Chapter 1: Database Systems, Chapter 2: Data Models, Chapter 3: The Relation Database Model, Chapter 4: Entity Relationship ER Modeling, Chapter 6: Normalization of Database Tables, Chapter 7: Introduction to Structured Query Language (SQL), Chapter...
Which of the following is true of NoSQL databases? a. They do not support distributed database architectures. b. They are not based on the relational model. c. They are geared toward transaction consistency rather than performance. d. They do not support very large amounts of sparse data.
ANSWER: b
Which of the following types of HDFS nodes acts as the interface between the user application and the HDFS? a. Data node b. Client node c. Name node d. Map node
ANSWER: b
_____ CASE tools provide support for the coding and implementation phases. a. Front-end b. Back-end c. Vertical d. Horizontal
ANSWER: b
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications. a. Backup and recovery b. System support c. Performance monitoring and tuning d. Security auditing and monitoring
ANSWER: b
_____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely. a. Normalized b. Data warehouse c. Temporary d. Report
ANSWER: b
_____ fragmentation refers to the division of a relation into subsets of tuples. a. Vertical b. Horizontal c. Data d. Mixed
ANSWER: b
From a database point of view, the collection of data becomes meaningful only when it reflects properly defined _____.
ANSWER: business rules
A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence. a. partial dependency b. transitive dependency c. repeating group d. primary key
ANSWER: c
A _____ lock will lock the entire diskpage. a. transaction-level b. table-level c. page-level d. row-level
ANSWER: c
A _____ relationship exists when three entities are associated. a. unary b. strong c. ternary d. weak
ANSWER: c
A data administrator is also known as a(n) _____. a. data security officer b. systems administrator c. information resource manager d. information engineering officer
ANSWER: c
In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up. a. transaction log backup b. conservative backup c. differential backup d. adaptive backup
ANSWER: c
In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools. a. access plan b. active data dictionary c. information systems architecture d. security policy
ANSWER: c
A(n) _____ is a collection of similar objects with a shared structure and behavior.
ANSWER: class
The entity relationship diagram (ERD) represents the _____ database as viewed by the end user. a. condensed b. physical c. logical d. conceptual
ANSWER: d
The only way to access the data in a database is through the DBMS. a. True b. False
a. True
Corporations use only structured data. a. True b. False
b. False
Data is the result of processing raw facts to reveal its meaning. a. True b. False
b. False
A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization. a. desktop b. workgroup c. enterprise d. transactional
b. Workgroup
A(n) _____ database is used by an organization and supports many users across many departments. a. desktop b. workgroup c. enterprise d. transactional
c. Enterprise
_____ is the body of information and facts about a specific subject. a. Validation b. A format c. Knowledge d. A database
c. Knowledge
The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event. a. True b. False
ANSWER: False
The hierarchical model is software-independent. a. True b. False
ANSWER: False
The order of the rows and columns is important to the DBMS. a. True b. False
ANSWER: False
Time stamps must only have the single property of uniqueness. a. True b. False
ANSWER: False
Date procedures are often more software-specific than other SQL procedures. a. True b. False
ANSWER: True
The phenomenon of uncommitted data occurs when two transactions are executed concurrently and the first transaction is rolled back after the second transaction has already accessed the uncommitted data—thus violating the isolation property of transactions. a. True b. False
ANSWER: True
The practical significance of taking the logical view of a database is that it serves as a reminder of the simple file concept of data storage. a. True b. False
ANSWER: True
The term "database development" is used to describe the process of database design and implementation. a. True b. False
ANSWER: True
_____ is a language based on OO concepts that describes a set of diagrams and symbols used to graphically model a system.
ANSWER: UML (Unified Modeling Language) Unified Modeling Language (UML) Unified Modeling Language UML
The _____ specification is used to avoid having duplicated values in a column.
ANSWER: UNIQUE
"_____" means that the names of the relation attributes must be the same and their data types must be alike.
ANSWER: Union-compatible
A _____ attribute can be further subdivided to yield additional attributes. a. composite b. simple c. single-valued d. multivalued
ANSWER: a
A _____ is any key that uniquely identifies each row. a. superkey b. special key c. foreign key d. candidate key
ANSWER: a
A _____ lets a single SQL statement access the data that are to be processed by a single remote database processor. a. remote request b. remote transaction c. distributed request d. distributed transaction
ANSWER: a
A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. a. outer b. inner c. equi- d. cross
ANSWER: a
An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence. a. existence b. relationship c. business d. data
ANSWER: a
Another name for a composite entity is a(n) _____ entity. a. bridge b. linked c. directive d. associative
ANSWER: a
Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B. a. determines b. derives from c. controls d. owns
ANSWER: a
Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design. a. information b. entity c. design d. processing
ANSWER: a
From a structural point of view, 2NF is better than _____. a. 1NF b. 3NF c. 4NF d. BCNF
ANSWER: a
Ideally, an entity identifier is composed of _____ attribute(s). a. one b. two c. three d. six
ANSWER: a
In subquery terminology, the first query in the SQL statement is known as the _____ query. a. outer b. left c. inner d. base
ANSWER: a
In the _____ model, the basic logical structure is represented as an upside-down tree. a. hierarchical b. network c. relational d. entity relationship
ANSWER: a
In a relational table, each column has a specific range of values known as the _____ domain.
ANSWER: attribute
A _____ attribute is one that cannot be subdivided. a. composite b. simple c. single-valued d. multivalued
ANSWER: b
A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship. a. strong b. weak c. business d. child
ANSWER: b
BCNF can be violated only if the table contains more than one _____ key. a. primary b. candidate c. foreign d. secondary
ANSWER: b
Data warehouse routinely uses _____ structures in its complex, multilevel, multisource data environment. a. 1NF b. 2NF c. 3NF d. 4NF
ANSWER: b
In a(n) _____ diagram, the arrows above the attributes indicate all desirable dependencies. a. Chen b. dependency c. functionality d. ER
ANSWER: b
In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent. a. hierarchical b. network c. object-oriented d. entity relationship
ANSWER: b
Rapid ad hoc data became unnecessary in the quick-response decision-making environment. a. True b. False
ANSWER: False
The level of transparency supported by the distributed database management system remains the same for all systems. a. True b. False
ANSWER: False
ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. a. True b. False
ANSWER: True
After the initial declarations in Database Life Cycle (DBLC), the database designer must carefully probe in order to generate additional information that will help define the problem within the larger framework of company operations. a. True b. False
ANSWER: True
_____ are normally expressed in the form of rules. a. Attributes b. Entities c. Relationships d. Constraints
ANSWER: d
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. a. Integrity b. Compliance c. Availability d. Confidentiality
ANSWER: d
Which of the following is a hardware-induced database failure? a. Memory chip errors b. Viruses c. Malware d. Abortion due to deadlock
ANSWER: a
The _____ relationship is the "relational model ideal." a. 1:1 b. 1:M c. M:1 d. M:N
ANSWER: b
The _____ rule requires that all copies of data fragments be identical. a. shared fragment b. mutual consistency c. horizontal fragmentation d. replication
ANSWER: b
The conceptual model can handle _____ relationships and multivalued attributes. a. 1:1 b. M:N c. 1:M d. 1:N
ANSWER: b
In Oracle, the _____ function converts a date to a character string. a. CONVERT() b. TO_DATE c. TO_CHAR() d. TO_STRING()
ANSWER: c
The web is the repository for distributed data. a. True b. False
ANSWER: True
A(n) _____ is an alternate name given to a column or table in any SQL statement. a. alias b. data type c. stored function d. trigger
ANSWER: a
Each table _____ represents an attribute. a. column b. row c. dimension d. value
ANSWER: a
In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's: a. lower levels. b. top levels. c. target markets. d. customer base.
ANSWER: a
A(n) _____ data dictionary is automatically updated by the DBMS with every database access. a. dynamic b. active c. passive d. static
ANSWER: b
Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be semantically correct. a. True b. False
ANSWER: True
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations. a. True b. False
ANSWER: True
An entity in the entity relationship model corresponds to a table in the relational environment. a. True b. False
ANSWER: True
In order to manage distributed data, copies or parts of the database processing functions must be distributed to all data storage sites. a. True b. False
ANSWER: True
In the Chen and Crow's Foot notations, an entity is represented with a rectangle containing the entity's name. a. True b. False
ANSWER: True
In the Systems Development Life Cycle (SDLC), problems defined during the planning phase are examined in greater detail during the analysis phase. a. True b. False
ANSWER: True
In the context of data models, an entity is a person, place, thing, or event about which data will be collected and stored. a. True b. False
ANSWER: True
It is possible for a table in 2NF to exhibit transitive dependency, where the primary key may rely on one or more nonprime attributes to functionally determine other nonprime attributes. a. True b. False
ANSWER: True
Since a partial dependency can exist only if a table's primary key is composed of several attributes, if a table in 1NF has a single-attribute primary key, then the table is automatically in 2NF. a. True b. False
ANSWER: True
The database contents might be loaded interactively or in batch mode using a variety of methods and devices including customized user programs. a. True b. False
ANSWER: True
The multiuser DBMS must implement controls to ensure serializability and isolation of transactions, in addition to atomicity and durability, in order to guard the database's consistency and integrity. a. True b. False
ANSWER: True
The network model has structural level dependence. a. True b. False
ANSWER: True
A(n) _____ is bidirectional. a. attribute b. entity c. relationship d. constraint
ANSWER: c
A(n) _____'s main function is to help one understand the complexities of the real-world environment. a. node b. entity c. model d. database
ANSWER: c
An operational database is sometimes referred to as an enterprise database. a. True b. False
b. False
Raw data must be properly _____ for storage, processing and presentation.
formatted
When a database stores the majority of data in RAM rather than in hard disks, it is referred to as a(n) _____ database.
in-memory
_____ exists when different versions of the same data appear in different places. a. Data inconsistency b. Poor data security c. Structural dependence d. Conceptual dependence
a. Data inconsistency
In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities. a. (max, min) b. (min, max) c. [min ... max] d. {min
max}| ANSWER: b
A(n) _____ is a specific request issued to the DBMS for data manipulation.
query
All SQL commands must be issued on a single line. a. True b. False
ANSWER: False
An alias cannot be used when a table is required to be joined to itself in a recursive query. a. True b. False
ANSWER: False
Comparison operators cannot be used to place restrictions on character-based attributes. a. True b. False
ANSWER: False
Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure. a. True b. False
ANSWER: False
The idea of determination is unique to the database environment. a. True b. False
ANSWER: False
A distributed database management system (DDBMS) governs the storage and processing of logically related data over interconnected computer systems. a. True b. False
ANSWER: True
M:N relationships are not appropriate in a relational model. a. True b. False
ANSWER: True
The basic SQL vocabulary has fewer than _____words.
