SQL Interview Questions (2021) - Javatpoint
SQL Interview Questions (2021) - Javatpoint
The following are the most popular and useful SQL interview questions and answers for fresher and
experienced candidates. These questions are created specifically to familiarise you with the types of
questions you might encounter during your SQL interview. According to our experiences, good
interviewers rarely plan to ask any specific topic during the interview. Instead, questioning usually
begins with a basic understanding of the subject, and based on your responses, further discussion
happened.
1) What is SQL?
SQL stands for the Structured Query Language. It is the standard language used to maintain the
relational database and perform many different data manipulation operations on the data. SQL was
initially invented in 1970. It is a database language used for database creation, deletion, fetching
and modifying rows, etc. sometimes, it is pronounced as 'sequel.' We can also use it to handle
organized data comprised of entities (variables) and relations between different entities of the data.
SQL first appeared in 1974. It is one of the most used languages for maintaining the relational
database. In 1986, SQL became the standard of the American National Standards Institute (ANSI)
and ISO (International Organization for Standardization) in 1987.
SQL is responsible for maintaining the relational data and the data structures present in the
database. Some of the common usages are given below:
SQL refers to the Standard Query Language. Therefore, it is true that SQL is a language but does
not actually support the programming language. It is a common language that doesn't have a loop,
conditional statements, and logical operations. It cannot be used for anything other than data
manipulation. It is a command language to perform database operations. The primary purpose of
SQL is to retrieve, manipulate, update, delete, and perform complex operations like joins on the
data present in the database.
Data definition language (DDL): It defines the data structure that consists of commands
like CREATE, ALTER, DROP, etc.
Data manipulation language (DML): It is used to manipulate existing data in the database.
The commands in this category are SELECT, UPDATE, INSERT, etc.
Data control language (DCL): It controls access to the data stored in the database. The
commands in this category include GRANT and REVOKE.
Transaction Control Language (TCL): It is used to deal with the transaction operations in
the database. The commands in this category are COMMIT, ROLLBACK, SET TRANSACTION,
SAVEPOINT, etc.
DDL stands for Data definition language. It is the subset of a database that defines the data
structure of the database when the database is created. For example, we can use the DDL
commands to add, remove, or modify tables. It consists of the following commands: CREATE, ALTER
and DELETE database objects such as schema, tables, indexes, view, sequence, etc.
Example
CREATE TABLE Students
(
Roll_no INT,
Name VARCHAR(45),
Branch VARCHAR(30),
);
Data manipulation language makes the user able to retrieve and manipulate data in a relational
database. The DML commands can only perform read-only operations on data. We can perform the
following operations using DDL language:
Example
INSERT INTO Student VALUES (111, 'George', 'Computer Science')
Data control language allows users to control access and permission management to the database.
It is the subset of a database, which decides that what part of the database should be accessed by
which user at what point of time. It includes two commands, GRANT and REVOKE.
GRANT: It enables system administrators to assign privileges and roles to the specific user
accounts to perform specific tasks on the database.
REVOKE: It enables system administrators to revoke privileges and roles from the user accounts so
that they cannot use the previously assigned permission on the database.
Example
GRANT * ON mydb.Student TO javatpoint@localhsot;
A table is a set of organized data in the form of rows and columns. It enables users to store and
display records in the structure format. It is similar to worksheets in the spreadsheet application.
Here rows refer to the tuples, representing the simple data item, and columns are the attribute of
the data items present in a particular row. Columns can categorize as vertical, and Rows are
horizontal.
Fields are the components to provide the structure for the table. It stores the same category of data
in the same data type. A table contains a fixed number of columns but can have any number of
rows known as the record. It is also called a column in the table of the database. It represents the
attribute or characteristics of the entity in the record.
Example
Table: Student
A primary key is a field or the combination of fields that uniquely identify each record in the table.
It is one of a special kind of unique key. If the column contains a primary key, it cannot be null or
empty. A table can have duplicate columns, but it cannot have more than one primary key. It always
stores unique values into a column. For example, the ROLL Number can be treated as the primary
key for a student in the university or college.
CREATE TABLE Student (
roll_number INT PRIMARY KEY,
name VARCHAR(45),
);
The foreign key is used to link one or more tables together. It is also known as the referencing key.
