DBMS Final
eferring to the figure below, which of the following is NOT true?
A component is always used in only one item.
A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.
API
________ is the process of assigning pieces of application code to clients or servers.
Application partitioning
Which of the following are key steps in a data quality program?
Apply TQM principles and practices
Which of the following is a type of network security?
Authentication of the client workstation
An appropriate datatype for adding a sound clip would be:
BLOB
If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle?
DBA_TABLES
The ________ DBA view shows information about all users of the database in Oracle.
DBA_USERS
The role that is responsible for developing overall policies and procedures for database security is:
Data Administration.
________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated.
Data integrity
The role responsible for administering database security is:
Database Administration.
________ is a technical function responsible for database design, security, and disaster recovery.
Database administration
Which of the following functions model business rules?
Database analysis
Which of the following functions design integrity controls?
Database design
________ problems are encountered when removing data with transitive dependencies.
Deletion
Many Python web applications use:
Django.
________ takes a value of TRUE if a subquery returns an intermediate results table which contains one or more rows.
EXISTS
A composite key consists of only one attribute.
False
A data expeditor is a person assigned the responsibility of ensuring that organizational applications properly support the organization's enterprise goals of data quality.
False
A data governance committee is always made up of high-ranking government officials.
False
A data stewardship program does not help to involve the organization in data quality.
False
A database is a sequence of steps that constitute a well-defined business activity.
False
A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.
False
A foreign key is a primary key of a relation that also is a primary key in another relation.
False
A function has only input parameters but can return multiple values.
False
A high-level function that is responsible for the overall management of data resources in an organization is called database administration.
False
A join index is a combination of two or more indexes.
False
A relation is in first normal form if it has no more than one multivalued attribute.
False
A review will thoroughly review all process controls on data entry and maintenance.
False
A routine is a named set of SQL statements that are considered when a data modification occurs.
False
A shared lock prevents another transaction from reading a record.
False
A transaction is consistent if it always runs with the same amount of memory.
False
A transaction is durable if it can resist failure.
False
ABET is a common encryption method used to secure data traveling between a client and a server.
False
ACID support for database-as-a-service is easily provided in a cloud computing environment.
False
Adding notations to the EER diagram regarding data volumes and usage is of no value to the physical design process.
False
An API is a set of routines that a database server uses to access database objects
False
An anomaly is a type of flaw in the database server.
False
An application server provides basic functionality for receiving and responding to requests from browsers.
False
An enterprise key is a foreign key whose value is unique across all relations.
False
An equi-join is a join in which one of the duplicate columns is eliminated in the result table.
False
Anomalies do not generally arise out of transitive dependencies.
False
Business rules logic includes such activities as data validation and identification of processing errors.
False
Completeness means that all data that must have a value does not have a value.
False
Data which arrive via XML and B2B channels is always guaranteed to be accurate.
False
Database administrators are responsible for developing overall policies and procedures for database security.
False
Database applications are not very disk intensive.
False
Databases are generally the property of a single department within an organization.
False
Dirty data saves work for information systems projects.
False
During multiple simultaneous transactions data integrity is maintained by logging.
False
EXISTS takes a value of false if the subquery returns an intermediate result set.
False
Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table.
False
Generally, records in a customer file never become obsolete.
False
Geolocation logic is the application logic component responsible for data storage and retrieval.
False
Horizontal partitioning is very different from creating a supertype/subtype relationship.
False
Horizontal partitioning refers to the process of combining several smaller relations into a larger table.
False
IF-THEN-ELSE logical processing cannot be accomplished within an SQL statement.
False
Loss of data integrity does not impact the quality of data in a database.
False
Loss of data integrity means that someone has stolen data from the database server.
False
MULTISET is similar to the table datatype.
False
Master data management is the disciplines, technologies, and methods to ensure the currency, meaning, and quality of data within one subject area.
False
One major disadvantage of the outer join is that information is easily lost.
False
One method to handle missing values is to substitute an exact value.
False
Open source software always comes with complete documentation.
False
Quality data are not essential for well-run organizations.
False
Quality data does not have to be unique.
False
Retention refers to the amount of data that is not purged periodically from tables.
