CIS 2109 Final
________ use the result of the other query to determine the processing of the inner query. A. Correlated subqueries B. Outer subqueries C. Inner subqueries D. Subqueries
A. Correlated subqueries
_____ is a set of commands used to update and query a database. A. DML B. DDL c. DCL D. DPL
A. DML
To get all the customers from Hawaii sorted together, which of the following would be used? A. Order by B. Group by C. Having D. Sort
A. Order by
A correlated subquery is executed once for each iteration through the outer loop. A. True B. False
A. True
A database table is defined using the data definition language (DDL). A. True B. False
A. True
A join in which the joining condition is based on equality between values in the common column is called an equi-join. A. True B. False
A. True
A major benefit of SQL as a standard is reduced training costs. A. True B. False
A. True
A natural join is the same as an equi-join, except that it is performed over matching columns that have been defined with the same name, and one of the duplicate columns is eliminated. A. True B. False
A. True
Adding the DISTINCT keyword to a query eliminates duplicates A. True B. False
A. True
An SQL query that implements an outer join will return rows that do not have matching values in common columns. A. True B. False
A. True
An insert command does not need to have the fields listed. A. True B. False
A. True
In order to update data in SQL, one must inform the DBMS which relation, columns, and rows are involved. A. True B. False
A. True
One of the original purposes of the SQL standard was to provide a vehicle for portability of database definition and application modules between conforming DMBSs. A. True B. False
A. True
SQL is both an American and international standard for database access. A. True B. False
A. True
The asterisk (*) wildcard designation can be used to select all fields from a table as well as in WHERE clauses when an exact match is not possible. A. True B. False
A. True
The content of dynamic views is generated when they are referenced. A. True B. False
A. True
The views are created by executing a CREATE VIEW SQL command A. True B. False
A. True
When a GROUP BY clause in included in an SQL statement, only those columns with a single value for each group can be included A. True B. False
A. True
When creating tables, it's important to decide which columns will allow null values before the table is created. A. True B. False
A. True
the ALTER TABLE command is used to change table definition. A. True B. False
A. True
A person's name, birthday, and social security number are all examples of: A. attributes B. entities C. relationships D. descriptors
A. attributes
Data modeling may be the most important part of the systems development process because: A. data characteristics are important in the design of programs and other systems components B. the data in a system are generally less complex than processes and play a central role in development C. data are less stable than processes D. it is the easiest
A. data characteristics are important in the design of programs and other systems components
A ________ addresses whether an instance of a supertype may simultaneously be a member of two or more subtypes. A. disjointedness constraint B. disjoint rule C. partial specialization D. total specialization
A. disjointedness constraint
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers and join tables to prepare query results is the: A. explain plan B. show optimization C. explain query D. analyze query
A. explain plan
An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A. foreign key B. link attribute C. link key D. foreign attribute
A. foreign key
An attribute that may have more than one meaning is called a(n): A. homonym B. alias C. double defined attribute D. synonym
A. homonym
The entity integrity rule states that: A. no primary key attribute can be null B. referential integrity must be maintained across all entities C. each entity must have a primary key D. a primary key must have only one attribute
A. no primary key attribute can be null
A rule that states that each foreign key value must match a primary key value in the other relation is called the: A. referential integrity constraint B. key match rule C. entity key group rule D. foreign/primary match rule
A. referential integrity constraint
An attribute of an entity that must have a value for each entity instance is a(n): A. required attribute B. optional attribute C. composite attribute D. fuzzy attribute
A. required attribute
Which of the following is a generic entity type that has a relationship with one or more subtypes? A. supertype B. megatype C. subgroup D. class
A. supertype
A business rule is a statement that defines or constrains some aspect of the business. A. true B. false
A. true
A cascading delete removes all records in other tables associated with the record to be deleted. A. true B. false
A. true
A physical scheme contains the specifications for how data from a conceptual schema are stored in a computer's secondary memory. a. true b. false
A. true
A referential integrity constraint is a rule that maintains consistency among the rows of two relations. A. true B. false
A. true
A single occurrence of an entity is called an entity instance. A. true B. false
A. true
A subtype can become a supertype if the subtype has other subtypes beneath it. A. true B. false
A. true
A time stamp is a time value that is associated with a data value. A. true B. false
A. true
A universal data model is a generic or template data model that can be reused as a starting point for a data modeling project. A. true B. false
