A. They are divided into pages.
B. They can be directly read by Interactive SQL.
C. You must unload and reload them to change operating systems.
D. You must have RESOURCE permission to create one.
Answer: A
2.After shutting your database server down cleanly, you have just deleted the existing database
transaction log. How do you create a new transaction log for this non-replicating database?
A. Start the DBTRAN command with the -n command line option.
B. Start the DBBACKUP utility with the -t command line option.
C. Start the database server using the existing database file.
D. Start the Change Log File Information utility in Sybase Central.
Answer: C
3.When trying to connect from your application to the personal database server you receive the error
"Database server connection limit exceeded". What is the problem?
A. The personal database server license has expired.
B. You have exceeded the personal database server limit of ten local connections.
C. The personal database server licensing information has been deleted.
D. You have exceeded the personal database server limit of five local connections.
E. You have exceeded the maximum number of connections for which you have licensed your personal
database server.
Answer: B
4.Given the following stored procedure definition:
The safer , easier way to help you pass any IT exams.
3 / 9
What is the result of the dba user executing the statement CALL my_proc(3)?
A. The value '3' is inserted into table_0.
B. The value '3' is inserted into table_1.
C. The value '3' is inserted into table_2.
D. The value '3' is inserted intoerr_table.
E. SQL Error -690, Return value cannot be set, will be issued.
Answer: D
5.Which two options are used for Transact-SQL compatibility?
A. BLOB_THRESHOLD
B. QUOTED_IDENTIFIER
C. DIVIDE_BY_ZERO
D. BLOCKING
E. ALLOW_NULLS_BY_DEFAULT
Answer: B,E
6.Which two are valid row-level trigger times?
A. DURING UPDATE
B. BEFORE INSERT
C. AFTER CONNECT
The safer , easier way to help you pass any IT exams.
4 / 9
D. BEFORE SELECT
E. AFTER DELETE
Answer: B,E
7.Which encryption technology can secure ASA client-server communications?
A. AES
B. C2
C. Certicom TLS/SSL
D. DES
E. S/MIME
F. TDS
Answer: C
8.Using the following SQL statements, the DBA user creates a table called Customer and gives
permission to the new user jsmith to view the data in the table:
When the user jsmith connects to the database the SQL statement SELECT * FROM Customer returns
the error "Table Customer not found", but the select statement SELECT * FROM dba.Customer returns
the proper result set. Which of the following should DBA execute so that jsmith could execute SELECT *
FROM Customer and still have the data returned from the Customer table owned by DBA?
A. GRANT DBA TOjsmith;
B. GRANT SELECT ON Customer TOjsmith WITH GRANT OPTION;
C. REVOKE SELECT ON Customer TOjsmith; GRANT ALL ON Customer TO jsmith;
D. GRANT GROUP TO Customer; GRANT MEMBERSHIP IN GROUP Customer TO jsmith;
E. GRANT GROUP TO DBA; GRANT MEMBERSHIP IN GROUP DBA TO jsmith;
Answer: E
The safer , easier way to help you pass any IT exams.
5 / 9
9.Your non-replicating database file and transaction log file are corrupted. When you try to start the
database server, you get an assertion failure. You are keeping a live backup of the database transaction
log and you do a full on-line backup every night. What should you do to recover the most transactions
after copying the backup database into your recovery directory?
A. Unload and reload the corrupted database.
B. Apply the backup log and the live backup log to the backup of the database file and restart the server.
C. Copy the live backup log over top of the corrupt transaction log and restart the server with the backup
database.
D. Start the server on the corrupt database with the -f recovery switch,then apply the live backup of the
transaction log to the corrupt database.
Answer: B
10.The default isolation level used when making ODBC connections is:
A. read uncommitted
B. read committed
C. repeatable read
D. whatever the AUTO_COMMIT option is set to
E. serializable
Answer: A
11.After the following SQL statements are executed, what is the value in the LastName column of the
Customer table in the row where the value of the pkey column is 1?
The safer , easier way to help you pass any IT exams.
6 / 9
A. A
B. B
C. C
D. D
Answer: B
12.When running a validation against a backup of a database, you should:
A. Commit all changes in the database.
B. Checkpoint the database.
C. Set the ON_ERROR_CONTINUE database option to TRUE.
D. Start the database in read-only mode.
Answer: D
13.Which programming interface is used by a Java application to communicate with the database server?
A. java.rmi
B. java.net
C. java.sqlanywhere
The safer , easier way to help you pass any IT exams.
7 / 9
D. JDBC
E. createStatement() method
Answer: D
14.The server machine loses power and reboots. During the restart, the database server (dbsrv8/dbeng8)
performs an automatic recovery. All non-committed changes are:
A. recovered from temporary files
B. rolled back by the server
C. written to the database from log files
D. written to the log file
Answer: B
15.In a non-replicating environment, you try to start the database server and receive the following
message: "Cannot open transaction log file
There is no mirror log or backup log available to recover from. The server was shut down cleanly the
previous night. When DBTRAN is run on the log file it encounters an error. What should you do next to get
your database up and running?
A. Back up the database and log files, delete the log and restart the server using the -f switch.
B. Back up the database and log files, then unload and reload the database.
C. Back up the log file, then restart the server and see if the log will repair itself.
D. Run DBVALID on the database file to see if you can detect the source of the corruption.
Answer: A
if you need more exam question,u can leave ur mailbox,or like my facebook page http://www.facebook.com/pages/Free-It-certification-exam-Real-QAs-such-as-ccna-mcse-comptia/159996837383933
No comments:
Post a Comment