Resource summary

Question 1

Question
1. The PEAR DB functions can be accessed using DB::<function_name>.
Answer
  • True
  • False

Question 2

Question
2. The string argument of the function for connecting to a database is of the format <DBMS software>://<user account>:<password>@<database server>
Answer
  • True
  • False

Question 3

Question
3. The PEAR DB functon for connecting to a database is called DB::linkto database('string').
Answer
  • True
  • False

Question 4

Question
4. The DBMS software in <DBMS software>://<user account>:<password>@<database server> stands for the particular DBMS software package being connected to: for example mysqli for versions of MySQL starting with version 4.1.2
Answer
  • True
  • False

Question 5

Question
5. The PEAR DB function DB::is Error can be used to determine whether any database access operation was successful or not.
Answer
  • True
  • False

Question 6

Question
6. In PHP, an _____ array provides pairs of key=>value elements; the value of an element is referenced through its key and all key values in a particular array must be unique.
Answer
  • a) Numeric
  • b) Value
  • c) String
  • d) Associative

Question 7

Question
7. Multi-line PHP comments start with // and end with #.
Answer
  • True
  • False

Question 8

Question
8. PHP written in C and usually comes installed with Unix: for other operating systems, the PHP interpreter can be downloaded from http://www.php.net
Answer
  • True
  • False

Question 9

Question
9. The PHP start tag is <?php and end the tag is ?>.
Answer
  • True
  • False

Question 10

Question
10. Web pages, where part of the information is extracted from databases or other data source, are called dynamic Web pages
Answer
  • True
  • False

Question 11

Question
11. In PHP, a ____ array associates a numeric index with each element in the array
Answer
  • a) Numeric
  • b) Associated
  • c) Variable
  • d) String

Question 12

Question
12. PHP variable names start with a $ sign and can include characters, numbers, and the underscore character
Answer
  • True
  • False

Question 13

Question
13. Interpolating variables occurs only within single-quoted strings.
Answer
  • True
  • False

Question 14

Question
14. PHP programs are executed on the client.
Answer
  • True
  • False

Question 15

Question
15. The auto-global predefined PHP variable $_POST is an array that holds all the values entered through form parameters.
Answer
  • True
  • False

Question 16

Question
16. The JDBC _____ libraries are called java.sql.*
Answer
  • a) Method
  • b) Function
  • c) Class

Question 17

Question
17. JDBC does not distinguish between queries that return single tuples and those that return multiple tuples.
Answer
  • True
  • False

Question 18

Question
19. The use of function calls is a more dynamic approach for database programming than embedded SQL.
Answer
  • True
  • False

Question 19

Question
20. A _____ object is similar to a cursor in embedded SQL and an iterator in SQLJ.
Answer
  • a) Procedure
  • b) Function call
  • c) Result Set

Question 20

Question
21. _____ is the part of the SQL standard that specifies how to write persistent stored modules.
Answer
  • a) SQL/PSM
  • b) XML
  • c) SQLJ
  • d) ResultSet

Question 21

Question
22. Database stored procedures (aka persistent stored modules) are stored and executed by the DBMS at the database server.
Answer
  • True
  • False

Question 22

Question
23. Discuss advantages and diadvantages to the library of function calls approach
Answer
  • a) Disadvantage are the loss of flexibility in changing the query at runtime and that all changes to queries must be recompiled.
  • b) The main advantage is flexibility in generating queries at runtime. Also, the library of function calls approach is able to call multiple data program.
  • c) The main advantage is flexibility in generating queries at compile time. Also, the library of function calls approach is able to call multiple single program.
  • d) Disadvantages are more complex programming, inability to do checking at compile time, and concerns about SQL runtime errors.
  • e) The main advantage is the query text is part of source code and can be checked for syntax errors and validated against the data. The program is quite readable.

Question 23

Question
24. It is necessary to have a binding between the data types of the programming language and the attribute data types in the data model
Answer
  • True
  • False

Question 24

Question
25. In SQLJ, embedded SQL commands are preceded by #sql.
Answer
  • True
  • False

Question 25

Question
27. One advantage of using an SQLJ translator is that it is not necessary to install drivers such as a JDBC driver.
Answer
  • True
  • False

Question 26

Question
28. Describe the three main approaches for database programming.
Answer
  • a) Using a library of database functions. This approach provides what is known as an application programming interface (API) for accessing a database from applications programs.
  • b) Using a library of database methods. This approach provides what is known as an application programming interface (API) for accessing a database from applications programs
  • c) Embedded SQL. Embeding database commands in a general-purpose programming language. A preprocessor extracts the embedded SQL from the source code and replaces it with function calls to DBMS-generated code.
  • d) Embedded SQL. Embeding database commands in a specific-purpose programming language. A preprocessor can not extract code, but function calls to be extracted to DBMS-generated code.
  • e) Designing a new database programming language.
  • f) Embedded SQL. Embeding database commands in a specific-purpose programming language. A preprocessor extracts the embedded SQL from the source code and replaces it with function calls to DBMS-generating code

Question 27

Question
29. In XML _____ defines the set of commands (names) that can be used
Answer
  • a) Namespace
  • b) Valid
  • c) Document
  • d) Invalid

