Home

Advance DBMS 1000+ MCQ with answer for RRB JE

Thursday 9th of March 2023

Sharing is caring

1. The race condition occurs when
A. Two concurrent processes attempt to interact with each other.
B. Two concurrent processes interact with different data files.
C. Two concurrent processes attempt to hold a data item .
D. none of the above.
Answer : C
2. It is possible to define a schema completely using
A. VDL and DDL.
B. DDL and DML.
C. SDL and DDL.
D. VDL and DML.
Answer : B
3. The overall design of a database is called
A. Subschema of the database
B. Schema of the database
C. Structure of the database
D. View of the database
Answer : B
4. Which of the following extracts its data from the result of an SQL SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer : A
5. In E-R diagram Generalization is represented by
A. Circle
B. Rectangle
C. Hyperbola
D. Triangle
Answer : D
6. Transaction processing is associated with everything below except
A. producing detail, summary, or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D. maintaining data.
Answer : C
7. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
8. A DBMS query language is designed to
A. support end users who use English-like commands.
B. support in the development of complex applications software.
C. specify the structure of a database.
D. all of the above.
Answer : D
9. .................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
A. Baseband transmission
B. Broadband transmission
C. Digital transmission
D. Analog transmission
Answer : A
10. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
11. EEPROM
A. Electrically Extractable Programmable Read Only Memory
B. Electrically Erasable Programmable Read Only Memory
C. Electronically Erasable Programmable Read Only Memory
D. Electrically Erasable Programmable Read Only Memory
Answer : D
12. A transaction which may not complete its execution successfully is termed as
A. Failed
B. Aborted
C. Blocked
D. Finished
Answer : B
13. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
14. Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only
B. ii and iii only
C. ii only
D. i only
Answer : D
15. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
16. Tertiary storage
A. magnetic tape
B. juke box
C. optical disk
D. All of the above
Answer : D
17. The database environment has all of the following components except:
A. users.
B. separate files.
C. database.
D. database administrator.
Answer : A
18. Noiseless channel has ……… types of protocols.
A. 2
B. 3
C. 4
D. 5
Answer : A
19. The privilege lists include
i) select
ii) insert
iii) update
iv) delete

A. only i)
B. only i) ii)
C. only i) ii) iii)
D. i) ii) iii) iv)
Answer : D
20. Tape storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : A
21. A relation that has no partial dependencies is in which normal form
A. First
B. Second
C. Third
D. BCNF
Answer : B
22. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
23. In which of the following transmissions, we can send data by grouping n bits at a time instead of a single bit?
A. parallel
B. serial
C. analog
D. digital
Answer : A
24. Database locking concept is used to solve the problem of
A. Lost Update
B. Uncommitted Depndency
C. Inconsistent Data
D. All of the above
Answer : D
25. A transaction which completes successfully is called
A. Granted
B. Committed
C. Compensated
D. Accomplished
Answer : B
26. Which of the following is not proper state of transaction ?
A. Partially aborted
B. Partially committed
C. Aborted
D. Committed
Answer : A
27. Commit operation …………… writes the changes made to the database.
A. temporarily
B. permanently
C. none of these
D. all of the above
Answer : B
28. A relation is said to be in ………. If it doesnt contain partial dependency
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer : B
29. Electromagnetic spectrum included in radiowaves are
i) Super High Frequency (SHF)
ii) Very High Frequency (VHF)
iii) Ultra High Frequency (UHF)
iv) High Frequencies (HF)

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : C
30. Which command is used to cancel privileges granted through the GRANT command ?
A. CANCEL
B. OVER
C. STOP
D. REVOKE
Answer : D
31. What is the max data capacity of STP?
A. 1 Gbps
B. 56 Mbps
C. 100 Mbps
D. 256 Mbps
Answer : C
32. In mesh topology, if the number of devices is n , then the number of ports present in each device is
A. n
B. n+1
C. n-1
D. n/2
Answer : C
33. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : B
34. Data integrity refers to
A. the uniqueness of the data in a database
B. the correctness and completeness of the data in a database
C. the un redundancies of the data in a database
D. Data independence of the database
Answer : B
35. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer : B
36. In ………… paging we make copy of the current page table.
A. physical
B. logical
C. shadow
D. duplicate
Answer : C
37. Size of source and destination address in IP header
A. 4 bits
B. 8 bits
C. 12 bits
D. 32 bits
Answer : D
38. A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
39. The statement
Every foreign-key value must match a primary-key value in an associated table
Is related to

A. View
B. Cursor defination
C. Referential intergrity
D. Trigger
Answer : C
40. What is ACID properties of Transactions?
A. Atomicity, Consistency, Isolation, Database
B. Atomicity, Consistency, Isolation, Durability
C. Atomicity, Consistency, Inconsistent, Durability
D. Automatically, Concurrency, Isolation, Durability
Answer : B
41. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed or aborted
C. either committed or failed
D. none of these
Answer : D
42. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
43. In an Entity-Relationship Diagram Ellipses represents
A. Attributes
B. Weak entity set
C. Relationship sets
D. Multi-valued attributes
Answer : A
44. The degree of the table with 500 rows and 7 columns is
A. 500
B. 7
C. 3500
D. none of these
Answer : B
45. In a Hierarchical model records are organized as
A. Graph.
B. List.
C. Links.
D. Tree.
Answer : D
46. Mail services are available to network users through the
A. Session layer
B. Presentation layer
C. Application layer
D. Transport layer
Answer : C
47. In two-phase locking protocol the two phases are
A. growing phase and shrinking phase
B. execution phase and blocking phase.
C. running phase and sleeping phase.
D. none of the above
Answer : A
48. Aggregte functions are also called
A. serial functions
B. non-serial functions
C. row functions
D. column functions
Answer : D
49. A composite attribute is converted to individual attributes in which of the following normal form ?
A. first
B. Second
C. third
D. fourth
Answer : A
50. A functional dependency between two or more non-key attributes is called
A. Transitive dependency
B. Partial transitive dependency
C. Functional dependency
D. Partial functional dependency
Answer : A

Sharing is caring