0% found this document useful (0 votes)
87 views95 pages

Microsoft - Prepking.98 364.v2012!08!11.by - Hillbilly.124q

The document describes a practice exam for the 98-364 Database Administrator certification. It includes 5 multiple choice questions about database design concepts like normal forms, logical database design, and the relational data model. It also provides explanations for each question and answer.

Uploaded by

Rizal Sangrilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views95 pages

Microsoft - Prepking.98 364.v2012!08!11.by - Hillbilly.124q

The document describes a practice exam for the 98-364 Database Administrator certification. It includes 5 multiple choice questions about database design concepts like normal forms, logical database design, and the relational data model. It also provides explanations for each question and answer.

Uploaded by

Rizal Sangrilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 95

98-364_formatted

Number: 98-364
Passing Score: 800
Time Limit: 120 min
File Version: 9.5

http://www.gratisexam.com/

PrepKing-98-364
Exam A

QUESTION 1
John works as a Database Administrator for Bluewell Inc. The company has a SQL Server database. A table in
the database has a candidate key and an attribute that is not a constituent of the candidate key. The non-key
attribute depends upon the whole of the candidate key rather than just a part of it. Which of the following normal
forms is represented in the scenario?

A. 4 NF
B. 2 NF
C. 1 NF
D. 3 NF

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Second normal form (2NF) is used in database normalization. A table that is in first normal form must meet
additional criteria if it is to qualify for second normal form. Specifically, a 1NF table is in 2NF if and only if, given
any candidate key and any attribute that is not a constituent of a candidate key, the non-key attribute depends
upon the whole of the candidate key rather than just a part of it. Answer: C is incorrect. The 1NF is a
normalization form in which each column in a row contains a single value, i.e., each attribute of the entity is
single valued. Single valued attributes are also known as atomic attributes, as they cannot be decomposed into
smaller units. There are mainly three kinds of attributes that prevent a table from being in the first normal form.
They are as follows:
Composite attributes
Plural attributes (attributes that have more than one value) Attributes with complex data types
The table below is in 1 NF, as all the columns in each row contain a single value.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: D is incorrect. Third normal form (3NF) is used in database normalization. A table is in 3NF if and only
if the relation S (table) is in second normal form (2NF) and every non-prime attribute of S is non-transitively
dependent on every key of S.
Answer: A is incorrect. Fourth normal form (4NF) is a normal form used in database normalization. Introduced
by Ronald Fagin in 1977, 4NF is the next level of normalization after Boyce-Codd normal form (BCNF).
Whereas the second, third, and Boyce-Codd normal forms are concerned with functional dependencies, 4NF is
concerned with a more general type of dependency known as a multivalued dependency. Symbolically, it can
be represented as follows:
If A -> > B|C, then A -> B and A -> C
Here, A, B, and C are attributes.

QUESTION 2
You work as a Database Designer for DataOneWorld Inc. The company has a SQL Server database. You are
assigned the task of creating a data model of an enterprise based on a specific data model. The model to be
created should be independent of a particular DBMS. Which of the following database designs will help you
accomplish the task?

A. Logical database design


B. Conceptual database design
C. Physical database design
D. Application design

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Logical database design is the process of creating a data model of an enterprise based on a specific data
model, but independent of a particular DBMS. In the logical database design stage, users can define tables and
relationships that reflect the conceptual design. Answer: C is incorrect. Physical database design is the process
of producing a description of the database implementation on secondary storage. It describes base relations,
file organizations, and indexes used to achieve efficient access to data. It also describes any associated
integrity constraints and security measures, tailored to a specific DBMS system. This involves the actual
programming of the database, taking into account the features and limitations of the DBMS and the client.
Answer: B is incorrect. Conceptual database design is the process of constructing a model for the data at a
high level of abstraction without using DBMS. It consists of the construction of an Entity- Relationship schema,
providing an optimal description of the user requirements. Answer: D is incorrect. Application design is a design
of the user interface and the application programs that use and process the database. Database and
application design are parallel activities. Application design includes two important activities: transaction design
and user interface design.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 3
Which of the following steps in database planning helps to determine the requirements of the database through
interviewing?

A. Gathering information
B. Identifying the relationship between objects
C. Identify the objects
D. Identifying the type of information for each objects
E. Modeling the object

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Gathering information is the first step of database planning and requires a good understanding of what tasks
are to be performed in the database. In case the database has to replace a paper-based or a manual system,
the old system can provide all the necessary information. Moreover, all those who were involved with the
previous system should be interviewed to determine what they did and what is now needed for the new
database. The limitations, problems, and bottlenecks of the old system should also be identified.
Answer: C is incorrect. In the object identification process in database planning, it is necessary to identify the
key objects or entities for database management. There are generally a few primary objects, and once these
are identified, the related items become visible. Answer: E is incorrect. Object modeling is the third step in
database planning in which objects are identified in the system. A user should record an object in such a way
that it is represented visually in the system. He can use the database model as a reference during
implementation of the database. Database developers use tools such as pencils, paper, word processing etc.,
as well as create software programs for data modeling of the database. Answer: D is incorrect. Identifying
information for objects is the fourth step in database planning where the information for each object is stored. In
a table, there are four columns that contain different types of information for objects:
1.Categorical column: In this column, data is classified and grouped, and a limited selection of data is stored.
2.Relational or referential column: In this column, a link is established between information in one table and
related information in another table.
3.Identifier column: In this column, each item stored in the table is identified. 4.Raw data column: In this
column, tangible information is stored and is determined by a source that is external to the database.
Answer: B is incorrect. Identifying relationships between objects is the last step in database planning, which is
the ability to relate information about various items in the database. Isolated types of information can be stored
separately, but the data can be combined according to the requirements of the database engine. Identifying the
relationship between objects in the design process necessitates looking at the tables, determining how the
tables are logically related, and adding relational columns to the tables that establish a link from one table to
another.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 4
Consider the case of a fruit juice company. The company manufactures fruit juices and supplies them to
wholesalers. The Database Designer creates a table named Production. The code is given below:
1.CREATE Table Production
2.(Fruit_type VarChar,
3.Fruit_name Char(20),
4.Quantity Int(3))
Which of the above-mentioned lines has an error?

A. Line 3
B. Line 2
C. Line 1
D. Line 4

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In line 2, Fruit_type is declared as VarChar. A VarChar datatype should always specify the maximum length of
the column. However, in this case, the maximum length has not been specified.

QUESTION 5
John works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database.
John wants to insert records in a table where the database is structured in a fixed format. Which of the following
data models will he use to accomplish the task?

A. Object relational data model


B. Entity-Relationship Model
C. Network data model
D. Relational model

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A relational model uses a collection of tables to represent both data and the relationship between those data.
Every table has multiple columns, and each column has a unique name. A relational model is an example of a
record-based model. Record-based models are so named because the database is structured in a fixed format.
Each table in the database contains records of a particular type and each record type defines a fixed number of
fields or attributes. This model is the most widely used data model, and most database systems are based on
this model. This model is at a lower level of abstraction than the E-R Model.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: B is incorrect. The Entity-Relationship Model is a collection of objects called entities and the
relationships between these objects. Entities in a database are known as attributes. A relationship is an
association among several entities. It is a conceptual representation of structured data. Entity- relationship
modeling is a relational schema database modeling method that is used in software engineering to produce a
type of conceptual data model of a system, often a relational database. The logical structure of a database can
be expressed graphically by an E-R diagram, which has the following components:
Rectangle: It represents entity sets.
Ellipse: It represents attributes.
Diamond: It represents relationships among entity sets.
Line: It links attributes to entity sets.
Answer: A is incorrect. An object relational data model (ORD) is similar to a relational data model, but with an
object-oriented database model. Objects, classes, and inheritance are directly supported in database schemas
and in the query language.
Answer: C is incorrect. The network data model contains logical information such as connectivity relationships
among nodes and links, directions of links, and costs of nodes and links. A node represents an object of
interest and a link represents a relationship between two nodes.

QUESTION 6
You manage a database named Customers, which includes a table named Orders. The Orders table is
frequently queried, but only orders with a sales total of more than $1000.00 are required in the query. You want
to create an index to speed up these types of queries at the same time, ensuring the index is as small as
possible. What type of index should you use?

A. Non-clustered
B. Filtered
C. Clustered
D. XML

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A filtered index is used to filter out unwanted data in the index. These indexes are ideally suited to improve
queries on data that is mostly NULL values. A filtered query only indexes the rows that have non-null data in the
indexed column. The filtered index would be defined as a non-clustered index. Filtered indexes consume less
space in the system, and also require less processing power to query. Moreover, filtered indexes are mainly
created on columns configured as sparse columns. In this case, the filter within the CREATE INDEX statement
could look something like WHERE SalesTotal > 1000. Answer: C is incorrect. A clustered index is organized as
a B-tree structure. The index consists of a root page, intermediate levels, and leaf levels. The leaf level nodes
contain the data pages of the underlying table. The root and intermediate level nodes contain index pages that
hold index rows. Each index row contains a key value and a pointer. A clustered index is useful when you want
to optimize queries based
on ranges since it orders the data based on the clustered index. However, the clustered index would include all
of the rows and will never be smaller than a filtered index.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: A is incorrect. A nonclustered index has the same B-tree structure as the clustered index. The index
consists of a root page, intermediate levels, and a leaf level. The leaf level of a nonclustered index does not
contain the actual data. It contains pointers to the data that is stored in the data pages. A nonclustered index
does not physically rearrange the data. A non-clustered index can be used to improve performance of queries.
However, a non-clustered index would include all of the rows and will never be smaller than a filtered index.
While a filtered index must be a non- clustered index, all non-clustered indexes do not include WHERE clauses
and are not filtered indexes. Answer: A is incorrect. A nonclustered index has the same B-tree structure as the
clustered index. The index consists of a root page, intermediate levels, and a leaf level. The leaf level of a
nonclustered index does not contain the actual data. It contains pointers to the data that is stored in the data
pages. A nonclustered index does not physically rearrange the data. A non-clustered index can be used to
improve performance of queries. However, a non-clustered index would include all of the rows and will never be
smaller than a filtered index. While a filtered index must be a non- clustered index, all non-clustered indexes do
not include WHERE clauses and are not filtered indexes. Answer: D is incorrect. The XML column provides
great ability to retrieve data from within the XML column using various query methods. To support the querying
of XML data, users can create indexes on these columns. There are four different types of XML indexes
supported by SQL Server 2005/2008. There is a single primary XML index and three different flavors of
secondary XML indexes. The primary XML index is a clustered index on an internal table known as the node
table that users cannot use directly from their T-SQL statements. The primary XML index basically contains one
row for each node in the XML instance.After the primary XML index has been created, users can create
supplementary three kinds of secondary XML indexes. The secondary XML indexes help in specific types of
XQuery processing. These are called the PATH, PROPERTY, and VALUE indexes. An XML index is only
appropriate for XML data.

QUESTION 7
Which of the following database terms is described in the statement below? "It prevents the current database
operation from reading or writing a data item while the data item is being accessed by another operation."

http://www.gratisexam.com/

A. Lock
B. Encryption
C. Constraint
D. Deadlock

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Lock is the process to prevent the current database operations from reading and writing a data while that data
item is being accessed by another operation. A lock is used when multiple users need to access a database
concurrently. It prevents data from getting corrupt or invalidated, when multiple users try to write to the
database. When a lock is applied, a single user can only modify that record to which the lock is applied. It gives
the user exclusive access to the record until the lock is released. Locking also prevents reading of unfinished
(uncommitted) data.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: B is incorrect. Encryption provides an additional security layer, protecting the data from unauthorized
viewing with the help of an algorithm called cipher. Even if access to the database is obtained, it will not be easy
to decipher encrypted data into a readable form. Answer: D is incorrect. A deadlock is a situation wherein two or
more competing actions wait for the other to finish, and neither ever does.
Answer: C is incorrect. A constraint enforces the integrity of a database. It defines the rules regarding the
values allowed in the columns of a table. A constraint is the standard mechanism for enforcing integrity.

QUESTION 8
Your Company is designing and developing a number of databases for a stock exchange. One of the
databases will contain highly sensitive data for which high level of security will be required. Although high
processing speed is one of the prime requirements of the customer, for this database, security of the data will
take priority over the processing speed. It needs to be ensured that even if unauthorized access to the
database is obtained, the rogue user is unable to read the data. Which of the following protection techniques
will you suggest for this database?
A. Authentication
B. Encryption
C. Native auditing
D. Integrity controls

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
According to the question, the database contains highly sensitive data and that needs to be protected from
being read by a rogue user even if he is able to access database un-authoritatively. In order to accomplish this
task, you should suggest applying encryption over the database. Encryption provides an additional security
layer, protecting the data from unauthorized viewing with the help of an algorithm called cipher. Even if access
to the database is obtained, it will not be easy to decipher encrypted data into a readable form.
Answer: A, D, and C are incorrect. These techniques will not help in protecting the data, in case a rouge user
has unauthorized access to the database.

QUESTION 9
Which of the following are the main approaches in the database design? Each correct answer represents a
complete solution. Choose three.

A. Top-down approach
B. Bottom-up approach
C. Middle approach
D. Inside-out approach

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
There are four different types of approaches in database design, which are as follows:
1.Top-down approach
2.Bottom-up approach
3.Inside-out approach
4.Mixed approach

QUESTION 10
You work as a Software Developer for ArchiTech Inc. You plan to create a well-designed database for the
company. You implement normalization rules for designing the database. Choose the appropriate normalization
rules from the Choose and Reorder window pane.
A.
B.
C.
D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

Explanation:
The following are some normalization rules that can be made for achieving a well-designed database: Each
table in a database should have a unique row identifier, i.e. an ID column in which no two records can share the
same ID value. Such column is known as the primary key column that serves as the unique row identifier for
the table. For example, ProductID can be the primary key column for the Products table.Each table in a
database should store information for a single type of entity. Too much information stored in one table can
hinder the efficiency and reliability of data in
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

the table. For example, in a table, the columns that contain information of both sales order and customer details
can lead to several problems. It is a best practice to store both these information in separate tables for better
maintenance and avoidance of any query issues.A table in a database should avoid containing nullable
columns. However, some columns of a table can be defined to allow null values. A table in a database should
not contain repeated values or columns for a specific piece of information. For example, a product may be
purchased from multiple vendors. If the product name and the names of all the vendors are stored in one table,
it will contain columns for all the vendors with repeating product ID. This will create several problems.
Therefore, it is a best practice to store product information in one table and the names of all vendors in another
table. For creating relationships between the two tables, a common column such as ProductID should be
placed in both the tables.

QUESTION 11
You are a Database Administrator of MySQL database. Few days back, your server crashed. Now, it is up and
online. You need to check the integrity of various tables used in the database. You need to issue the CHECK
TABLE command. For which of the following tables will this command work? Each correct answer represents a
complete solution. Choose two.

A. FEDERATED
B. MyISAM
C. MERGE
D. InnoDB

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and B

Explanation:
The CHECK TABLE command works for the InnoDB and MyISAM tables. CHECK TABLE is a built-in tool
provided by MySQL for checking tables before any attempts to repair the database. It checks tables for
structural problems and ensures that no table data are corrupt. It is a SQL command that is used in conjunction
with the REPAIR TABLE and OPTIMIZE TABLE commands to check, repair, and optimize tables in a database
for optimal performance. It does not require that the database server be shut down. Instead, since this
command can only be sent to the server via a client, the server must be running throughout the process.
Answer: C and A are incorrect. The CHECK TABLE command does not work for the MERGE and
FEDERATED tables.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 12
Which of the following can be used to populate a table? Each correct answer represents a complete solution.
Choose all that apply.
A. Data Pump
B. SQL*Loader
C. INSERT statement
D. MERGE statement

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: C, B, A, and
D

Explanation:
The INSERT statement is a Data Manipulation Language (DML) statement that is used to add new rows of data
to a specified database table.
Syntax:
INSERT INTO TableName [ (ColumnName [, ColumnName...] ) ] VALUES ( value [, value...] );
where,
TableName specifies the name of the table.
ColumnName specifies the name of the column of the table, which is to be populated. value specifies the value
for the corresponding column of the table. The number and datatypes of values specified in the VALUES clause
must match the number and datatypes of corresponding columns specified in the INTO clause. If the columns
are not specified, the values in the VALUES clause must be in the order in which the columns are defined in the
table. SQL*Loader (sqlldr) is a utility that is used for high performance data loads. The data can be in the form
of a text file or embedded into a database. By using the information stored in the data file and the control file,
sqlldr loads the data into a database. The architecture of SQL*Loader is given below:
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

In the figure, 1 depicts the parameter file, 2 depicts the data file, 3 depicts the control file, 4 depicts the log file,
5 depicts the bad file, and 6 depicts the discard file.Note: While processing the information, SQL*Loader stores
messages in the log file, bad rows in the bad file, and discarded rows in the discard file. Data Pump is a new
feature introduced in Oracle 10g to move data and meta data between databases and to or from operating
system files very efficiently. It provides parallel import and export utilities (impdp, expdp) on the command-line
as well as the Web-based Oracle Enterprise Manager export/import interface. It is ideally beneficial for large
databases and data warehousing environments. Oracle Data Pump facility runs on the server. Following are
some functions performed by Oracle Data Pump:
1.It is used to copy data from one schema to another between two databases or within a single database.
2.It can be used to extract a logical copy of the entire database, a list of tablespaces, a list of schemas or a list
of tables. The MERGE statement is a Data Manipulation Language (DML) statement that is used to update or
insert rows conditionally into a table. It selects rows from one table and updates or inserts them into another
table. The decision whether to update or insert rows in the target table is based on a condition in the ON clause
of the MERGE statement.