Question 28

Question
30. In XML schema, the tag _____ is used tospecify primary keys.
Answer
  • a) xs:element
  • b) xsd:key
  • c) psd:schema
  • d) xs:sequence

Question 29

Question
31. A * following an element name means the element can be repeated zero or one times (an optional, single-valued, nonrepeating elements)
Answer
  • True
  • False

Question 30

Question
32. If an XML document is well-formed and follows a particular schema, it is _____
Answer
  • a) Namespace
  • b) Keys
  • c) Invalid
  • d) Valid

Question 31

Question
33. The XML schema, it is possible to specify constraints that correspond to unique and primary key constraints ina relational database, as well as foreign keys constraints
Answer
  • True
  • False

Question 32

Question
34. An element that does not have *, +, or ? following the element name means the element must appear exactly once in the document (a required, single-valued, nonrepeating element).
Answer
  • True
  • False

Question 33

Question
35. A ? following an element name means that element can be repeated zero or more times in the document (an optional, mult-valued, repeating element).
Answer
  • True
  • False

Question 34

Question
36. The basic object in XML is the XML document, which is structured using types and iterators.
Answer
  • True
  • False

Question 35

Question
37. How does a well-formed XML document look like?
Answer
  • a) It is syntactically correct: a non-single root element with every element including a matching pair of start/end tags within the start-end of the parent element
  • b) It must finish with an XML declaration to indicate the version of XML.
  • c) It is syntactically correct: a single root element with every element including a matching pair of start/end tags within the start-end tags of the parent element
  • d) It is syntactically correct: a single root element with every element except a matching pair of start/end tags within the start-end tags of the parent elements
  • e) It must start with an XML declaration to indicate the version of XML

Question 36

Question
38. Struct type constructors include the set (T), list (T), bag(T), array(T), and dictionary (K,T) type constructors.
Answer
  • True
  • False

Question 37

Question
39. Three major differences between the relational and object database design.
Answer
  • a) In ODB design a binary relationship can be declared in one direction or both. If attributes are included in both directions, there is a potential problem with redundancy.
  • b) In ODB design a binary relationship can be declared in one direction or both. If attributes are included in both directions, there is no any problem
  • c) In an ODB, operations must be defined early since they are part of the classes specifications. In RDBs, operations may not be defined until implementation
  • d) In RDB inheritance is built into the model; ODBs do not have built-in constructs for inheritance.
  • e) In an RDB, operations must be defined early since they are part of the class specifications. In an ODB, operations may not be defined until implementation
  • f) In ODB inheritance is built into the model; RDBs do not have built-in constructs for inheritance.

Question 38

Question
40. The typical mechanisms for making an object an object persistent are naming and reachability.
Answer
  • True
  • False

Question 39

Question
41. The main property required of an OID is that it be immutable (should not change).
Answer
  • True
  • False

Question 40

Question
42. _____ inheritance occurs when a subtype inherits only some of the functions of a supertype.
Answer
  • a) Generalisation
  • b) Complete encapsulation
  • c) Conditional
  • d) Selective

Question 41

Question
43. In operator overloading (or polymorphism), an operation name may refer to several distinct implementations, depending on the type of object it is applied to.
Answer
  • True
  • False

Question 42

Question
44. In ______ all operations that can be applied to an object must be predefined.
Answer
  • a) Half encapsulation
  • b) Complete encapsulation
  • c) Object identifier
  • d) Feedback loop

Question 43

Question
45. The implementation of an operation is called its signature.
Answer
  • True
  • False

Question 44

Question
46. A subtype is used when a new type is needed that is similar but not identical to an already defined type.
Answer
  • True
  • False

Question 45

Question
47. The dictionary constructor creates a collection of two tupes (K,V) where the value of a key K can be used to retrieve the can be used to retrieve the corresponding value V.
Answer
  • True
  • False

Question 46

Question
48. An ODMS provides a unique identity to each independent object in the database via a unique, system-generated ____.
Answer
  • a) Selective
  • b) Complete encaplsulation
  • c) Object identifier

Question 47

Question
49. An object typically has three components: state, timing, and behavior
Answer
  • True
  • False

Question 48

Question
50. The 80-20 rule suggests that 80% of the workload is presented by 20% of the most frequently used transactions, which govem the physical database design.
Answer
  • True
  • False

Question 49

Question
51. The phases (or activities) of the life cycle are not strictly in sequence; ______ are common among and within the phases of the life cycle.
Answer
  • a) One-shot
  • b) Requirements collection
  • c) Feedback loop
  • d) View integration

Question 50

Question
52. In the _____ approach to schema design, a scheme is designed for each user group or application based phase, these schemas are merged into a global conecptual schema.
Answer
  • a) Requirements analysis
  • b) Feedback loops
  • c) Feasibility analysis
  • d) One-shot
  • e) View integration

Question 51

Question
53. A large database typically has large transaction volumes and rates, is used in service sector industries, and runs 24/7
Answer
  • True
  • False

Question 52

Question
54. Many organizations use data dictionary systems (information repositories) to manage meta-data, i.e., data that describes the database structure, constraints, applications, authorizations, users, and so forth.
Answer
  • True
  • False

Question 53

Question
55. What are the three goals of database design?
Answer
  • a) Satisfy the information content requirements of the generalised users and applications.
  • b) Support result
  • c) Support processing requirements and any performance objectives.
  • d) Provide a natural and easy-to-understand structuring of the information.
  • e) Satisfy the information content requirements ofthe specified users and applications.
  • f) Provide a comlicated structuring of the information.

