Database Concepts Ch. 1 - Ch. 9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When both criteria must be true for the compound criterion to be true, the _______________ operator is being used.

AND

_________________________ describes the large volume of data produced by every digital process, system, sensor, mobile device, and even social media exchange.

Big data

In SQL, you can use the _______________ clause to enforce legal-values integrity.

CHECK

Access has a tool called the ____________________, which allows you to easily print detailed documentation concerning any table, query, report, form, or other object in the database.

Documenter

. In SQL, you use the VERIFY clause to enforce legal-values integrity.

False

. Stored procedures do not accept parameters, and must be queried in a manner similar to tables.

False

A WHERE and a HAVING clause cannot be included in the same query.

False

A client is an example of an attribute.

False

A column whose value uniquely identifies a given row in the table is the secondary key.

False

A spreadsheet is a screen object used to maintain and view data from a database.

False

A trigger is stored and compiled on the client computer.

False

A valid name for a table might be tbl$Student.

False

An attribute is known as a row in most databases.

False

Computed fields are existing fields in the database that you can perform computations with.

False

Each table in a database represents two or more entities.

False

Fields will appear in alphabetical order in the query results of a SELECT clause.

False

In a SELECT statement, the WHERE clause is mandatory.

False

In a relation, the order of rows is important.

False

In an AND criterion, the overall criterion is true if either of the individual criteria is true.

False

Increased complexity is one advantage of database processing.

False

Instead of listing all the field names in the SELECT clause, you can use the @ symbol.

False

Microsoft Access uses the != version of the "not equal to" operator.

False

One disadvantage of using views is that they are data dependent so that if the database structure changes in any way, the view can no longer be used.

False

Programs created with Visual Basic, Java, Perl, PHP, or C++ can interact with the database directly.

False

SQL uses an on-screen form to create tables, update tables, and retrieve data from tables.

False

The BETWEEN operator is exclusive; it includes all numbers between the lower and higher numbers, but excludes the lower and higher numbers themselves.

False

The command DEL INDEX CustList; would remove the index named CustList.

False

The concept of grouping means that statistics will be calculated for individual records.

False

The field on which records are sorted is called the composite primary key.

False

The primary key of a table is the row or rows that uniquely identify a given column in that table.

False

The relational operators are +, *, %, and /.

False

The two tables involved in a join operation must have the same structure.

False

There is a greater impact of failure in a nondatabase, file-oriented system.

False

There is no difference between the COUNT function and the SUM function.

False

To select data from more than one table at the same time, you need to perform a make-table query.

False

When you connect simple conditions using the AND operator, only one of the simple conditions must be true for the compound condition to be true.

False

When you create a query that involves a view, the DBMS immediately executes the query you created.

False

You can change the structure of a table using the CREATE VIEW command.

False

You can use the SQL CREATE TABLE command to insert rows into a table.

False

You use the WHERE clause on groups and the HAVING clause on rows.

False

Views cannot be used to examine table data.

Flase

You use the __________ statement to give users privileges to the database.

GRANT

Within relational model systems on both mainframes and personal computers, the main mechanism for increasing the efficiency with which data is retrieved from the database is the ____________________.

Index

Transmission Control Protocol/____________________ Protocol is the standard protocol for all communication on the Internet.

Internet

You can take away user privileges to the database using the ____________ statement.

REVOKE

In a system catalog, the ____________________ table contains information about the tables known to SQL.

Systables

. Indexes can increase the efficiency with which data is retrieved from the database.

True

A compound condition includes either or both of the AND and OR operators.

True

A database will not only hold information about multiple types of entities, but also information about the relationships among these multiple entities.

True

A query is a question represented in a way that the DBMS can recognize and process.

True

A relational database is a collection of tables.

True

An entity is a person, place, object, event, or idea for which you want to store and process data.

True

CHAR data types can be used to store numbers that will not be used in calculations.

True

In Access, a parameter query allows you to enter criterion when you run the query.

True

In relational database shorthand, the structure of a relational database is written with the name of the table followed by the columns in the table listed within parentheses.

True

In the Access Query window, the upper portion of the window contains the design grid.

True

Information about tables in the database is kept in the system catalog.

True

One advantage of a view is that different users can view the same data in different ways.

True

Preceding a condition by the NOT operator reverses the result of the original condition.

True

Redundancy makes changing data more cumbersome and time-consuming.

True

Redundancy wastes space because you are storing multiple copies of the same data.

True

Referential integrity is specified using the FOREIGN KEY clause in the CREATE TABLE command.

True

The attributes of an entity become the fields or columns in a table.

True

The following command will enable Jones to retrieve data from the Customer table, but not to take any other action: GRANT SELECT ON Customer To Jones

True

To correct anomalies in a database, tables must be converted into various types of normal forms. a. True b. False

True

To create a view in Access, you create and then save a query.

True

When rows are grouped, one line of output is produced for each group.

True

When you create an index whose key has a single field, you have created what is called a single-column index.

True

You can combine values in character fields using the & operator.

True

You can use the GROUP BY clause and the ORDER BY clause in the same SELECT statement.

True

users never interact with a database directly; database interaction is always through the DBMS.

True

What is a nonkey column? a. A column that is not part of the primary key. b. A column that has a null value. c. A column that is part of a repeating group. d. A column that contains a numeric value.

a. A column that is not part of the primary key.

If B is functionally dependent on A, what can you also say? a. A functionally determines B b. A functionally determines another attribute in the table c. B functionally determines A d. B does not determine any other attribute

a. A functionally determines B

Which of the following DBMS evaluation categories does the following question relate to: What is the unit that may be locked and are exclusive locks the only ones permitted? a. Concurrent update b. Data recovery c. Data dictionary d. Security

a. Concurrent update

Which rule for distributed databases states that the performance of functions such as adding sites, changing versions of DBMSs, creating backups, and modifying hardware should not require planned shutdowns of the entire distributed database? a. Continuous operation b. Local autonomy c. Location transparency d. Fragmentation transparency

a. Continuous operation

Which of the following is a characteristic of a table that is in first normal form? a. It doesn't contain repeating groups. b. It has at least two foreign keys. c. It doesn't have a primary key d. There are no alternate keys.

a. It doesn't contain repeating groups.

When users interact with an RDBMS, they use transactions. What are these types of systems called? a. OLTP b. ODBMS c. OLAP d. ODBC

a. OLTP

Which of the following contains a repeating group where the primary key is OrderNum? a. Orders (OrderNum, OrderDate, (ItemNum, NumOrdered) ) b. Orders (OrderNum, OrderDate, ItemNum, NumOrdered ) c. Orders (OrderNum, OrderDate) d. Orders (OrderNum, ItemNum, NumOrdered )

a. Orders (OrderNum, OrderDate, (ItemNum, NumOrdered) )

Suppose you have the following two tables where EmployeeNum is the primary key in both tables. What can you say about the EmployeeBuilding table?Employee (EmployeeNum, LastName, FirstName)EmployeeBuilding (EmployeeNum, BuildingName)FK EmployeeNum -> Employee a. The EmployeeBuilding table is a subtype of the Employee table. b. The EmployeeBuilding table is a supertype of the Employee table. c. The Employee table is a subtype of the EmployeeBuilding table. d. BuildingName is a subtype discriminator.

a. The EmployeeBuilding table is a subtype of the Employee table.

What does it mean when an entity has a minimum cardinality of one? a. The entity is required in the relationship. b. The entity is not required in the relationship. c. The entity should not be in the relationship as an attribute. d. The entity must be listed with all ones in the data fields.

a. The entity is required in the relationship.

