ch4,6,7,8,10,12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The ________ DBA view shows information about all users of the database in Oracle. A) DBA_USERS B) DBA_INDEXES C) USERS D) DBA_VIEWS

A) DBA_USERS

The ________ operator is used to combine the output from multiple queries into a single result table. A) UNION B) COLLATE C) DIVIDE D) INTERSECT

A) UNION

In order for two queries to be UNION-compatible, they must: A) both output compatible data types for each column and return the same number of rows. B) both have the same number of lines in their SQL statements. C) both return exactly one row. D) both return at least one row.

A) both output compatible data types for each column and return the same number of rows.

SQL-invoked routines can be: A) functions or procedures. B) contained within a CREATE statement. C) part of a DDL statement. D) part of a DCL statement.

A) functions or procedures.

An operation to join a table to itself is called a(n): A) self-join. B) sufficient-join. C) inner join. D) outer join.

A) self-join.

All of the following are advantages to cloud-based computing EXCEPT: A) no need for initial investment in hardware, physical facilities and systems software. B) organizations can explore new data management technologies more easily. C) ACID support for database as a service. D) elasticity.

ACID support for database as a service.

Hive is a(n) ________ data warehouse software. A) Microsoft B) Oracle C) Apache D) Macintosh

Apache

Which of the following are key steps in a data quality program? A) Apply TQM principles and practices B) Do not allow outside data C) Keep all data on one server D) Avoid a data quality audit

Apply TQM principles and practices

If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? A) DBA_TAB_PRIVS B) DBA_TABLES C) DBA_TAB_COMMENTS D) DBA_TABLE_LABEL

B) DBA_TABLES

The following code would include: SELECT Customer_T.CustomerID,CustomerName, OrderIDFROM Customer_T LEFT OUTER JOIN Order_T ONCustomer_T.CustomerID = Order_T.CustomerID; A) all rows of the Order_T Table regardless of matches with the Customer_T Table. B) all rows of the Customer_T Table regardless of matches with the Order_T Table. C) only rows that match both Customer_T and Order_T Tables. D) only rows that don't match both Customer_T and Order_T Tables.

B) all rows of the Customer_T Table regardless of matches with the Order_T Table.

The UNION clause is used to: A) join two tables together to form one table. B) combine the output from multiple queries into a single result table. C) find all rows that are in one table, but not the other. D) find all rows that do not match in two tables.

B) combine the output from multiple queries into a single result table.

A materialized view is/are: A) always an exact copy of the source table. B) copies or replica of data based on queries. C) a virtual table created dynamically on request by a user. D) an in-line query.

B) copies or replica of data based on queries.

When a user creates a virtual table it is called a(n): A) inline view. B) dynamic view. C) materialized view. D) virtual table.

B) dynamic view.

The most commonly used form of join operation is the: A) outer join. B) natural join. C) union join. D) equi-join.

B) natural join.

All of the following are part of the coding structure for triggers EXCEPT: A) action. B) selection. C) condition. D) event.

B) selection.

EXISTS will take a value of ________ if the subquery returns an intermediate results table which contains one or more rows. A) 1 B) true C) undefined D) false

B) true

Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: A) using the if-then-else construct. B) using the CASE key word in a statement. C) using a subquery. D) using the immediate if statement.

B) using the CASE key word in a statement.

All of the following are valid datatypes in Oracle 12c EXCEPT: A) BLOB. B) NUMBER. C) BOOLEAN. D) VARCHAR2.

BOOLEAN

Data in MongoDB is represented in: A) CSON. B) JSON. C) BSON. D) SON.

BSON

The normal form which removes any remaining functional dependencies because there was more than one primary key for the same nonkeys is called: A) sixth normal form. B) fifth normal form. C) Boyce-Codd normal form. D) fourth normal form.

Boyce-Codd normal form.

Which of the following is a component of processing logic? A) Output B) Input C) Retrieval D) Business rules

Business rules

In which of the following situations would one have to use an outer join in order to obtain the desired results? A) There is never a situation that requires only an outer join. B) A report is desired that lists all customers who placed an order. C) A report is desired that lists all customers and the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). D) A report is desired that lists all customers and the total of their orders.

C) A report is desired that lists all customers and the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero).

The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID,CustomerName, OrderIDFROM Customer_T, Order_TWHERE Customer_T.CustomerID = Order_T. CustomerID; A) all rows of the Order_T Table regardless of matches with the Customer_T Table. B) all rows of the Customer_T Table regardless of matches with the Order_T Table. C) only rows that match both Customer_T and Order_T Tables. D) only rows that don't match both Customer_T and Order_T Tables.

C) only rows that match both Customer_T and Order_T Tables.

A type of join between three tables is called a(n): A) self-join. B) pinned join. C) ternary join. D) unnatural join.

C) ternary join.

A named set of SQL statements that are considered when a data modification occurs are called: A) treatments. B) stored procedures. C) triggers. D) trapdoors.

C) triggers.

