SQL MC Practice
The minimum number of clauses in an SQL Select statement is: 8 6 4 2
2
The clause the gives the condition for selecting rows is: Where Select Order by From
Where
In transforming a recursive relationship to the relational model a foreign key is created which references: a lexical attribute an intersection relation its own relation a specialization
its own relation
Conditions connected by OR will be true: only when just one condition is true when both conditions are false only when both conditions are true when either condition is true
when either condition is true
The type designation Numeric(8,2) means: 8 digits to the left, 2 digits to the right of the decimal usually only 8 digits, but sometimes 10 digits a minimum of 2 digits, a maximum of 8 8 digits, 2 of them to the right of the decimal
8 digits, 2 of them to the right of the decimal
To make changes to the definition of a table the statement used is: Update Alter Change Revise
Alter
The process to determine who or what is requesting access to the database is called what? Authorization Validation Authentication Verification
Authentication
Which occurs first at the time a user desires database access? Validation, then Verification Authentication, then authorization. Authorization, then authentication Verification then validation
Authentication, then authorization.
The process to determine what actions are allowed to what portions of the database is called what? Validation Authentication Authorization Verification
Authorization
If a doctor who is reviewing medical records is only allowed to view medical records of his particular patients, then we would say, he/she is not ____ to view certain records. Authorized Approved Authenticated Verified
Authorized
The backup technique that requires all activity to stop until the backup is complete is called what? Full backup Hot backup Complete backup Cold backup
Cold backup
The technique to apply change logs to obtain lost activity is called what? Database recovery Database restore Database restore and rerun Database logging
Database recovery
The technique to use the latest backup file and return the database to a point in time is called what? Database restore and rerun Database checkpoint Database restore Database recovery
Database restore
The plan to fix a lost or damaged database is called what? Replacement plan Disaster recovery plan Database correction plan Database restore plan
Disaster recovery plan
To remove a table from the database schema definition the statement used is: Remove Drop Alter Delete
Drop
How is the security activity that hides data from being human readable done? Hiding the data columns Putting the data in a secure directory Encrypting the data Restricting database privileges
Encrypting the data
The SQL statement used to enter new rows into a table is: Update Append Insert Add
Insert
* in an SQL Select statement means: Many Exactly 1 character 0 or more characters List all columns
List all columns
The clause that says how the rows in the query result should be sorted is: Select Order by Where From
Order By
Which of the following is NOT an element in a viable database backup and recovery process? Recovery of lost data Logging of activity Periodic freezing all transactions Duplication of the database
Periodic freezing all transactions
The clause that identifies the tables the query should access is: Order by Where Select From
From
The order in which SQL Select clauses are executed is: From, Where, Select, Order by Order by, Select, From, Where Select, From, Where, Order by Where, From, Select, Order by
From, Where, Select, Order by
The clause that says which columns to list in the query result is: From Order by Where Select
Select
The other name for symmetric encryption is what? Single-encryption Two-key encryption Single-key encryption Double-encryption
Single-key encryption
What is the key for an associative entity on a conceptual data model when it is converted to the relational model schema? The table is not required to have a key. Either endpoint key becomes a foreign key in the table. The key consists of the primary keys of the two related tables. A random key is chosen by the developer.
The key consists of the primary keys of the two related tables.
How is a one-to-many relationship implemented in the a database schema? The keys of each class become foreign keys in the other class. The key of the many class becomes a foreign key in the one class. Another table is made which contains the keys from both classes. The key of the one class becomes a foreign key in the many class.
The key of the one class becomes a foreign key in the many class
How are the keys transformed in the relations to capture a one-to-one relationship in the conceptual model? A new table is created with its own primary key The primary key of one class becomes a foreign key in the related class The primary key of each class is becomes a foreign key in the other class A separate table is created with both primary keys as foreign keys
The primary key of one class becomes a foreign key in the related class
The first column listed in the Order by clause is: The primary sort key The first column in the Select clause The secondary sort key The last column in the Select clause
The primary sort key
The maximum number of tables that can be joined in an SQL Select statement is: 4 There is no maximum 6 2
There is no maximum
An SQL data type used for strings is: Currency String Text VarChar
VarChar
The relational model concept equivalent to a many-to-many relationship is: a foreign key an object set a specialization a bridge table
a bridge table
A column whose value is always unique in a table is called: a key a finder an individual a locator
a key
The relational model concept equivalent to an object entity is: a key an object set an attribute a relation
a relation
The From clause can contain a second name for a table. This name is called: an alias an alternate aka also known as
an alias
The relational model concept equivalent to an attribute is: a foreign key a many-many relationship a specialization an attribute
an attribute
The difference between Char and VarChar is: in VarChar short strings are right-padded with blanks Char is for short strings, VarChar is for long strings Char is for long strings, VarChar is for short strings in Char string lengths are fixed
in Char string lengths are fixed
When data is read from the database but retrieves data that is not the most current, it is called _______________. inconsistent read problem read error bad read problem incorrect read problem
inconsistent read problem
A backup of only portions of the database is called a ________________ backup. incomplete partial incremental differential
incremental
The process of linking records in different tables is called: concatenating connecting joining linking
joining
When concurrent updates to the database cause data to be lost it is called __________. lost update problem lost transaction problem lost data problem lost activity problem
lost update problem
Conditions connected by AND will be true: when one condition is false when either condition is true when neither condition is true only when both conditions are true
only when both conditions are true
The authorization process is simply a process of validating a person's ________. login ID and password permissions password login ID
permissions
Which of the following is NOT a valid operation when defining a foreign key the default action when the referenced tuple is deleted? remove set null restrict cascade
remove
How do you capture a recursive relationship in a relation schema? The primary key is also identified as a foreign key A copy (renamed) of the primary key becomes a foreign key A separate intersection table is defined with the primary key and a copy (renamed) as a foreign key A separate foreign key is defined
A copy (renamed) of the primary key becomes a foreign key
How is a many-to-many relationship implemented in the database schema? A new table is created with foreign keys of both classes All of the other choices are correct and will work. The key of each class becomes a foreign key in the opposite class A key from one class becomes a foreign key in the other class. Either direction is okay.
A new table is created with foreign keys of both classes