Execution on a time activated basis according to a schedule is done by _______
1.Stored program
2.Events
3.Triggers
4.Stored procedures
For which table does ‘REPAIR TABLE’ not work?
1.MyISAM
2.ARCHIVE
3.CSV
4.InnoDB
How can the value of recently generated sequence number be obtained?
1.LAST_INSERT_ID()
2.LATEST_INSERT_ID()
3.INITIAL_INSERT_ID()
4.INSERT_ID()
How is a stored procedure invoked?
1.INVOKE
2.SEE
3.CALL
4.RETURN
How many files does each end of a client/server connection including SSL support use to set up secure communications?
1.0
2.1
3.2
4.3
How would a stored function named PI() written in the database ‘sampdb’ be called?
1.PI()
2.sampdb.PI()
3.MySQL.PI()
4.db.PI()
REPAIR TABLE does not work for _____
1.MyISAM
2.ARCHIVE
3.InnoDB
4.CSV
Slow shutdown can be performed by setting innodb_fast_shutdown to ________
1.0
2.-1
3.1
4.2
The character that the MySQL client program recognizes as a statement delimiter is _______
1.:
2..
3.;
4.,
The column not returned by ‘OPTIMIZE TABLE’ is ______
1.Table
2.Msg_txt
3.Op
4.Msg_type
The command to see the warning messages is _______
1.DISPLAY WARNINGS
2.DISP WARNINGS
3.DISP WARNING
4.SHOW WARNINGS
The datatype that stores the longest length of strings is _____
1.CHAR
2.VARCHAR
3.TINYTEXT
4.TEXT
The grant table scope columns that is case insensitive is _____
1.Host
2.User
3.Password
4.Db
The line that is not used to turn on the event scheduler is ______
1.event_scheduler = ON
2.eventscheduler = ON
3.event_scheduler_ON
4.events_scheduler_ON
The line which is written at the top of the script to write a Perl script using CGI.pm is _______
1.use this CGI
2.put CGI
3.use CGI
4.include CGI
The log enabled by –relay-log-index is _____
1.relay log index
2.relay log
3.binary log
4.error log
The mode used to turn on strict mode and all of the additional restrictions is ____
1.STRICT_ALL_TABLES
2.ERROR_FOR_DIVISION_BY_ZERO
3.TRADITIONAL
4.ERROR_WHEN_DIVIDE_BY_ZERO
The number of values returned from a stored procedure can be _____
1.0
2.1
3.2
4.3
The privilege that must be given to the database to create a stored function or procedure is _____
1.CREATE ROUTINE
2.CREATE METHOD
3.CREATE FUNCTION
4.CREATE PROCEDURE
The recovery of data changes made since a given point in time is called ____
1.decremental
2.incremental
3.close
4.clear
The security context when a user creates a stored program that accesses sensitive data but forgets that other people who can invoke the object have the same access is ______
1.good
2.bad
3.illegal
4.fare
The statement that is used to check the status of the event scheduler at runtime is _____
1.SHOW STATUS OF ‘event_scheduler’
2.SHOW VARIABLES OF ‘event_scheduler’
3.SSHOW STATUS LIKE ‘event_scheduler’
4.SHOW VARIABLES LIKE ‘event_scheduler’
The statement that performs key distribution analysis and stores the distribution for the named tables is _______
1.CHECK TABLE
2.ANALYZE TABLE
3.CHECKSUM TABLE
4.OPTIMIZE TABLE
The table that lists the column level privileges is ______
1.columns_priv
2.db
3.tables_priv
4.procs_priv
The TLS protocol is _____
1.transparent layer security
2.transport layer security
3.transparent level security
4.transport level security
The value of event_scheduler that enables checking status but not changing it at runtime is ______________
1.ON
2.OFF
3.DISABLED
4.ENABLED
To check if the data directory contains insecure files or directories, the command executed is _____________
1.ls -l
2.ls -a
3.ls -la
4.ls -lu
To perform consistency checks on a MyISAM table the statement is _____
1.CHECK TABLE
2.REPAIR TABLE
3.ANALYZE TABLE
4.OPTIMIZE TABLE
Triggers are not supported for ______
1.delete
2.update
3.insert
4.views
What causes a replication master server to delete all the binary log files even if they are still in use?
1.RESET MASTER LOGS
2.FLUSH TABLES
3.RELOAD
4.FLUSH LOGS
What does ‘abc’ || ‘xyz’, when PIPES_AS_CONCAT is enabled, result in?
1.0
2.1
3.abcxyz
4.xyzabc
What does LAST_INSERT_ID() return when no AUTO_INCREMENT value has been generated during the current connection?
1.-1
2.0
3.1
4.2
What does the AUTO_INCREMENT sequences normally begin at?
1.0
2.1
3.-1
4.2
What does the expression ‘2 BETWEEN 2 AND 5’ result in?
1.TRUE
2.FALSE
3.-1
4.2
What enables the read and execute access to all users outside of mysql group.
1.drwxrwxr-x
2.drwxrwxr-y
3.drwyrwyr-x
4.drwyrwyr-y
What is a synonym for CHARACTER SET?
1.CSET
2.CHSET
3.CHARSET
4.CHCSET
What is the best datatype for a column that is expected to store values up to 2 million?
1.SMALLINT
2.TINYINT
3.MEDIUMINT
4.BIGINT
What is the Perl DBI?
1.database inheritance
2.database integrity
3.database interface
4.database isolation
What is the size of the BIT type?
1.1
2.2
3.3
4.variable
What is the SQL mode to check for divide by zero error?
1.STRICT_ALL_TABLES
2.ERROR_FOR_DIVISION_BY_ZERO
3.ERROR_DIVIDE_BY_ZERO
4.ERROR_WHEN_DIVIDE_BY_ZERO
What is the storage size in bytes required for the MEDIUMINT datatype?
1.1
2.2
3.3
4.4
What is the synonym for REAL?
1.FLOAT
2.INT
3.DOUBLE
4.BIT
What performs a key distribution analysis and stores the distribution for the named table or tables?
1.ANALYZE TABLE
2.CHECK TABLE
3.CHECKSUM TABLE
4.OPTIMIZE TABLE
Which of the following columns is not returned by ‘OPTIMIZE TABLE’?
1.Table
2.Op
3.Msg_type
4.Msg_txt
Which of these grant table scope columns is case insensitive?
1.Host
2.User
3.Password
4.Db
Which program is used as a utility for MyISAM table maintenance?
1.innochecksum
2.myisam_ftdump
3.myisamchk
4.myisamlog
Which table lists the accounts and the databases for which the privileges are provided?
1.user
2.db
3.tables_priv
4.procs_priv
Which upgrade involves exporting existing data using mysqldump?
1.inplace
2.logical
3.illogical
4.system
Which upgrade involves shutting down the old MySQL version and replacing the old binaries?
1.inplace
2.logical
3.illogical
4.system
Which variable checks for the availability of SSL support?
1.ave_ssl
2.has_ssl
3.avail_ssl
4.ssl_avail