MCQOPTIONS
Saved Bookmarks
This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain: |
| A. | GROUP BY. |
| B. | WHERE. |
| C. | ORDER BY. |
| D. | FROM. |
| Answer» D. FROM. | |
| 52. |
The size of a lock is called: |
| A. | implicit lock. |
| B. | lock granularity. |
| C. | exclusive lock. |
| D. | shared lock. |
| Answer» C. exclusive lock. | |
| 53. |
Dirty read, nonrepeatable, and phantom reads are not possible in this instance. |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» E. | |
| 54. |
A transaction in which either all of the database actions occur or none of them do is called: |
| A. | atomic. |
| B. | consistent. |
| C. | isolated. |
| D. | durable. |
| Answer» B. consistent. | |
| 55. |
Which of the following occurs when one transaction reads a changed record that has not been committed to the database? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» D. Consistent read | |
| 56. |
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» B. Phantom read | |
| 57. |
What is the overall responsibility of the DBA? |
| A. | Facilitate the development and use of the database |
| B. | Create and populate tables |
| C. | Development, operation, and maintenance of the database and its applications |
| D. | Both the first and third answers above are correct. |
| Answer» E. | |
| 58. |
Locks placed by the DBMS are called ________ . |
| A. | implicit locks |
| B. | explicit locks |
| C. | exclusive locks |
| D. | shared locks |
| Answer» B. explicit locks | |
| 59. |
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» C. Repeatable read | |
| 60. |
SQL Server 2000 stored procedures can: |
| A. | never be kept within the database. |
| B. | be kept within the database and invoked by application programs. |
| C. | be stored on the users' computer. |
| D. | support BEFORE, INSTEAD OF and AFTER types. |
| Answer» C. be stored on the users' computer. | |
| 61. |
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row? |
| A. | Forward only |
| B. | Static |
| C. | Keyset |
| D. | Dynamic |
| Answer» D. Dynamic | |
| 62. |
Which of the following refers to a cursor type where changes of any type and from any source are visible? |
| A. | Forward only |
| B. | Static |
| C. | Keyset |
| D. | Dynamic |
| Answer» E. | |
| 63. |
Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» D. Serializable | |
| 64. |
One solution to the multivalued dependency constraint problem is to: |
| A. | split the relation into two relations, each with a single theme. |
| B. | change the theme. |
| C. | create a new theme. |
| D. | add a composite key. |
| Answer» B. change the theme. | |
| 65. |
Which type of SQL Server cursor concurrency places an update lock on a row when the row is read? |
| A. | READ_ONLY |
| B. | SCROLL_LOCK |
| C. | OPTIMISTIC |
| D. | READCOMMITTED |
| Answer» E. | |
| 66. |
Which of the following is a way to create and modify tables using SQL Server? |
| A. | Write SQL code using either CREATE or ALTER SQL statements only. |
| B. | Use the graphical facilities of SQL Server Enterprise Manager only. |
| C. | Both of the two methods above will work. |
| D. | Neither of the two methods above will work. |
| Answer» D. Neither of the two methods above will work. | |
| 67. |
With which type of SQL Server recovery model, is no logging done? |
| A. | Differential recovery |
| B. | Full recovery |
| C. | Bulk-logged recovery |
| D. | Simple recovery |
| Answer» E. | |
| 68. |
With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data. |
| A. | Nonclustered |
| B. | Clustered |
| C. | Primary |
| D. | Secondary |
| Answer» B. Clustered | |
| 69. |
With which type of SQL Server recovery model are all database changes logged? |
| A. | Differential recovery |
| B. | Full recovery |
| C. | Simple recovery |
| D. | Bulk-logged recovery |
| Answer» C. Simple recovery | |
| 70. |
SQL Server program code that is executed after an SQL command has been processed is called a(n): |
| A. | INSTEAD OF trigger. |
| B. | BEFORE trigger. |
| C. | AFTER trigger. |
| D. | BEGIN trigger. |
| Answer» D. BEGIN trigger. | |
| 71. |
With this type of SQL Server cursor concurrency no lock is obtained until the user updates the data. |
| A. | READ_ONLY |
| B. | SCROLL_LOCK |
| C. | OPTIMISTIC |
| D. | PESSIMISTIC |
| Answer» D. PESSIMISTIC | |
| 72. |
With this type of index, the data are stored in the bottom level of the index and in the same order as that index. |
| A. | Nonclustered |
| B. | Clustered |
| C. | Primary |
| D. | Secondary |
| Answer» C. Primary | |
| 73. |
Which of the following is a group of one or more attributes that uniquely identifies a row? |
| A. | Key |
| B. | Determinant |
| C. | Tuple |
| D. | Relation |
| Answer» B. Determinant | |
| 74. |
In SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup? |
| A. | Complete backup |
| B. | Transaction Log |
| C. | Differential backup |
| D. | None of the above is correct. |
| Answer» D. None of the above is correct. | |
| 75. |
When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n): |
| A. | transitive dependency. |
| B. | insertion anomaly. |
| C. | referential integrity constraint. |
| D. | normal form. |
| Answer» D. normal form. | |
| 76. |
A functional dependency is a relationship between or among: |
| A. | tables. |
| B. | rows. |
| C. | relations. |
| D. | attributes. |
| Answer» E. | |
| 77. |
For some relations, changing the data can have undesirable consequences called: |
| A. | referential integrity constraints. |
| B. | modification anomalies. |
| C. | normal forms. |
| D. | transitive dependencies. |
| Answer» C. normal forms. | |
| 78. |
