Skip to main content

DBMS MCQ 1

DBMS MCQ'S 1 

1. A relational database consists of a collection of

a) Tables

b) Fields

c) Records

d) Keys

View Answer

Answer: a

Explanation: Fields are the column of the relation or tables. Records are each row in a relation.

Keys are the constraints in a relation.

advertisement

2. A ________ in a table represents a relationship among a set of values.

a) Column

b) Key

c) Row

d) Entry

View Answer

Answer: c

Explanation: Column has only one set of values. Keys are constraints and row is one whole set

of attributes. Entry is just a piece of data.

3. The term _______ is used to refer to a row.

a) Attribute

b) Tuple

c) Field

d) Instance

View Answer

Answer: b

Explanation: Tuple is one entry of the relation with several attributes which are fields.

4. The term attribute refers to a ___________ of a table.

a) Record

b) Column

c) Tuple

d) Key

View Answer

Answer: b

Explanation: Attribute is a specific domain in the relation which has entries of all tuples.

advertisement

5. For each attribute of a relation, there is a set of permitted values, called the ________ of that

attribute.

a) Domain

b) Relation

c) Set

d) Schema

View Answer

Answer: a

Explanation: The values of the attribute should be present in the domain. Domain is a set of

values permitted.

6. Database __________ which is the logical design of the database, and the database _______

which is a snapshot of the data in the database at a given instant in time.

a) Instance, Schema

b) Relation, Schema

c) Relation, Domain

d) Schema, Instance

View Answer

Answer: d

Explanation: Instance is an instance of time and schema is a representation.

7. Course(course_id,sec_id,semester)

Here the course_id,sec_id and semester are __________ and course is a _________

a) Relations, Attribute

b) Attributes, Relation

c) Tuple, Relation

d) Tuple, Attributes

View Answer

Answer: b

Explanation: The relation course has a set of attributes course_id,sec_id,semester .

advertisement

8. Department (dept name, building, budget) and Employee (employee_id, name, dept name,

salary)

Here the dept_name attribute appears in both the relations. Here using common attributes in

relation schema is one way of relating ___________ relations.

a) Attributes of common

b) Tuple of common

c) Tuple of distinct

d) Attributes of distinct

View Answer

Answer: c

Explanation: Here the relations are connected by the common attributes.

9. A domain is atomic if elements of the domain are considered to be ____________ units.

a) Different

b) Indivisbile

c) Constant

d) Divisible

View Answer

Answer: b

Explanation: None.

10. The tuples of the relations can be of ________ order.

a) Any

b) Same

c) Sorted

d) Constant

View Answer

Answer: a

Explanation: The values only count. The order of the tuples does not matter


1. Which one of the following is a set of one or more attributes taken collectively to uniquely

identify a record?

a) Candidate key

b) Sub key

c) Super key

d) Foreign key

View Answer

Answer: c

Explanation: Super key is the superset of all the keys in a relation.

advertisement

2. Consider attributes ID, CITY and NAME. Which one of this can be considered as a super

key?

a) NAME

b) ID

c) CITY

d) CITY, ID

View Answer

Answer: b

Explanation: Here the id is the only attribute which can be taken as a key. Other attributes are

not uniquely identified.

3. The subset of a super key is a candidate key under what condition?

a) No proper subset is a super key

b) All subsets are super keys

c) Subset is a super key

d) Each subset is a super key

View Answer

Answer: a

Explanation: The subset of a set cannot be the same set. Candidate key is a set from a super key

which cannot be the whole of the super set.

4. A _____ is a property of the entire relation, rather than of the individual tuples in which each

tuple is unique.

a) Rows

b) Key

c) Attribute

d) Fields

View Answer

Answer: b

Explanation: Key is the constraint which specifies uniqueness.

advertisement

5. Which one of the following attribute can be taken as a primary key?

a) Name

b) Street

c) Id

d) Department

View Answer

Answer: c

Explanation: The attributes name, street and department can repeat for some tuples. But the id

attribute has to be unique. So it forms a primary key.

6. Which one of the following cannot be taken as a primary key?

a) Id

b) Register number

c) Dept_id

d) Street

View Answer

Answer: d

Explanation: Street is the only attribute which can occur more than once.

7. An attribute in a relation is a foreign key if the _______ key from one relation is used as an

attribute in that relation.

a) Candidate

b) Primary

c) Super

d) Sub

View Answer

Answer: b

Explanation: The primary key has to be referred in the other relation to form a foreign key in

that relation.

advertisement

8. The relation with the attribute which is the primary key is referenced in another relation. The

relation which has the attribute as a primary key is called ______________

a) Referential relation

b) Referencing relation

c) Referenced relation

d) Referred relation

View Answer

Answer: c

Explanation: None.

9. The ______ is the one in which the primary key of one relation is used as a normal attribute in

another relation.

a) Referential relation

b) Referencing relation

c) Referenced relation

d) Referred relation

View Answer

Answer: c

Explanation: None.

10. A _________ integrity constraint requires that the values appearing in specified attributes of

any tuple in the referencing relation also appear in specified attributes of at least one tuple in the

referenced relation.

a) Referential

b) Referencing

c) Specific

d) Primary

View Answer

Answer: a

Explanation: A relation, say r1, may include among its attributes the primary key of another

relation, say r2. This attribute is called a foreign key from r1, referencing r2. The relation r1 is

also called the referencing relation of the foreign key dependency, and r2 is called the referenced

relation of the foreign key.


1. Using which language can a user request information from a database?

a) Query

b) Relational

c) Structural

d) Compiler

View Answer

Answer: a

Explanation: Query language is a method through which the database entries can be accessed.

advertisement

2. Student(ID, name, dept name, tot_cred)

In this query which attributes form the primary key?

a) Name

b) Dept

c) Tot_cred

d) ID

View Answer

Answer: d

Explanation: The attributes name, dept and tot_cred can have same values unlike ID.

3. Which one of the following is a procedural language?

a) Domain relational calculus

b) Tuple relational calculus

c) Relational algebra

d) Query language

View Answer

Answer: c

Explanation: Domain and Tuple relational calculus are non-procedural language. Query

language is a method through which database entries can be accessed.

4. The_____ operation allows the combining of two relations by merging pairs of tuples, one

from each relation, into a single tuple.

a) Select

b) Join

c) Union

d) Intersection

View Answer

Answer: b

Explanation: Join finds the common tuple in the relations and combines it.

advertisement

5. The result which operation contains all pairs of tuples from the two relations, regardless of

whether their attribute values match.

a) Join

b) Cartesian product

c) Intersection

d) Set difference

View Answer

Answer: b

Explanation: Cartesian product is the multiplication of all the values in the attributes.

