Database Management Quiz 3 & 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In MySQL workbench, Views are generally stored under tables. True False

False

The following code is an example of a Subquery. SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; True False

False

The following two SQL statements will produce different results. Select last_name, first_name from customer where state = 'MA' or state = 'NY' or state = 'NJ' or state = 'NH' or state = 'CT'; Select last_name, first_name from customer where state in ('MA','NY','NJ','NH','CT'); True False

False

A database table is defined using the data definition language (DDL). True False

True

A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants. True False

True

A procedure is run by calling it by its name. True False

True

Figuring out what attributes you want in your query before you write the query will help with query writing. True False

True

In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with EXISTS. True False

True

Once executed, procedures and functions will be stored in the schema, which eliminates the need to execute them again each time a query is executed. True False

True

Target and Sony Playstation experienced data breaches due to poor database administration. True False

True

The default value of autocommit in MySQL is 1 True False

True

The following scenario represents a case in which a concurrency control mechanism is needed. John Marsha 1. Read account balance (balance = $1,000) | | 1. Read account 2. Withdraw $200 (balance =$1000) (Balance - $800) | | | | 2. Withdraw $300 3. Write account balance (Balance = (Balance = $500) $700) 3. Write account (balance = $700) ERROR! True False

True

To write a query involving a unary relationship, it is a good practice to create two tables based on the original table. True False

True

Views can be used to improve database security. True False

True

When creating tables, it's important to decide which columns will allow null values before the table is created. True False

True

An open-source DBMS is: a. A free source-code RBMS that provides the functionality of an SQL-compliant DBMS. b. A beta release of a commercial RDBMS. c. An object-oriented database management system. d. Source code for a commercial RDBMS.

a. A free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; a. A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries b. A listing of all drivers c. A listing of the number of deliveries greater than 2 d. A listing of all drivers who made more than 2 deliveries

a. A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries

A device to measure or detect fingerprints or signatures is called a(n) ________ device. a. Biometric b. View c. Ink d. Laser

a. Biometric

Converting data from the format of its source to the format of its destination is called: a. Data transformation. b. Data loading. c. Data scrubbing. d. Data storage

a. Data transformation.

Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality. a. External data source b. Inconsistent metadata c. Data entry problem d. Lack of organizational commitment

a. External data source

3NF is achieved when a. The table is in 2NF and any transitive dependencies have been removed b. The table is in 2NF and non key columns all depend on the key c. The table is in 2NF and every determinant is a candidate key d. The table is in 2NF and all occurrences of a row must have the same number of columns.

a. The table is in 2NF and any transitive dependencies have been removed

What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no; a. A listing of all drivers who made deliveries to state = 'MA', sorted by driver number b. A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state c. A count of all of the deliveries made to state = 'MA' by all drivers d. A listing of driver numbers

b. A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state

A join operation: a. Brings together data from two different fields. b. Causes two tables with a common domain to be combined into a single table or view. c. Causes two disparate tables to be combined into a single table or view. d. Is used to combine indexing operations.

b. Causes two tables with a common domain to be combined into a single table or view.

Whether in top-down or bottom-up modeling approaches, a primary key that consists of more than one attribute is called a: a. Foreign key. b. Composite key. c. Multivalued key. d. Cardinal key.

b. Composite key.

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. a. Logging b. Concurrency control c. Transaction authorization d. Multiple management

b. Concurrency control

________ is a technical function responsible for database design, security, and disaster recovery. a. Data administration b. Database administration c. Tech support d. Operations

b. Database administration

Data governance can be defined as: a. A means to slow down the speed of data. b. High-level organizational groups and processes that oversee data stewardship. c. A government task force for defining data quality. d. A means to increase the speed of data.

b. High-level organizational groups and processes that oversee data stewardship.

A candidate key must satisfy all of the following conditions EXCEPT: a. The key must uniquely identify the row. b. The key must indicate the row's position in the table. c. The key must be nonredundant. d. Each nonkey attribute is functionally dependent upon it.

b. The key must indicate the row's position in the table.

A good definition of 1NF is that a. There are no transitive dependencies b. There are no multi-valued attributes c. There is only one key d. All non keyed fields are dependent on the key

b. There are no multi-valued attributes

Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems. a. External data source b. Inconsistent metadata c. Data entry d. Lack of organizational commitment

c. Data entry

A constraint between two attributes is called a(n): a. Functional relation. b. Attribute dependency. c. Functional dependency. d. Functional relation constraint.

c. Functional dependency.

Which of the following finds all groups meeting stated conditions? a. SELECT b. WHERE c. HAVING d. FIND

c. HAVING

________ are anomalies that can be caused by editing data in tables. a. Insertion b. Deletion c. Modification d. Creation

c. Modification

The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; a. All rows of the Order_T Table regardless of matches with the Customer_T Table. b. All rows of the Customer_T Table regardless of matches with the Order_T Table. c. Only rows that match both Customer_T and Order_T Tables. d. Only rows that don't match both Customer_T and Order_T Tables.

c. Only rows that match both Customer_T and Order_T Tables.

Which of the following functions develop integrity controls? a. Database planning b. Database analysis c. Database implementation d. Database design

d. Database design

The coding or scrambling of data so that humans cannot read them is called: a. Demarcation. b. Hiding. c. Encoding. d. Encryption.

d. Encryption.

The last part of an SQL query to be read is the _____________statement. a. SELECT b. FROM c. WHERE d. ORDER BY

d. ORDER BY

Which of the following are goals of the normalization process? a. Minimize data redundancy b. Complicate the referential integrity constraints c. Improve efficiency of update, insert and delete functions d. Only A and C

d. Only A and C

Which of the following MySQL commands is used to recover a transaction? a. REVOKE b. DROP c. GRANT d. ROLLBACK

d. ROLLBACK

A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? a. Drop user businessanalyst@localhost b. Delete update privilege on schema c. Withdraw update privilege from businessanalyst@localhost d. Revoke update on schema from businessanalyst@localhost

d. Revoke update on schema from businessanalyst@localhost


Kaugnay na mga set ng pag-aaral

Radiation Protection (Biological aspects of radiation) ARRT

View Set

Chapter 19: Postoperative Nursing Management

View Set

Marketing 11, 12, 15, 19 (final p1)

View Set

Section 13, Unit 1: Arizona Real Estate Contracts

View Set

Business Intro Chapter 5 How to form a business

View Set

Collaborative-Management of Care

View Set