SQL Server [BSCIT-1] and Mscit-1
SQL Server [BSCIT-1] and Mscit-1
PART-A
1. There are _________ typical implementation model of data base :-
(A) 2 (B) 3 (C) 4 (D) 5
2. Relational data base model is based on __________.
(A)Graph theory (B) Set theory
(C) Statistics (D) Complex math’s functions
3. The user interface used with relational model is _____________.
(A) Procedural (B) Non procedural
(C) Object based (D) Both (A) & (B)
4. Data as well as ___________ comes under the control of the RDBMS system.
(A) Data management (B) Data encryption
(C) Data security (D) Data storage
5. In a RDBMS all users request to insert data in a table or to update delete or view data in a table must be routed through the ___________ only.
(A) DBA (B) RDBMS engine
(C) End user (D) Data dictionary
6. A relational database resolves around the concept of ___________.
(A) Index (B) Record
(C) File (D) Tables
7. A database is a collection of _____________.
(A) Data (B) Tables (C) View (D) All of the above
8. A multi column primary key is called a ___________ primary key.
(A) Candidate (B) Composite (C) Alternate (D) Reference
9. A _____________ is column whose value are derived from the primary key of the same or some other table.
(A) Alternate key (B) Primary key (C) Super key (D) Foreign key
10. A primary key must be _____
(A) Not null (B) Unique index
(C) Both (A) & (B) (D) Domain constraint
11. In relational database ______________ is a process that eliminates redundancy organize data efficiently improve performance
(A) DFD (B) ERD (C) Normalization (D) Demoralization
12. Which of the following is not aim of normalization :-
(A) Eliminate redundancy (B) Good representation of real world
(C) Avoid certain anomalies (D) Provide easy user interface
13. _____________ normal from only applies to temporal data base.
(A) III (B) BSNF (C) V (D) VI
14. _____________ says that :-
The domain of the attribute must include only atom8ic values.
(A) I NF (B) II NF (C) III NF (D) BCNF
15. _____________ describe full functional dependency on the primary key.
(A) INF (B) IINF (C) IIINF (D) BCNF
16. _______________ requires that there be no non – trivial functional dependencies of attributes on something other than & superset of candidate key.
(A) INF (B) IINF (C) III NF (D) BCNF
17. __________________ requires that there are no non – trivial jan dependencies that do not follow from the key constraint.
(A) II NF (B) III NF (C) BCNF (D) V NF
18. _____________ requires that each key uniquely identifies each row in tuples.
(A) IV NF (B) VI NF (C) BCNF (D) DKNF
19. Primary querry language for SQL server 2005 is
(A) SQL (B) MY – SQL (C) Transact – SQL (D) ABAP
20. SQL server 2005 is a product of _____
(A) IBM (B) Sun micro system (C) Info system (D) Micro soft
21. The SQL server data platform not include tool -
(A) Management fools (B) Development tool
(C) Back up tool (D) Services
22. The out standing functionality of SQL is its support for ___________ to the target data.
(A) Fast execution (B) Easy to learn
(C) Automatic navigation (D) Easy implementation
23. T – SQL enhanced functionality of SQL, these functionality includes :-
(A) Error handling (B) Recursive query capability
(C) Relational operator pivot (D) All of the above
24. _______________ is a communication software component that package the database API
(A) Network library (B) Client application
(C) Data base API (D) OLEDB
25. When a new column was created the column name and data type could be found in an internal system table called ___________.
(A) Fixed table (B) Master table (C) Sys column (D) metadata
26. SQL – server services not include :-
(A) SQL – server (B) SQL – server agent
(C) Micro soft distributed transaction coordinator (Ms – DTC)
(D) SQL – server – database management tool (SDMT)
27. The __________ control what is exposed to the network.
(A) SQL – server agent (SA) (B) SQL – server management studio (SMS)
(C) SQL – surface area configuration tool (SAC) (D) SQL – server configuration manager (SCM)
28. The primary interface for the data base administrator is the ______________.
(A) SQL – server agent (SA) (B) SQL – Server Management studio (SMS)
(C) SQL – surface area configuration tool (SAC) (D) SQL – server configuration manager (SCM)
29. MS – SQL server also support ______________ connectivity.
(A) ODBC (B) JDBC
(C) ADODC (D) ADODB
30. Enterprise edition available in _____________ version.
(A) 32 bit (B) 64 bit
(C) 128 bit (D) Both (A) & (B)
31. ____________________ or higher is required for Microsoft SQL – server 2005 reporting services installation.
