Chapters 1-8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

63) With PHP, we enclose PHP commands in between the ________ and ________ symbols.

<?php, ?>

37) If the computer hosting the Web server is running a UNIX or Linux operating system, the Web server is probably: A) Apache. B) Tomcat. C) Internet Information Server (IIS). D) Internet Interpreter Server (IIS). E) Information Interpreter Server (IIS).

A

39) We have obtained access to the company's operational data. In one record, we find that a customer's age has been recorded as "337." This is an example of: A) dirty data. B) inconsistent data. C) non-integrated data. D) a "wrong format" problem. E) a "too much data" problem.

A

41) The intermediary between the application and the DBMS drivers in the ODBC architecture is the: A) driver manager. B) OLE DB interface. C) ODBC driver. D) data source. E) database connector.

A

45) Dimensional databases are used to track historical data and therefore must have a: A) time dimension. B) customer dimension. C) sales dimension. D) Either A or B E) Both A and B

A

46) Star schemas have a ________ at the center of the star. A) fact table B) dimension table C) map table D) reduce table E) None of the above

A

48) OLAP stands for: A) Online Analytical Processing. B) Offline Analytical Processing. C) Online Analysis Process. D) Offline Analysis Process. E) Old, Lazy And Particular.

A

50) XML allows a programmer to: A) define elements. B) use only predefined elements. C) use only "shrink-warped," purchased programs. D) Both A and B E) All of the above

A

51) When distributed databases create copies of the database on different servers, this is known as: A) replication. B) partitioning. C) disbursing. D) distributed two-phase locking. E) None of the above

A

52) Before running Web pages in Internet Information Server (IIS) against a Microsoft Access database, we need to create a(n): A) OBDC data source. B) JBDC data source. C) OLE DB data source. D) LAMP data source. E) WAMP data source.

A

55) When using Microsoft Access and IIS, we can create Web pages that access the database using the popular ________ scripting language. A) PHP B) DSN C) DSP D) JSN E) PSJ

A

57) To use the Access 2013 database in an Excel 2013 PivotTable, it is generally useful to: A) create a view-equivalent query in Access to organize the data. B) store the needed data in an Excel worksheet. C) store the needed data in a Word document. D) store the needed data in a PowerPoint slide show. E) store the needed data in a Visio diagram.

A

60) To format a PivotTable in Excel 2013, we use the: A) Design command tab in the PivotTable Tools contextual command tab. B) Format command tab in the PivotTable Tools contextual command tab. C) Design command tab in the Report Tools contextual command tab. D) Format command tab in the Report Tools contextual command tab. E) Report Tools command tab.

A

A computer that provides database storage and access in a client/server environment is called a: A) database server. B) file server. C) cloud data store. D) none of the above.

A

A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A) API B) MOM C) RPC D) LAN

A

All of the following are characteristics of cloud technologies EXCEPT: A) unlimited bandwidth. B) on-demand self-service IT capabilities. C) broad network access. D) rapid elasticity.

A

All of the following are newer XML schema languages EXCEPT: A) Document Type Declarations (DTDs). B) XML Schema Definition (XSD). C) RELAX NG. D) Document Structure Description (DSD).

A

An XML-based grammar used to describe a Web service is called: A) Web Service Description Language (WSDL). B) WIDL. C) WISL. D) Business-to-Business (B2B).

A

Sets of routines that an application program uses to direct the performance of procedures by the computer's operating system is called a(n): A) application program interface. B) xpi. C) application device interface. D) CMOS.

A

The MERGE command: A) allows one to combine the INSERT and UPDATE operations. B) allows one to combine the INSERT and DELETE operations. C) joins 2 tables together. D) none of the above.

A

To get all the customers from Hawaii sorted together, which of the following would be used? A) ORDER BY B) GROUP BY C) HAVING D) SORT

A

User-defined transactions can improve system performance because: A) transactions are processed as sets, reducing system overhead. B) transactions are mapped to SQL statements. C) speed is improved due to query optimization. D) all of the above.

A

What does the following SQL command do? insert into Customer_T values (001,'John Smith','231 West St','Boston','MA','02115'); A) Adds a new record to the Customer_T B) Creates the Customer_T table C) Deletes the Customer_T table D) Updates the Customer_T table

A

What does the following SQL statement do? Delete from Customer_T where state = 'HI'; A) Deletes all records from customer_t where the state is equal to HI B) Removes the Customer_T table from the database C) Deletes all records from the Customer_T table D) None of the above

A

What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A) A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B) A listing of all drivers C) A listing of the number of deliveries greater than 2 D) A listing of all drivers who made more than 2 deliveries

A

Which of the following counts ONLY rows that contain a value? A) Count B) Count(*) C) Tally(*) D) Checknum

A

Which of the following is not a common distribution logic for two-tiered server environments? A) Fat client B) Tall client C) Thin client D) Distributed

A

64) When Microsoft Access 2013 compiles VBA code in a database, the resulting file is stored using a(n) ________ file extension.

Answer: *.accde

65) When Microsoft Access 2013 uses user-level security with an Access 2003 database file, it stores the database in a(n) ________ file.

Answer: *.mdb

69) By default, when Microsoft Access creates a relationship between two tables it creates a(n) ________ relationship.

Answer: 1:N

30) Each attribute of an entity becomes a(n) ________ of a table. A) column B) primary key C) foreign key D) alternate key E) B or D

Answer: A

31) The identifier of the entity becomes the ________ of the corresponding table. A) primary key B) foreign key C) supertype D) subtype E) either A or B

Answer: A

35) Which type of lock assumes that no conflicts will occur? A) Optimistic locks B) Granular locks C) Explicit locks D) Shared locks E) Open locks

Answer: A

52) Which of the following is not one of the five SQL built-in functions? A) MODE B) SUM C) COUNT D) MAX E) AVG

Answer: A

77) Existing tables in a database can be structurally modified by using the SQL ________ command.

Answer: ALTER TABLE

64) By default, Microsoft Access 2013 saves data files in the ________ file format

Answer: Access 2007

34) Which of the following terms is synonymous with "relation"? A) Attribute B) Table C) Record D) Row E) Tuple

Answer: B

36) Given only the following excerpt of an E-R model: Which of the following is known to be true? A) There are more instances of ENTITY A than there are instances of ENTITY B in the user's environment. B) A single instance of ENTITY B may be related to many instances of ENTITY A. C) A single instance of ENTITY A must be related to many instances of ENTITY B. D) ENTITY A has a minimum cardinality of one. E) The degree of the relationship is "many."

Answer: B

45) Microsoft SQL Server is an example of a: A) database B) database management system C) data manipulation system D) table E) list manager

Answer: B

30) Which of the following would not be contained in a use case? A) Inputs provided to the system to perform a task B) A description of a task the user wants to perform C) A prototype of the system performing a given task D) Outputs generated by the system in performing a given task E) All of the above would be contained in a use case.

Answer: C

35) SQL stands for: A) Standard Query Language B) Structural Question Language C) Structured Query Language D) Standard Question Language E) Structured Question Language

Answer: C

37) Which of the following data types used in SQL would define a numeric field of the pattern 99.99? A) integer(2,2) B) integer(5,2) C) numeric(2,2) D) numeric(4,2) E) numeric(5,2)

Answer: C

37) Which of the following is not a basic component of a database system? A) Database B) User C) ERD D) DBMS E) Data applications

Answer: C

39) When the primary key of one relation is placed into a second relation, it is called a: A) field key. B) referential integrity. C) foreign key. D) candidate key. E) relocated key.

Answer: C

50) The Microsoft Access 2013 data type of AutoNumber is used when there is a specific need for a: A) foreign key B) primary key C) surrogate key D) spare key E) secondary key

Answer: C

32) Which of the following is not a basic element of the E-R Model? A) Identifiers B) Entities C) Cardinalities D) Use cases E) Relationships

Answer: D

37) Which of the following would be a reason to denormalize a relation? A) Relax security B) Lack of design time C) End user preference D) Improve performance E) None of the above

Answer: D

38) Which of the following is true about representing a weak entity with the relational model? A) If the weak entity is existence-dependent, the key of the parent must be part of the key of the weak entity. B) If the strong entity has a minimum cardinality of 1, the key of the weak entity must be part of the strong entity. C) If the weak entity is ID-dependent, the key of the weak entity must be part of the key of the parent entity. D) If the weak entity is ID-dependent, the key of the parent entity must be part of the key of the weak entity. E) If the parent entity is existence-dependent, then the minimum cardinality of the weak entity is zero.

Answer: D

42) The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as: A) reprocessing. B) rollback. C) transaction logging. D) rollforward. E) checkpointing.

Answer: D

64) Which of the following standard SQL data types is not supported in Microsoft Access SQL? A) Integer B) Char(25) C) VarChar(35) D) Numeric(5,3) E) DateTime

Answer: D

32) The ideal primary key is ________. A) short B) numeric C) fixed D) A and B E) A, B, and C

Answer: E

38) A candidate key is: A) required to be unique. B) used to represent rows in relationships. C) a candidate to be the primary key. D) Both A and B E) All of the above

Answer: E

59) After a 1:1 relationship has been created between two tables in Microsoft Access, the Relationship Type of One-To-One appears: A) in the Relationship Type property of the primary key column in table Design View. B) in the Relationship Type property of the foreign key column in table Design View. C) in the table object in the Relationships window. D) in the Show Table dialog box. E) in the Edit Relationships dialog box.

Answer: E

59) In Microsoft Access, referential integrity constraints are created: A) by setting a property value on the primary key in the table which contains it. B) by setting a property value on the foreign key in the table which contains it. C) by setting a property value on the primary key in the Relationships window. D) by setting a property value on the foreign key in the Relationships window. E) by checking the Enforce Referential Integrity check box in the Edit Relationships dialog box.

Answer: E

59) Which of the following SQL commands would be used to remove only the data from a table named STUDENT while leaving the table structure intact? A) DROP TABLE STUDENT; B) DELETE TABLE STUDENT; C) REMOVE TABLE STUDENT; D) SELECT * FROM STUDENT THEN DROP; E) DELETE FROM STUDENT;

Answer: E

14) In SQL, to refer to a range of values in a WHERE clause, use the WITHIN keyword.

Answer: FALSE

14) Relationships that are 1:1 do not require referential integrity constraints.

Answer: FALSE

26) As far as Microsoft Access is concerned, there are no 1:N relationships.

Answer: FALSE

9) SQL stands for Structural Question Language

Answer: FALSE

72) The SQL command used to add new data to a table is ________.

Answer: INSERT

11) To force the DBMS to remove duplicate rows from the results of an SQL SELECT query, the keyword DISTINCT must be used.

Answer: TRUE

16) In SQL, the LIKE keyword can be used to select on partial values.

Answer: TRUE

2) The acronym DBA refers to either the office or the manager.

Answer: TRUE

63) Microsoft Access 2013 database files are stored using the ________ file extension

Answer: accdb

65) Microsoft Access 2013 uses ________ form and report editors.

Answer: banded

63) Microsoft Access 2013 database files can be easily ________ to create multiple copies of a database.

Answer: copied

60) In a database system, the ________ creates and processes forms

Answer: database application

67) Microsoft Access does not create N:M relationships because Microsoft Access creates databases based on ________.

Answer: database designs

32) Which of the following SQL commands cannot be used with a trigger? A) INSERT B) SELECT C) UPDATE D) DELETE E) Both B and D

B

51) When working with Microsoft Access on a Windows operating system, a simple but usable ASCII text editor is: A) Microsoft Word. B) Notepad. C) Wordpad. D) Microsoft Frontpage. E) Microsoft Visual Studio .NET.

B

54) When using Microsoft Access and IIS, a basic Web home page name that we should use even if we need to change IIS settings is: A) AWebPage.htm. B) index.html. C) MyWebPage.htm. D) MyWeb.htm. E) MyPage.htm.

B

A PC configured to handle user interfaces with limited local storage is called a: A) fat client. B) thin client. C) light client. D) overweight client.

B

A Web server: A) is used only to host Web pages. B) processes client requests and returns HTML pages to the client. C) always contains a database. D) is considered to be part of the firewall.

B

A ________ is a temporary table used in the FROM clause of an SQL query. A) correlated subquery B) derived table C) view table D) none of the above

B

A ________ view is materialized when referenced. A) virtual B) dynamic C) materialized D) base

B

A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): A) equi-join. B) natural join. C) multivariate join. D) inner join

B

A single value returned from an SQL query that includes an aggregate function is called a(n): A) agate. B) scalar aggregate. C) vector aggregate. D) summation.

B

A type of join where a table is joined to itself is called a(n): A) unary join. B) self-join. C) unnatural join. D) pinned join.

B

A type of query that is placed within a WHERE or HAVING clause of another query is called a: A) master query. B) subquery. C) superquery. D) multi-query

B

All of the following are concerns about developing a Web services approach EXCEPT: A) transaction speed. B) user acceptability. C) security. D) reliability

B

An application programming interface that enables an application program to process RDBMS databases meets the: A) object linking and embedding standard. B) open database connectivity standard. C) multi-platform connectivity standard. D) open source standard.

B

Any create command may be reversed by using a ________ command. A) truncate B) drop C) delete D) unpack

B

DDL is typically used during which phases of the development process? A) Implementation B) Physical design C) Analysis D) All of the above

B

Extensible Business Reporting Language (XBRL) is an example of: A) a 3GL language. B) an XML-based vocabulary. C) a legacy database application. D) none of the above.

B

Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: A) stored procedures. B) Persistent Stored Modules. C) flow control modules. D) none of the above.

B

FLWOR is an acronym for: A) flowers. B) For, LET, Where OrderBy, Return. C) For, Locate, Work, Order, Results. D) none of the above.

B

Given a table named store with 5 fields: store_id, address, city, state, zipcode, why would the following insert command not work? insert into store values ('234 Park Street') A) It would work just fine. B) You must specify the fields to insert if you are only inserting some of the fields. C) There is no table keyword. D) None of the above.

B

In order for two queries to be UNION-compatible, they must: A) both have the same number of lines in their SQL statements. B) both output compatible data types for each column and return the same number of rows. C) both return at least one row. D) all of the above.