6. The _______operation performs a set union of two “similarly structured” tables

a) Union

b) Join

c) Product

d) Intersect

View Answer

Answer: a

Explanation: Union just combines all the values of relations of same attributes.

7. The most commonly used operation in relational algebra for projecting a set of tuple from a

relation is

a) Join

b) Projection

c) Select

d) Union

View Answer

Answer: c

Explanation: Select is used to view the tuples of the relation with or without some constraints.

advertisement

8. The _______ operator takes the results of two queries and returns only rows that appear in

both result sets.

a) Union

b) Intersect

c) Difference

d) Projection

View Answer

Answer: b

Explanation: The union operator gives the result which is the union of two queries and

difference is the one where query which is not a part of second query.

9. A ________ is a pictorial depiction of the schema of a database that shows the relations in the

database, their attributes, and primary keys and foreign keys.

a) Schema diagram

b) Relational algebra

c) Database diagram

d) Schema flow

View Answer

Answer: a

Explanation: None.

10. The _________ provides a set of operations that take one or more relations as input and

return a relation as an output.

a) Schematic representation

b) Relational algebra

c) Scheme diagram

d) Relation flow

View Answer

Answer: b

Explanation: None


1. Given the evolution of DBMSs, business data is now:

a. Stored in main memory and stays resident there even after the application that uses it terminates.

b. Stored only if it is relevant to business decisions.

c. Stored indefinitely in case it's needed since storing it is much cheaper now.

d. None of the above.

Answer: (b).Stored only if it is relevant to business decisions.

2. Which of the following is not true of a DBMS?

a. It provides efficient storage and retrieval of data.

b. It has evolved over the years into a fairly simple set of tools that are relatively easy to master.

c. Marketplace demands and product innovation have led to the development of a broad range of features.

d. None of the above.

Answer: (b).It has evolved over the years into a fairly simple set of tools that are relatively easy to master.

3. Nonprocedural access to a database:

a. Can provide a dramatic improvement in software productivity.

b. Allows a user to submit queries to a database without having to know how the data will be retrieved.

c. Is supported by more than one tool in most DBMSs.

d. All of the above.

Answer: (d).All of the above.

4. Which of the following statements is not true of a desktop DBMS?

a. They usually run on personal computers or small servers.

b. They have a much lower cost than other DBMSs.

c. Although useful for processing ad hoc queries, they cannot perform transaction processing.

d. They usually support databases used by work teams and small businesses.

Answer: (c).Although useful for processing ad hoc queries, they cannot perform transaction processing.

5. In the evolution of database technology, second-generation products are considered to be the first true DBMSs because:

a. They were "navigational", i.e. the programmer had to write code to navigate through a network of linked records.

b. Of their foundation on mathematical relations and associated operators.

c. They supported sequential and random searching.

d. They could manage multiple entities and relationships.

Answer: (d).They could manage multiple entities and relationships.

6. In the evolution of database technology, third-generation products supplanted second-generation systems because:

a. Nonprocedural database access was an improvement over navigational access.

b. IBM supported the CODASYL standard of database definition and manipulation.

c. Nonprocedural languages were still not very efficient.

d. All of the above.

Answer: (a).Nonprocedural database access was an improvement over navigational access.

7. Which statement is not true of the Three Schema Architecture?

a. It is an official standard of the American Standards Institute (ANSI).

b. It is an architecture for compartmentalizing database descriptions.

c. Its details have been widely adopted in third- and fourth-generation DBMSs.

d. None of the above.

Answer: (c).Its details have been widely adopted in third- and fourth-generation DBMSs.

8. Which of the following statements is not true of information resource management?

a. It is very different and much more challenging than managing the other physical resources of an organization.

b. Its goal is to use information technology as a tool for processing, distributing, and integrating information throughout an organization.

c. Its emergence has created new management responsibilities.

d. None of the above.

Answer: (a).It is very different and much more challenging than managing the other physical resources of an organization.

9. A Database Management System (DBMS) is

a. Collection of interrelated data

b. Collection of programs to access data

c. Collection of data describing one particular enterprise

d. All of the above

Answer: (d).All of the above

10. Data Manipulation Language enables users to

a. Retrieval of information stored in database

b. Insertion of new information into the database

c. Deletion of information from the database

d. All of the above

Answer: (d).All of the above

11. Which of the following is Database Language?

a. Data Definition Language

b. Data Manipulation Language

c. Query Language

d. All of the above

Answer: (d).All of the above

12. Which of the following in not a function of DBA?

a. Network Maintenance

b. Routine Maintenance

c. Schema Definition

d. Authorization for data access

Answer: (a).Network Maintenance

13. Which of the following represents a relationship among a set of values.

a. A Row

b. A Table

c. A Field

d. A Column

Answer: (a).A Row

14. Column header is refer as

a. Table

b. Relation

c. Attributes

d. Domain

Answer: (c).Attributes

15. Which of the following is not Modification of the Database?

a. Deletion

b. Insertion

c. Sorting

d. Updating

Answer: (c).Sorting

16. Which of the following in true regarding Null Value?

a. Null = 0

b. Null < 0

c. Null > 0

d. Null <> 0

Answer: (d).Null <> 0

17. ODBC stands for ______

a. Offline database connection

b. Oriented database connection

c. Open database connection

d. None of the above

Answer: (c).Open database connection

18. _____________ refers to the correctness and completeness of the data in a database?

a. Data security

b. Data integrity

c. Data constraint

d. Data independence

19. Data integrity constraints are used to:

a. Control who is allowed access to the data

b. Ensure that duplicate records are not entered into the table

c. Improve the quality of data entered for a specific property (i.e., table column)

d. Prevent users from changing the values stored in the table

Answer: (c).Improve the quality of data entered for a specific property (i.e., table column)

20. The DBMS acts as an interface between what two components of an enterprise-class database system?

a. Database application and the database

b. Data and the database

c. The user and the database application

Answer: (a).Database application and the database

1. Which of the following is not a level of data abstraction?

a. Physical Level

b. Critical Level

c. Logical Level

d. View Level

Answer: (b).Critical Level

2. Which of the following is not an Schema?

a. Database Schema

b. Physical Schema

c. Critical Schema

d. Logical Schema

Answer: (c).Critical Schema

3. Which of the following is a Data Model?

a. Entity-Relationship model

b. Relational data model

c. Object-Based data model

d. All of the above

Answer: (d).All of the above

4. Logical design of database is called

a. Database Instance

b. Database Snapshot

c. Database Schema

d. All of the above

Answer: (c).Database Schema

5. Snapshot of the dta in the database at a given instant of time is called

a. Database Schema

b. Database Instance

c. Database Snapshot

d. All of the above

Answer: (b).Database Instance

6. Which of the following is the structure of the Database?

a. Table

b. Schema

c. Relation

d. None of these

Answer: (b).Schema

7. A logical description of some portion of database that is required by a user to perform task is called as

a. System View

b. User View

c. Logical View

d. Data View

Answer: (b).User View

8. _____________ is a classical approach to database design?

