100% found this document useful (1 vote)
46 views

Database Question For Exit

Uploaded by

aaaabeni6
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
46 views

Database Question For Exit

Uploaded by

aaaabeni6
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

1. The _____________________________ states that no primary key value can be NULL.

a. referential integrity constraint


b. Entity integrity constraint
c. domain constraint
d. semantic integrity constraints
e. none
answer b
2. Storing same data in many places is called _______.
a. Iteration
b. redundancy
c. concurrency
d. enumeration
e. none
answer b
3. Which of the following data constraints would be used to specify that the value of cells in a
column must be one of a specific set of possible values?
a. A domain constraint
b. A range constraint
c. An intrarelation constraint
d. relation constraint
e. all
Answer a
4. _______ language is used to specify the user views and their mappings to conceptual schema.
a. VDL
b. SDL
c. DDL
d. DML
e. A and b
Answer a
5. _______ is a collection of programs that enables users to create and maintain a database.
a. RTS
b. DBMS
c. IS
d. AI
e. None
Answer b
6. Multimedia database is _______
a. a Database type
b. a Database functionality
c. a Database Example
d. a and b
e. None
Answer a
7. _______ determines the requirements of end-users and develop specifications for those
requirements.
a. database administrators
b. application programmers
c. system analyst
d. auditors
e. none
answer c
8. ______ is a subset of database.
a. Portion
b. Scene
c. view
d. part
e. none
answer c
9. _______ language is used to do insertion, deletion, retrieval, and modification of data.
a. VDL
b. SDL
c. DDL
d. DML
e. A and c
Answer d
10. A state that satisfies the structure and constraints of a scheme is called ______ state.
a. Invalid
b. True
c. Real
d. Valid
e. None
answer d
11. The database state is called _______ of the schema.
a. Intension
b. Extension
c. Expansion
d. Definition
e. All
Answer b
12. ________ is the basic object of ER model which is a thing in real world.
a. Relation
b. Domain
c. Attribute
d. Entity
e. None
Answer d
13. _______ attributes can have more than one value.
a. Composite
b. Simple
c. multi-valued
d. single valued
e. none
answer c
14. The entity is represented in ER-diagrams by ______.
a. Oval
b. Rectangle
c. double oval
d. diamond
e. none
answer b
15. ________ attribute values are used to identify each entity uniquely.
a. Complex
b. Unique
c. Characters
d. key
e. none
answer d
16. The relationships are displayed as _______ in ER-diagrams.
a. Rectangles
b. Ovals
c. Triangles
d. Diamonds
e. None
answer d
17. The partial key attribute is underlined with a ______ line.
a. Single
b. Shaded
c. Dotted
d. Double
e. None
answer c
18. In ER diagrams, the total participation is displayed as a _______.
a. Oval
b. single line
c. double line
d. arrow
e. none
answer c
19. A weak entity type always has a ______ participation constraint with respect to its identifying
relationships.
a. Partial
b. Total
c. Overlap
d. disjoint
e. none
answer b
20. A ______________ is an executing program or process that includes one or more database
accesses, such as reading or updating of database records.
a. Transaction
b. Query
c. Database
d. Schema
e. Instance
Answer a
21. Which one of the following is a relation of tuple 4?
a. R (A, BC, BB, CC, R, AA)
b. R (EE, R, T, Y, U, XX, CC)
c. R (ABC, BBC,CCD,DC,C)
d. R (TT,A,B,C,RR,EE,RRT)
e. None of the above
Answer e
22. One of the following characteristics of database deal with making change to the data structure
and storage organization without having to change the DBMS access programs.
a. Self-describing nature of a database system
b. Insulation between programs and data
c. Support of multiple views of the data
d. Sharing of data and multiuser transaction processing
e. None
Answer b
23. ____________ implement the specifications developed by analysts and test and debug them
before deployment.
a. Parametric end user
b. Naïve end user
c. Standalone end user
d. Sophisticated end user
e. None
Answer e
24. The association between two or more entity in ER model is
a. Relationship
b. Unique key
c. Multivalued attribute
d. Object Model
e. None
Answer a
25. The difference between schema and instance is
a. The schema describes the database sate but instance describe the structure only.
b. The schema is data in the database at a particular moment in time but the instance is data
during all time.
c. The instance is data in the database at a particular moment in time but the schema is data
during all time.
d. The instance is data in the database at a given point time but the schema is the structure of
the database.
e. A and b
Answer d
26. car_color attribute of a car can be
a. Multivalued attribute
b. Composite attribute
c. Derived attribute
d. Single value attribute
e. B and d
f. C and d
Answer a
27. Which one of the following can be semantic integrity constraint?
a. Data type constraint
b. Primary key constraint
c. Implemented by model
d. Can be enforced by application
e. a and b None
answer d
28. Each binary many to one relationship in E-R diagram are transformed into _________
a. Attribute
b. Tuple
c. Relation
d. Constraint
e. Domain
Answer a
29. Student (Student_ID, sex, Dept_Name, Dateofbirth) and Department (Dept_Name,
Dept_code, location), in both relations Dept_Name attribute exist; using common
attribute in relational schema is one way of relating _________________ relations.
a. Attribute of distinct
b. Attribute of common
c. Tuple distinct
d. Tuple of common
e. A and C

Answer b
30. A set of attributes (or combination of attributes) whose value is unique across all
occurrences of a relation.
a. Primary key
b. Candidate key
c. Super key
d. Foreign key attribute
e. None
Answer a
31. Given the following relation, one of the following is not true
R(a1,a2,a3,a4,a5,a6,a7) , a2 and a6 are candidate key
a. a4,a5,a3,a6 can be a superkey of R
b. a2 and a6 can be a super key of R
c. a2 can be a superkey of R
d. a2,a4,a5 can be a superkey of R
e. None
Answer e
32. Multimedia Database is
a. a Database type
b. a Database functionality
c. a Database Example
d. None
e. A and b
Answer a

