1. |
Data security threats include |
|||||||||
|
2. |
An operation that will increase the length of a list is |
|||||||||
|
3. |
In SQL, which command is used to add a column/integrity constraint to a table |
|||||||||
|
4. |
In SQL, which command(s) is(are) used to enable/disable a database trigger? |
|||||||||
|
5. |
In a relational schema, each tuple is divided into fields called |
|||||||||
|