Database Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following approaches begins with the identification of only a few important concepts and, based on these, the design proceeds, spreading outward 'radially'? A. Inside-out approach B. Bottom-up approach C. Mixed approach D. Top-down approach

A

Which of the following database terms is described in the statement below? "It prevents the current database operation from reading or writing a data item while the data item is being accessed by another operation." A. Lock B. Encryption C. Constraint D. Deadlock

A

Which of the following terms is described in statement below? "It is a collection of conceptual tools for describing data, data relationship, data semantics, and consistency constraints." A. Data model B. Generic Data Model C. Relational model D. Entity-Relationship Model

A

Which of the following values cannot be stored in a character column defined as the primary key of a table? A. null B. '0' C. 'null' D. ''

A

Which of the following files contain configuration information that must be restored after a MySQL database server has crashed? Each correct answer represents a complete solution. Choose two. A. My.ini B. My.cnf C. Master.info D. Binary log files

A B

Which of the following can be used to populate a table? Each correct answer represents a complete solution. Choose all that apply. A. Data Pump B. SQL*Loader C. INSERT statement D. MERGE statement

A B C D

Which of the following are DML commands? Each correct answer represents a complete solution. Choose all that apply. A. SELECT INTO B. DELETE C. UPDATE D. ALTER E. SELECT F. INSERT

A B C F

Which of the following are the main approaches in the database design? Each correct answer represents a complete solution. Choose three. A. Top-down approach B. Bottom-up approach C. Middle approach D. Inside-out approach

A B D

You are a Database Administrator for MySQL database. Users are complaining of slow query execution in a few tables. You need to ensure that contents of those tables are accessed more efficiently. You are sure that the table structure and its contents have no problems. Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the solution. Choose two. A. Perform a table analysis operation. B. Perform a table repair operation. C. Perform a table optimization operation. D. Perform a table check operation.

A C

You are the database administrator of a MySQL database server. Your network contains a combination of new and old (pre-4.1) MySQL clients. You are configuring a new server for testing purposes. You want to allow connections only by the clients that have new-format passwords. Which of the following steps will you take to accomplish the task? A. Start the server with the --old-password option. B. Start the server with the --secure-auth option. C. Start the server with the --enable-named-pipe option. D. Start the server with the --shared-memory option.

B

Which of the following DML SQL statements support usage of correlated sub-queries? Each correct answer represents a complete solution. Choose all that apply. A. INSERT B. UPDATE C. DELETE D. SELECT

B C

You are a Database Administrator of MySQL database. Few days back, your server crashed. Now, it is up and online. You need to check the integrity of various tables used in the database. You need to issue the CHECK TABLE command. For which of the following tables will this command work? Each correct answer represents a complete solution. Choose two. A. FEDERATED B. MyISAM C. MERGE D. InnoDB

B D

What is the ideal time to back up dynamic log files? A. When the server is running. B. You can back up dynamic log files any time. C. When the server is stopped. D. When the server is shut down

C

Which of the following is undertaken at any time prior to the logical design, provided that sufficient information is available regarding system requirements? A. Application design B. Prototyping C. DBMS selection D. Database planning

C

You manage a large database named Sales. The Sales database contains a table named OrderDetails, which is a heavily transacted table with frequent inserts. Indexes in the table often become fragmented due to excessive page splitting. You want to minimize the amount of fragmentation due to page splits. What should you do? A. Update the statistics on the indexes. B. Change the fillfactor for the indexes to 100. C. Change the fillfactor for the indexes to 60. D. Change the fillfactor for the indexes to 0.

C

John works as a database designer in ABC Tech. He wants to produce a description of a database implemented on secondary storage media. Which of the following designs will he implement to accomplish the task? A. Logical database design B. Conceptual database design C. Database design D. Physical database design

D

Mark works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. Management instructs him to verify the identity of a user or software that is connecting to the database. Which of the following will help him to accomplish the task? A. Referential integrity B. Abstraction C. Encryption D. Authentication

D

Mark works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. Mark has to change the properties of an object inside the database. Which of the following statements will he use to accomplish the task? A. DROP B. UPDATE C. CREATE D. ALTER

D

Which of the following is the process of creating a design for the database that will support the enterprise's operations and objectives for the required database system? A. Identifying relationships between objects B. Application design C. Database planning D. Database design

D

Which of the following provides reliable units of work that allow correct recovery from failures and keeps a database consistent even in cases of system failure? A. Database security B. Concurrency control C. Two-phase commit D. Database transaction

D

Which of the following statements is true about referential integrity? A. It checks that no component of a primary key can have a null value and no duplicate entries can exist. B. It checks that the value of a primary key must be consistent throughout the life of an instance. C. It distinguishes between null values and zero entries. D. It checks that no record in a child table can exist if its corresponding record is not available in the parent table.