A. true
A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies. A. true B. false
A. true
All values that appear in a column of a relation must be taken from the same domain. A. true B. false
A. true
An enterprise resource planning system integrates all functions of the enterprise. A. true B. false
A. true
An entity cluster can have a relationship with another entity cluster much the same way that an entity can have a relationship with another entity. A. true B. false
A. true
Data modeling is about documenting rules and policies of an organization that govern data. A. true B. false
A. true
Data structures include data organized in the form of tables with rows and columns. A. true B. false
A. true
In a supertype/subtype hierarchy, attributes are assigned at the highest logical level that is possible in the hierarchy. A. true B. false
A. true
In prototyping, implementation and maintenance activities are repeated as necessary until the product is correct. A. true B. false
A. true
It is desirable that no two attributes across all entity types have the same name. A. true B. false
A. true
Specialization is the reverse of generalization. A. true B. false
A. true
Multiple values returned from an SQL query that includes an aggregate function are called: A. vector aggregates B. scalar aggregates C. agates D. summations.
A. vector aggregates
An entity type whose existence depends on another entity type is called a ________ entity. A. weak B. strong C. codependent D. variant
A. weak
Which of the following is the wildcard operator in SQL statements? A. < > B. * C. = D. &
B. *
What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no; A. A listing of all drivers, sorted by driver number B. A listing of each driver as well as the number of deliveries that he or she has made C. A count of all of the deliveries made by all drivers D. None of these
B. A listing of each driver as well as the number of deliveries that he or she has made
The SQL command _______ adds one or more new columns to a table. A. Create table B. Alter table C. Create view D. Create relationship
B. Alter table
A join operation: A. brings together data from two different fields. B. Causes two tables with a common domain to be combined into a single table or view. C. Causes two disparate tables to be combined into a single table or view. D. is used to combine indexing operations.
B. Causes two tables with a common domain to be combined into a single table or view
Which of the following is a technique for optimizing the internal performance of the relational data model? A. Avoiding indexes on secondary keys B. Clustering data C. not reporting statistics to save machine resources D. Using random index organizations
B. Clustering data
To eliminate duplicate rows in a query, the _______ qualifier is used in the SQL Select command. A. Alter B. Distinct C. Check D. Specific
B. Distinct
Any create command may be reversed by using a _______ command. A. Truncate B. Drop. C. Delete D. Unpack
B. Drop
A single value returned from an SQL query that includes an aggregate function is called a vector aggregate. A. True B. False
B. False
An equi-join is a join in which one of the duplicate columns is eliminated in the result table. A. True B. False
B. False
Count(*) tallies only those rows that contain a value, while Count counts all rows. A. True B. False
B. False
DCL is used to update the database with new records. A. True B. False
B. False
Indexes generally slow down access speed in most RDMS. A. True B. False
B. False
SQL has been implemented only in the mainframe and midrange environments. A. True B. False
B. False
Subqueries can only be used in the WHERE clause. A. True B. False
B. False
The DELETE TABLE DDL command is used to remove a table from the database. A. True B. False
B. False
The DROP command deletes rows from a table individually or in groups. A. True B. False
B. False
The HAVING clause and the WHERE clause perform the same operation A. True B. False
B. False
When creating a table, it is not important to consider foreign key- primary key mates. A. True B. False
B. False
When the SELECT clause in the create view statement contains the keyword DISTINCT, the view can used to update data. A. True B. False
B. False
Which of the following can produce scalar and vector aggregates? A. Order by B. Group by C. Having D. Sort
B. Group by
The first in a series of steps to follow when creating a table is to: A. Identify columns that must be unique B. Identify each attribute and its characteristics C. Create an index D. Identify columns that must be null
B. Identify each attribute and its characteristics
Which of the following will produce the minimum of all standard prices? A. Select Standard_Price from min(Product_V); B. Select min(Standard_Price) from Product_V; C. Select Standard_Price from min(Product_V); D. Select min(Standard_Price) from Product_V where Standard_Price = min(Standard_Price);
B. Select min(standard_price) from Product_V;
Which of the following will product the minimum of all standard prices? A. Select standard_price from Product_V where Standard_Price = min; B. Select min(standard_price) from Product_V; C. Select Standard_Price form min(Product_V); D. Select min(Standard_Price) from Product_V where Standard_Price = min(Standard_price);
B. Select min(standard_price) from Product_V;
A type of join where a table is joined to itself is called a(n): A. unary join B. Self-join C. Unnatural join D. Pinned join
B. Self-join
A type of query that is placed within a WHERE or HAVING clause of another query is called a: A. Master query. B. Subquery. C. Superquery. D. Multi-query.
