DBMS One Mark Questions-New
DBMS One Mark Questions-New
DBMS One Mark Questions-New
B) Dynamic Programs
C) Query Language
D) Static Language Programs
C) 4 NF
D) BCNF
6. Which is proper subset designed to support views belonging to different classes of users in
order to hide or protect information.
A) Schema
B) Sub-schema
C) Non-schema
D) Non-sub schema
7. Which contain information about a file needed by system programs for accessing file records?
A) File blocks
B) File operators
C) File headers
D) None of these
8. A .................... DBMS distributes data processing tasks between the workstation and network
server.
A) Network
B) Relational
C) Client Server
D) Hierarchical
9. The .................... refers to the way data is organized in and accessible from DBMS.
A) database hierarchy
B) data organization
C) data sharing
D) data model
A) Relations
B) Domains
C) Queries
D) All of the above
13. In an ER model, . is described in the database by storing its data.
A) Entity
B) Attribute
C) Relationship
D) Notation
14. DFD stands for
A) Data Flow Document
B) Data File Diagram
C) Data Flow Diagram
D) Non of the above
15. A top-to-bottom relationship among the items in a database is established by a
A) Hierarchical schema
B) Network schema
C) Relational Schema
D) All of the above
16. table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
17. . ..defines the structure of a relation which consists of a fixed set of attributedomain pairs.
A) Instance
B) Schema
c) Program
D) Super Key
18. clause is an additional filter that is applied to the result.
A) Select
B) Group-by
C) Having
D) Order by
19. A logical schema
A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above
20. is a full form of SQL.
A) Standard query language
B) Sequential query language
C) Structured query language
B) ELIMINATE
C) DISTINCT
D) None of these
34. State true or false
i) A candidate key is a minimal super key.
ii) A candidate key can also refer to as surrogate key.
A) i-true, ii-false
B) i-false, ii-true
C) i-true, ii-true
D) i-false, ii-false
35. DCL stands for
A) Data Control Language
B) Data Console Language
C) Data Console Level
D) Data Control Level
36. is the process of organizing data into related tables.
A) Normalization
B) Generalization
C) Specialization
D) None of the above
37. A . Does not have a distinguishing attribute if its own and mostly are
dependent entities, which are part of some another entity.
A) Weak entity
B) Strong entity
C) Non attributes entity
D) Dependent entity
38. .. is the complex search criteria in the where clause.
A) Sub string
B) Drop Table
C) Predict
D) Predicate
39. is preferred method for enforcing data integrity
A) Constraints
B) Stored Procedure
C) Triggers
D) Cursors
40. The number of tuples in a relation is called its . While the number of attributes in a
relation is called its ..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
41) The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
42) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
43) The database schema is written in
A. HLL
B. DML
C. DDL
D. DCL
44) The way a particular application views the data from the database that the application uses is
a
A. module
B. relational model
C. schema
D. sub schema
45) The relational model feature is that there
A) Data Security
B) Domain access
C) Data Control
D) Domain Integrity
54. .. operator is basically a join followed by a project on the attributes of first
relation.
A) Join
B) Semi-Join
C) Full Join
D) Inner Join
55. Which of the following is not a binary operator in relational algebra?
A) Join
B) Semi-Join
C) Assignment
D) Project
56. Centralizing the integrity checking directly under the DBMS .. Duplication and
ensures the consistency and validity of the database.
A) Increases
B) Skips
C) Does not reduce
D) Reduces
57. Which of the following is/are the DDL statements?
A) Create
B) Drop
C) Alter
D) All of the above
58. In snapshot, . clause tells oracle how long to wait between refreshes.
A) Complete
B) Force
C) Next
D) Refresh
59. defines rules regarding the values allowed in columns and is the standard
mechanism for enforcing database integrity.
A) Column
B) Constraint
C) Index
D) Trigger
60. For like predicate which of the following is true.
i) % matches zero of more characters.
ii) _ matches exactly one character.