D

Which of the following steps in database planning is used to record an object so that it is represented visually in the system? A. Identifying the relationships between objects B. Gathering information C. Object identification D. Object modeling

D

Suzanne works as a Database Designer for DataOneWorld Inc. She is assigned the task of decomposing the components of a database, but she has to ensure that all the components are decomposed to only some extent. Which of the following approaches will she use to accomplish the task? A. Mixed approach B. Inside-out approach C. Top-down approach D. Bottom-up approach

A

Which of the following ensures referential integrity between tables? A. Foreign key B. CHECK constraint C. Index D. Primary key

A

Which of the following commands are used to terminate a transaction? Each correct answer represents a complete solution. Choose all that apply. A. TRUNCATE B. DELETE C. ROLLBACK D. COMMIT

A C D

Which of the following are the types of prototyping strategies? Each correct answer represents a complete solution. Choose two. A. Requirements prototyping B. Physical prototyping C. Revolutionary prototyping D. Evolutionary prototyping

A D

Which of the following is a building working model of a database system? A. Prototyping B. Bottom-up approach C. Conceptual database design D. Top-down approach

A

Which of the following is the process of extracting trails on a regular basis so that they can be transferred to a designated security system where the database administrators do not have access? A. Native auditing B. Abstraction C. Database security D. Encryption

A

You work as a Database Administrator for DataOneWorld Inc. Management instructs you to remove an object from the relational database management system. Which of the following statements will you use to accomplish the task? A. DROP B. SELECT C. CREATE D. ALTER

A

Which of the following are the correct statements of using the Flashback Query feature in Oracle? Each correct answer represents a complete solution. Choose all that apply. A. CREATE TABLE AS SELECT AS OF B. SELECT AS OF C. CREATE TABLE AS SELECT D. INSERT INTO (SELECT)

A B

Which of the following are the steps of database planning life cycle? Each correct answer represents a part of the solution. Choose three. A. Application Design B. Data conversion and loading C. Conceptual database design D. Operational Maintenance

A B D

Which of the following statements about rebuilding an index is true? A. The NOLOGGING and ONLINE keywords can never be used together. B. Without the ONLINE keyword the index is locked for any DML operation. C. The NOLOGGING and ONLINE keywords are always used together. D. Without the ONLINE keyword the index is locked for the SELECT operation.

B

You are modifying a database that is used as a backend for a web site. The web site developers want to include positional data that can be used by the web site users to determine store locations information that is stored in the Stores table of the database. You are asked to add a column to the Stores table. What data type should you use? A. varchar B. nvarchar C. geography D. GPS

C

You are the database administrator of a MySQL server that runs on a Windows server. All clients are local clients. For security, you want to disable connections from the remote clients. Which of the following steps will you take to accomplish the task? A. Start the server with the --disable-networking option. B. Start the server with the --shared-memory option. C. Start the server with the --skip-networking option. D. Start the server with the --secure-auth option.

C

Mark works as the Database Administrator for DataWorld Inc. The company has a SQL server 2008 database. Mark wants to protect the database from unintended activities made by authorized individuals or processes such as authenticated misuse, malicious attacks, or inadvertent mistakes. Which of the following should he use to accomplish the task? A. Native auditing B. Abstraction C. Referential integrity D. Database security

D

You are the database administrator for a MySQL database. The database server is installed on a Unix system. The time zone files for the system are located at /usr/share/zoneinfo. You need to ensure that the system and MySQL time zones are based on the same information. Which of the following statements will you use to accomplish the task? A. shell> /ust/share/zoneinfo mysql_tzinfo_to_sql | mysql -u root mysql B. shell> /ust/share/zoneinfo mysql_tz_to_sql | mysql -u root mysql C. shell> mysql_tz_to_sql /ust/share/zoneinfo | mysql -u root mysql D. shell> mysql_tzinfo_to_sql /ust/share/zoneinfo | mysql -u root mysql

