Chapter 1: Database Systems, Chapter 2: Data Models, Chapter 3: The Relation Database Model, Chapter 4: Entity Relationship ER Modeling, Chapter 6: Normalization of Database Tables, Chapter 7: Introduction to Structured Query Language (SQL), Chapter...

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is true of NoSQL databases? a. They do not support distributed database architectures. b. They are not based on the relational model. c. They are geared toward transaction consistency rather than performance. d. They do not support very large amounts of sparse data.

ANSWER: b

Which of the following types of HDFS nodes acts as the interface between the user application and the HDFS? a. Data node b. Client node c. Name node d. Map node

ANSWER: b

_____ CASE tools provide support for the coding and implementation phases. a. Front-end b. Back-end c. Vertical d. Horizontal

ANSWER: b

_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications. a. Backup and recovery b. System support c. Performance monitoring and tuning d. Security auditing and monitoring

ANSWER: b

_____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely. a. Normalized b. Data warehouse c. Temporary d. Report

ANSWER: b

_____ fragmentation refers to the division of a relation into subsets of tuples. a. Vertical b. Horizontal c. Data d. Mixed

ANSWER: b

From a database point of view, the collection of data becomes meaningful only when it reflects properly defined _____.

ANSWER: business rules

A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence. a. partial dependency b. transitive dependency c. repeating group d. primary key

ANSWER: c

A _____ lock will lock the entire diskpage. a. transaction-level b. table-level c. page-level d. row-level

ANSWER: c

A _____ relationship exists when three entities are associated. a. unary b. strong c. ternary d. weak

ANSWER: c

A data administrator is also known as a(n) _____. a. data security officer b. systems administrator c. information resource manager d. information engineering officer

ANSWER: c

In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up. a. transaction log backup b. conservative backup c. differential backup d. adaptive backup

ANSWER: c

In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools. a. access plan b. active data dictionary c. information systems architecture d. security policy

ANSWER: c

A(n) _____ is a collection of similar objects with a shared structure and behavior.

ANSWER: class

The entity relationship diagram (ERD) represents the _____ database as viewed by the end user. a. condensed b. physical c. logical d. conceptual

ANSWER: d

The only way to access the data in a database is through the DBMS. a. True b. False

a. True

Corporations use only structured data. a. True b. False

b. False

Data is the result of processing raw facts to reveal its meaning. a. True b. False

b. False

A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization. a. desktop b. workgroup c. enterprise d. transactional

b. Workgroup

A(n) _____ database is used by an organization and supports many users across many departments. a. desktop b. workgroup c. enterprise d. transactional

c. Enterprise

_____ is the body of information and facts about a specific subject. a. Validation b. A format c. Knowledge d. A database

c. Knowledge

The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event. a. True b. False

ANSWER: False

The hierarchical model is software-independent. a. True b. False

ANSWER: False

The order of the rows and columns is important to the DBMS. a. True b. False

ANSWER: False

Time stamps must only have the single property of uniqueness. a. True b. False

ANSWER: False

Date procedures are often more software-specific than other SQL procedures. a. True b. False

ANSWER: True

The phenomenon of uncommitted data occurs when two transactions are executed concurrently and the first transaction is rolled back after the second transaction has already accessed the uncommitted data—thus violating the isolation property of transactions. a. True b. False

ANSWER: True

The practical significance of taking the logical view of a database is that it serves as a reminder of the simple file concept of data storage. a. True b. False

ANSWER: True

The term "database development" is used to describe the process of database design and implementation. a. True b. False

ANSWER: True

_____ is a language based on OO concepts that describes a set of diagrams and symbols used to graphically model a system.

ANSWER: UML (Unified Modeling Language) Unified Modeling Language (UML) Unified Modeling Language UML

The _____ specification is used to avoid having duplicated values in a column.

ANSWER: UNIQUE

"_____" means that the names of the relation attributes must be the same and their data types must be alike.

ANSWER: Union-compatible

A _____ attribute can be further subdivided to yield additional attributes. a. composite b. simple c. single-valued d. multivalued

ANSWER: a

A _____ is any key that uniquely identifies each row. a. superkey b. special key c. foreign key d. candidate key

ANSWER: a

A _____ lets a single SQL statement access the data that are to be processed by a single remote database processor. a. remote request b. remote transaction c. distributed request d. distributed transaction

ANSWER: a

A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. a. outer b. inner c. equi- d. cross

ANSWER: a

An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence. a. existence b. relationship c. business d. data

ANSWER: a

Another name for a composite entity is a(n) _____ entity. a. bridge b. linked c. directive d. associative

ANSWER: a

Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B. a. determines b. derives from c. controls d. owns

ANSWER: a

Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design. a. information b. entity c. design d. processing

ANSWER: a

From a structural point of view, 2NF is better than _____. a. 1NF b. 3NF c. 4NF d. BCNF

ANSWER: a

Ideally, an entity identifier is composed of _____ attribute(s). a. one b. two c. three d. six

ANSWER: a

In subquery terminology, the first query in the SQL statement is known as the _____ query. a. outer b. left c. inner d. base

ANSWER: a

In the _____ model, the basic logical structure is represented as an upside-down tree. a. hierarchical b. network c. relational d. entity relationship

ANSWER: a

In a relational table, each column has a specific range of values known as the _____ domain.

ANSWER: attribute

A _____ attribute is one that cannot be subdivided. a. composite b. simple c. single-valued d. multivalued

ANSWER: b

A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship. a. strong b. weak c. business d. child

ANSWER: b

BCNF can be violated only if the table contains more than one _____ key. a. primary b. candidate c. foreign d. secondary

ANSWER: b

Data warehouse routinely uses _____ structures in its complex, multilevel, multisource data environment. a. 1NF b. 2NF c. 3NF d. 4NF

ANSWER: b

In a(n) _____ diagram, the arrows above the attributes indicate all desirable dependencies. a. Chen b. dependency c. functionality d. ER

ANSWER: b

In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent. a. hierarchical b. network c. object-oriented d. entity relationship

ANSWER: b

Rapid ad hoc data became unnecessary in the quick-response decision-making environment. a. True b. False

ANSWER: False

The level of transparency supported by the distributed database management system remains the same for all systems. a. True b. False

ANSWER: False

ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. a. True b. False

ANSWER: True

After the initial declarations in Database Life Cycle (DBLC), the database designer must carefully probe in order to generate additional information that will help define the problem within the larger framework of company operations. a. True b. False

ANSWER: True

_____ are normally expressed in the form of rules. a. Attributes b. Entities c. Relationships d. Constraints

ANSWER: d

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. a. Integrity b. Compliance c. Availability d. Confidentiality

ANSWER: d

Which of the following is a hardware-induced database failure? a. Memory chip errors b. Viruses c. Malware d. Abortion due to deadlock

ANSWER: a

The _____ relationship is the "relational model ideal." a. 1:1 b. 1:M c. M:1 d. M:N

ANSWER: b

The _____ rule requires that all copies of data fragments be identical. a. shared fragment b. mutual consistency c. horizontal fragmentation d. replication

ANSWER: b

The conceptual model can handle _____ relationships and multivalued attributes. a. 1:1 b. M:N c. 1:M d. 1:N

ANSWER: b

In Oracle, the _____ function converts a date to a character string. a. CONVERT() b. TO_DATE c. TO_CHAR() d. TO_STRING()

ANSWER: c

The web is the repository for distributed data. a. True b. False

ANSWER: True

A(n) _____ is an alternate name given to a column or table in any SQL statement. a. alias b. data type c. stored function d. trigger

ANSWER: a

Each table _____ represents an attribute. a. column b. row c. dimension d. value

ANSWER: a

In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's: a. lower levels. b. top levels. c. target markets. d. customer base.

ANSWER: a

A(n) _____ data dictionary is automatically updated by the DBMS with every database access. a. dynamic b. active c. passive d. static

ANSWER: b

Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be semantically correct. a. True b. False

ANSWER: True

An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations. a. True b. False

ANSWER: True

An entity in the entity relationship model corresponds to a table in the relational environment. a. True b. False

ANSWER: True

In order to manage distributed data, copies or parts of the database processing functions must be distributed to all data storage sites. a. True b. False

ANSWER: True

In the Chen and Crow's Foot notations, an entity is represented with a rectangle containing the entity's name. a. True b. False

ANSWER: True

In the Systems Development Life Cycle (SDLC), problems defined during the planning phase are examined in greater detail during the analysis phase. a. True b. False

ANSWER: True

In the context of data models, an entity is a person, place, thing, or event about which data will be collected and stored. a. True b. False

ANSWER: True

It is possible for a table in 2NF to exhibit transitive dependency, where the primary key may rely on one or more nonprime attributes to functionally determine other nonprime attributes. a. True b. False

ANSWER: True

Since a partial dependency can exist only if a table's primary key is composed of several attributes, if a table in 1NF has a single-attribute primary key, then the table is automatically in 2NF. a. True b. False

ANSWER: True

The database contents might be loaded interactively or in batch mode using a variety of methods and devices including customized user programs. a. True b. False

ANSWER: True

The multiuser DBMS must implement controls to ensure serializability and isolation of transactions, in addition to atomicity and durability, in order to guard the database's consistency and integrity. a. True b. False

ANSWER: True

The network model has structural level dependence. a. True b. False

ANSWER: True

A(n) _____ is bidirectional. a. attribute b. entity c. relationship d. constraint

ANSWER: c

A(n) _____'s main function is to help one understand the complexities of the real-world environment. a. node b. entity c. model d. database

ANSWER: c

An operational database is sometimes referred to as an enterprise database. a. True b. False

b. False

Raw data must be properly _____ for storage, processing and presentation.

formatted

When a database stores the majority of data in RAM rather than in hard disks, it is referred to as a(n) _____ database.

in-memory

_____ exists when different versions of the same data appear in different places. a. Data inconsistency b. Poor data security c. Structural dependence d. Conceptual dependence

a. Data inconsistency

In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities. a. (max, min) b. (min, max) c. [min ... max] d. {min

max}| ANSWER: b

A(n) _____ is a specific request issued to the DBMS for data manipulation.

query

All SQL commands must be issued on a single line. a. True b. False

ANSWER: False

An alias cannot be used when a table is required to be joined to itself in a recursive query. a. True b. False

ANSWER: False

Comparison operators cannot be used to place restrictions on character-based attributes. a. True b. False

ANSWER: False

Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure. a. True b. False

ANSWER: False

The idea of determination is unique to the database environment. a. True b. False

ANSWER: False

A distributed database management system (DDBMS) governs the storage and processing of logically related data over interconnected computer systems. a. True b. False

ANSWER: True

M:N relationships are not appropriate in a relational model. a. True b. False

ANSWER: True

The basic SQL vocabulary has fewer than _____words.

