On This Page

This set of DataBase Management System (DBMS) Multiple Choice Questions & Answers (MCQs) focuses on Database Management System Set 26

Q1 | Which of the following is an atomic sequence of database actions?
  • transaction
  • concurrency
  • relations
  • all of the mentioned
Q2 | If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called
  • consistent state
  • parallel state
  • atomic state
  • inconsistent state
Q3 |                means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
  • serializability
  • atomicity
  • isolation
  • time stamping
Q4 | Which of the following is not a state in transaction?
  • active
  • terminated
  • aborted
  • partially committed
Q5 |                                joins are SQL server default
  • outer
  • inner
  • equi
  • none of the mentioned
Q6 | The                                  is essentially used to search for patterns in target string.
  • like predicate
  • null predicate
  • in predicate
  • out predicate
Q7 |                          is a combination of two of more attributes used as a primary key
  • composite key
  • alternate key
  • candidate key
  • foreign key
Q8 | Which of the following is not the function of client?
  • compile queries
  • query optimization
  • receive queries
  • result formatting and presentation
Q9 |                          is a special type of stored procedure that is automatically invoked whenever the data in the table is modified.
  • procedure
  • trigger
  • curser
  • none of the mentioned
Q10 |                              requires that data should be made available to only authorized users.
  • data integrity
  • privacy
  • security
  • none of the mentioned
Q11 |                          allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement.
  • procedure
  • trigger
  • curser
  • none of the mentioned
Q12 | Which s essential a business problem not a data problem:
  • data
  • database
  • database design
  • all of the mentioned
Q13 | McFadden has defined normalization in his which book                       
  • database modern management
  • management database of modern
  • modern database management
  • database management
Q14 | The database design prevents some data from being represented due to                
  • deletion anomalies
  • insertion anomalies
  • update anomaly
  • none of the mentioned
Q15 | How many types of insertion anomalies:
  • 1
  • 2
  • 3
  • 4
Q16 | Who developed the normalization process:
  • e.f. codd
  • f.f. codd
  • e.e. codd
  • none of the mentioned
Q17 | E.F.Codd developed the normalization process in the which early:
  • 1969
  • 1970
  • 1971
  • 1972
Q18 | Which is the process of breaking a relation into multiple relations:
  • functional dependency
  • database modeling
  • normalization
  • decomposition
Q19 | Which is refers to a stalemate situation due to which no further progress is possible as computer await response of each other:
  • concurrency
  • deadlock
  • backup
  • recovery
Q20 | Which is a duplicate copy of a file program that is stored on a different storage media than the original location:
  • concurrency
  • deadlock
  • backup
  • recovery
Q21 | Which is the duplication of computer operations and routine backups to combat any unforeseen problems:
  • concurrency
  • deadlock
  • backup
  • recovery
Q22 | Optimization basically related to the Rewrite module is termed as               
  • semantic query optimization
  • global query optimization
  • all of the mentioned
  • none of the mentioned
Q23 | Database security helps organizations to protect data from            
  • internal users
  • external users
  • non-external users
  • non internal users
Q24 | Copying files to secondary or specific devices is known as              
  • retrieve
  • backup
  • recovery
  • deadlock
Q25 | Which are types of recovery control techniques:
  • deferred update
  • immediate update
  • all of the mentioned
  • none of the mentioned