Home

Advance DBMS 1000+ MCQ with answer for SSC CPO

Thursday 9th of March 2023

Sharing is caring

1. The number of cursors depend on the
A. number of queries
B. number of attributes
C. size of memory area
D. none of these
Answer : C
2. The database environment has all of the following components except:
A. users.
B. separate files.
C. database.
D. database administrator.
Answer : A
3. Generalization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : B
4. A lock that allows concurrent transactions to access different rows of the same table is known as a
A. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
5. A data manipulation command the combines the records from one or more tables is called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
Answer : C
6. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
7. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
8. In E-R diagram Generalization is represented by
A. Circle
B. Rectangle
C. Hyperbola
D. Triangle
Answer : D
9. Tape storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : A
10. The output of the Data Definition Language is stored in the
A. view table
B. schema
C. metadata
D. all of the above.
Answer : C
11. A ………… clause permits a view definition to be used in multiple places within a query.
A. where
B. exist
C. with
D. select
Answer : C
12. Which of the following is not a database object?
A. index
B. sequence
C. cursor
D. trigger
Answer : C
13. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
14. Which of the following is not an Aggregate function?
A. Min
B. Max
C. Select
D. Avg
Answer : C
15. Functional dependencies are generalization of
A. Relation dependencies
B. Data dependencies
C. key dependencies
D. none of the above
Answer : A
16. The attribute that can be divided into other attributes is called
A. Simple Attribute
B. Composite Attribute
C. Multi-valued Attribute
D. Derived Attribute
Answer : B
17. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
18. Aggregate functions are also called
A. serial functions
B. non-serial functions
C. row functions
D. column functions
Answer : D
19. In case of entity integrity, the primary key may be
A. not Null
B. Null
C. both Null & not Null.
D. any value.
Answer : A
20. The class based addressing is known as
A. Classless addressing
B. Classful addressing
C. Classified addressing
D. Classical addressing
Answer : B
21. Which of the following extracts its data from the result of an SQL SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer : A
22. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B
23. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
24. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
25. Related fields in a database are grouped to form a
A. data file.
B. data record.
C. menu.
D. bank.
Answer : B
26. A functional dependency between two or more non-key attributes is called
A. Transitive dependency
B. Partial transitive dependency
C. Functional dependency
D. Partial functional dependency
Answer : A
27. Tertiary storage
A. magnetic tape
B. juke box
C. optical disk
D. All of the above
Answer : D
28. Which command is used to cancel privileges granted through the GRANT command ?
A. CANCEL
B. OVER
C. STOP
D. REVOKE
Answer : D
29. Select the incorrect statement
A. View is derived from other tables.
B. Once a transaction has executed commit work its effect cant be undone by rollback work .
C. The input to the aggregate function avg can be non numeric data types
D. A primary key can never be null.
Answer : C
30. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
31. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : C
32. RAID
A. Redundant Arrays of Independent Disks
B. Redundant Arrays of Independent Drives
C. Redundant Arrays of Interconnected Drives
D. Redundant Arrays of Interconnected Disks
Answer : A
33. Select the correct
i) A timestamp-based scheduler cant produce live lock
ii) Aggregate functions cant appear with HAVING clause.
iii) Isolation is a property of database transaction.

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : C
34. By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
D. none
Answer : B
35. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
36. An entity set which have sufficient attributes to form a primary key
A. Tree structure
B. Subtree structure
C. Strong entity set
D. Table structure
Answer : C
37. In client/server computing data are
A. sent only upon the client's request
B. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
38. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
39. A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
40. Secondary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : A
41. Unwanted energy from source other than the transmitter.
A. Attenuation
B. Distortion
C. Delay
D. Noise
Answer : D
42. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
43. As a side-effect of database update ,the system automatically executes a statement called
A. a view
B. a grant permission
C. a trigger
D. all of the above
Answer : C
44. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
45. The minimal set of super key is called
A. Primary key
B. Secondary key
C. Candidate key
D. Foreign key
Answer : C
46. Which topology requires a central controller or hub?
A. Ring
B. Tree
C. Switch
D. Graph
Answer : C
47. In an Entity-Relationship Diagram Ellipses represents
A. Attributes
B. Weak entity set
C. Relationship sets
D. Multi-valued attributes
Answer : A
48. Which of the following produces the relation that has attributes of R1 and R2
A. Cartesian product
B. Difference
C. Intersection
D. Product
Answer : A
49. Primary storage A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
50. Data stored in cursor is called ……………
A. record
B. active data set
C. object
D. none of the above
Answer : B

Sharing is caring