ANSWER: 100 one hundred a hundred

The term _____ describes the strength of the relationships found among a module's entities.

ANSWER: cohesivity

In a basic distributed processing environment, the distributed processing system shares the database chores among three sites connected through a(n) _____.

ANSWER: communications network

The _____ is central to a discussion of normalization.

ANSWER: concept of keys

The _____ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.

ANSWER: conceptual design

The first step in _____ is to discover the data element characteristics.

ANSWER: conceptual design

One advantage of a database system over previous data management approaches is that the database system is considerably less complex. a. True b. False

b. False

The response of the DBMS to a query is the ___________ a. ad hoc query b. ad hoc response c. query result set d. integrated view of the data

c. Query result set

_____ data exist in a format that does not lend itself to processing that yields information. a. Structured b. Semistructured c. Unstructured d. Historical

c. Unstructured

_____ data exist in the format in which they were collected. a. Structured b. Semistructured c. Unstructured d. Historical

c. Unstructured

A _____ is a logically connected set of one or more fields that describes a person, place, or thing. a. database b. column c. record d. file

c. record

Web and mobile technologies that enable "anywhere, anytime, always on" human interactions are forms of _____.

social media

Each row in the relational table is known as an entity instance or entity occurrence in the ER model. a. True b. False

ANSWER: True

The DIFFERENCE operator subtracts one table from the other. a. True b. False

ANSWER: True

A disadvantage of a distributed database management system (DDBMS) is: a. slower data access. b. site additions affects other operations. c. processor dependence. d. lack of standards.

ANSWER: d

_____ is a special language used to represent and manipulate data elements in a textual format.

XML (Extensible Markup Language) Extensible Markup Language (XML) Extensible Markup Language XML

_____ serve as the intermediary between the user and the database. a. DBMSs b. Metadata c. End-user data d. Programming languages

a. DBMSs

A _____ is a character or group of characters that has a specific meaning. a. database b. field c. record d. file

b. field

A(n) _____ is a collection of programs that manages the database structure and controls access to the data stored in the database.

DBMS (database management system) database management system (DBMS) database management system DBMS

Database programming languages receive all application requests and translate them into the complex operations required to fulfill those requests. a. True b. False

b. False

If one department chair—a professor—can chair only one department, and one department can have only one department chair. The entities PROFESSOR and DEPARTMENT exhibit a(n) _____ relationship.

ANSWER: 1:1

One characteristic of generalization hierarchies is that they are implemented as _____ relationships.

ANSWER: 1:1

The _____ relationship is the relational database norm.

ANSWER: 1:M

All relational tables satisfy the _____ requirements.

ANSWER: 1NF first normal form first normal form (1NF) 1NF (first normal form)

In the _____, no row may contain two or more multivalued facts about an entity.

ANSWER: 4NF fourth normal form fourth normal form (4NF) 4NF (fourth normal form)

_____ are characteristics of entities.

ANSWER: Attributes

_____ are usually provided by the database management system (DBMS) to check for access violations.

ANSWER: Audit trails

The movement to find new and better ways to manage large amounts of web- and sensor-generated data and derive business insight from it, while simultaneously providing high performance and scalability at a reasonable cost is referred to as "_____."

ANSWER: Big Data

_____ functions allow you to take a value of a given data type and convert it to the equivalent value in another data type.

ANSWER: Conversion

In _____, a three-pronged symbol represents the "many" side of the relationship.

ANSWER: Crow's Foot notation

When designing a new database structure based on the business requirements of the end users, the database designer will construct a data model using a technique such as _____.

ANSWER: Crow's Foot notation ERDs

The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.

ANSWER: DA data administrator

Most multiuser _____ automatically initiate and enforce locking procedures, where all locking information is managed by the lock manager.

ANSWER: DBMSs database management systems database management systems (DBMSs)

The _____ protocol is used by a DP to roll transactions back and forward with the help of the system's transaction log entries.

ANSWER: DO-UNDO-REDO DO UNDO REDO do-undo-redo do undo redo

_____ allow end users to access the database without being able to download the information from their workstations.

ANSWER: Diskless workstations

_____ not only helps database designers to stay on track during the design process, it also enables them to pick up the design thread when the time comes to modify the design.

ANSWER: Documentation

The _____ statement in SQL combines rows from two queries and returns only the rows that appear in the first set but not in the second.

ANSWER: EXCEPT

A dependency of one nonprime attribute on another nonprime attribute is a partial dependency. a. True b. False

ANSWER: False

A disadvantage of the relational database management system (RDBMS) is its inability to hide the complexities of the relational model from the user. a. True b. False

ANSWER: False

A distributed database management system (DDBMS) must be communications-media-dependent. a. True b. False

ANSWER: False

A growing phase in a two-phase lock is when a transaction acquires all the required locks without locking any data. a. True b. False

ANSWER: False

A lock guarantees the open use of a data item to multiple transactions. a. True b. False

ANSWER: False

A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date. a. True b. False

ANSWER: False

A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions. a. True b. False

ANSWER: False

A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance. a. True b. False

ANSWER: False

A shared lock produces no conflict as long as all the concurrent transactions are read-write only. a. True b. False

ANSWER: False

A system maintenance activity generated in response to changes in the business environment is referred to as corrective maintenance. a. True b. False

ANSWER: False

A table is in BCNF if every determinant in the table is a foreign key. a. True b. False

ANSWER: False

A transaction processor (TP) is the software component residing on each computer that stores and retrieves data located at the site. a. True b. False

ANSWER: False

A weak relationship exists if the primary key of the related entity contains at least one primary key component of the parent entity. a. True b. False

ANSWER: False

An implementation-ready data model needn't necessarily contain enforceable rules to guarantee the integrity of the data. a. True b. False

ANSWER: False

Atomicity indicates the permanence of the database's consistent state. a. True b. False

ANSWER: False

Business rules apply to businesses and government groups, but not to other types of organizations such as religious groups or research laboratories. a. True b. False

ANSWER: False

Character data can contain any character or symbol intended for mathematical manipulation. a. True b. False

ANSWER: False

Composite attributes make it easier to facilitate detailed queries. a. True b. False

ANSWER: False

Data stored at their highest level of granularity are said to be atomic data. a. True b. False

ANSWER: False

Database designers determine the data and information that yield the required understanding of the entire business. a. True b. False

ANSWER: False

Dependencies that are based on only a part of a composite primary key are called transitive dependencies. a. True b. False

ANSWER: False

Distributed database systems do not require complex mechanisms to manage transactions and ensure the database's consistency and integrity. a. True b. False

ANSWER: False

Distributed processing does not require a distributed database, and a distributed database does not require distributed processing. a. True b. False

ANSWER: False

Durability requires that all portions of the transaction must be treated as a single, logical unit of work in which all operations are applied and completed to produce a consistent database. a. True b. False

ANSWER: False

Evaluation of database performance is rendered easier by the fact there are no standards to measure it. a. True b. False

ANSWER: False

In an SQL-based relational database, each table is dependent on every other table. a. True b. False

ANSWER: False

In implementation terms, an entity is existence-dependent if it has a mandatory primary key. a. True b. False

ANSWER: False

In the Systems Development Life Cycle(SDLC), the design of the system's processes begins in the detailed systems design phase. a. True b. False

ANSWER: False

In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the system. a. True b. False

ANSWER: False

Incremental backups produce a backup of all data. a. True b. False

ANSWER: False

Most SQL implementations yield case-insensitive searches. a. True b. False

ANSWER: False

Most real-world database transactions are formed by only one database request. a. True b. False

ANSWER: False

Normalization is a process that is used for changing attributes to entities. a. True b. False

ANSWER: False

Normalization purity is often easy to sustain in the modern database environment. a. True b. False

ANSWER: False

One of the advantages of a distributed database management system (DDBMS) is security. a. True b. False

ANSWER: False

One of the advantages of a distributed database management system (DDBMS) is that the data is located near the site with the least demand. a. True b. False

ANSWER: False

Only a single attribute, not multiple attributes, can define functional dependence. a. True b. False

ANSWER: False

Oracle users can use the Access QBE (query by example) query generator. a. True b. False

ANSWER: False

Referential integrity and participation are both bidirectional, meaning that they must be addressed in both directions along a relationship. a. True b. False

ANSWER: False

Relationships between entities always operate in one direction. a. True b. False

ANSWER: False

Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. a. True b. False

ANSWER: False

Software vendors have adopted the Chen representation because of its compact representation. a. True b. False

ANSWER: False

The COMMIT command does not permanently save all changes. In order to do that, you must use SAVE. a. True b. False

ANSWER: False

The Crow's Foot notation easily identifies multivalued attributes. a. True b. False

ANSWER: False

The Crow's Foot notation is less implementation-oriented than the Chen notation. a. True b. False

ANSWER: False

The Systems Development Life Cycle (SDLC) is a sequential process rather than an iterative process. a. True b. False

ANSWER: False

The analysis phase of the Systems Development Life Cycle (SDLC) involves a cycle of coding, testing, and debugging. a. True b. False

ANSWER: False

The entity relationship model (ERM) is dependent on the database type. a. True b. False

ANSWER: False

The existence of a mandatory relationship indicates that the minimum cardinality is 0 or 1 for the mandatory entity. a. True b. False

ANSWER: False

The external model is the representation of the database as "seen" by the DBMS. a. True b. False

ANSWER: False

The implementation phase of database design includes creating the database storage structure and loading the database, but does not provide for data management. a. True b. False

ANSWER: False

The one-to-many (1:M) relationship is easily implemented in the relational model by putting the foreign key of the "1" side in the table of the "many" side as a primary key. a. True b. False

ANSWER: False

The overall purpose of the database initial study is to create the conceptual design. a. True b. False

ANSWER: False

The relational model is hardware-dependent and software-independent. a. True b. False

ANSWER: False

The row's range of permissible values is known as its domain. a. True b. False

ANSWER: False

The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations. a. True b. False

ANSWER: False

The serializable isolation level is the least restrictive level defined by the ANSI SQL standard. a. True b. False

ANSWER: False

The testing and evaluation phase of the Database Life Cycle (DBLC) occurs after applications programming. a. True b. False

ANSWER: False

You cannot insert a row containing a null attribute value using SQL. a. True b. False

ANSWER: False

Rows can be grouped into smaller collections quickly and easily using the _____ clause within the SELECT statement.

