Database Management

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

68. Application integration is achieved by coordinating the flow of event information between business applications. TRUE FASLE

TRUE

1. Embedded SQL consists of: A. hard-coded SQL statements included in a program written in another language. B. SQL encapsulated inside of other SQL statements. C. SQL written into a front-end application. D. SQL translated to a lower-level language.

A. hard-coded SQL statements included in a program written in another language.

30. Which of the following is the wildcard operator in SQL statements? A. < > B. * C. = D. &

B. *

INSERT INTO is an example of ________ code. A. DDL B. DML C. DCL D. TIO Answer: B

B. DML

25. Event-driven propagation: A. provides a means to duplicate data for events. C. pulls duplicate data from redundant sites. B. pushes data to duplicate sites as an event occurs. D. triggers a virus.

B. pushes data to duplicate sites as an event occurs.

9. NoSQL systems allow ________ by incorporating commodity servers that can be easily added to the architectural solution. A. scaling down B. scaling out C. scaling up D. scaling over

B. scaling out

26. A type of join where a table is joined to itself is called a(n.: A. ternary join. B. self-join. C. unnatural join. D. pinned join.

B. self-join.

15. One simple task of a data quality audit is to: A. interview all users. B. statistically profile all files. C. load all data into a data warehouse. D. establish quality metrics.

B. statistically profile all files.

27. A type of query that is placed within a WHERE or HAVING clause of another query is called a: A. master query. B. subquery. C. superquery. D. multi-query.

B. subquery.

32. Every key used to join the fact table with a dimension table should be a ________ key. A. primary B. surrogate C. foreign D. secondary

B. surrogate

8. A PC configured to handle user interfaces with limited local storage is called a(n.: A. fat client. B. thin client. C. light client. D. overweight client

B. thin client.

34. A discrete unit of work that must be processed completely or not at all within a computer system is called a: A. change control device. B. transaction. C. before image. D. journalizing facility.

B. transaction.

17. Apache Cassandra is a leading producer of ________ NoSQL database management systems. A. key-value store B. wide-column C. relational D. graph

B. wide-column

7. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A. on-line geometrical processing (OGP.. B. drill-down analysis. C. on-line analytical processing (OLAP.. D. on-line datacube processing (ODP..

C. on-line analytical processing (OLAP..

29. Data that are never physically altered once they are added to the store are called ________ data. A. transient B. override C. periodic D. complete

C. periodic

38. When an organization must decide on optimization and simulation tools to make things happen it is using: A. predictive analytics. B. descriptive analytics. C. prescriptive analytics. D. comparative analytics.

C. prescriptive analytics.

56. The views are created by executing a CREATE VIEW SQL command. TRUE FALSE

TRUE

65. Drill-down involves analyzing a given set of data at a finer level of detail. TRUE FALSE

TRUE

42. ________ are not used for querying and analyzing data stored in data warehouses. A. Word processing programs B. OLAP tools C. MOLAP tools D. Dashboard tools

A. Word processing programs

25. Regarding big data value, the primary focus is on: A. usefulness. B. speed. C. quantity. D. variety.

A. usefulness

36. A technique using pattern recognition to upgrade the quality of raw data is called: A. data scrounging. B. data scrubbing. C. data gouging. D. data analysis.

B. data scrubbing.

5. A ________ is a temporary table used in the FROM clause of an SQL query. A. correlated subquery B. derived table C. view table D. trigger

B. derived table

33. To eliminate duplicate rows in a query, the ________ qualifier is used in the SQL Select command. A. alter B. distinct C. check D. specific

B. distinct

3. Data quality is important for all of the following reasons EXCEPT: A. it minimizes project delay. C. it provides a stream of profit. B. it aids in making timely business decisions. D. it helps to expand the customer base

C. it provides a stream of profit.

4. Big data requires effectively processing: A. a single data type (numeric.. C. many data types. B. two data types (text and numeric.. D. a single data type (text..