B

In order to embed SQL inside of another language, the ________ statement must be placed before the SQL in the host language. A) GET SQL B) EXEC SQL C) RUN SQL D) SQL SQL

B

Service-oriented architectures (SOA) are: A) a set of tiers designed to serve each other. B) a collection of services that communicate with each other in some manner. C) architecture designed for the military. D) none of the above.

B

The SQL command ________ adds one or more new columns to a table. A) create table B) alter table C) create view D) create relationship

B

The ________ is the structure that contains descriptions of objects such as tables and views created by users. A) SQL B) schema C) catalog D) master view

B

The ________ specification allows drivers to conform to various levels of the specification, and that affects the level of functionality of the drivers. A) JDBC B) ODBC C) CORBA D) Cobra

B

The first in a series of steps to follow when creating a table is to: A) identify columns that must be unique. B) identify each attribute and its characteristics. C) create an index. D) identify columns that must be null

B

The main difference between Java applets and Java servlets is: A) applets are stored on the client but executed on the server. B) servlets are stored on the server while applets are stored on the client. C) both applets and servlets are executed and stored on the server. D) none of the above.

B

To eliminate duplicate rows in a query, the ________ qualifier is used in the SQL Select command. A) alter B) distinct C) check D) specific

B

What result set is returned from the following query? Select Customer_Name, telephone from customers where city in ('Boston','New York','Denver'); A) The Customer_Name and telephone of all customers B) The Customer_Name and telephone of all customers living in either Boston, New York or Denver C) The Customer_Name and telephone of all customers living in Boston and New York and Denver D) The Customer_Name of all customers living in Boston, New York or Denver

B

What result will the following SQL statement produce? Select Avg(standard_price) as average from Product_V; A) The average of all products in Product_V B) The average Standard_Price of all products in Product_V C) The average price of all products D) None of the above

B

What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = 'CUSTOMER'; A) A listing of all customers in the customer table B) A listing of the owner of the customer table C) A listing of the owner of the customer table as well as customers D) An error message

B

While triggers run automatically, ________ do not and have to be called. A) trapdoors B) routines C) selects D) updates

B

53) Apache Cassandra is an example of a(n) ________ non-relational DBMS. A) Key-Value B) Document C) Column Family D) Graph E) Object-Oriented

C

59) To arrange the PivotTable columns and rows in Excel 2013, we use the: A) PivotTable Control. B) PivotTable dialog box. C) PivotTable Field List. D) PivotTable Wizard. E) PivotTable command tab.

C

37) Which of the following is true about data mining applications? A) They use sophisticated mathematical techniques. B) They use sophisticated statistical techniques. C) Their report delivery is more difficult than report delivery for reporting systems. D) Both A and B E) All of the above

D

47) After getting data from a database, a PHP program needs to: A) open the connection. B) test the connection. C) query the database. D) process the query results. E) close the connection.

D

49) The term drill down means the user wants to: A) summarize data. B) get older data. C) sort data. D) get more details. E) aggregate data.

D

36) Data mining applications are used to accomplish which of the following tasks? A) Perform what-if analysis B) Make predications C) Facilitate decision making D) Both A and B E) All of the above

E

38) Which of the following is a reason that operational data are difficult to read? A) Dirty data B) Missing values C) Non-integrated data D) Both A and B E) All of the above

E

39) The ODBC standard defines a way to: A) start transactions. B) rollback transactions. C) create a connection. D) issue SQL commands. E) All of the above

E

40) Which of the following is a function performed by the driver manager in ODBC? A) Submit SQL statements to the data source. B) Determine the type of DBMS that processes a given ODBC data source. C) Load the appropriate ODBC driver into memory. D) Convert data source error codes into ODBC error codes. E) Both B and C

E

64) XML stands for ________.

Extensible Markup Language Diff: 1 Page Ref: 405

69) Data warehouses are populated with data prepared by ________ programs.

Extract, Transform and Load (ETL)

10) If the Web server and the DBMS are running on the same server, the system has a three-tier architecture.

FALSE

12) ODBC only works with Microsoft products.

FALSE

14) Operational databases store historical data.

FALSE

14) With ODBC, only a single driver is needed to handle all data source types, such as SQL Server, Oracle Database, MySQL, and Microsoft Access.

FALSE

16) With ODBC, a file data source is available only to the user that created it.

FALSE

17) Operational databases contain a fact table.

FALSE

18) A star schema resembles a star, with a dimension table at the center and fact tables radiating out from the center.

FALSE

26) To create an OLAP report for an Access 2013 database, use the PivotTable tool in Access 2013.

FALSE

27) When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is FrontPage.

FALSE

29) Excel 2013 cannot import Access 2013 data directly into a PivotTable report, but must first place the data into a worksheet.

FALSE

3) A stored procedure is a module of logic normally written in a traditional programming language like C++ and stored in the application program.

FALSE

3) Business Intelligence (BI) systems support operational activities.

FALSE

30) Although Excel 2013 will create a PivotTable report using Access 2013 data, it does not have formatting tools that can be used with the report.

FALSE

30) When using Microsoft Access and IIS, the Web pages that access the database cannot be written using PHP.

FALSE

4) A stored procedure is invoked automatically by the DBMS whenever certain events occur.

FALSE

7) BI reporting systems summarize the current status of business activities and compare that status with past events but not with predicted future activities.

FALSE

9) Report delivery is more difficult for data mining than it is for reporting systems.

FALSE

9) The most commonly used Web server on servers running the UNIX or Linux operating system is Internet Information Services (IIS).

FALSE

A DTD is a language used for defining XML databases.

False

A catalog is the structure that contains object descriptions created by a user.

False

A database is maintained and queried using the data mapping language (DML).

False

A fat client does most of its processing on the server.

False

A function has only input parameters but can return multiple values.

False

A language used to transform complex XML documents and also used to create HTML pages from XML documents is called Extensible Stylesheet Transformation.

False

A referential integrity constraint specifies that the existence of an attribute in one table depends upon the existence of a foreign key in the same or another table.

False

A routine is a named set of SQL statements that are considered when a data modification occurs.

False

A subquery in which processing the inner query depends on data from the outer query is called a codependent query.

False

A(n) HTTP Schema Definition is a language used for defining XML databases.

False

An API is a set of routines that a database server uses to access database objects.

False

An XML Schema is a language used to define HTML.

False

An equi-join is a join in which one of the duplicate columns is eliminated in the result table.

False

Business rules logic includes such activities as data validation and identification of processing errors.

False

Cloud computing will have a limited impact on three-tier applications.

False

Combining a table with itself results in a faster query.

False

Count(*) tallies only those rows that contain a value, while Count counts all rows.

False

EXISTS takes a value of false if the subquery returns an intermediate result set.

False

Even with XML, different types of devices will require a different page.

False

Geolocation logic is the application logic component responsible for data storage and retrieval.

False

IF-THEN-ELSE logical processing cannot be accomplished within an SQL statement.

False

Implementation of a standard can never stifle creativity and innovation.

False

Indexes generally slow down access speed in most RDMS.

False

Materialized views are stored on disk and are never refreshed.

False

One major disadvantage of the outer join is that information is easily lost.

False

SQL has been implemented only in the mainframe and midrange environments.

False

SQL originated from a project called System-S.

False

Subqueries can only be used in the WHERE clause.

False

The CREATE SCHEMA DDL command is used to create a table.

False

The DELETE TABLE DDL command is used to remove a table from the database.

False

The DROP command deletes rows from a table individually or in groups.

False

The HAVING clause and the WHERE clause perform the same operation.

False

The following two SQL statements will produce different results. Select last_name, first_name from customer where state = 'MA' or state = 'NY' or state = 'NJ' or state = 'NH' or state = 'CT'; Select last_name, first_name from customer where state in ('MA','NY','NJ','NH','CT');

False

There is a special operation in SQL to join a table to itself.

False

Three-tier architectures generally result in higher long-term costs.

False

User-defined functions can improve system performance because they will be processed as sets rather than individually, thus reducing system overhead.

False

Using an outer join produces this information: rows that do not have matching values in common columns are not included in the result table.

False

WXDL is an XML-based grammar.

False

When a subquery is used in the FROM clause, it is called a denied table.

False

When creating a table, it is not important to consider foreign key—primary key mates.

False

When developing an application, one must decide where it will be placed when it is developed.

False

When the SELECT clause in the create view statement contains the keyword DISTINCT, the view can be used to update data.

False

XML uses bcode, long commands embedded in quotes, to characterize data.

False

XML-based vocabularies, such as XBRL, do not allow meaningful comparisons to be made of data across many organizations.

False

67) When using Microsoft Access and IIS, a good basic ASCII text editor for producing HTML is ________.

Notepad

76) ________ provides the ability to sum, count, average and perform other simple arithmetic operations on groups of data.

OLAP

78) OLAP reports can be created using the Excel 2013 ________ tool.

PivotTable

13) With ODBC, the driver manager serves as an intermediary between the application and the DBMS drivers.

TRUE

15) Dimensional databases are used for analytical data processing.

TRUE

15) With ODBC, a database and the DBMS that processes it are identified by the data source.

TRUE

16) Dimensional databases use the star schema.

TRUE

17) In general, the best type of ODBC data source that can be defined for a Web application is a system data source.

TRUE

19) HTML standards are defined by the World Wide Web Consortium (W3C).

TRUE

19) In a snowflake table, each dimension table is normalized.

TRUE

20) OLAP provides the ability to sum, count, average and perform other simple arithmetic operations on groups of data.

TRUE

21) Extensible Markup Language (XML) is becoming a standard means for defining the structure of documents and for transmitting documents from one computer to another.

TRUE

8) Data Mining uses sophisticated statistical and mathematical techniques to perform what-if analyses, to make predictions, and to facilitate decision making.

TRUE

8) If a server is using a Microsoft Windows operating system, it is usually running Internet Information Services (IIS) as its Web server.

TRUE

A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.

True

A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.

True

A correlated subquery is executed once for each iteration through the outer loop.

True

An insert command does not need to have the fields listed.

True

Application Programming Interfaces are more efficient than CGI scripts and are implemented as shared code or dynamic link libraries.

True

Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.

True

Applications can be moved from one machine to another when each machine uses SQL

True

Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.

True

In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with the IN qualifier.

True

In order to update data in SQL, one must inform the DBMS which relation, columns, and rows are involved.

True

In some three-tier architectures, most application code is stored on the application server.

True

Java servlets execute from within another program and reside on the server.

True

Joining tables or using a subquery may produce the same result.

True

PHP is a platform for Web development.

True

The FROM clause is the first statement processed in an SQL command.

True

The ORDER BY clause sorts the final results rows in ascending or descending order.

True

The SQL command used to populate tables is the INSERT command.

True

The UNION clause is used to combine the output from multiple queries into a single result table.

True

The WHERE clause includes the conditions for row selection within a single table or view and the conditions between tables or views for joining.

True

Web Services Description Language is an XML-based grammar.

True

When creating tables, it's important to decide which columns will allow null values before the table is created.

True

XML addresses the structuring and manipulation of information in a Web browser.

True

XQuery is an XML transformation language for querying relational data as well as XML databases.

True

58) Every DBMS product has a(n) ________ that allows DBMS functions to be executed from application program code.

application programming interface (API)

70) A(n) ________ is a collection of data that addresses a particular component or functional area of a business.

data mart

66) Business Intelligence (BI) ________ uses sophisticated statistical and mathematical techniques to perform what-if analyses, to make predictions, and to facilitate decision making.

data mining

73) In the snowflake schema, the ________ tables are normalized.

dimension

67) Problematic data are called ________.

dirty data

77) The term ________ refers to the capability of seeing the data in smaller and smaller units.

drill down

72) A variant of the star schema is the ________.

snowflake schema

71) A dimensional database uses a(n) ________.

star schema

57) A(n) ________ is similar to a computer program subroutine or function, but it is stored within the database.

stored procedure

69) When using Microsoft Access and IIS with an ODBC data source, the ODBC data source should be a(n) ________.

system data source

64) Business Intelligence (BI) systems obtain data in ________ different ways.

three

61) If the Web server and the DBMS are running on the different servers, the system has a(n) ________ architecture.

three-tier

75) To deal with historical data values, dimensional databases use a(n) ________.

time dimension

56) A(n) ________ is a program stored within the DBMS that is invoked by the DBMS when a specified event occurs.

trigger

12) In SQL, the WHERE clause is used to specify which columns will be included in the result.

Answer: FALSE

21) Microsoft Access 2013 uses a user-level security system.

Answer: FALSE

10) There is usually only one instance of an entity in an entity class.

Answer: FALSE Diff: 1 Page Ref: 247-248

20) Subtype entities may be either exclusive or inclusive.

Answer: TRUE

5) One problem with storing duplicated data is the potential for inconsistent values

Answer: TRUE

9) An entity class is described by the structure of the entities in that class.

Answer: TRUE

60) A commonly used Web server on servers running the Linux operating system is ________.

Apache

24) XML designers created a system that allows document structure, data content, and materialization to be mixed.

FALSE

28) When using Microsoft Access and IIS, there is no need for an ODBC data source.

FALSE

MULTISET is similar to the table datatype.

False

The natural join is very rarely used.

False

UDDI stands for Underwritten Data Dictionary Inquiry.

False

Constraints are a special case of triggers.

True

Correlated subqueries are less efficient than queries that do not use nesting.

True

The joining condition of an equi-join is based upon an equality.

True

The views are created by executing a CREATE VIEW SQL command.

True

66) Even when using Microsoft Access and IIS, we should still use a basic Web home page named ________.

index.html

60) ________ constrain data values and the processing of the database.

Answer: Business rules

What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries group by driver_no; A) A listing of all drivers, sorted by driver number B) A listing of each driver as well as the number of deliveries that he or she has made C) A count of all of the deliveries made by all drivers D) None of the above

B

Which of the following can produce scalar and vector aggregates? A) ORDER BY B) GROUP BY C) HAVING D) SORT

B

Which of the following is the wildcard operator in SQL statements? A) < > B) * C) = D) &

B

55) Hadoop is a(n): A) RDMBS. B) OODBMS. C) distributed file system (DFS). D) print system. E) Web server.

