DATABASE MANAGEMENT SYSTEMS

¡Supera tus tareas y exámenes ahora con Quizwiz!

40. In a university environment, what is the appropriate multiplicity for an association linking courses with their list of pre-requisite courses? Focus on the numbers placed next to the 'Pre-requisite courses' side of the association. A) 0..* B) 1..* C) 0..1 D) 1..1

0..*

22. Failure to specify cascading delete when enforcing referential integrity can cause what problem? A) A foreign key may reference a value in the originating table that no longer exists B) All the records in a given table can be accidentally deleted C) The primary key may no longer be unique in a given table D) There will be no control over the creation of duplicate data

A foreign key may reference a value in the originating table that no longer exists

Assume that you are dealing with a database dealing with a university curriculum and have created the table Schedule to capture which instructor is teaching each course under the following business rules: Schedule (CourseNo, Discipline, Instructor) Business rules: 1) CourseNo uniquely defines each course offering 2) Faculty have a single discipline area (i.e., Finance, Marketing, or Information Systems), and only teach classes in that area 3) There are many faculty in each discipline 4) Students can have more than one faculty for classes in a certain discipline (you can have different instructors for Accounting 1 and Accounting 2). 28. Assume you want to add the student roster to the database, capturing which student is enrolled in which course. What is the best way to incorporate this data? A) Add a column in the schedule table for each student (i.e., CourseNo, Discipline, Instructor, Student1, Student2, ... , StudentN) B) Add another table which list the CourseNo, followed by a column for each student (i.e., CourseNo, Student1, Student2, ... , StudentN) C) Add another table with only two columns, CourseNo, StudentID, which is then associated with the Schedule table D) Add another table with Student information including all courses they are taking (i.e., Student(ID, Name, address, (other personal information fields), Course1, Course2, ..., CourseN)

Add another table with only two columns, CourseNo, StudentID, which is then associated with the Schedule table

52. Assume you are creating a database to handle the data associated with instruction at a university. What is the most appropriate special association to model the different elements contained in each classroom (i.e., projection equipment, blackboard type, computer support, etc)? A) composition association B) generalization association C) n-ary association D) reflexive association

Composition association

Assume that you are dealing with a database dealing with a university curriculum and have created the table Schedule to capture which instructor is teaching each course under the following business rules: Schedule (CourseNo, Discipline, Instructor) Business rules: 1) CourseNo uniquely defines each course offering 2) Faculty have a single discipline area (i.e., Finance, Marketing, or Information Systems), and only teach classes in that area 3) There are many faculty in each discipline 4) Students can have more than one faculty for classes in a certain discipline (you can have different instructors for Accounting 1 and Accounting 2). 29. What should the primary key be for the Schedule table? A) CourseNo B) CourseNo & Discipline C) CourseNo, Discipline & Instructor D) You need to add a surrogate key that is an autonumber

CourseNo

26. The ultimate goal in designing a database is to get all the tables into what normal form? A) Boyce Codd Normal Form B) Dependency Free Normal Form C) Domain Key Normal Form D) First Normal Form

Domain key Normal From

46. One of the first phases of a new database project that involves critical areas, expensive hardware or software within the organization is called ___________. A) analysis phase B) feasibility study C) investigation stage D) system design

Feasibility study

62. The primary difference between the Relational database (RDB) and Object Oriented database (OODB) models is ____________________. A) OODB incorporates methods in with the definition of the data structure, while RDB does not B) OODB supports multiple objects in the same database while RDB only supports a single table per database C) RDB allows the definition of the relationships between the different tables, while OODB does not allow the relationships to be defined between objects D) RDB supports indexes, while OODB does not support indexes

OODB incorporates methods in with the definition of the data structure, while RDB does not

21. The database design that uses a hierarchical data structure, but incorporates multiple data entry points is called a ________________. A) Hierarchical database B) Network database C) Object oriented database D) Relational database

Network database

48. The property (or set of properties) that uniquely defines each row in a table is called the ___________________. A) identifier B) index C) primary key D) symmetric key

Primary Key

50. The database model that utilizes multiple tables interconnected through common attributes to store and manage information is called a ______________. A) Class Database B) Matrix Database C) Network Database D) Relational Database

Relational Database

36. The database design that consists of multiple tables that are linked together through matching data stored in each table is called a ___________________. A) Hierarchical database B) Network database C) Object oriented database D) Relational database

Relational databse

24. A composition association is drawn using which symbol _______________. A) A line which loops back onto the same table B) Small closed diamond at the end of a line connecting two tables C) Small open diamond at the end of a line connecting two tables D) Small triangle at the end of a line connecting the aggregated item and multiple component items

