CS 4420 Intro to Database Systems Final Chapter 9 and 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

A view can be built to present only the data to which a user requires access.

True

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

concurrency control

A repository of information about a database that documents data elements of a database is called a:

data dictionary.

The transaction log contains before and after images of records that have been modified.

False

Transient data are never changed.

False

The W3C standard for Web privacy is called:

Platform for Privacy Preferences.

Which of the following is a principal type of authorization table?

Subject

Which of the following is not a component of a repository system architecture?

A data transformation process

What is a journalizing facility?

A facility that maintains an audit trail of transactions and database changes.

What is backward and forward recovery?

Backward - DBMS undo unwanted changes to the database (Rollback) Foward - DBMS start with an earlier copy of the database (Rollfoward)

________ is an ill-defined term applied to databases where size strains the ability of commonly used relational DBMSs to manage the data.

Big data

Which of the following factors drive the need for data warehousing?

Businesses need an integrated view of company information.

Which of the following data-mining techniques identifies clusters of observations with similar characteristics?

Clustering and signal processing

A domain is a way to create a structure that acts like a table.

False

A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions.

True

A data mart is a(n):

data warehouse that is limited in scope.

A repository of information about data is called a catalog.

False

An operational data store typically holds a history of snapshots of the state of an organization whereas an enterprise data warehouse does not typically contain history.

False

Controls incorporated into a data management system that restrict access to data are called authentication rules.

False

In order to perform a restore/rerun, the database must be mirrored.

False

Multidimensional OLAP (MOLAP) tools use variations of SQL and view the database as a relational database, in either a star schema or other normalized or denormalized set of tables.

False

The representation of data in a graphical format is called data mining.

False

What are some approaches to handling slowly changing dimensions?

Overwrite the current value with the new value. For each dimension attribute that changes, create a current value field and as many old value fields as we wish. Create a new dimension table row each time the dimension object changes.

What are integrity controls? Describe the different types.

Protects data from unauthorized use and update. Domain - User-defined data type, that can be in one place the domain definition. Assertions - Enforce certain desirable database conditions. Triggers - Used for security purposes. (Prohibit actions, special handling procedures to execute, and write to a log file)

OLAP tools that use the database as a traditional relational database are called:

ROLAP tools.

A corporate information factory (CIF) is a comprehensive view of organizational data in support of all user data requirements.

True

A shared lock allows other transactions to read but not update records in use.

True

Medical claims and pharmaceutical data would be an example of big data.

True

Open-source DBMS are free software that provide the core functionality of an SQL compliant DBMS.

True

Scalable technology is critical to a data mart.

True

The data administrator takes responsibility for the overall management of data resources.

True

The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.

True

The need for data warehousing in an organization is driven by its need for an integrated view of high-quality data.

True

All of the following are ways to handle changing dimensions EXCEPT:

create a snowflake schema.

All of the following are some beneficial applications for real-time data warehousing EXCEPT:

data entry.

An operational data store (ODS) is a(n):

integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.

All of the following are limitations of the independent data mart EXCEPT:

it is often more expedient to build a data mart than a data warehouse.

Conformed dimensions allow users to do the following:

query across fact tables with consistency.

The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is:

subject-oriented.

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

two-phase lock


Conjuntos de estudio relacionados

Accounting multiple choice questions test 2

View Set

A6-Demand, Supply, Marginal costs, Marginal Benefit

View Set

Prep U's - Chapter 41 - Drug Therapy for Diabetes Mellitus

View Set

Module 1 (Graded Quiz): Overview of Cloud Computing

View Set

Texas Principles of Real Estate 1: Chapter 9 Quiz

View Set

BAS 282: Retailing & Omnichannel Marketing: Homework

View Set

Business Law I -- Chapter 17 -- Agency -- Cengage Mind Tap / Quiz

View Set

Chapter 18: Health Promotion and Risk Reduction in the Community

View Set