C

32) Business Intelligence (BI) systems fall into which of the following categories? A) Processing B) Reporting C) Data mining D) Both A and B E) Both B and C

E

65) NetBeans is a(n) ________.

Integrated Development Environment (IDE)

59) ODBC stands for ________.

Open Database Connectivity

70) When using Microsoft Access and IIS, the Web pages that access the database can be written using the ________ scripting language.

PHP

A procedure is run by calling it by its name.

True

A transaction is the complete set of closely related update commands that must all be done, or none of them done, for the database to remain valid.

True

A trigger is a named set of SQL statements that are considered when a data modification occurs.

True

80) Objects have ________, which are computer programs that perform some task.

methods

79) Distributed databases can be distributed by partitioning and ________.

replication

63) Business Intelligence (BI) systems fall into two broad categories: ________ and ________.

reporting and data mining

65) Business Intelligence (BI) ________ are used to filter data, sort data, group data and make simple calculations based on the data.

reporting systems

Dynamic SQL: A) is used to generate appropriate SQL code on the fly as an application is processing. B) is quite volatile. C) is not used widely on the Internet. D) creates a less flexible application

A

Embedded SQL consists of: A) hard-coded SQL statements included in a program written in another language. B) SQL encapsulated inside of other SQL statements. C) SQL written into a front-end application. D) SQL translated to a lower-level language.

A

Extensible Markup Language (XML) is: A) a scripting language that allows the creation of customized tags to enable easier sharing of data across organizations. B) a database language. C) a product used for database middleware. D) none of the above.

A

In SQL, a(n) ________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. A) correlated B) paired C) natural D) inner

A

Java servlets: A) are small programs that execute from within another application rather than from the operating system. B) must be executed each time a user makes a request. C) are stored on the client. D) are implemented as dynamic link libraries (DLLs).

A

Multiple values returned from an SQL query that includes an aggregate function are called: A) vector aggregates. B) scalar aggregates. C) agates. D) summations

A

PHP is a popular API for MySQL because of all of the following EXCEPT: A) Microsoft integration. B) high performance. C) easy to use. D) MySQL connectivity built-in.

A

The UNION clause is used to: A) combine the output from multiple queries into a single result table. B) join two tables together to form one table. C) find all rows that do not match in two tables. D) none of the above.

A

The ________ DBA view shows information about all users of the database in Oracle. A) DBA_USERS B) USERS C) DBA_VIEWS D) DBA_INDEXES

A

The outer join syntax does not apply easily to a join condition of more than ________ tables. A) two B) three C) four D) any number of

A

What does the following SQL statement do? Select * From Customer Where Cust_Type = "Best" A) Selects all the fields from the Customer table for each row with a customer labeled "Best" B) Selects the "*" field from the Customer table for each row with a customer labeled "Best" C) Selects fields with a "*" in them from the Customer table D) Selects all the fields from the Customer table for each row with a customer labeled "*"

A

What results will be produced by the following SQL query? Select sum(standard_price) as Total_Price from Product_V where Product_Type = 'WOOD'; A) The total price of all products that are of type wood B) The total price of all products C) The Standard_Price of the first wood product in the table D) The Standard_Price of any wood product in the table

A

________ facilitates the ability of applications to query relational data along with associated structured data. A) XPath B) XQuery C) XSLT D) SOAP

A

________ is a rapidly developing scripting language that allows for the creation of customized tags that can be used across applications. A) Extensible Markup Language B) HTML C) SGL D) CGI

A

________ is a set of commands used to update and query a database. A) DML B) DDL C) DCL D) DPL

A

________ is the process of assigning pieces of application code to clients or servers. A) Application partitioning B) Modularizing programs C) Code distribution D) Program breakup

A

________ use the result of the outer query to determine the processing of the inner query. A) Correlated subqueries B) Outer subqueries C) Inner subqueries D) Subqueries

A

36) A key that contains more than one attribute is called a(n): A) composite key. B) complex key. C) multi-key. D) n-key. E) candidate key.

Answer: A

38) A relational database is: A) a self-describing collection of related tables B) a collection of forms and reports that support a given purpose C) a library of queries and data files for querying D) a set of applications and the data sets for those applications E) a set of metadata

Answer: A

38) Which of the following is not a standard data type used in SQL? A) Text B) Char C) Varchar D) Integer E) Numeric

Answer: A

39) What is the least restrictive isolation level that will prevent dirty reads? A) Read Committed B) Serializable C) Read Uncommitted D) Atomic Read E) Repeatable Read

Answer: A

41) Which of the following is the correct technique for representing a 1:N relationship in the relational model? A) The key of the entity on the one side is placed into the relation for the entity on the many side. B) The key of the child is placed into the relation of the parent. C) The key of either relation can be placed into the other relation. D) The key of the entity on the many side is placed into the relation for the entity on the one side. E) An intersection relation is created, and the keys from both parent entities are placed as keys in the intersection relation.

Answer: A

43) In crow's foot style E-R diagrams, a circle across the relationship line near an entity indicates: A) a minimum cardinality of zero. B) a minimum cardinality of one. C) a maximum cardinality of one. D) a maximum cardinality of many. E) Both B and C

Answer: A

43) Which of the following is a function of the database application in a database system? A) Create and transmit queries B) Update database data C) Maintain database structures D) Create tables E) Backup and restore data

Answer: A

43) Which of the following is not true of surrogate keys? A) They are meaningful to the users. B) They are numeric. C) They are usually generated by the DBMS. D) They are unique. E) They are usually hidden on forms and reports.

Answer: A

46) When Microsoft Access 2013 secures a database just by storing the database in a trusted location, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

Answer: A

47) When Microsoft Access 2013 secures a database with just a password, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

Answer: A

48) One important relational design principle is that: A) every determinant must be a candidate key. B) every candidate key must not be a determinant. C) every primary key must be a surrogate key. D) every determinant must be functionally dependent on the primary key. E) every primary key must be functionally dependent on every determinant.

Answer: A

48) When transforming an E-R data model into a relational database design, the key of the parent entity should be placed as part of the primary key into the child entity ________. A) when the child entity is ID-dependent B) when the child entity is non-ID-dependent C) when the child entity has a 1:1 relationship with the parent entity D) when the child entity has a 1:N relationship with the parent entity E) when the child entity has a recursive relationship with the parent entity

Answer: A

49) The Microsoft Access 2013 form editor is a(n): A) banded form editor. B) wizard-based form editor. C) ASCII form editor. D) WYSIWYG form editor. E) Web-based form editor.

Answer: A

49) The default file format for Microsoft Access 2013 database files is the: A) Access 2007 format B) Access 2003 format C) Access XP format D) SQL Server format E) XBD format

Answer: A

49) Which symbol is used in standard SQL as a wildcard to represent a series of one or more unspecified characters? A) % (percent sign) B) ! (exclamation mark) C) _ (underscore) D) ? (question mark) E) ; (semi-colon)

Answer: A

50) The Microsoft Access 2013 report editor is a(n): A) banded report editor. B) wizard-based report editor. C) ASCII report editor. D) WYSIWYG report editor. E) Web-based report editor.

Answer: A

50) What relationship pattern is illustrated in the following schema?PRODUCT (ProductID, Description) SUPPLIER (SupplierID, ContactName, PhoneNumber) PRODUCT_SUPPLIER (ProductID, SupplierID, Cost) ProductID in PRODUCT_SUPPLIER must exist in ProductID in PRODUCT SupplierID in PRODUCT_SUPPLIER must exist in SupplierID in PRODUCT A) Association relationship B) Intersection relationship C) Recursive relationship D) Strong entity relationship E) Supertype/subtype relationship

Answer: A

51) The first step of the normalization process is to: A) identify all the candidate keys of a relation. B) identify all the foreign keys of a relation. C) identify all the functional dependencies of a relation. D) identify all the determinants of a relation. E) split the relation into two or more new relations.

Answer: A

55) In the normalization process, if you find that every determinant in a relation is a candidate key then you have determined that: A) the relation is well formed. B) the relation needs to be broken into two or more new relations. C) surrogate keys in the relation may not be correctly linked to other relations. D) the relation needs to have foreign keys added in order to be correctly linked to other relations. E) referential integrity constraints concerning the relation need to be established.

Answer: A

55) Microsoft Access does not create N:M relationships because: A) Microsoft Access creates databases based on database designs instead of data models. B) Microsoft Access creates databases based on data models instead of database designs. C) Microsoft Access cannot implement association relationships. D) Microsoft Access cannot implement supertype/subtype relationships. E) Microsoft Access cannot implement recursive relationships.

Answer: A

58) Given the table STUDENT(StudentID, Name, Advisor), which of the following SQL statements would be used to change the value of the Advisor field to 'Smith' for all rows in the STUDENT table? A) UPDATE STUDENT SET Advisor = 'Smith'; B) MODIFY STUDENT SET Advisor = 'Smith'; C) MODIFY Advisor SET STUDENT = 'Smith'; D) UPDATE Advisor = 'Smith'; E) SET STUDENT Advisor = 'Smith';

Answer: A

60) Which of the following SQL commands would be used to remove both the data and the table structure of a table named STUDENT? A) DROP TABLE STUDENT; B) DELETE TABLE STUDENT; C) REMOVE TABLE STUDENT; D) SELECT * FROM STUDENT THEN DROP; E) DELETE FROM STUDENT;

Answer: A

84) Microsoft Access SQL allows table structures to be modified by using the standard SQL ________ command.

Answer: ALTER TABLE

65) Microsoft Access 2013 generates surrogate key values when the ________ data type is used

Answer: AutoNumber

26) Which of the following is not a stage in the development of a database system? A) Requirements analysis B) Validation C) Component design D) Implementation E) All of the above are stages in the development of a database system.

Answer: B

28) Which of the following activities is not performed during the implementation phase of developing a database system? A) Filling the database with data B) Transforming the data model into a database design C) Writing application programs D) Creating forms E) Creating reports

Answer: B

30) What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read? A) Nonrepeatable reads B) Phantom reads C) Dirty reads D) Serialized reads E) Unlocked reads

Answer: B

31) A use case can be used to perform which of the following tasks? A) Transform the data model into the database design B) Validate the data model C) Fill the database with data D) Implement business rules E) Develop applications

Answer: B

32) Which of the following is true about a relation? A) The order of the columns in a relation must go from largest to smallest. B) All entries in any column must be of the same kind. C) A relation may have duplicate column names. D) A relation may have duplicate rows. E) A relation may have multiple names.

Answer: B

35) One of the important properties of a column is whether or not it is ________. A) found in more than one entity B) required C) character or numeric D) subject to normalization E) subject to denormalization

Answer: B

36) In a relational database design, all relationships are expressed by ________. A) creating a primary key B) creating a foreign key C) creating a supertype D) creating a subtype E) creating a line between entities

Answer: B

36) The statement SELECT STUDENT StudentNumber, STUDENT.StudentName, FROM STUDENT WHERE STUDENT StudentNumber = S12345678; is an example of: A) QBE B) SQL C) QLE D) C++ E) Java

Answer: B

36) Which of the following data types used in SQL would define a fixed-length text field of 10 characters? A) text(10) B) char(10) C) varchar(10) D) fixed(10) E) length(10)

Answer: B

37) Given only the following excerpt of an E-R model: Which of the following is known to be true? A) A single instance of ENTITY A must be related to one instance of ENTITY B. B) Many instances of ENTITY A may be related to one instance of ENTITY B. C) ENTITY B has a degree of many. D) ENTITY B is a weak entity. E) Both A and C are true.

Answer: B

38) What is the least restrictive isolation level that will prevent phantom read problems? A) Read Committed B) Serializable C) Read Uncommitted D) Atomic Read E) Repeatable Read

Answer: B

41) A rule that requires that the values in a foreign key must have a matching value in the primary key to which the foreign key corresponds is called: A) normalization. B) a referential integrity constraint. C) a key matching constraint. D) a functional dependency. E) synchronization.

Answer: B

42) Given the table STUDENT(StudentID, Name, Advisor), which of the following SQL statements would be used to add new student data to the STUDENT table? A) INSERT DATA STUDENT SET StudentID=123, Name='Jones', Advisor='Smith'; B) INSERT INTO STUDENT VALUES (123, 'Jones', 'Smith'); C) INSERT INTO STUDENT (New Student Data) VALUES (123, 'Jones', 'Smith'); D) INPUT DATA STUDENT SET StudentID=123, Name=' Jones', Advisor='Smith'; E) INPUT INTO STUDENT (123, 'Jones', 'Smith');

Answer: B

44) Which of the following is not a function of the database application in a database system? A) Execute application logic B) Control concurrency C) Create and process forms D) Create and transmit queries E) Create and process reports

Answer: B

46) Given the below functional dependency, MedicineCode → (MedicineName, ShelfLife, Manufacturer, Dosage) which of the following statements is not known to be true? A) MedicineCode is a determinant. B) MedicineName is a determinant. C) Manufacturer is functionally dependent on MedicineCode. D) ShelfLife is functionally dependent on MedicineCode. E) MedicineCode is a candidate key of the relation MEDICINE (MedicineName, ShelfLife, Manufacturer, Dosage, MedicineCode).

Answer: B

46) Microsoft Access is a personal database system, and a personal database system is characterized by: A) the DBMS removing the metadata from the database B) the DBMS product taking the role of the DBMS and the database application generator C) the database being stored inside the DBMS D) the DBMS product being limited to a maximum of ten tables in any given database E) the DBMS not supporting indexes

Answer: B

49) When Microsoft Access 2013 creates a signed package with a digital signature, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

Answer: B

50) A table that meets the requirements of a relation is said to be in which normal form? A) Relational normal form (RNF) B) First normal form C) Second normal form D) Boyce-Codd normal form E) Domain/key normal form

Answer: B

52) In the normalization process, it is not necessary to: A) identify all the candidate keys of a relation. B) identify all the foreign keys of a relation. C) identify all the functional dependencies of a relation. D) identify all the determinants of a relation. E) determine if every determinant is a candidate key.

Answer: B

52) Which of the following is not true about representing subtypes in a relational database design? A) One table is created for the supertype and one for each subtype. B) All of the attributes of the supertype are added to the subtype relations. C) The key of the supertype is made the key of the subtypes. D) A subtype and its supertype are representations of the same underlying table. E) An instance of the supertype may be related to one instance each of several subtypes.

