Test about database security P12

  1. Question 1. Declaring table structure includes:
    1. Declare the size of the school
    2. Create links between tables
    3. Name the fields and specify the data type for each field
    4. A and C are right
  2. Question 2. Which of the following is not a type of relational database creation?
    1. Create table structure
    2. Select the primary key
    3. Name the table and save the table structure
    4. Enter the original data
  3. Question 3. During the process of creating the structure of a table, when creating a field, which of the following is not necessarily done?
    1. Name, the names of the fields to distinguish
    2. Select the data type
    3. Set size
    4. Description of content
  4. Question 4. For the following actions:
    B1: Create a table

    B2: Name and save the structure

    B3: Select the primary key for the table

    B4: Create links

    When creating a relational database, we take the following steps in turn:
    1. B1-B3-B4-B2
    2. B2-B1-B2-B4
    3. B1-B3-B2-B4
    4. B1-B2-B3-B4
  5. Question 5. The first thing to create a relational database is:
    1. Create one or more forms
    2. Create one or more reports
    3. Create one or more questions
    4. Create one or more tables
  6. Question 6. Which of the following is not a data update operation?
    1. Enter the original data
    2. Fix inappropriate data
    3. Add a record
    4. Copy the database to a backup copy
  7. Question 7. Editing data is:
    1. Delete some relationships
    2. Delete the value of some properties of a set
    3. Change the values ​​of some properties of a set
    4. Delete some properties
  8. Question 8. Clearing the record is:
    1. Delete one or several relationships
    2. Delete one or several databases
    3. Delete one or several sets of tables
    4. Delete one or more attributes of the table
  9. Question 9. Which of the following is not a relational database exploit?
    1. Arrange the logs
    2. Report output
    3. View data
  10. Question 10. Relational database exploitation can be:
    1. Create a table, specify a primary key, create a link
    2. Set field names, select data types, define field properties
    3. Add, edit, delete records
    4. Sort, query, view data, render reports
5 ★ | 1 Vote

May be interested

  • Test of database security P10Test of database security P10
    database is a data collection organized in a structured way related to each other and stored in a computer. the database is designed and built to allow users to store data, retrieve information or update data. here, please read more about this topic through our quiz below.
  • Test of database security P9Test of database security P9
    please read your knowledge and multiple choice questions about the database that the network administrator has edited below. certainly with this useful knowledge will help you work more effectively.
  • [QUIZ] Test your understanding of SQL - Part 5[QUIZ] Test your understanding of SQL - Part 5
    multiple-choice questions on sql help you familiarize and review useful knowledge for work and learning sql language.
  • Test on database security P7Test on database security P7
    please read your knowledge of the database through the multiple choice questions below. hope with these interesting questions will give you lots of useful information.
  • Test about database security P13Test about database security P13
    please read your knowledge of the database through the multiple choice questions below. hope with these interesting questions will give you lots of useful information.
  • A serious vulnerability on phpMyAdmin allows an attacker to destroy the databaseA serious vulnerability on phpMyAdmin allows an attacker to destroy the database
    a serious security vulnerability on phpmyadmin - one of the most popular mysql database management software will harm the database when the tricked administrator clicks on the link.
  • Database security (common usage guidelines)Database security (common usage guidelines)
    recently, the database security issue has spread widely on the mass media and internet news network. the first is the slammer worm and most recently the illegal access to more than 8 million credit card numbers. many people put
  • [QUIZ] Test your understanding of SQL - Part 7[QUIZ] Test your understanding of SQL - Part 7
    part 7 of the sql quiz goes into the sql practice exercises that follow the previous period.
  • Test about database security P5Test about database security P5
    in the quiz below, join the network administrator to find out more about this topic through extremely interesting multiple choice questions.
  • Test on database security P4Test on database security P4
    today network administrator will give you reading multiple choice questions around the topic of databases, with certain questions below you will have more useful knowledge.