a. Left – Right approach

b. Right – Left approach

c. Top – Down approach

d. Bottom – Up approach

Answer: (c).Top – Down approach

9. Which of the following is the oldest database model?

a. Relational

b. Hierarchical

c. Physical

d. Network

Answer: (d).Network

10. Which of the following indicates the maximum number of entities that can be involved in a relationship?

a. Minimum cardinality

b. Maximum cardinality

c. ERD

d. Greater Entity Count (GEC)

Answer: (b).Maximum cardinality

11. Which of the following data constraints would be used to specify that the value of cells in a column must be one of a specific set of possible values?

a. A domain constraint

b. A range constraint

c. An intrarelation constraint

d. An interrelation constraint

Answer: (a).A domain constraint

12. In a 1:N relationship, the foreign key is placed in:

a. either table without specifying parent and child tables.

b. the parent table.

c. the child table.

d. either the parent table or the child table.

Answer: (c).the child table.

13. Which of the following column properties specifies whether or not cells in a column must contain a data value?

a. Null status

b. Data type

c. Default value

d. Data constraints

Answer: (a).Null status

14. A primary key should be defined as:

a. NULL

b. NOT NULL

c. Either of the above can be used

d. None of the above are correct

Answer: (b).NOT NULL

15. Which of the following column properties would be used to specify that cells in a column must contain a monetary value?

a. Null status

b. Data type

c. Default value

d. Data constraints

Answer: (b).Data type

16. If a denormalization situation exists with a one-to-one binary relationship, which of the following is true?

a. All fields are stored in one relation.

b. All fields are stored in two relations.

c. All fields are stored in three relations.

d. All fields are stored in four relations.

Answer: (a).All fields are stored in one relation.

17. Selecting a data type involves which of the following?

a. Maximize storage space

b. Represent most values

c. Improve data integrity

d. All of the above

Answer: (c).Improve data integrity

18. What is the best data type definition for Oracle when a field is alphanumeric and has a length that can vary?

a. VARCHAR2

b. CHAR

c. LONG

d. NUMBER

Answer: (a).VARCHAR2

19. A multidimensional database model is used most often in which of the following models?

a. Data warehouse

b. Relational

c. Hierarchical

d. Network

Answer: (a).Data warehouse

20. Which of the following is not a factor to consider when switching from small to large block size?

a. The length of all of the fields in a table row.

b. The number of columns

c. Block contention

d. Random row access speed

Answer: (b).The number of columns

1. A Relation is a

a. Subset of a Cartesian product of a list of attributes

b. Subset of a Cartesian product of a list of domains

c. Subset of a Cartesian product of a list of tuple

d. Subset of a Cartesian product of a list of relations

Answer: (b).Subset of a Cartesian product of a list of domains

2. In mathematical term Table is referred as

a. Relation

b. Attribute

c. Tuple

d. Domain

Answer: (a).Relation

3. In mathematical term Row is referred as

a. Relation

b. Attribute

c. Tuple

d. Domain

Answer: (c).Tuple

4. _______ allow us to identify uniquely a tuple in the relation.

a. Superkey

b. Domain

c. Attribute

d. Schema

Answer: (a).Superkey

5. Minimal Superkeys are called

a. Schema keys

b. Candidate keys

c. Domain keys

d. Attribute keys

Answer: (b).Candidate keys

1. Which of the following is correct regarding Aggregate functions?

a. it takes a list of values and return a single values as result

b. it takes a list of values and return a list of values as result

c. it takes a single value and returns a list of values as result

d. it takes a single value and returns a single value as result

Answer: (a).it takes a list of values and return a single values as result

2. Which of the following option is use to retrieval of data?

a. Stack

b. Data Structure

c. Linked list

d. Query

Answer: (d).Query

3. Establishing limits on allowable property values, and specifying a set of acceptable, predefined options that can be assigned to a property are examples

of:

a. Attributes

b. Data integrity constraints

c. Method constraints

d. Referential integrity constraints

Answer: (b).Data integrity constraints

4. ______ is a special type of integrity constraint that relates two relations & maintains consistency across the relations.

a. Entity Integrity Constraints

b. Referential Integrity Constraint

c. Domain Integrity Constraints

d. Domain Constraints

Answer: (b).Referential Integrity Constraint

5. Which of the following is a physical storage media ?

a. Tape Storage

b. Optical Storage

c. Flash memory

d. All of the mentioned

Answer: (d).All of the mentioned

6. Which of the following creates a virtual relation for storing the query ?

a. Function

b. View

c. Procedure

d. None of the mentioned

7. Which of the following is the syntax for views where v is view name ?

a. Create view v as “query name”;

b. Create “query expression” as view;

c. Create view v as “query expression”;

d. Create view “query expression”;

Answer: (c).Create view v as “query expression”;

1. Disadvantages of File systems to store data is:

a. Data redundancy and inconsistency

b. Difficulty in accessing data

c. Data isolation

d. All of the above

Answer: (d).All of the above

2. Which level of RAID refers to disk mirroring with block striping?

a. RAID level 1

b. RAID level 2

c. RAID level 0

d. RAID level 3

Answer: (a).RAID level 1

3. Optical disk technology uses

a. Helical scanning

b. DAT

c. a laser beam

d. RAID

Answer: (d).RAID

1. State true or false: SQL specifies a way of mentioning functional dependencies

a. True

b. False

c. May be

d. Can't say

Answer: (b).False

2. State true or false: Most current database systems do not support constraints on materialized view

a. True

b. False

c. May be

d. Can't say

Answer: (a).True

3. Multi valued dependencies are also called as __________

a. Equality generating dependencies

b. Tuple generating dependencies

c. Multi-purpose dependencies

d. None of the mentioned

Answer: (b).Tuple generating dependencies

4. Functional dependencies are sometimes referred to as ________

a. Equality generating dependencies

b. Tuple generating dependencies

c. Multi-purpose dependencies

d. None of the mentioned

Answer: (a).Equality generating dependencies

5. The _______ is a set of all functional and multi values dependencies implied by a set of functional dependencies

a. Star

b. Closure

c. Derivation

d. Evolution

Answer: (b).Closure

6. State true or false: If a relational schema is in _______ NF and A is a subset of R and B is also a subset of R then it is that A is a superkey is a trivial multi

values dependency.

a. 1

b. 2

c. 3

d. 4

Answer: (d).4

7. Which of the following normal forms does not exist?

a. BCNF

b. PJNF

c. 5NF

d. None of the mentioned

Answer: (d).None of the mentioned

1. The SQL database language includes statements for:

a. Database definition.

b. Database manipulation.

c. Database control.

d. All of the above.