False
Specifications for transactions do not need to be reviewed quickly.
False
Specifying the attribute names in the SELECT statement will make it easier to find errors in queries and also correct for problems that may occur in the base system.
False
The Number datatype would be appropriate for a zip code.
False
The natural join is very rarely used.
False
The primary key of the many side migrates to the one side when transforming a one-to-many relationship.
False
The record log is a record of the essential data for each transaction that has been processed against the database.
False
The relational data model does, at this time, directly support subtype/supertype relationships.
False
The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.
False
The smallest unit of named application data is a record.
False
The transaction log contains before and after images of records that have been modified.
False
There is a special operation in SQL to join a table to itself.
False
Three-factor authentication is most often implemented with a credit card.
False
Three-tier architectures generally result in higher long-term costs.
False
Total quality management (TQM) focuses on defect correction rather than defect prevention.
False
Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, and replicate tables, but cannot call other triggers.
False
User-defined functions can improve system performance because they will be processed as sets rather than individually, thus reducing system overhead.
False
Using an index for attributes referenced in ORDER BY and GROUP BY clauses has no significant impact upon database performance.
False
Using an outer join produces this information: rows that do not have matching values in common columns are not included in the result table.
False
Versioning is a pessimistic approach to concurrency control.
False
When developing an application, one must decide where it will be placed when it is developed.
False
When transforming a one-to-one relationship, a new relation is always created.
False
When transforming a weak entity, one should create one relation with both the attributes of the strong entity and the attributes of the weak entity.
False
One major disadvantage of JSP is:
HTML, Java cod,e and SQL code are mixed together.
In which type of file is multiple key retrieval not possible?
Hashed
In the figure below, what type of relationship do the relations depict? ( employee and child)
Identifying entity/weak entity
A cloud computing approach in which the service consists mainly of hardware and systems software resources is called:
Infrastructure-as-a-service.
A data-interchange format easily for humans to read and machines to parse and process is called:
JavaScript Object Notation (JSON).
Which of the following threats involves outside parties using information to embarrass a company?
Loss of confidentiality
Which of the following is NOT true of poor data and/or database administration?
Maintaining a secure server
The methods to ensure the quality of data across various subject areas are called:
Master Data Management.
________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved.
Middleware
________ anomalies can be caused by editing data in tables.
Modification
Which of the following are properties of relations?
No two rows in a relation are identical.
Which of the following functions do cost/benefit models?
Operations
The LAMP stack consists of all of the following EXCEPT:
PHP or Python.
All of the following are well-accepted characteristics of transactions EXCEPT:
Persistence.
In which data model would a code table appear?
Physical
The W3C standard for Web privacy is called:
Platform for Privacy Preferences.
In the figure below, what type of key is depicted? (foreign key depends on primary key)
Recursive foreign
Which of the following violates the atomic property of relations?
Sam Hinz
Which of the following is NOT a reason to create an instance of a relational schema with sample data?
Sample data can reverse database implementation errors.
A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?
Second
A common encryption method to secure data traveling between a client and a server is called:
Secure Sockets Layer (SSL).
A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called:
Software-as-a-service.
________ use the result of the inner query to determine the processing of the outer query.
Subqueries
Which of the following is NOT a common distribution logic for two-tiered server environments?
Tall client
The figure below is an example of mapping which type of relationship? (patient, physician)
Ternary
TQM stands for:
Transforming Quality Management.
A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.
True
A business transaction requires several actions against a database.
True
A candidate key is an attribute, or combination of attributes, that uniquely identifies a row in a relation.
True
A cascading delete removes all records in other tables associated with the record to be deleted.
True
A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.
True
A correlated subquery is executed once for each iteration through the outer loop.
True
A data quality audit helps an organization understand the extent and nature of data quality problems.
True
A data steward is a person assigned the responsibility of ensuring the organizational applications properly support the organization's enterprise goals for data quality.
True
A dynamic query is created by the user.
True
A hashing algorithm is a routine that converts a primary key value into a relative record address.
True
A join in which the joining condition is based on equality between values in the common column is called an equi-join.
True
A materialized view is not persistent.