(A) IIS 4.0 (B) IIS 5.0
(C) IIS 6.0 (D) IIS 6 A
32. MS – SQL server 2005 support ___________ licensing mode.
(A) Per service license (B) Per seat licenses
(C) Per user license (D) Both (A) & (B)
33. The configuration management tool is a _______________ application that consolidates the setting involving the services & network information for SQL –server.
(A) MAC (B) MMC (C) SAC (D) SQLCMD
34. The user interface of SQL server 2005 is similar to _____________ that provides a standard and consistent feel to developers & administrator.
(A) Java (B) Visual studio. NET (C) Perl (D) Oracle
35. __________________ is used for starting and stopping services of SQL – server 2005.
(A) Microsoft management studio (B) Microsoft configuration management
(C) Microsoft enterprise console management (D) Microsoft SQL command prompt
36. SQL server used __________ types of files used to stare a database.
(A) Two (B) Three (C) Four (D) Five
37. ___________ are as files used to stare databases transaction logs and their backup.
(A) Transaction manager (B) Cluster
(C) Log (D) Device
38. ______________ used to store document and fragments in a table column variable or parameter in SQL server data base.
(A) XML (B) . MDB (C) & LF (D) Config
39. The class libraries are called net frame work base library and runtime is called ___________.
(A) JRE (B) ELR (C) VRE (D) VLR
40. A _________ is a table whose content are defined by quarry.
(A) Procedure (B) Trigger (C) View (D) Index
PART-B
1. State true or false :-
(1) The transaction log record data modification
(2) Transaction marker are used to determine the starting and ending point of a transaction.
(A) TT (B) TF (C) FT (D) FF
2. State true or false :-
(1) A file cannot be a member of more them one file group.
(2) A maximum 35635 file group care be created for each data base.
(3) TT (B) TF (C) FT (D) FF
3. A local variable is defined with a _____________ statements, assigned an initial value with a _______ statement.
(A) Set, declare (B) Set, order (C) Order, set (D) Convert, set
4. Which of the following is not a database object.
(1) Table (B)Views (C) Indexes (D) Instances
5. Every data base has at leas two files, there are
(1) Data file (2) Primary data file (3) Secondary data file (4) Transaction log file
(5) OS – files
(A) 2, 3 (B) 2, 4 (C) 1, 5 (D) 2, 5
6. Primary data file contain _____________ for the data base where as transaction log files hold the ___________ used to recovery the database.
(A) Log info, startup info (B) Startup, configuration info
(C) Startup, log info (D) None
7. State true or false :-
(1) The minimum size for a transaction log file is 512 kb.
(2) Every data base has at least three files,
(A) TT (B) TF (C) FT (D) FF
8. SQL server allocated spaces to database in units _________ continuous pages called ______________.
(A) 128, primary data unit (B) 256, OS – files
(C) 256, allocation unit (D) 128, transaction unit
9. The allocation page does not contain any ______________ but contain ___________ and 32 extent data structure.
(A) User, system (B) System, transaction log
(C) Transaction log, system (D) System, user
10. MS – SQL server automatic recovery process uses the __________ to roll forward all committed transactions and roll back any incomplete transaction.
(A) Primary data file (B) Secondary data file
(C) Transaction file (D) None of these
11. Devices are OS files used to __________
(1) Store data base (2) Store transaction logs
(3) Back up & recovery
(A) 1, 2 (B) 2, 3 (C) 1, 3 (D) 1, 2, 3
12. State true or false :-
(1) Data base devices are stored on disk files
(2) Dumb devices are stored an disks, diskettes or tapes
(A) TT (B) TF (C) FT (D) FF
13. State true or false :-
(1) SQL server uses a copy of the model data base to initialize the database and its meta data
(2) In SQL server only one way to create data base.
(A) TT (B) TF (C) FT (D) FF
14. State true or false :-
(1) Programs provide an interface for client based user to access data and database structure that message & store the data on the server.
(2) Data base structure message & store the data on the server.
(A) TT (B) TF (C) FT (D) FF
15. State true or false :-
(1) Cost converts data but does not support styles.
(2) Dense – rank ( ) function produces ranking values according to the sorting criteria.
