CPSC 440 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

E.F. Codd developed the relational model in the:

1970s

Hive is an __________ data warehouse software

Apache

______ is a set of commands used to control a database, including security

DCL

INSERT INTO is an example of ________ code

DML

Online Analytical Processing (OLAP) is an important part of:

Descriptive analytics

The main concept of relational databases was published in 1970s by:

E.F. Codd

YARN, also called MapReduce 2.0, is like a traffic cop that controls the allocation of resources in a system

True

Volume, variety, and velocity are considered the initial three V dimensions. The two additional Vs of big data were added and include:

Veracity and Value

An XML-based grammar used to describe a Web service is called:

Web Service Description Language (WSDL)

An XML transformation language that allows applications to query both XML and relational databases is called:

XQuery

A user view is:

a logical description of some portion of the database

A transaction that terminates abnormally is called an ____________ transaction.

aborted

Controls designed to restrict access and activities are called

authorisation rules

A ___________ constraint is a type of constraint that addresses whether an instance of a supertype must also be an instance of at least one subtype

completeness

A primary that consists of more than one attribute is called a:

composite key

A repository of information about a database that documents data elements of a database is called a:

data dictionary

The ___________ rule specifies that an entity can be a member of only one subtype at a type

disjoint

A ____________ addresses whether an instance of a supertype may simultaneously be a member of two or more sybtypes

disjointedness constraint

A person, place, object, event, or concept about which the organisation wishes to maintain data is called an

entity

An ______________ prevents another transaction from reading and therefore updating a record until it is unlocked

exclusive lock

NoSQL focuses on

flexibility

An audit trail of database changes is kept a:

journalising facility

It is true that in an HDFS cluster the DataNodes are the:

large number of slaves

The extent of the database resource that is included with each lock is called the level of:

lock grnularity

An organisation using HDFS realises that hardware failure is a:

norm

An application programming iterface that enables an application program to process RDBMS databases meets the:

open database connectivity standard

The ________ rule states that an entity instance can simultaneously be a member of two (or more) subtypes

overlap

A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a _________ dependency

partial functional

The __________ rule specifies that an entity instance of a supertype is allowed not to belong to any subtype

partial specialisation

Application of statistical and computational methods to predict data events is:

predictive analytics

Descriptive, predictive, and ___________ are the three main types of analytics.

prescriptive

A rule that states that each foreign key value must match a primary key value in the other relation is called the:

referential integrity constraint

A two-dimensial table of data is sometimes is called a:

relation

_____________ is used to undo unwanted database changes

rollback

NoSQL systems enable automated ___________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it

sharding

It is true that in an HDFS cluster the NameNode is the:

single master server

An attribute of the supertype that determines the target subtype(s) is called the:

subtype discriminator

The ________ rule specifies that each entity instance of the supertype must be a member of some subtype in the relationship

total specialisation

A discrete unit of work that must be processed completely or not all within a computer system is called a:

transaction

A functional dependency between two or more nonkey attributes is called a:

transitive dependency

A ___________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released

two-phase lock

An optimistic approach to concurrency control is called:

versioning

Apache Cassandra is a leading producer of ___________ NoSQL database management systems.

wide-column

The NoSQL model that incorporates 'column families' is called a:

wide-column store

Big data databases tend to sacrifice consistency for availability

True

Data in HDFS files cannot be updated

True

Hive creates MapReduce jobs and executes them on a Hadoop Cluster

True

JSON is commonly used in conjunction with the 'document store' NoSQL database model

True

MapReduce is an algorithm for massive parallel processing utilised by Hadoop

True

Hadoop is considered a relational database management system:

False

An organisation that requires a graph database that is highly scalable would select the ___________ database management system

Neo4j

NoSql stands for

Not Only SQL

____________ is an important scripting language to help reduce the complexity of MapReduce.

Pig

Referential Integrity Constraints are generally established between:

Primary and Foreign keys

A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?

Second

A trigger can be used as a security measure in which of the following ways?

To cause a special handling procedures to be executed


Ensembles d'études connexes

Introduction to Programming (IS111)

View Set

Chapter 50: Assessment and Management of Patients With Biliary Disorders

View Set

Marketing 3150 Chapter 7 (Group Influences on Consumer Behavior)

View Set

EDAPT: Nursing Care - Pediatric Gastrointestinal and Elimination Alterations

View Set

12.1 - Listing Agreement - Part 1

View Set