CPSC 4620 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The _____ specification creates an individual index on a respective attribute; use it to avoid having duplicated values in a column. UNIQUE VARCHAR NOT NULL UPDATE

UNIQUE

_____ data exist in the format in which they were collected. Structured Historical Semistructured Unstructured

Unstructured

A(n) _____ is the set of possible values for a given attribute. domain range identifier ke

domain

A(n) _____ database is used by an organization and supports many users across many departments. enterprise workgroup transactional desktop

enterprise

The default comparison condition for the subtype discriminator attribute is the _____ comparison. less than greater than nonequality equality

equality

When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. difference-compatible union-compatible intersect-compatible select-compatible

union-compatible

A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship. child weak business strong

weak

What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE "old-style" join procedural statement set operator natural join

"old-style" join

The Crow's foot symbol with two vertical parallel lines indicates _____ cardinality. (1,N) (0,1) (1,1) (0,N)

(1,1)

A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____. 3NF 1NF 4NF 2NF

1NF

From a structural point of view, 2NF is better than _____. 1NF BCNF 4NF 3NF

1NF

From a structural point of view, 3NF is better than _____. 6NF 3NF 5NF 2NF

2NF

A table that is in 2NF and contains no transitive dependencies is said to be in _____. 1NF 2NF 3NF 4NF

3NF

All changes in a table structure are made using the _____ TABLE command, followed by a keyword that produces the specific changes a user wants to make. UPDATE ALTER ROLLBACK COMMIT

ALTER

_____ requires that all operations of a transaction be completed. Atomicity Durability Time stamping Specificity

Atomicity

The special operator used to check whether an attribute value is within a range of values is _____. IN BETWEEN NULL LIKE

BETWEEN

The SQL command that allows a user to permanently save data changes is _____. COMMIT UPDATE INSERT SELECT

COMMIT

The _____ command permanently saves all changes—such as rows added, attributes modified, and rows deleted—made to any table in the database. SELECT ROLLBACK UPDATE COMMIT

COMMIT

The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. MAX COUNT SUM MIN

COUNT

Using the _____ command, SQL indexes can be created on the basis of any selected attribute. CREATE INDEX UPDATE CASCADE SELECT VARCHAR

CREATE INDEX

The _____ constraint assigns a value to an attribute when a new row is added to a table. NOT NULL DEFAULT CASCADE UNIQUE

DEFAULT

Which command would be used to delete the table row where the P_CODE is 'BRT-345'? REMOVE FROM PRODUCT WHERE P_CODE = 'BRT-345'; ERASE FROM PRODUCT WHERE P_CODE = 'BRT-345'; DELETE FROM PRODUCT WHERE P_CODE = 'BRT-345'; ROLLBACK FROM PRODUCT WHERE P_CODE = 'BRT-345';

DELETE FROM PRODUCT WHERE P_CODE = 'BRT-345';

A table can be deleted from the database by using the _____ TABLE command. DELETE ERASE MODIFY DROP

DROP

_____ can render data useless to unauthorized users who might have violated some of the database security layers. Data encryption Password security Physical security Access rights

Data encryption

_____ exists when different versions of the same data appear in different places. Conceptual dependence Data inconsistency Structural dependence Poor data security

Data inconsistency

SQL requires the use of the _____ command to enter data into a table. INSERT SELECT COMMIT NOT NULL

INSERT

_____ is a string function that returns the number of characters in a string value. SUBSTRING CONCAT UCASE LENGTH

LENGTH

According to the rules of precedence, which of the following computations should be completed first? Operations within parentheses Multiplications and divisions Additions and subtractions Power operations

Operations within parentheses

_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. Equijoins Outer joins Inner joins Theta joins

Outer Joins

_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. Logical design Network design Conceptual design Physical design

Physical design

The _____ command is used to restore the database to its previous condition. ROLLBACK BACKUP ROWCOUNT COMMIT

ROLLBACK

A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. SELECT INSERT COMMIT UPDATE