B. Subquery
Because applications are often developed independently in file processing systems: A. the data is always non-redundant B. Unplanned duplicate data files are the rule rather than the exception. C. Data can always be shared with others. D. There is a large volume of file I/O
B. Unplanned duplicate data files are the rule rather than the exception
Given a table named store with 5 fields: store_id, address, city, state, zipcode, why would the following insert command not work? Insert into store values ('234 Park Street') A. It would work just fine. B. You must specify the fields to insert if you are only inserting some of the fields. C. There is no table keyword. D. none of these.
B. You must specify the fields to insert if you are only inserting some of the fields.
An alternative name for an attribute is called a(n): A. synonym B. alias C. alternate attribute D. related characteristic
B. alias
A ________ specifies the number of instances of one entity that can be associated with each instance of another entity. A. degree B. cardinality constraint C. counter constraint D. limit
B. cardinality constraint
A _______ is a temporary table used in the FROM clause of an SQL query. A. correlated subquery B. derived table C. view table D. none of these
B. derived table
Any create command may be reversed by using a ________ command. A. truncate B. drop C. delete D. unpack
B. drop
The logical representation of an organization's data is called a(n): A. database model B. entity-relationship model C. relationship systems design D. database entity diagram
B. entity-relationship model
A business rule is a statement of how a policy is enforced or conducted. A. true B. false
B. false
A database is maintained and queried using the data mapping language (DML). A. true B. false
B. false
A foreign key is a primary key of a relation that also is a primary key in another relation. A. true B. false
B. false
A member of a subtype does NOT necessarily have to be a member of the supertype. A. true B. false
B. false
A simple attribute can be broken down into smaller pieces. A. true B. false
B. false
A ternary relationship is equivalent to three binary relationships. A. true B. false
B. false
An anomaly is a type of flaw in the database server. A. true B. false
B. false
Generalization is a top-down process. A. true B. false
B. false
The degree of a relationship is the number of attributes that are associated with it. A. true B. false
B. false
Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A. how many products are in the table Product_T? B. how many products have product descriptions in the Product Table? C. how many characters are in the field name "Product_Description"? D. How many different columns named "Product_Description" are there in table Product_T?
B. how many products have product descriptions in the Product Table?
A join that is based on equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): A. equi-join B. natural join C. multivariate join D. inner join
B. natural join
A single value from an SQL query that includes an aggregate function is called a(n): A. agate B. scalar aggregate C. vector aggregate D. summation
B. scalar aggregate
A simultaneous relationship among the instances of three entity types is called a(n) ________ relationship. A. tertiary B. ternary C. primary D. binary
B. ternary
_____ is a set of commands used to control a database, which includes security. A. DML B. DDL C. DCL D. DPL
C. DCL
Which of the following finds all groups meeting stated conditions? A. Select B. Where C. Having D. Find
C. Having
Indexes are created in most RDBMSs to: A. Provide a quicker way to store data. B. Decrease the amount of disk space utilized. C. Provide rapid random and sequential access to base-table data. D. Increase the cost of implementation.
