One
Two
Three
Four
B. Two
Select the content from a table.
Rename the content in a table.
Copy the content from one table into another existing table.
None of the above
Specify the columns of the table in this SQL clause to return distinct values.
By executing this SQL statement, all records in the SQL database will be deleted.
The data specified in this table or view is reported in this SQL statement.
Changes made in the SQL database transaction are permanently saved using this SQL statement.
CREATE DATABASE
RENAME DATABASE
DROP DATABASE
SELECT DATABASE
To retrieve data
To fetch data
Both A. and B.
None of the above
RENAME
ALTER
Both A) and B)
None of the above
Referential Integrity
Domain Integrity
User-defined Integrity
Entity Integrity
Using SQL in relational databases is all about inserting, updating, and deleting data.
Sample data can also be described with the aid of this tool.
It helps develop relational database functions, events, and views.
A SQL user can also set restrictions and permissions for a table column, a view, and a stored procedure.
1
2
3
4
USE DATABASES;
SELECT DATABASES;
SHOW DATABASES;
None of the above
Primary
Foreign
Composite
Unique
Both CLOB and NCLOB are used for multibyte national character set data.
Both CLOB and NCLOB can range upto 2^32-1 bytes or 4 GB.
Both CLOB and NCLOB can range upto 2^32-1 bytes or 8GB.
Both CLOB and NCLOB are used for singlebyte and multibyte national character set data.
Upper
Unique
Update
Uppercase
When the user is asked to logout
When the user is asked to input password
When the user is asked to input captcha
When the user is asked to input username
Data Definition
View Definition
Data Manipulation
All of the above
It inserts the data
It updates the data
It deletes the data
All of the above
SELECT Statement
UPDATE Statement
TRUNCATE TABLE Statement
FROM Statement
SQL Injection is an Object Penetration Technique
SQL Injection is a Function Penetration Technique
SQL Injection is a Code Penetration Technique
SQL Injection is a Database Penetration Technique
Column Name
Row Name
Table Name
None of the above
Before
After
Flexible to before or after
None of the above
0
1
Null
All of the above
A single or multiple rows can be accessed using this command from one or more tables of a database. Using the WHERE clause with this command is also possible.
Database data can be updated or changed using this command.
Database objects such as tables, table views, and other objects can be deleted using this command.
Using this command, you can remove or erase recorded information from a database table.
Intrusion Detection System is Network-based
Intrusion Detection System is Host-based
Both A) and B)
None of the above
HAVING
WHERE
ORDER BY
FROM
Primary Key
Foreign Key
Composite Key
Alternate Key
Tables
WHERE Conditions
Expressions
None of the above
Group by unique column
Group by single column
Group by one column
Group by same value
When the table is small, it is possible to avoid using SQL indexes.
Updates need to be made frequently to the table.
When there are a lot of NULL values in a column, indexed should not be used.
All of the above
MIN()
MAX()
LARGE()
AVG()
Converts database field to uppercase
Converts database field to lowercase
Returns the length of the text field
Returns the current date and time
In order to group the rows, HAVING Clause is used.
In order to return the rows, HAVING Clause is used.
In order to select the defined groups by the GROUP BY Clause, HAVING Clause is used.
None of the above