Question 54

Question
56. _______ involves interacting with potential users and user groups to identify their particular problems and needs.
Answer
  • a) view-integration
  • b) requirements collection and analysis
  • c) feasibility analysis
  • d) one-shot
  • e) feedback loop

Question 55

Question
57. A transaction processing system can be characterized as one with several dozen gigabytes of data and a schema with more than 30 or 40 distinct entity types
Answer
  • True
  • False

Question 56

Question
58. Identify the three criteria to guide the choice of physical database design options
Answer
  • a) Space utisilation
  • b) Availability of vendor services
  • c) Transaction throughput
  • d) Response time
  • e) Familiarity of personnel with the system

Question 57

Question
59. Identify the three factors to consider in choosing one DBMS over another
Answer
  • a) Space utisilation
  • b) Organization-wide adoption of a certain philosophy (data model, vendor, methodology, tools)
  • c) Availability of vendor services
  • d) Transaction throughput
  • e) Response time
  • f) Familiarity of personnel with the system

Question 58

Question
60. _____ is concerned with analyzing potential application areas, identifying the economics of information gathering and dissemination, performing preiliminary cost-benefit studies, determining the complexity of data and processes, and setting up priorities among applications.
Answer
  • a) Feasibility analysis
  • b) Requirements collection and analysis
  • c) View integration
  • d) One-shot
  • e) Feedback loops

Question 59

Question
61. The initial requirements can be expected to be formal, complete, consistent, and correct.
Answer
  • True
  • False

Question 60

Question
62. In the ______ schema design approach, the requirements from the different stakeholders are merged into a single set of requirements before the schema design begins.
Answer
  • a) Requirements collection
  • b) Feedback loop
  • c) Centralized (or one-shot)
  • d) Requirements analysis

Question 61

Question
63. What two things does minimizing redundancy imply?
Answer
  • a) Reducing the need for multiple updates to maintain consistency across multiple copies of the same information.
  • b) Reducing the redundant information in tuples.
  • c) Making sure the semantics of the attributes is clear in the schema
  • d) Minimizing redundant storage of the same information
  • e) Disallowing the possibility of generating spurious tuples

Question 62

Question
64. Third normal form (3NF): R is 2NF and all non-prime attributes are transively dependent on the primary key.
Answer
  • True
  • False

Question 63

Question
65. First normal from (1NF): the domain of an attribute must include only atomic (simple, indivisible, scalar) values and the value of any attribute ina tuple must be a single value from the domain of that attribute.
Answer
  • True
  • False

Question 64

Question
66. A functional dependency is a property of the relation schema R not of a particular legal relation state r or R, therefor it must understands the semantics of the attributes of R.
Answer
  • True
  • False

Question 65

Question
67. Second normal form (2NF): R is 1NF and every non-prime attribute A in R is fully functionally dependent on the primary key of R
Answer
  • True
  • False

Question 66

Question
68. What are four informal guidelines that may be used to measure the quality of a relation schema design?
Answer
  • a) Reducing the need for multiple updates to maintain consistency across multiple copies of the same information.
  • b) Disallowing the possibility of generating spurious tuples.
  • c) Reducing the redundant information in tuples
  • d) Reducing the NULL values in tuples
  • e) Making sure the semantics of the attributes is clear in the schema
  • f) Minimizing redundant storage of the same information

Question 67

Question
69. Normalization of data can be considered a process of analyzing the given relation schemas based on their functional dependencies and primary keys to achieve closure on the domain space
Answer
  • True
  • False

Question 68

Question
71. When mapping a binary M:N relationship type R, create a new relation S to represent R, including as foreign key attributes in S the primary keys of the relations that are the perticipating entity types (their combination in S is the composite primary key of S).
Answer
  • True
  • False

Question 69

Question
The symbol σ (sigma) is used to denote the SELECT operator in the relational algebra
Answer
  • True
  • False

Question 70

Question
A EQUIJOIN uses any of the comparison operators =, <, ≤, >, ≥, or ≠.
Answer
  • True
  • False

Question 71

Question
The symbol π (pi) is used to denote the PROJECT operation in the relational algebra.
Answer
  • True
  • False

Question 72

Question
78. A THETA JOIN uses the comparison operator =
Answer
  • True
  • False

Question 73

Question
80. SQL is both a data definition language (DDL) and a data manipulation language (DML).
Answer
  • True
  • False

Question 74

Question
81. A key uniquely identifies a tuple in a relation.
Answer
  • True
  • False

Question 75

Question
82. When the DELETE operation violates a contraint, the deletion must be rejected.
Answer
  • True
  • False

Question 76

Question
83. Semantic integrity constarint may be enforced using mechanisms called triggers and assertions.
Answer
  • True
  • False

Question 77

Question
84. If a multi-table query refers to two or more attributes with the same name, we must qualify the attribute name with the table name, e.g., TABLE.Attribute, to prevent ambiguity.
Answer
  • True
  • False