A) i-only
B) ii-only
C) Both of them
D) None of them
SET 4
61. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and
GRANT statements in a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
A) All of the above
62. In SQL, the CREATE TABLESPACE is used
A) to create a place in the database for storage of scheme objects, rollback segments, and naming
the data files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
D) All of the above
63. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
64. Which of the following is TRUE for the System Variable $date$?
A) Can be assigned to a global variable.
B) Can be assigned to any field only during design time.
C) Can be assigned to any variable or field during run time.
D) Can be assigned to a local variable.
69. When SQL statements are embedded inside 3GL, we call such a program as ..........
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
70. ................ provides option for entering SQL queries as execution time, rather than at the
development stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL
A) Fields
B) Records
C) Relations
D) Keys
82. .. contains information that defines valid values that are stored in a column
or data type.
A) View
B) Rule
C) Index
D) Default
83. Which of the syntax is correct for insert statement?
i) insert into <table_name> values <list of values>
ii) insert into <table_name> (column list) values <list of values>
A) i-only
B) ii-only
C) Both of them
D) None of them
84. . . First proposed the process of normalization.
A) Edgar. W
B) Edgar F. Codd
C) Edward Stephen
D) Edward Codd
85. . For using a specific database command is used.
A) use database
B) database name use
C) Both A &B
D) None of them
86. Which of the following is not comparison operator?
A) <>
B) <
C) =<
D) >=
87. An outstanding functionality of SQL is its support for automatic to the target
data.
A) programming
B) functioning
C) navigation
D) notification
88. is a special type of integrity constraint that relates two relations &
maintains consistency across the relations.
A) Entity Integrity Constraints
B) Referential Integrity Constraints
C) Domain Integrity Constraints
D) Domain Constraints
E) Key Constraints
B) Trigger
C) Curser
D) None of the above
98. ................. requires that data should be made available to only authorized users.
A) Data integrity
B) Privacy
C) Security
D) None of the above
99. Some of the utilities of DBMS are .............
i) Loading
ii) Backup
iii) File organization
B) Information
C) Useful data
D) Source
102. .. is a utility to capture a continuous record of server activity and provide
auditing capability.
A) SQL server Profile
B) SQL server service manager
C) SQL server setup
D) SQL server wizard.
103. Data items grouped together for storage purposes are called a
A) record
B) title
C) list
D) string
104. . contains data assisting day to day activities of the organization.
A) Control database
B) Operational database
C) Strategic database
D) Sequential database
105. approach reduces time and effort required for design and lesser risk in
database management.
A) Single global database
B) Top-down approach
C) Multiple databases
D) None of the above
106. HSAM stands for .
A) Hierarchic Sequential Access Method
B) Hierarchic Standard Access Method
C) Hierarchic Sequential and Method
D) Hierarchic Standard and Method
107. SQL server stores index information in the system table
A) syst indexes
B) system indexes
C) sysind
D) sys indexes
108. The one guideline to be followed while designing the database is
A) A database design may be ambiguous.
B) Unrelated data should be in the same table so that updating the data will be easy.
C) It should avoid/reduce the redundancy.
D) An entity should not have attributes.
109. Which of the following is not a logical database structure?
A) Chain
B) Network
C) Tree
D) Relational
110. . . is a preferred method for enforcing data integrity
A) Constraints
B) Stored procedure
C) Triggers
D) Cursors
SET 8
111. Reflexivity property says that X - Y is true if Y is .
A) Subset of X
B) Null set of X
C) Super set of Y
D) Subset of Y
112. Anything that affects the database schema is a part of
A) DML
B) DCL
C) DDL
D) All of the above
113. An instance of a relation is a time varying set of .
A) Tuples
B) Rows
C) Both of them
D) None of them
114. In the mode any record in the file can be accessed at random
A) Sequential access
B) Random access
C) Standard access
D) Source access
115. Which can be used to delete all the rows if a table?
A) Delete * from table_name
B) Delete from table_name
C) Delete table_name
D) all rows cannot be deleted at a time.
116. Which if the following is not the type of data integrity.
A) Key integrity
B) Domain integrity
C) Entity integrity
D) Referential integrity
117. 4NF stands for ..
A) Fourth Normal File
B) Fourth Normal Form
C) Fourth Normal Fraction
D) Fourth Negative File
118. A allows to make copies of the database periodically to help in the cases
of crashes & disasters.
