Top 100 DBMS Multiple choice Questions
The ascending order of a data hirerchy is:
a. bit-byte-record-field-file-database
b. byte-bit-field-record-file-database
c. bit-byte-field-record-file-database
d. bit-byte-file-record-field-database
Which of the following is true of a network structure?
a. t is a physical representation of the data
b. It allows a many-to-many relationship
c. It is conceptually simple
d. It will be dominant data base of the future
Which of the following is a problem of file management system?
a. difficult to update
b. lack of data independence
c. data redundancy
d. program dependence
e. all of above
One data dictionery software package is called
a. DB/DC dictionary
b. TOTAL
c. ACCESS
d. Datapac
e. Data Manager
The function of a database is …
a. to check all input data
b. to check all spelling
c. to collect and organize input data
d. to output data
What is the language used by most of the DBMSs for helping their users to access data?
a. High level language
b. SQL
c. Query Language
d. 4GL
The model for a record management system might be
a. handwritten list
b. a Rolodex card file
c. a business form
d. all of above
Primitive operations common to all record management system include
a. print
b. sort
c. look-up
d. all of above
In a large DBMS
a. each user can “see” only a small part of the entire database
b. each subschema contains every field in the logical schema
c. each user can access every subschema
Information can be transferred between the DBMS and a
a. spreadsheet program
b. word processor program
c. graphics program
d. all of the above
Answers:
1. c 2. b 3. e 4. a 5. c 6. c 7. d 8. c 9. a 10. d
Which of the following fields in a student file can be used as a primary key?
a. class
b. Social Security Number
c. GPA
d. Major
Which of the following is not an advantage of the database approach
a. Elimination of data redundancy
b. Ability of associate deleted data
c. increased security
d. program/data independence
e. all of the above
Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
a. report writer
b. query language
c. data manipulation language
d. transaction log
e. none of the above
In the DBMS approach, application programs perform the
a. storage function
b. processing functions
c. access control
d. all of the above
e. none of the above
A set of programs that handle a firm’s database responsibilities is called
a. database management system (DBMS)
b. database processing system (DBPS)
c. data management system (DMS)
d. all of above
Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
a. full media
b. graphics media
c. multimedia
d. hypertext
A record management system
a. can handle many files of information at a time
b. can be used to extract information stored in a computer file
c. always uses a list as its model
d. both a and b
A command that lets you change one or more fields in a record is
a. insert
b. modify
c. lookup
d. none of above
A transparent DBMS
a. can not hide sensitive information from users
b. keeps its logical structure hidden from users
c. keeps its physical structure hidden from users
d. both b and c
A file produced by a spreadsheet
a. is generally stored on disk in an ASCII text fromat
b. can be used as is by the DBMS
c. both a and b
d. none of the above
Answers:
1.b 2.e 3.d 4.b 5.d 6.c 7.b 8.b 9.c 10.a
Which of the following is not true of the traditional approach to information processing
a. there is common sharing of data among the various applications
b. it is file oriented
c. programs are dependent on the file
d. it is inflexible
e. all of the above are true
Which of the following hardware component is the most important to the operation of database management system?
a. high resolution video display
b. printer
c. high speed, large capacity disk
d. plotter
e. mouse
Generalized database management system do not retrieve data to meet routine request
a. true
b. false
Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is avilbale
c. only a few transactions are involved
d. all of the above
e. none of the above
Large collection of files are called
a. fields
b. records
c. database
d. sectors
Which of the following is not a relational database?
a. dBase IV
b. 4th Dimension
c. FoxPro
d. Reflex
In order to use a record management system
a. you need to understand the low level details of how information is stored
b. you need to understand the model the record management system uses
c. bother a and b
d. none of the above
Sort/Report generators
a. are faster than index/report generators
b. require more disk space than indexed/report generators
c. do not need to sort before generating report
d. both a and b
If a piece of data is stored in two places in the database, then
a. storage space is wasted
b. changing the data in one spot will cause data inconsistency
c. in can be more easily accessed
d. both and b
An audit trail
a. is used to make backup copies
b. is the recorded history of operations performed on a file
c. can be used to restore lost information
d. none of the aobve
Answers:
1.a 2.c 3. b 4.e 5.c 6.d 7.b 8.b 9.d 10.b
The relational database environment has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database
Database management systems are intended to
a. eliminate data redundancy
b. establish relationship among records in different files
c. manage file access
d. maintain data integrity
e. all of the above
One approach to standardization storing of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above
The language used application programs to request data from the DBMS is referred to as the
a. DML
b. DDL
c. query language
d. any of the above
e. none of the above
The highest level in the hierarchy of data organization is called
a. data bank
b. data base
c. data file
d. data record
Choose the RDBMS which supports full fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress
Report generators are used to
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c
A form defined
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above
A top-to-bottom relationship among the items in a database is established by a
a. hierarchical schema
b. network schema
c. relational schema
d. all of the above
The management information system (MIS) structure with one main computer system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure
Answers:
1.b 2.e 3.c 4.a 5.b 6. b 7.d 8.a 9.a 10.c
1) ——————————-responsible for authorizing access to the database, for co-ordinating and monitoring its use, acquiring software, and hardware resources, controlling its use and monitoring efficiency of operations.
