

MCQOPTIONS
Saved Bookmarks
This section includes 427 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
301. |
With XML: |
A. | views are not limited to one multi-valued path only. |
B. | documents can automatically be generated from database data only. |
C. | database data can automatically be extracted from XML documents only. |
D. | With XML, all of the above are true. |
Answer» E. | |
302. |
The most popular way to materialize XML documents is to use: |
A. | DTD. |
B. | XSLT. |
C. | HTML. |
D. | SOAP. |
Answer» C. HTML. | |
303. |
Which of the following statements is not true about XML Schemas: |
A. | They are used to define the content and structure of data. |
B. | They define a set of symbols and the relationships of those symbols. |
C. | They are themselves XML documents. |
D. | They have their own syntax. |
Answer» E. | |
304. |
What standard, protocol or language was generalized to become a standard protocol for sending messages of any type, using any protocol? |
A. | SOAP |
B. | SGML |
C. | SQL |
D. | ADO |
Answer» B. SGML | |
305. |
The XSLT processor copies the elements of the stylesheet until it finds a command in the format: |
A. | SELECT ... FROM ... WHERE. |
B. | {item, action}. |
C. | {for-each select}. |
D. | <HTML>...<HTML>. |
Answer» C. {for-each select}. | |
306. |
Which of the following refers to the SQL Server transaction isolation level which places and holds locks on all rows that are read? |
A. | REPEATABLE READ |
B. | SERIALIZABLE |
C. | READ COMMITTED |
D. | READ UNCOMMITTED |
Answer» B. SERIALIZABLE | |
307. |
SQL Server program code that is executed after an SQL command has been processed is called a(n): |
A. | INSTEAD OF trigger. |
B. | BEFORE trigger. |
C. | AFTER trigger. |
D. | BEGIN trigger. |
Answer» D. BEGIN trigger. | |
308. |
Which of the following is not a factor in determining the concurrency control behavior of SQL Server? |
A. | Lock level |
B. | Transaction isolation level |
C. | Cursor concurrency setting |
D. | Locking hints |
Answer» B. Transaction isolation level | |
309. |
SQL Server automatically creates an index on: |
A. | primary keys only. |
B. | foreign key only. |
C. | both primary and foreign keys. |
D. | SQL Server never automatically creates an index. |
Answer» D. SQL Server never automatically creates an index. | |
310. |
With which type of SQL Server recovery model are all database changes logged? |
A. | Differential recovery |
B. | Full recovery |
C. | Simple recovery |
D. | Bulk-logged recovery |
Answer» C. Simple recovery | |
311. |
With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data. |
A. | Nonclustered |
B. | Clustered |
C. | Primary |
D. | Secondary |
Answer» B. Clustered | |
312. |
n SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup? |
A. | Complete backup |
B. | Transaction Log |
C. | Differential backup |
D. | None of the above is correct. |
Answer» D. None of the above is correct. | |
313. |
With this type of index, the data are stored in the bottom level of the index and in the same order as that index. |
A. | Nonclustered |
B. | Clustered |
C. | Primary |
D. | Secondary |
Answer» C. Primary | |
314. |
An SQL Server 2000 language that adds programming elements like parameters, variables, IF, WHILE loops, and so forth, to the basic capabilities of SQL is called: |
A. | COBOL. |
B. | VB.NET. |
C. | TRANSACT SQL. |
D. | Visual Basic. |
Answer» D. Visual Basic. | |
315. |
With this type of SQL Server cursor concurrency no lock is obtained until the user updates the data. |
A. | READ_ONLY |
B. | SCROLL_LOCK |
C. | OPTIMISTIC |
D. | PESSIMISTIC |
Answer» D. PESSIMISTIC | |
316. |
SQL Server 2000 stored procedures can: |
A. | never be kept within the database. |
B. | be kept within the database and invoked by application programs. |
C. | be stored on the users computer. |
D. | support BEFORE, INSTEAD OF and AFTER types. |
Answer» C. be stored on the users computer. | |
317. |
With which type of SQL Server recovery model, is no logging done? |
A. | Differential recovery |
B. | Full recovery |
C. | Bulk-logged recovery |
D. | Simple recovery |
Answer» E. | |
318. |
Which of the following is a way to create and modify tables using SQL Server? |
A. | Write SQL code using either CREATE or ALTER SQL statements only. |
B. | Use the graphical facilities of SQL Server Enterprise Manager only. |
C. | Both of the two methods above will work. |
D. | Neither of the two methods above will work. |
Answer» D. Neither of the two methods above will work. | |
319. |
Which of the three possible types of triggers does SQL Server support? |
A. | INSTEAD OF only |
B. | AFTER only |
C. | BEFORE only |
D. | INSTEAD OF and AFTER only |
Answer» E. | |
320. |
Which type of SQL Server cursor concurrency places an update lock on a row when the row is read? |
A. | READ_ONLY |
B. | SCROLL_LOCK |
C. | OPTIMISTIC |
D. | READCOMMITTED |
Answer» E. | |
321. |
SQL Server program code that is executed instead of an SQL command that needs to be processed is called a(n): |
A. | INSTEAD OF trigger. |
B. | BEFORE trigger. |
C. | AFTER trigger. |
D. | BEGIN trigger. |
Answer» B. BEFORE trigger. | |
322. |
The strictest transaction isolation level provided by SQL Server is called: |
A. | REPEATABLE READ. |
B. | SERIALIZABLE. |
C. | READ COMMITTED. |
D. | READ UNCOMMITTED. |
Answer» C. READ COMMITTED. | |
323. |
What mode of authentication does SQL Server NOT provide? |
A. | Windows-only security |
B. | Both SQL Server and Windows-only security |
C. | Mixed security |
D. | SQL Server only security |
