Exercise: Database Systems

Questions for: Database Systems

In a relational schema, each tuple is divided into fields called
A:
Relations
B:
Domains
C:
Queries
D:
All of the above
Answer: B
No answer description is available. Let's discuss.
In SQL, which command is used to add a column/integrity constraint to a table
A:
ADD COLUMN
B:
INSERT COLUMN
C:
MODIFY TABLE
D:
ALTER TABLE
Answer: D
No answer description is available. Let's discuss.
An operation that will increase the length of a list is
A:
Insert
B:
Look-up
C:
Modify
D:
All of the above
Answer: A
No answer description is available. Let's discuss.
Data security threats include
A:
hardware failure
B:
privacy invasion
C:
fraudulent manipulation of data
D:
All of the above
Answer: B
No answer description is available. Let's discuss.
If a calculation is embedded in a form
A:
the result of the calculations are stored with the form
B:
the calculations are stored with the form
C:
the result of the calculations are printed in report
D:
All of the above
Answer: B
No answer description is available. Let's discuss.
Ad Slot (Above Pagination)
Quiz