Small closed diamond at the end of a line connecting two tables

15. If a table is in DKNF, then it is also in 3NF. A) True B) False

True

17. The employee - manager association is an example of a reflexive relationship A) True B) False

True

20. In a university database, the normal multiplicity for a relationship between courses and students would be many to many. A) True B) False

True

27. A bad choice for a primary key for the university's student database is the student phone number. A) True B) False

True

31. Tables with non-compound primary keys (i.e., primary keys that are based on a single column) are always in second normal form. A) True B) False

True

32. The purpose of class diagrams is to model the interrelationships between the different classes in the database. A) True B) False

True

37. Data normalization minimizes data redundancy. A) True B) False

True

41. Properties of an object are stored as columns in a table. A) True B) False

True

47. Individual objects are stored as rows in a table. A) True B) False

True

49. Specifying a one (1) for the lower bound for the association multiplicity on a class diagram indicates that the item is required. A) True B) False

True

51. Specifying a zero (0) for the lower bound for the association multiplicity on a class diagram indicates that the item is optional. A) True B) False

True

53. Specifying an asterisk (*) for the association multiplicity on a class diagram indicates that the quantity of the item is unknown, and can have many items associated with it. A) True B) False

True

54. The developer can follow a specific set of procedures and rules to ensure that a table is in 1NF, 2NF and 3NF. A) True B) False

True

58. N-ary associations are used to convert Many to Many relationships to multiple 1 to Many relationships. A) True B) False

True

63. DBMS stores data efficiently with little wasted space. A) True B) False

True

64. A primary goal of a database system is to share data with multiple users. A) True B) False

True

59. Data integrity can be improved by which of the following me

____________. A) adding indexes B) entering appropriate terms into the data dictionary C) incorporating business rules when defining the data D) using inheritance ans incorporating business rules when defining the data

43. Assume you are dealing with a purchasing database involving a single table. This table contains information on the customer, sale, and items purchased, where the sales order number is the primary key.Using this database design, the system will prevent you from entering any information on new products unless they are involved in a sale. This is an example of ______________. A) a hidden dependency B) an insertion anomaly C) an update anomaly D) referential data integrity

an insterion anomaly

7. Business rules can be represented in the database through ________________. A) associations (or relationships) B) attributes C) properties D) secondary keys

associations (or relationships)

34. A data type that creates unique numbers for key columns in Microsoft Access is ___________. A) autonumber B) Boolean C) sequential key D) sequential number

autonumber

2. Software that defines a database, stores the data, supports a query language, produces reports and creates data entry screens is a _________________. A) data dictionary B) database management system (DBMS) C) decision support system D) relational database

database management system (DBMS)

12. Tables in first normal form (1NF) __________________. A) do not have any repeating groups B) does not have any replicated data C) eliminate the possibility of a insertion anomalies D) have a composite key

do not have any repeating groups

33. The process of defining and bundling all of the properties and functions into a class is called __________________________. A) database design B) encapsulation C) inheritance D) polymorphism

encapsulation

25. Referential Integrity Constraints are used to ________________. A) enforce one to many relationships B) enforce the uniqueness of the values entered as primary keys C) ensure that foreign keys can be entered only if the corresponding value exists in the originating table D) ensure that values entered for a certain property (i.e., table column) are appropriate

ensure that foreign keys can be entered only if the corresponding value exists in the origination table

3. The term referring to a physical item existing in the real world that you want to track is called ____________________. A) class B) entity C) object D) table

entity

19. The ability to define common properties or functions in the higher class and then modify them in the lower classes is called _______________________. A) Inheritance B) Polymorphism C) Reflexive D) Tr

formance ans Polymorphism

4. The tool which assists in generating input screens is referred to as ____________. A) data dictionary B) forms generator C) input screen tool D) report generator

forms generator

10. Tables in third normal form (3NF) _______________. A) do not have any repeating groups B) eliminate the possibility of a insertion anomalies C) have a composite key D) have all non-key fields depend on nothing but the primary key

have all non-key fields depend on nothing but the primary key

14. Tables in second normal form (2NF) ___________________. A) eliminate all hidden dependencies B) eliminate the possibility of a insertion anomalies C) have a composite key D) have all non-key fields depend on the whole primary key

have all non-key fields depend on the whole primary key

11. The association role defines ____________________. A) how tables are related in the database B) the relationship between the class diagram and the tables in the database C) the tables that each attribute is contained D) which attribute is the table's primary key

how tables are related in the database

23. Data integrity constraints are used to _____________________. A) control who is allowed access to the data B) ensure that duplicate records are not entered into the table C) improve the quality of data entered for a specific property (i.e., table column) D) prevent users from changing the values stored in the table

improve the quality of data entered for a specific property (i.e., table column)

