Execution on a time activated basis according to a schedule is done by _______
1.Stored program
2.Events
3.Triggers
4.Stored procedures
Posted Date:-2021-07-19 04:15:28
For which table does ‘REPAIR TABLE’ not work?
1.MyISAM
2.ARCHIVE
3.CSV
4.InnoDB
Posted Date:-2021-07-19 04:15:28
How can the value of recently generated sequence number be obtained?
1.LAST_INSERT_ID()
2.LATEST_INSERT_ID()
3.INITIAL_INSERT_ID()
4.INSERT_ID()
Posted Date:-2021-07-19 04:15:28
How is a stored procedure invoked?
1.INVOKE
2.SEE
3.CALL
4.RETURN
Posted Date:-2021-07-19 04:15:28
How many files does each end of a client/server connection including SSL support use to set up secure communications?
1.0
2.1
3.2
4.3
Posted Date:-2021-07-19 04:15:28
How would a stored function named PI() written in the database ‘sampdb’ be called?
1.PI()
2.sampdb.PI()
3.MySQL.PI()
4.db.PI()
Posted Date:-2021-07-19 04:15:28
REPAIR TABLE does not work for _____
1.MyISAM
2.ARCHIVE
3.InnoDB
4.CSV
Posted Date:-2021-07-19 04:15:28
Slow shutdown can be performed by setting innodb_fast_shutdown to ________
1.0
2.-1
3.1
4.2
Posted Date:-2021-07-19 04:15:28
The character that the MySQL client program recognizes as a statement delimiter is _______
1.:
2..
3.;
4.,
Posted Date:-2021-07-19 04:15:28
The column not returned by ‘OPTIMIZE TABLE’ is ______
1.Table
2.Msg_txt
3.Op
4.Msg_type
Posted Date:-2021-07-19 04:15:28
The command to see the warning messages is _______
1.DISPLAY WARNINGS
2.DISP WARNINGS
3.DISP WARNING
4.SHOW WARNINGS
Posted Date:-2021-07-19 04:15:28
The datatype that stores the longest length of strings is _____
1.CHAR
2.VARCHAR
3.TINYTEXT
4.TEXT
Posted Date:-2021-07-19 04:15:28
The grant table scope columns that is case insensitive is _____
1.Host
2.User
3.Password
4.Db
Posted Date:-2021-07-19 04:15:28
The line that is not used to turn on the event scheduler is ______
1.event_scheduler = ON
2.eventscheduler = ON
3.event_scheduler_ON
4.events_scheduler_ON
Posted Date:-2021-07-19 04:15:28
The line which is written at the top of the script to write a Perl script using CGI.pm is _______
1.use this CGI
2.put CGI
3.use CGI
4.include CGI
Posted Date:-2021-07-19 04:15:28
The log enabled by –relay-log-index is _____
1.relay log index
2.relay log
3.binary log
4.error log
Posted Date:-2021-07-19 04:15:28
The mode used to turn on strict mode and all of the additional restrictions is ____
1.STRICT_ALL_TABLES
2.ERROR_FOR_DIVISION_BY_ZERO
3.TRADITIONAL
4.ERROR_WHEN_DIVIDE_BY_ZERO
Posted Date:-2021-07-19 04:15:28
The number of values returned from a stored procedure can be _____
1.0
2.1
3.2
4.3
Posted Date:-2021-07-19 04:15:28
The privilege that must be given to the database to create a stored function or procedure is _____
1.CREATE ROUTINE
2.CREATE METHOD
3.CREATE FUNCTION
4.CREATE PROCEDURE
Posted Date:-2021-07-19 04:15:28
The recovery of data changes made since a given point in time is called ____
1.decremental
2.incremental
3.close
4.clear
Posted Date:-2021-07-19 04:15:28
The security context when a user creates a stored program that accesses sensitive data but forgets that other people who can invoke the object have the same access is ______
1.good
2.bad
3.illegal
4.fare
Posted Date:-2021-07-19 04:15:28
The statement that is used to check the status of the event scheduler at runtime is _____
1.SHOW STATUS OF ‘event_scheduler’
2.SHOW VARIABLES OF ‘event_scheduler’
3.SSHOW STATUS LIKE ‘event_scheduler’
4.SHOW VARIABLES LIKE ‘event_scheduler’
Posted Date:-2021-07-19 04:15:28
The statement that performs key distribution analysis and stores the distribution for the named tables is _______
1.CHECK TABLE
2.ANALYZE TABLE
3.CHECKSUM TABLE
4.OPTIMIZE TABLE
Posted Date:-2021-07-19 04:15:28
The table that lists the column level privileges is ______
1.columns_priv
2.db
3.tables_priv
4.procs_priv
Posted Date:-2021-07-19 04:15:28
The TLS protocol is _____
1.transparent layer security
2.transport layer security
3.transparent level security
4.transport level security
Posted Date:-2021-07-19 04:15:28
The value of event_scheduler that enables checking status but not changing it at runtime is ______________
1.ON
2.OFF
3.DISABLED
4.ENABLED
Posted Date:-2021-07-19 04:15:28
To check if the data directory contains insecure files or directories, the command executed is _____________
1.ls -l
2.ls -a
3.ls -la
4.ls -lu
Posted Date:-2021-07-19 04:15:28
To perform consistency checks on a MyISAM table the statement is _____
1.CHECK TABLE
2.REPAIR TABLE
3.ANALYZE TABLE
4.OPTIMIZE TABLE
Posted Date:-2021-07-19 04:15:28
Triggers are not supported for ______
1.delete
2.update
3.insert
4.views
Posted Date:-2021-07-19 04:15:28
What causes a replication master server to delete all the binary log files even if they are still in use?
