This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 3 Database Management Systems – Quiz 12 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 3 Database Management Systems Quiz 12 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What data type would be used to store the following item code:0024 A) Calculated. B) Text. C) Boolean. D) Numeric. Show Answer Correct Answer: B) Text. 2. Which DBMS architecture uses a middle layer between client and database? A) 2-Tier. B) 1-Tier. C) 4-Tier. D) 3-Tier. Show Answer Correct Answer: D) 3-Tier. 3. In an Entity-Relationship Diagram (ERD), an arrow line represents what? A) A primary key. B) An entity. C) A relationship. D) An attribute. Show Answer Correct Answer: C) A relationship. 4. Which database language is commonly used for querying relational databases? A) Java. B) CSS. C) SQL. D) HTML. Show Answer Correct Answer: C) SQL. 5. What additional elements are needed, besides data, to produce information according to the formula provided? A) Context, structure, and analysis. B) Only context. C) Only structure. D) Only analysis. Show Answer Correct Answer: A) Context, structure, and analysis. 6. The result of a SELECT statement can contain duplicate rows . A) False. B) True. C) None of the above. D) None of the above. Show Answer Correct Answer: B) True. 7. Which of the following is a key component of database architecture? A) Database server. B) Keyboard. C) Monitor. D) Storage device. Show Answer Correct Answer: A) Database server. 8. ..... :Unfair outcomes caused by data or algorithms. A) Data Encryption. B) Data Visualization. C) Algorithm Efficiency. D) Bias in Data. Show Answer Correct Answer: D) Bias in Data. 9. Define a trigger in the context of a database. A) A trigger is a type of database index that improves query performance. B) A trigger is a user-defined function that returns a value. C) A trigger is a command that manually updates a database record. D) A trigger is a database object that automatically executes a specified action in response to certain events on a table or view. Show Answer Correct Answer: D) A trigger is a database object that automatically executes a specified action in response to certain events on a table or view. 10. True or False:Can a database management system completely eliminate the need for manual data entry in healthcare? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 11. Which of the following is true about a foreign key? A) It must have a different data type than the primary key it references. B) It cannot reference a primary key in another table. C) It must always be a unique value. D) It ensures referential integrity by linking to a primary key in another table. Show Answer Correct Answer: D) It ensures referential integrity by linking to a primary key in another table. 12. What is the primary purpose of the relational model in databases? A) Create graphical representations. B) Organize data in tables. C) Manage network connections. D) Perform complex calculations. Show Answer Correct Answer: B) Organize data in tables. 13. Which of the following best describes the key difference between a file-based system and a database management system? A) Storage medium. B) Data organisation and management capabilities. C) Cost of implementation. D) Number of files stored. Show Answer Correct Answer: B) Data organisation and management capabilities. 14. Indices whose search key specifies an order different from the sequential order of the file are called ..... indices. A) Nonclustered. B) Secondary. C) All of the mentioned. D) None of the mentioned. Show Answer Correct Answer: C) All of the mentioned. 15. Database is collection of ..... A) Modules. B) Data. C) Programs. D) None of these. Show Answer Correct Answer: B) Data. 16. What is the main purpose of a database? A) To store and manage data B) To create software C) To design websites D) To run applications A) G) To host web servers. B) F) To manage user accounts. C) E) To analyze financial data. D) A) To store and manage data. Show Answer Correct Answer: D) A) To store and manage data. 17. Which of the following would result in a data anomaly? A) Obsolescence of data. B) Inconsistent redundant data. C) Modification of data. D) Timeliness of data. Show Answer Correct Answer: B) Inconsistent redundant data. 18. Which DBMS component controls user access and prevents unauthorized users from editing records? A) Schema. B) Transaction Manager. C) Authorization. D) Indexing. Show Answer Correct Answer: C) Authorization. 19. Which of the following statements is true about the relational database model? A) Requires less storage. B) Allows flexible queries using tables and keys. C) Supports tree-like structures. D) Uses less processing power. Show Answer Correct Answer: B) Allows flexible queries using tables and keys. 20. In the context of a database, what is ACID? A) A chemical compound. B) A database programming language. C) A set of properties that guarantee database transactions are processed reliably. D) A data visualization tool. Show Answer Correct Answer: C) A set of properties that guarantee database transactions are processed reliably. 