MCQOPTIONS
Saved Bookmarks
This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
What is the type of Oracle backup in which all uncommitted changes have been removed from the datafiles? |
| A. | Full backup |
| B. | Consistent backup |
| C. | Inconsistent backup |
| D. | Differential backup |
| Answer» C. Inconsistent backup | |
| 352. |
Which of the following is not true about modifying table columns? |
| A. | You can drop a column at any time. |
| B. | You can add a column at any time as long as it is a NULL column. |
| C. | You can increase the number of characters in character columns or the number of digits in numeric columns |
| D. | You cannot increase or decrease the number of decimal places. |
| Answer» E. | |
| 353. |
________ is considered to be one of the foundations of data access in the Microsoft world. |
| A. | ODBC |
| B. | OLE DB |
| C. | JPCD |
| D. | ADO |
| Answer» C. JPCD | |
| 354. |
________ is an interface by which application programs can access and process SQL databases in a DBMS-independent manner. |
| A. | ODBC |
| B. | OLE DB |
| C. | JPCD |
| D. | ADO |
| Answer» B. OLE DB | |
| 355. |
Which of the following are goals of OLE DB? |
| A. | Create object interfaces for DBMS functionality pieces only. |
| B. | Increase flexibility only. |
| C. | Object interface over any type of data only. |
| D. | All of the above as goals of OLE DB. |
| Answer» E. | |
| 356. |
An ODBC data structure that identifies a database and the DBMS that processes it is called a(n): |
| A. | data source. |
| B. | driver manager. |
| C. | driver. |
| D. | API. |
| Answer» B. driver manager. | |
| 357. |
What is invoked via HTTP on the Web server computer when it responds to requests from a user's Web browser? |
| A. | A Java application |
| B. | A Java applet |
| C. | A Java servlet |
| D. | None of the above is correct. |
| Answer» D. None of the above is correct. | |
| 358. |
The ODBC Level 2 API contains which the following functions? |
| A. | Commit or rollback transactions only |
| B. | Connect to data sources with driver-specific information only |
| C. | Connect to data sources only |
| D. | All of the above are contained in the OBDC Level 2 API |
| Answer» E. | |
| 359. |
A JSP is transformed into a(n): |
| A. | Java applet. |
| B. | Java servlet. |
| C. | Either 1 or 2 above. |
| D. | Neither 1 nor 2 above. |
| Answer» C. Either 1 or 2 above. | |
| 360. |
________ is a cover for utilizing OLE DB that is designed for use by almost any language. |
| A. | ODBC |
| B. | ASP |
| C. | JPCD |
| D. | ADO |
| Answer» E. | |
| 361. |
What is sent to the user via HTTP, invoked using the HTTP protocol on the user's computer, and run on the user's computer as an application? |
| A. | A Java application |
| B. | A Java applet |
| C. | A Java servlet |
| D. | None of the above is correct. |
| Answer» C. A Java servlet | |
| 362. |
Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge? |
| A. | Type 1 |
| B. | Type 2 |
| C. | Type 3 |
| D. | Type 4 |
| Answer» B. Type 2 | |
| 363. |
How many copies of a JSP page can be in memory at a time? |
| A. | One |
| B. | Two |
| C. | Three |
| D. | Unlimited |
| Answer» B. Two | |
| 364. |
Which JDBC driver Type(s) can you use in a three-tier architecture and if the Web server and the DBMS are running on the same machine? |
| A. | Type 1 only |
| B. | Type 2 only |
| C. | Both Type 3 and Type 4 |
| D. | All of Type 1, Type 2, Type 3 and Type 4 |
| Answer» E. | |
| 365. |
What programming language(s) or scripting language(s) does Java Server Pages (JSP) support? |
| A. | VBScript only |
| B. | Jscript only |
| C. | Java only |
| D. | All of the above are supported |
| Answer» D. All of the above are supported | |
| 366. |
________ is an open source DBMS product that runs on UNIX, Linux and Windows. |
| A. | MySQL |
| B. | JSP/SQL |
| C. | JDBC/SQL |
| D. | Sun ACCESS |
| Answer» B. JSP/SQL | |
| 367. |
What MySQL property is used to create a surrogate key in MySQL? |
| A. | UNIQUE |
| B. | SEQUENCE |
| C. | AUTO_INCREMENT |
| D. | None of the above -- Surrogate keys are not implemented in MySQL. |
| Answer» D. None of the above -- Surrogate keys are not implemented in MySQL. | |
| 368. |
When using ODBC, which of the following processes ODBC requests and submits specific SQL statements to a given type of data source? |
| A. | Data source |
| B. | Driver |
| C. | Driver manager |
| D. | DBMS |
| Answer» C. Driver manager | |
| 369. |
What type of failure occurs when Oracle fails due to an operating system or computer hardware failure? |
| A. | Application failure |
| B. | Instance Failure |
| C. | Media Failure |
| D. | Rollback failure |
