IBPS SO IT Officer Professional Knowledge – DBMS – 14

Hello and welcome to exampundit. Here is a set of IBPS Specialist Officer IT Officer Professional Knowledge Test on Database Management System (DBMS) Questions.

IBPS SO IT Officer Professional Knowledge

  1. ORDBMS is:

(1) Extension of OODBMS

(2) Extension of RDBMS

(3) Any of the above

(4) None of the above

Answer

 

  1. Full form of DBTG is:

(1) Database tool group

(2) Database task group

(3) Database transaction group

(4) Data transmission group

Answer

 

  1. The network model used the concept of:

(1) Set construct

(2) Relationship

(3) Entity sets

(4) Keys

Answer

 

  1. For client/server system which of the following statement is false ?

(1) Set construct

(2) Relationship

(3) Entity sets

(4) Keys

Answer

 

  1. Which of the following is not a features of client system?

(1) Needs Powerful n/w

(2) Needs of OS capable of multitasking

(3) Needs multiprocessor system

(4) Has communication capabilities

Answer

 

  1. The highest normal form in normalization is:

(1) 3 NF

(2) BCNF

(3) 2 NF

(4) 1 NF

Answer

 

  1. A relation schema R is NF if the domains of all attributes of R, are:

(1) Primary keys

(2) Superkey

(3) Atomic

(4) 0 of fixed size

Answer

 

  1. Functional dependency is the constraint on the set of:

(1) Attributes

(2) Relations

(3) Keys

(4) Domain sets

Answer

 

  1. Which of the following no called Armstrong’s axioms?

(1) Reflexivity rule

(2) Augmentation rule

(3) Transitivity rule

(4) Union rule

Answer

 

  1. Which of the statement is not true?

(1) Every primary key is a super key

(2) Every super key is a candidate key

(3) Both of the above

(4) None of the above

Answer

 

 

  1. Which of the following is not the property of canonical cover FC?

(1) No functional dependency in FC contains an extraneous attribute

(2) Each left side of a functional dependency in FC contains single attribute

(3) Each left side of a functional dependency in FC contains single attribute

(4) None of the above

Answer

 

  1. To protect the database, we must take security measure at several levels, which of the following levels is not one of them:

(1) Database system

(2) Operating system

(3) Physical

(4) None of the above

Answer

 

  1. Which of the following helps user to hide data?

(1) Primary key

(2) Foreign key

(3) View

(4) Table

Answer

 

  1. The command used in SQL, to make any privilege from any user is:

(1) Grant

(2) Revoke

(3) Delete

(4) Modify

Answer

 

  1. An encryption technique is not a good technique if:

(1) It is relationship simple

(2) It depends on the secrecy of the algorithm

(3) Any of the above

(4) None of the above

Answer

 

  1. The type of constraint that can be used to protect data is:

(1) Domain

(2) Referential integrity

(3) Integrity

(4) Primary key

Answer

 

  1. If records of a relation are sorted by a field (Primary key) on which, you have created an indexed. The type of index in this case will be:

(1) Primary index

(2) Secondary index

(3) Clustering index

(4) Any of the above

Answer

 

  1. QBE is based on:

(1) SQL

(2) Relational algebra

(3) Domain calculus

(4) Tupel calculus

Answer

 

  1. Which of the following has a two dimensional syntax?

(1) QUEL

(2) QBE

(3) SQL

(4) None of the above

Answer

 

  1. In QBE, to retrieve any field of a relation the command is indicated by:

(1) R

(2) S

(3) P

(4) I

Answer

 

Regards

Team EP