0% found this document useful (0 votes)
38 views10 pages

Basics of DBMS

The document contains a series of questions and answers related to Database Management Systems (DBMS), covering topics such as SQL commands, data normalization, and database integrity constraints. It includes multiple-choice questions that test knowledge on various aspects of databases, including concepts like primary keys, foreign keys, and SQL clauses. Additionally, it addresses the roles of database administrators and the purpose of database transactions and backups.

Uploaded by

rajesh7991095
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views10 pages

Basics of DBMS

The document contains a series of questions and answers related to Database Management Systems (DBMS), covering topics such as SQL commands, data normalization, and database integrity constraints. It includes multiple-choice questions that test knowledge on various aspects of databases, including concepts like primary keys, foreign keys, and SQL clauses. Additionally, it addresses the roles of database administrators and the purpose of database transactions and backups.

Uploaded by

rajesh7991095
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

1. What is the full form of DBMS?

d) Data Definition Language

a) Data of Binary Management System

b) Database Management System 5. In a relational database, a row is also known as a:

c) Database Management Service a) Field

d) Data Backup Management System b) Tuple

c) Attribute

2. Which of the following is NOT a characteristic of a d) Instance


database?

a) Organized collection of data


6. Which SQL command is used to retrieve data from
b) Easily accessible one or more tables?

c) Data redundancy is completely eliminated a) INSERT

d) Efficient data retrieval b) UPDATE

c) SELECT

3. The level of data abstraction that describes how d) DELETE


the data is actually stored is the:

a) Logical Level
7. Which SQL clause is used to filter records based on
b) Conceptual Level specified conditions?

c) Physical Level a) ORDER BY

d) View Level b) GROUP BY

c) HAVING

4. A collection of conceptual tools for describing data, d) WHERE


relationships, semantics, and constraints is referred to
as a:

a) Database Schema 8. What is the purpose of the `JOIN` clause in SQL?

b) Database Instance a) To filter rows based on a condition.

c) Data Model b) To combine rows from two or more tables based


on a related column.

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
c) To sort the result set. a) It contains no repeating groups.

d) To group rows with the same values in one or b) It is in 1NF and all non-key attributes are fully
more columns into a summary row. functionally dependent on the primary key.

c) It is in 2NF and there are no transitive


dependencies.
9. Which SQL constraint ensures that all values in a
column are different? d) It is in BCNF and there are no multi-valued
dependencies.
a) NOT NULL

b) PRIMARY KEY
13. A functional dependency X -> Y means that:
c) FOREIGN KEY
a) The value of Y determines the value of X.
d) UNIQUE
b) The value of X determines the value of Y.

c) X and Y are always equal.


10. What is a primary key in a relational database?
d) X is a superkey of Y.
a) A column used to link two tables.

b) A column that uniquely identifies each row in a


table and cannot contain NULL values. 14. Which of the following is NOT an ACID property of
a transaction?
c) Any column that is used frequently in queries.
a) Atomicity
d) A column that stores the most important data.
b) Consistency

c) Isolation
11. The process of organizing data in a database to
reduce redundancy and improve data integrity is d) Durability
called:
e) Reliability
a) Indexing

b) Normalization
15. The property of database transactions that
c) Optimization ensures that all operations within a transaction are
treated as a single, indivisible unit of work is:
d) Abstraction
a) Consistency

b) Isolation
12. A table is in First Normal Form (1NF) if:

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
c) Atomicity b) Rectangles

d) Durability c) Diamonds

d) Lines

16. What is the primary purpose of creating an index


on a database table column?
20. Which type of join returns all rows from the left
a) To enforce data integrity. table and the matching rows from the right table. If
there is no match in the right table, NULL values are
b) To speed up data retrieval operations. used?
c) To reduce data redundancy. a) INNER JOIN
d) To improve data security. b) LEFT JOIN (or LEFT OUTER JOIN)

c) RIGHT JOIN (or RIGHT OUTER JOIN)


17. In an Entity-Relationship (ER) diagram, entities are d) FULL JOIN (or FULL OUTER JOIN)
represented by:

a) Ellipses
21. What is the purpose of the `GROUP BY` clause in
b) Rectangles SQL?
c) Diamonds a) To filter rows based on a condition.
d) Lines b) To combine rows from two or more tables.

c) To sort the result set.


