Which phase of the data migration process typically involves data extraction from the source system?
- Data Cleansing
- Data Extraction
- Data Profiling
- Data Transformation
The phase of data extraction from the source system is typically the initial step in the data migration process, where data is fetched for further processing.
When should you use a LEFT JOIN in SQL?
- When you want to retrieve all records from both tables
- When you want to retrieve all records from the left table and matching records from the right table
- When you want to retrieve only matching records from both tables
- When you want to retrieve only records from the right table
A LEFT JOIN is used when you want to retrieve all records from the left table, regardless of whether there are matching records in the right table. It includes all records from the left table and the matching records from the right table. This is useful when you want to retrieve data from one table even if there are no corresponding records in the other table.
Database testing tools help in automating the process of test ________ creation for different scenarios.
- Data
- Case
- Script
- Scenario
Database testing tools automate the creation of test scripts for various scenarios, enabling testers to execute tests efficiently and consistently. Test scripts encompass a series of actions to be performed during testing, making option 3, "Script," the correct choice.
In SQL, the primary key is used to uniquely identify each ____________ in a table.
- Column
- Entity
- Record
- Row
The primary key in SQL uniquely identifies each row in a table. It ensures that each row is distinct from others and serves as a reference point for other tables when establishing relationships.
Which encryption method transforms data into an unreadable format and requires a decryption key to revert it to its original form?
- Asymmetric Encryption
- Hashing
- Salting
- Symmetric Encryption
Symmetric encryption transforms data into an unreadable format using a single encryption key. This encrypted data can only be decrypted using the same key, ensuring confidentiality. Without the decryption key, it is virtually impossible to revert the data to its original form, enhancing security. This method is commonly used for securing data in databases.
In a scenario without proper database testing, data ____________ can go undetected.
- Anomalies
- Corruption
- Inconsistencies
- Loss
Without proper database testing, data anomalies can go undetected. These anomalies could include inconsistencies, duplicates, or incorrect data entries, leading to data quality issues and potentially impacting business decisions and operations.
Database testing tools may provide ____________ reporting to track test execution and results.
- Detailed
- Graphical
- Tabular
- Visual
In database testing, tools often provide tabular reporting to display test execution and results in a structured format, making it easier for testers to analyze and interpret the data efficiently.
In a subquery, the ____________ clause is used to compare a single value with the result set of the subquery.
- GROUP BY
- HAVING
- ORDER BY
- WHERE
The WHERE clause in a subquery is used to filter the rows returned by the subquery based on a condition. It's essential for narrowing down the result set to meet specific criteria.
What is a test script in the context of database automation frameworks?
- A code editor used for writing automation scripts
- A database schema
- A document describing test cases
- A set of instructions to perform automated tests
A test script in the context of database automation frameworks is a set of instructions to perform automated tests. These scripts are typically written using scripting or programming languages and are designed to interact with the database, execute queries, validate data, and verify the functionality of database-related features. Test scripts play a crucial role in automating the testing process and ensuring the reliability and integrity of the database.
What is a clustered index in a database, and how does it differ from a non-clustered index?
- Arranges data rows physically based on the indexed column(s).
- Can be created on any column in the table.
- Stores the index separately from the actual data rows.
- Supports faster retrieval of data but slows down data modification operations.
A clustered index dictates the physical order of data rows in the table, often based on the primary key column. In contrast, a non-clustered index stores a separate list of pointers to the actual data rows, allowing for different orders of retrieval. Understanding this distinction is crucial for efficient data retrieval and modification strategies.