An attribute is a(n): |
| A. | column of a table. |
| B. | two dimensional table. |
| C. | row of a table. |
| D. | key of a table. |
| Answer» B. two dimensional table. | |
| 79. |
The advantage of optimistic locking is that: |
| A. | the lock is obtained only after the transaction has processed. |
| B. | the lock is obtained before the transaction has processed. |
| C. | the lock never needs to be obtained. |
| D. | transactions that are best suited are those with a lot of activity. |
| Answer» B. the lock is obtained before the transaction has processed. | |
| 80. |
A tuple is a(n): |
| A. | column of a table. |
| B. | two dimensional table. |
| C. | row of a table. |
| D. | key of a table. |
| Answer» D. key of a table. | |
| 81. |
Table is synonymous with the term: |
| A. | record. |
| B. | relation. |
| C. | column. |
| D. | field. |
| Answer» C. column. | |
| 82. |
Which of the following is not a restriction for a table to be a relation? |
| A. | The cells of the table must contain a single value. |
| B. | All of the entries in any column must be of the same kind. |
| C. | The columns must be ordered. |
| D. | No two rows in a table may be identical. |
| Answer» D. No two rows in a table may be identical. | |
| 83. |
A key: |
| A. | must always be composed of two or more columns. |
| B. | can only be one column. |
| C. | identifies a row. |
| D. | identifies a column. |
| Answer» D. identifies a column. | |
| 84. |
When using the SQL INSERT statement: |
| A. | rows can be modified according to criteria only. |
| B. | rows cannot be copied in mass from one table to another only. |
| C. | rows can be inserted into a table only one at a time only. |
| D. | rows can either be inserted into a table one at a time or in groups. |
| Answer» E. | |
| 85. |
What is not an advantage of stored procedures? |
| A. | Greater security |
| B. | SQL can be optimized |
| C. | Code sharing |
| D. | Increased network traffic |
| Answer» E. | |
| 86. |
A reason for using an SQL view to hide columns is: |
| A. | to simplify a result only. |
| B. | to prevent the display of sensitive data only. |
| C. | to accomplish both of the above. |
| D. | None of the above are reasons for using an SQL view. |
| Answer» D. None of the above are reasons for using an SQL view. | |
| 87. |
The SQL ALTER statement can be used to: |
| A. | change the table structure. |
| B. | change the table data. |
| C. | add rows to the table. |
| D. | delete rows from the table. |
| Answer» B. change the table data. | |
| 88. |
To update an SQL view, the DBMS must be able to associate the column(s) to be updated with: |
| A. | a particular column in a particular underlying table. |
| B. | a particular column in a particular row. |
| C. | a particular row in a particular underlying table. |
| D. | None of the above is correct. |
| Answer» D. None of the above is correct. | |
| 89. |
Which of the following is NOT a type of SQL constraint? |
| A. | PRIMARY KEY |
| B. | FOREIGN KEY |
| C. | ALTERNATE KEY |
| D. | UNIQUE |
| Answer» D. UNIQUE | |
| 90. |
A ________ is a program that performs some common action on database data and that is stored in the database. |
| A. | trigger |
| B. | stored procedure |
| C. | pseudofile |
| D. | None of the above is correct. |
| Answer» C. pseudofile | |
| 91. |
For what purposes are views used? |
| A. | To hide columns only |
| B. | To hide rows only |
| C. | To hide complicated SQL statements only |
| D. | All of the above are uses for SQL views. |
| Answer» E. | |
| 92. |
Which type of entity is related to two or more associated entities that each contain specialized attributes that apply to some but not all of the instances of the entity? |
| A. | Supertype entity |
| B. | Subtype entity |
| C. | Archetype entity |
| D. | Instance entity |
| Answer» B. Subtype entity | |
| 93. |
In which of the following is a single-entity instance of one type of related to a single-entity instance of another type? |
| A. | One-to-One Relationship |
| B. | One-to-Many Relationship |
| C. | Many-to-Many Relationship |
| D. | Composite Relationship |
| Answer» B. One-to-Many Relationship | |
| 94. |
Entities can be associated with one another in which of the following? |
| A. | Entities |
| B. | Attributes |
| C. | Identifiers |
| D. | Relationships |
| Answer» E. | |
| 95. |
Properties that describe the characteristics of entities are called: |
| A. | entities. |
| B. | attributes. |
| C. | identifiers. |
| D. | relationships. |
| Answer» C. identifiers. | |
| 96. |
The strictest transaction isolation level provided by SQL Server is called: |
| A. | REPEATABLE READ. |
| B. | SERIALIZABLE. |
| C. | READ COMMITTED. |
| D. | READ UNCOMMITTED. |
| Answer» C. READ COMMITTED. | |
| 97. |
In which of the following can many entity instances of one type be related to many entity instances of another type? |
| A. | One-to-One Relationship |
| B. | One-to-Many Relationship |
| C. | Many-to-Many Relationship |
| D. | Composite Relationship |
| Answer» D. Composite Relationship | |
| 98. |
SQL Server program code that is executed instead of an SQL command that needs to be processed is called a(n): |
| A. | INSTEAD OF trigger. |
| B. | BEFORE trigger. |
| C. | AFTER trigger. |
| D. | BEGIN trigger. |
| Answer» B. BEFORE trigger. | |
| 99. |
Which of the following locks the item from change but not from read? |
| A. | Implicit lock |
| B. | Explicit lock |
| C. | Exclusive lock |
| D. | Shared lock |
| Answer» E. | |
| 100. |
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed. |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» B. Read uncommitted | |