Close

Квиз))

Question 1 of 200

1

1. The PEAR DB functions can be accessed using DB::<function_name>.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 200

1

2. The string argument of the function for connecting to a database is of the format <DBMS software>://<user account>:<password>@<database server>

Select one of the following:

  • True
  • False

Explanation

Question 3 of 200

1

3. The PEAR DB functon for connecting to a database is called DB::linkto database('string').

Select one of the following:

  • True
  • False

Explanation

Question 4 of 200

1

4. The DBMS software in <DBMS software>://<user account>:<password>@<database server> stands for the particular DBMS software package being connected to: for example mysqli for versions of MySQL starting with version 4.1.2

Select one of the following:

  • True
  • False

Explanation

Question 5 of 200

1

5. The PEAR DB function DB::is Error can be used to determine whether any database access operation was successful or not.

Select one of the following:

  • True
  • False

Explanation

Question 6 of 200

1

6. In PHP, an _____ array provides pairs of key=>value elements; the value of an element is referenced through its key and all key values in a particular array must be unique.

Select one of the following:

  • a) Numeric

  • b) Value

  • c) String

  • d) Associative

Explanation

Question 7 of 200

1

7. Multi-line PHP comments start with // and end with #.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 200

1

8. PHP written in C and usually comes installed with Unix: for other operating systems, the PHP interpreter can be downloaded from http://www.php.net

Select one of the following:

  • True
  • False

Explanation

Question 9 of 200

1

9. The PHP start tag is <?php and end the tag is ?>.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 200

1

10. Web pages, where part of the information is extracted from databases or other data source, are called dynamic Web pages

Select one of the following:

  • True
  • False

Explanation

Question 11 of 200

1

11. In PHP, a ____ array associates a numeric index with each element in the array

Select one of the following:

  • a) Numeric

  • b) Associated

  • c) Variable

  • d) String

Explanation

Question 12 of 200

1

12. PHP variable names start with a $ sign and can include characters, numbers, and the underscore character

Select one of the following:

  • True
  • False

Explanation

Question 13 of 200

1

13. Interpolating variables occurs only within single-quoted strings.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 200

1

14. PHP programs are executed on the client.

Select one of the following:

  • True
  • False

Explanation

Question 15 of 200

1

15. The auto-global predefined PHP variable $_POST is an array that holds all the values entered through form parameters.

Select one of the following:

  • True
  • False

Explanation

Question 16 of 200

1

16. The JDBC _____ libraries are called java.sql.*

Select one of the following:

  • a) Method

  • b) Function

  • c) Class

Explanation

Question 17 of 200

1

17. JDBC does not distinguish between queries that return single tuples and those that return multiple tuples.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 200

1

19. The use of function calls is a more dynamic approach for database programming than embedded SQL.

Select one of the following:

  • True
  • False

Explanation

Question 19 of 200

1

20. A _____ object is similar to a cursor in embedded SQL and an iterator in SQLJ.

Select one of the following:

  • a) Procedure

  • b) Function call

  • c) Result Set

Explanation

Question 20 of 200

1

21. _____ is the part of the SQL standard that specifies how to write persistent stored modules.

Select one of the following:

  • a) SQL/PSM

  • b) XML

  • c) SQLJ

  • d) ResultSet

Explanation

Question 21 of 200

1

22. Database stored procedures (aka persistent stored modules) are stored and executed by the DBMS at the database server.

Select one of the following:

  • True

  • False

Explanation

Question 22 of 200

1

23. Discuss advantages and diadvantages to the library of function calls approach

Select one or more of the following:

  • a) Disadvantage are the loss of flexibility in changing the query at runtime and that all changes to queries must be recompiled.

  • b) The main advantage is flexibility in generating queries at runtime. Also, the library of function calls approach is able to call multiple data program.

  • c) The main advantage is flexibility in generating queries at compile time. Also, the library of function calls approach is able to call multiple single program.

  • d) Disadvantages are more complex programming, inability to do checking at compile time, and concerns about SQL runtime errors.

  • e) The main advantage is the query text is part of source code and can be checked for syntax errors and validated against the data. The program is quite readable.

Explanation

Question 23 of 200

1

24. It is necessary to have a binding between the data types of the programming language and the attribute data types in the data model

Select one of the following:

  • True
  • False

Explanation

Question 24 of 200

1

25. In SQLJ, embedded SQL commands are preceded by #sql.

Select one of the following:

  • True
  • False

Explanation

Question 25 of 200

1

27. One advantage of using an SQLJ translator is that it is not necessary to install drivers such as a JDBC driver.

Select one of the following:

  • True
  • False

Explanation

Question 26 of 200

1

28. Describe the three main approaches for database programming.

Select one or more of the following:

  • a) Using a library of database functions. This approach provides what is known as an application programming interface (API) for accessing a database from applications programs.

  • b) Using a library of database methods. This approach provides what is known as an application programming interface (API) for accessing a database from applications programs

  • c) Embedded SQL. Embeding database commands in a general-purpose programming language. A preprocessor extracts the embedded SQL from the source code and replaces it with function calls to DBMS-generated code.

  • d) Embedded SQL. Embeding database commands in a specific-purpose programming language. A preprocessor can not extract code, but function calls to be extracted to DBMS-generated code.

  • e) Designing a new database programming language.