Question 78

Question
85. A relation schema may only have one key.
Answer
  • True
  • False

Question 79

Question
86. Tuples in a relation are ordered.
Answer
  • True
  • False

Question 80

Question
88. The DELETE operation can violate referential integrity.
Answer
  • True
  • False

Question 81

Question
89. The INSERT operation can violate domain constraints, key constraints, entity integrity, or referential integrity.
Answer
  • True
  • False

Question 82

Question
90. The theortical basis of the relation data model is set theory and first-order predicate logic.
Answer
  • True
  • False

Question 83

Question
92. Attributes that represent the same real-world concept must have identical names in different relations.
Answer
  • True
  • False

Question 84

Question
93. When the INSERT operation violates a constraint, the default option is to reject the insertion.
Answer
  • True
  • False

Question 85

Question
94. Attributes must have unique domains.
Answer
  • True
  • False

Question 86

Question
95. NULL values may mean value unknown, value exits but is not available, attribute does not apply to this tuple (value undefined).
Answer
  • True
  • False

Question 87

Question
96. All tuples in a relation must be distinct.
Answer
  • True
  • False

Question 88

Question
102. The $d->query function takes an SQL command as its string argument and sends it to the database server for execution.
Answer
  • True
  • False

Question 89

Question
103. The _____ is a collection of several libraries of functions for enhancing PHP.
Answer
  • a) DBMS
  • b) PHP Extension and Application Repository (PEAR)
  • c) MYSQL
  • d) PHP SQL

Question 90

Question
104. The _____ variable is similar to cursor and iterator variables.
Answer
  • a) $d->query
  • b) post
  • c) $r

Question 91

Question
105. The abend function can be used to terminate a PHP program if there is an error.
Answer
  • True
  • False

Question 92

Question
106. The PHP function $d->nextID creates a sequence of unique values for a particular table.
Answer
  • True
  • False

Question 93

Question
115. The ___________ R S keeps tuple in the first {left} relation R; if no matching tuple found in S, then the attribute of S in the join are filled with NULL values
Answer
  • o LEFT OUTER JOIN
  • o RIGHT OUTER JOIN
  • o FULL OUTER JOIN
  • o LEFT INNER JOIN

Question 94

Question
116. If a relation schema has more than one key, each is called a _______ key.
Answer
  • o Candidate
  • o Primary
  • o Public
  • o Foreign

Question 95

Question
117. A ¬¬¬_________conflict arises when an attribute may have different domains in two schemas, e.g. pounds vs kilograms
Answer
  • o Domain
  • o Type
  • o Norming
  • o Constraints

Question 96

Question
119. Objects in an object-oriented programming language exist only during program execution, therefore they are called transient objects; an object-oriented database can extend the existence of objects so that they are stored permanently, therefore they are called
Answer
  • o persistent object
  • o instance variable
  • o attribute
  • o object structure

Question 97

Question
120. __________________ is the term used to refer to the problems that occur because of difference between the database model and the programming language model.
Answer
  • o Independence mismatch
  • o Denormalisation
  • o Redundancy
  • o Duplication

Question 98

Question
121. A __________________ is typically used to loop over the tuples in a query result
Answer
  • o Cursor {iterator variable}
  • o Shared variable
  • o Communication variables
  • o fetch

Question 99

Question
122. NULL values may mean value unknown, value exists but isn't available, and attribute does not apply to this tuple (value undefined)
Answer
  • True
  • False

Question 100

Question
123. A THETA JOIN uses any of the comparison operators =,<,>
Answer
  • True
  • False

Question 101

Question
124. For structured data, the schema information is mixed in with the data values, so it is sometimes referred to as self-describing data.
Answer
  • True
  • False

Question 102

Question
125. The main advantage of using a function call interface is that it makes it easier to access multiple databases within the same application program
Answer
  • True
  • False

Question 103

Question
126. In PHP, Interpolating variables may occur within double-quoted or single-quoted strings
Answer
  • True
  • False

Question 104

Question
127. In PHP, the $d->query function takes an SQL command as its string argument and sends it to the database server for execution.
Answer
  • True
  • False

Question 105

Question
128. The ________________ property ensures that either all the database operations in a transaction are executed or none are
Answer
  • o Atomicity
  • o Transaction
  • o Isolation
  • o Concurrency

Question 106

Question
129. ____________________occurs when the same data is stored multiple times
Answer
  • o Redundancy
  • o Normalisation
  • o Denormalization
  • o Persistent

Question 107

Question
130. Creating a database design that only stores each logical data item in only one place is the database is called______________________.
Answer
  • o Redundancy
  • o Normalization
  • o Denormalization
  • o Persistent

Question 108

Question
131. When a database design is in ____________, each value in a tuple is in atomic value.
Answer
  • o First normal form
  • o Second normal form
  • o Third normal form
  • o Forth normal form

Question 109

Question
132. An entity cannot exist in a database merely by being a member of a subclass, it must also be a member of the superclass
Answer
  • True
  • False

Question 110

Question
133. An entity that is a member of a subclass may inherit one, some, or all the attributes of the entity as a member of the superclass.
Answer
  • True
  • False

Question 111

Question
134. The ________________ property allows several users to update the same data in a controlled manner so that result of the updates is correct
Answer
  • o Atomicity
  • o Transaction
  • o Isolation
  • o Concurrency