QUESTION 13
Which of the following statements about external tables is true?

A. They can have constraints or triggers.


B. They cannot be written to with DML commands.
C. They can have indexes.
D. They cannot be used in joins, views, and subqueries.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
An external table is a read-only table stored outside a database in flat files. The metadata for an external table
is not created at the time of table creation. However, the CREATE TABLE statement is used to create
metadata. External tables are used to load and unload Oracle data as flat files. The following can be used to
query data stored in an external table:
SQL statements
PL/SQL
JAVA
Indexes cannot be created for an external table. The following are the two types of access drivers provided by
an Oracle server for an external table:ORACLE_LOADER (Loader access driver): It is used to read data from
external files by using Oracle Loader technology. The data format should be interpreted by SQL*Loader
utility.ORACLE_INTERNAL (Import/export access driver): It is used to import and export data. The import and
export operations are platform independent. Some additional characteristics of external tables are mentioned
below:
They can be queried in a similar manner as internal tables.
They can be used in joins, views, and subqueries.
They cannot have indexes, constraints, or, triggers.
They cannot be written to with DML commands.
Note: It is possible to write to an external table with Data Pump.
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 14
You work as a Database Designer for SoftTech Inc. You have developed the conceptual design of the database
of an organization. Following is the ER-diagram, which you have designed. Now you have to convert the
following diagram to a logical model.

Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the
solution. Choose all that apply.

A. Now migrate the Start Date attribute of "works on" relationship to the Project table.
B. Create two tables, Employee and Project.
C. Create a primary key for both the tables.
D. Migrate the primary key of the Employee table to the Project table to maintain referential integrity between
the two tables.
E. Create three tables, Employee, Project, and Manager.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: B, C, D, and
A
Explanation:
While converting the conceptual model to a logical model, the following steps are to be followed:
Convert the entities defined in the ER-diagram to tables. The attributes of entities are represented as columns
in the table. In the above mentioned ER-diagram, there will be two tables, Employee and Project. Define the
primary keys for both the tables, EmpID for the Employee table and ProjectID for the Project table.Migrate
EmpID, i.e. the primary key of the Employee table, to the Project table to maintain referential integrity constraint
between the two tables.Migrate the attribute Start Date of the "works on" relationship in the same direction as
the primary key, i.e. in Project table.
The process is shown below as a logical diagram:
Note: The relational model does not support "relationship" data structure like the hierarchical model; therefore,
the information that was defined in the relationship attribute should be migrated to an existing or associative
entity. The Start Date attribute of "works on" relationshipis therefore migrated to the Project table.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 15
Which of the following values cannot be stored in a character column defined as the primary key of a table?

A. null
B. '0'
C. 'null'
D. ''

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A primary key must be defined as NOT NULL. For a character column, any value, even a space, or lack of a
space, is a valid value. So the strings '', 'null', and '0' are valid strings and would be accepted as input into a
column that is a primary key. The value null is not acceptable.

QUESTION 16
Mark works as a Database Administrator for DataOneWorld Inc. Management instructs him to provide an
additional security layer to the database to prevent unauthorized viewing of data with the help of an algorithm
called cipher. Which of the following will help him to accomplish the task?

A. Native auditing
B. Authentication
C. Encryption
D. Abstraction

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Encryption provides an additional security layer, protecting the data from unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.
Answer: B is incorrect. Authentication is the process of verifying the identity of a user or software connecting to
a database. During the process of authentication, the user must submit sufficient information validated either by
the database itself, or by the operating system within which the database is installed.
Answer: D is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific database API. A user can use generic methods to access a database. In order to
perform database abstraction, a user requires additional code or libraries. The benefit of database abstraction
is that it provides a uniform interface for database access.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: A is incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be
transferred to a designated security system where the database administrators do not have access. This
ensures a certain level of segregation of duties and provides evidence that the native audit trails were not
modified by authenticated administrators.

QUESTION 17
Which of the following is a design of the user interface and the application programs that use and process the
database?

A. Application Design
B. Object Modeling
C. Database Design
D. Database Planning

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Application design is a design of the user interface and the application programs that use and process the
database. Database and application design are parallel activities. Application design includes two important
activities: transaction design and user interface design. Answer: C is incorrect. Database design is the process
of creating a design for a database that will support the enterprise's operations and objectives for the required
database system. It represents data and relationships between data required by all major application areas and
user groups. Answer: D is incorrect. Database planning is a management activity that allows the stages of the
database application to be realized as efficiently and effectively as possible. It identifies the work to be done
and the resources with which to do it. Database planning is integrated with the overall IS strategy of the
organization.
Answer: B is incorrect. Object modeling is the third step in database planning in which objects are identified in
the system. A user should record an object in such a way that it is represented visually in the system. He can
use the database model as a reference during implementation of the database. Database developers use tools
such as pencils, paper, word processing etc., as well as create software programs for data modeling of the
database.

QUESTION 18
Which of the following is used to give a default value to a column if the value for that column is unknown?
A. Concurrency
B. DEFAULT constraint
C. Nested transaction
D. Transaction

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The DEFAULT constraint is a constraint in which a default value is given to a column if the value for that
column is unknown. If a user does not provide any value for that column, the default value is automatically
inserted. If a default value is not provided, then NULL is inserted. If a column does not allow NULL value and a
default value is also not assigned for that column, an error is sent by the database engine.
Answer: D is incorrect. A transaction is a logical unit or work, where related DML statements are grouped
together. When a transaction is active, either all the statements in the transaction will complete successfully or
none of them will run. This means that if any of the statements in the transaction fails due to any reason, the
whole transaction will be rolled back. Transactions are ended by using the COMMIT or ROLLBACK statement.
A perfect example would be a bank transaction, where a check deposit should cause a debit in the check
issuer's account and a credit in the depositor's account. If any one operation fails, the bank should reverse the
whole transaction, thus maintaining correct balances in both the accounts.
Answer: C is incorrect. A nested transaction occurs when a new transaction is started by an instruction that is
already inside an existing transaction. The new transaction is said to be nested within the existing
transaction.Nested transactions are implemented differently in databases. However, these nested transactions
have in common that the changes are not made visible to any unrelated transactions until the outermost
transaction has committed. This means that a commit in an inner transaction does not necessary persist
updates to the database. Answer: A is incorrect. Concurrency is the ability of several users to access data from
the database simultaneously. Database concurrency increases when the number of simultaneous operations
that the database engine can support is large. In Microsoft SQL Server 2008 Compact 3.5, concurrency control
is achieved by using locks to protect data. The locks control how multiple users can access and modify shared
data simultaneously without conflicting with each other.

QUESTION 19
Suzanne works as a Database Designer for DataOneWorld Inc. She is assigned the task of ecomposing the
components of a database, but she has to ensure that all the components are decomposed to only some
extent. Which of the following approaches will she use to accomplish the task?

A. Mixed approach
B. Inside-out approach
C. Top-down approach
D. Bottom-up approach

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In a mixed approach, the designer decomposes the requirements into a number of components, as in the
bottom-up approach, but not to the extent where all the concepts are separated. At the same time, a skeleton
schema is defined containing the main concepts of the application. This skeleton schema gives a unified view
of the whole design and helps the integration of schemas developed separately. Then the designer examines
separately these main concepts and can proceed with

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

gradual refinements following the top-down approach or extending a portion with concepts that are not yet
represented following the bottom-up approach.
Answer: B is incorrect. Inside-out approach can be regarded as a particular type of bottom-up approach. It
begins with the identification of only a few important concepts and, based on these, the design proceeds,
spreading outward 'radially'. First the concepts nearest to the initial concepts are represented, and a user then
moves towards those further away by means of 'navigation' through the specification.
Answer: D is incorrect. In a bottom-up approach, the preliminary specifications are broken down into smaller
components so that each component describes a basic fragment of the specifications. These components are
then represented by schemas, some of which may consist of single concepts. The schemas are later obtained
to be integrated together until a final schema is obtained. Answer: C is incorrect. In a top-down approach, a
schema is created through a series of successive refinements, starting from the first schema, which is gradually
expanded by using appropriate modifications that increase the detail of the various concepts. Moving from one
level to another, the schema is modified using some basic transformations called top-down transformation
primitives.

QUESTION 20
Consider the case of a distance education university. The university has many regional centers across the
country. Each regional center has a head known as regional manager. Each regional center has allotted more
than one study center in its region. Each regional center has a region code, which is unique and specifies a
region. Each study center also has a study center code, which is also unique. What is the relationship between
regional center and study center?

A. One-to-one
B. One-to-many
C. There is no relationship.
D. Many-to-many

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
It is given in the scenario that there is one regional center for each region, and each regional center has more
than one study center.
Therefore, one-to-many relationship

QUESTION 21
You work as the Database Administrator for www.company.com.com. All servers on the
www.company.com.com network run Windows Server 2003 and Windows Server 2000, and all client
computers run Windows XP rofessional and Windows Vista. The www.company.com.com network area
consists of a single Active Directory domain named www.company.com.com. The www.company.com.com
network contains a Microsoft SQL Server 2005 database server named COMPANY-DB111, which you
administer at a regular interval of time. COMPANY-DB111 contains and hosts three databases that support
different types of business requirements. The network uses the DBA database that supports internal operations
including maintaining data, accounting, and mailing. The network's regular users make use of stored
procedures for the data values that need insertion into the tables. The stored procedures used in the network of
the company are designed to access

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

SQL variant type parameters and then use the values to build and execute ad hoc query statements that are
the part of the SQL statements. During a routine network check, you discover that there are several odd
occurrences in the database. The odd occurrences include data deleted from tables and other unauthorized
activity. You suspect a user is executing the unauthorized statements through the stored procedures. You are
required to stop the unauthorized changes while having least impact on the stored procedures that are in use.
Your explanation must use the least administrative effort.
What should you do?

A. The input parameters should be parsed to watch for and block any input including single quotes.
B. The stored procedures used for the table should be replaced with ad hoc queries.
C. The stored procedure should be customized to use type-specific and length-restricted parameters.
D. All data handling activity on the table should be audited and recorded.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
You should consider modifying the stored procedures to use type-specific and length-restricted SQL
parameters if there are problems generated from a SQL Injection attack when the malicious code is inserted in
a query for execution on the server.
Answer: D is incorrect. This choice could be used for identifying the cause, but it will not help in stopping the
attacks.
Answer: A is incorrect. This choice could be used, but the solution is incomplete. Answer: B is incorrect. You
should not consider this explanation, as it is even less secure and more prone to a SQL injection attack.

QUESTION 22
You work as a Database Administrator for DataOneWorld Inc. Management instructs you to remove an object
from the relational database management system. Which of the following statements will you use to accomplish
the task?

A. DROP
B. SELECT
C. CREATE
D. ALTER

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The DROP statement in SQL is used to remove an object from an RDBMS. The types of objects that can be
dropped depend on which RDBMS is being used, but most support the dropping of tables, users, and
databases. The syntax of the DROP TABLE statement is as follows:
DROP TABLE "table_name"

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: C is incorrect. The CREATE statement is used to make a new database, table, index, or stored query.
The CREATE statement in SQL creates an object inside DBMS. The types of objects that can be created
depend on which DBMS is being used, but most support the creation of tables, indexes, users, and databases.
Answer: D is incorrect. The ALTER statement in SQL changes the properties of an object inside DBMS. The
types of objects that can be altered depend on which DBMS is being used. The syntax of the ALTER statement
is as follows:
ALTER <specification> [Specification name]
Answer: B is incorrect. The SELECT statement is used to select data from a database. The result is stored in a
result table called the result-set. The SELECT statement retrieves zero or more rows from one or more base
tables, temporary tables, or views in a database.

QUESTION 23
Which of the following enables a user to use generic methods to access a database and to focus on the coding
rather than the syntax for a specific database API?

A. Abstraction
B. Database security
C. Native auditing
D. Authentication

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Abstraction is a method of coding that enables a user to focus on the coding rather than the syntax for a
specific database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional code or libraries. The benefit of database abstraction is that it provides a
uniform interface for database access. Answer: B is incorrect. Database security refers to the system,
processes, and procedures that protect a database from unintended activities, such as authenticated misuse,
malicious attacks, or inadvertent mistakes made by authorized individuals or processes. Database security can
begin with the process of creating and publishing appropriate security standards for the database environment.
These standards may include specific controls for the various relevant database platforms. Answer: C is
incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be transferred to
a designated security system where the database administrators do not have access. This ensures a certain
level of segregation of duties and provides evidence that the native audit trails were not modified by
authenticated administrators. Answer: D is incorrect. Authentication is the process of verifying the identity of a
user or software connecting to a database. During the process of authentication, the user must submit sufficient
information validated either by the database itself, or by the operating system within which the database is
installed.
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 24
You work as a Database Administrator for InfoTech Inc. The company has a database and they want you to
create a design for a database that will support the enterprise's operations and objectives. Which of the
following will you use to accomplish the task?

A. Application design
B. Database design
C. Database planning
D. Requirements collection and analysis

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Database design is the process of creating a design for a database that will support the enterprise's operations
and objectives for the required database system. It represents data and relationships between data required by
all major application areas and user groups. Answer: C is incorrect. Database planning is a management
activity that allows the stages of the database application to be realized as efficiently and effectively as possible.
It identifies the work to be done and the resources with which to do it. Database planning is integrated with the
overall IS strategy of the organization.
Answer: A is incorrect. Application design is a design of the user interface and the application programs that
use and process the database. Database and application design are parallel activities. Application design
includes two important activities: transaction design and user interface design. Answer: D is incorrect.
Requirements collection and analysis is the process of collecting and analyzing information about the part of the
organization that is to be supported by the database application, and using this information to identify the user's
requirements of the new system.

QUESTION 25
Which of the following scripts is used to convert Unix-type zone files into SQL statements, and loads the time
zone tables in a mysql database?

A. mysql_tzinfo_to_sql
B. mysql_time_to_sql
C. mysql_timezone_to_sql
D. mysql_tz_to_sql

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
mysql_tzinfo_to_sql script converts the Unix-type zone files into SQL statements and loads time zone tables in
the mysql database. It is used
on systems that have a zoneinfo database. A zoneinfo database is a set of files describing time zones. Answer:
C, D, and B are incorrect. No such scripts are available in a MySQL database.

QUESTION 26
You work as a Database Designer for Tritech Inc. You are designing a table named Info. The table contains the
following attributes:
Login and Password
Name
ContactNumber
Address
Each new employee joining the company is assigned an E-mail Login and Password. This E-mail Login and
Password is used by each employee
to access his account on the company's Web site. The value of both the attributes should be unique and cannot
be NULL. You design an
artificial key EmpID in the Info table to serve as a primary key. Which of the following factors lead you to define
an artificial key for use as a
primary key in the Info table?
Each correct answer represents a part of the solution. Choose all that apply.

A. The value of the primary key cannot be NULL.


B. The value of the primary key must be persistent.
C. The natural key contains highly sensitive data.
D. The value of the primary key must be unique.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D, A, B, and
C
Explanation:
The Name attribute cannot be used as a primary key, as two employees may have the same name in a
company. For an attribute to be used as a primary key, it must have a unique value.The primary key attribute
cannot contain NULL values. ContactNumber cannot be used as a primary key, for it is possible that some
employees in the company may not have a ContactNumber, which will result in NULL values of ContactNumber
for such employees. To be used as a primary key, a natural key must contain a unique value. This is a
prerequisite for a primary key. In addition to this, if the natural key contains sensitive data, it cannot be used as
a primary key. The primary key must be persistent, i.e. the value of the attribute must remain the same
throughout the lifetime of the instance. Therefore, Address cannot be used as a primary key, as it is possible
that an employee might change his house in future and this may lead to a change in the value of the attribute.
In the given scenario, Login and Password of each employee is unique and cannot be NULL, but sharing this
information with others is not at all appropriate, as these are classified as sensitive data. If one employee
comes to know about the login and password of another employee, he can access his mail account and read
his confidential mails or even send mails from his account to other people. Therefore, all these factors lead you
to define an artificial key.
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 27
In addition to taking backups of your databases, you should also backup up files stated below. Which of these
files store updates that have been made after the backup was made?

A. Binary log files


B. My.ini
C. My.cnf
D. Master.info

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The Binary log is a log file that contains a record of statements that modify data. This log is stored in the binary
format and its contents can be
viewed using the mysqlbinlog utility. The Binary log is used for communication between the master and slave
replication servers, and can also
be used for data recovery. Statements that are part of a multiple-statement transaction are written as a group
after the transaction has been
committed. The log contains UPDATE and DELETE statements but does not contain the SELECT statement.
Answer: C and B are incorrect. These are option files used by the server. These files contain configuration
information that must be
restored after a crash.
Answer: D is incorrect. Replication slave servers create a master.info file that contains information needed for
connecting to the master
server.

QUESTION 28
Which of the following is a building working model of a database system?

