Database quiz study
What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2 A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries A listing of all drivers A listing of the number of deliveries greater than 2 A listing of all drivers who made more than 2 deliveries
A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries
What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no A listing of all drivers who made deliveries to state = 'MA', sorted by driver number A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state A count of all of the deliveries made to state = 'MA' by all drivers A listing of driver numbers
A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state
A property or characteristic of an entity type that is of interest to the organization is call a(n): co-existing entity primary key relation attribute
Attribute
In the SQL language, the ________ statement is used to make table definitions. create session create table create index create index
Create table
________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated. Business rule constraint Data integrity Business integrity Data structure
Data integrity
________ is a technical function responsible for database design, security, and disaster recovery. Data administration Database administration Tech support Operations
Database administration
Which of the following functions develop integrity controls? Database planning Database analysis Database implementation Database design
Database design
A member of a subtype does NOT necessarily have to be a member of the supertype. (T/F)
False
An enterprise data model describes the scope of data for only one information system. (T/F)
False
In MySQL workbench, Views are generally stored under tables. (T/F)
False
The following code is an example of a Subquery. SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID (T/F)
False
The following two SQL statements will produce different results. Select last_name, first_name from customer where state = 'MA' or state = 'NY' or state = 'NJ' or state = 'NH' or state = 'CT'; Select last_name, first_name from customer where state in ('MA','NY','NJ','NH','CT') (T/F)
False
The physical structure and storage organization of the database is decided upon during the implementation phase of the systems development life cycle. (T/F)
False
There can be multivalued attributes in a relation. (T/F)
False
Total specialization has 1 line
False
When transforming a one-to-one relationship, a new relation is always created. (T/F)
False
Which of the following finds all groups meeting stated conditions? SELECT WHERE HAVING FIND
HAVING
Data that describes the properties of other data are: metadata logical physical relationships
Metadata
________ are anomalies that can be caused by editing data in tables. Insertion Deletion Modification Creation
Modification
The last part of an SQL query to be read is the _____________statement. SELECT FROM WHERE ORDER BY
ORDER BY
Which of the following are goals of the normalization process? Minimize data redundancy Complicate the referential integrity constraints Improve efficiency of update, insert and delete functions Only A and C
Only A and C (Minimize data redundancy & Improve efficiency of update, insert and delete functions)
Which of the following MySQL commands is used to recover a transaction? REVOKE DROP GRANT ROLLBACK
ROLLBACK
_____________ are established between entities in a well-structured database model so that the desired information can be retrieved. Entities Relationships Lines attributes
Relationships
A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? Drop user businessanalyst@localhost Delete update privilege on schema Withdraw update privilege from businessanalyst@localhost Revoke update on schema from businessanalyst@localhost
Revoke update on schema from businessanalyst@localhost
The most common type of entities are: Strong Weak Associative Dependent
Strong
A simultaneous relationship between the instances of three entity types is called a ______________ relationship. binary ternary unary primary
Ternary
A database table is defined using the data definition language (DDL). (T/F)
True
A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants. (T/F)
True
A person is an example of an entity. (T/F)
True
A procedure is run by calling it by its name. (T/F)
True
A single occurrence of an entity is called an entity instance. (T/F)
True
A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies. (T/F)
True
Data modeling is about documenting rules and policies of an organization that govern data. (T/F)
True
Entity clustering is a methodology for grouping one or more entity types and associated relationships into a single abstract entity type. (T/F)
True
Figuring out what attributes you want in your query before you write the query will help with query writing. (T/F)
True
In an E-R diagram, an associative entity is represented by a rounded rectangle. (T/F)
True
In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with EXISTS. (T/F)
True
Once executed, procedures and functions will be stored in the schema, which eliminates the need to execute them again each time a query is executed. (T/F)
True
One property of a relation is that each attribute within a relation has a unique name. (T/F)
True
Target and Sony Playstation experienced data breaches due to poor database administration. (T/F)
True
The default primary key for an associative relation consists of the two primary key attributes from the other two relations. (T/F)
True
The default value of autocommit in MySQL is 1. (T/F)
True
The user interface includes languages, menus, and other facilities by which users interact with various system components. (T/F)
True
To write a query involving a unary relationship, it is a good practice to create two tables based on the original table. (T/F)
True
Views can be used to improve database security. (T/F)
True
When creating tables, it's important to decide which columns will allow null values before the table is created. (T/F)
True
An open-source DBMS is: a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. a beta release of a commercial RDBMS. an object-oriented database management system. source code for a commercial RDBMS.