After the information-level design is completed, what is the next step? a. The physical-level design b. The top-down design c. The bottom-up design d. The logical-level design

a. The physical-level design

What is an entity that can serve as the relationship between other entities called? a. composite entity b. complex entity c. complicated entity d. circular entity

a. composite entity

Which DBA role manages or supervises the construction of large and comprehensive databases? a. data architect b. database programmer c. data administrator d. data operations manager

a. data architect

Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field? a. data type b. legal value c. format d. secondary

a. data type

Which of the following contains a multipart primary key, each part of which is a foreign key to the surrounding dimension tables? a. fact table b. primary table c. dimension table d. star table

a. fact table

The crucial issue in making the determination between a single many-to-many-to-many relationship and two (or three) many-to-many relationships is the ____. a. independence b. primary key c. redundancy d. primary index

a. independence

Which of the following is an advantage of distributed databases? a. local control of data b. easier updates of replicated data c. more complex query processing d. more complex treatment of concurrent updates

a. local control of data

What is the term used in an E-R diagram that specifies the maximum number of entities that can participate in a relationship? a. maximum cardinality b. maximum entropy c. highest ratio d. highest entropy

a. maximum cardinality

Second normal form can be defined as a table that is in first normal form but that contains no ____. a. partial dependencies b. alternate keys c. nonkey columns d. interrelation constraints

a. partial dependencies

After the database designers complete the information-level design, what design level does the DBA do next? a. physical b. information c. logical d. graphical

a. physical

Which process returns the database to a state that is known to be correct? a. recovery b. concurrent update c. encryption d. batch processing

a. recovery

Which type of key is usually an automatic numbering data type, such as the Access AutoNumber data type? a. surrogate b. artificial c. natural d. logical

a. surrogate

The formula for message transmission time is: communication time = access delay + (data volume / X). What does X represent in the formula? a. transmission rate b. length of transmission c. lag time d. seek time

a. transmission rate

Which of the following is a set of requirements that is necessary to support the operations of a particular database user? a. user view b. user table c. user attribute d. user field

a. user view

When used after the word SELECT, which symbol indicates that you want to include all fields in the query results in the order in which you described them to the DBMS when you created the table? a. * b. & c. # d. $

a. *

The compound criteria (conditions) are created by using which of the following two keywords? a. AND, OR b. AND, NOR c. OR, NOT d. NOT, ONLY

a. AND, OR

Which function calculates the number of entries in a table? a. COUNT b. SUM c. MAX d. MIN

a. COUNT

What command do you use to add new data to a table? a. INSERT b. APPEND c. ADDTO d. SELECT

a. INSERT

Which of the following statements is correct? a. In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having its own collection of files. b. User data cannot be combined and shared among authorized users. c. Database users should not have access to the same information. d. Controlling redundancy is easier with the nondatabase approach.

a. In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having its own collection of files.

Which operator do you use in the WHERE clause when you want to include a wildcard? a. LIKE b. AS c. BETWEEN d. UNION

a. LIKE

To create the primary key clause for the Customer table on the CustomerNum field, which statement should you use? a. PRIMARY KEY (CustomerNum) b. PRIMARY KEY (Customer, CustomerNum) c. KEY (CustomerNum) d. PRIMARY (CustomerNum)

a. PRIMARY KEY (CustomerNum)

Based on the code shown, which query lists the number, name, and balance of all customers with balances greater than or equal to $2,000 and less than or equal to $5,000? Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum ) a. SELECT CustomerNum, CustomerName, Balance FROM Customer WHERE Balance BETWEEN 2000 AND 5000 ; b. SELECT CustomerNum, CustomerName, Balance FROM Customer WHERE Balance > 2000 ; c. SELECT CustomerName, Balance FROM Customer WHERE Balance BETWEEN 2000 AND 5000 ; d. SELECT CustomerNum, CustomerName FROM Customer WHERE Balance BETWEEN 2000 AND 5000 ;

a. SELECT CustomerNum, CustomerName, Balance FROM Customer WHERE Balance BETWEEN 2000 AND 5000 ;

Which of the following is true if two tables have the same number of columns and their corresponding columns represent the same type of data? a. They are union compatible. b. They are intersection compatible. c. They are difference compatible. d. They are product compatible.

a. They are union compatible.

Which command creates a table containing all rows that are in either or both of two tables? a. UNION b. SUBTRACT c. JOIN d. INTERSECT

a. UNION

What SQL feature can you use if you want to create a view that combines data from more than one table? a. a join b. a trigger c. an index d. a catalog

a. a join

Which of the following is considered a disadvantage of a database system? a. a larger file size b. data dependence c. reduced integrity d. reduced productivity

a. a larger file size

Which of the following is called a field or column in many database systems? a. attribute b. entity c. data file d. relationship

a. attribute

Which aspect of an entity becomes the columns in the database table? a. attributes b. relationships c. data files d. E-R diagrams

a. attributes

How does the use of a database facilitate data consistency? a. by controlling redundancy b. by reducing security c. by eliminating integrity constraints d. by providing data independence

a. by controlling redundancy

Which advantage of database processing makes it easier to make a change in the database structure? a. data independence b. integrity constraints c. redundancy control d. security controls

a. data independence

What feature is available in Access 2016 that offers the functionality of a trigger? a. data macro b. system catalog c. index d. view

a. data macro

What should an administrator use to more easily assign database access permissions to multiple users? a. groups b. classes c. attributes d. clusters

a. groups

Which of the following is the column or collection of columns that uniquely identifies a given row in that table? a. primary key b. secondary key c. foreign key d. minor key

a. primary key

If you are sorting records by more than one field, which field is the more important field? a. primary sort key b. secondary sort key c. maximum sort key d. minor sort key

a. primary sort key

Which term is another word for a row in a table? a. tuple b. field c. group d. relation

a. tuple

What do you call a data inconsistency that results from data redundancy or the use of inappropriate nulls? a. update anomaly b. insertion anomaly c. deletion anomaly d. relational anomaly

a. update anomaly

A(n) ________________ key is a candidate key not chosen ad the primary key.

alternate

On a class diagram, the lines joining the classes represent the relationships and are called ____________________.

associations

Which of the following contains information about table relationships, views, indexes, users, privileges, and replicated data? a. Biometrics b. Catalogs c. Workgroups d. Journals

b. Catalogs

Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two tables?Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum)Employee (EmployeeNum, LastName, FirstName, Street, City, State, PostalCode) a. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, (Street, City, PostalCode) ) b. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode) c. Employee (EmployeeNum, LastName, FirstName, Street, City, State, PostalCode, WageRate, SocSecNum) d. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, EmployeeNum, LastName, FirstName, Street, City, State, PostalCode )

b. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

What type of locks forbid any other user from accessing the data in any way? a. Shared b. Exclusive c. Limited d. Concurrent

b. Exclusive

Which of the following is a federal law that sets a national standard to protect an individual's medical records and other personal health information? a. FCRA b. HIPAA c. FERPA d. IDEA

b. HIPAA

What is the data communication method used by Web clients and Web servers to exchange data on the Internet? a. UML b. HTTP c. URL d. IIS

b. HTTP

Which rule for distributed databases states that no site should depend on another site to perform its database functions? a. Distributed transaction management b. Local autonomy c. Operating system independence d. Network independence

b. Local autonomy

Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS support encryption, password support, and authorization rules? a. Concurrent update b. Security c. Integrity d. Limitations

b. Security

What does it mean when an entity has a minimum cardinality of zero? a. The entity has a mandatory role in the relationship. b. The entity is not required in the relationship. c. The entity should not be in the relationship as an attribute. d. The entity must be listed with all zeros in the data fields.

b. The entity is not required in the relationship.