A. Prototyping
B. Bottom-up approach
C. Conceptual database design
D. Top-down approach

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com
Explanation:
Prototyping refers to the creation of a working model of the database system. The purpose of Prototyping is to
suggest improvements or even
add new features; to identify features of a system that work well, or are inadequate; to evaluate feasibility of a
particular system design; to
clarify a user's requirements.
Answer: D is incorrect. In a top-down approach, a schema is created through a series of successive
refinements, starting from the first
schema, which is gradually expanded by using appropriate modifications that increase the detail of the various
concepts. Moving from one
level to another, the schema is modified using some basic transformations called top-down transformation
primitives.
Answer: B is incorrect. In a bottom-up approach, the preliminary specifications are broken down into smaller
components so that each
component describes a basic fragment of the specifications. These components are then represented by
schemas, some of which may consist
of single concepts. The schemas are later obtained to be integrated together until a final schema is obtained.
Answer: C is incorrect. Conceptual database design is the process of constructing a model for the data at a
high level of abstraction
without using DBMS. It consists of the construction of an Entity-Relationship schema, providing an optimal
description of the user
requirements.

QUESTION 29
You are the database administrator for a MySQL database server. The network contains new and old (pre-4.1)
clients. You configure another database server on the network. You allow the network clients to connect to the
new server. Some users complain that when they try to connect to the server, they receive the following error:
ERROR 1251: The client does not support authentication protocol requested by the server; consider upgrading
MySQL client
You do not want to upgrade any client or server right now, and want to enable all clients to connect to the new
server successfully. Which of
the following steps will you take to resolve the issue?

A. Run the server with the --secure-auth option.


B. Run the server with the --old-password option.
C. Run the server with the --allow-old option.
D. Run the server with the --enable-old option.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
According to the question, you are receiving Error 1251. Servers from MySQL 4.1 and later, use an enhanced
authentication mechanism for
providing greater security. This mechanism provides better passwords than in the older version.
When client programs try to connect to the
server, they do not understand this mechanism and produce the above stated error. In order to resolve the
issue, you will have to run the
server with the --old-password option. Starting the server with this option will provide support to the older
clients.
Answer: A is incorrect. This option will enforce the server to reject connection attempts for any client that has a
password in the old
format.
Answer: D and C are incorrect. No such options are available with the server.

QUESTION 30
Which of the following steps in database planning is used to record an object so that it is represented visually in
the system?

A. Identifying the relationships between objects


B. Gathering information
C. Object identification
D. Object modeling

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Object modeling is the third step in database planning in which objects are identified in the system.
A user should record an object in such a
way that it is represented visually in the system. He can use the database model as a reference during
implementation of the database.
Database developers use tools such as pencils, paper, word processing etc., as well as create software
programs for data modeling of the
database.
Answer: C is incorrect. In the object identification process in database planning, it is necessary to identify the
key objects or entities for
database management. There are generally a few primary objects, and once these are identified, the related
items become visible.
Answer: B is incorrect. Gathering information is the first step of database planning and requires a good
understanding of what tasks are
to be performed in the database. In case the database has to replace a paper-based or a manual system, the
old system can provide all the
necessary information. Moreover, all those who were involved with the previous system should be interviewed
to determine what they did
and what is now needed for the new database. The limitations, problems, and bottlenecks of the old system
should also be identified.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: A is incorrect. Identifying relationships between objects is the last step in database planning, which is
the ability to relate
information about various items in the database. Isolated types of information can be stored separately, but the
data can be combined
according to the requirements of the database engine. Identifying the relationship between objects in the design
process necessitates
looking at the tables, determining how the tables are logically related, and adding relational columns to the
tables that establish a link from
one table to another.

QUESTION 31
Remo works as a Database Designer for Tech Inc. He wants to create a table named Product. He issues the
following query to create the Product table:
CREATE Product (
ProductID Char (10) NOT NULL,
OrderID Char (10) NULL
ProductName Varchar NOT NULL,
Primary key (OrderID, ProductID))
What are the errors in the above query?
Each correct answer represents a complete solution. Choose two.

A. An attribute declared as a primary key cannot contain NULL values.


B. Each attribute should be defined as a primary key separately.
C. A table cannot have two primary keys.
D. ProductName is declared as Varchar without specifying the width of the column.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and A

Explanation:
When a column is declared as Varchar, it is mandatory to declare the maximum width of the column. The
OrderID and ProductID columns are declared as the composite primary key attribute. Therefore, neither
ProductID nor OrderID can contain
NULL values, whereas in the declaration of OrderID, it is not specified as NOT NULL. Therefore, both answer
options D and A are responsible
for introducing errors in the query.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 32
What is the relationship between the foreign key and primary key? Each correct answer represents a complete
solution. Choose all that apply.

A. A foreign key constraint works in conjunction with a primary key constraint to enforce referential integrity
among related entities.
B. A foreign key ties attribute(s) of an entity to the primary key of another entity, for the purpose of creating a
dependency.
C. There is no relationship between a primary key and a foreign key.
D. A foreign key and a primary key create a link between two entities.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: A and B

Explanation:
A foreign key ties attribute(s) of an entity to the primary key of another entity, for the purpose of creating a
dependency. It is used to
establish and enforce a relationship between data in two tables. A relationship between two tables is created by
adding a column or columns
holding the primary key values of the primary table to the related table. This column becomes a foreign key in
the second table. You can
create a foreign key by defining a FOREIGN KEY constraint, when you create or alter a table.

QUESTION 33
Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server database.
Management instructs him to ensure that no inconsistent data is entered in the database. Which of the
following will help him to accomplish the task?

A. Referential integrity
B. Abstraction
C. Encryption
D. Authentication
E. Native auditing

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Referential integrity is a feature or property that prevents users or applications from entering inconsistent data
which, when satisfied,
requires every value of one column of a table to exist as a value of another column in a different or the same
table.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: D is incorrect. Authentication is the process of verifying the identity of a user or software connecting to
a database. During the process of authentication, the user must submit sufficient information validated either by
the database itself, or by the operating system within which the database is installed.
Answer: B is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database access.
Answer: E is incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be
transferred to a
designated security system where the database administrators do not have access. This ensures a certain level
of segregation of duties and
provides evidence that the native audit trails were not modified by authenticated administrators. Answer: C is
incorrect. Encryption provides an additional security layer, protecting the data from unauthorized viewing with
the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.

QUESTION 34
You work as a Database Designer for Netwell Inc. The database has a table named Project, which is depicted
below:
ProjectID
ProjectName
TaskID
TaskName
A
Macwell
Design
A
Macwell
Coding
B
Vintech
Design
B
Vintech
Coding
Is the table given above in normalized form? If not, then which normal form (NF) is violated?

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

A. The table is in normal form, as each cell contains only one value.
B. 3NF
C. 1NF
D. 2NF

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
Explanation:
and The table given above violates 2NF, as TaskID and TaskName are not functionally dependent on the
primary key attribute, i.e. ProjectID. TaskID functionally determines TaskName. Therefore, in order to make it in
2NF, you should split the
parent table Project and create a table named Task with TaskID as the primary key attribute and migrate
ProjectID to the Task table as the
foreign key. The table is not in 2NF. Therefore, it is also not in 3NF. Answer: is incorrect. The table is in 1NF, as
each row contains atomic values, i.e. each cell contains a single value. Reference: Database Management
Systems, Contents:
"Database Normalization"

QUESTION 35
Which of the following statements about rebuilding an index is true?
A. The NOLOGGING and ONLINE keywords can never be used together.
B. Without the ONLINE keyword the index is locked for any DML operation.
C. The NOLOGGING and ONLINE keywords are always used together.
D. Without the ONLINE keyword the index is locked for the SELECT operation.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The syntax of the REBUILD command has many options such as TABLESPACE, ONLINE, and NOLOGGING.
The discussion is narrowed down to
ONLINE and NOLOGGING options. NOLOGGING disables redo generation only for the index rebuild; all
subsequent DML against the index will
generate redo as normal. Without the ONLINE keyword the index is locked for DML, but not for SELECT.
However, the rebuild still continues.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 36
You work as a database developer for www.company.com.com. The company has a database named
www.company.com that is hosted on a SQL Server 2008 server. The database includes a table named
Employees, which contains the details of the employees. You want to ensure that anytime any data in the
Employees table is modified with an UPDATE statement, they are recorded in a table named
EmployeeChanges. The EmployeeChanges table includes columns to record what the change was, who made
the change, and when they made the change. What should you create to meet this need?

A. A DDL trigger that queries the updated table


B. A DML trigger that queries the inserted table
C. A DDL trigger that queries the inserted table
D. A DML trigger that queries the updated table

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A Data Manipulation Language (DML) trigger can be used to capture DML statements (such as UPDATE,
INSERT, and DELETE). DML triggers can
use the inserted and deleted tables, which are virtual tables that hold data from the last INSERT, UPDATE, or
DELETE statement.
An INSERT will record the inserted data in the inserted table. A DELETE will record the deleted data in the
deleted table. An UPDATE will record
the original row in the deleted table, and the modified row in the inserted table. The GetDate() function can be
used to retrieve the current date.
Answer: D is incorrect. There is no such thing as an updated table. The inserted and deleted tables are used to
record updated data.
Answer: A and C are incorrect. DDL triggers will capture Data Definition Language statements (such as
CREATE, DROP, and ALTER) but will not capture statements that modify data.

QUESTION 37
You want to recover one or more tablespaces to a point in time older than the rest of the database. Which of
the following are the recovery situations in which tablespace Point-in-Time Recovery (TSPITR) should be used?
Each correct answer represents a part of the solution. Choose all that apply.

A. To recover a tablespace that contains rollback segments.


B. To recover a table that has become logically corrupted.
C. To recover a DML statement that has affected only a subset of the database.
D. To recover a tablespace on a very large database.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: C, B, and A

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
Following are the situations in which tablespace Point-in-Time Recovery (TSPITR) should be used:
To recover from an erroneous drop or truncate table operation. To recover a table that has become plausibly
corrupted. To recover from an erroneous batch job or other DML statement that has affected only a subset of
the database.
To recover one independent schema to a point dissimilar from the respite of a physical database (in cases
where there are multiple
independent schemas in individual tablespaces of one physical database). To recover a tablespace on a very
large database (VLDB) instead of restoring the whole database from a backup and carrying out a
complete database roll-forward.
Point-in-time recovery is a technique used to back up any database object or recover any database object to a
particular target SCN. When
the target SCN is specified using the date and time, it is known as time-based recovery. Following types of
point-in-time recoveries are known:
Tablespace point-in-time recovery (TSPITR)
Database point-in-time recovery (DBPITR)
Answer: A is incorrect. Tablespace Point-in-Time Recovery cannot be used on the SYSTEM tablespace, an
UNDO tablespace, or any
tablespace that contains rollback segments.

QUESTION 38
Linda works as a Database Designer for Lion Inc. She has been given an assignment to design the database of
a publishing company. The database has a table named Author, which has a composite key, AuthorID and
TitleID. Royalty and LiteraryAgent are the other attributes. The functional dependencies are such that AuthorID
+ TitleID-> Royalty (i.e. Royalty is functionally dependent on AuthorID and TitleID) and AuthorID-> LiteraryAgent
(i.e. LiteraryAgent is functionally dependent on AuthorID). Which of the following is true about this table?

A. It violates 4NF.
B. It violates 2NF.
C. It violates 1NF.
D. There is no violation.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
It violates the 2NF. According to 2NF, all the attributes that are not part of the primary key should be functionally
dependent on the entire key attributes (composite key). Here, Literary Agent is functionally dependent on one of
the composite key attributes, i.e. AuthorID. To make this in 2NF, the Author table should be decomposed into
two tables such that the first table contains AuthorID, TitleID, and Royalty as its attributes, and the second table
contains AuthorID and LiteraryAgent as its attributes. This will make the two tables in 2NF.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 39
Which of the following is a management activity that allows the stages of the database application to be
realized as efficiently and effectively as possible?

A. Database planning
B. Identifying information for objects
C. Object identification
D. Requirements collection and analysis

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Database planning is a management activity that allows the stages of the database application to be realized as
efficiently and effectively as
possible. It identifies the work to be done and the resources with which to do it. Database planning is integrated
with the overall IS strategy
of the organization.
Answer: B is incorrect. Identifying information for objects is the fourth step in database planning where the
information for each object
is stored. In a table, there are four columns that contain different types of information for objects:
1.Categorical column: In this column, data is classified and grouped, and a limited selection of data is stored.
2.Relational or referential column: In this column, a link is established between information in one table and
related information in
another table.
3.Identifier column: In this column, each item stored in the table is identified. 4.Raw data column: In this
column, tangible information is stored and is determined by a source that is external to the database.
Answer: D is incorrect. Requirements collection and analysis is the process of collecting and analyzing
information about the part of the
organization that is to be supported by the database application, and using this information to identify the user's
requirements of the new
system.
Answer: C is incorrect. In the object identification process in database planning, it is necessary to identify the
key objects or entities for
database management. There are generally a few primary objects, and once these are identified, the related
items become visible.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 40
You work as a Database Administrator for Bell Ceramics Inc. An employee of the company has fired a query,
including a DML statement, such as INSERT, against a table named Sales. You notice that the DML statement
has not executed. What will you do to resolve the issue? Each correct answer represents a complete solution.
Choose two.

A. Clean up all the uncommitted transactions on the Sales table.


B. Add more space to the tablespace and increase the users quota on the tablespace.
C. Provide redundant network paths from the client computer to the server along with additional listener
connections on the Oracle server and redundant network cards on the Oracle server.
D. Provide an appropriate privilege or create views on the Sales table, and grant privileges on the view.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and B

Explanation:
If an Oracle database fails due to any DML statements issued in a database, then the type of failure is
categorized under statement failures.
To overcome the statement failures, appropriate privileges on the table and views should be provided. The
issue can also be resolved by
adding more space to the tablespace or by increasing the users' quota on the tablespace. Answer: A is
incorrect. Cleaning up all the uncommitted transactions in the Sales table will not resolve the issue if an Oracle
database
faces inconsistencies due to statement failures.
Answer: C is incorrect. The redundant network paths from the client computer to the server along with
additional listener connections
on the Oracle server and the redundant network cards on the Oracle server will resolve the issue only if the
Oracle database fails due to
network inconsistencies.

QUESTION 41
You work as a Database Developer for GraySoft Inc. You are designing a database to record information about
potential customers. You create a table named ProductInquiry for the database.
The table is given below:
You want to uniquely identify the product in which a customer is interested. Choose the columns on which a
PRIMARY KEY constraint needs to
be created to accomplish this.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

A.
B.
C.
D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Explanation: Create a PRIMARY KEY constraint on the InquiryID and ProductID columns to uniquely identify
the product in which a customer is
interested.
The ProductInquiry table is working as a junction table to create a many-to-many relationship between the
Products table and the Inquiries
table. A customer can be interested in many products, while a product can also be inquired by many customers.
However, the inquiry
information of one product by a particular customer should be stored only once. For the next subsequent inquiry
for the same product by the
same customer, only the LastInquiredOn column should be updated. The correct entity relationship diagram for
this scenario is given below:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 42
Which of the following is the process of extracting trails on a regular basis so that they can be transferred to a
designated security system where the database administrators do not have access?

A. Native auditing
B. Abstraction
C. Database security
D. Encryption

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Native auditing is the process of extracting trails on a regular basis so that they can be transferred to a
designated security system where the
database administrators do not have access. This ensures a certain level of segregation of duties and provides
evidence that the native audit
trails were not modified by authenticated administrators. Answer: B is incorrect. Abstraction is a method of
coding that enables a user to focus on the coding rather than the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database access.
Answer: C is incorrect. Database security refers to the system, processes, and procedures that protect a
database from unintended
activities, such as authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized
individuals or processes. Database
security can begin with the process of creating and publishing appropriate security standards for the database
environment. These standards
may include specific controls for the various relevant database platforms. Answer: D is incorrect. Encryption
provides an additional security layer, protecting the data from unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.

QUESTION 43
You manage a large database named Sales. The Sales database contains a table named OrderDetails, which
is a heavily transacted table with frequent inserts. Indexes in the table often become fragmented due to
excessive page splitting. You want to minimize the amount of fragmentation due to page splits. What should
you do?

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

A. Update the statistics on the indexes.


B. Change the fillfactor for the indexes to 100.
C. Change the fillfactor for the indexes to 60.
D. Change the fillfactor for the indexes to 0.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
FILLFACTOR specifies a percentage that indicates how much free space will be in the leaf level of each index
page. When a clustered index is
created on a table, SQL Server does not stuff data wherever it finds space, but it physically rearranges data in
order. SQL Server cannot
rearrange data without page split if it does not find free space at an index page. To help SQL Server
accomplish this, there is a need to leave
a little space at the leaf level of each page on a clustered index. This free space is called FILLFACTOR. The
fillfactor determines how much empty space is left in the indexes. Once a page is full, it must split to
accommodate additional data.
However, excessive splitting causes the indexes to be fragmented and can significantly impact performance.
The fillfactor can be modified with
a statement like this:
ALTER INDEX ALL ON dbo.OrderDetails REBUILD WITH (FILLFACTOR = 60); FILLFACTOR =60 tells SQL
Server to fill the page to 60 percent full with 30 percent free space. Answer: D and B are incorrect. Fillfactor
values of 0 and 100 are both the same. This indicates that the indexes fill the pages with only
one empty row. As soon as a second insert is performed, the page will split. Answer: A is incorrect. Statistics
are used by the database engine to determine how useful an index may be for a query, but updating
the index would not reduce the fragmentation.

QUESTION 44
You are the database administrator of a MySQL server that runs on a Windows server. All clients are local
clients. For security, you want to disable connections from the remote clients. Which of the following steps will
you take to accomplish the task?

