Saturday, 16 July 2016

Computer Awareness Quiz : DBMS Advance Level 64 MCQs for Aptitude and Competitive Examinations

Dear Readers. Today we are presenting DBMS Advance Level MCQs for Aptitude and Competitive Examinations. Computer Awareness is much more scoring section in every competitive and upcoming bank examinations. So, you practice with here 64 objective type questions for your better exam preparation. These computer awareness questions are helpful for RBI Grade 'B' officer Exam, SBI PO and SBI Clerk Mains Exams and IBPS PO/MT and Specialist Officer (SO) exam etc.

Q.1. The first generation of DBMS is represented by systems
a. Hierarchical and CODASYL systems.
b. Relational model
c. Network model
d. None of the above



Q.2. Which of the following SQL statements are helpful in database redesign?
a. Correlated subqueries only
b. EXISTS/NOT EXISTS expressions only
c. Both of the above are helpful
d. None of the above are helpful.

Q.3. What SQL command can be used to delete columns from a table?
a. MODIFY TABLE TableName DROP COLUMN ColumnName
b. MODIFY TABLE TableName DROP ColumnName
c. ALTER TABLE TableName DROP COLUMN ColumnName
d. ALTER TABLE TableName DROP ColumnName

Q.4. Database redesign is not terribly difficult if the:
a. database is structured
b. database is well-designed.
c. database has no data
d. database is relatively small

Q.5. Which SQL-92 standard SQL command can be used to change a table name?
a. RENAME TABLE
b. CHANGE TABLE
c. ALTER TABLE
d. None of the above is correct

Q.6. The process of reading a database schema and producing a data model from that schema is known as:
a. data modeling
b. database design
c. reverse engineering
d. None of the above is correct

Q.7. Before any changes to database structure are attempted one should first:
a. clearly understand the current structure and contents of the database only
b. test any changes on a test database only.
c. create a complete backup of the operational database only
d. All of the above should be done

Q.8. Which of the following modifications may not succeed?
a. Changing a column data type from char to date
b. Changing a column data type from numeric to char
c. Both of the above actions should succeed
d. Neither of the above actions will succeed

Q.9. A regular sub-query can be processed:
a. from the top down
b. from the bottom up
c. by nesting
d. None of the above is correct

Q.10. What SQL command can be used to add columns to a table?
a. MODIFY TABLE TableName ADD COLUMN ColumnName
b. MODIFY TABLE TableName ADD ColumnName
c. ALTER TABLE TableName ADD COLUMN ColumnName
d. ALTER TABLE TableName ADD ColumnName

Q.11. The EXISTS keyword will be true if:
a. any row in the subquery meets the condition only
b. all rows in the subquery fail the condition only.
c. both of these two conditions are met.
d. neither of these two conditions is met.

Q.12. Changing cardinalities in a database is:
a. a common database design task
b. a rare database design task, but does occur.
c. a database design task that never occurs.
d. is impossible to do, so a new database must be constructed and the data moved into it.

Q.13. The NOT EXISTS keyword will be true if:
a. any row in the subquery meets the condition.
b. all rows in the subquery fail the condition.
c. both of these two conditions are met.
d. neither of these two conditions is met

Q.14. The data model that is produced from reverse engineering is:
a. a conceptual model.
b. an internal model.
c. a logical model.
d. None of the above is correct

Q.15. To drop a column that is used as a foreign key, first:
a. drop the primary key.
b. drop the table containing the foreign key
c. drop the foreign key constraint
d. All of the above must be done

Q.16. What SQL command will allow you to change the table STUDENT to add the constraint named Grade Check that states that the values of the Grade column must be greater than 0?
a. ALTER TABLE STUDENT ALTER CONSTRAINT GradeCheck (Grade > 0);
b. ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck (Grade > 0);
c. ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck CHECK (Grade > 0);
d. None of the above is correct.

Q.17. Which is not true of a correlated sub query?
a. EXISTS/NOT EXISTS is a form of a correlated subquery.
b. The processing of the SELECT statements is nested.
c. They can be used to verify functional dependencies.
d. They are very similar to a regular subquery

Q.18. A tool that can help designers understand the dependencies of database structures is a ___________?
a. dependency graph.
b. data model
c. graphical display
d. None of the above is correct.

Q.19. Data is a ___________?
a. Raw fact and figure
b. Metadata
c. Information only
d. None of the above.

Q.20. A repository of information about a database is known as a ___________?
a. Data Dictionary
b. Distributed database
c. File
d. None of the above

Q.21. The overall description of the database is known as ___________?
a. Instance
b. Schema
c. Snapshot
d. None of the above

Q.22. Schema is same as an ___________?
a. Extension of the database
b. Intension of the database
c. Subschema
d. None of the above

Q.23. The physical storage structures of devices could be changed without affecting conceptual schema. This is known as ___________?
a. Physical data independence
b. Logical data independence
c. External data independence
d. None of the above

Q.24. Create, Alter and Drop are the examples of ___________?
a. DDL
b. DML
c. VDL
d. SDL

Q.25. The term ‘relation’ was chosen by ___________?
a. Dr. Berry Boehm
b. Dr. E.F. Codd.
c. Dr. Jacobson
d. None of the above

Q.26. Each row of data is known as a ___________?
a. Tuple
b. Cardinality
c. Degree
d. None of the above

Q.27. The number of tuples in a relation is known as ___________?
a. Cardinality
b. Degree
c. Modality
d. None of the above