In Microsoft Access, what do you need to decrypt an encrypted database? a. 128-bit decryption software b. a password c. an administrator account d. backup software

b. a password

If there is more than one possible choice for the primary key, and one of the possibilities is chosen to be the primary key. What are the others called? a. canceled keys b. alternate keys c. nonkey attributes d. contributory keys

b. alternate keys

What technique is used to identify the person who is attempting to access the DBMS? a. encryption b. authentication c. authorization d. viewing

b. authentication

In which procedure does the DBMS read the log for the problem transactions and apply the before images to undo their updates? a. concurrent update b. backward recovery c. authentication d. batch processing

b. backward recovery

When a DBMS cannot enforce data and access restrictions, how should they be enforced? a. by users when they are entering data using the DBMS b. by peripheral programs written to access the database c. by the operating system used to run the DBMS d. by technicians who monitor database usage

b. by peripheral programs written to access the database

What is each key that meets the criteria for a primary key called? a. alternate key b. candidate key c. functional key d. normal key

b. candidate key

Which of the following is a column or collection of columns on which all columns in the table are functionally dependent? a. index key b. candidate key c. major key d. special key

b. candidate key

In IDEF1X terminology, what is a subtype called? a. catalog b. category c. entity d. discriminator

b. category

What does a DBMS do to break a deadlock? a. rolls back all transactions involved in the deadlock b. chooses one deadlocked user to be the victim c. closes the database and restores from the last backup d. erases the records involved in the deadlock and reschedules the transactions

b. chooses one deadlocked user to be the victim

As you design the user view, which aspect of the table are the properties of the entities you choose? a. rows b. columns c. data d. DBMS

b. columns

Which process converts a table that is in third normal form to a table no longer in third normal form? a. conversion b. denormalizing c. normalization d. replication

b. denormalizing

If the client, in a client/server system, performs the business functions (calculations, etc.), what is this type of client known as? a. external client b. fat client c. virtual client d. thin client

b. fat client

Which type of DDBMS has at least two sites at which the local DBMS are different? a. homogeneous DDBMS b. heterogeneous DDBMS c. holistic DDBMS d. DDBMS

b. heterogeneous DDBMS

If an entity represented in a supertype table is not represented in the subtype table, what is this called in IDEF1X terminology? a. foreign key b. incomplete category c. subtype anomaly d. supertype discriminator

b. incomplete category

What type of key is also called a logical key? a. surrogate b. intelligent c. secondary d. synthetic

b. intelligent

Which of the following is true about distributed databases? a. it is preferable to send a large number of short messages rather than a small number of lengthy messages b. it is preferable to send a small number of lengthy messages rather than a large number of short messages c. it is preferable to send a large number of lengthy messages rather than a small number of short messages d. it is preferable to send a large number of short messages rather than a small number of short messages

b. it is preferable to send a small number of lengthy messages rather than a large number of short messages

In order to accomplish serial processing of updates, what technique do many DBMSs use? a. backups b. locking c. encryption d. biometrics

b. locking

On an E-R diagram, what does the number closest to the relationship represent? a. maximum entropy b. minimum cardinality c. midvalue ratio d. highest entropy

b. minimum cardinality

In which type of system are the data and actions encapsulated? a. relational b. object-oriented c. network d. parallel

b. object-oriented

If each employee works in a single department and each department has several employees, what is the relationship between departments and employees? a. one-to-one b. one-to-many c. many-to-one d. many-to-many

b. one-to-many

Which of the following is a log of all database maintenance, with dates, license keys, issues or updates, involved personnel, and resolutions? a. system journal b. run-book c. system catalog d. DBMS log

b. run-book

What type of environment do database programmers use to develop new programs and modify existing programs? a. live b. sandbox c. production d. virtual

b. sandbox

When implementing the physical-level design, for secondary keys, you must ensure that it is possible to retrieve data rapidly based on a value of which key? a. primary b. secondary c. alternate d. foreign

b. secondary

What type of primary key is system-generated and is usually hidden from users? a. weak entity b. surrogate key c. natural key d. artificial key

b. surrogate key

If you convert a collection of tables to an equivalent third normal form collection of tables, what problems do you remove? a. those arising from multivalued dependencies b. those arising from functional dependencies c. those arising from inappropriate null values d. those arising from incomplete deletions

b. those arising from functional dependencies

With respect to the definition of data warehouse, which of the following means that data in a data warehouse represents periodic snapshots of the data, such as at the end of each month? a. nonvolatile b. time-variant c. subject-oriented d. integrated

b. time-variant

Where does a user send a message to execute steps in a method? a. to the method b. to the object c. to a class d. to a subclass

b. to the object

Which arrangement of client/server architecture uses thin clients to perform only presentation functions while a single server performs database and business functions? a. single-tier architecture b. two-tier architecture c. three-tier architecture d. multi-tier architecture

b. two-tier architecture

What is a table that contains a repeating group called? a. normalized relation b. unnormalized relation c. nominal relation d. non-nominal relation

b. unnormalized relation

It is possible for local DBMSs to commit updates at some sites and undo updates at other sites. How can this inconsistency be prevented? a. using a two-step rollback b. using a two-phase commit c. using a two-phase rollback d. using a two-phase transaction

b. using a two-phase commit

To insert a new field in a table, which keyword should be used with the ALTER TABLE command? a. INSERT b. ADD c. INCLUDE d. ALTER

b. ADD

Which SQL command should you use to delete the Storehouse field from the Item table? a. ALTER TABLE Item DELETE Storehouse ; b. ALTER TABLE Item DROP COLUMN Storehouse ; c. ALTER Item DELETE Storehouse ; d. ALTER TABLE DELETE Storehouse ;

b. ALTER TABLE Item DROP COLUMN Storehouse ;

Which statement removes the table Category from a DBMS? a. DELETE TABLE Category ; b. DROP TABLE Category ; c. REMOVE TABLE Category ; d. RID TABLE Category ;

b. DROP TABLE Category ;

Which of the following are screen objects used to maintain, view, and print data from a database? a. Fields b. Forms c. Data files d. Entities

b. Forms

Based on the table below, which command creates a new table named CustState containing the fields CustomerNum and State? Customer (CustomerNum, CustomerName, Street, City, State, PostalCode) a. JOIN Customer WITH (CustomerNum, State) GIVING CustState b. PROJECT Customer OVER (CustomerNum, State) GIVING CustState c. SELECT Customer OVER (CustomerNum, State) GIVING CustState d. MAKE-TABLE CustState FROM Customer WITH (CustomerNum, State)

b. PROJECT Customer OVER (CustomerNum, State) GIVING CustState

Which query will return the number of rows where the State field is 'AZ' from the table Customers? a. SELECT FROM Customers WHERE State='AZ' COUNT(*); b. SELECT COUNT(*) FROM Customers WHERE State='AZ'; c. SELECT FROM Customers COUNT(*) WHERE State='AZ'; d. SELECT COUNT(*) WHERE State='AZ' FROM Customers;

b. SELECT COUNT(*) FROM Customers WHERE State='AZ';

Based on the table below, which command lists all information from the table concerning the customer with CustomerNum 260? Customer (CustomerNum, CustomerName, Street, City, State, PostalCode) a. SELECT Customer 260 RESULTS Answer b. SELECT Customer WHERE CustomerNum=260 GIVING Answer c. SELECT Customer GIVING Answer WHERE CustomerNum='260' d. SELECT Customer WHERE CustomerNum='260' RESULTS Answer

b. SELECT Customer WHERE CustomerNum=260 GIVING Answer

Based on the code shown, which query lists the number, name, credit limit, and balance for all customers with credit limits that exceed their balances? Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum ) a. SELECT CustomerNum, CustomerName FROM Customer WHERE CreditLimit>Balance ; b. SELECT CustomerNum, CustomerName, CreditLimit, Balance FROM Customer WHERE CreditLimit>Balance ; c. SELECT CustomerNum, CustomerName, Balance FROM Customer WHERE CreditLimit>Balance ; d. SELECT CustomerNum, CustomerName, CreditLimit, Balance FROM Customer ;

b. SELECT CustomerNum, CustomerName, CreditLimit, Balance FROM Customer WHERE CreditLimit>Balance ;