| Answer» C. Media Failure | |
| 370. |
In OLE DB, which of the following represents characteristics of the recordset abstraction? |
| A. | Properties |
| B. | Collections |
| C. | Methods |
| D. | Abstractions |
| Answer» B. Collections | |
| 371. |
In ODBC, a file that can be shared among database users is called a: |
| A. | system data source. |
| B. | file data source. |
| C. | user data source. |
| D. | SQL text file. |
| Answer» C. user data source. | |
| 372. |
________ is an object-oriented interface that encapsulates data-server functionality. |
| A. | ODBC |
| B. | OLE DB |
| C. | JPCD |
| D. | ADO |
| Answer» C. JPCD | |
| 373. |
Duplicate data often results in loss of data integrity because: |
| A. | the data formats may be inconsistent. |
| B. | data values may not agree. |
| C. | Both A & B. |
| D. | Neither A & B. |
| Answer» D. Neither A & B. | |
| 374. |
Who invented Java? |
| A. | Netscape |
| B. | Microsoft |
| C. | Sun |
| D. | None of the above is correct. |
| Answer» D. None of the above is correct. | |
| 375. |
Metadata enables database designers and users to do all of the following except: |
| A. | sample data. |
| B. | understand what data exist. |
| C. | what the fine distinctions are between similar data items. |
| D. | what the data mean. |
| Answer» B. understand what data exist. | |
| 376. |
A database management system (DBMS) is a: |
| A. | hardware system used to create, maintain, and provide controlled access to a database. |
| B. | hardware system used to create, maintain, and provide uncontrolled access to a database. |
| C. | software system used to create, maintain, and provide controlled access to a database. |
| D. | software system used to create, maintain, and provide uncontrolled access to a database. |
| Answer» D. software system used to create, maintain, and provide uncontrolled access to a database. | |
| 377. |
To run a compiled Java program, the machine must have what loaded and running? |
| A. | Java virtual machine |
| B. | Java compiler |
| C. | Java bytecode |
| D. | A Web browser |
| Answer» B. Java compiler | |
| 378. |
Which JDBC driver Type(s) can be used in either applet or servlet code? |
| A. | Both Type 1 and Type 2 |
| B. | Both Type 1 and Type 3 |
| C. | Both Type 3 and Type 4 |
| D. | Type 4 only |
| Answer» D. Type 4 only | |
| 379. |
________ is a simple object model that is easier to understand and use than OLE DB, and is frequently used for database applications. |
| A. | ASP |
| B. | XML |
| C. | ODBC |
| D. | ADO |
| Answer» E. | |
| 380. |
ODBC core SQL grammar contains which of the following?: |
| A. | INSERT, UPDATE, DELETE only |
| B. | Stored procedures only |
| C. | Full SELECT (includes subqueries) only |
| D. | Both 1 and 3 above are contained in the ODBC core SQL. |
| Answer» E. | |
| 381. |
In creating a procedure, you may get a message if you have compile errors. Which of the following is true? |
| A. | The line numbers reported match the line numbers you see in your text editor. |
| B. | SQL*Plus will automatically show the errors to you. |
| C. | To see the errors, enter SHOW ERRORS in SQL*Plus. |
| D. | If there are no syntax errors, you will receive the message "NO ERRORS." |
| Answer» D. If there are no syntax errors, you will receive the message "NO ERRORS." | |
| 382. |
Which of the following is not true about indexes? |
| A. | Indexes are created to enforce uniqueness on columns. |
| B. | Indexes are created to enable fast retrieval by column values. |
| C. | Columns that are frequently used with equal conditions in WHERE clauses are good candidates for indexes. |
| D. | Indexes are created with the ALTER TABLE command. |
| Answer» E. | |
| 383. |
The transaction log includes which of the following? |
| A. | The before-image of a record |
| B. | The after-image of a record |
| C. | The before and after-image of a record |
| D. | The essential data of the record |
| Answer» E. | |
| 384. |
Which of the following could cause data to be unavailable? |
| A. | Data becoming lost or inaccurate |
| B. | The database server |
| C. | Planned database maintenance activities |
| D. | All of the above. |
| Answer» E. | |
| 385. |
A shared lock allows which of the following types of transactions to occur? |
| A. | Delete |
| B. | Insert |
| C. | Read |
| D. | Update |
| Answer» D. Update | |
| 386. |
Locking may cause which of the following problems? |
| A. | Erroneous updates |
| B. | Deadlock |
| C. | Versioning |
| D. | All of the above. |
| Answer» C. Versioning | |
| 387. |
Which of the following is true about Microsoft Active Server Pages (ASP)? |
| A. | It is stored in .cfm files. |
| B. | It is executed on the client. |
