

MCQOPTIONS
This section includes 1033 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
351. |
What is the type of Oracle backup in which all uncommitted changes have been removed from the datafiles? |
A. | Full backup |
B. | Consistent backup |
C. | Inconsistent backup |
D. | Differential backup |
Answer» C. Inconsistent backup | |
352. |
Which of the following is not true about modifying table columns? |
A. | You can drop a column at any time. |
B. | You can add a column at any time as long as it is a NULL column. |
C. | You can increase the number of characters in character columns or the number of digits in numeric columns |
D. | You cannot increase or decrease the number of decimal places. |
Answer» E. | |
353. |
________ is considered to be one of the foundations of data access in the Microsoft world. |
A. | ODBC |
B. | OLE DB |
C. | JPCD |
D. | ADO |
Answer» C. JPCD | |
354. |
________ is an interface by which application programs can access and process SQL databases in a DBMS-independent manner. |
A. | ODBC |
B. | OLE DB |
C. | JPCD |
D. | ADO |
Answer» B. OLE DB | |
355. |
Which of the following are goals of OLE DB? |
A. | Create object interfaces for DBMS functionality pieces only. |
B. | Increase flexibility only. |
C. | Object interface over any type of data only. |
D. | All of the above as goals of OLE DB. |
Answer» E. | |
356. |
An ODBC data structure that identifies a database and the DBMS that processes it is called a(n): |
A. | data source. |
B. | driver manager. |
C. | driver. |
D. | API. |
Answer» B. driver manager. | |
357. |
What is invoked via HTTP on the Web server computer when it responds to requests from a user's Web browser? |
A. | A Java application |
B. | A Java applet |
C. | A Java servlet |
D. | None of the above is correct. |
Answer» D. None of the above is correct. | |
358. |
The ODBC Level 2 API contains which the following functions? |
A. | Commit or rollback transactions only |
B. | Connect to data sources with driver-specific information only |
C. | Connect to data sources only |
D. | All of the above are contained in the OBDC Level 2 API |
Answer» E. | |
359. |
A JSP is transformed into a(n): |
A. | Java applet. |
B. | Java servlet. |
C. | Either 1 or 2 above. |
D. | Neither 1 nor 2 above. |
Answer» C. Either 1 or 2 above. | |
360. |
________ is a cover for utilizing OLE DB that is designed for use by almost any language. |
A. | ODBC |
B. | ASP |
C. | JPCD |
D. | ADO |
Answer» E. | |
361. |
What is sent to the user via HTTP, invoked using the HTTP protocol on the user's computer, and run on the user's computer as an application? |
A. | A Java application |
B. | A Java applet |
C. | A Java servlet |
D. | None of the above is correct. |
Answer» C. A Java servlet | |
362. |
Which JDBC driver Type(s) is(are) the JDBC-ODBC bridge? |
A. | Type 1 |
B. | Type 2 |
C. | Type 3 |
D. | Type 4 |
Answer» B. Type 2 | |
363. |
How many copies of a JSP page can be in memory at a time? |
A. | One |
B. | Two |
C. | Three |
D. | Unlimited |
Answer» B. Two | |
364. |
Which JDBC driver Type(s) can you use in a three-tier architecture and if the Web server and the DBMS are running on the same machine? |
A. | Type 1 only |
B. | Type 2 only |
C. | Both Type 3 and Type 4 |
D. | All of Type 1, Type 2, Type 3 and Type 4 |
Answer» E. | |
365. |
What programming language(s) or scripting language(s) does Java Server Pages (JSP) support? |
A. | VBScript only |
B. | Jscript only |
C. | Java only |
D. | All of the above are supported |
Answer» D. All of the above are supported | |
366. |
________ is an open source DBMS product that runs on UNIX, Linux and Windows. |
A. | MySQL |
B. | JSP/SQL |
C. | JDBC/SQL |
D. | Sun ACCESS |
Answer» B. JSP/SQL | |
367. |
What MySQL property is used to create a surrogate key in MySQL? |
A. | UNIQUE |
B. | SEQUENCE |
C. | AUTO_INCREMENT |
D. | None of the above -- Surrogate keys are not implemented in MySQL. |
Answer» D. None of the above -- Surrogate keys are not implemented in MySQL. | |
368. |
When using ODBC, which of the following processes ODBC requests and submits specific SQL statements to a given type of data source? |
A. | Data source |
B. | Driver |
C. | Driver manager |
D. | DBMS |
Answer» C. Driver manager | |
369. |
What type of failure occurs when Oracle fails due to an operating system or computer hardware failure? |
A. | Application failure |
B. | Instance Failure |
C. | Media Failure |
D. | Rollback failure |
Answer» C. Media Failure | |
370. |
