dbms banner

DBMS Multiple Choice Questions (MCQs) and Answers

Master Database Management Systems (DBMS) with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of DBMS. Begin your placement preparation journey now!

Q121

Q121 In the context of data warehousing, what is "dimensional modeling"?

A

The process of converting unstructured text into a structured format

B

A technique for the physical design of databases

C

The creation of a conceptual model for analyzing data, typically involving facts and dimensions

D

The use of 3D models to represent data visually

Q122

Q122 Which data mining technique is used to uncover hidden patterns and relationships in data, but does not predict outcomes?

A

Classification

B

Regression

C

Clustering

D

Decision trees

Q123

Q123 How can you create an OLAP cube in SQL Server Analysis Services (SSAS)?

A

Using the CREATE CUBE statement in SQL

B

Through the SQL Server Management Studio (SSMS) interface

C

By executing a special OLAP cube creation script

D

Defining it in an XMLA script file

Q124

Q124 Which command is used to initiate the mining process on a dataset named "customer_data" using the Apriori algorithm in a data mining software tool?

A

MINING START customer_data USING Apriori

B

APRIORI MINING ON customer_data

C

USE Apriori ON customer_data

D

START MINING customer_data WITH Apriori

Q125

Q125 In a data warehousing environment, how is a materialized view refreshed to ensure it contains the latest data?

A

Refreshing it manually by executing a specific SQL command

B

Automatically, based on a schedule defined within the database management system

C

By triggering a script when the underlying data changes

D

All of the above

Q126

Q126 A materialized view in a data warehouse is not updating correctly.
What could be a reason?

A

The source data has not changed

B

The view is not scheduled for regular refreshes

C

The database lacks sufficient storage space

D

The view's definition does not include all necessary joins

Q127

Q127 During data mining, the model's accuracy drastically decreases when applied to new datasets.
What is a likely cause?

A

Overfitting to the training data

B

Underfitting to the training data

C

Insufficient data preprocessing

D

The data mining algorithm is not suitable for the task

Q128

Q128 How can "dimensional skew" in a data warehouse be identified and corrected?

A

By normalizing all tables to 3NF

B

By redistributing data to ensure uniform access patterns

C

By converting all OLAP cubes to ROLAP models

D

By implementing data compression techniques

Q129

Q129 What is the primary purpose of database encryption?

A

To increase database performance

B

To reduce data storage requirements

C

To protect sensitive data from unauthorized access

D

To improve data integrity

Q130

Q130 What does the principle of least privilege in database security entail?

A

Granting users minimal permissions necessary

B

Granting all users admin privileges

C

Storing all data centrally

D

Encrypting all data

Q131

Q131 Which database security feature limits data exposure by hiding certain data elements from unauthorized users?

A

Data masking

B

Data encryption

C

Data replication

D

Data indexing

Q132

Q132 What is SQL injection?

A

A method for encrypting SQL queries

B

A technique for improving SQL query performance

C

An attack by inserting malicious SQL into a query

D

A query optimization tool

Q133

Q133 What mechanism manages and validates user access in a database?

A

Data encryption algorithms

B

Data indexing strategies

C

Authentication and authorization

D

Data normalization techniques

Q134

Q134 How does role-based access control (RBAC) enhance database security?

A

By encrypting all data

B

By allowing unrestricted access

C

By assigning permissions to roles, not individuals

D

By using complex passwords

Q135

Q135 How can you grant a user read-only access to a specific table in SQL?

A

GRANT SELECT ON table_name TO user_name

B

ALTER TABLE table_name ALLOW READ FOR user_name

C

ENABLE READ ON table_name TO user_name

D

SET READ PERMISSION ON table_name FOR user_name

Q136

Q136 How do you create a new user with specific privileges in MySQL?

A

CREATE USER 'user_name' IDENTIFIED BY 'password'; GRANT privileges ON database_name.* TO 'user_name'

B

CREATE USER 'user_name' WITH privileges

C

USE 'user_name' WITH privileges

D

INITIATE USER 'user_name' WITH privileges

Q137

Q137 How do you revoke all privileges from a user in SQL?

A

REVOKE ALL PRIVILEGES FROM user_name

B

REVOKE ACCESS FROM user_name

C

REMOVE ALL PRIVILEGES user_name

D

DENY ALL FROM user_name

Q138

Q138 A user reports losing access to a table.
What could be the cause?

A

Permissions were revoked

B

The table was deleted

C

Database restored to a previous state

D

Permissions error

Q139

Q139 How can "privilege escalation" vulnerabilities be addressed?

A

Regular database software updates

B

Strict password policies

C

Regular security audits

D

Security patch implementation

Q140

Q140 How can SQL injection vulnerabilities be prevented?

A

Validating user inputs

B

Sanitizing user inputs

C

Using prepared statements

D

Sanitizing and using prepared statements

Q141

Q141 Which technology is commonly associated with real-time analytics and data processing?

A

Hadoop Distributed File System (HDFS)

B

Online Analytical Processing (OLAP)

C

Stream Processing

D

Data Warehousing

Q142

Q142 In the context of database technologies, what is a "Data Lake"?

A

A type of SQL database optimized for large-scale transactions

B

A storage repository that holds a vast amount of raw data

C

A new algorithm for data encryption

D

An advanced form of data masking technique

Q143

Q143 What differentiates Graph databases from traditional relational databases?

A

Graph databases use SQL for querying, while relational databases do not

B

Graph databases are primarily used for data warehousing

C

Graph databases are optimized for storing and querying data relationships

D

Relational databases cannot store complex, interconnected data

Q144

Q144 How do distributed ledger technologies (such as blockchain) enhance data security in database applications?

A

By centralizing data storage

B

By making data immutable and enabling transparent access

C

By encrypting all stored data

D

By limiting data access to administrators

Q145

Q145 What is the significance of "Edge Computing" in the context of database technologies?

A

Reducing cloud computing costs

B

Increasing the physical security of data centers

C

Minimizing latency by processing data closer to the source of data generation

D

Maximizing the efficiency of centralized databases

Q146

Q146 What SQL extension is used to query JSON data within a PostgreSQL database?

A

JSON_QUERY

B

SELECT JSON

C

JSONB_PATH_QUERY

D

GET_JSON_ITEM

Q147

Q147 How can you enable automatic scaling in a cloud-based NoSQL database service?

A

SET AUTOSCALE ON

B

MODIFY DATABASE SET SCALING=AUTOMATIC

C

UPDATE SCALING POLICY AUTO

D

Configure auto-scaling settings through the database's management console

Q148

Q148 A NoSQL database's response times degrade as data volume grows.
What strategy can improve performance?

A

Normalizing the database schema

B

Implementing sharding or partitioning strategies

C

Converting the NoSQL database to a SQL database

D

Decreasing the write consistency level

Q149

Q149 How can "query sprawl" in big data applications be managed effectively?

A

By limiting the number of users accessing the database

B

By using stricter schema definitions

C

By optimizing query execution and caching frequently accessed data

D

By reducing the size of the dataset

Q150

Q150 What is a common challenge when integrating IoT devices with real-time databases, and how can it be addressed?

A

Data volume exceeds storage capacity; addressed by increasing storage space

B

Data arrives faster than it can be processed; addressed by implementing stream processing solutions

C

IoT devices use incompatible data formats; addressed by standardizing data formats

D

All devices require constant internet connection; addressed by creating offline data processing capabilities

ad verticalad vertical
ad