325
120.4k

1410+ DataBase Management System (DBMS) Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Bachelor of Science in Computer Science FY (BSc CS) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Science in Information Technology SY (BSc IT) , Bachelor of Computer Applications (BCA) .

Chapters

More MCQs
851.

Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:

A. concurrency
B. deadlock
C. backup
D. recovery
Answer» B. deadlock
852.

Which is a duplicate copy of a file program that is stored on a different storage media than the original location:

A. concurrency
B. deadlock
C. backup
D. recovery
Answer» C. backup
853.

Which is the duplication of computer operations and routine backups to combat any unforeseen problems:

A. concurrency
B. deadlock
C. backup
D. recovery
Answer» D. recovery
854.

Optimization basically related to the Rewrite module is termed as               

A. semantic query optimization
B. global query optimization
C. all of the mentioned
D. none of the mentioned
Answer» A. semantic query optimization
855.

Database security helps organizations to protect data from            

A. internal users
B. external users
C. non-external users
D. non internal users
Answer» B. external users
856.

Copying files to secondary or specific devices is known as              

A. retrieve
B. backup
C. recovery
D. deadlock
Answer» B. backup
857.

Which are types of recovery control techniques:

A. deferred update
B. immediate update
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
858.

Which server can join the indexes when only multiple indexes combined can cover the query:

A. sql
B. dbms
C. rdbms
D. all of the mentioned
Answer» A. sql
859.

In concurrency control policy the lock is obtained on

A. entire database
B. a particular transaction alone
C. all the new elements
D. all of the mentioned
Answer» A. entire database
860.

A concurrency-control policy such as this one leads to              performance since it forces transactions to wait for preceding transactions to finish before they can start.

A. good
B. average
C. poor
D. unstable
Answer» C. poor
861.

                     are used to ensure that transactions access each data item in order of the transactions’          if their accesses conflict.

A. zone
B. relay
C. line
D. timestamps
Answer» D. timestamps
862.

In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?

A. to find the groups forming the subtotal in a row
B. to create group-wise grand totals for the groups specified within a group by clause
C. to create a grouping for expressions or columns specified within a group by clause in one direction, from right to left for calculating the subtotals
D. to create a grouping for expressions or columns specified within a group by clause in all possible directions, which is cross- tabular report for calculating the subtotals
Answer» C. to create a grouping for expressions or columns specified within a group by clause in one direction, from right to left for calculating the subtotals
863.

Which statement is true regarding external tables?

A. the default reject limit for external tables is unlimited
B. the data and metadata for an external table are stored outside the database
C. oracle_loader and oracle_datapump have exactly the same functionality when used with an external table
D. the create table as select statement can be used to unload data into regular table in the database from an external table
Answer» D. the create table as select statement can be used to unload data into regular table in the database from an external table
864.

SNAPSHOT is used for (DBA)

A. synonym
B. tablespace
C. system server
D. dynamic data replication
Answer» D. dynamic data replication
865.

Isolation of the transactions is ensured by

A. transaction management
B. application programmer
C. concurrency control
D. recovery management
Answer» C. concurrency control
866.

Which of the following statements is/are not true for SQL profiler?

A. enables you to monitor events
B. check if rows are being inserted properly
C. check the performance of a stored procedure
D. all of the mentioned
Answer» C. check the performance of a stored procedure
867.

Which of the following is the original purpose of SQL?

A. to specify the syntax and semantics of sql data definition language
B. to specify the syntax and semantics of sql manipulation language
C. to define the data structures
D. all of the mentioned
Answer» D. all of the mentioned
868.

SQL can be used to:

A. create database structures only
B. query database data only
C. modify database data only
D. all of the mentioned
Answer» D. all of the mentioned
869.

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. database-level lock
B. table-level lock
C. page-level lock
D. row-level lock
Answer» D. row-level lock
870.

Which of the following are introduced to reduce the overheads caused by the log- based recovery?

A. checkpoints
B. indices
C. deadlocks
D. locks
Answer» A. checkpoints
871.

Which of the following protocols ensures conflict serializability and safety from deadlocks?

A. two-phase locking protocol
B. time-stamp ordering protocol
C. graph based protocol
D. none of the mentioned
Answer» B. time-stamp ordering protocol
872.

Which refers to a property of computer to run several operation simultaneously and possible as computers await response of each other

A. concurrency
B. deadlock
C. backup
D. recovery
Answer» A. concurrency
873.

The          lock allows concurrent transactions to access the same row as long as they require the use of different fields within that row.

A. table-level
B. page-level
C. row-level
D. field-level
Answer» D. field-level
874.

Which of the following is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released?

A. record controller
B. exclusive lock
C. authorization rule
D. two phase lock
Answer» D. two phase lock
875.

A system is in a              state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.

A. idle
B. waiting
C. deadlock
D. ready
Answer» C. deadlock
876.

The deadlock state can be changed back to stable state by using                             statement.

