GAT Subject
Engineering
Computer Science Civil Engineering Chemical Engineering Agricultural Engineering Mechanical Engineering Electronics and Communication
1. | Data security threats include | ||
A. | hardware failure | ||
B. | privacy invasion | ||
C. | fraudulent manipulation of data | ||
D. | All of the above | ||
2. | An operation that will increase the length of a list is | ||
A. | Insert | ||
B. | Look-up | ||
C. | Modify | ||
D. | All of the above | ||
3. | In SQL, which command is used to add a column/integrity constraint to a table | ||
A. | ADD COLUMN | ||
B. | INSERT COLUMN | ||
C. | MODIFY TABLE | ||
D. | ALTER TABLE | ||
4. | In SQL, which command(s) is(are) used to enable/disable a database trigger? | ||
A. | ALTER TRIGGER | ||
B. | ALTER DATABASE | ||
C. | ALTER TABLE | ||
D. | MODIFY TRIGGER | ||
5. | In a relational schema, each tuple is divided into fields called | ||
A. | Relations | ||
B. | Domains | ||
C. | Queries | ||
D. | All of the above | ||