d. Command data files
51. Which of the following types of functions is used to return a result that is a set but can be based on multiple SQL statements?
a. Scalar
b. Inline table-valued
Maybe you are interested!
-
SQL server database management system course, web design profession, Dalat College of Technology - 14 -
SQL Database Administration - Hanoi University of Business and Technology - 14 -
Data Entry Check Diagram On Form At Client And Server -
Nat Outbound (Nat Ra) 1.PC09 Configuration to Make Nat Server
c. Multi-statement table-value
52. What value does the following program return?

CREATE PROCEDURE sp_TestOutput3
@a int, @b int AS
BEGIN
declare @c int
select @c = @a + @b return @c
END GO
Declare @tong int
exec @tong = sp_TestOutput3 100, 200 select @tong
a. 0 b. 300
53. Find the correct statement about referential integrity.
a. Referential integrity ensures that relationships between tables are not lost when operating on their records.
b. Referential integrity does not guarantee consistency of key field values across tables.
c. Referential integrity ensures that when the value of a key field is changed, all references to it are also changed.
54. Which of the following permission groups allows all operations to be performed on SQL Server 2008?
a. SysAdmin b.ServerAdmin
c. ProcessAdmin d. SetupAdmin
55. When two or more fields are linked together to uniquely identify each row in a table, the primary key is called
a. Composite key
b. Candidate key
c. Alternate key
56.Ensures that the input value is restricted to a specific field.
a. Entity integrity
b. Domain integrity
c. Referential integrity
57._is a field or set of fields whose values match a unique key in another table.
a. Primary key
b. Secondary key
c. Foreign key
58. Which of the following global variables returns the number of thousands per second the system has processed when SQL Server is started.
a. @@ERROR b. @@CONNECTIONS
c. @@CPU_BUSY d. @@CURSOR_ROWS
59. How many types of triggers are there?
a. 3 b. 1 c. 5 d. 6
60. Which of the following statements belongs to the DML language?
a. CREATE statement b. SELECT statement
c. GRANT statement d. DROP statement
61._ specifies that no element of the primary key in a base table may contain a NULL value.
a. Referential integrity
b. Domain integrity
c. Field integrity
d. Entity integrity
62. Which of the following actions will copy the old data rows affected by the statement to the DELETED table, and the new data rows will be in the INSERTED table?
a. Update b. Delete c. Insert
63. Executing a command to retrieve data from a database is called _
a. Transaction b. Query
c. Operation d. Command
64. Which of the following Trigger types is the default type, which will execute the commands inside the Trigger after the Trigger activation event has been completed?
a. INSTEAD OF b. AFTER c. FOR
65. SQL Server is designed according to the Client/Server model.
a. True b. False
66. SQL Server 2008 is based on
a. Flat-File Model b. Hierarchical Model
c. Network model c. Relational model
67. Which of the following is the system database in SQL Server 2008?
a. msdb b. northwind c. pubs D. QLTS
68. How many types of databases are there in SQL Server 2008? a. 1. b. 2 c.3 d.4
69. SQL Server 2008 checks valid users at two levels
a. SQL Server Authentication
b. System Authentication
c. Login Authentication
70. For each table or index, rows of data are stored contiguously.
data page
a. 4KB b. 8KB c. 16KB
71. Microsoft SQL Server 2008 Database Engine is the core service for
data
a. Arrangement, processing and security
b. Testing, processing and security
c. Organize, compress and secure
d. Sort, process and restore
72. Which of the following authentication modes requires the user to provide a User Name and Password when logging into SQL Server?
a. Windows Authentication b. SQL Server Authentication
73. Which of the following statements describes the basic features of SQL Server 2005?
a. Integration with the Internet
b. Scalability and Availability
d. Data warehouse
e. Support Client/Server model.
f. All of the above
74. Which of the following global variables returns the number of connections to the Server since the last connection was initiated?
a. @@ERROR b. @@CONNECTIONS
c. @@CPU_BUSY d. @@CURSOR_ROWS
75. What is the purpose of using the IN operator?
a. Compare two similar values
b. Limit the returned results in the result set list
c. Compare the equalities
d. Assess the range of values
76. The statement SELECT DATEPART(day,'01/15/2000') returns which of the following values? a. 4 b. 15 c. 5 d. 6
77. Identify the query statement that returns all names in the students table that contain the character 'L', but not as the first character.
