MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Which of the following represents exactly two occurrence of digits? |
| A. | dd |
| B. | d{2} |
| C. | [d][d] |
| D. | All of the above |
| Answer» E. | |
| 152. |
Which of the following is used to create a choice? |
| A. | <xsd:multi>element |
| B. | <xsd:choice>element |
| C. | <xsd:select>element |
| D. | <xsd:single>element |
| Answer» C. <xsd:select>element | |
| 153. |
Which of the following is not a valid argument of the insert adjacent text() method? |
| A. | Before Begin |
| B. | After Begin |
| C. | Before End |
| D. | At End |
| Answer» E. | |
| 154. |
What is the value of the ready state property of the element when the script is completely loaded? |
| A. | loaded |
| B. | finished |
| C. | done |
| D. | complete |
| Answer» E. | |
| 155. |
Code in XML is |
| A. | Any part of the document whether it is elements, attribute or otherwise |
| B. | Referred only to the attributes |
| C. | Referred to top element in the document |
| D. | None of these |
| Answer» B. Referred only to the attributes | |
| 156. |
Which of the following declarations must every xml document that uses a DTD have? |
| A. | A <!DTD> declaration |
| B. | A <STANADALONE> declaration |
| C. | A <DOCTYPE> declaration |
| D. | A <! DOCTYPE> declaration |
| Answer» E. | |
| 157. |
Which of the following HTML tags is used to refer to an external style sheet? |
| A. | <link url = “stylesheet” type = “text/CSS”> |
| B. | <style src = “mystyle.CSS”> |
| C. | <link rel = “stylesheet” type = “text⁄CSS” href = “mystyle.CSS”> |
| D. | <Style sheet>mystyle.CSS<⁄style sheet> |
| Answer» D. <Style sheet>mystyle.CSS<⁄style sheet> | |
| 158. |
Which of the following is true regarding password field? |
| A. | it is similar to text area except that text is shown as“ . ”(dot) |
| B. | it is similar to text field except that text is shown as “.” (dot) |
| C. | it is similar to hidden field except that text is shown as “.” (dot) |
| D. | it is similar to selection list |
| Answer» C. it is similar to hidden field except that text is shown as “.” (dot) | |
| 159. |
Which of the following refers to the root element of an XML document? |
| A. | Document |
| B. | document Element |
| C. | Root |
| D. | root Element |
| Answer» E. | |
| 160. |
Which of the following recommended XML? |
| A. | W3C |
| B. | Microsoft |
| C. | Sun |
| D. | IEEE |
| Answer» B. Microsoft | |
| 161. |
Which of the following objects is the root object in HTML DOM object hierarchy? |
| A. | Document |
| B. | navigator |
| C. | body |
| D. | window |
| Answer» E. | |
| 162. |
Which of the following XML document are well formed? |
| A. | <one><two><⁄two><⁄one> |
| B. | <one><⁄once><two><⁄two> |
| C. | <one><two><⁄once><⁄two> |
| D. | <⁄one><⁄two><two><one> |
| Answer» B. <one><⁄once><two><⁄two> | |
| 163. |
Which of the following would java script assign to an un initialized array element? |
| A. | |
| B. | |
| C. | undefined |
| D. | false |
| Answer» D. false | |
| 164. |
Which of the following are not supported by X path? |
| A. | Character values functions |
| B. | Sequence manipulations functions |
| C. | String values functions |
| D. | Node manipulation functions |
| Answer» B. Sequence manipulations functions | |
| 165. |
Which of the following is not a method of the window object? |
| A. | Alert() |
| B. | move() |
| C. | confirm() |
| D. | close() |
| Answer» C. confirm() | |
| 166. |
Which of the following is not a property of the history object? |
| A. | next |
| B. | previous |
| C. | up |
| D. | current |
| Answer» D. current | |
| 167. |
HTML can be displayed |
| A. | By users |
| B. | by computers |
| C. | automatically |
| D. | none of these |
| Answer» B. by computers | |
| 168. |
Which of the following is used to create table caption? |
| A. | <caption> |
| B. | <title> |
| C. | <table caption> |
| D. | <table title> |
| Answer» B. <title> | |
| 169. |
Which of the following events occurs when a form is submitted? |
| A. | go |
| B. | submitted |
| C. | finished |
| D. | submit |
| Answer» E. | |
| 170. |
Which data method would you use to set a 4 – digit year? |
| A. | setYear() |
| B. | setFullYear() |
| C. | fullYear() |
| D. | set_full _year() |
| Answer» C. fullYear() | |
| 171. |
