A) Organizing data in a database to reduce redundancy. B) Adding extra data to improve accuracy. C) Deleting old data. D) Creating duplicate records.
A) Atomicity, Convergent, Isolation, Dispersion. B) Atomicity, Consistency, Isolation, Durability. C) Asset, Consistency, Independence, Durability. D) Aggregate, Consistency, Isolation, Duration.
A) Encrypting data. B) Adding security to the database. C) Improving the speed of data retrieval operations. D) Deleting records.
A) Calculate, Rank, Update, Delete. B) Create, Read, Update, Delete. C) Copy, Remove, Use, Delete. D) Create, Refresh, Undo, Dump.
A) An error message. B) A type of encryption. C) Automated response to a specific event in a database. D) A security warning.
A) Combining rows from two or more tables based on a related column. B) Separating data into different tables. C) Deleting duplicate records. D) Changing the primary key.
A) Data Backup and Migration Service. B) Database Management System. C) Digital Banking Management System. D) Dynamic Business Model Software.
A) Establish Table Licensing. B) Enable Table Linking. C) Encrypt, Transmit, Log data. D) Extract, Transform, Load data from various sources into a data warehouse.
A) A report produced by the database. B) A physical database backup. C) Rules that define acceptable values or conditions for data in the database. D) A database user's access level.
A) A data structure that improves the speed of data retrieval operations on a database table. B) A report generation tool. C) A type of database model. D) A file containing all database records.
A) To develop database applications. B) To manage and maintain the database system. C) To delete data from the database. D) To design the physical database schema.
A) A database error. B) A database replication process. C) A request for data or information from a database table. D) A type of database model.
A) To encrypt all data. B) To slow down data retrieval. C) To create a visual representation of the database structure. D) To make data unavailable for querying.
A) An extra security measure. B) A rule that ensures the referential integrity of the data. C) A key that allows duplicate values. D) A key that cannot be changed.
A) Series Query Language B) Structured Query Language C) Sequential Query Language D) Structured Query Logic
A) Oracle Database B) MySQL C) SQLite D) MongoDB
A) Optimization B) Normalization C) Denormalization D) Indexing
A) FROM B) WHERE C) SELECT D) ORDER BY
A) DB2 B) MySQL C) SQL Server D) PostgreSQL
A) Cross Join B) Left Join C) Full Outer Join D) Inner Join |