Answer: B

55) Which SQL keyword is used to apply conditions to restrict groups that appear in the results of a SELECT query that uses GROUP BY? A) HERE B) HAVING C) LIKE D) SORT E) DISTINCT

Answer: B

57) By default, when Microsoft Access creates a relationship between two tables, it creates a(n): A) 1:1 relationship. B) 1:N relationship. C) N:M relationship. D) association relationship. E) recursive relationship.

Answer: B

63) In Microsoft Access, tables are added to a Query window by: A) selecting the tables from the Use Table dialog box. B) selecting the tables from the Show Table dialog box. C) selecting the tables from the Tables section of the Navigation Pane. D) selecting the tables from the Queries section of the Navigation Pane. E) selecting the tables from the Relationships window.

Answer: B

65) In Microsoft Access, standard SQL table creation syntax items not supported by Access SQL can generally be implemented by: A) setting the Data Types in Access table Design View. B) setting the field properties in Access table Design View. C) setting the relationship properties in the Edit Relationship dialog box. D) setting the referential integrity properties in the Edit Relationship dialog box. E) running an ALTER TABLE query in Access SQL.

Answer: B

27) The representation of the content, relationships, and constraints of the data needed to support the system requirements is the: A) relation design. B) implementation. C) data model. D) data view. E) application program.

Answer: C

28) The purpose of concurrency control is to: A) ensure that each form has a corresponding report. B) ensure that ASPs do not duplicate JSPs. C) ensure that one user's work does not interfere with another's. D) ensure that stored procedures do not invoke triggers. E) ensure that triggers do not invoke stored procedures.

Answer: C

29) The first step in transforming an extended E-R model into a relational database design is to ________. A) create a table for each relationship B) evaluate the entities against the normalization criteria C) create a table for each entity D) remove any recursive relationships E) document referential integrity constraints

Answer: C

29) When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be: A) consistent. B) isolated. C) atomic. D) locked. E) logical.

Answer: C

31) What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database? A) Nonrepeatable reads B) Phantom reads C) Dirty reads D) Serialized reads E) Unlocked reads

Answer: C

31) Which of the following is not true about a relation? A) A relation is a two-dimensional table. B) The cells of a relation must hold a single value. C) A relation may have duplicate column names. D) A relation may not have duplicate rows. E) The order of the rows of a relation is insignificant.

Answer: C

33) A surrogate key should be considered when ________. A) a relationship is M:N B) a composite key is required C) the key contains a lengthy text field D) the key contains a number E) an index needs to be created

Answer: C

33) In the Entity-Relationship data model, all instances of an entity of a given type are grouped into: A) entity objects. B) class objects. C) entity classes. D) identifiers. E) entity attributes.

Answer: C

34) Which of the following is not true about surrogate keys? A) They are identifiers that are supplied by the system, not the users. B) They have no meaning to the users. C) They are nonunique within a table. D) They can be problematic when combining databases. E) The DBMS will not allow their values to be changed.

Answer: C

34) Which of the following is true about identifiers of entities? A) Identifiers must be unique. B) Identifiers are not normally used in a naming role. C) The value of an identifier may identify a set of entity instances. D) Identifiers may not be more than two attributes. E) An identifier in the E-R model is equivalent to a key in the relational model.

Answer: C

37) Ensuring that each SQL statement independently processes consistent rows is known as: A) transaction level consistency. B) independent consistency. C) statement level consistency. D) process level consistency. E) serializable consistency.

Answer: C

39) Whether or not an instance of one entity class must participate in a relationship with another entity class is indicated by the: A) degree. B) recursive cardinality. C) minimum cardinality. D) maximum cardinality. E) ordinality.

Answer: C

39) Which of the following is not true about primary keys? A) Primary keys cannot be null. B) Primary keys must be unique. C) Primary keys must be a single attribute. D) Primary keys are used to represent relationships. E) Primary keys can be defined using an SQL CONSTRAINT phrase.

Answer: C

39) Which of the following is true when representing a 1:1 binary relationship using the relational model? A) The key of the entity with the highest minimum cardinality must be placed in the other entity as a foreign key. B) The key of each entity must be placed in the other as a foreign key. C) The key of either entity is placed in the other as a foreign key. D) The key of the entity with the most attributes must be placed in the other entity as a foreign key. E) Both entities must have the same primary key.

Answer: C

40) A composite primary key can be defined using the CONSTRAINT phrase in which SQL command? A) MODIFY TABLE B) CHANGE TABLE C) CREATE TABLE D) SET TABLE E) BUILD TABLE

Answer: C

40) Given the relations: STUDENT (SID, StudentName, Major, AdvisorID) ADVISOR (AdvisorID, AdvisorName, Office, Phone) such that each student is assigned to one advisor, which of the following is true? A) SID is both a primary key and a foreign key. B) AdvisorName is a determinant. C) AdvisorID is a foreign key. D) Phone is a candidate key. E) Major is a candidate key.

Answer: C

41) The creation of a database and its tables is a function of which component of the database system? A) Users B) Application C) DBMS D) Database E) Web server

Answer: C

41) Which of the following is not true of database recovery through reprocessing? A) Reprocessing makes use of a database save. B) Reprocessing takes the same amount of time as did processing in the first place. C) Reprocessing will always return the database to its exact previous state. D) Reprocessing requires a record of all transactions since the last time the database was saved. E) All of the above are true of reprocessing.

Answer: C

43) The order of the columns returned by an SQL SELECT statement is determined by the: A) ORDER BY clause. B) SORT BY clause. C) order they are listed in following SELECT. D) order they are listed in following WHERE. E) order they are listed in following FROM.

Answer: C

43) Which of the following is the correct technique for representing a M:N relationship using the relational model? A) An intersection relation is created, and the key of either entity is placed as a key in both the intersection relation and in the other relation. B) An intersection relation is created with a surrogate key, which is placed in each of the parent entities. C) An intersection relation is created, and the keys of both parent entities are placed as a composite key in the intersection relation. D) The key from either relation is placed as a foreign key in the other relation. E) None of the above

Answer: C

45) Which SQL keyword is used to specify a condition that rows must meet to be included in the results of an SQL SELECT query? A) SELECT B) FROM C) WHERE D) ORDER BY E) GROUP BY

Answer: C

46) Microsoft Access can be used to build a prototype database, which allows users: A) to draw a crow's foot E-R diagram themselves. B) to normalize the tables in the E-R diagram. C) to validate the data model by demonstrating the consequences of data modeling decisions. D) to determine the functional dependencies in the data model. E) to determine the appropriate primary and foreign keys in the data model.

Answer: C

47) In relational database design, ID-dependent entities are used to ________. A) represent 1:1 relationships B) represent 1:N relationships C) represent N:M relationships D) handle recursive relationships E) eliminate the need for weak entities being converted to tables.

Answer: C

47) Microsoft Access is a good tool for creating mock-ups of forms and reports because: A) the form and report generators do not exist within Access itself. B) Access forms and reports are very simplistic. C) Access wizards make it easy to create the forms and reports. D) Access has a version of Microsoft PowerPoint built into it to allow easy creation of PowerPoint slide shows. E) Access has a version of Microsoft Excel built into it to allow easy exporting of data to spreadsheets.

Answer: C

48) Microsoft Access 2013 database files are stored using the file extension: A) adb. B) asp. C) accdb. D) mdb. E) sql.

Answer: C

48) When Microsoft Access 2013 compiles VBA code in a database, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

Answer: C

48) Which symbol is used in standard SQL as a wildcard to represent a single, unspecified character? A) % (percent sign) B) ! (exclamation mark) C) _ (underscore) D) ? (question mark) E) ; (semi-colon)

Answer: C

49) During the normalization process, the remedy for a relation that is not well formed is to: A) create a surrogate key. B) create a functional dependency. C) break it into two or more relations that are well formed. D) combine it with another relation that is well formed. E) convert it into a list.

Answer: C

49) When transforming an ID-dependent E-R data model relationship into a relational database design and the child entity is designed to use a surrogate key, then ________. A) the parent entity must also use a surrogate key B) the relationship remains an ID-dependent relationship C) the relationship changes to a non-ID-dependent relationship D) A and B E) A and C

Answer: C

51) Which of the following is the correct SQL clause to sort the results of a SELECT query in reverse-alphabetic order using the Department field? A) SORT BY Department B) REVERSE Department C) ORDER BY Department DESC D) SORT BY Department DESC E) SORT BY Department REVERSE

Answer: C

53) Given the table CUSTOMER(CustID, Name, PhoneNum, AcctBalance) what is the standard SQL query phrase to retrieve the Name and Phone Number of customers? A) SELECT CUSTOMER-Name AND CUSTOMER-PhoneNum B) SELECT (CUSTOMER-Name AND CUSTOMER-PhoneNum) C) SELECT Name, PhoneNum D) SELECT (Name, PhoneNum) E) SELECT *

Answer: C

53) What relationship pattern is illustrated in the following schema? EMPLOYEE (EmployeeID, OfficePhone, Manager) Manager in EMPLOYEE must exist in EmployeeID in EMPLOYEE A) Association relationship B) Intersection relationship C) Recursive relationship D) Strong entity relationship E) Supertype/subtype relationship

Answer: C

54) Given the table CUSTOMER(CustID, Name, PhoneNum, AcctBalance) what is the standard SQL query phrase to retrieve data for customers with an account balance greater than 50? A) WHERE CUSTOMER-AcctBalance > 50 B) WHERE (CUSTOMER-AcctBalance > 50) C) WHERE AcctBalance > 50 D) WHERE (AcctBalance > 50) E) HAVING AcctBalance > 50

Answer: C

57) In Microsoft Access, relationships between tables are created: A) by the Relationships button on the Create command tab. B) by the Relationships button on the Home command tab. C) in the Relationships window. D) in the Table window of the table containing the primary key. E) in the Table window of the table containing the foreign key.

Answer: C

57) Which type of join, although not included in standard SQL, was created to allow unmatched rows to appear in the result of a join operation? A) ODD JOIN B) OPEN JOIN C) OUTER JOIN D) INNER JOIN E) COMBINE JOIN

Answer: C

58) In Microsoft Access, a relationship between two tables is created: A) by entering the name of the foreign key in the appropriate table in Design View. B) by entering the name of the primary key in the appropriate table in Design View. C) by dragging the primary key column of one table onto the foreign key column of the other table in the Relationships window. D) by dragging the foreign key column of one table onto the primary key column of the other table in the Relationships window. E) by dragging the primary key column of one table onto the primary key column of the other table in the Relationships window.

Answer: C

58) To create a 1:1 relationship between two tables in Microsoft Access: A) the Indexed property of the foreign key column must be set to No. B) the Indexed property of the foreign key column must be set to Yes (Duplicates OK). C) the Indexed property of the foreign key column must be set to Yes (No Duplicates). D) the Data Type of the foreign key column must be set to AutoNumber. E) the Smart Tag property of the foreign key column must be set to Foreign Key.

Answer: C

26) The term DBA refers to the: A) database accessor. B) database auditor. C) data business auditor. D) database administrator. E) data business administrator.

Answer: D

32) Preventing multiple applications from obtaining copies of the same record when the record is about to be changed is called: A) serialized reading. B) lost updating. C) concurrent processing. D) resource locking. E) block factoring.

Answer: D

33) Today almost every commercial database is based on: A) lists B) the hierarchical model C) the linked-list model D) the relational model E) the object-oriented model

Answer: D

33) Which of the following terms is synonymous with "tuple"? A) Attribute B) Table C) Field D) Row E) Relation

Answer: D

34) A relational database stores data in the form of: A) lists B) forms C) columns D) tables E) spreadsheets

Answer: D

34) Which of the following is true about a shared lock? A) It is more restrictive than an implicit lock. B) It allows only two transactions to update a record simultaneously. C) It locks the item from all access. D) It allows reads to the locked item. E) It must use a two-phase locking scheme.

Answer: D

35) The number of entity classes involved in a relationship is known as the relationship's: A) maximum cardinality. B) minimum cardinality. C) ordinality. D) degree. E) class.

Answer: D

41) Which of the following cannot be done using the CONSTRAINT phrase? A) Create a single attribute primary key. B) Define a foreign key. C) Establish a referential integrity constraint. D) All of the above can be done using the CONSTRAINT phrase. E) None of the above can be done using the CONSTRAINT phrase.

Answer: D

42) Which of the following is a function of the DBMS in a database system? A) Create and transmit queries B) Control applications C) Create and process forms D) Perform backup and recover E) Process Web page requests

Answer: D

43) A point of synchronization between the database and the transaction log is called a(n): A) before-image. B) after-image. C) recovery. D) checkpoint. E) None of the above

Answer: D

44) In SQL Server, the starting value of a surrogate key is called the: A) Identity. B) Identity Increment. C) Identity Start. D) Identity Seed. E) Identity Property.

Answer: D

44) In crow's foot style E-R diagrams, a crow's foot mark on the relationship line near an entity indicates: A) a minimum cardinality of zero. B) a minimum cardinality of one. C) a maximum cardinality of one. D) a maximum cardinality of many. E) Both B and C

Answer: D

44) Which SQL keyword is used to eliminate duplicate rows in the results of an SQL SELECT query? A) UNIQUE B) SORT C) ORDER BY D) DISTINCT E) REDUCE

Answer: D

45) In crow's foot style E-R diagrams, a single entity together with a related set of entities that each contain specific sets of attributes related to the single entity represent: A) a strong entity relationship. B) an ID-dependent weak entity relationship. C) a non-ID-dependent weak entity relationship. D) a supertype / subtype relationship. E) a recursive entity relationship.