ANSWER: GROUP BY

_____ refers to the level of detail represented by the values stored in a table's row.

ANSWER: Granularity

The _____ clause of the GROUP BY statement operates very much like the WHERE clause in the SELECT statement.

ANSWER: HAVING

The _____ operator could be used in place of INTERSECT if the DBMS does not support it.

ANSWER: IN

_____ are underlined in an ER diagram.

ANSWER: Identifiers

_____ is the real power behind the relational database, allowing the use of independent tables linked by common attributes.

ANSWER: JOIN

_____ can take place at any of the following levels: database, table, page, row, or field.

ANSWER: Locking

_____ relationships cannot be implemented as such in the relational model.

ANSWER: M:N

The _____ operator could be used in place of EXCEPT (MINUS) if the DBMS does not support it.

ANSWER: NOT IN

_____ is a process to help reduce the likelihood of data anomalies.

ANSWER: Normalization

DATE() and SYSDATE are special functions that return today's date in MS Access and _____, respectively.

ANSWER: Oracle

_____ could become a very technical job that affects not only the accessibility of the data in the storage device(s) but also the performance of the system.

ANSWER: Physical design

If database tables are treated as though they were files in a file system, the _____ never has a chance to demonstrate its superior data-handling capabilities.

ANSWER: RDBMS relational database management system relational database management system (RDBMS) RDBMS (relational database management system)

If a(n) _____ is issued before the termination of a transaction, the DBMS will restore the database only for that particular transaction, rather than for all transactions, in order to maintain the durability of the previous transactions.

ANSWER: ROLLBACK

_____ ensure that a disk physical failure will not impair the DBMS's ability to recover data.

ANSWER: Redundant transaction logs

The _____ command, coupled with appropriate search conditions, is an incredibly powerful tool that enables a user to transform data into information.

ANSWER: SELECT

_____ is the process that establishes the need for, and the extent of, an information system.

ANSWER: Systems analysis

_____-level locks are less restrictive than database-level locks, but they create traffic jams when many transactions are waiting to access the same table.

ANSWER: Table

_____ management ensures that data move from one consistent state to another.

ANSWER: Transaction

A composite identifier is a primary key composed of more than one attribute. a. True b. False

ANSWER: True

A data model is usually graphical. a. True b. False

ANSWER: True

A database language enables the user to perform complex queries designed to transform the raw data into useful information. a. True b. False

ANSWER: True

A database management system (DBMS) must have validation, transformation, and mapping functions, as well as other functions, in order to be classified as distributed. a. True b. False

ANSWER: True

A field-level lock allows concurrent transactions to access the same row, as long as they require the use of different fields within that row. a. True b. False

ANSWER: True

A full backup, or database dump, produces a complete copy of the entire database. a. True b. False

ANSWER: True

A fully distributed database management system (DBMS) must perform all the functions of a centralized DBMS, and it must handle all necessary functions imposed by the distribution of data and processing. a. True b. False

ANSWER: True

A null is created when you press the Enter key or the Tab key to move to the next entry without making a prior entry of any kind. a. True b. False

ANSWER: True

A scheduler facilitates data isolation to ensure that two transactions do not update the same data element at the same time. a. True b. False

ANSWER: True

A system is always at some stage of SDLC because every request for structural changes requires retracing the steps of the Systems Development Life Cycle (SDLC). a. True b. False

ANSWER: True

A table is in fourth normal form if it is in third normal form and has no independent multivalued dependencies. a. True b. False

ANSWER: True

A weak entity has a primary key that is partially or totally derived from the parent entity in the relationship. a. True b. False

ANSWER: True

All relational tables satisfy the 1NF requirements. a. True b. False

ANSWER: True

Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command's components. a. True b. False

ANSWER: True

An implementation-ready data model should contain a description of the data structure that will store the end-user data. a. True b. False

ANSWER: True

An optimistic approach is based on the assumption that the majority of the database operations do not conflict. a. True b. False

ANSWER: True

As rare as 1:1 relationships should be, certain conditions absolutely require their use. a. True b. False

ANSWER: True

Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database. a. True b. False

ANSWER: True

Business rules must be rendered in writing. a. True b. False

ANSWER: True

Connectivities and cardinalities are established by concise statements known as business rules. a. True b. False

ANSWER: True

Current distributed database management system (DDBMS) are subject to some problems, such as the complexity of management and control. a. True b. False

ANSWER: True

Data integrity is enforced by the database management system (DBMS) through the proper use of primary and foreign key rules. a. True b. False

ANSWER: True

Denormalization produces a lower normal form. a. True b. False

ANSWER: True

Dependency diagrams are very helpful in getting a bird's-eye view of all the relationships among a table's attributes. a. True b. False

ANSWER: True

Depending on the sophistication of the application development software, nulls can create problems when functions such as COUNT, AVERAGE, and SUM are used. a. True b. False

ANSWER: True

Distributed data access was needed to support geographically dispersed business units. a. True b. False

ANSWER: True

Distributed processing shares a database's logical processing among two or more physically independent sites that are connected through a network. a. True b. False

ANSWER: True

Distribution transparency is supported by a distributed data dictionary. a. True b. False

ANSWER: True

Each table in a relational database must have a primary key. a. True b. False

ANSWER: True

In order to meet performance requirements, portions of the database design may need to be occasionally denormalized. a. True b. False

ANSWER: True

In the detailed systems design phase of the Systems Development Life Cycle (SDLC), steps are laid out for the conversion of a database from an old system to a new system. a. True b. False

ANSWER: True

In the entity relationship model, a table row corresponds to an entity instance. a. True b. False

ANSWER: True

In the original Chen notation, each attribute is represented by an oval with the attribute name connected to an entity rectangle with a line. a. True b. False

ANSWER: True

Normalization represents a micro view of the entities within the ERD. a. True b. False

ANSWER: True

Normalization works through a series of stages called normal forms. a. True b. False

ANSWER: True

Performance transparency ensures that the system finds the most cost-effective path to access remote data. a. True b. False

ANSWER: True

RDBMSs enforce integrity rules automatically. a. True b. False

ANSWER: True

Relational algebra defines the theoretical way of manipulating table contents using relational operators. a. True b. False

ANSWER: True

Relational models view data as part of a table or collection of tables in which all key values must be identified. a. True b. False

ANSWER: True

Repeating groups must be eliminated by ensuring that each row defines a single entity. a. True b. False

ANSWER: True

SQL allows the use of logical restrictions on its inquiries such as OR, AND, and NOT. a. True b. False

ANSWER: True

Some RDBMSs, such as Microsoft Access, automatically make the necessary conversions to eliminate case sensitivity. a. True b. False

ANSWER: True

String comparisons are made from left to right. a. True b. False

ANSWER: True

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications. a. True b. False

ANSWER: True

Systems analysis establishes the need for an information system and its extent. a. True b. False

ANSWER: True

Testing procedures and standards must already be in place before any application program can be approved for use in the company. a. True b. False

ANSWER: True

The ANSI SQL standards are also accepted by the ISO. a. True b. False

ANSWER: True

The COUNT function is designed to tally the number of non-null "values" of an attribute, and is often used in conjunction with the DISTINCT clause. a. True b. False

ANSWER: True

The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department. a. True b. False

ANSWER: True

The DBA interacts with the end user by providing data and information support services to the organization's departments. a. True b. False

ANSWER: True

The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format. a. True b. False

ANSWER: True

The DBA must supervise the installation of all software and hardware designated to support the data administration strategy. a. True b. False

ANSWER: True

The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure. a. True b. False

ANSWER: True

The DIVIDE operation uses one single-column table (e.g., column "a") as the divisor and one two-column table (e.g., columns "a" and "b") as the dividend. a. True b. False

ANSWER: True

The Systems Development Life Cycle (SDLC) traces the history of an information system. a. True b. False

ANSWER: True

The Systems Development Life Cycle's (SDLC's) planning phase yields a general overview of the company and its objectives. a. True b. False

ANSWER: True

The combination of normalization and ER modeling yields a useful ERD, whose entities can be translated into appropriate table structures. a. True b. False

ANSWER: True

The objective of normalization is to ensure that each table conforms to the concept of well-formed relations. a. True b. False

ANSWER: True

The primary objective in database design is to create complete, normalized, nonredundant, and fully integrated conceptual, logical, and physical database models. a. True b. False

ANSWER: True

The scheduler establishes the order in which the operations within concurrent transactions are executed. a. True b. False

ANSWER: True

The storage locations for multiple backups must include sites inside and outside the organization. a. True b. False

ANSWER: True

The transaction processor (TP) is the software component found in each computer that requests data. a. True b. False

