Home

DBMS MCQ Solved Paper for IBPS RRB

Thursday 9th of March 2023

Sharing is caring

1. The middleware databases in which the business rules act are applicable to _______ tier architectures
A. Single
B. Three
C. Two
D. None
Answer : B
2. The graphical representation of a query is .
A. B-Tree
B. graph
C. Query Tree
D. directed graph
Answer : C
3. _____ First proposed the process of normalization.
A. Edgar. W
B. Edward Stephen
C. Edgar F. Codd
D. Edward Codd
Answer : C
4. A weak entity has an ______ dependency on its owner entity, which can be used for both ON UPDATE and ON DELETE.
A. Direct
B. Indirect
C. Existence
D. No
Answer : C
5. In multiple granularity of locks SIX lock is compatible with
A. IX
B. IS
C. S
D. SIX
Answer : B
6. The fact that information in the data warehouse changes far less often and may be regarded as non-real-time with periodic updating; This implies that data warehouses are _______
A. Volatile
B. Non - Volatile
C. Logical
D. Physical
Answer : B
7. A relational database developer refers to a record as
A. an attribute
B. a tuple
C. a criteria
D. a relation
Answer : B
8. The values of the attribute describes a particular
A. Entity set
B. File
C. Entity instance
D. Organization
Answer : C
9. The full form of GUI is _________
A. Government Union Internet
B. Graphical Unit Interface
C. Graphical User Interface
D. Graphical University Interface
Answer : C
10. In 2NF
A. No functional dependencies (FDs) exist.
B. No multivalued dependencies (MVDs) exist.
C. No partial FDs exist.
D. No partial MVDs exist.
Answer : C
11. Which of the following is not a recovery technique?
A. Deferred update
B. Immediate update
C. Two-phase commit
D. Shadow paging
Answer : C
12. Which of the following is not a characteristic of a relational database model?
A. Table
B. Tree like structure
C. Complex logical relationship
D. Records
Answer : B
13. SQL server stores index information in the _____system table
A. system indexes
B. syst indexes
C. sys indexes
D. sysind
Answer : C
14. An advantage of the database management approach is
A. data redundancy increases
B. data is dependent on programs
C. data is integrated and can be accessed by multiple programs
D. none of the above
Answer : C
15. DBMS helps achieve
A. Centralized control of data
B. Data independence
C. Both A and B
D. Neither A nor B
Answer : C
16. The fact that all employees of a particular organization should not have salaries more than $10000 is a _____ constraint.
A. Schema
B. Tuple
C. Domain
D. Relational
Answer : C
17. The set of all values that can be taken by the attribute is called as _______ of the attribute.
A. Tuple
B. Cardinality
C. Degree
D. Domain
Answer : D
18. A list consists of last names, first names, addresses and pin codes. If all people in the list have the same last name and same pin code a useful key would be
A. the pin code
B. the last name
C. the compound key first name and last name
D. Tr from next page
Answer : C
19. Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only
B. ii-only
C. Both of them
D. None of them
Answer : C
20. A relation is in attribute of other composite key. if an attribute of a composite key is dependent on an
A. 2NF
B. 3NF
C. BCNF
D. 1NF
Answer : B
21. What is data integrity?
A. It is the data contained in database that is non redundant.
B. It is the data contained in database that is accurate and consistent.
C. It is the data contained in database that is secured.
D. It is the data contained in database that is shared.
Answer : B
22. The ____ operator joins two or more conditions and displays rows only if that rows data satisfies all conditions specified.
A. OR
B. AND
C. NOT
D. ALL
Answer : B
23. Checkpoints are a part of
A. Recovery measures.
B. Security measures.
C. Concurrency measures.
D. uthorization measures.
Answer : A
24. The ______ indexes are forced to store only record IDs in the data structure and require at least one additional I/O Operation to retrieve the actual record.
A. Clustered
B. Hashed
C. Un-clustered
D. Collision
Answer : C
25. Which of the following addressing modes permits relocation without any change over in the code?
A. Indirect addressing
B. Indexed addressing
C. PC relative addressing
D. Base register addressing
Answer : B
26. If a transaction T has obtained an exclusive lock on item Q, then T can
A. read Q
B. write Q
C. both read and write Q
D. write Q but not read Q
Answer : C
27. The default level of consistency in SQL is
A. repeatable read
B. read committed
C. read uncommitted
D. serializable
Answer : D
28. Change Staff table by removing default of Assistant for position column
A. ALTER TABLE Staff ALTER position DROP DEFAULT;
B. ALTER TABLE Staff ALTER position DEFAULT;
C. ALTER TABLE Staff ALTER DROP DEFAULT;
D. MODIFY Staff ALTER position DROP DEFAULT;
Answer : A
29. ______defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
A. Instance
B. Program
C. Schema
D. Super Key
Answer : C
30. The drawback of shadow paging technique are
A. Commit overhead
B. Data fragmentation
C. Garbage collection
D. All of these
Answer : D
31. Union operator is a :
A. Unary Operator
B. Ternary Operator
C. Binary Operator
D. Not an operator
Answer : C
32. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
A. left outer join
B. right outer join
C. full outer join
D. inner join
Answer : D
33. The one guideline to be followed while designing the database is
A. A database design may be ambiguous.
B. It should avoid/reduce the redundancy.
C. Unrelated data should be in the same table so that updating the data will be easy.
D. An entity should not have attributes.
Answer : B
34. Which of the following aggregate functions does not ignore nulls in its results?.
A. COUNT .
B. COUNT (*)
C. MAX
D. MIN
Answer : B
35. Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
Answer : C
36. The normalization was first proposed by .
A. Code
B. Codd
C. Boyce Codd
D. Boyce
Answer : B
37. The _______ is a set of programs to use and / or modify this data.
A. DBMS
B. System
C. Program
D. Software
Answer : A
38. Relationships among relationships can be represented in an-E-R model using
A. Aggregation
B. Association
C. Weak entity sets
D. Weak relationship sets
Answer : A
39. The normal form that is not necessarily dependency preserving is
A. 2NF
B. 3NF
C. BCNF
D. 4NF
Answer : A
40. In SQL the word natural can be used with
A. inner join
B. full outer join
C. right outer join
D. all of the above
Answer : A
41. Which of the following is not a property of transactions?
A. Atomicity
B. Concurrency
C. Isolation
D. Durability
Answer : B
42. What are the desirable properties of a decomposition
A. Partition constraint.
B. Dependency preservation.
C. Redundancy.
D. Security.
Answer : B
43. A ______ module is typically designed so that it will run on a user workstation or personal computer.
A. Software
B. Server
C. Program
D. Client
Answer : D
44. The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint.
B. Index.
C. Integrity constraint.
D. Functional dependency.
Answer : A
45. HSAM stands for ……….
A. Hierarchic Standard Access Method
B. Hierarchic Sequential Access Method
C. Hierarchic Sequential and Method
D. Hierarchic Standard and Method
Answer : B
46. ______ keyword is used to find the number of values in a column.
A. TOTAL
B. ADD
C. COUNT
D. SUM
Answer : C
47. For using a specific database …………… command is used.
A. use database
B. database name use
C. Both A & B
D. None of them
Answer : A
48. Dependency preservation is not guaranteed in
A. BCNF
B. 3NF
C. PJNF
D. DKNF
Answer : A
49. Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are
A. m+n and 0
B. m+n and |m-n|
C. mn and 0
D. mn and m+n
Answer : C
50. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data
C. programs are not dependent on the logical attributes of data
D. both B and C
Answer : D

Sharing is caring