Database Exam 2
Which of the following is a type of network security? - moderate technology changes - a random password guessing - authentication - password naming conventions
authentication
obtain a positive identification of the user
authentication (not to be confused w/ authorization)
the coding or scrambling of data so that humans cannot read the data - encryption - logical access controls - physical access controls
encryption
T/F: Explicit Join Notation uses the JOIN keyword to specify the tables to join and the ON keyword to specify the joining condition.
True
T/F: In SQL, the INSERT statement adds one or more rows to a table.
True
T/F: In SQL, the UPDATE statement modifies data in an existing row (or rows).
True
T/F: In a SQL statement, the wildcard (*) retrieves all rows and columns in a table.
True
T/F: In a SQL statement, you use the AND, OR, and NOT operators for customizing conditions in the WHERE clause.
True
T/F: SQL is a programming language used to manage data in relational database management systems (RDBMS).
True
T/F: The CREATE TABLE SQL statement defines a new table and its columns.
True
T/F: When joining more than two tables, each pair of tables requires requires a joining condition, matching primary keys against foreign keys.
True
T/F: the objective of business intelligence is to enable easy access to data (and models) to provide business managers with the ability to conduct an analysis for better decision-making.
True
enforce database conditions - domains - assertions - triggers - transactions
assertions
T/F: Implicit Join Notation uses the JOIN keyword to specify the tables to join and the ON keyword to specify the joining condition.
False
The use of a set of graphical tools that provides users with multidimensional views of their data and allows them to analyze the data using simple techniques
OLAP
An example of implicit join notation is: - SELECT * FROM employee, department WHERE employee.departmentID = department.DepartmentID - SELECT * FROM employee JOIN department ON employee.DepartmentID = department.departmentID - both - neither
SELECT * FROM employee, department WHERE employee.departmentID = department.DepartmentID
T/F: A Data warehouse provides an integrated, company-wide view of high-quality information from various databases.
True
T/F: A data warehouse is the subject-oriented, integrated, time-variant, non-updatable collection of data used in support of management decision-making processes.
True
T/F: Any query you build can be saved as a view.
True
Associate the SQL category with its description. Data definition language Data manipulation language Data control language a - commands that define... b - commands that maintain... c - commands that control...
a b c
Match term to definition. DROP TABLE statement DELETE FROM table name WHERE condition DELETE FROM tablename a - allows you to remove tables... b - deletes all rows from a given table c - allows you to remove certain...
a c b
An outer join is: - a query that compares each row of one table with each row of another table to find all rows of data which satisfy the condition - a query that includes all columns from each table in the join, and an instance for each row of the table - a query in which the rows from the two tables that do not have matching values in common columns are still included in the result - none
a query in which the rows from the two tables that do not have matching values in common columns are still included in the result
A union join is: - a query that includes all columns from each table in the join, and an instance for each row of each table - a query in which the rows from the two tables that do not have matching vases in common columns are still included in the result - a query that compares each row of one table with each row of another table to find all rows of data which satisfy the join condition - none of these
a query that includes all columns from each table in the join, and an instance for each row of each table
Controls designed to restrict access and activities are called: - encryption controls - authorization rules - schemas - business rules
authorization rules
controls that are incorporated into the data management system; authorization rules grant access, specifying which actions and constraints govern the user (or user groups) access
authorization rules
Match the following routine with the appropriate definition: function procedure trigger a - a routine that does not return a value b - a routine that returns a value c - a routine that executes in response to a database event
b a c
Match the SQL statement component with its definition. SELECT FROM WHERE a - indicates the conditions under... b - determines what columns... c - indicates the table(s) from...
b c a
come up with 2-D view of data
cube slicing
a high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards; more managerial - data administration - database administration - data warehouse administration
data administration
knowledge discovery using a blend of statistical, AI, and computer graphics techniques
data mining
emphasis on integration and coordination of metadata/data across many data sources, supports decision support applications; build a stable architecture; manage data warehouses and data marts - data administration - database administration - data warehouse administration
data warehouse administration
a technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery; more technical - data administration - database administration - data warehouse administration
database administration
mechanisms for restoring a database quickly and accurately after loss or damage
database recovery
set allowable values (e.g., range restrictions, dropdowns) - domains - assertions - triggers - transactions
domains
Going from a summary view we progressively lower levels of detail is called data: - pivoting - drill down - clustering - slicing and dicing
drill down
Most data outages and organizations are caused by: - electrical outage - human error - hardware failure - software failure
human error
a system designed to support decision making based on a historical point-in-time and prediction data for complex queries or data-mining applications
information system
OLTP systems are designed/optimized for
inputs like inserts, updates, deletes in the database
A database schema can be described by all of the following EXCEPT: - it's stored in the data dictionary - it's the structure that contains descriptions of the objects created by the users - it's a special purpose programming language - it's the organization of data
it's a special purpose programming language
A data warehouse is important for organizations for all the following reasons except: - saves time (all data in one place) - it's independent of the company's business strategy - enhances data quality and consistency (standardizing on databases) - cannot have enhanced business intelligence without it
it's independent of the company's business strategy
Hiring practices, employee monitoring, security training, separation of duties - encryption - logical access controls - physical access controls
logical access controls
The use of a set of graphical tools that provides users with multidimensional multidimensional views of their data is called: - TIO tools - drill-down analysis - on-line geometrical processing (OGP) - on-line analytical processing (OLAP)
on-line analytical processing (OLAP)
a system that is used to run a business in real time, based on current data
operational system
Swipe cards, equipment locking, check-out procedures, screen placement, laptop protection - encryption - logical access controls - physical access controls
physical access controls
When representing data in data warehouse, using several dimension tables that are each connected only to a fact table means you are using which warehouse structure?
star schema
Operational or transaction databases are product oriented, handling transactions that update the database. In contrast, data warehouse are
subject-oriented and nonvolatile
A trigger can be used as a security measure in which the following ways? - to cause special handling procedures to be executed - to check for viruses - to design a database - to conduct a data flow analysis
to cause special handling procedures to be executed
make sure that all SQL commands execute inside a query or none of them do - domains - assertions - triggers - transactions
transactions
prevent inappropriate actions, invoke special handling procedures, write to log files - domains - assertions - triggers - transactions
triggers
Subset of the database that is presented to one or more users (groups)
views
When writing SQL queries, identifying the entities (tables) that contain the desired attributes tells you: - what to put in the EXECUTE clause - what to put in the SELECT clause - what to put in the JOIN or FROM clause - what to put in the ON or WHERE clause
what to put in the JOIN or FROM clause
When writing SQL queries, constructing a join condition for each pair of tables linked together tells you: - what to put in the ON or WHERE clause - what to put in the JOIN or FROM clause - what to put in the SELECT clause - what to put in the EXECUTE clause
what to put in the ON or WHERE clause