Explore topic-wise MCQs in Engineering.

This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.

351.

What is the type of Oracle backup in which all uncommitted changes have been removed from the datafiles?

A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
Answer» C. Inconsistent backup
352.

Which of the following is not true about modifying table columns?

A. You can drop a column at any time.
B. You can add a column at any time as long as it is a NULL column.
C. You can increase the number of characters in character columns or the number of digits in numeric columns
D. You cannot increase or decrease the number of decimal places.
Answer» E.
353.

________ is considered to be one of the foundations of data access in the Microsoft world.

A. ODBC
B. OLE DB
C. JPCD
D. ADO
Answer» C. JPCD
354.

________ is an interface by which application programs can access and process SQL databases in a DBMS-independent manner.

A. ODBC
B. OLE DB
C. JPCD
D. ADO
Answer» B. OLE DB
355.

Which of the following are goals of OLE DB?

A. Create object interfaces for DBMS functionality pieces only.
B. Increase flexibility only.
C. Object interface over any type of data only.
D. All of the above as goals of OLE DB.
Answer» E.
356.

An ODBC data structure that identifies a database and the DBMS that processes it is called a(n):

A. data source.
B. driver manager.
C. driver.
D. API.
Answer» B. driver manager.
357.

What is invoked via HTTP on the Web server computer when it responds to requests from a user's Web browser?

A. A Java application
B. A Java applet
C. A Java servlet
D. None of the above is correct.
Answer» D. None of the above is correct.
358.

The ODBC Level 2 API contains which the following functions?

A. Commit or rollback transactions only
B. Connect to data sources with driver-specific information only
C. Connect to data sources only
D. All of the above are contained in the OBDC Level 2 API
Answer» E.
359.

A JSP is transformed into a(n):

A. Java applet.
B. Java servlet.
C. Either 1 or 2 above.
D. Neither 1 nor 2 above.
Answer» C. Either 1 or 2 above.
360.

________ is a cover for utilizing OLE DB that is designed for use by almost any language.

A. ODBC
B. ASP
C. JPCD
D. ADO
Answer» E.
361.

What is sent to the user via HTTP, invoked using the HTTP protocol on the user's computer, and run on the user's computer as an application?

A. A Java application
B. A Java applet
C. A Java servlet
D. None of the above is correct.
Answer» C. A Java servlet
362.

Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge?

A. Type 1
B. Type 2
C. Type 3
D. Type 4
Answer» B. Type 2
363.

How many copies of a JSP page can be in memory at a time?

A. One
B. Two
C. Three
D. Unlimited
Answer» B. Two
364.

Which JDBC driver Type(s) can you use in a three-tier architecture and if the Web server and the DBMS are running on the same machine?

A. Type 1 only
B. Type 2 only
C. Both Type 3 and Type 4
D. All of Type 1, Type 2, Type 3 and Type 4
Answer» E.
365.

What programming language(s) or scripting language(s) does Java Server Pages (JSP) support?

A. VBScript only
B. Jscript only
C. Java only
D. All of the above are supported
Answer» D. All of the above are supported
366.

________ is an open source DBMS product that runs on UNIX, Linux and Windows.

A. MySQL
B. JSP/SQL
C. JDBC/SQL
D. Sun ACCESS
Answer» B. JSP/SQL
367.

What MySQL property is used to create a surrogate key in MySQL?

A. UNIQUE
B. SEQUENCE
C. AUTO_INCREMENT
D. None of the above -- Surrogate keys are not implemented in MySQL.
Answer» D. None of the above -- Surrogate keys are not implemented in MySQL.
368.

When using ODBC, which of the following processes ODBC requests and submits specific SQL statements to a given type of data source?

A. Data source
B. Driver
C. Driver manager
D. DBMS
Answer» C. Driver manager
369.

What type of failure occurs when Oracle fails due to an operating system or computer hardware failure?

A. Application failure
B. Instance Failure
C. Media Failure
D. Rollback failure
Answer» C. Media Failure
370.

In OLE DB, which of the following represents characteristics of the recordset abstraction?

A. Properties
B. Collections
C. Methods
D. Abstractions
Answer» B. Collections
371.

In ODBC, a file that can be shared among database users is called a:

A. system data source.
B. file data source.
C. user data source.
D. SQL text file.
Answer» C. user data source.
372.

________ is an object-oriented interface that encapsulates data-server functionality.

A. ODBC
B. OLE DB
C. JPCD
D. ADO
Answer» C. JPCD
373.

Duplicate data often results in loss of data integrity because:

A. the data formats may be inconsistent.
B. data values may not agree.
C. Both A & B.
D. Neither A & B.
Answer» D. Neither A & B.
374.

Who invented Java?

A. Netscape
B. Microsoft
C. Sun
D. None of the above is correct.
Answer» D. None of the above is correct.
375.

Metadata enables database designers and users to do all of the following except:

A. sample data.
B. understand what data exist.
C. what the fine distinctions are between similar data items.
D. what the data mean.
Answer» B. understand what data exist.
376.

A database management system (DBMS) is a:

A. hardware system used to create, maintain, and provide controlled access to a database.
B. hardware system used to create, maintain, and provide uncontrolled access to a database.
C. software system used to create, maintain, and provide controlled access to a database.
D. software system used to create, maintain, and provide uncontrolled access to a database.
Answer» D. software system used to create, maintain, and provide uncontrolled access to a database.
377.

