SQL Server - 40


d. Command data files

51. Which of the following types of functions is used to return a result that is a set but can be based on multiple SQL statements?

a. Scalar

b. Inline table-valued

Maybe you are interested!

c. Multi-statement table-value

52. What value does the following program return?

SQL Server - 40

CREATE PROCEDURE sp_TestOutput3

@a int, @b int AS

BEGIN

declare @c int

select @c = @a + @b return @c

END GO

Declare @tong int

exec @tong = sp_TestOutput3 100, 200 select @tong

a. 0 b. 300

53. Find the correct statement about referential integrity.

a. Referential integrity ensures that relationships between tables are not lost when operating on their records.

b. Referential integrity does not guarantee consistency of key field values ​​across tables.

c. Referential integrity ensures that when the value of a key field is changed, all references to it are also changed.

54. Which of the following permission groups allows all operations to be performed on SQL Server 2008?

a. SysAdmin b.ServerAdmin

c. ProcessAdmin d. SetupAdmin

55. When two or more fields are linked together to uniquely identify each row in a table, the primary key is called

a. Composite key

b. Candidate key

c. Alternate key

56.Ensures that the input value is restricted to a specific field.


a. Entity integrity

b. Domain integrity

c. Referential integrity

57._is a field or set of fields whose values ​​match a unique key in another table.


a. Primary key

b. Secondary key

c. Foreign key

58. Which of the following global variables returns the number of thousands per second the system has processed when SQL Server is started.

a. @@ERROR b. @@CONNECTIONS

c. @@CPU_BUSY d. @@CURSOR_ROWS

59. How many types of triggers are there?

a. 3 b. 1 c. 5 d. 6

60. Which of the following statements belongs to the DML language?

a. CREATE statement b. SELECT statement

c. GRANT statement d. DROP statement

61._ specifies that no element of the primary key in a base table may contain a NULL value.

a. Referential integrity

b. Domain integrity

c. Field integrity

d. Entity integrity

62. Which of the following actions will copy the old data rows affected by the statement to the DELETED table, and the new data rows will be in the INSERTED table?

a. Update b. Delete c. Insert

63. Executing a command to retrieve data from a database is called _

a. Transaction b. Query

c. Operation d. Command

64. Which of the following Trigger types is the default type, which will execute the commands inside the Trigger after the Trigger activation event has been completed?

a. INSTEAD OF b. AFTER c. FOR

65. SQL Server is designed according to the Client/Server model.

a. True b. False


66. SQL Server 2008 is based on

a. Flat-File Model b. Hierarchical Model

c. Network model c. Relational model

67. Which of the following is the system database in SQL Server 2008?

a. msdb b. northwind c. pubs D. QLTS

68. How many types of databases are there in SQL Server 2008? a. 1. b. 2 c.3 d.4

69. SQL Server 2008 checks valid users at two levels

a. SQL Server Authentication

b. System Authentication

c. Login Authentication

70. For each table or index, rows of data are stored contiguously.

data page

a. 4KB b. 8KB c. 16KB

71. Microsoft SQL Server 2008 Database Engine is the core service for

data

a. Arrangement, processing and security

b. Testing, processing and security

c. Organize, compress and secure

d. Sort, process and restore

72. Which of the following authentication modes requires the user to provide a User Name and Password when logging into SQL Server?

a. Windows Authentication b. SQL Server Authentication

73. Which of the following statements describes the basic features of SQL Server 2005?

a. Integration with the Internet

b. Scalability and Availability

d. Data warehouse

e. Support Client/Server model.

f. All of the above

74. Which of the following global variables returns the number of connections to the Server since the last connection was initiated?

a. @@ERROR b. @@CONNECTIONS

c. @@CPU_BUSY d. @@CURSOR_ROWS

75. What is the purpose of using the IN operator?

a. Compare two similar values

b. Limit the returned results in the result set list


c. Compare the equalities

d. Assess the range of values

76. The statement SELECT DATEPART(day,'01/15/2000') returns which of the following values? a. 4 b. 15 c. 5 d. 6

77. Identify the query statement that returns all names in the students table that contain the character 'L', but not as the first character.