A. Start the server with the --disable-networking option.


B. Start the server with the --shared-memory option.
C. Start the server with the --skip-networking option.
D. Start the server with the --secure-auth option.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
According to the question, all the clients are local and you want to disable connections from the remote clients.
In order to accomplish this
task, you will have to start the server with the --skip-networking option. This will disable the TCP/IP connections
(the only type of connection
that can be made by the remote clients).
Answer: B and D are incorrect. These options will not disable remote connections. Answer: A is incorrect. No
such option is available with a MySQL server.

QUESTION 45
Consider the case of an organization having many departments. Each department has a department head
known as senior manager. Several employees are working in a department under the senior manager. Identify
the most appropriate ER-diagram that represents the relationship between department and employees.
A.
B.
C.
D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The relationship between department and employees is one-to-many and that of employees and department is
one-to-one, i.e. an employee
can work in only one department at a time.
In the figure, a single line across the right end of the relationship represents one-to-one cardinality. The
crowfoot at the left end of the relationship signifies an optional cardinality of any number of, or several.
Answer: C is incorrect. A single line across the left end of the relationship represents one-to-one cardinality.
The crowfoot at the right
end of the relationship signifies an optional cardinality of any number of, or several. According to this figure, an
employee can work in several
departments and a department has a single employee, which is not possible. Answer: B is incorrect. A single
line between the two entities means one-to-one cardinality. Answer: A is incorrect. A single line across the left
end of the relationship represents one-to-one cardinality. However, in this case, a
department can have several employees, not just one.

QUESTION 46
Which of the following statements is true about referential integrity?

A. It checks that no component of a primary key can have a null value and no duplicate entries can exist.
B. It checks that the value of a primary key must be consistent throughout the life of an instance.
C. It distinguishes between null values and zero entries.
D. It checks that no record in a child table can exist if its corresponding record is not available in the parent
table.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Referential integrity is enforced through a foreign key. There must be a reference of the foreign key in its
originating table. For example, take
two tables, Employee and Department. The DeptID attribute of the Department table is the primary key, and
when it is exported to Employee
table, it becomes the foreign key in the Employee table. The data value of DeptID in the Employee table cannot
exist if it does not exist in the Department table.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Referential integrity constraint is a feature in RDBMS (Relational Database Management System) that prevents
a user from entering
inconsistent data. There are various referential integrity rules that are applied on tables sharing a relationship.
These are as follows:
If the Employee table has a foreign key that is a primary key of the Department table, then the Employee table
cannot have a value in
the foreign key column if there is no corresponding value in the Department table. If a record is deleted from the
Department table, the corresponding record must be deleted from the Employee table. This is known as
cascading delete.
Answer: C is incorrect. According to an integrity constraint, a table can have only one primary key constraint. A
primary key constraint imposes that the primary key attribute should be unique and cannot have NULL values.
This ensures that the primary key value uniquely identifies each and every row in a table.

QUESTION 47
Which of the following are DML commands? Each correct answer represents a complete solution.
Choose all that apply.

A. SELECT INTO
B. DELETE
C. UPDATE
D. ALTER
E. SELECT
F. INSERT

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: A, C, B, and F

Explanation:
A data-manipulation language (DML) is a family of languages to access or manipulate data that is organized by
the appropriate data model.
DML is used for the following operations:
Retrieval of information stored in the database.
Insertion of new information into the database.
Deletion of information from the database.
Modification of information stored in the database.
Currently the most popular data manipulation language is that of SQL, which is used to retrieve and manipulate
data in a Relational database.
In SQL, the following statements are used for database manipulation:
SELECT ... INTO
INSERT
UPDATE
DELETE
Each SQL DML statement is a declarative command.
Answer: E is incorrect. The purely read-only SELECT query statement is classed with the 'SQL-data'
statements and hence it is considered to be outside of DML. The SELECT ... INTO form is considered to be
DML because it manipulates or modifies data. Answer: D is incorrect. ALTER is a DDL command.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 48
Which of the following commands can be used to change the authorization type in DB2 9? Each correct answer
represents a complete solution. Choose all that apply.
A. UPDATE DATABASE CONFIGURATION
B. SET AUTHORISATION
C. RESET DATABASE CONFIGURATION
D. UPDATE DBM CFG

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and A

Explanation:
The UPDATE DBM CFG or UPDATE DATABASE CONFIGURATION command can be used to change the
authorization type in DB2. Both UPDATE
DBM CFG, UPDATE DATABASE CONFIGURATION are equivalent commands and used to put the desired
changes on the DB2 9 database
configuration file.
Answer: B is incorrect. This is not a valid DB2 command. Answer: C is incorrect. It is used to reset database
configuration.

QUESTION 49
Smith works as a Database Administrator for DWorlds Inc. The management instructs him to plan a database
where identifying the key objects or entities for database management is important. Which of the following
database planning steps will help him to accomplish the task?

A. Object identification
B. Gathering information
C. Identifying the relationships between objects
D. Object modeling

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In the object identification process in database planning, it is necessary to identify the key objects or entities for
database management.
There are generally a few primary objects, and once these are identified, the related items become visible.
Answer: B is incorrect. Gathering information is the first step of database planning and requires a good
understanding of what tasks are

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

to be performed in the database. In case the database has to replace a paper-based or a manual system, the
old system can provide all the
necessary information. Moreover, all those who were involved with the previous system should be interviewed
to determine what they did
and what is now needed for the new database. The limitations, problems, and bottlenecks of the old system
should also be identified.
Answer: D is incorrect. Object modeling is the third step in database planning in which objects are identified in
the system. A user
should record an object in such a way that it is represented visually in the system. He can use the database
model as a reference during
implementation of the database. Database developers use tools such as pencils, paper, word processing etc.,
as well as create software
programs for data modeling of the database.
Answer: C is incorrect. Identifying relationships between objects is the last step in database planning, which is
the ability to relate
information about various items in the database. Isolated types of information can be stored separately, but the
data can be combined
according to the requirements of the database engine. Identifying the relationship between objects in the design
process necessitates
looking at the tables, determining how the tables are logically related, and adding relational columns to the
tables that establish a link from
one table to another.

QUESTION 50
You are a database developer for a database named Customers hosted on a SQL Server 2008 server.
Recently, several customers were deleted from the Customers database. To ensure this is not repeated in
future, you have decided to create a DML trigger to prevent it. What code will create the trigger to meet your
goals? Each correct answer represents a complete solution. Choose all that apply.

A. CREATE TRIGGER trgDeleteCustomer


ON dbo.Customers
BEFORE DELETE
AS
RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK
TRANSACTION
B. CREATE TRIGGER trgDeleteCustomer
ON dbo.Customers
AFTER DELETE
AS
RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK
TRANSACTION
C. CREATE TRIGGER trgDeleteCustomer
ON dbo.Customers
AFTER DELETE
AS

For interactive and self-paced preparation of exam 98-364, try our practice exams.
Practice exams also include self assessment and reporting features! www.selftestengine.com

IF (SELECT COUNT(*) FROM DELETED) > 1


BEGIN
RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK
TRANSACTION
END
D. CREATE TRIGGER trgDeleteCustomer
ON dbo.Customers
AFTER DELETE
AS
IF (SELECT COUNT(*) FROM DELETED) > 0
BEGIN
RAISERROR ('Customers cannot be deleted. An error has been logged', 16, 10) WITH LOG ROLLBACK
TRANSACTION
END

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and B

Explanation:
In the code with answer option D, the deleted table is queried to see if it holds any data. The deleted table is a
virtual table that exists
immediately after the DELETE statement in a trigger. It will hold the deleted row or rows. The COUNT(*) is
counting the number of rows in the
table, and if any rows are present, the trigger will raise the error and roll back the transaction. This method is
useful if you want to prevent
more than a specific count (such as more than 5 customers) from being deleted.

QUESTION 51
JDBC API 2.0 defines five levels of transaction isolation for database concurrency control. Which of the
following is the lowest level of transaction isolation?

A. TRANSACTION_SERIALIZABLE
B. TRANSACTION_NONE
C. TRANSACTION_READ_COMMITTED
D. TRANSACTION_READ_UNCOMMITTED
E. TRANSACTION_REPEATABLE_READ

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
There are five levels of transaction isolation provided by JDBC 2.0 Connection interface. The higher the
transaction level, the more the care is taken to avoid database conflicts. On the other hand, the higher the level
of isolation, the slower the application executes (due to increased

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

locking overhead and decreased concurrency between users). The developer must balance the need for
performance with the need for data
consistency when making a decision about what isolation level to use. However, the level that can actually be
supported depends on the
capabilities of the underlying DBMS.
The highest transaction isolation level specifies that if one transaction is operating on a database, no other
transaction can access that part
of the database.
The transaction isolation levels in terms of concurrency control in ascending order are as follows:
TRANSACTION_NONE
TRANSACTION_READ_COMMITTED
TRANSACTION_READ_UNCOMMITTED
TRANSACTION_REPEATABLE_READ
TRANSACTION_SERIALIZABLE
The lowest transaction isolation level, i.e. TRANSACTION_NONE, specifies that transactions are not at all
supported.
A developer can change a transaction isolation level by using the setTransactionIsolation() method of the
Connection interface.

QUESTION 52
Which of the following provides reliable units of work that allow correct recovery from failures and keeps a
database consistent even in cases of system failure?

A. Database security
B. Concurrency control
C. Two-phase commit
D. Database transaction

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A database transaction comprises a unit of work performed within a database management system against a
database, and treated in a coherent and reliable way independent of other transactions. Transactions in a
database environment have two main purposes:
1.To provide reliable units of work that allow correct recovery from failures and to keep a database consistent
even in cases of system
failure, such as when execution stops and many operations in a database transaction remain uncompleted.
2.To provide isolation between multiple programs accessing a database concurrently. Answer: B is incorrect.
Concurrency control in database management systems ensures that database transactions are performed
concurrently without the concurrency violating the data integrity of a database. Executed transactions should
follow the ACID rules. This
mechanism is required to manage multiple users accessing the same groups of resources with the least
possible overhead, either optimized

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

for a specific task, or general purpose.


Answer: A is incorrect. Database security refers to the system, processes, and procedures that protect a
database from unintended
activities, such as authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized
individuals or processes. Database
security can begin with the process of creating and publishing appropriate security standards for the database
environment. These standards
may include specific controls for the various relevant database platforms. Answer: C is incorrect. A two-phase
commit is a feature of transaction processing systems, enabling databases to be returned to the
pre-transaction state if some error condition occurs. A single transaction can update many different databases.
A two-phase commit strategy
is designed to ensure that either all the databases are updated or none of them, so that the databases remain
synchronized.

QUESTION 53
Which of the following DML SQL statements support usage of correlated sub-queries? Each correct answer
represents a complete solution. Choose all that apply.

A. INSERT
B. UPDATE
C. DELETE

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: B and C

Explanation:
A correlated sub-query is a sub-query where a column of a table referred in the outer parent query is referenced
in the sub-query. Two tables are involved in a correlated sub-query and both have data in them. The two tables
are linked to each other using a common column. In the UPDATE and DELETE SQL statements the table can
have data and can be linked with a common column. However, the same is not true for INSERT statements as
in the INSERT statement the table does not contain any data, and hence, cannot be correlated with the inner
query table. The best way to work with correlated sub-queries is to use table and/or column aliases to clearly
understand which columns are being referenced from which tables. Without aliases Oracle will return an
ambiguity error in some cases.
Answer: A is incorrect. The INSERT statements do not support correlated sub-queries. They support other sub-
queries like INSERT INTO (SELECT FROM ).
Correlated sub-queries with INSERT will not work because for a correlated sub-query to work there has to be a
common column based on which rows in the table are linked to the columns of the table used in the sub-query.
When using the INSERT state, the table does not contain any data; hence, a correlation cannot occur. You may
however, INSERT data first into a table using INSERT INTO (SELECT FROM ) and then use UPDATE
statements and correlated sub-queries to update the data from other tables.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 54
Which of the following are the types of prototyping strategies? Each correct answer represents a complete
solution. Choose two.

A. Requirements prototyping
B. Physical prototyping
C. Revolutionary prototyping
D. Evolutionary prototyping

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and A

Explanation:
There are two types of prototyping strategies which are as follows:
Requirements prototyping: It is used to determine the requirements of a proposed database system and then
the prototype is
discarded.
Evolutionary prototyping: It is used for the same purpose, but the prototype is not discarded and with further
development becomes
the working database system.

QUESTION 55
A table named Emp is given below that contains data of an organization.

How many records will be displayed if the following SQL query is executed? SELECT *
FROM Emp
WHERE Name BETWEEN 'D' AND 'F'

A. 2
B. A character column cannot be used in the BETWEEN operator.
C. 3
D. 4

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The table given below shows the result of the query. The character column is compared against a string using
the BETWEEN operator, which is
equivalent to >= 'D' AND <='F'. The name Flora will not be included because Flora is > F.
QUESTION 56
Which of the following commands cannot be rolled back? Each correct answer represents a complete solution.
Choose two.

A. DELETE
B. TRUNCATE
C. UPDATE
D. COMMIT

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and B

Explanation:
COMMIT statement is a transaction control statement that ends the current database transaction and makes all
changes made in that
transaction permanent. It also releases all locks on the transaction. The TRUNCATE statement is a Data
Definition Language (DDL) statement that is used to remove all records from a table. It also releases the
storage space used by the table. The TRUNCATE statement cannot be rolled back.
Syntax:
TRUNCATE TABLE TableName;
Therefore, both the commands, COMMIT and TRUNCATE, can never be rolled back. Note: The TRUNCATE
command includes a built-in COMMIT command. Answer: C and A are incorrect. The SQL UPDATE statement
allows a user to update the current values in a database with new values.
It contains three main clauses. The first clause specifies the table that requires an update, the second clause
specifies the column name and
the data values that will be inserted in place of the current values, and the third clause specifies the criteria for
the records that will be
updated. An example query is given below:
Update Employee{first clause}
Set Fname="Roger"{second clause}
Lname="Pressman"

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

WHERE Empid=1{third clause}


The DELETE statement is a Data Manipulation Language (DML) statement that is used to delete records from
a table, based on the condition
specified in the WHERE clause. If the WHERE clause is omitted, all records in the table are deleted.
The DELETE statement can be rolled back.
Syntax:
DELETE [FROM] TableName
[WHERE condition];
The above two DML commands can therefore be rolled back.

QUESTION 57
Mark works as a Database Designer for Reon Inc. He is assigned the task to create a database for the
company. He issues the following query to create the database.
CREATE DATABASE '24342'
What will be the output of the query?

A. A database will be created.


B. An error will be generated stating that a database name must begin with an alphabet and all the alphabets
should be in uppercase.
C. An error will be generated stating that a database name must begin with an alphabet.
D. An error will be generated stating that a database name should be a combination of numerals and
alphabets.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A database name can begin with a digit, provided it is enclosed within single quotes. The digits within quotes
are treated as a string. It is not necessary that all the alphabets in a database name should be in uppercase.

QUESTION 58
What is the ideal time to back up dynamic log files?

A. When the server is running.


B. You can back up dynamic log files any time.
C. When the server is stopped.
D. When the server is shut down.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Dynamic files such as the logs that the server changes as it runs are best backed up when the server is
stopped.
Answer: D, C, and A are incorrect. These are not the appropriate statements for backing up dynamic log files.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 59
You work as a MySQL Database Administrator. Your server crashed and it was recovered and made online
within half an hour. What will you do to ensure that the table structure and contents are in a proper state?

A. Peform a table optimization operation.


B. Perform a table repair operation.
C. Perform a table analysis operation.
D. Perform a table check operation.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
While working on MySQL database maintenance, a table check performs an integrity check to ensure that the
table structure and contents are
in a proper state. A table check can be performed for the MyISAM and InnoDB tables.

QUESTION 60
James works as an Administrator for Softech Inc. The company has a SQL Server 2005 computer named
SQL1. The company has six departments; Accounting, Sales, Marketing, Manufacturing, Production, and
Research. The user accounts of each department are located in a domain group named after the department.
James wants to create a separate database on SQL1 for each epartment which will store the department
related information. Users in each department must be able to read and update data in the database belonging
to their respective departments. No user must be able to access the database belonging to another
department. James wants to configure access to the database to meet these requirements. What should
James do to accomplish the task?

A. James should create a Windows Authentication login for each domain group and configure the logins as
database users for the appropriate database. Add each database user to the db_ddladmin database role.
B. James should create a Windows Authentication login for each domain group and configure the logins as
database users for the appropriate database. Add each database user to the db_datareader and
db_datawriter database roles.
C. James should create a Windows Authentication login for each domain user and configure the logins as
database users for the appropriate database. Add each database user to the db_ddladmin database role.
D. James should create a Windows Authentication login for each domain user and configure the logins as
database users for the appropriate database. Add each database user to the db_datareader and
db_datawriter database roles.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
In order to accomplish the task James should create a Windows Authentication login for each domain group
and configure the logins as
database users for the appropriate database. Add each database user to the db_datareader and db_datawriter
database roles.
As the criterion in the question states that the users of each department belong to a group named after that
department. These groups can
be used to configure access to the database. Each department user should be assigned db_datareader and
db_datawriter database roles for
their respective databases. This will prevent a user in one department from accessing another department's
database.
Answer: D is incorrect. Create a Windows Authentication login for each domain user, and configure it as a
database user for the
appropriate database. Then add each database user to the db_datareader and db_datawriter database roles.
But it would require less
administrative effort to create a Windows Authentication login for each domain group when compared to that
created for each domain user.
Answer: A is incorrect. James could use the domain group to configure access to the database but the
database user should not be
added to the db_ddladmin database role. The db_ddladmin is a fixed database role. A user who is a member of
this database role can add,
modify, or drop objects at the database level but cannot issue the GRANT, REVOKE, or DENY statements. The
db_ddladmin role exists in each
database. As the scenario in the question states that the user can only read and update the data present in
database, thus, assigning user
to the db_ddladmin database role will not serve the purpose. Answer: C is incorrect. James should not create a
Windows Authentication login for each user, but for each group as this task will be
accomplished with least administrative effort. Moreover, the database should be added to the db_datareader
and db_datawriter database
roles as they have to only read and update the data present in the database.

QUESTION 61
Two tables, namely, OrderItem and Item are depicted below in which all attributes mentioned therein
respectively, refer to column heading labels.

http://www.gratisexam.com/

If the ItemName attribute is moved from the Item table to the OrderItem table, then will it violate any
normalization form? If yes, then which
of the following normalization forms will be violated?

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

A. It will not violate any normal form (NF).


B. 1NF
C. 3NF
D. 2NF

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
It will violate 2NF, as ItemName is functionally dependent on ItemNumber, which is the primary key of the Item
table.
ItemNumber is the foreign key of the OrderItem table, and OrderNumber is the primary key of the OrderItem
table. According to 2NF, all the
non-key attributes in a table must be functionally dependent on the primary key column. Migrating ItemName to
the OrderItem table will
violate 2NF, since ItemName (a non-key attribute) is not functionally dependent on OrderNumber, which is the
primary key of the OrderItem
table.

QUESTION 62
You are the database administrator for a MySQL database. The database server is installed on a Unix system.
The time zone files for the system are located at /usr/share/zoneinfo. You need to ensure that the system and
MySQL time zones are based on the same information. Which of the following statements will you use to
accomplish the task?

A. shell> /ust/share/zoneinfo mysql_tzinfo_to_sql | mysql -u root mysql


B. shell> /ust/share/zoneinfo mysql_tz_to_sql | mysql -u root mysql
C. shell> mysql_tz_to_sql /ust/share/zoneinfo | mysql -u root mysql
D. shell> mysql_tzinfo_to_sql /ust/share/zoneinfo | mysql -u root mysql

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
According to the question, you are required to ensure that the system and MySQL time zones are based on the
same information. To ensure this, on operating systems that have their own time zone files, it is best to use
them for loading the MySQL time zone tables. Furthermore, the question also provides information that the
system time zone files are located at /usr/share/zoneinfo location. In order to accomplish this task, you will have
to use the mysql_tzinfo_to_sql program to convert the file contents into SQL statements that can be loaded into
MySQL by
the mysql program. Use the following command for this:
shell> mysql_tzinfo_to_sql /ust/share/zoneinfo | mysql -u root mysql Answer: A is incorrect. Wrong syntax is
used.
Answer: C and B are incorrect. No such command is available with MySQL.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com
QUESTION 63
You work as a Database Designer for Hitech Inc. You are designing a database named Project. The company
takes projects from outside and divides them into tasks (design, coding, etc.). Each task is assigned to only one
employee. You want to use a primary key constraint to uniquely define each row in a table named Task. The
tables are given below:

Which of the following attributes can be a primary key in the Task table?

A. TaskID
B. ProjectID
C. EmployeeID
D. SocialSecurityNumber (SSN)

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The TaskID attribute uniquely defines each row in the Task table. It is given in the scenario that one task is
assigned to only one employee. Therefore, in order to avoid a task being given to two employees, TaskID
should be entered just once (unique).

QUESTION 64
Which of the following is the process of creating a design for the database that will support the enterprise's
operations and objectives for the required database system?

A. Identifying relationships between objects


B. Application design
C. Database planning
D. Database design

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
Database design is the process of creating a design for a database that will support the enterprise's operations
and objectives for the
required database system. It represents data and relationships between data required by all major application
areas and user groups.
Answer: C is incorrect. Database planning is a management activity that allows the stages of the database
application to be realized as
efficiently and effectively as possible. It identifies the work to be done and the resources with which to do it.
Database planning is integrated
with the overall IS strategy of the organization.
Answer: B is incorrect. Application design is a design of the user interface and the application programs that
use and process the
database. Database and application design are parallel activities. Application design includes two important
activities: transaction design and
user interface design.
Answer: A is incorrect. Identifying relationships between objects is the last step in database planning, which is
the ability to relate
information about various items in the database. Isolated types of information can be stored separately, but the
data can be combined
according to the requirements of the database engine. Identifying the relationship between objects in the design
process necessitates
looking at the tables, determining how the tables are logically related, and adding relational columns to the
tables that establish a link from
one table to another.

QUESTION 65
You manage a database named Exams accessed via a website. The website is regularly accessed by users in
different countries. You are redesigning a table named History that records when users have purchased and
taken online exams. You need one of the columns in the History table to record what time of day that a user
has taken an exam. Additionally, you need this column to have time zone awareness. What data type should
you use?

A. datetimeoffset
B. datetime
C. Use two different columns with one column of datetime, and the second column indicating the UTC offset
D. datetime2

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com
Explanation:
The datetimeoffset data type combines a date with a time of day that has time zone awareness. The time is
based on a 24-hour clock but also
includes a UTC offset. For the datetimeoffset data type, both the UTC and local datetime values will be
validated during update, insert,
convert, arithmetic, or assign operations. The recognition of any invalid UTC or local datetime value will result in
an invalid value error. For
example, the 9999-12-31 10:10:00 datetime value is valid in UTC, but it overflows in local time when the time
zone offset is +13:50.

QUESTION 66
Fill in the blank with the appropriate word.
The model for database management is a database model based on first-order predicate logic.

A. relational

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation: The Relational model describes a database as a collection of predicates over a finite set of
predicate variables, describing
constraints on the possible values and combinations of values. The content of the database at any given time is
a finite (logical) model of the
database, i.e., a set of relations, one per predicate variable, such that all predicates are satisfied. A request for
information from the database
or a database query is also a predicate.

QUESTION 67
You are designing a database for a sports hostel. In the hostel, a player can be enrolled for multiple games.
You are working on a relation shown in the image below:

Which of the following candidate keys would best serve as the primary key?

A. P_ID and P_DOB


B. Game_ID and P_ID
C. Game_ID and P_Age
D. P_ID and P_Age

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
According to the question, you are required to identify the keys that would best serve as the primary key for the
given relation. The primary
key must be unique for each row. The only combination of the candidate keys that makes it unique for each row
of the table is Game_ID and
P_ID.

QUESTION 68
You are designing a database for a sports hostel. There are three types of buildings for which a fixed fee is
charged on per room basis. No player can take two accommodations. You design the following table:

Considering that the P_ID is the primary key, the table is in which normal form? Each correct answer
represents a complete solution. Choose all that apply.

A. BCNF
B. 1NF
C. 2NF
D. 3NF

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: B and C

Explanation:
The table designed is following the first and second normal forms. In the first normal form, a table faithfully
represents a relation and has no
repeating groups. As the designed table does not have any repeating groups it is in the first normal form.
In the second normal form, no non-prime attribute in the table is functionally dependent on a proper subset of a
candidate key (primary key).
The designed table is following this normalization also. Answer: D is incorrect. According to the third normal
form, every non-prime attribute is non- transitively dependent on every candidate
key in the table. Here, in this design, the hostel fee is transitively dependent on the primary key.
Hence, this table is not in 3NF.
Answer: A is incorrect. The Boyce-Codd normal form (BCNF) is stricter than 3NF. According to BCNF, each
attribute must represent a fact about the key, the whole key, and nothing but the key. This is not followed by the
table designed in the question.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com
QUESTION 69
You work as a Database Administrator for Dowtech Inc. A table named StudentInformation exists in a
database. The table has columns named student_names, student_marks, and student_courses. Some
students who have opted for various courses have got different marks in them. This implies that the table has
two many-to-many relationships. You have to ensure that these two relationships are not represented in a
single table and that the student_name column exists in both tables. Which of the following normal forms will
you use to represent these relationships in the tables?

A. 4 NF
B. 3 NF
C. 2 NF
D. 1 NF

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Fourth normal form (4NF) is a normal form used in database normalization. Introduced by Ronald Fagin in
1977, 4NF is the next level of
normalization after Boyce-Codd normal form (BCNF). Whereas the second, third, and Boyce-Codd normal
forms are concerned with functional
dependencies, 4NF is concerned with a more general type of dependency known as a multivalued dependency.
Symbolically, it can be
represented as follows:
If A -> > B|C, then A -> B and A -> C
Here, A, B, and C are attributes.
Answer: D is incorrect. First normal form exists when all the columns in a table are atomic i.e., only a single
value is allowed in each
column. Also, there should not be a group value like more than one phone number in a phone number column.
If a table violates the first
normal rule, following steps should be taken to normalize the database:
To make column atomic, divide them into multiple columns. If there is group value, create separate tables for
the column and relate new table with a foreign key. Answer: C is incorrect. Second normal form (2NF) is used
in database normalization. A table that is in first normal form must meet
additional criteria if it is to qualify for second normal form. Specifically, a 1NF table is in 2NF if and only if, given
any candidate key and any
attribute that is not a constituent of a candidate key, the non-key attribute depends upon the whole of the
candidate key rather than just a
part of it.
Answer: B is incorrect. Third normal form (3NF) is used in database normalization. A table is in 3NF if and only
if the relation S (table) is
in second normal form (2NF) and every non-prime attribute of S is non-transitively dependent on every key of S.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com
QUESTION 70
Which of the following is an ANSI approved language for communicating and managing data in a relational
database management system (RDBMS)?

A. SQL
B. QL
C. DDL
D. XML

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Structured Query Language (SQL) is used to communicate and manage data in a relational database
management system (RDBMS).
Structured Query Language (SQL) is the most common language used to access relational databases.
SQL was developed by IBM in the
1970's, and SQL version 3 was officially defined by the American National Standards Institute (ANSI).
Most DBMS's conform to the ANSI SQL-92
standard. It is a nonprocedural language and supports many database systems that are in use today, such as
MySQL, PostgreSQL, Berkeley
DB, Oracle, DB2, Sybase, Informix, Microsoft SQL, etc. Answer: C is incorrect. Data Definition Language (DDL)
is a part of SQL that allows a user to create objects (such as tables, stored
procedures, indexes, and triggers) within a database. It also allows a user to delete already created objects.
Answer: B is incorrect. Query Language (QL) is a set of commands used to retrieve, modify, and update data
from the database; it is a
language for formulating queries for a given dataset.
Answer: D is incorrect. Extensible Markup Language (XML) is a general-purpose specification for creating
custom markup languages. It is
classified as an extensible language because it allows the user to define the mark-up elements. It is used to aid
information systems in
sharing structured data, especially via the Internet, to encode documents, and to serialize data. XML is
recommended by the World Wide Web
Consortium (W3C). It is a fee-free open standard. The recommendation specifies lexical grammar and parsing
requirements.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 71
Examine the following table:
What is the degree of this table?

A. 20
B. 25
C. 5
D. 4

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The question being asked is the degree of the displayed table. The degree of a table refers to the number of
columns that a table has. The number of columns contained in a table is referred to by the term degree of the
table; if the degree of a table is increased by 1, it means that a new column is added to the table. The degree of
the table denotes the number of columns or attributes. Since the table displayed has four attributes, the degree
of this table is four (4). Answer: C, A, and B are incorrect. These are not the appropriate values for the degree
of the table displayed.

QUESTION 72
A company named Rel Inc. has many authorized dealers across the country who sell their products. The Sales
Manager of the company wants to see the details of the authorized dealers, including the name, region, and
total sales in ascending order of sales. Which of the following queries should be issued to get the desired
output?

A. SELECT MAX (Totalsales)


FROM Dealer
B. SELECT
FROM Dealer
C. SELECT *
FROM Dealer
WHERE MAX (Totalsales)
D. SELECT Name, Region, Totalsales
FROM Dealer
ORDER BY Totalsales

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The first part of the query (i.e. SELECT Name, Region, Totalsales) selects the Name, Region, and Totalsales
attributes. The second part (i.e.
FROM Dealer) specifies the table name, and the third part (i.e. ORDER BY Totalsales) gives Totalsales in
ascending order. In the ORDER BY
clause, ascending is the default order.
Answer: B is incorrect. The SELECT clause does not specify the attributes. Answer: A is incorrect. The query
fails to provide the details from the table. It will provide only the maximum sales from the table.
Answer: C is incorrect. MAX is an aggregate function. An aggregate function cannot be in the WHERE clause.

QUESTION 73
You work as the Database Administrator for a MySQL database server. In an hour or so, you are able to bring a
corrupted server online. You execute the CHECK TABLE command and find that some of the InnoDB tables
need to be repaired. You restart the server and discover that auto-recover has failed. Which of the following
steps will you take to recover the corrupted InnoDB tables?

A. Run the ANALYZE TABLE command.


B. Run the REPAIR TABLE command.
C. Recover the tables from the last backup.
D. Run the OPTIMIZE TABLE command.
E. Restart the server with the innodb_force_recovery option.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:
Explanation:
According to the question, the corrupted InnoDB tables are not auto-recovered. In such a case, you will have to
restart the server with the innodb_force_recovery option. Further, you can dump the table, restart the server
normally, and recover the tables from the dump file.

QUESTION 74
Mark works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database.
Management instructs him to verify the identity of a user or software that is connecting to the database. Which
of the following will help him to accomplish the task?

A. Referential integrity
B. Abstraction
C. Encryption
D. Authentication

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
Authentication is the process of verifying the identity of a user or software connecting to a database.
During the process of authentication,
the user must submit sufficient information validated either by the database itself, or by the operating system
within which the database is
installed.
Answer: B is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database access.
Answer: A is incorrect. Referential integrity is a feature or property that prevents users or applications from
entering inconsistent data
which, when satisfied, requires every value of one column of a table to exist as a value of another column in a
different or the same table.
Answer: C is incorrect. Encryption provides an additional security layer, protecting the data from unauthorized
viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.

QUESTION 75
Which of the following are the characteristics of application design? Each correct answer represents a
complete solution. Choose three.

A. Output of the transaction


B. Shortlisting of two or three products
C. Data can be used from the transaction
D. Expected rate of usage

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: A, C, and D

Explanation:
Following are the five characteristic features of the Application Design :
Data can be used from the transaction
Functional characteristics of the transaction
Output of the transaction
Importance to the users
Expected rate of usage

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 76
Consider the conceptual database design, depicting the relationship between two entities. The relationship
among Author, Title, and Order is represented by the ER-diagram given below:
What is the relationship between Author and Title?

A. Many-to-one
B. One-to-many
C. One-to-one
D. Many-to-many

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The relationship between Author and Title is many-to-many. The crowfoot from Author to Title indicates an
optional cardinality of any number, or several, i.e. an author has written either no title or many
titles. Similarly, the crowfoot from Title to Author indicates an optional cardinality of any number, or several, i.e.
a title is either written by at
least one author or many authors.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 77
John works as a database designer in ABC Tech. He wants to produce a description of a database
implemented on secondary storage media. Which of the following designs will he implement to accomplish the
task?

A. Logical database design


B. Conceptual database design
C. Database design
D. Physical database design

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Physical database design is the process of producing a description of the database implementation on
secondary storage. It describes base
relations, file organizations, and indexes used to achieve efficient access to data. It also describes any
associated integrity constraints and
security measures, tailored to a specific DBMS system. This involves the actual programming of the database,
taking into account the features
and limitations of the DBMS and the client.
Answer: A is incorrect. Logical database design is the process of creating a data model of an enterprise based
on a specific data model,
but independent of a particular DBMS. In the logical database design stage, users can define tables and
relationships that reflect the
conceptual design.
Answer: C is incorrect. Database design is the process of creating a design for a database that will support the
enterprise's operations
and objectives for the required database system. It represents data and relationships between data required by
all major application areas
and user groups.
Answer: B is incorrect. Conceptual database design is the process of constructing a model for the data at a
high level of abstraction
without using DBMS. It consists of the construction of an Entity-Relationship schema, providing an optimal
description of the user
requirements.

QUESTION 78
You have developed a stored procedure named usp_GetEmp that accepts an employee number as a
parameter and retrieves the details about the employee from the CurrentEmp table of a database named
Employees. You have tested it, and it works exactly as you expected. Later, another employee tries to use the
stored procedure and receives the following error: "The SELECT permission was denied on the object
'CurrentEmp', database 'Employees.schema 'dbo' ".
What should you do to resolve the problem?

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

A. Modify usp_GetEmp to include the With Execute As Owner clause.


B. Modify usp_GetEmp to include the With Execute As Caller clause.
C. Grant the employee the SELECT permission on the CurrentEmp table.
D. Grant the employee the SELECT permission on the Employees database.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Execute As OWNER clause can be used to identify what permissions a stored procedure will have when it
is executed. The Execute As
Owner clause results in the stored procedure running with the same permissions as the owner of the stored
procedure, or the account that
created the stored procedure. The EXECUTE AS permission is placed in the line right after the CREATE
PROCEDURE line as follows:
CREATE PROCEDURE ....
WITH EXECUTE AS ....
Since you created the stored procedure and it worked when you tested it, it will work if it is executed with your
permissions.
Answer: C is incorrect. While it may be possible to grant the SELECT permission to the table, it would not help
if another user executes
the stored procedure. The next user will have the same problem. Additionally, a common method of protecting
databases is not to grant
access to the tables directly, but instead grant access via stored procedures or views. Answer: B is incorrect.
The SELECT permission is granted to tables or views, not entire databases.

