Database Systems - CH 7 MC, Database Systems - CH 8 MC, Database Systems - CH 9 MC

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

32. The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC). a. analysis b. detailed systems design c. implementation d. maintenance

ANSWER: c

21. The process of creating an information system is known as _____. a. systems development b. database development c. network development d. enterprise development

ANSWER: a

24. The _____ specification creates an individual index on a respective attribute; use it to avoid having duplicated values in a column. a. UNIQUE b. NOT NULL c. UPDATE d. VARCHAR

ANSWER: a

25. "Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance

ANSWER: a

25. Words used by a system that cannot be used for any other purpose are called _____ words. For example, in Oracle SQL, the word INITIAL cannot be used to name tables or columns. a. reserved b. unique c. null d. character

ANSWER: a

26. A(n) _____ is an alternate name given to a column or table in any SQL statement. a. alias b. data type c. stored function d. trigger

ANSWER: a

27. The result of the _____ phase of the Systems Development Life Cycle (SDLC) should be a better understanding of the system's functional areas, actual and potential problems, and opportunities. a. analysis b. implementation c. detailed systems design d. maintenance

ANSWER: a

28. Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? a. SELECT ONLY V_CODE FROM PRODUCT; b. SELECT UNIQUE V_CODE FROM PRODUCT; c. SELECT DIFFERENT V_CODE FROM PRODUCT; d. SELECT DISTINCT V_CODE FROM PRODUCT;

ANSWER: a

30. A(n) _____ join will select only the rows with matching values in the common attribute(s). a. natural b. outer c. full d. cross

ANSWER: a

30. Using the _____ command, SQL indexes can be created on the basis of any selected attribute. a. CREATE INDEX b. UPDATE CASCADE c. SELECT d. VARCHAR

ANSWER: a

31. All changes in a table structure are made using the _____ TABLE command, followed by a keyword that produces the specific changes a user wants to make. a. ALTER b. COMMIT c. UPDATE d. ROLLBACK

ANSWER: a

32. A table can be deleted from the database by using the _____ TABLE command. a. DROP b. DELETE c. MODIFY d. ERASE

ANSWER: a

32. A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. a. outer b. inner c. equi- d. cross

ANSWER: a

33. SQL requires the use of the _____ command to enter data into a table. a. INSERT b. SELECT c. COMMIT d. NOT NULL

ANSWER: a

34. The _____ command permanently saves all changes—such as rows added, attributes modified, and rows deleted—made to any table in the database. a. COMMIT b. SELECT c. ROLLBACK d. UPDATE

ANSWER: a

35. Which command would be used to delete the table row where the P_CODE is 'BRT-345'? a. DELETE FROM PRODUCT WHERE P_CODE = 'BRT-345'; b. REMOVE FROM PRODUCT WHERE P_CODE = 'BRT-345'; c. ERASE FROM PRODUCT WHERE P_CODE = 'BRT-345'; d. ROLLBACK FROM PRODUCT WHERE P_CODE = 'BRT-345';

ANSWER: a

38. The special operator used to check whether an attribute value is within a range of values is _____. a. BETWEEN b. NULL c. LIKE d. IN

ANSWER: a

40. The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. a. COUNT b. MIN c. MAX d. SUM

ANSWER: a

41. In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____. a. data analysis and requirements b. entity relationship modeling and normalization c. data model verification d. distributed database design

ANSWER: a

42. In subquery terminology, the first query in the SQL statement is known as the _____ query. a. outer b. left c. inner d. base

ANSWER: a

42. _____ can render data useless to unauthorized users who might have violated some of the database security layers. a. Data encryption b. Access rights c. Physical security d. Password security

ANSWER: a

45. Which of the following is a hardware-induced database failure? a. Memory chip errors b. Viruses c. Malware d. Abortion due to deadlock

ANSWER: a

46. The last step in the Database Life Cycle (DBLC) is _____. a. maintenance and evolution b. operation c. testing and evaluation d. implementation and loading

ANSWER: a

46. When using the Oracle TO_DATE function, the code _____ represents a three-letter month name. a. MON b. MM3 c. MONTH d. MM

ANSWER: a

47. Oracle recommends _____ for creating audit logs. a. triggers b. stored procedures c. stored functions d. tables

ANSWER: a

47. _____ is a string function that returns the number of characters in a string value. a. LENGTH b. SUBSTRING c. CONCAT d. UCASE

ANSWER: a

48. A(n) _____ cursor is automatically created in procedural SQL when the SQL statement returns only one value. a. implicit b. dynamic c. explicit d. static

ANSWER: a

50. _____ is a relational set operator. a. EXCEPT b. PLUS c. ALL d. EXISTS

ANSWER: a

21. The SQL data manipulation command HAVING: a. restricts the selection of rows based on a conditional expression. b. restricts the selection of grouped rows based on a condition. c. modifies an attribute's values in one or more table's rows. d. groups the selected rows based on one or more attributes.

