

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Master of Computer Applications (MCA) .
Chapters
51. |
Which of the following is database element? |
A. | Data |
B. | Constraints and schema |
C. | Relationships |
D. | All of these. |
Answer» D. All of these. |
52. |
What separates the physical aspects of data storage from the logical aspects of data representation? |
A. | Data |
B. | Schema |
C. | Constraints |
D. | Relationships |
Answer» D. Relationships |
53. |
What scheme defines how and where the data are organized in a physical data storage? |
A. | External |
B. | Internal |
C. | Conceptual |
D. | None of these. |
Answer» A. External |
54. |
Which of the following schemas defines the stored data structures in terms of the database model used? |
A. | External |
B. | Conceptual |
C. | Internal |
D. | None of these |
Answer» B. Conceptual |
55. |
Which of the following schemas defines a view or views of the database for particular users? |
A. | External |
B. | Conceptual |
C. | Internal |
D. | None of these |
Answer» B. Conceptual |
56. |
A collection of data designed to be used by different people is called. |
A. | Database |
B. | RDBMS |
C. | DBMS |
D. | None of these |
Answer» A. Database |
57. |
Which of the following is an object-oriented feature? |
A. | Inheritance |
B. | Abstraction |
C. | Polymorphism |
D. | All of these |
Answer» B. Abstraction |
58. |
In ……………technique, data splits at decision points based on entropy |
A. | Cluster detection |
B. | Decision trees |
C. | Link analysis |
D. | All of the above |
Answer» D. All of the above |
59. |
Association of unknown instances with known instances is a process of………….technique |
A. | Memory based reasoning |
B. | Link analysis |
C. | Neural network |
D. | Genetic algorithm |
Answer» A. Memory based reasoning |
60. |
Which technique is based on linking of variables |
A. | Cluster detection |
B. | Decision trees |
C. | Link analysis |
D. | All of the above |
Answer» B. Decision trees |
61. |
Forward propagation network is a structure of…………….. |
A. | Memory based reasoning |
B. | Link analysis |
C. | Neural network |
D. | Genetic algorithm |
Answer» B. Link analysis |
62. |
Data mining applications include |
A. | Customer segmentation |
B. | Market basket analysis |
C. | Risk management |
D. | All of the above |
Answer» D. All of the above |
63. |
Fraud detection is an application of |
A. | Data warehousing |
B. | Data mining |
C. | Both I and ii |
D. | None of the above |
Answer» D. None of the above |
64. |
…………….is a best source of data for a data mining operation |
A. | OLAP |
B. | Data warehouse |
C. | OLTP |
D. | None of the above |
Answer» B. Data warehouse |
65. |
…………….uncovers relationships and patterns in the existing data |
A. | Data mining |
B. | Data warehouse |
C. | OLAP |
D. | None of the above |
Answer» D. None of the above |
66. |
…………….steps comprise the knowledge discovery process |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» A. 3 |
67. |
Data mining is |
A. | Data driven |
B. | User driven |
C. | Both I and ii |
D. | None of the above |
Answer» B. User driven |
68. |
OLAP is |
A. | Data driven |
B. | User driven |
C. | Both I and ii |
D. | None of the above |
Answer» B. User driven |
69. |
Which of the following is an advantage of a database? |
A. | Reduction in Redundancy |
B. | Avoidance of inconsistency |
C. | Security enforcement |
D. | All of the above |
Answer» D. All of the above |
70. |
Which of the following is an example of a database application? |
A. | Computerized library systems |
B. | ATMs |
C. | Flight reservation systems |
D. | All of the above |
Answer» D. All of the above |
71. |
DBMS stands for________________? |
A. | Data blocking and Management Systems |
B. | Database Management Systems |
C. | Database Business Management Systems |
D. | None of the above |
Answer» B. Database Management Systems |
72. |
What is the name of the system database that contains descriptions of the data in the database? |
A. | Metadata |
B. | Data dictionary |
C. | Table |
D. | None of the above |
Answer» B. Data dictionary |
73. |
IMS stands for ___________ |
A. | Information Management System |
B. | Internal Mechanical Security |
C. | International Managers Society |
D. | None of the above |
Answer» A. Information Management System |
74. |
Which of the following is the oldest database model? |
A. | Hierarchical |
B. | Network |
C. | Relational |
D. | Object Oriented |
Answer» A. Hierarchical |
75. |
Which category of users need not be aware of the presence of the database system? |
A. | DBA |
B. | Naive |
C. | Casual |
D. | Application Programmers |
Answer» B. Naive |
76. |
The different classes of relations created by the technique for preventing modification anomalies are called: |
A. | normal forms. |
B. | referential integrity constraints. |
C. | functional dependencies. |
