Home

1000+ Advance DBMS MCQ for SSC CGL [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
2. Only one communication channel is needed rather than n channels to transmit data between two communicating devices
A. parallel
B. serial
C. analog
D. digital
Answer : B
3. .................. occurs due to velocity of propagation the frequency varies. Thus various frequency components of a signal arrive at the receiver at different times.
A. Noise
B. Delay distortion
C. Attenuation distortion
D. Dispersion
Answer : B
4. Database locking concept is used to solve the problem of
A. Lost Update
B. Uncommitted Dependency
C. Inconsistent Data
D. All of the above
Answer : D
5. What is the max data capacity of STP?
A. 1 Gbps
B. 56 Mbps
C. 100 Mbps
D. 256 Mbps
Answer : C
6. Transaction processing is associated with everything below except
A. producing detail, summary, or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D. maintaining data.
Answer : C
7. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
8. The ability to modify the conceptual schema without causing any change to the application program is known as
A. Physical data independence
B. Logical data independence
C. External data independence
D. Static data
Answer : B
9. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
10. Aggregate functions are also called
A. serial functions
B. non-serial functions
C. row functions
D. column functions
Answer : D
11. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
12. A relation is said to be in ………. If it doesnt contain partial dependency
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer : B
13. The database environment has all of the following components except:
A. users.
B. separate files.
C. database.
D. database administrator.
Answer : A
14. A lock that allows concurrent transactions to access different rows of the same table is known as a
A. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
15. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B
16. Select the incorrect statement
A. BCNF is stronger than 3NF
B. Relational algebra is a non-procedural language
C. Every conflict serializable schedule is view serializable.
D. none of the above
Answer : B
17. Data stored in cursor is called ……………
A. record
B. active data set
C. object
D. none of the above
Answer : B
18. Select the correct statement
i) Aggregate functions work on a group of data and return a single value.
ii) ODBC connects the frontend with the database without considering its compatibility
iii) View definition cant be used at multiple places through with clause .

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : A
19. The host part in a class A type of an IP address has
A. 12 bits
B. 16 bits
C. 24 bits
D. 28 bits
Answer : C
20. Object based data models are used in describing the abstraction of the following levels?
A. Conceptual and view
B. Only physical
C. Physical and conceptual
D. Only conceptual
Answer : A
21. In E-R diagram Generalization is represented by
A. Circle
B. Rectangle
C. Hyperbola
D. Triangle
Answer : D
22. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
23. The degree of the table with 500 rows and 7 columns is
A. 500
B. 7
C. 3500
D. none of these
Answer : B
24. The index table has …… Columns.
A. 1
B. 2
C. 3
D. 4
Answer : B
25. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
26. Functional dependencies are generalization of
A. Relation dependencies
B. Data dependencies
C. key dependencies
D. none of the above
Answer : A
27. Size of source and destination address in IP header
A. 4 bits
B. 8 bits
C. 12 bits
D. 32 bits
Answer : D
28. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
29. UML is stands for
A. Universal Modeling Language
B. Unified Modeling Language
C. United Modeling Language
D. Uni Modeling Language
Answer : B
30. Which of the following statements is not true about two tier client server database architecture?
A. SQL statements are processed on tier server
B. SQL statements may be processed on some of the clients
C. Business logic is mostly processed on clients
D. Business logic may be processed on the server
Answer : C
31. A relation which is in 3NF is
A. in 1NF also
B. in 2NF also
C. free from transitive dependencies
D. All of these
Answer : D
32. The exists construct returns the value true, if the argument subquery is
A. empty
B. nonempty
C. contains null values
D. none of the above
Answer : B
33. A composite attribute is converted to individual attributes in which of the following normal form ?
A. first
B. Second
C. third
D. fourth
Answer : A
34. Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:

A. mn
B. m+n
C. m+n)/2
D. 2 m+n)
Answer : A
35. An entity set that does not have sufficient attributes to form a primary key is a
A. strong entity set.
B. weak entity set.
C. simple entity set.
D. primary entity set.
Answer : B
36. File organization that provides fast access to any arbitrary record
A. Hashed file
B. B-tree
C. Ordered file
D. Unordered file
Answer : A
37. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
38. As a side-effect of database update ,the system automatically executes a statement called
A. a view
B. a grant permission
C. a trigger
D. all of the above
Answer : C
39. Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only
B. ii only
C. Both A and B
D. None of the above
Answer : C
40. In which of the following transmissions, we can send data by grouping n bits at a time instead of a single bit?
A. parallel
B. serial
C. analog
D. digital
Answer : A
41. FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
42. Noiseless channel has ……… types of protocols.
A. 2
B. 3
C. 4
D. 5
Answer : A
43. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
44. The physical path over which a message travels
A. Thermal
B. Medium
C. Protocol
D. Impulse
Answer : B
45. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
46. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
47. Expand the acronym OLAP
A. Object Linked Access Program
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
48. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
49. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
50. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C

Sharing is caring