Database Set 6 (30 mcqs)

1. A domain is ______ if elements of the domain are considered to be indivisible units.
a) Atomic
b) Subatomic
c) Substructure
d) Subset

2. Identify the composite attributes
a) Salary
b) Credits
c) Section_id
d) None of the mentioned

3. Consider the relation given below and ind the maximum normal form applicable to them
1. R(A, B) with productions { A –> B }
2. R(A, B) with productions { B –> A }
3 R(A, B) with productions {A —> B, B –> A }
4 R(A, B, C) with productions {A –>B, B –> A, AB –> C }
a) 1, 2 and 3 are in 3NF and 4 is in BCNF
b) 1 and 2 are in BCNF and 3 and 4 are in 3NF
c) All are in 3NF
d) All are in BCNF

4. Which one is based on multi-valued dependency:
a) First
b) Second
c) Third
d) Fourth

5. If a relation is in BCNF, then it is also in
a) 1 NF
b) 2 NF
c) 3 NF
d) All of the mentioned

6. If every non-key attribute is functionally depedent primary key, then the relation will be in
a) First normal form
b) Second normal form
c) Third form
d) Fourth normal form

7. If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called _____ is needed.
c) Fourth
d) Third

8. The term for information that describes what type of data is available in a database is:
a) Data dictionary
b) data repository
c) Index data
d) Metadata

9. A data type that creates unique numbers for key columns in Microsoft Access is:
a) Autonumber
b) Boolean
c) Sequential key
d) Sequential number

10. A dependency exist between two columns when
a) Together they constitute a composite key for the table
b) Knowing the value in one column determines the value stored in another column
c) The table is in 3NF
d) Together they constitute a foreign key

11. _______________ joins are SQL server default
a) Outer
b) Inner
c) Equi
d) None of the Mentioned

12. The ________________ is essentially used to search for patterns in target string.
a) Like Predicate
b) Null Predicate
c) In Predicate
d) Out Predicate

13. Which of the following is/are the Database server functions?
i) Data management ii) Transaction management
iii) Compile queries iv) Query optimization
a) i, ii, and iv only
b) i, ii and iii only
c) ii, iii and iv only
d) All i, ii, iii, and iv

14. To delete a database ___________ command is used
a) Delete database database_name
b) Delete database_name
c) drop database database_name
d) drop database_name

15. ____________ is a combination of two of more attributes used as a primary key
a) Composite Key
b) Alternate Key
c) Candidate Key
d) Foreign Key

16. Which of the following is not the function of client?
a) Compile queries
b) Query optimization
c) Receive queries
d) Result formatting and presentation

17. ____________ is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.
a) Procedure
b) Trigger
c) Curser
d) None of the Mentioned

18. ______________ requires that data should be made available to only authorized users.
a) Data integrity
b) Privacy
c) Security
d) None of the Mentioned

19. Some of the utilities of DBMS are _____________
i) Loading ii) Backup iii) File organization iv) Process Organization
a) i, ii, and iv only
b) i, ii and iii only
c) ii, iii and iv only
d) All i, ii, iii, and iv

20. ____________ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.
a) Procedure
b) Trigger
c) Curser
d) None of the Mentioned

21. _____________, express the number of entities to which another entity can be associated via a relationship set.
a) Mapping Cardinality
b) Relational Cardinality
c) Participation Constraints
d) None of the mentioned

22. An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A.This is called as
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one

23. An entity in A is associated with at most one entity in B. An entity in B, however, can be associated with any number (zero or more) of entities in A.
a) One-to-many
b) One-to-one
c) Many-to-many
d) Many-to-one

24. Data integrity constraints are used to:
a) Control who is allowed access to the data
b) Ensure that duplicate records are not entered into the table
c) Improve the quality of data entered for a specific property
d) Prevent users from changing the values stored in the table

25. Establishing limits on allowable property values, and specifying a set of acceptable, predefined options that can be assigned to a property are examples of:
a) Attributes
b) Data integrity constraints
c) Method constraints
d) Referential integrity constraints

26. Which of the following can be addressed by enforcing a referential integrity constraint?
a) All phone numbers must include the area code
b) Certain fields are required (such as the email address, or phone number) before the record is accepted
c) Information on the customer must be known before anything can be sold to that customer
d) Then entering an order quantity, the user must input a number and not some text (i.e., 12 rather than ‘a dozen’)

27. ______ is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
a) Entity Integrity Constraints
b) Referential Integrity Constraints
c) Domain Integrity Constraints
d) Domain Constraints

28. Which one of the following uniquely identifies the elements in the relation?
a) Secondary Key
b) Primary key
c) Foreign key
d) Composite key

29. Drop Table cannot be used to drop a table referenced by a _________ constraint.
a) Local Key
b) Primary Key
c) Composite Key
d) Foreign Key

30. ____________ is preferred method for enforcing data integrity
a) Constraints
b) Stored Procedure
c) Triggers
d) Cursors

1-a 2-d 3-d 4-d 5-d
6-b 7-b 8-d 9-a 10-a
11-b 12-a 13-a 14-c 15-a
16-b 17-b 18-c 19-b 20-c
21-a 22-b 23-d 24-c 25-b
26-c 27-b 28-b 29-d 30-a
Spread the love

Leave a Comment

Your email address will not be published. Required fields are marked *