A foreign key is specified as a key that is related to the primary key of another table. It means a
foreign key field in one table refers to the primary key field of the other table. It identifies each row
of another table uniquely that maintains the referential integrity. The primary key-foreign key
relationship is a very crucial relationship as it maintains the ACID properties of the database
sometimes. It also prevents actions that would destroy links between the child and parent tables.
We can define a foreign key into a table as follows:
CONSTRAINT constraint_name]
FOREIGN KEY [foreign_key_name] (col_name, ...)
REFERENCES parent_tbl_name (col_name,...)
A unique key is a single or combination of fields that ensure all values stores in the column will be
unique. It means a column cannot stores duplicate values. This key provides uniqueness for the
column or set of columns. For example, the email addresses and roll numbers of student's tables
should be unique. It can accept a null value but only one null value per column. It ensures the
integrity of the column or group of columns to store different values into a table.
CREATE TABLE table_name(
col1 datatype,
col2 datatype UNIQUE,
...
);
13) What is the difference between a primary key and a unique key?
The primary key and unique key both are essential constraints of the SQL. The main difference
among them is that the primary key identifies each record in the table. In contrast, the unique key
prevents duplicate entries in a column except for a NULL value. The following comparison chart
explains it more clearly:
The primary key act as a unique The unique key is also a unique identifier for records
identifier for each record in the when the primary key is not present in the table.
table.
We cannot store NULL values in the We can store NULL value in the unique key column,
primary key column. but only one NULL is allowed.
We cannot change or delete the We can modify the unique key column values.
primary key column values.
A database is an organized collection of data that is structured into tables, rows, columns, and
indexes. It helps the user to find the relevant information frequently. It is an electronic system that
makes data access, data manipulation, data retrieval, data storing, and data management very easy.
Almost every organization uses the database for storing the data due to its easily accessible and
high operational ease. The database provides perfect access to data and lets us perform required
tasks.
Accurate
Easy to update
Security
Data integrity
DBMS stands for Database Management System. It is a software program that primarily functions
as an interface between the database and the end-user. It provides us the power such as managing
the data, the database engine, and the database schema to facilitate the organization and
manipulation of data using a simple query in almost no time. It is like a File Manager that manages
data in a database rather than saving it in file systems. Without the database management system,
it would be far more difficult for the user to access the database's data.
Software
Data
Procedures
Database Languages
Query Processor
Database Manager
Database Engine
Reporting
The database management systems can be categorized into several types. Some of the important
lists are given below:
Object-oriented databases
Graph databases
ER model databases
NoSQL databases
RDBMS stands for Relational Database Management System. It is a database management system
based on a relational model. It facilitates you to manipulate the data stored in the tables by using
relational operators. RDBMS stores the data into the collection of tables and links those tables
using the relational operators easily whenever required. Examples of relational database
management systems are Microsoft Access, MySQL, SQL Server, Oracle database, etc.
Normalization is used to minimize redundancy and dependency by organizing fields and table of a
database.
There are some rules of database normalization, which is commonly known as Normal From, and
they are:
Using these steps, the redundancy, anomalies, inconsistency of the data in the database can be
removed.
Normalization is mainly used to add, delete or modify a field that can be made in a single table.
The primary use of Normalization is to remove redundancy and remove the insert, delete and
update distractions. Normalization breaks the table into small partitions and then links them using
different relationships to avoid the chances of redundancy.
The occurrence of redundant terms in the database causes the waste of space in the disk.
Due to redundant terms, inconsistency may also occur. If any change is made in the data of one
table but not made in the same data of another table, then inconsistency will occur. This
inconsistency will lead to the maintenance problem and effects the ACID properties as well.
An Inconsistent dependency refers to the difficulty of getting relevant data due to a missing or
broken path to the data. It leads users to search the data in the wrong table, resulting in an error as
an output.
Denormalization doesn't mean that normalization will not be done. It is an optimization strategy
that takes place after the normalization process.
Logical operators: These operators evaluate the expressions and return their results in True
or False. This operator includes ALL, AND, ANY, ISNULL, EXISTS, BETWEEN, IN, LIKE, NOT, OR,
UNIQUE.
Comparison operators: These operators are used to perform comparisons of two values
and check whether they are the same or not. It includes equal to (=), not equal to (!= or <>),
less than (<), greater than (>), less than or equal to (<=), greater than or equal to (>=), not
less than (!<), not greater than (!>), etc.
