Explore topic-wise MCQs in Technical Programming.

This section includes 427 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

301.

With XML:

A. views are not limited to one multi-valued path only.
B. documents can automatically be generated from database data only.
C. database data can automatically be extracted from XML documents only.
D. With XML, all of the above are true.
Answer» E.
302.

The most popular way to materialize XML documents is to use:

A. DTD.
B. XSLT.
C. HTML.
D. SOAP.
Answer» C. HTML.
303.

Which of the following statements is not true about XML Schemas:

A. They are used to define the content and structure of data.
B. They define a set of symbols and the relationships of those symbols.
C. They are themselves XML documents.
D. They have their own syntax.
Answer» E.
304.

What standard, protocol or language was generalized to become a standard protocol for sending messages of any type, using any protocol?

A. SOAP
B. SGML
C. SQL
D. ADO
Answer» B. SGML
305.

The XSLT processor copies the elements of the stylesheet until it finds a command in the format:

A. SELECT ... FROM ... WHERE.
B. {item, action}.
C. {for-each select}.
D. <HTML>...<HTML>.
Answer» C. {for-each select}.
306.

Which of the following refers to the SQL Server transaction isolation level which places and holds locks on all rows that are read?

A. REPEATABLE READ
B. SERIALIZABLE
C. READ COMMITTED
D. READ UNCOMMITTED
Answer» B. SERIALIZABLE
307.

SQL Server program code that is executed after an SQL command has been processed is called a(n):

A. INSTEAD OF trigger.
B. BEFORE trigger.
C. AFTER trigger.
D. BEGIN trigger.
Answer» D. BEGIN trigger.
308.

Which of the following is not a factor in determining the concurrency control behavior of SQL Server?

A. Lock level
B. Transaction isolation level
C. Cursor concurrency setting
D. Locking hints
Answer» B. Transaction isolation level
309.

SQL Server automatically creates an index on:

A. primary keys only.
B. foreign key only.
C. both primary and foreign keys.
D. SQL Server never automatically creates an index.
Answer» D. SQL Server never automatically creates an index.
310.

With which type of SQL Server recovery model are all database changes logged?

A. Differential recovery
B. Full recovery
C. Simple recovery
D. Bulk-logged recovery
Answer» C. Simple recovery
311.

With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data.

A. Nonclustered
B. Clustered
C. Primary
D. Secondary
Answer» B. Clustered
312.

n SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup?

A. Complete backup
B. Transaction Log
C. Differential backup
D. None of the above is correct.
Answer» D. None of the above is correct.
313.

With this type of index, the data are stored in the bottom level of the index and in the same order as that index.

A. Nonclustered
B. Clustered
C. Primary
D. Secondary
Answer» C. Primary
314.

An SQL Server 2000 language that adds programming elements like parameters, variables, IF, WHILE loops, and so forth, to the basic capabilities of SQL is called:

A. COBOL.
B. VB.NET.
C. TRANSACT SQL.
D. Visual Basic.
Answer» D. Visual Basic.
315.

With this type of SQL Server cursor concurrency no lock is obtained until the user updates the data.

A. READ_ONLY
B. SCROLL_LOCK
C. OPTIMISTIC
D. PESSIMISTIC
Answer» D. PESSIMISTIC
316.

SQL Server 2000 stored procedures can:

A. never be kept within the database.
B. be kept within the database and invoked by application programs.
C. be stored on the users computer.
D. support BEFORE, INSTEAD OF and AFTER types.
Answer» C. be stored on the users computer.
317.

With which type of SQL Server recovery model, is no logging done?

A. Differential recovery
B. Full recovery
C. Bulk-logged recovery
D. Simple recovery
Answer» E.
318.

Which of the following is a way to create and modify tables using SQL Server?

A. Write SQL code using either CREATE or ALTER SQL statements only.
B. Use the graphical facilities of SQL Server Enterprise Manager only.
C. Both of the two methods above will work.
D. Neither of the two methods above will work.
Answer» D. Neither of the two methods above will work.
319.

Which of the three possible types of triggers does SQL Server support?

A. INSTEAD OF only
B. AFTER only
C. BEFORE only
D. INSTEAD OF and AFTER only
Answer» E.
320.

Which type of SQL Server cursor concurrency places an update lock on a row when the row is read?

