REMOVE
DELETE
DROP
DEL
C. DROP
Strings
Numbers
Both A. and B.
None of the above
Average value
Largest value
Smallest value
Number of rows
To retrieve data
To fetch data
Both A. and B.
None of the above
There must be the same number of columns in each table and the same order in every select statement.
It is desirable that the columns have similar or compatible data types.
Both SELECT statements must have the same fields in their respective columns.
All of the above
The primary key value, table name, and column name are characteristics that allow us to access the precise data (atomic value) logically from a relational database.
Null values are treated in database records according to this rule.
Database systems must update all views tables on a regular basis.
Databases contain a wide variety of information, and each row and column of each table must hold this information.
Bind
Dynamic
Both A) and B)
None of the above
When the user is asked to logout
When the user is asked to input password
When the user is asked to input captcha
When the user is asked to input username
Time
Date
Date & Time
Day
In some cases you may not have any unique identifying characteristics in data; therefore, it makes sense to create a Primary Key.
Explicitly initializing and modifying the auto-increment value is possible at any time.
Record identifiers can easily be created that are unique to each record.
All of the above
Inserting records or data into the database tables is accomplished with this command. In addition to inserting records in single rows, we can insert records in multiple rows as well.
Database objects such as tables, table views, and other objects can be deleted using this command.
One or more rows from one or more tables of the database can be accessed with this command. Using the WHERE clause with this command is also possible.
It enables you to create new databases, tables, table views, and other objects using this command.
SQL UPDATE INTO
SQL UPDATE JOIN
SQL JOIN
SQL JOIN UPDATE
The result is purged of duplicates
Duplicate records are not removed
Only one column can be compared by a clause
None of the above
Addition
Subtraction
Unary
Modulus
Finds any values that end with a
Finds any values whose second character is a
Find any values that contains only two characters ending with a
Mysql > Savepoint ini;
Arithmetic
Comparison
Set
All of the above
The precedence-low operators are evaluated last in SQL.
The precedence-high operators are evaluated first in SQL.
Both A and B
None of the above
Data Control Language
Data Commit Language
Data Common Language
Data Concatenate Language
12-hour format
24-hour format
Both A. and B.
None of the above
In case a transaction is rolled back, the data allied with table variable also get rolled back.
In case a transaction is rolled back, the data allied with table variable does not roll back.
In case a transaction is not rolled back, the data allied with table variable get rolled back.
None of the above.
We should pre-define the input type, input field and length of the user data to validate the input for the user authentication.
Access privileges should be restricted for the users
Administrator accounts should not be used.
All of the above
GRANT
REVOKE
Both A. and B.
None of the above
DELETE
DISTINCT
FROM
WHERE
With the DDL commands, any structural changes can be made to the table, including creation, deletion, and alteration.
With the DML commands, any structural changes can be made to the table, including creation, deletion, and alteration.
With the DCL commands, any structural changes can be made to the table, including creation, deletion, and alteration.
With the TCL commands, any structural changes can be made to the table, including creation, deletion, and alteration.
SQL DELETE ALL ROWS Table_Name;
SQL DELETE ROWS Table_Name;
DELETE FROM ALL ROWS Table_Name;
DELETE FROM Table_Name;
Both CLOB and NCLOB are used for multibyte national character set data.
Both CLOB and NCLOB can range upto 2^32-1 bytes or 4 GB.
Both CLOB and NCLOB can range upto 2^32-1 bytes or 8GB.
Both CLOB and NCLOB are used for singlebyte and multibyte national character set data.
Dates
Texts
Numbers
All of the above
DATE
TIME
MONTH
DATE & TIME
CREATE
DROP
TRUNCATE
All of the above
SQL Injection is an Object Penetration Technique
SQL Injection is a Function Penetration Technique
SQL Injection is a Code Penetration Technique
SQL Injection is a Database Penetration Technique
UCASE()
LEN()
SUM()
NOW()