Home

1000+ Advance DBMS Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. The physical path over which a message travels
A. Thermal
B. Medium
C. Protocol
D. Impulse
Answer : B
2. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
3. The number of cursors depend on the
A. number of queries
B. number of attributes
C. size of memory area
D. none of these
Answer : C
4. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
5. In an Entity-Relationship Diagram Ellipses represents
A. Attributes
B. Weak entity set
C. Relationship sets
D. Multi-valued attributes
Answer : A
6. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
7. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
8. Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only
B. ii and iii only
C. ii only
D. i only
Answer : D
9. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
10. Mail services are available to network users through the
A. Session layer
B. Presentation layer
C. Application layer
D. Transport layer
Answer : C
11. When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
A. first
B. second
C. third
D. fourth
Answer : C
12. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C
13. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
14. In this data model each record can hae more than one parent
A. Hierarchical model
B. E-R model
C. Network based model
D. none of these
Answer : C
15. EEPROM
A. Electrically Extractable Programmable Read Only Memory
B. Electrically Erasable Programmable Read Only Memory
C. Electronically Erasable Programmable Read Only Memory
D. Electrically Erasable Programmable Read Only Memory
Answer : D
16. The control of concurrent execution is left with the
A. operating system
B. controller unit of the kernel
C. concurrency control component of the database system
D. none
Answer : C
17. Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:

A. mn
B. m+n
C. m+n)/2
D. 2 m+n)
Answer : A
18. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B
19. A subschema expresses
A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
Answer : C
20. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
21. Data stored in cursor is called ……………
A. record
B. active data set
C. object
D. none of the above
Answer : B
22. The collection of information stored in a database at a particular moment is?
A. View
B. Instance
C. Scheme
D. None of these
Answer : B
23. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
24. Electromagnetic spectrum included in radiowaves are
i) Super High Frequency (SHF)
ii) Very High Frequency (VHF)
iii) Ultra Hgh Frequency (UHF)
iv) High Frequencies (HF)

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : C
25. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
26. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
27. DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions
A. Backup
B. Recovery
C. Grant
D. Troubleshooting
Answer : B
28. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
29. Data Manipulation Language DML) is not to
A. Create information table in the Database
B. Insertion of new information into the Database
C. Deletion of information in the Database
D. Modification of information in the Database
Answer : A
30. Which of the following extracts its data from the result of an SQL SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer : A
31. DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A) nor B)
D. both A) and B)
Answer : D
32. Which of the following is not a database object?
A. index
B. sequence
C. cursor
D. trigger
Answer : C
33. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
34. A DBMS query language is designed to
A. support end users who use English-like commands.
B. support in the development of complex applications software.
C. specify the structure of a database.
D. all of the above.
Answer : D
35. An entity set which have sufficient attributes to form a primary key
A. Tree structure
B. Subtree structure
C. Strong entity set
D. Table structure
Answer : C
36. Database locking concept is used to solve the problem of
A. Lost Update
B. Uncommitted Dependency
C. Inconsistent Data
D. All of the above
Answer : D
37. Primary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
38. A transaction which may not complete its execution successfully is termed as
A. Failed
B. Aborted
C. Blocked
D. Finished
Answer : B
39. Usenet is also known as
A. Newsgroups
B. 10Km to 1Km
C. 10^3Km to 100Km
D. 100M to 10M
Answer : A
40. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
41. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
42. For large networks, _______ topology is used
A. Ring
B. Bus
C. Mesh
D. none of these
Answer : A
43. In RDBMS, Data is presented as a collection of
A. Relation
B. Table
C. Attribute
D. Entity
Answer : A
44. Natural mask for a Class A network
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of these
Answer : A
45. Relational Algebra is
A. Data Definition Language.
B. Data Manipulation Language
C. Procedural query Language
D. None of the above
Answer : C
46. Select the incorrect statement
A. View is derived from other tables.
B. Once a transaction has executed commit work its effect cant be undone by rollback work .
C. The input to the aggregate function avg can be non numeric data types
D. A primary key can never be null.
Answer : C
47. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
48. Expand the acronym OLAP
A. Object Linked Access rogram
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
49. The class based addressing is known as
A. Classless addressing
B. Classful addressing
C. Classified addressing
D. Classical addressing
Answer : B
50. In the architecture of a database system external level is the
A. physical level.
B. logical level.
C. conceptual level
D. view level.
Answer : D

Sharing is caring