SELECT

Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? SELECT ONLY V_CODE FROM PRODUCT; SELECT DISTINCT V_CODE FROM PRODUCT; SELECT UNIQUE V_CODE FROM PRODUCT; SELECT DIFFERENT V_CODE FROM PRODUCT;

SELECT DISTINCT V_CODE FROM PRODUCT;

The syntax for a left outer join is _____. SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition SELECT column-list WHERE LEFT table1 = table SELECT column-list FROM table1 LEFT table2 [JOIN] WHERE join-condition SELECT column-list FROM table1 OUTER JOIN table2 LEFT WHERE join-condition

SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition

Which SQL format would be best used for a small, numeric data type? SMALLINT CHAR(L) INTEGER NUMERIC(L,D)

SMALLINT

Which is a feature of a correlated subquery? The inner subquery executes first. The outer subquery initiates the process of execution in a subquery. The outer subquery executes independent of the inner subquery. The inner subquery initiates the process of execution in a subquery.

The outer subquery initiates the process of execution in a subquery.

_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. Specialization Generalization Normalization Virtualization

Virtualization

When a user issues the DELETE FROM tablename command without specifying a WHERE condition, _____. all rows will be deleted the first row will be deleted no rows will be deleted the last row will be deleted

all rows will be deleted

A(n) _____ is the equivalent of a field in a file system. constraint attribute relationship entity

attribute

The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables. core indexed relation base

base

Another name for a composite entity is a(n) _____ entity. directive bridge linked associative

bridge

A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes. foreign candidate primary secondary

candidate

An atomic attribute _____. cannot be further subdivided displays multiplicity is always chosen to be a foreign key cannot exist in a relational table

cannot be further subdivided

The database structure in a DBMS is stored as a _____. single file collection of queries set of key/value pairs collection of files

collection of files

A _____ attribute can be further subdivided to yield additional attributes. simple multivalued single-valued composite

composite

A(n) _____ is a restriction placed on the data. relationship attribute entity constraint

constraint

_____ are normally expressed in the form of rules. Attributes Relationships Constraints Entities

constraints

In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____. distributed database design entity relationship modeling and normalization data analysis and requirements data model verification

data analysis and requirements

Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints. manager database administrator systems administrator programmer

database administrator

From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices. historical derived granular atomic

derived

Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B. derives from controls determines owns

determines

When you create a new database, the RDBMS automatically creates the data _____ tables in which to store the metadata and creates a default database administrator. appendix dictionary index chapter

dictionary

In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up. adaptive backup differential backup conservative backup transaction log backup

differential backup

In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____. ER modeling and normalization database analysis and requirements distributed database design data model verification

distributed database design

A(n) _____ represents a particular type of object in the real world. attribute relationship entity node

entity

The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. entity relational null referential

entity

The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text. entity relationship network hierarchical object-oriented

entity relationship

A _____ is a character or group of characters that has a specific meaning. file field database record

field

In a real-world environment, we must strike a balance between design integrity and _____. ease of use robustness flexibility uniqueness

flexibility

A _____ is the primary key of one table that has been placed into another table to create a common attribute. foreign key superkey candidate key composite primary key

foreign key

Lock _____ indicates the level of lock use. shrinking growing granularity serializability

granularity

The first step in developing the conceptual model using ER diagrams is to _____. define the attributes, primary keys, and foreign keys for each of the entities identify, analyze, and refine the business rules normalize the entities complete the initial ER diagram

identify, analyze, and refine the business rules

A(n) _____ cursor is automatically created in procedural SQL when the SQL statement returns only one value. dynamic implicit static explicit

implicit

When using a(n) _____ join, only rows from the tables that match on a common value are returned. outer inner set full

inner

A(n) _____ only returns matched records from the tables that are being joined. equijoin outer join inner join theta join

inner join

A specialization hierarchy can have _____ level(s) of supertype/subtype relationships. zero only one one or many many

many

In a _____ situation, one key determines multiple values of two other attributes and those attributes are independent of each other. functional dependency multivalued dependency transitive dependency partial dependency