D

In addition to taking backups of your databases, you should also backup up files stated below. Which of these files store updates that have been made after the backup was made? A. Binary log files B. My.ini C. My.cnf D. Master.info

A

James works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. James has been assigned the task to store information for each object in the database. Which of the following steps will help him accomplish the task? A. Identifying the information for objects B. Object modeling C. Object identification D. Identifying the relationships between objects

A

John works as a Database Administrator in www.company.com Inc. The company has a SQL Server database. John wants to create a table named employees in the database. The table will have the id, firstname, lastname, and dateofbirth columns. John has to ensure that the lastname column does not allow null values. Which of the following queries will he use to accomplish the task? A. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR (75)NOT NULL, dateofbirth DATE NULL); B. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR (75), dateofbirth NULL); C. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR (75) NOT NULL); D. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR (75), dateofbirth DATE NULL);

A

Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server database. Management instructs him to ensure that no inconsistent data is entered in the database. Which of the following will help him to accomplish the task? A. Referential integrity B. Abstraction C. Encryption D. Authentication E. Native auditing

A

Mark works as a Database Designer for Reon Inc. He is assigned the task to create a database for the company. He issues the following query to create the database. CREATE DATABASE '24342' What will be the output of the query? A. A database will be created. B. An error will be generated stating that a database name must begin with an alphabet and all the alphabets should be in uppercase. C. An error will be generated stating that a database name must begin with an alphabet. D. An error will be generated stating that a database name should be a combination of numerals and alphabets.

A

Peter works as a Database Administrator for UnrealTech Inc. Management instructs him to create a schema that is gradually expanded from one level to another through appropriate modifications. Which of the following approaches will he use to accomplish the task? A. Top down approach B. Bottom up approach C. Mixed approach D. Inside-out approach

A

Philandrio Inc. is one of the largest drug manufacturing companies in the world. It has many offices worldwide. Each office has a manpower of approximately 14,000. The managers themselves are employees in the company. You are building a database for the company's Human Resources Department (HRD). You want to track the following attributes for each employee, and at the same time, eliminate duplicate entries and minimize data storage wherever possible. FirstName MiddleName LastName EmployeeIdentityNumber Address Date_ of_ Hire Department Salary ManagerIdentityNumber Which of the following is the appropriate table detail sufficient to track the above attributes, correctly and efficiently? A. Only one table, Employee B. Three tables, Employee, Manager, and a table to link both these entities C. Two tables, Employee and Manager D. Either two or three tables

A

Smith works as a Database Administrator for DWorlds Inc. The management instructs him to plan a database where identifying the key objects or entities for database management is important. Which of the following database planning steps will help him to accomplish the task? A. Object identification B. Gathering information C. Identifying the relationships between objects D. Object modeling

A

Which of the following enables a user to use generic methods to access a database and to focus on the coding rather than the syntax for a specific database API? A. Abstraction B. Database security C. Native auditing D. Authentication

A

Which of the following is NOT a valid DDL command? A. UPDATE B. ALTER C. DROP D. CREATE

A

Which of the following is a design of the user interface and the application programs that use and process the database? A. Application Design B. Object Modeling C. Database Design D. Database Planning

A

Which of the following is a management activity that allows the stages of the database application to be realized as efficiently and effectively as possible? A. Database planning B. Identifying information for objects C. Object identification D. Requirements collection and analysis

A

Which of the following is an ANSI approved language for communicating and managing data in a relational database management system (RDBMS)? A. SQL B. QL C. DDL D. XML

A

Which of the following refers to the system, processes, and procedures that protect a database from unintended activities, such as authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or processes? A. Database security B. Encryption C. Abstraction D. Referential integrity

A

Which of the following scripts is used to convert Unix-type zone files into SQL statements, and loads the time zone tables in a mysql database? A. mysql_tzinfo_to_sql B. mysql_time_to_sql C. mysql_timezone_to_sql D. mysql_tz_to_sql

A

Which of the following steps in database planning helps to determine the requirements of the database through interviewing? A. Gathering information B. Identifying the relationship between objects C. Identify the objects D. Identifying the type of information for each objects E. Modeling the object