String operators: These operators are primarily used to perform concatenation and pattern
matching of strings. It includes + (String concatenation), += (String concatenation
assignment), % (Wildcard), [] (Character(s) matches), [^] (Character(s) not to match), _
(Wildcard match one character), etc.
A view is a database object that has no values. It is a virtual table that contains a subset of data
within a table. It looks like an actual table containing rows and columns, but it takes less space
because it is not present physically. It is operated similarly to the base table but does not contain
any data of its own. Its name is always unique. A view can have data from one or more tables. If any
changes occur in the underlying table, the same changes reflected in the views also.
The primary use of a view is to implement the security mechanism. It is the searchable object where
we can use a query to search the view as we use for the table. It only shows the data returned by
the query that was declared when the view was created.
CREATE VIEW view_name AS
SELECT column_lists FROM table_name
WHERE condition;
An index is a disc structure associated with a table or view that speeds up row retrieval. It reduces
the cost of the query because the query's high cost will lead to a fall in its performance. It is used to
increase the performance and allow faster retrieval of records from the table. Indexing reduces the
number of data pages we need to visit to find a particular data page. It also has a unique value
meaning that the index cannot be duplicated. An index creates an entry for each value which makes
it faster to retrieve data.
For example: Suppose we have a book which carries the details of the countries. If you want to
find out information about India, why will you go through every page of that book? You could
directly go to the index. Then from the index, you can go to that particular page where all the
information about India is given.
SQL indexes are nothing more than a technique of minimizing the query's cost. The higher the
query's cost, the worse the query's performance. The following are the different types of Indexes
supported in SQL:
Unique Index
Clustered Index
Non-Clustered Index
Bit-Map Index
Normal Index
Composite Index
B-Tree Index
Function-Based Index
UNIQUE INDEX is used to enforce the uniqueness of values in single or multiple columns. We can
create more than one unique index in a single table. For creating a unique index, the user has to
check the data in the column because the unique indexes are used when any column of the table
has unique values. This indexing does not allow the field to have duplicate values if the column is
unique indexed. A unique index can be applied automatically when a primary key is defined.
CREATE UNIQUE INDEX index_name
ON table_name (index_column1, index_column2,...);
Example
CREATE TABLE Employee(
ID int AUTO_INCREMENT PRIMARY KEY,
Name varchar(45),
Phone varchar(15),
City varchar(25),
);
Suppose we want to make a Phone column as a unique index. We can do this like below:
CREATE UNIQUE INDEX index_name_phone ON Employee (Phone);
A clustered index is actually a table where the data for the rows are stored. It determines the order
of the table data based on the key values that can sort in only one direction. Each table can have
only one clustered index. It is the only index, which has been automatically created when the
primary key is generated. If many data modifications needed to be done in the table, then clustered
indexes are preferred.
The indexes other than PRIMARY indexes (clustered indexes) are called non-clustered indexes. We
know that clustered indexes are created automatically when primary keys are generated, and non-
clustered indexes are created when multiple joins conditions and various filters are used in the
query. The non-clustered index and table data are both stored in different places. It cannot be able
to alter the physical order of the table and maintains the logical order of data.
The purpose of creating a non-clustered index is for searching the data. Its best example is a book
where the content is written in one place, and the index is at a different place. We can create 0 to
249 non-clustered indexes in each table. The non-clustered indexing improves the performance of
the queries which use keys without assigning the primary key.
30) What are the differences between SQL, MySQL, and SQL Server?
SQL first appeared in MySQL first appeared on May SQL Server first appeared on
1974. 23, 1995. April 24, 1989.
SQL was developed by MySQL was developed by SQL Server was developed by
IBM Corporation. Oracle Corporation. Microsoft Company.
SQL is a query language MySQL is database software SQL Server is also a software
for managing databases. that uses SQL language to that uses SQL language to
conduct with the database. conduct with the database.
SQL has no variables. MySQL can use variables SQL Server can use variables
constraints and data types. constraints and data types.
SQL PL/SQL
SQL has no variables. PL/SQL can use variables constraints and data
types.
SQL can execute only a single query at PL/SQL can execute a whole block of code at once.
a time.
SQL query can be embedded in PL/SQL cannot be embedded in SQL as SQL does
PL/SQL. not support any programming language and
keywords.
SQL can directly interact with the PL/SQL cannot directly interact with the database
database server. server.
SQL is like the source of data that we PL/SQL provides a platform where SQL data will be
need to display. shown.