C. Provide rapid random and sequential access to base-table data.
An iterative methodology that rapidly repeats the analysis, design, and implementation phases of the SDLC is called: A. CASE B. CAD C. RAD D. MST
C. RAD
Which of the following is true of the order in which SQL statements are evaluated? A. The SELECT clause is always processed first. B. The SELECT clause is always processed last. C. The SELECT Clause is processed before the ORDER BY clause. D. The GROUP BY clause is processed before the WHERE clause.
C. The SELECT clause is processed before the ORDER BY clause.
In an SQL statement, which of the following parts states the conditions for row selection? A. Select B. From C. Where D. Group By
C. Where
In an SQL statement, which of the following parts states the conditions for row selection? A. Select B. From C. Where D. Group by
C. Where
An entity type name should be all of the following EXCEPT: A. concise B. specific to the organization C. as short as possible D. a singular noun
C. as short as possible
A ________ constraint is a type of constraint that addresses whether an instance of a supertype must also be an instance of at least one subtype. A. disjoint B. overlap C. completeness D. weak
C. completeness
An attribute that can be broken down into smaller parts is called a(n) ________ attribute. A. associative B. simple C. composite D. complex
C. composite
A primary key whose value is unique across all relations is called a(n): A. global primary key B. inter-table primary key C. enterprise key D. foreign global key
C. enterprise key
An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A. link attribute B. link key C. foreign key D. foreign attribute
C. foreign key
A domain definition consists of the following components EXCEPT: A. domain name B. data type C. integrity constraints D. size
C. integrity constraints
All of the following are the main goals of normalization EXCEPT: A. minimize data redundancy B. simplify the enforcement of referential integrity C. maximize storage space D. make it easier to maintain data
C. maximize storage space
A join in which rows that do not have matching values in common columns are still included in the result table called a(n): A. natural join B. equi-join C. outer join D. union join
C. outer join
An attribute (or attributes) that uniquely identifies each row in a relation is called a: A. column B. foreign field C. primary key D. duplicate key
C. primary key
The benefits of a standardized relational language include: A. application longevity B. reduced training costs. C. Cross-system communication D. All of these
D. All of these
which of the following is a purpose of the SQL standard? A. To specify syntax and semantics of SQL data definition and manipulation B. To specify minimal and complete standards, which permit different degrees of adoption in products. C. To define the date structures and basic operations for SQL databases D. All of these
D. All of these
A join in which the joining condition is based on equality between values in the common columns is called a(n): A. Equi-join B. Unilateral join C. Natural join D. Both equi-join and natural join
D. Both equi-join and natural join
The _______ clause is used to combine the output from multiple queries into a single result table. A. Intersect B. Divide C. Collate D. Union
D. Union
An entity cluster can be formed by: A. abstracting a supertype and its subtype B. combining directly related entity types and their relationships C. combining a strong entity and its weak entities D. all of these
D. all of these
An understanding of how to merge relations is important because: A. there may be a need to merge relations on projects with subteams B. different views may need to be integrated C. new data requirements may produce new relations to be merged D. all of these
D. all of these
The common types of entities are: A. strong entities B. weak entities C. associative entities D. all of these
D. all of these
CASE is a class of tools that: A. assists the database administrator in maintaining a database. B. provides guidelines for the physical design of a database C. provides management reporting tools D. automates the design of databases and application programs.
D. automates the design of databases and application programs
Which of the following is an objective of selecting a data type? A. Represent a small number of possible values B. Maximize storage space C. Limit security D. Improve data integrity
D. improve data integrity
A relationship where the minimum and maximum cardinality are both one is a(n) ________ relationship. A. optional B. undirectional C. mandatory link D. mandatory one
D. mandatory one
All of the following are primary purposes of a database management system (DBMS) EXCEPT: A. Creating data. B. updating data. C. Storing data. D. Providing an integrated development environment
D. providing an integrated development environment
A two-dimensional table of data sometimes is called a: A. group B. set C. declaration D. relation
D. relation
A relationship between the instances of a single entity type is called a(n) ________ relationship. A. ternary B. primary C. binary D. unary
D. unary
A relation that contains minimal redundancy and allows easy use is considered to be: A. clean B. simple C. complex D. well-structured
D. well-structured
What three clauses are contained in most SQL retrieval statements?