In the figure below, Customer_ID in the CUSTOMER Table is which type of key? A) Composite B) Standard C) Grouped D) Candidate

Candidate

In the figure below, the primary key for "Order Line" is which type of key? A) Standard B) Foreign C) Grouped D) Composite

Composite

What would the following view contain for values? Create view CustomerOrders asSelect CustID, Count(*) as TotOrders, Sum(ordertotal) as ValueFrom customer inner join sale on customer.customer_id = sale.customer_id; A) An error message B) A listing of all customers in the customer table C) A listing of the customer ID as well as the total orders D) A listing of the customer ID as well as the total number of orders and the total amount spent by the customer

D) A listing of the customer ID as well as the total number of orders and the total amount spent by the customer

________ use the result of the inner query to determine the processing of the outer query. A) Correlated subqueries B) Inner subqueries C) Outer subqueries D) Subqueries

D) Subqueries

A join in which the joining condition is based on equality between values in the common columns is called a(n): A) equi-join. B) unilateral join. C) natural join. D) both equi-join. and natural join.

D) both equi-join. and natural join. .

A procedure is: A) stored outside the database. B) unable to be modified. C) given a reserved SQL name. D) called by name.

D) called by name.

User-defined data types: A) are only allowed in Oracle. B) are not allowed in any DBMS. C) can be used once in a system. D) can have defined functions and methods.

D) can have defined functions and methods.

A ________ is a temporary table used in the FROM clause of an SQL query. A) correlated subquery B) view table C) trigger D) derived table

D) derived table

The following code is an example of a(n): SELECT Customer_T.CustomerID, Order_T.CustomerID,CustomerName, OrderIDFROM Customer_T, Order_TWHERE Customer_T.CustomerID = Order_T. CustomerID; A) Full Outer JOIN. B) subquery. C) Right Outer JOIN. D) equi-join.

D) equi-join.

While triggers run automatically, ________ do not and have to be called. A) updates B) selects C) trapdoors D) routines

D) routines

All of the following are advantages of SQL-invoked routines EXCEPT: A) sharability. B) flexibility. C) efficiency. D) security.

D) security.

The following code is an example of a: SELECT CustomerName, CustomerAddress, CustomerCity, CustomerState,CustomerPostalCodeFROM Customer_TWHERE Customer_T.CustomerID =(SELECT Order_T.CustomerIDFROM Order_TWHERE OrderID = 1008); A) join. B) correlated subquery. C) FULL OUTER JOIN. D) subquery.

D) subquery.

The role that is responsible for developing overall policies and procedures for database security is: A) Accounting. B) Database Development. C) Data Administration. D) Database Administration.

Data Administration.

________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated A) Business integrity B) Data integrity C) Data structure D) Business rule constraint

Data integrity

The role responsible for administering database security is: A) Developers. B) Security. C) Database Administration. D) Data Administration.

Database Administration.

________ is a technical function responsible for database design, security, and disaster recovery. A) Tech support B) Operations C) Data administration D) Database administration

Database administration

Which of the following functions model business rules? A) Database analysis B) Database planning C) Database design D) Operations

Database analysis

Which of the following functions design integrity controls? A) Database analysis B) Database design C) Database implementation D) Database planning

Database design

Which of the following functions design integrity controls? A) Database implementation B) Database design C) Database planning D) Database analysis

Database design

Which of the following functions do cost/benefit models? A) Operations B) Database planning C) Database design D) Database analysis

Database planning

A data management platform service is called: A) Infrastructure-as-a-service. B) Database-as-a-service. C) Software-as-a-service. D) Platform-as-a-service.

Database-as-a-service.

________ problems are encountered when removing data with transitive dependencies. A) Merging B) Insertion C) Deletion D) Modification

Deletion

Many Python web applications use: A) jQuery. B) Django. C) stored procedures. D) iPython.

Django

A co-dependency is a constraint between two attributes or two sets of attributes. True False

False

A composite key consists of only one attribute. True False

False

A data expeditor is a person assigned the responsibility of ensuring that organizational applications properly support the organization's enterprise goals of data quality. True False

False

A data governance committee is always made up of high-ranking government officials. True False

False

A data stewardship program does not help to involve the organization in data quality. True False

False

A database is a sequence of steps that constitute a well-defined business activity. True False

False

A default value is the value that a field will always assume, regardless of what the user enters for an instance of that field. True False

False

A fat client does most of its processing on the server. True False

False

A file organization is a named portion of primary memory. True False

False

A function has only input parameters but can return multiple values. True False

False

A high-level function that is responsible for the overall management of data resources in an organization is called database administration. True False

False

A key is a data structure used to determine the location of rows in a file that satisfy some condition. True False

False

A relation is in first normal form if it has no more than one multivalued attribute. True False

False

A review will thoroughly review all process controls on data entry and maintenance. True False

False

A routine is a named set of SQL statements that are considered when a data modification occurs. True False

False

A subquery in which processing the inner query depends on data from the outer query is called a codependent query. True False

False

A synonym is an attribute that may have more than one meaning. True False

False

A transaction is consistent if it always runs with the same amount of memory. True False

False

A transaction is durable if it can resist failure. True False

False

A transversal dependency is a functional dependency between two or more nonkey attributes. True False

False

ABET is a common encryption method used to secure data traveling between a client and a server. True False

False

An API is a set of routines that a database server uses to access database objects. True False

False

An enterprise key is a foreign key whose value is unique across all relations. True False

False

An equi-join is a join in which one of the duplicate columns is eliminated in the result table. True False

False

An identifier assigned to an associative entity is also called a cross-relation key. True False