a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
The property by which subtype entities possess the values of all attributes of a supertype is called: hierarchy reception. class management. attribute inheritance. generalization.
attribute inheritance
A device to measure or detect fingerprints or signatures is called a(n) ________ device. biometric view ink laser
biometric
A join operation: brings together data from two different fields. causes two tables with a common domain to be combined into a single table or view. causes two disparate tables to be combined into a single table or view. is used to combine indexing operations.
causes two tables with a common domain to be combined into a single table or view.
A primary key that consists of more than one attribute is called a: foreign key. composite key. multivalued key. cardinal key.
composite key.
Whether in top-down or bottom-up modeling approaches, a primary key that consists of more than one attribute is called a: foreign key. composite key. multivalued key. cardinal key.
composite key.
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. logging concurrency control transaction authorization multiple management
concurrency control
Data modeling may be the most important part of the systems development process because: the data in a system are generally less complex than the processes and play a central role in development. data characteristics are important in the design of programs and other system components. it is the easiest. limited program maintenance
data characteristics are important in the design of programs and other system components.
Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems. external data source inconsistent metadata data entry lack of organizational commitment
data entry
Converting data from the format of its source to the format of its destination is called: data transformation. data loading. data scrubbing. data storage.
data transformation.
The coding or scrambling of data so that humans cannot read them is called: demarcation. hiding. encoding. encryption.
encryption
The logical representation of an organizations's data is called a(n): database model entity-relationship model relationship systems design database entity diagram
entity-relationship model
Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality. external data source inconsistent metadata data entry problem lack of organizational commitment
external data source
An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: link attribute. link key. foreign key. foreign attribute.
foreign key
A constraint between two attributes is called a(n): functional relation. attribute dependency. functional dependency. functional relation constraint.
functional dependency.
Data governance can be defined as: a means to slow down the speed of data. high-level organizational groups and processes that oversee data stewardship. a government task force for defining data quality. a means to increase the speed of data.
high-level organizational groups and processes that oversee data stewardship.
The entity integrity rule states that: no primary key attribute can be null. referential integrity must be maintained across all entities. each entity must have a primary key. a primary key must have only one attribute.
no primary key attribute can be null.
The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID all rows of the Order_T Table regardless of matches with the Customer_T Table. all rows of the Customer_T Table regardless of matches with the Order_T Table. only rows that match both Customer_T and Order_T Tables. only rows that don't match both Customer_T and Order_T Tables.
only rows that match both Customer_T and Order_T Tables.
A two-dimensional table of data sometimes is called a: group. set. declaration. relation.
relation
The process of defining one or more subtypes of a supertype and forming relationships is called: specialization. generalization. creating discord. selecting classes.
specialization
A candidate key must satisfy all of the following conditions EXCEPT: the key must uniquely identify the row. the key must indicate the row's position in the table. the key must be nonredundant. each nonkey attribute is functionally dependent upon it.
the key must indicate the row's position in the table.
3NF is achieved when the table is in 2NF and any transitive dependencies have been removed the table is in 2NF and non key columns all depend on the key the table is in 2NF and every determinant is a candidate key the table is in 2NF and all occurrences of a row must have the same number of columns.
the table is in 2NF and any transitive dependencies have been removed
A good definition of 1NF is that there are no transitive dependencies there are no multi-valued attributes there is only one key all non keyed fields are dependent on the key
there are no multi-valued attributes
Because applications are often developed independently in file processing systems: the data is always non-redundant unplanned duplicate data files are the rule rather than the exception. data can always be shared with others there is a large volume of file I/O.
unplanned duplicate data files are the rule rather than the exception.