Top 1000+ Database Subject Mcqs Pdf Download Set No 19

Print/Downlaod pdf

901. A table can be logically connected to another table by defining a ____.     

  1. hyperlink                            
  2. primary key
  3. common attribute          
  4. logic key              

902. A relational operator that yields values from all rows in a table is known as the ____ operator.

  1. DIFFERENCE                      
  3. PRODUCT                           
  4. PROJECT                            

903. A relational operator that yields all values from selected attributes is known as the ____ operator.

  1. DIFFERENCE                      
  3. PRODUCT                           
  4. PROJECT                             

904. A relational operator that allows for the combination of information from two or more tables is known as the ____ operator.

  1. SELECT                 
  2. JOIN
  3. PROJECT                             
  4. DIFFERENCE      

905. In a relationship, when a primary key from one table is also defined in a second table, the field is referred to as a ____ in the second table.          

  1. combined key                  
  2. primary key
  3. redundant field               
  4. foreign key        

906. A relational operator that yields all possible pairs of rows from two tables is known as the ____operator.                            

  1. UNION                
  3. INTERSECT                         
  4. PRODUCT                          

907. A primary key that consists of more than one field is called a ____ key.     

  1. composite                         
  2. group
  3. secondary                          
  4. foreign

908. A relational operator that yields all rows in one table that are not found in the other table is the operator.                            

  1. UNION                
  3. INTERSECT                         
  4. PRODUCT        

909. The short Date format is ____.     

  1. DD-MM-YY                        
  2. MM/DD/Y

910. A field that consists of integer values is a ____ type field.

  1. Date/Time         
  2. Memo
  3. Yes/No
  4. Numeric           

911. Which of the following statements concerning the primary key is true?

  1. All primary key entries are unique.        
  2. The primary key may be null.
  3. The primary key is not required for all tables.
  4. The primary key data do not have to be unique.

912. Which of the following is NOT an allowable operation for a date field?

  1. Compare two dates       
  2. Multiply two dates
  3. Convert a date from its internal representation to a different presentation format
  4. Create a date by adding or subtracting a number of days from a given date

913. In general terms, the ____ key is an attribute (or combination of attributes) that uniquely identifies any given entity.    

  1. indexed              
  2. foreign
  3. primary  redundant

 914.In the context of a database table, the statement “A determines B” indicates that ____.knowing the value of attribute A, you cannot look up the value of attribute B B.  you do not need to know the value of attribute

  1. in order to look up the value of attribute B
  2. knowing the value of attribute
  3. you can look up the value of attribute A
  4. knowing the value of attribute A, you can look up the value of attribute B

915. A ____ is any key that identifies each entity uniquely.   It functionally determines all of the entity’s attributes.         

  1. super key           
  2. foreign key
  3. primary key       
  4. combined key

916. It might take more than a single attribute to define functional dependence; that is, a key may be composed of more than one attribute.   A multi-attribute key is known as a ____ key.

  1. primary
  2. composite
  3. super   
  4. foreign

917. The table is said to exhibit ____ integrity.

  1. referential         
  2. enforced
  3. entity   
  4. key

918 .In a sophisticated application development software, nulls can create problems when using functions such as               

  1. COUNT
  3. SUM     
  4. D.  COUNT, SUM, and AVERAGE

919. We can describe a link by observing that ____.

  1. a primary key of one table appears again as a primary key in a related table
  2. a foreign key of one table appears again as a foreign key in a related table
  3. a primary key of one table appears again as a foreign key in a related table
  4. a foreign key of one table appears again as a primary key in a related table ANS 

920. User rights information is stored in

  1. Physical database  
  2. Catalog
  3. Logical database   
  4. Buffer

921. Making a change to the conceptual schema of a database but not affecting the existing external schemas is an example of

  1. Physical data independence
  2. Concurrency control.
  3. Logical data independence.  
  4. Functional dependency

 922. Identify the constraint that limits the values that can be placed in a column.

  1. NOT NULL    
  2. CHECK
  4. UNIQUE                               

923. Which of the following enforces a relation into 1st normal form?

  1. The domain of attribute must include only atomic values.
  2. Every non-key attribute is fully functionally dependent on primary key
  3. non-key  attribute is non-transitively dependent on primary key.
  4. Every non-key attribute is partially dependent on super key                      

924. Controlling redundancy in a database management system DOES NOT help to

  1. avoid duplication
  2. avoid unnecessary wastage of storage space 
  3. avoid unauthorized access to data  avoid inconsistency among data       

925. Which of the following is CORRECT about database management system’s languages?

  1. Data definition languages are used to specify the conceptual schema only.
  2. Data manipulation languages are used to create the databases.
  3. Data manipulation languages are used for retrieval, insertion, deletion and modification of data.
  4. Data definition languages are only used to update data in the DBMS.     

926. Which of the following is INCORRECT statement concerning the database design process?

  1. During requirements collection and analysis phase, one can gather the data requirements of
  2. database users.
  3. By referring to a high level data model, it is possible to underst and the data requirements of the users, entity types, relationships and constraints.
  4. Transformation of the high level data model into the implementation data model is called logical design or data model mapping.
  5. During the logical design phase of internal storage structures, access paths and file organization for the database files are specified.

927. Identify the INCORRECT statement among the given.

  1. An entity may be an object with a physical existence like a car, a house or an Employee.  One cannot consider something which has conceptual existence like a course in a degree program as an
  2. entity.
  3. Age can be considered as a single value attribute of a person.
  4. An entity type describes the schema or intension for a set of entities which share the same structure.