A) Recovery utility
B) Backup Utility
C) Monitoring utility
D) Data loading utility
119. . Allows definitions and query language statements to be entered; query
results are formatted and displayed.
A) Schema Processor
B) Query Processor
C) Terminal Interface
D) None of the above
120. The main task carried out in the is to remove repeating attributes to separate
tables.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Fourth Normal Form
121. Relational Algebra is a __________ query language that takes two relation as input and
produces another relation as output of the query.
A) Relational
B) Structural
C) Procedural
D) Fundamental
122. Which of the following is a fundamental operation in relational algebra?
a) Set intersection
b) Natural join
c) Assignment
d) None of the mentioned
123. Which of the following is used to denote the selection operation in relational algebra ?
a) Pi (Greek)
b) Sigma (Greek)
c) Lambda (Greek)
d) Omega (Greek)
View Answer
124. For select operation the ________ appear in the subscript and the ___________ argument
appears in the paranthesis after the sigma.
a) Predicates, relation
b) Relation, Predicates
c) Operation, Predicates
d) Relation, Operation
125. The ___________ operation, denoted by , allows us to find tuples that are in one relation
but are not in another.
a) Union
b) Set-difference
c) Difference
d) Intersection
126. Which is a unary operation:
a) Selection operation
b) Primitive operation
c) Projection operation
d) Generalized selection
127. Which is a join condition contains an equality operator:
a) Equijoins
b) Cartesian
c) Natural
d) Left
128. In precedence of set operators the expression is evaluated from
a) Left to left
b) Left to right
c) Right to left
d) From user specification
129. Which of the following is not outer join ?
a) Left outer join
b) Right outer join
135.
136.
137.
138.
In a relation between the entities the type and condition of the relation should be
specified . That is called as______attribute
a) Desciptive
b) Derived
c) Recursive
d) Relative
139.
140.
A table on the many side of a one to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
b) Be in Third Normal Form (3NF)
c) Have a single attribute key
d) Have a composite key
141.
142.
143.
Functional Dependencies are the types of constraints that are based on______
a) Key
b) Key revisited
c) Superset key
d) None of these
144.
145.
Which forms simplifies and ensures that there is minimal data aggregates and
repetitive groups:
a) 1NF
b) 2NF
c) 3NF
d) All of the mentioned
146.
Which forms has a relation that possesses data about an individual entity:
a) 2NF
b) 3NF
c) 4NF
d) 5NF
147.
148.
149.
150.
d) Network
151.
Which of the following schemas does define a view or views of the database for
particular users?
a) Internal schema
b) Conceptual schema
c) Physical schema
d) External schema
152.
Which of the following is an attribute that can uniquely identify a row in a table?
a) Secondary key
b) Candidate key
c) Foreign key
d) Alternate key
153.
Which of the following is the process of selecting the data storage and data
access characteristics of the database?
a) Logical database design
b) Physical database design
c) Testing and performance tuning
d) Evaluation and selecting
154.
Which of the following terms does refer to the correctness and completeness of
the data in a database?
a) Data security
b) Data constraint
c) Data independence
d) Data integrity
155.
156.
157.
If the state of the database no longer reflects a real state of the world that the
database is supposed to capture, then such a state is called
a) Consistent state
b) Parallel state
c) Durable state
d) Inconsistent state
158.
159.
160.
161.
162.
163.
The database system must take special actions to ensure that transactions operate
properly without interference from concurrently executing database statements. This
property is referred to as
a) Atomicity
b) Durability
c) Isolation
d) All of the mentioned
164.
__________ states that only valid data will be written to the database.
a) Consistency
b) Atomicity
c) Durability
d) Isolation
166.
167.
The Oracle RDBMS uses the ____ statement to declare a new transaction start
and its properties.
a) BEGIN
b) SET TRANSACTION
c) BEGIN TRANSACTION
d) COMMIT
168.
____ means that the data used during the execution of a transaction cannot be
used by a second transaction until the first one is completed.
a) Consistency
b) Atomicity
c) Durability
d) Isolation
169.
170.
171.
d) POS
172.
