Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Dbms Mcqs

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 3

DATABASE MANAGEMENT MULTIPLE CHOICE QUESTIONS &

ANSWERS
·0 In an object-oriented model, one object can
access data of another object by passing:
·1 Instance variable
·2 Message
·3 Variable
·4 None of these
·5 A view of database that appears to an
application program is known as:
·6 Schema
·7 Subschema
·8 virtual table
·9 none of the above
·10 An abstraction concept for building
composite object from their component
object is called:
·11 Specialization
·12 Normalization
·13 Generalization
·14 Aggregation
·15 A set of objects that share a common structure
and a common behavior is called:
·16 Object
·17 Class
·18 Entity
·19 None of these
·20 Every weak entity set can be converted
into a strong entity set by:
·21 using generalization
·22 adding appropriate attributes
·23 using aggregation
·24 none of the above
·25 The number of entities to which another entity
can be associated via a relationship set is
expressed as:
·26 Entity
·27 Cardinality
·28 Schema
·29 Attributes
·30 Relations produced from an E-R model will
always be in:

·31 Second normal form


·32 Third normal form
·33 Fourth normal form
·34 In ER model the details of the entities are
hidden from the user. This process is called:
·35 Generalization
·36 Specialization
·37 Abstraction
·38 none of these above
·39 The file organization that provides very
fast access to any arbitrary record of a
file is:
·40 Ordered file
·41 Unordered file
·42 Hashed file
·43 B-tree
·44 What is not true about a view?
·45 It is a definition of a restricted
portion of the database
·46 It is a security mechanism
·47 It is always updatable like any other table
·48 All are true
·49 In a relational database a referential
integrity constraint can be specified with
the help of
·50 primary key
·51 foreign key
·52 secondary key
·53 none of the above
·54 A super key is a set of one or more
attributes that, taken collectively, allow
us
·55 to identify uniquely an entity in the
entity set
·56 to make the key most powerful for
faster retrieval
·57 to increase effectiveness of database
access
·58 none of the above
·59 4NF is designed to cope with:
·60 Transitive dependency
·61 Join dependency
·62 Multi valued dependency
·63 None of these
·64 Every Boyee-Codd normal form is in

pray for kashif ali


allah pak ap ko kaamyab kary amin!
best of luck!

You might also like