A

You are taking back up of your MySQL database server. You need to take a back up of the file that has been created by the replication slave server and contains information needed for connecting to the master server. Which of the following files will you copy? A. Master.info B. My.ini C. Relay-log.info D. My.cnf

A

You have developed a stored procedure named usp_GetEmp that accepts an employee number as a parameter and retrieves the details about the employee from the CurrentEmp table of a database named Employees. You have tested it, and it works exactly as you expected. Later, another employee tries to use the stored procedure and receives the following error: "The SELECT permission was denied on the object 'CurrentEmp', database 'Employees.schema 'dbo' ". What should you do to resolve the problem? A. Modify usp_GetEmp to include the With Execute As Owner clause. B. Modify usp_GetEmp to include the With Execute As Caller clause. C. Grant the employee the SELECT permission on the CurrentEmp table. D. Grant the employee the SELECT permission on the Employees database.

A

You manage a database named Exams accessed via a website. The website is regularly accessed by users in different countries. You are redesigning a table named History that records when users have purchased and taken online exams. You need one of the columns in the History table to record what time of day that a user has taken an exam. Additionally, you need this column to have time zone awareness. What data type should you use? A. datetimeoffset B. datetime C. Use two different columns with one column of datetime, and the second column indicating the UTC offset D. datetime2

A

You work as a Database Administrator for Dowtech Inc. A table named StudentInformation exists in a database. The table has columns named student_names, student_marks, and student_courses. Some students who have opted for various courses have got different marks in them. This implies that the table has two many-to-many relationships. You have to ensure that these two relationships are not represented in a single table and that the student_name column exists in both tables. Which of the following normal forms will you use to represent these relationships in the tables? A. 4 NF B. 3 NF C. 2 NF D. 1 NF

A

You work as a Database Designer for DataOneWorld Inc. The company has a SQL Server database. You are assigned the task of creating a data model of an enterprise based on a specific data model. The model to be created should be independent of a particular DBMS. Which of the following database designs will help you accomplish the task? A. Logical database design B. Conceptual database design C. Physical database design D. Application design

A

You work as an Application Developer for Nero Inc. You want to instruct the DBMS to set the transaction isolation level so that when a user updates a table in the database, other users cannot read the value at the same time. Which of the following methods will you use to define the transaction level? A. setTransactionIsolation() B. isClosed() C. getTransactionIsolation() D. supportsTransactions()

A

What is the relationship between the foreign key and primary key? Each correct answer represents a complete solution. Choose all that apply. A. A foreign key constraint works in conjunction with a primary key constraint to enforce referential integrity among related entities. B. A foreign key ties attribute(s) of an entity to the primary key of another entity, for the purpose of creating a dependency. C. There is no relationship between a primary key and a foreign key. D. A foreign key and a primary key create a link between two entities.

A B

You want to recover one or more tablespaces to a point in time older than the rest of the database. Which of the following are the recovery situations in which tablespace Point-in-Time Recovery (TSPITR) should be used? Each correct answer represents a part of the solution. Choose all that apply. A. To recover a tablespace that contains rollback segments. B. To recover a table that has become logically corrupted. C. To recover a DML statement that has affected only a subset of the database. D. To recover a tablespace on a very large database.

A B C

You work as a Database Designer for Tritech Inc. You are designing a table named Info. The table contains the following attributes: Login and Password Name ContactNumber Address Each new employee joining the company is assigned an E-mail Login and Password. This E-mail Login and Password is used by each employee to access his account on the company's Web site. The value of both the attributes should be unique and cannot be NULL. You design an artificial key EmpID in the Info table to serve as a primary key. Which of the following factors lead you to define an artificial key for use as a primary key in the Info table? Each correct answer represents a part of the solution. Choose all that apply. A. The value of the primary key cannot be NULL. B. The value of the primary key must be persistent. C. The natural key contains highly sensitive data. D. The value of the primary key must be unique.

A B C D

Which of the following are the characteristics of application design? Each correct answer represents a complete solution. Choose three. A. Output of the transaction B. Shortlisting of two or three products C. Data can be used from the transaction D. Expected rate of usage

A C D

Remo works as a Database Designer for Tech Inc. He wants to create a table named Product. He issues the following query to create the Product table: CREATE Product ( ProductID Char (10) NOT NULL, OrderID Char (10) NULL ProductName Varchar NOT NULL, Primary key (OrderID, ProductID)) What are the errors in the above query? Each correct answer represents a complete solution. Choose two. A. An attribute declared as a primary key cannot contain NULL values. B. Each attribute should be defined as a primary key separately. C. A table cannot have two primary keys. D. ProductName is declared as Varchar without specifying the width of the column.