To run a compiled Java program, the machine must have what loaded and running?

A. Java virtual machine
B. Java compiler
C. Java bytecode
D. A Web browser
Answer» B. Java compiler
378.

Which JDBC driver Type(s) can be used in either applet or servlet code?

A. Both Type 1 and Type 2
B. Both Type 1 and Type 3
C. Both Type 3 and Type 4
D. Type 4 only
Answer» D. Type 4 only
379.

________ is a simple object model that is easier to understand and use than OLE DB, and is frequently used for database applications.

A. ASP
B. XML
C. ODBC
D. ADO
Answer» E.
380.

ODBC core SQL grammar contains which of the following?:

A. INSERT, UPDATE, DELETE only
B. Stored procedures only
C. Full SELECT (includes subqueries) only
D. Both 1 and 3 above are contained in the ODBC core SQL.
Answer» E.
381.

In creating a procedure, you may get a message if you have compile errors. Which of the following is true?

A. The line numbers reported match the line numbers you see in your text editor.
B. SQL*Plus will automatically show the errors to you.
C. To see the errors, enter SHOW ERRORS in SQL*Plus.
D. If there are no syntax errors, you will receive the message "NO ERRORS."
Answer» D. If there are no syntax errors, you will receive the message "NO ERRORS."
382.

Which of the following is not true about indexes?

A. Indexes are created to enforce uniqueness on columns.
B. Indexes are created to enable fast retrieval by column values.
C. Columns that are frequently used with equal conditions in WHERE clauses are good candidates for indexes.
D. Indexes are created with the ALTER TABLE command.
Answer» E.
383.

The transaction log includes which of the following?

A. The before-image of a record
B. The after-image of a record
C. The before and after-image of a record
D. The essential data of the record
Answer» E.
384.

Which of the following could cause data to be unavailable?

A. Data becoming lost or inaccurate
B. The database server
C. Planned database maintenance activities
D. All of the above.
Answer» E.
385.

A shared lock allows which of the following types of transactions to occur?

A. Delete
B. Insert
C. Read
D. Update
Answer» D. Update
386.

Locking may cause which of the following problems?

A. Erroneous updates
B. Deadlock
C. Versioning
D. All of the above.
Answer» C. Versioning
387.

Which of the following is true about Microsoft Active Server Pages (ASP)?

A. It is stored in .cfm files.
B. It is executed on the client.
C. It does not use tags.
D. It allows for coding of custom tags in an HTML file.
Answer» E.
388.

Websites without a database attached to them have which of the following characteristics?

A. The ability to generate data via SQL.
B. The inability to use a browser to display Web pages.
C. Static information using HTML or JavaScript.
D. The need to use TCP/IP as the network protocol.
Answer» D. The need to use TCP/IP as the network protocol.
389.

Web servers should be configured in which of the following ways?

A. unauthorized access is restricted.
B. unauthorized access is unrestricted.
C. unauthorized access is impossible.
D. unauthorized access is possible.
Answer» B. unauthorized access is unrestricted.
390.

A proxy server is used for which of the following?

A. To provide security against unauthorized users
B. To process client requests for Web pages
C. To process client requests for database access
D. To provide TCP/IP
Answer» B. To process client requests for Web pages
391.

XML is which of the following?

A. A scripting language that states the rules for tagging elements.
B. A programming language that states the rules for tagging elements.
C. A programming language that allows the creation of customized tags.
D. A scripting language that allows the creation of customized tags.
Answer» E.
392.

An intranet provides which of the following?

A. Connectivity to all customers
B. Connectivity to selected customers
C. Connectivity to no customers
D. Connectivity to all of the above
Answer» D. Connectivity to all of the above
393.

Structured data may include which of the following?

A. Photo image
B. Video clip
C. Dates
D. None of the above.
Answer» D. None of the above.
394.

An extranet is which of the following?

A. The use of Internet protocols with limited access to company data by the company's customers and suppliers.
B. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers.
C. The use of Internet protocols with limited access to company data by people within an organization.
D. The use of Internet protocols with unlimited access to company data by people within an organization.
Answer» B. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers.
395.

Data administrators are responsible for:

A. physical database design.
B. managing technical issues in the database environment.
C. overall management of data resources in an organization.
D. writing application programs.
Answer» D. writing application programs.
396.

Which of the following is true concerning open-source DBMS?

A. Is free or nearly free database software whose source code is publicly available
B. Is free or nearly free database software whose source code is not publicly available
C. Is not competitive against PC-oriented packages and is fully SQL compliant
D. Is competitive against PC-oriented packages and is not fully SQL compliant
Answer» B. Is free or nearly free database software whose source code is not publicly available
397.

Which of the following is the preferred way to recover a database after a system failure?

A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Answer» D. Reprocess transactions
398.

A data warehouse administrator is concerned with which of the following?

A. The time to make a decision but not the typical roles of a database administrator
B. The time to make a decision and the typical roles of a database administrator
C. The typical roles of a data administrator and redesigning existing applications
D. The typical roles of a database administrator and redesigning existing applications
Answer» C. The typical roles of a data administrator and redesigning existing applications
399.

Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?

A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Answer» B. Rollforward
400.

An enterprise database is which of the following?

A. A database designed to support only users external to an organization
B. A database designed to support an entire organization
C. A database designed to support a relatively small group
D. A database designed to support a single PC
Answer» C. A database designed to support a relatively small group