Home

Advance DBMS 1000+ MCQ with answer for IIFT

Thursday 9th of March 2023

Sharing is caring

1. Data stored in cursor is called ……………
A. record
B. active data set
C. object
D. none of the above
Answer : B
2. A composite attribute is converted to individual attributes in which of the following normal form ?
A. first
B. Second
C. third
D. fourth
Answer : A
3. Primary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
4. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
5. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
6. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
7. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
8. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
9. Functional dependencies are generalization of
A. Relation dependencies
B. Data dependencies
C. key dependencies
D. none of the above
Answer : A
10. Secondary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : A
11. Symbol to represent weak entity set in ER Model
A. Dotted rectangle
B. Square
C. Doubly outlined rectangle
D. Diamond
Answer : C
12. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C
13. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
14. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
15. A functional dependency between two or more non-key attributes is called
A. Transitive dependency
B. Partial transitive dependency
C. Functional dependency
D. Partial functional dependency
Answer : A
16. An operation that will increase the length of a list is
A. insert
B. modify
C. lookup
D. none of the above
Answer : A
17. A logical description of some portion of database that is required by a user to perform task is called as
A. System View
B. User View
C. Logical View
D. Data View
Answer : B
18. The overall design of a database is called
A. Subschema of the database
B. Schema of the database
C. Structure of the database
D. View of the database
Answer : B
19. Which of the following is not a constraint on a single relation?
A. check
B. unique
C. not null
D. is duplicate
Answer : D
20. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
21. The privilege lists include
i) select
ii) insert
iii) update
iv) delete

A. only i)
B. only i) ii)
C. only i) ii) iii)
D. i) ii) iii) iv)
Answer : D
22. QBE
A. Query By Execution
B. Query By Example
C. Query By Extraction
D. None of the above.
Answer : B
23. Size of source and destination address in IP header
A. 4 bits
B. 8 bits
C. 12 bits
D. 32 bits
Answer : D
24. Full form of CIDR
A. Classful Inter Domain Routing
B. Classless International Domain Routing
C. Classless Inter Domain Routing
D. none of these
Answer : C
25. Tertiary storage
A. magnetic tape
B. juke box
C. optical disk
D. All of the above
Answer : D
26. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
27. Noiseless channel has ……… types of protocols.
A. 2
B. 3
C. 4
D. 5
Answer : A
28. Select the correct statement
i) Aggregate functions work on a group of data and return a single value.
ii) ODBC connects the frontend with the database without considering its compatibility
iii) View definition cant be used at multiple places through with clause .

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : A
29. Which topology requires a central controller or hub?
A. Ring
B. Tree
C. Switch
D. Graph
Answer : C
30. Which of the following is a classical approach to database design?
A. Left Right approach
B. Right Left approach
C. Top Down approach
D. Bottom Up approach
Answer : C
31. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
32. A table that displays data redundancies yields ____________ anomalies
A. Insertion
B. Deletion
C. Update
D. All of the above
Answer : D
33. Object based data models are used in describing the abstraction of the following levels?
A. Conceptual and view
B. Only physical
C. Physical and conceptual
D. Only conceptual
Answer : A
34. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
35. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
36. Cross Product is a:
A. Unary Operator
B. Binary Operator
C. Ternary Operator
D. none of the above
Answer : B
37. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
38. When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
A. first
B. second
C. third
D. fourth
Answer : C
39. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
40. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
41. Expand the acronym OLAP
A. Object Linked Access Program
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
42. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
43. The collection of information stored in a database at a particular moment is?
A. View
B. Instance
C. Scheme
D. None of these
Answer : B
44. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
45. Which of the following works as a filter?
A. UPDATE
B. DROP
C. ALTER
D. SELECT
Answer : D
46. .................. occurs due to velocity of propagation the frequency varies. Thus various frequency components of a signal arrive at the receiver at different times.
A. Noise
B. Delay distortion
C. Attenuation distortion
D. Dispersion
Answer : B
47. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
48. A lock that allows concurrent transactions to access different rows of the same table is known as a
. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
49. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
50. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @

Sharing is caring