(A) TT (B) TF (C) FT (D) FF
16. A trigger can be deleted using :-
(A) Drop trigger (B) Drop table
(C) Alter database (D) Both A & B
17. Whenever a ___________ fires a response to the insert delete, or update statement _____ special table are created.
(A) Procedure, 3 (B) Constraint, 4
(C) Trigger, 2 (D) None
18. Which of the following cursor not supported by SQL – server 2005
(A) ODBC (B) ADO (C) DB – Library (D) JDBC
19. The integration of _________ with ______________ allows you to write procedure, trigger and function in any of the language from VC#, VB.Net & VC++
(A) JRE, SQL – Server 2000 (B) CLR, SQL – Server 2005
(C) JRE, Visual studio 2005 (D) CLR, Visual net environment
20. State true or false :-
(1) A trigger is block of code the constitutes a set of T – SQL statements that are activated in response to certain action.
(2) Trigger help in maintaining consistent reliable and correct data in tables.
(A) TT (B) TF (C) FT (D) FF
PART-C
1. Match the following –
(1) Foreign key (P) Stored procedure
(2) Primary key (Q) Multiple column primary key
(3) Composite primary key (R) Uniquely identify each row
(4) Trigger (S) Represent relationship b/w tables
(A) P – 1, Q – 2, R – 3, S – 4 (B) P – 2, Q – 4, R – 1, S – 3
(C) P – 4, Q – 3, R – 2, S – 1 (D) None
2. Match the following –
(1) INF (P) Deal with multi attributes primary key
(2) 2NF (Q) Deal with the relationship of non key attribute of the primary key
(3) 4NF (R) An attribute can only store one value
(A) 1 – S, 2 – Q, 3 – P (B) 1 – P, 2 – Q, 3 – S
(C) 1 – Q, 2 – S, 3 – P (D) None
3. Match the following –
(1)Master data base (P) Used by SQL server agent for scheduling alerts and jobs.
(2)MS db data base (Q)Record all system level information for an instance of SQL
(3)Model database (R)Is used as the template for are databases created on the
instance of SQL server
(A) 1 – Q, 2 – R, 3 – S (B) 1 – Q, 2 – P, 3 – R
(C) 1 – R, 2 – P, 3 – Q (D) None
4. SQL server service perform :-
(1) Allocate computed resources among multiple concurrent users
(2) Prevent logical problem
(3) Ensure data consistency and integrity
(A) 1 (B) 1, 2 (C) 2, 3 (D) All of the above
5. Match the following –
(1) Enterprise edition (P) Develop for testing data base solution
(2) Standard edition (Q) Developed for large scale enterprise
(3) Developer edition (R) Developed for medium – sized organization
(A) 1 – P, 2 – Q, 3 – R (B) 1 – P, 2 – Q, 3 – S
(C) 1 – Q, 2 – S, 3 – P (D) None
6. State true or false :-
(1) Network s/w requirement for the 64 – bit version of SQL server 2005 are the same as the requirement for the 32 bit version.
(2) SQL server 2005 support the Banyan VINES Sequenced Packet Protocol (SPP)
(3) SQL server needed minimum 192 MB RAM for installation.
(A) TTT (B) FTT (C) TFT (D) FFT
7. Match the following –
(1) Primary data file (P) .ndf
(2) Secondary data file (Q) .ldf
(3) Transaction log (R) .mdf
(A) P – 3, Q – 1, R – 2 (B) P – 2, Q – 1, R – 3
(C) P – 1, Q – 3, R – 2 (D) P – 2, Q – 3, R – 1
8. Consider following code :-
DISK INT
NAME = Logical – Name
PHYSNAME = physical – Name
VDEVNO = Virtual – device – Name
SIZE = Number – of – 2k – blocks
Here –
(P) DISK INIT (1) Gives the device a physical and logical name prepare the data base device for data base storage
(Q) Name (2) Give the logical name of the database device
(R) PHYSNAME (3) Gives the physical name and location of the data base device
(S) VDEVNO (4) Gives the virtual no that identifies the database device.