33. Which SQL constraint do we use to set some value to a field whose value has not been
added explicitly?
a. Default
b. Unique
c. Not null
d. Check
e. None
Answer c
34. _______ is responsible for authorizing access to the database.
a. database administrators
b. application programmers
c. system analyst
d. auditors
e. none
answer a

35. A __is an executing program or process that includes one or more database access.
a. Transaction
b. Object
c. Procedure
d. application
e. none
answer a
36. ______ is the ability to change the schema at one level of a database system without
having to change the schema at next higher level.
a. data exchange
b. data dependence
c. data independence
d. data binding
e. none
answer c
37. DBMS combines everything into single system including- DBMS software, hardware,
application programs and user interface processing software.
a. Distributed
b. Centralized
c. Client
d. All
e. None
Answer b
38. To change the physical file structure the ________ scheme needs to be changed
a. Conceptual
b. View
c. Logical
d. low-level
e. none
answer d
39. architectures are common for web applications
a. One tier
b. Two tiers
c. Three tires
d. Centralized
e. None
Answer c
40. _______ language is used to do insertion, deletion, retrieval, and modification of data.
a. VDL
b. SDL
c. DDL
d. DML
e. A and b
Answer d
41. _______ language is used to specify the internal schema.
a. VDL
b. SDL
c. DDL
d. DML
e. None
Answer c
42. Security is a typical DBMS function aims to protect databases from _______
a. Data Visualization
b. Unauthorized access
c. Data loss
d. A and b
e. Non
Answer b
43. Procedural language among the following is __________
a. Domain relational calculus
b. Tuple relational calculus
c. Relational algebra
d. Query language
e. none
Answer c
44. In a 1:N relationship, the foreign key is placed in:
a. either table without specifying parent and child tables.
b. the one side table.
c. the many side table.
d. either the one table or the many table.
e. None
Answer c
45. One of the following approaches is true in mapping of Binary 1:1 Relation Types
a. Foreign key approaches
b. Merged relationship
c. Relationship relation
d. All
e. A and b
Answer d
46. Which of the following is a fundamental operation in relational algebra?
a. Set intersection
b. Natural join
c. Assignment
d. All of the above
e. None of the above
Answer e none of the above
47. Which is not a unary operation:
a. Selection operation
b. rename operation
c. Projection operation
d. Generalized selection
e. None
Answer a Selection operation
48. Which is a join condition that contains an equality operator:
a. Equijoins
b. Cartesian
c. Natural
d. Left
e. None
Answer a equijoins
49. The wildcard in a WHERE clause is useful when?
a. An exact match is necessary in a SELECT statement.
b. An exact match is not possible in a SELECT statement.
c. An exact match is necessary in a CREATE statement.
d. An exact match is not possible in a CREATE statement.

Answer b An exact match is not possible in a SELECT statement.

50. Which of the following SQL statements is used to retrieve data from a database?
a. DELETE
b. UPDATE
c. SELECT
d. INSERT
e. none
Answer: c SELECT
51. What is the purpose of the WHERE clause in an SQL statement?
a. To specify the columns to be retrieved
b. To specify the table to be updated
c. To filter rows based on a condition
d. To join multiple tables
e. None
Answer: c To filter rows based on a condition
52. Which SQL command is used to create a new table?
a. ALTER TABLE
b. CREATE TABLE
c. UPDATE TABLE
d. INSERT INTO
Answer: b CREATE TABLE
53. What is the function of the GROUP BY clause in an SQL query?
a. To filter rows based on a condition
b. To sort the result set in ascending order
c. To group rows that have the same values into summary rows
d. To join multiple tables
e. none
Answer: c To group rows that have the same values into summary rows
54. Which SQL statement is used to add a new row to a table?
a. ADD ROW
b. INSERT INTO
c. CREATE ROW
d. UPDATE ROW
e. None
Answer: b INSERT INTO
55. What is the purpose of the ORDER BY clause in an SQL query?
a. To filter rows based on a condition
b. To group rows that have the same values into summary rows
c. To sort the result set in ascending or descending order
d. To join multiple tables
e. None
Answer: c To sort the result set in ascending or descending order
56. Which SQL command is used to update existing data in a table?
a. MODIFY
b. REPLACE
c. UPDATE
d. CHANGE
e. none
Answer: c UPDATE
57. What does the SQL keyword "DISTINCT" do in a SELECT statement?
a. It specifies that only unique values should be returned
b. It sorts the result set in ascending order
c. It groups rows that have the same values into summary rows
d. It joins multiple tables
e. none
Answer: a It specifies that only unique values should be returned
58. Which SQL function is used to calculate the total number of rows in a table?
a. COUNT(*)
b. SUM()
c. AVG()
d. MAX()
e. none
Answer: a COUNT(*)
59. What does the SQL keyword "JOIN" do in a SELECT statement?
a. It specifies which columns to retrieve
b. It filters rows based on a condition
c. It combines rows from two or more tables based on a related column between them
d. It groups rows that have the same values into summary rows
e. none
Answer: c It combines rows from two or more tables based on a related column between them
60. Which of the following SQL command is used for removing (or deleting) a relation
form the database?
a. Drop
b. Remove
c. Delete
d. Rollback
e. None
Answer a
61. Which of the following is known as minimal super key?
a. Foreign key
b. Primary key
c. Candidate key
d. A and b
e. None
Answer b
62. Which one of the following is not an option if a delete operation causes a violation
a. Restrict
b. Cascade
c. Set null
d. Set default
e. None
Answer e
63.

You might also like