A stored program associated with a schedule is _____________
1.Trigger
2.Event
3.Stored function
4.Stored procedure
By default, the AUTO_INCREMENT sequences begin at __________
1.0
2.1
3.-1
4.2
CGI stands for ________
1.Computer Gateway Interface
2.Common Gateway Interface
3.Computer Generated Interface
4.Common Generated Interface
DBI scripts are located in the directory ______________
1.cgi-inc
2.cgi-bin
3.cgi-usr
4.cgi-perl
fetchrow_hashref() returns reference to hash of row values keyed by _____
1.row name
2.column name
3.table name
4.database name
Illegal values converted to the appropriate ‘zero’ value for ________
1.Numeric
2.String
3.ENUM
4.TIME
In PHP, if $a represents an array with numeric indices, how is the first element accessed?
1.$a[1]
2.$a[0]
3.$a.1
4.$a.0
In PHP, which operator is used to access property of an object?
1..
2.*
3.->
4.@
MySQL uses security based on ACL which stands for ______
1.Access Control Language
2.Access Control Lists
3.Automatic Control Lists
4.Automatic Control Language
PHP variables are preceded by __________
1._
2.@
3.$
4.&
RTF refers to ________
1.Rich Text Format
2.Right Text Format
3.Rich Text Function
4.Right Text Function
The AUTO_INCREMENT column attribute is best used with ______________
1.FLOAT
2.INT
3.CHARACTER
4.DOUBLE
The column attribute provides unique numbers for identification is _______
1.AUTO_INCREMENT
2.UNSIGNED
3.IDENTIFY
4.DESCRIBE
The datatype best suited to store currency values is __________
1.INT
2.FLOAT
3.DOUBLE
4.DECIMAL
The datatype best suited to store currency values is ______________
1.INT
2.FLOAT
3.DOUBLE
4.DECIMAL
The function returning an array of row values is ______________
1.fetchrow_array()
2.fetchrow_arrayref()
3.fetch()
4.fetchrow_hashref()
The function returning reference to array of row values is ______
1.fetchrow_array()
2.fetchrow_arrayref()
3.fetch()
4.fetchrow_hashref()
The function returning reference to hash of row values is ______________
1.fetchrow_array()
2.fetchrow_arrayref()
3.fetch()
4.fetchrow_hashref()
The function used to convert a string to an int is ____
1.INET_ATON()
2.INET_NTOA()
3.INET_ITOS()
4.INET_STOI()
The function used to convert an int to string is ________
1.INET_ATON()
2.INET_ATON()
3.INET_ITOS()
4.INET_STOI()
The hub of a MySQL installation is _______
1.mysqla
2.mysqlb
3.mysqlc
4.mysqld
The indicator of presence/absence of a word in search is used in the mode _____
1.Natural language
2.Boolean mode
3.Boolean mode
4.Cross mode
The line used to turn on the event scheduler is ______________
1.event_scheduler = ON
2.eventscheduler = ON
3.event_scheduler_ON
4.events_scheduler_ON
The log in which data changes received from a replication master server are written are ____
1.error log
2.general query log
3.binary log
4.relay log
The max_binlog_cache_size system variable has default size _____
1.1 GB
2.2 GB
3.4 GB
4.8 GB
The module that links DBI to the web is ________
1.CGI.pn
2.CGI.pem
3.CGI.pm
4.CGI.po
The number of values that can be returned from a given stored function is ______________
1.0
2.1
3.2
4.3
The numbers that are prefixed with ‘0x’ are in base ______
1.8
2.16
3.32
4.64
The output from PHP is __________
1.statically generated
2.dynamically generated
3.not generated
4.no output
The return value from operations returning a row count is ______
1.$rc
2.$rv
3.$rows
4.$ary
The statement used to create a trigger is ______________
1.CREATE TRIGGER
2.CREATE TRIGGERS
3.PRODUCE TRIGGER
4.PRODUCE TRIGGERS
The system variable controls the size of the table cache _______
1.table_cache
2.cache_table
3.open_cache
4.cache_open
The tool for copying databases is _______
1.mysql
2.mysqlcheck
3.mysqlhotcopy
4.mysqlisamchk
What does ‘abc’ || ‘xyz’ result in if the PIPES_AS_CONCAT is disabled?
1.1
2.0
3.error
4.-1
What does the expression ’12 DIV 5′ evaluate to?
1.2.4
2.2
3.error
4.0
What is defined to execute when the table is modified only?
1.Stored functions
2.Stored procedures
3.Triggers
4.Events
What is the creation of a stored program similar to?
1.Trigger
2.Event
3.View
4.Table
What is the datatype for single precision floating point number?
1.FLOAT
2.DOUBLE
3.INT
4.BIGINT
What is the escape sequence for carriage return?
1.‘c’
2.‘ ’
3.‘’
4.‘z’
What is the maximum number of indexes on MyISAM table?
1.0
2.1
3.2
4.more than 1
What is used to perform an analysis of key values by the server?
1.ANALYZE KEYS
2.ANALYZE TABLE
3.PERFORM ANALYSIS
4.PERFORM TABLE ANALYSIS
What returns a result to the client?
1.Stored functions
2.Stored procedures
3.Triggers
4.Events
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________
1.bad
2.good
3.illegal
4.fare
Which line is written at the top of the script to write a Perl script using CGI.pm?
1.use this CGI
2.put CGI
3.use CGI
4.include CGI
Which mode of search is the search string parsed into words and the search looks for rows?
1.Boolean mode
2.Natural language
3.Query expansion
4.Cross mode
Which of these exports table definitions and contents?
1.mysqldump
2.mysqladmin
3.mysqlimport
4.mysqlexport
Which of these is the metadata log?
1.error log
2.ddl log
3.binary log
4.relay log
Which statement is used to check how MySQL would execute a SELECT query?
1.TELL
2.SHOW
3.DISPLAY
4.EXPLAIN
Which statement is used to produce a stored function?
1.PRODUCE FUNCTION
2.CREATE FUNCTION
3.PRODUCE PROCEDURE
4.CREATE PROCEDURE
Without LOCAL, LOAD DATA is ____
1.less efficient
2.more efficient
3.same speed
4.arbitrary