Home

1000+ Advance DBMS MCQ for CAT [Solved]

Thursday 9th of March 2023

Sharing is caring

1. In client/server computing data are
A. sent only upon the client's request
B. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
2. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed or aborted
C. either committed or failed
D. none of these
Answer : D
3. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
4. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
5. Which of the following Key is used to represent relationship between the tables?
A. Primary key
B. Secondary Key
C. Foreign Key
D. None of these
Answer : C
6. Which of the following concurrency control schemes is not based on serializability property?
A. Two-phase locking
B. Timestamped based locking
C. Graph-based locking
D. none of the above
Answer : C
7. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
8. Secondary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : A
9. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
10. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : B
11. A table that displays data redundancies yields ____________ anomalies
A. Insertion
B. Deletion
C. Update
D. All of the above
Answer : D
12. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
13. As a side-effect of database update ,the system automatically executes a statement called
A. a view
B. a grant permission
C. a trigger
D. all of the above
Answer : C
14. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
15. Which of the following is not a database object?
A. index
B. sequence
C. cursor
D. trigger
Answer : C
16. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
17. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
18. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
A. entity integrity rule
B. referential integrity constraint
C. composite attribute
D. action assertion
Answer : A
19. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
20. Data Manipulation Language DML) is not to
A. Create information table in the Database
B. Insertion of new information into the Database
C. Deletion of information in the Database
D. Modification of information in the Database
Answer : A
21. A subschema expresses
A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
Answer : C
22. The command used to delete a particular column in a relation
A. UPDATE
B. DROP
C. ALTER
D. DELETE
Answer : C
23. The race condition occurs when
A. Two concurrent processes attempt to interact with each other.
B. Two concurrent processes interact with different data files.
C. Two oncurrent processes attempt to hold a data item .
D. none of the above.
Answer : C
24. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
25. Which topology requires a central controller or hub?
A. Ring
B. Tree
C. Switch
D. Graph
Answer : C
26. Which of the following is not an Aggregate function?
A. Min
B. Max
C. Select
D. Avg
Answer : C
27. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
28. The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
Answer : A
29. Natural mask for a Class A network
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of these
Answer : A
30. Thermal noise is often referred to as ............... noise, because it affects uniformly the different frequencies.
A. Gray
B. White
C. Blue
D. Black
Answer : B
31. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B
32. DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions
A. Backup
B. Recovery
C. Grant
D. Troubleshooting
Answer : B
33. Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
Answer : C
34. The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. VDL
D. SDL
Answer : A
35. Referential integrity
A. controls relationships between operations of an object
B. controls relationships between instances of a class
C. controls relationships between attributes in a table
D. controls relationships between tables in a database
Answer : D
36. A DBMS query language is designed to
A. support end users who use English-like commands.
B. support in the development of complex applications software.
C. specify the structure of a database.
D. all of the above.
Answer : D
37. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
38. Select the incorrect statement
A. BCNF is stronger than 3NF
B. Relational algebra is a non-procedural language
C. Every conflict serializable schedule is view serializable.
D. none of the above
Answer : B
39. In RDBMS, Data is presented as a collection of
A. Relation
B. Table
C. Attribute
D. Entity
Answer : A
40. The statement
Every foreign-key value must match a primary-key value in an associated table
Is related to

A. View
B. Cursor defination
C. Referential intergrity
D. Trigger
Answer : C
41. For large networks, _______ topology is used
A. Ring
B. Bus
C. Mesh
D. none of these
Answer : A
42. Aggregate functions are also called
A. serial functions
B. non-serial functions
C. row functions
D. column functions
Answer : D
43. Generalization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : B
44. Object based data models are used in describing the abstraction of the following levels?
A. Conceptual and view
B. Only physical
C. Physical and conceptual
D. Only conceptual
Answer : A
45. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
46. The output of the Data Definition Language is stored in the
A. view table
B. schema
C. metadata
D. all of the above.
Answer : C
47. A type of query that is placed within a WHERE or HAVING clause of another query is called
A. Super query
B. Sub query
C. Master query
D. Multi-query
Answer : B
48. DBMS helps acieve
A. Data independence
B. Centralized control of data
C. Neither A) nor B)
D. both A) and B)
Answer : D
49. Tape storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : A
50. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C

Sharing is caring