Home

1000+ DBMS MCQ for UPSC CSE [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only
B. ii-only
C. Both of them
D. None of them
Answer : C
2. The _______ is a set of programs to use and / or modify this data.
A. DBMS
B. System
C. Program
D. Software
Answer : A
3. ______ keyword is used to find the number of values in a column.
A. TOTAL
B. ADD
C. COUNT
D. SUM
Answer : C
4. Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)
B. (iv) only
C. (i) and (iv)
D. (ii) and (iii)
Answer : D
5. The normalization was first proposed by .
A. Code
B. Codd
C. Boyce Codd
D. Boyce
Answer : B
6. In E-R Diagram total participation is represented by
A. Double lines
B. Single line
C. Dashed lines
D. Triangle
Answer : A
7. _____ is a utility to capture a continuous record of server activity and provide auditing capability.
A. SQL server Profile
B. SQL server wizard.
C. SQL server service manager
D. SQL server setup
Answer : C
8. Drop Table cannot be used to drop a table referenced by a ______ constraint.
A. Primary Key
B. Local Key
C. Foreign Key
D. Composite Key
Answer : C
9. Shadow paging has
A. no redo
B. no undo
C. redo but no undo
D. neither redo nor undo
Answer : A
10. Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.
A. It will result in a deadlock situation.
B. It will immediately be rejected.
C. It will immediately be granted.
D. It will be granted as soon as it is released by A .
Answer : C
11. Employees in a company are each assigned their own office, i.e. for each employee there exists a unique office and for each office there exists a unique employee; This statement is an example of ____ type of relation.
A. 1:1
B. 1: Many
C. Many: One
D. Many : Many
Answer : A
12. Relationships among relationships can be represented in an-E-R model using
A. Aggregation
B. Association
C. Weak entity sets
D. Weak relationship sets
Answer : A
13. _____ command can be used to modify a column in a table
A. alter
B. update
C. set
D. create
Answer : A
14. In an E-R diagram double lines indicate
A. Total participation.
B. Multiple participation.
C. Cardinality N.
D. None of the above.
Answer : A
15. A top-to-bottom relationship among the items in a database is established by a
A. Hierarchical schema
B. Network schema
C. Relational Schema
D. All of the above
Answer : A
16. Cascading rollback is avoided in all protocol except
A. strict two-phase locking protocol.
B. tree locking protocol
C. two-phase locking protocol
D. validation based protocol.
Answer : D
17. A table can have only one
A. Secondary key
B. Alternate key
C. Unique key
D. Primary key
Answer : D
18. Which of the following is not a characteristic of a relational database model?
A. Table
B. Tree like structure
C. Complex logical relationship
D. Records
Answer : B
19. Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
Answer : C
20. Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.
D. None of these.
Answer : A
21. In a relational schema, each tuple is divided into fields called
A. Relations
B. Queries
C. Domains
D. All of the above
Answer : A
22. By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0) or one (1).
A. Vulcanizing
B. Galvanizing
C. Magnetizing
D. Passing UV rays
Answer : C
23. A _____ is used to define overall design of the database
A. code
B. data definition language
C. application program
D. schema
Answer : D
24. _____clause is an additional filter that is applied to the result.
A. Select
B. Order by
C. Group-by
D. Having
Answer : D
25. A ______ module is typically designed so that it will run on a user workstation or personal computer.
A. Software
B. Server
C. Program
D. Client
Answer : D
26. Which of the following aggregate functions does not ignore nulls in its results?.
A. COUNT .
B. COUNT (*)
C. MAX
D. MIN
Answer : B
27. If the closure of an attribute set is the entire relation then the attribute set is a
A. superkey
B. candidate key
C. primary key
D. not a key
Answer : A
28. The clause alter table in SQL can be used to
A. add an attribute
B. delete an attribute
C. alter the default values of an attribute
D. all of the above
Answer : D
29. An advantage of views is
A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
Answer : A
30. A data type or format is specified for each _________
A. Relation
B. Tuple
C. Database
D. Domain
Answer : B
31. DFD stands for
A. Data Flow Document
B. Data File Diagram
C. Data Flow Diagram
D. Non of the above
Answer : C
32. _____ First proposed the process of normalization.
A. Edgar. W
B. Edward Stephen
C. Edgar F. Codd
D. Edward Codd
Answer : C
33. A _____ is a logical unit of database processing that includes one or more data access operations that can include insertion, deletion, modification or retrieval operations.
A. Database
B. Data
C. Transaction
D. Record
Answer : C
34. Change Staff table by removing default of Assistant for position column
A. ALTER TABLE Staff ALTER position DROP DEFAULT;
B. ALTER TABLE Staff ALTER position DEFAULT;
C. ALTER TABLE Staff ALTER DROP DEFAULT;
D. MODIFY Staff ALTER position DROP DEFAULT;
Answer : A
35. A relation is in attribute of other composite key. if an attribute of a composite key is dependent on an
A. 2NF
B. 3NF
C. BCNF
D. 1NF
Answer : B
36. Which of the following addressing modes permits relocation without any change over in the code?
A. Indirect addressing
B. Indexed addressing
C. PC relative addressing
D. Base register addressing
Answer : B
37. The transactions like adding an employee, enrolling a student in a course are examples of _______
A. Logical
B. Physical
C. None
D. Theoretical
Answer : A
38. _____is a full form of SQL.
A. Standard query language
B. Sequential query language
C. Structured query language
D. Server side query language
Answer : C
39. Which of the following is not a consequence of non-normalized database?
A. Update Anomaly
B. Insertion Anomaly
C. Redundancy
D. Lost update problem
Answer : D
40. In b-tree the number of keys in each node is than the number of its children.
A. one less
B. same
C. one more
D. half
Answer : A
41. Wait-for graph is used for
A. detecting view serializability.
B. detecting conflict serializability.
C. deadlock prevention
D. deadlock detection
Answer : D
42. Which of the following statement on the view concept in SQL is invalid?
A. All views are not updateable
B. The views may be referenced in an SQL statement whenever tables are referenced.
C. The views are instantiated at the time they are referenced and not when they are defined.
D. The definition of a view should not have GROUP BY clause in it.
Answer : D
43. In a multi-user database, if two users wish to update the same record at the same time, they are prevented from doing so by
A. jamming
B. password
C. documentation
D. record lock
Answer : D
44. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
A. left outer join
B. right outer join
C. full outer join
D. inner join
Answer : D
45. The default level of consistency in SQL is
A. repeatable read
B. read committed
C. read uncommitted
D. serializable
Answer : D
46. If both the functional dependencies : X�Y and Y�X hold for two attributes X and Y then the relationship between X and Y is
A. M:N
B. M:1
C.
D. 1:M
Answer : C
47. Which of the following is not a logical database structure?
A. Chain
B. Network
C. Tree
D. Relational
Answer : A
48. The data in the database at a particular moment of time is called the _______
A. Snapshot
B. Dynaset
C. Stateless
D. Stateful
Answer : A
49. ______is a preferred method for enforcing data integrity
A. Constraints
B. Triggers
C. Stored procedure
D. Cursors
Answer : A
50. For using a specific database …………… command is used.
A. use database
B. database name use
C. Both A & B
D. None of them
Answer : A

Sharing is caring