Home

1000+ Advance DBMS MCQ for NEET [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
2. Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only
B. ii only
C. Both A and B
D. None of the above
Answer : C
3. A logical schema
A. is the entire database.
B. is a standard way of organizing information into accessible parts.
C. describes how data is actually stored on disk.
D. both A) and C)
Answer : A
4. A relation is said to be in ………. If it doesnt contain partial dependency
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer : B
5. The method of access which uses key transformation is known as
A. direct.
B. hash.
C. random.
D. sequential.
Answer : B
6. Primary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
7. Volatile storage
A. loses its contents when power is switched off.
B. doesnt loses its contents when power is switched off.
C. creates backup when power is switched off.
D. none
Answer : A
8. A logical description of some portion of database that is required by a user to perform task is called as
A. System View
B. User View
C. Logical View
D. Data View
Answer : B
9. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed or aborted
C. either committed or failed
D. none of these
Answer : D
10. The left outer join takes all tuples
A. in the left relation which didnt match with any tuple in right relation
B. in the left relation which matched with a tuple in right relation
C. in the right relation which didnt match with any tuple in left relation
D. in the right relation which matched with a tuple in left relation
Answer : A
11. Data stored in cursor is called ……………
A. record
B. active data set
C. object
D. none of the above
Answer : B
12. It is possible to define a schema completely using
A. VDL and DDL.
B. DDL and DML.
C. SDL and DDL.
D. VDL and DML.
Answer : B
13. In this data model each record can hae more than one parent
A. Hierarchical model
B. E-R model
C. Network based model
D. none of these
Answer : C
14. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
15. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
16. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
17. Full form of CIDR
A. Classful Inter Domain Routing
B. Classless International Domain Routing
C. Classless Inter Domain Routing
D. none of these
Answer : C
18. Three SQL, DDL, CREATE commands are
A. Schema, Base and Table
B. Schema, Table and View
C. Base, Table and Schema
D. Key, Base and Table
Answer : B
19. Aggregate functions are also called
A. serial functions
B. non-serial functions
C. row functions
D. column functions
Answer : D
20. Disk storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : B
21. Which of the following is not a database object?
A. index
B. sequence
C. cursor
D. trigger
Answer : C
22. In an Entity-Relationship Diagram Ellipses represents
A. Attributes
B. Weak entity set
C. Relationship sets
D. Multi-valued attributes
Answer : A
23. Which of the following is logical topology?
A. Bus
B. Ring
C. Star
D. None of these
Answer : B
24. What is ACID properties of Transactions?
A. Atomicity, Consistency, Isolation, Database
B. Atomicity, Consistency, Isolation, Durability
C. Atomicity, Consistency, Incosistent, Durability
D. Automatically, Concurrency, Isolation, Durability
Answer : B
25. In an E-R diagram attributes are represented by
A. rectangle.
B. square.
C. ellipse.
D. triangle.
Answer : C
26. Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only
B. ii, only
C. ii, iii only
D. none of the above
Answer : D
27. A transaction which completes successfully is called
A. Granted
B. Committed
C. Compensated
D. Accomplished
Answer : B
28. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : C
29. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
30. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
31. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
32. Noisy channel has ……… .. types of protocols
A. two
B. three
C. four
D. none
Answer : B
33. Which of the following is not a constraint on a single relation?
A. check
B. unique
C. not null
D. is duplicate
Answer : D
34. A composite attribute is converted to individual attributes in which of the following normal form ?
A. first
B. Second
C. third
D. fourth
Answer : A
35. If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
A. Noise
B. Delay
C. Dispersion
D. Attenuation
Answer : D
36. A fragmentation is categorized in
A. 1 part
B. 2 part
C. 3 part
D. 4 part
Answer : C
37. A data dictionary contains:
i) The name of all fields in all files.
ii) The data type of all fields in all files.
iii) The width of all fields in all files.

A. only i)
B. only i) and ii)
C. only ii) and iii)
D. i) ii) iii)
Answer : D
38. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
39. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
40. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
41. For large networks, _______ topology is used
A. Ring
B. Bus
C. Mesh
D. none of these
Answer : A
42. QBE
A. Query By Execution
B. Query By Example
C. Query By Extraction
D. None of the above.
Answer : B
43. UML is stands for
A. Universal Modeling Language
B. Unified Modeling Language
C. United Modeling Language
D. Uni Modeling Language
Answer : B
44. Data Manipulation Language DML) is not to
A. Create information table in the Database
B. Insertion of new information into the Database
C. Deletion of information in the Database
D. Modification of information in the Database
Answer : A
45. The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. VDL
D. SDL
Answer : A
46. The privilege lists include
i) select
ii) insert
iii) update
iv) delete

A. only i)
B. only i) ii)
C. only i) ii) iii)
D. i) ii) iii) iv)
Answer : D
47. A subschema expresses
A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
Answer : C
48. Which of the following aggregate function doesnt ignore NULLs in its results?
A. COUNT
B. COUNT(*
C. MAX
D. none of these
Answer : B
49. A type of query that is placed within a WHERE or HAVING clause of another query is called
A. Super query
B. Sub query
C. Master query
D. Multi-query
Answer : B
50. Which of the following concurrency control schemes is not based on serializability property?
A. Two-phase locking
B. Timestamped based locking
C. Graph-based locking
D. none of the above
Answer : C

Sharing is caring