Yes. We can use the alias method in the ORDER BY instead of the WHERE clause for sorting a
column.
Indexing is a method to get the requested data very fast. There are mainly two types of indexes in
SQL, clustered index and non-clustered index. The differences between these two indexes are very
important from an SQL performance perspective. The following comparison chart explains their
main differences:
A clustered index is a table or view where the The indexes other than PRIMARY indexes
data for the rows are stored. In a relational (clustered indexes) are called non-clustered
database, if the table column contains a indexes. It has a structure separate from the
primary key, MySQL automatically creates a data row. The non-clustered indexes are also
clustered index named PRIMARY. known as secondary indexes.
Clustered indexes store the data information Non-clustered indexes stores only the
and the data itself. information, and then it will refer you to the
data stored in clustered data.
There can only be one clustered index per There can be one or more non-clustered
table. indexes in a table.
A clustered index determines how data is It creates a logical ordering of data rows and
stored physically in the table. Therefore, uses pointers for accessing the physical data
reading from a clustered index is faster. files. Therefore, reading from a clustered
index is slower.
There is a built-in function in SQL called GetDate(), which is used to return the current timestamp.
35) Which are joins in SQL? Name the most commonly used SQL joins?
SQL joins are used to retrieve data from multiple tables into a meaningful result set. It is performed
whenever you need to fetch records from two or more tables. They are used with SELECT statement
and join conditions.
INNER JOIN
Joins are used to merge two tables or retrieve data from tables. It depends on the relationship
between tables. According to the ANSI standard, the following are the different types of joins used
in SQL:
INNER JOIN
SELF JOIN
CROSS JOIN
To read more information, click here.
Inner join returns only those records from the tables that match the specified condition and hides
other rows and columns. In simple words, it fetches rows when there is at least one match of rows
between the tables is found. INNER JOIN keyword joins the matching records from two tables. It is
assumed as a default join, so it is optional to use the INNER keyword with the query.
SELECT column_lists
FROM table1
INNER JOIN table2 ON join_condition1
INNER JOIN table3 ON join_condition2
...;
The Right join is used to retrieve all rows from the right-hand table and only those rows from the
other table that fulfilled the join condition. It returns all the rows from the right-hand side table
even though there are no matches in the left-hand side table. If it finds unmatched records from
the left side table, it returns a Null value. This join is also known as Right Outer Join.
SELECT colum_lists
FROM table1
RIGHT JOIN table2
ON join_condition;
The Left Join is used to fetch all rows from the left-hand table and common records between the
specified tables. It returns all the rows from the left-hand side table even though there are no
matches on the right-hand side table. If it will not find any matching record from the right side
table, then it returns null. This join can also be called a Left Outer Join.
SELECT colum_lists
FROM table1
LEFT JOIN table2
ON join_condition;
The Full Join results from a combination of both left and right join that contains all the records
from both tables. It fetches rows when there are matching rows in any one of the tables. This
means it returns all the rows from the left-hand side table and all the rows from the right-hand side
tables. If a match is not found, it puts NULL value. It is also known as FULL OUTER JOIN.
SELECT * FROM table1
FULL OUTER JOIN table2
ON join_condition;
A trigger is a set of SQL statements that reside in a system catalog. It is a special type of stored
procedure that is invoked automatically in response to an event. It allows us to execute a batch of
code when an insert, update or delete command is run against a specific table because the trigger
is the set of activated actions whenever DML commands are given to the system.
SQL triggers have two main components one is action, and another is an event. When certain
actions are taken, an event occurs as a result of those actions.
We use the CREATE TRIGGER statement for creating a trigger in SQL. Here is the syntax:
CREATE TRIGGER trigger_name
(AFTER | BEFORE) (INSERT | UPDATE | DELETE)
ON table_name FOR EACH ROW
BEGIN
--variable declarations
--trigger code
END;
A SELF JOIN is used to join a table with itself. This join can be performed using table aliases, which
allow us to avoid repeating the same table name in a single sentence. It will throw an error if we
use the same table name more than once in a single query without using table aliases.
A SELF JOIN is required when we want to combine data with other data in the same table itself. It is
often very useful to convert a hierarchical structure to a flat structure.
