Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

151.

What are scripting languages?(a) The programming languages that pre decide the web page content(b) The programming languages that are simpler and offer same protection(c) The programming languages that trade off simplicity for protection.(d) None of the mentioned

Answer» Correct choice is (b) The programming languages that are simpler and offer same protection

Best explanation: Scripting languages are those languages that are simpler with enriched user interface features but offer the same protection as that of Java.
152.

The operation of moving from coarser granular data to finer granular data is called _______(a) Reduction(b) Increment(c) Roll back(d) Drill down

Answer» Correct answer is (d) Drill down

To explain: OLAP systems permit users to view the data at any level of granularity. The process of moving from finer granular data to coarser granular data is called as drill-down.
153.

How many dimensions of multi-dimensional data do cross tabs enable analysts to view?(a) 1(b) 2(c) 3(d) None of the mentioned

Answer» The correct option is (b) 2

The best explanation: Cross-tabs enable analysts to view two dimensions of multi-dimensional data, along with the summaries of the data.
154.

What is the full form of OLAP?(a) Online Application Programming(b) Online Application Processing(c) Online Analytical programming(d) Online Analytical Processing

Answer» Right choice is (d) Online Analytical Processing

To explain: The full form of OLAP is Online Analytical Processing. It is an interactive system that gives various features to analysts.
155.

An instance of a relation that satisfies all real world constraints is known as?(a) Proper relation(b) Ideal relation(c) Perfect relation(d) Legal relation

Answer» Correct choice is (d) Legal relation

Explanation: A relation that satisfies all the real world constraints is called as a legal relation. An instance of a legal relation is called as a legal instance.
156.

Multi valued dependencies are also called as __________(a) Equality generating dependencies(b) Tuple generating dependencies(c) Multi-purpose dependencies(d) None of the mentioned

Answer» Correct choice is (b) Tuple generating dependencies

For explanation I would say: Multi valued dependencies are also called as tuple generating dependencies because they require other tuples of a certain form to be present in the relation.
157.

Which off the following is not a valid type of join?(a) left outer join(b) outer join(c) join(d) full join

Answer» Right answer is (d) full join

Best explanation: There is no such join called as full join. There is a full outer join but a full join does not exist.
158.

Which of the following can be implemented?(a) Conjunctive selection using one index(b) Conjunctive selection using composite index(c) Conjunctive selection by intersection of identifiers(d) All of the mentioned

Answer» Right option is (d) All of the mentioned

For explanation: Conjunctive selection using one index, conjunctive selection using composite index and conjunctive selection by intersection of identifiers can be implemented. These are A7, A8, A9 algorithms that use an index.
159.

What are client side scripting languages?(a) The languages designed to be executed on the client’s web browser(b) The languages designed to be executed on the server(c) The languages designed to reduce the amount of data costs incurred at the client end(d) The languages designed to be executed in multiple computers paralleled with each other

Answer» Correct choice is (a) The languages designed to be executed on the client’s web browser

For explanation: Client side scripting languages are those languages that are designed to be executed on the client’s web browser. These languages provide constructs that can be embedded with an HTML document.
160.

What are workflows in a business logic layer?(a) They describe how a particular task that involves servers is handled(b) They describe how multiple tasks involving a single participant is handled(c) They describe how a particular task involving multiple participants is handled.(d) None of the mentioned

Answer» Right choice is (c) They describe how a particular task involving multiple participants is handled.

Easiest explanation: Business logic includes workflows. Workflows in a business logic layer describe how a particular task involving multiple participants is handled.
161.

What is the function of a full outer join?(a) It preserves tuples only in the relation named before the operation(b) It preserves tuples only in the relation named after the operation(c) It preserved tuples in the relations named on both the sides of the operation(d) It does not preserve any tuples on either side of the relation

Answer» Right choice is (c) It preserved tuples in the relations named on both the sides of the operation

For explanation I would say: The full outer join operation preserves the tuples named on both the sides of the operation. Unlike the inner join, outer joins preserve tuples from either or both sides of the operation.
162.

What is the function of a left outer join?(a) It preserves tuples only in the relation named before the operation(b) It preserves tuples only in the relation named after the operation(c) It preserved tuples in the relations named on both the sides of the operation(d) It does not preserve any tuples on either side of the relation

Answer» Correct answer is (a) It preserves tuples only in the relation named before the operation

To explain I would say: The left outer join operation preserves the tuples named before the operation.
163.

What is the full form of CGI?(a) Common graphics interface(b) Common gateway interface(c) Common gateway internet(d) Common gateway information

Answer» Correct option is (b) Common gateway interface

Explanation: The full form of CGI is Common Gateway Interface. This defines how a web server communicates with an application program.
164.

What is the function of the cascading style sheet(a) Allows us to edit the HTML document(b) It is an IDE that allows us to write HTML codes more efficiently(c) It allows us to use the same style on multiple HTML documents(d) It acts as an intermediary to provide a variety of information services

Answer» The correct choice is (c) It allows us to use the same style on multiple HTML documents

The explanation is: The cascading style sheet allows us to use the same style sheet on multiple HTML documents allowing us to maintain a distinctive but uniform look on all the pages of a Web site.
165.

What is the use of CGI?(a) It specifies the path of data transfer(b) It specifies how the server communicates with the application programs(c) It charts out error handling procedures in case an error arises(d) None of the mentioned

Answer» Correct choice is (b) It specifies how the server communicates with the application programs

The best explanation: CGI specifies how the server communicates with application programs. The application program communicates with a database server in order to get data.
166.

A ______ is a program running on the server which accepts requests from a browser and sends HTML documents(a) Web server(b) Web transmitter(c) Web intermediate(d) Web multitasker

Answer» Right choice is (a) Web server

The explanation: A Web Server is a program running on the server which accepts requests from a browser and sends HTML documents. The browser and the web server communicate via HTTP.
167.

Which of the following set operations does the selection operation distribute over?(a) Union(b) Intersection(c) Difference(d) All of the mentioned

Answer» Correct answer is (d) All of the mentioned

The best explanation: The selection operation distributes over Set union, intersection, set difference.
168.

For schemas derived from strong entity sets, the _______ of the entity set serves as the primary key of the resulting schema(a) First attribute(b) Primary key(c) Foreign key(d) None of the mentioned

Answer» Correct choice is (b) Primary key

To elaborate: For schemas derived from strong entity sets, the primary key of the entity set serves as the primary key of the resulting schema. This is because the primary keys are to be preserved as they are unique.
169.

Statement 1: We can create foreign key constraints on relational schema derived from ER diagramStatement 2: Relational schema cannot be derived from an ER diagram(a) Both the statements are true(b) Both the statements are false(c) Statement 1 is true and Statement 2 is false

Answer» The correct choice is (c) Statement 1 is true and Statement 2 is false

The best explanation: We can create foreign key constraints on relational schema derived from ER diagram and also it is possible to derive relational schema from ER diagrams.
170.

The process of making a normalized schema unnormalized is called as _________(a) Unnormalization(b) Denormalization(c) Renormalization(d) Annormalization

Answer» The correct choice is (b) Denormalization

Easiest explanation: The process of making a normalized schema unnormalized is called as denormalization. Designers use it to tune performance of systems to support time-critical operations.
171.

What is the method of specifying a primary key in a schema description?(a) By writing it in bold letters(b) By underlining it using a dashed line(c) By writing it in capital letters(d) By underlining it using a bold line

Answer» The correct option is (d) By underlining it using a bold line

The best explanation: We can specify a primary key in schema description by underlining the respective attribute with a bold line.
172.

Which of the following is not a process of generating a good relational schema?(a) Converting ER diagrams to relational schema(b) Decomposing the relational schema while satisfying functional dependencies(c) Joining multiple relations together to form a single relation containing all the attributes(d) A design of relations which is then tested and modified to satisfy given normal forms

Answer» Correct option is (c) Joining multiple relations together to form a single relation containing all the attributes

Explanation: Joining multiple relations together to form a single relation containing all the attributes is not a method for the development of good relational schema because it might violate the normal forms if it is combined.
173.

What values does the count(*) function ignore?(a) Repetitive values(b) Null values(c) Characters(d) Integers

Answer» Right choice is (b) Null values

The best I can explain: The count(*) aggregation function ignores null values while calculating the number of values in a particular attribute.
174.

State true or false: If a relational schema is in _______ NF and A is a subset of R and B is also a subset of R then it is that A is a superkey is a trivial multi values dependency.(a) 1(b) 2(c) 3(d) 4

Answer» Correct choice is (d) 4

The best I can explain: If a relational schema is in 4NF and A is a subset of R and B is also a subset of R then it is that A is a superkey is a trivial multi values dependency.
175.