multivalued dependency

A _____ key is a real-world, generally accepted identifier used to uniquely identify real-world objects. foreign natural surrogate primary

natural

A(n) _____ join will select only the rows with matching values in the common attribute(s). outer cross natural full

natural

The most likely data type for a surrogate key is _____. numeric character date logical

numeric

Within a specialization hierarchy, every subtype can have _____ supertype(s) to which it is directly related. zero one or many many only one

only one

A data warehouse contains historical data obtained from the _____. operational databases enterprise databases desktop database workgroup databases

operational databases

The existence of a(n) _____ entity indicates that its minimum cardinality is zero. strong weak optional ternary

optional

A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. cross inner outer equi-

outer

In subquery terminology, the first query in the SQL statement is known as the _____ query. base inner outer left

outer

A _____ lock will lock the entire diskpage. transaction-level page-level table-level row-level

page-level

When writing SQL table-creating command sequences, the entire table definition is enclosed in _____. quotations parentheses asterisks commas

parentheses

If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute. partial dependencies Boyce-Codd normal forms redundancies time-variances

partial dependencies

One important inheritance characteristic is that all entity subtypes inherit their _____ key attribute from their supertype. primary surrogate foreign natural

primary

A _____ is a logically connected set of one or more fields that describes a person, place, or thing. column database record file

record

You cannot have an invalid entry in the foreign key column; at the same time, you cannot delete a vendor row as long as a product row references that vendor. This is known as _____. referential integrity cross joining authentication batch updating

referential integrity

A verb associating two nouns in a business rule translates to a(n) _____ in the data model. entity attribute relationship constraint

relationship

A(n) _____ is bidirectional. entity relationship attribute constraint

relationship

A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence. repeating group primary key partial dependency transitive dependency

repeating group

A relational table must not contain a(n) _____ relationship repeating group entity attribute

repeating group

Words used by a system that cannot be used for any other purpose are called _____ words. For example, the word GROUP cannot be used to name tables or columns. reserved unique null character

reserved

The SQL data manipulation command HAVING: restricts the selection of rows based on a conditional expression. modifies an attribute's values in one or more table's rows. restricts the selection of grouped rows based on a condition. groups the selected rows based on one or more attributes.

restricts the selection of grouped rows based on a condition.

A _____ key is defined as a key that is used strictly for data retrieval purposes. secondary foreign candidate lookup

secondary

A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock. shared binary exclusive two-phase

shared

A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock. shrinking unlocking locking growing

shrinking

A(n) _____ is a query that is embedded (or nested) inside another query. view alias operator subquery

subquery

A(n) _____ is the attribute in the supertype entity that determines to which entity subtype each supertype occurrence is related. subtype discriminator entity supertype specialization hierarchy inheritance discriminator

subtype discriminator

A _____ is a primary key created by a database designer to simplify the identification of entity instances. compound key natural key surrogate key composite key

surrogate key

When the specific cardinalities are not included on the diagram in Crow's Foot notation, cardinality is implied by the use of _____. symbols tables images attributes

symbols

The process of creating an information system is known as _____. network development database development systems development enterprise development

systems development

The CREATE TABLE command lets you define constraints when you use the CONSTRAINT keyword, known as a(n) _____ constraint. column index cell table

table

Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process. two three four five

three

A(n) _____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key. partial dependency repeating group atomic attribute transitive dependency

transitive dependency

What SQL construct could be used for automatically maintaining audit log data? triggers tables stored procedures stored functions

triggers

A _____ relationship exists when an association is maintained within a single entity. weak unary strong ternary

unary


संबंधित स्टडी सेट्स

Management Principles- Module 8 (chapter 13)

View Set

Le Petit Prince Chapter 5 Questions

View Set

APUSH Chapter 24: The Great Depression and the New Deal: FDR's NEW DEAL: when it was, what it was, supporters, opponents

View Set

Patho 2: Chapter 36, 37, 38 - Quiz 4- GI Disorders, Gall Bladder and Pancreatic Disorders

View Set