SELECT column_lists
FROM table1 AS T1, table1 AS T2
WHERE join_conditions;
Example
If we want to get retrieve the student_id and name from the table where student_id is equal, and
course_id is not equal, it can be done by using the self-join:
SELECT s1.student_id, s1.name
FROM student AS s1, student s2
WHERE s1.student_id=s2.student_id
AND s1.course_id<>s2.course_id;
We use the set operators to merge data from one or more tables of the same kind. Although the
set operators are like SQL joins, there is a significant distinction. SQL joins combine columns from
separate tables, whereas SQL set operators combine rows from different queries. SQL queries that
contain set operations are called compound queries. The set operators in SQL are categories into
four different types:
A. UNION: It combines two or more results from multiple SELECT queries into a single result set. It
has a default feature to remove the duplicate rows from the tables. The following syntax illustrates
the Union operator:
SELECT columns FROM table1
UNION
SELECT columns FROM table2;
B. UNION ALL: This operator is similar to the Union operator, but it does not remove the duplicate
rows from the output of the SELECT statements. The following syntax illustrates the UNION ALL
operator:
SELECT columns FROM table1
UNION ALL
SELECT columns FROM table2;
C. INTERSECT: This operator returns the common records from two or more SELECT statements. It
always retrieves unique records and arranges them in ascending order by default. Here, the number
of columns and data types should be the same. The following syntax illustrates the INTERSECT
operator:
SELECT columns FROM table1
INTERSECT
SELECT columns FROM table2;
D. MINUS: This operator returns the records from the first query, which is not found in the second
query. It does not return duplicate values. The following syntax illustrates the MINUS operator:
SELECT columns FROM table1
MINUS
SELECT columns FROM table2;
This operator is used to selects the It is a logical operator to determine whether or not a
range of data between two values. specific value exists within a set of values. This
The values can be numbers, text, and operator reduces the use of multiple OR conditions
dates as well. with the query.
It returns records whose column It compares the specified column's value and
value lies in between the defined returns the records when the match exists in the set
range. of values.
The following syntax illustrates this The following syntax illustrates this operator:
operator: SELECT * FROM table_name
SELECT * FROM table_name WHERE column_name IN ('value1','value 2');
WHERE column_name BETWEEN
'value1' AND 'value2';
The constraint is used to specify the rule and regulations that allows or restricts what values/data
will be stored in the table. It ensures data accuracy and integrity inside the table. It enforces us to
store valid data and prevents us from storing irrelevant data. If any interruption occurs between the
constraint and data action, the action is failed. Some of the most commonly used constraints are
NOT NULL, PRIMARY KEY, FOREIGN KEY, AUTO_INCREMENT, UNIQUE KEY, etc.
CREATE TABLE table_name (
column1 datatype constraint,
column2 datatype constraint,
.........
);
SQL categories the constraints into two levels:
Column Level Constraints: These constraints are only applied to a single column and limit the
type of data that can be stored in that column.
Table Level Constraints: These constraints are applied to the entire table and limit the type of data
that can be entered.
46) How to write an SQL query to find students' names start with 'A'?
We can write the following query to get the student details whose name starts with A:
SELECT * FROM student WHERE stud_name like 'A%';
Here is the demo example where we have a table named student that contains two names starting
with the 'A' character.
47) Write the SQL query to get the third maximum salary of an employee
from a table named employees.
The following query is the simplest way to get the third maximum salary of an employee:
SELECT * FROM `employees` ORDER BY `salary` DESC LIMIT 1 OFFSET 2
Here is the demo example that shows how to get the third maximum salary of an employee.
The following are the alternative way to get the third-highest salary of an employee:
SELECT salary FROM employees
ORDER BY salary DESC
LIMIT 2, 1;
B. Using Subquery
SELECT salary
FROM
(SELECT salary
FROM employees
ORDER BY salary DESC
LIMIT 3) AS Temp
ORDER BY salary LIMIT 1;
SELECT TOP 1 salary
FROM
(SELECT DISTINCT TOP 3 salary
FROM employees
ORDER BY salary DESC) AS Temp
ORDER BY salary ASC;
The main difference between them is that the delete statement deletes data without resetting a
table's identity, whereas the truncate command resets a particular table's identity. The following
comparison chart explains it more clearly:
1) The delete statement removes single The truncate command deletes the whole
or multiple rows from an existing contents of an existing table without the
table depending on the specified table itself. It preserves the table structure or
condition. schema.
3) We can use the WHERE clause in the We cannot use the WHERE clause with
DELETE command. TRUNCATE.