A D

Which of the following commands can be used to change the authorization type in DB2 9? Each correct answer represents a complete solution. Choose all that apply. A. UPDATE DATABASE CONFIGURATION B. SET AUTHORISATION C. RESET DATABASE CONFIGURATION D. UPDATE DBM CFG

A D

Which of the following statements are true regarding DML? Each correct answer represents a complete solution. Choose all that apply. A. It enables users to access/manipulate data in a database. B. It is used to specify additional properties of the data. C. It is used to specify a database schema by a set of definitions. D. It can be procedural or declarative.

A D

Peter works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. Peter has to construct an Entity-Relationship schema design for the data he will use in the database. Which of the following database designs will he use to accomplish the task? A. Physical database design B. Conceptual database design C. Logical database design D. Application design

B

Which of the following is the process of collecting and analyzing information about the part of the organization that is to be supported by the database application? A. Object identification B. Requirements collection and analysis C. Gathering information D. Application Design

B

Which of the following is used to give a default value to a column if the value for that column is unknown? A. Concurrency B. DEFAULT constraint C. Nested transaction D. Transaction

B

Which of the following statements about external tables is true? A. They can have constraints or triggers. B. They cannot be written to with DML commands. C. They can have indexes. D. They cannot be used in joins, views, and subqueries.

B

You work as a Database Administrator for Bell Ceramics Inc. An employee of the company has fired a query, including a DML statement, such as INSERT, against a table named Sales. You notice that the DML statement has not executed. What will you do to resolve the issue? Each correct answer represents a complete solution. Choose two. A. Clean up all the uncommitted transactions on the Sales table. B. Add more space to the tablespace and increase the users quota on the tablespace. C. Provide redundant network paths from the client computer to the server along with additional listener connections on the Oracle server and redundant network cards on the Oracle server. D. Provide an appropriate privilege or create views on the Sales table, and grant privileges on the view.

B D

You work as a Database Designer for Netwell Inc. The database has a table named Project, which is depicted below: ProjectID ProjectName TaskID TaskName A Macwell Design A Macwell Coding B Vintech Design B Vintech Coding Is the table given above in normalized form? If not, then which normal form (NF) is violated? A. The table is in normal form, as each cell contains only one value. B. 3NF C. 1NF D. 2NF

B D

Mark works as a Database Administrator for DataOneWorld Inc. Management instructs him to provide an additional security layer to the database to prevent unauthorized viewing of data with the help of an algorithm called cipher. Which of the following will help him to accomplish the task? A. Native auditing B. Authentication C. Encryption D. Abstraction

C

Meryl works as a Database Designer for Klone Inc. She wants to create a table named Emp. She issues the following query: CREATE Table Emp (id Int UNSIGNED NOT NULL AUTO_INCREMENT PRIMARY KEY name Char(10)) What will happen after executing this query? A. The query will fail, as the id and name attributes are created in lowercase. B. The query will execute partially, as it will create the table but will fail to create the attributes. C. The query will fail because the id and name attributes must be separated by a comma. D. The query will create a table named Emp.

C

A company named Rel Inc. has many authorized dealers across the country who sell their products. The Sales Manager of the company wants to see the details of the authorized dealers, including the name, region, and total sales in ascending order of sales. Which of the following queries should be issued to get the desired output? A. SELECT MAX (Totalsales) FROM Dealer B. SELECT FROM Dealer C. SELECT * FROM Dealer WHERE MAX (Totalsales) D. SELECT Name, Region, Totalsales FROM Dealer ORDER BY Totalsales

D

John works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. John wants to insert records in a table where the database is structured in a fixed format. Which of the following data models will he use to accomplish the task? A. Object relational data model B. Entity-Relationship Model C. Network data model D. Relational model

D

Mark works as a Database Administrator for Techworld Inc. He wants to remove the columns from a table that are not dependent on the primary key. Which of the following normal forms will help him accomplish the task? A. 4 NF B. 6 NF C. 5 NF D. 3 NF

