CPSC 440 Final
E.F. Codd developed the relational model in the:
1970s
Hive is an __________ data warehouse software
Apache
______ is a set of commands used to control a database, including security
DCL
INSERT INTO is an example of ________ code
DML
Online Analytical Processing (OLAP) is an important part of:
Descriptive analytics
The main concept of relational databases was published in 1970s by:
E.F. Codd
YARN, also called MapReduce 2.0, is like a traffic cop that controls the allocation of resources in a system
True
Volume, variety, and velocity are considered the initial three V dimensions. The two additional Vs of big data were added and include:
Veracity and Value
An XML-based grammar used to describe a Web service is called:
Web Service Description Language (WSDL)
An XML transformation language that allows applications to query both XML and relational databases is called:
XQuery
A user view is:
a logical description of some portion of the database
A transaction that terminates abnormally is called an ____________ transaction.
aborted
Controls designed to restrict access and activities are called
authorisation rules
A ___________ constraint is a type of constraint that addresses whether an instance of a supertype must also be an instance of at least one subtype
completeness
A primary that consists of more than one attribute is called a:
composite key
A repository of information about a database that documents data elements of a database is called a:
data dictionary
The ___________ rule specifies that an entity can be a member of only one subtype at a type
disjoint
A ____________ addresses whether an instance of a supertype may simultaneously be a member of two or more sybtypes
disjointedness constraint
A person, place, object, event, or concept about which the organisation wishes to maintain data is called an
entity
An ______________ prevents another transaction from reading and therefore updating a record until it is unlocked
exclusive lock
NoSQL focuses on
flexibility
An audit trail of database changes is kept a:
journalising facility
It is true that in an HDFS cluster the DataNodes are the:
large number of slaves
The extent of the database resource that is included with each lock is called the level of:
lock grnularity
An organisation using HDFS realises that hardware failure is a:
norm
An application programming iterface that enables an application program to process RDBMS databases meets the:
open database connectivity standard
The ________ rule states that an entity instance can simultaneously be a member of two (or more) subtypes
overlap
A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a _________ dependency
partial functional
The __________ rule specifies that an entity instance of a supertype is allowed not to belong to any subtype
partial specialisation
Application of statistical and computational methods to predict data events is:
predictive analytics
Descriptive, predictive, and ___________ are the three main types of analytics.
prescriptive
A rule that states that each foreign key value must match a primary key value in the other relation is called the:
referential integrity constraint
A two-dimensial table of data is sometimes is called a:
relation
_____________ is used to undo unwanted database changes
rollback
NoSQL systems enable automated ___________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it
sharding
It is true that in an HDFS cluster the NameNode is the:
single master server
An attribute of the supertype that determines the target subtype(s) is called the:
subtype discriminator
The ________ rule specifies that each entity instance of the supertype must be a member of some subtype in the relationship
total specialisation
A discrete unit of work that must be processed completely or not all within a computer system is called a:
transaction
A functional dependency between two or more nonkey attributes is called a:
transitive dependency
A ___________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released
two-phase lock
An optimistic approach to concurrency control is called:
versioning
Apache Cassandra is a leading producer of ___________ NoSQL database management systems.
wide-column
The NoSQL model that incorporates 'column families' is called a:
wide-column store
Big data databases tend to sacrifice consistency for availability
True
Data in HDFS files cannot be updated
True
Hive creates MapReduce jobs and executes them on a Hadoop Cluster
True
JSON is commonly used in conjunction with the 'document store' NoSQL database model
True
MapReduce is an algorithm for massive parallel processing utilised by Hadoop
True
Hadoop is considered a relational database management system:
False
An organisation that requires a graph database that is highly scalable would select the ___________ database management system
Neo4j
NoSql stands for
Not Only SQL
____________ is an important scripting language to help reduce the complexity of MapReduce.
Pig
Referential Integrity Constraints are generally established between:
Primary and Foreign keys
A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?
Second
A trigger can be used as a security measure in which of the following ways?
To cause a special handling procedures to be executed