The SELECT clause, which lists the columns and calculated expression from base tables. The FROM clause, which identifies tables and views which we want to gather data from in the query. Finally, the WHERE clause, which is used to specify conditions for selection of rows in the result set.
What steps should be followed when preparing to create a table?
When preparing to create a table, one should: 1. Identify the appropriate data type and length for each attribute 2. Identify the columns that should accept null values 3. Identify that columns that need to be unique 4. Identify all primary-foreign key mates 5. Determine default values 6. Identify any columns for which domain constraints, such as check, need to be stated 7. Create the table and any indexes using create table and create index statements
________ is the process of assigning pieces of application code to clients or servers. a. Application partitioning b. Modularizing programs c. Code distribution d. Program breakup
a. Application partitioning
Which of the following is a type of network security? a. Authentication of the client workstation b. Password naming conventions c. Guidelines for frequency of password changes d. All of these
a. Authentication of the client workstation
PHP is a popular API for MySQL because of all of the following EXCEPT: a. Microsoft integration b. high performance c. easy to use d. MySQL connectivity built-in
a. Microsoft integration
OLAP tools that use the database as a traditional relational database are called: a. ROLAP tools b. MOLAP tools c. slice and dice d. none of these
a. ROLAP tools
________ is used to undo unwanted database changes. a. Rollback b. Rollforward c. Restart d. Encryption
a. Rollback
An open-source DBMS is: a. a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. b. a beta release of a commercial RDBMS. c. an object-oriented database management system. d. source code for a commercial RDBMS.
a. a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
Extensible Markup Language (XML) is: a. a scripting language that allows the creation of customized tags to enable easier sharing of data across organizations b. a database language c. a product used for database middleware d. None of these
a. a scripting language that allows the creation of customized tags to enable easier sharing of data across organizations
While views promote security by restricting user access to data, they are not adequate security measures because: a. an unauthorized person may gain access to a view through experimentation. b. all users can read any view. c. a view's data does not change. d. None of these.
a. an unauthorized person may gain access to a view through experimentation.
A star schema contains both fact and ________ tables. a. dimension b. narrative c. cross functional d. starter
a. dimension
The ________ occurs when one user reads data that have been partially updated by another user. a. inconsistent read problem b. distant read problem c. honest dirty data d. data quality problem
a. inconsistent read problem
Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called ________ data. a. reconciled b. subject c. derived d. detailed
a. reconciled
An expanded version of a star schema in which all of the tables are fully normalized is called a(n): a. snowflake schema b. operational schema c. DSS schema d. complete schema
a. snowflake schema
Database access frequencies are estimated from: a. transaction volumes b. user logins c. security violations d. None of these
a. transaction volumes
A business transaction is a sequence of steps that constitute some well-defined business activity. a. true b. false
a. true
A client/server configuration that has three layers (one client and two servers) has a three-tier architecture. a. true b. false
a. true
A data model is a graphical system used to capture the nature and relationships among data. a. true b. false
a. true
A data warehouse contains summarized and historical information. a. true b. false
a. true
A modern database management system automates more of the backup and recovery tasks than a file system. a. true b. false
a. true
A range control limits the set of permissible values that a field may assume. a. true b. false
a. true
A view can be built to present only the data to which a user requires access. a. true b. false
a. true
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance. a. true b. false
a. true
Cost and complexity are just two of the disadvantages of database processing a. true b. false
a. true
Denormalization almost always leads to more storage space for raw data. a. true b. false
a. true
E. F. Codd developed the relational data model during the 1970s. a. true b. false
a. true
For performance reasons, it may be necessary to define more than one fact table for a star schema. a. true b. false
a. true
