Database Systems – Section 2

1. Data security threats include

A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above
E. None of the above

Correct Answer: B. privacy invasion

2. An operation that will increase the length of a list is

A. Insert
B. Look-up
C. Modify
D. All of the above
E. None of the above

Correct Answer: A. Insert

3. In SQL, which command is used to add a column/integrity constraint to a table

A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE
E. None of the above

Correct Answer: D. ALTER TABLE

4. In SQL, which command(s) is(are) used to enable/disable a database trigger?

A. ALTER TRIGGER
B. ALTER DATABASE
C. ALTER TABLE
D. MODIFY TRIGGER
E. All of the above

Correct Answer: A. ALTER TRIGGER

5. In a relational schema, each tuple is divided into fields called

A. Relations
B. Domains
C. Queries
D. All of the above
E. None of the above

Correct Answer: B. Domains

Leave A Comment?

17 − 5 =