173.
174.
175.
176.
Which of the following SQL command can be used to modify existing data in a
database table?
a) MODIFY
b) UPDATE
c) CHANGE
d) NEW
177.
When SQL statements are embedded inside 3GL, we call such a program as
a) Nested query
b) Nested programming
c) Distinct query
d) Embedded SQL
178.
d) Dynamic SQL
179.
180.
181.
Each modification done in database transaction are first recorded into the
a) Harddrive
b) Log
c) Disk
d) Datamart
182.
When the transaction finishes the final statement the transaction enters into
a) Active state
b) Committed state
c) Partially committed state
d) Abort state
183.
The name of the transaction file shall be provided by the operator and the file that
contains the edited transactions ready for execution shall be called
a) Batch. Exe
b) Trans. Exe
c) Opt. Exe
d) Edit.Exe
184.
185.
If the state of the database no longer reflects a real state of the world that the
database is supposed to capture, then such a state is called
a) Consistent state
b) Parallel state
c) Atomic state
d) Inconsistent state
186.
_______ means that data used during the execution of a transaction cannot be
used by a second transaction until the first one is completed.
a) Serializability
b) Atomicity
c) Isolation
d) Time stamping
187.
DBMS periodically suspends all processing and synchronizes its files and
journals through the use of
a) Checkpoint facility
b) Backup facility
c) Recovery manager
d) Database change log
188.
189.
190.
191.
__________ are used to ensure that transactions access each data item in order of
the transactions ____ if their accesses conflict.
a) Zone
b) Relay
c) Line
d) Timestamps
192.
In which scenario would you use the ROLLUP operator for expression or
columns within a GROUP BY clause?
a) To find the groups forming the subtotal in a row
b) To create group-wise grand totals for the groups specified within a GROUP BY clause
c) To create a grouping for expressions or columns specified within a GROUP BY clause
in one direction, from
right to left for calculating the subtotals
d) To create a grouping for expressions or columns specified within a GROUP BY clause
in all possible
directions, which is cross-tabular report for calculating the subtotals
194.
Name
Cust_id
Cust_Name
Null?
Not null
Type
Number(2)
Varchar2(15)
195.
196.
197.
198.
CREATE TABLE digits
(id NUMBER(2),
description VARCHAR2(15));
INSERT INTO digits VALUES (1,'ONE');
UPDATE digits SET description ='TWO' WHERE id=1;
INSERT INTO digits VALUES (2,'TWO');
COMMIT;
DELETE FROM digits;
200.
Once the lower-level lock is released, the operation cannot be undone by using the
old values of updated data items, and must instead be undone by executing a
compensating operation; such an operation is called
a) Logical operation
b) Redo operation
c) Logical undo operation
d) Undo operation
201.
202.
203.
To perform logical redo or undo, the database state on disk must be operation
_____________, that is, it should not have partial effects of any operation.
a) Persistent
b) Resistant
c) Consistent
d) None of the mentioned
204.
b) Changed
c) Repetitive
d) All of the above
205.
206.
207.
For correct behaviour during recovery, undo and redo operation must be
a) Commutative
b) Associative
c) Idempotent
d) Distributive
208.
If ___________ are not obtained in undo operation it will cause problem in undophase.
a) Higher-level lock
b) Lower-level lock
c) Read only lock
d) Read write
209.
210.
211.With multiple disks, we can improve the transfer rate as well by ___________ data
across multiple disks.
a) Striping
b) Dividing
c) Mirroring
d) Dividing
212.
213.
214.
Where performance and reliability are both important, RAID level ____ is used.
a) 0
b) 1
c) 2
d) 0+1
215.
______________ partitiones data and parity among all N+1 disks, instead of
storing data in N-disks and parity in one disk.
a) Block interleaved parity
b) Block interleaved distributed parity
c) Bit parity
d) Bit interleaved parity
216.
Hardware RAID implementations permit _________; that is, faulty disks can be
removed and replaced by new ones without turning power off.
a) Scrapping
b) Swapping
c) Hot swapping
d) None of the mentioned
217.
218.
d) RAID level 3
219.