| C. | It does not use tags. |
| D. | It allows for coding of custom tags in an HTML file. |
| Answer» E. | |
| 388. |
Websites without a database attached to them have which of the following characteristics? |
| A. | The ability to generate data via SQL. |
| B. | The inability to use a browser to display Web pages. |
| C. | Static information using HTML or JavaScript. |
| D. | The need to use TCP/IP as the network protocol. |
| Answer» D. The need to use TCP/IP as the network protocol. | |
| 389. |
Web servers should be configured in which of the following ways? |
| A. | unauthorized access is restricted. |
| B. | unauthorized access is unrestricted. |
| C. | unauthorized access is impossible. |
| D. | unauthorized access is possible. |
| Answer» B. unauthorized access is unrestricted. | |
| 390. |
A proxy server is used for which of the following? |
| A. | To provide security against unauthorized users |
| B. | To process client requests for Web pages |
| C. | To process client requests for database access |
| D. | To provide TCP/IP |
| Answer» B. To process client requests for Web pages | |
| 391. |
XML is which of the following? |
| A. | A scripting language that states the rules for tagging elements. |
| B. | A programming language that states the rules for tagging elements. |
| C. | A programming language that allows the creation of customized tags. |
| D. | A scripting language that allows the creation of customized tags. |
| Answer» E. | |
| 392. |
An intranet provides which of the following? |
| A. | Connectivity to all customers |
| B. | Connectivity to selected customers |
| C. | Connectivity to no customers |
| D. | Connectivity to all of the above |
| Answer» D. Connectivity to all of the above | |
| 393. |
Structured data may include which of the following? |
| A. | Photo image |
| B. | Video clip |
| C. | Dates |
| D. | None of the above. |
| Answer» D. None of the above. | |
| 394. |
An extranet is which of the following? |
| A. | The use of Internet protocols with limited access to company data by the company's customers and suppliers. |
| B. | The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. |
| C. | The use of Internet protocols with limited access to company data by people within an organization. |
| D. | The use of Internet protocols with unlimited access to company data by people within an organization. |
| Answer» B. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. | |
| 395. |
Data administrators are responsible for: |
| A. | physical database design. |
| B. | managing technical issues in the database environment. |
| C. | overall management of data resources in an organization. |
| D. | writing application programs. |
| Answer» D. writing application programs. | |
| 396. |
Which of the following is true concerning open-source DBMS? |
| A. | Is free or nearly free database software whose source code is publicly available |
| B. | Is free or nearly free database software whose source code is not publicly available |
| C. | Is not competitive against PC-oriented packages and is fully SQL compliant |
| D. | Is competitive against PC-oriented packages and is not fully SQL compliant |
| Answer» B. Is free or nearly free database software whose source code is not publicly available | |
| 397. |
Which of the following is the preferred way to recover a database after a system failure? |
| A. | Rollback |
| B. | Rollforward |
| C. | Switch to duplicate database |
| D. | Reprocess transactions |
| Answer» D. Reprocess transactions | |
| 398. |
A data warehouse administrator is concerned with which of the following? |
| A. | The time to make a decision but not the typical roles of a database administrator |
| B. | The time to make a decision and the typical roles of a database administrator |
| C. | The typical roles of a data administrator and redesigning existing applications |
| D. | The typical roles of a database administrator and redesigning existing applications |
| Answer» C. The typical roles of a data administrator and redesigning existing applications | |
| 399. |
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? |
| A. | Rollback |
| B. | Rollforward |
| C. | Switch to duplicate database |
| D. | Reprocess transactions |
| Answer» B. Rollforward | |
| 400. |
An enterprise database is which of the following? |
| A. | A database designed to support only users external to an organization |
| B. | A database designed to support an entire organization |
| C. | A database designed to support a relatively small group |
| D. | A database designed to support a single PC |
| Answer» C. A database designed to support a relatively small group | |