Home

Advance DBMS MCQ Solved Paper for RRB Group D

Thursday 9th of March 2023

Sharing is caring

1. Related fields in a database are grouped to form a
A. data file.
B. data record.
C. menu.
D. bank.
Answer : B
2. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
3. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
4. Data fragmentation is performed by the …… and each fragment is stored at…………..
A. DBMS, same site
B. OS ,same site
C. DBMS ,different site
D. OS ,different site
Answer : C
5. Unwanted energy from source other than the transmitter.
A. Attenuation
B. Distortion
C. Delay
D. Noise
Answer : D
6. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
7. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
8. Cross Product is a:
A. Unary Operator
B. Binary Operator
C. Ternary Operator
D. none of the above
Answer : B
9. What is the max data capacity of STP?
A. 1 Gbps
B. 56 Mbps
C. 100 Mbps
D. 256 Mbps
Answer : C
10. The statement
Every foreign-key value must match a primary-key value in an associated table
Is related to

A. View
B. Cursor defination
C. Referential intergrity
D. Trigger
Answer : C
11. By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
D. none
Answer : B
12. The number of cursors depend on the
A. number of queries
B. number of attributes
C. size of memory area
D. none of these
Answer : C
13. In RDBMS, Data is presented as a collection of
A. Relation
B. Table
C. Attribute
D. Entity
Answer : A
14. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
15. UML is stands for
A. Universal Modeling Language
B. Unified Modeling Language
C. United Modeling Language
D. Uni Modeling Language
Answer : B
16. The statement in SQL which allows to change the definition of a table is
A. Select
B. Update
C. Create
D. Alter
Answer : D
17. The collection of information stored in a database at a particular moment is?
A. View
B. Instance
C. Scheme
D. None of these
Answer : B
18. In case of entity integrity, the primary key may be
A. not Null
B. Null
C. both Null & not Null.
D. any value.
Answer : A
19. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
20. Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only
B. ii, only
C. ii, iii only
D. none of the above
Answer : D
21. Only one communication channel is needed rather than n channels to transmit data between two communicating devices
A. parallel
B. serial
C. analog
D. digital
Answer : B
22. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
23. Query processing is
A. converting data to insert in a database
B. translation of query to lower form
C. range of activities involved in extracting data from a database
D. none of the above
Answer : C
24. The class based addressing is known as
A. Classless addressing
B. Classful addressing
C. Classified addressing
D. Classical addressing
Answer : B
25. The database environment has all of the following components except:
A. users.
B. separate files.
C. database.
D. database administrator.
Answer : A
26. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
27. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
A. entity integrity rule
B. referential integrity constraint
C. composite attribute
D. action assertion
Answer : A
28. FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
29. A data manipulation command the combines the records from one or more tables is called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
Answer : C
30. If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
A. Noise
B. Delay
C. Dispersion
D. Attenuation
Answer : D
31. An advantage of the database management approach is
A. data is dependent on programs.
B. data redundancy increases.
C. data is integrated and can be accessed by multiple programs.
D. none of the above.
Answer : C
32. View never contains derived columns.
A. True
B. False
C. Cant say
D. none
Answer : A
33. A table that displays data redundancies yields ____________ anomalies
A. Insertion
B. Deletion
C. Update
D. All of the above
Answer : D
34. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
35. A composite attribute is converted to individual attributes in which of the following normal form ?
A. first
B. Second
C. third
D. fourth
Answer : A
36. Which of the following concurrency control schemes is not based on serializability property?
A. Two-phase locking
B. Timestamped based locking
C. Graph-based locking
D. none of the above
Answer : C
37. Natural mask for a Class A network
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. none of these
Answer : A
38. A ………… clause permits a view definition to be used in multiple places within a query.
A. where
B. exist
C. with
D. select
Answer : C
39. Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only
B. ii only
C. Both A and B
D. None of the above
Answer : C
40. …………… is responsible for using that the database remains in a consistent state despite system failure.
A. Storage manager
B. Admin
C. Transaction manager
D. none of the above
Answer : C
41. Authorization command in SQL
A. Allow
B. Access
C. Grant
D. none of the above
Answer : C
42. The ability to modify the conceptual schema without causing any change to the application program is known as
A. Physical data independence
B. Logical data independence
C. External data independence
D. Static data
Answer : B
43. Noisy channel has ……… .. types of protocols
A. two
B. three
C. four
D. none
Answer : B
44. Full form of CIDR
A. Classful Inter Domain Routing
B. Classless International Domain Routing
C. Classless Inter Domain Routing
D. none of these
Answer : C
45. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C
46. QBE
A. Query By Execution
B. Query By Example
C. Query By Extraction
D. None of the above.
Answer : B
47. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B
48. What are thedifferent types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
49. A relation that has no partial dependencies is in which normal form
A. First
B. Second
C. Third
D. BCNF
Answer : B
50. What does a field or a combination of fields that has a unique value called ?
A. Foreign key
B. Secondary key
C. Primary key
D. Alternate key
Answer : C

Sharing is caring