Based on the code shown, which query lists the number, name, and complete address of every customer located on a street that contains the letters "Oxford"? Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum ) a. SELECT CustomerNum, CustomerName, Street, City, State, PostalCode FROM Customer WHERE Street LIKE "?Oxford" ; b. SELECT CustomerNum, CustomerName, Street, City, State, PostalCode FROM Customer WHERE Street LIKE "%Oxford%" ; c. SELECT CustomerNum, CustomerName, Street, City, State, PostalCode FROM Customer WHERE Street LIKE "@Oxford@" ; d. SELECT CustomerNum, CustomerName, Street, City, State, PostalCode FROM Customer WHERE Street LIKE "Oxford" ;

b. SELECT CustomerNum, CustomerName, Street, City, State, PostalCode FROM Customer WHERE Street LIKE "%Oxford%" ;

Which database property lets you change the structure of the database without requiring you to change the programs that access the database? a. database design b. data independence c. integrity constraint d. data dependence

b. data independence

Which operation is performed by the SUBTRACT command in relational algebra? a. union b. difference c. product d. intersection

b. difference

When you use a name containing a space in Access SQL, what must you do to specify the table or column name? a. enclose it in quotation marks b. enclose it in square brackets c. enclose it in asterisks d. enclose it in question marks

b. enclose it in square brackets

The normalization process is a series of steps that will automatically restructure your database to resolve design flaws. a. True b. False

b. false

Which type of rule ensures that changes made to the database do not result in a loss of data consistency? a. redundancy constraint b. integrity constraint c. conflict requirement d. security requirement

b. integrity constraint

In SQL, what type of integrity are you enforcing by using the CHECK clause? a. referential b. legal-values c. entity d. structural

b. legal-values

What type of query creates a new table using the query results? a. new-table b. make-table c. create-table d. merge-table

b. make-table

In versions of SQL other than Access, which character is used as a wildcard to represent any collection of characters? a. asterisks (*) b. percent sign (%) c. underscore (_) d. hash tag (#)

b. percent sign (%)

Which term can be described as the duplication of data and storing it in multiple locations? a. data independence b. redundancy c. data integrity d. security

b. redundancy

Where can you save a query if you anticipate running it often? a. index b. stored procedure c. system catalog d. view

b. stored procedure

Which of the following is an action that occurs automatically in response to an associated database operation such as an INSERT, UPDATE, or DELETE command? a. stored procedure b. trigger c. view d. index

b. trigger

What is the correct order of steps in the information-level design method?1. Normalize the tables.2. Represent the user view as a collection of tables.3. Merge the result into the cumulative design.4. Represent all keys. a. 1, 3, 2, 4 b. 2, 4, 3, 1 c. 2, 1, 4, 3 d. 1, 4, 2, 3

c. 2, 1, 4, 3

What is the difference between a third normal form and fourth normal form table? a. A 4NF table has no alternate keys. b. A 4NF table has no foreign keys. c. A 4NF table has no multivalued dependencies. d. A 4NF table has no primary dependencies.

c. A 4NF table has no multivalued dependencies.

Which rule for distributed databases states that users should feel as if the entire database is stored locally? a. Fragmentation transparency b. Replication transparency c. Location transparency d. Distributed query processing

c. Location transparency

Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export? a. Cost b. Future plans c. Portability d. Performance

c. Portability

What can organizations use in their computer systems that allow the system to continue to process database transactions after a hard drive failure? a. UPS b. backup c. RAID d. surge suppressor

c. RAID

What characteristic of a computer system allows it to continue to function well as utilization of the system increases? a. Reliability b. Adaptability c. Scalability d. Polymorphism

c. Scalability

Which normal form has an additional condition that the only determinants the table contains are candidate keys? a. First b. Second c. Third d. Fourth

c. Third

Which of the following is a metalanguage and is designed for the exchange of data on the web? a. UML b. URL c. XML d. HTTP

c. XML

If performance testing shows that queries based on frequently accessed fields are taking a long time to complete, what can the DBA do that might improve performance? a. increase the number of columns b. delete foreign keys c. add indexes d. add alternate keys

c. add indexes

What is a column that you create for an entity to serve solely as the primary key and that is visible to users? a. synthetic key b. weak entity c. artificial key d. natural key

c. artificial key

What type of rules specify which users have what type of access to which data in the database? a. encryption b. authentication c. authorization d. privacy

c. authorization

Which of the following is NOT one of the nine functions of a DBMS? a. catalog services b. security services c. automatic table design d. support data replication

c. automatic table design

If users access only certain fields in a table, how can you improve performance? a. by splitting the table into two or more tables and removing the primary key b. by combining the table with another table that performs better c. by splitting the table into two or more tables that each has the same primary key as the original d. by adding indexes to each column and deleting the primary and alternate keys

c. by splitting the table into two or more tables that each has the same primary key as the original

What is an alternate key? a. foreign key b. primary key c. column that could be a primary key but was not chosen d. row that could be a primary key but was not chosen

c. column that could be a primary key but was not chosen

In a two-phase commit, what is the site that initiates the update known as? a. director b. initiator c. coordinator d. leader

c. coordinator

Which DBA role organizes metadata, and acts as a liaison between the database administrator and the rest of the database staff? a. data architect b. database programmer c. data administrator d. data operations manager

c. data administrator

What occurs when two or more users are waiting for the other user to release a lock before their transaction can proceed? a. commit b. timestamp c. deadlock d. transaction

c. deadlock

What type of diagram uses arrows to indicate all the functional dependencies present in a table? a. interrelation diagram b. functional diagram c. dependency diagram d. index diagram

c. dependency diagram

Which of the following contains a single-part primary key that serves as an index for the fact table and also contains other fields associated with the primary key value? a. primary table b. fact table c. dimension table d. star table

c. dimension table

What is it called when a database is divided into segments and the segments are stored on different computers? a. converged database b. centralized database c. distributed database d. virtual database

c. distributed database

What is a relationship that is necessary for identification? a. objectifying relationship b. merging relationship c. identifying relationship d. referential relationship

c. identifying relationship

What is an entity that does not require a relationship to another entity for identification? a. alternative entity b. foreign entity c. independent entity d. single entity

c. independent entity

With respect to the definition of data warehouse, which of the following means that the data is read-only? a. time-variant b. integrated c. nonvolatile d. subject-oriented

c. nonvolatile

What do key integrity constraints consist of? a. smart card limitations b. primary and alternate key constraints c. primary and foreign key constraints d. authorization permissions

c. primary and foreign key constraints

Which of the following can be defined as a column (or collection of columns) A such that all other columns are functionally dependent on A and no subcollection of the columns in A has this property? a. functional key b. composite key c. primary key d. declared key

c. primary key

Which term's definition also defines a candidate key? a. functional key b. repeating group c. primary key d. nonkey column

c. primary key

When users are unaware of the steps taken by the DDBMS to update the various copies of data, what is this characteristic of the DDBMS called? a. location transparency b. fragmentation transparency c. replication transparency d. location site license

c. replication transparency

Which of the following is an authentication method in which information used to identify a user is stored on a plastic card? a. biometrics b. sign-in c. smart card d. password

