Home

Advance DBMS MCQ Solved Paper for SSC CHSL

Thursday 9th of March 2023

Sharing is caring

1. Unwanted energy from source other than the transmitter.
A. Attenuation
B. Distortion
C. Delay
D. Noise
Answer : D
2. Radio frequencies below ............. are more suitable for omnidirectional applications.
A. 300MHz
B. 1GHz
C. 5GHz
D. 10 GHz
Answer : B
3. The collection of information stored in a database at a particular moment is?
A. View
B. Instance
C. Scheme
D. None of these
Answer : B
4. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
5. In case of entity integrity, the primary key may be
A. not Null
B. Null
C. both Null & not Null.
D. any value.
Answer : A
6. The method of access which uses key transformation is known as
A. direct.
B. hash.
C. random.
D. sequential.
Answer : B
7. An association of several structure of a data base can be expressed graphically by?
A. Tuple
B. Record
C. Relationship
D. Field
Answer : C
8. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
9. When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
A. first
B. second
C. third
D. fourth
Answer : C
10. Database locking concept is used to solve the problem of
A. Lost Update
B. Uncommitted Dependency
C. Inconsistent Data
D. All of the above
Answer : D
11. Primary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
12. Full form of CIDR
A. Classful Inter Domain Routing
B. Classless International Domain Routing
C. Classless Inter Domain Routing
D. none of these
Answer : C
13. The privilege lists include
i) select
ii) insert
iii) update
iv) delete

A. only i)
B. only i) ii)
C. only i) ii) iii)
D. i) ii) iii) iv)
Answer : D
14. .................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
A. Baseband transmission
B. Broadband transmission
C. Digital transmission
D. Analog transmission
Answer : A
15. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
16. An advantage of the database management approach is
A. data is dependent on programs.
B. data redundancy increases.
C. data is integrated and can be accessed by multiple programs.
D. none of the above.
Answer : C
17. An entity set which have sufficient attributes to form a primary key
A. Tree structure
B. Subtree structure
C. Strong entity set
D. Table structure
Answer : C
18. The number of cursors depend on the
A. number of queries
B. number of attributes
C. size of memory area
D. none of these
Answer : C
19. Which of the following aggregate function doesnt ignore NULLs in its results?
A. COUNT
B. COUNT(*)
C. MAX
D. none of these
Answer : B
20. Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only
B. ii only
C. Both A and B
D. None of the above
Answer : C
21. DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions
A. Backup
B. Recovery
C. Grant
D. Troubleshooting
Answer : B
22. The class based addressing is known as
A. Classless addressing
B. Classful addressing
C. Classified addressing
D. Classical addressing
Answer : B
23. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
25. Functional dependencies are generalization of
A. Relation dependencies
B. Data dependencies
C. key dependencies
D. none of the above
Answer : A
26. Select the incorrect statement(s)
i) Foreign key values can be left blank
ii) In SQL duplicates may be present
iii) Theta join operation doesnt remove duplicate columns.
iv) NULL value means string of blank characters.

A. i ,iii only
B. ii, iv only
C. iii, iv only
D. ii, iii, iv
Answer : C
27. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
28. In a Hierarchical model records are organized as
A. Graph.
B. List.
C. Links.
D. Tree.
Answer : D
29. Three SQL, DDL, CREATE commands are
A. Schema, Base and Table
B. Schema, Table and View
C. Base, Table and Schema
D. Key, Base and Table
Answer : B
30. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
31. The raw facts and figures are:
A. Data
B. Data field
C. DBMS
D. DBASE
Answer : A
32. In which of the random-access method, stations do not sense the medium?
A. ALOHA
B. ETHERNET
C. CSMA/CA
D. CSMA/CD
Answer : A
33. A lock that allows concurrent transactions to access different rows of the same table is known as a
A. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
34. Mail services are available to network users through the
A. Session layer
B. Presentation layer
C. Application layer
D. Transport layer
Answer : C
35. An entity set that does not have sufficient attributes to form a primary key is a
A. strong entity set.
B. weak entity set.
C. simple entity set.
D. primary entity set.
Answer : B
36. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @
37. A transaction which completes successfully is called
A. Granted
B. Committed
C. Compensated
D. Accomplished
Answer : B
38. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
39. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
40. Which of the following is not proper state of transaction ?
A. Partially aborted
B. Partially committed
C. Aborted
D. Committed
Answer : A
41. The mode in which data item may be locked
A. Partner
B. Mutual
C. Exclusive
D. Atomic
Answer : C
42. The output of the Data Definition Language is stored in the
A. view table
B. schema
C. metadata
D. all of the above.
Answer : C
43. Technique used in log based recovery
A. Immediate database modification
B. Graph-based recovery
C. key dependencies
D. none of the above
Answer : A
44. Data integrity refers to
A. the uniqueness of the data in a database
B. the correctness and completeness of the data in a database
C. the un redundancies of the data in a database
D. Data independence of the database
Answer : B
45. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
46. A logical schema
A. is the entire database.
B. is a standard way of organizing information into accessible parts.
C. describes how data is actually stored on disk.
D. both A) and C)
Answer : A
47. Relational Algebra is
A. Data Definition Language.
B. Data Manipulation Language
C. Procedural query Language
D. None of the above
Answer : C
48. A …………… is a memory area where data are processed.
A. view
B. trigger
C. cursor
D. none of the above
Answer : C
49. Which topology requires a central controller or hub?
A. Ring
B. Tree
C. Switch
D. Graph
Answer : C
50. Which of the following submit and execute query at run time?
A. Static SQL
B. Dynamic SQL
C. both
D. none of these
Answer : B

Sharing is caring