(A) P – 1, Q – 2, R – 3, S – 4 (B) P – 2, Q – 3, R – 4, S – 1
(C) P – 4, Q – 3, R – 2, S – 1 (D) P – 4, Q – 3, R – 2, S – 1
9. Match the following –
(P) & (1) Bitwise exclusive OR
(Q) (2) Bitwise OR
(R) ^ (3) Modulo
(S) % (4) Bitwise AND
(A)P – 4, Q – 2, R – 1, S – 3 (B) P – 2, Q – 4, R – 3, S – 1
(C) P – 3, Q – 1, R – 2, S – 4 (D) P – 4, Q – 3, R – 2, S – 1
10.When a table owner drop a table in any data base __________ drops with it.
(1) Constraints (2) Defaults
(3) Procedures (4) triggers (5) Indexes
(A) 1, 2, 4 (B) 1, 2, 3, 5 (C) 1, 2, 3, 4 (D) All
11. Drop table permission default to the _____________ and are not transfer member of the ________ fixed server role can drop any object by specifying the owner in the drop table statement.
(A) Any user, sys db a (B) Table owner, sys admin
(C) User, scoff (D) None
12. State true or false :-
(1) The use of table aliases means to rename a table, the renaming is a temporary change
(2) An outer join is used to return all rows exist in one table.
(3) The self join is used to join two different table
(A) TTT (B) TTF (C) TFT (D) FTT
13. Match the following under consideration of delete trigger –
(P) The cascade method (1) Restrict the deletion from master table
(Q) The restrict method (2) Nullify the values in the specified columns of the dependent table records is deleted from master table
(R) The nullify method (3) Delete record from the dependent tables
(A) P – 1, Q – 2, R – 3 (B) P – 3, Q – 1, R – 2
(C) P – 2, Q – 3, R – 1 (D) P – 2, Q – 1, R – 3
14. Which of the following is not right for trigger :-
(1) A trigger is block of code that constitute a set of T – SQL statements that are activated in response to certain action.
(2) It is fired whenever data in under lying table is affected by any DDL statement
(3) It help in maintaining consistent, reliable and correct data in tables.
(A) TTT (B) TFT (C) TFF (D) FTT
15.Which of the following is an advantage of views :-
(1) Security (2) Query simplicity
(3)Consistency (4) Data integrity
(5) Optimize query (6) Insulation from change
(A) 1, 2, 3, 4 (B) 1, 2, 4, 6 (C) 1, 2, 3, 5 (D) 1, 3, 4, 6
PART-A
1. There are _________ typical implementation model of data base :-
(A) 2 (B) 3 (C) 4 (D) 5
2. Relational data base model is based on __________.
(A)Graph theory (B) Set theory
(C) Statistics (D) Complex math’s functions
3. The user interface used with relational model is _____________.
(A) Procedural (B) Non procedural
(C) Object based (D) Both (A) & (B)
4. Data as well as ___________ comes under the control of the RDBMS system.
(A) Data management (B) Data encryption
(C) Data security (D) Data storage
5. In a RDBMS all users request to insert data in a table or to update delete or view data in a table must be routed through the ___________ only.
(A) DBA (B) RDBMS engine
(C) End user (D) Data dictionary
6. A relational database resolves around the concept of ___________.
(A) Index (B) Record
(C) File (D) Tables
7. A database is a collection of _____________.
(A) Data (B) Tables (C) View (D) All of the above
8. A multi column primary key is called a ___________ primary key.
(A) Candidate (B) Composite (C) Alternate (D) Reference
9. A _____________ is column whose value are derived from the primary key of the same or some other table.
(A) Alternate key (B) Primary key (C) Super key (D) Foreign key
10. A primary key must be _____
(A) Not null (B) Unique index
(C) Both (A) & (B) (D) Domain constraint
11. In relational database ______________ is a process that eliminates redundancy organize data efficiently improve performance
(A) DFD (B) ERD (C) Normalization (D) Demoralization
12. Which of the following is not aim of normalization :-
(A) Eliminate redundancy (B) Good representation of real world
(C) Avoid certain anomalies (D) Provide easy user interface
13. _____________ normal from only applies to temporal data base.
(A) III (B) BSNF (C) V (D) VI
14. _____________ says that :-
The domain of the attribute must include only atom8ic values.
(A) I NF (B) II NF (C) III NF (D) BCNF
15. _____________ describe full functional dependency on the primary key.
(A) INF (B) IINF (C) IIINF (D) BCNF
16. _______________ requires that there be no non – trivial functional dependencies of attributes on something other than & superset of candidate key.