Answer: (d).All of the above.

2. A command to remove a relation from an SQL database

a. Delete table table name

b. Drop table table name

c. Erase table table name

d. Alter table table name

Answer: (b).Drop table table name

3. Which SQL Query is use to remove a table and all its data from the database?

a. Create Table

b. Alter Table

c. Drop Table

d. None of these

Answer: (c).Drop Table

4. A type of query that is placed within a WHERE or HAVING clause of another query is called

a. Super query

b. Sub query

c. Master query

d. Multi-query

Answer: (b).Sub query

5. Aggregate functions are functions that take a ___________ as input and return a single value.

a. Collection of values

b. Single value

c. Aggregate value

d. Both a & b

6. Select __________ from instructor where dept name= ’Comp. Sci.’;

Which of the following should be used to find the mean of the salary ?

a. Mean(salary)

b. Avg(salary)

c. Sum(salary)

d. Count(salary)

Answer: (b).Avg(salary)


1. A collection of conceptual tools for describing data, relationships, semantics and constraints is

referred to as ..........

(A) Data Model

(B) E-R Model

(C) DBMS

(D) All of the above

Answer

(A) Data Model

2. Dr.E.F. Codd represented ....... rules that a database must obey if it has to be considered truly

relational.

(A) 10

(B) 15

(C) 14

(D) 12

Answer

(D) 12

3. In E-R Diagram, weak entity is represented by.......

(A) Rectangle

(B) Square

(C) Double Rectangle

(D) Circle

Answer

(C) Double Rectangle

4. An entity that is related with itself is known as.......

(A) binary relationship

(B) recursive relationship

(C) ternary relationship

(D) None of the above

Answer

(B) recursive relationship

5. ....... is a bottom-up approach in which two lower level entities combine to form a higher level

entity.

(A) Aggregation

(B) Specialization

(C) Generalization

(D) None of the above

Answer

(C) Generalization

6. An entity set that does not have sufficient attributes to form a primary key, is a ......

(A) Primary entity set

(B) Weak entity set

(C) Strong entity set

(D) None of the above

Answer

(B) Weak entity set


7. Which SQL command delete all the records and does not remove the structure?

(A) Drop

(B) Insert

(C) Truncate

(D) None of the above

Answer

(C) Truncate

8. Which of the following is a Data Definition Language (DDL) command?

(A) Delete

(B) Insert

(C) Drop

(D) Merge

Answer

(C) Drop

9. In ........ database, data is organized in the form of trees with nodes.

(A) Hierarchical

(B) Relational

(C) Network

(D) None of the above

Answer

(A) Hierarchical

10. Which command is used to retrieve records from one or more table?

(A) Delete

(B) Insert

(C) Drop

(D) Select

Answer

(D) Select1. A collection of conceptual tools for describing data, relationships, semantics and constraints is

referred to as ..........

(A) Data Model

(B) E-R Model

(C) DBMS

(D) All of the above

Answer

(A) Data Model

2. Dr.E.F. Codd represented ....... rules that a database must obey if it has to be considered truly

relational.

(A) 10

(B) 15

(C) 14

(D) 12

Answer

(D) 12

3. In E-R Diagram, weak entity is represented by.......

(A) Rectangle

(B) Square

(C) Double Rectangle

(D) Circle

Answer

(C) Double Rectangle

4. An entity that is related with itself is known as.......

(A) binary relationship

(B) recursive relationship

(C) ternary relationship

(D) None of the above

Answer

(B) recursive relationship

5. ....... is a bottom-up approach in which two lower level entities combine to form a higher level

entity.

(A) Aggregation

(B) Specialization

(C) Generalization

(D) None of the above

Answer

(C) Generalization

6. An entity set that does not have sufficient attributes to form a primary key, is a ......

(A) Primary entity set

(B) Weak entity set

(C) Strong entity set

(D) None of the above

Answer

(B) Weak entity set


7. Which SQL command delete all the records and does not remove the structure?

(A) Drop

(B) Insert

(C) Truncate

(D) None of the above

Answer

(C) Truncate

8. Which of the following is a Data Definition Language (DDL) command?

(A) Delete

(B) Insert

(C) Drop

(D) Merge

Answer

(C) Drop

9. In ........ database, data is organized in the form of trees with nodes.

(A) Hierarchical

(B) Relational

(C) Network

(D) None of the above

Answer

(A) Hierarchical

10. Which command is used to retrieve records from one or more table?

(A) Delete

(B) Insert

(C) Drop

(D) Select

Answer

(D) Select


1. Rows of a relation are called ________
(A) entity
(B) degree
(C) tuples
(D) None of the above
Answer
(C) tuples
2. The number of tuples in a relation is termed as ______
(A) cardinality
(B) entity
(C) column
(D) None of the above
Answer
(A) cardinality
3. In SQL, Which of the following is a Data Manipulation Language(DML) command?
(A) create
(B) alter
(C) merge
(D) drop
Answer
(C) merge
4. ….. is a top-down approach in which one higher level entity can be divided into two lower
level entities.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
Answer
(B) Specialization
5. Which of the following is not a type of database?
(A) Hierarchical
(B) Relational
(C) Network
(D) Transition
Answer
(D) Transition
6. In a relational database, each tuple is divided into fields called_______
(A) Relations
(B) Domains
(C) Queries
(D) None of the above
Answer
(B) Domains
7. In E-R Diagram, attribute is represented by…….
(A) Rectangle
(B) Square
(C) Double Rectangle
(D) eclipse
Answer
(D) eclipse
8. In SQL, TCL stands for______
(A) Transmission Control Language
(B) Transaction Central Language
(C) Ternary Control Language
(D) Transaction Control Language
Answer
(D) Transaction Control Language
9. Which of the following is a part of the Oracle database system?
(A) Free lists
(B) Front end
(C) Network
(D) None of the above
Answer
(B) Front end
10. Which of the following is used with database?
(A) ATM
(B) Payment gateway
(C) Data Mining
(D) None of the above
Answer
(C) Data Mining


1. The language used in application programs to request data from the DBMS is referred to as
the ______
(A) DML
(B) DDL
(C) DCL
(D) None of the above
Answer
(A) DML
2. In Oracle, who owns the data dictionary?
(A) DBA
(B) SYS
(C) SYSTEM
(D) None of the above
Answer
(B) SYS
3. In SQL, which command is used to update existing row in a table?
(A) Insert
(B) Delete
(C) Update
(D) None of the above
Answer
(C) Update
4. A ________ contains the smallest unit of meaningful data, so you might call it the basic
building block for a data file.
(A) Record
(B) Field
(C) Table
(D) None of the above
Answer
(B) Field
5. A relation between two entities is treated as a single entity is called__________
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
Answer
(A) Aggregation
6. Data mining evolve as a mechanism to cater the limitations of _______ systems to deal
massive data sets with high dimensionality.
(A) OLAP
(B) OLTP
(C) DWH
(D) None of the above
Answer
(B) OLTP
7. In Relational table, the term “Attribute” is also used to represent _______