D

You work as a Database Designer for Realtech Inc. You want to create two tables, Product and Order, such that a row in the Order table does not exist without a corresponding row in the Product table. The structure of the Product and Order tables with their respective columns is given below: Product ProductID ProductNumber Date_of_manufacturing SupplierID ProductPrice ProductQty Order OrderID OrderDate OrderQuantity OrderPrice Based on this information, while maintaining the integrity of this rule, what will you do to accomplish the task? A. Create the Product table, and then create the Order table. Create a third table that will be used to join the Product and Order tables by using FOREIGN KEY constraints. B. Create the Product table, and then create the Order table that has a primary key referenced by the foreign key in the Product table. C. Create the Product table, and then create the Order table. Create a primary key in both the tables and form a one-to-one relationship. D. Create the Product table, and then create the Order table that has a foreign key constraint that references the primary key in the Product table.

D

You work as a MySQL Database Administrator. Your server crashed and it was recovered and made online within half an hour. What will you do to ensure that the table structure and contents are in a proper state? A. Perform a table optimization operation. B. Perform a table repair operation. C. Perform a table analysis operation. D. Perform a table check operation.

D

You work as the Database Administrator for a MySQL database server. In an hour or so, you are able to bring a corrupted server online. You execute the CHECK TABLE command and find that some of the InnoDB tables need to be repaired. You restart the server and discover that auto-recover has failed. Which of the following steps will you take to recover the corrupted InnoDB tables? A. Run the ANALYZE TABLE command. B. Run the REPAIR TABLE command. C. Recover the tables from the last backup. D. Run the OPTIMIZE TABLE command. E. Restart the server with the innodb_force_recovery option.

E

Fill in the blank with the appropriate word. The _________ model for database management is a database model based on first-order predicate logic.

relational

Which of the following statements is true regarding a composite key in a table? A. It is a primary key. B. It is a primary or foreign key that consists of two or more attributes of the table. C. It is a combination of the primary key and the foreign key. D. It is a foreign key.

B

Linda works as a Database Designer for Lion Inc. She has been given an assignment to design the database of a publishing company. The database has a table named Author, which has a composite key, AuthorID and TitleID. Royalty and LiteraryAgent are the other attributes. The functional dependencies are such that AuthorID + TitleID-> Royalty (i.e. Royalty is functionally dependent on AuthorID and TitleID) and AuthorID-> LiteraryAgent (i.e. LiteraryAgent is functionally dependent on AuthorID). Which of the following is true about this table? A. It violates 4NF. B. It violates 2NF. C. It violates 1NF. D. There is no violation.

B

Adam works as a Database Designer for DataOne Inc. The company has a SQL Server database. Adam has to ensure that either all the databases are updated or none of them are updated, so that the databases remain synchronized. Which of the following will he use to accomplish the task? A. Native auditing B. Two-phase commit C. Encryption D. Concurrency control

B

Consider the case of a distance education university. The university has many regional centers across the country. Each regional center has a head known as regional manager. Each regional center has allotted more than one study center in its region. Each regional center has a region code, which is unique and specifies a region. Each study center also has a study center code, which is also unique. What is the relationship between regional center and study center? A. One-to-one B. One-to-many C. There is no relationship. D. Many-to-many

B

Consider the case of a fruit juice company. The company manufactures fruit juices and supplies them to wholesalers. The Database Designer creates a table named Production. The code is given below: 1. CREATE Table Production 2. 2.(Fruit_type VarChar, 3. Fruit_name Char(20), 4. Quantity Int(3)) Which of the above-mentioned lines has an error? A. Line 3 B. Line 2 C. Line 1 D. Line 4

B

JDBC API 2.0 defines five levels of transaction isolation for database concurrency control. Which of the following is the lowest level of transaction isolation? A. TRANSACTION_SERIALIZABLE B. TRANSACTION_NONE C. TRANSACTION_READ_COMMITTED D. TRANSACTION_READ_UNCOMMITTED E. TRANSACTION_REPEATABLE_READ