  • f) Embedded SQL. Embeding database commands in a specific-purpose programming language. A preprocessor extracts the embedded SQL from the source code and replaces it with function calls to DBMS-generating code

Explanation

Question 27 of 200

1

29. In XML _____ defines the set of commands (names) that can be used

Select one of the following:

  • a) Namespace

  • b) Valid

  • c) Document

  • d) Invalid

Explanation

Question 28 of 200

1

30. In XML schema, the tag _____ is used tospecify primary keys.

Select one of the following:

  • a) xs:element

  • b) xsd:key

  • c) psd:schema

  • d) xs:sequence

Explanation

Question 29 of 200

1

31. A * following an element name means the element can be repeated zero or one times (an optional, single-valued, nonrepeating elements)

Select one of the following:

  • True
  • False

Explanation

Question 30 of 200

1

32. If an XML document is well-formed and follows a particular schema, it is _____

Select one of the following:

  • a) Namespace

  • b) Keys

  • c) Invalid

  • d) Valid

Explanation

Question 31 of 200

1

33. The XML schema, it is possible to specify constraints that correspond to unique and primary key constraints ina relational database, as well as foreign keys constraints

Select one of the following:

  • True
  • False

Explanation

Question 32 of 200

1

34. An element that does not have *, +, or ? following the element name means the element must appear exactly once in the document (a required, single-valued, nonrepeating element).

Select one of the following:

  • True
  • False

Explanation

Question 33 of 200

1

35. A ? following an element name means that element can be repeated zero or more times in the document (an optional, mult-valued, repeating element).

Select one of the following:

  • True
  • False

Explanation

Question 34 of 200

1

36. The basic object in XML is the XML document, which is structured using types and iterators.

Select one of the following:

  • True
  • False

Explanation

Question 35 of 200

1

37. How does a well-formed XML document look like?

Select one or more of the following:

  • a) It is syntactically correct: a non-single root element with every element including a matching pair of start/end tags within the start-end of the parent element

  • b) It must finish with an XML declaration to indicate the version of XML.

  • c) It is syntactically correct: a single root element with every element including a matching pair of start/end tags within the start-end tags of the parent element

  • d) It is syntactically correct: a single root element with every element except a matching pair of start/end tags within the start-end tags of the parent elements

  • e) It must start with an XML declaration to indicate the version of XML

Explanation

Question 36 of 200

1

38. Struct type constructors include the set (T), list (T), bag(T), array(T), and dictionary (K,T) type constructors.

Select one of the following:

  • True
  • False

Explanation

Question 37 of 200

1

39. Three major differences between the relational and object database design.

Select one or more of the following:

  • a) In ODB design a binary relationship can be declared in one direction or both. If attributes are included in both directions, there is a potential problem with redundancy.

  • b) In ODB design a binary relationship can be declared in one direction or both. If attributes are included in both directions, there is no any problem

  • c) In an ODB, operations must be defined early since they are part of the classes specifications. In RDBs, operations may not be defined until implementation

  • d) In RDB inheritance is built into the model; ODBs do not have built-in constructs for inheritance.

  • e) In an RDB, operations must be defined early since they are part of the class specifications. In an ODB, operations may not be defined until implementation

  • f) In ODB inheritance is built into the model; RDBs do not have built-in constructs for inheritance.

Explanation

Question 38 of 200

1

40. The typical mechanisms for making an object an object persistent are naming and reachability.

Select one of the following:

  • True
  • False

Explanation

Question 39 of 200

1

41. The main property required of an OID is that it be immutable (should not change).

Select one of the following:

  • True
  • False

Explanation

Question 40 of 200

1

42. _____ inheritance occurs when a subtype inherits only some of the functions of a supertype.

Select one of the following:

  • a) Generalisation

  • b) Complete encapsulation

  • c) Conditional

  • d) Selective

Explanation

Question 41 of 200

1

43. In operator overloading (or polymorphism), an operation name may refer to several distinct implementations, depending on the type of object it is applied to.

Select one of the following:

  • True
  • False

Explanation

Question 42 of 200

1

44. In ______ all operations that can be applied to an object must be predefined.

Select one of the following:

  • a) Half encapsulation

  • b) Complete encapsulation

  • c) Object identifier

  • d) Feedback loop

Explanation

Question 43 of 200

1

45. The implementation of an operation is called its signature.

Select one of the following:

  • True
  • False

Explanation

Question 44 of 200

1

46. A subtype is used when a new type is needed that is similar but not identical to an already defined type.

Select one of the following:

  • True
  • False

Explanation

Question 45 of 200

1

47. The dictionary constructor creates a collection of two tupes (K,V) where the value of a key K can be used to retrieve the can be used to retrieve the corresponding value V.

Select one of the following:

  • True
  • False

Explanation

Question 46 of 200

1

48. An ODMS provides a unique identity to each independent object in the database via a unique, system-generated ____.

Select one of the following:

  • a) Selective

  • b) Complete encaplsulation

  • c) Object identifier

Explanation

Question 47 of 200

1

49. An object typically has three components: state, timing, and behavior

Select one of the following:

  • True
  • False

Explanation

Question 48 of 200

1

50. The 80-20 rule suggests that 80% of the workload is presented by 20% of the most frequently used transactions, which govem the physical database design.

Select one of the following:

  • True
  • False

Explanation

Question 49 of 200

1

51. The phases (or activities) of the life cycle are not strictly in sequence; ______ are common among and within the phases of the life cycle.

Select one of the following:

  • a) One-shot

  • b) Requirements collection

  • c) Feedback loop

  • d) View integration

Explanation

Question 50 of 200

1

52. In the _____ approach to schema design, a scheme is designed for each user group or application based phase, these schemas are merged into a global conecptual schema.

Select one of the following:

  • a) Requirements analysis

  • b) Feedback loops

  • c) Feasibility analysis

  • d) One-shot

  • e) View integration

Explanation

Question 51 of 200

1

53. A large database typically has large transaction volumes and rates, is used in service sector industries, and runs 24/7

Select one of the following:

  • True
  • False

Explanation

Question 52 of 200

1

54. Many organizations use data dictionary systems (information repositories) to manage meta-data, i.e., data that describes the database structure, constraints, applications, authorizations, users, and so forth.

Select one of the following:

  • True
  • False

Explanation

Question 53 of 200

1

55. What are the three goals of database design?

Select one or more of the following:

  • a) Satisfy the information content requirements of the generalised users and applications.

  • b) Support result

  • c) Support processing requirements and any performance objectives.

