Database Management - Quiz Questions (1-4)
A open-source DBMS is: A free source-code RBMS that provides the functionality of an SQL-compliant DBMS A beta release of a commercial RDBMS An object-oriented database management system Source code for a commercial RDBMS
A free source-code RBMS that provides the functionality of an SQL-compliant DBMS
What will returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2 A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries A listing of all drivers A listing of the number of deliveries greater than 2 A listing of all drivers who made more than 2 deliveries
A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries
What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no; A listing of all drivers who made deliveries to state = 'MA', sorted by driver number A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state A count of all of the deliveries made to state = 'MA' by all drivers A listing of driver numbers
A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state
A property or characteristic of an entity type that is of interest to the organization is called a(n): Co-existing entity Primary key Relation Attribute
Attribute
The property by which subtype entities possess the values of all attributes of a supertype is called: Hierarchy reception Class management Attribute inheritance Generalization
Attribute inheritance
A device to measure or detect fingerprints or signatures is called a(n) ____________ device Biometric View Ink Laser
Biometric
A join operation: Brings together data with a common domain to be combined into a single table or view Causes two tables with a common domain to be combined into a single table or view Causes two disparate tables to be combined into a single table or view Is used to combine indexing operations
Causes two tables with a common domain to be combined into a single table or view
A primary key that consists of more than one attribute is called a: Foreign key Composite key Multivalued key Cardinal key
Composite key
Whether in top-down or bottom-up modeling approaches, a primary key that consists of more than one attribute is called a: Foreign key Composite key Multivalued key Cardinal key
Composite key
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions Logging Concurrency control Transaction authorization Multiple management
Concurrency control
In the SQL language, the _________ statement is used to make table definitions Create session Create table Create index
Create table
What does this represent? ABC011 Ian ACB012 June ABC013 Carl ABCO15 Rita Information Knowledge Wisdom Data
Data
Data modeling may be the most important part of the systems development process because: Data characteristics are important in the design on programs and other system components The data in a system are generally less complex than the processes and play a central role in development It is the easiest Limited program maintenance
Data characteristics are important in the design on programs and other system components
Including data capture controls (i.e., dropdown lists) helps reduce _________ deteriorated data problems External data source Inconsistent metadata Data entry Lack of organizational commitment
Data entry
___________ is a component of the relationship data model included to specify business rules to maintain the integrity of data when they are manipulated Business rule constraint Data integrity Business integrity Data structure
Data integrity
Converting data from the format of its source to the format of its destination is called: Data transformation Data loading Data scrubbing Data storage
Data transformation
__________ is a technical function responsible for database design, security, and disaster recovery Data administration Database administration Tech support Operations
Database administration
Which of the following functions develop integrity controls? Database planning Database analysis Database implementation Database design
Database design
The coding or scrambling of data so that humans cannot read them is called: Demarcation Hiding Encoding Encryption
Encryption
The logical representation of an organization's data is called an: Entity-relationship model Database model Relationship systems design Database entity diagram
Entity-relationship model
T/F: A member of a subtype does NOT necessarily have to be a member of the supertype
False
T/F: An enterprise data model describes the scope of data for only one information system
False
T/F: In MySQL workbench, Views are generally stored under tables
False
T/F: In the figure below, Name would be an ideal identifier STUDENT SID Name Address (Street, City, State, ZipCode)
False
T/F: The following code is an example of a Subquery: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID;
False
T/F: The following two SQL statements will produce different results: Select last_name, first_name from customer where state = 'MA' or state = 'NY' or state = 'NJ' or state = 'NH' or state = 'CT'; Select last_name, first_name from customer where state in ('MA','NY','NJ','NH','CT');
False
T/F: The physical structure and storage organization of the database is decided upon during the implementation phase of the systems development life cycle
False
T/F: There can be multivalued attributes in a relation
False
An attribute in a relation of a database that serves as a the primary key of another relation in the same database is called a: Link attribute Link key Foreign key Foreign attribute
Foreign key
A constraint between two attributes is called a(n): Functional relation Attribute dependency Functional dependency Functional relation constraint
Functional dependency
Which of the following finds all group meeting stated conditions? SELECT WHERE HAVING FIND
HAVING