ANSWER: b

22. Which SQL format would be best used for a small, numeric data type? a. INTEGER b. SMALLINT c. NUMERIC(L,D) d. CHAR(L)

ANSWER: b

23. Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation

ANSWER: b

24. The _____ command restricts the selection of grouped rows based on a condition. a. DISPLAY b. HAVING c. FROM d. CONVERT

ANSWER: b

25. A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. a. INSERT b. SELECT c. COMMIT d. UPDATE

ANSWER: b

26. "What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance

ANSWER: b

26. You cannot have an invalid entry in the foreign key column; at the same time, you cannot delete a vendor row as long as a product row references that vendor. This is known as _____. a. batch updating b. referential integrity c. authentication d. cross joining

ANSWER: b

28. The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance

ANSWER: b

29. The CREATE TABLE command lets you define constraints when you use the CONSTRAINT keyword, known as a(n) _____ constraint. a. column b. table c. index d. cell

ANSWER: b

33. The syntax for a left outer join is _____. a. SELECT column-list FROM table1 OUTER JOIN table2 LEFT WHERE join-condition b. SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition c. SELECT column-list WHERE LEFT table1 = table d. SELECT column-list FROM table1 LEFT table2 [JOIN] WHERE join-condition

ANSWER: b

34. A(n) _____ join performs a relational product (also known as the Cartesian product) of two tables. a. full b. cross c. natural d. equi-

ANSWER: b

34. In DBLC, the phase after the database initial study is _____. a. operation b. database design c. database initial study d. implementation and loading

ANSWER: b

35. The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS

ANSWER: b

36. Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. implementation and loading d. testing and evaluation

ANSWER: b

38. _____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. a. Normalization b. Virtualization c. Specialization d. Generalization

ANSWER: b

39. The Oracle equivalent to an MS Access AutoNumber is a(n) _____. a. auto-number b. sequence c. TO_NUMBER function d. trigger

ANSWER: b

41. The _____ pseudo-column is used to select the next value from a sequence. a. CURRVAL b. NEXTVAL c. NEXT d. GET_NEXT

ANSWER: b

42. In Oracle, _____ retrieves the current value of a sequence. a. NEXTVAL b. CURRVAL c. VARCHAR d. VARCHAR2

ANSWER: b

43. The special operator used to check whether a subquery returns any rows is _____. a. BETWEEN b. EXISTS c. LIKE d. IN

ANSWER: b

44. Which is a feature of a correlated subquery? a. The inner subquery executes first. b. The outer subquery initiates the process of execution in a subquery. c. The inner subquery initiates the process of execution in a subquery. d. The outer subquery executes independent of the inner subquery.

ANSWER: b

48. The first step in the ER model verification process is to _____. a. identify each module and its components b. identify the ER model's central entity c. verify all processes against the ER model d. identify each module's internal transaction requirements

ANSWER: b

50. During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model. a. declaration process b. verification process c. conceptual process d. logical process

ANSWER: b

21. When you create a new database, the RDBMS automatically creates the data _____ tables in which to store the metadata and creates a default database administrator. a. index b. chapter c. dictionary d. appendix

ANSWER: c

22. The SQL command that allows a user to permanently save data changes is _____. a. INSERT b. SELECT c. COMMIT d. UPDATE

ANSWER: c

27. According to the rules of precedence, which of the following computations should be completed first? a. Additions and subtractions b. Multiplications and divisions c. Operations within parentheses d. Power operations

ANSWER: c

28. The _____ constraint is used to validate data when an attribute value is entered. a. UNIQUE b. CASCADE c. CHECK d. SET NULL

ANSWER: c

29. The _____ phase of the Systems Development Life Cycle (SDLC) includes all the necessary technical specifications for the screens, menus, reports, and other devices used to make the system more efficient. a. analysis b. implementation c. detailed systems design d. maintenance

ANSWER: c

29. When using a(n) _____ join, only rows from the tables that match on a common value are returned. a. full b. outer c. inner d. set

ANSWER: c

33. The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain. a. database-produced b. network-produced c. CASE-produced d. design-produced

ANSWER: c

37. Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. operation d. testing and evaluation

ANSWER: c

37. What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE a. set operator b. natural join c. "old-style" join d. procedural statement

ANSWER: c

39. The special operator used to check whether an attribute value matches a given string pattern is _____. a. BETWEEN b. IS NULL c. LIKE d. IN