A system is in a ______ state if there exists a set of transactions such that every
transaction in the set is waiting for another transaction in the set.
a) Idle
b) Waiting
c) Deadlock
d) Ready
220.
The deadlock state can be changed back to stable state by using _____________
statement.
a) Commit
b) Rollback
c) Savepoint
d) Deadlock
221.
224.
The situation where the lock waits only for a specified amount of time for another
lock to be released is
a) Lock timeout
b) Wait-wound
c) Timeout
d) Wait
225.
b) Wait graph
c) Wait-for graph
d) All of the mentioned
226.
A deadlock exists in the system if and only if the wait-for graph contains a
___________.
a) Cycle
b) Direction
c) Bi-direction
d) Rotation
227.
228.
229.
The log is a sequence of ___________, recording all the update activities in the
database.
a) Log records
b) Records
c) Entries
d) Redo
230.
In the ___________ scheme, a transaction that wants to update the database first
creates a complete copy of the database.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
231.
The ____________ scheme uses a page table containing pointers to all pages; the
page table itself and all updated pages are copied to a new location.
a) Shadow copy
b) Shadow Paging
c) Update log records
d) All of the mentioned
232.
233.
If a transaction does not modify the database until it has committed, it is said to
use the ___________ technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
234.
If database modifications occur while the transaction is still active, the transaction
is said to use the ___________technique.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
235.
____________ using a log record sets the data item specified in the log record to
the old value.
a) Deferred-modification
b) Late-modification
c) Immediate-modification
d) Undo
236.
237.
The actions which are played in the order while recording it is called
______________ history.
a) Repeating
b) Redo
c) Replay
d) Undo
238.
A special redo-only log record is written to the log, where V1 is the value being
restored to data item Xj during the rollback. These log records are sometimes called
a) Log records
b) Records
c) Compensation log records
240.
241.
Which of the following has each related entity set has its own schema and there is
an additional schema for the relationship set.
a) A many-to-many relationship set
b) A multivalued attribute of an entity set
c) A one-to-many relationship set
d) Both a and b
242.
243.
Suppose the user finds the usage of room number and phone number in a
relational schema there is confusion.This is reduced by
a) Unique-role assumption
b) Unique-key assignment
c) Role intergral assignment
d) None of the mentioned
244.
245.
d) Realization
246.
In the schema (dept name, size) we have relations total inst 2007, total inst 2008 .
Which dependency have lead to this relation ?
a) Dept name, year->size
b) Year->size
c) Dept name->size
d) Size->year
247.
Relation dept year(dept name, total inst 2007, total inst 2008, total inst 2009)
.Here the only functional dependencies are from dept name to the other attributes .This
relation is in
a) Fourth NF
b) BCNF
c) Third NF
d) Second NF
248.
Thus a _______ of course data gives the values of all attributes, such as title and
department, of all courses at a particular point in time.
a) Instance
b) Snapshot
c) Both a and b
d) All of the mentioned
249.
Representations such as the in the dept year relation, with one column for each
value of an attribute, are called _______; they are widely used in spreadsheets and
reports and in data analysis tools.
a) Cross-tabs
b) Snapshot
c) Both a and b
d) All of the mentioned
250.
251.
252.
Consider the relation given below and ind the maximum normal form applicable
to them
1. R(A, B) with productions { A > B }
2. R(A, B) with productions { B > A }
3 R(A, B) with productions {A > B, B > A }
4 R(A, B, C) with productions {A >B, B > A, AB > C }
a) 1, 2 and 3 are in 3NF and 4 is in BCNF
b) 1 and 2 are in BCNF and 3 and 4 are in 3NF
c) All are in 3NF
d) All are in BCNF
253.
254.
255.
If every non-key attribute is functionally depedent primary key, then the relation
will be in
a) First normal form
b) Second normal form
c) Third form
d) Fourth normal form
256.
257.
The term for information that describes what type of data is available in a
database is:
a) Data dictionary
b) data repository
c) Index data
d) Metadata
258.
A data type that creates unique numbers for key columns in Microsoft Access is:
a) Autonumber
b) Boolean
c) Sequential key
d) Sequential number
259.
260.
261.
