Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Single Answer


Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL

Correct Answer CURE

Your Answer CURE

Multiple Choice Multiple Answer


Question What can be used to manage databases data integrity rule

Correct Answer Integrity constraints , Database triggers

Your Answer Integrity constraints , Database triggers

Multiple Choice Single Answer


Question What is called for network of network scatered all over the world

Correct Answer internet

Your Answer internet

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard
for network transport layer security
Correct Answer False

Your Answer False

Select The Blank


Question ________is visual representation of Entity Relationships.

Correct Answer ERD

Your Answer ERD

Select The Blank


Question ________is protection of database against intentional and unintentional threats that
may be computer-based or non-computer-based
Correct Answer Security

Your Answer Security

Match The Following


Question Correct Answer Your Answer

Object privileges One example : Privilege to delete One example : Privilege to delete
rows from any named table rows from any named table
Grant command Contains 'To' clause in syntax Contains 'To' clause in syntax

Revoke command Contains 'From' clause in syntax Contains 'From' clause in syntax

You might also like