  • d) Provide a natural and easy-to-understand structuring of the information.

  • e) Satisfy the information content requirements ofthe specified users and applications.

  • f) Provide a comlicated structuring of the information.

Explanation

Question 54 of 200

1

56. _______ involves interacting with potential users and user groups to identify their particular problems and needs.

Select one of the following:

  • a) view-integration

  • b) requirements collection and analysis

  • c) feasibility analysis

  • d) one-shot

  • e) feedback loop

Explanation

Question 55 of 200

1

57. A transaction processing system can be characterized as one with several dozen gigabytes of data and a schema with more than 30 or 40 distinct entity types

Select one of the following:

  • True
  • False

Explanation

Question 56 of 200

1

58. Identify the three criteria to guide the choice of physical database design options

Select one or more of the following:

  • a) Space utisilation

  • b) Availability of vendor services

  • c) Transaction throughput

  • d) Response time

  • e) Familiarity of personnel with the system

Explanation

Question 57 of 200

1

59. Identify the three factors to consider in choosing one DBMS over another

Select one or more of the following:

  • a) Space utisilation

  • b) Organization-wide adoption of a certain philosophy (data model, vendor, methodology, tools)

  • c) Availability of vendor services

  • d) Transaction throughput

  • e) Response time

  • f) Familiarity of personnel with the system

Explanation

Question 58 of 200

1

60. _____ is concerned with analyzing potential application areas, identifying the economics of information gathering and dissemination, performing preiliminary cost-benefit studies, determining the complexity of data and processes, and setting up priorities among applications.

Select one of the following:

  • a) Feasibility analysis

  • b) Requirements collection and analysis

  • c) View integration

  • d) One-shot

  • e) Feedback loops

Explanation

Question 59 of 200

1

61. The initial requirements can be expected to be formal, complete, consistent, and correct.

Select one of the following:

  • True
  • False

Explanation

Question 60 of 200

1

62. In the ______ schema design approach, the requirements from the different stakeholders are merged into a single set of requirements before the schema design begins.

Select one of the following:

  • a) Requirements collection

  • b) Feedback loop

  • c) Centralized (or one-shot)

  • d) Requirements analysis

Explanation

Question 61 of 200

1

63. What two things does minimizing redundancy imply?

Select one or more of the following:

  • a) Reducing the need for multiple updates to maintain consistency across multiple copies of the same information.

  • b) Reducing the redundant information in tuples.

  • c) Making sure the semantics of the attributes is clear in the schema

  • d) Minimizing redundant storage of the same information

  • e) Disallowing the possibility of generating spurious tuples

Explanation

Question 62 of 200

1

64. Third normal form (3NF): R is 2NF and all non-prime attributes are transively dependent on the primary key.

Select one of the following:

  • True
  • False

Explanation

Question 63 of 200

1

65. First normal from (1NF): the domain of an attribute must include only atomic (simple, indivisible, scalar) values and the value of any attribute ina tuple must be a single value from the domain of that attribute.

Select one of the following:

  • True
  • False

Explanation

Question 64 of 200

1

66. A functional dependency is a property of the relation schema R not of a particular legal relation state r or R, therefor it must understands the semantics of the attributes of R.

Select one of the following:

  • True
  • False

Explanation

Question 65 of 200

1

67. Second normal form (2NF): R is 1NF and every non-prime attribute A in R is fully functionally dependent on the primary key of R

Select one of the following:

  • True
  • False

Explanation

Question 66 of 200

1

68. What are four informal guidelines that may be used to measure the quality of a relation schema design?

Select one or more of the following:

  • a) Reducing the need for multiple updates to maintain consistency across multiple copies of the same information.

  • b) Disallowing the possibility of generating spurious tuples.

  • c) Reducing the redundant information in tuples

  • d) Reducing the NULL values in tuples

  • e) Making sure the semantics of the attributes is clear in the schema

  • f) Minimizing redundant storage of the same information

Explanation

Question 67 of 200

1

69. Normalization of data can be considered a process of analyzing the given relation schemas based on their functional dependencies and primary keys to achieve closure on the domain space

Select one of the following:

  • True
  • False

Explanation

Question 68 of 200

1

71. When mapping a binary M:N relationship type R, create a new relation S to represent R, including as foreign key attributes in S the primary keys of the relations that are the perticipating entity types (their combination in S is the composite primary key of S).

Select one of the following:

  • True
  • False

Explanation

Question 69 of 200

1

The symbol σ (sigma) is used to denote the SELECT operator in the relational algebra

Select one of the following:

  • True
  • False

Explanation

Question 70 of 200

1

A EQUIJOIN uses any of the comparison operators =, <, ≤, >, ≥, or ≠.

Select one of the following:

  • True
  • False

Explanation

Question 71 of 200

1

The symbol π (pi) is used to denote the PROJECT operation in the relational algebra.

Select one of the following:

  • True
  • False

Explanation

Question 72 of 200

1

78. A THETA JOIN uses the comparison operator =

Select one of the following:

  • True
  • False

Explanation

Question 73 of 200

1

80. SQL is both a data definition language (DDL) and a data manipulation language (DML).

Select one of the following:

  • True
  • False

Explanation

Question 74 of 200

1

81. A key uniquely identifies a tuple in a relation.

Select one of the following:

  • True
  • False

Explanation

Question 75 of 200

1

82. When the DELETE operation violates a contraint, the deletion must be rejected.

Select one of the following:

  • True
  • False

Explanation

Question 76 of 200

1

83. Semantic integrity constarint may be enforced using mechanisms called triggers and assertions.

Select one of the following:

  • True
  • False

Explanation

Question 77 of 200

1

84. If a multi-table query refers to two or more attributes with the same name, we must qualify the attribute name with the table name, e.g., TABLE.Attribute, to prevent ambiguity.

