Advanced Data Management Exam 4: Chapters 10-14
comprehensive
A characteristic of reconciled data that means the data reflect an enterprise-wide view is:
concrete
A class that has direct instances is called a(n) ________ class.
smart card
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):
concurrency transparency.
A design goal for distributed databases that states that although a distributed database runs many transactions, it appears that a given transaction is the only one in the system is called:
replication transparency.
A design goal for distributed databases to allow programmers to treat a data item replicated at several sites as though it were at one site is called:
biometric
A device to measure or detect fingerprints or signatures is called a(n) ________ device.
class diagram.
A diagram that shows the static structure of an object-oriented model is called a(n):
transaction
A discrete unit of work that must be processed completely or not at all within a computer system is called a
synchronous
A form of distributed database in which all data across a network are kept continuously updated, so a user can access any data anywhere on the network and get the same answer is called a(n) ________ distributed database.
object diagram.
A graph of instances that are compatible within a class diagram is called a(n):
semijoin
A joining operation in which only the joining attribute from one site is transmitted to the other site is called a(n):
incremental
A method of capturing only the changes that have occurred in the source data since the last capture is called ________ extract.
composition
A part object which belongs to only one whole object and which lives and dies with the whole object is called a:
data dictionary
A repository of information about a database that documents data elements of a database is called a
explanatory
A researcher trying to explain why sales of garden supplies in Hawaii have decreased would be an example of ________ data mining.
excellent
A synchronized replication strategy has a(n) ________ reliability.
data scrubbing.
A technique using artificial intelligence to upgrade the quality of raw data is called:
data scrubbing.
A technique using pattern recognition to upgrade the quality of raw data is called:
aborted
A transaction that terminates abnormally is called a(n) ________ transaction.
To cause special handling procedures to be executed
A trigger can be used as a security measure in which of the following ways?
abstract operation
A(n) ________ defines the form or protocol of an operation, but not its implementation.
state
A(n) ________ encompasses an object's properties and the values of those properties.
object
A(n) ________ is a concept, abstraction, or thing that has a state, behavior, and identity.
decentralized database
A(n) ________ is a database stored on multiple computers in multiple locations that are NOT connected by a data communications link.
association
A(n) ________ is a named relationship between or among classes.
two-phase lock
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
class-scope attribute
A(n) ________ is an attribute of a class that specifies a value common to an entire class.
association
A(n) ________ is shown as a solid line between the participating classes.
heartbeat query
A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.
exclusive lock
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.
information repository
A(n) ________ stores metadata about an organization's data and data processing resources.
all subclasses have been specified, and no others are expected.
According to the UML Notation Guide, complete means:
a descendant may be descended from more than one of the subclasses.
According to the UML Notation Guide, overlapping means:
Not Only Structured Query Language.
According to your text, NoSQL stands for:
decreased communication among the users, analysts, designers, and programmers.
All of the following are benefits of object-oriented modeling EXCEPT:
descriptive analytics
Allowing users to dive deeper into the view of data with online analytical processing (OLAP) is an important part of:
veracity and value
Although volume, variety, and velocity are considered the initial three v dimensions, two additional Vs of big data were added and include:
refresh mode.
An approach to filling a data warehouse that employs bulk rewriting of the target data periodically is called:
class
An association ________ is an association that has attributes or operations of its own.
journalizing facility.
An audit trail of database changes is kept by a:
to database management systems.
An information repository supplies information:
difficult
An integrated partition strategy is ________ to manage
a free source-code RBMS that provides the functionality of an SQL-compliant DBMS
An open-source DBMS is:
class-scope operation.
An operation that applies to a class rather than an object instance is a(n):
constructor operation
An operation that creates a new instance of a class is called a(n):
versioning
An optimistic approach to concurrency control is called:
lazy commit
An optimization strategy that allows sites that can update to proceed and other sites to catch up is called:
100 gigabytes of data in the enterprise data warehouse.
