Home

ISRO Recruitment - Advance DBMS 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. In mesh topology, if the number of devices is n , then the number of ports present in each device is
A. n
B. n+1
C. n-1
D. n/2
Answer : C
2. The transaction consists of all statements executed between
A. the begin transaction and end transaction
B. the start transaction and end transaction
C. the begin transaction and finish transaction
D. none of the above.
Answer : A
3. The physical path over which a message travels
A. Thermal
B. Medium
C. Protocol
D. Impulse
Answer : B
4. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
5. RAID
A. Redundant Arrays of Independent Disks
B. Redundant Arrays of Independent Drives
C. Redundant Arrays of Interconnected Drives
D. Redundant Arrays of Interconnected Disks
Answer : A
6. DBMS helps achieve
A. Data independence
B. Centralized control of data
C. Neither A) nor B)
D. both A) and B)
Answer : D
7. Only one communication channel is needed rather than n channels to transmit data between two communicating devices
A. parallel
B. serial
C. analog
D. digital
Answer : B
8. Which of the following is not an Aggregate function?
A. Min
B. Max
C. Select
D. Avg
Answer : C
9. Unwanted energy from source other than the transmitter.
A. Attenuation
B. Distortion
C. Delay
D. Noise
Answer : D
10. A transaction is said to have terminated if it has
A. either committed or aborted
B. either partially committed or aborted
C. either committed or failed
D. none of these
Answer : D
11. A …………… is a memory area where data are processed.
A. view
B. trigger
C. cursor
D. none of the above
Answer : C
12. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
13. The access protocol used by traditional Ethernet
A. CSMA/CA
B. CSMA/CD
C. CSMA
D. Token ring
Answer : B
14. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @
15. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
16. Which of the following concurrency control schemes is not based on serializability property?
A. Two-phase locking
B. Timestamped based locking
C. Graph-based locking
D. none of the above
Answer : C
17. Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii iii
Answer : D
18. A type of query that is placed within a WHERE or HAVING clause of another query is called
A. Super query
B. Sub query
C. Master query
D. Multi-query
Answer : B
19. In which of the following transmissions, we can send data by grouping n bits at a time instead of a single bit?
A. parallel
B. serial
C. analog
D. digital
Answer : A
20. Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only
B. ii, only
C. ii, iii only
D. none of the above
Answer : D
21. Related fields in a database are grouped to form a
A. data file.
B. data record.
C. menu.
D. bank.
Answer : B
22. The minimal set of super key is called
A. Primary key
B. Secondary key
C. Candidate key
D. Foreign key
Answer : C
23. In client/server computing data are
A. sent only upon the client's request
B. sent in complete copies for the client to filter and sort
C. never sent to the client machine
D. sent in very large sections to save processing time
Answer : A
24. View never contains derived columns.
A. True
B. False
C. Cant say
D. none
Answer : A
25. A composite attribute is converted to individual attributes in which of the following normal form ?
A. first
B. Second
C. third
D. fourth
Answer : A
26. The privilege lists include
i) select
ii) insert
iii) update
iv) delete

A. only i)
B. only i) ii)
C. only i) ii) iii)
D. i) ii) iii) iv)
Answer : D
27. An advantage of the database management approach is
A. data is dependent on programs.
B. data redundancy increases.
C. data is integrated and can be accessed by multiple programs.
D. none of the above.
Answer : C
28. Mail services are available to network users through the
A. Session layer
B. Presentation layer
C. Application layer
D. Transport layer
Answer : C
29. The exists construct returns the value true, if the argument subquery is
A. empty
B. nonempty
C. contains null values
D. none of the above
Answer : B
30. Which of the following statement returns data to the host variables one at a time?
A. SELECT
B. RETURN
C. FETCH
D. GET
Answer : C
31. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
32. A logical description of some portion of database that is required by a user to perform task is called as
A. System View
B. User View
C. Logical View
D. Data View
Answer : B
33. The method of access which uses key transformation is known as
A. direct.
B. hash.
C. random.
D. sequential.
Answer : B
34. The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only
B. ii and iv only
C. ii and iv only
D. i, iv only
Answer : C
35. Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
Answer : C
36. Select the incorrect statement
A. BCNF is stronger than 3NF
B. Relational algebra is a non-procedural language
C. Every conflict serializable schedule is view serializable.
D. none of the above
Answer : B
37. ............... noise is caused by the random motion of the electrons in a wire and is avoidable.
A. Thermal
B. Intermodulation
C. Cross talk
D. Impulse
Answer : A
38. A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only
B. ii and iii only
C. i and iii only
D. iii and iv only
Answer : D
39. Technique(s) used for data recovery after any failure
A. Logging
B. Recovery manager
C. Both A and B are true
D. Both A and B are false
Answer : C
40. The command used to delete a particular column in a relation
A. UPDATE
B. DROP
C. ALTER
D. DELETE
Answer : C
41. In E-R Diagram weak entity set are represented by
A. Ellipse
B. Dashed ellipse
C. Dashed Rectangle
D. Doubled Rectangle
Answer : D
42. When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
A. first
B. second
C. third
D. fourth
Answer : C
43. Aggregate functions are also called
A. serial functions
B. non-serial functions
C. row functions
D. column functions
Answer : D
44. The union of primary keys of a related entity becomes …………. Of a relation.
A. primarykey
B. superkey
C. candidatekey
D. foreignkey
Answer : B
45. Database locking concept is used to solve the problem of
A. Lost Update
B. Uncommitted Dependency
C. Inconsistent Data
D. All of the above
Answer : D
46. Noiseless channel has ……… types of protocols.
A. 2
B. 3
C. 4
D. 5
Answer : A
47. Commit operation …………… writes the changes made to the database.
A. temporarily
B. permanently
C. none of these
D. all of the above
Answer : B
48. Which of the following produces the relation that has attributes of R1 and R2
A. Cartesian product
B. Difference
C. Intersection
D. Product
Answer : A
49. In an Entity-Relationship Diagram Diamonds represents
A. Attributes
B. Multi-valued attributes
C. Weak entity set
D. Relationship sets
Answer : D
50. Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only
B. ii only
C. Both A and B
D. None of the above
Answer : C

Sharing is caring