21. Which of the following best explains the concept of data redundancy? A) Backing up data to an external drive. B) Ensuring data is always up to date. C) Storing the same piece of data in multiple places within a database. D) Encrypting data for security. Show Answer Correct Answer: C) Storing the same piece of data in multiple places within a database. 22. Which of the following topics is covered in the "INTRODUCTION TO DBMS" section? A) Artificial Intelligence. B) Network Security. C) Data vs Information. D) Web Development. Show Answer Correct Answer: C) Data vs Information. 23. Which of the following is a dynamic web technology? A) CSS. B) HTML. C) XML. D) JavaScript. Show Answer Correct Answer: D) JavaScript. 24. Define the term 'schema' in a database context. A) A schema is a programming language for databases. B) A schema is a backup system for database data. C) A schema is a type of database query. D) A schema is the organizational blueprint of a database that defines its structure and relationships. Show Answer Correct Answer: D) A schema is the organizational blueprint of a database that defines its structure and relationships. 25. What does database integrity refer to in a DBMS? A) The validity and consistency of stored data. B) The protection of the database from unauthorized users. C) The speed at which data can be accessed. D) The size of the database. Show Answer Correct Answer: A) The validity and consistency of stored data. 26. The following figure shows a: A) Completeness constraint. B) Spindle constraint. C) Supertype/subtype hierarchy. D) Disjoint constraint. Show Answer Correct Answer: C) Supertype/subtype hierarchy. 27. ..... is a condition specified on a database schema and restricts the data that can be stored in an instance of the database. A) Foreign key constraint. B) Integrity constraint. C) Check constraint. D) Key constraint. Show Answer Correct Answer: B) Integrity constraint. 28. When a process is waiting for some I/O events, after the waiting process is completed, to what state does the process transition next? A) Running state. B) Ready state. C) New state. D) Terminated state. Show Answer Correct Answer: B) Ready state. 29. If a web developer wants to create a login page with real-time validation, then which technologies should they combine? A) HTML, CSS, Python. B) Java, PHP, SQL. C) HTML, CSS, JavaScript. D) JavaScript, SQL, PHP. Show Answer Correct Answer: C) HTML, CSS, JavaScript. 30. Which one of the following schema development practice is used for optimizing database performance? A) Normalization. B) Data security. C) Name conventions. D) Documentation. Show Answer Correct Answer: A) Normalization. 31. A company wants to store information about employees and their salaries. The data includes EmployeeID, EmployeeName, JobTitle, and Salary. Which of the following is an example of an attribute in this scenario? A) Database. B) Employees. C) Manages. D) Salary. Show Answer Correct Answer: D) Salary. 32. What is meant by location transparency in a distributed DBMS? A) Users must know the exact location of data. B) Data is only accessible from one location. C) Data can be accessed without knowing its physical location. D) All data must be stored in the same format. Show Answer Correct Answer: C) Data can be accessed without knowing its physical location. 33. In SQL, which operator is used to test whether a value matches any value in a list? A) LIKE. B) IN. C) BETWEEN. D) EXISTS. Show Answer Correct Answer: B) IN. 34. What type of relationship is represented by a diamond shape in an ER diagram? A) Attribute. B) Entity. C) Relationship. D) Weak entity. Show Answer Correct Answer: C) Relationship. 35. A(n) ..... constraint is a type of constraint that addresses whether an instance of a supertype must also be an instance of at least one subtype. A) Completeness. B) Disjoint. C) Overlap. D) Weak. Show Answer Correct Answer: A) Completeness. 36. What causes most errors in a database? A) Humans. B) SQL. C) Servers. D) Internet access. Show Answer Correct Answer: A) Humans. 37. Hierarchical databases are commonly used in modern applications. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 38. What term is given to a change made in a database? A) A transaction. B) An edit. C) An amend. D) None of the above. Show Answer Correct Answer: A) A transaction. 39. Which one of the following programing states a conceptual framework of object model and is implemented by writing classes and objects. A) Imperative programing. B) Declarative programming. C) Procedural programing. D) Object oriented programming. Show Answer Correct Answer: D) Object oriented programming. 40. Shrinking Phase:Phase where a transaction releases locks but ..... none. A) Holds. B) Removes. C) Shares. D) Acquires. Show Answer Correct Answer: D) Acquires. 41. Which SQL command is used to delete records from a table? A) DROP. B) ERASE. C) DELETE. D) REMOVE. Show Answer Correct Answer: C) DELETE. 42. What is the purpose of a candidate key? A) To link multiple tables. B) To store temporary data. C) To uniquely identify records. D) To create a backup. Show Answer Correct Answer: C) To uniquely identify records. 43. What is the CIA triad in database security? A) Confidentiality, Integrity, Availability. B) Control, Information, Access. C) Centralization, Integration, Analysis. D) Consistency, Isolation, Accessibility. Show Answer Correct Answer: A) Confidentiality, Integrity, Availability. 44. What is the main reason for the 3-level database architecture? A) To reduce storage costs. B) To simplify user interfaces. C) To increase database speed. D) To provide data independence. Show Answer Correct Answer: D) To provide data independence. 45. Explain the concept of indexing in databases. A) Indexing is a method to delete data from databases efficiently. B) Indexing is a way to encrypt sensitive data in databases. C) Indexing refers to the process of backing up database files. D) Indexing is a technique to enhance data retrieval speed in databases by creating a separate data structure that maps column values to their corresponding rows. Show Answer Correct Answer: D) Indexing is a technique to enhance data retrieval speed in databases by creating a separate data structure that maps column values to their corresponding rows. 46. Which modeling technique shows the message flow between objects in an Object Oriented application and also implies the basic associations between classes? A) Sequence Diagram. B) Class Diagram. C) Activity Diagram. D) Collaboration Diagram. Show Answer Correct Answer: D) Collaboration Diagram. 47. The most important challenge of customizing a purchased data model is: A) Getting user buy-in. B) Implementation. C) Determining the business rules that will be established through the data model. D) User training. Show Answer Correct Answer: C) Determining the business rules that will be established through the data model. 48. When the total specialization rule is set for a supertype/subtype relationship, one could roughly compare the supertype to an abstract class in object-oriented programming. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 49. What is the purpose of the INDEX in SQL? A) To improve the speed of data retrieval operations on a table. B) To delete records from a table. C) To define relationships between tables. D) To create a backup of the database. Show Answer Correct Answer: A) To improve the speed of data retrieval operations on a table. 50. Which SDLC phase focuses on identifying data requirements? A) Maintenance. B) Analysis. C) Implementation. D) Design. Show Answer Correct Answer: B) Analysis. 51. The following figure is an example of the overlap rule. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 52. What does DML stand for in SQL and what is its primary function? A) Data Manipulation Language, used to retrieve and manipulate database data. B) Data Modification Language, used to define database structures. C) Data Management Language, used to control access to data. D) Data Mapping Language, used to map data structures. Show Answer Correct Answer: A) Data Manipulation Language, used to retrieve and manipulate database data. 53. The subtype discriminator in the figure below is: A) Location. B) Part No. C) Part Type. D) Manufactured Part. Show Answer Correct Answer: C) Part Type. 54. List two types of data integrity constraints. A) Data Redundancy. B) Data Encryption. C) Entity Integrity, Referential Integrity. D) Data Normalization. Show Answer Correct Answer: C) Entity Integrity, Referential Integrity. 55. Which object stores information about related data? A) Document. B) Table. C) Page. D) Screen. Show Answer Correct Answer: B) Table. 56. If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an ..... on all the records belonging to that file. A) Explicit lock in shared mode. B) Explicit lock in exclusive mode. C) Implicit lock in exclusive mode. D) Implicit lock in shared mode. Show Answer Correct Answer: C) Implicit lock in exclusive mode. 57. Which of the following is a data integrity constraint? A) Data duplication. B) Data redundancy. C) Data inconsistency. D) Primary key. Show Answer Correct Answer: D) Primary key. 58. Describe what a database schema is. A) A database schema is a type of software application. B) A database schema is a blueprint that outlines the structure of a database, including tables, fields, data types, and relationships. C) A database schema is a collection of user accounts and permissions. D) A database schema is a programming language used for data manipulation. Show Answer Correct Answer: B) A database schema is a blueprint that outlines the structure of a database, including tables, fields, data types, and relationships. 59. ..... :Law protecting student education records. A) FERPA. B) FOIA. C) ADA. D) HIPAA. Show Answer Correct Answer: A) FERPA. 60. In a library DBMS, which is part of the external level? A) How data is physically stored. B) User views showing only book titles and authors. C) System catalog of metadata. D) Database buffers. Show Answer Correct Answer: B) User views showing only book titles and authors. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 3 Database Management Systems Quiz 1Class 12 Computer Science Chapter 3 Database Management Systems Quiz 2Class 12 Computer Science Chapter 3 Database Management Systems Quiz 3Class 12 Computer Science Chapter 3 Database Management Systems Quiz 4Class 12 Computer Science Chapter 3 Database Management Systems Quiz 5Class 12 Computer Science Chapter 3 Database Management Systems Quiz 6Class 12 Computer Science Chapter 3 Database Management Systems Quiz 7Class 12 Computer Science Chapter 3 Database Management Systems Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books