An organization should have one data warehouse administrator for every:
MongoDB.
An organization that decides to adopt the most popular NoSQL database management system would select:
Neo4j
An organization that requires a graph database that is highly scalable would select the ________ database management system.
Redis
An organization that requires a sole focus on performance with the ability for keys to include strings, hashes, lists, and sorted sets would select ________ database management system.
norm
An organization using HDFS realizes that hardware failure is a(n):
wide-column
Apache Cassandra is a leading producer of ________ NoSQL database management systems.
predictive analytics
Application of statistical and computational methods to predict data events is:
analysis and interpretation of data
At a basic level, analytics refers to:
large volumes of data with many different data types that are processed at very high speeds.
Big Data includes:
"
First degree or complete price discrimination relates to:
transactions do not have to be repeated
Forward recovery is faster than restore/rerun because:
external data source.
Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality.
securing the network between client and server.
Guidelines for server security should not include
Apache
Hive is a(n) ________ data warehouse software.
global
In a distributed database, a transaction that requires reference to data at one or more nonlocal sites is called a ________ transaction.
MOLAP
________ tools commonly load data into intermediate hypercube structures.
persistent
In the ________ approach, one consolidated record is maintained from which all applications draw data.
persistent
In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record.
Aggregation
In the figure below, what relationship is shown?
A faculty may advise up to a maximum of 10 students.
In the figure below, which of the following is true?
Students use various software tools for different courses.
In the figure below, which of the following is true?
link
In the following diagram, ________ objects are present (i.e., :Registration).
the connection requires full access to the database for dynamic pages
Security measures for dynamic Web pages are different from static HTML pages because:
gateways
Simple paths to other databases without the benefits of one logical database are called:
a data warehouse application.
Snapshot replication is most appropriate for:
Total Quality Management.
TQM stands for:
data management
The Hadoop Distributed File System (HDFS) is the foundation of a ________ infrastructure of Hadoop.
MapReduce
The Hadoop framework consists of the ________ algorithm to solve large scale problems.
key-value score.
The NoSQL model that includes a simple pair of a key and an associated collection of values is called a:
wide-column store
The NoSQL model that incorporates 'column families' is called a:
graph-oriented database
The NoSQL model that is specifically designed to maintain information regarding the relationships (often real-world instances of entities) between data items is called a:
is a notation useful for graphically depicting an object-oriented analysis or design model.
The Unified Modeling Language:
Platform for Privacy Preferences.
The W3C standard for Web privacy is called:
inconsistent read problem
The ________ occurs when one user reads data that have been partially updated by another user.
concurrency control
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
in the database definitions
The best place to improve data entry across all applications is:
encryption
The coding or scrambling of data so that humans cannot read them is called:
association role
The end of an association where it connects to a class is called a(n):
lock granularity.
The extent of the database resource that is included with each lock is called the level of:
user interfaces
User interaction integration is achieved by creating fewer ________ that feed different systems.
checkpoint facility
A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a
distributed request
A ________ allows a single SQL statement to refer to tables in more than one remote DBMS.
recovery manager
A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.
method
A ________ is the implementation of an operation.
poor
A centralized strategy has ________ expandability.
business rule constraint.
{disjoint, complete} is an example of a UML:
Query
Which of the following operations does NOT alter the state of an object?
Object class
Which of the following refers to a set of objects that share common structures and behaviors?
Polymorphism
________ means that the same operation can apply to two or more classes in different ways.
many data types.
Big data requires effectively processing:
does not require a strictly defined data model.
Big data:
objects
Both E-R model and object-oriented models are centered around:
data are stored, exchanged or presented in a format that is specified by its metadata.
Conformance means that:
authorization rules.
Controls designed to restrict access and activities are called:
data transformation.