ANSWER: c

41. A(n) _____ is a query that is embedded (or nested) inside another query. a. alias b. operator c. subquery d. view

ANSWER: c

43. Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints. a. programmer b. manager c. database administrator d. systems administrator

ANSWER: c

44. In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up. a. transaction log backup b. conservative backup c. differential backup d. adaptive backup

ANSWER: c

45. The PL/SQL block starts with the _____ section. a. IS b. OPEN c. DECLARE d. BEGIN

ANSWER: c

45. The _____ function returns the current system date in MS Access. a. TO_DATE() b. SYSDATE() c. DATE() d. TODAY()

ANSWER: c

46. The Oracle string concatenation function is _____. a. CONCAT b. + c. || d. &&

ANSWER: c

47. The first step in developing the conceptual model using ER diagrams is to _____. a. normalize the entities b. complete the initial ER diagram c. identify, analyze, and refine the business rules d. define the attributes, primary keys, and foreign keys for each of the entities

ANSWER: c

48. The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. a. NVL b. TO_CHAR c. DECODE d. CONVERT

ANSWER: c

49. In Oracle, the _____ function converts a date to a character string. a. CONVERT() b. TO_DATE c. TO_CHAR() d. TO_STRING()

ANSWER: c

49. _____ is a cursor attribute that returns TRUE if the last FETCH returned a row, and FALSE if not. a. %ROWCOUNT b. %NOTFOUND c. %FOUND d. %ISOPEN

ANSWER: c

50. No matter what language you use, if it contains embedded SQL statements, it is called the _____ language. a. base b. static c. host d. view

ANSWER: c

22. The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases. a. two b. three c. four d. five

ANSWER: d

23. The _____ command defines a default value for a column when no value is given. a. CHECK b. UNIQUE c. NOT NULL d. DEFAULT

ANSWER: d

23. When writing SQL table-creating command sequences, the entire table definition is enclosed in _____. a. asterisks b. commas c. quotations d. parentheses

ANSWER: d

24. Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation

ANSWER: d

27. The _____ constraint assigns a value to an attribute when a new row is added to a table. a. NOT NULL b. CASCADE c. UNIQUE d. DEFAULT

ANSWER: d

30. Training principles and methodologies are planned during the _____ phase of the Systems Development Life Cycle (SDLC). a. maintenance b. implementation c. analysis d. detailed systems design

ANSWER: d

31. During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented. a. detailed systems design b. analysis c. maintenance d. implementation

ANSWER: d

31. If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause. a. OF b. USING c. HAS d. JOIN ON

ANSWER: d

35. How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18? a. 8 b. 18 c. 26 d. 144

ANSWER: d

36. When a user issues the DELETE FROM tablename command without specifying a WHERE condition, _____. a. no rows will be deleted b. the first row will be deleted c. the last row will be deleted d. all rows will be deleted

ANSWER: d

36. Which comparison operator indicates a value is not equal? a. < b. <= c. >= d. <>

ANSWER: d

37. The _____ command is used to restore the database to its previous condition. a. ROWCOUNT b. BACKUP c. COMMIT d. ROLLBACK

ANSWER: d

38. The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables. a. indexed b. core c. relation d. base

ANSWER: d

39. The implementation and loading phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS

ANSWER: d

40. In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____. a. database analysis and requirements b. ER modeling and normalization c. data model verification d. distributed database design

ANSWER: d

40. Which statement describes a feature of Oracle sequences? a. Oracle sequences are tied to columns and tables. b. Oracle sequences generate a character string that can be assigned to tables. c. An Oracle sequence uses the identity column property to automatically number rows. d. Dropping a sequence does not delete values assigned to table attributes; it deletes only the sequence object from the database.

ANSWER: d

43. In Oracle, _____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping. a. dynamic SQL b. stored procedures c. embedded SQL d. Procedural Language SQL

ANSWER: d

44. A _____ is a block of code containing standard SQL statements and procedural extensions that is stored and executed at the DBMS server. a. cursor-style process b. statement-level trigger c. base table d. persistent storage module (PSM)

ANSWER: d

49. _____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. a. Conceptual design b. Network design c. Logical design d. Physical design

ANSWER: d


Ensembles d'études connexes

Exam 2: Schziophrenia, Bipolar Disorder, Neurocognitive Disorders

View Set

Driving Class Study Set (Chapters 1-6)

View Set

Business Stats Chapter 9 Smartbook

View Set

Solving Equations and Inequalities, Solving Equations and Inequalities

View Set

MO/B- CH 10- "Power and Politics"

View Set

Introductory Concepts and the Production Possibilities Curve

View Set

Chapter 6: Pediatric Considerations

View Set

DSM: Benign Prostatic Hyperplasia

View Set