ANSWER: True

Time stamping demands a lot of system resources because many transactions might have to be stopped, rescheduled, and restamped. a. True b. False

ANSWER: True

To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the relationships are mandatory or optional. a. True b. False

ANSWER: True

Today, most relational database products can be classified as object/relational. a. True b. False

ANSWER: True

When using an optimistic approach, during the read phase, a transaction reads the database, executes the needed computations, and makes the updates to a private copy of the database values. a. True b. False

ANSWER: True

Within the database environment, a data model represents data structures with the purpose of supporting a specific problem domain. a. True b. False

ANSWER: True

You can select partial table contents by naming the desired fields and by placing restrictions on the rows to be included in the output. a. True b. False

ANSWER: True

You can think of a table as a persistent representation of a logical relation. a. True b. False

ANSWER: True

"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance

ANSWER: a

A _____ contains at least all of the attribute names and characteristics for each table in the system. a. data dictionary b. relational schema c. logical schema d. database

ANSWER: a

A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems. a. fully heterogeneous b. fully homogeneous c. homogeneous d. heterogeneous

ANSWER: a

A _____ relationship exists when an association is maintained within a single entity. a. unary b. ternary c. strong d. weak

ANSWER: a

A _____ request lets a single SQL statement reference data located at several different local or remote DP sites. a. distributed b. transaction c. fragmented d. remote

ANSWER: a

A centralized database management is subject to a problem such as _____. a. growing numbers of remote locations b. maintaining and operating small database systems c. dependence on multiple sites d. organizational flexibility of the database

ANSWER: a

A noun in a business rule translates to a(n) _____ in the data model. a. entity b. attribute c. relationship d. constraint

ANSWER: a

A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF

ANSWER: a

A(n) _____ condition occurs when two or more transactions wait for each other to unlock data. a. deadlock b. exclusive lock c. binary lock d. two-phase lock

ANSWER: a

A(n) _____ is the equivalent of a field in a file system. a. attribute b. entity c. relationship d. constraint

ANSWER: a

A(n) _____ is the set of possible values for a given attribute. a. domain b. range c. identifier d. key

ANSWER: a

A(n) _____ join will select only the rows with matching values in the common attribute(s). a. natural b. outer c. full d. cross

ANSWER: a

A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock. a. shared b. exclusive c. binary d. two-phase

ANSWER: a

A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time. a. access b. completion c. application d. communications

ANSWER: a

According to Codd's _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. a. nonsubversion b. information c. guaranteed access d. view updating

ANSWER: a

From a structural point of view, 3NF is better than _____. a. 2NF b. 3NF c. 5NF d. 6NF

ANSWER: a

From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices. a. derived b. atomic c. granular d. historical

ANSWER: a

Improving _____ leads to more flexible queries. a. atomicity b. normalization c. denormalization d. derived attribute

ANSWER: a

In a _____ situation, one key determines multiple values of two other attributes and those attributes are independent of each other. a. multivalued dependency b. transitive dependency c. partial dependency d. functional dependency

ANSWER: a

In the _____ model, each parent can have many children, but each child has only one parent. a. hierarchical b. network c. relational d. entity relationship

ANSWER: a

In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____. a. data analysis and requirements b. entity relationship modeling and normalization c. data model verification d. distributed database design

ANSWER: a

In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values. a. read b. validation c. write d. shared

ANSWER: a

Lock _____ indicates the level of lock use. a. granularity b. shrinking c. growing d. serializability

ANSWER: a

One of the three most common data integrity and consistency problems is _____. a. lost updates b. disk failures c. user errors d. deadlocks

ANSWER: a

Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. a. integrity b. uniqueness c. model d. attribute

ANSWER: a

The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. a. entity b. referential c. relational d. null

ANSWER: a

The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. a. COUNT b. MIN c. MAX d. SUM

ANSWER: a

The _____ relationship should be rare in any relational database design. a. 1:1 b. 1:M c. M:1 d. M:N

ANSWER: a

The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities. a. M:N b. 1:M c. N:1 d. M:1

ANSWER: a

The hierarchical data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s

ANSWER: a

The last step in the Database Life Cycle (DBLC) is _____. a. maintenance and evolution b. operation c. testing and evaluation d. implementation and loading

ANSWER: a

The process of creating an information system is known as _____. a. systems development b. database development c. network development d. enterprise development

ANSWER: a

The result of the _____ phase of the Systems Development Life Cycle (SDLC) should be a better understanding of the system's functional areas, actual and potential problems, and opportunities. a. analysis b. implementation c. detailed systems design d. maintenance

ANSWER: a

The special operator used to check whether an attribute value is within a range of values is _____. a. BETWEEN b. NULL c. LIKE d. IN

ANSWER: a

What rule applies to the two-phase locking protocol? a. Two transactions cannot have conflicting lock. b. No unlock operation can precede a lock operation in a different transaction. c. No data is affected until all locks are released. d. No data is affected until the transaction is in its locked position.

ANSWER: a

When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system. a. cultural b. managerial c. technical d. operational

ANSWER: a

When the specific cardinalities are not included on the diagram in Crow's Foot notation, cardinality is implied by the use of _____. a. symbols b. attributes c. images d. tables

ANSWER: a

When using the Oracle TO_DATE function, the code _____ represents a three-letter month name. a. MON b. MM3 c. MONTH d. MM

ANSWER: a

Which property of the CAP theorem assumes that all transaction operations take place at the same time in all nodes, as if they were executing in a single-node database? a. Consistency b. Partition tolerance c. Availability d. Performance transparency

ANSWER: a

Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? a. SELECT ONLY V_CODE FROM PRODUCT; b. SELECT UNIQUE V_CODE FROM PRODUCT; c. SELECT DIFFERENT V_CODE FROM PRODUCT; d. SELECT DISTINCT V_CODE FROM PRODUCT;

ANSWER: a

_____ CASE tools provide support for the planning, analysis, and design phases. a. Front-end b. Back-end c. Vertical d. Horizontal

ANSWER: a

_____ are required to prevent another transaction form reading inconsistent data. a. Locks b. Schedules c. Stamps d. Logs

ANSWER: a

_____ can render data useless to unauthorized users who might have violated some of the database security layers. a. Data encryption b. Access rights c. Physical security d. Password security

ANSWER: a

_____ transparency allows data to be updated simultaneously at several network sites. a. Transaction b. Distribution c. Failure d. Performance

ANSWER: a

An attribute that cannot be further subdivided is said to display _____.

ANSWER: atomicity

An index key can have multiple _____ (a composite index).

ANSWER: attributes

"All users must have passwords" is an example of a _____. a. rule b. policy c. standard d. procedure

ANSWER: b

"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance

ANSWER: b

A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes. a. secondary b. candidate c. primary d. foreign

ANSWER: b

A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table. a. database-level b. table-level c. page-level d. row-level

ANSWER: b

A consistent database state is one in which all _____. a. tables have foreign keys b. data integrity constraints are satisfied c. table are normalized d. SQL statements only update one table at a time

ANSWER: b

A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity. a. single line b. dashed line c. double dashed line d. double line

ANSWER: b

A distributed _____ contains the description of the entire database as seen by the database administrator. a. global index b. data dictionary c. global catalog d. data thesaurus

ANSWER: b

A distributed database is composed of several parts known as database _____. a. sections b. fragments c. partitions d. parts

ANSWER: b

A relationship is an association between _____. a. objects b. entities c. databases d. fields

ANSWER: b

A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run. a. active b. passive c. static d. dynamic

ANSWER: b

A(n) _____ database stores each database fragment at a single site. a. partially replicated b. unreplicated c. fully replicated d. partitioned

ANSWER: b

A(n) _____ enables a database administrator to describe schema components. a. extensible markup language (XML) b. data definition language (DDL) c. unified modeling language (UML) d. query language

ANSWER: b

A(n) _____ is anything about which data are to be collected and stored. a. attribute b. entity c. relationship d. constraint

ANSWER: b

A(n) _____ join performs a relational product (also known as the Cartesian product) of two tables. a. full b. cross c. natural d. equi-

ANSWER: b

A(n) _____ only returns matched records from the tables that are being joined. a. outer join b. inner join c. equijoin d. theta join

ANSWER: b

A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock. a. growing b. shrinking c. locking d. unlocking

ANSWER: b

A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. a. INSERT b. SELECT c. COMMIT d. UPDATE

ANSWER: b

A(n) _____ represents a particular type of object in the real world. a. attribute b. entity c. relationship d. node

ANSWER: b

A(n) _____ specifically reserves access to the transaction that locked the object. a. shared lock b. exclusive lock c. binary lock d. deadlock

ANSWER: b

A(n) _______ enables a database administrator to describe schema components. a. extensible markup language (XML) b. data definition language (DDL) c. unified modeling language (UML) d. query language

ANSWER: b

According to Codd's _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns). a. distribution independence b. logical data independence c. comprehensive data sublanguage d. integrity independence

ANSWER: b

An atomic attribute _____. a. cannot exist in a relational table b. cannot be further subdivided c. displays multiplicity d. is always chosen to be a foreign key

ANSWER: b

At the level of middle management, the database must be able to provide _____. a. frameworks for defining and enforcing organizational policies b. data necessary for tactical decisions and planning c. feedback to monitor whether a company is achieving its goals d. access to external and internal data to identify growth opportunities

ANSWER: b

Database administration operations are commonly defined and divided according to the phases of the _____. a. SLA b. DBLC c. SDLC d. MRA

ANSWER: b

Database design is a(n) _____ process based on repetition. a. sequential b. iterative c. linear d. intermittent

ANSWER: b

Dependencies based on only a part of a composite primary key are known as _____ dependencies. a. primary b. partial c. incomplete d. composite

ANSWER: b

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation

ANSWER: b

Distributed processing does not require: a. processing function distribution to all storage sites. b. an existing distributed database. c. interconnected networks of components. d. multiple sites to share processing chores.