A. Authorization Manager
B. Storage Manager
C. File Manager
D. Transcation Manager
E. Buffer Manager
Q.2) ——————————is a property that describes various characteristics of an entity
A. ER Diagram
B. Column
C. Relationship
D. Attribute
Q.3) ———————- level describes what data is stored in the database and the relationships among the data
A. Physical Level
B. Logical Level
C. Conceptual Level
D. None of the above
Q.4) ———————— denote derived attributes.
A. Double ellipse
B. Dashed ellipse
C. Squared ellipse
D. Ellipse with attribute name underlined
Q.5) A ———————– is an association between entities
A. Relation
B. One to One
C. Generalization
D. Specialization
Q.6) ————————— stores metadata about the structure of the data base
A. Physical data base
B. Query Analyzer
C. Data Dictionary
D. Data Catalog
Q.7) ————————–is a collection of operations that perform s single logical function in a database application
A. Transaction
B. Concurrent operation
C. Atomocity
D. Durability
Q.8) The problem that is compounded when constraints involve several data items from different files are Called ————-.
A. Transaction Control Management Problem
B. Security Problem
C. Integrity Problem
D. Durability Problem
Q.9) Ensuring atomicity is the responsibility of the ————————–component
A. File Manager
B. Buffer Manager
C. DBA
D. Transation Manager
Q.10) ——————-manages the allocation of the space on the disk storage and the data base structure used to represent information stored on disk
A. Disk Manager
B. File Manager
C. Buffer Manager
D. Memory Manager
E. None of the above
Q.11) —————————-is the minimal super key
A. Primary Key
B. Candidate Key
C. Surrogate Key
D. Unique Key
E. Alternate Key
Q.12) —————————–engine executes low level instructions generated by the DML compilier
A. DDL Analyzer
B. Query Interpreter
C. Database Engine
D. None of the above
Q.13) ————————–responsible to define the content, the structure, the constraints, and functions or transactions against the database
A. Transcation Manager
B. Query Analyzer
C. DBA
D. All the above
E. None of the above
Q.14) In ER model —————————denote derived attributes
A. Double ellipse
B. Diamond
C. Reactangle
D. None of the above
Q.15) Foreign Key can be null
A. TRUE
B. FALSE
Q.16) All primary keys should be super keys.
A. TRUE
B. FALSE
Q.17) In Relational database Data is stored as record types and the relationship is represented by set types
A. True
B. False
Q.18) In Hierarchical database to get to a low-level table, you start at the root and work your way down the tree until you reach your target data.
A. True
B. False
Q.19) Using relational model we design conceptual database design
A. True
B. False
Q.20) Conceptual data model is the source of information for logical design phase
A. True
B. False
Q.21) Logical database design describes describes base relations, file organizations, and indexes that are used to achieve efficient access to data.
A. True
B. False
Q.22) Conceptual data modeling uses a high level data modeling concept of E-R Models
A. True
B. False
Q.23) Tables are required to have at least one column
A. True
B. False
Q.24) Logical data independence: Refers to the separation of the external views from the conceptual view
A. True
B. False
Q.25) Duplication of data is the disadvantage of DBMS
A. True
B. False
Q.26) Candidate key can have a null value
A. True
B. False
Q.27) Each program maintains its own set of data. So users of one program may be unaware of potentially useful data held by other programs this leads toDuplication of data
A. True
B. False
Q.28) A traditional database stores just data – with no procedures
A. True
B. False
Q.29) Simple Attribute composed of multiple components, each with an independent existence.
A. True
B. False
Q.30) Cardinality specifies how many instances of an entity relate to one instance of another entity.
A. True
B. False
ANSWERS
1)E
2)D
3)B
4)B
5)A
6)C
7)A
8)C
9)D
10)B
11)B
12)D
13)C
14)D
15)A
16)A
17)A
18)A
19)B
20)A
21)B
22)A
23)A
24)A
25)B
26)B
27)B
28)A
29)B
30)A