Question 112

Question
The theoretical basis of the relational data model is set theory and first-order predicate logic
Answer
  • True
  • False

Question 113

Question
Semantic integrity constraints may be enforced using mechanisms called triggers and assertions.
Answer
  • True
  • False

Question 114

Question
When mapping a binary M:N relationship type R, create a new relation S to represent R, including as foreign key attributes in S the primary keys of the relations that are the participating entity types (their combination in S is the composite primary key of S).
Answer
  • True
  • False

Question 115

Question
$_SESSION − An associative array containing session variables available to the current script.
Answer
  • True
  • False

Question 116

Question
PHP makes use of mail() function to send an email. This function requires three mandatory arguments that specify the recipient's email address, the subject of the the message and the actual message additionally there are other two optional parameters.
Answer
  • True
  • False

Question 117

Question
The interpreter identifies variable names within double-quoted strings by their initial character $ and replaces them with the value in the variable. This is known as interpolating variables within strings. Interpolation does not occur in single-quoted strings
Answer
  • True
  • False

Question 118

Question
SQLJ was developed after JDBC, which is used for accessing SQL data- bases from Java using function calls
Answer
  • True
  • False

Question 119

Question
Most NoSQL databases support automatic __________, meaning that you get high availability and disaster recovery
Answer
  • <text>processing</text>
  • <text>scalability</text>
  • <text>replication</text>
  • <text>All of the mentioned</text>

Question 120

Question
The Web Services Architecture supports interaction between a service provider, service requestor, and service registry.
Answer
  • True
  • False

Question 121

Question
Multi-line PHP comments start with // and end with #.
Answer
  • True
  • False

Question 122

Question
Define types of abstractions by the relations as "A is <u>made of/composed of</u> B,C,D"
Answer
  • Classification
  • Aggregation
  • Generalization
  • Specialization

Question 123

Question
FETCH commands are issued in the program; each FETCH moves the cursor to the next row in the result of the query, making it the cur- rent row and copying its attribute values into the C (host language) program variables specified in the FETCH command by an INTO clause.</text>
Answer
  • True
  • False

Question 124

Question
Define types of abstractions by the relations as "B,C,D are special cases of A"
Answer
  • Classification
  • Aggregation
  • Generalization
  • Specialization

Question 125

Question
A JDBC driver is basically an implementation of the function calls specified in the JDBC application programming interface (API) for a particular vendor's RDBMS.
Answer
  • True
  • False

Question 126

Question
In PHP, a numeric array associates a numeric index with each element in the array.
Answer
  • True
  • False

Question 127

Question
Before being able to process JDBC function calls with Java, it is necessary to import the JDBC class libraries, which are called java.sql.*.
Answer
  • True
  • False

Question 128

Question
How can you change "Hansen" into "Nilsen" in the "LastName" column in the Persons table?
Answer
  • • UPDATE Persons SET LastName='Hansen' WHERE LastName='Nilsen'
  • • UPDATE Persons SET LastName='Nilsen' WHERE LastName='Hansen'
  • • MODIFY Persons SET LastName='Hansen' WHERE LastName='Nilsen'
  • • UPDATE FROM Persons SET LastName='Nilsen' WHERE LastName='Hansen'

Question 129

Question
Publisher table contains id and name columns. Id is auto incremented and name is of varchar(40) type. Which of the following queries will execute NOT correctly?
Answer
  • INSERT INTO Publisher (name) values ('O'Reilly');
  • INSERT INTO Publisher (name) values ('O Reilly');
  • INSERT INTO Publisher (name) values ('OReilly');
  • INSERT INTO Publisher (name) values ('O-Reilly');

Question 130

Question
What is the correct order of clauses for a proper SQL query?
Answer
  • SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY
  • SELECT, FROM, WHERE, GROUP BY, ORDER BY, HAVING
  • SELECT, FROM, GROUP BY, WHERE, HAVING, ORDER BY
  • SELECT, FROM, WHERE, HAVING, GROUP BY, ORDER BY

Question 131

Question
Which clause indicates the table(s) from which data is to be retrieved?
Answer
  • FROM
  • SELECT
  • WHERE
  • GROUP BY
  • HAVING

Question 132

Question
161. Which clause is executed first in a SQL query?
Answer
  • WHERE
  • SELECT
  • FROM
  • ON

Question 133

Question
162. Which of the following DROP statements is INCORRECT?
Answer
  • • DROP DATABASE
  • • DROP ROW
  • • DROP INDEX
  • • DROP TABLE

Question 134

Question
163. Which of the following is NOT a language element of SQL?
Answer
  • Expression
  • Data mining
  • Query
  • Statement
  • Clause

Question 135

Question
Which operator is used to search for a specified pattern in a column?
Answer
  • WHERE
  • LIKE
  • ALIASE
  • PATTERN

Question 136

Question
165. Which operator is used to select values within a range?
Answer
  • RANGE
  • AND
  • BETWEEN
  • OR

Question 137

Question
With SQL, how can you delete the records where the "Address" is "Almaty" in the Student Table?
Answer
  • • DROP ROW Student ='Almaty' FROM Address
  • • DELETE FROM Student ROW Address ='Almaty'
  • • DROP ROW Address ='Almaty' FROM Student
  • • DELETE ROW Address ='Almaty' FROM Student

