热门面试题与答案和在线测试
面向面试准备、在线测试、教程与实战练习的学习平台

通过聚焦学习路径、模拟测试和面试实战内容持续提升技能。

WithoutBook 将分主题面试题、在线练习测试、教程和对比指南整合到一个响应式学习空间中。

面试准备

模拟考试

设为首页

收藏此页面

订阅邮箱地址

DBMS 面试题与答案

Test your skills through the online practice test: DBMS Quiz Online Practice Test

相关差异对比

RDBMS vs Hadoop

问题 31. What are Aggregate and Scalar Functions?

Aggregate and Scalar functions are in built function for counting and calculations.
Aggregate functions operate against a group of values but returns only one value.
AVG(column) :- Returns the average value of a column
COUNT(column) :- Returns the number of rows (without a NULL value) of a column
COUNT(*) :- Returns the number of selected rows
MAX(column) :- Returns the highest value of a column
MIN(column) :- Returns the lowest value of a column
Scalar functions operate against a single value and return value on basis of the single value.
UCASE(c) :- Converts a field to upper case
LCASE(c) :- Converts a field to lower case
MID(c,start[,end]) :- Extract characters from a text field
LEN(c) :- Returns the length of a text

这有帮助吗? 添加评论 查看评论
 

问题 32. Can you explain the SELECT INTO Statement?

SELECT INTO statement is used mostly to create backups. The below SQL backsup the
Employee table in to the EmployeeBackUp table. One point to be noted is that the structure of
wbEmployeeBackup and wbEmployee table should be same. SELECT * INTO
wbEmployeeBackup FROM wbEmployee

这有帮助吗? 添加评论 查看评论
 

问题 33. What is a View?

View is a virtual table which is created on the basis of the result set returned by the select
statement.
CREATE VIEW [MyView] AS SELECT * from pcdsEmployee where LastName = 'singh'
In order to query the view.
SELECT * FROM [MyView]

这有帮助吗? 添加评论 查看评论
 

问题 34. What is SQL injection?

It is a Form of attack on a database-driven Web site in which the attacker executes
unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet, bypassing the firewall. SQL injection attacks are used to steal information from a database from which the data would normally not be available and/or to gain access to an organizations host computers through the computer that is hosting the database.
SQL injection attacks typically are easy to avoid by ensuring that a system has strong input
validation.
As name suggest we inject SQL which can be relatively dangerous for the database. Example this is a simple SQL
SELECT email, passwd, login_id, full_name FROM members WHERE email = 'x'
Now somebody does not put x as the input but puts x ; DROP TABLE members;.
So the actual SQL which will execute is :-
SELECT email, passwd, login_id, full_name FROM members WHERE email = 'x' ; DROP TABLE
members;
Think what will happen to your database.

这有帮助吗? 添加评论 查看评论
 

问题 35. What is Data Independence?

Data independence means that "the application is independent of the storage structure and access strategy of data". In other words, The ability to modify the schema definition in one level should not affect the schema definition in the next higher level. 
Two types of Data Independence: 
1. Physical Data Independence: Modification in physical level should not affect the logical level.
2. Logical Data Independence: Modification in logical level should affect the view level.

这有帮助吗? 添加评论 查看评论
 

用户评价最有帮助的内容:

版权所有 © 2026,WithoutBook。