T2 Case Problem1: Slate & Pencil Tutoring

¡Supera tus tareas y exámenes ahora con Quizwiz!

The _____ relationship should be rare in any relational database design. a. 1:1 b. 1:M c. M:1 d. M:N

1:1

The _____ relationship is the "relational model ideal." a. 1:1 b. 1:M c. M:1 d. M:N

1:M

A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes Answers: a. foreign b. candidate c. secondary d. primary

Candidate

Date attributes contain calendar dates stored in a special format known as the _____ date format. a. Julian b. calendar c. Epoch d. logical

Julian

_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. a. 1:N b. M:1 c. 1:1 d. M:N

M:N

The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. Answers: a. NOT NULL b. VALUE c. UNIQUE d. EMPTY

NOT NULL

A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). Answers: a. foreign b. attribute c. natural d. unique

Natural

_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. a. Equijoins b. Outer joins c. Theta joins d. Inner joins

Outer joins

_____ returns only the attributes requested, in the order in which they are requested. a. DIFFERENCE b. UNION c. PROJECT d. SELECT

PROJECT

_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. a. Predicate b. Relational c. Database d. Index

Predicate

To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. a. UNION b. DIFFERENCE c. SELECT d. INTERSECT

SELECT

_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. a. UNION b. INTERSECT c. SELECT d. DIFFERENCE

SELECT

A _____ is any key that uniquely identifies each row a. foreign key b. superkey c. special key d. candidate key

Superkey

Another name for a composite entity is a(n) _____ entity. a. bridge b. associative c. directive d. linked

bridge

Each table _____ represents an attribute.

column

A _____ contains at least all of the attribute names and characteristics for each table in the system a. database b. data dictionary c. logical schema d. relational schema

data dictionary

The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. a. referential b. entity c. null d. relational

entity

A _____ is the primary key of one table that has been placed into another table to create a common attribute a. foreign key b. candidate key c. composite primary key d. superkey

foreign key

In a database context, the word _____ indicates the use of the same attribute name to label different attributes. a. duplicate b. redundancy c. synonym d. homonym

homonym

A(n) _____ is an orderly arrangement used to logically access rows in a table. a. primary rule b. superkey c. relationship d. index

index

A(n) _____ only returns matched records from the tables that are being joined. a. equijoin b. theta join c. outer join d. inner join

inner join

Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. Answers: a. model b. integrity c. uniqueness d. attribute

integrity

In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. a. keys b. indexes c. relations d. logical structures

keys

According to Codd's _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns). a. comprehensive data sublanguage b. distribution independence c. logical data independence d. integrity independence

logical data independence

According to Codd's _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. a. nonsubversion b. information c. guaranteed access d. view updating

nonsubversion

A _____ key is defined as a key that is used strictly for data retrieval purposes. a. foreign b. candidate c. secondary d. lookup

secondary

In a database context, a(n) _____ indicates the use of different names to describe the same attribute. a. homonym b. duplicate c. entity d. synonym

synonym

The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. a. system catalog b. unique index c. database tuple d. systematic database

system catalog

When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. a. union-compatible b. difference-compatible c. select-compatible d. intersect-compatible

union-compatible

When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. a. composite b. unique c. key d. primary

unique


Conjuntos de estudio relacionados

ADV5503 Media Consumer Behavior Exam 2 Study Guide

View Set

Chapter 20 (Campylobacter and Helicobacter) and Chapter 21 (Nonfermenters and Misfits)

View Set

Quantitative reasoning 4 DAT REVIEW

View Set

Business Law Midterm Study Guide

View Set