Consider the following tables (relations).Primary keys in the tables are shown using underline. Now, consider the following query:SELECT S.Name, Sum (P.Marks)FROM Students S, Performance PWHERE S.Roll-No = P.Roll-NoGROUP BY S.NameThe number of rows returned by the above query is |
| A. | 0 |
| B. | 1 |
| C. | 2 |
| D. | 3 |
| Answer» D. 3 | |
| 172. |
Consider a relation book (title, price) which contains the titles and prices of different books. Assuming that no two books have the same price, what does the following SQL query list? |
| A. | Titles of the six most expensive books. |
| B. | Title of the sixth most expensive books. |
| C. | Titles of the seven most expensive books. |
| D. | Title of the seventh most expensive books. |
| Answer» D. Title of the seventh most expensive books. | |
| 173. |
For the following sample database table staff. The SQL query:SELECT COUNT(Staff no) AS mycount, SUM(Salary) AS mysum FROM Staff WHERE Designation=’Manager’Returns the result |
| A. | mycount=2, mysal=47000 |
| B. | mycount=2, mysal=98000 |
| C. | mycount=5, mysal=47000 |
| D. | mycount=5, mysal=98000 |
| Answer» C. mycount=5, mysal=47000 | |
| 174. |
Match the following :Codes : (a) (b) (c) (d) |
| A. | (iii) (iv) (ii) (i) |
| B. | (iv) (iii) (ii) (i) |
| C. | (ii) (iii) (iv) (i) |
| D. | (iii) (iv) (i) (ii) |
| Answer» D. (iii) (iv) (i) (ii) | |
| 175. |
An entity has:(i) a set of properties(ii) a set of properties and values for all the properties(iii) a set of properties and the values for some set of properties may non-uniquely identify an entity(iv) a set of properties and the values for some set of properties may uniquely identify an entityWhich of the above are valid? |
| A. | (i) only |
| B. | (ii) only |
| C. | (iii) only |
| D. | (iv) only |
| Answer» E. | |
| 176. |
The E-R model is expressed in terms of:(i) Entities(ii) The relationship among entities(iii) The attributes of the entities |
| A. | (i) and (iii) |
| B. | (i), (ii) and (iii) |
| C. | (ii) and (iii) |
| D. | None of the above |
| Answer» C. (ii) and (iii) | |
| 177. |
An Entity - relationship diagram is a tool to represent: |
| A. | Data model |
| B. | Process model |
| C. | Event model |
| D. | Customer model |
| Answer» B. Process model | |
| 178. |
(i) DML includes a query language based on both relation algebra and tuple calculus(ii) DML includes a query language based on tuple calculus(iii) DML includes a query language based on relational algebra(iv) DML includes a query language based on none of the relational algebra and tuple calculusWhich one is correct? |
| A. | (i) only |
| B. | (ii) only |
| C. | (iii) only |
| D. | (iv) only |
| Answer» B. (ii) only | |
| 179. |
Which of the following is not a type of Database Management System? |
| A. | Hierarchical |
| B. | Network |
| C. | Relational |
| D. | Sequential |
| Answer» E. | |
| 180. |
A schema describes: |
| A. | data elements |
| B. | records and files |
| C. | record relationship |
| D. | all of the above |
| Answer» E. | |
| 181. |
Database systems that store each relation in a separate operating system file may use the operating system’s authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is false? |
| A. | The administrator enjoys more control on the grant option. |
| B. | It is difficult to differentiate among the update, delete and insert authorizations. |
| C. | Cannot store more than one relation in a file. |
| D. | Operations on the database are speeded up as the authorization procedure is carried out at the operating system level. |
| Answer» B. It is difficult to differentiate among the update, delete and insert authorizations. | |
| 182. |
Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges? |
| A. | Authorization |
| B. | Authentication |
| C. | Access Control |
| D. | All of these |
| Answer» D. All of these | |
| 183. |
Thoma’s-write rule is ................. |
| A. | Two phase locking protocol |
| B. | Timestamp ordering protocol |
| C. | One phase locking protocol |
| D. | Sliding window protocol |
| Answer» C. One phase locking protocol | |
| 184. |
The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X->Y specified in F, |
| A. | appeared directly in one of the relation schemas Ri in the decomposed D. |
| B. | could be inferred from dependencies that appear in some Ri. |
| C. | both a and b |
| D. | None of these |
| Answer» D. None of these | |
| 185. |
Specialization is …………… process. |
| A. | top-down |
| B. | bottom up |
| C. | both a and b |
| D. | none of these |