False

Backward recovery starts with an earlier copy of the database. True False

False

Big data allows for two different data types (text and numeric). True False

False

Business rules logic includes such activities as data validation and identification of processing errors. True False

False

CASE tools can model more complex data relationships, such as ternary relationships. True False

False

Completeness means that all data that must have a value does not have a value. True False

False

Data integrity consists of powerful operations to manipulate data stored in relations. True False

False

Data which arrive via XML and B2B channels is always guaranteed to be accurate. True False

False

Databases are generally the property of a single department within an organization. True False

False

Dirty data saves work for information systems projects. True False

False

EXISTS takes a value of false if the subquery returns an intermediate result set. True False

False

Economies of storage indicate data storage costs increase every year. True False

False

Generally, records in a customer file never become obsolete. True False

False

Geolocation logic is the application logic component responsible for data storage and retrieval. True False

False

IF-THEN-ELSE logical processing cannot be accomplished within an SQL statement. True False

False

In order to perform a restore/rerun, the database must be mirrored. True False

False

It is better not to have a result set identified before writing GROUP BY and HAVING clauses for a query. True False

False

Loss of data integrity does not impact the quality of data in a database. True False

False

Loss of data integrity means that someone has stolen data from the database server. True False

False

MULTISET is similar to the table datatype. True False

False

Master data management is the disciplines, technologies, and methods to ensure the currency, meaning, and quality of data within one subject area. True False

False

Neo4j is a wide-column NoSQL database management system developed by Oracle. True False

False

One major disadvantage of the outer join is that information is easily lost. True False

False

One method to handle missing values is to substitute an exact value. True False

False

Open source software always comes with complete documentation. True False

False

Quality data are not essential for well-run organizations. True False

False

Quality data does not have to be unique. True False

False

Random password guessing is a type of network security. True False

False

Retention refers to the amount of data that is not purged periodically from tables. True False

False

SOX stands for the Sorbet-Oxford Act. True False

False

Specifications for transactions do not need to be reviewed quickly. True False

False

Specifying the attribute names in the SELECT statement will make it easier to find errors in queries and also correct for problems that may occur in the base system. True False

False

Storage logic is provided by an application server. True False

False

Structured Query Language (SQL) is a set of methodologies, processes, architectures, and technologies that transform raw data into meaningful information. True False

False

The Magna Carta is the W3C standard for Web privacy. True False

False

The Number datatype would be appropriate for a zip code. True False

False

The dive in anywhere characteristic of a data lake overrides constraints related to confidentiality. True False

False

The following query will execute without errors. SELECT Customer.Customer_Name, Salesman.Sales_QuotaFROM CustomerWHERE Customer.Salesman_ID =(SELECT Salesman_IDWHERE Lname = 'SMITH'); True False

False

The logical database design always forms the best foundation for grouping attributes in the physical design. True False

False

The philosophical underpinnings of big data are based on schema on write. True False

False

The primary key of the many side migrates to the one side when transforming a one-to-many relationship. True False

False

The record log is a record of the essential data for each transaction that has been processed against the database. True False

False

The relational data model does, at this time, directly support subtype/supertype relationships. True False

False

The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions. True False

False

The schema on write and schema on read are considered synonymous approaches. True False

False

The smallest unit of named application data is a record. True False

False

The target market for Hadoop is small to medium companies using local area networks. True False

False

The truncate table statement in SQL creates a new table. True False

False

There are two principal types of authorization tables: one for subjects and one for facts. True False

False

Three-tier architectures generally result in higher long-term costs. True False

False

Total quality management (TQM) focuses on defect correction rather than defect prevention. True False

False

Transaction processing and management reporting tend to fit big data databases better than relational databases. True False

False

Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, and replicate tables, but cannot call other triggers. True False

False

Two-tier architectures are much more scalable than three-tier architectures. True False

False

Unlike columns, the rows of a relation may not be interchanged and must be stored in one sequence. True False

False

User-defined functions can improve system performance because they will be processed as sets rather than individually, thus reducing system overhead. True False

False

When developing an application, one must decide where it will be placed when it is developed. True False

False

When transforming a unary many-to-many relationship to relations, a recursive foreign key is used. True False

False

When transforming a weak entity, one should create one relation with both the attributes of the strong entity and the attributes of the weak entity. True False

False

Word processing documents are commonly stored in a 'document store' NoSQL database model. True False

False

One major disadvantage of JSP is: A) it runs slow. B) it is not popular. C) it does not use XML. D) HTML, Java cod,e and SQL code are mixed together.

HTML, Java cod,e and SQL code are mixed together.

Hive uses ________ to query data. A) BeesNest B) Honeyquery C) HiveQL D) SQL

HiveQL

The LAMP stack consists of all of the following EXCEPT: A) IIS. B) PHP or Python. C) MySQL. D) Apache.

IIS

In the figure below, what type of relationship do the relations depict? A) One-to-many B) Multivalued C) Composite foreign key D) Identifying entity/weak entity

Identifying entity/weak entity

Which of the following is NOT true of poor data and/or database administration? A) Data timing problems B) Unknown meanings of stored data C) Maintaining a secure server D) Multiple entity definitions

Maintaining a secure server

Which of the following is NOT true of poor data and/or database administration? A) Data timing problems B) Unknown meanings of stored data C) Multiple entity definitions D) Maintaining a secure server

Maintaining a secure server

The Hadoop framework consists of the ________ algorithm to solve large scale problems. A) MapComponent B) MapCluster C) MapSystem D) MapReduce

MapReduce

The methods to ensure the quality of data across various subject areas are called: A) Variable Data Management. B) Joint Data Management. C) Managed Data Management. D) Master Data Management.

