CNU 440 Final Exam Johnson

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

E. F. Codd developed the relational model in the:

1970s

Requiring a CustomerID to exist in a Primary table before it can exist in a foreign table is an example of:

Referential Integrity.

________ is used to undo unwanted database changes.

Rollback

In SQL, how do you select all columns from a table named Pokemon?

SELECT * FROM POKEMON

In SQL, how do you select all records from a table called Person where the FirstName column value is 'Mike' and the LastName value is 'Johnson'?

SELECT * FROM Person WHERE FirstName='Mike' AND LastName='Johnson';

In SQL, how do you select all values for the column Name from the table Person?

SELECT NAME FROM PERSON

Hive creates MapReduce jobs and executes them on a Hadoop Cluster. (T or F)

T

An audit trail of database changes is kept by a:

journalizing facility.

Select every true statement about composite foreign keys.

A composite foreign key cannot be created using a column constraint in SQL A composite foreign key is necessary to reference a table with a composite primary key A composite foreign key must be created using a table constraint in SQL

Select every relational database property provided by Entity Integrity: A foreign key must not be null A primary key must have a unique value within a table A primary key must not be null A primary key and foreign key value must match

A primary key must not be null A primary key must have a unique value within a table

What does the following SQL command do? insert into Customer_T values (001,'John Smith','231 West St','Boston','MA','02115');

Adds a new record to the Customer_T

What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2));

Alters the Customer_T table, and adds a field called "Type"

Hive is a(n) ________ data warehouse software.

Apache

Which of the following counts ONLY rows that contain a value?

COUNT

________ is a set of commands used to control a database, including security.

DCL

In SQL, how do you delete all rows from a table called "Student"?

DELETE FROM STUDENT

INSERT INTO is an example of ________ code.

DML

Select every requirement of First Normal Form. *There must be no partial dependencies *Data must be in a table with named columns *Primary key must be comprised of only one column *There must be no transitive dependencies *Each row must have no more than one value for each column *The table must have a foreign key

Data must be in a table with named columns Each row must have no more than one value for each column

What does the following SQL statement do? Delete from Customer_T where state = 'HI';

Deletes all records from customer_t where the state is equal to HI

The main concept of relational databases was published in 1970 by:

E.F.Codd.

MapReduce is an algorithm for massive parallel processing utilized by Hadoop.

True

YARN, also called MapReduce 2.0, is like a traffic cop that controls the allocation of resources in a system.

True

How can you change all values of 'Mike' to 'Michael' in the FirstName column in the Person table?

UPDATE Person SET FirstName='Michael' WHERE FirstName='Mike';

In an SQL statement, which of the following parts states the conditions for row selection?

WHERE

An XML-based grammar used to describe a Web service is called:

Web Service Description Language (WSDL).

An XML transformation language that allows applications to query both XML data and relational databases is called:

XQuery

A transaction that terminates abnormally is called a(n) ________ transaction.

aborted

The SQL command ________ adds one or more new columns to a table.

alter table

Controls designed to restrict access and activities are called:

authorization rules.

A(n) ________ constraint is a type of constraint that addresses whether an instance of a supertype must also be an instance of at least one subtype.

completeness

An attribute that can be broken down into smaller parts is called a(n) ________ attribute.

composite

A primary key that consists of more than one attribute is called a:

composite key.

A rule that CANNOT be violated by database users is called a:

constraint

In the SQL language, the ________ statement is used to make table definitions.

create table

The SQL command ________ defines a logical table from one or more tables or views.

create view

A repository of information about a database that documents data elements of a database is called a:

data dictionary.

Allowing users to dive deeper into the view of data with online analytical processing (OLAP) is an important part of:

descriptive analytics.

The ________ rule specifies that an entity can be a member of only one subtype at a time.

disjoint

A ________ addresses whether an instance of a supertype may simultaneously be a member of two or more subtypes.

disjointedness constraint

To eliminate duplicate rows in a query, the ________ qualifier is used in the SQL Select command.

distinct

Any create command may be reversed by using a ________ command.

drop

Any create command may be reversed by using a(n) ________ command.

drop

A person, place, an object , an event or concept about which the organization wishes to maintain data is called a(n):

entity

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

exclusive lock

NoSQL focuses on:

flexibility

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a:

foreign key.

It is true that in an HDFS cluster the DataNodes are the:

large number of slaves.

The extent of the database resource that is included with each lock is called the level of:

lock granularity.

An organization using HDFS realizes that hardware failure is a(n):

norm

An application programming interface that enables an application program to process RDBMS databases meets the:

open database connectivity standard.