QUESTION 79
Peter works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database.
Peter has to construct an Entity-Relationship schema design for the data he will use in the database. Which of
the following database designs will he use to accomplish the task?

A. Physical database design


B. Conceptual database design
C. Logical database design
D. Application design

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Conceptual database design is the process of constructing a model for the data at a high level of abstraction
without using DBMS. It consists
of the construction of an Entity-Relationship schema, providing an optimal description of the user requirements.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: D is incorrect. Application design is a design of the user interface and the application programs that
use and process the
database. Database and application design are parallel activities. Application design includes two important
activities: transaction design and
user interface design.
Answer: A is incorrect. Physical database design is the process of producing a description of the database
implementation on secondary
storage. It describes base relations, file organizations, and indexes used to achieve efficient access to data. It
also describes any associated
integrity constraints and security measures, tailored to a specific DBMS system. This involves the actual
programming of the database, taking
into account the features and limitations of the DBMS and the client. Answer: C is incorrect. Logical database
design is the process of creating a data model of an enterprise based on a specific data model,
but independent of a particular DBMS. In the logical database design stage, users can define tables and
relationships that reflect the
conceptual design.

QUESTION 80
You are taking back up of your MySQL database server. You need to take a back up of the file that has been
created by the replication slave server and contains information needed for connecting to the master server.
Which of the following files will you copy?

A. Master.info
B. My.ini
C. Relay-log.info
D. My.cnf

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Replication slave servers create a master.info file that contains information needed for connecting to the master
server.
Answer: C is incorrect. This file indicates the current progress in processing the relay logs. Answer: B and D are
incorrect. These files contain configuration information that must be restored after a crash.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 81
Which of the following is the process of collecting and analyzing information about the part of the organization
that is to be supported by the database application?

A. Object identification
B. Requirements collection and analysis
C. Gathering information
D. Application Design

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Requirements collection and analysis is the process of collecting and analyzing information about the part of the
organization that is to be
supported by the database application, and using this information to identify the user's requirements of the new
system.
Answer: C is incorrect. Gathering information is the first step of database planning and requires a good
understanding of what tasks
are to be performed in the database. In case the database has to replace a paper-based or a manual system,
the old system can provide all
the necessary information. Moreover, all those who were involved with the previous system should be
interviewed to determine what they did
and what is now needed for the new database. The limitations, problems, and bottlenecks of the old system
should also be identified.
Answer: A is incorrect. In the object identification process in database planning, it is necessary to identify the
key objects or entities for
database management. There are generally a few primary objects, and once these are identified, the related
items become visible.
Answer: D is incorrect. Application design is a design of the user interface and the application programs that
use and process the database. Database and application design are parallel activities. Application design
includes two important activities: transaction design and user interface design.

QUESTION 82
Which of the following statements is true regarding a composite key in a table?

A. It is a primary key.
B. It is a primary or foreign key that consists of two or more attributes of the table.
C. It is a combination of the primary key and the foreign key.
D. It is a foreign key.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
A composite key is a primary or foreign key that consists of two or more attributes of the table. It is a key that
consists of two or more
attributes that uniquely identify an entity occurrence. Answer: C, D, and A are incorrect. These statements do
represent a composite key.

QUESTION 83
Which of the following approaches begins with the identification of only a few important concepts and, based on
these, the design proceeds, spreading outward 'radially'?

A. Inside-out approach
B. Bottom-up approach
C. Mixed approach
D. Top-down approach

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Inside-out approach can be regarded as a particular type of bottom-up approach. It begins with the identification
of only a few important
concepts and, based on these, the design proceeds, spreading outward 'radially'. First the concepts nearest to
the initial concepts are
represented, and a user then moves towards those further away by means of 'navigation' through the
specification.
Answer: C is incorrect. In a mixed approach, the designer decomposes the requirements into a number of
components, as in the
bottom-up approach, but not to the extent where all the concepts are separated. At the same time, a skeleton
schema is defined containing
the main concepts of the application. This skeleton schema gives a unified view of the whole design and helps
the integration of schemas
developed separately. Then the designer examines separately these main concepts and can proceed with
gradual refinements following the
top-down approach or extending a portion with concepts that are not yet represented following the bottom-up
approach.
Answer: B is incorrect. In a bottom-up approach, the preliminary specifications are broken down into smaller
components so that each
component describes a basic fragment of the specifications. These components are then represented by
schemas, some of which may consist of single concepts. The schemas are later obtained to be integrated
together until a final schema is obtained. Answer: D is incorrect. In a top-down approach, a schema is created
through a series of successive refinements, starting from the first schema, which is gradually expanded by
using appropriate modifications that increase the detail of the various concepts. Moving from one level to
another, the schema is modified using some basic transformations called top-down transformation primitives.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 84
You have created a database for employee management. The database has a table named Employees. The
table has the following attributes:
Name
Address
Contact Number
Designation
You want to store the salary information for each employee. The database should also store salary history. How
will you design the database so that you can query the last increment given to a particular employee?

A. Create a new table that includes the EmployeeSalary and DateOfIncrement columns. Create a one-to-one
relationship with the Employees table.
B. Create a new table that includes the EmployeeID, EmployeeSalary, and DateOfIncrement columns.
Create a one-to-many relationship with the Employees table.
C. Add the EmployeeSalary and DateOfIncrement columns to the Employees table.
D. Create a new table that includes the EmployeeSalary and DateOfIncrement columns. Create a many-to-
many relationship with the Employees table using the new table.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
It is stated in the question that the database should contain salary history information. This means that the
salary of an employee can be incremented more than once, i.e. a one-to-many relationship exists. To create a
one-to-many relationship between salary and employee, you have to create a separate entity for salary, and
create a foreign key referring to the primary key of the Employees table.
Answer: C is incorrect. The creation of the DateOfIncrement column in the table will lead to redundant data.

QUESTION 85
Mark works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database.
Mark has to change the properties of an object inside the database. Which of the following statements will he
use to accomplish the task?

A. DROP
B. UPDATE
C. CREATE
D. ALTER

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The ALTER statement in SQL changes the properties of an object inside DBMS. The types of objects that can
be altered depend on which DBMS
is being used. The syntax of the ALTER statement is as follows:
ALTER <specification> [Specification name]
Answer: C is incorrect. The CREATE statement is used to make a new database, table, index, or stored query.
The CREATE statement in
SQL creates an object inside DBMS. The types of objects that can be created depend on which DBMS is being
used, but most support the
creation of tables, indexes, users, and databases.
Answer: A is incorrect. The DROP statement in SQL is used to remove an object from an RDBMS. The types of
objects that can be
dropped depend on which RDBMS is being used, but most support the dropping of tables, users, and
databases. The syntax of the DROP
TABLE statement is as follows:
DROP TABLE "table_name"
Answer: B is incorrect. The UPDATE statement is used to directly change or modify the values stored in one or
more fields in a specified
record in a single table. Using the UPDATE statement, either all the rows can be updated, or a subset may be
chosen using a given condition.

QUESTION 86
Mark works as the Database Administrator for DataWorld Inc. The company has a SQL server 2008 database.
Mark wants to protect the database from unintended activities made by authorized individuals or processes
such as authenticated misuse, malicious attacks, or inadvertent mistakes. Which of the following should he use
to accomplish the task?
A. Native auditing
B. Abstraction
C. Referential integrity
D. Database security

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Database security refers to the system, processes, and procedures that protect a database from unintended
activities, such as authenticated
misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or processes.
Database security can begin with the process
of creating and publishing appropriate security standards for the database environment. These standards may
include specific controls for the
various relevant database platforms.
Answer: B is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database access.
Answer: A is incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be
transferred to a
designated security system where the database administrators do not have access. This ensures a certain level
of segregation of duties and
provides evidence that the native audit trails were not modified by authenticated administrators. Answer: C is
incorrect. Referential integrity is a feature or property that prevents users or applications from entering
inconsistent data which, when satisfied, requires every value of one column of a table to exist as a value of
another column in a different or the same table.

QUESTION 87
Rick works as a database administrator for a MySQL server. The server uses the InnoDB storage engine. Rick
finds that a table's performance is inconsistent. He wants to bring the table to a consistent state without shutting
down the server. Choose the required steps to accomplish the task.
A.
B.
C.
D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

Explanation:
In order to accomplish the task, Rick will have to take the following steps:
Dump the table through mysqldump.
Drop the table.
Recreate the table through dump.
These steps will not require Rick to shut down the server and will put the table in a consistent state.
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 88
Examine the following table:

In the table, you deleted the record of Mark Smith. Which of the following will change as a result?

A. Degree of the table


B. Cardinality of the table
C. Domain of the table
D. Attribute of the table

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In tables, the number of rows (or tuples) is called the cardinality. When a record (or row) of the table is deleted
(or added), the cardinality of the table changes. Answer: A and D When a column of the table is changed, the
degree (or attribute is changed). The degree of a table refers
to the number of columns that a table has. The number of columns contained in a table is referred to by the
term degree of the table; if the
degree of a table is increased by 1, it means that a new column is added to the table. The degree of the table
denotes the number of columns
or attributes.
Answer: C is incorrect. A Domain is a set of allowable values for one or more attributes. It is also known as the
data domain which refers to all the unique values which a data element may contain. The Domain boundary can
be defined by rules such as a the data type with an enumerated list of values. Check constraint is also a simple
example of defining the boundary of a domain.

QUESTION 89
Which of the following files contain configuration information that must be restored after a MySQL database
server has crashed? Each correct answer represents a complete solution. Choose two.

A. My.ini
B. My.cnf
C. Master.info
D. Binary log files

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: B and A

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
My.cnf and my.ini files are the option files used by a MySQL server. These files contain configuration
information that must be restored after a crash.
Answer: D is incorrect. The binary logs store updates that have been made after the backup was made.Answer:
C is incorrect. Replication slave servers create a master.info file that contains information needed for
connecting to the master server.

QUESTION 90
John works as a Database Administrator in www.company.com Inc. The company has a SQL Server database.
John wants to create a table named employees in the database. The table will have the id, firstname, lastname,
and dateofbirth columns. John has to ensure that the lastname column does not allow null values. Which of the
following queries will he use to accomplish the task?

A. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR (75)
NOT NULL, dateofbirth DATE NULL);
B. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR
(75), dateofbirth NULL);
C. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR (75)
NOT NULL);
D. CREATE TABLE employees (id INTEGER PRIMARY KEY, firstname CHAR(50)NULL, lastname CHAR
(75), dateofbirth DATE NULL);

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In this query, all the columns are created according to the requirement and the lastname column is not allowing
the null values to be entered.
Answer: D is incorrect. In this query, the lastname column is allowing the null values to be entered. Answer: C is
incorrect. In this query, the dateofbirth column is missing. Answer: B is incorrect. In this query, the data type of
the dateofbirth column is missing.

QUESTION 91
Which of the following statements are true regarding DML? Each correct answer represents a complete
solution. Choose all that apply.

A. It enables users to access/manipulate data in a database.


B. It is used to specify additional properties of the data.
C. It is used to specify a database schema by a set of definitions.
D. It can be procedural or declarative.

Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Answer: A and D

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
A data-manipulation language (DML) is a family of languages to access or manipulate data that is organized by
the appropriate data model.
DML is used for the following operations:
Retrieval of information stored in the database.
Insertion of new information into the database.
Deletion of information from the database.
Modification of information stored in the database.
Currently the most popular data manipulation language is that of SQL, which is used to retrieve and manipulate
data in a Relational database.
In SQL, the following statements are used for database manipulation:
SELECT ... INTO
INSERT
UPDATE
DELETE
Each SQL DML statement is a declarative command. There are two types of DMLs:
Precedural DMLs: It requires a user to specify what data are needed and how to get those data. Declarative
DMLs: It requires a user to specify what data are needed without specifying how to get those data.
Answer: C and B are incorrect. Data-definition language (DDL) is used to specify a database schema by a set
of definitions. It is also
used to specify additional properties of the data.

QUESTION 92
Which of the following is NOT a valid DDL command?

A. UPDATE
B. ALTER
C. DROP
D. CREATE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
UPDATE is a DML command. Data-definition language (DDL) is used to specify a database schema by a set of
definitions. It is a computer
language for defining data structures. The term was first introduced in relation to the Codasyl database model,
where the schema of the
database was written in a Data Definition Language describing the records, fields, and "sets" making up the
user Data Model. The term DDL is
used in a generic sense to refer to any formal language for describing data or information structures, like XML
schemas. CREATE, DROP, and
ALTER are the major DDL commands.
Answer: C, B, and D are incorrect. DROP, ALTER, and CREATE are valid DDL commands.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 93
You are a database developer for a database named Sales hosted on a SQL Server 2008 server. The Sales
database includes the Exams and
ExamQuestions tables. If any questions are modified for an exam, you need to ensure that the
ExamModifiedDate in the Exams table is
updated with the date and time of the update. The ExamQuestions table includes an INSTEAD OF trigger that
records when and who last
modified each question. Therefore, you decide to create a trigger. You only want the trigger to fire if a constraint
violation has not occurred.
Which of the following code will create the trigger to meet your goals?

A. CREATE TRIGGER trgExamQuestionsModified


ON dbo.ExamQuestions
INSTEAD OF UPDATE NOT FOR REPLICATION
AS
UPDATE Exams
SET ExamModifiedDate = GetDate()
FROM inserted
WHERE inserted.ExamID = Exams.ExamID
B. CREATE TRIGGER trgExamQuestionsModified
ON dbo.ExamQuestions
AFTER UPDATE NOT FOR REPLICATION
AS
UPDATE Exams
SET ExamModifiedDate = GetDate()
FROM inserted
WHERE inserted.ExamID = Exams.ExamID
C. CREATE TRIGGER trgExamQuestionsModified
ON dbo.ExamQuestions
AFTER UPDATE FOR REPLICATION
AS
UPDATE Exams
SET ExamModifiedDate = GetDate()
FROM inserted
WHERE inserted.ExamID = Exams.ExamID
D. CREATE TRIGGER trgExamQuestionsModified
ON dbo.Exams
AFTER UPDATE NOT FOR REPLICATION
AS
UPDATE Exams
SET ExamModifiedDate = GetDate()
FROM inserted
WHERE inserted.ExamID = Exams.ExamID

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The syntax The DML trigger is created on the ExamQuestions table as it should be. AFTER UPDATE is used to
ensure that the trigger
will only fire after constraints are checked and succeed. In other words, if the UPDATE fails because it does not
meet the constraint checks,
the trigger will not fire. In contrast, the INSTEAD OF trigger will fire even if the UPDATE would violate
constraints since constraints are not
checked.
While replication is not specifically mentioned in the question, you can specify NOT FOR REPLICATION if the
table(s) are involved in replication. The NOT FOR REPLICATION clause indicates that the trigger should not be
executed when a replication agent modifies the table that is
involved in the trigger.

QUESTION 94
Peter works as a Database Administrator for UnrealTech Inc. Management instructs him to create a schema
that is gradually expanded from
one level to another through appropriate modifications. Which of the following approaches will he use to
accomplish the task?

A. Top down approach


B. Bottom up approach
C. Mixed approach
D. Inside-out approach

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In a top-down approach, a schema is created through a series of successive refinements, starting from the first
schema, which is gradually
expanded by using appropriate modifications that increase the detail of the various concepts.
Moving from one level to another, the schema is
modified using some basic transformations called top-down transformation primitives. Answer: B is incorrect. In
a bottom-up approach, the preliminary specifications are broken down into smaller components so that each
component describes a basic fragment of the specifications. These components are then represented by
schemas, some of which may consist
of single concepts. The schemas are later obtained to be integrated together until a final schema is obtained.
Answer: D is incorrect. Inside-out approach can be regarded as a particular type of bottom-up approach. It
begins with the identification
of only a few important concepts and, based on these, the design proceeds, spreading outward 'radially'. First
the concepts nearest to the
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

initial concepts are represented, and a user then moves towards those further away by means of 'navigation'
through the specification.
Answer: C is incorrect. In a mixed approach, the designer decomposes the requirements into a number of
components, as in the
bottom-up approach, but not to the extent where all the concepts are separated. At the same time, a skeleton
schema is defined containing
the main concepts of the application. This skeleton schema gives a unified view of the whole design and helps
the integration of schemas
developed separately. Then the designer examines separately these main concepts and can proceed with
gradual refinements following the
top-down approach or extending a portion with concepts that are not yet represented following the bottom-up
approach.

QUESTION 95
You are the database administrator of a MySQL database server. Your network contains a combination of new
and old (pre-4.1) MySQL clients.
You are configuring a new server for testing purposes. You want to allow connections only by the clients that
have new-format passwords.
Which of the following steps will you take to accomplish the task?