Question 138

Question
166. Which term is used to describe data organized in rows and columns?
Answer
  • Query
  • Program
  • Index
  • Table

Question 139

Question
With SQL, how can you return all the records from a table named "Persons" sorted descending by "FirstName"?
Answer
  • • SELECT * FROM Persons GROUP BY FirstName DESC
  • • SELECT * FROM Persons WHERE FirstName DESC
  • • SELECT * FROM Persons ORDER BY FirstName
  • • SELECT * FROM Persons ORDER BY FirstName DESC

Question 140

Question
169. With SQL, how can you return the number of records in the "Employee" table?
Answer
  • • SELECT COUNT(*) FROM Employee
  • • SELECT * FROM Employee GROUP BY
  • • SELECT NUM(*) FROM Employee
  • • RETURN COUNT(*) FROM Employee

Question 141

Question
170. With SQL, how do you select all the records from a table named "Persons" where the value of the column "FirstName" starts with an "a"?
Answer
  • • SELECT * FROM Persons WHERE FirstName LIKE 'a%';
  • • SELECT * FROM Persons WHERE FirstName LIKE '%a%';
  • • SELECT All FROM Persons WHERE FirstName LIKE='a';
  • • SELECT * FROM Persons WHERE FirstName LIKE 'a*';

Question 142

Question
171. With SQL, how do you select all the records from a table named "Persons" where the "FirstName" is "Alma" and the "LastName" is "Alimova"?
Answer
  • • SELECT * FROM Persons WHERE FirstName=' Alma ' AND LastName=' Alimova'
  • • SELECT * FROM Persons WHERE FirstName=' Alma ' OR LastName=' Alimova'
  • • SELECT FROM Persons WHERE FirstName=' Alma ' AND LastName=' Alimova'
  • • SELECT * FROM Persons HAVING FirstName=' Alma ' AND LastName=' Alimova'

Question 143

Question
Which of the following is not a NoSQL database ?
Answer
  • SQL Server
  • MongoDB
  • Cassandra
  • None of the mentioned

Question 144

Question
Which of the following is a NoSQL Database Type ?
Answer
  • SQL
  • Document databases
  • JSON
  • All of the mentioned

Question 145

Question
Which of the following is a wide-column store ?
Answer
  • Cassandra
  • Riak
  • MongoDB
  • Redis

Question 146

Question
An ODMS provides a unique identity to each independent object stored in the database via a unique, system-generated ________________
Answer
  • <text>object identifier (OID)</text>
  • <text>literals</text>
  • <text>indirect pointer</text>
  • <text>constructor</text>

Question 147

Question
Define types of abstractions by the relations as "A is a <u>member of</u> class B
Answer
  • <text>Classification</text>
  • <text>Aggregation</text>
  • <text>Generalization</text>
  • <text>Specialization</text>

Question 148

Question
Define types of abstractions by the relations as "B <u>is-an</u> A, C <u>is-an</u> A, D <u>is-an</u> A"
Answer
  • Classification
  • Aggregation
  • Generalization
  • Specialization

Question 149

Question
How will you close a MySql database using PHP?
Answer
  • mysql_destroy
  • mysql_exit
  • mysql_end
  • mysql_close

Question 150

Question
How will you concatenate two strings?
Answer
  • Using . operator
  • Using + operator
  • Using add() function
  • Using append() function

Question 151

Question
How will you connect a MySql database using PHP?
Answer
  • mysql_connection
  • mysql_query
  • mysql_fetch_array
  • mysql_connect

Question 152

Question
How will you destroy a session in PHP?
Answer
  • session_destroy()
  • destroy_session()
  • $_SESSION['destroy']
  • $_SESSION['']

Question 153

Question
How will you start a session in PHP?
Answer
  • <text>session_start()</text>
  • <text>start_session()</text>
  • <text>$_SESSION['start']</text>
  • <text>$_SESSION['']</text>

Question 154

Question
How will you unset a single session variable?
Answer
  • <text><![CDATA[<?phpunset($_SESSION['counter']);?>]]></text>
  • <text><![CDATA[<?phpisset($_SESSION['counter']); ?>]]></text>
  • <text>$_SESSION['unset']</text>
  • <text>$_SESSION['']</text>

Question 155

Question
Identify factors to consider in choosing one DBMS over another. I. Organization-wide adoption of a certain philosophy (data model, vendor, methodology, tools). I. Familiarity of personnel with the system. III. Availability of vendor services.
Answer
  • • <text>I, II</text>
  • • <text>I, II, III</text>
  • • <text>II, III</text>
  • • <text>I, III</text>

Question 156

Question
• In which type of PHP arrays the element values can be strings or integers?
Answer
  • • <text>numeric</text>
  • • <text>associative</text>
  • • <text>indexed</text>
  • • <text>none</text>

Question 157

Question
• In XML schema, the tag ________________ is used to specify foreign keys
Answer
  • • <text>xsd:keyref</text>
  • • <text>xsd:element</text>
  • • <text>xsd: unique</text>
  • • <text>xsd:foreignkey</text>

Question 158

Question
• NoSQL databases is used mainly for handling large volumes of ______________ data
Answer
  • unstructured
  • structured
  • semi-structured
  • all of the mentioned