ANSWER: b

During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model. a. declaration process b. verification process c. conceptual process d. logical process

ANSWER: b

Granularity refers to _____. a. the size of a table b. the level of detail represented by the values in a table's row c. the number of attributes represented in a table d. the number of rows in a table

ANSWER: b

In DBLC, the phase after the database initial study is _____. a. operation b. database design c. database initial study d. implementation and loading

ANSWER: b

In a database context, the word _____ indicates the use of the same attribute name to label different attributes. a. redundancy b. homonym c. duplicate d. synonym

ANSWER: b

In a real-world environment, we must strike a balance between design integrity and _____. a. robustness b. flexibility c. uniqueness d. ease of use

ANSWER: b

In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. a. relations b. keys c. indexes d. logical structures

ANSWER: b

Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process. a. two b. three c. four d. five

ANSWER: b

The SQL data manipulation command HAVING: a. restricts the selection of rows based on a conditional expression. b. restricts the selection of grouped rows based on a condition. c. modifies an attribute's values in one or more table's rows. d. groups the selected rows based on one or more attributes.

ANSWER: b

The _____ command restricts the selection of grouped rows based on a condition. a. DISPLAY b. HAVING c. FROM d. CONVERT

ANSWER: b

The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. a. UNIQUE b. NOT NULL c. VALUE d. EMPTY

ANSWER: b

The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application. a. multivalued b. derived c. single-valued d. composite

ANSWER: b

The existence of a(n) _____ entity indicates that its minimum cardinality is zero. a. ternary b. optional c. strong d. weak

ANSWER: b

The first step in building an entity-relationship diagram (ERD) is _____. a. developing the initial ERD b. creating a detailed narrative of the organization's description of operations c. identifying the attributes and primary keys that adequately describe the entities d. identifying the business rules based on the description of operations

ANSWER: b

The first step in the ER model verification process is to _____. a. identify each module and its components b. identify the ER model's central entity c. verify all processes against the ER model d. identify each module's internal transaction requirements

ANSWER: b

The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance

ANSWER: b

The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS

ANSWER: b

The person responsible for the control of the centralized and shared database is the database _____. a. analyst b. administrator c. programmer d. user

ANSWER: b

The relational data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s

ANSWER: b

The special operator used to check whether a subquery returns any rows is _____. a. BETWEEN b. EXISTS c. LIKE d. IN

ANSWER: b

The syntax for a left outer join is _____. a. SELECT column-list FROM table1 OUTER JOIN table2 LEFT WHERE join-condition b. SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition c. SELECT column-list WHERE LEFT table1 = table d. SELECT column-list FROM table1 LEFT table2 [JOIN] WHERE join-condition

ANSWER: b

To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible. a. unary b. binary c. strong d. weak

ANSWER: b

Under the _____ scenario, all record- and file-locking activities are performed at the end-user location. a. single-site processing, single-site data b. multiple-site processing, single-site data c. single-site processing, multiple-site data d. multiple-site processing, multiple-site data

ANSWER: b

User-access management is a subset of _____. a. password protection b. authorization management c. data integrity management d. managerial control

ANSWER: b

VMS/VSAM is an example of the _____. a. hierarchical model b. file system data model c. relational data model d. XML data model

ANSWER: b

When performing user access management, a DBA defines each user to the database at the _____ levels. a. application and DBMS b. operating system and DBMS c. operating system and application d. application and network

ANSWER: b

When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. a. intersect-compatible b. union-compatible c. difference-compatible d. select-compatible

ANSWER: b

Which is a feature of a correlated subquery? a. The inner subquery executes first. b. The outer subquery initiates the process of execution in a subquery. c. The inner subquery initiates the process of execution in a subquery. d. The outer subquery executes independent of the inner subquery.

ANSWER: b

_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. a. Inner joins b. Outer joins c. Equijoins d. Theta joins

ANSWER: b

_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. a. Guidelines b. Standards c. Procedures d. Documentations

ANSWER: b

_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. a. Normalization b. Virtualization c. Specialization d. Generalization

ANSWER: b

_____ requires that all operations of a transaction be completed. a. Specificity b. Atomicity c. Durability d. Time stamping

ANSWER: b

_____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify where these fragments are located. a. Transaction b. Location c. Local mapping d. Fragmentation

ANSWER: b

_____ transparency is the highest level of transparency. The end user or programmer does not need to know that a database is partitioned. a. Performance b. Fragmentation c. Location d. Local mapping

ANSWER: b

The proposed system is subject to limits known as _____, which are external to the system.

ANSWER: boundaries

A(n) _____ is a brief, precise, and unambiguous description of a policy, procedure, or principle within a specific organization.

ANSWER: business rule

A(n) _____ rule is a brief and precise narrative of a policy, procedure, or principle within a specific organization's environment.

ANSWER: business rule

A database management system needs _____ to prepare the data for presentation to the end user or to an application program. a. security b. concurrency control c. formatting d. I/O interface

ANSWER: c

A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time. a. serializability and durability b. atomicity and isolation c. serializability and isolation d. atomicity and serializability

ANSWER: c

A table is in 4NF if it is in 3NF, and _____. a. all attributes must be dependent on the primary key and must be dependent on each other b. all attributes are unrelated c. it has no multivalued dependencies d. no column contains the same values

ANSWER: c

A table that is in 2NF and contains no transitive dependencies is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF

ANSWER: c

A verb associating two nouns in a business rule translates to a(n) _____ in the data model. a. entity b. attribute c. relationship d. constraint

ANSWER: c

A(n) _____ is a query that is embedded (or nested) inside another query. a. alias b. operator c. subquery d. view

ANSWER: c

According to the rules of precedence, which of the following computations should be completed first? a. Additions and subtractions b. Multiplications and divisions c. Operations within parentheses d. Power operations

ANSWER: c

An attribute that is part of a key is known as a(n) _____ attribute. a. important b. nonprime c. prime d. entity

ANSWER: c

As long as two transactions, T1 and T2, access _____ data, there is no conflict, and the order of execution is irrelevant to the final outcome. a. shared b. common c. unrelated d. locked

ANSWER: c

Date attributes contain calendar dates stored in a special format known as the _____ date format. a. Epoch b. calendar c. Julian d. logical

ANSWER: c

In a database context, a(n) _____ indicates the use of different names to describe the same attribute. a. entity b. duplicate c. synonym d. homonym

ANSWER: c

In the optimistic approach, during the _____ phase, changes are permanently applied to the database. a. read b. validation c. write d. shared

ANSWER: c

In the wait/die scheme, the: a. older transaction rolls back the younger transaction and reschedules it. b. younger, preempted transaction is rescheduled using the same time stamp. c. older transaction waits for the younger one to complete and release its locks. d. younger and older transactions both wait indefinitely to be released.

ANSWER: c

MySQL is an example of the _____. a. hierarchical model b. file system data model c. relational data model d. XML data model

ANSWER: c

Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK? a. Five SQL statements are executed. b. The end of a program is successfully reached. c. All changes are aborted and returned to a previous consistent state. d. The database is shut down for maintenance.

ANSWER: c

Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints. a. programmer b. manager c. database administrator d. systems administrator

ANSWER: c

One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time. a. security component b. authorization manager c. initialization parameters d. administrator

ANSWER: c

Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. operation d. testing and evaluation

ANSWER: c

The Crow's foot symbol with two vertical parallel lines indicates _____ cardinality. a. (0,N) b. (1,N) c. (1,1) d. (0,1)

ANSWER: c

The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. a. NVL b. TO_CHAR c. DECODE d. CONVERT

ANSWER: c

The SQL command that allows a user to permanently save data changes is _____. a. INSERT b. SELECT c. COMMIT d. UPDATE

ANSWER: c

The _____ data model is said to be a semantic data model. a. relational b. network c. object-oriented d. entity relationship

ANSWER: c

The _____ data model uses the concept of inheritance. a. relational b. network c. object-oriented d. entity relationship

ANSWER: c

The _____ function returns the current system date in MS Access. a. TO_DATE() b. SYSDATE() c. DATE() d. TODAY()

ANSWER: c

The _____ manager is responsible for assigning and policing the locks used by transactions. a. transaction b. database c. lock d. schedule

ANSWER: c

The _____ phase of the Systems Development Life Cycle (SDLC) includes all the necessary technical specifications for the screens, menus, reports, and other devices used to make the system more efficient. a. analysis b. implementation c. detailed systems design d. maintenance

ANSWER: c

The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC). a. analysis b. detailed systems design c. implementation d. maintenance

ANSWER: c

The first step in developing the conceptual model using ER diagrams is to _____. a. normalize the entities b. complete the initial ER diagram c. identify, analyze, and refine the business rules d. define the attributes, primary keys, and foreign keys for each of the entities

ANSWER: c

The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain. a. database-produced b. network-produced c. CASE-produced d. design-produced

ANSWER: c

The implicit beginning of a transaction is when _____. a. a database is started b. a table is accessed for the first time c. the first SQL statement is encountered d. the COMMIT command is issued

ANSWER: c

The object-oriented data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s

ANSWER: c

The special operator used to check whether an attribute value matches a given string pattern is _____. a. BETWEEN b. IS NULL c. LIKE d. IN

ANSWER: c

To generate a surrogate key, Microsoft Access uses a(n) _____ data type. a. character b. sequence c. AutoNumber d. identity

ANSWER: c

Transaction is a _____ unit of work that must be either entirely completed or aborted. a. time b. practical c. logical d. physical

ANSWER: c

What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE a. set operator b. natural join c. "old-style" join d. procedural statement

ANSWER: c

When using a(n) _____ join, only rows from the tables that match on a common value are returned. a. full b. outer c. inner d. set

ANSWER: c

When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. a. key b. composite c. unique d. primary

ANSWER: c

Which of the following is a reason why a DBMS's daily operations must be clearly documented? a. Documentation of the daily operations help a company set its long-term goals. b. Documentation of the daily operations help manage the manual data resources of a company. c. Documentation of the daily operations help pinpoint causes and solutions of database problems. d. Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks.