True
A natural join is the same as an equi-join, except that it is performed over matching columns that have been defined with the same name, and one of the duplicate columns is eliminated.
True
A partial functional dependency is a functional dependency in which one or more nonkey attributes are functionally dependent on part (but not all) of the primary key.
True
A range control limits the set of permissible values that a field may assume.
True
A referential integrity constraint is a rule that maintains consistency among the rows of two relations.
True
A relation in fifth normal form may not contain any anomalies.
True
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
True
A trigger is a named set of SQL statements that are considered when a data modification occurs.
True
A web server is a key component of web applications.
True
A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies.
True
All transactions must have the ACID characteristics.
True
All values that appear in a column of a relation must be taken from the same domain.
True
Along with table scans, other elements of a query can be processed in parallel.
True
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.
True
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
True
Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.
True
Completeness means that all data that are needed are present.
True
Conformance refers to whether the data is stored, exchanged, or presented in a format that is as specified by its metadata.
True
Constraints are a special case of triggers.
True
Correlated subqueries are less efficient than queries that do not use nesting.
True
Data quality is essential for SOX and Basel II compliance.
True
Database administrators are responsible for administering database security.
True
Dirty data can cause delays and extra work on information systems projects.
True
Establishing IF-THEN-ELSE logical processing within an SQL statement can now be accomplished by using the CASE keyword in a statement.
True
Fast data retrieval is one factor to consider when choosing a file organization for a particular database file.
True
Figuring out what attributes you want in your query before you write the query will help with query writing.
True
Hash partitioning spreads data evenly across partitions independent of any partition key value
True
Improving data capture process is a fundamental step in data quality improvement.
True
In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with the IN qualifier.
True
In some three-tier architectures, most application code is stored on the application server.
True
In the figure below, each employee has exactly one manager.
True
Java servlets execute from within another program and reside on the server.
True
Lack of organizational commitment is a potential reason for an organization's deteriorated data quality.
True
Level of lock granularity is the extent of a database resource include with each lock.
True
One objective of selecting a data type is to minimize storage space.
True
One property of a relation is that each attribute within a relation has a unique name.
True
Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.
True
Open source DBMS are free software that provide the core functionality of an SQL compliant DBMS.
True
Restricting access to the Web server is one method of Web security
True
Sample data are useful for developing prototype applications and for testing queries.
True
Security is one advantage of partitioning.
True
Since dynamic Web pages require full access to the database, security is different from static HTML pages.
True
Sound data modeling is a central ingredient of a data quality program.
True
Specifying database access policies is done during the database implementation phase
True
The LAMP stack consists of Apache, PHP and MySQL.
True
The UNION clause is used to combine the output from multiple queries into a single result table.
True
The allowable range of values for a given attribute is part of the domain constraint.
True
The columns of a relation can be interchanged without changing the meaning or use of the relation.
True
The data administrator takes responsibility for the overall management of data resources.
True
The following SQL statement is an example of a correlated subquery.SELECT First_Name, Last_Name, Total_SalesFROM Salesman s1WHERE Total_Sales > all(SELECT Total_Sales FROM Salesman s2WHERE s1.Salesman_ID != s2.Salesman_ID);
True
The following query will execute without errors.SELECT Customer.Customer_Name, Salesman.Sales_QuotaFROM CustomerWHERE Customer.Salesman_ID =(SELECT Salesman_IDWHERE Lname = 'SMITH');
True
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
True
The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.
True
The role of database administration is typically a more hands-on, physical involvement with the management of databases.
True
The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.
True
The uncontrolled proliferation of spreadsheets, databases, and repositories leads to data quality problems.
True
Triggers have three parts: the event, the condition, and the action.
True
Two-phase locking is a procedure for acquiring locks for a transaction before any are released.
True
VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space.
True
When EXISTS or NOT EXISTS is used in a subquery, the select list of the subquery will usually just select all columns as a placeholder because it doesn't matter which columns are returned.
True
When a regular entity type contains a multivalued attribute, two new relations are created.
True
When normalizing, the goal is to decompose relations with anomalies to produce smaller, well-structured relations.
True
With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.
