MCQOPTIONS
Saved Bookmarks
This section includes 427 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 301. |
With XML: |
| A. | views are not limited to one multi-valued path only. |
| B. | documents can automatically be generated from database data only. |
| C. | database data can automatically be extracted from XML documents only. |
| D. | With XML, all of the above are true. |
| Answer» E. | |
| 302. |
The most popular way to materialize XML documents is to use: |
| A. | DTD. |
| B. | XSLT. |
| C. | HTML. |
| D. | SOAP. |
| Answer» C. HTML. | |
| 303. |
Which of the following statements is not true about XML Schemas: |
| A. | They are used to define the content and structure of data. |
| B. | They define a set of symbols and the relationships of those symbols. |
| C. | They are themselves XML documents. |
| D. | They have their own syntax. |
| Answer» E. | |
| 304. |
What standard, protocol or language was generalized to become a standard protocol for sending messages of any type, using any protocol? |
| A. | SOAP |
| B. | SGML |
| C. | SQL |
| D. | ADO |
| Answer» B. SGML | |
| 305. |
The XSLT processor copies the elements of the stylesheet until it finds a command in the format: |
| A. | SELECT ... FROM ... WHERE. |
| B. | {item, action}. |
| C. | {for-each select}. |
| D. | <HTML>...<HTML>. |
| Answer» C. {for-each select}. | |
| 306. |
Which of the following refers to the SQL Server transaction isolation level which places and holds locks on all rows that are read? |
| A. | REPEATABLE READ |
| B. | SERIALIZABLE |
| C. | READ COMMITTED |
| D. | READ UNCOMMITTED |
| Answer» B. SERIALIZABLE | |
| 307. |
SQL Server program code that is executed after an SQL command has been processed is called a(n): |
| A. | INSTEAD OF trigger. |
| B. | BEFORE trigger. |
| C. | AFTER trigger. |
| D. | BEGIN trigger. |
| Answer» D. BEGIN trigger. | |
| 308. |
Which of the following is not a factor in determining the concurrency control behavior of SQL Server? |
| A. | Lock level |
| B. | Transaction isolation level |
| C. | Cursor concurrency setting |
| D. | Locking hints |
| Answer» B. Transaction isolation level | |
| 309. |
SQL Server automatically creates an index on: |
| A. | primary keys only. |
| B. | foreign key only. |
| C. | both primary and foreign keys. |
| D. | SQL Server never automatically creates an index. |
| Answer» D. SQL Server never automatically creates an index. | |
| 310. |
With which type of SQL Server recovery model are all database changes logged? |
| A. | Differential recovery |
| B. | Full recovery |
| C. | Simple recovery |
| D. | Bulk-logged recovery |
| Answer» C. Simple recovery | |
| 311. |
With this type of index, the bottom level of an index does not contain data, but rather it contains pointers to data. |
| A. | Nonclustered |
| B. | Clustered |
| C. | Primary |
| D. | Secondary |
| Answer» B. Clustered | |
| 312. |
n SQL Server 2000, which of the following makes a copy of the changes that have been made to the database since the last complete backup? |
| A. | Complete backup |
| B. | Transaction Log |
| C. | Differential backup |
| D. | None of the above is correct. |
| Answer» D. None of the above is correct. | |
| 313. |
With this type of index, the data are stored in the bottom level of the index and in the same order as that index. |
| A. | Nonclustered |
| B. | Clustered |
| C. | Primary |
| D. | Secondary |
| Answer» C. Primary | |
| 314. |
An SQL Server 2000 language that adds programming elements like parameters, variables, IF, WHILE loops, and so forth, to the basic capabilities of SQL is called: |
| A. | COBOL. |
| B. | VB.NET. |
| C. | TRANSACT SQL. |
| D. | Visual Basic. |
| Answer» D. Visual Basic. | |
| 315. |
With this type of SQL Server cursor concurrency no lock is obtained until the user updates the data. |
| A. | READ_ONLY |
| B. | SCROLL_LOCK |
| C. | OPTIMISTIC |