ANSWER: 100 one hundred a hundred
The term _____ describes the strength of the relationships found among a module's entities.
ANSWER: cohesivity
In a basic distributed processing environment, the distributed processing system shares the database chores among three sites connected through a(n) _____.
ANSWER: communications network
The _____ is central to a discussion of normalization.
ANSWER: concept of keys
The _____ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.
ANSWER: conceptual design
The first step in _____ is to discover the data element characteristics.
ANSWER: conceptual design
One advantage of a database system over previous data management approaches is that the database system is considerably less complex. a. True b. False
b. False
The response of the DBMS to a query is the ___________ a. ad hoc query b. ad hoc response c. query result set d. integrated view of the data
c. Query result set
_____ data exist in a format that does not lend itself to processing that yields information. a. Structured b. Semistructured c. Unstructured d. Historical
c. Unstructured
_____ data exist in the format in which they were collected. a. Structured b. Semistructured c. Unstructured d. Historical
c. Unstructured
A _____ is a logically connected set of one or more fields that describes a person, place, or thing. a. database b. column c. record d. file
c. record
Web and mobile technologies that enable "anywhere, anytime, always on" human interactions are forms of _____.
social media
Each row in the relational table is known as an entity instance or entity occurrence in the ER model. a. True b. False
ANSWER: True
The DIFFERENCE operator subtracts one table from the other. a. True b. False
ANSWER: True
A disadvantage of a distributed database management system (DDBMS) is: a. slower data access. b. site additions affects other operations. c. processor dependence. d. lack of standards.
ANSWER: d
_____ is a special language used to represent and manipulate data elements in a textual format.
XML (Extensible Markup Language) Extensible Markup Language (XML) Extensible Markup Language XML
_____ serve as the intermediary between the user and the database. a. DBMSs b. Metadata c. End-user data d. Programming languages
a. DBMSs
A _____ is a character or group of characters that has a specific meaning. a. database b. field c. record d. file
b. field
A(n) _____ is a collection of programs that manages the database structure and controls access to the data stored in the database.
DBMS (database management system) database management system (DBMS) database management system DBMS
Database programming languages receive all application requests and translate them into the complex operations required to fulfill those requests. a. True b. False
b. False
If one department chair—a professor—can chair only one department, and one department can have only one department chair. The entities PROFESSOR and DEPARTMENT exhibit a(n) _____ relationship.
ANSWER: 1:1
One characteristic of generalization hierarchies is that they are implemented as _____ relationships.
ANSWER: 1:1
The _____ relationship is the relational database norm.
ANSWER: 1:M
All relational tables satisfy the _____ requirements.
ANSWER: 1NF first normal form first normal form (1NF) 1NF (first normal form)
In the _____, no row may contain two or more multivalued facts about an entity.
ANSWER: 4NF fourth normal form fourth normal form (4NF) 4NF (fourth normal form)
_____ are characteristics of entities.
ANSWER: Attributes
_____ are usually provided by the database management system (DBMS) to check for access violations.
ANSWER: Audit trails
The movement to find new and better ways to manage large amounts of web- and sensor-generated data and derive business insight from it, while simultaneously providing high performance and scalability at a reasonable cost is referred to as "_____."
ANSWER: Big Data
_____ functions allow you to take a value of a given data type and convert it to the equivalent value in another data type.
ANSWER: Conversion
In _____, a three-pronged symbol represents the "many" side of the relationship.
ANSWER: Crow's Foot notation
When designing a new database structure based on the business requirements of the end users, the database designer will construct a data model using a technique such as _____.
ANSWER: Crow's Foot notation ERDs
The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
ANSWER: DA data administrator
Most multiuser _____ automatically initiate and enforce locking procedures, where all locking information is managed by the lock manager.
ANSWER: DBMSs database management systems database management systems (DBMSs)
The _____ protocol is used by a DP to roll transactions back and forward with the help of the system's transaction log entries.
ANSWER: DO-UNDO-REDO DO UNDO REDO do-undo-redo do undo redo
_____ allow end users to access the database without being able to download the information from their workstations.
ANSWER: Diskless workstations
_____ not only helps database designers to stay on track during the design process, it also enables them to pick up the design thread when the time comes to modify the design.
ANSWER: Documentation
The _____ statement in SQL combines rows from two queries and returns only the rows that appear in the first set but not in the second.
ANSWER: EXCEPT
A dependency of one nonprime attribute on another nonprime attribute is a partial dependency. a. True b. False
ANSWER: False
A disadvantage of the relational database management system (RDBMS) is its inability to hide the complexities of the relational model from the user. a. True b. False
ANSWER: False
A distributed database management system (DDBMS) must be communications-media-dependent. a. True b. False
ANSWER: False
A growing phase in a two-phase lock is when a transaction acquires all the required locks without locking any data. a. True b. False
ANSWER: False
A lock guarantees the open use of a data item to multiple transactions. a. True b. False
ANSWER: False
A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date. a. True b. False
ANSWER: False
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions. a. True b. False
ANSWER: False
A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance. a. True b. False
ANSWER: False
A shared lock produces no conflict as long as all the concurrent transactions are read-write only. a. True b. False
ANSWER: False
A system maintenance activity generated in response to changes in the business environment is referred to as corrective maintenance. a. True b. False
ANSWER: False
A table is in BCNF if every determinant in the table is a foreign key. a. True b. False
ANSWER: False
A transaction processor (TP) is the software component residing on each computer that stores and retrieves data located at the site. a. True b. False
ANSWER: False
A weak relationship exists if the primary key of the related entity contains at least one primary key component of the parent entity. a. True b. False
ANSWER: False
An implementation-ready data model needn't necessarily contain enforceable rules to guarantee the integrity of the data. a. True b. False
ANSWER: False
Atomicity indicates the permanence of the database's consistent state. a. True b. False
ANSWER: False
Business rules apply to businesses and government groups, but not to other types of organizations such as religious groups or research laboratories. a. True b. False
ANSWER: False
Character data can contain any character or symbol intended for mathematical manipulation. a. True b. False
ANSWER: False
Composite attributes make it easier to facilitate detailed queries. a. True b. False
ANSWER: False
Data stored at their highest level of granularity are said to be atomic data. a. True b. False
ANSWER: False
Database designers determine the data and information that yield the required understanding of the entire business. a. True b. False
ANSWER: False
Dependencies that are based on only a part of a composite primary key are called transitive dependencies. a. True b. False
ANSWER: False
Distributed database systems do not require complex mechanisms to manage transactions and ensure the database's consistency and integrity. a. True b. False
ANSWER: False
Distributed processing does not require a distributed database, and a distributed database does not require distributed processing. a. True b. False
ANSWER: False
Durability requires that all portions of the transaction must be treated as a single, logical unit of work in which all operations are applied and completed to produce a consistent database. a. True b. False
ANSWER: False
Evaluation of database performance is rendered easier by the fact there are no standards to measure it. a. True b. False
ANSWER: False
In an SQL-based relational database, each table is dependent on every other table. a. True b. False
ANSWER: False
In implementation terms, an entity is existence-dependent if it has a mandatory primary key. a. True b. False
ANSWER: False
In the Systems Development Life Cycle(SDLC), the design of the system's processes begins in the detailed systems design phase. a. True b. False
ANSWER: False
In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the system. a. True b. False
ANSWER: False
Incremental backups produce a backup of all data. a. True b. False
ANSWER: False
Most SQL implementations yield case-insensitive searches. a. True b. False
ANSWER: False
Most real-world database transactions are formed by only one database request. a. True b. False
ANSWER: False
Normalization is a process that is used for changing attributes to entities. a. True b. False
ANSWER: False
Normalization purity is often easy to sustain in the modern database environment. a. True b. False
ANSWER: False
One of the advantages of a distributed database management system (DDBMS) is security. a. True b. False
ANSWER: False
One of the advantages of a distributed database management system (DDBMS) is that the data is located near the site with the least demand. a. True b. False
ANSWER: False
Only a single attribute, not multiple attributes, can define functional dependence. a. True b. False
ANSWER: False
Oracle users can use the Access QBE (query by example) query generator. a. True b. False
ANSWER: False
Referential integrity and participation are both bidirectional, meaning that they must be addressed in both directions along a relationship. a. True b. False
ANSWER: False
Relationships between entities always operate in one direction. a. True b. False
ANSWER: False
Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. a. True b. False
ANSWER: False
Software vendors have adopted the Chen representation because of its compact representation. a. True b. False
ANSWER: False
The COMMIT command does not permanently save all changes. In order to do that, you must use SAVE. a. True b. False
ANSWER: False
The Crow's Foot notation easily identifies multivalued attributes. a. True b. False
ANSWER: False
The Crow's Foot notation is less implementation-oriented than the Chen notation. a. True b. False
ANSWER: False
The Systems Development Life Cycle (SDLC) is a sequential process rather than an iterative process. a. True b. False
ANSWER: False
The analysis phase of the Systems Development Life Cycle (SDLC) involves a cycle of coding, testing, and debugging. a. True b. False
ANSWER: False
The entity relationship model (ERM) is dependent on the database type. a. True b. False
ANSWER: False
The existence of a mandatory relationship indicates that the minimum cardinality is 0 or 1 for the mandatory entity. a. True b. False
ANSWER: False
The external model is the representation of the database as "seen" by the DBMS. a. True b. False
ANSWER: False
The implementation phase of database design includes creating the database storage structure and loading the database, but does not provide for data management. a. True b. False
ANSWER: False
The one-to-many (1:M) relationship is easily implemented in the relational model by putting the foreign key of the "1" side in the table of the "many" side as a primary key. a. True b. False
ANSWER: False
The overall purpose of the database initial study is to create the conceptual design. a. True b. False
ANSWER: False
The relational model is hardware-dependent and software-independent. a. True b. False
ANSWER: False
The row's range of permissible values is known as its domain. a. True b. False
ANSWER: False
The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations. a. True b. False
ANSWER: False
The serializable isolation level is the least restrictive level defined by the ANSI SQL standard. a. True b. False
ANSWER: False
The testing and evaluation phase of the Database Life Cycle (DBLC) occurs after applications programming. a. True b. False
ANSWER: False
You cannot insert a row containing a null attribute value using SQL. a. True b. False
ANSWER: False
Rows can be grouped into smaller collections quickly and easily using the _____ clause within the SELECT statement.