1.RESET MASTER LOGS
2.FLUSH TABLES
3.RELOAD
4.FLUSH LOGS
Posted Date:-2021-07-19 04:15:28
What does ‘abc’ || ‘xyz’, when PIPES_AS_CONCAT is enabled, result in?
1.0
2.1
3.abcxyz
4.xyzabc
Posted Date:-2021-07-19 04:15:28
What does LAST_INSERT_ID() return when no AUTO_INCREMENT value has been generated during the current connection?
1.-1
2.0
3.1
4.2
Posted Date:-2021-07-19 04:15:28
What does the AUTO_INCREMENT sequences normally begin at?
1.0
2.1
3.-1
4.2
Posted Date:-2021-07-19 04:15:28
What does the expression ‘2 BETWEEN 2 AND 5’ result in?
1.TRUE
2.FALSE
3.-1
4.2
Posted Date:-2021-07-19 04:15:28
What enables the read and execute access to all users outside of mysql group.
1.drwxrwxr-x
2.drwxrwxr-y
3.drwyrwyr-x
4.drwyrwyr-y
Posted Date:-2021-07-19 04:15:28
What is a synonym for CHARACTER SET?
1.CSET
2.CHSET
3.CHARSET
4.CHCSET
Posted Date:-2021-07-19 04:15:28
What is the best datatype for a column that is expected to store values up to 2 million?
1.SMALLINT
2.TINYINT
3.MEDIUMINT
4.BIGINT
Posted Date:-2021-07-19 04:15:28
What is the Perl DBI?
1.database inheritance
2.database integrity
3.database interface
4.database isolation
Posted Date:-2021-07-19 04:15:28
What is the size of the BIT type?
1.1
2.2
3.3
4.variable
Posted Date:-2021-07-19 04:15:28
What is the SQL mode to check for divide by zero error?
1.STRICT_ALL_TABLES
2.ERROR_FOR_DIVISION_BY_ZERO
3.ERROR_DIVIDE_BY_ZERO
4.ERROR_WHEN_DIVIDE_BY_ZERO
Posted Date:-2021-07-19 04:15:28
What is the storage size in bytes required for the MEDIUMINT datatype?
1.1
2.2
3.3
4.4
Posted Date:-2021-07-19 04:15:28
What is the synonym for REAL?
1.FLOAT
2.INT
3.DOUBLE
4.BIT
Posted Date:-2021-07-19 04:15:28
What performs a key distribution analysis and stores the distribution for the named table or tables?
1.ANALYZE TABLE
2.CHECK TABLE
3.CHECKSUM TABLE
4.OPTIMIZE TABLE
Posted Date:-2021-07-19 04:15:28
Which of the following columns is not returned by ‘OPTIMIZE TABLE’?
1.Table
2.Op
3.Msg_type
4.Msg_txt
Posted Date:-2021-07-19 04:15:28
Which of these grant table scope columns is case insensitive?
1.Host
2.User
3.Password
4.Db
Posted Date:-2021-07-19 04:15:28
Which program is used as a utility for MyISAM table maintenance?
1.innochecksum
2.myisam_ftdump
3.myisamchk
4.myisamlog
Posted Date:-2021-07-19 04:15:28
Which table lists the accounts and the databases for which the privileges are provided?
1.user
2.db
3.tables_priv
4.procs_priv
Posted Date:-2021-07-19 04:15:28
Which upgrade involves exporting existing data using mysqldump?
1.inplace
2.logical
3.illogical
4.system
Posted Date:-2021-07-19 04:15:28
Which upgrade involves shutting down the old MySQL version and replacing the old binaries?
1.inplace
2.logical
3.illogical
4.system
Posted Date:-2021-07-19 04:15:28
Which variable checks for the availability of SSL support?
1.ave_ssl
2.has_ssl
3.avail_ssl
4.ssl_avail
Posted Date:-2021-07-19 04:15:28