Select one of the following:

  • True
  • False

Explanation

Question 78 of 200

1

85. A relation schema may only have one key.

Select one of the following:

  • True
  • False

Explanation

Question 79 of 200

1

86. Tuples in a relation are ordered.

Select one of the following:

  • True
  • False

Explanation

Question 80 of 200

1

88. The DELETE operation can violate referential integrity.

Select one of the following:

  • True
  • False

Explanation

Question 81 of 200

1

89. The INSERT operation can violate domain constraints, key constraints, entity integrity, or referential integrity.

Select one of the following:

  • True
  • False

Explanation

Question 82 of 200

1

90. The theortical basis of the relation data model is set theory and first-order predicate logic.

Select one of the following:

  • True
  • False

Explanation

Question 83 of 200

1

92. Attributes that represent the same real-world concept must have identical names in different relations.

Select one of the following:

  • True
  • False

Explanation

Question 84 of 200

1

93. When the INSERT operation violates a constraint, the default option is to reject the insertion.

Select one of the following:

  • True
  • False

Explanation

Question 85 of 200

1

94. Attributes must have unique domains.

Select one of the following:

  • True
  • False

Explanation

Question 86 of 200

1

95. NULL values may mean value unknown, value exits but is not available, attribute does not apply to this tuple (value undefined).

Select one of the following:

  • True
  • False

Explanation

Question 87 of 200

1

96. All tuples in a relation must be distinct.

Select one of the following:

  • True
  • False

Explanation

Question 88 of 200

1

102. The $d->query function takes an SQL command as its string argument and sends it to the database server for execution.

Select one of the following:

  • True
  • False

Explanation

Question 89 of 200

1

103. The _____ is a collection of several libraries of functions for enhancing PHP.

Select one of the following:

  • a) DBMS

  • b) PHP Extension and Application Repository (PEAR)

  • c) MYSQL

  • d) PHP SQL

Explanation

Question 90 of 200

1

104. The _____ variable is similar to cursor and iterator variables.

Select one of the following:

  • a) $d->query

  • b) post

  • c) $r

Explanation

Question 91 of 200

1

105. The abend function can be used to terminate a PHP program if there is an error.

Select one of the following:

  • True
  • False

Explanation

Question 92 of 200

1

106. The PHP function $d->nextID creates a sequence of unique values for a particular table.

Select one of the following:

  • True
  • False

Explanation

Question 93 of 200

1

115. The ___________ R S keeps tuple in the first {left} relation R; if no matching tuple found in S, then the attribute of S in the join are filled with NULL values

Select one of the following:

  • o LEFT OUTER JOIN

  • o RIGHT OUTER JOIN

  • o FULL OUTER JOIN

  • o LEFT INNER JOIN

Explanation

Question 94 of 200

1

116. If a relation schema has more than one key, each is called a _______ key.

Select one of the following:

  • o Candidate

  • o Primary

  • o Public

  • o Foreign

Explanation

Question 95 of 200

1

117. A ¬¬¬_________conflict arises when an attribute may have different domains in two schemas, e.g. pounds vs kilograms

Select one of the following:

  • o Domain

  • o Type

  • o Norming

  • o Constraints

Explanation

Question 96 of 200

1

119. Objects in an object-oriented programming language exist only during program execution, therefore they are called transient objects; an object-oriented database can extend the existence of objects so that they are stored permanently, therefore they are called

Select one of the following:

  • o persistent object

  • o instance variable

  • o attribute

  • o object structure

Explanation

Question 97 of 200

1

120. __________________ is the term used to refer to the problems that occur because of difference between the database model and the programming language model.

Select one of the following:

  • o Independence mismatch

  • o Denormalisation

  • o Redundancy

  • o Duplication

Explanation

Question 98 of 200

1

121. A __________________ is typically used to loop over the tuples in a query result

Select one of the following:

  • o Cursor {iterator variable}

  • o Shared variable

  • o Communication variables

  • o fetch

Explanation

Question 99 of 200

1

122. NULL values may mean value unknown, value exists but isn't available, and attribute does not apply to this tuple (value undefined)

Select one of the following:

  • True

  • False

Explanation

Question 100 of 200

1

123. A THETA JOIN uses any of the comparison operators =,<,>

Select one of the following:

  • True
  • False

Explanation

Question 101 of 200

1

124. For structured data, the schema information is mixed in with the data values, so it is sometimes referred to as self-describing data.

Select one of the following:

  • True
  • False

Explanation

Question 102 of 200

1

125. The main advantage of using a function call interface is that it makes it easier to access multiple databases within the same application program

Select one of the following:

  • True
  • False

Explanation

Question 103 of 200

1

126. In PHP, Interpolating variables may occur within double-quoted or single-quoted strings

Select one of the following:

  • True
  • False

Explanation

Question 104 of 200

1

127. In PHP, the $d->query function takes an SQL command as its string argument and sends it to the database server for execution.

Select one of the following:

  • True
  • False

Explanation

Question 105 of 200

1

128. The ________________ property ensures that either all the database operations in a transaction are executed or none are

Select one of the following:

  • o Atomicity

  • o Transaction

  • o Isolation

  • o Concurrency

Explanation

Question 106 of 200

1

129. ____________________occurs when the same data is stored multiple times

Select one of the following:

  • o Redundancy

  • o Normalisation

  • o Denormalization

  • o Persistent

Explanation

Question 107 of 200

1

130. Creating a database design that only stores each logical data item in only one place is the database is called______________________.

Select one of the following:

  • o Redundancy

  • o Normalization

  • o Denormalization

  • o Persistent

Explanation

Question 108 of 200

1

131. When a database design is in ____________, each value in a tuple is in atomic value.

Select one of the following:

  • o First normal form

  • o Second normal form

  • o Third normal form

  • o Forth normal form

Explanation

Question 109 of 200

1

132. An entity cannot exist in a database merely by being a member of a subclass, it must also be a member of the superclass

Select one of the following:

  • True
  • False

Explanation

Question 110 of 200

1

133. An entity that is a member of a subclass may inherit one, some, or all the attributes of the entity as a member of the superclass.