ANSWER: GROUP BY
_____ refers to the level of detail represented by the values stored in a table's row.
ANSWER: Granularity
The _____ clause of the GROUP BY statement operates very much like the WHERE clause in the SELECT statement.
ANSWER: HAVING
The _____ operator could be used in place of INTERSECT if the DBMS does not support it.
ANSWER: IN
_____ are underlined in an ER diagram.
ANSWER: Identifiers
_____ is the real power behind the relational database, allowing the use of independent tables linked by common attributes.
ANSWER: JOIN
_____ can take place at any of the following levels: database, table, page, row, or field.
ANSWER: Locking
_____ relationships cannot be implemented as such in the relational model.
ANSWER: M:N
The _____ operator could be used in place of EXCEPT (MINUS) if the DBMS does not support it.
ANSWER: NOT IN
_____ is a process to help reduce the likelihood of data anomalies.
ANSWER: Normalization
DATE() and SYSDATE are special functions that return today's date in MS Access and _____, respectively.
ANSWER: Oracle
_____ could become a very technical job that affects not only the accessibility of the data in the storage device(s) but also the performance of the system.
ANSWER: Physical design
If database tables are treated as though they were files in a file system, the _____ never has a chance to demonstrate its superior data-handling capabilities.
ANSWER: RDBMS relational database management system relational database management system (RDBMS) RDBMS (relational database management system)
If a(n) _____ is issued before the termination of a transaction, the DBMS will restore the database only for that particular transaction, rather than for all transactions, in order to maintain the durability of the previous transactions.
ANSWER: ROLLBACK
_____ ensure that a disk physical failure will not impair the DBMS's ability to recover data.
ANSWER: Redundant transaction logs
The _____ command, coupled with appropriate search conditions, is an incredibly powerful tool that enables a user to transform data into information.
ANSWER: SELECT
_____ is the process that establishes the need for, and the extent of, an information system.
ANSWER: Systems analysis
_____-level locks are less restrictive than database-level locks, but they create traffic jams when many transactions are waiting to access the same table.
ANSWER: Table
_____ management ensures that data move from one consistent state to another.
ANSWER: Transaction
A composite identifier is a primary key composed of more than one attribute. a. True b. False
ANSWER: True
A data model is usually graphical. a. True b. False
ANSWER: True
A database language enables the user to perform complex queries designed to transform the raw data into useful information. a. True b. False
ANSWER: True
A database management system (DBMS) must have validation, transformation, and mapping functions, as well as other functions, in order to be classified as distributed. a. True b. False
ANSWER: True
A field-level lock allows concurrent transactions to access the same row, as long as they require the use of different fields within that row. a. True b. False
ANSWER: True
A full backup, or database dump, produces a complete copy of the entire database. a. True b. False
ANSWER: True
A fully distributed database management system (DBMS) must perform all the functions of a centralized DBMS, and it must handle all necessary functions imposed by the distribution of data and processing. a. True b. False
ANSWER: True
A null is created when you press the Enter key or the Tab key to move to the next entry without making a prior entry of any kind. a. True b. False
ANSWER: True
A scheduler facilitates data isolation to ensure that two transactions do not update the same data element at the same time. a. True b. False
ANSWER: True
A system is always at some stage of SDLC because every request for structural changes requires retracing the steps of the Systems Development Life Cycle (SDLC). a. True b. False
ANSWER: True
A table is in fourth normal form if it is in third normal form and has no independent multivalued dependencies. a. True b. False
ANSWER: True
A weak entity has a primary key that is partially or totally derived from the parent entity in the relationship. a. True b. False
ANSWER: True
All relational tables satisfy the 1NF requirements. a. True b. False
ANSWER: True
Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command's components. a. True b. False
ANSWER: True
An implementation-ready data model should contain a description of the data structure that will store the end-user data. a. True b. False
ANSWER: True
An optimistic approach is based on the assumption that the majority of the database operations do not conflict. a. True b. False
ANSWER: True
As rare as 1:1 relationships should be, certain conditions absolutely require their use. a. True b. False
ANSWER: True
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database. a. True b. False
ANSWER: True
Business rules must be rendered in writing. a. True b. False
ANSWER: True
Connectivities and cardinalities are established by concise statements known as business rules. a. True b. False
ANSWER: True
Current distributed database management system (DDBMS) are subject to some problems, such as the complexity of management and control. a. True b. False
ANSWER: True
Data integrity is enforced by the database management system (DBMS) through the proper use of primary and foreign key rules. a. True b. False
ANSWER: True
Denormalization produces a lower normal form. a. True b. False
ANSWER: True
Dependency diagrams are very helpful in getting a bird's-eye view of all the relationships among a table's attributes. a. True b. False
ANSWER: True
Depending on the sophistication of the application development software, nulls can create problems when functions such as COUNT, AVERAGE, and SUM are used. a. True b. False
ANSWER: True
Distributed data access was needed to support geographically dispersed business units. a. True b. False
ANSWER: True
Distributed processing shares a database's logical processing among two or more physically independent sites that are connected through a network. a. True b. False
ANSWER: True
Distribution transparency is supported by a distributed data dictionary. a. True b. False
ANSWER: True
Each table in a relational database must have a primary key. a. True b. False
ANSWER: True
In order to meet performance requirements, portions of the database design may need to be occasionally denormalized. a. True b. False
ANSWER: True
In the detailed systems design phase of the Systems Development Life Cycle (SDLC), steps are laid out for the conversion of a database from an old system to a new system. a. True b. False
ANSWER: True
In the entity relationship model, a table row corresponds to an entity instance. a. True b. False
ANSWER: True
In the original Chen notation, each attribute is represented by an oval with the attribute name connected to an entity rectangle with a line. a. True b. False
ANSWER: True
Normalization represents a micro view of the entities within the ERD. a. True b. False
ANSWER: True
Normalization works through a series of stages called normal forms. a. True b. False
ANSWER: True
Performance transparency ensures that the system finds the most cost-effective path to access remote data. a. True b. False
ANSWER: True
RDBMSs enforce integrity rules automatically. a. True b. False
ANSWER: True
Relational algebra defines the theoretical way of manipulating table contents using relational operators. a. True b. False
ANSWER: True
Relational models view data as part of a table or collection of tables in which all key values must be identified. a. True b. False
ANSWER: True
Repeating groups must be eliminated by ensuring that each row defines a single entity. a. True b. False
ANSWER: True
SQL allows the use of logical restrictions on its inquiries such as OR, AND, and NOT. a. True b. False
ANSWER: True
Some RDBMSs, such as Microsoft Access, automatically make the necessary conversions to eliminate case sensitivity. a. True b. False
ANSWER: True
String comparisons are made from left to right. a. True b. False
ANSWER: True
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications. a. True b. False
ANSWER: True
Systems analysis establishes the need for an information system and its extent. a. True b. False
ANSWER: True
Testing procedures and standards must already be in place before any application program can be approved for use in the company. a. True b. False
ANSWER: True
The ANSI SQL standards are also accepted by the ISO. a. True b. False
ANSWER: True
The COUNT function is designed to tally the number of non-null "values" of an attribute, and is often used in conjunction with the DISTINCT clause. a. True b. False
ANSWER: True
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department. a. True b. False
ANSWER: True
The DBA interacts with the end user by providing data and information support services to the organization's departments. a. True b. False
ANSWER: True
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format. a. True b. False
ANSWER: True
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy. a. True b. False
ANSWER: True
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure. a. True b. False
ANSWER: True
The DIVIDE operation uses one single-column table (e.g., column "a") as the divisor and one two-column table (e.g., columns "a" and "b") as the dividend. a. True b. False
ANSWER: True
The Systems Development Life Cycle (SDLC) traces the history of an information system. a. True b. False
ANSWER: True
The Systems Development Life Cycle's (SDLC's) planning phase yields a general overview of the company and its objectives. a. True b. False
ANSWER: True
The combination of normalization and ER modeling yields a useful ERD, whose entities can be translated into appropriate table structures. a. True b. False
ANSWER: True
The objective of normalization is to ensure that each table conforms to the concept of well-formed relations. a. True b. False
ANSWER: True
The primary objective in database design is to create complete, normalized, nonredundant, and fully integrated conceptual, logical, and physical database models. a. True b. False
ANSWER: True
The scheduler establishes the order in which the operations within concurrent transactions are executed. a. True b. False
ANSWER: True
The storage locations for multiple backups must include sites inside and outside the organization. a. True b. False
ANSWER: True
The transaction processor (TP) is the software component found in each computer that requests data. a. True b. False
ANSWER: True
Time stamping demands a lot of system resources because many transactions might have to be stopped, rescheduled, and restamped. a. True b. False
ANSWER: True
To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the relationships are mandatory or optional. a. True b. False
ANSWER: True
Today, most relational database products can be classified as object/relational. a. True b. False
ANSWER: True
When using an optimistic approach, during the read phase, a transaction reads the database, executes the needed computations, and makes the updates to a private copy of the database values. a. True b. False
ANSWER: True
Within the database environment, a data model represents data structures with the purpose of supporting a specific problem domain. a. True b. False