Information is processed data a. true b. false
a. true
Keeping the zip code with the city and state in a table is a typical form of denormalization. a. true b. false
a. true
Medical claims and pharmaceutical data would be an example of big data. a. true b. false
a. true
Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed. a. true b. false
a. true
Separation of metadata from application programs that use the data is called data independence. a. true b. false
a. true
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme. a. true b. false
a. true
The systems development life cycle is the traditional methodology used to develop, maintain, and replace information systems. a. true b. false
a. true
Vertical partitioning means distributing the columns of a table into several separate physical records. a. true b. false
a. true
Horizontal partitioning makes sense: a. when different categories of a table's rows are processed separately b. when less security is needed c. when partitions must be organized the same d. when all of these are true
a. when different categories of a table's rows are processed seperately
________ is a technical function responsible for database design, security, and disaster recovery. a. Data administration b. Database administration c. Tech support d. Operations
b. Database administration
________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. a. User interface enhancers b. Middleware c. Interface managers d. MPP
b. Middleware
Service-oriented architectures (SOA) are: a. a set of tiers designed to serve each other b. a collection of services that communicate with each other in some manner c. architecture designed for the military d. None of these
b. a collection of services that communicate with each other in some manner
A transaction that terminates abnormally is called a(n) ________ transaction. a. terminated b. aborted c. completed d. deleted
b. aborted
Web services: a. are a set of services available to all on the Web b. are a set of emerging standards for protocols for automatic communication between software over the Web c. are a set of standards based upon HTML d. None of these
b. are a set of emerging standards for protocols for automatic communication between software over the Web
A form of denormalization where the same data are stored in multiple places in the database is called: a. data duplication b. data replication c. advanced placement d. horizontal partitioning
b. data replication
Going from a summary view to progressively lower levels of detail is called data: a. cubing b. drill-down c. dicing d. pivoting
b. drill-down
A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. a. true b. false
b. false
A fat client does most of its processing on the server. a. true b. false
b. false
A join index is a combination of two or more indexes. a. true b. false
b. false
NoSQL is a great technology for storing well-structured data. a. true b. false
b. false
Open-source software always comes with complete documentation. a. true b. false
b. false
SOX stands for the Sorbet-Oxford Act. a. true b. false
b. false
The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: a. span b. grain c. selection d. aggregation
b. grain
A dependent data mart: a. is filled with data extracted directly from the operational system b. is filled exclusively from the enterprise data warehouse with reconciled data c. is dependent upon an operational system d. participates in a relationship with an entity
b. is filled exclusively from the enterprise data warehouse with reconciled data
A class of database technology used to store textual and other unstructured data is called: a. mySQL b. noSQL c. KnowSQL d. PHP
b. noSQL
A Web server: a. is used only to host Web pages b. processes client requests and returns HTML pages to the client c. always contains a database d. is considered to be part of the firewall
b. processes client requests and returns HTML pages to the client
All of the following are properties of metadata EXCEPT: a. data definitions b. processing logic. c. rules or constraints. d. data structures.
b. processing logic
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs. a. backup facility b. recovery manager c. restart facility d. transaction logger
b. recovery manager
The main difference between Java applets and Java servlets is: a.applets are stored on the client but executed on the server b. servlets are stored on the server while applets are stored on the client c. both applets and servlets are executed and stored on the server d. None of these.
b. servlets are stored on the server while applets are stored on the client
A discrete unit of work that must be processed completely or not at all within a computer system is called a: a. change control device. b. transaction. c. before image. d. journalizing facility.
b. transaction.