(A) row
(B) column (or) field
(C) entity
(D) None of the above
Answer
(B) column (or) field
8. Which of the following categories of the data integrity RDBMS will enforce specific business
rules?
(A) Entity Integrity
(B) Domain Integrity
(C) User-Defined Integrity
(D) None of the above
Answer
(C) User-Defined Integrity
9. E-R Modeling technique is a _______
(A) top-down approach
(B) bottom-up approach
(C) User-Defin
(D) None of the above
Answer
(A) top-down approach
10. The number of attributes in a relation is called its _____
(A) row
(B) column
(C) degree
(D) None of the above
Answer
(C) degree

1. A top to bottom relationship among the items in a database is established by a ______
(A) Network Schema
(B) Relational Schema
(C) Hierarchical Schema
(D) None of the above
Answer
(C) Hierarchical Schema
2. Aggregation is a special form of _______
(A) Specialization
(B) Association
(C) Generalization
(D) None of the above
Answer
(B) Association
3. In E-R Diagram, _________ represents Key Attribute.
(A) Ellipse with underlying line
(B) Rectangle with underlying line
(C) Double rectangle
(D) None of the above
Answer
(A) Ellipse with underlying line
4. Which TCL command is used to permanently save any transaction into database?
(A) rollback
(B) savepoint
(C) commit
(D) None of the above
Answer
(C) commit
5. Which TCL command restores the database to last committed state?
(A) rollback
(B) savepoint
(C) commit
(D) None of the above
Answer
(A) rollback
6. _______ is used to control privilege in Database.
(A) Data Manipulation Language
(B) Data Definition Language
(C) Data Query Language
(D) Data Control Language
Answer
(D) Data Control Language
7. Which model remains operative until the software is required?
(A) Waterfall model
(B) Incremental model
(C) Prototyping model

(D) Spiral model
Answer
(D) Spiral model
8. In oracle, which tablespace is the minimum required when creating a database?
(A) System tablespace
(B) Undo tablespace
(C) temporary tablespace
(D) None of the above
Answer
(A) System tablespace
9. Which of the following is another name for weak entity?
(A) Dominant
(B) Child
(C) Owner
(D) None of the above
Answer
(B) Child
10. ODBC is based on ________
(A) C++ language
(B) RDBMS
(C) Structured Query Language
(D) C language
Answer
(C) Structured Query Language

1. OLAP stands for_____
(A) Online Arithmetic Processing
(B) Online Analysis Processing
(C) Online Analytical Processing
(D) None of the above
Answer
(C) Online Analytical Processing
2. The _____ operation allows the combining of two relations by merging pairs of tuples, one
from each relation, into a single tuple.
(A) Join
(B) Intersection
(C) Union
(D) None of the above
Answer
(A) Join
3. ________is the multiplication of all the values in the attributes.
(A) Set difference
(B) Cartesian product
(C) Intersection
(D) None of the above
Answer
(B) Cartesian product
4. Which command is used to remove a relation from an SQL database?
(A) Delete
(B) Remove
(C) Drop
(D) None of the above
Answer
(C) Drop
5. In SQL, the spaces at the end of the string are removed by _______ function .
(A) Lower
(B) String
(C) Trim
(D) None of the above
Answer
(C) Trim
6. ________ is used to save permanently any transaction into database.
(A) commit
(B) rollback
(C) savepoint
(D) None of the above
Answer
(A) commit
7. A unit of storage that can store one or more records in a hash file organization is denoted
as_______
(A) Bucket

(B) Disk pages
(C) Blocks
(D) Nodes
Answer
(A) Bucket
8. Which of the following operator used for appending two strings?
(A) %
(B) &
(C) +
(D) ||
Answer
(D) ||
9. The management information system (MIS) structure with one main computer system is
called a________
(A) Decentralized MIS structure
(B) Distributed MIS structure
(C) Centralized MIS structure
(D) None of the above
Answer
(C) Centralized MIS structure
10. The highest level in the hierarchy of data organization is called________
(A) data base
(B) data file
(C) data record
(D) None of the above
Answer
(A) data base

1. Which SQL statement is used to extract data from a database?
(A) EXTRACT
(B) GET
(C) OPEN
(D) SELECT
Answer
(D) SELECT
2. Which of the following keyword can be used to return different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
Answer
(D) DISTINCT
3. ______ operator is used to display a record if either the first condition or the second condition
is true.
(A) AND
(B) OR
(C) Both (A) & (B)
(D) None of the above
Answer
(B) OR
4. Which of the following DBMS provides faster response time and better performance?
(A) Relational Database Management System (RDBMS)
(B) NoSQL DBMS
(C) In-Memory Database Management System (IMDBMS)
(D) None of the above
Answer
(C) In-Memory Database Management System (IMDBMS)
5. ________is suitable for data warehouses that have a large number of similar data items.
(A) Relational Database Management System (RDBMS)
(B) Columnar Database Management system (CDBMS)
(C) In-Memory Database Management System (IMDBMS)
(D) None of the above
Answer
(B) Columnar Database Management system (CDBMS)
6. Which of the following is standard interactive and programming language for getting
information from and updating a database.
(A) SQL
(B) PHP
(C) ASP
(D) None of the above
Answer
(A) SQL
7. _______ keyword sorts the record in ascending order by default.
(A) ORDER BY

(B) SORT BY
(C) SORT
(D) None of the above
Answer
(A) ORDER BY
8. Which of the following is an open standard Application Programming Interface (API) for
accessing a database?
(A) Universal Data Access
(B) Open Database Connectivity
(C) Command Line Interface
(D) Open Data-Link Interface
Answer
(B) Open Database Connectivity
9. Which SQL statement is used to insert new data in a database?
(A) INSERT INTO
(B) ADD NEW
(C) ADD RECORD
(D) None of the above
Answer
(A) INSERT INTO
10. Which method of Online Analytical Processing stores data in both a relational and a multi
dimensional database.
(A) Hybrid OLAP
(B) Relational OLAP
(C) OLAP
(D) None of the above
Answer
(A) Hybrid OLAP