Master Data Management.

________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A) User interface enhancers B) Middleware C) MPP D) Interface managers

Middleware

An organization that decides to adopt the most popular NoSQL database management system would select: A) MongoDB. B) Access. C) Neo4j. D) Redis.

MongoDB.

An organization that requires a graph database that is highly scalable would select the ________ database management system. A) Neo4j B) Excel Spreadsheet C) Redis D) Access

Neo4j

According to your text, NoSQL stands for: A) Numbered SQL. B) No SQL. C) Not Only SQL. D) Numeric Only SQL.

No SQL.

Which of the following are properties of relations? A) There are multivalued attributes in a relation. B) Each attribute has the same name. C) All columns are numeric. D) No two rows in a relation are identical.

No two rows in a relation are identical.

All of the following are well-accepted characteristics of transactions EXCEPT: A) Persistence. B) Durability. C) Atomicity. D) Consistency.

Persistence

In which data model would a code table appear? A) Conceptual B) Logical C) Data layout D) Physical

Physical

________ is an important scripting language to help reduce the complexity of MapReduce. A) Cat B) Pig C) Horse D) Dog

Pig

The W3C standard for Web privacy is called: A) Platform for Privacy Preferences. B) the Magna Carta. C) the Web privacy act. D) Freedom of Web Information Act.

Platform for Privacy Preferences.

In the figure below, what type of key is depicted? A) Primary B) Composite C) Recursive primary D) Recursive foreign

Recursive foreign

An organization that requires a sole focus on performance with the ability for keys to include strings, hashes, lists, and sorted sets would select ________ database management system. A) Excel Spreadsheet B) Access C) Neo4j D) Redis

Redis

________ is the most popular key-value store NoSQL database management system. A) Access B) Redis C) Neo4j D) Apache Cassandra

Redis

________ is used to undo unwanted database changes. A) Encryption B) Restart C) Rollforward D) Rollback

Rollback

Which of the following violates the atomic property of relations? A) Atomic B) Sam Hinz C) Hinz D) Sam

Sam Hinz

Which of the following is NOT a reason to create an instance of a relational schema with sample data? A) Sample data can reverse database implementation errors. B) Sample data can be used for prototype generation. C) Sample data provide a convenient way to check the accuracy of your design. D) Sample data can be used to improve user communications.

Sample data can reverse database implementation errors.

A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form? A) First B) Second C) Third D) Fourth

Second

A common encryption method to secure data traveling between a client and a server is called: A) ITT. B) RSA. C) Secure Synchronization Layer (SSL). D) Secure Sockets Layer (SSL).

Secure Sockets Layer (SSL).

Which type of file is most efficient with storage space? A) Sequential B) Indexed C) Clustered D) Hashed

Sequential

Which of the following is a principal type of authorization table? A) View B) Index C) Subject D) Transaction

Subject

Which of the following is NOT a common distribution logic for two-tiered server environments? A) Tall client B) Fat client C) Distributed D) Thin client

Tall client

The figure below is an example of mapping which type of relationship? A) Unary B) Ternary C) Second D) First

Ternary

TQM stands for: A) Total Quality Management. B) Total Quality Manipulation. C) Transforming Quality Management. D) Thomas Quinn Mann, a famous data quality innovator.

Total Quality Management.

________ generally processes the largest quantities of data. A) Data marts B) Big data C) Operational databases D) Transaction processing

Transaction processing

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes. True False

True

A base table is the underlying table that is used to create views. True False

True

A business owner that needs carefully normalized tables would likely need a relational database instead of a NoSQL database. True False

True

A business transaction requires several actions against a database. True False

True

A candidate key is an attribute, or combination of attributes, that uniquely identifies a row in a relation. True False

True

A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions. True False

True

A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client. True False

True

A client/server configuration that has three layers (one client and two servers) has a three-tier architecture. True False

True

A correlated subquery is executed once for each iteration through the outer loop. True False

True

A data quality audit helps an organization understand the extent and nature of data quality problems. True False

True

A data steward is a person assigned the responsibility of ensuring the organizational applications properly support the organization's enterprise goals for data quality. True False

True

A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization. True False

True

A materialized view is not persistent. True False

True

A natural join is the same as an equi-join, except that it is performed over matching columns that have been defined with the same name, and one of the duplicate columns is eliminated. True False

True

A partial functional dependency is a functional dependency in which one or more nonkey attributes are functionally dependent on part (but not all) of the primary key. True False

True

A pointer is a field of data that can be used to locate a related field or record of data. True False

True

A procedure is run by calling it by its name. True False

True

A range control limits the set of permissible values that a field may assume. True False

True

A relation in the fifth normal form may not contain any anomalies. True False

True

A tablespace is a named set of disk storage elements in which physical files for the database tables may be stored. True False

True

A trigger is a named set of SQL statements that are considered when a data modification occurs. trigger is a named set of SQL statements that are considered when a data modification occurs. True False

