Computer Science - Database Systems

Exercise : Database Systems - Section 2
1.
Data security threats include
hardware failure
privacy invasion
fraudulent manipulation of data
All of the above
None of the above
Answer: Option
Explanation:
No answer description is available. Let's discuss.

2.
An operation that will increase the length of a list is
Insert
Look-up
Modify
All of the above
None of the above
Answer: Option
Explanation:
No answer description is available. Let's discuss.

3.
In SQL, which command is used to add a column/integrity constraint to a table
ADD COLUMN
INSERT COLUMN
MODIFY TABLE
ALTER TABLE
None of the above
Answer: Option
Explanation:
No answer description is available. Let's discuss.

4.
In SQL, which command(s) is(are) used to enable/disable a database trigger?
ALTER TRIGGER
ALTER DATABASE
ALTER TABLE
MODIFY TRIGGER
All of the above
Answer: Option
Explanation:
No answer description is available. Let's discuss.

5.
In a relational schema, each tuple is divided into fields called
Relations
Domains
Queries
All of the above
None of the above
Answer: Option
Explanation:
No answer description is available. Let's discuss.