Computer Science - Database Systems

Exercise :: Database Systems - Section 2

1. 

Data security threats include

A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above
E. None of the above

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

2. 

An operation that will increase the length of a list is

A. Insert
B. Look-up
C. Modify
D. All of the above
E. None of the above

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

3. 

In SQL, which command is used to add a column/integrity constraint to a table

A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE
E. None of the above

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

4. 

In SQL, which command(s) is(are) used to enable/disable a database trigger?

A. ALTER TRIGGER
B. ALTER DATABASE
C. ALTER TABLE
D. MODIFY TRIGGER
E. All of the above

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

5. 

In a relational schema, each tuple is divided into fields called

A. Relations
B. Domains
C. Queries
D. All of the above
E. None of the above

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

1 2 3 4 5 6 7 8 9 10 Next »