A. Start the server with the --old-password option.


B. Start the server with the --secure-auth option.
C. Start the server with the --enable-named-pipe option.
D. Start the server with the --shared-memory option.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
According to the question, the network contains both new and old clients and you have to allow only the new
clients that support new-format
passwords. In order to accomplish the task, you will have to start the server with the --secure-auth option. This
will cause the server to
reject connection attempts from any client that has a password in the old format. Answer: D and C are
incorrect. These options enable shared memory and named-pipe connection protocols, so that in a Windows
server the local clients can use either of these connections to connect with the server. Answer: A is incorrect.
This option will provide support for the older clients.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 96
Which of the following commands are used to terminate a transaction? Each correct answer represents a
complete solution. Choose all that apply.
A. TRUNCATE
B. DELETE
C. ROLLBACK
D. COMMIT

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D, C, and A

Explanation:
The COMMIT, ROLLBACK, and TRUNCATE commands are used to terminate a transaction. While the first
two do so explicitly, TRUNCATE does it implicitly. Answer: B is incorrect. The DELETE statement is a Data
Manipulation Language (DML) statement that is used to delete records from a table, based on the condition
specified in the WHERE clause. If the WHERE clause is omitted, all records in the table are deleted. The
DELETE statement can be rolled back.
Syntax:
DELETE [FROM] TableName
[WHERE condition];

QUESTION 97
Which of the following refers to the system, processes, and procedures that protect a database from
unintended activities, such as
authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or processes?

A. Database security
B. Encryption
C. Abstraction
D. Referential integrity

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Database security refers to the system, processes, and procedures that protect a database from unintended
activities, such as authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized
individuals or processes. Database security can begin with the process of creating and publishing appropriate
security standards for the database environment. These standards may include specific controls for the

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

various relevant database platforms.


Answer: D is incorrect. Referential integrity is a feature or property that prevents users or applications from
entering inconsistent data
which, when satisfied, requires every value of one column of a table to exist as a value of another column in a
different or the same table.
Answer: C is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database access.
Answer: B is incorrect. Encryption provides an additional security layer, protecting the data from unauthorized
viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.

QUESTION 98
Which of the following is undertaken at any time prior to the logical design, provided that sufficient information
is available regarding system requirements?

A. Application design
B. Prototyping
C. DBMS selection
D. Database planning

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The process involves selection of an appropriate DBMS to support the database system undertaken at any time
prior to the logical design,
provided sufficient information is available regarding system requirements. There are few steps for selecting a
DBMS and they are as follows:
Define terms of reference of study
Shortlist two or three products
Evaluate the product
Recommend selection and produce reports
Answer: B is incorrect. Prototyping refers to the creation of a working model of the database system.
The purpose of Prototyping is to
suggest improvements or even add new features; to identify features of a system that work well, or are
inadequate; to evaluate feasibility of
a particular system design; to clarify a user's requirements. Answer: A is incorrect. Application design is a
design of the user interface and the application programs that use and process the

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

database. Database and application design are parallel activities. Application design includes two important
activities: transaction design and
user interface design.
Answer: D is incorrect. Database planning is a management activity that allows the stages of the database
application to be realized as
efficiently and effectively as possible. It identifies the work to be done and the resources with which to do it.
Database planning is integrated
with the overall IS strategy of the organization.
QUESTION 99
Mark works as a Database Administrator for Techworld Inc. He wants to remove the columns from a table that
are not dependent on the
primary key. Which of the following normal forms will help him accomplish the task?

A. 4 NF
B. 6 NF
C. 5 NF
D. 3 NF

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Third normal form (3NF) is used in database normalization. A table is in 3NF if and only if the relation S (table)
is in second normal form (2NF)
and every non-prime attribute of S is non-transitively dependent on every key of S. Answer: A is incorrect.
Fourth normal form (4NF) is a normal form used in database normalization.
Introduced by Ronald Fagin in 1977,
4NF is the next level of normalization after Boyce-Codd normal form (BCNF). Whereas the second, third, and
Boyce-Codd normal forms are
concerned with functional dependencies, 4NF is concerned with a more general type of dependency known as
a multivalued dependency.
Symbolically, it can be represented as follows:
If A -> > B|C, then A -> B and A -> C
Here, A, B, and C are attributes.
Answer: C is incorrect. Fifth normal form (5NF), also known as Project-join normal form (PJ/NF), is a level of
database normalization
designed to reduce redundancy in relational databases recording multi-valued facts by isolating semantically
related multiple relationships. A
table is said to be in 5NF if and only if every join dependency in it is implied by the candidate keys. Answer: B is
incorrect. Sixth normal form (6NF) is used in database normalization. A relation (table) is in sixth normal form if
and only if it
satisfies no nontrivial join dependencies at all. A join dependency is trivial if and only if at least one of the
projections involved is taken over
the set of all attributes of the relation (table) concerned.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 100
You are a Database Administrator for MySQL database. Users are complaining of slow query execution in a
few tables. You need to ensure
that contents of those tables are accessed more efficiently. You are sure that the table structure and its
contents have no problems. Which of
the following steps will you take to accomplish the task? Each correct answer represents a part of the solution.
Choose two.

A. Perform a table analysis operation.


B. Perform a table repair operation.
C. Perform a table optimization operation.
D. Perform a table check operation.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: A and C

Explanation:
In order to ensure that the contents in a table are accessed more efficiently, perform table analysis and table
optimization operations. A table
analysis updates statistics of distribution of index key values. It helps the optimizer to generate better execution
plans for queries on the
table. A table optimization reorganizes a table so that its contents are accessed more efficiently.
These operations can be performed for the
MyISAM and InnoDB tables.
Answer: D and B are incorrect. Table check and table repair is used for integrity checking and repairing
respectively. It ensures that the
table's structure and contents have no problem.

QUESTION 101
You are modifying a database that is used as a backend for a web site. The web site developers want to
include positional data that can be used by the web site users to determine store locations information that is
stored in the Stores table of the database. You are asked to add a column to the Stores table. What data type
should you use?

A. varchar
B. nvarchar
C. geography
D. GPS

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The geography data type is used to hold spatial data. Geography is a .NET common language runtime (CLR)
data type that can store
ellipsoidal (round-earth) data such as GPS latitude and longitude coordinates. The geometry data type is a
planar spatial data type that is implemented as a common language runtime (CLR) data type in SQL Server.
This
type represents data in a Euclidean (flat) coordinate system.

QUESTION 102
Which of the following statements are correct regarding recovery of the InnoDB tables after a server crash?
Each correct answer represents a complete solution. Choose all that apply.

A. They can only be recovered from the dump files.


B. They are automatically recovered at the server startup.
C. They are recovered only after restarting the server with the innodb_force_recovery option configured.
D. The innodb_force_recovery option opens the InnoDB tables in the read-only mode.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: B and D

Explanation:
In the event of a crash, some InnoDB tables might need repairs. Simply restarting the server may repair the
tables because the InnoDB
storage engine performs auto-recovery as part of its startup sequence. In case auto-recovery does not work,
you need to open the InnoDB
tables in the read-only mode through the innodb_force_recovery option and dump the table to get it recovered
by restarting the server normally and recovering tables from the dump file. Answer: C is incorrect. Automatic
recovery of the InnoDB table is performed as a part of its startup sequence.
Answer: A is incorrect. The InnoDB tables can be recovered automatically from the dump files, from the earlier
backups.

QUESTION 103
Which of the following ensures referential integrity between tables?

A. Foreign key
B. CHECK constraint
C. Index
D. Primary key

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The foreign key ensures referential integrity between tables. A foreign key is a column or combination of
columns used to establish and enforce a relationship between the data in two tables. This relationship is
created by adding a column(s) in one of the tables to refer to the other table's column(s) protected by a
PRIMARY KEY or UNIQUE constraint. This column becomes a foreign key in the first table. A foreign key can
be created by defining a FOREIGN KEY constraint when creating or altering a table.

QUESTION 104
John works as a Database Administrator for www.company.com Inc. The company has a SQL server 2008
database. John wants to define a valid data while adding or updating an entry in a table of a relational
database. Which of the following should he use to accomplish the task?

A. Locking hints
B. Check constraint
C. Stored procedure
D. View

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A check constraint is a condition that defines valid data when adding or updating an entry in a table of a
relational database. A check
constraint is applied to each row in the table. The constraint must be a predicate. It can refer to a single or
multiple columns of the table. The
result of the predicate can be either TRUE, FALSE, or UNKNOWN, depending on the presence of NULLs. If
the predicate evaluates to
UNKNOWN, then the constraint is not violated and the row can be inserted or updated in the table.
This is contrary to the predicates in the
WHERE clauses in the SELECT or UPDATE statements.
Answer: C is incorrect. A stored procedure is a collection of T-SQL statement or a reference to common
language runtime (CLR) method
that can return as well as take the user-supplied parameters. Procedures can be created for permanent use or
for temporary use within a
session as local temporary procedure, or global temporary procedure for temporary use within all sessions.
Answer: D is incorrect. A view is a type of virtual table. The data accessible through a view is not stored in the
database as a distinct
object. Views are created by defining a SELECT statement. The result set of the SELECT statement forms the
virtual table. A user can use this
virtual table by referencing the view name in SQL statements in the same way a table is referenced.
A view does not contain data of its own
but derives (or dynamically displays) data from other tables or views on the basis of the query specified for the
view. The tables from which a

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

view derives data are known as base tables. Operations on a view affect its base tables.
The syntax for creating a view is as follows:
CREATE VIEW <VIEW name> AS
SELECT <attributes>
FROM <Tablename>
WHERE <condition>
Answer: A is incorrect. Locking hints can be particular for individual table references in the INSERT, SELECT,
DELETE, and UPDATE
statements. The hints state the type of locking or row versioning the instance of the Microsoft SQL Server
Database Engine used for the table
data. Table level locking hints are used when a finer control of the types of locks acquired on an object is
required. These locking hints take
priority over the current transaction isolation level for the session.

QUESTION 105
Adam works as a Database Designer for DataOne Inc. The company has a SQL Server database. Adam has to
ensure that either all the databases are updated or none of them are updated, so that the databases remain
synchronized. Which of the following will he use to accomplish the task?

A. Native auditing
B. Two-phase commit
C. Encryption
D. Concurrency control

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A two-phase commit is a feature of transaction processing systems, enabling databases to be returned to the
pre-transaction state if some
error condition occurs. A single transaction can update many different databases. A two-phase commit strategy
is designed to ensure that
either all the databases are updated or none of them, so that the databases remain synchronized. Answer: C is
incorrect. Encryption provides an additional security layer, protecting the data from unauthorized viewing with
the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.
Answer: A is incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be
transferred to a designated security system where the database administrators do not have access. This
ensures a certain level of segregation of duties and provides evidence that the native audit trails were not
modified by authenticated administrators. Answer: D is incorrect. Concurrency control in database management
systems ensures that database transactions are performed concurrently without the concurrency violating the
data integrity of a database. Executed transactions should follow the ACID rules. This mechanism is required to
manage multiple users accessing the same groups of resources with the least possible overhead, either
optimized for a specific task, or general purpose.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 106
Meryl works as a Database Designer for Klone Inc. She wants to create a table named Emp. She issues the
following query:
CREATE Table Emp (id Int UNSIGNED NOT NULL AUTO_INCREMENT PRIMARY KEY name Char(10))
What will happen after executing this query?

A. The query will fail, as the id and name attributes are created in lowercase.
B. The query will execute partially, as it will create the table but will fail to create the attributes.
C. The query will fail because the id and name attributes must be separated by a comma.
D. The query will create a table named Emp.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The query will fail because a comma must separate the the id and name attributes. Executing the following
query will accomplish the task:
CREATE Table Emp (id Int UNSIGNED NOT NULL AUTO_INCREMENT PRIMARY KEY, name Char(10))
Answer: A is incorrect. The id and name attributes can be in lowercase.

QUESTION 107
James works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database.
James has been assigned the task to store information for each object in the database. Which of the following
steps will help him accomplish the task?

A. Identifying the information for objects


B. Object modeling
C. Object identification
D. Identifying the relationships between objects

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Identifying information for objects is the fourth step in database planning where the information for each object
is stored. In a table, there are
four columns that contain different types of information for objects:
1.Categorical column: In this column, data is classified and grouped, and a limited selection of data is stored.
2.Relational or referential column: In this column, a link is established between information in one table and
related information in another table.
3.Identifier column: In this column, each item stored in the table is identified.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

4.Raw data column: In this column, tangible information is stored and is determined by a source that is external
to the database.
Answer: D is incorrect. Identifying relationships between objects is the last step in database planning, which is
the ability to relate
information about various items in the database. Isolated types of information can be stored separately, but the
data can be combined
according to the requirements of the database engine. Identifying the relationship between objects in the design
process necessitates
looking at the tables, determining how the tables are logically related, and adding relational columns to the
tables that establish a link from
one table to another.
Answer: B is incorrect. Object modeling is the third step in database planning in which objects are identified in
the system. A user
should record an object in such a way that it is represented visually in the system. He can use the database
model as a reference during
implementation of the database. Database developers use tools such as pencils, paper, word processing etc.,
as well as create software
programs for data modeling of the database.
Answer: C is incorrect. In the object identification process in database planning, it is necessary to identify the
key objects or entities for
database management. There are generally a few primary objects, and once these are identified, the related
items become visible.

QUESTION 108
Which of the following terms is described in statement below? "It is a collection of conceptual tools for
describing data, data relationship, data semantics, and consistency constraints."

A. Data model
B. Generic Data Model
C. Relational model
D. Entity-Relationship Model

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A data model is a collection of conceptual tools for describing data, data relationship, data semantics, and
consistency constraints. In software
engineering, it is the process of creating a data model by applying formal data model descriptions using data
modeling techniques.
Answer: D is incorrect. The Entity-Relationship Model is a collection of objects called entities and the
relationships between these
objects. Entities in a database are known as attributes. A relationship is an association among several entities.
It is a conceptual
representation of structured data. Entity-relationship modeling is a relational schema database modeling
method that is used in software

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

engineering to produce a type of conceptual data model of a system, often a relational database.
The logical structure of a database can be
expressed graphically by an E-R diagram, which has the following components:
Rectangle: It represents entity sets.
Ellipse: It represents attributes.
Diamond: It represents relationships among entity sets.
Line: It links attributes to entity sets.
Answer: C is incorrect. A relational model uses a collection of tables to represent both data and the relationship
between those data.
Every table has multiple columns, and each column has a unique name. A relational model is an example of a
record-based model. Record-
based models are so named because the database is structured in a fixed format. Each table in the database
contains records of a particular
type and each record type defines a fixed number of fields or attributes. This model is the most widely used
data model, and most database
systems are based on this model. This model is at a lower level of abstraction than the E-R Model. Answer: B is
incorrect. Generic data models are generalizations of conventional data models. They define standardized
general relation
types, together with the kinds of things that may be related by such a relation type. The Generic Data Model is a
pattern where all the
attributes are separated from the object and saved in a different table.

QUESTION 109
Philandrio Inc. is one of the largest drug manufacturing companies in the world. It has many offices worldwide.
Each office has a manpower of approximately 14,000. The managers themselves are employees in the
company. You are building a database for the company's Human Resources Department (HRD). You want to
track the following attributes for each employee, and at the same time, eliminate duplicate entries and minimize
data storage wherever possible.
FirstName
MiddleName
LastName
EmployeeIdentityNumber
Address
Date_ of_ Hire
Department
Salary
ManagerIdentityNumber
Which of the following is the appropriate table detail sufficient to track the above attributes, correctly and
efficiently?

A. Only one table, Employee


B. Three tables, Employee, Manager, and a table to link both these entities
C. Two tables, Employee and Manager
D. Either two or three tables

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
Only one table is sufficient to keep track of all the above attributes of each employee, because all these
attributes refer to the Employee
entity. However, there can be many employees working under one manager, which requires a one- to-many
relationship between Manager
and Employee.
To retrieve the name of the manager of a particular employee, a self join should be performed. A self join is a
join of a table to itself. This table appears twice in the FROM clause and is followed by table aliases that qualify
column names in
the join condition.
Example:
SELECT A.EmployeeIdentityNumber, A.LastName, B.LastName FROM Employees A, Employees B
WHERE A.ManagerIdentityNumber=B.EmployeeIdentityNumber;
QUESTION 110
You work as a Database Administrator for Softech Inc.The company has a database that contains a table
named Emp. The Emp table has the EmpId, Name, Department, and Designation attributes. Recently, the table
was modified by adding the Phone attribute. Some employees have more than one phone number.

Which of the following statements is true about the Emp table?

A. It violates 1NF.
B. It violates 2NF.
C. It violates 3NF.
D. It does not violate any normal form.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
The table violates 1NF, as 1NF states that each column in a row must hold a single value. But in this case, the
phone attribute at some places
is having more than one value. Therefore, in order to make it in 1NF, you will have to create a separate table
with Name, Phone1, and Phone2
as the attributes.

QUESTION 111
You work as an Application Developer for Nero Inc. You want to instruct the DBMS to set the transaction
isolation level so that when a user updates a table in the database, other users cannot read the value at the
same time. Which of the following methods will you use to define the transaction level?