D. | None of the above is correct. |
Answer» A. normal forms. |
77. |
A relation is in this form if it is in BCNF and has no multivalued dependencies: |
A. | second normal form. |
B. | third normal form. |
C. | fourth normal form. |
D. | domain/key normal form. |
Answer» C. fourth normal form. |
78. |
The primary key is selected from the: |
A. | composite keys. |
B. | determinants. |
C. | candidate keys. |
D. | foreign keys. |
Answer» C. candidate keys. |
79. |
In the relational model, relationships between relations or tables are created by using: |
A. | composite keys. |
B. | determinants. |
C. | candidate keys. |
D. | foreign keys. |
Answer» D. foreign keys. |
80. |
A relation is considered a: |
A. | Column. |
B. | one-dimensional table. |
C. | two-dimensional table. |
D. | three-dimensional table. |
Answer» C. two-dimensional table. |
81. |
For some relations, changing the data can have undesirable consequences called: |
A. | referential integrity constraints. |
B. | modification anomalies. |
C. | normal forms. |
D. | transitive dependencies. |
Answer» B. modification anomalies. |
82. |
If attribute A determines both attributes B and C, then it is also true that: |
A. | A → B. |
B. | B → A. |
C. | C → A. |
D. | (B,C) → A. |
Answer» A. A → B. |
83. |
One solution to the multivalued dependency constraint problem is to: split the relation into two relations, each with a single theme. |
A. | change the theme. |
B. | create a new theme. |
C. | add a composite key. |
D. | none |
Answer» A. change the theme. |
84. |
When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n): |
A. | transitive dependency. |
B. | insertion anomaly. |
C. | referential integrity constraint. |
D. | normal form. |
Answer» C. referential integrity constraint. |
85. |
In a one-to-many relationship, the entity that is on the one side of the relationship is called a(n) ________ entity. |
A. | Parent |
B. | Child |
C. | Instance |
D. | Subtype |
Answer» A. Parent |
86. |
Who developed SEQUEL? |
A. | Dr. E.F. Codd |
B. | Chris Date |
D. | Chamberlain |
Answer» D. Chamberlain |
87. |
Which of the following is used to get all the columns of a table ? |
A. | * |
B. | @ |
C. | % |
D. | # |
Answer» A. * |
88. |
The first commercial RDBMS is: |
A. | INGRESS |
B. | DB2 |
C. | ORACLE |
D. | None of these. |
Answer» A. INGRESS |
89. |
Which of the following is not a DCL statement? |
A. | Rollback |
B. | Grant |
C. | Revoke |
D. | None of these |
Answer» A. Rollback |
90. |
Which of the following is the result of a select statement? |
A. | Trigger |
B. | Index |
C. | Table |
D. | None of these |
Answer» C. Table |
91. |
Which of the following clause specifies the table or tables from where the data has to be retrieved? |
A. | Where |
B. | Table |
C. | From |
D. | None of these |
Answer» C. From |
92. |
How many tables can be joined to create a view? |
A. | 1 |
B. | 2 |
C. | Database dependent |
D. | None of these |
Answer» A. 1 |
93. |
Which of the following can be used to get those items that fall within a range? |
A. | IN |
B. | BETWEEN |
C. | DISTINCT |
D. | LIKE |
Answer» B. BETWEEN | |
Explanation: The BETWEEN operator is used in SQL to filter the results that fall within a specific range of values (inclusive). For example: SELECT * FROM products WHERE price BETWEEN 10 AND 50; IN: is used to filter results that match any value in a list. DISTINCT: is used to return unique values. LIKE: is used for pattern matching in strings. |
94. |
Which of the following constitutes a basic set of operations for manipulating relational data? |
A. | Predicate calculus |
B. | Relational algebra |
C. | Relational calculus |
D. | None of the above |
Answer» B. Relational algebra |
95. |
Which of the following is not a relational algebraic operation that is not form the set theory? |
A. | UNION |
B. | INTERSECTION |
C. | CARTESIAN PRODUCT |
D. | SELECT |
Answer» D. SELECT |
96. |
Which of the following is not a relational algebraic operation that is developed specifically for the relational databases? |
A. | SELECT |
B. | UNION |
C. | JOIN |
D. | PROJECT |
Answer» B. UNION |
97. |
Which is the symbol used to denote the SELECT operation? |
A. | Sigma |
B. | Rho |
C. | Pi |
D. | None of the above |
Answer» A. Sigma |
98. |
Which of the following operations need the participating relations to be union compatible? |
A. | UNION |
B. | INTERSECTION |
C. | DIFFERENCE |
D. | All of the above |
Answer» D. All of the above |
99. |
What will be the number of columns of CARTESIAN PRODCUT if the participating relations have 5 and 7 columns respectively? |
A. | 5 |
B. | 12 |
C. | 35 |
D. | None of the above |
Answer» B. 12 |
100. |
What will be the number of columns of CARTESIAN PRODCUT if the participating relations have 5 and 20 rows respectively? |
A. | 5 |
B. | 20 |
C. | 25 |
D. | 100 |
Answer» D. 100 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.