1. What is the full form of DBMS?
d) Data Definition Language
a) Data of Binary Management System
b) Database Management System 5. In a relational database, a row is also known as a:
c) Database Management Service a) Field
d) Data Backup Management System b) Tuple
c) Attribute
2. Which of the following is NOT a characteristic of a d) Instance
database?
a) Organized collection of data
6. Which SQL command is used to retrieve data from
b) Easily accessible one or more tables?
c) Data redundancy is completely eliminated a) INSERT
d) Efficient data retrieval b) UPDATE
c) SELECT
3. The level of data abstraction that describes how d) DELETE
the data is actually stored is the:
a) Logical Level
7. Which SQL clause is used to filter records based on
b) Conceptual Level specified conditions?
c) Physical Level a) ORDER BY
d) View Level b) GROUP BY
c) HAVING
4. A collection of conceptual tools for describing data, d) WHERE
relationships, semantics, and constraints is referred to
as a:
a) Database Schema 8. What is the purpose of the `JOIN` clause in SQL?
b) Database Instance a) To filter rows based on a condition.
c) Data Model b) To combine rows from two or more tables based
on a related column.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
c) To sort the result set. a) It contains no repeating groups.
d) To group rows with the same values in one or b) It is in 1NF and all non-key attributes are fully
more columns into a summary row. functionally dependent on the primary key.
c) It is in 2NF and there are no transitive
dependencies.
9. Which SQL constraint ensures that all values in a
column are different? d) It is in BCNF and there are no multi-valued
dependencies.
a) NOT NULL
b) PRIMARY KEY
13. A functional dependency X -> Y means that:
c) FOREIGN KEY
a) The value of Y determines the value of X.
d) UNIQUE
b) The value of X determines the value of Y.
c) X and Y are always equal.
10. What is a primary key in a relational database?
d) X is a superkey of Y.
a) A column used to link two tables.
b) A column that uniquely identifies each row in a
table and cannot contain NULL values. 14. Which of the following is NOT an ACID property of
a transaction?
c) Any column that is used frequently in queries.
a) Atomicity
d) A column that stores the most important data.
b) Consistency
c) Isolation
11. The process of organizing data in a database to
reduce redundancy and improve data integrity is d) Durability
called:
e) Reliability
a) Indexing
b) Normalization
15. The property of database transactions that
c) Optimization ensures that all operations within a transaction are
treated as a single, indivisible unit of work is:
d) Abstraction
a) Consistency
b) Isolation
12. A table is in First Normal Form (1NF) if:
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
c) Atomicity b) Rectangles
d) Durability c) Diamonds
d) Lines
16. What is the primary purpose of creating an index
on a database table column?
20. Which type of join returns all rows from the left
a) To enforce data integrity. table and the matching rows from the right table. If
there is no match in the right table, NULL values are
b) To speed up data retrieval operations. used?
c) To reduce data redundancy. a) INNER JOIN
d) To improve data security. b) LEFT JOIN (or LEFT OUTER JOIN)
c) RIGHT JOIN (or RIGHT OUTER JOIN)
17. In an Entity-Relationship (ER) diagram, entities are d) FULL JOIN (or FULL OUTER JOIN)
represented by:
a) Ellipses
21. What is the purpose of the `GROUP BY` clause in
b) Rectangles SQL?
c) Diamonds a) To filter rows based on a condition.
d) Lines b) To combine rows from two or more tables.
c) To sort the result set.
18. In an ER diagram, attributes are represented by: d) To group rows that have the same values in
a) Ellipses specified columns into summary rows.
b) Rectangles
c) Diamonds 22. Which SQL aggregate function calculates the
average of values in a column?
d) Lines
a) SUM()
b) COUNT()
19. In an ER diagram, relationships are represented
by: c) AVG()
a) Ellipses d) MAX()
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
b) A key attribute depends on a non-key attribute.
23. What is a subquery in SQL? c) A non-key attribute depends on the primary key.
a) A query that is executed independently of the d) Two primary keys depend on each other.
main query.
b) A query nested inside another SQL query.