(A) INF (B) IINF (C) III NF (D) BCNF
17. __________________ requires that there are no non – trivial jan dependencies that do not follow from the key constraint.
(A) II NF (B) III NF (C) BCNF (D) V NF
18. _____________ requires that each key uniquely identifies each row in tuples.
(A) IV NF (B) VI NF (C) BCNF (D) DKNF
19. Primary querry language for SQL server 2005 is
(A) SQL (B) MY – SQL (C) Transact – SQL (D) ABAP
20. SQL server 2005 is a product of _____
(A) IBM (B) Sun micro system (C) Info system (D) Micro soft
21. The SQL server data platform not include tool -
(A) Management fools (B) Development tool
(C) Back up tool (D) Services
22. The out standing functionality of SQL is its support for ___________ to the target data.
(A) Fast execution (B) Easy to learn
(C) Automatic navigation (D) Easy implementation
23. T – SQL enhanced functionality of SQL, these functionality includes :-
(A) Error handling (B) Recursive query capability
(C) Relational operator pivot (D) All of the above
24. _______________ is a communication software component that package the database API
(A) Network library (B) Client application
(C) Data base API (D) OLEDB
25. When a new column was created the column name and data type could be found in an internal system table called ___________.
(A) Fixed table (B) Master table (C) Sys column (D) metadata
26. SQL – server services not include :-
(A) SQL – server (B) SQL – server agent
(C) Micro soft distributed transaction coordinator (Ms – DTC)
(D) SQL – server – database management tool (SDMT)
27. The __________ control what is exposed to the network.
(A) SQL – server agent (SA) (B) SQL – server management studio (SMS)
(C) SQL – surface area configuration tool (SAC) (D) SQL – server configuration manager (SCM)
28. The primary interface for the data base administrator is the ______________.
(A) SQL – server agent (SA) (B) SQL – Server Management studio (SMS)
(C) SQL – surface area configuration tool (SAC) (D) SQL – server configuration manager (SCM)
29. MS – SQL server also support ______________ connectivity.
(A) ODBC (B) JDBC
(C) ADODC (D) ADODB
30. Enterprise edition available in _____________ version.
(A) 32 bit (B) 64 bit
(C) 128 bit (D) Both (A) & (B)
31. ____________________ or higher is required for Microsoft SQL – server 2005 reporting services installation.
(A) IIS 4.0 (B) IIS 5.0
(C) IIS 6.0 (D) IIS 6 A
32. MS – SQL server 2005 support ___________ licensing mode.
(A) Per service license (B) Per seat licenses
(C) Per user license (D) Both (A) & (B)
33. The configuration management tool is a _______________ application that consolidates the setting involving the services & network information for SQL –server.
(A) MAC (B) MMC (C) SAC (D) SQLCMD
34. The user interface of SQL server 2005 is similar to _____________ that provides a standard and consistent feel to developers & administrator.
(A) Java (B) Visual studio. NET (C) Perl (D) Oracle
35. __________________ is used for starting and stopping services of SQL – server 2005.
(A) Microsoft management studio (B) Microsoft configuration management
(C) Microsoft enterprise console management (D) Microsoft SQL command prompt
36. SQL server used __________ types of files used to stare a database.
(A) Two (B) Three (C) Four (D) Five
37. ___________ are as files used to stare databases transaction logs and their backup.
(A) Transaction manager (B) Cluster
(C) Log (D) Device
38. ______________ used to store document and fragments in a table column variable or parameter in SQL server data base.
(A) XML (B) . MDB (C) & LF (D) Config
39. The class libraries are called net frame work base library and runtime is called ___________.
(A) JRE (B) ELR (C) VRE (D) VLR
40. A _________ is a table whose content are defined by quarry.
(A) Procedure (B) Trigger (C) View (D) Index
PART-B
1. State true or false :-
(1) The transaction log record data modification
(2) Transaction marker are used to determine the starting and ending point of a transaction.
(A) TT (B) TF (C) FT (D) FF
2. State true or false :-
(1) A file cannot be a member of more them one file group.
(2) A maximum 35635 file group care be created for each data base.
