303
117.8k

1410+ DataBase Management System (DBMS) Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Bachelor of Science in Computer Science FY (BSc CS) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Science in Information Technology SY (BSc IT) , Bachelor of Computer Applications (BCA) .

Chapters

More MCQs
601.

Html document must always be saved with:

A. .html
B. .htm
C. .doc
D. both .html & .htm
Answer» D. both .html & .htm
602.

How many levels of headings are in html:

A. 2
B. 7
C. 6
D. 4
Answer» C. 6
603.

The Java                      specification defines an application programming interface for communication between the Web server and the application program.

A. servlet
B. server
C. program
D. randomize
Answer» A. servlet
604.

How many JDBC driver types does Sun define?

A. one
B. two
C. three
D. four
Answer» D. four
605.

Which JDBC driver Type(s) can be used in either applet or servlet code?

A. both type 1 and type 2
B. both type 1 and type 3
C. both type 3 and type 4
D. type 4 only
Answer» C. both type 3 and type 4
606.

What MySQL property is used to create a surrogate key in MySQL?

A. unique
B. sequence
C. auto_increment
D. none of the mentioned
Answer» C. auto_increment
607.

A JSP is transformed into a(n):

A. java applet
B. java servlet
C. either 1 or 2 above
D. neither 1 nor 2 above
Answer» B. java servlet
608.

What is bytecode?

A. machine-specific code
B. java code
C. machine-independent code
D. none of the mentioned
Answer» C. machine-independent code
609.

Where is metadata stored in MySQL?

A. in the mysql database metadata
B. in the mysql database metasql
C. in the mysql database mysql
D. none of the mentioned
Answer» C. in the mysql database mysql
610.

Which of the following is true for Seeheim model?

A. presentation is abstracted from dialogue and application
B. presentation and dialogue is abstracted from application
C. presentation and application is abstracted from dialogue
D. none of the mentioned
Answer» A. presentation is abstracted from dialogue and application
611.

Which of the unit operation is used in Model view controller?

A. is a decomposition
B. part whole decomposition
C. all of the mentioned
D. none of the mentioned
Answer» B. part whole decomposition
612.

Memory address refers to the successive memory words and the machine is called as

A. word addressable
B. byte addressable
C. bit addressable
D. terra byte addressable
Answer» A. word addressable
613.

The                            layer, which provides a high-level view of data and actions on data.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» A. business logic
614.

The                              layer, which provides the interface between the business-logic layer and the underlying database.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» D. data access
615.

The                            system is widely used for mapping from Java objects to relations.

A. hibernate
B. object oriented
C. objective
D. none of the mentioned
Answer» A. hibernate
616.

Which among the following are the functions that any system with a user interface must provide?

A. presentation
B. dialogue
C. all of the mentioned
D. none of the mentioned
Answer» A. presentation
617.

Which of the following is the main task accomplished by the user?

A. compose a document
B. create a spread sheet
C. send mail
D. all of the mentioned
Answer» D. all of the mentioned
618.

What are the portability concerns founded in Seeheim model?

A. replacing the presentation toolkit
B. replacing the application toolkit
C. replacing the dialogue toolkit
D. replacing the presentation & application toolkit
Answer» D. replacing the presentation & application toolkit
619.

Which schema object instructs Oracle to connect to a remotely access an object of a database?

A. sequence
B. remote link
C. database link
D. data link
Answer» D. data link
620.

DML changes are

A. insert
B. update
C. create
D. both insert and update
Answer» D. both insert and update
621.

Which of the following object types below cannot be replicated?

A. data
B. trigger
C. view
D. sequence
Answer» D. sequence
622.

How to force a log switch?

A. by using alter system log
B. by using alter system switch logfile
C. by using alter system switch logs
D. by using alter sys logfiles
Answer» B. by using alter system switch logfile
623.

The ORDER BY clause can only be used in

A. select queries
B. insert queries
C. group by queries
D. having queries
Answer» A. select queries
624.

Which of the following rule below are categories of an index?