Answer: D

47) The Microsoft Access application generator is not responsible for: A) creating forms B) creating reports C) creating queries D) creating tables E) storing queries

Answer: D

47) Which of the following is the correct SQL clause to restrict the results of a SELECT query to only records that have a value in the range of 10 to 50 in the Hours column? A) WHERE Hours = MIN(10) and MAX(50) B) WHERE Hours IN [10, 50] C) WHERE Hours = 10 and Hours = 50 D) WHERE Hours BETWEEN 10 AND 50 E) WHERE Hours RANGE 10 TO 50

Answer: D

50) When Microsoft Access 2013 uses user-level security with an Access 2003 file, the database is stored in a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

Answer: D

54) In the normalization process, if you find a candidate key that is not a determinant then you should: A) place the columns of the functional dependency in a new relation. B) make the determinant of the functional dependency the primary key of the new relation. C) leave a copy of the determinant as a foreign key in the original relation. D) All of the above E) None of the above

Answer: D

56) Although Microsoft Access is a personal database, it is still subject to the following modification problem(s): A) problems adding data. B) problems changing data. C) problems deleting data. D) All of the above E) None of the above

Answer: D

56) As far as Microsoft Access is concerned, there are no: A) 1:1 relationships. B) 1:N relationships. C) N:1 relationships. D) N:M relationships. E) recursive relationships.

Answer: D

60) In Microsoft Access, the relationship between two tables is not actually created until: A) the OK button in the Create Relationships dialog box is clicked. B) the Create button in the Create Relationships dialog box is clicked. C) the OK button in the Edit Relationships dialog box is clicked. D) the Create button in the Edit Relationships dialog box is clicked. E) the Join button in the Edit Relationships dialog box is clicked.

Answer: D

56) The purpose of the ________ in a database system is to receive requests from applications and to translate those requests into reads and writes on the database files

Answer: DBMS

79) The values of existing data can be removed from a table using the SQL ________ command, which can even be used to remove all the data in the table at one time.

Answer: DELETE

80) A complete table, including both the table structure and any data in the table, can be removed from the database by using the SQL ________ command.

Answer: DROP

51) ________ is an important business function whose purpose is to manage the database to maximize its value to the organization.

Answer: Database administration

27) Which of the following is not a means of processing databases? A) Internet applications using ASP B) Internet applications using JSP C) Applications invoking stored procedures D) Programs coded in C# E) All of the above are means of processing a database.

Answer: E

29) Which of the following is not a source for user requirements during the requirements analysis stage of developing a database system? A) Business rules B) User interviews C) Forms D) Use cases E) All of the above are sources for user requirements.

Answer: E

31) A database may be used to help people: A) track which student is assigned to a particular advisor B) know the current inventory levels of products their company sells C) check on the estimated arrival time of an incoming flight at an airport D) look up their checking account balance over the Internet E) All of the above

Answer: E

32) Which of the following problems associated with storing data in a list is avoided by storing data in a relational database? A) Maintaining the data may require changing the same data value in many locations B) Inconsistency when a data item is used multiple times C) Inability to store partial data D) Duplication of data items E) All of the above

Answer: E

33) Whether a lock applies to data at the record level, page level, table level, or database level is referred to as: A) lock exclusivity. B) lock sharing. C) lock phasing. D) serializable locking. E) lock granularity.

Answer: E

35) Which of the following is true about a key? A) It may be unique. B) It may be non-unique. C) In may identify more than one row. D) Both A and B E) All of the above

Answer: E

36) An ACID transaction is one that is: A) atomic. B) consistent. C) isolated. D) durable. E) All of the above

Answer: E

37) A primary key is: A) required to be unique. B) used to represent rows in relationships. C) a candidate key. D) used to identify unique rows. E) All of the above

Answer: E

39) The component of a database that makes it self-describing is the: A) related tables B) applications C) library D) data set E) metadata

Answer: E

40) A dashed line between entities indicates: A) a unique identifier. B) a minimum cardinality of zero. C) a minimum cardinality of one. D) an identifying relationship. E) a nonidentifying relationship.

Answer: E

40) What is the least restrictive isolation level that will prevent nonrepeatable reads? A) Read Committed B) Serializable C) Read Uncommitted D) Atomic Read E) Repeatable Read

Answer: E

40) Which of the following would not be an example of database metadata? A) Names of tables in a database B) Properties of tables in a database C) Names of columns in a database and their associated tables D) Properties of columns E) Queries against records in the database tables

Answer: E

41) An ID-dependent entity is: A) a special type of weak entity. B) an entity in which the identifier of the entity includes the identifier of another entity. C) a strong entity. D) an entity with a maximum cardinality of one. E) Both A and B

Answer: E

42) A surrogate key may be appropriate under which of the following circumstances? A) The available candidate keys would produce a lot of data duplication when representing relationships. B) The primary key is numeric. C) The available candidate keys would be prone to typographical errors. D) The available candidate keys have little meaning to the users. E) Both A and C

Answer: E

42) In crow's foot style E-R diagrams, a hash mark across the relationship line near an entity indicates: A) a minimum cardinality of zero. B) a minimum cardinality of one. C) a maximum cardinality of one. D) a maximum cardinality of many. E) Both B and C

Answer: E

44) Additional DBA responsibilities include: A) problem and error reporting. B) requests of changes to existing systems. C) controlling database configuration. D) maintaining appropriate documentation. E) All of the above

Answer: E

45) Computer systems fail for which of the following reasons? A) Hardware breaks. B) Electrical power fails. C) Programs have bugs. D) People make mistakes. E) All of the above

Answer: E

45) In many-to-many relationships in a relational database design, ________. A) the key of the child is placed as a foreign key into the parent B) the key of the parent is placed as a foreign key into the child C) the keys of both tables are placed in a third table D) the keys of both tables are joined into a composite key E) C and D

Answer: E

45) Which of the following is not true about null values? A) A null value can mean that the value is unknown. B) A null value is ambiguous. C) A null value can mean that the value is known to be blank. D) A null value can mean that no value for the field is appropriate. E) Null values cannot be avoided.

Answer: E

46) Conditions after the WHERE keyword require single quotes around the values for columns that have which data type? A) Char B) VarChar C) Integer D) Numeric E) Both A and B

Answer: E

46) In many-to-many relationships in a relational database design, ________. A) the intersection table is ID-dependent on one of the parents B) the intersection table is ID-dependent on both of the parents C) the minimum cardinality from the intersection table to the parents is always M D) A and B E) B and C

Answer: E

48) Microsoft Access can be used to prototype databases for which of the following DBMS products? A) Microsoft Access B) SQL Server C) MySQL D) Oracle Database E) All of the above

Answer: E

50) Which SQL keyword can be used in conjunction with wildcards to select partial values? A) SELECT B) SEARCH C) FIND D) SUBSTRING E) LIKE

Answer: E

51) What relationship pattern is illustrated in the following schema? VEHICLE (VehicleID, Cost) CAR (VehicleID, NumberOfSeats) TRUCK (VehicleID, CargoCapacity) VehicleID in CAR must exist in VehicleID in VEHICLE VehicleID in TRUCK must exist in VehicleID in VEHICLE A) Association relationship B) Intersection relationship C) Recursive relationship D) Strong entity relationship E) Supertype/subtype relationship

Answer: E

53) In the normalization process, if you find a candidate key that is not a primary key then you should: A) place the columns of the functional dependency in a new relation. B) make the determinant of the functional dependency the primary key of the new relation. C) leave a copy of the determinant as a foreign key in the original relation. D) All of the above E) None of the above

Answer: E

54) Which of the following is not true of recursive relationships? A) When the recursive relationship is M:N, an intersection table is created. B) The rows of a single table can play two different roles. C) The techniques for representing the tables are the same as for non-recursive relationships except the rows are in the same table. D) Recursive relationships can be 1:1, 1:N, or M:N relationships. E) Even when the relationship is 1:N, a new table must be defined to represent the relationship.

Answer: E

56) Given the tables STUDENT(StudentID, StudentName, AdvisorID) ADVISOR(AdvisorID, AdvisorName, Office, Phone) which of the following SQL statements would be used to implant a join between the two tables? A) WHERE STUDENT MATCH ADVISOR B) WHERE STUDENT.AdvisorID MATCH ADVISOR.AdvisorID C) WHERE STUDENT = ADVISOR D) WHERE STUDENT JOIN ADVISOR E) WHERE STUDENT JOIN ADVISOR ON STUDENT.AdvisorID = ADVISOR.AdvisorID

Answer: E

61) Microsoft Access SQL commands are run in: A) the SQL window. B) the QBE window. C) the Query View of an SQL window. D) the Design View of a Query window. E) the SQL View of a Query window.

Answer: E

62) To open a new Microsoft Access Query window: A) click the New button on the Home command tab. B) click the New Query button on the Home command tab. C) click the Create Query button on the Create command tab. D) click the New Query in Design view button on the Create command tab. E) click the Query Design button on the Command tab.

Answer: E

A) BuildingName → (RoomNumber, Capacity, Department) B) RoomNumber → (BuildingName, Department, Capacity) C) (Department, Capacity) → (BuildingName, RoomNumber) D) (BuildingName, Capacity) → (Department, RoomNumber) E) (BuildingName, RoomNumber) → (Capacity, Department)

Answer: E

75) In Microsoft Access, referential integrity constraints are created in the ________.

Answer: Edit Relationships dialog box

1) During the implementation phase of developing a database system, the data model is transformed into a database design.

Answer: FALSE

1) Only large database systems have a need for database administration.

Answer: FALSE

1) The first step in representing entities using the relational model is to determine which identifier will be used as the key.

Answer: FALSE

1) While the relational model for databases appears to hold much promise, few commercial databases have implemented it.

Answer: FALSE

10) The result for SELECT statements in SQL is a relation unless the result is a single number.

Answer: FALSE

11) Although users use database systems, they are not considered part of a database system

Answer: FALSE

11) When used to represent a relationship, the primary key must have the same name as the corresponding foreign key.

Answer: FALSE

11) With optimistic locking, locks are first issued, then the transaction is processed, and then the locks are released.

Answer: FALSE

12) A database is a set of one or more computer programs that serves as an intermediary between the users and the database management system (DBMS)

Answer: FALSE

12) The technique for representing E-R relationships in the relational model is dependent on the minimum cardinality.

Answer: FALSE

13) For a 1:1 relationship, the key of each table should be placed in the other table as the foreign key.

Answer: FALSE

13) Since surrogate keys are used to uniquely identify rows, their values are normally displayed prominently on all forms and reports for the users to see.

Answer: FALSE

13) Statement level consistency means that all statements within a transaction will access consistent rows across the lifetime of the entire transaction.

Answer: FALSE

13) The number of entity classes involved in a relationship is the cardinality of the relationship.

Answer: FALSE

14) A database is self-describing because the user maintains a record of the database structure outside the database itself

Answer: FALSE

14) The use of surrogate keys usually complicates application programming since most DBMS products require the application program to generate surrogate key values.

Answer: FALSE

15) Database security is easy to achieve since all security is handled by the DBMS, which is a single point of entry into the database.

Answer: FALSE

15) Maximum cardinality indicates whether or not an instance of one entity class must be related to at least one instance of another entity class.

Answer: FALSE

15) Metadata is the user data stored in the database

Answer: FALSE

16) Most organizations create and use their own database management system (DBMS) products

Answer: FALSE

16) One type of strong entity is the ID-dependent entity.

Answer: FALSE

16) When applied to 1:N relationships, the term "parent" refers to the many side of the relationship since a child may have many parents.

Answer: FALSE

17) In crow's foot E-R notation, the crow's foot indicates a maximum cardinality of one.

Answer: FALSE

17) The simplest and most feasible means of recovering a database is through reprocessing.

Answer: FALSE

18) Normalization is the process of removing all functional dependencies from a relation.

Answer: FALSE

18) Referential integrity constraints must be enforced by the application program

Answer: FALSE

18) To represent a 1:N relationship in the relational model, the key of either entity may be placed as a foreign key in the other entity.

Answer: FALSE

19) Application programs are responsible for creating, maintaining, and supporting database backup and recovery systems

Answer: FALSE

19) In SQL, the order of the rows that result from a SELECT statement can be set using the SORT BY phrase.

Answer: FALSE

19) Rollback requires the use of logs, but rollforward does not.

Answer: FALSE

2) Every table is a relation, but not every relation is a table.

Answer: FALSE

2) Relations should always be normalized to the highest degree possible.

Answer: FALSE

2) When using SQL to create a table, a column is defined by declaring, in this order: data type, column name, and optional constraints.

Answer: FALSE

20) Any table that meets the definition of a relation is said to be in second normal form.

Answer: FALSE

21) In the general division of labor between database applications and the DBMS, the processing of forms is considered a DBMS task

Answer: FALSE

21) The TOP built-in function in SQL is used to find the maximum value in a numeric column.

Answer: FALSE

22) All recursive relationships are 1:1.

Answer: FALSE

22) In the normalization process, it is not necessary to identify all the functional dependencies in a relation.

Answer: FALSE

23) Microsoft Access 2013 databases cannot be secured by password encryption.

Answer: FALSE

23) Microsoft Access 2013 is only used to prototype databases where Microsoft Access itself will be the final DBMS.

Answer: FALSE

24) Built-in SQL functions cannot be applied to data combined using the GROUP BY keyword.

Answer: FALSE

24) In the normalization process, if you find a candidate key that is not a primary key, then you have determined that the relation needs to be broken into two or more other relations.

Answer: FALSE

24) Microsoft Access uses the same pure N:M relationships that occur in data modeling.

Answer: FALSE

24) Personal DBMS products, such as Microsoft Access, create a clear distinction between the DBMS and the database application

Answer: FALSE

25) Data from a maximum of three tables can be combined through the use of subqueries in SQL.

Answer: FALSE

25) There is no reason for serious database developers to learn many aspects of database processing technology because DBMS products like Microsoft Access hide these aspects

Answer: FALSE

25) When Microsoft Access 2013 uses user-level security with an Access 2003 file, the database is stored in a(n) *.accdb file.

Answer: FALSE

26) Since Microsoft Access is a personal database, it is not subject to the modification problems that occur in other relational databases.

Answer: FALSE

27) By default, Microsoft Access creates 1:1 relationships between tables.

Answer: FALSE

28) In Microsoft Access, foreign keys are designated by using the Foreign Key button in the toolbar.

Answer: FALSE

29) In Microsoft Access, a relationship is created by dragging a foreign key column and dropping it on top of the corresponding primary key.

Answer: FALSE

29) Microsoft Access 2013 uses the Access 2003 mdb file format as the default file format for database files.

Answer: FALSE

29) Values of existing data can be changed using SQL through the CHANGE command.

