Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
1. Data security threats include
A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above
E. None of the above
Advertisement
2. An operation that will increase the length of a list is
A. Insert
B. Look-up
C. Modify
D. All of the above
E. None of the above
Advertisement
3. In SQL, which command is used to add a column/integrity constraint to a table
A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE
E. None of the above
Advertisement
4. In SQL, which command(s) is(are) used to enable/disable a database trigger?
A. ALTER TRIGGER
B. ALTER DATABASE
C. ALTER TABLE
D. MODIFY TRIGGER
E. All of the above
Advertisement
5. In a relational schema, each tuple is divided into fields called
A. Relations
B. Domains
C. Queries
D. All of the above
E. None of the above
Advertisement
Warning: Undefined variable $in_same_cat in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27
Warning: Undefined variable $excluded_categories in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27