Select one of the following:

  • True
  • False

Explanation

Question 111 of 200

1

134. The ________________ property allows several users to update the same data in a controlled manner so that result of the updates is correct

Select one of the following:

  • o Atomicity

  • o Transaction

  • o Isolation

  • o Concurrency

Explanation

Question 112 of 200

1

The theoretical basis of the relational data model is set theory and first-order predicate logic

Select one of the following:

  • True
  • False

Explanation

Question 113 of 200

1

Semantic integrity constraints may be enforced using mechanisms called triggers and assertions.

Select one of the following:

  • True
  • False

Explanation

Question 114 of 200

1

When mapping a binary M:N relationship type R, create a new relation S to represent R, including as foreign key attributes in S the primary keys of the relations that are the participating entity types (their combination in S is the composite primary key of S).

Select one of the following:

  • True
  • False

Explanation

Question 115 of 200

1

$_SESSION − An associative array containing session variables available to the current script.

Select one of the following:

  • True
  • False

Explanation

Question 116 of 200

1

PHP makes use of mail() function to send an email. This function requires three mandatory arguments that specify the recipient's email address, the subject of the the message and the actual message additionally there are other two optional parameters.

Select one of the following:

  • True
  • False

Explanation

Question 117 of 200

1

The interpreter identifies variable names within double-quoted strings by their initial character $ and replaces them with the value in the variable. This is known as interpolating variables within strings. Interpolation does not occur in single-quoted strings

Select one of the following:

  • True
  • False

Explanation

Question 118 of 200

1

SQLJ was developed after JDBC, which is used for accessing SQL data- bases from Java using function calls

Select one of the following:

  • True
  • False

Explanation

Question 119 of 200

1

Most NoSQL databases support automatic __________, meaning that you get high availability and disaster recovery

Select one of the following:

  • <text>processing</text>

  • <text>scalability</text>

  • <text>replication</text>

  • <text>All of the mentioned</text>

Explanation

Question 120 of 200

1

The Web Services Architecture supports interaction between a service provider, service requestor, and service registry.

Select one of the following:

  • True
  • False

Explanation

Question 121 of 200

1

Multi-line PHP comments start with // and end with #.

Select one of the following:

  • True
  • False

Explanation

Question 122 of 200

1

Define types of abstractions by the relations as "A is <u>made of/composed of</u> B,C,D"

Select one of the following:

  • Classification

  • Aggregation

  • Generalization

  • Specialization

Explanation

Question 123 of 200

1

FETCH commands are issued in the program; each FETCH moves the cursor to the next row in the result of the query, making it the cur- rent row and copying its attribute values into the C (host language) program variables specified in the FETCH command by an INTO clause.</text>

Select one of the following:

  • True
  • False

Explanation

Question 124 of 200

1

Define types of abstractions by the relations as "B,C,D are special cases of A"

Select one of the following:

  • Classification

  • Aggregation

  • Generalization

  • Specialization

Explanation

Question 125 of 200

1

A JDBC driver is basically an implementation of the function calls specified in the JDBC application programming interface (API) for a particular vendor's RDBMS.

Select one of the following:

  • True
  • False

Explanation

Question 126 of 200

1

In PHP, a numeric array associates a numeric index with each element in the array.

Select one of the following:

  • True
  • False

Explanation

Question 127 of 200

1

Before being able to process JDBC function calls with Java, it is necessary to import the JDBC class libraries, which are called java.sql.*.

Select one of the following:

  • True
  • False

Explanation

Question 128 of 200

1

How can you change "Hansen" into "Nilsen" in the "LastName" column in the Persons table?

Select one of the following:

  • • UPDATE Persons SET LastName='Hansen' WHERE LastName='Nilsen'

  • • UPDATE Persons SET LastName='Nilsen' WHERE LastName='Hansen'

  • • MODIFY Persons SET LastName='Hansen' WHERE LastName='Nilsen'

  • • UPDATE FROM Persons SET LastName='Nilsen' WHERE LastName='Hansen'

Explanation

Question 129 of 200

1

Publisher table contains id and name columns. Id is auto incremented and name is of varchar(40) type. Which of the following queries will execute NOT correctly?

Select one of the following:

  • INSERT INTO Publisher (name) values ('O'Reilly');

  • INSERT INTO Publisher (name) values ('O Reilly');

  • INSERT INTO Publisher (name) values ('OReilly');

  • INSERT INTO Publisher (name) values ('O-Reilly');

Explanation

Question 130 of 200

1

What is the correct order of clauses for a proper SQL query?

Select one of the following:

  • SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY

  • SELECT, FROM, WHERE, GROUP BY, ORDER BY, HAVING

  • SELECT, FROM, GROUP BY, WHERE, HAVING, ORDER BY

  • SELECT, FROM, WHERE, HAVING, GROUP BY, ORDER BY

Explanation

Question 131 of 200

1

Which clause indicates the table(s) from which data is to be retrieved?

Select one of the following:

  • FROM

  • SELECT

  • WHERE

  • GROUP BY

  • HAVING

Explanation

Question 132 of 200

1

161. Which clause is executed first in a SQL query?

Select one of the following:

  • WHERE

  • SELECT

  • FROM

  • ON

Explanation

Question 133 of 200

1

162. Which of the following DROP statements is INCORRECT?

Select one of the following:

  • • DROP DATABASE

  • • DROP ROW

  • • DROP INDEX

  • • DROP TABLE

Explanation

Question 134 of 200

1

163. Which of the following is NOT a language element of SQL?

Select one of the following:

  • Expression

  • Data mining

  • Query

  • Statement

  • Clause

Explanation

Question 135 of 200

1

Which operator is used to search for a specified pattern in a column?

