

MCQOPTIONS
This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
51. |
Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain: |
A. | GROUP BY. |
B. | WHERE. |
C. | ORDER BY. |
D. | FROM. |
Answer» D. FROM. | |
52. |
The size of a lock is called: |
A. | implicit lock. |
B. | lock granularity. |
C. | exclusive lock. |
D. | shared lock. |
Answer» C. exclusive lock. | |
53. |
Dirty read, nonrepeatable, and phantom reads are not possible in this instance. |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» E. | |
54. |
A transaction in which either all of the database actions occur or none of them do is called: |
A. | atomic. |
B. | consistent. |
C. | isolated. |
D. | durable. |
Answer» B. consistent. | |
55. |
Which of the following occurs when one transaction reads a changed record that has not been committed to the database? |
A. | Nonrepeatable read |
B. | Phantom read |
C. | Dirty read |
D. | Consistent read |
Answer» D. Consistent read | |
56. |
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction? |
A. | Nonrepeatable read |
B. | Phantom read |
C. | Dirty read |
D. | Consistent read |
Answer» B. Phantom read | |
57. |
What is the overall responsibility of the DBA? |
A. | Facilitate the development and use of the database |
B. | Create and populate tables |
C. | Development, operation, and maintenance of the database and its applications |
D. | Both the first and third answers above are correct. |
Answer» E. | |
58. |
Locks placed by the DBMS are called ________ . |
A. | implicit locks |
B. | explicit locks |
C. | exclusive locks |
D. | shared locks |
Answer» B. explicit locks | |
59. |
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur? |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» C. Repeatable read | |
60. |
SQL Server 2000 stored procedures can: |
A. | never be kept within the database. |
B. | be kept within the database and invoked by application programs. |
C. | be stored on the users' computer. |
D. | support BEFORE, INSTEAD OF and AFTER types. |
Answer» C. be stored on the users' computer. | |
61. |
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row? |
A. | Forward only |
B. | Static |
C. | Keyset |
D. | Dynamic |
Answer» D. Dynamic | |
62. |
Which of the following refers to a cursor type where changes of any type and from any source are visible? |
A. | Forward only |
B. | Static |
C. | Keyset |
D. | Dynamic |
Answer» E. | |
63. |
Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads? |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» D. Serializable | |
64. |
One solution to the multivalued dependency constraint problem is to: |
A. | split the relation into two relations, each with a single theme. |
B. | change the theme. |
C. | create a new theme. |
D. | add a composite key. |
Answer» B. change the theme. | |
65. |
Which type of SQL Server cursor concurrency places an update lock on a row when the row is read? |
A. | READ_ONLY |
B. | SCROLL_LOCK |
C. | OPTIMISTIC |
D. | READCOMMITTED |
Answer» E. | |
66. |
Which of the following is a way to create and modify tables using SQL Server? |
A. | Write SQL code using either CREATE or ALTER SQL statements only. |
B. | Use the graphical facilities of SQL Server Enterprise Manager only. |
C. | Both of the two methods above will work. |
D. | Neither of the two methods above will work. |
Answer» D. Neither of the two methods above will work. | |
67. |
With which type of SQL Server recovery model, is no logging done? |
A. | Differential recovery |
B. | Full recovery |
C. | Bulk-logged recovery |
D. | Simple recovery |
Answer» E. | |
68. |
With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data. |
A. | Nonclustered |
B. | Clustered |
C. | Primary |
D. | Secondary |
Answer» B. Clustered | |
69. |
With which type of SQL Server recovery model are all database changes logged? |
A. | Differential recovery |
B. | Full recovery |
C. | Simple recovery |
D. | Bulk-logged recovery |
Answer» C. Simple recovery | |
70. |
SQL Server program code that is executed after an SQL command has been processed is called a(n): |
A. | INSTEAD OF trigger. |
B. | BEFORE trigger. |
C. | AFTER trigger. |
D. | BEGIN trigger. |
Answer» D. BEGIN trigger. | |
71. |
With this type of SQL Server cursor concurrency no lock is obtained until the user updates the data. |
A. | READ_ONLY |
B. | SCROLL_LOCK |
C. | OPTIMISTIC |
D. | PESSIMISTIC |
Answer» D. PESSIMISTIC | |
72. |
With this type of index, the data are stored in the bottom level of the index and in the same order as that index. |
A. | Nonclustered |
B. | Clustered |
C. | Primary |
D. | Secondary |
Answer» C. Primary | |
73. |
Which of the following is a group of one or more attributes that uniquely identifies a row? |
A. | Key |
B. | Determinant |
C. | Tuple |
D. | Relation |
Answer» B. Determinant | |
74. |
In SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup? |
A. | Complete backup |
B. | Transaction Log |
C. | Differential backup |
D. | None of the above is correct. |
Answer» D. None of the above is correct. | |
75. |
When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n): |
A. | transitive dependency. |
B. | insertion anomaly. |
C. | referential integrity constraint. |
D. | normal form. |
Answer» D. normal form. | |
76. |
A functional dependency is a relationship between or among: |
A. | tables. |
B. | rows. |
C. | relations. |
D. | attributes. |
Answer» E. | |
77. |
For some relations, changing the data can have undesirable consequences called: |