True
An open source DBMS is:
a free source code RBMS that provides the functionality of an SQL-compliant DBMS.
All of the following are common denormalization opportunities EXCEPT:
a one-to-many relationship.
The following code would include:SELECT Customer_T.CustomerID,CustomerName, OrderIDFROM Customer_T LEFT OUTER JOIN Order_T ONCustomer_T.CustomerID = Order_T.CustomerID;
all rows of the Customer_T Table regardless of matches with the Order_T Table.
The following code would include:SELECT Customer_T.CustomerID,CustomerName, OrderIDFROM Customer_T RIGHT OUTER JOIN Order_T ONCustomer_T.CustomerID = Order_T.CustomerID;
all rows of the Order_T Table regardless of matches with the Customer_T Table.
The MERGE command:
allows one to combine the INSERT and UPDATE operations.
The following statement is an example of:CREATE TABLE Customer_t (CustNmbr number(11,0),CreditLimit number(6,2),CustStart date,CustEnd date,PERIOD for Custperiod(CustStart,CustEnd));
an application time period table.
A materialized view is/are:
an in-line query
While views promote security by restricting user access to data, they are not adequate security measures because:
an unauthorized person may gain access to a view through experimentation.
In order for a transaction to be consistent:
any database constraints that must be true before the transaction must also be true after the transaction.
The preferred method of fixing an aborted transaction is:
backing out the transaction.
All of the following are additional methods of Web security EXCEPT:
blacklist bad users
A join in which the joining condition is based on equality between values in the common columns is called a(n):
both equi-join. and natural join. .
In order for two queries to be UNION-compatible, they must:
both output compatible data types for each column and return the same number of rows.
A procedure is:
called by name.
User-defined data types:
can have defined functions and methods.
A join operation:
causes two tables with a common domain to be combined into a single table or view.
One way to improve the data capture process is to:
check entered data immediately for quality against data in the database.
Sensitivity testing involves:
checking to see if missing data will greatly impact results.
A method to allow adjacent secondary memory space to contain rows from several tables is called:
clustering.
A primary key that consists of more than one attribute is called a:
composite key.
In SQL, a(n) ________ subquery is a type of subquery in which processing the inner query depends on data from the outer query.
correlated
When a regular entity type contains a multivalued attribute, one must:
create two new relations, one containing the multivalued attribute.
A mechanism in a ResultSet object in Java that points to the current row of data is called a:
cursor.
Data quality problems can cascade when:
data are copied from legacy systems.
Conformance means that:
data are stored, exchanged, or presented in a format that is specified by its metadata.
Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems.
data entry
With ________, the database itself is lost, destroyed, or cannot be read.
database destruction
A computer that provides database storage and access in a client/server environment is called a(n):
database server.
Which of the following is not a basic step to accessing a database from an application:
define physical storage.
A ________ is a temporary table used in the FROM clause of an SQL query.
derived table
A nonkey attribute is also called a(n):
descriptor.
The attribute on the left-hand side of the arrow in a functional dependency is the:
determinant.
An attribute that may have more than one meaning is called a(n):
double defined attribute.
When a user creates a virtual table it is called a(n):
dynamic view.
An advantage of partitioning is:
efficiency.
A factor to consider when choosing a file organization is:
efficient storage.
The following code is an example of a(n):SELECT Customer_T.CustomerID, Order_T.CustomerID,CustomerName, OrderIDFROM Customer_T, Order_TWHERE Customer_T.CustomerID = Order_T. CustomerID;
equi-join.
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the:
explain plan.
Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality.
external data source
A disadvantage of partitioning is:
extra space and update time.
An identifier assigned to an associative entity is also called a cross-relation key.
false
When transforming a unary many-to-many relationship to relations, a recursive foreign key is used.
false
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):
fat client.
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a:
fat client.
When all multivalued attributes have been removed from a relation, it is said to be in:
first normal form.
An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a:
foreign key.
The normal form which deals with multivalued dependencies is called:
fourth normal form.
A constraint between two attributes is called a(n):
functional dependency.
SQL-invoked routines can be:
functions or procedures.
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a:
hash index table.
