The document contains questions for an exam to obtain a level four database administration certification. It includes multiple choice and matching questions covering topics like database concepts, SQL Server features and configuration, database security and performance.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
14 views3 pages
Level - Four - Theory September 2010
The document contains questions for an exam to obtain a level four database administration certification. It includes multiple choice and matching questions covering topics like database concepts, SQL Server features and configuration, database security and performance.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
OCACA EXAM FOR DATABASE ADMINISTRATION LEVEL FOUR (DBA L-V)
PART I, Multiple Choose
1. The complete picture of data stored in a database is known as A, Schema B, Column C, System flow chart D, DBMS 2. You are the administrator of a SQL Server 2000 computer that contains a database users report that quire to the database ……….examine the subsystems on your server and receive the results shown in the exhibit. You need to modify the server to accelerate query response time. What should you do? A, Increase the amount of RAM B, Add a faster network adapter C, Add an additional processor D, Upgrade to a faster disk subsystem 3. The main facilities offered by database management software are: A, Ability to store a large amount of data in a structured format, easy update, sort, query production of reports B, Ability to process documents for deferent purposes C, Ability to rotate images, copy and paste, fill scale D, Easy editing, spell check, perform calculations, library of mathematical functions, replication 4. Which transaction property ensures changes are still present following a crash or system failure? A, Isolation B, Durability C, Atomicity D, Consistency 5. Which of the following defines mixed mode authentication? A, Connections can be made using only SQL Server Login B, Connections to SQL Server can be made with either Windows accounts or with SQL Server Logins C, Connections can be made using only Windows account D, Connections can be made using only database users 6. Which of the following is a scalability feature in SQL Server Enterprise Edition? A, Binary and compressed XML transport B, Publishing C, Data mining Queries D, Partitioning 7. Which one of the following is an example of resource allocator role of the manager? A, Holding informational meetings B, Scheduling C, Reading periodicals and reports D, Acknowledging mail 8. Which type of file contains data and database objects such as tables and indexes? A, Log file B, Data files C, Binary files D, File groups 9. Which of the following is a securable object in a database schema? A, View B, Database User C, Database D, Service 10. Which of the following can be mapped to database user? A, Domain account B, Login C, Windows account D, Windows group 11. One of the following is NOT related to database performance? A, SQL tuning B, Hardware optimization C, Partitioning of tables D, Tacking back up 12. Which of the following program languages can be used when creating Web Service? ements? A, FORTRAN B, BASIC C, C# D, COBOL 13. There is a database called Pubs having tables Authors(Au_fname, Au_lname , City)and Publishers(Pub_name,City).The report generated by the following keys is: Use Pubs SELECT Authors.Au_lname,Authors.Au_lname,Publishers.Pub_name FROM Authors LEFT OUTER JOIN Publishers ON Authors.City=Publishers.City ORDER BY Publishers.Pub_name ASC, Authors.Au_lname,Authors.Au_fname ASC A, Lists only those publishers that are located in the same cities as the authors, B, Lists the name of all authors and publishers, C, Retrieves the name of every author in the Authors table and the names of any publishers that are located in the same city as the authors. D, Lists the name of every author in the authors table. OCACA EXAM FOR DATABASE ADMINISTRATION LEVEL FOUR (DBA L-V)
14. Which of the following is considered as SQL Server level principle?
A, Windows Domain Login B, SQL Server C, SQL Server Login D, Application Role 15. Which of the following is NOT true about SQL? A, Query a database for information B, Unable to change system security settings C, Modify a database structure D, Add user permission on the databases or tables 16. When you change the Authentication Mode what action do you need to perform before the mode change takes effect? A, Look out all the database users B, Restart SQL Server Agent C, Reboot the server operating system D, Restart SQL Server Instance 17. Which is a reserved word in the Java programming language? A, Method B, Subclasses C, Native D, Reference 18. Which of the following is TRUE about NULL value? A, is not considered to be greater than, less than or equivalent to any other value B, is equivalent to blank C, Is equivalent to zero D, Is equivalent to space 19. Which one of the following is false about strategic plan? A, Implement within two years B, Applied in the entire organization C, 20. Running out of space on the drive used to store backups all of the servers use the same network location. What can you do to save space with your backups and maintaining the same number of backups? A, Use full backups B, Use compressed backups C, Use data compression D, Use a third party tool 21. The requirement to bring database from an access into SQL server A. Business intelligence development studio B. copy database wizard C. Import and export wizard D. BCP OCACA EXAM FOR DATABASE ADMINISTRATION LEVEL FOUR (DBA L-V)
PART II, Matching
A B 1. Enable you to assemble users into a single unit A, Differential backup to which you can apply permissions B, Application program interface(API) 2. The process of segmenting a single table into C, Cascading Delete multiple tables based on the selected rows D, Horizontal Partition 3. A method for keeping sensitive information confidential E, Roles by changing data into unreadable form F, Beta Testing 4. A function that performs a calculation on a column in G, Deadlock a set of rows and returns a single value. H, Encryption 5. A situation where two users ,each having a lock on I, Index one pace of data attempt to acquire a lock on the other’s pace J, Mirroring 6. In a relational database data base object that provides fast access K, Aggregate Function to data in the rows of a table(based on key values) L, Data Dictionary 7. A database backup that records only those changes made M, Decryption to the database since the last full backup N, Update Delete 8. An operation that deletes a row containing a primary key value O, Inheritance that is referenced by foreign key columns in existing rows in other table. P, Phantom 9. A set of system tables that stored in a catalog and that includes Q, System Stored Procedure definitions of database structure and related information such as permission R, Alpha Testing 10. The process for protecting against the loss of data due to disk failure S, Primary Key by maintaining a fully redundant copy of data on a separate disk. T, Vertical Partition 11. A form of software reuse in which a new class is created by U, Full Backup absorbing an existing class’s member’s and something them with new or capability 12. A type of system testing carried out by the test team within the development organization 13. By one task the insertion of a new row or the deletion of an existing row in a range of rows previously read by another task that has not yet committed 14. A set of routines available in an application such as ,ADO for a software program when designing an application interface 15. Provides a collection of prewritten queries