Home

1000+ Advance DBMS MCQ for NEET PG [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Which of the following is a classical approach to database design?
A. Left Right approach
B. Right Left approach
C. Top Down approach
D. Bottom Up approach
Answer : C
2. An association of several structure of a data base can be expressed graphically by?
A. Tuple
B. Record
C. Relationship
D. Field
Answer : C
3. A data dictionary contains:
i) The name of all fields in all files.
ii) The data type of all fields in all files.
iii) The width of all fields in all files.

A. only i)
B. only i) and ii)
C. only ii) and iii)
D. i) ii) iii)
Answer : D
4. In mesh topology, if the number of devices is n , then the number of ports present in each device is
A. n
B. n+1
C. n-1
D. n/2
Answer : C
5. A relation is said to be in ………. If it doesnt contain partial dependency
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer : B
6. Noisy channel has ……… .. types of protocols
A. two
B. three
C. four
D. none
Answer : B
7. Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only
B. ii, only
C. ii, iii only
D. none of the above
Answer : D
8. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
9. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
10. A data manipulation command the combines the records from one or more tables is called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
Answer : C
11. The index table has …… Columns.
A. 1
B. 2
C. 3
D. 4
Answer : B
12. The ability to modify the conceptual schema without causing any change to the application program is known as
A. Physical data independence
B. Logical data independence
C. External data independence
D. Static data
Answer : B
13. Which command is used to cancel privileges granted through the GRANT command ?
A. CANCEL
B. OVER
C. STOP
D. REVOKE
Answer : D
14. A DBMS query language is designed to
A. support end users who use English-like commands.
B. support in the development of complex applications software.
C. specify the structure of a database.
D. all of the above.
Answer : D
15. Which of the following statements is not true about two tier client server database architecture?
A. SQL statements are processed on tier server
B. SQL statements may be processed on some of the clients
C. Business logic is mostly processed on clients
D. Business logic may be processed on the server
Answer : C
16. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C
17. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
18. Disk storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : B
19. DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A) nor B)
D. both A) and B)
Answer : D
20. A ………… clause permits a view definition to be used in multiple places within a query.
A. where
B. exist
C. with
D. select
Answer : C
21. Which of the following is not an Aggregate function?
A. Min
B. Max
C. Select
D. Avg
Answer : C
22. Multivalued dependency is removed in
A. 4 NF
B. 3 NF
C. 2 NF
D. 1 NF
Answer : A
23. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
24. Benefit of database normalization is
A. smaller number of tables
B. higher query processing efficiency
C. redced I/O for most queries
D. reduced data redundancy
Answer : D
25. Select the incorrect statement(s)
i) Foreign key values can be left blank
ii) In SQL duplicates may be present
iii) Theta join operation doesnt remove duplicate columns.
iv) NULL value means string of blank characters.

A. i ,iii only
B. ii, iv only
C. iii, iv only
D. ii, iii, iv
Answer : C
26. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
27. Size of source and destination address in IP header
A. 4 bits
B. 8 bits
C. 12 bits
D. 32 bits
Answer : D
28. Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
Answer : C
29. Select the correct statement
i) Aggregate functions work on a group of data and return a single value.
ii) ODBC connects the frontend with the database without considering its compatibility
iii) View definition cant be used at multiple places through with clause .

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : A
30. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
31. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
32. .................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
A. Baseband transmission
B. Broadband transmission
C. Digital transmission
D. Analog transmission
Answer : A
33. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
34. By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
D. none
Answer : B
35. The command used to delete a particular column in a relation
A. UPDATE
B. DROP
C. ALTER
D. DELETE
Answer : C
36. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
37. Expand the acronym OLAP
A. Object Linked Access Program
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
38. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
39. What does the number of attributes in a relation is called?
A. Cardinality
B. Degree
C. Tuple
D. Order
Answer : B
40. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
41. What is the max data capacity of STP?
A. 1 Gbps
B. 56 Mbps
C. 100 Mbps
D. 256 Mbps
Answer : C
42. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed or aborted
C. either committed or failed
D. none of these
Answer : D
43. What is ACID properties of Transactions?
A. Atomicity, Consistency, Isolation, Database
B. Atomicity, Consistency, Isolation, Durability
C. Atomicity, Consistency, Inconsistent, Durability
D. Automatically, Concurrency, Isolation, Durability
Answer : B
44. The statement
Every foreign-key value must match a primary-key value in an associated table
Is related to

A. View
B. Cursor defination
C. Referential intergrity
D. Trigger
Answer : C
45. In a Hierarchical model records are organized as
A. Graph.
B. List.
C. Links.
D. Tree.
Answer : D
46. .................. is the loss of energy as the signal propagates outward, where theamount of energy depends on the frequency.
A. Noise
B. Delay distortion
C. Attenuation distortion
D. Dispersion
Answer : C
47. It is possible to define a schema completely using
A. VDL and DDL.
B. DDL and DML.
C. SDL and DDL.
D. VDL and DML.
Answer : B
48. In which of the following transmissions, we can send data by grouping n bits at a time instead of a single bit?
A. parallel
B. serial
C. analog
D. digital
Answer : A
49. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @
50. The race condition occurs when
A. Two concurrent processes attempt to interact with each other.
B. Two concurrent processes interact with different data files.
C. Two concurrent processes attempt to hold a data item .
D. none of the above.
Answer : C

Sharing is caring