A. | referential integrity constraints. |
B. | modification anomalies. |
C. | normal forms. |
D. | transitive dependencies. |
Answer» C. normal forms. | |
78. |
An attribute is a(n): |
A. | column of a table. |
B. | two dimensional table. |
C. | row of a table. |
D. | key of a table. |
Answer» B. two dimensional table. | |
79. |
The advantage of optimistic locking is that: |
A. | the lock is obtained only after the transaction has processed. |
B. | the lock is obtained before the transaction has processed. |
C. | the lock never needs to be obtained. |
D. | transactions that are best suited are those with a lot of activity. |
Answer» B. the lock is obtained before the transaction has processed. | |
80. |
A tuple is a(n): |
A. | column of a table. |
B. | two dimensional table. |
C. | row of a table. |
D. | key of a table. |
Answer» D. key of a table. | |
81. |
Table is synonymous with the term: |
A. | record. |
B. | relation. |
C. | column. |
D. | field. |
Answer» C. column. | |
82. |
Which of the following is not a restriction for a table to be a relation? |
A. | The cells of the table must contain a single value. |
B. | All of the entries in any column must be of the same kind. |
C. | The columns must be ordered. |
D. | No two rows in a table may be identical. |
Answer» D. No two rows in a table may be identical. | |
83. |
A key: |
A. | must always be composed of two or more columns. |
B. | can only be one column. |
C. | identifies a row. |
D. | identifies a column. |
Answer» D. identifies a column. | |
84. |
When using the SQL INSERT statement: |
A. | rows can be modified according to criteria only. |
B. | rows cannot be copied in mass from one table to another only. |
C. | rows can be inserted into a table only one at a time only. |
D. | rows can either be inserted into a table one at a time or in groups. |
Answer» E. | |
85. |
What is not an advantage of stored procedures? |
A. | Greater security |
B. | SQL can be optimized |
C. | Code sharing |
D. | Increased network traffic |
Answer» E. | |
86. |
A reason for using an SQL view to hide columns is: |
A. | to simplify a result only. |
B. | to prevent the display of sensitive data only. |
C. | to accomplish both of the above. |
D. | None of the above are reasons for using an SQL view. |
Answer» D. None of the above are reasons for using an SQL view. | |
87. |
The SQL ALTER statement can be used to: |
A. | change the table structure. |
B. | change the table data. |
C. | add rows to the table. |
D. | delete rows from the table. |
Answer» B. change the table data. | |
88. |
To update an SQL view, the DBMS must be able to associate the column(s) to be updated with: |
A. | a particular column in a particular underlying table. |
B. | a particular column in a particular row. |
C. | a particular row in a particular underlying table. |
D. | None of the above is correct. |
Answer» D. None of the above is correct. | |
89. |
Which of the following is NOT a type of SQL constraint? |
A. | PRIMARY KEY |
B. | FOREIGN KEY |
C. | ALTERNATE KEY |
D. | UNIQUE |
Answer» D. UNIQUE | |
90. |
A ________ is a program that performs some common action on database data and that is stored in the database. |
A. | trigger |
B. | stored procedure |
C. | pseudofile |
D. | None of the above is correct. |
Answer» C. pseudofile | |
91. |
For what purposes are views used? |
A. | To hide columns only |
B. | To hide rows only |
C. | To hide complicated SQL statements only |
D. | All of the above are uses for SQL views. |
Answer» E. | |
92. |
Which type of entity is related to two or more associated entities that each contain specialized attributes that apply to some but not all of the instances of the entity? |
A. | Supertype entity |
B. | Subtype entity |
C. | Archetype entity |
D. | Instance entity |
Answer» B. Subtype entity | |
93. |
In which of the following is a single-entity instance of one type of related to a single-entity instance of another type? |
A. | One-to-One Relationship |
B. | One-to-Many Relationship |
C. | Many-to-Many Relationship |
D. | Composite Relationship |
Answer» B. One-to-Many Relationship | |
94. |
Entities can be associated with one another in which of the following? |
A. | Entities |
B. | Attributes |
C. | Identifiers |
D. | Relationships |
Answer» E. | |
95. |
Properties that describe the characteristics of entities are called: |
A. | entities. |
B. | attributes. |
C. | identifiers. |
D. | relationships. |
Answer» C. identifiers. | |
96. |
The strictest transaction isolation level provided by SQL Server is called: |
A. | REPEATABLE READ. |
B. | SERIALIZABLE. |
C. | READ COMMITTED. |
D. | READ UNCOMMITTED. |
Answer» C. READ COMMITTED. | |
97. |
In which of the following can many entity instances of one type be related to many entity instances of another type? |
A. | One-to-One Relationship |
B. | One-to-Many Relationship |
C. | Many-to-Many Relationship |
D. | Composite Relationship |
Answer» D. Composite Relationship | |
98. |
SQL Server program code that is executed instead of an SQL command that needs to be processed is called a(n): |
A. | INSTEAD OF trigger. |
B. | BEFORE trigger. |
C. | AFTER trigger. |
D. | BEGIN trigger. |
Answer» B. BEFORE trigger. | |
99. |
Which of the following locks the item from change but not from read? |
A. | Implicit lock |
B. | Explicit lock |
C. | Exclusive lock |
D. | Shared lock |
Answer» E. | |
100. |
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed. |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» B. Read uncommitted | |