ANSWER: True
You can select partial table contents by naming the desired fields and by placing restrictions on the rows to be included in the output. a. True b. False
ANSWER: True
You can think of a table as a persistent representation of a logical relation. a. True b. False
ANSWER: True
"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance
ANSWER: a
A _____ contains at least all of the attribute names and characteristics for each table in the system. a. data dictionary b. relational schema c. logical schema d. database
ANSWER: a
A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems. a. fully heterogeneous b. fully homogeneous c. homogeneous d. heterogeneous
ANSWER: a
A _____ relationship exists when an association is maintained within a single entity. a. unary b. ternary c. strong d. weak
ANSWER: a
A _____ request lets a single SQL statement reference data located at several different local or remote DP sites. a. distributed b. transaction c. fragmented d. remote
ANSWER: a
A centralized database management is subject to a problem such as _____. a. growing numbers of remote locations b. maintaining and operating small database systems c. dependence on multiple sites d. organizational flexibility of the database
ANSWER: a
A noun in a business rule translates to a(n) _____ in the data model. a. entity b. attribute c. relationship d. constraint
ANSWER: a
A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF
ANSWER: a
A(n) _____ condition occurs when two or more transactions wait for each other to unlock data. a. deadlock b. exclusive lock c. binary lock d. two-phase lock
ANSWER: a
A(n) _____ is the equivalent of a field in a file system. a. attribute b. entity c. relationship d. constraint
ANSWER: a
A(n) _____ is the set of possible values for a given attribute. a. domain b. range c. identifier d. key
ANSWER: a
A(n) _____ join will select only the rows with matching values in the common attribute(s). a. natural b. outer c. full d. cross
ANSWER: a
A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock. a. shared b. exclusive c. binary d. two-phase
ANSWER: a
A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time. a. access b. completion c. application d. communications
ANSWER: a
According to Codd's _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. a. nonsubversion b. information c. guaranteed access d. view updating
ANSWER: a
From a structural point of view, 3NF is better than _____. a. 2NF b. 3NF c. 5NF d. 6NF
ANSWER: a
From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices. a. derived b. atomic c. granular d. historical
ANSWER: a
Improving _____ leads to more flexible queries. a. atomicity b. normalization c. denormalization d. derived attribute
ANSWER: a
In a _____ situation, one key determines multiple values of two other attributes and those attributes are independent of each other. a. multivalued dependency b. transitive dependency c. partial dependency d. functional dependency
ANSWER: a
In the _____ model, each parent can have many children, but each child has only one parent. a. hierarchical b. network c. relational d. entity relationship
ANSWER: a
In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____. a. data analysis and requirements b. entity relationship modeling and normalization c. data model verification d. distributed database design
ANSWER: a
In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values. a. read b. validation c. write d. shared
ANSWER: a
Lock _____ indicates the level of lock use. a. granularity b. shrinking c. growing d. serializability
ANSWER: a
One of the three most common data integrity and consistency problems is _____. a. lost updates b. disk failures c. user errors d. deadlocks
ANSWER: a
Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. a. integrity b. uniqueness c. model d. attribute
ANSWER: a
The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. a. entity b. referential c. relational d. null
ANSWER: a
The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. a. COUNT b. MIN c. MAX d. SUM
ANSWER: a
The _____ relationship should be rare in any relational database design. a. 1:1 b. 1:M c. M:1 d. M:N
ANSWER: a
The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities. a. M:N b. 1:M c. N:1 d. M:1
ANSWER: a
The hierarchical data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s
ANSWER: a
The last step in the Database Life Cycle (DBLC) is _____. a. maintenance and evolution b. operation c. testing and evaluation d. implementation and loading
ANSWER: a
The process of creating an information system is known as _____. a. systems development b. database development c. network development d. enterprise development
ANSWER: a
The result of the _____ phase of the Systems Development Life Cycle (SDLC) should be a better understanding of the system's functional areas, actual and potential problems, and opportunities. a. analysis b. implementation c. detailed systems design d. maintenance
ANSWER: a
The special operator used to check whether an attribute value is within a range of values is _____. a. BETWEEN b. NULL c. LIKE d. IN
ANSWER: a
What rule applies to the two-phase locking protocol? a. Two transactions cannot have conflicting lock. b. No unlock operation can precede a lock operation in a different transaction. c. No data is affected until all locks are released. d. No data is affected until the transaction is in its locked position.
ANSWER: a
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system. a. cultural b. managerial c. technical d. operational
ANSWER: a
When the specific cardinalities are not included on the diagram in Crow's Foot notation, cardinality is implied by the use of _____. a. symbols b. attributes c. images d. tables
ANSWER: a
When using the Oracle TO_DATE function, the code _____ represents a three-letter month name. a. MON b. MM3 c. MONTH d. MM
ANSWER: a
Which property of the CAP theorem assumes that all transaction operations take place at the same time in all nodes, as if they were executing in a single-node database? a. Consistency b. Partition tolerance c. Availability d. Performance transparency
ANSWER: a
Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? a. SELECT ONLY V_CODE FROM PRODUCT; b. SELECT UNIQUE V_CODE FROM PRODUCT; c. SELECT DIFFERENT V_CODE FROM PRODUCT; d. SELECT DISTINCT V_CODE FROM PRODUCT;
ANSWER: a
_____ CASE tools provide support for the planning, analysis, and design phases. a. Front-end b. Back-end c. Vertical d. Horizontal
ANSWER: a
_____ are required to prevent another transaction form reading inconsistent data. a. Locks b. Schedules c. Stamps d. Logs
ANSWER: a
_____ can render data useless to unauthorized users who might have violated some of the database security layers. a. Data encryption b. Access rights c. Physical security d. Password security
ANSWER: a
_____ transparency allows data to be updated simultaneously at several network sites. a. Transaction b. Distribution c. Failure d. Performance
ANSWER: a
An attribute that cannot be further subdivided is said to display _____.
ANSWER: atomicity
An index key can have multiple _____ (a composite index).
ANSWER: attributes
"All users must have passwords" is an example of a _____. a. rule b. policy c. standard d. procedure
ANSWER: b
"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance
ANSWER: b
A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes. a. secondary b. candidate c. primary d. foreign
ANSWER: b
A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table. a. database-level b. table-level c. page-level d. row-level
ANSWER: b
A consistent database state is one in which all _____. a. tables have foreign keys b. data integrity constraints are satisfied c. table are normalized d. SQL statements only update one table at a time
ANSWER: b
A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity. a. single line b. dashed line c. double dashed line d. double line
ANSWER: b
A distributed _____ contains the description of the entire database as seen by the database administrator. a. global index b. data dictionary c. global catalog d. data thesaurus
ANSWER: b
A distributed database is composed of several parts known as database _____. a. sections b. fragments c. partitions d. parts
ANSWER: b
A relationship is an association between _____. a. objects b. entities c. databases d. fields
ANSWER: b
A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run. a. active b. passive c. static d. dynamic
ANSWER: b
A(n) _____ database stores each database fragment at a single site. a. partially replicated b. unreplicated c. fully replicated d. partitioned
ANSWER: b
A(n) _____ enables a database administrator to describe schema components. a. extensible markup language (XML) b. data definition language (DDL) c. unified modeling language (UML) d. query language
ANSWER: b
A(n) _____ is anything about which data are to be collected and stored. a. attribute b. entity c. relationship d. constraint
ANSWER: b
A(n) _____ join performs a relational product (also known as the Cartesian product) of two tables. a. full b. cross c. natural d. equi-
ANSWER: b
A(n) _____ only returns matched records from the tables that are being joined. a. outer join b. inner join c. equijoin d. theta join
ANSWER: b
A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock. a. growing b. shrinking c. locking d. unlocking
ANSWER: b
A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. a. INSERT b. SELECT c. COMMIT d. UPDATE
ANSWER: b
A(n) _____ represents a particular type of object in the real world. a. attribute b. entity c. relationship d. node
ANSWER: b
A(n) _____ specifically reserves access to the transaction that locked the object. a. shared lock b. exclusive lock c. binary lock d. deadlock
ANSWER: b
A(n) _______ enables a database administrator to describe schema components. a. extensible markup language (XML) b. data definition language (DDL) c. unified modeling language (UML) d. query language
ANSWER: b
According to Codd's _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns). a. distribution independence b. logical data independence c. comprehensive data sublanguage d. integrity independence
ANSWER: b
An atomic attribute _____. a. cannot exist in a relational table b. cannot be further subdivided c. displays multiplicity d. is always chosen to be a foreign key
ANSWER: b
At the level of middle management, the database must be able to provide _____. a. frameworks for defining and enforcing organizational policies b. data necessary for tactical decisions and planning c. feedback to monitor whether a company is achieving its goals d. access to external and internal data to identify growth opportunities
ANSWER: b
Database administration operations are commonly defined and divided according to the phases of the _____. a. SLA b. DBLC c. SDLC d. MRA
ANSWER: b
Database design is a(n) _____ process based on repetition. a. sequential b. iterative c. linear d. intermittent
ANSWER: b
Dependencies based on only a part of a composite primary key are known as _____ dependencies. a. primary b. partial c. incomplete d. composite
ANSWER: b
Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation
ANSWER: b
Distributed processing does not require: a. processing function distribution to all storage sites. b. an existing distributed database. c. interconnected networks of components. d. multiple sites to share processing chores.