A. column and functional
B. multiple column and functional
C. column, multiple column and functional
D. none of the mentioned
Answer» A. column and functional
625.

Which of the following queries are legal?

A. select deptno, count(deptno) from emp group by ename;
B. select deptno, count(deptno), job from emp group by deptno;
C. select deptno, avg(sal) from emp;
D. select deptno, avg(sal) from emp group by deptno;
Answer» D. select deptno, avg(sal) from emp group by deptno;
626.

Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500?

A. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null;
B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;
C. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job;
D. select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null;
Answer» B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;
627.

Which of the following data structure is not linear data structure?

A. arrays
B. linked lists
C. arrays & linked lists
D. none of the mentioned
Answer» D. none of the mentioned
628.

Which of the following data structure is linear data structure?

A. trees
B. graphs
C. arrays
D. none of the mentioned
Answer» C. arrays
629.

The operation of processing each element in the list is known as

A. sorting
B. merging
C. inserting
D. traversal
Answer» D. traversal
630.

Finding the location of the element with a given value is:

A. traversal
B. search
C. sort
D. none of the mentioned
Answer» B. search
631.

Arrays are best data structures

A. for relatively permanent collections of data
B. for the size of the structure and the data in the structure are constantly changing
C. all of the mentioned
D. none of the mentioned
Answer» A. for relatively permanent collections of data
632.

Linked lists are best suited

A. for relatively permanent collections of data
B. for the size of the structure and the data in the structure are constantly changing
C. all of the mentioned
D. none of the mentioned
Answer» B. for the size of the structure and the data in the structure are constantly changing
633.

Each array declaration need not give, implicitly or explicitly, the information about

A. the name of array
B. the data type of array
C. the first data from the set to be stored
D. the index set of the array
Answer» C. the first data from the set to be stored
634.

In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. sql injection
B. sql
C. direct
D. application
Answer» A. sql injection
635.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» C. cross-site scripting
636.

                   is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» B. cross-site request forgery
637.

A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» B. sign-on system
638.

The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» C. security assertion markup language (saml)
639.

                               allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

A. openid
B. single-site system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» D. virtual private database (vpd)
640.

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.

A. row-level authorization
B. column-level authentication
C. row-type authentication
D. authorization security
Answer» A. row-level authorization
641.

                       is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

A. encryption
B. data mining
C. internet security
D. architectural security
Answer» A. encryption
642.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

A. encryption key
B. decryption key
C. primary key
D. authorised key
Answer» B. decryption key
643.

Which of the following is not a property of good encryption technique?

A. relatively simple for authorized users to encrypt and decrypt data
B. decryption key is extremely difficult for an intruder to determine
C. encryption depends on a parameter of the algorithm called the encryption key
D. none of the mentioned
Answer» D. none of the mentioned
644.

In which of the following encryption key is used to encrypt and decrypt the data?

A. public key
B. private key
C. symmetric key
D. asymmetric key
Answer» C. symmetric key
645.

Encryption of small values, such as identifiers or names, is made complicated by the possibility of                      

A. dictionary attacks
B. database attacks
C. minor attacks
D. random attacks
Answer» A. dictionary attacks
646.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?

A. round key algorithm
B. public key algorithm
C. advanced encryption standard
D. asymmetric key algorithm
Answer» C. advanced encryption standard
647.

Which of the following requires no password travel across the internet?

A. readable system
B. manipulation system
C. challenge–response system
D. response system
Answer» C. challenge–response system
648.

The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.

A. cache
B. disk
C. main memory
D. flash memory
Answer» A. cache
649.

Which of the following stores several gigabytes of data but usually lost when power failure?

A. flash memory
B. disk
C. main memory
D. secondary memory
Answer» C. main memory
650.

The flash memory storage used are

A. nor flash
B. or flash
C. and flash
D. all of the mentioned
Answer» A. nor flash

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.