C430 Midterm
database
A _______ is an integrated collection of stored data that is centrally managed and controlled
referential integrity constraint
A constraint which is stored in the schema and which ensures that all foreign keys have associated primary keys is called a(n) ______ ______ ______.
complex
A data type that is defined by extending or combining other data types is called a(n) ______ data type.
primary key
A(n) ____ is a field or set of fields used to uniquely identify each row.
schema
A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.
key
An attribute or set of attributes that uniquely define the rows in a table is called a(n) ______.
exclusive lock
Another name for a write lock is a(n) ______ ______.
true
Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.
false
Classes that participate in a classification relationship can only be represented within a relational database as a single table containing all the attributes in each class.
true
Ease of learning and ease of use are often in conflict.
true
Every database in a DBMS consists of two separate data stores.
false
Every table in a relational database must have a foreign key.
candidate key
If there is more than one field in a database table that is unique for all rows each one may be called a(n) ______ _____.
primary key
If there is more than one field in a database table that is unique for all rows only one of those fields will be identified as the ______ ______ for the table.
attribute
In a database table a column is the same thing as a(n) ______.
database synchronization
In a distributed database configuration when all the tables are copied to all locations that is called _____ ______
horizontal partitioning
In a distributed database when the data is divided so that separate rows of the same table are at distinct locations that is referred to as _________.
the primary keys of the associated tables
In a many-to-many association, the primary key of the created table consists of which of the following?
false
In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.
tuple
In a relational database, a row can be referred to as a(n) ____.
false
Including a total amount field as the sum of other fields in a table is a violation of second normal form.
false
Menu design and dialog design should be done separately.
database management system
Microsoft SQL Server is an example of what?
normalization
Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.
true
One-to-many and many-to-many relationships are both represented by foreign keys in a relational database.
true
Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.
database management system
Referential integrity is normally enforced by the ____.
true
Relationships between tables is usually indicated through the use of a foreign key.
false
Relationships in a relational database are usually represented by embedding a foreign key in each participating table.
referential integrity
The condition that requires that every value in a foreign key must have an equivalent value as the primary key in another table is called ________ ______.
false
The domain data in a database is sometimes referred to as metadata.
synchronization
When it is necessary to update one database copy with changes made to the other database, it is called _________.
structured query language
______ ______ ______ is a query language used to access and update the data in a relational database.
functional dependency
___________ is where the value in one field determines the value in another field in the same record.
attribute
One column of a table in a relational database is called a(n) ____.
structured query language
What does SQL stand for?
primitive
A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.
write lock
A database lock that does not allow another user to update the data is called what?
third normal form
A database table is in _____ _____ _____ if no non-key attributes are functionally dependent on any other non-key attributes.
database management system
A software system whose purpose is to manage and control the data in a database is called a(n) _______ _______ ______.
heterogeneous distributed database
A distributed database configuration which contains both global and local schemas and which allows purely local data is called a(n) ______ ______ ______.
complex data type
A field in a relational table called "address" would be an example of what?
false
A local business office with a small database which is only used by two or three users would most probably implement a desktop DBMS.
read lock
A lock on a portion of the database by one user, which allows other users to read the data is called a(n) ______ ______.
write lock
A lock on a portion of the database by one user, which does not allow other users to read or access the data is called a(n) ______ ______.
second
A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key.
first
A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns.
foreign key
A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.
true
Adequate feedback from a system to user data entry helps reduce errors.
true
An initial grouping of cases by actor and subsystem is a good starting point for menu design.
shared lock
Another name for a read lock is a(n) ______ ______.
tables
Data elements in a relational database are organized into ____.
table
Each class on an class diagram is represented by a(n) ____ in a relational database.
false
Problem domain modeling and database normalization are incompatible techniques for relational database design.
false
Storyboarding should result in a detailed dialog design.
false
The design of a desktop system and a Web based system have similar performance issues that must be considered.
false
User interface design is frequently added to the system after the business rules and business logic has been designed.
true
Users need to feel that they can explore options and take actions that can be cancelled without difficulty.
database administrator
What does DBA stand for?
many to many
A separate relation must be created to store the attributes of a ____ relationship among two other classes.
row
In a database table a tuple is the same thing as a(n) ______.
tuple
Which of the following is not a synonym of the others? column attribute field tuple
columns
All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique.
table
In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.
true
In an iterative approach to software development, it is usually best to develop the database in the first few iterations.
database management system
What does DBMS stand for?
first normal form
A database table is in _____ _____ _____ if all non-key attributes are functionally dependent on the entire key.
decentralized database
A database that is stored at multiple locations but which does not need to be interconnected or synchronized is called a(n) ______ ______.
homogeneous distributed database
A distributed database configuration where all databases use the same DBMS and have a global schema is called a(n) ______ ______ ______.
true
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.
normalization
A formal technique for transforming a relational schema to an equivalent one that eliminates data anomalies is called _______.
false
A good example of an error message might be, "The account information is missing critical data. Please re-enter."
false
A phased database development and deployment (using iterative development) is usually the safest approach to deploying the best database solution.
False
A relation describes the structure, content, and access controls of a physical data store or database.
True
A relational database management system stores data in tables.
third
A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.
first
A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.
false
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.
true
A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.
relational database management system
A specific type of DBMS that organizes the data into tables is called a(n) ______ ______ _____ _____.
transaction logging
A technique for protecting the database wherein every update to the database is recorded with audit information is called ______ ______.
false
A write lock on a database allows other users to read the data, but they cannot update any data.
schema
A(n) ____ describes the structure, content, and access controls of a physical data store or database.
foreign key
A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table.
false
Each dialog may only have one window form.
globally unique identifier
GUID stands for ______ ______ ______.
database administrator
The person who is in charge of the safety and operation of the DBMS is called the _____ _____.
data administrator
The person who is in charge of the structure and integrity of the data is called the _____ _____.
database lock
The technique of applying exclusive control to a part of the database to one user at a time is called a(n) ______ ______.
false
To ensure that the database is designed correctly, an important member of the project team is the data administrator.
in first normal form
What can be said about the following relational database table (key is underlined): (Choose the most correct answer.) CourseSectionID, StudentID, Grade, StudentName
determine data confidentiality
Which is NOT one of the responsibilities of the database administrator? backup the database do performance tuning set up user authentication determine data confidentiality
establish user authentication for data access
Which is not one of the responsibilities of the DA? provide data naming standards keep track of who owns the data set up standards for data validation establish user authentication for data access
heterogeneous distributed database
Which of the following contains both global and local schemas with distinct DBMSs?
low level process management
Which of the following is NOT a component or function of a typical database management system (DBMS)?
field
Which of the following is not a synonym of the others? row tuple record field
keys
____ are a critical element of relational database design because they are the bases for representing relationships among tables.
referential integrity
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.
in first and second normal form
What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding
transaction
When there is a piece of work or an action that includes several steps and updates to the data and which all must complete to be valid, that piece or work is called a(n) _______.