MTA 98-364 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following values cannot be stored in a character column defined as the primary key of a table? A. null B. '0' C. 'null' D. ''

A

Suzanne works as a Database Designer for DataOneWorld Inc. She is assigned the task of decomposing the components of a database, but she has to ensure that all the components are decomposed to only some extent. Which of the following approaches will she use to accomplish the task? A. Mixed approach B. Inside-out approach C. Top-down approach D. Bottom-up approach

A

Which of the following database terms is described in the statement below? "It prevents the current database operation from reading or writing a data item while the data item is being accessed by another operation." A. Lock B. Encryption C. Constraint D. Deadlock

A

Which of the following is a design of the user interface and the application programs that use and process the database? A. Application Design B. Object Modeling C. Database Design D. Database Planning

A

Which of the following steps in database planning helps to determine the requirements of the database through interviewing? A. Gathering information B. Identifying the relationship between objects C. Identify the objects D. Identifying the type of information for each objects E. Modeling the object

A

You work as a Database Administrator for DataOneWorld Inc. Management instructs you to remove an object from the relational database management system. Which of the following statements will you use to accomplish the task? A. DROP B. SELECT C. CREATE D. ALTER

A

You work as a Database Designer for DataOneWorld Inc. The company has a SQL Server database. You are assigned the task of creating a data model of an enterprise based on a specific data model. The model to be created should be independent of a particular DBMS. Which of the following database designs will help you accomplish the task? A. Logical database design B. Conceptual dat abase design C. Physical database design D. Application design

A

Which of the following are the main approaches in the database design? Each correct answer represents a complete solution. Choose three. A. Top-down approach B. Bottom-up approach C. Middle approach D.Inside-out approach

A, B, D

Consider the case of a distance education university. The university has many regional centers across the country. Each regional center has a head known as regional manager. Each regional center has allotted more than one study center in its region. Each regional center has a region code, which is unique and specifies a region. Each study center also has a study center code, which is also unique. What is the relationship between regional center and study center? A. One-to-one B. One-to-many C. There is no relationship. D. Many-to-many

B

Consider the case of a fruit juice company. The company manufactures fruit juices and supplies them to wholesalers. The Database Designer creates a table named Production. The code is given below: 1. CREATE Table Production 2. 2.(Fruit_type VarChar, 3. Fruit_name Char(20), 4. Quantity Int(3)) Which of the above- mentioned lines has an error? A. Line 3 B. Line 2 C. Line 1 D. Line 4

B

Which of the following is used to give a default value to a column if the value for that column is unknown? A. Concurrency B. DEFAULT constraint C. Nested transaction D. Transaction

B

Which of the following statements about external tables is true? A. They can have constraints or triggers. B. They cannot be written to with DML commands. C. They can have indexes. D. They cannot be used in joins, views, and subqueries.

B

You manage a database named Customers, which includes a table named Orders. The Orders table is frequently queried, but only orders with a sales total of more than $1000.00 are required in the query. You want to create an index to speed up these types of queries at the same time, ensuring the index is as small as possible. What type of index should you use? A. Non-clustered B. Filtered C. Clustered D. XML

B

Your Company is designing and developing a number of databases for a stock exchange. One of the databases will contain highly sensitive data for which high level of security will be required. Although high processing speed is one of the prime requirements of the customer, for this database, security of the data will take priority over the processing speed. It needs to be ensured that even if unauthorized access to the database is obtained, the rogue user is unable to read the data. Which of the following protection techniques will you suggest for this data base? A. Authentication B. Encryption C. Native auditing D. Integrity controls

B

ex. John works as a Database Administrator for Bluewell Inc. The company has a SQL Server database. A table in the database has a candidate key and an attribute that is not a constituent of the candidate key. The non-key attribute depends upon the whole of the candidate key rather than just a part of it. Which of the following normal forms is represented in the scenario? A. 4NF B. 2NF C. 1NF D. 3NF

B

You work as a Database Designer for SoftTech Inc. You have developed the conceptual design of the database of an organization. Following is the ER-diagram, which you have designed. Now you have to convert the following diagram to a logical model. Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. A. Now migrate the Start Date at tribute of "works on" relationship to the Project table. B. Create two tables, Employee and Project. C. Create a primary key for both the tables. D. Migrate the primary key of the Employee table to the Project table to maintain referential integrity between the two tables. E. Create three tables, Employee, Project, and Manager.

B, C, D, A

You are a Database Administrator of MySQL database. Few days back, your server crashed. Now, it is up and online. You need to check the integrity of various tables used in the database. You need to issue the CHECK TABLE command. For which of the following tables will this command work? Each correct answer represents a complete solution. Choose two. A. FEDERATED B. MyISAM C. MERGE D. InnoDB

B, D

Mark works as a Database Administrator for DataOneWorld Inc. Management instructs him to provide an additional security layer to the database to prevent unauthorized viewing of data with the help of an algorithm called cipher. Which of the following will help him to accomplish the task? A. Native auditing B. Authentication C. Encryption D. Abstraction

C

Which of the following can be used to populate a table? Each correct answer represents a complete solution. Choose all that apply. A. Data Pump B. SQL*Loader C. INSERT statement D. MERGE statement

C, B, A, D

John works as a Database Administrator for DataOneWorld Inc. The company has a SQL Server database. John wants to insert records in a table where the database is structured in a fixed format. Which of the following data models will he use to accomplish the task? A. Object relational data model B. Entity-Relationship Model C. Network data model D. Relational model

D


Conjuntos de estudio relacionados

Organizational Behavior Chapter 18

View Set

Fin 232 Ch. 4 practice exam, Finance Exam 1 Chapter 4, FIN 331, CHAP 1

View Set

Basic Physical Assessment NCLEX Questions

View Set

Chapter 11: Cardiovascular System

View Set

World Geo Chapter 10 Study Guide

View Set