Select one of the following:

  • WHERE

  • LIKE

  • ALIASE

  • PATTERN

Explanation

Question 136 of 200

1

165. Which operator is used to select values within a range?

Select one of the following:

  • RANGE

  • AND

  • BETWEEN

  • OR

Explanation

Question 137 of 200

1

With SQL, how can you delete the records where the "Address" is "Almaty" in the Student Table?

Select one of the following:

  • • DROP ROW Student ='Almaty' FROM Address

  • • DELETE FROM Student ROW Address ='Almaty'

  • • DROP ROW Address ='Almaty' FROM Student

  • • DELETE ROW Address ='Almaty' FROM Student

Explanation

Question 138 of 200

1

166. Which term is used to describe data organized in rows and columns?

Select one of the following:

  • Query

  • Program

  • Index

  • Table

Explanation

Question 139 of 200

1

With SQL, how can you return all the records from a table named "Persons" sorted descending by "FirstName"?

Select one of the following:

  • • SELECT * FROM Persons GROUP BY FirstName DESC

  • • SELECT * FROM Persons WHERE FirstName DESC

  • • SELECT * FROM Persons ORDER BY FirstName

  • • SELECT * FROM Persons ORDER BY FirstName DESC

Explanation

Question 140 of 200

1

169. With SQL, how can you return the number of records in the "Employee" table?

Select one of the following:

  • • SELECT COUNT(*) FROM Employee

  • • SELECT * FROM Employee GROUP BY

  • • SELECT NUM(*) FROM Employee

  • • RETURN COUNT(*) FROM Employee

Explanation

Question 141 of 200

1

170. With SQL, how do you select all the records from a table named "Persons" where the value of the column "FirstName" starts with an "a"?

Select one of the following:

  • • SELECT * FROM Persons WHERE FirstName LIKE 'a%';

  • • SELECT * FROM Persons WHERE FirstName LIKE '%a%';

  • • SELECT All FROM Persons WHERE FirstName LIKE='a';

  • • SELECT * FROM Persons WHERE FirstName LIKE 'a*';

Explanation

Question 142 of 200

1

171. With SQL, how do you select all the records from a table named "Persons" where the "FirstName" is "Alma" and the "LastName" is "Alimova"?

Select one of the following:

  • • SELECT * FROM Persons WHERE FirstName=' Alma ' AND LastName=' Alimova'

  • • SELECT * FROM Persons WHERE FirstName=' Alma ' OR LastName=' Alimova'

  • • SELECT FROM Persons WHERE FirstName=' Alma ' AND LastName=' Alimova'

  • • SELECT * FROM Persons HAVING FirstName=' Alma ' AND LastName=' Alimova'

Explanation

Question 143 of 200

1

Which of the following is not a NoSQL database ?

Select one of the following:

  • SQL Server

  • MongoDB

  • Cassandra

  • None of the mentioned

Explanation

Question 144 of 200

1

Which of the following is a NoSQL Database Type ?

Select one of the following:

  • SQL

  • Document databases

  • JSON

  • All of the mentioned

Explanation

Question 145 of 200

1

Which of the following is a wide-column store ?

Select one of the following:

  • Cassandra

  • Riak

  • MongoDB

  • Redis

Explanation

Question 146 of 200

1

An ODMS provides a unique identity to each independent object stored in the database via a unique, system-generated ________________

Select one of the following:

  • <text>object identifier (OID)</text>

  • <text>literals</text>

  • <text>indirect pointer</text>

  • <text>constructor</text>

Explanation

Question 147 of 200

1

Define types of abstractions by the relations as "A is a <u>member of</u> class B

Select one of the following:

  • <text>Classification</text>

  • <text>Aggregation</text>

  • <text>Generalization</text>

  • <text>Specialization</text>

Explanation

Question 148 of 200

1

Define types of abstractions by the relations as "B <u>is-an</u> A, C <u>is-an</u> A, D <u>is-an</u> A"

Select one of the following:

  • Classification

  • Aggregation

  • Generalization

  • Specialization

Explanation

Question 149 of 200

1

How will you close a MySql database using PHP?

Select one of the following:

  • mysql_destroy

  • mysql_exit

  • mysql_end

  • mysql_close

Explanation

Question 150 of 200

1

How will you concatenate two strings?

Select one of the following:

  • Using . operator

  • Using + operator

  • Using add() function

  • Using append() function

Explanation

Question 151 of 200

1

How will you connect a MySql database using PHP?

Select one of the following:

  • mysql_connection

  • mysql_query

  • mysql_fetch_array

  • mysql_connect

Explanation

Question 152 of 200

1

How will you destroy a session in PHP?

Select one of the following:

  • session_destroy()

  • destroy_session()

  • $_SESSION['destroy']

  • $_SESSION['']

Explanation

Question 153 of 200

1

How will you start a session in PHP?

Select one of the following:

  • <text>session_start()</text>

  • <text>start_session()</text>

  • <text>$_SESSION['start']</text>

  • <text>$_SESSION['']</text>

Explanation

Question 154 of 200

1

How will you unset a single session variable?

Select one of the following:

  • <text><![CDATA[<?phpunset($_SESSION['counter']);?>]]></text>

  • <text><![CDATA[<?phpisset($_SESSION['counter']); ?>]]></text>

  • <text>$_SESSION['unset']</text>

  • <text>$_SESSION['']</text>

Explanation

Question 155 of 200

1

Identify factors to consider in choosing one DBMS over another. I. Organization-wide adoption of a certain philosophy (data model, vendor, methodology, tools).
I. Familiarity of personnel with the system. III. Availability of vendor services.

Select one of the following:

  • • <text>I, II</text>

  • • <text>I, II, III</text>

  • • <text>II, III</text>

  • • <text>I, III</text>

Explanation

Question 156 of 200

1

• In which type of PHP arrays the element values can be strings or integers?