A. commit
B. rollback
C. savepoint
D. deadlock
Answer» B. rollback
877.

What are the ways of dealing with deadlock?

A. deadlock prevention
B. deadlock recovery
C. deadlock detection
D. all of the mentioned
Answer» D. all of the mentioned
878.

When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This is

A. wait-die
B. wait-wound
C. wound-wait
D. wait
Answer» A. wait-die
879.

When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp larger than that of Tj (that is, Ti is younger than Tj ). Otherwise, Tj is rolled back (Tj is wounded by Ti). This is

A. wait-die
B. wait-wound
C. wound-wait
D. wait
Answer» C. wound-wait
880.

The situation where the lock waits only for a specified amount of time for another lock to be released is

A. lock timeout
B. wait-wound
C. timeout
D. wait
Answer» A. lock timeout
881.

The deadlock in a set of a transaction can be determined by

A. read-only graph
B. wait graph
C. wait-for graph
D. all of the mentioned
Answer» A. read-only graph
882.

A deadlock exists in the system if and only if the wait-for graph contains a                        

A. cycle
B. direction
C. bi-direction
D. rotation
Answer» A. cycle
883.

                     rollback requires the system to maintain additional information about the state of all the running transactions.

A. total
B. partial
C. time
D. commit
Answer» B. partial
884.

If a node is locked in an intention mode, explicit locking is done at a lower level of the tree. This is called

A. intention lock modes
B. explicit lock
C. implicit lock
D. exclusive lock
Answer» A. intention lock modes
885.

If a node is locked in                      explicit locking is being done at a lower level of the tree, but with only shared-mode locks.

A. intention lock modes
B. intention-shared-exclusive mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» A. intention lock modes
886.

If a node is locked in                          then explicit locking is being done at a lower level, with exclusive-mode or shared-mode locks.

A. intention lock modes
B. intention-shared-exclusive mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» C. intention-exclusive (ix) mode
887.

If a node is locked in                              the subtree rooted by that node is locked explicitly in shared mode, and that explicit locking is being done at a lower level with exclusive-mode locks.

A. intention lock modes
B. shared and intention-exclusive (six) mode
C. intention-exclusive (ix) mode
D. intention-shared (is) mode
Answer» B. shared and intention-exclusive (six) mode
888.

The                      requires that each transaction Ti executes in two or three different phases in its lifetime, depending on whether it is a read-only or an update transaction.

A. validation protocol
B. validation-based protocol
C. timestamp protocol
D. timestamp-ordering protocol
Answer» A. validation protocol
889.

                         denotes the largest timestamp of any transaction that executed write(Q) successfully.

A. w-timestamp(q)
B. r-timestamp(q)
C. rw-timestamp(q)
D. wr-timestamp(q)
Answer» A. w-timestamp(q)
890.

The most recent version of standard SQL prescribed by the American National Standards Institute is

A. sql 2016
B. sql 2002
C. sql – 4
D. sql2
Answer» A. sql 2016
891.

ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value is null is

A. between
B. is null
C. like
D. in
Answer» B. is null
892.

A lock that prevents the use of any tables in the database from one transaction while another transaction is being processed is called a

A. database-level lock
B. table-level lock
C. page-level lock
D. row-level lock
Answer» A. database-level lock
893.

A condition that occurs when two transactions wait for each other to unlock data is known as a(n)

A. shared lock
B. exclusive lock
C. binary lock
D. deadlock
Answer» D. deadlock
894.

The file organization which allows us to read records that would satisfy the join condition by using one block read is

A. heap file organization
B. sequential file organization
C. clustering file organization
D. hash files organization
Answer» C. clustering file organization
895.

The extent of the database resource that is included with each lock is called the level of

A. impact
B. granularity
C. management
D. dbms control
Answer» B. granularity
896.

DBMS periodically suspends all processing and synchronizes its files and journals through the use of

A. checkpoint facility
B. backup facility
C. recovery manager
D. database change log
Answer» A. checkpoint facility
897.

Snapshot isolation is used to give

A. transaction a snapshot of the database
B. database a snapshot of the transaction
C. database a snapshot of committed values in the transaction
D. transaction a snapshot of the database and database a snapshot of committed values in the transaction
Answer» D. transaction a snapshot of the database and database a snapshot of committed values in the transaction
898.

Lost update problem is

A. second update overwrites the first
B. first update overwrites the second
C. the updates are lost due to conflicting problem
D. none of the mentioned
Answer» A. second update overwrites the first
899.

Each of a pair of transactions has read data that is written by the other, but there is no data written by both transactions, is referred to as

A. read skew
B. update skew
C. write lock
D. none of the mentioned
Answer» D. none of the mentioned
900.

Which statements are correct regarding indexes?

A. when a table is dropped, the corresponding indexes are automatically dropped
B. for each dml operation performed, the corresponding indexes are automatically updated
C. a non-deferrable primary key or unique key constraint in a table automatically creates a unique index
D. all of the mentioned
Answer» D. all of the mentioned

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.