ANSWER: b
During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model. a. declaration process b. verification process c. conceptual process d. logical process
ANSWER: b
Granularity refers to _____. a. the size of a table b. the level of detail represented by the values in a table's row c. the number of attributes represented in a table d. the number of rows in a table
ANSWER: b
In DBLC, the phase after the database initial study is _____. a. operation b. database design c. database initial study d. implementation and loading
ANSWER: b
In a database context, the word _____ indicates the use of the same attribute name to label different attributes. a. redundancy b. homonym c. duplicate d. synonym
ANSWER: b
In a real-world environment, we must strike a balance between design integrity and _____. a. robustness b. flexibility c. uniqueness d. ease of use
ANSWER: b
In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. a. relations b. keys c. indexes d. logical structures
ANSWER: b
Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process. a. two b. three c. four d. five
ANSWER: b
The SQL data manipulation command HAVING: a. restricts the selection of rows based on a conditional expression. b. restricts the selection of grouped rows based on a condition. c. modifies an attribute's values in one or more table's rows. d. groups the selected rows based on one or more attributes.
ANSWER: b
The _____ command restricts the selection of grouped rows based on a condition. a. DISPLAY b. HAVING c. FROM d. CONVERT
ANSWER: b
The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. a. UNIQUE b. NOT NULL c. VALUE d. EMPTY
ANSWER: b
The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application. a. multivalued b. derived c. single-valued d. composite
ANSWER: b
The existence of a(n) _____ entity indicates that its minimum cardinality is zero. a. ternary b. optional c. strong d. weak
ANSWER: b
The first step in building an entity-relationship diagram (ERD) is _____. a. developing the initial ERD b. creating a detailed narrative of the organization's description of operations c. identifying the attributes and primary keys that adequately describe the entities d. identifying the business rules based on the description of operations
ANSWER: b
The first step in the ER model verification process is to _____. a. identify each module and its components b. identify the ER model's central entity c. verify all processes against the ER model d. identify each module's internal transaction requirements
ANSWER: b
The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance
ANSWER: b
The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS
ANSWER: b
The person responsible for the control of the centralized and shared database is the database _____. a. analyst b. administrator c. programmer d. user
ANSWER: b
The relational data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s
ANSWER: b
The special operator used to check whether a subquery returns any rows is _____. a. BETWEEN b. EXISTS c. LIKE d. IN
ANSWER: b
The syntax for a left outer join is _____. a. SELECT column-list FROM table1 OUTER JOIN table2 LEFT WHERE join-condition b. SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition c. SELECT column-list WHERE LEFT table1 = table d. SELECT column-list FROM table1 LEFT table2 [JOIN] WHERE join-condition
ANSWER: b
To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible. a. unary b. binary c. strong d. weak
ANSWER: b
Under the _____ scenario, all record- and file-locking activities are performed at the end-user location. a. single-site processing, single-site data b. multiple-site processing, single-site data c. single-site processing, multiple-site data d. multiple-site processing, multiple-site data
ANSWER: b
User-access management is a subset of _____. a. password protection b. authorization management c. data integrity management d. managerial control
ANSWER: b
VMS/VSAM is an example of the _____. a. hierarchical model b. file system data model c. relational data model d. XML data model
ANSWER: b
When performing user access management, a DBA defines each user to the database at the _____ levels. a. application and DBMS b. operating system and DBMS c. operating system and application d. application and network
ANSWER: b
When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. a. intersect-compatible b. union-compatible c. difference-compatible d. select-compatible
ANSWER: b
Which is a feature of a correlated subquery? a. The inner subquery executes first. b. The outer subquery initiates the process of execution in a subquery. c. The inner subquery initiates the process of execution in a subquery. d. The outer subquery executes independent of the inner subquery.
ANSWER: b
_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. a. Inner joins b. Outer joins c. Equijoins d. Theta joins
ANSWER: b
_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. a. Guidelines b. Standards c. Procedures d. Documentations
ANSWER: b
_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. a. Normalization b. Virtualization c. Specialization d. Generalization
ANSWER: b
_____ requires that all operations of a transaction be completed. a. Specificity b. Atomicity c. Durability d. Time stamping
ANSWER: b
_____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify where these fragments are located. a. Transaction b. Location c. Local mapping d. Fragmentation
ANSWER: b
_____ transparency is the highest level of transparency. The end user or programmer does not need to know that a database is partitioned. a. Performance b. Fragmentation c. Location d. Local mapping
ANSWER: b
The proposed system is subject to limits known as _____, which are external to the system.
ANSWER: boundaries
A(n) _____ is a brief, precise, and unambiguous description of a policy, procedure, or principle within a specific organization.
ANSWER: business rule
A(n) _____ rule is a brief and precise narrative of a policy, procedure, or principle within a specific organization's environment.
ANSWER: business rule
A database management system needs _____ to prepare the data for presentation to the end user or to an application program. a. security b. concurrency control c. formatting d. I/O interface
ANSWER: c
A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time. a. serializability and durability b. atomicity and isolation c. serializability and isolation d. atomicity and serializability
ANSWER: c
A table is in 4NF if it is in 3NF, and _____. a. all attributes must be dependent on the primary key and must be dependent on each other b. all attributes are unrelated c. it has no multivalued dependencies d. no column contains the same values
ANSWER: c
A table that is in 2NF and contains no transitive dependencies is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF
ANSWER: c
A verb associating two nouns in a business rule translates to a(n) _____ in the data model. a. entity b. attribute c. relationship d. constraint
ANSWER: c
A(n) _____ is a query that is embedded (or nested) inside another query. a. alias b. operator c. subquery d. view
ANSWER: c
According to the rules of precedence, which of the following computations should be completed first? a. Additions and subtractions b. Multiplications and divisions c. Operations within parentheses d. Power operations
ANSWER: c
An attribute that is part of a key is known as a(n) _____ attribute. a. important b. nonprime c. prime d. entity
ANSWER: c
As long as two transactions, T1 and T2, access _____ data, there is no conflict, and the order of execution is irrelevant to the final outcome. a. shared b. common c. unrelated d. locked
ANSWER: c
Date attributes contain calendar dates stored in a special format known as the _____ date format. a. Epoch b. calendar c. Julian d. logical
ANSWER: c
In a database context, a(n) _____ indicates the use of different names to describe the same attribute. a. entity b. duplicate c. synonym d. homonym
ANSWER: c
In the optimistic approach, during the _____ phase, changes are permanently applied to the database. a. read b. validation c. write d. shared
ANSWER: c
In the wait/die scheme, the: a. older transaction rolls back the younger transaction and reschedules it. b. younger, preempted transaction is rescheduled using the same time stamp. c. older transaction waits for the younger one to complete and release its locks. d. younger and older transactions both wait indefinitely to be released.
ANSWER: c
MySQL is an example of the _____. a. hierarchical model b. file system data model c. relational data model d. XML data model
ANSWER: c
Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK? a. Five SQL statements are executed. b. The end of a program is successfully reached. c. All changes are aborted and returned to a previous consistent state. d. The database is shut down for maintenance.
ANSWER: c
Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints. a. programmer b. manager c. database administrator d. systems administrator
ANSWER: c
One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time. a. security component b. authorization manager c. initialization parameters d. administrator
ANSWER: c
Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. operation d. testing and evaluation
ANSWER: c
The Crow's foot symbol with two vertical parallel lines indicates _____ cardinality. a. (0,N) b. (1,N) c. (1,1) d. (0,1)
ANSWER: c
The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. a. NVL b. TO_CHAR c. DECODE d. CONVERT
ANSWER: c
The SQL command that allows a user to permanently save data changes is _____. a. INSERT b. SELECT c. COMMIT d. UPDATE
ANSWER: c
The _____ data model is said to be a semantic data model. a. relational b. network c. object-oriented d. entity relationship
ANSWER: c
The _____ data model uses the concept of inheritance. a. relational b. network c. object-oriented d. entity relationship
ANSWER: c
The _____ function returns the current system date in MS Access. a. TO_DATE() b. SYSDATE() c. DATE() d. TODAY()
ANSWER: c
The _____ manager is responsible for assigning and policing the locks used by transactions. a. transaction b. database c. lock d. schedule
ANSWER: c
The _____ phase of the Systems Development Life Cycle (SDLC) includes all the necessary technical specifications for the screens, menus, reports, and other devices used to make the system more efficient. a. analysis b. implementation c. detailed systems design d. maintenance
ANSWER: c
The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC). a. analysis b. detailed systems design c. implementation d. maintenance
ANSWER: c
The first step in developing the conceptual model using ER diagrams is to _____. a. normalize the entities b. complete the initial ER diagram c. identify, analyze, and refine the business rules d. define the attributes, primary keys, and foreign keys for each of the entities
ANSWER: c
The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain. a. database-produced b. network-produced c. CASE-produced d. design-produced
ANSWER: c
The implicit beginning of a transaction is when _____. a. a database is started b. a table is accessed for the first time c. the first SQL statement is encountered d. the COMMIT command is issued
ANSWER: c
The object-oriented data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s
ANSWER: c
The special operator used to check whether an attribute value matches a given string pattern is _____. a. BETWEEN b. IS NULL c. LIKE d. IN
ANSWER: c
To generate a surrogate key, Microsoft Access uses a(n) _____ data type. a. character b. sequence c. AutoNumber d. identity
ANSWER: c
Transaction is a _____ unit of work that must be either entirely completed or aborted. a. time b. practical c. logical d. physical
ANSWER: c
What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE a. set operator b. natural join c. "old-style" join d. procedural statement
ANSWER: c
When using a(n) _____ join, only rows from the tables that match on a common value are returned. a. full b. outer c. inner d. set
ANSWER: c
When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. a. key b. composite c. unique d. primary
ANSWER: c
Which of the following is a reason why a DBMS's daily operations must be clearly documented? a. Documentation of the daily operations help a company set its long-term goals. b. Documentation of the daily operations help manage the manual data resources of a company. c. Documentation of the daily operations help pinpoint causes and solutions of database problems. d. Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.