c. smart card

What is the overall structure of the fact table and dimension tables called? a. class schema b. data model c. star schema d. object model

c. star schema

In a centralized database design, what should you try to minimize to increase data access speed? a. the speed of the disk drive b. the number of network messages c. the number of disk accesses d. the amount of memory used

c. the number of disk accesses

What is the main purpose of data fragmentation? a. to make it easier for users to access remote data b. to place data at the location where the data is least often accessed c. to place data at the location where the data is most often accessed d. to make data access faster, whether it is local or remote

c. to place data at the location where the data is most often accessed

How do you refer to a column named State in a table named Client? a. State.Client b. State(Client) c. Client.State d. Client(State)

c. Client.State

What clause do you use in a query to save the results of the query as a table? a. UPDATE b. INSERT c. INTO d. DELETE

c. INTO

To create the primary key clause for the OrderLine table on the OrderNum and ItemNum fields, which statement should you use? a. PRIMARY KEY (OrderLine, OrderNum, ItemNum) b. KEY (OrderNum, ItemNum) c. PRIMARY KEY (OrderNum, ItemNum) d. PRIMARY (OrderNum, ItemNum)

c. PRIMARY KEY (OrderNum, ItemNum)

Using Access, which command will create a new table named NewClients from an existing table named Clients? a. CREATE NewClients FROM Clients; b. SELECT * FROM Clients CREATE NewClients; c. SELECT * INTO NewClients FROM Clients; d. SELECT * MAKE NewClients FROM Clients;

c. SELECT * INTO NewClients FROM Clients;

Based on the code shown, which query lists the number, name, street, and credit limit of all customers? The records are ordered by customer name within descending credit limit. Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum ) a. SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer SORT BY CreditLimit DESC, CustomerName ; b. SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer SORT BY CreditLimit ASC, CustomerName ; c. SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit DESC, CustomerName ; d. SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit ASC, CustomerName ;

c. SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit DESC, CustomerName ;

Based on the code shown, for each sales rep, which query lists the rep number, the number of customers assigned to the rep, and the average balance of the rep's customers? The records are grouped by rep number and ordered by rep number. Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum ) a. SELECT RepNum, AVG(Balance) FROM Customer GROUP BY RepNum ORDER BY RepNum ; b. SELECT RepNum, COUNT(*), AVG(Balance) FROM Part GROUP BY RepNum ORDER BY RepNum ; c. SELECT RepNum, COUNT(*), AVG(Balance) FROM Customer GROUP BY RepNum ORDER BY RepNum ; d. SELECT RepNum, COUNT(*) FROM Customer GROUP BY RepNum ORDER BY RepNum ;

c. SELECT RepNum, COUNT(*), AVG(Balance) FROM Customer GROUP BY RepNum ORDER BY RepNum ;

What is a potential problem, if any, if you design a database in which the last name of a consultant functionally determines the consultant's address? a. There is no problem with this design. b. There could be two consultants living at the same address. c. There could be more than one consultant with the same last name. d. The address will automatically functionally determine the consultant's last name.

c. There could be more than one consultant with the same last name.

Which of the following is NOT true about a relation in a two-dimensional table? a. The entries in the table are single-valued. b. All values in a column are values of the same attribute. c. Two or more columns can share the same name. d. The order of rows is immaterial.

c. Two or more columns can share the same name.

In database terms, what is the analogy to an ordinary paper file you might keep in a file cabinet or an accounting ledger? a. database b. spreadsheet c. data file d. attribute

c. data file

During which process does a database expert determine the structure of the required database? a. data security b. database integrity c. database design d. database selection

c. database design

How are multiple entities stored in a database? a. each entity is stored as a row b. each entity is stored as an attribute c. each entity is stored as a table d. each entity is stored as a column

c. each entity is stored as a table

Which database term is a person, place, object, event, or idea for which you want to store and process data? a. attribute b. DBMS c. entity d. DBA

c. entity

What tool can you use to visually represent and analyze a database? a. multi-sheet workbook b. DBMS table identifier c. entity-relationship diagram d. DBA column analyzer

c. entity-relationship diagram

Which of the following is descriptive information about the data in a database? a. backup b. hyperdata c. metadata d. rollback

c. metadata

What value can you set a field to that is similar to not entering a value in it at all? a. N/A b. nil c. null d. 0

c. null

How many lines of output are produced when rows are grouped? a. one line for each group member b. two lines for each group c. one line for each group d. no output is produced

c. one line for each group

What uniquely identifies a row in a table? a. attribute b. column c. primary key d. field

c. primary key

Which operator is used to concatenate every row in the first table with every row in the second table? a. union b. difference c. product d. intersection

c. product

Which rule uses a foreign key in Table B to ensure that the field matches a primary key field in Table A? a. legal-values integrity b. structural integrity c. referential integrity d. entity integrity

c. referential integrity

Which factor can mitigate the problems of increased complexity that come with using a DBMS? a. writing complex access rules b. using large file sizes c. sound database design d. using no integrity constraints

c. sound database design

What type of query changes data? a. addition b. update c. update d. select

c. update

____________________ refers to the number of items that must be included in a relationship.

cardinality

The relationships between tables are implemented through common ____________________.

columns

In IDEF1X, _______________ categories are represented by two horizontal lines below the category symbol.

complete

A ______________ primary key is composed of more than one column so that the row is unique.

composite

A(n) ____________________ is essentially both an entity and a relationship and is represented in an E-R diagram by a diamond within a rectangle.

composite entity

In a LAN, support for ____________________ update is very important because many users might be updating the database at the same time.

concurrent

An interrelation ____________________ is a condition that involves two or more relations.

constraint

As soon as you have completed Steps 1 through 3 for a given user view, you can merge the results into the __________________ design.

cumulative

An alternative to the primary key of a table is listed with which abbreviation in DBDL? a. SK b. FK c. PK d. AK

d. AK

Convert the following table to first normal form:Branch (BranchNum, BranchName, (BookCode, Title, OnHand) ) where BranchNum is the primary key a. Branch (BranchNum, BranchName) where BranchNum is the primary keyBook (BookCode, Title) where BookCode is the primary key b. Branch (BranchNum, BranchName) where BranchNum is the primary key c. Book (BookCode, Title) where BookCode is the primary key d. Branch (BranchNum, BranchName, BookCode, Title, OnHand ) where BranchNum and BookCode make the primary key

d. Branch (BranchNum, BranchName, BookCode, Title, OnHand ) where BranchNum and BookCode make the primary key

Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time? a. Concurrent update b. Security c. Integrity d. Limitations

d. Limitations

What strategy can programs employ to minimize the occurrence of deadlocks? a. Only unlock records at the end of the day. b. Unlock records in the reverse order in which they were locked. c. Use a random order record-locking strategy. d. Lock records in the same order.

d. Lock records in the same order.