Data governance can be defined as: A means to slow down the speed of data High-level organizational groups and processes that oversee data stewardship A government task force for defining data quality A means to increase the speed of data
High-level organizational groups and processes that oversee data stewardship
This represents: Agent No Agent Name ABC011 Ian ABC012 Carl ABC013 Deb ABC015 Jim Data Information Knowledge Wisdom
Information
Data that describes the properties of other data are: Logical Metadata Physical Relationships
Metadata
___________ are anomalies that can be caused by editing data in tables Insertion Deletion Modification Creation
Modification
The entity integrity rule states that: No primary key attribute can be null Referential integrity must be maintained across all entities Each entity must have a primary key A primary key must have only one attribute
No primary key attribute can be null
The last part of the SQL query to be read is the ___________ statement SELECT FROM WHERE ORDER BY
ORDER BY
Which of the following are goals of the normalization process? Minimize data redundancy Complicate the referential integrity constraints Improve efficiency of update, insert and delete functions Only A and C
Only A and C
The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; All rows of the Order_T Table regardless of matches with the Customer_T Table All rows of the Customer_T Table regardless of matches with the Order_T Table Only rows that match both Customer_T and Order_T Tables Only rows that don't match both Customer_T and Order_T Tables
Only rows that match both Customer_T and Order_T Tables
Which of the following MySQL commands is used to recover a transactions? REVOKE DROP GRANT ROLLBACK
ROLLBACK
A two-dimensional table of data sometimes is called a: Group Set Declaration Relation
Relation
__________________ are established between entities in a well-structured database model so that the desired information can be retrieved Entities Relationships Lines Attributes
Relationships
A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? Drop user businessanalyst@localhost Delete update privilege on schema Withdraw update privilege from businessanalyst@localhost Revoke update on schema from businessanalyst@localhost
Revoke update on schema from businessanalyst@localhost
The process of defining one or more subtypes of a supertype and forming relationships is called: Specialization Generalization Creating discord Selecting classes
Specialization
The most common type of entities are: Strong Weak Associative Dependent
Strong
A simultaneous relationship between the instances of three entity types is called a ____________ relationship Binary Ternary Unary Primary
Ternary
A candidate key must satisfy all of the following conditions EXCEPT: The key must uniquely identify the row The key must indicate the row's position in the table The key must be non-redundant Each non-key attribute is functionally dependent upon it
The key must indicate the row's position in the table
3NF is achieved when The table is in 2NF and any transitive dependencies have been removed The table is in 2NF and non key columns all depend on the key The table is in 2NF and every determinant is a candidate key The table is in 2NF and all occurrences of a row must have the same number of columns
The table is in 2NF and any transitive dependencies have been removed
A good definition of 1NF is that There are no transitive dependencies There are no multi-valued attributes There is only one key All non keyed fields are dependent on the key
There are no multi-valued attributes
T/F: A database table is defined using the data definition language (DDL)
True
T/F: A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants
True
T/F: A person is an example of an entity
True
T/F: A procedure is run by calling it by its name
True
T/F: A single occurrence of an entity is called an entity instance
True
T/F: A well-structured relations contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies
True
T/F: Data modeling is about documenting rules and policies of an organization that govern data
True
T/F: Entity clustering is a methodology for grouping one of more entity types and associated relationships into a single abstract entity type
True
T/F: Figuring out what attributes you want in your query before you write the query will help with query writing
True
T/F: In an E-R diagram, an associative entity is represented by a rounded rectangle
True
T/F: In order to find out what customers have not placed an order for particular item, one might use the NOT qualifier along with EXISTS
True
T/F: Once executed, procedures and functions will be stored in the schema, which eliminates the need to execute them again each time a query is executed
True
T/F: One property of a relation is that each attribute within a relation has a unique name
True
T/F: Target and Sony Playstation experienced data breaches due to poor database administration
True
T/F: The default primary key for an associative relation consists of the two primary key attributes from the other two relations
True
T/F: The default value of autocommit in MySQL is 1
True
T/F: The user interface includes languages, menus, and other facilities by which users interact with various system components
True
T/F: To write a query involving a unary relationship, it is a good practice to create two tables based on the original table
True
T/F: Views can be used to improve database security
True
T/F: When creating tables, it's important to decide which columns will allow null values before the table is created
True
Because applications are often developed independently in file processing systems: The data is always non-redundant Unplanned duplicate data files are the rule rather than the expectation Data can always be shared with others There is a large volume of file I/O
Unplanned duplicate data files are the rule rather than the expectation