(3) TT (B) TF (C) FT (D) FF
3. A local variable is defined with a _____________ statements, assigned an initial value with a _______ statement.
(A) Set, declare (B) Set, order (C) Order, set (D) Convert, set
4. Which of the following is not a database object.
(1) Table (B)Views (C) Indexes (D) Instances
5. Every data base has at leas two files, there are
(1) Data file (2) Primary data file (3) Secondary data file (4) Transaction log file
(5) OS – files
(A) 2, 3 (B) 2, 4 (C) 1, 5 (D) 2, 5
6. Primary data file contain _____________ for the data base where as transaction log files hold the ___________ used to recovery the database.
(A) Log info, startup info (B) Startup, configuration info
(C) Startup, log info (D) None
7. State true or false :-
(1) The minimum size for a transaction log file is 512 kb.
(2) Every data base has at least three files,
(A) TT (B) TF (C) FT (D) FF
8. SQL server allocated spaces to database in units _________ continuous pages called ______________.
(A) 128, primary data unit (B) 256, OS – files
(C) 256, allocation unit (D) 128, transaction unit
9. The allocation page does not contain any ______________ but contain ___________ and 32 extent data structure.
(A) User, system (B) System, transaction log
(C) Transaction log, system (D) System, user
10. MS – SQL server automatic recovery process uses the __________ to roll forward all committed transactions and roll back any incomplete transaction.
(A) Primary data file (B) Secondary data file
(C) Transaction file (D) None of these
11. Devices are OS files used to __________
(1) Store data base (2) Store transaction logs
(3) Back up & recovery
(A) 1, 2 (B) 2, 3 (C) 1, 3 (D) 1, 2, 3
12. State true or false :-
(1) Data base devices are stored on disk files
(2) Dumb devices are stored an disks, diskettes or tapes
(A) TT (B) TF (C) FT (D) FF
13. State true or false :-
(1) SQL server uses a copy of the model data base to initialize the database and its meta data
(2) In SQL server only one way to create data base.
(A) TT (B) TF (C) FT (D) FF
14. State true or false :-
(1) Programs provide an interface for client based user to access data and database structure that message & store the data on the server.
(2) Data base structure message & store the data on the server.
(A) TT (B) TF (C) FT (D) FF
15. State true or false :-
(1) Cost converts data but does not support styles.
(2) Dense – rank ( ) function produces ranking values according to the sorting criteria.
(A) TT (B) TF (C) FT (D) FF
16. A trigger can be deleted using :-
(A) Drop trigger (B) Drop table
(C) Alter database (D) Both A & B
17. Whenever a ___________ fires a response to the insert delete, or update statement _____ special table are created.
(A) Procedure, 3 (B) Constraint, 4
(C) Trigger, 2 (D) None
18. Which of the following cursor not supported by SQL – server 2005
(A) ODBC (B) ADO (C) DB – Library (D) JDBC
19. The integration of _________ with ______________ allows you to write procedure, trigger and function in any of the language from VC#, VB.Net & VC++
(A) JRE, SQL – Server 2000 (B) CLR, SQL – Server 2005
(C) JRE, Visual studio 2005 (D) CLR, Visual net environment
20. State true or false :-
(1) A trigger is block of code the constitutes a set of T – SQL statements that are activated in response to certain action.
(2) Trigger help in maintaining consistent reliable and correct data in tables.
(A) TT (B) TF (C) FT (D) FF
PART-C
1. Match the following –
(1) Foreign key (P) Stored procedure
(2) Primary key (Q) Multiple column primary key
(3) Composite primary key (R) Uniquely identify each row
(4) Trigger (S) Represent relationship b/w tables
(A) P – 1, Q – 2, R – 3, S – 4 (B) P – 2, Q – 4, R – 1, S – 3
(C) P – 4, Q – 3, R – 2, S – 1 (D) None
2. Match the following –
(1) INF (P) Deal with multi attributes primary key
(2) 2NF (Q) Deal with the relationship of non key attribute of the primary key
(3) 4NF (R) An attribute can only store one value
(A) 1 – S, 2 – Q, 3 – P (B) 1 – P, 2 – Q, 3 – S
(C) 1 – Q, 2 – S, 3 – P (D) None
3. Match the following –
(1)Master data base (P) Used by SQL server agent for scheduling alerts and jobs.