When users access a data warehouse, their queries usually involve aggregate data. What type of software is used to perform these queries? a. XSLT b. XSL c. OOXML d. OLAP

d. OLAP

When evaluating and selecting a DBMS, in which category is the DBA most concerned with benchmarks? a. Cost b. Security c. Integrity d. Performance

d. Performance

Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas? a. Backup and recovery b. Security c. Integrity d. Replication and distributed databases

d. Replication and distributed databases

In a three-tier system, what type of computer performs the business functions and serves as an interface for clients? a. database server b. fat client c. network server d. application server

d. application server

Which of the following refers to the association of an operation to actual program code? a. attaching b. matching c. linking d. binding

d. binding

Which authentication method identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics? a. smart cards b. data dictionaries c. authorization d. biometrics

d. biometrics

If a many-to-many-to-many relationship is created when it is not appropriate to do so, how can the problem be corrected? a. by converting to 1NF b. by converting to 2NF c. by converting to 3NF d. by converting to 4NF

d. by converting to 4NF

With the table Orders (OrderNum, OrderDate, (ItemNum, NumOrdered) ) where OrderNum is the primary key, how would you convert the table to first normal form? a. by creating a second table with just the columns ItemNum and NumOrdered b. by changing the primary key to OrderDate c. by making ItemNum a foreign key d. by making the primary key a combination of OrderNum and ItemNum

d. by making the primary key a combination of OrderNum and ItemNum

What type of database update occurs when multiple users make updates to the same database at the same time? a. batch b. random c. sequential d. concurrent

d. concurrent

Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the database? a. field independence b. data integrity constraints c. key integrity constraints d. data independence

d. data independence

What is the process of uncovering new knowledge, patterns, trends, and rules from the data stored in a data warehouse known as? a. fragmentation transparency b. replication transparency c. polymorphism d. data mining

d. data mining

Which DBA role makes sure the data gets from one place to another with integrity and security? a. data architect b. database programmer c. data administrator d. data operations manager

d. data operations manager

Which of the following is an example of an enforcing restriction? a. ensuring each row has a primary key b. verifying there are no null values c. verifying there is at least one secondary key in each table d. ensuring values in foreign keys are legitimate

d. ensuring values in foreign keys are legitimate

In DBDL documentation, what element of a table is followed by an arrow pointing to the table identified by the element? a. columns b. alternate keys c. secondary keys d. foreign keys

d. foreign keys

Which of the following is used to improve performance in frequently used columns by maintaining a sort order but does not enforce constraints? a. surrogate key b. unique index c. artificial key d. nonunique index

d. nonunique index

Which group performs additional testing of the database program after the programmers complete their testing? a. customers b. accounting c. users d. quality assurance

d. quality assurance

What is it called when the data is organized by entity rather than by the application that uses the data? a. table-oriented b. row-oriented c. column-oriented d. subject-oriented

d. subject-oriented

What is it called when a 2-step identity verification procedure is used to grant users access to the system? a. smart card authorization b. multilayer security c. security in depth d. two-factor authentication

d. two-factor authentication

What can be described as a snapshot of certain data in a database at a given moment in time? a. encryption b. authentication c. authorization d. view

d. view

When are nulls used? a. when a numeric value is zero b. when a character value is blank c. when a string contains a space d. when a value is inapplicable

d. when a value is inapplicable

When is a 1NF table automatically a 2NF table? a. when two or more columns make up the primary key b. when there are no interrelation constraints c. when there are only nonkey columns d. when the primary key contains only a single column

d. when the primary key contains only a single column

Which of the following statement fragments will only allow a CreditLimit of $5,000, $7,500, or $15,000? a. (CreditLimit IN (5000, 7500, 15000)) b. CHECK ((5000, 7500, 15000)) c. CHECK (CreditLimit LIKE (5000, 7500, 15000)) d. CHECK (CreditLimit IN (5000, 7500, 15000))

d. CHECK (CreditLimit IN (5000, 7500, 15000))

18. To create an index named RepBal with the keys RepNum and Balance and with the balances listed in descending order, which command should you use? a. CREATE INDEX RepBal ON Customer (RepNum, Balance) ; b. CREATE INDEX RepBal Customer (RepNum DESC) ; c. CREATE INDEX ON Customer (RepNum, Balance ASC) ; d. CREATE INDEX RepBal ON Customer (RepNum, Balance DESC) ;

d. CREATE INDEX RepBal ON Customer (RepNum, Balance DESC) ;

Which command will create an application program's or individual user's picture of the database? a. CREATE INDEX b. SELECT INDEX c. SELECT VIEW d. CREATE VIEW

d. CREATE VIEW

What type of software programs are Access, Oracle, DB2, MySQL, and SQL Server? a. E-R diagrams b. DBAs c. data files d. DBMSs

d. DBMSs

Which part of the SQL query specifies the table or tables that contain the data you wish to display in the query results? a. SELECT clause b. WHERE clause c. WITHIN clause d. FROM clause

d. FROM clause

Which command contains all rows that are common in two tables? a. UNION b. SUBTRACT c. JOIN d. INTERSECT

d. INTERSECT

Based on the tables below, which command creates a new table named CustSales that combines the Customer and SalesPerson tables based on SalesPersonNum? Customer (CustomerNum, CustomerName, Street, City, State, PostalCode, SalesPersonNum) SalesPerson (SalesPersonNum, LastName, FirstName) a. PROJECT Customer SalesPerson WHERE Customer.SalesPersonNum=SalesPerson.SalesPersonNum MAKING CustSales b. UNION Customer SalesPerson WHERE Customer.SalesPersonNum=SalesPerson.SalesPersonNum MAKING CustSales c. SELECT Customer SalesPerson JOIN Customer.SalesPersonNum=SalesPerson.SalesPersonNum GIVING CustSales d. JOIN Customer SalesPerson WHERE Customer.SalesPersonNum=SalesPerson.SalesPersonNum GIVING CustSales

d. JOIN Customer SalesPerson WHERE Customer.SalesPersonNum=SalesPerson.SalesPersonNum GIVING CustSales

Which operation will allow you to extract data from more than one table? a. Select b. Merge c. Project d. Join

d. Join

In relational algebra, what command causes only certain columns to be included in the new table? a. SELECT b. DELETE c. PROGRAM d. PROJECT

d. PROJECT

19. Which statement will take away user privileges to the database? a. SELECT b. INDEX c. DEL d. REVOKE

d. REVOKE

Which query will return the number of rows where the State field is 'AZ' from the table Customers and provide a total of the Payment field? a. SELECT COUNT(*) WHERE State='AZ' SUM(Payment) FROM Customers; b. SELECT FROM Customers COUNT(Payment) SUM(*) WHERE State='AZ'; c. SELECT FROM Customers SUM(Payment) WHERE State='AZ' COUNT(*); d. SELECT COUNT(*), SUM(Payment) FROM Customers WHERE State='AZ';

d. SELECT COUNT(*), SUM(Payment) FROM Customers WHERE State='AZ';

Based on the code shown, which query lists the number, name, and available credit for all customers with credit limits that exceed their balances? Customer ( CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum ) a. SELECT CustomerNum, CustomerName AS AvailableCredit FROM Customer WHERE CreditLimit>Balance ; b. SELECT CustomerNum, CustomerName, CreditLimit AS AvailableCredit FROM Customer WHERE CreditLimit>Balance ; c. SELECT CustomerNum, CustomerName, Balance AS AvailableCredit FROM Customer WHERE CreditLimit>Balance ; d. SELECT CustomerNum, CustomerName, CreditLimit-Balance AS AvailableCredit FROM Customer WHERE CreditLimit>Balance ;

d. SELECT CustomerNum, CustomerName, CreditLimit-Balance AS AvailableCredit FROM Customer WHERE CreditLimit>Balance ;

Which of the following is a disadvantage of using an index? a. You can only add an index when the table is created. b. You can't use indexes with foreign keys. c. Record retrieval is less efficient. d. The index must be updated whenever the data in the database changes.

d. The index must be updated whenever the data in the database changes.