18. In an ER diagram, attributes are represented by: d) To group rows that have the same values in
a) Ellipses specified columns into summary rows.

b) Rectangles

c) Diamonds 22. Which SQL aggregate function calculates the


average of values in a column?
d) Lines
a) SUM()

b) COUNT()
19. In an ER diagram, relationships are represented
by: c) AVG()

a) Ellipses d) MAX()

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
b) A key attribute depends on a non-key attribute.

23. What is a subquery in SQL? c) A non-key attribute depends on the primary key.

a) A query that is executed independently of the d) Two primary keys depend on each other.
main query.

b) A query nested inside another SQL query.


27. Boyce-Codd Normal Form (BCNF) is a stricter form
c) A query that operates on multiple databases. of:

d) A query used to create new tables. a) 1NF

b) 2NF

24. Which SQL command is used to modify existing c) 3NF


data in a table?
d) 4NF
a) INSERT

b) UPDATE
28. What is a deadlock in the context of database
c) SELECT transactions?

d) DELETE a) A situation where a transaction cannot proceed


because the database system has crashed.

b) A situation where two or more transactions are


25. A table is in Second Normal Form (2NF) if: blocked indefinitely, each waiting for the other to
a) It contains no repeating groups. release a resource.

b) It is in 1NF and all non-key attributes are fully c) A violation of the ACID properties of a
functionally dependent on the primary key. transaction.

c) It is in 2NF and there are no transitive d) An error in the SQL query that prevents the
dependencies. transaction from completing.

d) It is in BCNF and there are no multi-valued


dependencies. 29. Which of the following is a concurrency control
technique used in DBMS?

26. A transitive dependency occurs when: a) Data Encryption

a) A non-key attribute depends on another non-key b) Firewall


attribute. c) Locking

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
d) Data Backup 33. Which of the following is NOT a common type of
NoSQL database?

a) Key-Value Store
30. What is the purpose of a database transaction
log? b) Document Database

a) To store user access information. c) Relational Database

b) To record all changes made to the database, d) Graph Database


allowing for recovery in case of failures.

c) To optimize query execution plans.


34. What is the purpose of the `HAVING` clause in
d) To manage user permissions. SQL?

a) To filter rows before grouping.

31. Which type of database integrity constraint b) To filter groups after they have been created by
ensures that the values in one column of a table the `GROUP BY` clause.
match the values in a column of another table?
c) To specify the join condition between tables.
a) Entity Integrity
d) To order the result set.
b) Referential Integrity

c) Domain Integrity
35. Which SQL command is used to remove one or
d) Key Integrity more rows from a table?

a) INSERT

32. What is SQL injection? b) UPDATE

a) A technique used to optimize SQL query c) SELECT


performance.
d) DELETE
b) A security vulnerability where malicious SQL
code is inserted into an application's database
queries. 36. What is a view in SQL?
c) A method for creating database backups. a) A physical table stored in the database.
d) A standard way of defining database schemas. b) A virtual table based on the result-set of an SQL
statement.

c) A stored procedure that returns data.

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
d) A constraint used to enforce data integrity. 40. What is data warehousing primarily used for?

a) Real-time transaction processing.

37. What is the advantage of using views in a b) Online analytical processing (OLAP) and business
database? intelligence.

a) They improve the physical storage of data. c) Storing operational data for day-to-day activities.

b) They can simplify complex queries and provide d) Ensuring data integrity during transaction
data security by hiding underlying table structures. processing.

c) They automatically optimize query performance.

d) They eliminate the need for indexing. 41. What is data mining?

a) The process of cleaning and transforming data


for warehousing.
38. What is a stored procedure?
b) The process of discovering patterns and insights
a) A function that operates on database tables. from large datasets.
b) A set of SQL statements with an assigned name, c) The management of database security and
which is stored in the database. access controls.
c) A trigger that automatically executes in response d) The design and implementation of database
to certain database events. schemas.
d) A user-defined data type.

42. What is the purpose of the `TRUNCATE TABLE`


39. What is a database trigger? command in SQL?

a) A user interface component for interacting with a) To remove a specific row from a table.
the database. b) To remove all rows from a table but keep the
b) A stored procedure that automatically executes table structure.
in response to certain events on a particular table or c) To remove a table and its data.
view in a database.
d) To modify the structure of a table.
c) A mechanism for ensuring data consistency
across multiple databases.

d) A tool for monitoring database performance. 43. What is the difference between `DELETE` and
`TRUNCATE TABLE` in SQL?