| D. | PESSIMISTIC |
| Answer» D. PESSIMISTIC | |
| 316. |
SQL Server 2000 stored procedures can: |
| A. | never be kept within the database. |
| B. | be kept within the database and invoked by application programs. |
| C. | be stored on the users computer. |
| D. | support BEFORE, INSTEAD OF and AFTER types. |
| Answer» C. be stored on the users computer. | |
| 317. |
With which type of SQL Server recovery model, is no logging done? |
| A. | Differential recovery |
| B. | Full recovery |
| C. | Bulk-logged recovery |
| D. | Simple recovery |
| Answer» E. | |
| 318. |
Which of the following is a way to create and modify tables using SQL Server? |
| A. | Write SQL code using either CREATE or ALTER SQL statements only. |
| B. | Use the graphical facilities of SQL Server Enterprise Manager only. |
| C. | Both of the two methods above will work. |
| D. | Neither of the two methods above will work. |
| Answer» D. Neither of the two methods above will work. | |
| 319. |
Which of the three possible types of triggers does SQL Server support? |
| A. | INSTEAD OF only |
| B. | AFTER only |
| C. | BEFORE only |
| D. | INSTEAD OF and AFTER only |
| Answer» E. | |
| 320. |
Which type of SQL Server cursor concurrency places an update lock on a row when the row is read? |
| A. | READ_ONLY |
| B. | SCROLL_LOCK |
| C. | OPTIMISTIC |
| D. | READCOMMITTED |
| Answer» E. | |
| 321. |
SQL Server program code that is executed instead of an SQL command that needs to be processed is called a(n): |
| A. | INSTEAD OF trigger. |
| B. | BEFORE trigger. |
| C. | AFTER trigger. |
| D. | BEGIN trigger. |
| Answer» B. BEFORE trigger. | |
| 322. |
The strictest transaction isolation level provided by SQL Server is called: |
| A. | REPEATABLE READ. |
| B. | SERIALIZABLE. |
| C. | READ COMMITTED. |
| D. | READ UNCOMMITTED. |
| Answer» C. READ COMMITTED. | |
| 323. |
What mode of authentication does SQL Server NOT provide? |
| A. | Windows-only security |
| B. | Both SQL Server and Windows-only security |
| C. | Mixed security |
| D. | SQL Server only security |
| Answer» E. | |
| 324. |
Using SQL Server 2000, which of the following symbols is used to indicate parameters in stored procedures? |
| A. | # |
| B. | % |
| C. | & |
| D. | @ |
| Answer» E. | |
| 325. |
With which type of SQL Server recovery model are all database changes logged except those that cause large log entries? |
| A. | Differential recovery |
| B. | Full recovery |
| C. | Simple recovery |
| D. | Bulk-logged recovery |
| Answer» E. | |
| 326. |
Locks placed by the DBMS are called ________ |
| A. | implicit locks |
| B. | explicit locks |
| C. | exclusive locks |
| D. | shared locks |
| Answer» B. explicit locks | |
| 327. |
What is the overall responsibility of the DBA? |
| A. | Facilitate the development and use of the database |
| B. | Create and populate tables |
| C. | Development, operation, and maintenance of the database and its applications |
| D. | Both the first and third answers above are correct |
| Answer» E. | |
| 328. |
A cursor type in which the application sees the data as they were at the time the cursor was opened is called: |
| A. | forward only. |
| B. | static. |
| C. | keyset. |
| D. | dynamic. |
| Answer» C. keyset. | |
| 329. |
The size of a lock is called: |
| A. | implicit lock. |
| B. | lock granularity. |
| C. | exclusive lock. |
| D. | shared lock. |
| Answer» C. exclusive lock. | |
| 330. |
Which of the following locks the item from access of any type? |
| A. | Implicit lock |
| B. | Explicit lock |
| C. | Exclusive lock |
| D. | Shared lock |
| Answer» D. Shared lock | |
| 331. |
Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» C. Repeatable read | |
| 332. |
Which of the following occurs when one transaction reads a changed record that has not been committed to the database? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» D. Consistent read | |