What command do you use to make changes to existing data in a table? a. MODIFY b. CHANGE c. SELECT d. UPDATE

d. UPDATE

What type of functions are Count, Sum, Avg, Max, and Min? a. accumulation b. allowed c. primary d. aggregate

d. aggregate

Which of the following is true about big data? a. unstructured big data doesn't contain metadata b. a Twitter tweet is an example of structured big data c. all big data can be handled with traditional DBMS tools d. big data may be structured or unstructured

d. big data may be structured or unstructured

When a new table is added or deleted, or the structure of a table is changed, where does the DBMS record these changes? a. procedure b. views c. indexes d. catalog

d. catalog

20. What database rule states that no field that is part of the primary key may accept null values? a. legal-values integrity b. structural integrity c. referential integrity d. entity integrity

d. entity integrity

Which advantage of using a DBMS frees programmers who write database access programs from having to engage in mundane data manipulation activities, such as adding new data and deleting existing data? a. controlling redundancy b. referential integrity c. data independence d. increased productivity

d. increased productivity

In Access SQL, which character is used as a wildcard to represent any individual character? a. underscore (_) b. hash tag (#) c. asterisks (*) d. question mark (?)

d. question mark (?)

While not always required, how should you end an SQL command? a. with a comma (,) b. with a period (.) c. with a colon (:) d. with a semicolon (;)

d. with a semicolon (;)

Methods are defined during the ___________________ process.

data definition

A program, or collection of programs, through which users interact with a database is known as a(n)_________________________ management system.

database

In Access, a(n) ____________________ enables you to add logic to table events such as adding, changing, or deleting data.

date macro

When you normalize a table by breaking down the relations into progressively finer levels of detail, it is called_____________________.

decomposition

When the existence of one entity depends on the existence of another related entity, there is an existence ____________________.

dependency

On an E-R diagram, ____________________ entities have rounded corners.

dependent

A table that contains a ________________ that is not a candidate key indicates the table is not in third normal form.

determinant

Any column or collection of columns that determines another column is called a(n) ___________________.

determinant

The data ____________________ is the catalog, but it often contains a wider range of information, including information about tables, fields, indexes, programs, and users.

dictionary

The ____________________ recovery plan specifies the ongoing and emergency actions and procedures required to ensure data availability if a disaster occurs.

disaster

A subtype ____________________ is the specific attribute that determines the subtype-supertype relationship.

discriminator

A DDBMS is a DBMS capable of supporting and manipulating ____________________ databases.

distributed

A(n) ____________________ is the set of values that are permitted for an attribute.

domain

____________________ means that you define an object to contain both the data and its associated actions.

encapsulation

In an E-R diagram rectangles represent _________________________.

entities

A rectangle represents each _____________ in an E-R diagram.

entity

In the object-oriented representation of a database, each _______________ is represented as an object rather than a relation.

entity

When the primary key cannot be null, this is known as ____________________.

entity integrity

A characteristic of a DDBMS that states that users do not need to be aware of the location of the data in a database is known as replication transparency.

false

A column is a nonkey column when it is part of the primary key. a. True b. False

false

A commit is a record of what the data in a row looked like before an update.

false

A design that supports all user views is called a constructive design.

false

A homogeneous database is one where there are at least two sites at which the local DBMSs are different.

false

A local deadlock involves one transaction that requires a record held by a second transaction at one site, while the second transaction requires a record held by the first transaction at a different site.

false

A relational database handles entities, attributes, and relationships by storing each entity in its own row.

false

A subclass inherits the structure of a class but not its methods.

false

A surrogate key is a primary key that consists of a column that uniquely identifies an entity.

false

Accessing data using messages over a network is substantially faster than accessing data on a disk.

false

After you have completed the first two steps for a given user view, you can merge the results into the cumulative design.

false

All database users need full access to all tables and fields in the database.

false

An advantage of a distributed database is that the database can handle more complex query processing.

false

Any row that determines another row is called a determinant. a. True b. False

false

Authentication refers to techniques for decrypting data when it accessed by authorized users.

false

Converting to third normal form always avoids the problems related to dependencies. a. True b. False

false

Functional dependencies can always be determined by looking at sample data. a. True b. False

false

If a user is authorized to access database data, the user will always be able to make changes to the data.

false

If a user is granted the use of the SELECT statement on a table, the user is also authorized to use UPDATE statements even if the user was not specifically granted that permission.

false

If column B is functionally dependent on column A, you can also say that column B functionally determines column A. a. True b. False

false

If data is loaded into a data warehouse periodically, but users cannot update a data warehouse directly, the data is said to be volatile.

false

If each employee works in a single department, and each department has only one employee, the relationship between employees and departments is a one-to-many relationship.

false

If no unique identifier is available for an entity, you can go without one.

false

If the primary key of a table contains only a single column, the table is automatically in third normal form. a. True b. False

false

In a one-to-many relationship, the primary key of the "many" table becomes the foreign key of the "one" table.

false

In an entity-relationship diagram, rectangles represent foreign keys.

false

In updating and retrieving data, users need to know how data is physically structured on a storage medium.

false

One of the nine functions of a DBMS is to provide disk management services.

false

Programmers monitor database usage to detect potential security violations.

false

QBE is an example of a procedural language.

false

The ability of a DBMS to allow multiple computers to share access to data and software by running multiple instances of a single, shared database is called a serial database system.

false

The command 'REVOKE REFERENCES ON Customer to bsmith' prevents the bsmith user from using the ALTER TABLE statement to change a table definition.

false

The data architect sets data-handling policies and assigns data entry.

false

The first step in creating a user view is to normalize the collection of tables.

false

The first substep in representing the user view as a collection of tables is to determine entities and create a table for each.

false

The main purpose of data fragmentation is to place data at the location where the data is least often accessed.

false

The server in a client/server system is also known as a front-end processor.

false

The term domain refers to the general structure of an object.

false

When a DBMS uses journaling, the update log is part of the same file in which the database is stored.

false

When converting a non-first normal form table to first normal form, the foreign key will usually include the original foreign key concatenated with the key to the repeating group. a. True b. False

false

When selecting a DBMS, the only database model choice available to the DBA is the relational model.

false

When the DBMS locks more rows and releases none of the locks, this is called the contracting phase.

false

When you combine third normal form tables, the result will always be in third normal form.

false

When you use thin clients in a two-tier architecture, you have a potential client maintenance problem.

false

You can minimize the occurrence of deadlocks by making sure all programs lock records in random order whenever possible.

false

For each table, you must identify the primary key and any alternate keys, secondary keys, and ____________________ keys.

foreign

____________________ key restrictions determine the relationships between tables.

foreign

You can recognize entity subtypes by the fact the primary key is also a(n) ____________________.

foreign key

To obtain information about ____________________ dependencies you might ask users questions such as: "If you know a particular employee number, can you establish other information, such as employee name?"

functional

A column B is ____________________ on another column A if each value for A in the database is associated with exactly one value of B.

functionally dependent

The relationship between a superclass and a subclass is called a ____________________.

generalization

A(n) ____________________ DDBMS is a database that has the same local DBMS at each site.

homogenous

A(n) ____________________ site is a backup site that an organization can switch to in minutes or hours because the site is completely equipped with duplicate hardware, software, and data.

hot

An OODBMS must provide a way to ____________________ objects; that is, the OODBMS must provide a way to distinguish between one object and another.

identify

A good DBMS provides data _________________________, which is a property that lets you change the structure of a database without requiring you to change the programs that access the database.

independence

The subclass ____________________ the structure of the class as well as its methods.

inherits

It is through foreign keys that you can create relationships among tables and enforce certain types of ____________________ constraints in a database.

integrity

____________________ constraints are rules that the DBMS must be follow in order to update data accurately and consistently.

integrity

An ____________________ is an internal company network that uses software tools typically used on the Internet and the World Wide Web.

intranet

____________________ involves maintaining a log of all updates in the database.

journaling

____________________ integrity constraints consist of primary key constraints and foreign key constraints.

key

An entity with a minimum cardinality of one plays a(n) ____________________ role in the relationship.

mandatory

A database file requires a large amount of disk space and internal ____________________.