a. SELECT * FROM SV WHERE Names LIKE 'L'

b. SELECT hoten FROM SV WHERE Name LIKE „%L‟

c. SELECT * FROM SV WHERE Name LIKE '&L'

d. SELECT * FROM SV WHERE Name LIKE „%L%‟

e. SELECT hoten FROM SV WHERE Name LIKE „[^L]%L%‟

78. What is the result of POWER(6, 2)?

a. 12 b. 3 c. 36 d. 4

79. Functionin SQL Server returns the current date.

a. getdate() b. now() c. date() d. currentdate()

80. Microsoft SQL Server supports the following two types of comments:

a. -- (two minus signs) b. * c. '

81. The statement SELECT DATEDIFF(mm,‟01/01/99‟,‟05/01/99‟) returns which of the following values?

a. 4 b. 1 c. 5 d. 6

82. Which of the following statements belongs to the DLL language type?

a. CREATE statement b. SELECT statement

c. INSERT statement d. UPDATE statement

83. Which data type stores character data, is fixed in size, and supports Unicode?

a. nchar b. nvarchar c. char d. text.

84. Which data type will use 4 bytes in computer memory, commonly used to store integer values.

a. int b. smallint c.char d. text. text.

85. Which of the following global variables returns the number of most recent T-SQL errors?

a. @@ERROR b. @@CONNECTIONS

c. @@CPU_BUSY d. @@CURSOR_ROWS

86. Which of the following types of functions is used to return a single value based on a number of parameters passed in?

a. Scalar

b. Inline table-valued


c. Multi-statement table-value

87. Which of the following types of Trigger will ignore the event that calls the trigger and instead execute the commands in the trigger?

a. INSTEAD OF b. AFTER c. FOR

88. Which of the following types of backups provides a full backup of the storage media?

a. Fullbackup b. Differential backup c. Transactionlogbackup

89. Which of the following permission groups allows adding or removing SQL Server 2008 linked objects?

a. SysAdmin b.ServerAdmin

c. ProcessAdmin d. SetupAdmin

90. Which of the following authentication modes allows a user to log in to SQL Server without providing a User Name and Password.

a. Windows Authentication b. SQL Server Authentication


REFERENCES


[1]. Nguyen Thien Bang, Phuong Lan. SQL Server 2000 Textbook. Labor-Social Publishing House. 2005.

[2]. Pham Huu Khang, Phuong Lan. Microsoft SQL Server 2008 Database Administration. Volume 1, Volume 2. Labor-Social Publishing House. 2009.

[3]. Pham Huu Khang. Professional application programming SQL Server 2008. Labor-Social Publishing House. 2007.

[4]. Nguyen Ngoc Minh, Hoang Duc Hai. Self-study Microsoft SQL Server 2000. Labor-Social Publishing House. 2005.

[5]. SQL Server 2005, T-SQL Recipes: Problem, Solution, Approach – Apppress Publisher.

[6]. Sams Teach yourself Microsoft SQL Server 2005 Express in 24 hours. [7]. Bill Hamilton. Programming SQL Server 2005. O'Reilly, 2006

[8]. Robert Vieira. Beginning Microsoft SQL Server 2008 Programming. Wrox, 2008. [9]. Rodney Landrum, Shawn McGehee and Walter J. Voytec. Pro SQL Server 2008

Reporting Services, Press, 2008

[10]. Robert D. Schneider and Darril Gibson. Microsoft SQL Server 2008 All-in-One Desk Reference For Dummies, 2008.

[11]. Thomas Rizzo, Adam Machanic, Robin Dewson, Rob Walters, Joseph Sack, Julian Skinner, Louis Davidson. Pro SQL Server 2005, Apress, 2006.

[12]. Rob Walters, Michael Coles, Robin Dewson, Fabio Claudio Ferracchiata, Jan D. Narkiewicz, and Robert Rae. Accelerated SQL Server, Apress, 2008.

Comment


Agree Privacy Policy *