A table on the many side of a one to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
b) Be in Third Normal Form (3NF)
c) Have a single attribute key
d) Have a composite key
262.
263.
264.
Functional Dependencies are the types of constraints that are based on______
a) Key
b) Key revisited
c) Superset key
d) None of these
265.
266.
Which forms simplifies and ensures that there is minimal data aggregates and
repetitive groups:
a) 1NF
b) 2NF
c) 3NF
d) All of the mentioned
267.
Which forms has a relation that possesses data about an individual entity:
a) 2NF
b) 3NF
c) 4NF
d) 5NF
268.
269.
270.
a) Procedures
b) Triggers
c) Functions
d) None of the mentioned
271.
272.
The CREATE TRIGGER statement is used to create the trigger. THE _____
clause specifies the table name on which the trigger is to be attached. The ______
specifies that this is an AFTER INSERT trigger.
a) for insert, on
b) On, for insert
c) For, insert
d) Both a and c
273.
274.
275.
276.
d) INSTEAD OF
277.
278.
279.
280.
281.
282.
b) Blob
c) Binary
d) Image
284.
285.
Values of one type can be converted to another domain using which of the
following ?
a) Cast
b) Drop type
c) Alter type
d) Convert
286.
287.
288.
In contemporary databases the top level of the hierarchy consists of ______, each
of which can contain _____.
a) Catalogs, schemas
b) Schemas, catalogs
c) Environment, schemas
d) Schemas, Environment
289.
Which of the following statements creates a new table temp instructor that has
the same schema as instructor.
a) create table temp_instructor;
b) Create table temp_instructor like instructor;
c) Create Table as temp_instructor;
d) Create table like temp_instructor;
290.
291.
292.
Select emp_name
from department
where dept_name like _____ Computer Science;
Which one of the following has to be added into the blank to select the dept_name which
has Computer Science as its ending string ?
a) %
b) _
c) ||
d) $
293.
294.
Select name
from instructor
where dept name = Physics
order by name;
By default, the order by clause lists items in ______ order.
a) Descending
b) Any
c) Same
d) Ascending
295.
Select *
from instructor
order by salary ____, name ___;
To display the salary from greater to smaller and name in ascending order which of the
Select name
from instructor
where salary <= 100000 and salary >= 90000;
This query can be replaced by which of the following ?
a) Select name
from instructor
where salary between 90000 and 100000;
b) Select name
from employee
where salary <= 90000 and salary>=100000;
c) Select name
from employee
where salary between 90000 and 100000;
d) Select name
from instructor
where salary between 100000 and 90000;
297.
Select instructor.*
from instructor, teaches
where instructor.ID= teaches.ID;
This query does which of the following operation?
a) All attributes of instructor and teaches are selected
b) All attributes of instructor are selected on the given condition
c) All attributes of teaches are selected on given condition
d) Only the some attributes from instructed and teaches are selected
298.
In SQL the spaces at the end of the string are removed by _______ function .
a) Upper
b) String
c) Trim
d) Lower
299.
300.
A _____ indicates an absent value that may exist but be unknown or that may not
exist at all.
a) Empty tuple
b) New value
c) Null value
d) Old value
301.
The predicate in a where clause can involve Boolean operations such as and.The
result of true and unknown is_______, false and unknown is _____, while unknown and
unknown is _____.
a) Unknown, unknown, false
b) True, false, unknown
c) True, unknown, unknown
d) Unknown, false, unknown
302.
Select name
from instructor
where salary is not null;
Selects
a) Tuples with null value
b) Tuples with no null values
c) Tuples with any salary
d) All of the mentioned
303.
In a employee table to include the attributes whose value always have some value
which of the following constraint must be used ?
a) Null
b) Not null
c) Unique
d) Distinct
304.
Using the ______ clause retains only one copy of such identical tuples.
a) Null
b) Unique
c) Not null
d) Distinct
305.
Some of these insert statements will produce an error. Identify the statement.
a) Insert into employee values (1005,Rach,0);
b) Insert into employee values (1002,Joey,335);
c) Insert into employee values (1007,Ross, );
d) Both a and c
306.
307.
308.