True

A web server is a key component of web applications. True False

True

All transactions must have the ACID characteristics. True False

True

All values that appear in a column of a relation must be taken from the same domain. True False

True

Along with table scans, other elements of a query can be processed in parallel. True False

True

An SQL query that implements an outer join will return rows that do not have matching values in common columns. True False

True

An audit trail of transactions and database changes is kept by a journalizing facility. True False

True

Apache Cassandra is a wide-column NoSQL database management system. True False

True

Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance. True False

True

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data. True False

True

Broad network access is a characteristic of cloud computing. True False

True

Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services. True False

True

Clustering allows for adjacent secondary memory locations to contain rows from several tables. True False

True

Collect everything is a characteristic of a data lake. True False

True

Completeness means that all data that are needed are present. True False

True

Conformance refers to whether the data is stored, exchanged, or presented in a format that is as specified by its metadata. True False

True

Constraints are a special case of triggers. True False

True

Correlated subqueries are less efficient than queries that do not use nesting. True False

True

Data quality is essential for SOX and Basel II compliance. True False

True

Data structures include data organized in the form of tables with rows and columns. True False

True

Database administrators are responsible for administering database security. True False

True

Dirty data can cause delays and extra work on information systems projects. True False

True

Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures. True False

True

Figuring out what attributes you want in your query before you write the query will help with query writing. True False

True

Graph-oriented databases are designed to maintain information regarding the relationships between data items. True False

True

HBASE is a wide-column store database that runs on top of HDFS (modeled after Google). True False

True

HP HAVEn integrates HP technologies with open source big data technologies. True False

True

Hash partitioning spreads data evenly across partitions independent of any partition key value. True False

True

Hive creates MapReduce jobs and executes them on a Hadoop Cluster. True False

True

If an identifier is not assigned, the default primary key for an associative relation consists of the two primary key attributes from the other two relations. True False

True

Improving data capture process is a fundamental step in data quality improvement. True False

True

In a Heap file organization, files are not stored in any particular order. True False

True

In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with the IN qualifier. True False

True

In some three-tier architectures, most application code is stored on the application server. True False

True

Indexes are most useful for columns that frequently appear in WHERE clauses of SQL commands, either to qualify the rows to select or for linking. True False

True

JSON is commonly used in conjunction with the 'document store' NoSQL database model. True False

True

Java servlets execute from within another program and reside on the server. True False

True

Joining tables or using a subquery may produce the same result. True False

True

Keeping the zip code with the city and state in a table is a typical form of denormalization. True False

True

Lack of organizational commitment is a potential reason for an organization's deteriorated data quality. True False

True

Level of lock granularity is the extent of a database resource include with each lock. True False

True

Loss of confidentiality is a threat that involves outside parties using information to embarrass a company. True False

True

MapReduce is an algorithm for massive parallel processing utilized by Hadoop. True False

True

NoSQL databases DO NOT support ACID (atomicity, consistency, isolation, and durability). True False

True

NoSQL stands for 'Not only SQL.' True False

True

ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed. True False

True

One objective of selecting a data type is to minimize storage space. True False

True

One property of a relation is that each attribute within a relation has a unique name. True False

True

Open source DBMS are free software that provide the core functionality of an SQL compliant DBMS. True False

True

Requirements for response time, data security, backup, and recovery are all requirements for physical design. True False

True

SQL allows one to calculate linear regressions, moving averages, and correlations without moving the data outside of the database. True False

True

Sample data are useful for developing prototype applications and for testing queries. True False

True

Security is one advantage of partitioning. True False

True

Server logs are considered a big data variety data type. True False

True

Since dynamic Web pages require full access to the database, security is different from static HTML pages. True False

True

Sound data modeling is a central ingredient of a data quality program. True False

True

Specifying database access policies is done during the database implementation phase. True False

True

The 'schema on read' approach often incorporates JSON or XML. True False

True

The LAMP stack consists of Apache, PHP and MySQL. True False

True

The UNION clause is used to combine the output from multiple queries into a single result table. True False

True

The allowable range of values for a given attribute is part of the domain constraint. True False

True

The data administrator takes responsibility for the overall management of data resources. True False

True

The following queries produce the same results. SELECT DISTINCT Customer_Name, Customer_CityFROM Customer, SalesmanWHERE Customer.Salesman_ID = Salesman.Salesman_IDand Salesman.Lname = 'SMITH'; SELECT Customer_Name, Customer_CityFROM CustomerWHERE Customer.Salesman_ID =(SELECT Salesman_IDFROM SalesmanWHERE Lname = 'SMITH'); True False

True

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access. True False

True

The joining condition of an equi-join is based upon an equality. True False

True

The original three 'v's' attributed to big data include volume, variety, and velocity. True False

True

The role of database administration is typically a more hands-on, physical involvement with the management of databases. True False

True

The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application. True False

True

The uncontrolled proliferation of spreadsheets, databases, and repositories leads to data quality problems. True False

True

Triggers have three parts: the event, the condition, and the action. True False

True

Two-phase locking is a procedure for acquiring locks for a transaction before any are released. True False

True

Using an outer join produces this information: rows that do not have matching values in common columns are not included in the result table. True False

True

Value (related to the five 'v's' of big data) addresses the pursuit of a meaningful goal. True False

True

Vertical partitioning means distributing the columns of a table into several separate physical tables. True False

