This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 3 Database Management Systems – Quiz 24 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 3 Database Management Systems Quiz 24 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Which of the following is an advantage of a distributed database? A) Reduced communications costs. B) Slower response to data requests. C) Increased complexity in data management. D) Limited user control over data. Show Answer Correct Answer: A) Reduced communications costs. 2. What is normalisation in the context of databases? A) The process of backing up data. B) The process of encrypting data. C) The process of indexing data for faster retrieval. D) The process of organising data to reduce redundancy. Show Answer Correct Answer: D) The process of organising data to reduce redundancy. 3. Which feature of a DBMS allows users to request and manipulate data? A) File storage system. B) Query processor. C) Logical schema. D) Data integrity. Show Answer Correct Answer: B) Query processor. 4. Which of the following is an example of a NoSQL DBMS? A) SQL Server. B) MongoDB. C) Oracle. D) MySQL. Show Answer Correct Answer: B) MongoDB. 5. Time-series databases are optimized for handling non-time-stamped data. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 6. All lock information is managed by a ..... which is responsible for assigning and policing the locks used by the transactions. A) Scheduler. B) Lock manager. C) DBMS. D) Locking agent. Show Answer Correct Answer: B) Lock manager. 7. Hirarki Data terdiri dari (urutan yang terkecil ke yang besar): A) Record-File-Database-Bit-Byte-Field. B) Bit-byte-field-record-File-Database. C) File-database-Bit-Byte-Field-Record. D) Field-bit-byte-record-file-Database. E) Byte-Bit-field-record-file-database. Show Answer Correct Answer: B) Bit-byte-field-record-File-Database. 8. What feature of a database management system allows users to protect sensitive patient information? A) Formatting. B) Sorting. C) Encryption. D) Filtering. Show Answer Correct Answer: C) Encryption. 9. What is a crucial step to ensure data security in a hospital's database management system? A) Sharing passwords between departments. B) Storing data in plain text. C) Implementing encryption and access controls. D) Allowing all staff to access all data. Show Answer Correct Answer: C) Implementing encryption and access controls. 10. What should companies do regarding naming conventions according to the image? A) Ignore naming conventions as they are outdated. B) Choose naming conventions randomly. C) Identify and follow a naming convention. D) Create a new naming convention for each project. Show Answer Correct Answer: C) Identify and follow a naming convention. 11. Why is it important for computer graduates to learn DBMS? A) It is important for computer graduates to learn DBMS to effectively manage data, ensure data integrity, and optimize database performance. B) DBMS knowledge is not applicable in data science. C) Learning DBMS is unnecessary for software development. D) DBMS is only relevant for database administrators. Show Answer Correct Answer: A) It is important for computer graduates to learn DBMS to effectively manage data, ensure data integrity, and optimize database performance. 12. What are the three levels of the ANSI-SPARC architecture? A) Physical Level, Logical Level, Data Level. B) User Level, System Level, Storage Level. C) Presentation Level, Application Level, Database Level. D) External Level, Conceptual Level, Internal Level. Show Answer Correct Answer: D) External Level, Conceptual Level, Internal Level. 13. How can user authentication enhance database security? A) User authentication enhances database security by restricting access to authorized users only. B) It eliminates the need for data encryption. C) User authentication slows down database performance. D) It allows anyone to access the database freely. Show Answer Correct Answer: A) User authentication enhances database security by restricting access to authorized users only. 14. Transaction transparency ensures that distributed transactions are treated as centralized transactions. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 15. Growing Phase:Phase where a transaction acquires locks but ..... none. A) Shares. B) Acquires. C) Releases. D) Holds. Show Answer Correct Answer: C) Releases. 16. How can you prevent SQL injection attacks? A) By disabling all database access. B) By using prepared statements and parameterized queries. C) By allowing all user inputs without validation. D) By using only stored procedures. Show Answer Correct Answer: B) By using prepared statements and parameterized queries. 17. What are the types of information systems? A) Transaction Processing Systems, Management Information Systems, Decision Support Systems. B) File-based systems, paper-based systems. C) Data storage systems, text file systems. D) None of the above. Show Answer Correct Answer: A) Transaction Processing Systems, Management Information Systems, Decision Support Systems. 18. What does the DBMS use if user A1 is authorized to request a logical record? A) Physical Record Interface. B) Logical Record Interface. C) Conceptual Record Interface. D) External Record Interface. Show Answer Correct Answer: B) Logical Record Interface. 19. Which of the following is not a valid aggregate function? A) MIN. B) MAX. C) COMPUTE. D) COUNT. Show Answer Correct Answer: C) COMPUTE. 