. Tables

  2. Treelike structures

  3. Complex logical relationship

  4. Records


Correct Option: A

Which command is used to remove a table or index from the database in SQL?

  1. Delete Table

  2. Drop table

  3. Erase Table

  4. None of above


Correct Option: B

The command used to select only one copy of each set of duplicable rows is called

  1. Select distinct

  2. Select unique

  3. Select different

  4. None of above


Correct Option: A

The model for a record management system might be a

  1. business form

  2. handwritten list

  3. rolodex card file

  4. all of above


Correct Option: D

Which of the following is at the highest level in the hierarchy of data organisation?

  1. Data record

  2. Data file

  3. Database

  4. Data bank


Correct Option: C

Which database handles full text data, image, audio and video?

  1. Transaction database

  2. Graphics database

  3. Video on demand database

  4. Multimedia database


Correct Option: D

Which of the following contains a complete record of all the activities that affect the contents of a database?

  1. Transaction log

  2. Query language

  3. Report writer

  4. Data manipulation language


Correct Option: A
Explanation:

  Transaction log is a history of actions executed by a DBMS to guarantee ACID properties over crashes or hardware failures.

A data dictionary does not provide information about

  1. where the data is located

  2. who owns it

  3. the size of disk storage device

  4. how the data is used


Correct Option: C

Which of the following is a record based logical model?

  1. Network model

  2. Object oriented model

  3. Object based

  4. E-R model


Correct Option: A

Which of the following is a relational database?

  1. 4th Dimension

  2. Foxpro

  3. D base-IV

  4. All of the above


Correct Option: D

Which of the following is the highest level of data abstraction?

  1. Physical

  2. Logical

  3. View

  4. None of above


Correct Option: C

A DBMS consists of application programs called

  1. Fortran

  2. Autoflow

  3. BPL

  4. Total


Correct Option: C

A large computer information system maintains many different computer files, which file is called perpetual file?

  1. Log file

  2. Master file

  3. Specialised file

  4. Update file


Correct Option: B

An entry in a telephone book can be compared to a

  1. database

  2. file

  3. record

  4. field


Correct Option: C

The logical data structure with one to many relationship is a

  1. network

  2. tree

  3. chain

  4. All of above


Correct Option: D

Which language is used by most DBMS for helping their users to access the data?

  1. 4GL

  2. SQL

  3. Query language

  4. HLL


Correct Option: C

A schema describes

  1. record and files

  2. data and elements

  3. record and relationships

  4. all of the above


Correct Option: D

Data item characteristics that are important in data management include

  1. Width

  2. Language

  3. Spelling

  4. All of above


Correct Option: A

The modify operation is likely to be done after

  1. Delete

  2. Look-up

  3. Insert

  4. None of above


Correct Option: B

A report generator is used to

  1. update files

  2. print files on paper

  3. enter data

  4. none of these


Correct Option: B

The distinguishable parts of a record are called

  1. data

  2. files

  3. fields

  4. all of above


Correct Option: C

The set of permitted values for each attribute is called its

  1. attribute set

  2. attribute range

  3. domain

  4. group


Correct Option: C

In a relational schema, each tuple is divided into fields called

  1. relations

  2. domains

  3. queries

  4. none of these


Correct Option: B

The database environment has all of the following components except

  1. users

  2. separate files

  3. database

  4. DBA


Correct Option: B

Report generators are used to

  1. store data input by a user

  2. retrieve information from files

  3. answer queries

  4. both (2) and (3)


Correct Option: D

Which of the following is the problem of file management system?

  1. Lack of data independence

  2. Data redundancy

  3. Update

  4. All of above


Correct Option: D

The index consists of

  1. a list of keys

  2. pointers to the master list

  3. both (1) and (2)

  4. none of above


Correct Option: C

Periodically adding, changing and deleting file records is called file

  1. updating

  2. upgrading

  3. restructuring

  4. renewing


Correct Option: A

In relation, model column is referred to as

  1. tuple

  2. entity

  3. degree

  4. attribute


Correct Option: D

E-R Model comes under

  1. physical data model

  2. record based logical model

  3. object based logical model

  4. all of these


Correct Option: C

The way a particular application views the data from the database that the application uses is a

  1. module

  2. relational model

  3. schema

  4. sub schema


Correct Option: D

Embedded pointers provide

  1. an inverted index

  2. a secondary access path

  3. a physical record key

  4. all of above


Correct Option: B

An attribute of one table matching the primary key of another table is called as

  1. foreign key

  2. secondary key

  3. candidate key

  4. composite key


Correct Option: A

Which of the following is more concerned about the conceptual level of the DBMS?

  1. DBA

  2. The end user

  3. The systems programmer

  4. Client


Correct Option: A

If a relation is in BCNF, it is also in

  1. 1NF

  2. 2NF

  3. 3NF

  4. All of the above


Correct Option: D
Explanation:

Any relation that is in BCNF, is in 3NF. Any relation in 3NF is in 2NF and any relation in 2NF is in 1NF.

Relations produced from an E-R model will always be in

  1. 1NF

  2. 2NF

  3. 3NF

  4. 4NF


Correct Option: C

In relational database systems, attributes correspond to

  1. attribute set

  2. attribute range

  3. domain

  4. fields


Correct Option: D

E-R modeling technique is a

  1. top-down approach

  2. bottom-up approach

  3. left-right approach

  4. none of above


Correct Option: A

Which of the following is not a record based logical model?

  1. Network model

  2. Object-oriented model

  3. Relational model

  4. Hierarchical model


Correct Option: B

A table consists of

  1. fields & columns

  2. rows & columns

  3. rows & cells

  4. None of above


Correct Option: B

In an E-R diagram, ellipses represents

  1. entity sets

  2. relationship among entity sets

  3. attributes

  4. link in attributes & entity sets


Correct Option: C

If every non key attribute is functionally dependent on the primary key, the relation will be in

  1. 1NF

  2. 2NF

  3. 3NF

  4. 4NF


Correct Option: C

If every non-key attribute is functionally dependent on the primary key, the relation will be in

  1. 1NF

  2. 2NF

  3. 3NF

  4. 4NF


Correct Option: C
- Hide questions