1. Which operator is used to select values within a range?
(A) WITHIN
(B) RANGE
(C) BETWEEN
(D) None of the above
Answer
(C) BETWEEN
2. Which of the following is the most common type of Join?
(A) INNER JOIN
(B) INSIDE JOIN
(C) JOINED
(D) None of the above
Answer
(A) INNER JOIN
3. DBMS may be combined with or used by ______ type of transaction manager.
(A) DB2
(B) Customer Information Control System (CICS)
(C) Oracle
(D) None of the above
Answer
(B) Customer Information Control System (CICS)
4. The _____clause is used to specify the number of records to return.
(A) FROM
(B) WHERE
(C) SELECT TOP
(D) None of the above
Answer
(C) SELECT TOP
5. In SQL, Wildcard characters are used with the _______ operator.
(A) LIKE
(B) RANGE
(C) BETWEEN
(D) None of the above
Answer
(A) LIKE
6. Which operator allows to specify multiple values in a WHERE Clause?
(A) LIKE
(B) IN
(C) BETWEEN
(D) None of the above
Answer
(B) IN
7. In SQL,which of the following wildcard character is used as a substitute for Zero or more
characters?
(A) *
(B) _

(C) ^
(D) %
Answer
(D) %
8. The basic unit of PL/SQL variant is called a _____
(A) block
(B) cell
(C) table
(D) None of the above
Answer
(A) block
9. Which of the following is a special type of stored procedure that is automatically invoked
whenever the data in the table is modified?
(A) Curser
(B) Trigger
(C) Both (A) & (B)
(D) None of the above
Answer
(B) Trigger
10. __________ are used to temporarily rename a table or heading of a column.
(A) Wildcards
(B) Constraints
(C) Joins
(D) Aliases
Answer
(D) Aliases

1. ______ is the complex search criteria in the where clause.
(A) Substring
(B) Drop Table
(C) Predicate
(D) None of the above
Answer
(C) Predicate
2. Which of the following clause is an additional filter that is applied to the result?
(A) Having
(B) Group-by
(C) Select
(D) Order by
Answer
(A) Having
3. _______ is the process of organizing data into related tables.
(A) Generalization
(B) Normalization
(C) Specialization
(D) None of the above
Answer
(B) Normalization
4. Which of the following is used to determine whether of a table contains duplicate rows?
(A) Unique predicate
(B) Like Predicate
(C) Null predicate
(D) In predicate
Answer
(A) Unique predicate
5. The candidate key is that you choose to identify each row uniquely is called_______
(A) Primary Key
(B) Foreign Key
(C) Alternate Key
(D) None of the above
Answer
(A) Primary Key
6. An operator is basically a join followed by a project on the attributes of first relation is known
as_______
(A) Join
(B) Inner Join
(C) Full Join
(D) Semi-Join
Answer
(D) Semi-Join
7. Which of the following is a special type of integrity constraint that relates two relations and
maintains consistency across the relations?
(A) Entity Integrity Constraints

(B) Referential Integrity Constraints
(C) Domain Integrity Constraints
(D) None of the above
Answer
(B) Referential Integrity Constraints
8. Each modification done in database transaction are first recorded into the______
(A) Hard Drive
(B) Disk
(C) Log File
(D) Data Mart
Answer
(C) Log File
9. Which of the following is preferred method for enforcing data integrity?
(A) Cursors
(B) Constraints
(C) Triggers
(D) None of the above
Answer
(B) Constraints
10. Which allows to make copies of the database periodically to help in the cases of crashes and
disasters?
(A) Recovery utility
(B) Data loading utility
(C) Monitoring utility
(D) Backup Utility
Answer
(D) Backup Utility

1. ________ allows a unique number to be generated when a new record is inserted into a table.
(A) Insert Into Select
(B) Insert Into
(C) Select Into
(D) Auto Increment
Answer
(D) Auto Increment
2. Which of the following constraint is used to limit the value range that can be placed in a
column?
(A) Check
(B) Default
(C) Unique
(D) None of the above
Answer
(A) Check
3. A Foreign key in one table points to a ________ key in another table.
(A) Alternate
(B) Default
(C) Primary
(D) None of the above
Answer
(C) Primary
4. Domain constraints, functional dependency and referential integrity are special forms of
_________
(A) Foreign key
(B) Primary key
(C) Referential constraint
(D) Assertion
Answer
(D) Assertion
5. 4NF stands for ______
(A) Fourth Normal File
(B) Fourth Normal Form
(C) Fourth Normal Fraction
(D) Fourth Negative File
Answer
(B) Fourth Normal Form
6. Which of the following field type is used to store photograph of employees?
(A) Memo
(B) Picture
(C) OLE
(D) Photo
Answer
(C) OLE
7. _______ statement is used in conjunction with the aggregate functions to group the result-set
by one or more columns.

(A) Select
(B) Group By
(C) Distinct
(D) None of the above
Answer
(B) Group By
8. Which of the following method can be used to add more tables in a database?
(A) Design View
(B) Table Wizard
(C) Both (A) & (B)
(D) None of the above
Answer
(C) Both (A) & (B)
9. Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
Answer
(B) Auto Number
10. The feature that database allows to access only certain records in database is______
(A) Queries
(B) Reports
(C) Forms
(D) Tables
Answer
(A) Queries

1. Which of the following is used to generate a square root of a number?
(A) MySQL SQRT Function
(B) MySQL RAND Function
(C) MySQL AVG Function
(D) None of the above
Answer
(A) MySQL SQRT Function
2. Which datatype is used to store up to 65,536 characters?
(A) Memo
(B) Text
(C) Integer
(D) None of the above
Answer
(A) Memo
3. Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) None of the above
Answer
(C) Union
4. Long datatype allows whole numbers between ___________
(A) 0 to 255
(B) -32,768 to 32,767
(C) -2,147,483,648 to 2,147,483,647
(D) None of the above
Answer
(C) -2,147,483,648 to 2,147,483,647
5. Which of the following datatype holds a string with maximum length of 255 characters?
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
Answer
(D) Tiny Text
6. In E-R Diagram, the total participation by entities is represented as________
(A) Dashed line
(B) Rectangle
(C) Double rectangle
(D) Double line
Answer
(D) Double line
7. Intersection operator is used to obtain the _______ tuples.
(A) Unique
(B) Common
(C) Different

(D) None of the above
Answer
(B) Common
8. Which is a low level operator?
(A) Insert
(B) Update
(C) Directory
(D) None of the above
Answer
(C) Directory
9. The LAST() function is only supported in _______
(A) MS Word
(B) MS Access
(C) MS Excel
(D) None of the above
Answer
(B) MS Access
10. _______ are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) None of the above
Answer
(A) Constraints