20. Mainframe Architecture:Centralized database accessed by ..... users. A) Remote. B) Few. C) Many. D) Single. Show Answer Correct Answer: C) Many. 21. Which DBMS does Tesla use for monitoring data in real-time? A) InfluxDB. B) Couchbase. C) SQLite. D) Snowflake. Show Answer Correct Answer: A) InfluxDB. 22. Which company uses Microsoft SQL Server to handle data from millions of user interactions? A) Snapchat. B) NASA. C) Stack Overflow. D) American Airlines. Show Answer Correct Answer: C) Stack Overflow. 23. What is a database management system's role in data security? A) A DBMS is primarily used for data visualization. B) A DBMS only stores data without any security features. C) A DBMS does not allow user access management. D) A DBMS secures data by enforcing access controls, encryption, and auditing. Show Answer Correct Answer: D) A DBMS secures data by enforcing access controls, encryption, and auditing. 24. What is a rollback in the context of transactions? A) A rollback is a method for permanently saving a transaction. B) A rollback is a technique for analyzing transaction data. C) A rollback is the process of enhancing a transaction's performance. D) A rollback is the process of reverting a transaction to its previous state. Show Answer Correct Answer: D) A rollback is the process of reverting a transaction to its previous state. 25. What does a DBMS help minimize in data management? A) End-user productivity. B) Data sharing. C) Data inconsistency. D) Data integration. Show Answer Correct Answer: C) Data inconsistency. 26. Which of the following is NOT a type of NoSQL database? A) MongoDB. B) Cassandra. C) Redis. D) MySQL. Show Answer Correct Answer: D) MySQL. 27. Which of these is a popular relational database system? A) MongoDB. B) MySQL. C) Netflix Recommendations. D) Google Docs. Show Answer Correct Answer: B) MySQL. 28. Which of the following is an example of a field in a file record? A) LastName. B) ProjectCode. C) Department. D) EmployeeNumber. Show Answer Correct Answer: A) LastName. 29. Physical Data Independence is best described as: A) Immunity of the external model to changes in the conceptual model. B) Immunity of an application to changes in the internal storage model and access strategy. C) Immunity of the conceptual model to changes in the external model. D) Immunity of the database to changes in user queries. Show Answer Correct Answer: B) Immunity of an application to changes in the internal storage model and access strategy. 30. What is required for translating a relationship set into a table? A) No attributes needed. B) Primary key and descriptive attributes. C) Descriptive attributes only. D) Only primary key attributes. Show Answer Correct Answer: B) Primary key and descriptive attributes. 31. ..... exists when different versions of the same data appear in different places A) Data inconsistency. B) Data redundancy. C) Data integrity. D) Data anomaly. Show Answer Correct Answer: A) Data inconsistency. 32. American Airlines uses Teradata to improve what? A) Customer service operations. B) Transaction speeds. C) Email marketing. D) Advertising efficiency. Show Answer Correct Answer: A) Customer service operations. 33. Which component of the SQL environment processes SQL commands? A) Client application. B) Network. C) Database server. D) Development tool. Show Answer Correct Answer: C) Database server. 34. What does improved data integrity refer to in the context of a DBMS? A) Ignoring constraints for data items. B) Allowing unauthorized users to modify data. C) Ensuring data is inconsistent across records. D) Defining consistency rules for the database. Show Answer Correct Answer: D) Defining consistency rules for the database. 35. What is the main advantage of using polymorphism in Java? A) It allows methods to be overloaded and overridden for flexibility. B) It forces all methods to have the same name. C) It eliminates the need for classes. D) It prevents code reuse. Show Answer Correct Answer: A) It allows methods to be overloaded and overridden for flexibility. 36. Which model uses a tree structure? A) Hierarchical Model. B) Object Oriented Model. C) Relational Model. D) Network Model. Show Answer Correct Answer: A) Hierarchical Model. 37. Which of the following field of table "Book" can act as primary key? A) Price. B) Author name. C) Book number. D) Subject. Show Answer Correct Answer: C) Book number. 38. What are the different events in Triggers? A) Drop, Comment. B) Insert, Update, Delete. C) Select, Commit. D) Define, Create. Show Answer Correct Answer: B) Insert, Update, Delete. 39. In a hospital database, which DBMS component ensures unique patient IDs? A) Primary Key. B) Foreign Key. C) View. D) Index. Show Answer Correct Answer: A) Primary Key. 40. How does a DBMS ensure data consistency? A) By ignoring user access controls. B) By enforcing ACID properties. C) By allowing unlimited data duplication. D) By using a single database file. Show Answer Correct Answer: B) By enforcing ACID properties. 41. Which of the following database applications uses a centralized database system? A) Social media platforms. B) E-commerce websites. C) Airline reservation system. D) Distributed file systems. Show Answer Correct Answer: C) Airline reservation system. 42. In the context of normalization, a table is considered to be in 'Second Normal Form' (2NF) if it is in 1NF and what other condition is met? A) All non-key attributes are dependent on the entire primary key. B) It has no repeating groups. C) It has no transitive dependencies. D) All non-key attributes are dependent on another non-key attribute. Show Answer Correct Answer: A) All non-key attributes are dependent on the entire primary key. 43. What is the purpose of a backup procedure in a DBMS? A) To restore data in case of failure. B) To delete old tables. C) To speed up data retrieval. D) To enforce referential integrity. Show Answer Correct Answer: A) To restore data in case of failure. 