Home

JEE Main - DBMS 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. In E-R Diagram total participation is represented by
A. Double lines
B. Single line
C. Dashed lines
D. Triangle
Answer : A
2. A ______ module is typically designed so that it will run on a user workstation or personal computer.
A. Software
B. Server
C. Program
D. Client
Answer : D
3. The data models defined by ANSI/SPARC architecture are
A. Conceptual, physical and internal
B. Conceptual, view and external
C. Logical, physical and internal
D. Logical, physical and view
Answer : D
4. The middleware databases in which the business rules act are applicable to _______ tier architectures
A. Single
B. Three
C. Two
D. None
Answer : B
5. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data
C. programs are not dependent on the logical attributes of data
D. both B and C
Answer : D
6. A ____ key specifies a uniqueness constraint that no two distinct tuples in any state r of relation R can have the same value for super key.
A. Sub
B. Parent
C. Candidate
D. Super
Answer : D
7. ______contains information that defines valid values that are stored in a column or data type.
A. Default
B. Index
C. Rule
D. View
Answer : B
8. Relational Algebra does not have
A. Selection operator.
B. Projection operator.
C. Aggregation operators.
D. Division operator.
Answer : C
9. The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree
A. m - 1
B. m + 1
C. m * m
D. m
Answer : D
10. An advantage of the database management approach is
A. data redundancy increases
B. data is dependent on programs
C. data is integrated and can be accessed by multiple programs
D. none of the above
Answer : C
11. ______ keyword is used to find the number of values in a column.
A. TOTAL
B. ADD
C. COUNT
D. SUM
Answer : C
12. The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint.
B. Index.
C. Integrity constraint.
D. Functional dependency.
Answer : A
13. The _____ category includes storage media that can be operated on directly by the computers central processing unit.
A. Primary storage
B. Secondary Storage
C. All
D. Tertiary Storage
Answer : A
14. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer systems.
A. None
B. Multi
C. Single
D. Concurrent
Answer : C
15. The keyword to eliminate duplicate rows from the query result in SQL is
A. DISTINCT
B. NO DUPLICATE
C. UNIQUE
D. None of the above
Answer : C
16. Which of the following is not a logical database structure?
A. Chain
B. Network
C. Tree
D. Relational
Answer : A
17. The ______ key of a relation is the attribute (column) or collection of attributes, which uniquely identify a given tuple.
A. Primary
B. Foreign
C. Candidate
D. Alternate
Answer : A
18. The relational model is based on the concept that data is organized and stored in two-dimensional tables called ______
A. Fields
B. Records
C. Relations
D. Keys
Answer : C
19. Employees in a company are each assigned their own office, i.e. for each employee there exists a unique office and for each office there exists a unique employee; This statement is an example of ____ type of relation.
A. 1:1
B. 1: Many
C. Many: One
D. Many : Many
Answer : A
20. Immediate database modification technique uses
A. Both undo and redo.
B. Undo but no redo.
C. Redo but no undo.
D. Neither undo nor redo.
Answer : A
21. DROP is a statement in SQL.
A. Query
B. Embedded SQL
C. DDL
D. DCL
Answer : C
22. Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common because it is non volatile.
A. RAM
B. Flash
C. Hard Disk
D. Secondary
Answer : B
23. An advantage of views is
A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
Answer :
24. Relationships among relationships can be represented in an-E-R model using
A. Aggregation
B. Association
C. Weak entity sets
D. Weak relationship sets
Answer : A
25. DBMS helps achieve
A. Centralized control of data
B. Data independence
C. Both A and B
D. Neither A nor B
Answer : C
26. A transaction is in state after the final statement has been executed.
A. partially committed
B. active
C. committed
D. none of the above
Answer : C
27. Checkpoints are a part of
A. Recovery measures.
B. Security measures.
C. Concurrency measures.
D. uthorization measures.
Answer : A
28. The drawback of shadow paging technique are
A. Commit overhead
B. Data fragmentation
C. Garbage collection
D. All of these
Answer : D
29. Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only
B. ii-only
C. Both of them
D. None of them
Answer : C
30. The graphical representation of a query is .
A. B-Tree
B. graph
C. Query Tree
D. directed graph
Answer : C
31. The cost of reading and writing temporary files while evaluating a query can be reduced by
A. building indices
B. pipelining
C. join ordering
D. none of the above
Answer : B
32. Which of the following is not a consequence of non-normalized database?
A. Update Anomaly
B. Insertion Anomaly
C. Redundancy
D. Lost update problem
Answer : D
33. Which of the following is not comparison operator?
A. <>
B. <
C. =<
D. >=
Answer : C
34. DBMS is a collection of _____ that enables user to create and maintain a database.
A. Keys
B. Program
C. Translators
D. Language Activity
Answer : B
35. Relations produced from an E-R model will always be
A. First normal form.
B. Second normal form.
C. Third normal form.
D. Fourth normal form.
Answer : A
36. For using a specific database …………… command is used.
A. use database
B. database name use
C. Both A & B
D. None of them
Answer : A
37. The one guideline to be followed while designing the database is
A. A database design may be ambiguous.
B. It should avoid/reduce the redundancy.
C. Unrelated data should be in the same table so that updating the data will be easy.
D. An entity should not have attributes.
Answer : B
38. What are the desirable properties of a decomposition
A. Partition constraint.
B. Dependency preservation.
C. Redundancy.
D. Security.
Answer : B
39. The fact that information in the data warehouse changes far less often and may be regarded as non-real-time with periodic updating; This implies that data warehouses are _______
A. Volatile
B. Non - Volatile
C. Logical
D. Physical
Answer : B
40. What is data integrity?
A. It is the data contained in database that is non redundant.
B. It is the data contained in database that is accurate and consistent.
C. It is the data contained in database that is secured.
D. It is the data contained in database that is shared.
Answer : B
41. _____clause is an additional filter that is applied to the result.
A. Select
B. Order by
C. Group-by
D. Having
Answer : D
42. In multiple granularity of locks SIX lock is compatible with
A. IX
B. IS
C. S
D. SIX
Answer : B
43. Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)
B. (iv) only
C. (i) and (iv)
D. (ii) and (iii)
Answer : D
44. Which of the following addressing modes permits relocation without any change over in the code?
A. Indirect addressing
B. Indexed addressing
C. PC relative addressing
D. Base register addressing
Answer : B
45. According to the levels of abstraction, the schema at the intermediate level is called
A. Logical schema.
B. Physical schema.
C. Subschema.
D. None of the above.
Answer : D
46. A top-to-bottom relationship among the items in a database is established by a
A. Hierarchical schema
B. Network schema
C. Relational Schema
D. All of the above
Answer : A
47. Shadow paging has
A. no redo
B. no undo
C. redo but no undo
D. neither redo nor undo
Answer : A
48. Protection of data from unauthorized Disclosure results in loss of _______
A. Integrity
B. Availability
C. Confidentiality
D. Discretionary Security
Answer : C
49. HSAM stands for ……….
A. Hierarchic Standard Access Method
B. Hierarchic Sequential Access Method
C. Hierarchic Sequential and Method
D. Hierarchic Standard and Method
Answer : B
50. Which of the following relational algebraic operations is not from set theory?
A. Union
B. Intersection
C. Cartesian Product
D. Select
Answer : D

Sharing is caring