Answer» E. | |
324. |
Using SQL Server 2000, which of the following symbols is used to indicate parameters in stored procedures? |
A. | # |
B. | % |
C. | & |
D. | @ |
Answer» E. | |
325. |
With which type of SQL Server recovery model are all database changes logged except those that cause large log entries? |
A. | Differential recovery |
B. | Full recovery |
C. | Simple recovery |
D. | Bulk-logged recovery |
Answer» E. | |
326. |
Locks placed by the DBMS are called ________ |
A. | implicit locks |
B. | explicit locks |
C. | exclusive locks |
D. | shared locks |
Answer» B. explicit locks | |
327. |
What is the overall responsibility of the DBA? |
A. | Facilitate the development and use of the database |
B. | Create and populate tables |
C. | Development, operation, and maintenance of the database and its applications |
D. | Both the first and third answers above are correct |
Answer» E. | |
328. |
A cursor type in which the application sees the data as they were at the time the cursor was opened is called: |
A. | forward only. |
B. | static. |
C. | keyset. |
D. | dynamic. |
Answer» C. keyset. | |
329. |
The size of a lock is called: |
A. | implicit lock. |
B. | lock granularity. |
C. | exclusive lock. |
D. | shared lock. |
Answer» C. exclusive lock. | |
330. |
Which of the following locks the item from access of any type? |
A. | Implicit lock |
B. | Explicit lock |
C. | Exclusive lock |
D. | Shared lock |
Answer» D. Shared lock | |
331. |
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur? |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» C. Repeatable read | |
332. |
Which of the following occurs when one transaction reads a changed record that has not been committed to the database? |
A. | Nonrepeatable read |
B. | Phantom read |
C. | Dirty read |
D. | Consistent read |
Answer» D. Consistent read | |
333. |
A cursor type in which the application can only move forward through the recordset is called: |
A. | forward only. |
B. | static. |
C. | keyset. |
D. | dynamic. |
Answer» B. static. | |
334. |
A transaction in which either all of the database actions occur or none of them do is called: |
A. | atomic. |
B. | consistent. |
C. | isolated. |
D. | durable |
Answer» B. consistent. | |
335. |
Dirty read, nonrepeatable, and phantom reads are not possible in this instance. |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» E. | |
336. |
Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads? |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» D. Serializable | |
337. |
Which of the following refers to a cursor type where changes of any type and from any source are visible? |
A. | Forward only |
B. | Static |
C. | Keyset |
D. | Dynamic |
Answer» E. | |
338. |
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row? |
A. | Forward only |
B. | Static |
C. | Keyset |
D. | Dynamic |
Answer» D. Dynamic | |
339. |
The advantage of optimistic locking is that: |
A. | the lock is obtained only after the transaction has processed. |
B. | the lock is obtained before the transaction has processed. |
C. | the lock never needs to be obtained. |
D. | transactions that are best suited are those with a lot of activity. |
Answer» B. the lock is obtained before the transaction has processed. | |
340. |
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction? |
A. | Nonrepeatable read |
B. | Phantom read |
C. | Dirty read |
D. | Consistent read |
Answer» B. Phantom read | |
341. |
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed. |
A. | Read committed |
B. | Read uncommitted |
C. | Repeatable read |
D. | Serializable |
Answer» B. Read uncommitted | |
342. |
A transaction for which all committed changes are permanent is called: |
A. | atomic. |
B. | consistent. |
C. | isolated. |
D. | durable. |
Answer» E. | |
343. |
Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read? |
A. | Nonrepeatable read |
B. | Phantom read |
C. | Dirty read |
D. | Consistent read |
Answer» C. Dirty read | |
344. |
Which of the following locks the item from change but not from read? |
A. | Implicit lock |
B. | Explicit lock |
C. | Exclusive lock |
D. | Shared lock |
Answer» E. | |
345. |
Locks placed by command are called ________ . |
A. | implicit locks |
B. | explicit locks |
C. | exclusive locks |
D. | shared locks |
Answer» C. exclusive locks | |
346. |
Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain: |
A. | GROUP BY |
B. | WHERE. |
C. | ORDER BY. |
D. | FROM. |
Answer» D. FROM. | |
347. |
What is an advantage of placing computations in SQL views? |
A. | To save users from having to write an expression. |
B. | To ensure that the results are consistent. |
C. | To accomplish both of the above. |
D. | None of the above is correct - computations cannot be placed in a view. |
Answer» D. None of the above is correct - computations cannot be placed in a view. | |
348. |
Which is NOT one of the most common types of SQL CHECK constraints? |
A. | System date |
B. | Range checks |
C. | Lists of values |
D. | Comparing one column value to another within the same table |
Answer» B. Range checks | |
349. |
What SQL structure is used to limit column values of a table? |
A. | The LIMIT constraint |
B. | The CHECK constraint |
C. | The VALUE constraint |
D. | None of the above is correct. |
Answer» C. The VALUE constraint | |
350. |
The SQL ALTER statement can be used to: |
A. | change the table structure. |
B. | change the table data. |
C. | add rows to the table. |
D. | delete rows from the table. |
Answer» B. change the table data. | |