Select one of the following:

  • • <text>numeric</text>

  • • <text>associative</text>

  • • <text>indexed</text>

  • • <text>none</text>

Explanation

Question 157 of 200

1

• In XML schema, the tag ________________ is used to specify foreign keys

Select one of the following:

  • • <text>xsd:keyref</text>

  • • <text>xsd:element</text>

  • • <text>xsd: unique</text>

  • • <text>xsd:foreignkey</text>

Explanation

Question 158 of 200

1

• NoSQL databases is used mainly for handling large volumes of ______________ data

Select one of the following:

  • unstructured

  • structured

  • semi-structured

  • all of the mentioned

Explanation

Question 159 of 200

1

• Point out the wrong statement

Select one of the following:

  • Non Relational databases require that schemas be defined before you can add data

  • NoSQL databases are built to allow the insertion of data without a predefined schema

  • NewSQL databases are built to allow the insertion of data without a predefined schema

  • All of the mentioned

Explanation

Question 160 of 200

1

• The ___ notation applies to user-defined subclasses of a specialization that must be ________, as illustrated by the specialization "every STUDENT must be either an GRADUATE_STUDENT, or a UNDERGRADUATE_STUDENT"

Select one of the following:

  • • <text>d, disjoint</text>

  • • <text>j, joint</text>

  • • <text>o, overlapping</text>

  • • <text>u, union</text>

Explanation

Question 161 of 200

1

• 190. The case of specialization what the same (real-world) entity may be a member of more than one subclass of the specialization for example, an alumnus may also be an employee and may also be a student pursuing an advanced degree (PERSON entity type, which is specialized into the subclasses {EMPLOYEE, ALUMNUS, STUDENT})

Select one of the following:

  • • <text> disjoint</text>

  • • <text> joint</text>

  • • <text>overlapping</text>

  • • <text>union</text>

Explanation

Question 162 of 200

1

• The case represents a single superclass/subclass relationship with more than one superclass, where the superclasses represent different entity types

Select one of the following:

  • • <text> disjoint</text>

  • • <text> joint</text>

  • • <text>overlapping</text>

  • • <text>union</text>

Explanation

Question 163 of 200

1

• This auto-global built-in array variable which provides the IP (Internet Protocol) address of the client user computer that is accessing the server, for example 129.107.61.8.

Select one of the following:

  • • <text>$_SERVER['SERVER_NAME']</text>

  • • <text>$_SERVER['REMOTE_ADDRESS']</text>

  • • <text>$_SERVER['REMOTE_HOST'] 
</text>

  • • <text>$_SERVER['PATH_INFO'] 
</text>

  • • <text>$_SERVER['QUERY_STRING']</text>

Explanation

Question 164 of 200

1

• This auto-global built-in array variable which provides the part of the URL address that comes after a backslash (/) at the end of the URL.

Select one of the following:

  • • <text>$_SERVER['SERVER_NAME']</text>

  • • <text>$_SERVER['REMOTE_ADDRESS']</text>

  • • <text>$_SERVER['REMOTE_HOST'] 
</text>

  • • <text>$_SERVER['PATH_INFO'] 
</text>

Explanation

Question 165 of 200

1

• This auto-global built-in array variable which provides the string that holds parameters in a URL after a question mark (?) at the end of the URL. This can hold search parameters, for example.

Select one of the following:

  • • <text>$_SERVER['SERVER_NAME']</text>

  • • <text>$_SERVER['QUERY_STRING']</text>

  • • <text>$_SERVER['REMOTE_ADDRESS']</text>

  • • <text>$_SERVER['PATH_INFO'] 
</text>

Explanation

Question 166 of 200

1

• This auto-global built-in array variablewhich provides the Web site name of the server computer where the PHP interpreter is running.

Select one of the following:

  • • <text>$_SERVER['SERVER_NAME']</text>

  • • <text>$_SERVER['REMOTE_ADDRESS']</text>

  • • <text>$_SERVER['REMOTE_HOST'] 
</text>

  • • <text>$_SERVER['PATH_INFO'] 
</text>

Explanation

Question 167 of 200

1

• What does PHP stands for

Select one of the following:

  • • <text>Personal Hypertext Processor</text>

  • • <text>PHP: Hypertext Preprocessor</text>

  • • <text>Private Home Page</text>

  • • <text>Private Hypertext Preprocessor</text>

Explanation

Question 168 of 200

1

• What does S in BASE refers to?

Select one of the following:

  • • <text>System Consistence</text>

  • • <text>System Availability</text>

  • • <text>Changing System</text>

  • • <text>System Stability</text>

Explanation

Question 169 of 200

1

• [What does the term "I" expands to in the term "ACID"?

Select one of the following:

  • • <text>Isolated</text>

  • • <text>Inseparable</text>

  • • <text>Indispensable</text>

  • • <text>Insulted</text>

Explanation

Question 170 of 200

1

• What does XML stand for?

Select one of the following:

  • • <text>eXtensible Markup Language</text>

  • • <text>Example Markup Language</text>

  • • <text>X-Markup Language</text>

  • • <text>eXtra Modern Link</text>

Explanation

Question 171 of 200

1

• What does XSL stand for?

Select one of the following:

  • • <text>eXtensible Stylesheet Language</text>

  • • <text>eXtra Style Language</text>

  • • <text>eXpandable Style Language</text>

  • • <text>eXtensible Style Listing</text>

Explanation

Question 172 of 200

1

• What is the correct syntax of the declaration which defines the XML version?

Select one of the following:

  • • <?xml version="1.0" />

  • • <?xml version="1.0"?>

  • • <xml version="1.0" />

Explanation

Question 173 of 200

1

• Which company did Cassandra was primarily developed in?