True

View integration is the process of merging relations together. True False

True

When EXISTS or NOT EXISTS is used in a subquery, the select list of the subquery will usually just select all columns as a placeholder because it doesn't matter which columns are returned. True False

True

When a regular entity type contains a multivalued attribute, two new relations are created. True False

True

When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated. True False

True

When normalizing, the goal is to decompose relations with anomalies to produce smaller, well-structured relations. True False

True

When two or more attributes describe the same characteristic of an entity, they are synonyms. True False

True

________ includes NoSQL accommodation of various data types. A) Variety B) Verified C) Vigilant D) Velocity

Variety

________ includes the value of speed in a NoSQL database. A) Vigilant B) Verified C) Variety D) Velocity

Velocity

________ includes concern about data quality issues. A) Vigilant B) Variety C) Veracity D) Velocity

Veracity

An open source DBMS is: A) an object-oriented database management system. B) source code for a commercial RDBMS. C) a free source code RBMS that provides the functionality of an SQL-compliant DBMS. D) a beta release of a commercial RDBMS.

a free source code RBMS that provides the functionality of an SQL-compliant DBMS.

While views promote security by restricting user access to data, they are not adequate security measures because: A) views are not possible to create in most DBMS. B) all users can read any view. C) a view's data does not change. D) an unauthorized person may gain access to a view through experimentation.

an unauthorized person may gain access to a view through experimentation.

A transaction is considered isolated when: A) users can see changes to tables before the transaction is complete. B) it can only be run on one server. C) it runs in a vacuum. D) any changes in the database are not revealed to the user until the transaction is complete.

any changes in the database are not revealed to the user until the transaction is complete.

In order for a transaction to be consistent: A) any database constraints that must be true before the transaction must also be true after the transaction. B) it must tell the truth. C) it must run using the same amount of memory. D) it must run the same way all the time.

any database constraints that must be true before the transaction must also be true after the transaction.

A device to measure or detect fingerprints or signatures is called a(n) ________ device. A) laser B) view C) biometric D) ink

biometric

All of the following are additional methods of Web security EXCEPT: A) restrict access to the Web server. B) remove unneeded programs. C) restrict the number of users on the Web server. D) blacklist bad users.

blacklist bad users.

One way to improve the data capture process is to: A) provide little or no training to data entry operators. B) allow all data to be entered manually. C) not use any automatic data entry routines. D) check entered data immediately for quality against data in the database.

check entered data immediately for quality against data in the database.

A method to allow adjacent secondary memory space to contain rows from several tables is called: A) concatenating. B) cluttering. C) compiling. D) clustering.

clustering

MongoDB databases are composed of: A) rowsets. B) tables. C) columns. D) collections.

collections

A primary key that consists of more than one attribute is called a: A) multivalued key. B) cardinal key. C) composite key. D) foreign key.

composite key.

In the SQL language, the ________ statement is used to make table definitions. A) create index B) create table C) create session D) select

create table

When a regular entity type contains a multivalued attribute, one must: A) delete the relation and start over. B) create two new relations, both containing the multivalued attribute. C) create a single relation with multiple lines for each instance of the multivalued attribute. D) create two new relations, one containing the multivalued attribute.

create two new relations, one containing the multivalued attribute.

A mechanism in a ResultSet object in Java that points to the current row of data is called a: A) table. B) trigger. C) stored procedure. D) cursor.

cursor

Data quality problems can cascade when: A) data are not deleted properly. B) there is redundant data storage and inconsistent metadata. C) data are copied from legacy systems. D) there are data entry problems.

data are copied from legacy systems.

Conformance means that: A) data are stored, exchanged, or presented in a format that is specified by its metadata. B) data are stored in a way to expedite retrieval. C) data is a harbinger. D) data have been transformed.

data are stored, exchanged, or presented in a format that is specified by its metadata.

Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems. A) external data source B) lack of organizational commitment C) data entry D) inconsistent metadata

data entry

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A) programmer productivity B) data integrity C) query design D) data integration

data integrity

When a data repository (including internal and external data) does NOT follow a predefined schema, this is called a: A) data ocean. B) data stream. C) data dump. D) data lake.

data lake.

The Hadoop Distributed File System (HDFS) is the foundation of a ________ infrastructure of Hadoop. A) DBBMS B) relational database management system C) Java D) data management

data management

With HDFS it is less expensive to move the execution of computation to data than to move the: A) data to systems analysis. B) data to processes. C) data to computation. D) data to hardware.

data to computation.

A detailed coding scheme recognized by system software for representing organizational data is called a(n): A) data type. B) DB layout. C) SQL. D) DBMS code.

data type.

The value a field will assume unless the user enters an explicit value for an instance of that field is called a: A) null value. B) gurand. C) range control. D) default value.

default value.

Which of the following is not a basic step to accessing a database from an application: A) define physical storage. B) open a connection. C) register database driver. D) query the database.

define physical storage.

Designing physical files requires ________ of where and when data are used in various ways. A) descriptions B) maps C) keys D) hints

descriptions

A nonkey attribute is also called a(n): A) unimportant datum. B) descriptor. C) address. D) column.

descriptor.