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
a) `DELETE` removes the table structure, while b) Conceptual and External
`TRUNCATE TABLE` only removes rows.
c) Primary and Secondary
b) `DELETE` can be rolled back (it's a DML
command), while `TRUNCATE TABLE` cannot be rolled d) Online and Offline
back (it's a DDL command).

c) `TRUNCATE TABLE` can be used with a `WHERE` 47. What is the role of the database administrator
clause, while `DELETE` cannot. (DBA)?
d) There is no significant difference between them. a) To write application code that interacts with the
database.

44. What is the purpose of database backups? b) To design and manage the database system,
including security, performance, and backups.
a) To improve query performance.
c) To analyze data and generate reports.
b) To ensure data availability and recoverability in
case of failures. d) To provide technical support to end-users.

c) To enforce data security.

d) To manage user access permissions. 48. What is the difference between a candidate key
and a primary key?

a) A primary key is a foreign key, while a candidate


45. What is data independence in DBMS? key is not.

a) The ability to modify the schema at one level b) A candidate key is chosen to be the primary key;
without affecting the schema at the next higher level. there can be multiple candidate keys but only one
primary key per table.
b) The ability of multiple users to access the
database concurrently. c) A primary key can have NULL values, while a
candidate key cannot.
c) The independence of data from the applications
that use it. d) There is no difference between them.

d) The ability to store data in a distributed


environment.
49. What is a foreign key?

a) A primary key of another table used to establish


46. What are the two types of data independence? and enforce a link between the two tables.

a) Physical and Logical b) A key that uniquely identifies each record within
its own table.

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
c) Any non-key attribute in a table.

d) A key used for indexing purposes only.

50. What is the purpose of the `EXPLAIN` or `EXPLAIN


PLAN` command in SQL?

a) To execute an SQL query and display the results.

b) To show the execution plan that the database


system will use to execute a query, which helps in
query optimization.

c) To create a new execution plan for a query.

d) To delete existing execution plans.

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
1. b) Database Management System 24. b) UPDATE

2. c) Data redundancy is completely eliminated 25. b) It is in 1NF and all non-key attributes are
fully functionally dependent on the primary
3. c) Physical Level key.
4. c) Data Model 26. a) A non-key attribute depends on another
5. b) Tuple non-key attribute.

6. c) SELECT 27. c) 3NF

7. d) WHERE 28. b) A situation where two or more transactions


are blocked indefinitely, each waiting for the
8. b) To combine rows from two or more tables other to release a resource.
based on a related column.
29. c) Locking
9. d) UNIQUE
30. b) To record all changes made to the
10. b) A column that uniquely identifies each row database, allowing for recovery in case of
in a table and cannot contain NULL values. failures.

11. b) Normalization 31. b) Referential Integrity

12. a) It contains no repeating groups. 32. b) A security vulnerability where malicious


SQL code is inserted into an application's
13. b) The value of X determines the value of Y.
database queries.
14. e) Reliability
33. c) Relational Database
15. c) Atomicity
34. b) To filter groups after they have been
16. b) To speed up data retrieval operations. created by the GROUP BY clause.

17. b) Rectangles 35. d) DELETE

18. a) Ellipses 36. b) A virtual table based on the result-set of an


SQL statement.
19. c) Diamonds
37. b) They can simplify complex queries and
20. b) LEFT JOIN (or LEFT OUTER JOIN) provide data security by hiding underlying
table structures.
21. d) To group rows that have the same values in
specified columns into summary rows. 38. b) A set of SQL statements with an assigned
name, which is stored in the database.
22. c) AVG()

23. b) A query nested inside another SQL query.

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
39. b) A stored procedure that automatically
executes in response to certain events on a
particular table or view in a database.

40. b) Online analytical processing (OLAP) and


business intelligence.

41. b) The process of discovering patterns and


insights from large datasets.

42. b) To remove all rows from a table but keep


the table structure.

43. b) DELETE can be rolled back (it's a DML


command), while TRUNCATE TABLE cannot be
rolled back (it's a DDL command).

44. b) To ensure data availability and


recoverability in case of failures.

45. a) The ability to modify the schema at one


level without affecting the schema at the next
higher level.

46. a) Physical and Logical

47. b) To design and manage the database


system, including security, performance, and
backups.

48. b) A candidate key is chosen to be the primary


key; there can be multiple candidate keys but
only one primary key per table.

49. a) A primary key of another table used to


establish and enforce a link between the two
tables.

50. b) To show the execution plan that the


database system will use to execute a query,
which helps in query optimization.

Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India


Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR

You might also like