32.
Which of these operators does not perform relative-value comparisons?

33.
When a user creates a stored program that accesses sensitive data but forgets that other people who can invoke the object have the same access, the security context is . . . . . . . .

34.
What is the TLS protocol?

35.
Which table in the 'INFORMATION_SCHEMA' stores information about storage engines and server plugins?

36.
Is there any error in the following MySQL statement?
SELECT e.emp_id, e.fname,e.lname,d.name
FROM employee e INNER JOIN department d
ON e.dept_id=e.dept_id;

37.
The variable that is a handle to a database object is . . . . . . . .

38.
What is def in the following MySQL statement?
DECLARE abc HANDLER FOR def ghi;

39.
A multiple-table delete can apply any join.

40.
The header that should be included first is . . . . . . . .