This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 3 Database Management Systems – Quiz 8 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 3 Database Management Systems Quiz 8 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is a limitation of a DBMS? A) Allows easy data sharing. B) Supports multiple formats. C) Requires admin/training to manage. D) Is always online. Show Answer Correct Answer: C) Requires admin/training to manage. 2. What are two key benefits of utilizing a Database Management System (DBMS)? A) Increased data inconsistency. B) Complex data management. C) Enhanced data security and backup options. D) Higher costs and maintenance requirements. Show Answer Correct Answer: C) Enhanced data security and backup options. 3. If we might write the following internet program, then what type of CSS is applying for displaying the text color in red? This is your exit exam! It should appear in red A) Browser default styles. B) External. C) Inline. D) Internal. Show Answer Correct Answer: C) Inline. 4. How does a DBMS handle multiple users accessing the database at the same time? A) By preventing multiple users from accessing data. B) By deleting duplicate records. C) By storing data in separate files. D) By implementing concurrency control mechanisms. Show Answer Correct Answer: D) By implementing concurrency control mechanisms. 5. What is the main benefit of modular growth in a distributed database? A) Increased complexity in data management. B) Ability to expand the database incrementally. C) Slower response to data requests. D) Reduced user control over data. Show Answer Correct Answer: B) Ability to expand the database incrementally. 6. Which approach is characterized by decentralized data management? A) File-Based Approach. B) Cloud-Based Approach. C) Database Approach. D) Manual Approach. Show Answer Correct Answer: A) File-Based Approach. 7. SQL is used for? A) Database management. B) Hardware control. C) Network security. D) Operating systems. Show Answer Correct Answer: A) Database management. 8. What are the main components of an ER model? A) Nodes, Edges, Weights. B) Entities, Attributes, Relationships. C) Classes, Methods, Objects. D) Tables, Columns, Rows. Show Answer Correct Answer: B) Entities, Attributes, Relationships. 9. What action should be taken to maintain data integrity in a hospital database? A) Delete all records older than a year. B) Allow unrestricted access to all users. C) Ignore obsolete records. D) Regularly update and back up the database. Show Answer Correct Answer: D) Regularly update and back up the database. 10. Which architecture separates the user interface from the database A) All of the above. B) Single-tier architecture. C) Two-tier architecture. D) Three-tier architecture. Show Answer Correct Answer: D) Three-tier architecture. 11. In a database transaction, what occurs if consistency rules are violated? A) Transaction is partially completed. B) Database continues normal operation. C) Entire transaction is rolled back. D) Only problematic data is removed. Show Answer Correct Answer: C) Entire transaction is rolled back. 12. What is data integrity? A) The accuracy and consistency of data. B) The speed of data retrieval. C) The amount of data stored. D) The security of data. Show Answer Correct Answer: A) The accuracy and consistency of data. 13. Which of the following is Database Language? A) Data Definition Language. B) Data Manipulation Language. C) Query Language. D) All of the above. Show Answer Correct Answer: D) All of the above. 14. In tables, data is organized in the form of rows and columns.(T/F) A) A. True. B) B. False. C) All the above. D) None of the above. Show Answer Correct Answer: A) A. True. 15. Which of the following is an example of a Database Management System? A) Google Chrome. B) Microsoft Word. C) Adobe Photoshop. D) MySQL. Show Answer Correct Answer: D) MySQL. 16. Deadlock Resolution: ..... one transaction to break a deadlock. A) Suspending. B) Aborting. C) Locking. D) Committing. Show Answer Correct Answer: B) Aborting. 17. What is the function of a surrogate key? A) To link multiple tables. B) To store user data. C) To create indexes. D) To replace a natural key. Show Answer Correct Answer: D) To replace a natural key. 18. Which SQL clause is used to group rows that have the same values in specified columns? A) GROUP BY. B) SELECT. C) ORDER BY. D) HAVING. Show Answer Correct Answer: A) GROUP BY. 19. Which SQL command is used to create a new table in a database? A) CREATE TABLE. B) INSERT. C) ALTER. D) DROP TABLE. Show Answer Correct Answer: A) CREATE TABLE. 20. What is the primary key in the following relation? STUDENT(StudentID, Name, Address, CourseID) A) Address. B) StudentID. C) CourseID. D) Name. Show Answer Correct Answer: B) StudentID. 21. Which of the following is NOT a characteristic of Object-Oriented Database Management Systems (OODBMS)? A) Data stored in tables. B) Supports complex data types. C) Integration with object-oriented programming. D) Data represented as objects. Show Answer Correct Answer: A) Data stored in tables. 22. What is the purpose of the COMMIT command? A) To permanently save all changes made in a transaction. B) To undo changes made in a transaction. C) To delete a record. D) To create a new table. Show Answer Correct Answer: A) To permanently save all changes made in a transaction. 