1. A database is best described as
a. Collection of unrelated files
b. Collection of interrelated data
c. Collection of programs
d. Collection of operating system files
b. Collection of interrelated data
2. DBMS mainly helps in
a. Increasing data redundancy
b. Reducing data redundancy and inconsistency
c. Increasing file dependency
d. Removing need of storage devices
b. Reducing data redundancy and inconsistency
3. In a file processing system, a major problem is
a. Data independence
b. Centralized control
c. Data redundancy
d. Easy recovery
c. Data redundancy
4. Data independence refers to the ability to
a. Store data without any schema
b. Change data at physical level without changing application programs
c. Store data only in files
d. Remove data constraints
b. Change data at physical level without changing application programs
5. Which of the following is NOT an advantage of DBMS?
a. Improved data sharing
b. Better data security
c. Increased program-data dependence
d. Reduced data inconsistency
c. Increased program-data dependence
6. The collection of data stored in the database at a particular moment is called
a. Schema
b. Instance
c. Metadata
d. View
b. Instance
7. The overall logical design of a database is called
a. Instance
b. Schema
c. Record
d. File
b. Schema
8. Data abstraction is mainly used to
a. Increase complexity
b. Hide internal details and show only necessary information
c. Remove need of DBMS
d. Avoid backups
b. Hide internal details and show only necessary information
9. Which of the following is an example of a DBMS?
a. MS Word
b. MySQL
c. Google Chrome
d. Linux Kernel
b. MySQL
10. The person responsible for overall control of the database is
a. System Analyst
b. Database Administrator (DBA)
c. Data Entry Operator
d. End user
b. Database Administrator (DBA)
11. Which of the following is a disadvantage of DBMS?
a. Data security
b. Concurrency control
c. High initial cost and complexity
d. Reduced redundancy
c. High initial cost and complexity
12. A DBMS is used to provide
a. Only data storage
b. Only data retrieval
c. Both data storage and controlled access
d. Only hardware support
c. Both data storage and controlled access
13. Which of the following is an example of application program in DBMS environment?
a. Query optimizer
b. Banking management software using database
c. Storage manager
d. Data dictionary
b. Banking management software using database
14. Metadata is
a. Data about data
b. Data in the form of files
c. Redundant data
d. Encrypted data
a. Data about data
15. The primary goal of DBMS is to
a. Minimize memory usage only
b. Provide efficient and convenient access to data
c. Replace operating system
d. Remove need of transactions
b. Provide efficient and convenient access to data
16. Which of the following is a data model?
a. Entity-Relationship model
b. Compiler model
c. Browser model
d. Cache model
a. Entity-Relationship model
17. The main reason for using a database approach is
a. Program-data independence
b. Increased redundancy
c. More inconsistency
d. No security
a. Program-data independence
18. In DBMS, the data dictionary is used to store
a. User data only
b. Metadata and schema information
c. Temporary files only
d. Operating system files
b. Metadata and schema information
19. A view in DBMS is
a. A physical table stored on disk
b. A virtual table derived from one or more tables
c. A backup file
d. An index
b. A virtual table derived from one or more tables
20. Data consistency means
a. Same data stored in many places
b. Data is always duplicated
c. Data values are correct and match across the database
d. Data cannot be shared
c. Data values are correct and match across the database
21. Which user category interacts with DBMS through programs or queries?
a. End users
b. DBA only
c. Hardware engineers
d. Network cables
a. End users
22. Which of the following is a key feature of database approach?
a. Controlled redundancy
b. Uncontrolled duplication
c. No sharing
d. No backup
a. Controlled redundancy
23. The ability of DBMS to allow multiple users to access data simultaneously is
a. Concurrency
b. Redundancy
c. Fragmentation
d. Compilation
a. Concurrency
24. Which of the following is used to ensure authorized access to database?
a. Normalization
b. Security and authorization
c. Redundancy
d. Cartesian product
b. Security and authorization
25. A DBMS provides a language to define and manipulate data called
a. Programming language
b. Database language (SQL)
c. Assembly language
d. Machine language
b. Database language (SQL)