Answer: FALSE

3) An advantage of keeping data in lists is that if you update a data value in one row of data in a list, other occurrences of the same data item in other rows will be automatically updated as well

Answer: FALSE

3) During the design phase of developing a database system, the users are asked about the need for changes to existing forms and reports.

Answer: FALSE

3) If a weak entity is ID-dependent but not existence-dependent, it can be represented using the same techniques as a strong entity.

Answer: FALSE

3) When using SQL to create a table, specifying the NULL property for a column indicates that only null values may be stored in that column.

Answer: FALSE

30) Microsoft Access forms can only contain data from one table.

Answer: FALSE

30) The ON DELETE CASCADE referential integrity constraint does not apply when rows are deleted using the SQL DELETE command.

Answer: FALSE

32) Microsoft Access can run QBE queries, but not SQL queries.

Answer: FALSE

34) Microsoft Access SQL supports and will correctly implement the numeric data type with (m,n) notation.

Answer: FALSE

4) An advantage of keeping data in lists is that if you add a new row of data to the list, you will never have null values occurring for any data item in the row

Answer: FALSE

5) A transaction in which all steps must be completed successfully or none of them will be completed is called a durable transaction.

Answer: FALSE

5) For a column to be defined as the primary key using table constraints, the column must have been given the property NULL.

Answer: FALSE

5) In the relational model, each row of a table contains data that represents an attribute of the entity.

Answer: FALSE

6) A key must be unique.

Answer: FALSE

6) A relational database stores data in the form of lists

Answer: FALSE

6) An entity needs to be examined according to normalization criteria before creating a table from it in the relational database design.

Answer: FALSE

6) System requirements as documented by use cases, business rules, forms, reports, and queries are sufficient to design the database without using a formal data model.

Answer: FALSE

7) A dirty read is a problem with concurrent processing when a transaction rereads data it has already read and finds modifications or deletions caused by another transaction.

Answer: FALSE

7) Unified Modeling Language (UML) has quickly replaced the E-R Model as the most popular technique for creating data models.

Answer: FALSE

7) Usually, a database table containing both rows and columns is designed to store data for exactly two themes

Answer: FALSE

7) When creating a table in the relational database design from an entity in the extended E-R model, the attributes of the entity become the rows of the table.

Answer: FALSE

8) By default, the identifier of the entity becomes the foreign key of the corresponding table.

Answer: FALSE

8) Candidate keys may or may not be unique.

Answer: FALSE

8) The PRODUCT entity instance is the collection of all PRODUCT entity classes.

Answer: FALSE

9) Lock granularity refers to whether a lock is placed by the DBMS automatically or is placed by a command from the application program.

Answer: FALSE

65) For a(n) ________ weak entity, it is necessary to add the key of the parent entity to the weak entity's relation so that this added attribute becomes part of the weak entity's key.

Answer: ID-dependent

61) ________ can be used to build prototype databases.

Answer: Microsoft Access 2013

68) As far as Microsoft Access is concerned, there are no ________.

Answer: N:M relationships

69) The SQL keyword(s) ________ mean(s) that a value must be supplied before a new row can be created.

Answer: NOT NULL

71) An SQL data type of ________ means that values consist of seven decimal numbers with two numbers assumed to the right of the decimal point.

Answer: Numeric(7,2)

76) Using SQL commands, multiple tables can be queried so that all the values from one table appear in the results, regardless of whether they have one or more corresponding values in the other table, by using the SQL ________ command.

Answer: OUTER JOIN

82) In Microsoft Access, the default method of creating and running a query is ________.

Answer: Query By Example (QBE)

57) ________ constraints are rules that the DBMS enforces to ensure that data values in one table have corresponding values in another related table

Answer: Referential integrity

73) In Microsoft Access, the Relationships window is accessed by using the ________ button on the Database tools command tab.

Answer: Relationship

72) In Microsoft Access, relationships between tables are built in the ________.

Answer: Relationships window.

73) One way to specify all of the columns of a table is to use the special character * after the SQL keyword ________.

Answer: SELECT

81) Microsoft Access SQL commands are run in the ________ of a Query window.

Answer: SQL View

83) In Microsoft Access, tables are added to a QBE Query window by selecting the tables from the ________ dialog box.

Answer: Show Table

54) In relational databases, query requests use a language called ________

Answer: Structured Query Language (SQL)

66) SQL stands for ________.

Answer: Structured Query Language Diff: 1 Page Ref: 119

1) SQL is a data sublanguage, not a complete programming language.

Answer: TRUE

1) The purpose of a database is to help people keep track of things

Answer: TRUE

10) A surrogate key is appropriate when the primary key of a table contains a lengthy text field.

Answer: TRUE

10) Relational database tables are commonly combined, queried, and processed using Structured Query Language (SQL)

Answer: TRUE

10) To represent a relationship in the relational model, the primary key of one relation is placed into a second relation.

Answer: TRUE

10) Two-phase locking can be used to ensure that transactions are serializable.

Answer: TRUE

11) One of the important properties of an attribute is whether or not it is required.

Answer: TRUE

11) The E-R Model assumes that all instances of a given entity class have the same attributes.

Answer: TRUE

12) An entity identifier can be either unique or nonunique.

Answer: TRUE

12) One advantage of optimistic locking is that the lock is obtained only after the transaction is processed.

Answer: TRUE

12) Surrogate key values have no meaning to the users.

Answer: TRUE

13) A relational database can be defined as a self-describing collection of related tables

Answer: TRUE

13) In SQL, multiple conditions in the WHERE clause can be combined by using the SQL AND keyword.

Answer: TRUE

14) Generally, the more restrictive the transaction isolation level, the less the throughput of database processing.

Answer: TRUE

14) It is possible for an entity to have a relationship to itself.

Answer: TRUE

15) In SQL, the NOT keyword can be combined with the IN keyword to form the NOT IN condition for selecting values.

Answer: TRUE

15) In certain circumstances, there may be a preference as to which table in a 1:1 relationship contains the foreign key.

Answer: TRUE

15) Null values can cause problems because they are ambiguous.

Answer: TRUE

16) If the condition exists such that knowing the value of attribute X determines the value of attribute Y, then attribute Y is functionally dependent on attribute X.

Answer: TRUE

16) In terms of database security, a user can be assigned many roles, and a role can be assigned to many users.

Answer: TRUE

17) Given the functional dependency for the attributes of ENTITY1, X → (A, B, C), X is a candidate key for the relation ENTITY1 (A, B, C, X).

Answer: TRUE

17) In SQL, the LIKE keyword can be combined with the NOT keyword to form the NOT LIKE condition for selecting values.

Answer: TRUE

17) The DBMS is used to create the database itself

Answer: TRUE

17) To represent a 1:N relationship in the relational model, the key of the entity on the one side of the relationship is placed as a foreign key in the entity on the many side of the relationship.

Answer: TRUE

18) In SQL, the IS NULL keyword can be used to select on records containing NULL values in a particular column.

Answer: TRUE

18) In comparison to reprocessing, rollforward does not involve the application programs.

Answer: TRUE

18) In crow's foot E-R notation, a circle indicates a minimum cardinality of zero.

Answer: TRUE

19) In crow's foot E-R notation, the hash mark indicates both a minimum cardinality of one and a maximum cardinality of one.

Answer: TRUE

19) In the relational model, many-to-many relationships cannot be directly represented by relations the way 1:1 and 1:N relationships can.

Answer: TRUE

19) To create a well-formed relation through normalization, every determinant must be a candidate key.

Answer: TRUE

2) A possible problem with keeping data in lists is that if you delete a row of data from a list, you may also delete some data items that you want to keep

Answer: TRUE

2) When developing a database system, the database is constructed during the implementation phase.

Answer: TRUE

20) The DBMS receives data update requests from the application program

Answer: TRUE

20) The SUM built-in function in SQL is used to total the values in a numeric column.

Answer: TRUE

20) To represent a M:N relationship in the relational model, an intersection relation is created to represent the relationship itself.

Answer: TRUE

20) Transactions should be written to the log before they are applied to the database itself.

Answer: TRUE

21) Microsoft Access 2013 can be used to build a prototype database, which allows users to validate the data model by demonstrating the consequences of data modeling decisions.

Answer: TRUE

21) The key for an intersection relation is always the combination of the keys of the parent entities.

Answer: TRUE

22) In the general division of labor between database applications and the DBMS, the application program determines which tables need to be modified

Answer: TRUE

22) Microsoft Access 2013 databases can be secured using trusted locations for database storage.

Answer: TRUE

22) Microsoft Access 2013 wizards allow easy mock-ups of forms and reports for prototyping.

Answer: TRUE

22) Standard SQL does not allow built-in functions to be used in a WHERE clause.

Answer: TRUE

23) In the general division of labor between database applications and the DBMS, the application program formats the results of a query into a report

Answer: TRUE

23) In the normalization process, it is necessary to identify all the determinants in a relation.

Answer: TRUE

23) Recursive relationships can be represented in the relational model using the same techniques that are used for binary relationships.

Answer: TRUE

23) The SQL GROUP BY keyword can be used to group rows by common values.

Answer: TRUE

24) Microsoft Access 2013 database files can be easily copied to create multiple copies of a database.

Answer: TRUE

24) Microsoft Access 2013 databases can be secured by deploying databases packaged with digital signatures.

Answer: TRUE

25) As far as Microsoft Access is concerned, there are no N:M relationships.

Answer: TRUE

25) In the normalization process, if you find that every determinant in a relation is a candidate key, then you have determined that the relation is well formed.

Answer: TRUE

25) Microsoft Access 2013 uses banded form and report editors.

Answer: TRUE

26) A subquery is appropriate only if the final result contains only data from a single table.

Answer: TRUE

26) Microsoft Access 2013 is a personal database that combines a DBMS with an application generator

Answer: TRUE

27) In Microsoft Access, relationships between tables are created in the Relationships window.

Answer: TRUE

27) The Microsoft Access 2013 application generator provides the ability to create and store forms, reports, and queries

Answer: TRUE

27) The basic idea of a join is to combine the contents of two or more relations into a new relation.

Answer: TRUE

28) Microsoft Access 2013 databases are stored using the file extension accdb.

Answer: TRUE

28) To create a 1:1 relationship in Microsoft Access, the Indexed property of the foreign key column must be set to Yes (No Duplicates).

Answer: TRUE

28) Using standard SQL, unmatched rows will not appear in the result of a join.

Answer: TRUE

3) Every relation is a table, but not every table is a relation.

Answer: TRUE

3) The purpose of concurrency control is to ensure that one user's work does not inappropriately influence another user's work.

Answer: TRUE

30) Microsoft Access 2013 uses the AutoNumber data type to create surrogate keys

Answer: TRUE

31) Microsoft Access SQL commands are run within the SQL View of a Query window.

Answer: TRUE

33) To open a new Microsoft Access Query window, click the Query Design button on the Create command tab.

Answer: TRUE

35) In Microsoft Access, default values must be set as a field property while the table is in Design View.

Answer: TRUE

4) A use case is a description of the way a user will employ the features and functions of the new system.

Answer: TRUE

4) All actions in an atomic transaction are completed successfully or none of the actions are completed at all.

Answer: TRUE

4) Every cell in a relation can hold only a single value.

Answer: TRUE

4) The key of the parent entity becomes part of the key of an ID-dependent entity.

Answer: TRUE

4) When using SQL to create a table, specifying a data type of Char(10) indicates a fixed length field of 10 characters.

Answer: TRUE

5) From a pragmatic standpoint, the only important rule of normalization is that the determinant of every functional dependency must be a candidate key.

Answer: TRUE

5) Use cases can be used to validate the data model, design, and implementation.

Answer: TRUE

6) Concurrent processing of a database only poses problems when two or more processes attempt to use the same data.

Answer: TRUE

6) If you need to create a primary key that is a composite key using SQL, the key may be defined when the table is created using the CREATE TABLE statement.

Answer: TRUE

7) Referential integrity constraints can be created using the ON DELETE phrase when the table is created using the CREATE TABLE statement.

Answer: TRUE

7) To be considered a composite key, a key must contain at least two attributes.

Answer: TRUE

8) By separating data into tables containing data on only one theme each, making changes to the data is simplified

Answer: TRUE

8) One way to prevent concurrent processing problems is to lock data that are retrieved for update.

Answer: TRUE

8) Referential integrity constraints using the ON DELETE NO ACTION phrase may be explicitly stated when the table is created using the CREATE TABLE statement.

Answer: TRUE

9) Data is added to a table using the SQL INSERT command.

Answer: TRUE

9) The ideal primary key is short, numeric, and fixed.

Answer: TRUE

9) The primary key is used both to identify unique rows in a relation and to represent rows in relationships.

Answer: TRUE

21) The first step of the normalization process is to identify all the candidate keys of a relation.

Answer: TRUE Diff: 1 Page Ref: 79

78) The values of existing data can be modified using the SQL ________ command, which can be used to change several column values at once.

Answer: UPDATE...SET

53) ________ are descriptions of the ways users will employ the features and functions of the new information system.

Answer: Use cases

70) An SQL data type of ________ would indicate a variable-length character string with maximum length 75.

Answer: VarChar(75)

74) Conditions in an SQL INSERT command and after the SQL ________ keyword require single quotes around values for Char and VarChar columns, but not around values for Integer and Numeric columns.

Answer: WHERE

54) Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the database in case of failure and to recover it as quickly and accurately as possible when necessary.

Answer: backup

55) Relationships with the degree 2 are often called ________ relationships.

Answer: binary

63) The unique keys that are not chosen to be the primary key are called ________ keys.

Answer: candidate

63) To normalize a relation, the determinant of every functional dependency should be a(n) ________.

Answer: candidate key

54) Identifiers of an entity that are composed of two or more attributes are called ________ identifiers.

Answer: composite

62) A key that contains two or more attributes is called a(n) ________ key.

Answer: composite

60) Breaking hardware, power outages, and human mistakes are all reasons that ________.

Answer: computers fail

52) One of the major tasks of the database administration is called ________ control, which allows multiple users to access the database simultaneously.

