LIC AAO - Advance DBMS 1000+ MCQ [Solved] PDF Download
Thursday 9th of March 2023
1. Which of the following statements is not true about two tier client server database architecture?
A. SQL statements are processed on tier server
B. SQL statements may be processed on some of the clients
C. Business logic is mostly processed on clients
D. Business logic may be processed on the server
Answer : C
2. Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data.
C. programs are not dependent on the logical attributes of data.
D. both B) and C).
Answer : @
3. The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
Answer : A
4. In mesh topology, if the number of devices is n , then the number of ports present in each device is
A. n
B. n+1
C. n-1
D. n/2
Answer : C
5. In which of the following SET concept is used ?
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer : A
6. Primary storage
A. magnetic disk
B. magnetic tape
C. juke box
D. cache
Answer : D
7. In the architecture of a database system external level is the
A. physical level.
B. logical level.
C. conceptual level
D. view level.
Answer : D
8. A relation is said to be in ………. If it doesnt contain partial dependency
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer : B
9. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :
A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
10. Tertiary storage
A. magnetic tape
B. juke box
C. optical disk
D. All of the above
Answer : D
11. Thermal noise is often referred to as ............... noise, because it affects uniformly the different frequencies.
A. Gray
B. White
C. Blue
D. Black
Answer : B
12. Mail services are available to network users through the
A. Session layer
B. Presentation layer
C. Application layer
D. Transport layer
Answer : C
13. The statement
Every foreign-key value must match a primary-key value in an associated table
Is related to
A. View
B. Cursor defination
C. Referential intergrity
D. Trigger
Answer : C
14. A transaction which completes successfully is called
A. Granted
B. Committed
C. Compensated
D. Accomplished
Answer : B
15. Range variables are designed using the
A. TO clause
B. FROM clause
C. RANGE clause
D. none of the above
Answer : C
16. Which one of the following is provided by a data dictionary ?
A. User data
B. Database structure data
C. Sorted data
D. Functional data
Answer : B
17. Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer
A. i and ii only
B. ii and iii only
C. ii only
D. i only
Answer : D
18. By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
D. none
Answer : B
19. The index table has …… Columns.
A. 1
B. 2
C. 3
D. 4
Answer : B
20. Which of the following extracts its data from the result of an SQL SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer : A
21. The race condition occurs when
A. Two concurrent processes attempt to interact with each other.
B. Two concurrent processes interact with different data files.
C. Two concurrent processes attempt to hold a data item .
D. none of the above.
Answer : C
22. RAID
A. Redundant Arrays of Independent Disks
B. Redundant Arrays of Independent Drives
C. Redundant Arrays of Interconnected Drives
D. Redundant Arrays of Interconnected Disks
Answer : A
23. UML is stands for
A. Universal Modeling Language
B. Unified Modeling Language
C. United Modeling Language
D. Uni Modeling Language
Answer : B
24. Symbol to represent weak entity set in ER Model
A. Dotted rectangle
B. Square
C. Doubly outlined rectangle
D. Diamond
Answer : C