Table of Contents=> Go Directly
SQL commands and syntax
SQL commands are divided into several different types, among them data manipulation language (DML) and data definition language (DDL) statements, transaction controls and security measures. The DML vocabulary is used to retrieve and manipulate data, while DDL statements are for defining and modifying database structures. The transaction controls help manage transaction processing, ensuring that transactions are either completed or rolled back if errors or problems occur. The security statements are used to control database access as well as to create user roles and permissions.
Let’s Learn about some No SQL
What is NoSQL?
NoSQL is an upcoming category of Database Management Systems. Its main characteristic is its non-adherence to Relational Database Concepts. NOSQL means “Not only SQL”.
Concept of NoSQL databases grew with internet giants such as Google, Facebook, Amazon etc who deal with gigantic volumes of data.
When you use relational database for massive volumes of data , the system starts getting slow in terms of response time.
Related Link
SQL Database #2 -Questions & Answers
SQL Database #1 -Questions & Answers
Security Tool -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
To overcome this , we could of course “scale up” our systems by upgrading our existing hardware.
The alternative to the above problem would be to distribute our database load on multiple hosts as the load increases.
This is known as “scaling out”.
NOSQL database are non-relational databases that scale out better than relational databases and are designed with web applications in mind.
They do not use SQL to query the data and do not follow strict schemas like relational models.With NoSQL, ACID (Atomicity, Consistency, Isolation, Durability) features are not guaranteed always
Some Important Questions of SQL Database are listed Bellow :
1- State true or false. EXISTS, SOME, ANY are operators in SQL.
Explanation:
2- State true or false. !=, <>, ^= all denote the same operation.
Explanation:
3- What are the privileges that can be granted on a table by a user to others?
Explanation:
Related Link
SQL Database #2 -Questions & Answers
SQL Database #1 -Questions & Answers
Security Tool -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
4- What command is used to get back the privileges offered by the GRANT command?
Explanation:
5- Which system tables contain information on privileges granted and privileges obtained?
Explanation:
6- Which system table contains information on constraints on all the tables created?
Explanation:
7- TRUNCATE TABLE EMP; DELETE FROM EMP;
Will the outputs of the above two commands differ?
Explanation:
8- What is the difference between TRUNCATE and DELETE commands?
Explanation:
9- What is the advantage of specifying WITH GRANT OPTION in the GRANT command?
Explanation:
Related Link
SQL Database #2 -Questions & Answers
SQL Database #1 -Questions & Answers
Security Tool -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
10- What does the following query do?
SELECT SAL + NVL(COMM,0) FROM EMP;
Explanation:
Related Link ,See once
SQL Database #2 -Questions & Answers
SQL Database #1 -Questions & Answers
SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Facts around World
Science
You must log in to post a comment.