Q.28. ER-model was introduced by ___________?
a. E.F. Codd
b. P.P. Chen
c. Constantine
d. None of the above

Q.29. The primary key of a weak entity needs to be formed. It is known as the ___________?
a. Discriminator or partial key
b. Foreign key
c. Weak key
d. None of the above

Q.30. The process of minimizing the difference between entities by identifying their common characteristics is known as ___________?
a. Specialization
b. Generalization
c. Multiplicity
d. None of the above

Q.31. The process of compiling information on an object, there by abstracting a higher ___________?
level object is known as
a. Specialization
b. Generalization
c. Aggregation
d. None of the above

Q.32. The relationship between a weak entity-set is called as the ___________?
a. Weak relationship
b. Identifying relationship
c. Connecting relationship
d. Associative relationship

Q.33. An ER-diagram that shows the concepts of Specialization and Generalization are known as ___________?
a. Extended ER-diagrams
b. Effective ER-diagrams
c. Expanded ER-diagrams
d. Enhanced ER-diagrams

Q.34. Those candidate keys which are not currently selected as the primary key are called as ___________?
a. Super keys
b. Candidate key
c. Alternate key
d. None of the above

Q.35. A key that has no meaning to the business or organization is  ___________?
a. Candidate key
b. Alternate key
c. Artificial key
d. None of the above

Q.36. A rule that states that in a base relation, the value of attribute of a primary key cannot be null is called as ___________?
a. Entity integrity rule
b. Referential integrity rule
c. Security integrity rule
d. None of the above

Q.37. A virtual relation is also known as a ___________?
a. View
b. Table
c. Snapshot
d. None of the above

Q.38. When we want to display records with attributes from many relations then we use ___________?
a. SELECT operation
b. PROJECT operation
c. JOIN operation
d. None of the above

Q.39. What is the cardinality of a table with 50 rows and 5 columns?
a. 50
b. 5
c. 250
d. None of the above

Q.40. What is the degree of a table with 50 rows and 5 columns? ___________?
a. 50
b. 5
c. 250
d. None of the above

Q.41. To sort records we use ___________?
a. ORDER BY clause
b. HAVING clause
c. GROUP clause
d. None of the above

Q.42. The logical tables of data extracted from existing tables are known as ___________?
a. Records
b. Views
c. Queries
d. None of the above

Q.43. Oracle provides a special table that can be used to test any function. This table is ___________?
a. DUAL table
b. VIEW table
c. CALCULATION table
d. None of the above

Q.44. ROLLBACK, COMMIT and SAVEPOINT are ___________?
a. DMLs
b. DDLs
c. VDLs
d. TCLs


Q.45. Primary indexing is also known as ___________?
a. Clustering index
b. Non-clustering index
c. Pinned indexing
d. None of the above

Q.46. A buffer use to store results of the recent query ___________?
a. Cursor
b. Triggers
c. Packages
d. Exceptions

Q.47. The process of decomposition of a table is known as ___________?
a. Specialization
b. Generalization
c. Normalization
d. None of the above

Q.48. The process of Normalization was proposed by ___________?
a. Dr. E.F. Codd
b. Dr. Berry Boehm
c. Jacobson
d. None of the above

Q.49. An association between two attributes of the same table is known as ___________?
a. Functional Dependency
b. Multi Valued Dependency
c. Join Dependency
d. None of the above

Q.50. After normalization the original table can be obtained by ___________?
a. Delete operation
b. Cascade operation
c. Join operation
d. None of the above

Q.51. Every BCNF is in ___________?
a. 1NF
b. 2NF
c. 3NF
d. 4NF

Q.52. Shadow paging was introduced by ___________?
a. Boehm
b. Dr. E.F. Codd
c. Lorie
d. None of the above

Q.53. Shadowing maintains ___________?
a. 2 tables
b. 3 tables
c. 4 tables
d. None of the above

Q.54. The page size in shadowing technique is of the order ___________?
a. 210 to 215 bytes
b. 211 to 215 bytes
c. 212 to 216 bytes
d. 213 to 217 bytes

Q.55. Shadowing may result in ___________?
a. Page loss
b. Data scattering
c. Page swap
d. None of the above

Q.56. A checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out is called as a ___________?
a. Buffer
b. Fuzzy checkpoint
c. Shadow paging
d. None of the above

Q.57. The point of synchronization between the database and the transaction log file is called as a ___________?
a. Checkpoint
b. Fuzzy checkpoint
c. UNDO and REDO
d. None of the above

Q.58. Shadow paging is used for ___________?
a. Writing same item at same location
b. Writing same item at different location
c. Creating shadow
d. None of the above

Q.59. The process of choosing a suitable execution strategy for processing a query is ___________?
known as
a. Query optimization
b. Query evaluation
c. Query execution plan
d. None of the above

Q.60. The process of sending the result of one operator to another operator without creating a temporary relation to hold the intermediate results is known as___________?
a. Query
b. Relation
c. Pipelining
d. None of the above

Q.61. The syntax of the query is checked by ___________?
a. Parser
b. Compiler
c. Assembler
d. None of the above

Q.62. The first phase of query processing is ___________?
a. Decomposition
b. Restructuring
c. Analysis
d. None of the above

Q.63. The result of a query, in a query tree is represented by ___________?
a. Root node
b. Leaf node
c. Intermediary node
d. None of the above

Q.64. Which of the following query processing method is more efficient.
a. Pipelining
b. Materialization
c. Tunnelling
d. None of the above



More Computer Awareness Quiz Click here

No comments:

Post a Comment

Advertisement