Choose a topic to test your knowledge and improve your SQL skills
The return value from operations returning a row count is ______
Which mode of search is the search string parsed into words and the search looks for rows?
The indicator of presence/absence of a word in search is used in the mode _____
The numbers that are prefixed with ‘0x’ are in base ______
What is the escape sequence for carriage return?
What is the datatype for single precision floating point number?
RTF refers to ________
The function returning an array of row values is ______________
The function returning reference to hash of row values is ______________
fetchrow_hashref() returns reference to hash of row values keyed by _____
The function returning reference to array of row values is ______
Illegal values converted to the appropriate ‘zero’ value for ________
The column attribute provides unique numbers for identification is _______
The module that links DBI to the web is ________
CGI stands for ________
Which line is written at the top of the script to write a Perl script using CGI.pm?
By default, the AUTO_INCREMENT sequences begin at __________
What does the expression ’12 DIV 5′ evaluate to?
What does ‘abc’ || ‘xyz’ result in if the PIPES_AS_CONCAT is disabled?
The AUTO_INCREMENT column attribute is best used with ______________
The datatype best suited to store currency values is ______________
The output from PHP is __________
PHP variables are preceded by __________
The datatype best suited to store currency values is __________
What returns a result to the client?
What is defined to execute when the table is modified only?
Which statement is used to produce a stored function?
The number of values that can be returned from a given stored function is ______________
The statement used to create a trigger is ______________
In PHP, if $a represents an array with numeric indices, how is the first element accessed?
In PHP, which operator is used to access property of an object?
DBI scripts are located in the directory ______________
A stored program associated with a schedule is _____________
The line used to turn on the event scheduler is ______________
What is the creation of a stored program similar to?
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________
What is the maximum number of indexes on MyISAM table?
The hub of a MySQL installation is _______
The tool for copying databases is _______
Which statement is used to check how MySQL would execute a SELECT query?
What is used to perform an analysis of key values by the server?
The function used to convert an int to string is ________
The function used to convert a string to an int is ____
Without LOCAL, LOAD DATA is ____
The log in which data changes received from a replication master server are written are ____
Which of these is the metadata log?
The max_binlog_cache_size system variable has default size _____
The system variable controls the size of the table cache _______
Which of these exports table definitions and contents?
MySQL uses security based on ACL which stands for ______