ANSWER: c

Which of the following is true of business rules? a. They allow the designer to set company policies with regard to data. b. They allow the designer to develop business processes. c. They can serve as a communication tool between the users and designers. d. They provide a framework for the company's self-actualization.

ANSWER: c

Which of the following types of HDFS nodes stores all the metadata about a file system? a. Data node b. Client node c. Name node d. Map node

ANSWER: c

_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals. a. Access Management b. Business Intelligence c. Information engineering (IE) d. MOLAP

ANSWER: c

_____ fragmentation allows a user to break a single object into two or more segments, or fragments. a. Horizontal b. Vertical c. Data d. Request

ANSWER: c

_____ fragmentation refers to the division of a relation into attribute subsets. a. Data b. Horizontal c. Vertical d. Mixed

ANSWER: c

_____ is the delay imposed by the amount of time required for a data packet to make a round trip from point A to point B. a. Data distribution b. Replica transparency c. Network latency d. Network partitioning

ANSWER: c

_____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. a. Serializability b. Atomicity c. Isolation d. Time stamping

ANSWER: c

_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. a. 1:N b. M:1 c. M:N d. 1:1

ANSWER: c

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. a. Debilitative b. Preserving c. Corrupting d. Destructive

ANSWER: c

_____ transparency allows the system to operate as if it were a centralized database management system. a. Heterogeneity b. Distribution c. Performance d. Failure

ANSWER: c

A relationship _____ is difficult to establish if only one side of the relationship is known.

ANSWER: classification

The relational operators have the property of _____ - that is, the use of relational algebra operators on existing relations (tables) produces new relations.

ANSWER: closure

In a distributed database management system (DDBMS), _____ control is used to manage simultaneous data access and ensure data consistency across database fragments.

ANSWER: concurrency

A DDBMS is subject to which restriction? a. Multiple instances of the same database should be integrated over a network. b. All database processing must be done at a single site. c. Rapid ad hoc data access is not possible. d. Remote data access is provided on a read-only basis.

ANSWER: d

A _____ is the primary key of one table that has been placed into another table to create a common attribute. a. superkey b. composite primary key c. candidate key d. foreign key

ANSWER: d

A _____ key is defined as a key that is used strictly for data retrieval purposes. a. lookup b. foreign c. candidate d. secondary

ANSWER: d

A _____ lock allows concurrent transactions to access different rows of the same table. a. database table b. table-level c. page-level d. row-level

ANSWER: d

A diskpage, or page, is the equivalent of a _____. a. database table b. disk sector c. database schema d. diskblock

ANSWER: d

A distributed _____ can reference several different local or remote data processing sites. a. request b. site c. data location d. transaction

ANSWER: d

A relational table must not contain a(n) _____. a. entity b. attribute c. relationship d. repeating group

ANSWER: d

A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF

ANSWER: d

A(n) _____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key. a. partial dependency b. repeating group c. atomic attribute d. transitive dependency

ANSWER: d

A(n) _____ is a logical storage area in Oracle. a. audit log b. datafile c. schema d. tablespace

ANSWER: d

A(n) _____ is a restriction placed on the data. a. attribute b. entity c. relationship d. constraint

ANSWER: d

A(n) _____ is an orderly arrangement used to logically access rows in a table. a. primary rule b. superkey c. relationship d. index

ANSWER: d

A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). a. attribute b. unique c. foreign d. natural

ANSWER: d

ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements _____ and ROLLBACK. a. RETRIEVE b. ASSIGN c. UPDATE d. COMMIT

ANSWER: d

An example of denormalization is using a _____ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows. a. transitive b. 3NF c. component d. temporary

ANSWER: d

Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation

ANSWER: d

Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role. a. operative b. arbitration c. technical d. managerial

ANSWER: d

During _____ data allocation, the database is divided into two or more disjointed parts (fragments) and stored at two or more sites. a. mixed b. replicated c. centralized d. partitioned

ANSWER: d

During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented. a. detailed systems design b. analysis c. maintenance d. implementation

ANSWER: d

How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18? a. 8 b. 18 c. 26 d. 144

ANSWER: d

If Tiny College has some departments that are classified as "research only" and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity. a. existence-dependent on b. independent of c. mandatory for d. optional to

ANSWER: d

If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause. a. OF b. USING c. HAS d. JOIN ON

ANSWER: d

If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute. a. Boyce-Codd normal forms b. redundancies c. time-variances d. partial dependencies

ANSWER: d

If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship. a. self b. self-referring c. looping d. recursive

ANSWER: d

If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity. a. weak b. alone c. unary d. strong

ANSWER: d

In organizations that generate large number of transactions, _____ are often a top priority in database design. a. relationships among entities b. logical design standards c. naming conventions d. high processing speeds

ANSWER: d

In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management. a. database programmer b. systems analyst c. data administrator d. database security officer

ANSWER: d

In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users. a. change tracker b. digital footprint c. paper trail d. audit log

ANSWER: d

In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____. a. database analysis and requirements b. ER modeling and normalization c. data model verification d. distributed database design

ANSWER: d

In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote access from other independent database management systems in the network. a. transaction processor b. application processor c. transaction manager d. data processor

ANSWER: d

Instructions to create a password are an example of a _____. a. rule b. policy c. standard d. procedure

ANSWER: d

Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level. a. object b. attribute c. data d. entity

ANSWER: d

Oracle 12c, MS SQL Server, and Tamino are examples of _____ data models. a. hierarchical b. file system c. relational d. XML Hybrid

ANSWER: d

Some very specialized applications may require normalization beyond the _____. a. 1NF b. 2NF c. 3NF d. 4NF

ANSWER: d

Students and classes have a _____ relationship. a. one-to-one b. one-to-many c. many-to-one d. many-to-many

ANSWER: d

The _____ approach to scheduling concurrent transactions assigns a global unique stamp to each transaction. a. scheduled b. table-locking c. unique d. time stamping

ANSWER: d

The _____ command defines a default value for a column when no value is given. a. CHECK b. UNIQUE c. NOT NULL d. DEFAULT

ANSWER: d

The _____ component of a CASE tool produces the information system's input/output formats. a. analysis b. graphics c. program document generator d. screen painter and report generator

ANSWER: d

The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. a. database tuple b. systematic database c. unique index d. system catalog

ANSWER: d

The _____ isolation level ensures that queries return consistent results. a. read uncommitted b. read committed c. serializable d. repeatable read

ANSWER: d

The _____ model uses the term connectivity to label the relationship types. a. relational b. network c. object-oriented d. entity relationship

ANSWER: d

The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text. a. hierarchical b. network c. object-oriented d. entity relationship

ANSWER: d

The implementation and loading phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS

ANSWER: d

The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash. a. data dictionary b. metadata c. rollback manager d. transaction log

ANSWER: d

The most likely data type for a surrogate key is _____. a. character b. date c. logical d. numeric

ANSWER: d

The objective of _____ optimization is to minimize the total cost associated with the execution of a request. a. data b. remote c. transaction d. query

ANSWER: d

The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases. a. two b. three c. four d. five

ANSWER: d

To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. a. INTERSECT b. UNION c. DIFFERENCE d. SELECT

ANSWER: d

Training principles and methodologies are planned during the _____ phase of the Systems Development Life Cycle (SDLC). a. maintenance b. implementation c. analysis d. detailed systems design

ANSWER: d

When using the Crow's Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity. a. dotted b. double c. triple d. solid

ANSWER: d

Which comparison operator indicates a value is not equal? a. < b. <= c. >= d. <>

ANSWER: d

_____ are important because they help to ensure data integrity. a. Attributes b. Entities c. Relationships d. Constraints

ANSWER: d

_____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity. a. Connectivity b. Relationship c. Dependence d. Cardinality

ANSWER: d

_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. a. Conceptual design b. Network design c. Logical design d. Physical design

ANSWER: d

_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. a. INTERSECT b. UNION c. DIFFERENCE d. SELECT

ANSWER: d

A(n) ______ provides a detailed description of all tables found within the user/designer-created database.

ANSWER: data dictionary

A(n) _____ defines the environment in which data can be managed and is used to work with the data in the database.

ANSWER: data manipulation language (DML)

A designer must have a thorough understanding of the company's data types, extent, and uses in order to develop an accurate _____.

ANSWER: data model

A(n) _____ is a relatively simple representation of more complex real-world data structures.

ANSWER: data model

In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.

ANSWER: data-profiling

A(n) _____ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system.

ANSWER: database

A(n) _____ physically stores the database's data.

ANSWER: datafile

In a heavily used database management system (DBMS), the prevention and detection of _____ constitutes an important DBMS function.

ANSWER: deadlocks

If T1 has not unlocked data item Y, T2 cannot begin - if T2 has not unlocked data item X, T1 cannot continue. Consequently, T1 and T2 each wait for the other to unlock the required data item. Such a deadlock is also known as a(n) _____.

ANSWER: deadly embrace

The advent of very sophisticated application generators and _____ has substantially decreased coding and testing time.

ANSWER: debugging tools

A relationship _____ indicates the number of entities or participants associated with a relationship.

ANSWER: degree

A(n) _____ attribute need not be physically stored within the database.

ANSWER: derived

Any attribute whose value determines other values within a row is known as a(n) _____.

ANSWER: determinant

The DSO's activities are often classified as _____ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.

ANSWER: disaster

After testing is concluded, the final _____ is reviewed and printed and end users are trained.

ANSWER: documentation

In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.

ANSWER: efficient

Each row in the relational table is known as a(n) _____.

ANSWER: entity instance

According to the data-modeling checklist, _____ should be nouns that are familiar to business, should be short and meaningful, and should document abbreviations, synonyms, and aliases for each entity.

ANSWER: entity names

A(n) _____ links tables on the basis of an equality condition that compares specified columns of each table.

