Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

SQL Server automatically creates an index on:

A. primary keys only.
B. foreign key only.
C. both primary and foreign keys.
D. SQL Server never automatically creates an index.
Answer» D. SQL Server never automatically creates an index.
2.

In OLE DB, actions that an object can perform are called:

A. properties.
B. collections.
C. methods.
D. abstractions.
Answer» D. abstractions.
3.

An application that uses the ODBC interface could process any database that is ODBC-compliant without any program coding changes.

A. True
B. False
Answer» B. False
4.

To see the contents of the SQL*Plus buffer, type:

A. CONTENTS.
B. BUFFER.
C. CURRENT.
D. LIST.
Answer» E.
5.

All primary keys are required.

A. True
B. False
Answer» B. False
6.

Business Intelligence (BI) reporting analyses can be performed using ________ .

A. standard SQL only
B. extensions to SQL only
C. OLAP only
D. both standard SQL and extensions to SQL
Answer» B. extensions to SQL only
7.

Which of the following statements is true concerning JDBC?

A. It is language independent.
B. It is similar in concept to ODBC.
C. It is useful for all object-oriented languages.
D. It consists of three main layers.
Answer» C. It is useful for all object-oriented languages.
8.

Data replication is favored where most process requests are read-only and where the data are relatively static.

A. True
B. False
Answer» B. False
9.

READ COMMITTED is the default isolation level.

A. True
B. False
Answer» B. False
10.

Which of the following is true concerning the following statement: class Manager extends Employee

A. Manager is a concrete class and a superclass.
B. Manager is a concrete class and a subclass.
C. Manager is an abstract class and a superclass.
D. Manager is an abstract class and a subclass.
Answer» C. Manager is an abstract class and a superclass.
11.

The default extension for an Oracle SQL*Plus file is:

A. .txt.
B. .pls.
C. .ora.
D. .sql.
Answer» E.
12.

An SQL Server 2000 language that adds programming elements like parameters, variables, IF, WHILE loops, and so forth, to the basic capabilities of SQL is called:

A. COBOL.
B. VB.NET.
C. TRANSACT SQL.
D. Visual Basic.
Answer» D. Visual Basic.
13.

How many JDBC driver types does Sun define?

A. One
B. Two
C. Three
D. Four
Answer» E.
14.

OLE DB tabular data providers present data in the form of rowsets.

A. True
B. False
Answer» B. False
15.

The "F" in RFM analysis stands for ________ .

A. frequently
B. freshness
C. fast food
D. fantasy
Answer» B. freshness
16.

The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T WHERE CUSTOMER_T. CUSTOMER_ID = ORDER_T. CUSTOMER_ID

A. Equi-join
B. Natural join
C. Outer join
D. Cartesian join
Answer» B. Natural join
17.

A benefit of the three-tier architecture is which of the following?

A. New modules can be built to support specific business needs
B. Performance improves for compiled SQL statements
C. Results in a thinner client and database server
D. All of the above.
Answer» B. Performance improves for compiled SQL statements
18.

A semijoin is which of the following?

A. Only the joining attributes are sent from one site to another and then all of the rows are returned.
B. All of the attributes are sent from one site to another and then only the required rows are returned.
C. Only the joining attributes are sent from one site to another and then only the required rows are returned.
D. All of the attributes are sent from one site to another and then only the required rows are returned.
Answer» D. All of the attributes are sent from one site to another and then only the required rows are returned.
19.

Which of the following is part of an administrative policy to secure a database?

A. Authentication policies
B. Limiting particular areas within a building to only authorized people
C. Ensure appropriate responses rates are in external maintenance agreements
D. All of the above.
Answer» E.
20.

A foreign key is used to implement relationships between tables.

A. True
B. False
Answer» B. False
21.

Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?

A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Answer» C. Dirty read
22.

Which of the following is not a factor in determining the concurrency control behavior of SQL Server?

A. Lock level
B. Transaction isolation level
C. Cursor concurrency setting
D. Locking hints
Answer» B. Transaction isolation level
23.

ODBC conformance levels specify which SQL statements, expressions, and data types a driver can process.

A. True
B. False
Answer» B. False
24.

HTML is an application of a more robust document markup language called:

A. XHTML.
B. XML.
C. SGML.
D. None of the above is correct.
Answer» D. None of the above is correct.
25.

OLAP uses measures, dimensions and associations.

A. True
B. False
Answer» C.
26.

A proxy server controls the passage of messages or files through to the organization's network.

A. True
B. False
Answer» B. False
27.

VBScript is similar to JavaScript.

A. True
B. False
Answer» B. False
28.

A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing.

A. True
B. False
Answer» C.
29.

C++ is an object-oriented language and is simpler than Java.

A. True
B. False
Answer» C.
30.

Servlets are stored on the server rather than with an application on a client.

A. True
B. False
Answer» B. False
31.

Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching.

A. True
B. False
Answer» B. False
32.

Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted.

A. True
B. False
Answer» B. False
33.

Routers are used to transmit message packets and forward them to the correct destination over the most efficient pathway available.

A. True
B. False
Answer» B. False
34.

Documents that have no DTD are by definition not-type-valid.

A. True
B. False
Answer» B. False
35.

XML uses the same terms with the same meanings as terms in the database world.

A. True
B. False
Answer» C.
36.

Datasets which reside on the user's hard drive are created by ADO.NET to facilitate the transformation of XML documents to and from relational database constructs.

A. True
B. False
Answer» C.
37.

It took the popularity of the Internet to realize that database processing and document processing need each other.

A. True
B. False
Answer» B. False
38.

With XML, document structure, content and format are all defined within one document.

A. True
B. False
Answer» C.
39.

XML Schemas are XML documents.

A. True
B. False
Answer» B. False
40.

You can validate an XML Schema document against its schema, just as you would any other XML document.

A. True
B. False
Answer» B. False
41.

Stylesheets are used by XSLT to indicate how to transform the elements of the XML document into another format.

A. True
B. False
Answer» B. False
42.

SOAP is now just a name, not an acronym.

A. True
B. False
Answer» B. False
43.

XML technology is a hybrid of document processing and database processing.

A. True
B. False
Answer» B. False
44.

With XSLT, you specify a procedure for materializing document elements.

A. True
B. False
Answer» C.
45.

XML Schema is used to define the content, structure and format of documents.

A. True
B. False
Answer» C.
46.

The most popular way to materialize XML documents is to use XSLT.

A. True
B. False
Answer» B. False
47.

Schemas consist of properties and methods

A. True
B. False
Answer» C.
48.

With failure transparency, all of the actions of a transaction are committed or none of them are committed.

A. True
B. False
Answer» B. False
49.

Each site (or node) in a distributed system is subject to the same types of failure as in a centralized system.

A. True
B. False
Answer» B. False
50.

Replication may use either synchronous or asynchronous distributed database technologies, although asynchronous technologies are more typical in a replicated environment.

A. True
B. False
Answer» B. False