5) DELETE is slower because it TRUNCATE statement is faster than DELETE
maintained the log. statement as it deletes entire data at a time
without maintaining transaction logs.
6) You can roll back data after using It is not possible to roll back after using the
the DELETE statement. TRUNCATE statement.
The ACID properties are meant for the transaction that goes through a different group of tasks. A
transaction is a single logical order of data. It provides properties to maintain consistency before
and after the transaction in a database. It also ensures that the data transactions are processed
reliably in a database system.
The ACID property is an acronym for Atomicity, Consistency, Isolation, and Durability.
Atomicity: It ensures that all statements or operations within the transaction unit must be
executed successfully. If one part of the transaction fails, the entire transaction fails, and the
database state is left unchanged. Its main features are COMMIT, ROLLBACK, and AUTO-COMMIT.
Consistency: This property ensures that the data must meet all validation rules. In simple words,
we can say that the database changes state only when a transaction will be committed successfully.
It also protects data from crashes.
Isolation: This property guarantees that the concurrent property of execution in the transaction
unit must be operated independently. It also ensures that statements are transparent to each other.
The main goal of providing isolation is to control concurrency in a database.
Durability: This property guarantees that once a transaction has been committed, it persists
permanently even if the system crashes, power loss, or failed.
No. The NULL value is not the same as zero or a blank space. The following points explain their
main differences:
The NULL value can be treated as an unknown and missing value, but zero and blank spaces
differ from the NULL value.
We can compare a blank space or a zero to another blank space or a zero. On the other
hand, one NULL may not be the same as another NULL. NULL indicates that no data has
been provided or that no data exists.
SQL functions are simple code snippets that are frequently used and re-used in database systems
for data processing and manipulation. Functions are the measured values. It always performs a
specific task. The following rules should be remembered while creating functions:
A function should have a name, and the name cannot begin with a special character such as
@, $, #, or other similar characters.
User-Defined Function: Functions created by a user based on their needs are termed user-
defined functions.
System Defined Function: Functions whose definition is defined by the system are termed
system-defined functions. They are built-in database functions.
Case manipulation functions are part of the character functions. It converts the data from the state
in which it is already stored in the table to upper, lower, or mixed case. The conversion performed
by this function can be used to format the output. We can use it in almost every part of the SQL
statement. Case manipulation functions are mostly used when you need to search for data, and you
don't have any idea that the data you are looking for is in lower case or upper case.
LOWER: This function is used to converts a given character into lowercase. The following example
will return the 'STEPHEN' as 'stephen':
SELECT LOWER ('STEPHEN') AS Case_Reault FROM dual;
UPPER: This function is used to converts a given character into uppercase. The following example
will return the 'stephen' as 'STEPHEN':
SELECT UPPER ('stephen') AS Case_Reault FROM dual;
INITCAP: This function is used to converts given character values to uppercase for the initials of
each word. It means every first letter of the word is converted into uppercase, and the rest is in
lower case. The following example will return the 'hello stephen' as 'Hello Stephen':
SELECT INITCAP ('hello stephen') AS Case_Reault FROM dual;
Character-manipulation functions are used to change, extract, and alter the character string. When
one or more characters and words are passed into the function, the function will perform its
operation on those input strings and return the result.
A) CONCAT: This function is used to join two or more values together. It always appends the
second string into the end of the first string. For example:
Output: Information-technology
B) SUBSTR: It is used to return the portion of the string from a specified start point to an endpoint.
For example:
Output: Management
C) LENGTH: This function returns the string's length in numerical value, including the blank spaces.
For example:
Output: 16
D) INSTR: This function finds the exact numeric position of a specified character or word in a given
string. For example:
Output: 7
E) LPAD: It returns the padding of the left-side character value for right-justified value. For
example:
Output: ***200
F) RPAD: It returns the padding of the right-side character value for left-justified value. For
example:
Output: 200***
G) TRIM: This function is used to remove all the defined characters from the beginning, end, or
both. It also trimmed extra spaces. For example:
Output: BCDCB
H) REPLACE: This function is used to replace all occurrences of a word or portion of the string
(substring) with the other specified string value. For example:
Input: SELECT REPLACE ( 'It is the best coffee at the famous coffee shop.', 'coffee', 'tea');
The NVL() function is used to convert the NULL value to the other value. The function returns the
value of the second parameter if the first parameter is NULL. If the first parameter is anything other
than NULL, it is left unchanged. This function is used in Oracle, not in SQL and MySQL. Instead of
NVL() function, MySQL have IFNULL() and SQL Server have ISNULL() function.