memory

To execute the steps in a(n) ____________________, the user sends a message to the object.

method

____________________ indicates the number of objects that can be related to an individual object at the other end of the relationship.

multiplicity

A table is in fourth normal form when it is in third normal form and there are no ________________ dependencies.

multivalued

The ____________________ process enables you to identify the existence of potential problems in the design of a database.

normalization

A value of ________ is used when a value is missing, unknown, or inapplicable.

null

A(n) ____________________ is a special value that represents the absence of a value in a field.

null

In a(n) ____________________ relationship between two entities, an entity is associated with multiple other entities such as when a consultant is associated with multiple clients.

one-to-many

The database ____________________ manager is concerned with the ongoing maintenance of established databases.

operations

A query ___________________ is a DBMS component that analyzes queries and attempts to determine the most efficient way to execute a given query.

optimizer

An entity in a relationship with minimum cardinality of zero plays a(n) ____________________ role in the relationship.

optional

A ____________________ query in Access allows you to enter criterion when you run the query, as opposed to placing it in the design grid.

parameter

Database ____________________ deals with the ability of the production system to serve users in a timely and responsive manner.

performance

A user's ____________________ specify what kind of access the user has to objects in the database.

permissions

During the ____________________-level design, designers must consider the characteristics of the particular DBMS that the organization will use.

physical

Late binding lets you use the same name for different operations, which is called ____________________ in object-oriented systems.

polymorphism

____________________ key constraints are governed by entity integrity and enforce the uniqueness of the primary key.

primary

A column is a nonkey column if it is not a part of the ____________________.

primary key

The type of field for which you should never allow nulls is the ____________________.

primary key

When the ____________________ of a table is a single column, the table is automatically in second normal form.

primary key

With ____________________ visibility, only the class itself can view or update the value.

private

DBAs should have an understanding of information legislation such as the Data ____________________ Act.

protection

With ____________________ visibility, any other class can view or update the value of an attribute.

public

The problem of inconsistency in data is a direct result of ____________________.

redundancy

In SQL, you specify _____________ integrity using a FOREIGN KEY clause in either the CREATE TABLE or ALTER TABLE commands.

referential

____________________ integrity is a relational database concept stating that table relationships must be consistent and follow integrity constraints.

referential

A(n) ____________________ database is a collection of tables.

relational

In an E-R diagram, lines represent

relationships

The E-R model (also called ERM) uses diagrams to represent the high-level abstract and conceptual representation of data, along with entities, attributes, and ____________________.

relationships

Multiple entries in tables are often called ____________________.

repeating groups

The steps taken by the DDBMS to update the various copies of data should be done behind the scenes; this is called _____________________ transparency.

replication

_________________________ allows users at different sites to use and modify copies of a database and then share their changes with the other users.

replication

A backward recovery is also called a(n) ____________________.

rollback

Columns that are of interest strictly for the purpose of retrieval are known as ____________________.

secondary key

____________________ is the prevention of unauthorized access, either intentional or accidental.

security

To list the records in a query's results in a particular order, you need to ____________________ the records

sort

Web pages that display the same content for all Web clients are called ____________________ Web pages.

static

When one class is a subclass of a second class, you call the second class a ____________________ of the first class.

superclass

When designing a database, you might find it helpful to design a ____________ form to obtain the required information from users.

survey

A(n) ____________________ is a set of steps completed by a DBMS to accomplish a single user task.

transactilon

A DDBMS effectively contains a local DBMS at each site.

true

A distributed database is a single logical database that is physically divided among computers at several sites on a network.

true

A foreign key is a column or collection of columns in one table that is required to match the value of the primary key for some row in another table, or be null.

true

A shared lock permits other users to read the data in the database.

true

A table is in fourth normal form (4NF) when it is in third normal form and there are no multivalued dependencies. a. True b. False

true

A table that is in first normal form may contain problems that will require you to restructure it. a. True b. False

true

A weak entity is an entity that depends on another entity for its own existence.

true

Access delay refers to the fixed amount of time that is required for every message.

true

Access to a data warehouse is accomplished through the use of OLAP software.

true

An advantage of using the database approach to processing is that it facilitates consistency.

true

An interrelation constraint is a condition that involves two or more relations. a. True b. False

true

DBMSs must manage multiple copies of the same data at multiple locations.

true

Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

true

If the database has been destroyed, you can use a rollback to recover the database to a valid state by undoing problem transactions.

true

If you find that more than one table in your cumulative design has the same primary key, you should combine the tables to form a new table.

true

In two-phase locking, the second phase is where the DBMS releases all locks and acquires no new locks.

true

One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table, the whole table must be locked.

true

Systems that are record-at-a-time-oriented can create performance problems in distributed systems.

true

Tables that are in second normal form can still contain redundancy problems. a. True b. False

true

Tables without repeating groups are said to be in first normal form. a. True b. False

true

The DBA determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog.

true

The DBA is responsible for DBMS maintenance, data dictionary management, and training.

true

The DBMS must successfully complete all transaction steps or none at all for the database to remain in a correct state.

true

The actions defined for a class are known as methods.

true

The basic relationships among entities are: one-to-many, many-to-many, and one-to-one.

true

The beginning of a URL specifies the data communication method used by clients and servers to exchange data on the Internet.

true

The data architect designs, builds, and deploys databases.

true

The information-level design methodology is completed independently of any particular DBMS that the organization will ultimately use.

true

The relationship between different entities (in different tables) is handled by their common columns.

true

The simplest way to implement a one-to-one relationship is to treat it as a one-to-many relationship.

true

The use of a three-tier architecture can help solve the scalability problem of the two-tier architecture.

true

Third normal form is sometimes referred to as the Boyce-Codd normal form. a. True b. False

true

Timestamping avoids the need to lock rows in the database and eliminates the processing time needed to apply and release locks and to detect and resolve deadlocks.

true

To manage problems that arise from using a DBMS, companies appoint a DBA to manage both the database and the use of the DBMS.

true

When combining third normal form tables, the resulting table will not be in third normal form when a column A in one user view determines a column B in a second user view, yet column A is not a column in the second user view.

true

When determining the primary key of a table you must decide what properties are required to uniquely identify an entity.

true

When relational databases store complex objects, these special data types are known as BLOBs.

true

When selecting a DBMS and evaluating the concurrent update category, you should determine whether the DBMS resolves deadlock.

true

When selecting a DBMS and evaluating the data definitions category, you should ask if the DBMS supports views.

true

When the user views are not clearly defined, you should consider each stated requirement as a separate user view.

true

You can improve the performance of the recovery program by having it first scan the log and then apply the last after image.

true

You create a many-to-many relationship by creating a new table whose primary key is the combination of the primary keys of the original tables.

true

When some of the entries in a structure contain repeating groups and thus are not single-valued, the structure is called a(n) ____________________.

unnormalized relation

_________________________ data is not organized or easily interpreted by traditional databases or data models.

unstructured

A(n) ______________ query makes a specified change to all records satisfying the criteria in the query.

update

A DBMS provides a number of ____________________ services that assist in the general maintenance of the database.

utility

On a class diagram, a(n) ____________________ symbol precedes each attribute.

visibility

A(n) ____________________ site is a backup site that is equipped with duplicate hardware and software but not data

warm


Set pelajaran terkait

Leçon 7B: La culture- Les vacances des Français et Les Alpes

View Set

Introduction to World Geography Exam #2

View Set

Special Applications of Nuclear and Wave Phenomena Warm-Up, Instruction, Assignment, and Quiz

View Set

EMS 1020 - Chapter 11: Scene Size-Up

View Set

Unit 5 - Imperialism and World War I

View Set