Home

Advance DBMS MCQ Solved Paper for IBPS RRB

Thursday 9th of March 2023

Sharing is caring

1. A lock that allows concurrent transactions to access different rows of the same table is known as a
A. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
2. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
3. In an E-R diagram attributes are represented by
A. rectangle.
B. square.
C. ellipse.
D. triangle.
Answer : C
4. FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
5. DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A) nor B)
D. both A) and B)
Answer : D
6. Count function in SQL returns the number of
A. values.
B. distinct values.
C. groups.
D. columns.
Answer : A
7. .................. is the loss of energy as the signal propagates outward, where the amount of energy depends on the frequency.
A. Noise
B. Delay distortion
C. Attenuation distortion
D. Dispersion
Answer : C
8. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
9. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
10. B-Tree is used for
A. searching data
B. storing data
C. both A and B
D. none of these
Answer : A
11. An operation that will increase the length of a list is
A. insert
B. modify
C. lookup
D. none of the above
Answer : A
12. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
13. Encoding method which does not provide for synchronization
A. B8ZS
B. Manchester
C. RZ
D. NRZ-L
Answer : D
14. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
15. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
16. Object based data models are used in describing the abstraction of the following levels?
A. Conceptual and view
B. Only physical
C. Physical and conceptual
D. Only conceptual
Answer : A
17. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : B
18. An entity set that does not have sufficient attributes to form a primary key is a
A. strong entity set.
B. weak entity set.
C. simple entity set.
D. primary entity set.
Answer : B
19. In an Entity-Relationship Diagram Ellipses represents
A. Attributes
B. Weak entity set
C. Relationship sets
D. Multi-valued attributes
Answer : A
20. Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?
A. BCNF
B. Second
C. Third
D. Fourth
Answer : A
21. The syntax to select all column from the table is
A. select all from tablename
B. select * from tablename
C. select from tablename
D. none of these
Answer : B
22. An association of several structure of a data base can be expressed graphically by?
A. Tuple
B. Record
C. Relationship
D. Field
Answer : C
23. The physical path over which a message travels
A. Thermal
B. Medium
C. Protocol
D. Impulse
Answer : B
24. A logical description of some portion of database that is required by a user to perform task is called as
A. System View
B. User View
C. Logical View
D. Data View
Answer : B
25. In ………… paging we make copy of the current page table.
A. pysical
B. logical
C. shadow
D. duplicate
Answer : C
26. Radio frequencies below ............. are more suitable for omnidirectional applications.
A. 300MHz
B. 1GHz
C. 5GHz
D. 10 GHz
Answer : B
27. Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only
B. ii and iii only
C. ii only
D. i only
Answer : D
28. In this data model each record can hae more than one parent
A. Hierarchical model
B. E-R model
C. Network based model
D. none of these
Answer : C
29. Query processing is
A. converting data to insert in a database
B. translation of query to lower form
C. range of activities involved in extracting data from a database
D. none of the above
Answer : C
30. In case of entity integrity, the primary key may be
A. not Null
B. Null
C. both Null & not Null.
D. any value.
Answer : A
31. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
32. Unwanted energy from source other than the transmitter.
A. Attenuation
B. Distortion
C. Delay
D. Noise
Answer : D
33. A type of query that is placed within a WHERE or HAVING clause of another query is called
A. Super query
B. Sub query
C. Master query
D. Multi-query
Answer : B
34. Disk storage is referred to as
A. sequential access storage
B. direct access storage
C. random access storage
D. none of the above
Answer : B
35. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
36. .................. occurs due to velocity of propagation the frequency varies. Thus various frequency components of a signal arrive at the receiver at different times.
A. Noise
B. Delay distortion
C. Attenuation distortion
D. Dispersion
Answer : B
37. Expand the acronym OLAP
A. Object Linked Access Program
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
38. The host part in a class A type of an IP address has
A. 12 bits
B. 16 bits
C. 24 bits
D. 28 bits
Answer : C
39. In mesh topology, if the number of devices is n , then the number of ports present in each device is
A. n
B. n+1
C. n-1
D. n/2
Answer : C
40. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
41. Select the correct statement
i) Aggregate functions work on a group of data and return a single value.
ii) ODBC connects the frontend with the database without considering its compatibility
iii) View definition cant be used at multiple places through with clause .

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : A
42. The command used to delete a particular column in a relation
A. UPDATE
B. DROP
C. ALTER
D. DELETE
Answer : C
43. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
44. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
45. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
46. When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
A. first
B. second
C. third
D. fourth
Answer : C
47. DECLARE is a(an)
A. executable statement.
B. declarative statement.
C. Ordered file
D. none of the above
Answer : B
48. By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
D. none
Answer : B
49. Which of the following is not an Aggregate function?
A. Min
Max
C. Select
D. Avg
Answer : C
50. Select the incorrect statement
A. BCNF is stronger than 3NF
B. Relational algebra is a non-procedural language
C. Every conflict serializable schedule is view serializable.
D. none of the above
Answer : B

Sharing is caring