Home

Advance DBMS MCQ Solved Paper for GMAT

Thursday 9th of March 2023

Sharing is caring

1. For large networks, _______ topology is used
A. Ring
B. Bus
C. Mesh
D. none of these
Answer : A
2. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @
3. In this data model each record can hae more than one parent
A. Hierarchical model
B. E-R model
C. Network based model
D. none of these
Answer : C
4. The output of the Data Definition Language is stored in the
A. view table
B. schema
C. metadata
D. all of the above.
Answer : C
5. Encoding method which does not provide for synchronization
A. B8ZS
B. Manchester
C. RZ
D. NRZ-L
Answer : D
6. Commit operation …………… writes the changes made to the database.
A. temporarily
B. permanently
C. none of these
D. all of the above
Answer : B
7. Which of the following produces the relation that has attributes of R1 and R2
A. Cartesian product
B. Difference
C. Intersection
D. Product
Answer : A
8. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
9. The minimal set of super key is called
A. Primary key
B. Secondary key
C. Candidate key
D. Foreign key
Answer : C
10. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
11. A relation which is in 3NF is
A. in 1NF also
B. in 2NF also
C. free from transitive dependencies
D. All of these
Answer : D
12. Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?
A. BCNF
B. Second
C. Third
D. Fourth
Answer : A
13. Data fragmentation is performed by the …… and each fragment is stored at…………..
A. DBMS, same site
B. OS ,same site
C. DBMS ,different site
D. OS ,different site
Answer : C
14. EEPROM
A. Electrically Extractable Programmable Read Only Memory
B. Electrically Erasable Programmable Read Only Memory
C. Electronically Erasable Programmable Read Only Memory
D. Electrically Erasable Programmable Read Only Memory
Answer : D
15. Object based data models are used in describing the abstraction of the following levels?
A. Conceptual and view
B. Only physical
C. Physical and conceptual
D. Only conceptual
Answer : A
16. A subschema expresses
A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
Answer : C
17. The class based addressing is known as
A. Classless addressing
B. Classful addressing
C. Classified addressing
D. Classical addressing
Answer : B
18. Radio frequencies below ............. are more suitable for omnidirectional applications.
A. 300MHz
B. 1GHz
C. 5GHz
D. 10 GHz
Answer : B
19. Which of the following is not a database object?
A. index
B. sequence
C. cursor
D. trigger
Answer : C
20. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
21. Which of the following operator preserves unmatched rows of the relations being joined?
A. Inner join
B. Outer join
C. union
D. Intersect
Answer : B
22. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
23. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
24. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed r aborted
C. either committed or failed
D. none of these
Answer : D
25. Volatile storage
A. loses its contents when power is switched off.
B. doesnt loses its contents when power is switched off.
C. creates backup when power is switched off.
D. none
Answer : A
26. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
27. An entity set that does not have sufficient attributes to form a primary key is a
A. strong entity set.
B. weak entity set.
C. simple entity set.
D. primary entity set.
Answer : B
28. In the architecture of a database system external level is the
A. physical level.
B. logical level.
C. conceptual level
D. view level.
Answer : D
29. A …………… is a memory area where data are processed.
A. view
B. trigger
C. cursor
D. none of the above
Answer : C
30. Data Manipulation Language DML) is not to
A. Create information table in the Database
B. Insertion of new information into the Database
C. Deletion of information in the Database
D. Modification of information in the Database
Answer : A
31. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
32. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
33. Which of the following concurrency control schemes is not based on serializability property?
A. Two-phase locking
B. Timestamped based locking
C. Graph-based locking
D. none of the above
Answer : C
34. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
35. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
36. In an E-R diagram attributes are represented by
A. rectangle.
B. square.
C. ellipse.
D. triangle.
Answer : C
37. File organization that provides fast access to any arbitrary record
A. Hashed file
B. B-tree
C. Ordered file
D. Unordered file
Answer : A
38. A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
39. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
40. As a side-effect of database update ,the system automatically executes a statement called
A. a view
B. a grant permission
C. a trigger
D. all of the above
Answer : C
41. Transaction processing is associated with everything below except
A. producing detail, summary, or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D. maintaining data.
Answer : C
42. Three SQL, DDL, CREATE commands are
A. Schema, Base and Table
B. Schema, Table and View
C. Base, Table and Schema
D. Key, Base and Table
Answer : B
43. Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only
B. ii, only
C. ii, iii only
D. none of the above
Answer : D
44. In client/server computing data are
A. sent only upon the client's request
B. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
45. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
46. Cross Product is a:
A. Unary Operator
B. Binary Operator
C. Ternary Operator
D. none of the above
Answer : B
47. Expand the acronym OLAP
A. Object Linked Access Program
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
48. elated fields in a database are grouped to form a
A. data file.
B. data record.
C. menu.
D. bank.
Answer : B
49. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
50. What is ACID properties of Transactions?
A. Atomicity, Consistency, Isolation, Database
B. Atomicity, Consistency, Isolation, Durability
C. Atomicity, Consistency, Inconsistent, Durability
D. Automatically, Concurrency, Isolation, Durability
Answer : B

Sharing is caring