Data governance can be defined as:
high-level organizational groups and processes that oversee data stewardship.
Data that are accurate, consistent, and available in a timely fashion are considered:
high-quality.
Distributing the rows of data into separate files is called:
horizontal partitioning.
The best place to improve data entry across all applications is:
in the database definitions
One major advantage of the outer join is that:
information is not lost.
A domain definition consists of all of the following components EXCEPT:
integrity constraints.
Data quality is important for all of the following reasons EXCEPT:
it provides a stream of profit.
An index on columns from two or more tables that come from the same domain of values is called a:
join index.
An audit trail of database changes is kept by a:
journalizing facility.
A form of database design which maps conceptual requirements is called:
logical designs.
All of the following are the main goals of normalization EXCEPT:
maximize storage space.
The architecture that most applications use that separates the business logic, presentation logic, and database logic is called:
model-view-controller.
The most commonly used form of join operation is the:
natural join.
Which Java method retrieves the next row of a cursor?
next()
The entity integrity rule states that:
no primary key attribute can be null.
All of the following are popular architectures for Master Data Management EXCEPT:
normalization.
Durability means that:
once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction.
The following code would include:SELECT Customer_T.CustomerID, Order_T.CustomerID,CustomerName, OrderIDFROM Customer_T, Order_TWHERE Customer_T.CustomerID = Order_T. CustomerID;
only rows that match both Customer_T and Order_T Tables.
While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:
operating system.
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:
parallel query processing.
A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a ________ dependency.
partial functional
In the ________ approach, one consolidated record is maintained from which all applications draw data.
persistent
In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record.
persistent
A(n) ________ is a field of data used to locate a related field or record.
pointer
All of the following are advantages of stored procedures EXCEPT:
portability.
An attribute (or attributes) that uniquely identifies each row in a relation is called a
primary key.
All of the following are key components of a web application EXCEPT:
processing-logic server.
Sarbanes-Oxley Act was enacted to ensure the integrity of:
public companies' financial statements.
A rule that states that each foreign key value must match a primary key value in the other relation is called the:
referential integrity constraint.
When incorrect data have been introduced, the database is best recovered by:
restarting from the most recent checkpoint and processing subsequent transactions.
Data quality ROI stands for:
risk of incarceration.
While triggers run automatically, ________ do not and have to be called.
routines
All of the following are part of the coding structure for triggers EXCEPT:
selection.
An operation to join a table to itself is called a(n):
self-join.
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n):
smart card.
One simple task of a data quality audit is to:
statistically profile all files.
A type of query that is placed within a WHERE or HAVING clause of another query is called a:
subquery.
The following code is an example of a:SELECT CustomerName, CustomerAddress, CustomerCity, CustomerState,CustomerPostalCodeFROM Customer_TWHERE Customer_T.CustomerID =(SELECT Order_T.CustomerIDFROM Order_TWHERE OrderID = 1008);
subquery.
Two or more attributes having different names but the same meaning are called:
synonyms.
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n):
tablespace.
A candidate key must satisfy all of the following conditions EXCEPT:
the key must indicate the row's position in the table.
All of the following are disadvantages to cloud-based computing EXCEPT:
the visibility of costs of data management is better.
External data sources present problems for data quality because:
there is a lack of control over data quality.
A PC configured to handle user interfaces with limited local storage is called a(n):
thin client.
One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is:
timeliness.
A method for handling missing data is to:
track missing data with special reports.
A discrete unit of work that must be processed completely or not at all within a computer system is called a:
transaction
A functional dependency between two or more nonkey attributes is called a:
transitive dependency.
A named set of SQL statements that are considered when a data modification occurs are called:
triggers.
A primary key is an attribute that uniquely identifies each row in a relation.
true
The outer join syntax does not apply easily to a join condition of more than ________ tables.
two
Quality data can be defined as being:
unique.
All of the following are guidelines for better query design EXCEPT:
use a lot of self-joins.
Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by:
using the CASE key word in a statement.
A relation that contains minimal redundancy and allows easy use is considered to be:
well-structured.
Horizontal partitioning makes sense:
when different categories of a table's rows are processed separately.