C. many data types.

11. The NoSQL model that incorporates 'column families' is called a: A. key-value score. B. document store. C. wide-column store. D. column-SQL database.

C. wide-column store.

4. The ________ operator is used to combine the output from multiple queries into a single result table. A. INTERSECT B. DIVIDE C. COLLATE D. UNION

D. UNION

26. Controls designed to restrict access and activities are called: A. schemas. B. business rules. C. encryption controls. D. authorization rules

D. authorization rules

14. A join in which the joining condition is based on equality between values in the common columns is called a(n.: A. equi-join. B. unilateral join. C. natural join. D. both A and C.

D. both A and C.

24. The phrase ________ refers to a model for providing ubiquitous, convenient and on-demand network access. A. software services B. grid computing C. network computing D. cloud computing

D. cloud computing

28. A characteristic of reconciled data that means the data reflect an enterprise-wide view is: A. detailed. B. historical. C. normalized. D. comprehensive.

D. comprehensive.

10. A repository of information about a database that documents data elements of a database is called a: A. schema. B. subschema. C. view. D. data dictionary.

D. data dictionary.

29. The coding or scrambling of data so that humans cannot read them is called: A. demarcation. B. hiding. C. encoding. D. encryption.

D. encryption.

20. The most commonly used form of join operation is the: A. outer join. C. equi-join. B. union join. D. natural join.

D. natural join.

9. Rotating the view of a multidimensional database for a particular data point is called data: A. cubing. B. drill-down. C. dicing. D. pivoting.

D. pivoting.

8. An open-source DBMS is: A. a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. B. a beta release of a commercial RDBMS. C. an object-oriented database management system. D. source code for a commercial RDBMS.

A. a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

38. Converting data from the format of its source to the format of its destination is called: A. data transformation. B. data loading. C. data scrubbing. D. data storage.

A. data transformation.

4. The role of a ________ emphasizes integration and coordination of metadata across many data sources. A. data warehouse administrator B. database administrator C. data administrator D. data architect

A. data warehouse administrator

11. A computer that provides database storage and access in a client/server environment is called a(n.: A. database server. B. file server. C. cloud data store. D. info server.

A. database server

11. Datatype conflicts is an example of a(n. ________ reason for deteriorated data quality. A. external data source. B. inconsistent metadata C. data entry problem D. lack of organizational commitment

A. external data source.

37. Application of statistical and computational methods to predict data events is: A. predictive analytics. B. descriptive analytics. C. prescriptive analytics. D. comparative analytics.

A. predictive analytics.

37. An expanded version of a star schema in which all of the tables are fully normalized is called a(n.: A. snowflake schema. B. operational schema. C. DSS schema. D. complete schema.

A. snowflake schema.

2. The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A. subject-oriented. B. integrated. C. time-variant. D. nonvolatile.

A. subject-oriented.

22. The outer join syntax does not apply easily to a join condition of more than ________ tables. A. two B. three C. four D. five

A. two

17. An optimistic approach to concurrency control is called: A. versioning. B. denormalization. C. deadlock resolution. D. HappyControl.

A. versioning.

14. Which of the following are key steps in a data quality program? A. Avoid a data quality audit. B. Apply TQM principles and practices. C. Do not allow outside data. D. Keep all data on one server.

B. Apply TQM principles and practices.

2. ________ is a technical function responsible for database design, security, and disaster recovery. A. Data administration B. Database administration C. Tech support D. Operations

B. Database administration

6. Which of the following functions model business rules? A. Database planning B. Database analysis C. Database design D. Operations

B. Database analysis

21. The first part of an SQL query to be read is the ________ statement. A. SELECT B. FROM C. WHERE D. ORDER BY

B. FROM

38. Which of the following can produce scalar and vector aggregates? A. ORDER BY B. GROUP BY C. HAVING D. SORT

B. GROUP BY

6. ________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A. User interface enhancers B. Middleware C. Interface managers D. MPP

B. Middleware

42. A class of database technology used to store textual and other unstructured data is called: A. mySQL. B. NoSQL. C. KnowSQL. D. PHP.

