Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Humanities
Q:
Only open source products may be used in conjunction with JDBC.
Q:
An ADO.NET dataset can only be used with optimistic locking.
Q:
Once an ADO.NET dataset is constructed, its contents can be formatted as an XML document with a single command.
Q:
An ADO.NET dataset can have primary and foreign keys, but ADO.NET does not support referential integrity.
Q:
An ADO.NET DataSet is connected to databases.
Q:
An ADO.NET DataSet has all the characteristics, features, and functions of a regular database.
Q:
ADO.NET provides the capability to create and process in-memory databases called DataSets.
Q:
ADO.NET is a completely new product, with no connection to ADO except the similar name.
Q:
ADO was (and still is) frequently used for database applications.
Q:
ADO is accessible from languages such as C++ and C#, but not Visual Basic or scripting languages.
Q:
ADO provides access to OLE functionality to programming languages that ordinarily could not access OLE functions.
Q:
An OLE DB service provider accepts data from an OLE DB tabular data provider.
Q:
One important result of OLE DB is that data does not have to be moved or converted from one form to another.
Q:
In OLE DB, all of an object's properties must be exposed in all interfaces, but not all methods have to be exposed.
Q:
One of the properties of all collections is Count, which is the number of objects in the collection.
Q:
Object classes have properties that represent characteristics of the objects in the class.
Q:
In OLE DB, a RecordSet is a more abstract representation of a rowset.
Q:
OLE DB is an object-oriented interface.
Q:
OLE DB can be used to access ODBC data sources.
Q:
OLE DB objects are COM objects.
Q:
In general, the best type of ODBC data source to define for a Web application is a system data source.
Q:
With ODBC, a file data source is available only to the user that created it.
Q:
A multiple-tier ODBC driver may reformat an SQL request, but it does not actually process the SQL statement.
Q:
In ODBC, the amount of work that the driver must do is largely determined by the degree of SQL-compliance of the data source.
Q:
With ODBC, only a single driver is needed to handle all data source types, such as Oracle, DB2, and Access.
Q:
With ODBC, the driver manager serves as an intermediary between the application and the DBMS drivers.
Q:
With ODBC, a database and the DBMS that processes it are identified by the data source.
Q:
OLE DB can act as a wrapper for (covers) database native libraries so that the functionality can be provided by OLE.
Q:
ODBC works with table-like data sources such as relational databases and spreadsheets.
Q:
ODBC has not had practical success, but has shown great potential for future development.
Q:
If the Web server and the DBMS are running on the same server, the system has a three-tier architecture.
Q:
The most widely used Web server for all operating systems is Internet Information Services (IIS).
Q:
If a server is using a Microsoft Windows operating system, it is usually running Internet Information Server (IIS) as its Web server.
Q:
ODBC stands for Open Database Connectivity.
Q:
Every DBMS product uses the same API.
Q:
Every DBMS product has an application programming interface (API).
Q:
Give an example of how XML can be used with a DBMS.
Q:
Briefly describe NetBeans.
Q:
Briefly describe PHP.
Q:
Explain the process by which JSP pages are compiled.
Q:
Compare and contrast servlets and applets.
Q:
Distinguish among the four types of JDBC drivers.
Q:
What is ADO.NET and what is an ADO.NET DataSet?
Q:
Why is the decomposition of the features and functions of a DBMS into different objects an advantage for OLE DB?
Q:
What are the different types of conformance levels within the ODBC standard, and why do they exist?
Q:
Briefly describe the components of the ODBC architecture.
Q:
Explain the relationships among native DBMS libraries, ODBC, OLE DB, ADO, and ADO.NET and why each led to the development of the next.
Q:
The SQL Server statement
SELECT *
FROM Table01
FOR XML RAW
tells SQL Server to place the data values from the columns in the table into XML ________.
A) elements
B) attributes
C) elements or attributes, as chosen by SQL Server
D) elements or attributes, as designated by the XML Schema
Q:
Which of the following is not true about XML?
A) It is a subset of SGML.
B) Additional standards and capabilities have been added to XML processing.