Question 159

Question
• Point out the wrong statement
Answer
  • Non Relational databases require that schemas be defined before you can add data
  • NoSQL databases are built to allow the insertion of data without a predefined schema
  • NewSQL databases are built to allow the insertion of data without a predefined schema
  • All of the mentioned

Question 160

Question
• The ___ notation applies to user-defined subclasses of a specialization that must be ________, as illustrated by the specialization "every STUDENT must be either an GRADUATE_STUDENT, or a UNDERGRADUATE_STUDENT"
Answer
  • • <text>d, disjoint</text>
  • • <text>j, joint</text>
  • • <text>o, overlapping</text>
  • • <text>u, union</text>

Question 161

Question
• 190. The case of specialization what the same (real-world) entity may be a member of more than one subclass of the specialization for example, an alumnus may also be an employee and may also be a student pursuing an advanced degree (PERSON entity type, which is specialized into the subclasses {EMPLOYEE, ALUMNUS, STUDENT})
Answer
  • • <text> disjoint</text>
  • • <text> joint</text>
  • • <text>overlapping</text>
  • • <text>union</text>

Question 162

Question
• The case represents a single superclass/subclass relationship with more than one superclass, where the superclasses represent different entity types
Answer
  • • <text> disjoint</text>
  • • <text> joint</text>
  • • <text>overlapping</text>
  • • <text>union</text>

Question 163

Question
• This auto-global built-in array variable which provides the IP (Internet Protocol) address of the client user computer that is accessing the server, for example 129.107.61.8.
Answer
  • • <text>$_SERVER['SERVER_NAME']</text>
  • • <text>$_SERVER['REMOTE_ADDRESS']</text>
  • • <text>$_SERVER['REMOTE_HOST'] 
</text>
  • • <text>$_SERVER['PATH_INFO'] 
</text>
  • • <text>$_SERVER['QUERY_STRING']</text>

Question 164

Question
• This auto-global built-in array variable which provides the part of the URL address that comes after a backslash (/) at the end of the URL.
Answer
  • • <text>$_SERVER['SERVER_NAME']</text>
  • • <text>$_SERVER['REMOTE_ADDRESS']</text>
  • • <text>$_SERVER['REMOTE_HOST'] 
</text>
  • • <text>$_SERVER['PATH_INFO'] 
</text>

Question 165

Question
• This auto-global built-in array variable which provides the string that holds parameters in a URL after a question mark (?) at the end of the URL. This can hold search parameters, for example.
Answer
  • • <text>$_SERVER['SERVER_NAME']</text>
  • • <text>$_SERVER['QUERY_STRING']</text>
  • • <text>$_SERVER['REMOTE_ADDRESS']</text>
  • • <text>$_SERVER['PATH_INFO'] 
</text>

Question 166

Question
• This auto-global built-in array variablewhich provides the Web site name of the server computer where the PHP interpreter is running.
Answer
  • • <text>$_SERVER['SERVER_NAME']</text>
  • • <text>$_SERVER['REMOTE_ADDRESS']</text>
  • • <text>$_SERVER['REMOTE_HOST'] 
</text>
  • • <text>$_SERVER['PATH_INFO'] 
</text>

Question 167

Question
• What does PHP stands for
Answer
  • • <text>Personal Hypertext Processor</text>
  • • <text>PHP: Hypertext Preprocessor</text>
  • • <text>Private Home Page</text>
  • • <text>Private Hypertext Preprocessor</text>

Question 168

Question
• What does S in BASE refers to?
Answer
  • • <text>System Consistence</text>
  • • <text>System Availability</text>
  • • <text>Changing System</text>
  • • <text>System Stability</text>

Question 169

Question
• [What does the term "I" expands to in the term "ACID"?
Answer
  • • <text>Isolated</text>
  • • <text>Inseparable</text>
  • • <text>Indispensable</text>
  • • <text>Insulted</text>

Question 170

Question
• What does XML stand for?
Answer
  • • <text>eXtensible Markup Language</text>
  • • <text>Example Markup Language</text>
  • • <text>X-Markup Language</text>
  • • <text>eXtra Modern Link</text>

Question 171

Question
• What does XSL stand for?
Answer
  • • <text>eXtensible Stylesheet Language</text>
  • • <text>eXtra Style Language</text>
  • • <text>eXpandable Style Language</text>
  • • <text>eXtensible Style Listing</text>

Question 172

Question
• What is the correct syntax of the declaration which defines the XML version?
Answer
  • • <?xml version="1.0" />
  • • <?xml version="1.0"?>
  • • <xml version="1.0" />

Question 173

Question
• Which company did Cassandra was primarily developed in?
Answer
  • • <text>Apache</text>
  • • <text>Facebook</text>
  • • <text>Google</text>
  • • <text>Amazon</text>

Question 174

Question
• Which feature of CAP refers to load balancing
Answer
  • None of these
  • C
  • P
  • A

Question 175

Question
• Which of the following is correct about PHP
Answer
  • Key-value
  • Wide-column
  • Document
  • All of the mentioned

Question 176

Question
• Which of the following is correct about PHP
Answer
  • • PHP is a recursive acronym for "PHP: Hypertext Preprocessor".]
  • • PHP is a server side scripting language that is embedded in HTML
  • • It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites
  • • All of these statement

Question 177

Question
• Which of the following is correct about variable naming rules?
Answer
  • • Variable names must begin with a letter or underscore character
  • • A variable name can consist of numbers, letters, underscores.
  • • A variable name can consist of numbers, letters, underscores. you cannot use characters like + , - , % , ( , ) . &amp; , etc in a variable name.
  • • All of these statement

Question 178

Question
• Which of the following is not a NoSQL database?
Answer
  • • <text>SQL Server</text>
  • • <text>MongoDB</text>
  • • <text>Cassandra</text>
  • • <text>None of the mentioned</text>.