(2)MS db data base (Q)Record all system level information for an instance of SQL
(3)Model database (R)Is used as the template for are databases created on the
instance of SQL server
(A) 1 – Q, 2 – R, 3 – S (B) 1 – Q, 2 – P, 3 – R
(C) 1 – R, 2 – P, 3 – Q (D) None
4. SQL server service perform :-
(1) Allocate computed resources among multiple concurrent users
(2) Prevent logical problem
(3) Ensure data consistency and integrity
(A) 1 (B) 1, 2 (C) 2, 3 (D) All of the above
5. Match the following –
(1) Enterprise edition (P) Develop for testing data base solution
(2) Standard edition (Q) Developed for large scale enterprise
(3) Developer edition (R) Developed for medium – sized organization
(A) 1 – P, 2 – Q, 3 – R (B) 1 – P, 2 – Q, 3 – S
(C) 1 – Q, 2 – S, 3 – P (D) None
6. State true or false :-
(1) Network s/w requirement for the 64 – bit version of SQL server 2005 are the same as the requirement for the 32 bit version.
(2) SQL server 2005 support the Banyan VINES Sequenced Packet Protocol (SPP)
(3) SQL server needed minimum 192 MB RAM for installation.
(A) TTT (B) FTT (C) TFT (D) FFT
7. Match the following –
(1) Primary data file (P) .ndf
(2) Secondary data file (Q) .ldf
(3) Transaction log (R) .mdf
(A) P – 3, Q – 1, R – 2 (B) P – 2, Q – 1, R – 3
(C) P – 1, Q – 3, R – 2 (D) P – 2, Q – 3, R – 1
8. Consider following code :-
DISK INT
NAME = Logical – Name
PHYSNAME = physical – Name
VDEVNO = Virtual – device – Name
SIZE = Number – of – 2k – blocks
Here –
(P) DISK INIT (1) Gives the device a physical and logical name prepare the data base device for data base storage
(Q) Name (2) Give the logical name of the database device
(R) PHYSNAME (3) Gives the physical name and location of the data base device
(S) VDEVNO (4) Gives the virtual no that identifies the database device.
(A) P – 1, Q – 2, R – 3, S – 4 (B) P – 2, Q – 3, R – 4, S – 1
(C) P – 4, Q – 3, R – 2, S – 1 (D) P – 4, Q – 3, R – 2, S – 1
9. Match the following –
(P) & (1) Bitwise exclusive OR
(Q) (2) Bitwise OR
(R) ^ (3) Modulo
(S) % (4) Bitwise AND
(A)P – 4, Q – 2, R – 1, S – 3 (B) P – 2, Q – 4, R – 3, S – 1
(C) P – 3, Q – 1, R – 2, S – 4 (D) P – 4, Q – 3, R – 2, S – 1
10.When a table owner drop a table in any data base __________ drops with it.
(1) Constraints (2) Defaults
(3) Procedures (4) triggers (5) Indexes
(A) 1, 2, 4 (B) 1, 2, 3, 5 (C) 1, 2, 3, 4 (D) All
11. Drop table permission default to the _____________ and are not transfer member of the ________ fixed server role can drop any object by specifying the owner in the drop table statement.
(A) Any user, sys db a (B) Table owner, sys admin
(C) User, scoff (D) None
12. State true or false :-
(1) The use of table aliases means to rename a table, the renaming is a temporary change
(2) An outer join is used to return all rows exist in one table.
(3) The self join is used to join two different table
(A) TTT (B) TTF (C) TFT (D) FTT
13. Match the following under consideration of delete trigger –
(P) The cascade method (1) Restrict the deletion from master table
(Q) The restrict method (2) Nullify the values in the specified columns of the dependent table records is deleted from master table
(R) The nullify method (3) Delete record from the dependent tables
(A) P – 1, Q – 2, R – 3 (B) P – 3, Q – 1, R – 2
(C) P – 2, Q – 3, R – 1 (D) P – 2, Q – 1, R – 3
14. Which of the following is not right for trigger :-
(1) A trigger is block of code that constitute a set of T – SQL statements that are activated in response to certain action.
(2) It is fired whenever data in under lying table is affected by any DDL statement
(3) It help in maintaining consistent, reliable and correct data in tables.
(A) TTT (B) TFT (C) TFF (D) FTT
15.Which of the following is an advantage of views :-
(1) Security (2) Query simplicity
(3)Consistency (4) Data integrity
(5) Optimize query (6) Insulation from change
(A) 1, 2, 3, 4 (B) 1, 2, 4, 6 (C) 1, 2, 3, 5 (D) 1, 3, 4, 6
Comments
Post a Comment