Converting data from the format of its source to the format of its destination is called:
provides a virtual view of integrated data without actually creating one centralized database
Data federation is a technique which:
high level organizational groups and processes that oversee data stewardship
Data governance can be defined as:
SQL Commands (Insert/Update).
Data may be loaded from the staging area into the warehouse by following
risk of incarceration.
Data quality ROI stands for:
it provides a stream of profit.
Data quality is NOT important for this reason:
data are copied from legacy system
Data quality problems can cascade when:
node decoupling.
Data replication allowing for each transition to proceed without coordination is called:
high-quality
Data that are accurate, consistent, and available in a timely fashion are considered:
external data source.
Datatype conflicts is an example of a(n) ________ reason for deteriorated data quality.
prescriptive
Descriptive, predictive, and ________ are the three main types of analytics.
pushes data to duplicate sites as an event occurs.
Event-driven propagation:
there is a lack of control over data quality
External data sources present problems for data quality because:
data entry
Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems
level of detail.
Informational and operational data does NOT differ in this way:
large number of slaves.
It is true that in an HDFS cluster the DataNodes are the:
single master server
It is true that in an HDFS cluster the NameNode is the:
formatting the hard drive.
Loading data into a data warehouse does NOT involve:
human error
Most data outages in organizations are caused by:
flexibility
NoSQL focuses on:
not based on the relational model.
NoSQL includes data storage and retrieval:
scaling out
NoSQL systems allow ________ by incorporating commodity servers that can be easily added to the architectural solution.
sharding
NoSQL systems enable automated ________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it.
OO objects exhibits behavior.
Object-oriented model objects differ from E-R models because:
timeliness
One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is:
statistically profile all files.
One simple task of a data quality audit is to:
triggers
One way to generate, store, and forward messages for completed transactions to be broadcast across a network is through the use of:
check entered data immediately for quality against data in the database.
One way to improve the data capture process is to:
unique
Quality data can be defined as being:
usefulness
Regarding big data value, the primary focus is on:
there are no or few triggers.
Replication should be used when:
seconds
Research shows that if an online customer does not get the service he or she expects within a few ________, the customer will switch to a competitor.
public companies' financial statements
Sarbanes-Oxley Act was enacted to ensure the integrity of:
object diagram.
The following figure is an example of a(n):
exploratory
The goal of data mining related to analyzing data for unexpected relationships is:
method
The implementation of an operation is called a(n):
real-time cascading of data changes throughout the organization
The major advantage of data propagation is:
Master Data Management.
The methods to ensure the quality of data across various subject areas are called:
three phases
The object-oriented systems development cycle consists of:
descriptive analytics.
The oldest form of analytics is:
backing out the transaction.
The preferred method of fixing an aborted transaction is:
joining
The process of combining data from various sources into a single table or view is called:
overriding
The process of replacing a method inherited from a superclass by a more specific implementation of the method in a subclass is called:
aggregating
The process of transforming data from a detailed to a summary level is called:
data warehouse administrator
The role of a ________ emphasizes integration and coordination of metadata across many data sources.
unit of work.
The sequence of instructions required to process a transaction is called the:
global optimization.
The step in which a distributed database decides the order in which to execute the distributed query is called:
volume, variety, and velocity.
The three 'v's commonly associated with big data include:
Normalization
This is NOT a popular architectures for Master Data Management:
data rollup and integration.
This is NOT a way to consolidate data:
easier to set up than horizontal partitioning.
This is NOT an advantage of vertical partitioning:
personal finances.
This is NOT an application for big data and analytics:
reduced network traffic at prime time.
This is an advantage of data replication:
data lake
When a data repository (including internal and external data) does NOT follow a predefined schema, this is called a:
multiple classification.
When an object is an instance of more than one class, it is called:
prescriptive analytics.
When an organization must decide on optimization and simulation tools to make things happen it is using:
restarting from the most recent checkpoint and processing subsequent transactions.