A. READ_ONLY
B. SCROLL_LOCK
C. OPTIMISTIC
D. READCOMMITTED
Answer» E.
321.

SQL Server program code that is executed instead of an SQL command that needs to be processed is called a(n):

A. INSTEAD OF trigger.
B. BEFORE trigger.
C. AFTER trigger.
D. BEGIN trigger.
Answer» B. BEFORE trigger.
322.

The strictest transaction isolation level provided by SQL Server is called:

A. REPEATABLE READ.
B. SERIALIZABLE.
C. READ COMMITTED.
D. READ UNCOMMITTED.
Answer» C. READ COMMITTED.
323.

What mode of authentication does SQL Server NOT provide?

A. Windows-only security
B. Both SQL Server and Windows-only security
C. Mixed security
D. SQL Server only security
Answer» E.
324.

Using SQL Server 2000, which of the following symbols is used to indicate parameters in stored procedures?

A. #
B. %
C. &
D. @
Answer» E.
325.

With which type of SQL Server recovery model are all database changes logged except those that cause large log entries?

A. Differential recovery
B. Full recovery
C. Simple recovery
D. Bulk-logged recovery
Answer» E.
326.

Locks placed by the DBMS are called ________

A. implicit locks
B. explicit locks
C. exclusive locks
D. shared locks
Answer» B. explicit locks
327.

What is the overall responsibility of the DBA?

A. Facilitate the development and use of the database
B. Create and populate tables
C. Development, operation, and maintenance of the database and its applications
D. Both the first and third answers above are correct
Answer» E.
328.

A cursor type in which the application sees the data as they were at the time the cursor was opened is called:

A. forward only.
B. static.
C. keyset.
D. dynamic.
Answer» C. keyset.
329.

The size of a lock is called:

A. implicit lock.
B. lock granularity.
C. exclusive lock.
D. shared lock.
Answer» C. exclusive lock.
330.

Which of the following locks the item from access of any type?

A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
Answer» D. Shared lock
331.

Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» C. Repeatable read
332.

Which of the following occurs when one transaction reads a changed record that has not been committed to the database?

A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Answer» D. Consistent read
333.

A cursor type in which the application can only move forward through the recordset is called:

A. forward only.
B. static.
C. keyset.
D. dynamic.
Answer» B. static.
334.

A transaction in which either all of the database actions occur or none of them do is called:

A. atomic.
B. consistent.
C. isolated.
D. durable
Answer» B. consistent.
335.

Dirty read, nonrepeatable, and phantom reads are not possible in this instance.

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» E.
336.

Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads?

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» D. Serializable
337.

Which of the following refers to a cursor type where changes of any type and from any source are visible?

A. Forward only
B. Static
C. Keyset
D. Dynamic
Answer» E.
338.

Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?

A. Forward only
B. Static
C. Keyset
D. Dynamic
Answer» D. Dynamic
339.

The advantage of optimistic locking is that:

A. the lock is obtained only after the transaction has processed.
B. the lock is obtained before the transaction has processed.
C. the lock never needs to be obtained.
D. transactions that are best suited are those with a lot of activity.
Answer» B. the lock is obtained before the transaction has processed.
340.

Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?

A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Answer» B. Phantom read
341.

In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed.

A. Read committed
B. Read uncommitted
C. Repeatable read
D. Serializable
Answer» B. Read uncommitted
342.

A transaction for which all committed changes are permanent is called:

A. atomic.
B. consistent.
C. isolated.
D. durable.
Answer» E.
343.

Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?

A. Nonrepeatable read
B. Phantom read
C. Dirty read
D. Consistent read
Answer» C. Dirty read
344.

Which of the following locks the item from change but not from read?

A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
Answer» E.
345.

Locks placed by command are called ________ .

A. implicit locks
B. explicit locks
C. exclusive locks
D. shared locks
Answer» C. exclusive locks
346.

Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain:

A. GROUP BY
B. WHERE.
C. ORDER BY.
D. FROM.
Answer» D. FROM.
347.

What is an advantage of placing computations in SQL views?

A. To save users from having to write an expression.
B. To ensure that the results are consistent.
C. To accomplish both of the above.
D. None of the above is correct - computations cannot be placed in a view.
Answer» D. None of the above is correct - computations cannot be placed in a view.
348.

Which is NOT one of the most common types of SQL CHECK constraints?

A. System date
B. Range checks
C. Lists of values
D. Comparing one column value to another within the same table
Answer» B. Range checks
349.

What SQL structure is used to limit column values of a table?

A. The LIMIT constraint
B. The CHECK constraint
C. The VALUE constraint
D. None of the above is correct.
Answer» C. The VALUE constraint
350.

The SQL ALTER statement can be used to:

A. change the table structure.
B. change the table data.
C. add rows to the table.
D. delete rows from the table.
Answer» B. change the table data.