A. setTransactionIsolation()
B. isClosed()
C. getTransactionIsolation()
D. supportsTransactions()

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The setTransactionIsolation() method of the Connection interface takes an integer as a parameter and sets the
transaction isolation level.
There are five levels of transaction isolation levels provided by JDBC 2.0. The higher the transaction level, the
more care is taken to avoid
database conflicts. On the other hand , the higher the level of isolation, the slower the application executes (due
to increased locking
overhead and decreased concurrency between users). The developer must balance the need for performance
with the need for data
consistency when making a decision about what isolation level to use. However, the level that can actually be
supported depends on the
capabilities of the underlying DBMS.
The highest transaction isolation level specifies that if one transaction is operating on a database, no other
transaction can access that part
of the database.
Answer: C is incorrect. The getTransactionIsolation() method returns the current isolation mode of the
transaction associated with the
Connection object.
Answer: B is incorrect. The isClosed() method of the Connection object returns a Boolean true if the connection
to the database is
closed, and a Boolean false if the database connection is currently open. Answer: D is incorrect. The
supportsTransactions() method of the DatabaseMetaData interface is used to determine whether a given
database supports the use of transactions or not. It returns a Boolean true if the database supports a
transaction and a Boolean false if it does not.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 112
You work as a Database Designer for Realtech Inc. You want to create two tables, Product and Order, such
that a row in the Order table does not exist without a corresponding row in the Product table. The structure of
the Product and Order tables with their respective columns is given below:
Product
ProductID
ProductNumber
Date_of_manufacturing
SupplierID
ProductPrice
ProductQty

Order
OrderID
OrderDate
OrderQuantity
OrderPrice
Based on this information, while maintaining the integrity of this rule, what will you do to accomplish the task?

A. Create the Product table, and then create the Order table. Create a third table that will be used to join the
Product and Order tables by using FOREIGN KEY constraints.
B. Create the Product table, and then create the Order table that has a primary key referenced by the foreign
key in the Product table.
C. Create the Product table, and then create the Order table. Create a primary key in both the tables and form
a one-to-one relationship.
D. Create the Product table, and then create the Order table that has a foreign key constraint that references
the primary key in the Product table.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The Product table and the Order table will have a one-to-many relationship. To form this relationship, you will
have to add a column in the
Order table, and create a foreign key constraint on that column such that it references the primary key in the
Product table. Suppose
ProductID is designated as the primary key of the Product table, then it will have to be migrated to the Order
table to maintain the referential
integrity constraint.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 113
Which of the following are the correct statements of using the Flashback Query feature in Oracle? Each correct
answer represents a complete solution. Choose all that apply.

A. CREATE TABLE AS SELECT AS OF


B. SELECT AS OF
C. CREATE TABLE AS SELECT
D. INSERT INTO (SELECT )

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: A and B

Explanation:
You perform a Flashback Query by using a SELECT statement with an AS OF clause. You use a Flashback
Query to retrieve data as it existed at
some time in the past. The query explicitly references a past time by means of a timestamp or SCN.
It returns committed data that was current
at that point in time. To use the results of a Flashback Query in a DDL or DML statement that affects the
current state of the database, use an
AS OF clause inside the INSERT or CREATE TABLE AS SELECT statement. Answer: C is incorrect. The
CREATE TABLE AS SELECT command is used to create a table with data and structure copied from another
table. Since there is no use of the AS OF clause in this statement, this command is not a Flashback Query
command; instead it's the normal
CREATE TABLE command.
Answer: D is incorrect. INSERT INTO (SELECT ) is not a Flashback Query because the AS OF clause is not
used in this command. This
command will select data from a table and insert into another table on which the INSERT INTO clause is
based. Flashback Query does support
insert commands, but the correct usage is INSERT INTO (SELECT AS OF).

QUESTION 114
Which of the following are the steps of database planning life cycle? Each correct answer represents a part of
the solution. Choose three.

A. Application Design
B. Data conversion and loading
C. Conceptual database design
D. Operational Maintenance

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: A, D, and B

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
There are eleven steps in the database planning life cycle, which are as follows:
1.Database planning
2.System definition
3.Requirements collection and analysis
4.Database design
5.DBMS selection
6.Application design
7.Prototyping
8.Implementation
9.Data conversion and loading
10.Testing
11.Operational maintenance

QUESTION 115
You manage a SQL Server 2008 server that hosts a database named Sales. Unauthorized odifications to some
tables within the Sales database have resulted in some views no longer working. You need to implement a
method that will ensure that all modifications to any objects with the Sales database are logged. What should
you do?

A. Create a DDL trigger with database scope.


B. Create a DML trigger with database scope.
C. Create a DML trigger with server scope.
D. Create a DDL trigger with server scope.
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A Database Definition Language (DDL) trigger with database scope can be used to audit all DDL statements on
any database objects. A DDL
statement (such as CREATE, ALTER, and drop) is used to create, alter, or drop (remove or delete) objects
within the database. Once the event
is captured, the DDL trigger can be programmed to log events, or if desired, even roll back unauthorized
events.
Answer: D is incorrect. A Database Definition Language (DDL) trigger with server scope can be used to audit all
DDL statements at the
server level, such as the creation, modification, or deletion of a database. However, DDL triggers at the server
level will not capture DDL
statements executed on objects within a database.
Answer: B and C are incorrect. Data Manipulation Language (DML) statements (such as UPDATE, INSERT, or
DELETE) are used to
update, insert, or delete data within a database. A DML trigger will not capture modifications to the objects.
Further, DML triggers would be
created with database scope since it works on data within a database.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 116
Which of the following are considered limitations of the legacy LOB implementation?

A. Legacy LOBs are not available in a RAC environment.


B. DML access is multi-threaded.
C. User-defined version control
D. Randomly writing data to LOBs was preferable to reading LOB data.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
LOBs were first implemented in Oracle8i, and the assumptions at the time were as follows:
LOBs would not be more than a few megabytes in size.
LOBs were typically "write-once, read-many" types of objects.
There would be no OLTP access.
Undo retention was difficult to manage using the initialization parameters PCTVERSION and RETENTION.
Chunk sizes are uniform; in other words, data was expected to be written in the same size blocks, and each
block was 32K or less.
Multiple concurrency in a RAC environment was not anticipated. Versioning was not an important requirement,
and user-defined version control solutions were not optimal.
These assumptions no longer apply in an environment with XML documents and images that are gigabytes in
size and are frequently read and
written to, in a RAC environment no less.
Large amounts of application data (much greater than 4K bytes in size) can be classified into three areas:
structured, semi-structured, and
unstructured. You may have all three types in a database, or even within the same table. For example, XML
documents are highly structured
and may be several gigabytes in size; on the other end of the spectrum, unstructured image data may require
hundreds of megabytes or
even gigabytes for each image. The recent enhancements to LOBs, SecureFile LOBs, makes processing these
objects even more scalable,
even in a RAC environment.
Answer: D is incorrect. Random writes to LOB were expected to be rare or non-existent; only sequential reads
were expected after a
LOB was first written.
Answer: B is incorrect. Legacy LOBs are not efficient at concurrent DML access; locking usually occurs at the
LOB level.
Answer: A is incorrect. Legacy LOBs are available in a RAC environment, but high concurrency writes are very
inefficient in a RAC
environment.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 117
Which of the following properties of the database transaction has been defined in the given statement: "Either
all the changes or no changes have been made in the database."

A. Durability
B. Atomicity
C. Consistency
D. Isolation

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Atomicity ensures that a transaction is either committed (i.e., all the changes made to the database are
permanently saved) or rolled back (i.e., no changes have been made, and the database is recovered to its
original state).Answer: D is incorrect. The isolation property ensures that a transaction is isolated from any
outside operation. This means that data in a transaction cannot be viewed in its intermediate state.
Answer: A is incorrect. The durability property ensures that once the user has been notified about the success
of the transaction, the transaction will continue and will not revert. This implies that the transaction has been
checked for all data integrity constraints, and no constraint has been found violated.Answer: C is incorrect. The
consistency property ensures that the database remains in a valid state before and after the transaction is
committed. This means that a transaction cannot violate business rules, or integrity constraints, of the
database. For example, if an integrity constraint states that an account cannot be debited if the balance is less
than $500, then any transaction violating this rule will be aborted.

QUESTION 118
You work as a Database Designer for Allen Inc. You are designing the database of a company that has several
divisions (e.g. Spare Parts division). Each division has several departments (e.g. Quality Control department),
and every department has several employees. What will be the relationship between the two entities, namely,
division and employee, if you model the database?

A. No direct relationship
B. One-to-one
C. Many-to-many
D. One-to-many

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Explanation:
There is no direct relationship between the two entities: division and employee. In the given scenario, the
relationship is as follows: There exists a one-to-many relationship between division and department. There
exists a one-to-many relationship between department and employee. Answer: B is incorrect. In a one-to-one
relationship, every instance of the first entity has only one instance of the second entity. For example, in an
organization, every department such as Sales has only one Senior Manager, and all the other employees in the
Sales department work under him. This relationship between the Sales department and the Senior Manager is
one-to-one. Answer: D is incorrect. In a one-to-many relationship, every instance of the first entity can have
more than one instance of the second entity, but for the instance of the second entity, there is exactly one
instance of the first entity. For example, the relationship between Department and Employee is one-to-many.
There are many employees working in a department (e.g. Sales). Answer: C is incorrect. In a many-to-many
relationship, every instance of the first entity can have multiple instances of the second entity, and every
instance of the second entity can also have more than one instance of the first entity. For example, a customer
can purchase more than one product, and a product can also be sold to several customers.

QUESTION 119
Roger is the HR Manager of Neon Inc. He wants to generate a report of all the employees working in
Department ID 30 from the Emp table on the following attributes:
Fname
Lname
Salary
All the records should be sorted in ascending order of the Lname attribute. Which of the following queries will
he use to get the required output?

A. SELECT Fname Lname Salary FROM Emp WHERE DeptId=30 ORDER BY Lname
B. SELECT Fname, Lname, Salary FROM Emp ORDER BY Lname WHERE DeptId=30
C. SELECT Fname Lname Salary FROM Emp ORDER BY Lname WHERE DeptId=30
D. SELECT Fname, Lname, Salary FROM Emp WHERE DeptId=30 ORDER BY Lname

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
The first part of the query, i.e. SELECT Fname, Lname, Salary selects the Fname, Lname, and Salary columns
(attributes). The second part, i.e. FROM Emp selects the Emp table, and the third part, i.e. WHERE DeptId=30
specifies the condition that DeptId is 30. The ORDER BY clause is used to sort the name in ascending order of
Lname.In the ORDER BY clause, ascending is the default order. Therefore, if no order is given, the column is
sorted in ascending order. Answer: C is incorrect. The first part, i.e. SELECT Fname Lname Salary has an
error, as each column name must be separated by a comma, and the ORDER BY clause should be after the
WHERE clause and not before it.
Answer: B is incorrect. The ORDER BY clause should be used after the WHERE clause and not before it.
Answer: A is incorrect. The first part of the query, i.e. SELECT Fname Lname Salary is erroneous, as each
column name must be separated by a comma.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 120
Merlyn works as a Database Administrator for DOW Inc. She is currently designing a database. She wants to
break down the preliminary specifications into smaller components so that each component describes a basic
fragment of the specifications. Which of the following approaches is she using?

A. Inside-out approach
B. Top-down approach
C. Mixed approach
D. Bottom-up approach

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In a bottom-up approach, the preliminary specifications are broken down into smaller components so that each
component describes a basic fragment of the specifications. These components are then represented by
schemas, some of which may consist of single concepts. The schemas are later obtained to be integrated
together until a final schema is obtained. Answer: C is incorrect. In a mixed approach, the designer
decomposes the requirements into a number of components, as in the bottom-up approach, but not to the
extent where all the concepts are separated. At the same time, a skeleton schema is defined containing the
main concepts of the application. This skeleton schema gives a unified view of the whole design and helps the
integration of schemas developed separately. Then the designer examines separately these main concepts and
can proceed with gradual refinements following the top-down approach or extending a portion with concepts
that are not yet represented following the bottom-up approach. Answer: A is incorrect. Inside-out approach can
be regarded as a particular type of bottom-up approach. It begins with the identification of only a few important
concepts and, based on these, the design proceeds, spreading outward 'radially'. First the concepts nearest to
the initial concepts are represented, and a user then moves towards those further away by means of
'navigation' through the specification.
Answer: B is incorrect. In a top-down approach, a schema is created through a series of successive
refinements, starting from the first schema, which is gradually expanded by using appropriate modifications that
increase the detail of the various concepts. Moving from one level to another, the schema is modified using
some basic transformations called top-down transformation primitives.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 121
John works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database.
John wants to insert records in a table where the database is structured in a fixed format. Which of the following
data models will he use to accomplish the task?

A. Object relational data model


B. Entity-Relationship Model
C. Network data model
D. Relational model

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
A relational model uses a collection of tables to represent both data and the relationship between those data.
Every table has multiple columns, and each column has a unique name. A relational model is an example of a
record-based model. Record-based models are so named because the database is structured in a fixed format.
Each table in the database contains records of a particular type and each record type defines a fixed number of
fields or attributes. This model is the most widely used data model, and most database systems are based on
this model. This model is at a lower level of abstraction than the E-R Model.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: B is incorrect. The Entity-Relationship Model is a collection of objects called entities and the
relationships between these objects. Entities in a database are known as attributes. A relationship is an
association among several entities. It is a conceptual representation of structured data. Entity- relationship
modeling is a relational schema database modeling method that is used in software engineering to produce a
type of conceptual data model of a system, often a relational database. The logical structure of a database can
be expressed graphically by an E-R diagram, which has the following components:
Rectangle: It represents entity sets.
Ellipse: It represents attributes.
Diamond: It represents relationships among entity sets.
Line: It links attributes to entity sets.
Answer: A is incorrect. An object relational data model (ORD) is similar to a relational data model, but with an
object-oriented database model. Objects, classes, and inheritance are directly supported in database schemas
and in the query language.
Answer: C is incorrect. The network data model contains logical information such as connectivity relationships
among nodes and links, directions of links, and costs of nodes and links. A node represents an object of
interest and a link represents a relationship between two nodes.

QUESTION 122
You are a Database Administrator of MySQL database. Few days back, your server crashed. Now, it is up and
online. You need to check the integrity of various tables used in the database. You need to issue the CHECK
TABLE command. For which of the following tables will this command work? Each correct answer represents a
complete solution. Choose two.

A. FEDERATED
B. MyISAM
C. MERGE
D. InnoDB

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:
Answer: D and B

Explanation:
The CHECK TABLE command works for the InnoDB and MyISAM tables. CHECK TABLE is a built-in tool
provided by MySQL for checking tables before any attempts to repair the database. It checks tables for
structural problems and ensures that no table data are corrupt. It is a SQL command that is used in conjunction
with the REPAIR TABLE and OPTIMIZE TABLE commands to check, repair, and optimize tables in a database
for optimal performance. It does not require that the database server be shut down. Instead, since this
command can only be sent to the server via a client, the server must be running throughout the process.
Answer: C and A are incorrect. The CHECK TABLE command does not work for the MERGE and
FEDERATED tables.

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

QUESTION 123
Mark works as a Database Administrator for DataOneWorld Inc. Management instructs him to provide an
additional security layer to the database to prevent unauthorized viewing of data with the help of an algorithm
called cipher. Which of the following will help him to accomplish the task?

A. Native auditing
B. Authentication
C. Encryption
D. Abstraction

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Explanation:
Encryption provides an additional security layer, protecting the data from unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.
Answer: B is incorrect. Authentication is the process of verifying the identity of a user or software connecting to
a database. During the process of authentication, the user must submit sufficient information validated either by
the database itself, or by the operating system within which the database is installed.
Answer: D is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific database API. A user can use generic methods to access a database. In order to
perform database abstraction, a user requires additional code or libraries. The benefit of database abstraction
is that it provides a uniform interface for database access.
For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

Answer: A is incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be
transferred to a designated security system where the database administrators do not have access. This
ensures a certain level of segregation of duties and provides evidence that the native audit trails were not
modified by authenticated administrators.

QUESTION 124
Suzanne works as a Database Designer for DataOneWorld Inc. She is assigned the task of ecomposing the
components of a database, but she has to ensure that all the components are decomposed to only some
extent. Which of the following approaches will she use to accomplish the task?

A. Mixed approach
B. Inside-out approach
C. Top-down approach
D. Bottom-up approach

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Explanation:
In a mixed approach, the designer decomposes the requirements into a number of components, as in the
bottom-up approach, but not to the extent where all the concepts are separated. At the same time, a skeleton
schema is defined containing the main concepts of the application. This skeleton schema gives a unified view
of the whole design and helps the integration of schemas developed separately. Then the designer examines
separately these main concepts and can proceed with

For interactive and self-paced preparation of exam 98-364, try our practice exams. Practice exams also include
self assessment and reporting features! www.selftestengine.com

gradual refinements following the top-down approach or extending a portion with concepts that are not yet
represented following the bottom-up approach.
Answer: B is incorrect. Inside-out approach can be regarded as a particular type of bottom-up approach. It
begins with the identification of only a few important concepts and, based on these, the design proceeds,
spreading outward 'radially'. First the concepts nearest to the initial concepts are represented, and a user then
moves towards those further away by means of 'navigation' through the specification.
Answer: D is incorrect. In a bottom-up approach, the preliminary specifications are broken down into smaller
components so that each component describes a basic fragment of the specifications. These components are
then represented by schemas, some of which may consist of single concepts. The schemas are later obtained
to be integrated together until a final schema is obtained. Answer: C is incorrect. In a top-down approach, a
schema is created through a series of successive refinements, starting from the first schema, which is gradually
expanded by using appropriate modifications that increase the detail of the various concepts. Moving from one
level to another, the schema is modified using some basic transformations called top-down transformation
primitives.

http://www.gratisexam.com/

You might also like