Which of the following are TCL commands? August 29, 2021August 29, 2021 administrator Which of the following are TCL commands?COMMIT and ROLLBACKWell Done. Your Answer is Correct Keep it Up!UPDATE and TRUNCATESELECT and INSERTGRANT and REVOKE
Which statement is used to delete all rows in a table without having the action logged? August 29, 2021August 29, 2021 administrator Which statement is used to delete all rows in a table without having the action logged?TRUNCATEWell Done. Your Answer is Correct Keep it Up!DROPREMOVEDELETE
Which of the following is not a DDL command? August 29, 2021August 29, 2021 administrator Which of the following is not a DDL command?UPDATEWell Done. Your Answer is Correct Keep it Up!CREATEALTERTRUNCATE
Which of the following is not a valid SQL type? August 29, 2021August 29, 2021 administrator Which of the following is not a valid SQL type?DECIMALWell Done. Your Answer is Correct Keep it Up!NUMERICFLOATCHARACTER
Which one of the following is commonly used to define the overall design of the database? August 29, 2021August 29, 2021 administrator Which one of the following is commonly used to define the overall design of the database?SchemaWell Done. Your Answer is Correct Keep it Up!Data definition languageApplication programSource code
Which one of the following commands is used to modify a column inside a table? August 29, 2021August 29, 2021 administrator Which one of the following commands is used to modify a column inside a table?AlterWell Done. Your Answer is Correct Keep it Up!UpdateDropSet
Which one of the following keyword is used to find out the number of values in a column? August 29, 2021August 29, 2021 administrator Which one of the following keyword is used to find out the number of values in a column?COUNTWell Done. Your Answer is Correct Keep it Up!TOTALSUMADD
A computer security protocol for logging-in can be considered as the example of the ______ component of an information system. August 29, 2021August 29, 2021 administrator A computer security protocol for logging-in can be considered as the example of the ______ component of an information system.ProcedureWell Done. Your Answer is Correct Keep it Up!SoftwareDataHardware
Which of the following keys is generally used to represents the relationships between the tables? August 29, 2021August 29, 2021 administrator Which of the following keys is generally used to represents the relationships between the tables?Foreign keyWell Done. Your Answer is Correct Keep it Up!Primary keySecondary keyNone of the options are correct
Which of the following levels is considered as the level closed to the end-users? August 29, 2021August 29, 2021 administrator Which of the following levels is considered as the level closed to the end-users?External LevelWell Done. Your Answer is Correct Keep it Up!Conceptual LevelInternal LevelPhysical Level