27. Boyce-Codd Normal Form (BCNF) is a stricter form
c) A query that operates on multiple databases. of:
d) A query used to create new tables. a) 1NF
b) 2NF
24. Which SQL command is used to modify existing c) 3NF
data in a table?
d) 4NF
a) INSERT
b) UPDATE
28. What is a deadlock in the context of database
c) SELECT transactions?
d) DELETE a) A situation where a transaction cannot proceed
because the database system has crashed.
b) A situation where two or more transactions are
25. A table is in Second Normal Form (2NF) if: blocked indefinitely, each waiting for the other to
a) It contains no repeating groups. release a resource.
b) It is in 1NF and all non-key attributes are fully c) A violation of the ACID properties of a
functionally dependent on the primary key. transaction.
c) It is in 2NF and there are no transitive d) An error in the SQL query that prevents the
dependencies. transaction from completing.
d) It is in BCNF and there are no multi-valued
dependencies. 29. Which of the following is a concurrency control
technique used in DBMS?
26. A transitive dependency occurs when: a) Data Encryption
a) A non-key attribute depends on another non-key b) Firewall
attribute. c) Locking
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
d) Data Backup 33. Which of the following is NOT a common type of
NoSQL database?
a) Key-Value Store
30. What is the purpose of a database transaction
log? b) Document Database
a) To store user access information. c) Relational Database
b) To record all changes made to the database, d) Graph Database
allowing for recovery in case of failures.
c) To optimize query execution plans.
34. What is the purpose of the `HAVING` clause in
d) To manage user permissions. SQL?
a) To filter rows before grouping.
31. Which type of database integrity constraint b) To filter groups after they have been created by
ensures that the values in one column of a table the `GROUP BY` clause.
match the values in a column of another table?
c) To specify the join condition between tables.
a) Entity Integrity
d) To order the result set.
b) Referential Integrity
c) Domain Integrity
35. Which SQL command is used to remove one or
d) Key Integrity more rows from a table?
a) INSERT
32. What is SQL injection? b) UPDATE
a) A technique used to optimize SQL query c) SELECT
performance.
d) DELETE
b) A security vulnerability where malicious SQL
code is inserted into an application's database
queries. 36. What is a view in SQL?
c) A method for creating database backups. a) A physical table stored in the database.
d) A standard way of defining database schemas. b) A virtual table based on the result-set of an SQL
statement.
c) A stored procedure that returns data.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
d) A constraint used to enforce data integrity. 40. What is data warehousing primarily used for?
a) Real-time transaction processing.
37. What is the advantage of using views in a b) Online analytical processing (OLAP) and business
database? intelligence.
a) They improve the physical storage of data. c) Storing operational data for day-to-day activities.
b) They can simplify complex queries and provide d) Ensuring data integrity during transaction
data security by hiding underlying table structures. processing.
c) They automatically optimize query performance.
d) They eliminate the need for indexing. 41. What is data mining?
a) The process of cleaning and transforming data
for warehousing.
38. What is a stored procedure?
b) The process of discovering patterns and insights
a) A function that operates on database tables. from large datasets.
b) A set of SQL statements with an assigned name, c) The management of database security and
which is stored in the database. access controls.
c) A trigger that automatically executes in response d) The design and implementation of database
to certain database events. schemas.
d) A user-defined data type.
42. What is the purpose of the `TRUNCATE TABLE`
39. What is a database trigger? command in SQL?
a) A user interface component for interacting with a) To remove a specific row from a table.
the database. b) To remove all rows from a table but keep the
b) A stored procedure that automatically executes table structure.
in response to certain events on a particular table or c) To remove a table and its data.
view in a database.
d) To modify the structure of a table.
c) A mechanism for ensuring data consistency
across multiple databases.
d) A tool for monitoring database performance. 43. What is the difference between `DELETE` and
`TRUNCATE TABLE` in SQL?
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
a) `DELETE` removes the table structure, while b) Conceptual and External
`TRUNCATE TABLE` only removes rows.
c) Primary and Secondary
b) `DELETE` can be rolled back (it's a DML
command), while `TRUNCATE TABLE` cannot be rolled d) Online and Offline
back (it's a DDL command).
c) `TRUNCATE TABLE` can be used with a `WHERE` 47. What is the role of the database administrator
clause, while `DELETE` cannot. (DBA)?
d) There is no significant difference between them. a) To write application code that interacts with the
database.