56) What are the syntax and use of the COALESCE function?
The COALESCE() function evaluates the arguments in sequence and returns the first NON-NULL
value in a specified number of expressions. If it evaluates arguments as NULL or not found any
NON-NULL value, it returns the NULL result.
COALESCE (exp1, exp2, .... expn)
Example:
SELECT COALESCE(NULL, 'Hello', 'Javatpoint', NULL) AS Result;
This statement will return the following output:
The DISTINCT keyword is used to ensure that the fetched value always has unique values. It does
not allow to have duplicate values. The DISTINCT keyword is used with the SELECT statement and
retrieves different values from the table's column. We can use it with the help of the following
syntax:
SELECT DISTINCT column_lists FROM table_name WHERE [condition];
Suppose we have a table 'customer' containing eight records in which the name column has some
duplicate values.
If we want to get the name column without any duplicate values, the DISTINCT keyword is required.
Executing the below command will return a name column with unique values.
58) What is the default ordering of data using the ORDER BY clause? How
could it be changed?
The ORDER BY clause is used to sort the table data either in ascending or descending order. By
default, it will sort the table in ascending order. If we want to change its default behavior, we need
to use the DESC keyword after the column name in the ORDER BY clause.
SELECT expressions FROM tables
WHERE conditions
ORDER BY expression [ASC | DESC];
We have taken a customer table in the previous example. Now, we will demonstrate the ORDER BY
clause on them as well.
In the below output, we can see that the first query will sort the table data in ascending order
based on the name column. However, if we run the second query by specifying the DESC keyword,
the table's order is changed in descending order.
Answer: No. The above query does not return the output because we cannot use the WHERE
clause to restrict the groups. We need to use the HAVING clause instead of the WHERE clause to
get the correct output.
60) What is the difference between the WHERE and HAVING clauses?
The main difference is that the WHERE clause is used to filter records before any groupings are
established, whereas the HAVING clause is used to filter values from a group. The below
comparison chart explains the most common differences:
WHERE HAVING
It does not allow to work with aggregate functions. It can work with aggregate functions.
This clause can be used with the SELECT, UPDATE, This clause can only be used with the
and DELETE statements. SELECT statement.
The aggregate function is used to determine and calculate several values in a table and return the
result as a single number. For example, the average of all values, the sum of all values, and the
maximum and minimum value among particular groupings of values.
function_name (DISTINCT | ALL expression)
SQL provides seven (7) aggregate functions, which are given below:
AVG(): This function is used to returns the average value from specified columns.
COUNT(): This function is used to returns the number of table rows, including rows with null
values.
MAX(): This function is used to returns the largest value among the group.
MIN(): This function is used to returns the smallest value among the group.
SUM(): This function is used to returns the total summed values(non-null) of the specified
column.
SQL injection is a type of vulnerability in website and web app code that allows attackers to control
back-end operations and access, retrieve, and destroy sensitive data from databases. In this
technique, malicious SQL statements are inserted into a database entry field, and once they are
performed, the database becomes vulnerable to an attacker. This technique is commonly used to
access sensitive data and perform administrative activities on databases by exploiting data-driven
applications. It is also known as SQLi attack.
Examine the database to extract information regarding the version and structure of the
database.
The RANK function determines the rank for each row within your ordered partition in the result
set. If the two rows are assigned the same rank, then the next number in the ranking will be its
previous rank plus a number of duplicate numbers. For example, if we have three records at rank 4,
the next rank listed would be ranked 7.
The DENSE_RANK function assigns a unique rank for each row within a partition as per the
specified column value without any gaps. It always specifies ranking in consecutive order. If the two
rows are assigned the same rank, this function will assign it with the same rank, and the next rank
being the next sequential number. For example, if we have 3 records at rank 4, the next rank listed
would be ranked 5.
Yes. We can implicitly insert a row for the identity column. Here is an example of doing this:
SET IDENTITY_INSERT TABLE1 ON
INSERT INTO demo_table1 (id, name, branch)
SELECT id, name, branch FROM demo_table2
SET IDENTITY_INSERT OFF
Comments are explanations or annotations in SQL queries that are readable by programmers. It's
used to make SQL statements easier to understand for humans. During the parsing of SQL code, it
will be ignored. Comments can be written on a single line or across several lines.