In general, database objects should be owned by the ____.
A -
DataBase Admistrator (DBA)
B -
Database Management System (DBMS)
C -
System Administrator (SA)
D -
Database Owner (DBO)
2-
It is the job of a program called a database management system to:
A -
store and retrieve data in the database tables
B -
delete and append data in the database tables
C -
process forms
D -
None of these answers
3-
MedicineCode ->(MedicineName, ShelfLine, Manufacturer, Dosage)
Given the above functional dependency, which of the followintg statement is not known to be true?
A -
MedicineCode is a determinant
B -
Manufacturer is functionally dependent on MedicineCode
C -
MedocineName is a determinant
D -
ShelfLine is functionally dependent on MedicineCode
4-
Member of the db_datareader role have which of the following object permissions?
A -
SELECT
B -
REFERENCES
C -
INSERT
D -
EXECUTE
5-
Microsoft SQL Server is am example of a: *
A -
databse
B -
data manipulation system
C -
database management system
D -
list manager
6-
Modern microcomputer DBMS products.
A -
are not truly relational
B -
have poor response time
C -
are really just programming languages with generalized file-processing capabilities
D -
provide easy to use interfaces
7-
Omitting the WHERE clause from a DELETE statement has which of the following effects?
A -
The delete statement will prompt the user to enter criteria for the deletion
B -
The delete statement will fail because there are no records to delete
C -
The delete statement will fail because of syntax error
D -
The delete statement will remove all records from the table
8-
On the server, you create a new database named EmployeeData. The EmployeeData database will
store confidential information about company employees. You need to allow only authenticated users to
access the EmployeeData databse.
Which Transact SQL statement should you execute?
A -
EXEC sp_droplogin guest
B -
EXEC sp_addrolereader db_denydatareader.guest
C -
EXEC sp_revokelogin guest
D -
EXEX sp_revokebaccess guest
9-
One disadvantage of file processing systems is:
A -
enforcement of integrity constraints
B -
limited data sharing
C -
program-data independence
D -
reduced data duplication
10-
One important relational design principle is that:
A -
every determinant must be a candidate key
B -
every determiant must be functionally dependent on the primary key
C -
every candidate key must not be a determiant
D -
every primary key must be funstionally dependent on every determiant