Home

Advance DBMS MCQ Solved Paper for UPSC IES

Thursday 9th of March 2023

Sharing is caring

1. In the architecture of a database system external level is the
A. physical level.
B. logical level.
C. conceptual level
D. view level.
Answer : D
2. Every Boyce-Codd normal form is in
A. 3NF
B. 2NF
C. 1NF
D. none of the above
Answer : D
3. An operation that will increase the length of a list is
A. insert
B. modify
C. lookup
D. none of the above
Answer : A
4. Which of the following is logical topology?
A. Bus
B. Ring
C. Star
D. None of these
Answer : B
5. Noiseless channel has ……… types of protocols.
A. 2
B. 3
C. 4
D. 5
Answer : A
6. A transaction which may not complete its execution successfully is termed as
A. Failed
B. Aborted
C. Blocked
D. Finished
Answer : B
7. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
8. What is the max data capacity of STP?
A. 1 Gbps
B. 56 Mbps
C. 100 Mbps
D. 256 Mbps
Answer : C
9. A functional dependency between two or more non-key attributes is called
A. Transitive dependency
B. Partial transitive dependency
C. Functional dependency
D. Partial functional dependency
Answer : A
10. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : B
11. By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
D. none
Answer : B
12. The privilege lists include
i) select
ii) insert
iii) update
iv) delete

A. only i)
B. only i) ii)
C. only i) ii) iii)
D. i) ii) iii) iv)
Answer : D
13. Which of the following works as a filter?
A. UPDATE
B. DROP
C. ALTER
D. SELECT
Answer : D
14. In which of the random-access method, stations do not sense the medium?
A. ALOHA
B. ETHERNET
C. CSMA/CA
D. CSMA/CD
Answer : A
15. The number of cursors depend on the
A. number of queries
B. number of attributes
C. size of memory area
D. none of these
Answer : C
16. A fragmentation is categorized in
A. 1 part
B. 2 part
C. 3 part
D. 4 part
Answer : C
17. In client/server computing data are
A. sent only upon the client's request
B. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
18. The database environment has all of the following components except:
A. users.
B. separate files.
C. database.
D. database administrator.
Answer : A
19. Database locking concept is used to solve the problem of
A. Lost Update
B. Uncommitted Dependency
C. Inconsistent Data
D. All of the above
Answer : D
20. Electromagnetic spectrum included in radiowaves are
i) Super High Frequency (SHF)
ii) Very High Frequency (VHF)
iii) Ultra High Frequency (UHF)
iv) High Frequencies (HF)

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : C
21. The method of access which uses key transformation is known as
A. direct.
B. hash.
C. random.
D. sequential.
Answer : B
22. The class based addressing is known as
A. Classless addressing
B. Classful addressing
C. Classified addressing
D. Classical addressing
Answer : B
23. In which of the following transmissions, we can send data by grouping n bits at a time instead of a single bit?
A. parallel
B. serial
C. analog
D. digital
Answer : A
24. In two-phase locking protocol the two phases are
A. growing phase and shrinking phase
B. execution phase and blocking phase.
C. running phase and sleeping phase.
D. none of the above
Answer : A
div class="panel-body">25. Object based data models are used in describing the abstraction of the following levels?
A. Conceptual and view
B. Only physical
C. Physical and conceptual
D. Only conceptual
Answer : A
26. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
27. Select the incorrect statement(s)
i) Foreign key values can be left blank
ii) In SQL duplicates may be present
iii) Theta join operation doesnt remove duplicate columns.
iv) NULL value means string of blank characters.

A. i ,iii only
B. ii, iv only
C. iii, iv only
D. ii, iii, iv
Answer : C
28. What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only
B. i, ii and iv only
C. ii, iii and iv only
D. i, iii and iv only
Answer : B
29. The output of the Data Definition Language is stored in the
A. view table
B. schema
C. metadata
D. all of the above.
Answer : C
30. Data integrity refers to
A. the uniqueness of the data in a database
B. the correctness and completeness of the data in a database
C. the un redundancies of the data in a database
D. Data independence of the database
Answer : B
31. An association of several structure of a data base can be expressed graphically by?
A. Tuple
B. Record
C. Relationship
D. Field
Answer : C
32. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
33. The transaction consists of all statements executed between
A. the begin transaction and end transaction
B. the start transaction and end transaction
C. the begin transaction and finish transaction
D. none of the above.
Answer : A
34. Size of source and destination address in IP header
A. 4 bits
B. 8 bits
C. 12 bits
D. 32 bits
Answer : D
35. For large networks, _______ topology is used
A. Ring
B. Bus
C. Mesh
D. none of these
Answer : A
36. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
37. Thermal noise is often referred to as ............... noise, because it affects uniformly the different frequencies.
A. Gray
B. White
C. Blue
D. Black
Answer : B
38. What does a field or a combination of fields that has a unique value called ?
A. Foreign key
B. Secondary key
C. Primary key
D. Alternate key
Answer : C
39. The minimal set of super key is called
A. Primary key
B. Secondary key
C. Candidate key
D. Foreign key
Answer : C
40. Which of the following file organization provides very fast access to any arbitrary record of a file?
A. Ordered file
B. Unordered file
C. Hashed file
D. B-tree
Answer : C
41. An advantage of the database management approach is
A. data is dependent on programs.
B. data redundancy increases.
C. data is integrated and can be accessed by multiple programs.
D. none of the above.
Answer : C
42. Which of the following is not a constraint on a single relation?
A. check
B. unique
C. not null
D. is duplicate
Answer : D
43. If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
A. Noise
B. Delay
C. Dispersion
D. Attenuation
Answer : D
44. Cross Product is a:
A. Unary Operator
B. Binary Operator
C. Ternary Operator
D. none of the above
Answer : B
45. Only one communication channel is needed rather than n channels to transmit data between two communicating devices
A. parallel
B. serial
C. analog
D. digital
Answer : B
46. The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
Answer : A
47. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
48. The maximum number of children in a B-tree of order m is
A. m+1
B. m
C. m-1
D. m/2
Answer : B
49. Triggers are also called
A. active rules
B. passive rules
C. inferences
D. none of the above
Answer : A
50. A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D

Sharing is caring