Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 2
Institution Name Document No.
ወ/ሮ ስህን ፖሊቴክኒክ ኮሌጅ OF/WSPC /263-01
W/R SIHEEN POLYTECHNIC COLLEGE Title: Issue No. Page No. 2 Page 1 of 2 TTLM Module Title: Monitoring and Administering Database Time allowed: - _mints Name: ________________________________Occupation: DBA IV ID No.: ____________ I. Choose the Correct answer from the given alternatives 1. A system administrator can lose access to an instance of SQL Server because of one of the following reasons. Which one is it? A. All logins that are members of the sysadmin server role have been removed B. All Windows Groups that are members of the sysadmin fixed server role have been removed. C. The sa account is disabled or no one knows the password. D. All of the above 2. What are the information describing the contents, format, and structure of a database and the relationship between its elements? A. data dictionary B. data integrity C. attributes D. data types 3. Which statement is not true? A. Index provides fast access to the data in tables B. Index has only char data type C. Index maintains uniqueness of the indexed column D. Indexes can be created using one or more columns of a database table 4. With SQL, how to create an index for the EmpID column of the employee table in asending order? A. CREATE INDEX Index_EmpID ON employee (EmpID ASC ) B. CREATE INDEX ON employee (EmpID ASC ) C. CREATE INDEX Index_EmpID ON employee (EmpID DESC ) D. CREATE INDEX ON employee (EmpID ASC ) 5. Which SQL statement is used to remove index from a current database? A. drop index B. remove index C. Delete index D. collapse 6. The commands used to modify data in database table: A. modify B. change C. update D. rename 7. With SQL, how do you create a SQL server login "CoC" with password is “123” A. Create login coc with password=’123’ C. Create login coc with password 123 B. Create login =’coc’ password = ‘123’ D. Create login with password =’123’ 8. The Integrity which makes sure that key values are consistent across tables A. Entity Integrity B. Domain Integrity C. Referential Integrity 9. Primary Key Constraint Enforces ----------------------of the table A. Referential Integrity B. Entity Integrity C. Domain Integrity 10. _______________constraint enforces referential Integrity A. Primary key B. Foreign key C. Unique key D. Candidate key 11. Default Constraint Enforces ____________________ A. Data Integrity B. Referential Integrity C. Entity Integrity D. Domain Integrity Institution Name Document No.
ወ/ሮ ስህን ፖሊቴክኒክ ኮሌጅ OF/WSPC /263-01
W/R SIHEEN POLYTECHNIC COLLEGE Title: Issue No. Page No. 2 Page 1 of 2 TTLM 12. Which one is used for storing, processing and securing data? A. Database Engine B. Analysis Services C. Reporting Services D. Integration Services 13. Point out the correct statement. A. A login is a database-level principal B. The Information about login is stored in sys.sysusers C. A login is a server-level principal D. Multiple users can be associated with one server login in single database 14. Working on the Status page of Login Properties: point out the correct match with the combination given below: A. Select DENY and ENABLED login: Login failed for a given user. B. Select GRANT and DISABLED login: Login sa is connect successfully C. Select DENY and DISABLED login: Login is connect successfully for a given user D. Select GRANT and ENABLED login: Login failed for a given user. 15. Point out the odd one A. SysAdmin B. ServerAdmin C. SetupAdmin D. db_owner II. Match Column ‘A’ with column ‘B’. A. DbCreator 1) In SQL holds initialization information for SQL Server 2) In SQL holds template information for the newly created B. db_datareader database C. Model Database 3) It stores information related to backups, SQL Server Agent D. TempDB Database information, SQL Server Jobs, alerts and so on 4) It stores temporary objects, like temporary tables, temporary E. Master database Stored Procedures and temporary tables to store sorting and F. User Databases so on. G. MSDB database 5) It stores the data created by the user themselves. 6) fixed server role 7) fixed database role
III. Write short Answer:
1. write the two types of authentication in SQL Server: a) ______________________________ b) ______________________________________