B. NoSQL.

16. The ________ specification allows drivers to conform to various levels of the specification, and that affects the level of functionality of the drivers. A. JDBC C. CORBA B. ODBC D. Cobra

B. ODBC

4. DDL is typically used during which phase of the development process? A. Implementation B. Physical design C. Analysis D. Evaluation

B. Physical design

23. The W3C standard for Web privacy is called: A. the Web privacy act. B. Platform for Privacy Preferences. C. Freedom of Web Information Act. D. the Magna Carta.

B. Platform for Privacy Preferences.

14. Which of the following data-mining applications identifies customers for promotional activity? A. Population profiling B. Target marketing C. Usage analysis D. Product affinity

B. Target marketing

36. ________ is a language used to transform complex XML documents and also to create HTML pages from XML documents. A. HTML B. XSLT C. SGI D. WSL

B. XSLT

45. Service-oriented architectures (SOA. are: A. a set of tiers designed to serve each other. C. architecture designed for the military. B. a collection of services that communicate with each other in some manner. D. architecture designed for Schools of Accountancy (SOA..

B. a collection of services that communicate with each other in some manner.

The SQL command ________ adds one or more new columns to a table. A. create table B. alter table C. create view D. create relationship

B. alter table

9. Data quality problems can cascade when: A. data are not deleted properly. C. there is redundant data storage and inconsistent metadata. B. data are copied from legacy systems. D. there are data entry problems.

B. data are copied from legacy systems.

17. A Web server: A. is used only to host Web pages. C. always contains a database. B. processes client requests and returns HTML pages to the client. D. is considered to be part of the firewall.

B. processes client requests and returns HTML pages to the client.

21. A(n. ________ is a module of code written in SQL or some proprietary language to run business rules on a server. A. SQL program B. select module C. select procedureD. stored procedure

D. stored procedure

7. One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is: A. currency. B. consistency. C. referential integrity. D. timeliness.

D. timeliness.

24. Although volume, variety, and velocity are considered the initial three v dimensions, two additional Vs of big data were added and include: A. veracity and verified. B. volume and verified. C. verified and valuable. D. veracity and value.

D. veracity and value.

2. ________ is a set of commands used to control a database, including security. A. DML B. DDL C. DCL D. DPL

C. DCL

58. In some three-tier architectures, most application code is stored on the application server. TRUE FALSE

Answer: TRUE

44. A ________ view is materialized when referenced. A. virtual B. dynamic C. materialized D. base

B. dynamic

28. A database action that results from a transaction is called a(n.: A. transition. B. event. C. log entry. D. journal happening.

B. event.

15. A(n. ________ prevents another transaction from reading and therefore updating a record until it is unlocked. A. record controller B. exclusive lock C. authorization rule D. shared lock

B. exclusive lock

19. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n.: A. equi-join. C. multivariate join. B. natural join. D. inner join.

B. natural join.

39. While triggers run automatically, ________ do not and have to be called. A. trapdoors C. selects B. routines D. updates

B. routines

41. Which of the following finds all groups meeting stated conditions? A. Select B. Where C. Having D. Find

C. Having

19. Which of the following threats involves outside parties using information to embarrass a company? A. Accidental loss B. Theft and fraud C. Loss of confidentiality D. Loss of data integrity

C. Loss of confidentiality

47. ________ differs from array because it can contain duplicates. A. BIGINT B. XML C. MULTISET D. TABLE

C. MULTISET

6. According to your text, NoSQL stands for: A. Numbered Structured Query Language. C. Not Only Structured Query Language. B. No Structured Query Language. D. Numeric Only Structured Query Language.

C. Not Only Structured Query Language.

8. The SQL command ________ defines a logical table from one or more tables or views. A. create table B. alter table C. create view D. create relationship

C. create view

17. A data mart is a(n.: A. enterprisewide data warehouse. B. smaller system built upon file processing technology. C. data warehouse that is limited in scope. D. generic on-line shopping site.

