Which of the following is NOT a valid DDL command?
Which of the following is NOT a valid DDL command?
Which of the following code will create the triggerto meet your goals?
You are a database developer for a database named Sales hosted on a SQL Server 2008 server. The Sales
database includes the Exams and
ExamQuestions tables. If any questions are modifiedfor an exam, you need to ensure that the
ExamModifiedDate in the Exams table is
updated with the date and time of the update. The ExamQuestions table includes an INSTEAD OF trigger that
records when and who last
modified each question. Therefore, you decide to create a trigger. You only want the trigger to fire if a
constraint violation has not occurred.
Which of the following code will create the triggerto meet your goals?
Which of the following approaches will he use to accomplish the task?
Peter works as a Database Administrator for UnrealTech Inc. Management instructs him to create a schema
that is gradually expanded from
one level to another through appropriate modifications. Which of the following approaches will he use to
accomplish the task?
Which of the following steps will you take to accomplish the task?
You are the database administrator of a MySQL database server. Your network contains a combination of new
and old (pre-4.1) MySQL clients.
You are configuring a new server for testing purposes. You want to allow connections only by the clients that
have new-format passwords.
Which of the following steps will you take to accomplish the task?
Which of the following commands are used to terminate a transaction?
Which of the following commands are used to terminate a transaction? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following refers to the system, processes, and procedures that protect a database from unintended
Which of the following refers to the system, processes, and procedures that protect a database from
unintended activities, such as
authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or processes?
Which of the following is undertaken at any time prior to the logical design, provided that sufficientinformat
Which of the following is undertaken at any time prior to the logical design, provided that sufficientinformation
is available regarding system requirements?
Which of the following normal forms will help him accomplish the task?
Mark works as a Database Administrator for Techworld Inc. He wants to remove the columns from a table that
are not dependent on the
primary key. Which of the following normal forms will help him accomplish the task?
Which of the following steps will you take to accomplish thetask?
You are a Database Administrator for MySQL database. Users are complaining of slow query execution in a
few tables. You need to ensure
that contents of those tables are accessed more efficiently. You are sure that the table structure andits
contents have no problems. Which of
the following steps will you take to accomplish thetask? Each correct answer represents a part of thesolution.
Choose two.
What data type should you use?
You are modifying a database that is used as a backend for a web site. The web site developers want to
include positional data that can be used by the website users to determine store locations information that is
stored in the Stores table of the database. You areasked to add a column to the Stores table. What data type
should you use?