On This Page

This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 37

Q1 | In the ........... normal form, a composite attribute is converted to individual attributes.
  • First
  • Second
  • Third
  • Fourth
Q2 | In RDBMS, Data is presented as a collection of ............
  • Table
  • Attributes
  • Relations
  • Entities
Q3 | A .................. normal form, normalization will be needed where all attributes in a relationare not functionally dependent only on the key attribute.
  • First
  • Second
  • Third
  • Fourth
Q4 | To select all column from the table the syntax is:
  • Select all from table_name
  • Select * from table_name
  • Select from table_name
  • Non of the above
Q5 | For using a specific database …………… command is used.
  • use database
  • databasename use
  • Both A &B
  • None of them
Q6 | ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
  • Entity Integrity Constraints
  • Referential Integrity Constraints
  • Domain Integrity Constraints
  • Key Constraints
Q7 | ____ ensures that once transaction changes are done, they cannot be undone orlost, even in the event of a system failure.
  • Atomicity
  • Consistency
  • Durability
  • Isolation
Q8 | Deadlocks are possible only when one of the transactions wants to obtain a(n)____ lock on a data item.
  • binary
  • exclusive
  • shared
  • Complete
Q9 | If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the ____ property is violated and the database is no longer consistent.
  • atomicity
  • consistency
  • isolation
  • Durability
Q10 | A DBMS uses a transaction ____ to keep track of all transactions that update thedatabase
  • log
  • table
  • block
  • Statement
Q11 | When a program is abnormally terminated, the equivalent of a ____ commandoccurs.
  • COMMIT
  • ROLLBACK
  • QUIT
  • EXIT
Q12 | In a(n) ____ backup of the database, only the last modifications to the databaseare copied.
  • full
  • incomplete
  • differential
  • transaction log
Q13 | Although the ____ locking approach improves the availability of data, itsmanagement requires high overhead.
  • database-level
  • table-level
  • page-level
  • row-level
Q14 | A(n) ____ lock exists when concurrent transactions are granted Read access onthe basis of a common lock.
  • binary
  • field-level
  • shared
  • Exclusive
Q15 | A ____ database state is one in which all data integrity constraints are satisfied.
  • fixed
  • complete
  • consistent
  • Secure
Q16 | The ____ statement is used to end a successful transaction.
  • COMMIT
  • DONE
  • END
  • QUIT
Q17 | ____ means that the data used during the execution of a transaction cannot beused by a second transaction until the first one is completed.
  • Atomicity
  • Consistency
  • Durability
  • Isolation
Q18 | The three basic techniques to control deadlocks are: deadlock ____, deadlockdetection, and deadlock avoidance.
  • prevention
  • prohibition
  • rollback
  • Commits
Q19 | All transactions are controlled and executed by the DBMS (subject to somelimitations) to guarantee database ____.
  • integrity
  • uniqueness
  • consistency
  • Design
Q20 | In a ____ lock, the DBMS will lock an entire disk page.
  • database-level
  • table-level
  • page-level
  • row-level
Q21 | According to the ANSI SQL standard, when does a transaction begin?
  • with use of the START command
  • when the first SQL statement is encountered
  • with the BEGIN command
  • with the BEGIN TRANSACTION command
Q22 | The ____ lock allows concurrent transactions to access the same row as long asthey require the use of different fields within that row.
  • table-level
  • page-level
  • row-level
  • field-level
Q23 | What is ACID properties
  • Atomicity
  • Consistency
  • Isolation
  • All of the above
Q24 | Which refers to a property of computer to run several operation simultaneouslyand possible as computers await response of each other:
  • Concurrency
  • Deadlock
  • Backup
  • Recovery
Q25 | Which is refers to a stalemate situation due to which no further progress ispossible as computer await response of each other:
  • Concurrency
  • Deadlock
  • Backup
  • Recovery