Q.1
Which of the following relational algebra operations do not require the participatingtables to be union-compatible?
(A)
 Union
(B)
Intersection
(C)
Difference
(D)
Join
Ans: (D)Q.2
Which of the following is not a property of transactions?
(A)
Atomicity
(B)
 Concurrency
(C)
Isolation
(D)
Durability
Ans: (B)
 
Q.3
Relational Algebra does not have
(A)
Selection operator.
(B)
Projection operator.
(C)
Aggregation operators.
(D)
Division operator.
Ans: (C )
 
Q.4
Checkpoints are a part of
(A)
Recovery measures.
(B)
Security measures.
(C )
Concurrency measures.
(D)
 Authorization measures.
 Ans: (A)
 
Q.5
Tree structures are used to store data in
(A)
Network model.
(B)
Relational model.
 (C)
 Hierarchical model. (
D)
File based system.
Ans: (C )
 
Q.6
The language that requires a user to specify the data to be retrieved without specifyingexactly how to get it is
(A)
Procedural DML.
(B)
Non-Procedural DML.
(C)
 Procedural DDL.
(D)
Non-Procedural DDL.
Ans: (B)


1)A relational database consists of a collection of
a)Tables
b)Data type
c)Relation
d)Record
e)None of these
2)Related fields in a database are grouped to form a
a)User data
b)Meta data
c)Data record
d)Reports
e)None of these
3) A ________ in a table represents a relationship among a set
of values.
a)Attribute
b)Structure
c)Entry
d)Row
e)None of these
4)The database environment has all of the following components
except:
a)Separate files
b)Operation
c)Bank
d)Module
e)None of these
5)The term _______ is used to refer to a row.
a)Attribute
b)Tuple
c)Aggregation
d)Encapsulation
e)None of these
6)The way a particular application views the data from the
database that the application uses is a
a)Number
b)Security
c)Extra space
d)Sub schema
e)None of these
7)A report generator is used to
a)Demo data
b)Inconsistent data
c)Print files on paper
d)Meta data
e)None of these
8)The method in which records are physically stored in a
specified order according to a key field in each record is
a)Lift
b)Support
c)Confidence
d)Hash
e)None of these
9)For each attribute of a relation, there is a set of
permitted values, called the ________ of that attribute.
a)Domain
b)Divisible
c)Different
d)Sorted
e)None of these
10) _______ produces the relation that has attributes of R1
and R2
a)Dimensional
b)Cartesian product
c)Difference
d)Switchboards
e)None of these

Answers:
1)a
2)c
3)d
4)a
5)b
6)d
7)c
8)d
9)a
10)b

1)The ascending order of a data hierarchy is:
a)Bit – byte – record – field – file – database
b)Byte – bit – field – record – file – database
c)Bit – byte – field – record – file – database
d)Both (a) and (b)
e)None of The Above
2)Database management systems are intended to:
a)Eliminate data redundancy
b)Establish relationships among records in different files
c)Manage file access
d)Maintain data integrity
e)All of The Above
3)Which of the following is not characteristic of a relational
database model?
a)Tables
b)Treelike structure
c)Complex logical relationships
d)Records
e)Fields
4)The relational data – base environment has all the following
components except:
a)Users
b)Separate files
c)Data base
d)Query languages
e)Data base administrator
5)Which of the following is true of a network structure?
a)It is a physical representation of the data
b)It allows a many – to – many relationship
c)It is conceptually simple
d)It will be dominant data base of the future
e)None of The Above
6)A data dictionary doesn’t provide information about:
a)Where data is located
b)The size of the disk storage device
c)Who owns or is responsible for the data
d)How the data is used
e)Security and privacy limitations
7)Embedded pointer provide:
a)A secondary access path
b)A physical record key
c)An inverted index
d)All of The Above
e)None of The Above
8)Data items grouped together for storage purpose are called
a:
a)Record
b)Title
c)List
d)String
e)None of The Above
9)The language used application programs to request data from
the DBMS is referred to as the:
a)DML
b)DDL
c)Query Language
d)Any of The Above
e)None of The Above
10)A large computer information system maintains many
different computer files. Which amongst them is called
perpetual file?
a)Specialized File
b)Log File
c)Master File
d)History File
e)None of The Above
Answers:
1)c
2)e
3)b
4)b
5)b
6)b
7)a
8)a
9)a
10)c

1)Which privilege is required to create a database?
(A) SYSDBA
(B) DBA
(C) SYSOPER
(D) RESOURCE
2)Which Normal Form(NF) is considered adequate for normal
relational database design?
(A) 2NF
(B) 5NF
(C) 4NF
(D) 3NF
3)A Foreign key in one table points to a ________ key in
another table.
(A) Alternate
(B) Default
(C) Primary
(D) None of the above
4)In SQL, the spaces at the end of the string are removed by
_______ function
(A) Lower
(B) String
(C) Trim
(D) None of the above
5)The highest level in the hierarchy of data organization is
called________
(A) data base
(B) data file
(C) data record
(D) None of the above
6)_______ is the process of organizing data into related
tables.
(A) Generalization
(B) Normalization
(C) Specialization
(D) None of the above
7)Which of the following keyword can be used to return
different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
8)Which of the following field type is used to store
photograph of employees?
(A) Memo
(B) Picture
(C) OLE
(D) Photo
9)Which of the following is standard interactive and
programming language for getting information from and updating
a database.
(A) SQL
(B) PHP
(C) ASP
(D) None of the above
10)Which TCL command is used to permanently save any
transaction into database?
(A) rollback
(B) savepoint
(C) commit
(D) None of the above
Answers:
1)a
2)d
3)c
4)c
5)a
6)b
7)d
8)c
9)a
10)c

1)Each block of B tress of order ‘n’ can have
a)n-1 key values, and n pointers
b)n+1 key values, and n pointers
c)n key values, and n+1 pointers
d)Cannot be determined
2)Which normal form is considered adequate for relational
database design?
a)2NF
b)3NF
c)4NF
d)BCNF
3)The concept of locking can be used to solve the problems of
a)Lost Updates
b)Uncommited dependency
c)Inconsistent data
d)All of the above
4)When the number of buckets or the bucket address range
changes with file, it is called
a)Hashing
b)Extendable Hashing
c)Inverted index Hashing
d)None of the above
5)Blocking factor is applicable for ………….. organization
a)Spanned
b)Un-spanned
c)Both
d)None
6)A correlate sub-query always executes in
a)Top-Bottom
b)Bottom-Top
c)Top-Bottom-Top
d)None of these
7)Access time in B+ trees
a)Varies
b)Constant
c)Cannot say
d)Both a and b
8)The five aggregation operations in SQL is
a)SUM, AVG, IN ALL, ANY
b)SUM, AVG, MIN, MAX, DISTINCT
c)SUM, AVG, MIN,MAX,COUNT
d)SUM, AVG,IN, DISTINCT,COUNT
9)Deadlock in database system is an example of…
a)User error
b)Consistency error
c)System error
d)None of these
10)Which language is used to define the integrity constraints?
a)DDL
b)DML
c)DCL
d)None of these
Answers:
1)a
2)b
3)d
4)b
5)b
6)c
7)b
8)c
9)c
10)a