928. Select the correct statement among the following.

  1. Role names are not technically necessary in relationship types when all the participating entity types are distinct.
  2. When different entity types participate only once in a single relationship type it is called a recursive relationship.
  3. Cardinality ratios for binary relationship are displayed on Entity Relationship Diagrams by using a diamond shape notation.
  4. Partial participation which is also called existence dependency is displayed as a double line connecting the participating entity type to the relationship.

929.In a relation, which of the following refers by the Structural constraints?

  1. finding the owner entity type relevant to a given entity type.
  2. the number of relationship instances which an entity can participate in.
  3. the role that a participating entity from the entity type plays in each relationship instance.
  4. the constraints applicable in granting access to tables, columns and views in a database
  5. schema 

930. Identify the correct statement.

  1. Entity integrity constraints specify that primary key values can be composite.
  2. Entity integrity constraints are specified on individual relations.
  3. Entity integrity constraints are specified between weak entities.
  4. When entity integrity rules are enforced,
  5. a row in one relation that refers to another relation must refer to an existing tuple.

931.Which of the following is true about relational schema?

  1. The sequence of columns is significant
  2. The sequence of rows is significant.
  3. Contains only derived attributes.  Values are atomic.    

932. Identify the factor which enforces a relation in 3NF?

  1. Every non-key attribute is fully functionally dependent on primary key
  2. Every non-key attribute is partially dependent on super key
  3. The domain of attribute must include only atomic values.  Every non-key attribute is non-transitively dependent on primary key.
  4. all           

933. If W, X, Y and Z are attributes of a relation, which of the following inference rules for functional dependencies is correct?

  1. If (X, Z) -> Y then X -> Y and Z -> Y.  If X -> Y and X -> Z then X -> (Y, Z). 
  2. If X      Y then Y -> X
  3. If X -> Y then (X, Z) -> (Y,W).
  4. all 

934. Which of the following is not a benefit of normalization?

  1. Minimize insertion anomalies
  2. Minimize deletion anomalies 
  3. Minimize updating anomalies 
  4. Maximize redundancy

935. A candidate key that does not have a null value and is selected to uniquely identify all other attribute values in any given row is called a ____.

  1. Super key
  2. candidate key
  3. primary key
  4. secondary key

936. What is sub-type discriminator?

  1. The subtype discriminator,
  2. you  will add to the super type table for a disjoint condition (or non-overlapping condition).
  3. The purpose of the subtype discriminator is to help you avoid having to
  4. write sub queries or joins just to find information
  5. Such as the names of all AARP members.
  6. But when subtypes overlap, this simple discriminator structure doesn’t work.

937. In which condition a relation in first normal form, automatically turns into the second normal form?

  1. Those that do not depend upon the combination
  2. key, are moved to another table on whose key they depend on.

938. Structures which do not contain combination keys are automatically in second normal form.  State the two major benefits of referential integrity constraints?

  1. Often, in relational database,
  2. to ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.
  3. This condition is called Referential integrity (RI).
  4. It  is the concept of relationships between tables, based on the definition of a primary key and a foreign key.

939. The following summarize the benefits of referential integrity

  1. Ensure data integrity and consistency base on primary key and foreign key ..
  2. Increases development productivity, because it is not necessary to code
  3. SQL statements to enforce referential constraints,
  4. the  data RDBMS automatically enforces referential integrity.

940. What is table. 

  1. it consist of rows and columns.
  2. The columns save the qualities that describe the group of data.
  3. Every row contains full record of a particular data.
  4. Every table has a Primary key which denotes
  5. all

942. Consider the following two columns. The Column A consists of terms related to the ER model and Column B consists of terms used in the relational model.?

  1. The terms in Column A have been mapped to Column B so that it corresponds to the mapping process of the ER Model into a Relational model.
  2. Map
  3. each of the entry in column A to the appropriate entry
  4. in column B

943.  Relation

  1. A relation is a table that holds the data we are interested in.
  2. It is two-dimensional and has rows and columns.
  3. none

944. Each entity type in the ER model is mapped into a relation.

  1. The attributes become the columns.
  2. The individual entities become the rows.
  3. 1-entity    type relation
  4. 2key attributes>>>primary or secondary keys
  5. 3->composite attribute-> relation and foreign keys )

945. Why do we need to know the specific data model of any DBMS?

  1. all.
  2. Hierarchical Model
  3. Network Model Relational Model
  4. Data in a series of records, which have a set of field values attached to it. It collects all the instances of a specific record together as a record type.
  5. These record types are the equivalent of

946.Type of t

  1. Logical modeling
  2. Physical modeling
  3. all

947. logical model

  1. Logical modeling deals with gathering business requirements and converting those requirements into a model.
  2. The logical model revolves around the needs of the business, not the database
  3. All
  4. needs of the business are used to establish the needs of the database.
  5. Logical modeling involves gathering information about business processes, business entities

948. Diagram

  1. The diagrams produced should show the processes and data that exists, as well as the relationships between business processes and data.
  2. Logical modeling should accurately render a visual
  3. representation of the activities and data relevant to a particular business.
  4. The diagrams and documentation generated during logical modeling is used to determine whether the requirements of the business have been completely gathered.

949 . Entity relationship diagrams

  1. An Entity Relationship Diagram is also referred to as an analysis ERD.
  2. ERD is to provide the development team with a picture of the different categories
  3. categorize data

950. Business process diagrams

  1. The process model illustrates all the parent and child processes that are performed by individuals within a company.
  2. The process model gives the development team an idea of how data moves within
  3.  all