The attribute on the left-hand side of the arrow in a functional dependency is the: A) candidate key. B) determinant. C) primary key. D) foreign key.

determinant

Big data: A) does not require a strictly defined data model. B) requires a normalized dataset to BCNF. C) requires a strictly defined schema. D) requires a normalized dataset to 3rd Normal Form.

does not require a strictly defined data model.

A primary key whose value is unique across all relations is called a(n): A) foreign global key. B) global primary key. C) inter-table primary key. D) enterprise key.

enterprise key

A contiguous section of disk storage space is called a(n): A) sector. B) track. C) tablespace. D) extent.

extent

Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality. A) external data source B) lack of organizational commitment C) inconsistent metadata D) data entry problem

external data source

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a: A) file processor. B) database server. C) file server. D) fat client.

fat client.

A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. A) physical pointer B) update program C) retrieval program D) file organization

file organization

NoSQL focuses on: A) flexibility. B) normalized data. C) minimizing storage space. D) avoidance of replication of data.

flexibility

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A) link key. B) foreign key. C) link attribute. D) foreign attribute.

foreign key.

The normal form which deals with multivalued dependencies is called: A) Boyce-Codd normal form. B) sixth normal form. C) fourth normal form. D) fifth normal form.

fourth normal form.

A constraint between two attributes is called a(n): A) functional relation constraint. B) functional relation. C) functional dependency. D) attribute dependency.

functional dependency.

The NoSQL model that is specifically designed to maintain information regarding the relationships (often real-world instances of entities) between data items is called a: A) document store. B) key-value store. C) wide-column store. D) graph-oriented database.

graph-oriented database.

A file organization where files are not stored in any particular order is considered a: A) heap file organization. B) multi-indexed file organization. C) hashed file organization. D) hash key.

heap file organization.

Data governance can be defined as: A) high-level organizational groups and processes that oversee data stewardship. B) a means to increase the speed of data. C) a government task force for defining data quality. D) a means to slow down the speed of data.

high-level organizational groups and processes that oversee data stewardship.

Data that are accurate, consistent, and available in a timely fashion are considered: A) Microsoft-based. B) high-quality. C) low-quality. D) Oracle-based.

high-quality.

An attribute that may have more than one meaning is called a(n): A) double defined attribute. B) synonym. C) alias. D) homonym.

homonym

The best place to improve data entry across all applications is: A) in the users. B) in the database definitions. C) in the level of organizational commitment. D) in the data entry operators.

in the database definitions.

Data quality is important for all of the following reasons EXCEPT: A) it provides a stream of profit. B) it helps to expand the customer base. C) it aids in making timely business decisions. D) it minimizes project delay.

it provides a stream of profit.

The NoSQL model that includes a simple pair of a key and an associated collection of values is called a: A) key-value store. B) document store. C) graph database. D) wide-column store.

key-value store.

It is true that in an HDFS cluster the DataNodes are the: A) language libraries. B) single master servers. C) large number of slaves. D) business intelligences.

large number of slaves.

Big data includes: A) large volumes of data with many different data types that are processed at very high speeds. B) large volumes of entity relationship diagrams (ERD) with a single data type processed at very high speeds. C) large volumes of entity relationship diagrams (ERD) with many different data types that are processed at very high speeds. D) large volumes of data entry with a single data type processed at very high speeds.

large volumes of data with many different data types that are processed at very high speeds.

The extent of the database resource that is included with each lock is called the level of: A) management. B) lock granularity. C) TIO. D) impact.

lock granularity.

A form of database design which maps conceptual requirements is called: A) physical design. B) logical designs. C) response designs. D) security design.

logical designs.

Big data requires effectively processing: A) many data types. B) a single data type (text). C) two data types (text and numeric). D) a single data type (numeric).

many data types.

All of the following are the main goals of normalization EXCEPT: A) make it easier to maintain data. B) minimize data redundancy. C) maximize storage space. D) simplify the enforcement of referential integrity.

maximize storage space.

Which Java method retrieves the next row of a cursor? A) load() B) first() C) get() D) next()

next()

An organization using HDFS realizes that hardware failure is a(n): A) norm. B) anomaly. C) irregularity. D) inconsistency.

norm

All of the following are popular architectures for Master Data Management EXCEPT: A) persistent. B) identity registry. C) normalization. D) integration hub

normalization.

A requirement to begin designing physical files and databases is: A) all datatypes determined. B) implementation complete. C) normalized relations. D) physical tables created.

normalized relations.

NoSQL includes data storage and retrieval: A) not based on the relational model. B) based on the relational model. C) not based on data. D) based on normalized tables.

not based on the relational model.

Durability means that: A) transactions can withstand failure. B) transactions never finish on time. C) once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction. D) transactions can't be erased.

once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction.

Understanding the steps involved in transforming EER diagrams into relations is important because: A) there are rarely legitimate alternatives from which to choose. B) CASE tools model hypothetical business problems. C) CASE tools can model any situation. D) one must be able to check the output of a CASE tool.

one must be able to check the output of a CASE tool.

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the: A) user. B) XML. C) operating system. D) CEO.

operating system.

