Hello and welcome to exampundit. Here is a set of IBPS Specialist Officer IT Officer Professional Knowledge Test on Database Management System (DBMS) Questions. IBPS SO IT Officer Professional Knowledge
  1. ORDBMS is:
(1) Extension of OODBMS (2) Extension of RDBMS (3) Any of the above (4) None of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 2 [/su_spoiler]  
  1. Full form of DBTG is:
(1) Database tool group (2) Database task group (3) Database transaction group (4) Data transmission group [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 2 [/su_spoiler]  
  1. The network model used the concept of:
(1) Set construct (2) Relationship (3) Entity sets (4) Keys [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 2 [/su_spoiler]  
  1. For client/server system which of the following statement is false ?
(1) Set construct (2) Relationship (3) Entity sets (4) Keys [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 4 [/su_spoiler]  
  1. Which of the following is not a features of client system?
(1) Needs Powerful n/w (2) Needs of OS capable of multitasking (3) Needs multiprocessor system (4) Has communication capabilities [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. The highest normal form in normalization is:
(1) 3 NF (2) BCNF (3) 2 NF (4) 1 NF [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 2 [/su_spoiler]  
  1. A relation schema R is NF if the domains of all attributes of R, are:
(1) Primary keys (2) Superkey (3) Atomic (4) 0 of fixed size [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. Functional dependency is the constraint on the set of:
(1) Attributes (2) Relations (3) Keys (4) Domain sets [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 1 [/su_spoiler]  
  1. Which of the following no called Armstrong’s axioms?
(1) Reflexivity rule (2) Augmentation rule (3) Transitivity rule (4) Union rule [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 4 [/su_spoiler]  
  1. Which of the statement is not true?
(1) Every primary key is a super key (2) Every super key is a candidate key (3) Both of the above (4) None of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]    
  1. Which of the following is not the property of canonical cover FC?
(1) No functional dependency in FC contains an extraneous attribute (2) Each left side of a functional dependency in FC contains single attribute (3) Each left side of a functional dependency in FC contains single attribute (4) None of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 1 [/su_spoiler]  
  1. To protect the database, we must take security measure at several levels, which of the following levels is not one of them:
(1) Database system (2) Operating system (3) Physical (4) None of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. Which of the following helps user to hide data?
(1) Primary key (2) Foreign key (3) View (4) Table [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. The command used in SQL, to make any privilege from any user is:
(1) Grant (2) Revoke (3) Delete (4) Modify [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 1 [/su_spoiler]  
  1. An encryption technique is not a good technique if:
(1) It is relationship simple (2) It depends on the secrecy of the algorithm (3) Any of the above (4) None of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 2 [/su_spoiler]  
  1. The type of constraint that can be used to protect data is:
(1) Domain (2) Referential integrity (3) Integrity (4) Primary key [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. If records of a relation are sorted by a field (Primary key) on which, you have created an indexed. The type of index in this case will be:
(1) Primary index (2) Secondary index (3) Clustering index (4) Any of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. QBE is based on:
(1) SQL (2) Relational algebra (3) Domain calculus (4) Tupel calculus [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]  
  1. Which of the following has a two dimensional syntax?
(1) QUEL (2) QBE (3) SQL (4) None of the above [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 2 [/su_spoiler]  
  1. In QBE, to retrieve any field of a relation the command is indicated by:
(1) R (2) S (3) P (4) I [su_spoiler title="Answer" style="fancy" icon="arrow-circle-1"] Option: 3 [/su_spoiler]   Regards Team EP