ANSWER: c
Which of the following is true of business rules? a. They allow the designer to set company policies with regard to data. b. They allow the designer to develop business processes. c. They can serve as a communication tool between the users and designers. d. They provide a framework for the company's self-actualization.
ANSWER: c
Which of the following types of HDFS nodes stores all the metadata about a file system? a. Data node b. Client node c. Name node d. Map node
ANSWER: c
_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals. a. Access Management b. Business Intelligence c. Information engineering (IE) d. MOLAP
ANSWER: c
_____ fragmentation allows a user to break a single object into two or more segments, or fragments. a. Horizontal b. Vertical c. Data d. Request
ANSWER: c
_____ fragmentation refers to the division of a relation into attribute subsets. a. Data b. Horizontal c. Vertical d. Mixed
ANSWER: c
_____ is the delay imposed by the amount of time required for a data packet to make a round trip from point A to point B. a. Data distribution b. Replica transparency c. Network latency d. Network partitioning
ANSWER: c
_____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. a. Serializability b. Atomicity c. Isolation d. Time stamping
ANSWER: c
_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. a. 1:N b. M:1 c. M:N d. 1:1
ANSWER: c
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. a. Debilitative b. Preserving c. Corrupting d. Destructive
ANSWER: c
_____ transparency allows the system to operate as if it were a centralized database management system. a. Heterogeneity b. Distribution c. Performance d. Failure
ANSWER: c
A relationship _____ is difficult to establish if only one side of the relationship is known.
ANSWER: classification
The relational operators have the property of _____ - that is, the use of relational algebra operators on existing relations (tables) produces new relations.
ANSWER: closure
In a distributed database management system (DDBMS), _____ control is used to manage simultaneous data access and ensure data consistency across database fragments.
ANSWER: concurrency
A DDBMS is subject to which restriction? a. Multiple instances of the same database should be integrated over a network. b. All database processing must be done at a single site. c. Rapid ad hoc data access is not possible. d. Remote data access is provided on a read-only basis.
ANSWER: d
A _____ is the primary key of one table that has been placed into another table to create a common attribute. a. superkey b. composite primary key c. candidate key d. foreign key
ANSWER: d
A _____ key is defined as a key that is used strictly for data retrieval purposes. a. lookup b. foreign c. candidate d. secondary
ANSWER: d
A _____ lock allows concurrent transactions to access different rows of the same table. a. database table b. table-level c. page-level d. row-level
ANSWER: d
A diskpage, or page, is the equivalent of a _____. a. database table b. disk sector c. database schema d. diskblock
ANSWER: d
A distributed _____ can reference several different local or remote data processing sites. a. request b. site c. data location d. transaction
ANSWER: d
A relational table must not contain a(n) _____. a. entity b. attribute c. relationship d. repeating group
ANSWER: d
A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF
ANSWER: d
A(n) _____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key. a. partial dependency b. repeating group c. atomic attribute d. transitive dependency
ANSWER: d
A(n) _____ is a logical storage area in Oracle. a. audit log b. datafile c. schema d. tablespace
ANSWER: d
A(n) _____ is a restriction placed on the data. a. attribute b. entity c. relationship d. constraint
ANSWER: d
A(n) _____ is an orderly arrangement used to logically access rows in a table. a. primary rule b. superkey c. relationship d. index
ANSWER: d
A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). a. attribute b. unique c. foreign d. natural
ANSWER: d
ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements _____ and ROLLBACK. a. RETRIEVE b. ASSIGN c. UPDATE d. COMMIT
ANSWER: d
An example of denormalization is using a _____ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows. a. transitive b. 3NF c. component d. temporary
ANSWER: d
Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation
ANSWER: d
Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role. a. operative b. arbitration c. technical d. managerial
ANSWER: d
During _____ data allocation, the database is divided into two or more disjointed parts (fragments) and stored at two or more sites. a. mixed b. replicated c. centralized d. partitioned
ANSWER: d
During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented. a. detailed systems design b. analysis c. maintenance d. implementation
ANSWER: d
How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18? a. 8 b. 18 c. 26 d. 144
ANSWER: d
If Tiny College has some departments that are classified as "research only" and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity. a. existence-dependent on b. independent of c. mandatory for d. optional to
ANSWER: d
If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause. a. OF b. USING c. HAS d. JOIN ON
ANSWER: d
If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute. a. Boyce-Codd normal forms b. redundancies c. time-variances d. partial dependencies
ANSWER: d
If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship. a. self b. self-referring c. looping d. recursive
ANSWER: d
If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity. a. weak b. alone c. unary d. strong
ANSWER: d
In organizations that generate large number of transactions, _____ are often a top priority in database design. a. relationships among entities b. logical design standards c. naming conventions d. high processing speeds
ANSWER: d
In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management. a. database programmer b. systems analyst c. data administrator d. database security officer
ANSWER: d
In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users. a. change tracker b. digital footprint c. paper trail d. audit log
ANSWER: d
In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____. a. database analysis and requirements b. ER modeling and normalization c. data model verification d. distributed database design
ANSWER: d
In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote access from other independent database management systems in the network. a. transaction processor b. application processor c. transaction manager d. data processor
ANSWER: d
Instructions to create a password are an example of a _____. a. rule b. policy c. standard d. procedure
ANSWER: d
Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level. a. object b. attribute c. data d. entity
ANSWER: d
Oracle 12c, MS SQL Server, and Tamino are examples of _____ data models. a. hierarchical b. file system c. relational d. XML Hybrid
ANSWER: d
Some very specialized applications may require normalization beyond the _____. a. 1NF b. 2NF c. 3NF d. 4NF
ANSWER: d
Students and classes have a _____ relationship. a. one-to-one b. one-to-many c. many-to-one d. many-to-many
ANSWER: d
The _____ approach to scheduling concurrent transactions assigns a global unique stamp to each transaction. a. scheduled b. table-locking c. unique d. time stamping
ANSWER: d
The _____ command defines a default value for a column when no value is given. a. CHECK b. UNIQUE c. NOT NULL d. DEFAULT
ANSWER: d
The _____ component of a CASE tool produces the information system's input/output formats. a. analysis b. graphics c. program document generator d. screen painter and report generator
ANSWER: d
The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. a. database tuple b. systematic database c. unique index d. system catalog
ANSWER: d
The _____ isolation level ensures that queries return consistent results. a. read uncommitted b. read committed c. serializable d. repeatable read
ANSWER: d
The _____ model uses the term connectivity to label the relationship types. a. relational b. network c. object-oriented d. entity relationship
ANSWER: d
The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text. a. hierarchical b. network c. object-oriented d. entity relationship
ANSWER: d
The implementation and loading phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS
ANSWER: d
The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash. a. data dictionary b. metadata c. rollback manager d. transaction log
ANSWER: d
The most likely data type for a surrogate key is _____. a. character b. date c. logical d. numeric
ANSWER: d
The objective of _____ optimization is to minimize the total cost associated with the execution of a request. a. data b. remote c. transaction d. query
ANSWER: d
The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases. a. two b. three c. four d. five
ANSWER: d
To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. a. INTERSECT b. UNION c. DIFFERENCE d. SELECT
ANSWER: d
Training principles and methodologies are planned during the _____ phase of the Systems Development Life Cycle (SDLC). a. maintenance b. implementation c. analysis d. detailed systems design
ANSWER: d
When using the Crow's Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity. a. dotted b. double c. triple d. solid
ANSWER: d
Which comparison operator indicates a value is not equal? a. < b. <= c. >= d. <>
ANSWER: d
_____ are important because they help to ensure data integrity. a. Attributes b. Entities c. Relationships d. Constraints
ANSWER: d
_____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity. a. Connectivity b. Relationship c. Dependence d. Cardinality
ANSWER: d
_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. a. Conceptual design b. Network design c. Logical design d. Physical design
ANSWER: d
_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. a. INTERSECT b. UNION c. DIFFERENCE d. SELECT
ANSWER: d
A(n) ______ provides a detailed description of all tables found within the user/designer-created database.
ANSWER: data dictionary
A(n) _____ defines the environment in which data can be managed and is used to work with the data in the database.
ANSWER: data manipulation language (DML)
A designer must have a thorough understanding of the company's data types, extent, and uses in order to develop an accurate _____.
ANSWER: data model
A(n) _____ is a relatively simple representation of more complex real-world data structures.
ANSWER: data model
In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
ANSWER: data-profiling
A(n) _____ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system.
ANSWER: database
A(n) _____ physically stores the database's data.
ANSWER: datafile
In a heavily used database management system (DBMS), the prevention and detection of _____ constitutes an important DBMS function.
ANSWER: deadlocks
If T1 has not unlocked data item Y, T2 cannot begin - if T2 has not unlocked data item X, T1 cannot continue. Consequently, T1 and T2 each wait for the other to unlock the required data item. Such a deadlock is also known as a(n) _____.
ANSWER: deadly embrace
The advent of very sophisticated application generators and _____ has substantially decreased coding and testing time.
ANSWER: debugging tools
A relationship _____ indicates the number of entities or participants associated with a relationship.
ANSWER: degree
A(n) _____ attribute need not be physically stored within the database.
ANSWER: derived
Any attribute whose value determines other values within a row is known as a(n) _____.
ANSWER: determinant
The DSO's activities are often classified as _____ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.
ANSWER: disaster
After testing is concluded, the final _____ is reviewed and printed and end users are trained.
ANSWER: documentation
In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.
ANSWER: efficient
Each row in the relational table is known as a(n) _____.