Which of the following is a good database management practice?(a) Adding redundant attributes(b) Removing redundant attributes(c) Not specifying primary keys(d) None of the mentioned

Answer» The correct answer is (b) Removing redundant attributes

The explanation: Removing redundant attributes from a relation makes data extraction more efficient and faster. Thus, it is a good database management technique.
176.

Higher level entity sets are designated by the term _________(a) Sub class(b) Super class(c) Parent class(d) Root class

Answer» Right option is (b) Super class

Easiest explanation: Higher level entity sets can also be designated by the term super class. In the similar manner lower level entity sets can also be designated by the term sub class.
177.

What is the function of the not null constraint?(a) It prevents illegal data from being entered into the database(b) It ensures that data is entered into the database(c) It ensures that the data entered is unique(d) None of the mentioned

Answer» The correct answer is (b) It ensures that data is entered into the database

To explain: The not null constraint ensures that data is entered into the database. It displays an error message whenever a data field mentioned is left empty.
178.

Which of the following is not a generalization constraint?(a) Condition-defined(b) User defined(c) Disjoint(d) Machine defined

Answer» Correct answer is (d) Machine defined

The explanation is: Machine definition is not a generalization constraint. Condition defined, user defined, disjoint and overlapping are 4 generalization constraints.
179.

What is the function of the unique constraint?(a) It ensures that no two values under an attribute are identical(b) It ensures that all the attributes are perfectly unique in their data type(c) It ensures that all the relations in the database have a unique set of attributes(d) It does not have any function in SQL

Answer» The correct option is (a) It ensures that no two values under an attribute are identical

Explanation: The purpose of the unique clause is to ensure that no two values under the same attribute are identical. Primary keys are unique by default.
180.

Condition defined generalization constraint is also said to be ________(a) Attribute defined(b) Constraint defined(c) Value defined(d) Undefined

Answer» The correct option is (a) Attribute defined

Best explanation: Condition defined generalization constraint is also said to be attribute defined.
181.

Which of the following is not an integrity constraint?(a) not null(b) unique(c) identical(d) check

Answer» Correct choice is (c) identical

The best I can explain: Identical is not an allowed integrity constraint in SQL. Not null prevents null values and unique only allows unique values to be entered. Check checks for a given condition.
182.

What does the notnull integrity constraint do?(a) It ensures that at least one tuple is present in the relation(b) It ensures that at least one foreign key is present in the relation(c) It ensures that all tuples have a finite value on a specified attribute(d) It ensures that all tuples have finite attributes on all the relations

Answer» Right answer is (c) It ensures that all tuples have a finite value on a specified attribute

Explanation: The notnull integrity constraint ensures that all the tuples have a finite value on the specified attribute in the relation. It avoids the specification of null values.
183.

Which of the following syntax of the basic query is correct?(a) select from (b) select from (c) select from (d) select from

Answer» Correct choice is (b) select from

Explanation: The select clause is used to select a specific attribute from a given relation. So, the syntactically correct statement is select from .
184.

Which of the following is the time of temporal data that record when a fact was recorded in a database?(a) Transaction time(b) Valid time(c) Enter time(d) Exit time

Answer» Right answer is (a) Transaction time

For explanation: The transaction time is the time of temporal data that records when a fact was recorded in a database.
185.

If all the domains are atomic then the relational schema is in ________ normal form(a) 1(b) 2(c) 3(d) 4

Answer» Correct answer is (a) 1

To explain I would say: If all the domains are atomic then the relational schema is in first (1) normal form. That is, the domains must be indivisible.
186.

An entity set that has a primary key is called as ___________(a) Strong entity set(b) Weak entity set(c) Complete entity set(d) None of the mentioned

Answer» The correct option is (a) Strong entity set

Easy explanation: An entity set that has a primary key is called as a strong entity set. An entity set that does not have a primary key is called a weak entity set.
187.

Which of the following is not a property of a transaction?(a) Atomicity(b) Simplicity(c) Isolation(d) Durability

Answer» The correct answer is (b) Simplicity

For explanation: Simplicity is not a property of a transaction. Atomicity, Isolation, Durability are all parts of ACID properties.
188.

