Question: SECTION A 1 . The command used in SQL to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction is called

SECTION A
1. The command used in SQL to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction is called
a. CREATE PACKAGE
b. CREATE CLUSTER
c. CREATE SCHEMA
d. CREATE TABLE, VIEW, GRANT
e. All
2.....................Is used for traceability when security incidents occur.
a. Verification
b. Authentication
c. Identification
d. Accountability
e. Assessment
3. The view in which the field data types and field properties for a database table can be seen in Microsoft Access is called the
a. Datasheet view
b. Design view
c. SQL view
d. Dashboard view Field view
4. Pick the odd one out.
a. INSERT
b. CREATE
c. UPDATE
d. SELECT
e. DELETE
5. The command that add a new field to an active database is
a. MODIFY STRUCTURE
b. b. MODIFY COMMAND
c. c. MODIFY REPORT
d. MODIFY LABEL
e. MODIFY FIELD
6. Which of these can be used to add a row using SQL in a database?
a. Add b. Create c. Insert d. Make e. Update
7. To remove rows from a table 'CUSTOMER', what is the command to use?
a. UPDATE FROM CUSTOMER ... b. DELETE FROM CUSTOMER WHERE... c. DROP FROM CUSTOMER... d. REMOVE FROM CUSTOMER.. e. MODIFY FROM CUSTOMER...
8. Collecting personal information and effectively posing as another individual is known as the crime of
a. Spooling b. Identity theft c. Hacking d. Spoofing e. Tailgating
9. Choose the correct one out of the following;
a. CREATE, ALTER, DROP b. CREATE, DELETE, ALTER c. SELECT, UPDATE, DROP d. SELECT, INSERT, DROP e. SELECT, ALTER, DROP
10. The SQL query definition and the expected data can be modified in the database checkpoint.
a. Not false b. False c. Partly false d. Semi-false Not totally false
I l . You can modify the value of the cell or you can parameterize it to use a value from an external source, such as
a. Environment variable b. Data table c. A & B d. Not A, B, & C e.Not sure
12. How many tables may be included with a join?
a. One b. Two c. Three d. A, B & C e. A & B
13. Choose the one with the correct order.
a. SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY
b. SELECT, FROM, WHERE, HAVING, ORDER BY, GROUP BY
c. SELECT, FROM, WHERE, HAVING, GROUP BY, ORDER BY
d. SELECT, FROM, WHERE, GROUP BY, ORDER BY, HAVING
e. SELECT, FROM WHERE, ORDER BY, HAVING, GROUP BY
14. DBMS helps to achieve
a. Data independence b. More redundancy c. Centralized manner to control of data
d. A & C e. A, B & C
15. Redundancy is minimized with a computer-based database approach
a. Not false b. False c. Partially false d. Partially true e. None
16. In a database, a row is also called a domain.
a. Not false b. False c. Incorrect question d. Question not complete e. None
17. Needs analysis is the first step in database creation
a. True b. False c. Partially false d. Partially true e. Technically false
18. The SQL Having clause
a. Filters rows
b. Forms groups of rows with same column value
c. Filters groups subject to some condition
d. Specifies which column are to appear in output
e. Specifies the order of the output
19. The most popular commercial DBMS is ...
a. Oracle b. MySQL c. Microsoft Access d. Microsoft SQL Server e. DB2
20. The SQL WHERE clause:
a. Limits the row data are returned
b. Limits the column data that are returned
c. A &
d. Neither A nor B
e. Question is technically incorrect
SECTION B
1. Write the query that returns records of all employees that has Coccurring at the third position of the last name column _______________________\
2.____________ is the skeleton structure that represents the logical view of the entire database.
3._____________ Refers to the need to capture and maintain log files that can be used for traceability when security incidents occur.
4._____________ consists of all the activities needed to ensure high quality data is available.
5. A data management system that is designed to enable and support business intelligence activities especially analytics is known as ________________
6._______________ involves protecting the database from unauthorized access, modification, or destruction.
7.___________________ Requires that only authorized users be allowed to modify data.
8. Loss of availability is sometimes called ______________________
9.___________________ Regulate who can access which data.
10. An application security weakness that allows attackers to control an application's database, letting them access or delete data by tricking the application into sending unexpected SQL commands is _________________
SECTION C
QUESTION 1
1a. Explain big data and list its characteristics.
1b. Difference between variety and variability
1c. Explain Hadoop List the core components of Hadoop
1d. What are the key assumptions made by the Hadoop Distributed File System approach?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!