A functional dependency in which one or more nonkey attributes are functionally dependent on the part, but not all, of the primary key is called a ________ dependency. A) partial functional B) partial key-based C) merged relation D) cross key

partial functional

In the ________ approach, one consolidated record is maintained from which all applications draw data. A) persistent B) persnickity C) data-oriented D) cautious

persistent

In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record. A) integration hub B) persistent C) federated D) identity registry

persistent

All of the following are advantages of stored procedures EXCEPT: A) portability. B) thinner client. C) network traffic deceases. D) performance improves for compiled SQL statements.

portability

All of the following are key components of a web application EXCEPT: A) processing-logic server. B) web server. C) web browser. D) database server.

processing-logic server.

A two-dimensional table of data sometimes is called a: A) group. B) relation. C) set. D) declaration.

relation.

Data quality ROI stands for: A) rough outline inclusion. B) rate of installation. C) risk of incarceration. D) return on installation.

risk of incarceration.

NoSQL systems allow ________ by incorporating commodity servers that can be easily added to the architectural solution. A) scaling up B) scaling down C) scaling out D) scaling over

scaling out

When reporting and analysis organization of the data is determined when the data is used is called a(n): A) cognitive schema. B) schema on read. C) entity relationship diagram. D) schema binding.

schema on read.

One field or combination of fields for which more than one record may have the same combination of values is called a(n): A) secondary key. B) index. C) composite key. D) linked key.

secondary key.

Guidelines for server security should include all of the following EXCEPT: A) password naming conventions. B) guidelines for password lengths. C) guidelines for frequency of password changes. D) securing the network between client and server.

securing the network between client and server.

A business transaction requires: A) human intervention. B) several actions against the database. C) a trigger. D) a stored procedure.

several actions against the database.

NoSQL systems enable automated ________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it. A) sharding B) sharing C) SQL D) mongo

sharding

It is true that in an HDFS cluster the NameNode is the: A) large number of slaves. B) single master server. C) business intelligence. D) language library.

single master server.

One simple task of a data quality audit is to: A) establish quality metrics. B) statistically profile all files. C) interview all users. D) load all data into a data warehouse.

statistically profile all files.

Two or more attributes having different names but the same meaning are called: A) aliases. B) synonyms. C) alternate attributes. D) homonyms.

synonyms

Data is represented in the form of: A) chairs. B) data notes. C) tables. D) data trees.

tables

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): A) extent. B) table. C) partition. D) tablespace.

tablespace

How the database results are read into memory is determined by: A) the program. B) the database driver. C) the operating system. D) None of these.

the database driver.

A candidate key must satisfy all of the following conditions EXCEPT: A) the key must indicate the row's position in the table. B) the key must be nonredundant. C) each nonkey attribute is functionally dependent upon it. D) the key must uniquely identify the row.

the key must indicate the row's position in the table.

External data sources present problems for data quality because: A) data are not always available. B) data are unformatted. C) there are poor data capture controls. D) there is a lack of control over data quality.

there is a lack of control over data quality.

A PC configured to handle user interfaces with limited local storage is called a(n): A) light client. B) overweight client. C) fat client. D) thin client

thin client.

One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is: A) currency. B) consistency. C) referential integrity. D) timeliness.

timeliness

A method for handling missing data is to: A) perform insensitivity testing. B) delete the associated row. C) substitute with random numbers for the missing data. D) track missing data with special reports.

track missing data with special reports.

A discrete unit of work that must be processed completely or not at all within a computer system is called a: A) journalizing facility. B) before image. C) transaction. D) change control device.

transaction

A sequence of steps that constitute a well-defined business activity is called a: A) table. B) transfixture. C) database. D) transaction.

transaction

A functional dependency between two or more nonkey attributes is called a: A) transitive dependency. B) partial functional dependency. C) partial nonkey dependency. D) partial transitive dependency.

transitive dependency.

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released. A) record controller B) authorization rule C) two-phase lock D) exclusive lock

two-phase lock

Quality data can be defined as being: A) unique. B) historical. C) inaccurate. D) precise.

unique.

All of the following are objectives when selecting a data type EXCEPT: A) improve data integrity. B) use a lot of storage space. C) support all data manipulations. D) represent all possible values.

use a lot of storage space.

Although volume, variety, and velocity are considered the initial three v dimensions, two additional Vs of big data were added and include: A) volume and verified. B) veracity and verified. C) verified and valuable. D) veracity and value.

veracity and value.

The three 'v's' commonly associated with big data include: A) vigilant, viewable, and verified. B) viewable, volume, and variety. C) verified, variety, and velocity. D) volume, variety, and velocity.

volume, variety, and velocity.

A relation that contains minimal redundancy and allows easy use is considered to be: A) well-structured. B) complex. C) clean. D) simple.

well-structured.

Apache Cassandra is a leading producer of ________ NoSQL database management systems. A) key-value store B) graph C) wide-column D) relational

wide-column

The NoSQL model that incorporates 'column families' is called a: A) document store. B) column-SQL database. C) wide-column store. D) key-value store.

wide-column store.


संबंधित स्टडी सेट्स

MKT 291 Ch. 3 Understanding the Environment, Ethical Behavior and Social Responsibility

View Set

Small Business Management - Exam 4

View Set

Customer Service Quizizz on Questions 11 - 30

View Set

Astronomy Ch. 13 Uranus and Neptune: The outer Worlds of the Solar System

View Set

Chapter 8&9 Antiinfective Agents& Antibiotics

View Set

Analyzing and Evaluating Arguments 100%

View Set

MAR 5625 - Marketing Research and Analytics - Chapter 9

View Set