All of the following are concerns about developing a Web services approach EXCEPT: a. transaction speed b. user acceptability c. security d. reliability
b. user acceptability
Which of the following threats involves outside parties using information to embarrass a company? a. Accidental loss b. Theft and fraud c. Loss of confidentiality d. Loss of data integrity
c. Loss of confidentiality
A technical specification for creating a distributed registry of Web services and businesses that are open to communicating through Web services is called: a. HTML b. B2B c. UDDI d. XML
c. UDDI
A data mart is a(n): a. enterprisewide data warehouse b. smaller system built upon file processing technology c. data warehouse that is limited in scope d. generic on-line shopping site
c. data warehouse that is limited in scope
One application of data warehouses is: a. shipping of information b. order processing c. decision support d. File updating
c. decision support
A disadvantage of partitioning is: a. simplicity b. remote optimization c. extra space and update time d. shorter technology spans
c. extra space and update time
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. a. physical pointer b. retrieval program c. file organization d. update program
c. file organization
An operational data store (ODS) is a(n): a. place to store all unreconciled data b. representation of the operational data c. integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users d. small-scale data mart
c. integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users
An index on columns from two or more tables that come from the same domain of values is called a: a. bitmap index b. multivalued index c. join index d. transaction index
c. join index
The use of a set of graphical tools that provides users with multidimensional views of their data is called: a. on-line geometrical processing (OGP) b. drill-down analysis c. on-line analytical processing (OLAP) d. on-line datacube processing (ODP)
c. on-line analytical processing (OLAP)
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: a. multiple partition queries b. perpendicular query processing c. parallel query processing d. query optimization
c. parallel query processing
One of the most popular RAD methods is: a. Automated design b. Structured Walkthrough c. prototyping d. Crafting
c. prototyping
When an XML document is shredded, each element is: a. thrown away b. split up c. stored in a relational table d. added to other XML documents
c. stored in a relational table
A PC configured to handle user interface with little or no local storage is called a: a. server b. fat client c. thin client d. workstation
c. thin client
Databases may be more expensive to maintain than file because of: a. the need for specialized personnel b. the complexity of the database environment. c. backup and recovery needs. d. All of the above
d. All of the above
The real-time data warehouse is characterized by which of the following? a. It accepts near-real time feeds of transaction data. b. Data are immediately transformed and loaded into the warehouse. c. It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. d. All of these.
d. All of these
Which of the following is true of data visualization? a. It is easier to observe trends and patterns in data b. Correlations and clusters in data can be easily identified c. It is often used in conjunction with data mining d. All of these
d. All of these
SOAP stands for: a. what you wash your hands with b. Simple ODBC Access Protocol c. Strategic Operational Advanced Planning d. Simple Object Access Protocol
d. Simple Object Access Protocol
A data warehouse administrator has which of the following responsibilities? a. Build and administer an environment supportive of decision-support applications b. Build a stable architecture for the data warehouse c. Develop service level agreements with suppliers and consumers of data for the data warehouse d. All of these
d. all of these
A method for handling missing data is to: a. substitute and estimate for the missing data b. track missing data with special reports c. perform sensitivity testing d. all of these
d. all of these
When incorrect data have been introduced, the database is best recovered by: a. backward recovery, if the error has been discovered soon enough. b. human intervention for only a few errors. c. restarting from the most recent checkpoint and processing subsequent transactions. d. all of these.
d. all of these.
The preferred method of fixing an aborted transaction is: a. repairing the schema. b. switching. c. duplication of data. d. backing out the transaction.
d. backing out the transaction.
Which of the following is NOT a method for storing XML documents? a. Shredding b. Use a BLOB or CLOB to store the entire XML file c. Use an XML native database d. Convert to text
d. convert to text
All of the following are some beneficial applications for real-time data warehousing EXCEPT: a. just-in-time transportation b. e-commerce. For example, an abandoned shopping cart can trigger an email promotional message c. fraud detection in credit card transactions d. data entry
d. data entry
The coding or scrambling of data so that humans cannot read them is called: a. demarcation. b. hiding. c. encoding. d. encryption.
d. encryption.
A person, place, an object, an event or concept about which the organization wishes to maintain data is called a(n): a. relationship b. object c. attribute d. entity
d. entity
A client PC that is responsible for processing presentation logic, extensive application and business rules logic as well as many DBMS functions is called a(n): a. file server b. file processor c. database server d. fat client
d. fat client
All of the following are limitations of the independent data mart EXCEPT: a. separate extraction, transformation, and loading processes are developed for each data mart. b. data marts may not be consistent with one another. c. there is no capability to drill down into greater detail in other data marts. d. it is often more expedient to build a data mart than a data warehouse.
d. it is often more expedient to build a data mart than a data warehouse.
A(n) ________ is a field of data used to locate a related field or record. a. key b. index c. lock d. pointer
d. pointer
A(n) ________ is a module of code written in SQL or some proprietary language to run business rules on a server. a. SQL program b. select module c. select procedure d. stored procedure
d. stored procedure