| Answer» B. bottom up | |
| 186. |
Linear probing suffers from a problem known as |
| A. | Secondary clustering |
| B. | Primary clustering |
| C. | Both a and b |
| D. | None of these |
| Answer» C. Both a and b | |
| 187. |
Consider the relation schema R = (A,B,C,D,E,F) on which the following functional dependencies hold:A → BB, C → DE → CD → AWhat are the candidate keys of R? |
| A. | AE and BE |
| B. | AE, BE and DE |
| C. | AEF, BEF and BCF |
| D. | AEF, BEF and DEF |
| Answer» E. | |
| 188. |
The SQL expressionSelect distinct T, branch_name from branch T, branch S where T.assets>S.assets and S.branch_city=”Mumbai” finds the names of |
| A. | All branches that have greater assets than some branch located in Mumbai |
| B. | All branches that have greater assets than all branches in Mumbai |
| C. | The branch that has greatest asset in Mumbai |
| D. | Any branch that has greater assets than any branch in Mumbai |
| Answer» B. All branches that have greater assets than all branches in Mumbai | |
| 189. |
Which of the following is true ? |
| A. | A relation in 3NF is always in BCNF |
| B. | A relation in BCNF is always in 3NF |
| C. | BCNF and 3NF are totally different |
| D. | A relation in BCNF is in 2NF but not in 3NF |
| Answer» C. BCNF and 3NF are totally different | |
| 190. |
SQL command to delete a column from an existing table: |
| A. | Alter table |
| B. | Drop table |
| C. | Delete table |
| D. | Delete column |
| Answer» B. Drop table | |
| 191. |
Which of the following statements is true, when structure of database file with 20 records is modified? |
| A. | ? EOF ( ) Prints T |
| B. | ? BOF ( ) Prints F |
| C. | ? BOF ( ) Prints T |
| D. | ? EOF ( ) Prints F |
| Answer» B. ? BOF ( ) Prints F | |
| 192. |
With QBE, inserting records from one or more source tables into a single target table can be achieved by: |
| A. | Append action query |
| B. | Update action query |
| C. | Insert action query |
| D. | Make table action query |
| Answer» B. Update action query | |
| 193. |
B+ tree are preferred to binary tree in Database because |
| A. | Disk capacity are greater than memory capacities |
| B. | Disk access is much slower than memory access |
| C. | Disk data transfer rates are much less than memory data transfer rate |
| D. | Disks are more reliable than memory |
| Answer» C. Disk data transfer rates are much less than memory data transfer rate | |
| 194. |
Consider a hash table of size seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Here “__” denotes an empty location in the table. |
| A. | 3, 10, 1, 8, __, __, __ |
| B. | 1, 3, 8, 10, __, __, __ |
| C. | 1, __, 3, __, 8, __, 10 |
| D. | 3, 10, __, __, 8, __, __ |
| Answer» B. 1, 3, 8, 10, __, __, __ | |
| 195. |
In a relational schema, each tuple is divided in fields called: |
| A. | Relations |
| B. | Domains |
| C. | Queries |
| D. | All the above |
| Answer» C. Queries | |
| 196. |
For a database relation R(a, b, c, d) where the domains of a, b, c and d include only atomic values, and only the following functional dependencies and those that can be inferred from them hold:a → cb → dThe relation is in ............... |
| A. | First normal form but not in second normal form |
| B. | Second normal form but not in third normal form |
| C. | Third normal form |
| D. | BCNF |
| Answer» B. Second normal form but not in third normal form | |
| 197. |
Which of the following statement/s is/are true?(i) Facebook has the world’s largest Hadoop Cluster.(ii) Hadoop 2.0 allows live stream processing of Real time data.Choose the correct answer from the code given below: |
| A. | (i) only |
| B. | (ii) only |
| C. | Both (i) and (ii) |
| D. | Neither (i) nor (ii) |
| Answer» D. Neither (i) nor (ii) | |
| 198. |
Consider a hash table of size m = 10000 and the hash function h(k) = ∟m(kA mod 1)'┘ for A = (√5–1)/2. The location to the key k = 123456 is |
| A. | 46 |
| B. | 47 |
| C. | 41 |
| D. | 43 |
| Answer» D. 43 | |
| 199. |
Generalization is ………… process. |
| A. | top-down |
| B. | bottom up |
| C. | both a & b |
| D. | None of these |
| Answer» C. both a & b | |
| 200. |
The normalization of 1NF relations to 2NF involves: |
| A. | Removal of partial dependencies |
| B. | Removal of full dependencies |
| C. | Removal of transitive dependencies |
| D. | Removal of multi-valued dependencies |
| Answer» B. Removal of full dependencies | |