A Primary Key cannot be NULL
A Foreign Key cannot be NULL
A Primary Key cannot be Duplicate
A Foreign Key can be Duplicate
B. A Foreign Key cannot be NULL
Finds any values that start with a and ends with o
Finds any values whose first character is a and third character is o
Both A. and B.
None of the above
INSERT IN
INSERT INSIDE
INSERT UNDER
INSERT INTO
Unique
Composite
Foreign
None of the above
NOT NULL
CHECK
DEFAULT
All of the above
Comparison Operator has higher precedence than Conjuction Operator.
Identity Operator has higher precedence than Multiplication Operator.
Both A and B
None of the above
All columns must be identical in number and order.
There must be compatibility between data types.
Both A and B
None of the above
Column Name
Row Name
Table Name
None of the above
Round
Hierarchal
Linear
None of the above
2
3
4
5
BIT(Size)
CHAR(Size)
INTEGER(Size)
INT(Size)
VARCHAR can store upto 4000 bytes and VARCHAR2 can store upto 8000 bytes.
VARCHAR can store upto 2000 bytes and VARCHAR2 can store upto 4000 bytes.
Both VARCHAR and VARCHAR2 are similar but use of VARCHAR2 is mostly recommended.
There is no similarity between VARCHAR and VARCHAR2.
DELETE
DROP
ALTER
None of the above
###
####
#
##
1
2
3
4
SQL is cheap.
SQL interface is simple.
Both A and B.
None of the above.
timestamp
sql_variant
real
text
Rows, same
Columns, same
Rows, different
Columns, different
A new table in SQL is created using this SQL statement.
By deleting the stored data, this SQL statement deletes the database.
Columns in the SQL database can be created, deleted, or modified with this SQL statement.
By executing this SQL statement, you remove the table and all the information that it contains, including the structure, views, permissions, and triggers.
//*Line1
Line2*//
/*Line1
Line2/*
TEXT(Size)
TINYTEXT
MEDIUMTEXT
LARGETEXT
We should pre-define the input type, input field and length of the user data to validate the input for the user authentication.
Access privileges should be restricted for the users
Administrator accounts should not be used.
All of the above
Transactions can be saved to the database and rolled back with the help of TCL commands in SQL.
There will be certain privileges that each user has; consequently, the data can be accessed by them using TCL.
Our data is stored in a table that is described by the schema, thus TCL commands deal with the schema.
SQL TCL commands can be used to perform any kind of retrieval or manipulation of the data present in SQL tables.
When the user is asked to logout
When the user is asked to input password
When the user is asked to input captcha
When the user is asked to input username
Specify the columns of the table in this SQL statement to return distinct values.
Changes made in the SQL database transaction are permanently saved using this SQL statement.
By running this SQL statement, the transaction will be undone and the operations not yet saved to the SQL database will be undone.
An index is created in a SQL database table with this SQL statement.
UPDATE
ADD
ALTER
JOIN
Referential Integrity
Domain Integrity
User-defined Integrity
Entity Integrity
The primary key value, table name, and column name are characteristics that allow us to access the precise data (atomic value) logically from a relational database.
Null values are treated in database records according to this rule.
Database dictionaries represent the complete logic of all descriptive data, which must be stored online.
None of the above
SQL is rational whereas No-SQL is non-rational.
SQL follows BASE Model whereas No-SQL follows ACID Model.
SQL database are vertically scalable whereas No-SQL database are horizontally scalable.
No-SQL databases are preferable to store hierarchical data in comparison SQL databases.
SELECT TOP name
SELECT TOP column
SELECT TOP FROM
SELECT TOP Number
RENAME old_database_name TO new_database_name;
RENAME DATABASE old_database_name TO new_database_name;
ALTER old_database_name MODIFY NAME = new_database_name;
ALTER DATABASE old_database_name MODIFY NAME = new_database_name;