IBPS SO IT Officer Professional Knowledge – DBMS – 14

Hello and welcome to exampundit. Here is a set of IBPS Specialist Officer IT Officer Professional Knowledge Test on Database Management System (DBMS) Questions.

IBPS SO IT Officer Professional Knowledge

  1. ORDBMS is:

(1) Extension of OODBMS

(2) Extension of RDBMS

(3) Any of the above

(4) None of the above

Answer

Option: 2

 

  1. Full form of DBTG is:

(1) Database tool group

(2) Database task group

(3) Database transaction group

(4) Data transmission group

Answer

Option: 2

 

  1. The network model used the concept of:

(1) Set construct

(2) Relationship

(3) Entity sets

(4) Keys

Answer

Option: 2

 

  1. For client/server system which of the following statement is false ?

(1) Set construct

(2) Relationship

(3) Entity sets

(4) Keys

Answer

Option: 4

 

  1. Which of the following is not a features of client system?

(1) Needs Powerful n/w

(2) Needs of OS capable of multitasking

(3) Needs multiprocessor system

(4) Has communication capabilities

Answer

Option: 3

 

  1. The highest normal form in normalization is:

(1) 3 NF

(2) BCNF

(3) 2 NF

(4) 1 NF

Answer

Option: 2

 

  1. A relation schema R is NF if the domains of all attributes of R, are:

(1) Primary keys

(2) Superkey

(3) Atomic

(4) 0 of fixed size

Answer

Option: 3

 

  1. Functional dependency is the constraint on the set of:

(1) Attributes

(2) Relations

(3) Keys

(4) Domain sets

Answer

Option: 1

 

  1. Which of the following no called Armstrong’s axioms?

(1) Reflexivity rule

(2) Augmentation rule

(3) Transitivity rule

(4) Union rule

Answer

Option: 4

 

  1. Which of the statement is not true?

(1) Every primary key is a super key

(2) Every super key is a candidate key

(3) Both of the above

(4) None of the above

Answer

Option: 3

 

 

  1. Which of the following is not the property of canonical cover FC?

(1) No functional dependency in FC contains an extraneous attribute

(2) Each left side of a functional dependency in FC contains single attribute

(3) Each left side of a functional dependency in FC contains single attribute

(4) None of the above

Answer

Option: 1

 

  1. To protect the database, we must take security measure at several levels, which of the following levels is not one of them:

(1) Database system

(2) Operating system

(3) Physical

(4) None of the above

Answer

Option: 3

 

  1. Which of the following helps user to hide data?

(1) Primary key

(2) Foreign key

(3) View

(4) Table

Answer

Option: 3

 

  1. The command used in SQL, to make any privilege from any user is:

(1) Grant

(2) Revoke

(3) Delete

(4) Modify

Answer

Option: 1

 

  1. An encryption technique is not a good technique if:

(1) It is relationship simple

(2) It depends on the secrecy of the algorithm

(3) Any of the above

(4) None of the above

Answer

Option: 2

 

  1. The type of constraint that can be used to protect data is:

(1) Domain

(2) Referential integrity

(3) Integrity

(4) Primary key

Answer

Option: 3

 

  1. If records of a relation are sorted by a field (Primary key) on which, you have created an indexed. The type of index in this case will be:

(1) Primary index

(2) Secondary index

(3) Clustering index

(4) Any of the above

Answer

Option: 3

 

  1. QBE is based on:

(1) SQL

(2) Relational algebra

(3) Domain calculus

(4) Tupel calculus

Answer

Option: 3

 

  1. Which of the following has a two dimensional syntax?

(1) QUEL

(2) QBE

(3) SQL

(4) None of the above

Answer

Option: 2

 

  1. In QBE, to retrieve any field of a relation the command is indicated by:

(1) R

(2) S

(3) P

(4) I

Answer

Option: 3

 

Regards

Team EP