Question: SECTION A 1 . The command used in SQL to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction is called
SECTION A
The command used in SQL to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction is called
a CREATE PACKAGE
b CREATE CLUSTER
c CREATE SCHEMA
d CREATE TABLE, VIEW, GRANT
e All
Is used for traceability when security incidents occur.
a Verification
b Authentication
c Identification
d Accountability
e Assessment
The view in which the field data types and field properties for a database table can be seen in Microsoft Access is called the
a Datasheet view
b Design view
c SQL view
d Dashboard view Field view
Pick the odd one out.
a INSERT
b CREATE
c UPDATE
d SELECT
e DELETE
The command that add a new field to an active database is
a MODIFY STRUCTURE
b b MODIFY COMMAND
c c MODIFY REPORT
d MODIFY LABEL
e MODIFY FIELD
Which of these can be used to add a row using SQL in a database?
a Add b Create c Insert d Make e Update
To remove rows from a table 'CUSTOMER', what is the command to use?
a UPDATE FROM CUSTOMER b DELETE FROM CUSTOMER WHERE... c DROP FROM CUSTOMER... d REMOVE FROM CUSTOMER.. e MODIFY FROM CUSTOMER...
Collecting personal information and effectively posing as another individual is known as the crime of
a Spooling b Identity theft c Hacking d Spoofing e Tailgating
Choose the correct one out of the following;
a CREATE, ALTER, DROP b CREATE, DELETE, ALTER c SELECT, UPDATE, DROP d SELECT, INSERT, DROP e SELECT, ALTER, DROP
The SQL query definition and the expected data can be modified in the database checkpoint.
a Not false b False c Partly false d Semifalse Not totally false
I l You can modify the value of the cell or you can parameterize it to use a value from an external source, such as
a Environment variable b Data table c A & B d Not A B & C eNot sure
How many tables may be included with a join?
a One b Two c Three d A B & C e A & B
Choose the one with the correct order.
a SELECT, FROM, WHERE, GROUP BY HAVING, ORDER BY
b SELECT, FROM, WHERE, HAVING, ORDER BY GROUP BY
c SELECT, FROM, WHERE, HAVING, GROUP BY ORDER BY
d SELECT, FROM, WHERE, GROUP BY ORDER BY HAVING
e SELECT, FROM WHERE, ORDER BY HAVING, GROUP BY
DBMS helps to achieve
a Data independence b More redundancy c Centralized manner to control of data
d A & C e A B & C
Redundancy is minimized with a computerbased database approach
a Not false b False c Partially false d Partially true e None
In a database, a row is also called a domain.
a Not false b False c Incorrect question d Question not complete e None
Needs analysis is the first step in database creation
a True b False c Partially false d Partially true e Technically false
The SQL Having clause
a Filters rows
b Forms groups of rows with same column value
c Filters groups subject to some condition
d Specifies which column are to appear in output
e Specifies the order of the output
The most popular commercial DBMS is
a Oracle b MySQL c Microsoft Access d Microsoft SQL Server e DB
The SQL WHERE clause:
a Limits the row data are returned
b Limits the column data that are returned
c A &
d Neither A nor B
e Question is technically incorrect
SECTION B
Write the query that returns records of all employees that has Coccurring at the third position of the last name column
is the skeleton structure that represents the logical view of the entire database.
Refers to the need to capture and maintain log files that can be used for traceability when security incidents occur.
consists of all the activities needed to ensure high quality data is available.
A data management system that is designed to enable and support business intelligence activities especially analytics is known as
involves protecting the database from unauthorized access, modification, or destruction.
Requires that only authorized users be allowed to modify data.
Loss of availability is sometimes called
Regulate who can access which data.
An application security weakness that allows attackers to control an application's database, letting them access or delete data by tricking the application into sending unexpected SQL commands is
SECTION C
QUESTION
a Explain big data and list its characteristics.
b Difference between variety and variability
c Explain Hadoop List the core components of Hadoop
d What are the key assumptions made by the Hadoop Distributed File System approach?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