B

James works as an Administrator for Softech Inc. The company has a SQL Server 2005 computer named SQL1. The company has six departments; Accounting, Sales, Marketing, Manufacturing, Production, and Research. The user accounts of each department are located in a domain group named after the department. James wants to create a separate database on SQL1 for each department which will store the department related information. Users in each department must be able to read and update data in the database belonging to their respective departments. No user must be able to access the database belonging to another department. James wants to configure access to the database to meet these requirements. What should James do to accomplish the task? A. James should create a Windows Authentication login for each domain group and configure the logins as database users for the appropriate database. Add each database user to the db_ddladmin database role. B. James should create a Windows Authentication login for each domain group and configure the logins as database users for the appropriate database. Add each database user to the db_datareader and db_datawriter database roles. C. James should create a Windows Authentication login for each domain user and configure the logins as database users for the appropriate database. Add each database user to the db_ddladmin database role. D. James should create a Windows Authentication login for each domain user and configure the logins as database users for the appropriate database. Add each database user to the db_datareader and db_datawriter database roles.

B

John works as a Database Administrator for Bluewell Inc. The company has a SQL Server database. A table in the database has a candidate key and an attribute that is not a constituent of the candidate key. The non-key attribute depends upon the whole of the candidate key rather than just a part of it. Which of the following normal forms is represented in the scenario? A. 4 NF B. 2 NF C. 1 NF D. 3 NF

B

John works as a Database Administrator for www.company.com Inc. The company has a SQL server 2008 database. John wants to define a valid data while adding or updating an entry in a table of a relational database. Which of the following should he use to accomplish the task? A. Locking hints B. Check constraint C. Stored procedure D. View

B

You are a database developer for a database named Sales hosted on a SQL Server 2008 server. The Sales database includes the Exams and ExamQuestions tables. If any questions are modified for an exam, you need to ensure that the ExamModifiedDate in the Exams table is updated with the date and time of the update. The ExamQuestions table includes an INSTEAD OF trigger that records when and who last modified each question. Therefore, you decide to create a trigger. You only want the trigger to fire if a constraint violation has not occurred. Which of the following code will create the trigger to meet your goals? A. CREATE TRIGGER trgExamQuestionsModified ON dbo.ExamQuestions INSTEAD OF UPDATE NOT FOR REPLICATION AS UPDATE Exams SET ExamModifiedDate = GetDate() FROM inserted WHERE inserted.ExamID = Exams.ExamID B. CREATE TRIGGER trgExamQuestionsModified ON dbo.ExamQuestions AFTER UPDATE NOT FOR REPLICATION AS UPDATE Exams SET ExamModifiedDate = GetDate() FROM inserted WHERE inserted.ExamID = Exams.ExamID C. CREATE TRIGGER trgExamQuestionsModified ON dbo.ExamQuestions AFTER UPDATE FOR REPLICATION AS UPDATE Exams SET ExamModifiedDate = GetDate() FROM inserted WHERE inserted.ExamID = Exams.ExamID D. CREATE TRIGGER trgExamQuestionsModified ON dbo.Exams AFTER UPDATE NOT FOR REPLICATION AS UPDATE Exams SET ExamModifiedDate = GetDate() FROM inserted WHERE inserted.ExamID = Exams.ExamID

B

You are the database administrator for a MySQL database server. The network contains new and old (pre-4.1) clients. You configure another database server on the network. You allow the network clients to connect to the new server. Some users complain that when they try to connect to the server, they receive the following error: ERROR 1251: The client does not support authentication protocol requested by the server; consider upgrading MySQL client. You do not want to upgrade any client or server right now, and want to enable all clients to connect to the new server successfully. Which of the following steps will you take to resolve the issue? A. Run the server with the --secure-auth option. B. Run the server with the --old-password option. C. Run the server with the --allow-old option. D. Run the server with the --enable-old option.

B

You have created a database for employee management. The database has a table named Employees. The table has the following attributes: Name Address Contact Number Designation You want to store the salary information for each employee. The database should also store salary history. How will you design the database so that you can query the last increment given to a particular employee? A. Create a new table that includes the EmployeeSalary and DateOfIncrement columns. Create a one-to-one relationship with the Employees table. B. Create a new table that includes the EmployeeID, EmployeeSalary, and DateOfIncrement columns. Create a one-to-many relationship with the Employees table. C. Add the EmployeeSalary and DateOfIncrement columns to the Employees table. D. Create a new table that includes the EmployeeSalary and DateOfIncrement columns. Create a many-to-many relationship with the Employees table using the new table.

