Home

Advance DBMS 1000+ MCQ with answer for UPSC CSE

Thursday 9th of March 2023

Sharing is caring

1. Data fragmentation is performed by the …… and each fragment is stored at…………..
A. DBMS, same site
B. OS ,same site
C. DBMS ,different site
D. OS ,different site
Answer : C
2. In an E-R diagram attributes are represented by
A. rectangle.
B. square.
C. ellipse.
D. triangle.
Answer : C
3. What is the result of the following SQL statement ?
SELECT A.emp_Name, B.ph_num
FROM emp A LEFT OUTER JOIN phone B
ON A. emp_ID = B.emp_ID

A. A list of employees phone number
B. A list of all employees that have spouses, with phone number included in the list
C. A list of all employees names, including the phone number if they have one
D. Two lists : One list of employees, the other of phone numbers
Answer : C
4. Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
Answer : C
5. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
6. Noisy channel has ……… .. types of protocols
A. two
B. three
C. four
D. none
Answer : B
7. Which of the following is not a constraint on a single relation?
A. check
B. unique
C. not null
D. is duplicate
Answer : D
8. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
9. Multivalued dependency is removed in
A. 4 NF
B. 3 NF
C. 2 NF
D. 1 NF
Answer : A
10. A type of query that is placed within a WHERE or HAVING clause of another query is called
A. Super query
B. Sub query
C. Master query
D. Multi-query
Answer : B
11. A logical description of some portion of database that is required by a user to perform task is called as
A. System View
B. User View
C. Logical View
D. Data View
Answer : B
12. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
13. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C
14. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
15. The physical path over which a message travels
A. Thermal
B. Medium
C. Protocol
D. Impulse
Answer : B
16. The collection of information stored in a database at a particular moment is?
A. View
B. Instance
C. Scheme
D. None of these
Answer : B
17. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
18. A lock that allows concurrent transactions to access different rows of the same table is known as a
A. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
19. The host part in a class A type of an IP address has
A. 12 bits
B. 16 bits
C. 24 bits
D. 28 bits
Answer : C
20. A relation is said to be in ………. If it doesnt contain partial dependency
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer : B
21. Log into a computer across an internet
A. IMAP
B. TELNET
C. POP3
D. Infrared
Answer : B
22. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
23. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
24. In client/server computing data are
A. sent only upon the client's request
. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
25. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
A. entity integrity rule
B. referential integrity constraint
C. composite attribute
D. action assertion
Answer : A
26. File organization that provides fast access to any arbitrary record
A. Hashed file
B. B-tree
C. Ordered file
D. Unordered file
Answer : A
27. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
28. Select the correct
i) A timestamp-based scheduler cant produce live lock
ii) Aggregate functions cant appear with HAVING clause.
iii) Isolation is a property of database transaction.

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : C
29. The database environment has all of the following components except:
A. users.
B. separate files.
C. database.
D. database administrator.
Answer : A
30. .................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
A. Baseband transmission
B. Broadband transmission
C. Digital transmission
D. Analog transmission
Answer : A
31. Encoding method which does not provide for synchronization
A. B8ZS
B. Manchester
C. RZ
D. NRZ-L
Answer : D
32. Which of the following operator preserves unmatched rows of the relations being joined?
A. Inner join
B. Outer join
C. union
D. Intersect
Answer : B
33. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
34. Generalization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : B
35. Only one communication channel is needed rather than n channels to transmit data between two communicating devices
A. parallel
B. serial
C. analog
D. digital
Answer : B
36. Tape storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : A
37. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
38. For large networks, _______ topology is used
A. Ring
B. Bus
C. Mesh
D. none of these
Answer : A
39. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
40. What does a field or a combination of fields that has a unique value called ?
A. Foreign key
B. Secondary key
C. Primary key
D. Alternate key
Answer : C
41. Three SQL, DDL, CREATE commands are
A. Schema, Base and Table
B. Schema, Table and View
C. Base, Table and Schema
D. Key, Base and Table
Answer : B
42. Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only
B. ii, only
C. ii, iii only
D. none of the above
Answer : D
43. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : B
44. The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. VDL
D. SDL
Answer : A
45. A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
46. Primary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
47. The overall design of a database is called
A. Subschema of the database
B. Schema of the database
C. Structure of the database
D. View of the database
Answer : B
48. Transaction processing is associated with everything below except A. producing detail, summary, or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D. maintaining data.
Answer : C
49. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
50. Which command is used to cancel privileges granted through the GRANT command ?
A. CANCEL
B. OVER
C. STOP
D. REVOKE
Answer : D

Sharing is caring