42. A problem created with repeating groups is ___________________. A) creates a deletion anomaly B) creates an update anomaly C) inefficient use of space D) slows down the system

inefficient use of space

13. Tables in Boyce-Codd Normal Form (BCNF) if the table is in 3NF and ________. A) data integrity is enforced B) no hidden dependencies exist between non-key fields and key fields C) referential integrity is enforced D) the table is indexed

no hidden dependencies exist between non-key fields and key fields

16. Tables in fourth normal form (4NF) if the table is in 3NF and ____________. A) data integrity is enforced B) it contains a composite key C) referential integrity is enforced D) there are no hidden dependencies

there are no hidden dependencies

65. When building a database, the data dealing with an entity is modeled as a _____ . A) attribute B) class C) object D) table

Class

45. Database system modelers use this type of diagram to graphically represent both the data structure and how the different objects are interrelated. A) Class Diagram B) Data Diagram C) Object Diagram D) Table Relationship Diagram

Class Diagram

55. The process to properly define the database tables to provide flexibility, minimize redundancy, and ensure data integrity is called ___________________. A) class diagram B) data normalization C) database design D) design rationalization

Data Normalization

56. Which component of the database management system (DBMS) most affects the performance (speed)? A) Data Storage Subsystem B) Database Engine C) Query Processor D) Security Subsystem

Database Engine

18. If a table is in 3NF, it is also in 1NF. A) True B) False

False

39. Databases do not have the ability to do numerical calculations. A) True B) False

False

44. Most databases allow multiple records that are identical (i.e., records that have the same values for all properties). A) True B) False

False

5. A good choice for a primary key for the university's student database is the student phone number. A) True B) False

False

6. The primary key need not be unique for a given table. A) True B) False

False

60. Aggregation associations are used to convert Many to Many relationships to multiple 1 to Many relationships. A) True B) False

False

8. In a university database, the normal multiplicity for a relationship between courses and students would be one to many. A) True B) False

False

Assume that you are dealing with a database dealing with a university curriculum and have created the table Schedule to capture which instructor is teaching each course under the following business rules: Schedule (CourseNo, Discipline, Instructor) Business rules: 1) CourseNo uniquely defines each course offering 2) Faculty have a single discipline area (i.e., Finance, Marketing, or Information Systems), and only teach classes in that area 3) There are many faculty in each discipline 4) Students can have more than one faculty for classes in a certain discipline (you can have different instructors for Accounting 1 and Accounting 2). 30. Assuming that the appropriate primary key is used in Schedule, what normal form is it in? A) First & Second Normal Form B) First Normal only C) First, Second & third Normal Form D) Second Normal Form only

First, Second, & third Normal Form

38. The fields in one table that link to the primary key in another table are called _________. A) composite key B) dependent key C) foreign key D) metadata

Foreign key

1. The traditional storage of data that is organized by customer, stored in separate folders in filing cabinets is an example of what type of 'database' system? A) Hierarchical B) Network C) Object oriented D) Relational

Hierarchical

9. The term used for the functions and procedures that work on class data is ______. A) Attributes B) Entity C) Methods D) objects

Methods

35. Assume that you have a Customer table and an Order table, where Referential Integrity constraints require that a customer record be entered before an order can be entered. Also Cascade on delete is enforced. If you delete a Customer record, ______________. A) nothing will happen to the order table (it will be unchanged) B) orders by that customer will be deleted C) the Customerid in the order table will be set to null for those records which previously referred to the now deleted customer D) the system will prevent you from deleting the customer until the orders placed by that customer are deleted first by the user.

orders by that customer will be dleeted

57. Two different terms are used to describe the characteristics of interest for an entity. They are attributes and _____________. A) classes B) entities C) properties D) traits

properties

61. The role of the query system is to __________________. A) present the data in a user friendly format B) provide data security C) retrieve and manipulate data D) support data integrity

retrieve and manipulate data


Conjuntos de estudio relacionados

Ming/Qing Dynasty and Tokugawa Japan Review

View Set

EB Chapter 5: Profit Sharing Plans

View Set

KIN 245 Manual of Structural Kinesiology (19 ed) Chapter 9, 10, 11, & 12

View Set

Quiz 5: The Cycling of Water Through Soil

View Set

1.3.2 - CATEGORIES OF PREFERRED STOCK

View Set