Select one of the following:

  • • <text>Apache</text>

  • • <text>Facebook</text>

  • • <text>Google</text>

  • • <text>Amazon</text>

Explanation

Question 174 of 200

1

• Which feature of CAP refers to load balancing

Select one of the following:

  • None of these

  • C

  • P

  • A

Explanation

Question 175 of 200

1

• Which of the following is correct about PHP

Select one of the following:

  • Key-value

  • Wide-column

  • Document

  • All of the mentioned

Explanation

Question 176 of 200

1

• Which of the following is correct about PHP

Select one of the following:

  • • PHP is a recursive acronym for "PHP: Hypertext Preprocessor".]

  • • PHP is a server side scripting language that is embedded in HTML

  • • It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites

  • • All of these statement

Explanation

Question 177 of 200

1

• Which of the following is correct about variable naming rules?

Select one of the following:

  • • Variable names must begin with a letter or underscore character

  • • A variable name can consist of numbers, letters, underscores.

  • • A variable name can consist of numbers, letters, underscores. you cannot use characters like + , - , % , ( , ) . &amp; , etc in a variable name.

  • • All of these statement

Explanation

Question 178 of 200

1

• Which of the following is not a NoSQL database?

Select one of the following:

  • • <text>SQL Server</text>

  • • <text>MongoDB</text>

  • • <text>Cassandra</text>

  • • <text>None of the mentioned</text>.

Explanation

Question 179 of 200

1

• Which of the following method can be used to create a MySql database using PHP?

Select one of the following:

  • • <text>mysql_connect()</text>

  • • <text>mysql_query()</text>

  • • <text>mysql_close()</text>

  • • <text>None of the above</text>

Explanation

Question 180 of 200

1

• Which of them could not be applied to techniques for looping through arrays in PHP

Select one of the following:

  • • $courses = ('Database', 'OS', 'Graphics', 'Data Mining');

  • • $courses = array('Database', 'OS', 'Graphics', 'Data Mining');

  • • $teaching = array('Database' => 'Smith', 'OS' => 'Carrick', 'Graphics' => 'Kam');

  • • $teaching['Graphics'] = 'Benson';

Explanation

Question 181 of 200

1

• A key difference between structured and semistructured data concerns how the schema constructs (such as the names of attributes, relationships, and entity types) are handled.

Select one of the following:

  • True
  • False

Explanation

Question 182 of 200

1

• A large database typically has large transaction volumes and rates, is used in service sector industries, and runs 24/7

Select one of the following:

  • True
  • False

Explanation

Question 183 of 200

1

• A library of functions, also known as an application programming interface (API), is used to access the database

Select one of the following:

  • True
  • False

Explanation

Question 184 of 200

1

• A safer way to do inserts and other queries is through the use of placeholders (specified by the ? symbol) in PHP

Select one of the following:

  • True
  • False

Explanation

Question 185 of 200

1

• Associative array − An array with strings as index. This stores element values in association with key values rather than in a strict linear index order.

Select one of the following:

  • True
  • False

Explanation

Question 186 of 200

1

• In SQLJ, an iterator is a type of object associated with a collection (set or multiset) of records in a query result.

Select one of the following:

  • True
  • False

Explanation

Question 187 of 200

1

• In SQLJ, embedded SQL commands are preceded by #sql.

Select one of the following:

  • True
  • False

Explanation

Question 188 of 200

1

• In XML schema, it is possible to specify constraints that correspond to unique and primary key constraints in a relational database, as well as foreign keys constraints.

Select one of the following:

  • True
  • False

Explanation

Question 189 of 200

1

• Interfaces are defined to provide a common function names to the implementers. Different implementers can implement those interfaces according to their requirements. You can say, interfaces are skeletons which are implemented by developers.

Select one of the following:

  • True
  • False

Explanation

Question 190 of 200

1

• Numeric array − An array with a numeric index. Values are stored and accessed in linear fashion.

Select one of the following:

  • True
  • False

Explanation

Question 191 of 200

1

• OPEN CURSOR command is issued to indicate that we are done with processing the result of the query associated with that cursor.

Select one of the following:

  • True
  • False

Explanation

Question 192 of 200

1

• PHP is written in C and usually comes installed with Unix; for other operating systems, the PHP interpreter can be downloaded from http://www.php.net.

Select one of the following:

  • True
  • False

Explanation

Question 193 of 200

1

• The cursor is declared when the SQL query command is declared in the program. Later in the program, an OPEN CURSOR command fetches the query result from the database and sets the cursor to a position before the first row in the result of the query.

Select one of the following:

  • True
  • False

Explanation

Question 194 of 200

1

• The typical mechanisms for making an object persistent are naming and reachability

Select one of the following:

  • True
  • False

Explanation

Question 195 of 200

1

• The typical mechanisms for making an object persistent are naming and reachability

Select one of the following:

  • True
  • False

Explanation

Question 196 of 200

1

• XML attribute values must always be enclosed in quotes

Select one of the following:

  • True
  • False

Explanation

Question 197 of 200

1

• XML elements cannot be empty

Select one of the following:

  • True
  • False

Explanation

Question 198 of 200

1

• XML's goal is to replace HTML

Select one of the following:

  • True
  • False

Explanation

Question 199 of 200

1

• XQuery is the language for querying XML data

Select one of the following:

  • True
  • False

Explanation

Question 200 of 200

1

• What are the advantages and disadvantages of the embedded SQL approach.

Select one or more of the following:

  • • The main advantage is the query text is part of the source code can be checked for syntax errors and validated against the database schema at compile time. The program is quite readable. Since queries are known in advance, the choice of program variables to hold query results is simple.

  • • The main advantage is flexibility in generating queries at runtime. Also, the library of function calls approach is able to call multiple data program.

  • • The main disadvantage is the query text is part of the source code can be checked for syntax errors and validated against the database schema at compile time. The program is quite readable. Since queries are known in advance, the choice of program variables to hold query results is simple.

  • • Disadvantage are more complex programming, inability to do checking at compile time, and concerns about SQL runtime errors.

  • • Disadvantage are the loss of flexibility in changing the query the query at runtime and that all changes to queries must be recompiled.

Explanation