C) It is a hybrid of document processing and database processing.
D) It is a subset of HTML.
Q:
HTML is an application of ________.
A) SGML
B) XML
C) SOAP
D) XSLT
Q:
PDO stands for ________.
A) PHP Data Objects
B) PHP Design Objects
C) Personal Data Objects
D) Personal Design Objects
Q:
The final step of using a PHP connection to a DBMS is to ________.
A) open the connection
B) test the connection
C) close the connection
D) process the query results
Q:
The first PHP element to be created is the ________.
A) Command object
B) Connection object
C) Errors collection
D) Parameters collection
Q:
In PHP, any programming language statements that are to be processed on the server must be enclosed in ________.
A) <!-- and --!>
B) [php and php]
C) (php and php)
D) <?php and ?>
Q:
As compared to CGI files, JSP pages ________.
A) are less memory efficient
B) require more processor time
C) execute faster
D) keep more copies of a given page in memory
Q:
JSP pages ________.
A) are automatically compiled by the servlet processor as needed
B) are required to be compiled by the developer before being made public
C) are automatically checked for syntax errors by the servlet as they are written
D) uses more memory than CGI files
Q:
Which of the following is not true about Tomcat?
A) It is a servlet processor.
B) It can be used as a standalone Web server.
C) It is often used in conjunction with Apache.
D) It is an applet processor.
Q:
Which of the following is true about JSP code?
A) It must be written in Java or JavaScript.
B) It does not have access to HTTP functionality.
C) It must be coded as complete Java classes and methods.
D) It is automatically converted into Java servlets.
Q:
Explain the purpose of transaction logs and checkpoints.
Q:
Discuss the DBMS security model.
Q:
Distinguish between the four cursor types.
Q:
Which are more commonly used: implicit or explicit locks? Why?
Q:
Explain the process of using optimistic locking.
Q:
Briefly define the four isolation levels and the problems they prevent.
Q:
Briefly define the three problems that can occur because of concurrent processing that are addressed by resource locking.
Q:
Distinguish between statement-level consistency and transaction-level consistency.
Q:
Explain the concept of an atomic transaction.
Q:
Briefly explain the strategy of two-phased locking.
Q:
Explain the concept of serializable transactions.
Q:
Explain the importance of documenting changes in database structure.
Q:
Which type of data repository is composed of metadata that is created automatically as the system components are created?
A) Passive
B) Dynamic
C) Active
D) Automatic
Q:
Which of the following is not true of data repositories?
A) They are usually created after the database has been implemented and optimized for performance.
B) They may be virtual.
C) They may contain metadata about database applications.
D) They may contain metadata about users.
Q:
Which of the following would a DBA typically NOT do in managing the DBMS?
A) Analyze system performance statistics
B) Install new versions of the operating system, as needed
C) Evaluate new DBMS product features
D) Tune DBMS product options to accommodate other software in use
Q:
Which of the following would not be contained in a transaction log?
A) Before images
B) Type of operation
C) Time of the action
D) Permissions
Q:
Recovering a database via rollback involves ________.
A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning and, then reprocessing all of the transactions
Q:
Recovering a database via rollforward involves ________.
A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning, and then reprocessing all of the transactions
Q:
Recovering a database via reprocessing involves ________.
A) restoring the database from the save and reprocessing all the transactions since the save
B) restoring the database from the save and reapplying all the changes made by transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and restarting the valid transactions that were in process at the time of the failure
D) recreating the database by reentering all of the data from the beginning, and then reprocessing all of the transactions
Q:
Which of the following is not true of DBMS security features?
A) Users may be assigned to one or more roles.
B) A role may be assigned to only one user.
C) Both users and roles can have many permissions.
D) Objects have many permissions.
Q:
Once processing rights have been defined, they may be implemented at any of these levels except ________.
A) network
B) operating system
C) data
D) application
Q:
Which of the following cannot be enforced in the DBMS or application programs?
A) Processing rights
B) Security
C) Processing responsibilities
D) Cursors
E) Transaction isolation