C. data warehouse that is limited in scope.

29. Hive is a(n. ________ data warehouse software. A. Oracle B. Microsoft C. Macintosh D. Apache

D. Apache

22. The last part of an SQL query to be read is the ________ statement. A. SELECT B. FROM C. WHERE D. ORDER BY

D. ORDER BY

54. Structured Query Language (SQL. is a set of methodologies, processes, architectures, and technologies that transform raw data into meaningful information. TRUE FALSE

FALSE

55. Combining a table with itself results in a faster query. TRUE FALSE

FALSE

53. The role of a sources. DBMS are free software that provide the core functionality of an SQL compliant DBMS. TRUE FALSE

TRUE

32. ________ use the result of the outer query to determine the processing of the inner query. A. Correlated subqueries B. Outer subqueries C. Inner subqueries D. Subqueries

A. Correlated subqueries

34. The ________ DBA view shows information about all users of the database in Oracle. A. DBA_USERS B. USERS C. DBA_VIEWS D. DBA_INDEXES

A. DBA_USERS

35. To get all the customers from Hawaii sorted together, which of the following would be used? A. ORDER BY B. GROUP BY C. HAVING D. SORT

A. ORDER

27. Which of the following is a principal type of authorization table? A. Subject B. Transaction C. View D. Index

A. Subject

20. ________ includes the value of speed in a NoSQL database. A. Velocity B. Vigilant C. Verified D.

A. Velocity

42. An XML-based grammar used to describe a Web service is called: A. Web Service Description Language (WSDL.. B. WIDL. C. WISL. D. Business-to-Business (B2B..

A. Web Service Description Language (WSDL..

41. A technical specification for creating a distributed registry of Web services and businesses that are open to communicating through Web services is called: A. HTML. B. B2B. C. UDDI. D. XML.

C. UDDI.

1. At a basic level, analytics refers to: A. collecting data. C. analysis and interpretation of data. B. conducting a needs analysis. D. normalizing data.

C. analysis and interpretation of data.

4. The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers. A. memory B. files C. application logic components D. query logic components

C. application logic components

31. A star schema contains both fact and ________ tables. A. narrative B. cross functional C. dimension D. starter

C. dimension

34. Grain and duration have a direct impact on the size of ________ tables. A. selection B. grain C. fact D. figure

C. fact

6. Data that are accurate, consistent, and available in a timely fashion are considered: A. Oracle-based. B. Microsoft-based. C. high-quality. D. low-quality.

C. high-quality.

39. ________ is an ill-defined term applied to databases where size strains the ability of commonly used relational DBMSs to manage the data. A. Mean data B. Small data C. Star data D. Big data

D. Big data

44. SOAP stands for: A. what you wash your hands with. C. Strategic Operational Advanced Planning. B. Simple ODBC Access Protocol. D. Simple Object Access Protocol Method.

D. Simple Object Access Protocol Method.

17. TQM stands for: A. Thomas Quinn Mann, a famous data quality innovator. C. Transforming Quality Management. B. Total Quality Manipulation. D. Total Quality Management.

D. Total Quality Management.

40. The process of transforming data from a detailed to a summary level is called: A. extracting. B. updating. C. joining. D. aggregating.

D. aggregating.


Ensembles d'études connexes

Carmen Homework 10 - Binomial Distribution

View Set

Business Law Chapter 8 Study Guide

View Set

Nurs3115 Musculoskeletal Trauma and Orthopedic Surgery

View Set

Virtual Business Final Exam Review

View Set

Step 4 - Applying Memorization Techniques

View Set

Paleogeography and Biodiversity in the Cenozoic: GEOL 105 Lab

View Set

ch 3 professional responsibilities

View Set

Prep-u Chapter 30: Personality and Borderline Personality Disorder

View Set

Chapter 48: Musculoskeletal or Articular Dysfunction NCLEX

View Set