a. SELECT * FROM SV WHERE Names LIKE 'L'
b. SELECT hoten FROM SV WHERE Name LIKE „%L‟
c. SELECT * FROM SV WHERE Name LIKE '&L'
d. SELECT * FROM SV WHERE Name LIKE „%L%‟
e. SELECT hoten FROM SV WHERE Name LIKE „[^L]%L%‟
78. What is the result of POWER(6, 2)?
a. 12 b. 3 c. 36 d. 4
79. Functionin SQL Server returns the current date.
a. getdate() b. now() c. date() d. currentdate()
80. Microsoft SQL Server supports the following two types of comments:
a. -- (two minus signs) b. * c. '
81. The statement SELECT DATEDIFF(mm,‟01/01/99‟,‟05/01/99‟) returns which of the following values?
a. 4 b. 1 c. 5 d. 6
82. Which of the following statements belongs to the DLL language type?
a. CREATE statement b. SELECT statement
c. INSERT statement d. UPDATE statement
83. Which data type stores character data, is fixed in size, and supports Unicode?
a. nchar b. nvarchar c. char d. text.
84. Which data type will use 4 bytes in computer memory, commonly used to store integer values.
a. int b. smallint c.char d. text. text.
85. Which of the following global variables returns the number of most recent T-SQL errors?
a. @@ERROR b. @@CONNECTIONS
c. @@CPU_BUSY d. @@CURSOR_ROWS
86. Which of the following types of functions is used to return a single value based on a number of parameters passed in?
a. Scalar
b. Inline table-valued
c. Multi-statement table-value
87. Which of the following types of Trigger will ignore the event that calls the trigger and instead execute the commands in the trigger?
a. INSTEAD OF b. AFTER c. FOR
88. Which of the following types of backups provides a full backup of the storage media?
a. Fullbackup b. Differential backup c. Transactionlogbackup
89. Which of the following permission groups allows adding or removing SQL Server 2008 linked objects?
a. SysAdmin b.ServerAdmin
c. ProcessAdmin d. SetupAdmin
90. Which of the following authentication modes allows a user to log in to SQL Server without providing a User Name and Password.
a. Windows Authentication b. SQL Server Authentication
REFERENCES
[1]. Nguyen Thien Bang, Phuong Lan. SQL Server 2000 Textbook. Labor-Social Publishing House. 2005.
[2]. Pham Huu Khang, Phuong Lan. Microsoft SQL Server 2008 Database Administration. Volume 1, Volume 2. Labor-Social Publishing House. 2009.
[3]. Pham Huu Khang. Professional application programming SQL Server 2008. Labor-Social Publishing House. 2007.
[4]. Nguyen Ngoc Minh, Hoang Duc Hai. Self-study Microsoft SQL Server 2000. Labor-Social Publishing House. 2005.
[5]. SQL Server 2005, T-SQL Recipes: Problem, Solution, Approach – Apppress Publisher.
[6]. Sams Teach yourself Microsoft SQL Server 2005 Express in 24 hours. [7]. Bill Hamilton. Programming SQL Server 2005. O'Reilly, 2006
[8]. Robert Vieira. Beginning Microsoft SQL Server 2008 Programming. Wrox, 2008. [9]. Rodney Landrum, Shawn McGehee and Walter J. Voytec. Pro SQL Server 2008
Reporting Services, Press, 2008
[10]. Robert D. Schneider and Darril Gibson. Microsoft SQL Server 2008 All-in-One Desk Reference For Dummies, 2008.
[11]. Thomas Rizzo, Adam Machanic, Robin Dewson, Rob Walters, Joseph Sack, Julian Skinner, Louis Davidson. Pro SQL Server 2005, Apress, 2006.
[12]. Rob Walters, Michael Coles, Robin Dewson, Fabio Claudio Ferracchiata, Jan D. Narkiewicz, and Robert Rae. Accelerated SQL Server, Apress, 2008.