44. What is the purpose of database backups? b) To design and manage the database system,
including security, performance, and backups.
a) To improve query performance.
c) To analyze data and generate reports.
b) To ensure data availability and recoverability in
case of failures. d) To provide technical support to end-users.
c) To enforce data security.
d) To manage user access permissions. 48. What is the difference between a candidate key
and a primary key?
a) A primary key is a foreign key, while a candidate
45. What is data independence in DBMS? key is not.
a) The ability to modify the schema at one level b) A candidate key is chosen to be the primary key;
without affecting the schema at the next higher level. there can be multiple candidate keys but only one
primary key per table.
b) The ability of multiple users to access the
database concurrently. c) A primary key can have NULL values, while a
candidate key cannot.
c) The independence of data from the applications
that use it. d) There is no difference between them.
d) The ability to store data in a distributed
environment.
49. What is a foreign key?
a) A primary key of another table used to establish
46. What are the two types of data independence? and enforce a link between the two tables.
a) Physical and Logical b) A key that uniquely identifies each record within
its own table.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
c) Any non-key attribute in a table.
d) A key used for indexing purposes only.
50. What is the purpose of the `EXPLAIN` or `EXPLAIN
PLAN` command in SQL?
a) To execute an SQL query and display the results.
b) To show the execution plan that the database
system will use to execute a query, which helps in
query optimization.
c) To create a new execution plan for a query.
d) To delete existing execution plans.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
1. b) Database Management System 24. b) UPDATE
2. c) Data redundancy is completely eliminated 25. b) It is in 1NF and all non-key attributes are
fully functionally dependent on the primary
3. c) Physical Level key.
4. c) Data Model 26. a) A non-key attribute depends on another
5. b) Tuple non-key attribute.
6. c) SELECT 27. c) 3NF
7. d) WHERE 28. b) A situation where two or more transactions
are blocked indefinitely, each waiting for the
8. b) To combine rows from two or more tables other to release a resource.
based on a related column.
29. c) Locking
9. d) UNIQUE
30. b) To record all changes made to the
10. b) A column that uniquely identifies each row database, allowing for recovery in case of
in a table and cannot contain NULL values. failures.
11. b) Normalization 31. b) Referential Integrity
12. a) It contains no repeating groups. 32. b) A security vulnerability where malicious
SQL code is inserted into an application's
13. b) The value of X determines the value of Y.
database queries.
14. e) Reliability
33. c) Relational Database
15. c) Atomicity
34. b) To filter groups after they have been
16. b) To speed up data retrieval operations. created by the GROUP BY clause.
17. b) Rectangles 35. d) DELETE
18. a) Ellipses 36. b) A virtual table based on the result-set of an
SQL statement.
19. c) Diamonds
37. b) They can simplify complex queries and
20. b) LEFT JOIN (or LEFT OUTER JOIN) provide data security by hiding underlying
table structures.
21. d) To group rows that have the same values in
specified columns into summary rows. 38. b) A set of SQL statements with an assigned
name, which is stored in the database.
22. c) AVG()
23. b) A query nested inside another SQL query.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR
39. b) A stored procedure that automatically
executes in response to certain events on a
particular table or view in a database.
40. b) Online analytical processing (OLAP) and
business intelligence.
41. b) The process of discovering patterns and
insights from large datasets.
42. b) To remove all rows from a table but keep
the table structure.
43. b) DELETE can be rolled back (it's a DML
command), while TRUNCATE TABLE cannot be
rolled back (it's a DDL command).
44. b) To ensure data availability and
recoverability in case of failures.
45. a) The ability to modify the schema at one
level without affecting the schema at the next
higher level.
46. a) Physical and Logical
47. b) To design and manage the database
system, including security, performance, and
backups.
48. b) A candidate key is chosen to be the primary
key; there can be multiple candidate keys but
only one primary key per table.
49. a) A primary key of another table used to
establish and enforce a link between the two
tables.
50. b) To show the execution plan that the
database system will use to execute a query,
which helps in query optimization.
Plot No. - 215, Saheed Nagar, Bhubaneswar – 751007, Odisha, India
Contact: 9438734530, 9237424344
E-mail: questqsk@yahoo.com,Website: www.questbbsr.org,Facebook: questbbsr24×7,App:QUEST BBSR