Home

RRB ALP - Advance DBMS 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
Answer : A
2. When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
A. first
B. second
C. third
D. fourth
Answer : C
3. Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only
B. ii only
C. Both A and B
D. None of the above
Answer : C
4. An association of several structure of a data base can be expressed graphically by?
A. Tuple
B. Record
C. Relationship
D. Field
Answer : C
5. Event condition action model is related to
A. Views
B. Cursors
C. Triggers
D. None of these.
Answer : C
6. As a side-effect of database update ,the system automatically executes a statement called
A. a view
B. a grant permission
C. a trigger
D. all of the above
Answer : C
7. In two-phase locking
A. the data items are locked in growing phase.
B. the data items are released in shrinking phase.
C. Both A and B are true
D. Both A and B are false
Answer : C
8. In defining the notion of the tuple variable, which one of the clause is useful?
A. as
B. by
C. from
D. none of the above
Answer : A
9. Thermal noise is often referred to as ............... noise, because it affects uniformly the different frequencies.
A. Gray
B. White
C. Blue
D. Black
Answer : B
10. Datalog is
A. procedural query language
B. nonprocedural query language
C. scan(), write()
D. none of the above
Answer : B
11. A transaction which may not complete its execution successfully is termed as
A. Failed
B. Aborted
C. Blocked
D. Finished
Answer : B
12. The minimal set of super key is called
A. Primary key
B. Secondary key
C. Candidate key
D. Foreign key
Answer : C
13. Symbol to represent weak entity set in ER Model
A. Dotted rectangle
B. Square
C. Doubly outlined rectangle
D. Diamond
Answer : C
14. State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only
B. ii and iii only
C. i and iii only
D. None of these
Answer : D
15. Query processing is
A. converting data to insert in a database
B. translation of query to lower form
C. range of activities involved in extracting data from a database
D. none of the above
Answer : C
16. Which of the following is true statement ?
A. SQL permits attribute names to be repeated in the same relation.
B. a SQL query automatically eliminates duplicates.
C. a SQL query will not work if there are no indexes on the relations
D. None of these
Answer : D
17. Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only
B. ii only
C. Both
D. None of these
Answer : B
18. A type of query that is placed within a WHERE or HAVING clause of another query is called
A. Super query
B. Sub query
C. Master query
D. Multi-query
Answer : B
19. Encoding method which does not provide for synchronization
A. B8ZS
B. Manchester
C. RZ
D. NRZ-L
Answer : D
20. The left outer join takes all tuples
A. in the left relation which didnt match with any tuple in right relation
B. in the left relation which matched with a tuple in right relation
C. in the right relation which didnt match with any tuple in left relation
D. in the right relation which matched with a tuple in left relation
Answer : A
21. Which topology requires a central controller or hub?
A. Ring
B. Tree
C. Switch
D. Graph
Answer : C
22. Which of the following extracts its data from the result of an SQL SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer : A
23. Select the correct statement
i) Aggregate functions wrk on a group of data and return a single value.
ii) ODBC connects the frontend with the database without considering its compatibility
iii) View definition cant be used at multiple places through with clause .

A. i and ii only
B. ii and iii only
C. i and iii only
D. i only
Answer : A
24. The host part in a class A type of an IP address has
A. 12 bits
B. 16 bits
C. 24 bits
D. 28 bits
Answer : C
25. Log into a computer across an internet
A. IMAP
B. TELNET
C. POP3
D. Infrared
Answer : B
26. Which of the following is not a database object?
A. index
B. sequence
C. cursor
D. trigger
Answer : C
27. Which of the following is also known as Offline storage ?
A. primary storage
B. secondary storage
C. tertiary storage
D. none of the above
Answer : C
28. It is possible to define a schema completely using
A. VDL and DDL.
B. DDL and DML.
C. SDL and DDL.
D. VDL and DML.
Answer : B
29. In an object oriented model, one object can access data of another object by passing?
A. Instance variable
B. Variable
C. Message
D. Function
Answer : C
30. An entity set that does not have sufficient attributes to form a primary key is a
A. strong entity set.
B. weak entity set.
C. simple entity set.
D. primary entity set.
Answer : B
31. Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
B. Define subtypes
C. Define each attribute as having an initial value that is recognized as blank
D. Define supertypes
Answer : D
32. Transaction access data using two operations
A. read(), print()
B. read(), write()
C. scan(), write()
D. none of the above
Answer : B
33. QBE
A. Query By Execution
B. Query By Example
C. Query By Extraction
D. None of the above.
Answer : B
34. A lock that allows concurrent transactions to access different rows of the same table is known as a
A. Field-level lock
B. Row-level lock
C. Table-level lock
D. Database-level lock
Answer : A
35. EEPROM
A. Electrically Extractable Programmable Read Only Memory
B. Electrically Erasable Programmable Read Only Memory
C. Electronically Erasable Programmable Read Only Memory
D. Electrically Erasable Programmable Read Only Memory
Answer : D
36. Mail services are available to network users through the
A. Session layer
B. Presentation layer
C. Application layer
D. Transport layer
Answer : C
37. Data fragmentation is performed by the …… and each fragment is stored at…………..
A. DBMS, same site
B. OS ,same site
C. DBMS ,different site
D. OS ,different site
Answer : C
38. Which of the following layer uses trailer of the frame for error detection?
A. Transport layer
B. Network layer
C. Datalink layer
D. None of these
Answer : C
39. The exists construct returns the value true, if the argument subquery is
A. empty
B. nonempty
C. contains null values
D. none of the above
Answer : B
40. Which of the following is a classical approach to database design?
A. Left Right approach
B. Right Left approach
C. Top Down approach
D. Bottom Up approach
Answer : C
41. Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?
A. BCNF
B. Second
C. Third
D. Fourth
Answer : A
42. Which of the following works as a filter?
A. UPDATE
B. DROP
C. ALTER
D. SELECT
Answer : D
43. Related fields in a database are grouped to form a
A. data file.
B. data record.
C. menu.
D. bank.
Answer : B
44. Data integrity refers to
A. the uniqueness of the data in a database
B. the correctness and completeness of the data in a database
C. the un redundancies of the data in a database
D. Data independence of the database
Answer : B
45. .................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
A. Baseband transmission
B. Broadband transmission
C. Digital transmission
D. Analog transmission
Answer : A
46. Multivalued dependency is removed in
A. 4 NF
B. 3 NF
C. 2 NF
D. 1 NF
Aswer : A
47. Expand the acronym OLAP
A. Object Linked Access Program
B. Organizational Architecture Processing
C. Online Analytical Processing
D. none of these
Answer : C
48. Specialization is a
A. top-down approach.
B. bottom-up approach.
C. left-right approach.
D. none of the above
Answer : A
49. The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer : B
50. Select the incorrect statement(s)
i) Foreign key values can be left blank
ii) In SQL duplicates may be present
iii) Theta join operation doesnt remove duplicate columns.
iv) NULL value means string of blank characters.

A. i ,iii only
B. ii, iv only
C. iii, iv only
D. ii, iii, iv
Answer : C

Sharing is caring