Home

1000+ Advance DBMS MCQ for SSC Scientific Assistant [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Functional dependencies are generalization of
A. Relation dependencies
B. Data dependencies
C. key dependencies
D. none of the above
Answer : A
2. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
3. Secondary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : A
4. A data manipulation command the combines the records from one or more tables is called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
Answer : C
5. Which of the following is true statement ?
A. SQL permits attribute names to be repeated in the same relation.
B. a SQL query automatically eliminates duplicates.
C. a SQL query will not work if there are no indexes on the relations
D. None of these
Answer : D
6. In two-phase locking protocol the two phases are
A. growing phase and shrinking phase
B. execution phase and blocking phase.
C. running phase and sleeping phase.
D. none of the above
Answer : A
7. File organization that provides fast access to any arbitrary record
A. Hashed file
B. B-tree
C. Ordered file
D. Unordered file
Answer : A
8. Disk storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : B
9. .................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
A. Baseband transmission
B. Broadband transmission
C. Digital transmission
D. Analog transmission
Answer : A
10. In an E-R diagram attributes are represented by
A. rectangle.
B. square.
C. ellipse.
D. triangle.
Answer : C
11. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
12. QBE
A. Query By Execution
B. Query By Example
C. Query By Extraction
D. None of the above.
Answer : B
13. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
14. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
15. An operation that will increase the length of a list is
A. insert
B. modify
C. lookup
D. none of the above
Answer : A
16. DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A) nor B)
D. both A) and B)
Answer : D
17. A …………… is a memory area where data are processed.
A. view
B. trigger
C. cursor
D. none of the above
Answer : C
18. The syntax to select all column from the table is
A. select all from tablename
B. select * from tablename
C. select from tablename
D. none of these
Answer : B
19. Volatile storage
A. loses its contents when power is switched off.
B. doesnt loses its contents when power is switched off.
C. creates backup when power is switched off.
D. none
Answer : A
20. The collection of information stored in a database at a particular moment is?
A. View
B. Instance
C. Scheme
D. None of these
Answer : B
21. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
22. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed or aborted
C. either committed or failed
D. none of these
Answer : D
23. Which of the following operator preserves unmatched rows of the relations being joined?
A. Inner join
B. Outer join
C. union
D. Intersect
Answer : B
24. A transaction which completes successfully is called
A. Granted
B. Committed
C. Compensated
D. Accomplished
Answer : B
25. Which topology requires a central controller or hub?
A. Ring
B. Tree
C. Switch
D. Graph
Answer : C
26. Natural mask for a Class A network
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of these
Answer : A
27. Triggers are also called
A. active rules
B. passive rules
C. inferences
D. none of the above
Answer : A
28. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
29. Related fields in a database are grouped to form a
A. data file.
B. data record.
C. menu.
D. bank.
Answer : B
30. Which of the following works as a filter?
A. UPDATE
B. DROP
C. ALTER
D. SELECT
Answer : D
31. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @
32. Tertiary storage
A. magnetic tape
B. juke box
C. optical disk
D. All of the above
Answer : D
33. Which of the following statement returns data to the host variables one at a time?
A. SELECT
B. RETURN
C. FETCH
D. GET
Answer : C
34. Noiseless channel has ……… types of protocols.
A. 2
B. 3
C. 4
D. 5
Answer : A
35. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
36. What is the max data capacity of STP?
A. 1 Gbps
B. 56 Mbps
C. 100 Mbps
D. 256 Mbps
Answer : C
37. View never contains derived columns.
A. True
B. False
C. Cant say
D. none
Answer : A
38. Select the incorrect statement
A. BCNF is stronger than 3NF
B. Relational algebra is a non-procedural language
C. Every conflict serializable schedule is view serializable.
D. none of the above
Answer : B
39. Which of the following is not an Aggregate function?
A. Min
B. Max
C. Select
D. Avg
Answer : C
40. Size of source and destination address in IP header
A. 4 bits
B. 8 bits
C. 12 bits
D. 32 bits
Answer : D
41. B-Tree is used for
A. searching data
B. storing data
C. both A and B
D. none of these
Answer : A
42. If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
A. Noise
B. Delay
C. Dispersion
D. Attenuation
Answer : D
43. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
44. In client/server computing data are
A. sent only upon the client's request
B. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
45. The physical path over which a message travels
A. Thermal
B. Medium
C. Protocol
D. Impulse
Answer : B
46. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
47. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
48. A subschema expresses
A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
Answer : C
49. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
50. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None f these
Answer : D

Sharing is caring