| 333. |
A cursor type in which the application can only move forward through the recordset is called: |
| A. | forward only. |
| B. | static. |
| C. | keyset. |
| D. | dynamic. |
| Answer» B. static. | |
| 334. |
A transaction in which either all of the database actions occur or none of them do is called: |
| A. | atomic. |
| B. | consistent. |
| C. | isolated. |
| D. | durable |
| Answer» B. consistent. | |
| 335. |
Dirty read, nonrepeatable, and phantom reads are not possible in this instance. |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» E. | |
| 336. |
Which of the following disallows both dirty reads and nonrepeatable reads, but allows phantom reads? |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» D. Serializable | |
| 337. |
Which of the following refers to a cursor type where changes of any type and from any source are visible? |
| A. | Forward only |
| B. | Static |
| C. | Keyset |
| D. | Dynamic |
| Answer» E. | |
| 338. |
Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row? |
| A. | Forward only |
| B. | Static |
| C. | Keyset |
| D. | Dynamic |
| Answer» D. Dynamic | |
| 339. |
The advantage of optimistic locking is that: |
| A. | the lock is obtained only after the transaction has processed. |
| B. | the lock is obtained before the transaction has processed. |
| C. | the lock never needs to be obtained. |
| D. | transactions that are best suited are those with a lot of activity. |
| Answer» B. the lock is obtained before the transaction has processed. | |
| 340. |
Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» B. Phantom read | |
| 341. |
In this instance, dirty reads are disallowed, while nonrepeatable reads and phantom reads are allowed. |
| A. | Read committed |
| B. | Read uncommitted |
| C. | Repeatable read |
| D. | Serializable |
| Answer» B. Read uncommitted | |
| 342. |
A transaction for which all committed changes are permanent is called: |
| A. | atomic. |
| B. | consistent. |
| C. | isolated. |
| D. | durable. |
| Answer» E. | |
| 343. |
Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read? |
| A. | Nonrepeatable read |
| B. | Phantom read |
| C. | Dirty read |
| D. | Consistent read |
| Answer» C. Dirty read | |
| 344. |
Which of the following locks the item from change but not from read? |
| A. | Implicit lock |
| B. | Explicit lock |
| C. | Exclusive lock |
| D. | Shared lock |
| Answer» E. | |
| 345. |
Locks placed by command are called ________ . |
| A. | implicit locks |
| B. | explicit locks |
| C. | exclusive locks |
| D. | shared locks |
| Answer» C. exclusive locks | |
| 346. |
Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain: |
| A. | GROUP BY |
| B. | WHERE. |
| C. | ORDER BY. |
| D. | FROM. |
| Answer» D. FROM. | |
| 347. |
What is an advantage of placing computations in SQL views? |
| A. | To save users from having to write an expression. |
| B. | To ensure that the results are consistent. |
| C. | To accomplish both of the above. |
| D. | None of the above is correct - computations cannot be placed in a view. |
| Answer» D. None of the above is correct - computations cannot be placed in a view. | |
| 348. |
Which is NOT one of the most common types of SQL CHECK constraints? |
| A. | System date |
| B. | Range checks |
| C. | Lists of values |
| D. | Comparing one column value to another within the same table |
| Answer» B. Range checks | |
| 349. |
What SQL structure is used to limit column values of a table? |
| A. | The LIMIT constraint |
| B. | The CHECK constraint |
| C. | The VALUE constraint |
| D. | None of the above is correct. |
| Answer» C. The VALUE constraint | |
| 350. |
The SQL ALTER statement can be used to: |
| A. | change the table structure. |
| B. | change the table data. |
| C. | add rows to the table. |
| D. | delete rows from the table. |
| Answer» B. change the table data. | |