ANSWER: equijoin

A weak entity must be _____-dependent.

ANSWER: existence

The _____ model is the end users' view of the data environment.

ANSWER: external

To avoid nulls, some designers use special codes, known as _____, to indicate the absence of some value.

ANSWER: flags

It becomes difficult to create a suitable _____ key when the related table uses a composite primary key.

ANSWER: foreign

The proper use of _____ keys is crucial to controlling data redundancy.

ANSWER: foreign

The database description, known as the distributed _____ schema, is the common database schema used by local transaction processors (TPs) to translate user requests into subqueries that will be processed by different data processors (DPs).

ANSWER: global

Dr. Codd's _____ rule of relational database states that every value in a table is guaranteed to be accessible through a combination of table name, primary key value, and column name.

ANSWER: guaranteed Access

When selecting DBMS _____, items to consider include processors, RAM, and disk space.

ANSWER: hardware

One of the limitations of the _____ model is that there is a lack of standards.

ANSWER: hierarchical

In organizations that generate large numbers of transactions, _____ processing speeds are often a top priority in database design, which result in minimal access time.

ANSWER: high

One of the advantages of a distributed database management system (DDBMS) is processor _____.

ANSWER: independence

The distributed database system must be _____ of the computer system hardware.

ANSWER: independent

Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.

ANSWER: integrity

A user-friendly _____ is one advantage of a distributed database management system (DDBMS) .

ANSWER: interface

The _____ is the representation of a database as "seen" by the DBMS.

ANSWER: internal model

A(n) _____ process is based on repetition of processes and procedures.

ANSWER: iterative

An ERD is created through a(n) _____ process.

ANSWER: iterative

The _____ condition is generally composed of an equality comparison between the foreign key and the primary key of related tables.

ANSWER: join

In a relational model, _____ are used to establish relationships among tables and to ensure the integrity of the data.

ANSWER: keys

To determine the appropriate order of the operations, the scheduler bases its actions on concurrency control algorithms, such as _____ or time stamping methods.

ANSWER: locking

The _____ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.

ANSWER: logical design

The term _____ is used to refer to the task of creating a conceptual data model that could be implemented in any DBMS.

ANSWER: logical design

The _____ occurs when two concurrent transactions, T1 and T2, are updating the same data element and one of the updates is lost.

ANSWER: lost update problem

In a distributed database management system (DDBMS), _____ occurs to determine the data location of local and remote fragments.

ANSWER: mapping

In object-oriented terms, a(n) _____ defines an object's behavior.

ANSWER: method

When indicating cardinality, the first value represents the _____ number of associated entities.

ANSWER: minimum

A(n) _____ is an information system component that handles a specific business function, such as inventory, orders, or payroll.

ANSWER: module

Because real-world database design is generally done by teams, the database design is probably divided into major components known as _____.

ANSWER: modules

Uniqueness ensures that no equal time stamp values can exist, and _____ ensures that time stamp values always increase.

ANSWER: monotonicity

Typically, the _____ scenario requires a network file server running conventional applications that are accessed through a network.

ANSWER: multiple-site processing, single-site data MPSD multiple-site processing, single-site data (MPSD)

The _____ rule states that only one transaction at a time can own an exclusive lock on the same object.

ANSWER: mutual exclusive

The combination of _____ and ER modeling yields a useful ERD, whose entities may now be translated into appropriate table structures.

ANSWER: normalization

In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations - for example, deciding to change the price of a product to clear it from inventory.

ANSWER: operational

In a distributed database management system (DDBMS), query _____ is used to find the best access strategy.

ANSWER: optimization

Participation is _____ if one entity occurrence does not require a corresponding entity occurrence in a particular relationship.

ANSWER: optional

A dependency based on only a part of a composite primary key is called a(n) _____.

ANSWER: partial dependency

Failure to understand the distinction between mandatory and optional _____ in relationships might yield designs in which awkward (and unnecessary) temporary rows (entity instances) must be created just to accommodate the creation of required entities.

ANSWER: participation

In order to meet _____ requirements, you may have to denormalize some portions of a database design.

ANSWER: performance

A(n) ______ occurs when a transaction executes a query at time T1, and it runs the same query at same time T2, yielding additional rows that satisfy the query.

ANSWER: phantom read

An initial assessment of the information flow-and-extent requirements must be made during the _____ portion of the Systems Development Life Cycle (SDLC).

ANSWER: planning

The traditional Systems Development Life Cycle (SDLC) phases are _____, analysis, detailed systems design, implementation, and maintenance.

ANSWER: planning

One of the advantages of a distributed database management system (DDBMS) is less danger of a single-_____ failure.

ANSWER: point

Because a partial dependency can exist only when a table's primary key is composed of several attributes, a table whose _____ key consists of only a single attribute is automatically in 2NF once it is in 1NF.

ANSWER: primary

The concept of relationship strength is based on how the _____ of a related entity is defined.

ANSWER: primary key

Any attribute that is at least part of a key is known as a(n) _____.

ANSWER: prime attribute key attribute

In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.

ANSWER: privacy

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource a given user can access.

ANSWER: profile

During _____ replication, after an update, the originating DP node sends "messages" to the replica nodes to notify them of the update.

ANSWER: pull

After an update, the originating DP node sends the changes to the replica nodes to ensure that data is immediately updated, during _____ replication.

ANSWER: push

In the SQL environment, the word _____ covers both questions and actions.

ANSWER: query

The syntax of the EXCEPT statement in Oracle is _____.

ANSWER: query EXCEPT query;

Database transaction _____ restores a database from an inconsistent state to a previously consistent state.

ANSWER: recovery

An alias is especially useful when a table must be joined to itself in a(n) _____ query.

ANSWER: recursive

A(n) _____ attribute is an attribute that must have a value.

ANSWER: required

In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.

ANSWER: role

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

ANSWER: role

The _____ interleaves the execution of database operations to ensure serializability.

ANSWER: scheduler

A(n) _____ is the conceptual organization of an entire database as viewed by a database administrator.

ANSWER: schema

An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chosen database.

ANSWER: schema

The system's _____ defines the extent of the design according to operational requirements.

ANSWER: scope

A(n) _____ in a hierarchical model is the equivalent of a record in a file system.

ANSWER: segment

Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be _____ correct.

ANSWER: semantically

The scheduler's main job is to create a(n) _____ of a transaction's operation, in which the interleaved executions of transactions yield the same results as if the transactions were executed in serial order.

ANSWER: serializable schedule

The _____ scenario is typical of most mainframe and midrange UNIX/LINUX server database management systems (DBMS).

ANSWER: single-site processing, single-site data SPSD single-site processing, single-site data (SPSD)

A person's Social Security number would be an example of a(n) _____ attribute.

ANSWER: single-valued

In Crow's Foot notation, an optional relationship between entities is shown by drawing a(n) _____ on the side of the optional entity.

ANSWER: small circle (O)

The Crow's Foot notation depicts the strong relationship with a(n) _____ line between the entities.

ANSWER: solid

Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.

ANSWER: strategic

A(n) _____ relationship is also known as an identifying relationship.

ANSWER: strong

A(n) _____, also known as a nested query or an inner query, is a query that is embedded (or nested) inside another query.

ANSWER: subquery

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of _____ keys.

ANSWER: surrogate

The _____ catalog can be described as a detailed system data dictionary that describes all objects within the database, including data about table names, the table's creator and creation date, the number of columns in each table, the data type corresponding to each column, index filenames, index creators, authorized users, and access privileges.

ANSWER: system

In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator.

ANSWER: systems

As a rule, a(n) _____ must unlock the object after its termination.

ANSWER: transaction

The DBMS uses the information stored in the _____ log for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.

ANSWER: transaction

Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.

ANSWER: tuning

Each row in a relation is called a(n) _____.

ANSWER: tuple

A(n) _____ index is an index in which the index key can have only one pointer value (row) associated with it.

ANSWER: unique

The _____ fragment condition indicates that no row has a duplicate, regardless of the fragment in which it is located.

ANSWER: unique

In the context of Oracle Enterprise Manager, a(n) _____ is a uniquely identifiable object that allows a given person to log on to the database.

ANSWER: user

Unnormalized tables yield no simple strategies for creating virtual tables known as _____.

ANSWER: views

A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

ANSWER: vulnerability

Proper data _____ design requires carefully defined and controlled data redundancies to function properly.

ANSWER: warehousing

A(n) _____ character is a symbol that can be used as a general substitute for other characters or commands.

ANSWER: wildcard wild card

The _____ forces the log entry to be written to permanent storage before the actual operation takes place.

ANSWER: write-ahead protocol

The _____ protocol ensures that transaction logs are always written before any database data is actually updated.

ANSWER: write-ahead-log

_____ exists when different and conflicting versions of the same data appear in different places.

Data inconsistency

_____ exists when it is possible to make changes in the data storage characteristics without affecting an application program's ability to access data.

Data independence

_____ relates to activities that make a database operate more efficiently in terms of storage and access speed.

Performance tuning

_____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. a. Data integrity b. Data anomaly c. Data ubiquity d. Data quality

a. Data integrity

A data warehouse can store data derived from many sources. a. True b. False

a. True

Data is said to be verifiable if: a. the data always yields consistent results. b. the data cannot be changed or manipulated. c. the data is obtained from trusted sources. d. the data is stored in different places within the database.

a. the data always yields consistent results.