44. What shape represents entities in an ER diagram? A) Diamond. B) Circle. C) Rectangle. D) Triangle. Show Answer Correct Answer: C) Rectangle. 45. What is the function of a foreign key in a database? A) To define the structure of a database. B) To increase the speed of data retrieval. C) To store encrypted data. D) To ensure data integrity by linking tables. Show Answer Correct Answer: D) To ensure data integrity by linking tables. 46. In a DBMS, the "metadata" refers to: A) Encrypted data. B) Data about data. C) Temporary data. D) The actual data stored in the tables. Show Answer Correct Answer: B) Data about data. 47. What is the main purpose of referential integrity constraints? A) To define the structure of a table. B) To enforce unique values in a column. C) To ensure data accuracy and reliability. D) To limit the range of values for attributes. Show Answer Correct Answer: C) To ensure data accuracy and reliability. 48. Why are databases important in hospitals? A) To track staff schedules. B) To monitor patient records and ensure accuracy. C) To manage social media accounts. D) To recommend treatment options automatically. Show Answer Correct Answer: B) To monitor patient records and ensure accuracy. 49. What is a potential downside of the size of a DBMS? A) Requirement for substantial memory and disk space. B) Minimal impact on memory usage. C) Decreased need for additional storage. D) Low cost of hardware procurement. Show Answer Correct Answer: A) Requirement for substantial memory and disk space. 50. What do RDBMS use for data manipulation? A) Python. B) Structured Query Language (SQL). C) HTML. D) Java. Show Answer Correct Answer: B) Structured Query Language (SQL). 51. The structure representing the organizational view of entire database is known as ..... inMySQL database. A) Instance. B) Table. C) View. D) Schema. Show Answer Correct Answer: D) Schema. 52. Which component of a DBMS defines how data is structured and stored? A) Data dictionary. B) Logical schema. C) Query processor. D) Report generator. Show Answer Correct Answer: B) Logical schema. 53. Which one of the following protocols includes under internet/internetworking layer TCP/IP layer? A) Transmission Control Protocol. B) Simple Mail Transfer Protocol. C) File Transfer Protocol. D) Address Resolution Protocol. Show Answer Correct Answer: D) Address Resolution Protocol. 54. What is the role of relational query languages in database management? A) Perform mathematical operations on the database. B) Ensure data consistency in the database. C) Define the physical storage structure of the database. D) Provide a way to interact with the database using queries. Show Answer Correct Answer: D) Provide a way to interact with the database using queries. 55. Name three common techniques for optimizing SQL queries. A) Data Encryption. B) Indexing, Query Rewriting, Analyzing Execution Plans. C) Database Normalization. D) Using Stored Procedures. Show Answer Correct Answer: B) Indexing, Query Rewriting, Analyzing Execution Plans. 56. Which combination of key allows user to move to the first field in the first record in Access table? A) Shift +Tab. B) Ctrl + Tab. C) Shift + Home. D) Ctrl + Home. Show Answer Correct Answer: D) Ctrl + Home. 57. What distinguishes data verification from data validation? A) Storage requirements. B) Checking against original source versus predefined rules. C) Computational complexity. D) Processing speed. Show Answer Correct Answer: B) Checking against original source versus predefined rules. 58. List three functions of a DBMS. A) Data encryption. B) 1. Data storage 2. Data retrieval 3. Data manipulation. C) Data visualization. D) Data backup. Show Answer Correct Answer: B) 1. Data storage 2. Data retrieval 3. Data manipulation. 59. ..... :Executive responsible for data governance. A) Chief Data Officer (CDO). B) Chief Financial Officer (CFO). C) Chief Marketing Officer (CMO). D) Chief Technology Officer (CTO). Show Answer Correct Answer: A) Chief Data Officer (CDO). 60. Discuss the importance of databases in healthcare. A) Databases are primarily used for financial transactions in healthcare. B) Databases have no impact on patient care or treatment outcomes. C) Databases are only useful for storing medical equipment inventory. D) Databases are essential in healthcare for managing patient data, improving care, supporting research, and ensuring compliance. Show Answer Correct Answer: D) Databases are essential in healthcare for managing patient data, improving care, supporting research, and ensuring compliance. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 3 Database Management Systems Quiz 1Class 12 Computer Science Chapter 3 Database Management Systems Quiz 2Class 12 Computer Science Chapter 3 Database Management Systems Quiz 3Class 12 Computer Science Chapter 3 Database Management Systems Quiz 4Class 12 Computer Science Chapter 3 Database Management Systems Quiz 5Class 12 Computer Science Chapter 3 Database Management Systems Quiz 6Class 12 Computer Science Chapter 3 Database Management Systems Quiz 7Class 12 Computer Science Chapter 3 Database Management Systems Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books