Top 150+ Solved Advanced Database Management Systems (ADBMS) MCQ Questions Answer

From 46 to 60 of 112

Q. Fraud detection is an application of

a. Data warehousing

b. Data mining

c. Both I and ii

d. None of the above

  • d. None of the above

Q. …………….is a best source of data for a data mining operation

a. OLAP

b. Data warehouse

c. OLTP

d. None of the above

  • b. Data warehouse

Q. …………….uncovers relationships and patterns in the existing data

a. Data mining

b. Data warehouse

c. OLAP

d. None of the above

  • d. None of the above

Q. Data mining is

a. Data driven

b. User driven

c. Both I and ii

d. None of the above

  • b. User driven

Q. OLAP is

a. Data driven

b. User driven

c. Both I and ii

d. None of the above

  • b. User driven

Q. Which of the following is an advantage of a database?

a. Reduction in Redundancy

b. Avoidance of inconsistency

c. Security enforcement

d. All of the above

  • d. All of the above

Q. Which of the following is an example of a database application?

a. Computerized library systems

b. ATMs

c. Flight reservation systems

d. All of the above

  • d. All of the above

Q. DBMS stands for________________?

a. Data blocking and Management Systems

b. Database Management Systems

c. Database Business Management Systems

d. None of the above

  • b. Database Management Systems

Q. What is the name of the system database that contains descriptions of the data in thedatabase?

a. Metadata

b. Data dictionary

c. Table

d. None of the above

  • b. Data dictionary

Q. IMS stands for ___________

a. Information Management System

b. Internal Mechanical Security

c. International Managers Society

d. None of the above

  • a. Information Management System

Q. Which of the following is the oldest database model?

a. Hierarchical

b. Network

c. Relational

d. Object Oriented

  • a. Hierarchical

Q. Which category of users need not be aware of the presence of the database system?

a. DBA

b. Naive

c. Casual

d. Application Programmers

  • b. Naive

Q. The different classes of relations created by the technique for preventing modificationanomalies are called:

a. normal forms.

b. referential integrity constraints.

c. functional dependencies.

d. None of the above is correct.

  • a. normal forms.

Q. A relation is in this form if it is in BCNF and has no multivalued dependencies:

a. second normal form.

b. third normal form.

c. fourth normal form.

d. domain/key normal form.

  • c. fourth normal form.
Subscribe Now

Get All Updates & News