What does a directed line ( →  )  from a relationship set to two entity sets mean?(a) One-one(b) Many-one(c) Many-many(d) One-many

Answer» The correct choice is (a) One-one

Explanation: A directed line ( →  )  from a relationship set to two entity sets means that there is a one-one cardinality between two entity sets.
189.

Which of the following systems is responsible for ensuring isolation?(a) Recovery system(b) Atomic system(c) Concurrency control system(d) Compiler system

Answer» Right choice is (c) Concurrency control system

The best explanation: The concurrency control system is responsible for ensuring isolation in a database system.
190.

What is the full form of JSON?(a) JavaScript Object Native(b) JavaScript Object Notation(c) JavaScript Object Negation(d) Java Object Notation

Answer» Correct option is (b) JavaScript Object Notation

The explanation: JSON – JavaScript Object Notation. This is an encoding for javascript objects.
191.

RAID level 5 refers to?(a) Disk arrays with striping at the level of blocks(b) Disk mirroring with block striping(c) Memory style error correcting code(d) Block interleaved distributed parity

Answer» Right choice is (d) Block interleaved distributed parity

The best I can explain: RAID level 5 refers to Block interleaved distributed parity. It partitions both the data and parity among N+1 disks.
192.

RAID level 2 refers to?(a) Disk arrays with striping at the level of blocks(b) Disk mirroring with block striping(c) Memory style error correcting code(d) Block interleaved distributed parity

Answer» The correct choice is (c) Memory style error correcting code

The explanation: RAID level 2 refers to Memory style error correcting code. Memory systems have long parity bits for error detection and correction.
193.

RAID level 1 refers to?(a) Disk arrays with striping at the level of blocks(b) Disk mirroring with block striping(c) Memory style error correcting code(d) Block interleaved distributed parity

Answer» Right choice is (b) Disk mirroring with block striping

Easiest explanation: RAID level 1 refers to Disk mirroring with block striping. This is also called as RAID 10 or RAID 1+0.
194.

Which of the factors need not be taken into consideration while choosing a RAID level?(a) Monetary cost(b) I/O requirements(c) Performance when the disk has failed(d) None of the mentioned

Answer» Right option is (d) None of the mentioned

For explanation: Monetary cost, I/O requirements, performance when disk has failed are to be taken into consideration while choosing a RAID level.
195.

How many levels of RAID exist?(a) 5(b) 6(c) 7(d) 8

Answer» The correct option is (c) 7

Explanation: There exist a total of 7 RAID levels ranging from 0 to 6.
196.

The types of access that are supported efficiently are called as ________(a) Access modes(b) Access types(c) Access time(d) Access overhead

Answer» Right choice is (b) Access types

Easy explanation: The types of access that are supported efficiently are called as Access types. Access types can include finding records with a specified attribute value or within a particular range.
197.

The subsystem responsible for the allocation of buffer space is called as _______(a) Buffer allocator(b) Buffer manager(c) Buffer enhancer(d) Buffer intermediary

Answer» The correct option is (b) Buffer manager

Best explanation: The subsystem responsible for the allocation of buffer space is called as buffer manager. Programs on the database make requests to the buffer manager and it in in turn allocates the buffer space.
198.

What are phishing attacks?(a) Users are forced to use a second server which causes the attack(b) Users are forced to divert to a fake site where the attack takes place(c) Users are fooled by similar GUI and data is extracted from them.(d) None of the mentioned

Answer» Correct option is (c) Users are fooled by similar GUI and data is extracted from them.

For explanation: Phishing attacks are those attacks in which users are fooled by similar GUI and data is extracted from them. The fake site is then used to obtain the data from the user.
199.

A log of all changes to the application data is called as __________(a) Audit trail(b) Audit log(c) Audit lead(d) Data log

Answer» Correct choice is (a) Audit trail

The explanation: A log of all changes to the application data is called as audit trail. This helps us maintain security as it tracks all the breaches on the system.
200.

Statement 1: Cache storage is very fastStatement 2: Cache storage is very cheap(a) Both the statements are true(b) Statement 1 is true but statement 2 is false(c) Statement 1 is false but statement 2 is true

Answer» The correct answer is (b) Statement 1 is true but statement 2 is false

Best explanation: Cache storage is very fast but it is the costliest form of storage.