23. What do foreign keys do? A) They delete records. B) They only store numbers. C) They establish relationships between tables. D) They create new tables. Show Answer Correct Answer: C) They establish relationships between tables. 24. What is a JOIN operation in SQL and why is it used? A) A JOIN operation in SQL is used to delete rows from a table. B) A JOIN operation in SQL is used to create new tables from existing ones. C) A JOIN operation in SQL is used to sort data within a single table. D) A JOIN operation in SQL is used to combine rows from two or more tables based on a related column. Show Answer Correct Answer: D) A JOIN operation in SQL is used to combine rows from two or more tables based on a related column. 25. What are the advantages of using a DBMS? A) Higher maintenance costs. B) Limited user access. C) Advantages of using a DBMS include data integrity, security, efficient management, reduced redundancy, and improved access. D) Increased data duplication. Show Answer Correct Answer: C) Advantages of using a DBMS include data integrity, security, efficient management, reduced redundancy, and improved access. 26. What is a feature of files regarding data storage? A) Multiple CSVs stored in different folders. B) All data in one table. C) Automatic backups. D) Role-based access. Show Answer Correct Answer: A) Multiple CSVs stored in different folders. 27. Which of the following defines the term 'field' in relation to databases? A) A field is all of the information about one person or one thing. B) A field is the collection of all the database records on one topic or subject. C) A field is one type or piece of information. D) None of the above. Show Answer Correct Answer: C) A field is one type or piece of information. 28. Every row in a table has the same structure.(T/F) A) A. True. B) B. False. C) All the above. D) None of the above. Show Answer Correct Answer: A) A. True. 29. Which one of the following provides the ability to query information from the database and to insert tuples into, delete tuples from, and modify tuples in the database? A) DCL. B) SCHEMA. C) DDL. D) DML. Show Answer Correct Answer: D) DML. 30. Which SQL command is part of DDL? A) SELECT. B) GRANT. C) UPDATE. D) CREATE TABLE. Show Answer Correct Answer: D) CREATE TABLE. 31. Which of the following products do not provide an enterprise database? A) Oracle RDBMS. B) MS Access. C) MS SQL Server. D) IBM DB2. Show Answer Correct Answer: B) MS Access. 32. Name the first normal form (1NF) requirement. A) There must be a primary key for each table. B) Attributes can contain multiple values. C) All attributes must be unique. D) All attributes must contain atomic values. Show Answer Correct Answer: D) All attributes must contain atomic values. 33. What does the term 'cardinality' refer to? A) Number of tables. B) Number of entities. C) Number of attributes. D) Number of relationships. Show Answer Correct Answer: B) Number of entities. 34. Define normalization in the context of databases. A) Normalization is the method of encrypting data for security purposes. B) Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. C) Normalization refers to the process of backing up data in a database. D) Normalization is the technique of merging multiple databases into one. Show Answer Correct Answer: B) Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. 35. Which of the following commands is used to modify the structure of an existing table? A) CHANGE TABLE. B) MODIFY TABLE. C) UPDATE TABLE. D) ALTER TABLE. Show Answer Correct Answer: D) ALTER TABLE. 36. Process Failure:Failure that causes loss of memory but not ..... data. A) Register. B) Disk. C) Network. D) Cache. Show Answer Correct Answer: B) Disk. 37. What is the purpose of backing up a database? A) To create new user accounts. B) To improve data access speed. C) To delete unnecessary data. D) To ensure data can be restored in case of loss. Show Answer Correct Answer: D) To ensure data can be restored in case of loss. 38. What does the SELECT statement do in SQL? A) Deletes data from a database. B) Updates data in a database. C) Retrieves data from a database. D) Creates a new database. Show Answer Correct Answer: C) Retrieves data from a database. 39. What is the main method to update data in files? A) Database transactions. B) Copy-paste. C) Automated scripts. D) Direct editing. Show Answer Correct Answer: B) Copy-paste. 40. What is the primary data model used for data storage and processing? A) Object-Oriented Model. B) Network Model. C) Relational Model. D) Hierarchical Model. Show Answer Correct Answer: C) Relational Model. 41. What is a limitation of file-based systems? A) Data inconsistency and confusion. B) Data is stored in a centralized manner. C) Data is easily shared. D) Data is always secure. Show Answer Correct Answer: A) Data inconsistency and confusion. 42. How does a DBMS ensure data security? A) By implementing access controls and backup procedures. B) By allowing all users to modify data. C) By storing data in unstructured formats. D) By preventing queries from being executed. Show Answer Correct Answer: A) By implementing access controls and backup procedures. 