ANSWER: entity instance
According to the data-modeling checklist, _____ should be nouns that are familiar to business, should be short and meaningful, and should document abbreviations, synonyms, and aliases for each entity.
ANSWER: entity names
A(n) _____ links tables on the basis of an equality condition that compares specified columns of each table.
ANSWER: equijoin
A weak entity must be _____-dependent.
ANSWER: existence
The _____ model is the end users' view of the data environment.
ANSWER: external
To avoid nulls, some designers use special codes, known as _____, to indicate the absence of some value.
ANSWER: flags
It becomes difficult to create a suitable _____ key when the related table uses a composite primary key.
ANSWER: foreign
The proper use of _____ keys is crucial to controlling data redundancy.
ANSWER: foreign
The database description, known as the distributed _____ schema, is the common database schema used by local transaction processors (TPs) to translate user requests into subqueries that will be processed by different data processors (DPs).
ANSWER: global
Dr. Codd's _____ rule of relational database states that every value in a table is guaranteed to be accessible through a combination of table name, primary key value, and column name.
ANSWER: guaranteed Access
When selecting DBMS _____, items to consider include processors, RAM, and disk space.
ANSWER: hardware
One of the limitations of the _____ model is that there is a lack of standards.
ANSWER: hierarchical
In organizations that generate large numbers of transactions, _____ processing speeds are often a top priority in database design, which result in minimal access time.
ANSWER: high
One of the advantages of a distributed database management system (DDBMS) is processor _____.
ANSWER: independence
The distributed database system must be _____ of the computer system hardware.
ANSWER: independent
Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.
ANSWER: integrity
A user-friendly _____ is one advantage of a distributed database management system (DDBMS) .
ANSWER: interface
The _____ is the representation of a database as "seen" by the DBMS.
ANSWER: internal model
A(n) _____ process is based on repetition of processes and procedures.
ANSWER: iterative
An ERD is created through a(n) _____ process.
ANSWER: iterative
The _____ condition is generally composed of an equality comparison between the foreign key and the primary key of related tables.
ANSWER: join
In a relational model, _____ are used to establish relationships among tables and to ensure the integrity of the data.
ANSWER: keys
To determine the appropriate order of the operations, the scheduler bases its actions on concurrency control algorithms, such as _____ or time stamping methods.
ANSWER: locking
The _____ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.
ANSWER: logical design
The term _____ is used to refer to the task of creating a conceptual data model that could be implemented in any DBMS.
ANSWER: logical design
The _____ occurs when two concurrent transactions, T1 and T2, are updating the same data element and one of the updates is lost.
ANSWER: lost update problem
In a distributed database management system (DDBMS), _____ occurs to determine the data location of local and remote fragments.
ANSWER: mapping
In object-oriented terms, a(n) _____ defines an object's behavior.
ANSWER: method
When indicating cardinality, the first value represents the _____ number of associated entities.
ANSWER: minimum
A(n) _____ is an information system component that handles a specific business function, such as inventory, orders, or payroll.
ANSWER: module
Because real-world database design is generally done by teams, the database design is probably divided into major components known as _____.
ANSWER: modules
Uniqueness ensures that no equal time stamp values can exist, and _____ ensures that time stamp values always increase.
ANSWER: monotonicity
Typically, the _____ scenario requires a network file server running conventional applications that are accessed through a network.
ANSWER: multiple-site processing, single-site data MPSD multiple-site processing, single-site data (MPSD)
The _____ rule states that only one transaction at a time can own an exclusive lock on the same object.
ANSWER: mutual exclusive
The combination of _____ and ER modeling yields a useful ERD, whose entities may now be translated into appropriate table structures.
ANSWER: normalization
In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations - for example, deciding to change the price of a product to clear it from inventory.
ANSWER: operational
In a distributed database management system (DDBMS), query _____ is used to find the best access strategy.
ANSWER: optimization
Participation is _____ if one entity occurrence does not require a corresponding entity occurrence in a particular relationship.
ANSWER: optional
A dependency based on only a part of a composite primary key is called a(n) _____.
ANSWER: partial dependency
Failure to understand the distinction between mandatory and optional _____ in relationships might yield designs in which awkward (and unnecessary) temporary rows (entity instances) must be created just to accommodate the creation of required entities.
ANSWER: participation
In order to meet _____ requirements, you may have to denormalize some portions of a database design.
ANSWER: performance
A(n) ______ occurs when a transaction executes a query at time T1, and it runs the same query at same time T2, yielding additional rows that satisfy the query.
ANSWER: phantom read
An initial assessment of the information flow-and-extent requirements must be made during the _____ portion of the Systems Development Life Cycle (SDLC).
ANSWER: planning
The traditional Systems Development Life Cycle (SDLC) phases are _____, analysis, detailed systems design, implementation, and maintenance.
ANSWER: planning
One of the advantages of a distributed database management system (DDBMS) is less danger of a single-_____ failure.
ANSWER: point
Because a partial dependency can exist only when a table's primary key is composed of several attributes, a table whose _____ key consists of only a single attribute is automatically in 2NF once it is in 1NF.
ANSWER: primary
The concept of relationship strength is based on how the _____ of a related entity is defined.
ANSWER: primary key
Any attribute that is at least part of a key is known as a(n) _____.
ANSWER: prime attribute key attribute
In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
ANSWER: privacy
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource a given user can access.
ANSWER: profile
During _____ replication, after an update, the originating DP node sends "messages" to the replica nodes to notify them of the update.
ANSWER: pull
After an update, the originating DP node sends the changes to the replica nodes to ensure that data is immediately updated, during _____ replication.
ANSWER: push
In the SQL environment, the word _____ covers both questions and actions.
ANSWER: query
The syntax of the EXCEPT statement in Oracle is _____.
ANSWER: query EXCEPT query;
Database transaction _____ restores a database from an inconsistent state to a previously consistent state.
ANSWER: recovery
An alias is especially useful when a table must be joined to itself in a(n) _____ query.
ANSWER: recursive
A(n) _____ attribute is an attribute that must have a value.
ANSWER: required
In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.
ANSWER: role
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.
ANSWER: role
The _____ interleaves the execution of database operations to ensure serializability.
ANSWER: scheduler
A(n) _____ is the conceptual organization of an entire database as viewed by a database administrator.
ANSWER: schema
An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chosen database.
ANSWER: schema
The system's _____ defines the extent of the design according to operational requirements.
ANSWER: scope
A(n) _____ in a hierarchical model is the equivalent of a record in a file system.
ANSWER: segment
Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be _____ correct.
ANSWER: semantically
The scheduler's main job is to create a(n) _____ of a transaction's operation, in which the interleaved executions of transactions yield the same results as if the transactions were executed in serial order.
ANSWER: serializable schedule
The _____ scenario is typical of most mainframe and midrange UNIX/LINUX server database management systems (DBMS).
ANSWER: single-site processing, single-site data SPSD single-site processing, single-site data (SPSD)
A person's Social Security number would be an example of a(n) _____ attribute.
ANSWER: single-valued
In Crow's Foot notation, an optional relationship between entities is shown by drawing a(n) _____ on the side of the optional entity.
ANSWER: small circle (O)
The Crow's Foot notation depicts the strong relationship with a(n) _____ line between the entities.
ANSWER: solid
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
ANSWER: strategic
A(n) _____ relationship is also known as an identifying relationship.
ANSWER: strong
A(n) _____, also known as a nested query or an inner query, is a query that is embedded (or nested) inside another query.
ANSWER: subquery
In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of _____ keys.
ANSWER: surrogate
The _____ catalog can be described as a detailed system data dictionary that describes all objects within the database, including data about table names, the table's creator and creation date, the number of columns in each table, the data type corresponding to each column, index filenames, index creators, authorized users, and access privileges.
ANSWER: system
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator.
ANSWER: systems
As a rule, a(n) _____ must unlock the object after its termination.
ANSWER: transaction
The DBMS uses the information stored in the _____ log for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.
ANSWER: transaction
Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
ANSWER: tuning
Each row in a relation is called a(n) _____.
ANSWER: tuple
A(n) _____ index is an index in which the index key can have only one pointer value (row) associated with it.
ANSWER: unique
The _____ fragment condition indicates that no row has a duplicate, regardless of the fragment in which it is located.
ANSWER: unique
In the context of Oracle Enterprise Manager, a(n) _____ is a uniquely identifiable object that allows a given person to log on to the database.
ANSWER: user
Unnormalized tables yield no simple strategies for creating virtual tables known as _____.
ANSWER: views
A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
ANSWER: vulnerability
Proper data _____ design requires carefully defined and controlled data redundancies to function properly.
ANSWER: warehousing
A(n) _____ character is a symbol that can be used as a general substitute for other characters or commands.
ANSWER: wildcard wild card
The _____ forces the log entry to be written to permanent storage before the actual operation takes place.
ANSWER: write-ahead protocol
The _____ protocol ensures that transaction logs are always written before any database data is actually updated.
ANSWER: write-ahead-log
_____ exists when different and conflicting versions of the same data appear in different places.
Data inconsistency
_____ exists when it is possible to make changes in the data storage characteristics without affecting an application program's ability to access data.
Data independence
_____ relates to activities that make a database operate more efficiently in terms of storage and access speed.
Performance tuning
_____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. a. Data integrity b. Data anomaly c. Data ubiquity d. Data quality
a. Data integrity
A data warehouse can store data derived from many sources. a. True b. False
a. True
Data is said to be verifiable if: a. the data always yields consistent results. b. the data cannot be changed or manipulated. c. the data is obtained from trusted sources. d. the data is stored in different places within the database.
a. the data always yields consistent results.