Answer: concurrency

58) The DBMS controls ________ by ensuring that one user's work does not inappropriately interfere with another user's work

Answer: concurrency

51) The ________ is a representation of the content, relationships, and constraints of the data needed to support the system requirements.

Answer: data model

67) SQL is not a complete programming language, but is rather a(n) ________.

Answer: data sublanguage

59) A(n) ________ is a set of one or more computer programs that serves as an intermediary between the user and the DBMS

Answer: database application

62) There are cases where it is possible to normalize a table too far, in which case there may be a need for ________.

Answer: denormalization

69) To be a well-formed relation, every ________ in the relation must be a candidate key.

Answer: determinant

63) Microsoft Access 2013 can secure databases by deploying databases packaged with a(n) ________.

Answer: digital signature

60) The first step of database design is to define a table for each ________.

Answer: entity

64) When the primary key of one relation is placed in a second relation to represent a relationship, the attribute in the second relation is called a(n) ________ key.

Answer: foreign

62) The Microsoft Access application generator adds the ability to create and store ________, ________, and ________

Answer: forms; reports; queries

67) The relationship between two attributes that denotes that if the value of the first attribute is known, then the value of the second attribute can be determined, is called a(n) ________.

Answer: functional dependency

55) Serializable transactions are created by having a(n) ________ phase, in which locks are obtained, and a(n) ________ phase, in which locks are released.

Answer: growing

64) To represent a many-to-many relationship in the relational model, a(n) ________ table is used.

Answer: intersection

56) Standard SQL defines four ________, which specify which of the concurrency control problems are allowed to occur.

Answer: isolation levels

59) Recursive relationships occur when an entity has a relationship with ________.

Answer: itself

75) Using SQL commands, multiple tables can be queried using either subqueries or ________.

Answer: joins

51) The purpose of a database is to help people ________

Answer: keep track of things

61) A(n) ________ is one or more columns of a relation that is used to identify a row.

Answer: key

57) Transaction results are kept in a(n) ________, which contains records of the data changes in chronological order.

Answer: log

85) Table and relationship properties not supported by Microsoft Access SQL can usually be set ________ in the appropriate window or dialog box.

Answer: manually

64) Microsoft Access 2013 can be used to prototype databases for ________.

Answer: many DBMS products

55) Data that the database keeps about its own structure is called ________

Answer: metadata

71) Although Microsoft Access is a personal database, the database tables in Access are still subject to ________ if they are not well-formed.

Answer: modification problems

61) Once a table has been defined, it should be examined according to ________ criteria.

Answer: normalization

53) It is almost always best to design a table in a database so that it contains data on ________ theme

Answer: one

62) Microsoft Access 2013 can secure databases by using ________ to encrypt and decrypt the database files.

Answer: passwords

61) Microsoft Access is a(n) ________, which combines a DBMS and an application generator

Answer: personal database

68) The key that has been designated the ________ key of a relation functionally determines all the other attributes in the relation.

Answer: primary

74) To create a relationship in Microsoft Access, we drag and drop the ________ of a table.

Answer: primary key

52) A(n) ________ is a working demonstration of selected portions of the future system.

Answer: prototype

58) In crow's foot style E-R diagrams, an entity class is represented by a(n) ________.

Answer: rectangle

56) When an entity class has a relationship with itself, it is called a(n) ________ relationship.

Answer: recursive

66) A(n) ________ is a relationship among entities of the same class.

Answer: recursive relationship

65) A rule that requires every value in a foreign key to match values in the corresponding primary key is called a(n) ________ constraint.

Answer: referential integrity

70) Any table that meets the requirements of a(n) ________ is in first normal form.

Answer: relation

59) The recovery method in which we undo the changes that erroneous or partially processed transactions have made in the database is called ________ recovery.

Answer: rollback

58) The recovery method where the database is restored using the saved data, and all transactions since the save are reapplied is called ________ recovery.

Answer: rollforward

53) Database administrators must make sure that ________ measures are in place and enforced so that only authorized users can take authorized actions at appropriate times.

Answer: security

66) A(n) ________ is a unique, numeric value that is appended to the relation to serve as the primary key.

Answer: surrogate key

52) A relational database stores data in the form of ________

Answer: tables

68) SQL was developed by ________ in the late 1970s.

Answer: the IBM Corporation

61) Microsoft Access 2013 can secure database files by storing them in a(n) ________.

Answer: trusted location

57) An entity that must logically depend on another entity is called a(n) ________ entity.

Answer: weak

62) Microsoft Access 2013 ________ allow easy mock-ups of forms and reports for prototyping.

Answer: wizards

31) Which of the following is not a type of trigger that can be invoked before DBMS insert, update, or delete actions? A) BEFORE triggers B) PREVIOUS triggers C) AFTER triggers D) INSTEAD OF triggers E) None of the above

B

35) A Business Intelligence (BI) reporting system that uses extensions to SQL is: A) cluster analysis. B) OLAP. C) regression analysis. D) RFM analysis. E) All of the above

B

35) ODBC stands for: A) Open Database Compatibility. B) Open Database Connectivity. C) Open-source Database Compatibility. D) Open-source Database Connectivity. E) None of the above

B

40) We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example of: A) dirty data. B) inconsistent data. C) non-integrated data. D) a "wrong format" problem. E) a "too much data" problem.

B

43) Data warehouses use a(n): A) operational database. B) dimensional database. C) structured storage. D) Either A or B E) All of the above

B

44) Slowly changing dimensions are handled by a(n): A) operational database. B) dimensional database. C) structured storage. D) Either A or B E) All of the above

B

44) The first PHP element to be created is the: A) Command object. B) Connection. C) Errors collection. D) Parameters collection. E) RecordSet object.

B

45) After trying to open a connection, a PHP connection to a DBMS needs to: A) open the connection. B) test the connection. C) query the database. D) process the query results. E) close the connection.

B

47) Snowflake schemas have normalized: A) fact tables. B) dimension tables. C) map tables. D) reduce tables. E) None of the above

B

50) When distributed databases break the database into sections and store the sections on different servers, this is known as: A) replication. B) partitioning. C) disbursing. D) distributed two-phase locking. E) None of the above

B

53) When using an ODBC data source with IIS and Microsoft Access, we should use: A) a file data source. B) a system data source. C) a user data source. D) a LAMP data source. E) a WAMP data source.

B

A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view. D) is used to combine indexing operations.

B

All of the following are guidelines for better query design EXCEPT: A) understand how indexes are used in query processing. B) use a lot of self-joins. C) write simple queries. D) retrieve on the data that you need.

B

All of the following are new data types added in SQL:200n EXCEPT: A) BIGINT. B) BIT. C) MULTISET. D) XML.

B

Explicit commands to manage transactions are needed when: A) a transaction consists of just one SQL command. B) multiple SQL commands must be run as part of a transaction. C) autocommit is set to off. D) none of the above

B

One major advantage of the outer join is that: A) information is easily accessible. B) information is not lost. C) the query is easier to write. D) all of the above.

B

Web services: A) are a set of services available to all on the Web. B) are a set of emerging standards for protocols for automatic communication between software over the Web. C) are a set of standards based upon HTML. D) none of the above.

B

What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A) Changes the price of a unit called Product_T to 7 B) Changes the unit price of Product 7 to 775 C) Changes the length of the Unit_Price field to 775 D) Updates the Product_T table to have a unit price of 775

B

What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no; A) A listing of all drivers who made deliveries to state = 'MA', sorted by driver number B) A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state C) A count of all of the deliveries made to state = 'MA' by all drivers D) None of the above

B

Which of the following is a technique for optimizing the internal performance of the relational data model? A) Avoiding indexes on secondary keys B) Clustering data C) Not reporting statistics to save machine resources D) Using random index organizations

B

Which of the following is not a disadvantage of stored procedures? A) Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B) Decreases in network traffic are realized. C) Stored procedures are proprietary and not easy to move from one RDBMS to another. D) Each client must be loaded with the application to be used at that location.

B

Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A) How many products are in the table Product_T? B) How many products have product descriptions in the Product Table? C) How many characters are in the field name "Product_Description"? D) How many different columns named "Product_Description" are there in table Product_T?

B

Which of the following will produce the minimum of all standard prices? A) Select standard_price from Product_V where Standard_Price = min; B) Select min(standard_price) from Product_V; C) Select Standard_Price from min(Product_V); D) Select min(Standard_Price) from Product_V where Standard_Price = min(Standard_Price);

B

________ is a language used to transform complex XML documents and also to create HTML pages from XML documents. A) HTML B) XSLT C) SGI D) WSL

B

________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A) User interface enhancers B) Middleware C) Interface managers D) MPP

B

61) The term for the enormous datasets generated by Web 2.0 applications is ________.

Big Data

62) A(n) ________ is an information system that helps users analyze and use data.

Business Intelligence (BI) system

) In which of the following situations would one have to use an outer join in order to obtain the desired results? A) A report is desired that lists all customers who placed an order. B) A report is desired that lists all customers and the total of their orders. C) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). D) There is never a situation that requires only an outer join.

C

33) Which of the following is true about stored procedures? A) Stored procedures cannot be passed parameters like a regular application function. B) Stored procedures are stored as an embedded function in the application program. C) Stored procedures are stored in the database. D) Stored procedures are invoked automatically by the DBMS when specific events occur. E) All of the above are true about stored procedures.

C

36) If the computer hosting the Web server is running a Windows operating system, the Web server is probably: A) Apache. B) Tomcat. C) Internet Information Services (IIS). D) Internet Interpreter Server (IIS). E) Information Interpreter Server (IIS).

C

38) According to the ODBC standard, which of the following is not part of the specification of a data source? A) The associated DBMS B) The database C) The driver D) The operating system E) The network platform

C

41) A data warehouse database differs from an operational database because: A) data warehouse data are not stored in tables. B) data warehouse databases do not have metadata. C) data warehouse data are often stored in a dimensional database. D) Both B and C E) All of the above

C

42) Which of the following is a task performed by the driver according to the ODBC standard? A) Determines the appropriate DBMS B) Validates the format of the ODBC command received from the application C) Converts data source error codes into ODBC standard error codes D) Verifies the application to the data source E) Converts the data source into an SQL-compliant data structure

C

46) To get data after opening a connection, a PHP program needs to: A) open the connection. B) test the connection. C) query the database. D) process the query results. E) close the connection.

C

A PC configured to handle user interface with little or no local storage is called a: A) server. B) fat client. C) thin client. D) workstation.

C

A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): A) natural join. B) equi-join. C) outer join. D) union join.

C

A named set of SQL statements that are considered when a data modification occurs are called: A) stored procedures. B) treatments. C) triggers. D) trapdoors.

C

A technical specification for creating a distributed registry of Web services and businesses that are open to communicating through Web services is called: A) HTML. B) B2B. C) UDDI. D) XML.

C

All of the following are part of the coding structure for triggers EXCEPT: A) event. B) condition. C) selection. D) action.

C

An emerging trend likely to have an effect on the development of three-tier applications is called: A) corporate computing. B) local area networks. C) cloud computing. D) wide-area storage.

C

An interactive command that can be used to dynamically control a user session for appropriate integrity measures is: A) rollback. B) rollforward. C) set autocommit. D) expunge.

C

EXISTS will take a value of ________ if the subquery returns an intermediate results table which contains one or more rows. A) FALSE B) 1 C) TRUE D) undefined

C

Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: A) using the if-then-else construct. B) using the immediate if statement. C) using the CASE keyword in a statement. D) using a subquery.

C

In an SQL statement, which of the following parts states the conditions for row selection? A) Select B) From C) Where D) Group By

C

Indexes are created in most RDBMSs to: A) provide a quicker way to store data. B) decrease the amount of disk space utilized. C) provide rapid random and sequential access to base-table data. D) increase the cost of implementation

C

RANK and DENSE-RANK are examples of: A) ceilings. B) door functions. C) window functions. D) moving functions.

C

SQL provides the ________ technique, which involves placing an inner query within the WHERE or HAVING clause of an outer query. A) grouping B) joining C) subquery D) union

C

SQL-invoked routines can be: A) procedures. B) functions. C) all of the above. D) none of the above.

C

The SQL command ________ defines a logical table from one or more tables or views. A) create table B) alter table C) create view D) create relationship

C

The XML shown in the figure below describes some data from the Pine Valley Furniture case study. (INSERT PHOTO HERE) The following XPath expression returns for results: /furniturecompany/product/[finish = "Cherry"]/standardprice A) all products with a cherry finish. B) a description of all products with a cherry finish. C) the standard price of products with a cherry finish. D) nothing.

C

The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers. A) memory B) files C) application logic components D) query logic components

C

The command for creating a database is: A) create table. B) create view. C) create schema. D) create authorization.

C

The promise of Web services is the development of a standardized communication system using: A) HTML. B) XST. C) XML. D) XPath.

C

What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 Varchars B) Alters the Customer_T table to be a Type 2 Varchar C) Alters the Customer_T table, and adds a field called "Type" D) Alters the Customer_T table by adding a 2-byte field called "Varchar"

C

What result set will the following query return? Select Item_No, description from item where weight > 100 and weight < 200; A) The Item_No and description for all items weighing less than 100 B) The Item_No for all items weighing between 101 and 199 C) The Item_No and description for all items weighing between 101 and 199 D) The Item_No for all items weighing more than 200

C

What will result from the following SQL Select statement? Select min(Product_Description) from Product_V; A) The minimum value of Product_Description will be displayed. B) An error message will be generated. C) The first product description alphabetically in Product_V will be shown. D) None of the above

C

When an XML document is shredded, each element is: A) thrown away. B) split up. C) stored in a relational table. D) added to other XML documents.

