πŸ“Š MySQL
Q. A stored procedure is invoked using the statement __________.
  • (A) CALL
  • (B) RETURN
  • (C) SEE
  • (D) INVOKE
πŸ’¬ Discuss
βœ… Correct Answer: (A) CALL
πŸ“Š MySQL
Q. Triggers and events are not invoked automatically by the server.
  • (A) False
  • (B) True
  • (C) NA
  • (D) NA
πŸ’¬ Discuss
βœ… Correct Answer: (A) False
πŸ“Š MySQL
Q. The security context when a user creates a stored program that accesses sensitive data but forgets that other people who can invoke the object have the same access is __________
  • (A) illegal
  • (B) fare
  • (C) bad
  • (D) good
πŸ’¬ Discuss
βœ… Correct Answer: (C) bad
πŸ“Š MySQL
Q. The datatype that stores the longest length of strings is ______________.
  • (A) VARCHAR
  • (B) TEXT
  • (C) CHAR
  • (D) TINYTEXT
πŸ’¬ Discuss
βœ… Correct Answer: (B) TEXT
πŸ“Š MySQL
Q. What is the best datatype for a column that is expected to store values up to 2 million?
  • (A) BIGINT
  • (B) SMALLINT
  • (C) TINYINT
  • (D) MEDIUMINT
πŸ’¬ Discuss
βœ… Correct Answer: (A) BIGINT
πŸ“Š MySQL
Q. MySQL does not provide a date type that has an optional time part.
  • (A) False
  • (B) True
  • (C) NA
  • (D) NA
πŸ’¬ Discuss
βœ… Correct Answer: (B) True
πŸ“Š MySQL
Q. Which variable checks for availability of SSL support?
  • (A) avail_ssl
  • (B) ssl_avail
  • (C) have_ssl
  • (D) has_ssl
πŸ’¬ Discuss
βœ… Correct Answer: (C) have_ssl
πŸ“Š MySQL
Q. The grant table scope columns that is case insensitive is _____________.
  • (A) Password
  • (B) Db
  • (C) Host
  • (D) User
πŸ’¬ Discuss
βœ… Correct Answer: (C) Host
πŸ“Š MySQL
Q. The TLS protocol is _____________.
  • (A) transparent level security
  • (B) transparent layer security
  • (C) transport level security
  • (D) transport layer security
πŸ’¬ Discuss
βœ… Correct Answer: (D) transport layer security
πŸ“Š MySQL
Q. How many files does each end of a client/server connection including SSL support use to set up secure communications?
  • (A) 3
  • (B) 2
  • (C) 1
  • (D) 0
πŸ’¬ Discuss
βœ… Correct Answer: (A) 3