A) A key used for encryption of data. B) A key that allows access to all records in a table. C) A key that is not indexed. D) A unique identifier for each record in a table.
A) Syntax Query Language for text documents. B) Structured Query Logic for manipulating files. C) Simple Query Language for non-relational databases. D) Structured Query Language used to manage and query relational databases.
A) All Columns Indexed Directly. B) Atomicity, Consistency, Isolation, Durability. C) Automated Computation and Integration Delivery. D) Access Control In Database.
A) Elasticsearch B) MySQL C) Redis D) MongoDB
A) A virtual table that presents data from one or more tables based on a query. B) An index created on a column for faster retrieval. C) A table with no records. D) A data type used for storing images.
A) GROUP B) FILTER C) SORT D) SELECT
A) A database index for quick data retrieval. B) A table containing data records. C) A collection of metadata that describes the data and structure of the database. D) A set of rules for defining relationships.
A) INNER JOIN B) LEFT JOIN C) OUTER JOIN D) RIGHT JOIN
A) A query nested within another query. B) A query that selects a random subset of data. C) A query that returns all records in a table. D) A query that retrieves data from multiple tables.
A) MAX B) FIRST C) MAXIMUM D) TOP
A) INSERT B) UPDATE C) ADD D) MERGE
A) An operation to pivot table data. B) A method for filtering data. C) A process of creating new records in a table. D) A method to combine rows from two or more tables based on a related column.
A) To combine multiple tables into one. B) To encrypt sensitive data in the database. C) To improve the speed of data retrieval operations. D) To define relationships between tables.
A) A primary key for composite data types. B) A key that consists of multiple columns to uniquely identify a record. C) A key that is not indexed. D) A key that is stored in multiple tables.
A) The physical storage location of the database files. B) A logical design that represents the structure of the database. C) A type of encryption algorithm. D) A software tool for database management.
A) DELETE. B) UPDATE. C) SELECT. D) INSERT INTO.
A) FILTER B) WHERE C) SELECT D) GROUP BY
A) UPDATE B) ALTER C) INSERT D) DROP
A) ALTER B) UPDATE C) CHANGE D) MODIFY |