MS SQL Server 2014 Quiz

Reviewed by Samy Boulos
Samy Boulos, MSc (Computer Science) |
Data Engineer
Review Board Member
Samy Boulos is an experienced Technology Consultant with a diverse 25-year career encompassing software development, data migration, integration, technical support, and cloud computing. He leverages his technical expertise and strategic mindset to solve complex IT challenges, delivering efficient and innovative solutions to clients.
, MSc (Computer Science)
By Cripstwick
C
Cripstwick
Community Contributor
Quizzes Created: 635 | Total Attempts: 842,101
| Attempts: 281 | Questions: 10 | Updated: Dec 8, 2025
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. What happens to local temporary tables when connection is closed? They are...

Explanation

When a connection is closed, local temporary tables are deleted. This means that any data stored in these tables is removed and the tables themselves no longer exist. This is because local temporary tables are only accessible within the current session or connection, and once the connection is closed, they are no longer needed and are therefore deleted to free up resources.

Submit
Please wait...
About This Quiz
MS SQL Server 2014 Quiz - Quiz

Ready to evaluate your knowledge of Microsoft SQL Server 2014? This quiz covers key topics such as local vs. Global temporary tables, bulk copy tools, SQL functions, system behaviors, and special SQL Server commands. You’ll work through real scenarios involving data movement, table creation, and function evaluation—helping you understand how... see moreSQL Server manages data efficiently. By the end, you’ll be confident applying SQL Server 2014 features, troubleshooting common issues, and optimizing database operations in practical environments.
see less

2.
You may optionally provide this to label your report, leaderboard, or certificate.
2. Which of these tools can be used to copy a large amount of data in an SQL?

Explanation

Bulk copy is the correct answer because it is a tool that can be used to copy a large amount of data in SQL. It is specifically designed for efficient and fast copying of data between SQL Server databases. The Bulk Copy Program (BCP) utility is commonly used to import or export large volumes of data in a tabular format. It provides high-performance data transfer and supports various data formats, making it an ideal choice for handling large data copying tasks in SQL.

Submit
3. Which of these cannot be checked by the sign function?

Explanation

The sign function is a mathematical function that returns the sign of a number. It can determine whether a number is positive, negative, or zero. However, it cannot check whether a value is an alphabet or not, as alphabets are not numerical values. Therefore, the sign function cannot be used to determine whether a value is an alphabet or not.

Submit
4. What type of table is created by ## commands?

Explanation

Global temporary tables are created using ## commands. These tables are accessible to all users and are stored in the tempdb database. They are created for a specific session or connection and are automatically dropped when the session or connection is closed. Global temporary tables are useful for storing temporary data that needs to be shared among multiple users or sessions.

Submit
5. Which of these can be applied to a column to limit the data that can be placed in it?

Explanation

A check constraint can be applied to a column to limit the data that can be placed in it. It is a rule defined on a single column or a group of columns that restricts the values that can be inserted or updated in the column(s). The check constraint ensures that only values satisfying the specified condition are allowed in the column, preventing any invalid or inappropriate data from being stored.

Submit
6. How many authentication modes are there in an SQL server?

Explanation

There are two authentication modes in an SQL server. This means that users can either authenticate using Windows authentication mode or SQL Server authentication mode. Windows authentication mode allows users to log in using their Windows credentials, while SQL Server authentication mode requires users to provide a username and password specific to the SQL Server.

Submit
7. Which of these allows an admin to monitor events in an SQL server?

Explanation

SQL Profiler is a tool that allows an admin to monitor events in an SQL server. It provides a graphical interface to capture and analyze events that occur within the SQL server, such as queries, stored procedures, and database transactions. The admin can use SQL Profiler to track performance issues, identify and troubleshoot problems, and optimize the server's performance. It helps in understanding the behavior of the SQL server by capturing and analyzing the events in real-time or from saved trace files.

Submit
8. All of these are types of trigger except...

Explanation

The given options - Update, Instead of, Insert, and Pull - are all related to triggers in databases. Update and Insert are common types of triggers used to perform actions before or after updating or inserting data into a table. Instead of triggers are used to replace the default behavior of a DML statement. However, Pull is not a type of trigger. It is likely an unrelated term or a distractor in this context.

Submit
9. What is the maximum level a recursive stored procedure can reach?

Explanation

A recursive stored procedure is a procedure that calls itself repeatedly until a certain condition is met. The maximum level that a recursive stored procedure can reach refers to the maximum number of times the procedure can call itself before reaching a termination condition. In this case, the maximum level is 32, meaning that the procedure can call itself up to 32 times before it must stop.

Submit
10. Which of these is used to compare only strings with strings?

Explanation

The === operator is used to compare only strings with strings. This operator compares both the value and the data type of the operands. It returns true if the operands are equal in both value and data type, and false otherwise. The other options, == and =, are used for general comparison and assignment respectively, and do not specifically compare only strings with strings. The option ==== does not exist in programming languages and is not a valid comparison operator.

Submit
Ă—
Saved
Thank you for your feedback!
View My Results
Samy Boulos |MSc (Computer Science) |
Data Engineer
Samy Boulos is an experienced Technology Consultant with a diverse 25-year career encompassing software development, data migration, integration, technical support, and cloud computing. He leverages his technical expertise and strategic mindset to solve complex IT challenges, delivering efficient and innovative solutions to clients.
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What happens to local temporary tables when connection is closed? They...
Which of these tools can be used to copy a large amount of data in an...
Which of these cannot be checked by the sign function?
What type of table is created by ## commands?
Which of these can be applied to a column to limit the data that can...
How many authentication modes are there in an SQL server?
Which of these allows an admin to monitor events in an SQL server?
All of these are types of trigger except...
What is the maximum level a recursive stored procedure can reach?
Which of these is used to compare only strings with strings?
Alert!

Advertisement