B

You manage a database named Customers, which includes a table named Orders. The Orders table is frequently queried, but only orders with a sales total of more than $1000.00 are required in the query. You want to create an index to speed up these types of queries at the same time, ensuring the index is as small as possible. What type of index should you use? A. Non-clustered B. Filtered C. Clustered D. XML

B

You work as a Database Administrator for InfoTech Inc. The company has a database and they want you to create a design for a database that will support the enterprise's operations and objectives. Which of the following will you use to accomplish the task? A. Application design B. Database design C. Database planning D. Requirements collection and analysis

B

You work as a database developer for www.company.com.com. The company has a database named www.company.com that is hosted on a SQL Server 2008 server. The database includes a table named Employees, which contains the details of the employees. You want to ensure that anytime any data in the Employees table is modified with an UPDATE statement, they are recorded in a table named EmployeeChanges. The EmployeeChanges table includes columns to record what the change was, who made the change, and when they made the change. What should you create to meet this need? A. A DDL trigger that queries the updated table B. A DML trigger that queries the inserted table C. A DDL trigger that queries the inserted table D. A DML trigger that queries the updated table

B

Your Company is designing and developing a number of databases for a stock exchange. One of the databases will contain highly sensitive data for which high level of security will be required. Although high processing speed is one of the prime requirements of the customer, for this database, security of the data will take priority over the processing speed. It needs to be ensured that even if unauthorized access to the database is obtained, the rogue user is unable to read the data. Which of the following protection techniques will you suggest for this database? A. Authentication B. Encryption C. Native auditing D. Integrity controls

B

Which of the following commands cannot be rolled back? Each correct answer represents a complete solution. Choose two. A. DELETE B. TRUNCATE C. UPDATE D. COMMIT

B D

Which of the following statements are correct regarding recovery of the InnoDB tables after a server crash? Each correct answer represents a complete solution. Choose all that apply. A. They can only be recovered from the dump files. B. They are automatically recovered at the server startup. C. They are recovered only after restarting the server with the innodb_force_recovery option configured. D. The innodb_force_recovery option opens the InnoDB tables in the read-only mode.

B D

You are a database developer for a database named Customers hosted on a SQL Server 2008 server. Recently, several customers were deleted from the Customers database. To ensure this is not repeated in future, you have decided to create a DML trigger to prevent it. What code will create the trigger to meet your goals? Each correct answer represents a complete solution. Choose all that apply. A. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers BEFORE DELETE AS RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION B. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION C. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS IF (SELECT COUNT(*) FROM DELETED) > 1 BEGIN RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION END D. CREATE TRIGGER trgDeleteCustomer ON dbo.Customers AFTER DELETE AS IF (SELECT COUNT(*) FROM DELETED) > 0 BEGIN RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK TRANSACTION END

B D

You work as the Database Administrator for www.company.com. All servers on the www.company.com network run Windows Server 2003 and Windows Server 2000, and all client computers run Windows XP professional and Windows Vista. The www.company.com network area consists of a single Active Directory domain named www.company.com. The www.company.com network contains a Microsoft SQL Server 2005 database server named COMPANY-DB111, which you administer at a regular interval of time. COMPANY-DB111 contains and hosts three databases that support different types of business requirements. The network uses the DBA database that supports internal operations including maintaining data, accounting, and mailing. The network's regular users make use of stored procedures for the data values that need insertion into the tables. The stored procedures used in the network of the company are designed to access SQL variant type parameters and then use the values to build and execute ad hoc query statements that are the part of the SQL statements. During a routine network check, you discover that there are several odd occurrences in the database. The odd occurrences include data deleted from tables and other unauthorized activity. You suspect a user is executing the unauthorized statements through the stored procedures. You are required to stop the unauthorized changes while having least impact on the stored procedures that are in use. Your explanation must use the least administrative effort. What should you do? A. The input parameters should be parsed to watch for and block any input including single quotes. B. The stored procedures used for the table should be replaced with ad hoc queries. C. The stored procedure should be customized to use type-specific and length-restricted parameters. D. All data handling activity on the table should be audited and recorded.

C


Ensembles d'études connexes

macroeconomics chapters 8&10 review problems

View Set

CompTIA 220-1001 Core 1 A+ Course Notes

View Set

Chapter 3 - Small Business Environment - Managing External Relations

View Set

Analysis of Social Problems CH 2

View Set

Chapter 26 Respiratory Function - PrepU questions

View Set