Which of the following steps in database planning helps to determine the requirements of the database through
Which of the following steps in database planning helps to determine the requirements of the database through
interviewing?
Which of the above-mentioned lines has an error?
Consider the case of a fruit juice company. The company manufactures fruit juices and supplies them to
wholesalers. The Database Designer creates a table named Production. The code is given below:
1.CREATE Table Production
2.(Fruit_type VarChar,
3.Fruit_name Char(20),
4.Quantity Int(3))
Which of the above-mentioned lines has an error?
Which of the following data models will he use to accomplish thetask?
John works as a Database Administrator for DataOneW orld Inc. The company has a SQL Server database.
John wants to insert records in a table where the database is structured in a fixed format. Which of the
following data models will he use to accomplish thetask?
What type of index should you use?
You manage a database named Customers, which includes a table named Orders. The Orders table is
frequently queried, but only orders with a sales total of more than $1000.00 are required in the query. You want
to create an index to speed up these types of queries at the same time, ensuring the index is as smallas
possible. What type of index should you use?
Which of the following database terms is described in the statement below?
Which of the following database terms is described in the statement below? “It prevents the current database
operation from reading or writing a data item whilethe data item is being accessed by another operation.”
Which of the following protection techniques will you suggest for this database?
Your Company is designing and developing a number of databases for a stock exchange. One of the
databases will contain highly sensitive data for which high level of security will be required. Although high
processing speed is one of the prime requirements of the customer, for this database, security of the data will
take priority over the processing speed. It needs to be ensured that even if unauthorized access to the
database is obtained, the rogue user is unable to read the data. Which of the following protection techniques
will you suggest for this database?
Which of the following are the main approaches in the database design?
Which of the following are the main approaches in the database design? Each correct answer represents a
complete solution. Choose three.
which of the following tables will this command work?
You are a Database Administrator of MySQL database.Few days back, your server crashed. Now, it is up and
online. You need to check the integrity of various tables used in the database. You need to issue the CHECK
TABLE command. For which of the following tables will this command work? Each correct answer represents a
complete solution. Choose two.
Choose the appropriate normalization rules from the Choose and Reorder window pane.
Which of the following can be used to populate a table?
Which of the following can be used to populate a table? Each correct answer represents a complete solution.
Choose all that apply.