In OLE DB, which of the following represents characteristics of the recordset abstraction? |
A. | Properties |
B. | Collections |
C. | Methods |
D. | Abstractions |
Answer» B. Collections | |
371. |
In ODBC, a file that can be shared among database users is called a: |
A. | system data source. |
B. | file data source. |
C. | user data source. |
D. | SQL text file. |
Answer» C. user data source. | |
372. |
________ is an object-oriented interface that encapsulates data-server functionality. |
A. | ODBC |
B. | OLE DB |
C. | JPCD |
D. | ADO |
Answer» C. JPCD | |
373. |
Duplicate data often results in loss of data integrity because: |
A. | the data formats may be inconsistent. |
B. | data values may not agree. |
C. | Both A & B. |
D. | Neither A & B. |
Answer» D. Neither A & B. | |
374. |
Who invented Java? |
A. | Netscape |
B. | Microsoft |
C. | Sun |
D. | None of the above is correct. |
Answer» D. None of the above is correct. | |
375. |
Metadata enables database designers and users to do all of the following except: |
A. | sample data. |
B. | understand what data exist. |
C. | what the fine distinctions are between similar data items. |
D. | what the data mean. |
Answer» B. understand what data exist. | |
376. |
A database management system (DBMS) is a: |
A. | hardware system used to create, maintain, and provide controlled access to a database. |
B. | hardware system used to create, maintain, and provide uncontrolled access to a database. |
C. | software system used to create, maintain, and provide controlled access to a database. |
D. | software system used to create, maintain, and provide uncontrolled access to a database. |
Answer» D. software system used to create, maintain, and provide uncontrolled access to a database. | |
377. |
To run a compiled Java program, the machine must have what loaded and running? |
A. | Java virtual machine |
B. | Java compiler |
C. | Java bytecode |
D. | A Web browser |
Answer» B. Java compiler | |
378. |
Which JDBC driver Type(s) can be used in either applet or servlet code? |
A. | Both Type 1 and Type 2 |
B. | Both Type 1 and Type 3 |
C. | Both Type 3 and Type 4 |
D. | Type 4 only |
Answer» D. Type 4 only | |
379. |
________ is a simple object model that is easier to understand and use than OLE DB, and is frequently used for database applications. |
A. | ASP |
B. | XML |
C. | ODBC |
D. | ADO |
Answer» E. | |
380. |
ODBC core SQL grammar contains which of the following?: |
A. | INSERT, UPDATE, DELETE only |
B. | Stored procedures only |
C. | Full SELECT (includes subqueries) only |
D. | Both 1 and 3 above are contained in the ODBC core SQL. |
Answer» E. | |
381. |
In creating a procedure, you may get a message if you have compile errors. Which of the following is true? |
A. | The line numbers reported match the line numbers you see in your text editor. |
B. | SQL*Plus will automatically show the errors to you. |
C. | To see the errors, enter SHOW ERRORS in SQL*Plus. |
D. | If there are no syntax errors, you will receive the message "NO ERRORS." |
Answer» D. If there are no syntax errors, you will receive the message "NO ERRORS." | |
382. |
Which of the following is not true about indexes? |
A. | Indexes are created to enforce uniqueness on columns. |
B. | Indexes are created to enable fast retrieval by column values. |
C. | Columns that are frequently used with equal conditions in WHERE clauses are good candidates for indexes. |
D. | Indexes are created with the ALTER TABLE command. |
Answer» E. | |
383. |
The transaction log includes which of the following? |
A. | The before-image of a record |
B. | The after-image of a record |
C. | The before and after-image of a record |
D. | The essential data of the record |
Answer» E. | |
384. |
Which of the following could cause data to be unavailable? |
A. | Data becoming lost or inaccurate |
B. | The database server |
C. | Planned database maintenance activities |
D. | All of the above. |
Answer» E. | |
385. |
A shared lock allows which of the following types of transactions to occur? |
A. | Delete |
B. | Insert |
C. | Read |
D. | Update |
Answer» D. Update | |
386. |
Locking may cause which of the following problems? |
A. | Erroneous updates |
B. | Deadlock |
C. | Versioning |
D. | All of the above. |
Answer» C. Versioning | |
387. |
Which of the following is true about Microsoft Active Server Pages (ASP)? |
A. | It is stored in .cfm files. |
B. | It is executed on the client. |
C. | It does not use tags. |
D. | It allows for coding of custom tags in an HTML file. |
Answer» E. | |
388. |
Websites without a database attached to them have which of the following characteristics? |
A. | The ability to generate data via SQL. |
B. | The inability to use a browser to display Web pages. |
C. | Static information using HTML or JavaScript. |
D. | The need to use TCP/IP as the network protocol. |
Answer» D. The need to use TCP/IP as the network protocol. | |
389. |
Web servers should be configured in which of the following ways? |
A. | unauthorized access is restricted. |
B. | unauthorized access is unrestricted. |
C. | unauthorized access is impossible. |
D. | unauthorized access is possible. |
Answer» B. unauthorized access is unrestricted. | |
390. |
A proxy server is used for which of the following? |
A. | To provide security against unauthorized users |
B. | To process client requests for Web pages |
C. | To process client requests for database access |
D. | To provide TCP/IP |
Answer» B. To process client requests for Web pages | |
391. |
XML is which of the following? |
A. | A scripting language that states the rules for tagging elements. |
B. | A programming language that states the rules for tagging elements. |
C. | A programming language that allows the creation of customized tags. |
D. | A scripting language that allows the creation of customized tags. |
Answer» E. | |
392. |
An intranet provides which of the following? |
A. | Connectivity to all customers |
B. | Connectivity to selected customers |
C. | Connectivity to no customers |
D. | Connectivity to all of the above |
Answer» D. Connectivity to all of the above | |
393. |
Structured data may include which of the following? |
A. | Photo image |
B. | Video clip |
C. | Dates |
D. | None of the above. |
Answer» D. None of the above. | |
394. |
An extranet is which of the following? |
A. | The use of Internet protocols with limited access to company data by the company's customers and suppliers. |
B. | The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. |
C. | The use of Internet protocols with limited access to company data by people within an organization. |
D. | The use of Internet protocols with unlimited access to company data by people within an organization. |
Answer» B. The use of Internet protocols with unlimited access to company data by the company's customers and suppliers. | |
395. |
Data administrators are responsible for: |
A. | physical database design. |
B. | managing technical issues in the database environment. |
C. | overall management of data resources in an organization. |
D. | writing application programs. |
Answer» D. writing application programs. | |
396. |
Which of the following is true concerning open-source DBMS? |
A. | Is free or nearly free database software whose source code is publicly available |
B. | Is free or nearly free database software whose source code is not publicly available |
C. | Is not competitive against PC-oriented packages and is fully SQL compliant |
D. | Is competitive against PC-oriented packages and is not fully SQL compliant |
Answer» B. Is free or nearly free database software whose source code is not publicly available | |
397. |
Which of the following is the preferred way to recover a database after a system failure? |
A. | Rollback |
B. | Rollforward |
C. | Switch to duplicate database |
D. | Reprocess transactions |
Answer» D. Reprocess transactions | |
398. |
A data warehouse administrator is concerned with which of the following? |
A. | The time to make a decision but not the typical roles of a database administrator |
B. | The time to make a decision and the typical roles of a database administrator |
C. | The typical roles of a data administrator and redesigning existing applications |
D. | The typical roles of a database administrator and redesigning existing applications |
Answer» C. The typical roles of a data administrator and redesigning existing applications | |
399. |
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? |
A. | Rollback |
B. | Rollforward |
C. | Switch to duplicate database |
D. | Reprocess transactions |
Answer» B. Rollforward | |
400. |
An enterprise database is which of the following? |
A. | A database designed to support only users external to an organization |
B. | A database designed to support an entire organization |
C. | A database designed to support a relatively small group |
D. | A database designed to support a single PC |
Answer» C. A database designed to support a relatively small group | |