CIS 458-

¡Supera tus tareas y exámenes ahora con Quizwiz!

1) A database is an organized collection of ________ related data. A) logically B) physically C) loosely D) badly

A

11) What does the following SQL command do? insert into Customer values (001,'John Smith','231 West St','Boston','MA','02115'); A) Adds a new record to the Customer B) Creates the Customer table C) Deletes the Customer table D) Updates the Customer table

A

5) ________ is a set of commands used to update and query a database. A) DML B) DDL C) DCL D) DPL

A

13) INSERT INTO is an example of ________ code. A) DDL B) DML C) DCL D) DNL

B

17) A primary key that consists of more than one attribute is called a: A) foreign key. B) composite key. C) multivalued key. D) cardinal key.

B

2) ________ are established between entities in a well-structured database so that the desired information can be retrieved. A) Entities B) Relationships C) Lines D) Ties

B

3) The ________ is the structure that contains descriptions of objects such as tables and views created by users. A) SQL B) schema C) catalog D) master view

B

6) DDL is typically used during which phase of the development process? A) Implementation B) Physical design C) Analysis D) Evaluation

B

7) Any create command may be reversed by using a(n) ________ command. A) undo B) drop C) delete D) unpack

B

8) The SQL command ________ adds one or more new columns to a table. A) create table B) alter table C) create view D) create relationship

B

10) What does the following SQL statement do? Alter Table Customer Add Type (varchar2 (10)); A) Alters the Customer table to accept Type Varchar2 B) Alters the Customer table to be a Type 2 Varchar C) Alters the Customer table, and adds a field called "Type" D) Alters the Customer table by adding a 2-byte field called "Varchar"

C

12) Referential Integrity Constraints are generally established between: A) Referential and Integrity keys. B) Primary and Secondary keys. C) Primary and Foreign keys. D) Foreign and Domestic keys.

C

14) In an SQL statement, which of the following parts states the conditions for row selection? A) Select B) From C) Where D) Group By

C

15) An attribute (or attributes) that uniquely identifies each row in a relation is called a: A) column. B) foreign field. C) primary key. D) duplicate key.

C

16) An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A) link attribute. B) link key. C) foreign key. D) foreign attribute.

C

4) ________ is a set of commands used to control a database, including security. A) DML B) DDL C) DCL D) TCL

C

18) A ________ defines or constrains some aspect of the business. A) Business constraint B) Business structure C) Business control D) Business rule

D

9) How to make changes permanent after manipulating a table? A) Rollback B) Update C) Delete D) Commit;

D

19) DCL is used to update the database with new records.

FALSE

21) A database is maintained and queried using the data mapping language (DML).

FALSE

22) The CREATE SCHEMA DDL command is used to create a table.

FALSE

24) In databases, null values are equivalent to zero.

FALSE

25) The DELETE TABLE DDL command is used to remove a table from the database.

FALSE

27) The following insert command would work fine: insert into budget values 121,222,111;

FALSE

28) The DROP command deletes rows from a table individually or in groups.

FALSE

30) RDBMS stands for Related Data Build Management System.

FALSE

20) A database table is defined using the data definition language (DDL).

TRUE

23) SQL is a standard language for database access.

TRUE

26) The SQL command used to populate tables is the INSERT command.

TRUE

29) The asterisk (*) wildcard designator can be used to select all fields from a table as well as in WHERE clauses when an exact match is not possible.

TRUE


Conjuntos de estudio relacionados

ACCY 1 LS: Chapter 8. Current Liabilities

View Set

Chapter Two Homework and Quiz Review - Econ 150

View Set

Module 2: Structures and Functions

View Set