Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Data and Database Administration Questions
Queries that do full table scans should be avoided.
Mirrored databases are almost always provided in high-availability systems.
Authorization tables contain highly sensitive data and should be protected by stringent security rules.
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure.
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
Data modeling and database design are key responsibilities of data and data base administration.
Failure to control confidentiality may lead to loss of competitiveness.
A transaction log shows before and after images of records that have been modified by transactions.
A disaster recovery plan does not need to include the shipment of database backups to other sites.
The greatest threat to business security is often internal rather than external.
1
2