Home / CSE / Database Systems :: Section 2

CSE :: Database Systems

  1. Data security threats include

  2. A.
    hardware failure
    B.
    privacy invasion
    C.
    fraudulent manipulation of data
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. An operation that will increase the length of a list is

  4. A.
    Insert
    B.
    Look-up
    C.
    Modify
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. In SQL, which command is used to add a column/integrity constraint to a table

  6. A.
    ADD COLUMN
    B.
    INSERT COLUMN
    C.
    MODIFY TABLE
    D.
    ALTER TABLE
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. In SQL, which command(s) is(are) used to enable/disable a database trigger?

  8. A.
    ALTER TRIGGER
    B.
    ALTER DATABASE
    C.
    ALTER TABLE
    D.
    MODIFY TRIGGER
    E.
    All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. In a relational schema, each tuple is divided into fields called

  10. A.
    Relations
    B.
    Domains
    C.
    Queries
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. In SQL, which command is used to changes data in a table?

  12. A.
    UPDATE
    B.
    INSERT
    C.
    BROWSE
    D.
    APPEND
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. What name is given to the collection of facts, items of information or data which are related in some way?

  14. A.
    Database
    B.
    Directory information
    C.
    Information tree
    D.
    Information provider
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. In a large DBMS

  16. A.
    each user can "see" only a small part of the entire database
    B.
    each user can access every sub¬schema
    C.
    each subschema contains every field in the logical schema
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. Which of the following command(s) is(are) used to recompile a stored procedure in SQL?

  18. A.
    COMPILE PROCEDURE
    B.
    ALTER PROCEDURE
    C.
    MODIFY PROCEDURE id) All of the above
    D.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. Internal auditors should review data system design before they are

  20. A.
    developed
    B.
    implemented
    C.
    modified
    D.
    All of the above
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum