DBMS MCQ
DBMS MCQ
Which of the following is generally used for performing tasks like creating the structure of the
relations, deleting relation?
b. Query
c. Relational Schema
e. DQL
2. Which of the following provides the ability to query information from the database and insert
tuples into, delete tuples from, and modify tuples in the database?
c. Query
d. Relational Schema
e. DQL
3. Which one of the following given statements possibly contains the error?
d. Both A and C
e. Both A and B
7. Which of the following can be considered as the maximum size that is supported by FAT?
a. 8GB
b. 4GB
c. 4TB
d. 2TB
d. Both A and C
e. Both A and B
9. A huge collection of the information or data accumulated form several different sources is
known as ________:
a. Data Management
b. Data Mining
c. Data Warehouse
d. Both B and A
10. Which of the following can be used to extract or filter the data & information from the data
warehouse?
a. Data redundancy
c. Data mining
d. Both B and C
11. Which one of the following refers to the copies of the same data (or information) occupying the
memory space at multiple places.
a. Data Repository
b. Data Inconsistency
c. Data Mining
d. Data Manipulation
e. Data Redundancy
12. Which one of the following refers to the "data about data"?
a. Directory
b. Sub Data
c. Warehouse
d. Meta Data
e. My data
13. Which of the following refers to the level of data abstraction that describes exactly how the data
actually stored?
a. Conceptual Level
b. Physical Level
c. File Level
d. Logical Level
e. File Transfer
b. Database Administrator
c. Data Administrator
e. Data Man
15. In general, a file is basically a collection of all related______.
b. Fields
c. Database
d. Records
e. Stock
b. Basic information
d. Both A and C
a. Degree
b. Tuples
c. Entity
d. Attribute
a. Entity
b. Column
c. Cardinality
d. Constant
a. Create
b. Alter
c. Delete
d. Drop
20. Which of the following command is a type of Data Definition language command?
a. Create
b. Update
c. Delete
d. Merge
e. Delete
21. Which of the following is a top-down approach in which the entity's higher level can be divided
into two lower sub-entities?
a. Aggregation
b. Generalization
c. Specialization
d. Marge
a. Specialization
b. Generalization
c. Aggregation
d. Marge
23. In a relation database, every tuples divided into the fields are known as the______.
a. Queries
b. Domains
c. Relations
d. Tuples
25. In the relational table, which of the following can also be represented by the term "attribute"?
a. Entity
b. Row
c. Column
d. Both B & C
e. Both B & A
a. Degree
b. Row
c. Column
d. Data
27. Which of the following is used in the application programs to request data from the database
management system?
28. Which one of the following command is used to delete the existing row in a table?
a. Delete
b. Update
c. Insert
d. into
a. Commit
b. Rollback
c. Savepoint
d. gotback
30. Which one of the following commands is used to restore the database to the last committed
state?
a. Savepoint
b. Rollback
c. Commit
d. Both A & B
e. Both A & C
31. The database management system can be considered as the collection of ______ that enables
us to create and maintain the database.
a. Translators
b. Programs
c. Keys
d. Language activity
e. Constant
33. Which of the following refers collection of the information stored in a database at a specific
time?
a. Independence
c. Schema
d. Data domain
e. Data Name
d. Both B & C
e. Both B & A
36. What is the relation calculus?
b. It is a non-procedural language
c. It is a high-level language
37. Which one of the following refers to the total view of the database content?
a. Conceptual view
b. Physical view
c. Internal view
d. External view
e. Inner view
a. One level
b. Two-level
c. Three-level
d. Four level
e. Eight level
41. In the relation model, the relation are generally termed as ________
a. Tuples
b. Attributes
c. Rows
d. Tables
e. Delete
42. The Database Management Query language is generally designed for the _____
43. Which of the following keys is generally used to represents the relationships between the
tables?
a. Primary key
b. Foreign key
c. Secondary key
d. Partial key
44. Which of the following levels is considered as the level closed to the end-users?
a. Internal Level
b. External Level
c. Conceptual Level
d. Physical Level
e. Inner Level
45. A computer security protocol for logging-in can be considered as the example of the ______
component of an information system.
a. Data
b. Software
c. Procedure
d. Hardware
e. Function
46. Which one of the following keyword is used to find out the number of values in a column?
a. TOTAL
b. COUNT
c. SUM
d. ADD
e. MAX
47. Which one of the following is commonly used to define the overall design of the database?
a. Application program
c. Schema
d. Source code
e. User Code
48. Which one of the following commands is used to modify a column inside a table?
a. Drop
b. Update
c. Alter
d. Set
e. get
a. A number of tuples.
b. A number of attributes.
c. A number of tables.
d. A number of constraints.
e. A number of file
a. Procedural language.
b. Non- Procedural language.
d. High-level language.
a. Conceptual view.
b. Internal view.
c. External view.
d. Physical view
e. Logical view
a. a Unary operator.
b. a Binary operator.
c. a Ternary operator.
d. A temporary operator
e. not defined.
a. Selection operation.
b. Rename operation.
c. Join operation.
d. Projection operation.
e. Direction operation
55. An entity set that does not have sufficient attributes to form a primary key is a
e. data key
a. Graph.
b. List.
c. Links.
d. Tree.
e. Line
a. rectangle.
b. square.
c. ellipse.
d. triangle.
e. round
a. not Null
b. Null
d. any value.
a. update files.
c. data entry.
d. delete files.
e. Alter files