1)Locking may cause which of the following problems?
a)Deadlock
b)Versioning
c)Versioning & deadlock
d)Erroneous updates
e)Erroneous updates and deadlock
2)Which of the following are placeholders for literal values
in a SQL query being sent to the database?
a)reduction and resolution variables
b)resolution variables
c)reduction variables
d)assimilation variables
e)bind variables
3)What is meant by type in RDBMS?
a)Domain
b)Range
c)Named set of value
d)Both a and c
e)None of these
4)What are the function of DCL?
a)handling the authorization aspects of data
b)permitting the user to control who has access to see or
manipulate data within the database
c)both a and b
d)a only
e)None of these
5)Which database level is closest to the users?
a)External
b)Internal
c)Physical
d)Conceptual
e)None of these
6)Fifth Normal Form is concerned with
a)Functional dependency
b)Multi-valued Dependency
c)Join Dependency
d)Domain Key
e)None of these
7)In E-R diagram, the term cardinality is a synonym for the
term………
a)Attributes
b)Degree
c)Entities
d)Cartesian
e)None of these
8)Rows of a relation are called:
a)Relation
b)Tuples
c)Data Structures
d)An entity
e)None of these
9)An Oracle server index———
a)Is a schema object
b)Is used to speed up the retrieval of rows by using a pointer
c)Is independent of the table its indexes
d)All of the above
e)None of these
10)In Oracle, what is the default number of transactions that
MAXTRANS is set to if not specified?
a)512
b)10
c)40
d)1
e)255
Answers:
1)a
2)e
3)d
4)c
5)a
6)c
7)b
8)b
9)d
10)e


1)A set of programs that handle firm’s database
responsibilities is called a
a)Database Management System(DBMS)
b)Database Processing System(DBPS)
c)Data Management System(DMS)
d)All of the above
e)None of these
2)Which of the following is used with database?
a)EDI
b)Credit card
c)ATM
d)Payment Gateway
e)Data mining
3)In Oracle, who owns the data dictionary?
a)Oracle
b)SYS
c)The DBA
d)System
e)None of these
4)The language used in application programs to request data
from the DBMS is referred to as the
a)DML
b)DDL
c)Query Language
d)DCL
e)None of these
5)An indexing operation
a)Sorts a file using a single key
b)Sorts file using two keys
c)Establishes an index for a file
d)Both a and c
e)None of these
6)In SQL, which command is used to changes data in a data
table?
a)Update
b)Insert
c)Browse
d)Append
e)None of these
7)An Oracle server index……..
a)Is a schema object
b)Is used to speed up the retrieval of rows by using a pointer
c)Is independent of the table it indexes
d)All of the above
e)None of these
8)Aggregation is special form of ……..
a)Object
b)Specialization
c)Generalization
d)Association
e)None of these
9)Which command is used to redefine a column of the table in
SQL?
a)Alter Table
b)Modify Table
c)All of the Above
d)Define Table
e)None of these
10)Data mining evolve as a mechanism to cater the limitations
of ……….system to deal massive data sets with high
dimensionality, new data type, multiple heterogenous data
resources etc.
a)OLTP
b)OLAP
c)DSS
d)DWH
e)None of these
Answers:
1)d
2)e
3)b
4)a
5)c
6)a
7)d
8)d
9)a
10)a






Comments

Popular posts from this blog

PPL 1

NEW Unit III STRUCTURING OF PROGRAM MULTIPLE CHOICE QUESTIONS 1. Which of the following is the functionality of ‘Data Abstraction’? (a) Reduce Complexity (b) Binds together code and data (c) Parallelism (d) None of the mentioned Answer : a Explanation : An essential element of Object Oriented Programming is ‘Data Abstraction’ which means hiding things. Complexity is managed through abstraction. 2. Which of the following mechanisms is/are provided by Object Oriented Language to implement Object Oriented Model? (a) Encapsulation (b) Inheritance (c) Polymorphism (d) All of the mentioned Answer : d Explanation : None. 3. Which of these is the functionality of ‘Encapsulation’? (a) Binds together code and data (b) Using single interface for general class of actions. (c) Reduce Complexity (d) All of the mentioned Answer : a Explanation : ‘Encapsulation’ acts as protective wrapper that prevents code and data from being accessed by other code defined outside the

EEE

EEE Unit-1 DC Machines MCQ's MULTIPLE CHOICE QUESTIONS ON UNIT 1: DC MACHINES Edit 1.The sole purpose of a Commutator in a dc generator is to------- ((A))increase output voltage ((B)) reduce sparking at brushes ((C)) provide smoother output ((D)) convert the induced ac into dc Hide ! Answer : D 2.In a dc generator, the generated emf is directly proportional to the------ ((A)) field current ((B)) pole flux ((C)) number of armature parallel paths ((D)) number of dummy coils Hide ! Answer:B 3.An ideal dc generator has .......... voltage regulation. ((A))low ((B))zero ((C))positive ((D))negative Hide ! Answer:B 4.Which generator may have poorest voltage regulation? ((A))series ((B))shunt((C))compound ((D))high Hide ! Answer:A 5.Voltage equation of a dc motor is----- ((A)) V = Eb + IaRa ((B)) Eb = V + IaRa ((C))V = Eb /IaRa ((D))V = Eb + Ia2Ra Hide ! Answer: A 6.Which of the following motor has the constant speed? ((A))Series motor ((B))Shunt motor ((C))Cumulatively compound motor ((D)

13.interface

File: /home/student/saiesh/ADS/Assignment No 13/ads13_2A.java package pack; interface ip { public public public public } void void void void add(int sub(int mul(int div(int a, a, a, a, int int int int b); b); b); b); public class A implements ip { public void add(int a, int b) { System.out.println("Addition is\t\t: "+(a+b)); } public void sub(int a,int b) { System.out.println("Substraction is\t\t: "+(a-b)); } public void mul(int a, int b) { System.out.println("Multiplication is\t: "+(a*b)); } public void div(int a, int b) { System.out.println("Division is\t\t: "+(a/b)); } } Page 1 of 1 ....................... File: /home/student/saiesh/ADS/Assignment No 13/ads13_2B.java package mypack; import pack.*; import java.util.Scanner; public class B { public static void main(String arg[]) { A obj= new A(); Scanner sc=new Scanner(System.in); System.out.println("\nEnter first number\t: "); int a=sc.nextInt(); System.out.println("\nEnter