A(n) _____ is a spur-of-the-moment question.
ad hoc query
Data and information are essentially the same thing. a. True b. False
b. False
Data anomaly is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. a. True b. False
b. False
Structural dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data. a. True b. False
b. False
The DBMS reveals much of the database's internal complexity to the application programs and users. a. True b. False
b. False
When data are entered into a form and saved, they are placed in the underlying database as knowledge. a. True b. False
b. False
Accurate, relevant, and timely information is the key to ____. a. data management b. good decision making c. knowledge d. understanding
b. Good decision making
A desktop database is a _____ database. a. single-user b. multiuser c. workgroup d. distributed
b. Multiuser
The organization of data within folders in a manual file system is determined by _______. a. its date of creation b. its expected use c. the title of the documents in the folder d. the data processing specialist
b. its expected use
End-user data is _____. a. knowledge about the end users b. raw facts of interest to the end user c. information about a specific subject d. accurate, relevant and timely information
b. raw facts of interest to the end user
Most data that can be encountered are best classified as _____. a. structured b. semistructured c. unstructured d. historical
b. semistructured
To reveal meaning, information requires _____.
context
A(n) _____ might be written by a programmer or it might be created through a DBMS utility program. a. query b. operating system c. database management system d. application
d. Application
Which of the following refers to the situation where different versions of the same data are stored at different places because they weren't updated consistently? a. Data query b. Data integrity c. Data dictionary d. Data redundancy
d. Data redundancy
_____ is the result of revealing the meaning of raw facts. a. End-user data b. An encoded sample c. An encrypted bit d. Information
d. Information
An XML database supports the storage and management of _____ XML data. a. structured b. multistructured c. fullystructured d. semistructured
d. semistructured
Information is produced by processing _____.
data
A(n) _____ develops when all required changes in the redundant data are not made successfully.
data anomaly
The DBMS uses the _____ to look up the required data component structures and relationships, thus relieving programmers from having to code such complex relationships in each program.
data dictionary
Each column in a relation represents a(n) _____.
ANSWER: attribute
Data _____ describes the process of deciding where to locate data.
ANSWER: allocation
A transaction processor is also known as the _____ processor.
ANSWER: application
The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
ANSWER: technological
_____ exists when the same data are stored unnecessarily at different places.
Data redundancy
Data constitute the building blocks of information. a. True b. False
a. True
Data processing can be as simple as organizing data to reveal patterns. a. True b. False
a. True
_____ is the result of processing raw data to reveal its meaning.
Information
One disadvantage of a database system over previous data management approaches is increased costs. a. True b. False
a. True
The _____ guarantees that if a portion of a transaction operation cannot be committed, all changes made at the other sites participating in the transaction will be undone to maintain a consistent database state. a. DO-UNDO-REDO protocol b. two-phase commit protocol (2PC) c. coordinator protocol d. write-ahead protocol
ANSWER: b
The _____ notation of entity-relationship modelling can be used for both conceptual and implementation modelling. a. Bachman b. UML c. Chen d. Crow's Foot
ANSWER: b
The _____ processor is the software component found in each computer that requests data. It receives and processes the application's data requests. a. database b. transaction c. data d. network
ANSWER: b
When a table contains only one candidate key, _____ are considered to be equivalent. a. the 1NF and the 2NF b. the 3NF and the BCNF c. the 4NF and the 3NF d. the BCNF and the DKNF
ANSWER: b
A primary key is a(n) _____ key chosen to be the primary means by which rows of a table are uniquely identified.
ANSWER: candidate
A(n) _____ order sequence is a multilevel ordered sequence that can be created easily by listing several attributes, separated by commas, after the ORDER BY clause.
ANSWER: cascading
In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.
ANSWER: cloud
The objective of _____ control is to ensure the serializability of transactions in a multiuser database environment.
ANSWER: concurrency
In SQL, all _____ expressions evaluate to true or false.
ANSWER: conditional
The DBA must review the database application design to ensure that transactions are _____, meaning that they mirror real-world events.
ANSWER: correct
"A password must have a minimum of five characters" is an example of a _____. a. policy b. rule c. procedure d. standard
ANSWER: d
Of the following normal forms, _____ is mostly of theoretical interest. a. 1NF b. 3NF c. BCNF d. DKNF
ANSWER: d
The Chen notation identifies a weak entity by using a double-walled entity _____.
ANSWER: rectangle
One of the advantages of a distributed database management system (DDBMS) is _____ operating cost.
ANSWER: reduced lower
The price paid for increased performance through denormalization is a larger amount of _____.
ANSWER: redundancy data redundancy
A table is also called a(n) _____ because the relational model's creator, E. F. Codd, used the two terms as synonyms.
ANSWER: relation
The relational model's foundation is a mathematical concept known as a(n) _____.
ANSWER: relation
Identifying the attributes of entities helps in the better understanding of _____ among entities.
ANSWER: relationships
The database structure in a DBMS is stored as a _____. a. single file b. collection of files c. set of key/value pairs d. collection of queries
b. Collection of files
An advantage of database systems is that you needn't perform frequent updates and apply latest patches. a. True b. False
b. False
Field refers to a collection of related records. a. True b. False
b. False
One disadvantage of the DBMS is that it increases the risk of data security breaches. a. True b. False
b. False
A workgroup database is a(n) _____ database. a. single-user b. multiuser c. desktop d. distributed
b. Multiuser
_____ provide a description of the data characteristics and the set of relationships that link the data found within the database. a. Queries b. End-user data c. Metadata d. Schemas
c. Metadata
A database that is created and maintained using services such as Microsoft Azure or Amazon AWS is called a(n) _____ database.
cloud
Even when a good database blueprint is available, an applications programmer's view of the data should match that of the manager and the end user. a. True b. False
ANSWER: False
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers. a. True b. False
ANSWER: False
In Chen notation, entities and relationships have to be oriented horizontally - not vertically. a. True b. False
ANSWER: False
In Chen notation, there is no way to represent cardinality. a. True b. False
ANSWER: False
In a natural join, the column on which the join was made occurs twice in the new table. a. True b. False
ANSWER: False
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity. a. True b. False
ANSWER: False
SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words. a. True b. False
ANSWER: False
The SELECT operator yields a vertical subset of a table. a. True b. False
ANSWER: False
A data dictionary is sometimes described as "the database designer's database" because it records the design decisions about tables and their structures. a. True b. False
ANSWER: True
Concurrent backups take place while the user is working on the database. a. True b. False
ANSWER: True
If the attribute (B) is functionally dependent on a composite key (A) but not on any subset of that composite key, the attribute (B) is fully functionally dependent on (A). a. True b. False
ANSWER: True
In a 1:M relationship, to avoid the possibility of referential integrity errors, the data of the "1" side must be loaded first. a. True b. False
ANSWER: True
In a page-level lock, the DBMS will lock an entire diskpage. a. True b. False
ANSWER: True
In an SQL-based relational database, rows in different tables are related based on common values in common attributes. a. True b. False
ANSWER: True
In most modern relational DBMSs, a new database implementation requires the creation of special storage-related constructs to house the end-user tables. a. True b. False
ANSWER: True
In the context of partial dependencies, data redundancies occur because every row entry requires duplication of data. a. True b. False
ANSWER: True
Numeric functions take one numeric parameter and return one value. a. True b. False
ANSWER: True
The conditional LIKE must be used in conjunction with wildcard characters. a. True b. False
ANSWER: True
_____ distributed database management systems (DDBMS) integrate multiple instances of the same DBMS over a network. a. Homogeneous b. Heterogeneous c. Fully heterogeneous d. Combination
ANSWER: a
_____ is a relational set operator. a. EXCEPT b. PLUS c. ALL d. EXISTS
ANSWER: a
_____ is a string function that returns the number of characters in a string value. a. LENGTH b. SUBSTRING c. CONCAT d. UCASE
ANSWER: a
_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. a. Predicate b. Database c. Relational d. Index
ANSWER: a
_____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. a. Inconsistent retrieval b. The phenomena of uncommitted data c. Lost update problems d. Dirty read problems
ANSWER: a
_____ returns only the attributes requested, in the order in which they are requested. a. PROJECT b. SELECT c. UNION d. DIFFERENCE
ANSWER: a
_____ transparency allows a physically dispersed database to be managed as though it were centralized. a. Distribution b. Transaction c. Failure d. Performance
ANSWER: a
Of the following events, which is defined by ANSI as being equivalent to a COMMIT? a. Five SQL statements are executed. b. The end of a program is successfully reached. c. The program is abnormally terminated. d. The database is shut down for maintenance.
ANSWER: b
Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. implementation and loading d. testing and evaluation
ANSWER: b
The _____ administrator is responsible for strategic planning. a. system b. data c. database d. program
ANSWER: b
_____ is data about data through which the end-user data are integrated and managed.
Metadata
PRODUCT yields all possible pairs of rows from two tables, also known as the _____ product.
ANSWER: Cartesian
A specialty field in mathematics, known as _____ algebra, is dedicated to the use of logical operators.
ANSWER: Boolean
_____ databases focus primarily on storing data used to generate information required to make tactical or strategic decisions.
Analytical
A data warehouse contains historical data obtained from the _____. a. operational databases b. desktop database c. enterprise databases d. workgroup databases
a. Operational database
_____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed. a. Performance tuning b. Database design c. Query access d. Database management
a. Performance tuning
_____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information. a. Structured data b. Raw data c. Unstructured data d. Obsolete data
a. Structured data
Metadata describe the data characteristics and the set of relationships that links the data found within the database. a. True b. False
a. True
Structure is based on the type of processing to be performed on the data. a. True b. False
a. True
Which of the following is true of spreadsheet applications? a. They provide enhanced security and robust data sharing features. b. They do not allow manipulation of data once entered. c. They are a better alternative to databases. d. They enhance the user's ability to understand the data.
d. They enhance the user's ability to understand the data.
The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment. a. structured data b. transaction c. management system d. database system
d. database system
A _____ is a collection of related records. a. schema b. field c. column d. file
d. file
The term _____ refers to scattered locations storing the same basic data.
islands of information