One application programming interface (API) that enables an application program to access RDBMS databases is the:

open database connectivity standard.

The ________ rule states that an entity instance can simultaneously be a member of two (or more) subtypes.

overlap

A dependency between a nonkey attribute and part of the primary key is called a:

partial dependency

A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a ________ dependency.

partial functional

The ________ rule specifies that an entity instance of a supertype is allowed not to belong to any subtype.

partial specialization

Application of statistical and computational methods to predict data events is:

predictive analytics.

Descriptive, predictive, and ________ are the three main types of analytics.

prescriptive

An attribute (or attributes) that uniquely identifies each row in a relation is called a:

primary key.

A rule that states that each foreign key value must match a primary key value in the other relation is called the:

referential integrity constraint.

A two-dimensional table of data sometimes is called a:

relation

An attribute that must have a value for every entity (or relationship) instance is a(n):

required attribute.

NoSQL systems enable automated ________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it.

sharding

It is true that in an HDFS cluster the NameNode is the:

single master server.

An attribute of the supertype that determines the target subtype(s) is called the:

subtype discriminator.

A candidate key must satisfy all of the following conditions EXCEPT:

the key must indicate the row's position in the table.

The ________ rule specifies that each entity instance of the supertype must be a member of some subtype in the relationship.

total specialization

A discrete unit of work that must be processed completely or not at all in a computer system is called a(n):

transaction

A discrete unit of work that must be processed completely or not at all within a computer system is called a:

transaction

A dependency between two nonkey attributes is called a:

transitive dependency

A functional dependency between two or more nonkey attributes is called a:

transitive dependency.

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

two-phase lock

A relationship between the instances of a single entity type is called a(n) ________ relationship.

unary

Although volume, variety, and velocity are considered the initial three v dimensions, two additional Vs of big data were added and include:

veracity and value.

An optimistic approach to concurrency control is called:

versioning

Apache Cassandra is a leading producer of ________ NoSQL database management systems.

wide-column

The NoSQL model that incorporates 'column families' is called a:

wide-column store.

According to your text, NoSQL stands for:

Not Only Structured Query Language.

Which SQL Keyword(s) are used to sort the result set of a query?

ORDER BY

Which of the following is an advantage of stored procedures?

Performance improves for compiled SQL statements.

________ is an important scripting language to help reduce the complexity of MapReduce.

Pig

Referential Integrity Constraints are generally established between:

Primary and Foreign keys.

A multivalued attribute may take on more than one value for a particular entity instance. (True or False)

True

Big data databases tend to sacrifice consistency for availability. (T or F)

True

Data in HDFS files cannot be updated. (T or F)

True

Select every requirement of Third Normal Form. *Primary key must be comprised of only one column *Each row must have no more than one value for each column *The table must have a foreign key *Data must be in a table with named columns *There must be no partial dependencies There must be no transitive dependencies

Each row must have no more than one value for each column Data must be in a table with named columns There must be no partial dependencies There must be no transitive dependencies

Hadoop is considered a relational database management system. (T or F)

F

In SQL, how would you insert a new record into the Department table, assuming it has a single column called Name?

INSERT INTO Department (Name) VALUES ('PCSE')

Select all relational database properties provided by Referential Integrity: If a foreign key has a non-null value, it must match a primary key value in the referenced table A foreign key may only be comprised of one column A foreign key must not be null A foreign key must have unique values within a table

If a foreign key has a non-null value, it must match a primary key value in the referenced table

A student can attend five classes, each with a different professor. Each professor has 30 students. The relationship of students to professors is a ________ relationship.

Many to Many

An organization that requires a graph database that is highly scalable would select the ________ database management system.

Neo4j

A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?

Second

JSON is commonly used in conjunction with the 'document store' NoSQL database model. (T or F)

T

Select every requirement of Second Normal Form.

There must be no partial dependencies Data must be in a table with named columns Each row must have no more than one value for each column

A trigger can be used as a security measure in which of the following ways?

To cause special handling procedures to be executed

A trigger can be used as a security measure in which of the following ways?

To prohibit inappropriate actions, To cause special handling procedures to be executed, To cause a row to be written to a log file


Set pelajaran terkait

Muscles of the Lips and Facial Expression

View Set

Comparing and Contrasting Two Versions of The War of the Worlds Quiz 100%!!!!

View Set

University Physics II Midterm 2017 Multiple Choice

View Set

Econ 320 - Ch 3: National Income

View Set

Chapter 2: Organizational Behavior

View Set