Question 179

Question
• Which of the following method can be used to create a MySql database using PHP?
Answer
  • • <text>mysql_connect()</text>
  • • <text>mysql_query()</text>
  • • <text>mysql_close()</text>
  • • <text>None of the above</text>

Question 180

Question
• Which of them could not be applied to techniques for looping through arrays in PHP
Answer
  • • $courses = ('Database', 'OS', 'Graphics', 'Data Mining');
  • • $courses = array('Database', 'OS', 'Graphics', 'Data Mining');
  • • $teaching = array('Database' => 'Smith', 'OS' => 'Carrick', 'Graphics' => 'Kam');
  • • $teaching['Graphics'] = 'Benson';

Question 181

Question
• A key difference between structured and semistructured data concerns how the schema constructs (such as the names of attributes, relationships, and entity types) are handled.
Answer
  • True
  • False

Question 182

Question
• A large database typically has large transaction volumes and rates, is used in service sector industries, and runs 24/7
Answer
  • True
  • False

Question 183

Question
• A library of functions, also known as an application programming interface (API), is used to access the database
Answer
  • True
  • False

Question 184

Question
• A safer way to do inserts and other queries is through the use of placeholders (specified by the ? symbol) in PHP
Answer
  • True
  • False

Question 185

Question
• Associative array − An array with strings as index. This stores element values in association with key values rather than in a strict linear index order.
Answer
  • True
  • False

Question 186

Question
• In SQLJ, an iterator is a type of object associated with a collection (set or multiset) of records in a query result.
Answer
  • True
  • False

Question 187

Question
• In SQLJ, embedded SQL commands are preceded by #sql.
Answer
  • True
  • False

Question 188

Question
• In XML schema, it is possible to specify constraints that correspond to unique and primary key constraints in a relational database, as well as foreign keys constraints.
Answer
  • True
  • False

Question 189

Question
• Interfaces are defined to provide a common function names to the implementers. Different implementers can implement those interfaces according to their requirements. You can say, interfaces are skeletons which are implemented by developers.
Answer
  • True
  • False

Question 190

Question
• Numeric array − An array with a numeric index. Values are stored and accessed in linear fashion.
Answer
  • True
  • False

Question 191

Question
• OPEN CURSOR command is issued to indicate that we are done with processing the result of the query associated with that cursor.
Answer
  • True
  • False

Question 192

Question
• PHP is written in C and usually comes installed with Unix; for other operating systems, the PHP interpreter can be downloaded from http://www.php.net.
Answer
  • True
  • False

Question 193

Question
• The cursor is declared when the SQL query command is declared in the program. Later in the program, an OPEN CURSOR command fetches the query result from the database and sets the cursor to a position before the first row in the result of the query.
Answer
  • True
  • False

Question 194

Question
• The typical mechanisms for making an object persistent are naming and reachability
Answer
  • True
  • False

Question 195

Question
• The typical mechanisms for making an object persistent are naming and reachability
Answer
  • True
  • False

Question 196

Question
• XML attribute values must always be enclosed in quotes
Answer
  • True
  • False

Question 197

Question
• XML elements cannot be empty
Answer
  • True
  • False

Question 198

Question
• XML's goal is to replace HTML
Answer
  • True
  • False

Question 199

Question
• XQuery is the language for querying XML data
Answer
  • True
  • False

Question 200

Question
• What are the advantages and disadvantages of the embedded SQL approach.
Answer
  • • The main advantage is the query text is part of the source code can be checked for syntax errors and validated against the database schema at compile time. The program is quite readable. Since queries are known in advance, the choice of program variables to hold query results is simple.
  • • The main advantage is flexibility in generating queries at runtime. Also, the library of function calls approach is able to call multiple data program.
  • • The main disadvantage is the query text is part of the source code can be checked for syntax errors and validated against the database schema at compile time. The program is quite readable. Since queries are known in advance, the choice of program variables to hold query results is simple.
  • • Disadvantage are more complex programming, inability to do checking at compile time, and concerns about SQL runtime errors.
  • • Disadvantage are the loss of flexibility in changing the query the query at runtime and that all changes to queries must be recompiled.
Show full summary Hide full summary

Similar

The Cold War
dottydiva96
Module C4: Chemical Patterns
remandsonic
G481 Mechanics Definitions
nikeishabk
Romeo and Juliet essay
Tambo234
Plant and animal cells
charlotteireland
The Norman Conquest 1066-1087
adam.melling
Of Mice and Men
becky_e
GCSE PE
alexis.hobbs99
Digestive System Pre/Post Quiz
mkelemete
Physics GCSE equations unit 1
James Howlett
Final Exam
Ms. Wong-Lee