C

Which of the following finds all groups meeting stated conditions? A) Select B) Where C) Having D) Find

C

Which of the following is true about three-tier architectures? A) Less scalable than two-tier B) Increased risk C) More technological flexibility D) All of the above

C

Which of the following is true of the order in which SQL statements are evaluated? A) The SELECT clause is always processed first. B) The SELECT clause is always processed last. C) The SELECT clause is processed before the ORDER BY clause. D) The GROUP BY clause is processed before the WHERE clause

C

________ differs from array because it can contain duplicates. A) BIGINT B) XML C) MULTISET D) TABLE

C

________ is a method to store XML documents by storing each element independently in a relational table. A) Writing B) Sledding C) Shredding D) Shedding

C

________ is a set of commands used to control a database, which includes security. A) DML B) DDL C) DCL D) DPL

C

________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. A) IN B) HAVING C) EXISTS D) EXTENTS

C

31) Business Intelligence (BI) systems do which of the following? A) Analyze current and past activities B) Predict future events C) Record and process transactions D) Both A and B E) All of the above

D

34) Business Intelligence (BI) reporting systems can do which of the following operations? A) Filter data B) Group data C) Modify data D) Both A and B E) All of the above

D

34) Every DBMS product has an API, which stands for: A) All Program Interpreter. B) All Program Interface. C) Application Programming Interpreter. D) Application Programming Interface. E) None of the above

D

43) In PHP, any programming language statements that are to be processed on the server must be enclosed in: A) <!-- and --!>. B) [php and php]. C) (php and php). D) <?php and ?>. E) <server> and </server>.

D

49) XML stands for: A) Experimental Markup Language. B) Existential Markup Language. C) Extendable Markup Language. D) Extensible Markup Language. E) Extensible Marketing Language.

D

54) In the MapReduce process, the first step is the ________ step. A) column B) super column C) column family D) map E) reduce

D

56) To create an OLAP report for an Access 2013 database, we can build a PivotTable in: A) Microsoft Access 2013. B) Microsoft Word 2013. C) Microsoft Visio 2013. D) Microsoft Excel 2013. E) Microsoft PowerPoint 2013.

D

58) To use Access 2013 data in an Excel 2013 PivotTable, we use the: A) "To Excel" command on the Access Data command tab. B) "To Excel" command on the Excel Data command tab. C) "From Access" command on the Access Data command tab. D) "From Access" command on the Excel Data command tab. E) "Get Data" command on the Excel Data command tab.

D

A client PC that is responsible for processing presentation logic, extensive application and business rules logic as well as many DBMS functions is called a(n): A) file server. B) file processor. C) database server. D) fat client.

D

A join in which the joining condition is based on equality between values in the common columns is called a(n): A) equi-join. B) unilateral join. C) natural join. D) both A and C.

D

A module of code that may be written in a proprietary language such as Oracle's PL/SQL that implements business rules on a database server is called a: A) persistent module. B) function. C) application component. D) stored procedure.

D

A new set of analytical functions added in SQL:2008 is referred to as: A) OLAF functions. B) MOLAP functions. C) average functions. D) OLAP functions.

D

A procedure is: A) stored within the database. B) given a unique name. C) called by name. D) all of the above.

D

A view may not be updated directly if it contains: A) the DISTINCT keyword. B) derived columns and expressions in the SELECT clause. C) uses the GROUP BY or HAVING clause. D) all of the above.

D

A(n) ________ is a module of code written in SQL or some proprietary language to run business rules on a server. A) SQL program B) select module C) select procedure D) stored procedure

D

All of the following are advantages of SQL-invoked routines EXCEPT: A) flexibility. B) efficiency. C) sharability. D) security.

D

An operation to join a table to itself is called a: A) sufficient-join. B) inner join. C) outer join. D) self-join.

D

If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? A) dba_tab_privs B) dba_tab_comments C) dba_table_label D) dba_tables

D

SOAP stands for: A) what you wash your hands with. B) Simple ODBC Access Protocol. C) Strategic Operational Advanced Planning. D) Simple Object Access Protocol Method.

D

The ________ clause is used to combine the output from multiple queries into a single result table. A) INTERSECT B) DIVIDE C) COLLATE D) UNION

D

The benefits of a standardized relational language include: A) application longevity. B) reduced training costs. C) cross-system communication. D) all of the above.

D

The most commonly used form of join operation is the: A) outer join. B) union join. C) equi-join. D) natural join.

D

The phrase ________ refers to a model for providing ubiquitous, convenient and on-demand network access. A) software services B) grid computing C) network computing D) cloud computing

D

User-defined data types: A) can be a subclass of a standard type. B) can behave as an object. C) can have defined functions and methods. D) can have all of the above.

D

What result set will the following query return? Select Item_No from Order_V where quantity > 10; A) The Item_No of all orders that had more than 10 items B) The Order_Id of all orders that had more than one item C) The Order_Id of all orders that had more than 10 items D) The Item_No of all orders that had 10 or more items

D

Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A) GUI evolutions B) Networking advances C) Communication changes D) All of the above

D

Which of the following is NOT a method for storing XML documents? A) Shredding B) Use a BLOB or CLOB to store the entire XML file C) Use an XML native database D) Convert to text

D

Which of the following is a component of processing logic? A) Input B) Output C) Retrieval D) Business rules

D

Which of the following is a purpose of the SQL standard? A) To specify syntax and semantics of SQL data definition and manipulation B) To specify minimal and complete standards, which permit different degrees of adoption in products C) To define the data structures and basic operations for SQL databases D) All of the above

D

Which of the following is an advantage of stored procedures? A) Data integrity improves when fewer applications access the procedure. B) The layers get cleaner. C) Stored procedures result in fatter clients. D) Performance improves for compiled SQL statements.

D

33) Business Intelligence (BI) systems obtain their data by which of the following means? A) Read and process data from an operational database B) Process extracts from operational databases C) Process data purchased from data vendors D) Both A and B E) All of the above

E

42) A data mart differs from a data warehouse in that: A) it has a smaller database. B) it deals with a particular component or functional area of the business. C) data mart users do not have the data management expertise of data warehouse employees. D) Both A and B E) All of the above

E

48) The final step of using a PHP connection to a DBMS is to: A) open the connection. B) test the connection. C) query the database. D) process the query results. E) close the connection.

E

52) Non-relational DBMSs associated with the NoSQL movement include: A) Key-Value. B) Document. C) Column Family. D) Graph. E) All of the above

E

2) A BEFORE trigger is called by the DBMS before reading data.

FALSE

20) A common default Web page name recognized by most Web servers is FirstPage.html.

FALSE

22) In XML, a document author can only use the predefined XML tags.

FALSE

23) XML provides a standardized, non-customizable way to describe the content of a document.

FALSE

24) Column family databases are indistinguishable from relational database tables.

FALSE

25) In the MapReduce process, the Reduce step is followed by the Map step.

FALSE

25) XML Web Services is a means for protecting and hiding elements of program functionality that otherwise would be available for misuse over the Web.

FALSE

6) Every DBMS product uses the same API.

FALSE

A single value returned from an SQL query that includes an aggregate function is called a vector aggregate.

False

Customer-oriented architectures are a collection of services that communicate with each other in some manner.

False

DBA_USERS contains comments on all tables in an Oracle database.

False

DCL is used to update the database with new records.

False

Infrastructure-as-a-Service refers to the use of technologies such as servers, storage and networks from external service providers.

False

It is better not to have a result set identified before writing GROUP BY and HAVING clauses for a query.

False

Java programs similar to applets that execute on the server are called hamlets.

False

Lack of secure standards and lack of user acceptance are the major issues that must be resolved with Web services.

False

Persistent Sorted Modules are extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions.

False

SOAP is an insignificant Web standard.

False

Specifying the attribute names in the SELECT statement will make it easier to find errors in queries and also correct for problems that may occur in the base system.

False

Stripping an XML document means storing each element of an XML schema in a relational table and using other tables to store the elements.

False

The ORDER BY clause is the first statement processed in an SQL command.

False

The comparison operators = and != are used to establish a range of values.

False

The following command would work fine: insert into budget values 121,222,111;

False

The following query totals sales in state= 'MA' for each salesperson. Select salesperson_id, sum(sales) from salesperson group by salesperson_id having state = 'MA';

False

The following query will execute without errors. select customer.customer_name, salesman.sales_quota from customer where customer.salesman_id = (select salesman_id where lname = 'SMITH');

False

The process of assigning parts of an application to a client or server is called application partitioning.

False

Transaction integrity commands are not used to identify whole units of database changes that must be completed in full for the database to retain integrity.

False

Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, replicate tables, but cannot call other triggers.

False

Two-tier architectures are much more scalable than three-tier architectures.

False

XQuery is an HTML transformation language used to query HTML pages.

False

68) When using Microsoft Access and IIS, the connection to the Access database must be provided by using a(n) ________.

ODBC data source

1) A trigger is an event stored in a database that is invoked by the DBMS when specified events occur.

TRUE

1) Big Data is the name given to the enormous datasets generated by Web 2.0 applications.

TRUE

10) Problematic data include so-called "dirty data."

TRUE

11) A data warehouse is a database system that has data and programs for, as well as personnel specialized in, BI processing.

TRUE

11) ODBC is an industry standard interface between programming code and DBMS APIs.

TRUE

12) Data warehouses are populated with data prepared by Extract, Transform, and Load (ETL) systems.

TRUE

13) A data mart is a collection of data that addresses a particular component or functional area of a business.

TRUE

18) Basic Web pages are created using Hypertext Markup Language (HTML).

TRUE

2) Business Intelligence (BI) systems are information systems that help users analyze and use data.

TRUE

21) The term drill down refers to the capability of seeing the data in smaller and smaller units.

TRUE

22) NoSQL really stands for "Not only SQL."

TRUE

23) Apache Cassandra is an example of a column family database.

TRUE

26) When using Microsoft Access and IIS, the basic Web home page can be named index.html.

TRUE

27) When creating an OLAP report based on Access 2013 data, it is often a good idea to create a view equivalent query to organize the data needed for the OLAP report.

TRUE

28) Excel 2013 allows us to connect directly to an Access 2013 database when building a PivotTable.

TRUE

29) When using Microsoft Access and IIS, the ODBC data source should be a system data source.

TRUE

4) Business Intelligence (BI) systems obtain data in three different ways.

TRUE

5) Business Intelligence (BI) reporting systems are used to filter data, sort data, group data and make simple calculations based on the data.

TRUE

5) Every DBMS product has an application programming interface (API).

TRUE

6) Business Intelligence (BI) reporting systems can analyze data using standard SQL.

TRUE

7) ODBC stands for Open Database Connectivity.

TRUE

) The following two SQL statements will produce the same results. Select last_name, first_name from customer where credit_limit > 99 and credit_limit < 10001; Select last_name, first_name from customer where credit_limit between 100 and 10000;

True

A database table is defined using the data definition language (DDL).

True

A join in which the joining condition is based on equality between values in the common column is called a(n) equi-join.

True

A major benefit of SQL as a standard is reduced training costs

True

A natural join is the same as an equi-join, except that it is performed over matching columns that have been defined with the same name, and one of the duplicate columns is eliminated.

True

Adding the DISTINCT keyword to a query eliminates duplicates.

True

An SQL query that implements an outer join will return rows that do not have matching values in common columns

True

Document Type Declarations (DTDs) are unable to specify data types.

True

Establishing IF-THEN-ELSE logical processing within an SQL statement can now be accomplished by using the CASE keyword in a statement.

True

Expressions are mathematical manipulations of data in a table that may be included as part of the SELECT statement.

True

Extensible Markup Language (XML) is a scripting language based upon SGML that allows the creation of customized tags.

True

Figuring out what attributes you want in your query before you write the query will help with query writing.

True

If multiple Boolean operators are used in an SQL statement, NOT is evaluated first, then AND, then OR.

True

ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.

True

One of the original purposes of the SQL standard was to provide a vehicle for portability of database definition and application modules between conforming DBMSs.

True

Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.

True

Persistent Stored Modules are extensions defined in SQL:1999 that include the capability to add and drop modules of code.

True

RDBMSs store database definition information in system-created tables which can be considered a data dictionary.

True

SQL is both an American and international standard for database access.

True

SQL statements can be included in another language, such as C or Java.

True

SQL:2008 allows one to calculate linear regressions, moving averages and correlations without moving the data outside of the database.

True

Simple Object Access Protocol (SOAP) is an XML-Based communication protocol.

True

Software as a service (SAAS) refers to an entire application or suite of applications running on the cloud.

True

Some DBMS can handle graphic data types as well as text and numbers.

True

Storing XML data is becoming a big question as XML data becomes more prevalent.

True

The ALTER TABLE command is used to change a table definition.

True

The WHERE clause is always processed before the GROUP BY clause when both occur in a SELECT statement.

True

The advantages of SQL-invoked routines are flexibility, efficiency, shareability and applicability.

True

The asterisk (*) wildcard designator can be used to select all fields from a table as well as in WHERE clauses when an exact match is not possible.

True

The content of dynamic views is generated when they are referenced

True

The following SQL statement is an example of a correlated subquery. select first_name, last_name, total_sales from salesman s1 where total_sales > all (select total_sales from salesman s2 where s1.salesman_id != s2.salesman_id);

True

The following queries produce the same results. select customer_name, customer_city from customer, salesman where customer.salesman_id = salesman.salesman_id and salesman.lname = 'SMITH'; select customer_name, customer_city from customer where customer.salesman_id = (select salesman_id from salesman where lname = 'SMITH');

True

The following query totals sales for each salesperson. Select salesperson_id, sum(sales) from salesperson group by salesperson_id;

True

The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.

True

The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.

True

Triggers have three parts: the event, the condition, and the action.

True

Web Services are a set of emerging standards that define protocols for automatic communication between software programs over the Web.

True

Web services allow for communication between programs over the Internet.

True

When EXISTS or NOT EXISTS is used in a subquery, the select list of the subquery will usually just select all columns as a placeholder because it doesn't matter which columns are returned.

True

When a GROUP BY clause is included in an SQL statement, only those columns with a single value for each group can be included.

True

62) According to the ODBC standard, a(n) ________ is a database and its associated DBMS, operating system, and network platform.

data source

68) Data warehouse data is often stored in a(n) ________.

dimensional database

74) To deal with data values that change over time, dimensional databases use a(n) ________.

slowly changing dimension


Kaugnay na mga set ng pag-aaral

Module 42. Major Depressive Disorder And Bipolar Disorder

View Set

Module 6 and 7: Security Assessment and Testing and Security Operations

View Set

Services Marketing QUIZ 1 (ch. 1-3)

View Set

Chapter 12 Liver, Gallbladder, and Pancreatic Diseases and Disorders

View Set

ORDERED-PAIR NUMBERS: RULES OF CORRESPONDENCE

View Set