Home

Advance DBMS 1000+ MCQ with answer for CLAT PG

Thursday 9th of March 2023

Sharing is caring

1. Which of the following file organization provides very fast access to any arbitrary record of a file?
A. Ordered file
B. Unordered file
C. Hashed file
D. B-tree
Answer : C
2. The method of access which uses key transformation is known as
A. direct.
B. hash.
C. random.
D. sequential.
Answer : B
3. Which command is used to cancel privileges granted through the GRANT command ?
A. CANCEL
B. OVER
C. STOP
D. REVOKE
Answer : D
4. The attribute that can be divided into other attributes is called
A. Simple Attribute
B. Composite Attribute
C. Multi-valued Attribute
D. Derived Attribute
Answer : B
5. Full form of CIDR
A. Classful Inter Domain Routing
B. Classless International Domain Routing
C. Classless Inter Domain Routing
D. none of these
Answer : C
6. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
7. Relational Algebra is
A. Data Definition Language.
B. Data Manipulation Language
C. Procedural query Language
D. None of the above
Answer : C
8. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
9. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
10. In ………… paging we make copy of the current page table.
A. physical
B. logical
C. shadow
D. duplicate
Answer : C
11. Only one communication channel is needed rather than n channels to transmit data between two communicating devices
A. parallel
B. serial
C. analog
D. digital
Answer : B
12. The degree of the table with 500 rows and 7 columns is
A. 500
B. 7
C. 3500
D. none of these
Answer : B
13. An entity set which have sufficient attributes to form a primary key
A. Tree structure
B. Subtree structure
C. Strong entity set
D. Table structure
Answer : C
14. Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only
B. ii and iii only
C. ii only
D. i only
Answer : D
15. The command used to delete a particular column in a relation
A. UPDATE
B. DROP
C. ALTER
D. DELETE
Answer : C
16. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
17. A transaction which completes successfully is called
A. Granted
B. Committed
C. Compensated
D. Accomplished
Answer : B
18. View never contains derived columns.
A. True
B. False
C. Cant say
D. none
Answer : A
19. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
20. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
21. Which of the following Key is used to represent relationship between the tables?
A. Primary key
B. Secondary Key
C. Foreign Key
D. None of these
Answer : C
22. Which of the following concurrency control schemes is not based on serializability property?
A. Two-phase locking
B. Timestamped based locking
C. Graph-based locking
D. none of the above
Answer : C
23. Noisy channel has ……… .. types of protocols
A. two
B. three
C. four
D. none
Answer : B
24. The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. VDL
D. SDL
Answer : A
25. What does a field or a combination of fields tht has a unique value called ?
A. Foreign key
B. Secondary key
C. Primary key
D. Alternate key
Answer : C
26. Commit operation …………… writes the changes made to the database.
A. temporarily
B. permanently
C. none of these
D. all of the above
Answer : B
27. In two-phase locking protocol the two phases are
A. growing phase and shrinking phase
B. execution phase and blocking phase.
C. running phase and sleeping phase.
D. none of the above
Answer : A
28. The output of the Data Definition Language is stored in the
A. view table
B. schema
C. metadata
D. all of the above.
Answer : C
29. The host part in a class A type of an IP address has
A. 12 bits
B. 16 bits
C. 24 bits
D. 28 bits
Answer : C
30. If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
A. Noise
B. Delay
C. Dispersion
D. Attenuation
Answer : D
31. In E-R Diagram weak entity set are represented by
A. Ellipse
B. Dashed ellipse
C. Dashed Rectangle
D. Doubled Rectangle
Answer : D
32. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
33. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
34. Triggers are also called
A. active rules
B. passive rules
C. inferences
D. none of the above
Answer : A
35. In RDBMS, Data is presented as a collection of
A. Relation
B. Table
C. Attribute
D. Entity
Answer : A
36. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
37. An association of several structure of a data base can be expressed graphically by?
A. Tuple
B. Record
C. Relationship
D. Field
Answer : C
38. Count function in SQL returns the number of
A. values.
B. distinct values.
C. groups.
D. columns.
Answer : A
39. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
40. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B
41. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
42. Radio frequencies below ............. are more suitable for omnidirectional applications.
A. 300MHz
B. 1GHz
C. 5GHz
D. 10 GHz
Answer : B
43. Disk storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : B
44. Benefit of database normalization is
A. smaller number of tables
B. higher query processing efficiency
C. reduced I/O for most queries
D. reduced data redundancy
Answer : D
45. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
46. Data Manipulation Language DML) is not to
A. Create information table in the Database
B. Insertion of new information into the Database
C. Deletion of information in the Database
D. Modification of information in the Database
Answer : A
47. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
48. Which of the ollowing is the unit of signaling speed or modulation rate or the rate of symbol transmission?
A. Data rate
B. Bit rate
C. Signal to Noise Ratio
D. Baud rate
Answer : D
49. In an E-R diagram attributes are represented by
A. rectangle.
B. square.
C. ellipse.
D. triangle.
Answer : C
50. As a side-effect of database update ,the system automatically executes a statement called
A. a view
B. a grant permission
C. a trigger
D. all of the above
Answer : C

Sharing is caring