A(n) _____ is a spur-of-the-moment question.

ad hoc query

Data and information are essentially the same thing. a. True b. False

b. False

Data anomaly is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. a. True b. False

b. False

Structural dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data. a. True b. False

b. False

The DBMS reveals much of the database's internal complexity to the application programs and users. a. True b. False

b. False

When data are entered into a form and saved, they are placed in the underlying database as knowledge. a. True b. False

b. False

Accurate, relevant, and timely information is the key to ____. a. data management b. good decision making c. knowledge d. understanding

b. Good decision making

A desktop database is a _____ database. a. single-user b. multiuser c. workgroup d. distributed

b. Multiuser

The organization of data within folders in a manual file system is determined by _______. a. its date of creation b. its expected use c. the title of the documents in the folder d. the data processing specialist

b. its expected use

End-user data is _____. a. knowledge about the end users b. raw facts of interest to the end user c. information about a specific subject d. accurate, relevant and timely information

b. raw facts of interest to the end user

Most data that can be encountered are best classified as _____. a. structured b. semistructured c. unstructured d. historical

b. semistructured

To reveal meaning, information requires _____.

context

A(n) _____ might be written by a programmer or it might be created through a DBMS utility program. a. query b. operating system c. database management system d. application

d. Application

Which of the following refers to the situation where different versions of the same data are stored at different places because they weren't updated consistently? a. Data query b. Data integrity c. Data dictionary d. Data redundancy

d. Data redundancy

_____ is the result of revealing the meaning of raw facts. a. End-user data b. An encoded sample c. An encrypted bit d. Information

d. Information

An XML database supports the storage and management of _____ XML data. a. structured b. multistructured c. fullystructured d. semistructured

d. semistructured

Information is produced by processing _____.

data

A(n) _____ develops when all required changes in the redundant data are not made successfully.

data anomaly

The DBMS uses the _____ to look up the required data component structures and relationships, thus relieving programmers from having to code such complex relationships in each program.

data dictionary

Each column in a relation represents a(n) _____.

ANSWER: attribute

Data _____ describes the process of deciding where to locate data.

ANSWER: allocation

A transaction processor is also known as the _____ processor.

ANSWER: application

The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.

ANSWER: technological

_____ exists when the same data are stored unnecessarily at different places.

Data redundancy

Data constitute the building blocks of information. a. True b. False

a. True

Data processing can be as simple as organizing data to reveal patterns. a. True b. False

a. True

_____ is the result of processing raw data to reveal its meaning.

Information

One disadvantage of a database system over previous data management approaches is increased costs. a. True b. False

a. True

The _____ guarantees that if a portion of a transaction operation cannot be committed, all changes made at the other sites participating in the transaction will be undone to maintain a consistent database state. a. DO-UNDO-REDO protocol b. two-phase commit protocol (2PC) c. coordinator protocol d. write-ahead protocol

ANSWER: b

The _____ notation of entity-relationship modelling can be used for both conceptual and implementation modelling. a. Bachman b. UML c. Chen d. Crow's Foot

ANSWER: b

The _____ processor is the software component found in each computer that requests data. It receives and processes the application's data requests. a. database b. transaction c. data d. network

ANSWER: b

When a table contains only one candidate key, _____ are considered to be equivalent. a. the 1NF and the 2NF b. the 3NF and the BCNF c. the 4NF and the 3NF d. the BCNF and the DKNF

ANSWER: b

A primary key is a(n) _____ key chosen to be the primary means by which rows of a table are uniquely identified.

ANSWER: candidate

A(n) _____ order sequence is a multilevel ordered sequence that can be created easily by listing several attributes, separated by commas, after the ORDER BY clause.

ANSWER: cascading

In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.

ANSWER: cloud

The objective of _____ control is to ensure the serializability of transactions in a multiuser database environment.

ANSWER: concurrency

In SQL, all _____ expressions evaluate to true or false.

ANSWER: conditional

The DBA must review the database application design to ensure that transactions are _____, meaning that they mirror real-world events.

ANSWER: correct

"A password must have a minimum of five characters" is an example of a _____. a. policy b. rule c. procedure d. standard

ANSWER: d

Of the following normal forms, _____ is mostly of theoretical interest. a. 1NF b. 3NF c. BCNF d. DKNF

ANSWER: d

The Chen notation identifies a weak entity by using a double-walled entity _____.

ANSWER: rectangle

One of the advantages of a distributed database management system (DDBMS) is _____ operating cost.

ANSWER: reduced lower

The price paid for increased performance through denormalization is a larger amount of _____.

ANSWER: redundancy data redundancy

A table is also called a(n) _____ because the relational model's creator, E. F. Codd, used the two terms as synonyms.

ANSWER: relation

The relational model's foundation is a mathematical concept known as a(n) _____.

ANSWER: relation

Identifying the attributes of entities helps in the better understanding of _____ among entities.

ANSWER: relationships

The database structure in a DBMS is stored as a _____. a. single file b. collection of files c. set of key/value pairs d. collection of queries

b. Collection of files

An advantage of database systems is that you needn't perform frequent updates and apply latest patches. a. True b. False

b. False

Field refers to a collection of related records. a. True b. False

b. False

One disadvantage of the DBMS is that it increases the risk of data security breaches. a. True b. False

b. False

A workgroup database is a(n) _____ database. a. single-user b. multiuser c. desktop d. distributed

b. Multiuser

_____ provide a description of the data characteristics and the set of relationships that link the data found within the database. a. Queries b. End-user data c. Metadata d. Schemas

c. Metadata

A database that is created and maintained using services such as Microsoft Azure or Amazon AWS is called a(n) _____ database.

cloud

Even when a good database blueprint is available, an applications programmer's view of the data should match that of the manager and the end user. a. True b. False

ANSWER: False

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers. a. True b. False

ANSWER: False

In Chen notation, entities and relationships have to be oriented horizontally - not vertically. a. True b. False

ANSWER: False

In Chen notation, there is no way to represent cardinality. a. True b. False

ANSWER: False

In a natural join, the column on which the join was made occurs twice in the new table. a. True b. False

ANSWER: False

In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity. a. True b. False

ANSWER: False

SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words. a. True b. False

ANSWER: False

The SELECT operator yields a vertical subset of a table. a. True b. False

ANSWER: False

A data dictionary is sometimes described as "the database designer's database" because it records the design decisions about tables and their structures. a. True b. False

ANSWER: True

Concurrent backups take place while the user is working on the database. a. True b. False

ANSWER: True

If the attribute (B) is functionally dependent on a composite key (A) but not on any subset of that composite key, the attribute (B) is fully functionally dependent on (A). a. True b. False

ANSWER: True

In a 1:M relationship, to avoid the possibility of referential integrity errors, the data of the "1" side must be loaded first. a. True b. False

ANSWER: True

In a page-level lock, the DBMS will lock an entire diskpage. a. True b. False

ANSWER: True

In an SQL-based relational database, rows in different tables are related based on common values in common attributes. a. True b. False

ANSWER: True

In most modern relational DBMSs, a new database implementation requires the creation of special storage-related constructs to house the end-user tables. a. True b. False

ANSWER: True

In the context of partial dependencies, data redundancies occur because every row entry requires duplication of data. a. True b. False

ANSWER: True

Numeric functions take one numeric parameter and return one value. a. True b. False

ANSWER: True

The conditional LIKE must be used in conjunction with wildcard characters. a. True b. False

ANSWER: True

_____ distributed database management systems (DDBMS) integrate multiple instances of the same DBMS over a network. a. Homogeneous b. Heterogeneous c. Fully heterogeneous d. Combination

ANSWER: a

_____ is a relational set operator. a. EXCEPT b. PLUS c. ALL d. EXISTS

ANSWER: a

_____ is a string function that returns the number of characters in a string value. a. LENGTH b. SUBSTRING c. CONCAT d. UCASE

ANSWER: a

_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. a. Predicate b. Database c. Relational d. Index

ANSWER: a

_____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. a. Inconsistent retrieval b. The phenomena of uncommitted data c. Lost update problems d. Dirty read problems

ANSWER: a

_____ returns only the attributes requested, in the order in which they are requested. a. PROJECT b. SELECT c. UNION d. DIFFERENCE

ANSWER: a

_____ transparency allows a physically dispersed database to be managed as though it were centralized. a. Distribution b. Transaction c. Failure d. Performance

ANSWER: a

Of the following events, which is defined by ANSI as being equivalent to a COMMIT? a. Five SQL statements are executed. b. The end of a program is successfully reached. c. The program is abnormally terminated. d. The database is shut down for maintenance.

ANSWER: b

Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. implementation and loading d. testing and evaluation

ANSWER: b

The _____ administrator is responsible for strategic planning. a. system b. data c. database d. program

ANSWER: b

_____ is data about data through which the end-user data are integrated and managed.

Metadata

PRODUCT yields all possible pairs of rows from two tables, also known as the _____ product.

ANSWER: Cartesian

A specialty field in mathematics, known as _____ algebra, is dedicated to the use of logical operators.

ANSWER: Boolean

_____ databases focus primarily on storing data used to generate information required to make tactical or strategic decisions.

Analytical

A data warehouse contains historical data obtained from the _____. a. operational databases b. desktop database c. enterprise databases d. workgroup databases

a. Operational database

_____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed. a. Performance tuning b. Database design c. Query access d. Database management

a. Performance tuning

_____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information. a. Structured data b. Raw data c. Unstructured data d. Obsolete data

a. Structured data

Metadata describe the data characteristics and the set of relationships that links the data found within the database. a. True b. False

a. True

Structure is based on the type of processing to be performed on the data. a. True b. False

a. True

Which of the following is true of spreadsheet applications? a. They provide enhanced security and robust data sharing features. b. They do not allow manipulation of data once entered. c. They are a better alternative to databases. d. They enhance the user's ability to understand the data.

d. They enhance the user's ability to understand the data.

The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment. a. structured data b. transaction c. management system d. database system

d. database system

A _____ is a collection of related records. a. schema b. field c. column d. file

d. file

The term _____ refers to scattered locations storing the same basic data.

islands of information


संबंधित स्टडी सेट्स

Primerica - Life Insurance Policy Provisions, Options & Riders (AZ)

View Set

Chapter 9 Certification Style Exam Quiz

View Set

Chapter 26: Structure & Function of the Pulmonary System

View Set

Fundamentals of Capital Budgeting

View Set

Chapter 7: The Late Silent Era in Hollywood, 1920-1928

View Set