43. What is a major issue caused by storing an employee's name and address in multiple places in traditional file systems? A) Increased security. B) Data redundancy and integrity problems. C) Faster data access. D) Easier data updates. Show Answer Correct Answer: B) Data redundancy and integrity problems. 44. What is the significance of databases in big data and analytics? A) Databases handle large volumes of data with speed and efficiency. B) Databases are not useful for analytics. C) Databases only store data in text files. D) Databases do not support real-time operations. Show Answer Correct Answer: A) Databases handle large volumes of data with speed and efficiency. 45. How are null values represented in a relational database? A) As the number 0. B) As an empty string. C) As a special marker or indicator. D) Null values are not allowed in relational databases. Show Answer Correct Answer: C) As a special marker or indicator. 46. What do tables in RDBMS consist of? A) Rows and columns. B) Only columns. C) Only rows. D) Only keys. Show Answer Correct Answer: A) Rows and columns. 47. The four main objects of a database consist of: A) Form, record, field, report. B) Form, data type, record, query. C) Form, table, query, report. D) Filter, table, database, query. Show Answer Correct Answer: C) Form, table, query, report. 48. What does tuple relational calculus describe? A) Database design. B) Procedural queries. C) Nonprocedural queries. D) Data types. Show Answer Correct Answer: C) Nonprocedural queries. 49. In SQL, what is a subquery? A) A query that creates a new table. B) A query that modifies the database structure. C) A query that is nested inside another query. D) A query that deletes records. Show Answer Correct Answer: C) A query that is nested inside another query. 50. What are the primary applications of database systems? A) Data encryption and security management. B) The primary applications of database systems include transaction processing, data analysis, data warehousing, and managing large datasets. C) Web hosting and server management. D) Graphic design and multimedia production. Show Answer Correct Answer: B) The primary applications of database systems include transaction processing, data analysis, data warehousing, and managing large datasets. 51. A set of possible data values is called A) Degree. B) Domain. C) Tuple. D) Attributes. Show Answer Correct Answer: B) Domain. 52. Provide an example of a DDL statement. A) DELETE FROM users WHERE id = 1;. B) CREATE TABLE users (id INT PRIMARY KEY, name VARCHAR(100), email VARCHAR(100));. C) SELECT * FROM users;. D) UPDATE users SET name = 'John' WHERE id = 1;. Show Answer Correct Answer: B) CREATE TABLE users (id INT PRIMARY KEY, name VARCHAR(100), email VARCHAR(100));. 53. Which of the following is the block that is not permitted to be written back to the disk? A) Zapped. B) Dead code. C) Read only. D) Pinned. Show Answer Correct Answer: D) Pinned. 54. Which one of the following matches the functions of a contemporary operating system? A) It does not ensure security and access control. B) It manages human resources. C) It enables single tasking. D) It enables multitasking. Show Answer Correct Answer: D) It enables multitasking. 55. Which of the following is a key component of a DBMS that is responsible for managing data storage and access? A) Transaction Manager. B) Query Processor. C) Data Dictionary. D) Storage Manager. Show Answer Correct Answer: D) Storage Manager. 56. What does the term 'weak entity set' refer to? A) An entity with many attributes. B) An entity with simple attributes. C) An entity with no attributes. D) An entity that cannot exist alone. Show Answer Correct Answer: D) An entity that cannot exist alone. 57. What does the GROUP BY clause do? A) Groups data. B) Deletes data. C) Filters data. D) Sorts data. Show Answer Correct Answer: A) Groups data. 58. What is an instance in relation to a database schema? A) An instance is a specific set of data that conforms to a database schema. B) An instance is a collection of database schemas. C) An instance is a type of database schema. D) An instance is a blueprint for a database schema. Show Answer Correct Answer: A) An instance is a specific set of data that conforms to a database schema. 59. Grant and revoke are ..... statements. A) DDL. B) DCL. C) DML. D) TCL. Show Answer Correct Answer: B) DCL. 60. How does a DBMS address the issue of data inconsistency? A) By storing data in a single file. B) By compressing the data. C) By storing data in separate linked tables. D) By validating the data entry. Show Answer Correct Answer: D) By validating the data entry. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 3 Database Management Systems Quiz 1Class 12 Computer Science Chapter 3 Database Management Systems Quiz 2Class 12 Computer Science Chapter 3 Database Management Systems Quiz 3Class 12 Computer Science Chapter 3 Database Management Systems Quiz 4Class 12 Computer Science Chapter 3 Database Management Systems Quiz 5Class 12 Computer Science Chapter 3 Database Management Systems Quiz 6Class 12 Computer Science Chapter 3 Database Management Systems Quiz 7Class 12 Computer Science Chapter 3 Database Management Systems Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books