logo

CuriousTab

CuriousTab

Discussion


Home Database SQL for Database Construction Comments

  • Question
  • What SQL structure is used to limit column values of a table?


  • Options
  • A. The LIMIT constraint
  • B. The CHECK constraint
  • C. The VALUE constraint
  • D. None of the above is correct.

  • Correct Answer
  • The CHECK constraint 


  • SQL for Database Construction problems


    Search Results


    • 1. A reason for using an SQL view to hide columns is:

    • Options
    • A. to simplify a result only.
    • B. to prevent the display of sensitive data only.
    • C. to accomplish both of the above.
    • D. None of the above are reasons for using an SQL view.
    • Discuss
    • 2. The SQL command to create a table is:

    • Options
    • A. MAKE TABLE.
    • B. ALTER TABLE.
    • C. DEFINE TABLE.
    • D. CREATE TABLE.
    • Discuss
    • 3. What is an advantage of placing computations in SQL views?

    • Options
    • A. To save users from having to write an expression.
    • B. To ensure that the results are consistent.
    • C. To accomplish both of the above.
    • D. None of the above is correct - computations cannot be placed in a view.
    • Discuss
    • 4. Which is NOT one of the most common types of SQL CHECK constraints?

    • Options
    • A. System date
    • B. Range checks
    • C. Lists of values
    • D. Comparing one column value to another within the same table
    • Discuss
    • 5. The SQL ALTER statement can be used to:

    • Options
    • A. change the table structure.
    • B. change the table data.
    • C. add rows to the table.
    • D. delete rows from the table.
    • Discuss
    • 6. Which of the following locks the item from change but not from read?

    • Options
    • A. Implicit lock
    • B. Explicit lock
    • C. Exclusive lock
    • D. Shared lock
    • Discuss
    • 7. What is the overall responsibility of the DBA?

    • Options
    • A. Facilitate the development and use of the database
    • B. Create and populate tables
    • C. Development, operation, and maintenance of the database and its applications
    • D. Both the first and third answers above are correct.
    • Discuss
    • 8. Which of the following locks the item from access of any type?

    • Options
    • A. Implicit lock
    • B. Explicit lock
    • C. Exclusive lock
    • D. Shared lock
    • Discuss
    • 9. Which of the following allows dirty reads, nonrepeatable reads and phantom reads to occur?

    • Options
    • A. Read committed
    • B. Read uncommitted
    • C. Repeatable read
    • D. Serializable
    • Discuss
    • 10. Which of the following refers to a cursor type that when the cursor is opened, a primary key value is saved for each row in the recordset; when the application accesses a row, the key is used to fetch the current values of the row?

    • Options
    • A. Forward only
    • B. Static
    • C. Keyset
    • D. Dynamic
    • Discuss


    Comments

    There are no comments.

Enter a new Comment