Database Systems - Section 6 Multiple Questions and Answers.




1.Data security threats include
A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. All of the above

2.An operation that will increase the length of a list is
A. Insert
B. Look-up
C. Modify
D. All of the above

3.In SQL, which command is used to add a column/integrity constraint to a table
A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE

4.In SQL, which command(s) is(are) used to enable/disable a database trigger?
A. ALTER TRIGGER
B. ALTER DATABASE
C. ALTER TABLE
D. MODIFY TRIGGER

5.In a relational schema, each tuple is divided into fields called
A. Relations
B. Domains
C. Queries
D. All of the above

»



Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers