Exam II BCIS 5420 Final Dataset Combined
1) ________ database specification indicates all the parameters for data storage that are then input to database implementation. A) Logical B) Physical C) Schematic D) Conceptual
B
14) Which of the following are properties of relations? A) Each attribute has the same name. B) No two rows in a relation are identical. C) There are multivalued attributes in a relation. D) All columns are numeric.
B
17) The ________ states that no primary key attribute may be null. A) referential integrity constraint B) entity integrity rule C) partial specialization rule D) range domain rule
B
18) In the figure below, Customer_ID in the CUSTOMER Table is which type of key? A) Composite B) Candidate C) Standard D) Grouped
B
3) Data is represented in the form of: A) data trees. B) tables. C) data notes. D) chairs.
B
The content of dynamic views is generated when they are referenced. T/F
T
All of the following are valid datatypes in Oracle 12c EXCEPT: BOOLEAN. BLOB. VARCHAR2. NUMBER.
a
Apache Cassandra is a leading producer of ________ NoSQL database management systems. wide-column key-value store graph relational
a
Hive uses ________ to query data. BeesNest HiveQL Honeyquery SQL
b
The ________ operator is used to combine the output from multiple queries into a single result table. DIVIDE UNION COLLATE INTERSECT
b
SQL provides the ________ technique, which involves placing an inner query within the WHERE or HAVING clause of an outer query. A) grouping B) joining C) subquery D) union
c
The command for creating a database is: A) create table. B) create view. C) create schema. D) create authorization.
c
The following code is an example of a(n): SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; subquery. Full Outer JOIN. Right Outer JOIN. Equi-join
d
The most commonly used form of join operation is the: A) outer join. B) union join. C) equi-join. D) natural join.
d
When a user creates a virtual table it is called a(n): A) materialized view. B) virtual table. C) inline view. D) dynamic view.
d
The CREATE SCHEMA DDL command is used to create a table. T/F
F
The DELETE TABLE DDL command is used to remove a table from the database. T/F
F
Unlimited bandwidth is a characteristic of cloud computing. T/F
F
When the SELECT clause in the create view statement contains the keyword DISTINCT, the view can be used to update data. T/F
F
Word processing documents are commonly stored in a 'document store' NoSQL database model. T/F
F
The 'schema on read' approach often incorporates JSON or XML. T/F
T
The ALTER TABLE command is used to change a table definition. T/F
T
The FROM clause is the first statement processed in an SQL command. T/F
T
The following query totals sales for each salesperson. SELECT salesperson_id, sum(sales) FROM salesperson GROUP BY salesperson_id; T/F
T
16) The entity integrity rule states that: A) no primary key attribute can be null. B) referential integrity must be maintained across all entities. C) each entity must have a primary key. D) a primary key must have only one attribute.
a
The following code is an example of a(n): SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; A) equi-join. B) subquery. C) Full Outer JOIN. D) Right Outer JOIN.
a
A disadvantage of partitioning is: remote optimization. extra space and update time. shorter technology spans. simplicity.
b
A discrete unit of work that must be processed completely or not at all in a computer system is called a(n) ________. journalizing facility. transaction. change control device. before image.
b
A factor to consider when choosing a file organization is: DDL. efficient storage. inefficient data retrieval. DML.
b
A file organization where files are not stored in any particular order is considered a: hash key. heap file organization. multi-indexed file organization. hashed file organization.
b
A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): A) equi-join. B) natural join. C) multivariate join. D) inner join.
b
A method for handling missing data is to: delete the associated row. track missing data with special reports. perform insensitivity testing. substitute with random numbers for the missing data.
b
A type of query that is placed within a WHERE or HAVING clause of another query is called a: A) master query. B) subquery. C) superquery. D) multi-query.
b
A(n) ________ is a field of data used to locate a related field or record. lock pointer index key
b
All of the following are guidelines for better query design EXCEPT: write simple queries. use a lot of self-joins. understand how indexes are used in query processing. retrieve only the data that you need.
b
An organization that requires a sole focus on performance with the ability for keys to include strings, hashes, lists, and sorted sets would select ________ database management system. Access Redis Excel Spreadsheet Neo4J
b
At a basic level, analytics refers to: conducting a needs analysis. analysis and interpretation of data. normalizing data. collecting data
b
Big data requires effectively processing: two data types (text and numeric). many data types. a single data type (text). a single data type (numeric).
b
Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: using the immediate if statement. using the CASE key word in a statement. using a subquery. using the if-then-else construct.
b
Given a table named store with 5 fields: store_id, address, city, state, zipcode, why would the following insert command not work? insert into store values ('234 Park Street') A) It would work just fine. B) You must specify the fields to insert if you are only inserting some of the fields. C) There is no table keyword. D) Insert into should be INSERT to.
b
NoSQL includes data storage and retrieval: based on the relational model. not based on the relational model. based on normalized tables. not based on data.
b
One major advantage of the outer join is that: A) information is easily accessible. B) information is not lost. C) the query is easier to write. D) information's data type changes.
b
Requiring a CustomerID to exist in a Primary table before it can exist in a foreign table is an example of: A) Referential Referring. B) Referential Integrity. C) Ethical Integrity. D) the Hoffer Principle.
b
SQL-invoked routines can be: A) part of a DDL statement. B) functions or procedures. C) part of a DCL statement. D) contained within a CREATE statement.
b
The following statement is an example of: CREATE TABLE Customer_t ( CustNmbr number(11,0), CreditLimit number(6,2), CustStart date, CustEnd date, PERIOD for Custperiod(CustStart,CustEnd)); A) a materialized view. B) an application time period table. C) a system-versioned table. D) a dynamic view.
b
To eliminate duplicate rows in a query, the ________ qualifier is used in the SQL Select command. A) alter B) distinct C) check D) specific
b
A join operation: brings together data from two different fields. is used to combine indexing operations. causes two tables with a common domain to be combined into a single table or view. causes two disparate tables to be combined into a single table or view.
c
A materialized view is/are: A) a virtual table created dynamically on request by a user. B) an in-line query. C) copies or replica of data based on queries. D) always an exact copy of the source table.
c
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: query optimization. perpendicular query processing. parallel query processing. multiple partition queries
c
A trigger can be used as a security measure in which of the following ways? To conduct a DFD analysis To check for viruses To cause special handling procedures to be executed To design a database
c
An appropriate datatype for adding a sound clip would be: CHAR. DATE. BLOB. VARCHAR
c
An integrity control supported by a DBMS is: GUI guards. security. range control. substitute estimates.
c
Arequirement to begin designing physical files and databases is: implementation complete. all datatypes determined. normalized relations. physical tables created.
c
Controls designed to restrict access and activities are called: business rules. schemas. authorization rules. encryption controls.
c
What will result from the following SQL Select statement? Select min(Product_Description) from Product_V; A) The minimum value of Product_Description will be displayed. B) An error message will be generated. C) The first product description alphabetically in Product_V will be shown. D) SELECT @ will be displayed.
c
When a data repository (including internal and external data) does NOT follow a predefined schema, this is called a: data stream data dump data lake data ocean
c
When reporting and analysis organization of the data is determined when the data is used is called a(n): entity relationship diagram. schema binding. schema on read. cognitive schema.
c
Which of the following finds all groups meeting stated conditions? A) Select B) Where C) Having D) Find
c
________ use the result of the inner query to determine the processing of the outer query. A) Correlated subqueries B) Outer subqueries C) Inner subqueries D) Subqueries
d
The following queries produce the same results. SELECT DISTINCT Customer_Name, Customer_City FROM Customer, Salesman WHERE Customer.Salesman_ID = Salesman.Salesman_ID and Salesman.Lname = 'SMITH'; SELECT Customer_Name, Customer_City FROM Customer WHERE Customer.Salesman_ID =(SELECT Salesman_ID FROM Salesman WHERE Lname = 'SMITH'); t/F
T
What results will be produced by the following SQL query? Select sum(standard_price) as Total_Price from Product_V where Product_Type = 'WOOD'; A) The total price of all products that are of type wood B) The total price of all products C) The Standard_Price of the first wood product in the table D) The Standard_Price of any wood product in the table
a
43) A rule that states that each foreign key value must match a primary key value in the other relation is called the: A) referential integrity constraint. B) key match rule. C) entity key group rule. D) foreign/primary match rule.
a
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a: checkpoint facility. database change log. backup facility. recovery manager.
a
A key decision in the physical design process is: selecting structures. deciding on the monitor. deciding the e-r diagrams. ignoring the size of the database.
a
Designing physical files requires ________ of where and when data are used in various ways. descriptions maps keys hints
a
One field or combination of fields for which more than one record may have the same combination of values is called a(n): secondary key linked key composite key index
a
Relational databases are heavily based on the mathematical concept of: A) Set Theory. B) Bet Theory. C) Get Theory. D) Met Theory.
a
The ________ operator is used to combine the output from multiple queries into a single result table. UNION DIVIDE COLLATE INTERSECT
a
The first part of an SQL query to be read is the ________ statement. A) SELECT B) FROM C) WHERE D) ORDER BY
b
32) An attribute that may have more than one meaning is called a(n): A) homonym. B) alias. C) double defined attribute. D) synonym.
A
34) Understanding the steps involved in transforming EER diagrams into relations is important because: A) one must be able to check the output of a CASE tool. B) there are rarely legitimate alternatives from which to choose. C) CASE tools can model any situation. D) CASE tools model hypothetical business problems.
A
23) A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form? A) First B) Second C) Third D) Fourth
B
25) A candidate key must satisfy all of the following conditions EXCEPT: A) the key must uniquely identify the row. B) the key must indicate the row's position in the table. C) the key must be nonredundant. D) each nonkey attribute is functionally dependent upon it.
B
26) The attribute on the left-hand side of the arrow in a functional dependency is the: A) candidate key. B) determinant. C) foreign key. D) primary key.
B
27) A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a ________ dependency. A) partial key-based B) partial functional C) cross key D) merged relation
B
33) An alternative name for an attribute is called a(n): A) synonym. B) alias. C) alternate attribute. D) related characteristic.
B
36) When a regular entity type contains a multivalued attribute, one must: A) create a single relation with multiple lines for each instance of the multivalued attribute. B) create two new relations, one containing the multivalued attribute. C) create two new relations, both containing the multivalued attribute. D) delete the relation and start over
B
41) Referring to the figure below, which of the following is NOT true? A) A component is part of an item. B) A component is always used in only one item. C) A component can be part of an item. D) A component may be used in many items.
B
5) ________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated. A) Business rule constraint B) Data integrity C) Business integrity D) Data structure
B
21) The normal form which removes any remaining functional dependencies because there was more than one primary key for the same nonkeys is called: A) fifth normal form. B) fourth normal form. C) Boyce-Codd normal form. D) sixth normal form.
C
31) Two or more attributes having different names but the same meaning are called: A) homonyms. B) aliases. C) synonyms. D) alternate attributes.
C
35) A nonkey attribute is also called a(n): A) column. B) unimportant datum. C) descriptor. D) address.
C
44) ________ anomalies can be caused by editing data in tables. A) Insertion B) Deletion C) Modification D) Creation
C
7) An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A) link attribute. B) link key. C) foreign key. D) foreign attribute.
C
A procedure is: A) stored outside the database. B) given a reserved SQL name. C) called by name. D) unable to be modified.
C
42) The figure below is an example of mapping which type of relationship? A) First B) Second C) Unary D) Ternary
D
45) A relation that contains minimal redundancy and allows easy use is considered to be: A) clean. B) simple. C) complex. D) well-structured.
D
72) The entity integrity rule states that a primary key attribute can be null. T/F
F
73) In the relational data model, associations between tables are defined through the use of primary keys. T/F
F
76) The truncate table statement in SQL creates a new table. T/F
F
81) A co-dependency is a constraint between two attributes or two sets of attributes. T/F
F
83) A relation is in first normal form if it has no more than one multivalued attribute. T/F
F
85) A transversal dependency is a functional dependency between two or more nonkey attributes. T/F
F
86) Anomalies do not generally arise out of transitive dependencies. T/F
F
A database is maintained and queried using the data mapping language (DML). T/F
F
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager. T/F
F
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. T/F
F
A domain is a way to create a structure that acts like a table. T/F
F
A routine is a named set of SQL statements that are considered when a data modification occurs. T/F
F
A single value returned from an SQL query that includes an aggregate function is called a vector aggregate. T/F
F
A subquery in which processing the inner query depends on data from the outer query is called a codependent query. T/F
F
The philosophical underpinnings of big data are based on schema on write. T/F
F
The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions. T/F
F
The schema on write and schema on read are considered synonymous approaches. T/F
F
The target market for Hadoop is small to medium companies using local area networks. T/F
F
Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, and replicate tables, but cannot call other triggers. T/F
F
What does the following SQL statement do? Select * From Customer Where Cust_Type = "Best" A) Selects all the fields from the Customer table for each row with a customer labeled "Best" B) Selects the "*" field from the Customer table for each row with a customer labeled "Best" C) Selects fields with a "*" in them from the Customer table D) Selects all the fields from the Customer table for each row with a customer labeled "*"
a
A join in which the joining condition is based on equality between values in the common column is called an equi-join. T/F
T
A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization. T/F
T
A procedure is run by calling it by its name. T/F
T
An INSERT command does not need to have the fields listed. T/F
T
Hive creates MapReduce jobs and executes them on a Hadoop Cluster. T/F
T
In a Heap file organization, files are not stored in any particular order. T/F
T
Platform-as-a-service is an approach for providing infrastructure resources and tools for developers to be productive. T/F
T
The advantages of SQL-invoked routines are flexibility, efficiency, sharability, and applicability. T/F
T
The following SQL statement is an example of a correlated subquery. SELECT First_Name, Last_Name, Total_Sales FROM Salesman s1 WHERE Total_Sales > all (SELECT Total_Sales FROM Salesman s2 WHERE s1.Salesman_ID != s2.Salesman_ID); T/F
T
ACID support for database-as-a-service is easily provided in a cloud computing environment. T/F
F
Backward recovery starts with an earlier copy of the database. T/F
F
A materialized view is not persistent. T/F
T
What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A) Changes the price of a unit called Product_T to 7 B) Changes the unit price of Product 7 to 775 C) Changes the length of the Unit_Price field to 775 D) Updates the Product_T table to have a unit price of 775
b
The preferred method of fixing an aborted transaction is: repairing the schema. switching. backing out the transaction. duplication of data.
c
8) A primary key whose value is unique across all relations is called a(n): A) global primary key. B) inter-table primary key. C) enterprise key. D) foreign global key.
C
An extent is a named portion of secondary memory allocated for the purpose of storing physical records. T/F
F
Big data allows for two different data types (text and numeric). T/F
F
Horizontal partitioning refers to the process of combining several smaller relations into a larger table. T/F
F
IF-THEN-ELSE logical processing cannot be accomplished within an SQL statement. T/F
F
Structured Query Language (SQL) is a set of methodologies, processes, architectures, and technologies that transform raw data into meaningful information. T/F
F
The Number datatype would be appropriate for a zip code. T/F
F
There is a special operation in SQL to join a table to itself. T/F
F
Three-factor authentication is most often implemented with a credit card. T/F
F
Transaction processing and management reporting tend to fit big data databases better than relational databases. T/F
F
75) A cascading delete removes all records in other tables associated with the record to be deleted. T/F
T
77) A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies. T/F
T
79) When normalizing, the goal is to decompose relations with anomalies to produce smaller, well-structured relations. T/F
T
82) A candidate key is an attribute, or combination of attributes, that uniquely identifies a row in a relation. T/F
T
84) A partial functional dependency is a functional dependency in which one or more nonkey attributes are functionally dependent on part (but not all) of the primary key. T/F
T
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. T/F
T
A base table is the underlying table that is used to create views. T/F
T
A business owner that needs carefully normalized tables would likely need a relational database instead of a NoSQL database. T/F
T
A natural join is the same as an equi-join, except that it is performed over matching columns that have been defined with the same name, and one of the duplicate columns is eliminated. T/F
T
A pointer is a field of data that can be used to locate a related field or record of data. T/F
T
Expressions are mathematical manipulations of data in a table that may be included as part of the SELECT statement. T/F
T
Some DBMS can handle graphic data types as well as text and numbers. T/F
T
Sarbanes-Oxley Act was enacted to ensure the integrity of: public companies' financial statements. SQL. Entity-Relationship Diagrams. private companies' shareholders meetings.
a
The Hadoop framework consists of the ________ algorithm to solve large scale problems. MapReduce MapSystem MapComponent MapCluster
a
Specifying the attribute names in the SELECT statement will make it easier to find errors in queries and also correct for problems that may occur in the base system. T/F
F
Subqueries can only be used in the WHERE clause. T/F
F
71) The allowable range of values for a given attribute is part of the domain constraint. T/F
T
74) A referential integrity constraint is a rule that maintains consistency among the rows of two relations. T/F
T
80) A relation in fifth normal form may not contain any anomalies. T/F
T
A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored. T/F
T
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day. T/F
T
A trigger is a named set of SQL statements that are considered when a data modification occurs. T/F
T
Adding the DISTINCT keyword to a query eliminates duplicates. T/F
T
Apache Cassandra is a wide-column NoSQL database management system. T/F
T
Joining tables or using a subquery may produce the same result. T/F
T
Triggers have three parts: the event, the condition, and the action. T/F
T
Value (related to the five 'v's' of big data) addresses the pursuit of a meaningful goal. T/F
T
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space. T/F
T
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called: Infrastructure-as-a-service. IDE. Software-as-a-service. Platform-as-a-service
a
_______ includes concern about data quality issues. Vigilant Velocity Veracity Variety
c
The following two SQL statements will produce the same results. SELECT last_name, first_name FROM customer WHERE credit_limit > 99 AND credit_limit < 10001; SELECT last_name, first_name FROM customer WHERE credit_limit BETWEEN 100 and 10000; T/F
T
The views are created by executing a CREATE VIEW SQL command. T/F
T
Hive is a(n) ________ data warehouse software. Apache Microsoft Macintosh Oracle
a
The outer join syntax does not apply easily to a join condition of more than ________ tables. A) two B) three C) four D) five
a
The primary use of Pig is to: transform raw data into a format that is useful for analysis. create data warehouses. create large databases. query large databases
a
To get all the customers from Hawaii sorted together, which of the following would be used? A) ORDER BY B) GROUP BY C) HAVING D) SORT
a
Which of the following can produce scalar and vector aggregates? A) ORDER BY B) GROUP BY C) HAVING D) SORT
b
Which of the following threats involves outside parties using information to embarrass a company? Loss of data integrity Theft and fraud Accidental loss loss of confidelity
d
Along with table scans, other elements of a query can be processed in parallel. T/F
T
An SQL query that implements an outer join will return rows that do not have matching values in common columns. T/F
T
An audit trail of transactions and database changes is kept by a journalizing facility T/F
T
Hash partitioning spreads data evenly across partitions independent of any partition key value. T/F
T
In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with the IN qualifier. T/F
T
In order to update data in SQL, one must inform the DBMS which relation, columns, and rows are involved. T/F
T
JSON is commonly used in conjunction with the 'document store' NoSQL database model. T/F
T
Keeping the zip code with the city and state in a table is a typical form of denormalization. t/f
T
Live migration from one environment to another in cloud computing is a challenge. T/F
T
MapReduce is an algorithm for massive parallel processing utilized by Hadoop. T/F
T
NoSQL databases DO NOT support ACID (atomicity, consistency, isolation, and durability). T/F
T
One objective of selecting a data type is to minimize storage space. T/F
T
One of the original purposes of the SQL standard was to provide a vehicle for portability of database definition and application modules between conforming DBMSs. T/F
T
The SQL command used to populate tables is the INSERT command. T/F
T
The asterisk (*) wildcard designator can be used to select all fields from a table as well as in WHERE clauses when an exact match is not possible. T/F
T
The benefits of a standardized relational language include: A) application turnover. B) increased training costs. C) cross-system communication. D) confusing the SQL programmers.
c
65) If an identifier is not assigned, the default primary key for an associative relation consists of the two primary key attributes from the other two relations. T/F
T
A view can be built to present only the data to which a user requires access. T/F
T
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. T/F
T
When EXISTS or NOT EXISTS is used in a subquery, the select list of the subquery will usually just select all columns as a placeholder because it doesn't matter which columns are returned. T/F
T
The first in a series of steps to follow when creating a table is to: A) identify columns that must be unique. B) identify each attribute and its characteristics. C) create an index. D) identify columns that must be null.
b
Which of the following is a technique for optimizing the internal performance of the relational data model? A) Avoiding indexes on secondary keys B) Clustering data C) Not reporting statistics to save machine resources D) Using random index organizations
b
Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A) How many products are in the table Product_T? B) How many products have product descriptions in the Product Table? C) How many characters are in the field name "Product_Description"? D) How many different columns named "Product_Description" are there in table Product_T?
b
Which of the following will produce the minimum of all standard prices? A) Select standard_price from Product_V where Standard_Price = min; B) Select min(standard_price) from Product_V; C) Select Standard_Price from min(Product_V); D) Select min(Standard_Price) from Product_V where Standard_Price = min(Standard_Price);
b
Which type of file is easiest to update? Clustered Hashed Sequential Indexed
b
While triggers run automatically, ________ do not and have to be called. A) trapdoors B) routines C) selects D) updates
b
________ is an important scripting language to help reduce the complexity of MapReduce. Dog Pig Cat Horse
b
24) A constraint between two attributes is called a(n): A) functional relation. B) attribute dependency. C) functional dependency. D) functional relation constraint.
c
28) A functional dependency between two or more nonkey attributes is called a: A) partial functional dependency. B) partial nonkey dependency. C) transitive dependency. D) partial transitive dependency.
c
6) An attribute (or attributes) that uniquely identifies each row in a relation is called a: A) column. B) foreign field. C) primary key. D) duplicate key.
c
A ________ is a temporary table used in the FROM clause of an SQL query. trigger view table derived table correlated subquery
c
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the: explain query. show optimization. explain plan. analyze query.
c
A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): equi-join. natural join. outer join. union join.
c
A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): A) natural join. B) equi-join. C) outer join. D) union join.
c
An index on columns from two or more tables that come from the same domain of values is called a: bitmap index. transaction index. join index. multivalued index
c
Big data: requires a normalized dataset to BCNF. requires a normalized dataset to 3rd Normal Form. does not require a strictly defined data model. requires a strictly defined schema.
c
EXISTS will take a value of ________ if the subquery returns an intermediate results table which contains one or more rows. A) false B) 1 C) true D) undefined
c
Forward recovery is faster than restore/rerun because: images are mirrored. security can be avoided. transactions do not have to be repeated. systems are more complete.
c
NoSQL systems allow ________ by incorporating commodity servers that can be easily added to the architectural solution. scaling up scaling over scaling out scaling down
c
NoSQL systems enable automated ________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it. sharing SQL Sharding Mongo
c
The NoSQL model that incorporates 'column families' is called a: document store. key-value store. wide-column store. column-SQL database.
c
The SQL command ________ defines a logical table from one or more tables or views. A) create table B) alter table C) create view D) create relationship
c
Which of the following is true of the order in which SQL statements are evaluated? A) The SELECT clause is always processed first. B) The SELECT clause is always processed last. C) The SELECT clause is processed before the ORDER BY clause. D) The GROUP BY clause is processed before the WHERE clause.
c
________ generally processes the largest quantities of data. Big data Data marts Transaction processing Operational databases
c
________ is a set of commands used to control a database, including security. A) DML B) DDL C) DCL D) DPL
c
________ is the most popular key-value store NoSQL database management system. Neo4j Apache Cassandra Redis Access
c
________ takes a value of TRUE if a subquery returns an intermediate results table which contains one or more rows. A) IN B) HAVING C) EXISTS D) EXTENTS
c
A cloud computing approach in which the service consists of infrastructure resources and additional tools that enable application and solution data management solution developers to reach a high level of productivity is called: Tools-as-a-service. Software-as-a-service. Infrastructure-as-a-service. Platform-as-a-service.
d
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n): smart chip. secure card. e-credit card. smart card
d
A method to allow adjacent secondary memory space to contain rows from several tables is called: compiling. cluttering. concatenating. clustering.
d
A new set of analytical functions added in SQL:2008 is referred to as: A) OLAF functions. B) MOLAP functions. C) average functions. D) OLAP functions
d
A transaction that terminates abnormally is called a(n) ________ transaction. terminated deleted completed aborted
d
All of the following are advantages of SQL-invoked routines EXCEPT: A) flexibility. B) efficiency. C) sharability. D) security.
d
All of the following are advantages of SQL-invoked routines EXCEPT: flexibility. efficiency. sharability. security.
d
An organization that requires a graph database that is highly scalable would select the ________ database management system. Redis Excel Spreadsheet Access neo4J
d
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): table. partition. extent. tablespace
d
________ includes NoSQL accommodation of various data types. Vigilant Velocity Verified Variety
d
________ is used to undo unwanted database changes. Rollforward Encryption Restart Rollback
d
11) In the figure below, the primary key for "Order Line" is which type of key? A) Composite B) Foreign C) Standard D) Grouped
A
2) A form of database desgin which maps conceptual requirements is called: A) logical specifications. B) response specifications. C) security specifications. D) physical specifications.
A
In the figure below, what type of relationship do the relations depict? A) Identifying entity/weak entity B) Multivalued C) Composite foreign key D) One-to-many
A
Multiple values returned from an SQL query that includes an aggregate function are called: A) vector aggregates. B) scalar aggregates. C) agates. D) summations.
A
Which of the following counts ONLY rows that contain a value? A) Count B) Count(*) C) Tally(*) D) Checknum
A
9) A primary key that consists of more than one attribute is called a: A) foreign key. B) composite key. C) multivalued key. D) cardinal key.
B
Any create command may be reversed by using a(n) ________ command. A) undo B) drop C) delete D) unpack
B
DDL is typically used during which phase of the development process? A) Implementation B) Physical design C) Analysis D) Evaluation
B
INSERT INTO is an example of ________ code. A) DDL B) DML C) DCL D) TIO
B
Which of the following is the wildcard operator in SQL statements? A) < > B) * C) = D) &
B
13) A domain definition consists of all of the following components EXCEPT: A) domain name. B) data type. C) integrity constraints. D) size.
C
15) Which of the following violates the atomic property of relations? A) Sam B) Hinz C) Sam Hinz D) Atomic
C
19) All of the following are the main goals of normalization EXCEPT: A) minimize data redundancy. B) simplify the enforcement of referential integrity. C) maximize storage space. D) make it easier to maintain data.
C
29) ________ problems are encountered when removing data with transitive dependencies. A) Insertion B) Modification C) Deletion D) Merging
C
30) The need to ________ relations commonly occurs when different views need to be integrated. A) metadata B) system C) drop D) merge
D
37) In the figure below, what type of relationship do the relations depict? A) Strong entity/weak entity B) Multivalued C) Composite foreign key D) One-to-many
D
39) In the figure below, what is depicted? A) A one-to-one relationship B) A unary relationship C) A one-to-many relationship D) An associative entity
D
40) In the figure below, what type of key is depicted? A) Primary B) Recursive primary C) Composite D) Recursive foreign
D
The main concept of relational databases was published in 1970 by: A) Itzak Ben-Gan. B) Hoffer. C) Mills. D) E.F.Codd.
D
47) A composite key consists of only one attribute. T/F
F
49) A foreign key is a primary key of a relation that also is a primary key in another relation. T/F
F
51) An enterprise key is a foreign key whose value is unique across all relations. T/F
F
53) There can be multivalued attributes in a relation. T/F
F
55) Unlike columns, the rows of a relation may not be interchanged and must be stored in one sequence. T/F
F
58) A synonym is an attribute that may have more than one meaning. T/F
F
60) CASE tools can model more complex data relationships, such as ternary relationships. T/F
F
62) When transforming a weak entity, one should create one relation with both the attributes of the strong entity and the attributes of the weak entity. T/F
F
63) The primary key of the many side migrates to the one side when transforming a one-to-many relationship. T/F
F
64) When transforming a one-to-one relationship, a new relation is always created. T/F
F
66) An identifier assigned to an associative entity is also called a cross-relation key. T/F
F
68) When transforming a unary many-to-many relationship to relations, a recursive foreign key is used. T/F
F
69) The relational data model does, at this time, directly support subtype/supertype relationships. T/F
F
70) Data integrity consists of powerful operations to manipulate data stored in relations. T/F
F
A file organization is a named portion of primary memory. T/F
F
A function has only input parameters but can return multiple values. T/F
F
A join index is a combination of two or more indexes. T/F
F
A referential integrity constraint specifies that the existence of an attribute in one table depends upon the existence of a foreign key in the same or another table. T/F
F
COUNT(* ) tallies only those rows that contain a value, while COUNT counts all rows. T/F
F
Controls incorporated into a data management system that restrict access to data are called authentication rules. T/F
F
DCL is used to update the database with new records. T/F
F
Denormalization is the process of transforming relations with variable-length fields into those with fixed-length fields. T/F
F
Economies of storage indicate data storage costs increase every year. T/F
F
Economies of storage indicate data storage costs increase every year. T/F
F
MongoDB is a proprietary NoSQL database management system created by Oracle. T/F
F
Neo4j is a wide-column NoSQL database management system developed by Oracle. T/F
F
NoSQL focuses on avoidance of replication and minimizing storage space. T/F
F
One major disadvantage of the outer join is that information is easily lost T/F
F
One method to handle missing values is to substitute an exact value. T/F
F
Parallel query processing speed is not significantly different from running queries in a non-parallel mode. T/F
F
The following code is an example of a correlated subquery. SELECT CustomerName, CustomerAddress, CustomerCity, CustomerState, CustomerPostalCode FROM Customer_T WHERE Customer_T.CustomerID = (SELECT Order_T.CustomerID FROM Order_T WHERE OrderID = 1008); T/F
F
The following query totals sales in state= 'MA' for each salesperson. SELECT salesperson_id, sum(sales) FROM salesperson GROUP BY salesperson_id HAVING state = 'MA'; T/F
F
The following query will execute without errors. SELECT Customer.Customer_Name, Salesman.Sales_Quota FROM Customer WHERE Customer.Salesman_ID = (SELECT Salesman_ID WHERE Lname = 'SMITH'); T/F
F
The following two SQL statements will produce different results. SELECT last_name, first_name FROM customer WHERE state = 'MA' OR state = 'NY' OR state = 'NJ' OR state = 'NH' OR state = 'CT'; SELECT last_name, first_name FROM customer WHERE state in ('MA','NY','NJ','NH','CT'); T/F
F
The logical database design always forms the best foundation for grouping attributes in the physical design. T/F
F
User-defined functions can improve system performance because they will be processed as sets rather than individually, thus reducing system overhead. T/F
F
Using an index for attributes referenced in ORDER BY and GROUP BY clauses has no significant impact upon database performance. T/F
F
Using an outer join produces this information: rows that do not have matching values in common columns are not included in the result table. T/F
F
When a subquery is used in the FROM clause, it is called a denied table. T/F
F
When creating a table, it is not important to consider foreign key- primary key mates. T/F
F
46) Data structures include data organized in the form of tables with rows and columns. T/F
T
48) A primary key is an attribute that uniquely identifies each row in a relation. T/F
T
50) Sample data are useful for developing prototype applications and for testing queries. T/F
T
A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions. T/F
T
A correlated subquery is executed once for each iteration through the outer loop. T/F
T
A dynamic query is created by the user. T/F
T
A hashing algorithm is a routine that converts a primary key value into a relative record address. T/F
T
A major benefit of SQL as a standard is reduced training costs. T/F
T
Applications can be moved from one machine to another when each machine uses SQL. T/F
T
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. T/F
T
Big data databases tend to sacrifice consistency for availability. T/F
T
Collect everything is a characteristic of a data lake. T/F
T
Constraints are a special case of triggers. T/F
T
Correlated subqueries are less efficient than queries that do not use nesting. T/F
T
Denormalization almost always leads to more storage space for raw data. T/F
T
Establishing IF-THEN-ELSE logical processing within an SQL statement can now be accomplished by using the CASE keyword in a statement. T/F
T
Examination and modification of the SQL code in an application may lead to performance improvements. T/F
T
Fast data retrieval is one factor to consider when choosing a file organization for a particular database file. T/F
T
Figuring out what attributes you want in your query before you write the query will help with query writing. T/F
T
Graph-oriented databases are designed to maintain information regarding the relationships between data items. T/F
T
HBASE is a wide-column store database that runs on top of HDFS (modeled after Google) T/F
T
HP HAVEn integrates HP technologies with open source big data technologies. T/F
T
NoSQL stands for 'Not only SQL.' T/F
T
SQL allows one to calculate linear regressions, moving averages, and correlations without moving the data outside of the database. T/F
T
SQL is both an American and international standard for database access. T/F
T
Security is one advantage of partitioning. T/F
T
Sensitivity testing involves ignoring missing data unless knowing a value might significantly change results. T/F
T
Server logs are considered a big data variety data type. T/F
T
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. T/F
T
The joining condition of an equi-join is based upon an equality. T/F
T
The original three 'v's' attributed to big data include volume, variety, and velocity. T/F
T
The restore/rerun technique involves reprocessing the day's transactions against the backup copy of the database. T/F
T
When a GROUP BY clause is included in an SQL statement, only those columns with a single value for each group can be included. T/F
T
When creating tables, it's important to decide which columns will allow null values before the table is created. T/F
T
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data. T/F
T
n a sequential file, the records are stored in sequence according to a primary key value. T/F
T
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: hash index table. hash key. multi-indexed file organization. hashed file organization.
a
A type of join between three tables is called a(n): A) ternary join. B) self-join. C) unnatural join. D) pinned join.
a
Distributing the rows of data into separate files is called: horizontal partitioning. file allocation. vertical partitioning. normalization
a
The NoSQL model that includes a simple pair of a key and an associated collection of values is called a: key-value store. graph database. document store. wide-column store
a
The UNION clause is used to: combine the output from multiple queries into a single result table. join two tables together to form one table. find all rows that are in one table, but not the other. find all rows that do not match in two tables.
a
The ________ DBA view shows information about all users of the database in Oracle. A) DBA_USERS B) USERS C) DBA_VIEWS D) DBA_INDEXES
a
The smallest unit of application data recognized by system software is a: field. column. data type. row
a
Which of the following is a purpose of the SQL standard? A) To specify syntax and semantics of SQL data definition and manipulation B) To specify maximum and incomplete standards C) To define every operation for every SQL database D) To permit no degrees of freedom for SQL DBMS
a
Which of the following is an objective of selecting a data type? Improve data integrity Maximize storage space Limit security Represent a small number of possible values
a
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: operating system. XML. user. CEO.
a
________ includes the value of speed in a NoSQL database. Velocity Variety Verified Vigilant
a
________ is a set of commands used to update and query a database. A) DML B) DDL C) DCL D) DPL
a
10) In the SQL language, the ________ statement is used to make table definitions. A) create session B) create table C) create index D) select
b
A ________ view is materialized when referenced. A) virtual B) dynamic C) materialized D) base
b
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called: Platform-as-a-service. Software-as-a-service. Soft-computing-service. Infrastructure-as-a-service.
b
A detailed coding scheme recognized by system software for representing organizational data is called a(n): DBMS code. data type. SQL. DB layout.
b
A named set of SQL statements that are considered when a data modification occurs are called: trapdoors. triggers. treatments. stored procedures.
b
A single value returned from an SQL query that includes an aggregate function is called a(n): A) agate. B) scalar aggregate. C) vector aggregate. D) summation.
b
Data in MongoDB is represented in: CSON. BSON. SON. JSON
b
In which type of file is multiple key retrieval not possible? Indexed Hashed Clustered Sequential
b
The MERGE command: A) allows one to combine the INSERT and UPDATE operations. B) allows one to combine the INSERT and DELETE operations. C) joins 2 tables together. D) is always a single table operation.
b
The command for removing a table is: REMOVE TABLE. DROP TABLE. CREATE TABLE. TRUNCATE TABLE.
b
The following code would include: SELECT Customer_T.CustomerID,CustomerName, OrderID FROM Customer_T LEFT OUTER JOIN Order_T ON Customer_T.CustomerID = Order_T.CustomerID; A) all rows of the Order_T Table regardless of matches with the Customer_T Table. B) all rows of the Customer_T Table regardless of matches with the Order_T Table. C) only rows that match both Customer_T and Order_T Tables. D) only rows that don't match both Customer_T and Order_T Tables.
b
What result will the following SQL statement produce? Select Avg(standard_price) as average from Product_V; A) The average of all products in Product_V B) The average Standard_Price of all products in Product_V C) The average price of all products D) The mode of all prices
b
What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries group by driver_no; A) A listing of all drivers, sorted by driver number B) A listing of each driver as well as the number of deliveries that he or she has made C) A count of all of the deliveries made by all drivers D) An error message
b
________ partitioning distributes the columns of a table into several separate physical records. Horizontal Vertical Crossways Final
b
12) Which of the following is NOT a reason to create an instance of a relational schema with sample data? A) Sample data can be used to improve user communications. B) Sample data can be used for prototype generation. C) Sample data can reverse database implementation errors. D) Sample data provide a convenient way to check the accuracy of your design.
c
All of the following are part of the coding structure for triggers EXCEPT: A) event. B) condition. C) selection. D) action
c
In an SQL statement, which of the following parts states the conditions for row selection? A) Select B) From C) Where D) Group By
c
MongoDB databases are composed of: columns. tables. collections. rowsets.
c
The coding or scrambling of data so that humans cannot read them is called ________. hiding. encoding. encryption. demarcation.
c
A form of denormalization where the same data are purposely stored in multiple places in the database is called: horizontal partitioning. advanced placement. data duplication. data replication.
d
A join in which the joining condition is based on equality between values in the common columns is called a(n): A) equi-join. B) unilateral join. C) natural join. D) both A and C.
d
All of the following are objectives when selecting a data type EXCEPT: support all data manipulations. represent all possible values. improve data integrity. use a lot of storage space.
d
An advantage of partitioning is: extra space and update time. increase redundancy. remote optimization. efficiency.
d
An audit trail of database changes is kept by a: subschema. change control device. before image. journalizing facility.
d
An operation to join a table to itself is called a(n): A) sufficient-join. B) inner join. C) outer join. D) self-join.
d
An organization that decides to adopt the most popular NoSQL database management system would select: Access. Neo4j. Redis. MongoDB.
d
An organization using HDFS realizes that hardware failure is a(n): inconsistency. irregularity. anomaly. norm.
d
Big data requires effectively processing: two data types (text and numeric). a single data type (numeric). a single data type (text). many data types.
d
The last part of an SQL query to be read is the ________ statement. A) SELECT B) FROM C) WHERE D) ORDER BY
d
One decision in the physical design process is selecting structures. T/F
t
The UNION clause is used to combine the output from multiple queries into a single result table. T/F
t
Implementation of a standard can never stifle creativity and innovation. T/F
F
In databases, null values are equivalent to zero. T/F
F
In order to perform a restore/rerun, the database must be mirrored. T/F
F
Indexes generally slow down access speed in most RDMS. T/F
F
Loss of data integrity does not impact the quality of data in a database. T/F
F
MULTISET is similar to the table datatype. T/F
F
Reduced uptime is a disadvantage of partitioning. T/F
F
SQL has been implemented only in the mainframe and midrange environments. T/F
F
SQL originated from a project called System-S. T/F
F
The comparison operators = and != are used to establish a range of values. T/F
F
20) When all multivalued attributes have been removed from a relation, it is said to be in: A) first normal form. B) second normal form. C) Boyce-Codd normal form. D) third normal form.
A
52) One property of a relation is that each attribute within a relation has a unique name. T/F
T
54) The columns of a relation can be interchanged without changing the meaning or use of the relation. T/F
T
56) All values that appear in a column of a relation must be taken from the same domain. T/F
T
57) View integration is the process of merging relations together. T/F
T
59) When two or more attributes describe the same characteristic of an entity, they are synonyms. T/F
T
61) When a regular entity type contains a multivalued attribute, two new relations are created. T/F
T
67) In the figure below, each employee has exactly one manager. T/F
T
What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A) A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B) A listing of all drivers C) A listing of the number of deliveries greater than 2 D) A listing of all drivers who made more than 2 deliveries
a
Which of the following is an objective of selecting a data type? Improve data integrity Limit security Represent a small number of possible values Maximize storage space
a
A device to measure or detect fingerprints or signatures is called a(n) ________ device. ink biometric laser view
b
All of the following are common denormalization opportunities EXCEPT: reference data. a one-to-many relationship. two entities with a one-to-one relationship. a many-to-many relationship with nonkey attributes.
b
The Hadoop Distributed File System (HDFS) is the foundation of a ________ infrastructure of Hadoop. Java data management relational database management system DBBMS
b
The NoSQL model that is specifically designed to maintain information regarding the relationships (often real-world instances of entities) between data items is called a: wide-column store. graph-oriented database. key-value store. document store
b
The ________ is the structure that contains descriptions of objects such as tables and views created by users. A) SQL B) schema C) catalog D) master view
b
What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no; A) A listing of all drivers who made deliveries to state = 'MA', sorted by driver number B) A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state C) A count of all of the deliveries made to state = 'MA' by all drivers D) An error message will be generated
b
What would the following view contain for values? Create view CustomerOrders as Select CustID, Count(*) as TotOrders, Sum(ordertotal) as Value From customer inner join sale on customer.customer_id = sale.customer_id; A) A listing of all customers in the customer table B) A listing of the customer ID as well as the total number of orders and the total amount spent by the customer C) A listing of the customer ID as well as the total orders D) An error message
b
In which of the following situations would one have to use an outer join in order to obtain the desired results? A) A report is desired that lists all customers who placed an order. B) A report is desired that lists all customers and the total of their orders. C) A report is desired that lists all customers and the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). D) There is never a situation that requires only an outer join
c
Indexes are created in most RDBMSs to: A) provide a quicker way to store data. B) decrease the amount of disk space utilized. C) provide rapid random and sequential access to base-table data. D) increase the cost of implementation.
c
Which type of file is most efficient with storage space? Indexed Hashed Sequential Clustered
c
4) A two-dimensional table of data sometimes is called a: A) group. B) set. C) declaration. D) relation.
d
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. restart facility backup facility transaction logger recovery manager
d
78) An anomaly is a type of flaw in the database server. T/F
F
It is true that in an HDFS cluster the NameNode is the: single master server. language library. large number of slaves. business intelligence.
a
NoSQL focuses on: flexibility. avoidance of replication of data. normalized data. minimizing storage space
a
According to your text, NoSQL stands for: Not Only SQL. Numeric Only SQL Numbered SQL. No SQL.
a
All of the following are advantages to cloud-based computing EXCEPT: ACID support for database as a service. elasticity. organizations can explore new data management technologies more easily no need for initial investment in hardware, physical facilities and systems software.
a
All of the following are disadvantages to cloud-based computing EXCEPT: the visibility of costs of data management is better. DBaaS is still struggling to provide ACID properties of databases. live migration from one environment to another is a challenge. the promise of elasticity is not fulfilled because the model will not adapt to changing requirements.
a
Although volume, variety, and velocity are considered the initial three v dimensions, two additional Vs of big data were added and include: veracity and value. veracity and verified. verified and valuable. volume and verified
a
An audit trail of transactions and database changes is kept by a ________. journalizing facility. before image. change control device. subschema
a
In SQL, a(n) ________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. A) correlated B) paired C) natural D) inner
a
The following code would include: SELECT Customer_T.CustomerID,CustomerName, OrderID FROM Customer_T RIGHT OUTER JOIN Order_T ON Customer_T.CustomerID = Order_T.CustomerID; all rows of the Order_T Table regardless of matches with the Customer_T Table. all rows of the Customer_T Table regardless of matches with the Order_T Table. only rows that match both Customer_T and Order_T Tables. only rows that don't match both Customer_T and Order_T Tables.
a
The following code would include: SELECT Customer_T.CustomerID,CustomerName, OrderID FROM Customer_T RIGHT OUTER JOIN Order_T ON Customer_T.CustomerID = Order_T.CustomerID; A) all rows of the Order_T Table regardless of matches with the Customer_T Table. B) all rows of the Customer_T Table regardless of matches with the Order_T Table. C) only rows that match both Customer_T and Order_T Tables. D) only rows that don't match both Customer_T and Order_T Tables.
a
What does the following SQL command do? insert into Customer_T values (001,'John Smith','231 West St','Boston','MA','02115'); A) Adds a new record to the Customer_T B) Creates the Customer_T table C) Deletes the Customer_T table D) Updates the Customer_T table
a
What result set will the following query return? Select Item_No from Order_V where quantity > 10; A) The Item_No of all orders that had more than 10 items B) The Order_Id of all orders that had more than one item C) The Order_Id of all orders that had more than 10 items D) The Item_No of all orders that had 10 or more items
a
What does the following SQL statement do? SELECT * From Customer WHERE Cust_Type = "Best" Selects all the fields from the Customer table for each row with a customer labeled " * " Selects fields with a "* " in them from the Customer table Selects all the fields from the Customer table for each row with a customer labeled "Best" Selects the " * " field from the Customer table for each row with a customer labeled "Best"
b
When incorrect data have been introduced, the database is best recovered by: starting with a new ERD. restarting from the most recent checkpoint and processing subsequent transactions. reloading RDMS software. formatting server.
b
Big data includes: large volumes of entity relationship diagrams (ERD) with a single data type processed at very high speeds. large volumes of data entry with a single data type processed at very high speeds. large volumes of entity relationship diagrams (ERD) with many different data types that are processed at very high speeds. large volumes of data with many different data types that are processed at very high speeds.
d
Horizontal partitioning makes sense: when less security is needed. when only one category is allowed. when partitions must be organized the same. when different categories of a table's rows are processed separately.
d
In order for two queries to be UNION-compatible, they must: both return at least one row. both have the same number of lines in their SQL statements. both return exactly one row. both output compatible data types for each column and return the same number of rows.
d
It is true that in an HDFS cluster the DataNodes are the: business intelligences. single master servers. language libraries. large number of slaves.
d
Sensitivity testing involves: deleting the associated row. seeing how accurate data are. checking to see if your teeth hurt when you brush. checking to see if missing data will greatly impact results.
d
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. programmer productivity query design data integration data integrity
d
The three 'v's' commonly associated with big data include: vigilant, viewable, and verified. verified, variety, and velocity. viewable, volume, and variety. volume, variety, and velocity.
d
The value a field will assume unless the user enters an explicit value for an instance of that field is called a: range control. gurand. null value default value
d
What result set is returned from the following query? SELECT Customer_Name, telephone FROM customers WHERE city in ('Boston','New York','Denver'); The Customer_Name of all customers living in Boston, New York or Denver The Customer_Name and telephone of all customers The Customer_Name and telephone of all customers living in Boston and New York and Denver The Customer_Name and telephone of all customers living in either Boston, New York or Denver
d
Which of the following is a technique for optimizing the internal performance of the relational data model? Not reporting statistics to save machine resources Avoiding indexes on secondary keys Using random index organizations Clustering data
d
With HDFS it is less expensive to move the execution of computation to data than to move the: data to processes. data to hardware. data to systems analysis. data to computation.
d
22) The normal form which deals with multivalued dependencies is called: A) fifth normal form. B) fourth normal form. C) Boyce-Codd normal form. D) sixth normal form.
B
Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table. T/F
F
The DROP command deletes rows from a table individually or in groups. T/F
F
The HAVING clause and the WHERE clause perform the same operation. T/F
F
The ORDER BY clause is the first statement processed in an SQL T/F
F
The WHERE clause is always processed before the GROUP BY clause when both occur in a SELECT statement. T/F
F
The dive in anywhere characteristic of a data lake overrides constraints related to confidentiality. T/F
F
The natural join is very rarely used. T/F
F
The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; A) all rows of the Order_T Table regardless of matches with the Customer_T Table. B) all rows of the Customer_T Table regardless of matches with the Order_T Table. C) only rows that match both Customer_T and Order_T Tables. D) only rows that don't match both Customer_T and Order_T Tables.
c
User-defined data types: A) are not allowed in any DBMS. B) are only allowed in Oracle. C) can have defined functions and methods. D) can be used once in a system.
c
What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 Varchars B) Alters the Customer_T table to be a Type 2 Varchar C) Alters the Customer_T table, and adds a field called "Type" D) Alters the Customer_T table by adding a 2-byte field called "Varchar"
c
What result set will the following query return? Select Item_No, description from item where weight > 100 and weight < 200; A) The Item_No and description for all items weighing less than 100 B) The Item_No for all items weighing between 101 and 199 C) The Item_No and description for all items weighing between 101 and 199 D) The Item_No for all items weighing more than 200
c
Which of the following is a purpose of the SQL standard? To permit no degrees of freedom for SQL DBMS To define every operation for every SQL database To specify syntax and semantics of SQL data definition and manipulation languages To specify maximum and incomplete standards
c