When incorrect data have been introduced, the database is best recovered by:
descriptive analytics
When online analytical processing (OLAP) studies last year's sales, this represents:
schema on read.
When reporting and analysis organization of the data is determined when the data is used is called a:
dashed arrow
When specifying a business rule between graphical symbols, a ________ is drawn from one element to the other.
Data communication reliability
Which of the following are business conditions that encourage the use of distributed databases?
Apply TQM principles and practices.
Which of the following are key steps in a data quality program?
Same DBMS used at all locations
Which of the following characterizes homogeneous environments?
Heterogeneous; federated
Which of the following environments uses a different DBMS at each node and supports local databases for unique data requests?
Homogeneous; nonautonomous
Which of the following environments uses the same DBMS at each node with a central or master DBMS coordinating database access across nodes?
Organizational forces
Which of the following factors in deciding on database distribution strategies is related to autonomy of organizational units?
Database design
Which of the following functions develop integrity controls?
Database planning
Which of the following functions do cost/benefit models?
Database analysis
Which of the following functions model business rules?
A data transformation process
Which of the following is NOT a component of a repository system architecture?
User interface design
Which of the following is NOT an area of concern when trying to maintain a well-tuned database?
Maintaining a secure server
Which of the following is NOT true of poor data and/or database administration?
Table lookup
Which of the following is a basic method for single field transformation?
Operation
Which of the following is a function or service provided by all instances of a class?
Subject
Which of the following is a principal type of authorization table?
The analysis model is not formal enough to be implemented in a programming language.
Which of the following is a reason for using an object-oriented design?
Authentication of the client workstation
Which of the following is a type of network security?
Data can be stored to optimize local access.
Which of the following is true about horizontal partitioning?
Node decoupling
Which of the following is true of data replication?
Better local control
Which of the following is true of distributed databases?
Gateways
Which of the following supports a simple path to other databases, without the benefits of one logical database?
Loss of confidentiality
Which of the following threats involves outside parties using information to embarrass a company?
Bit-mapped index
Which type of index is commonly used in data warehousing environments?
Update
Which type of operation has side effects?
an unauthorized person may gain access to a view through experimentation.
While views promote security by restricting user access to data, they are not adequate security measures because:
data to computation.
With HDFS it is less expensive to move the execution of computation to data than to move the:
failure transparency
With ________, all of the actions of a transaction are either committed or not committed.
database destruction
With ________, the database itself is lost, destroyed, or cannot be read.
location transparency
With ________, users can act as if all the data were located at a single node.
target
With a pull strategy of replication, the ________ node determines when a database is updated.
Smartphones
________ are examples of Business Intelligences and Analytics 3.0 because they have millions of observations per second.
Word processing programs
________ are not used for querying and analyzing data stored in data warehouses.
Data propagation
________ duplicates data across databases.
Commit protocol
________ ensures that a transaction is successfully completed or else it is aborted.
Transaction processing
________ generally processes the largest quantities of data.
Variety
________ includes NoSQL accommodation of various data types.
Veracity
________ includes concern about data quality issues.
Velocity
________ includes the value of speed in a NoSQL database.
Multiplicity
________ indicates how many objects participate in a given relationship.
Local autonomy
________ is a design goal for a distributed database that says a site can independently administer and operate its database.
Location transparency
________ is a design goal for a distributed database, which says a user does not need to know the location of data to use the data.
Database administration
________ is a technical function responsible for database design, security, and disaster recovery.
Data warehousing
________ is an application that can effectively employ snapshot replication in a distributed environment.
Pig
________ is an important scripting language to help reduce the complexity of MapReduce.
Personal privacy
________ is arguably the most common concern by individuals regarding big data analytics.
creating foreign keys
________ is not a task of data cleansing:
Redis
________ is the most popular key-value store NoSQL database management system.
Encapsulation
________ is the technique of hiding the internal implementation details of an object from its external view.
Rollback
________ is used to undo unwanted database changes.