Which of the following statements are true regarding DML?
Which of the following statements are true regarding DML?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is NOT a valid DDL command?
Which of the following is NOT a valid DDL command?
Which of the following code will create the trigger to meet your goals?
You are a database developer for a database named Sales hosted on a SQL Server 2008 server. The
Sales database includes the Exams and
ExamQuestions tables. If any questions are modified for an exam, you need to ensure that the
ExamModifiedDate in the Exams table is
updated with the date and time of the update. The ExamQuestions table includes an INSTEAD OF
trigger that records when and who last
modified each question. Therefore, you decide to create a trigger. You only want the trigger to fire if
a constraint violation has not occurred.
Which of the following code will create the trigger to meet your goals?
Which of the following approaches will he use to accomplish the task?
Peter works as a Database Administrator for UnrealTech Inc. Management instructs him to create a
schema that is gradually expanded from
one level to another through appropriate modifications. Which of the following approaches will he
use to accomplish the task?
Which of the following steps will you take to accomplish the task?
You are the database administrator of a MySQL database server. Your network contains a
combination of new and old (pre-4.1) MySQL clients.
You are configuring a new server for testing purposes. You want to allow connections only by the
clients that have new-format passwords.
Which of the following steps will you take to accomplish the task?
Which of the following commands are used to terminate a transaction?
Which of the following commands are used to terminate a transaction?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is undertaken at any time prior to the logical design, provided that sufficient informa
Which of the following is undertaken at any time prior to the logical design, provided that sufficient
information is available regarding system requirements?
Which of the following refers to the system, processes, and procedures that protect a database from unintended
Which of the following refers to the system, processes, and procedures that protect a database from
unintended activities, such as
authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or
processes?
Which of the following normal forms will help him accomplish the task?
Mark works as a Database Administrator for Techworld Inc. He wants to remove the columns from a
table that are not dependent on the
primary key. Which of the following normal forms will help him accomplish the task?
Which of the following steps will you take to accomplish the task?
You are a Database Administrator for MySQL database. Users are complaining of slow query
execution in a few tables. You need to ensure
that contents of those tables are accessed more efficiently. You are sure that the table structure and
its contents have no problems. Which of
the following steps will you take to accomplish the task?
Each correct answer represents a part of the solution. Choose two.