DBMS Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

eferring to the figure below, which of the following is NOT true?

A component is always used in only one item.

A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.

API

________ is the process of assigning pieces of application code to clients or servers.

Application partitioning

Which of the following are key steps in a data quality program?

Apply TQM principles and practices

Which of the following is a type of network security?

Authentication of the client workstation

An appropriate datatype for adding a sound clip would be:

BLOB

If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle?

DBA_TABLES

The ________ DBA view shows information about all users of the database in Oracle.

DBA_USERS

The role that is responsible for developing overall policies and procedures for database security is:

Data Administration.

________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated.

Data integrity

The role responsible for administering database security is:

Database Administration.

________ is a technical function responsible for database design, security, and disaster recovery.

Database administration

Which of the following functions model business rules?

Database analysis

Which of the following functions design integrity controls?

Database design

________ problems are encountered when removing data with transitive dependencies.

Deletion

Many Python web applications use:

Django.

________ takes a value of TRUE if a subquery returns an intermediate results table which contains one or more rows.

EXISTS

A composite key consists of only one attribute.

False

A data expeditor is a person assigned the responsibility of ensuring that organizational applications properly support the organization's enterprise goals of data quality.

False

A data governance committee is always made up of high-ranking government officials.

False

A data stewardship program does not help to involve the organization in data quality.

False

A database is a sequence of steps that constitute a well-defined business activity.

False

A database management system needs to provide only three basic facilities for backup and recovery of a database: backup facilities, journalizing facilities, and a recovery manager.

False

A foreign key is a primary key of a relation that also is a primary key in another relation.

False

A function has only input parameters but can return multiple values.

False

A high-level function that is responsible for the overall management of data resources in an organization is called database administration.

False

A join index is a combination of two or more indexes.

False

A relation is in first normal form if it has no more than one multivalued attribute.

False

A review will thoroughly review all process controls on data entry and maintenance.

False

A routine is a named set of SQL statements that are considered when a data modification occurs.

False

A shared lock prevents another transaction from reading a record.

False

A transaction is consistent if it always runs with the same amount of memory.

False

A transaction is durable if it can resist failure.

False

ABET is a common encryption method used to secure data traveling between a client and a server.

False

ACID support for database-as-a-service is easily provided in a cloud computing environment.

False

Adding notations to the EER diagram regarding data volumes and usage is of no value to the physical design process.

False

An API is a set of routines that a database server uses to access database objects

False

An anomaly is a type of flaw in the database server.

False

An application server provides basic functionality for receiving and responding to requests from browsers.

False

An enterprise key is a foreign key whose value is unique across all relations.

False

An equi-join is a join in which one of the duplicate columns is eliminated in the result table.

False

Anomalies do not generally arise out of transitive dependencies.

False

Business rules logic includes such activities as data validation and identification of processing errors.

False

Completeness means that all data that must have a value does not have a value.

False

Data which arrive via XML and B2B channels is always guaranteed to be accurate.

False

Database administrators are responsible for developing overall policies and procedures for database security.

False

Database applications are not very disk intensive.

False

Databases are generally the property of a single department within an organization.

False

Dirty data saves work for information systems projects.

False

During multiple simultaneous transactions data integrity is maintained by logging.

False

EXISTS takes a value of false if the subquery returns an intermediate result set.

False

Free range partitioning is a type of horizontal partitioning in which each partition is defined by a range of values for one or more columns in the normalized table.

False

Generally, records in a customer file never become obsolete.

False

Geolocation logic is the application logic component responsible for data storage and retrieval.

False

Horizontal partitioning is very different from creating a supertype/subtype relationship.

False

Horizontal partitioning refers to the process of combining several smaller relations into a larger table.

False

IF-THEN-ELSE logical processing cannot be accomplished within an SQL statement.

False

Loss of data integrity does not impact the quality of data in a database.

False

Loss of data integrity means that someone has stolen data from the database server.

False

MULTISET is similar to the table datatype.

False

Master data management is the disciplines, technologies, and methods to ensure the currency, meaning, and quality of data within one subject area.

False

One major disadvantage of the outer join is that information is easily lost.

False

One method to handle missing values is to substitute an exact value.

False

Open source software always comes with complete documentation.

False

Quality data are not essential for well-run organizations.

False

Quality data does not have to be unique.

False

Retention refers to the amount of data that is not purged periodically from tables.

False

Specifications for transactions do not need to be reviewed quickly.

False

Specifying the attribute names in the SELECT statement will make it easier to find errors in queries and also correct for problems that may occur in the base system.

False

The Number datatype would be appropriate for a zip code.

False

The natural join is very rarely used.

False

The primary key of the many side migrates to the one side when transforming a one-to-many relationship.

False

The record log is a record of the essential data for each transaction that has been processed against the database.

False

The relational data model does, at this time, directly support subtype/supertype relationships.

False

The restoration manager allows the DBMS to restore the database to a correct condition and restart processing transactions.

False

The smallest unit of named application data is a record.

False

The transaction log contains before and after images of records that have been modified.

False

There is a special operation in SQL to join a table to itself.

False

Three-factor authentication is most often implemented with a credit card.

False

Three-tier architectures generally result in higher long-term costs.

False

Total quality management (TQM) focuses on defect correction rather than defect prevention.

False

Triggers can be used to ensure referential integrity, enforce business rules, create audit trails, and replicate tables, but cannot call other triggers.

False

User-defined functions can improve system performance because they will be processed as sets rather than individually, thus reducing system overhead.

False

Using an index for attributes referenced in ORDER BY and GROUP BY clauses has no significant impact upon database performance.

False

Using an outer join produces this information: rows that do not have matching values in common columns are not included in the result table.

False

Versioning is a pessimistic approach to concurrency control.

False

When developing an application, one must decide where it will be placed when it is developed.

False

When transforming a one-to-one relationship, a new relation is always created.

False

When transforming a weak entity, one should create one relation with both the attributes of the strong entity and the attributes of the weak entity.

False

One major disadvantage of JSP is:

HTML, Java cod,e and SQL code are mixed together.

In which type of file is multiple key retrieval not possible?

Hashed

In the figure below, what type of relationship do the relations depict? ( employee and child)

Identifying entity/weak entity

A cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

Infrastructure-as-a-service.

A data-interchange format easily for humans to read and machines to parse and process is called:

JavaScript Object Notation (JSON).

Which of the following threats involves outside parties using information to embarrass a company?

Loss of confidentiality

Which of the following is NOT true of poor data and/or database administration?

Maintaining a secure server

The methods to ensure the quality of data across various subject areas are called:

Master Data Management.

________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved.

Middleware

________ anomalies can be caused by editing data in tables.

Modification

Which of the following are properties of relations?

No two rows in a relation are identical.

Which of the following functions do cost/benefit models?

Operations

The LAMP stack consists of all of the following EXCEPT:

PHP or Python.

All of the following are well-accepted characteristics of transactions EXCEPT:

Persistence.

In which data model would a code table appear?

Physical

The W3C standard for Web privacy is called:

Platform for Privacy Preferences.

In the figure below, what type of key is depicted? (foreign key depends on primary key)

Recursive foreign

Which of the following violates the atomic property of relations?

Sam Hinz

Which of the following is NOT a reason to create an instance of a relational schema with sample data?

Sample data can reverse database implementation errors.

A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?

Second

A common encryption method to secure data traveling between a client and a server is called:

Secure Sockets Layer (SSL).

A cloud computing approach in which the service consists of software solutions intended to address the needs of a noncompeting activity is called:

Software-as-a-service.

________ use the result of the inner query to determine the processing of the outer query.

Subqueries

Which of the following is NOT a common distribution logic for two-tiered server environments?

Tall client

The figure below is an example of mapping which type of relationship? (patient, physician)

Ternary

TQM stands for:

Transforming Quality Management.

A DBMS must provide journalizing facilities to provide an audit trail of transactions and database changes.

True

A business transaction requires several actions against a database.

True

A candidate key is an attribute, or combination of attributes, that uniquely identifies a row in a relation.

True

A cascading delete removes all records in other tables associated with the record to be deleted.

True

A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.

True

A correlated subquery is executed once for each iteration through the outer loop.

True

A data quality audit helps an organization understand the extent and nature of data quality problems.

True

A data steward is a person assigned the responsibility of ensuring the organizational applications properly support the organization's enterprise goals for data quality.

True

A dynamic query is created by the user.

True

A hashing algorithm is a routine that converts a primary key value into a relative record address.

True

A join in which the joining condition is based on equality between values in the common column is called an equi-join.

True

A materialized view is not persistent.

True

A natural join is the same as an equi-join, except that it is performed over matching columns that have been defined with the same name, and one of the duplicate columns is eliminated.

True

A partial functional dependency is a functional dependency in which one or more nonkey attributes are functionally dependent on part (but not all) of the primary key.

True

A range control limits the set of permissible values that a field may assume.

True

A referential integrity constraint is a rule that maintains consistency among the rows of two relations.

True

A relation in fifth normal form may not contain any anomalies.

True

A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.

True

A trigger is a named set of SQL statements that are considered when a data modification occurs.

True

A web server is a key component of web applications.

True

A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies.

True

All transactions must have the ACID characteristics.

True

All values that appear in a column of a relation must be taken from the same domain.

True

Along with table scans, other elements of a query can be processed in parallel.

True

Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.

True

Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.

True

Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.

True

Completeness means that all data that are needed are present.

True

Conformance refers to whether the data is stored, exchanged, or presented in a format that is as specified by its metadata.

True

Constraints are a special case of triggers.

True

Correlated subqueries are less efficient than queries that do not use nesting.

True

Data quality is essential for SOX and Basel II compliance.

True

Database administrators are responsible for administering database security.

True

Dirty data can cause delays and extra work on information systems projects.

True

Establishing IF-THEN-ELSE logical processing within an SQL statement can now be accomplished by using the CASE keyword in a statement.

True

Fast data retrieval is one factor to consider when choosing a file organization for a particular database file.

True

Figuring out what attributes you want in your query before you write the query will help with query writing.

True

Hash partitioning spreads data evenly across partitions independent of any partition key value

True

Improving data capture process is a fundamental step in data quality improvement.

True

In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with the IN qualifier.

True

In some three-tier architectures, most application code is stored on the application server.

True

In the figure below, each employee has exactly one manager.

True

Java servlets execute from within another program and reside on the server.

True

Lack of organizational commitment is a potential reason for an organization's deteriorated data quality.

True

Level of lock granularity is the extent of a database resource include with each lock.

True

One objective of selecting a data type is to minimize storage space.

True

One property of a relation is that each attribute within a relation has a unique name.

True

Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.

True

Open source DBMS are free software that provide the core functionality of an SQL compliant DBMS.

True

Restricting access to the Web server is one method of Web security

True

Sample data are useful for developing prototype applications and for testing queries.

True

Security is one advantage of partitioning.

True

Since dynamic Web pages require full access to the database, security is different from static HTML pages.

True

Sound data modeling is a central ingredient of a data quality program.

True

Specifying database access policies is done during the database implementation phase

True

The LAMP stack consists of Apache, PHP and MySQL.

True

The UNION clause is used to combine the output from multiple queries into a single result table.

True

The allowable range of values for a given attribute is part of the domain constraint.

True

The columns of a relation can be interchanged without changing the meaning or use of the relation.

True

The data administrator takes responsibility for the overall management of data resources.

True

The following SQL statement is an example of a correlated subquery.SELECT First_Name, Last_Name, Total_SalesFROM Salesman s1WHERE Total_Sales > all(SELECT Total_Sales FROM Salesman s2WHERE s1.Salesman_ID != s2.Salesman_ID);

True

The following query will execute without errors.SELECT Customer.Customer_Name, Salesman.Sales_QuotaFROM CustomerWHERE Customer.Salesman_ID =(SELECT Salesman_IDWHERE Lname = 'SMITH');

True

The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.

True

The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.

True

The role of database administration is typically a more hands-on, physical involvement with the management of databases.

True

The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.

True

The uncontrolled proliferation of spreadsheets, databases, and repositories leads to data quality problems.

True

Triggers have three parts: the event, the condition, and the action.

True

Two-phase locking is a procedure for acquiring locks for a transaction before any are released.

True

VarChar2 would be appropriate for a user that wanted a text datatype for LastName that would only consume the required space.

True

When EXISTS or NOT EXISTS is used in a subquery, the select list of the subquery will usually just select all columns as a placeholder because it doesn't matter which columns are returned.

True

When a regular entity type contains a multivalued attribute, two new relations are created.

True

When normalizing, the goal is to decompose relations with anomalies to produce smaller, well-structured relations.

True

With a one-key encryption standard, both the sender and the receiver need to know the key that is used to scramble the transmitted or stored data.

True

An open source DBMS is:

a free source code RBMS that provides the functionality of an SQL-compliant DBMS.

All of the following are common denormalization opportunities EXCEPT:

a one-to-many relationship.

The following code would include:SELECT Customer_T.CustomerID,CustomerName, OrderIDFROM Customer_T LEFT OUTER JOIN Order_T ONCustomer_T.CustomerID = Order_T.CustomerID;

all rows of the Customer_T Table regardless of matches with the Order_T Table.

The following code would include:SELECT Customer_T.CustomerID,CustomerName, OrderIDFROM Customer_T RIGHT OUTER JOIN Order_T ONCustomer_T.CustomerID = Order_T.CustomerID;

all rows of the Order_T Table regardless of matches with the Customer_T Table.

The MERGE command:

allows one to combine the INSERT and UPDATE operations.

The following statement is an example of:CREATE TABLE Customer_t (CustNmbr number(11,0),CreditLimit number(6,2),CustStart date,CustEnd date,PERIOD for Custperiod(CustStart,CustEnd));

an application time period table.

A materialized view is/are:

an in-line query

While views promote security by restricting user access to data, they are not adequate security measures because:

an unauthorized person may gain access to a view through experimentation.

In order for a transaction to be consistent:

any database constraints that must be true before the transaction must also be true after the transaction.

The preferred method of fixing an aborted transaction is:

backing out the transaction.

All of the following are additional methods of Web security EXCEPT:

blacklist bad users

A join in which the joining condition is based on equality between values in the common columns is called a(n):

both equi-join. and natural join. .

In order for two queries to be UNION-compatible, they must:

both output compatible data types for each column and return the same number of rows.

A procedure is:

called by name.

User-defined data types:

can have defined functions and methods.

A join operation:

causes two tables with a common domain to be combined into a single table or view.

One way to improve the data capture process is to:

check entered data immediately for quality against data in the database.

Sensitivity testing involves:

checking to see if missing data will greatly impact results.

A method to allow adjacent secondary memory space to contain rows from several tables is called:

clustering.

A primary key that consists of more than one attribute is called a:

composite key.

In SQL, a(n) ________ subquery is a type of subquery in which processing the inner query depends on data from the outer query.

correlated

When a regular entity type contains a multivalued attribute, one must:

create two new relations, one containing the multivalued attribute.

A mechanism in a ResultSet object in Java that points to the current row of data is called a:

cursor.

Data quality problems can cascade when:

data are copied from legacy systems.

Conformance means that:

data are stored, exchanged, or presented in a format that is specified by its metadata.

Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems.

data entry

With ________, the database itself is lost, destroyed, or cannot be read.

database destruction

A computer that provides database storage and access in a client/server environment is called a(n):

database server.

Which of the following is not a basic step to accessing a database from an application:

define physical storage.

A ________ is a temporary table used in the FROM clause of an SQL query.

derived table

A nonkey attribute is also called a(n):

descriptor.

The attribute on the left-hand side of the arrow in a functional dependency is the:

determinant.

An attribute that may have more than one meaning is called a(n):

double defined attribute.

When a user creates a virtual table it is called a(n):

dynamic view.

An advantage of partitioning is:

efficiency.

A factor to consider when choosing a file organization is:

efficient storage.

The following code is an example of a(n):SELECT Customer_T.CustomerID, Order_T.CustomerID,CustomerName, OrderIDFROM Customer_T, Order_TWHERE Customer_T.CustomerID = Order_T. CustomerID;

equi-join.

A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers, and join tables to prepare query results is the:

explain plan.

Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality.

external data source

A disadvantage of partitioning is:

extra space and update time.

An identifier assigned to an associative entity is also called a cross-relation key.

false

When transforming a unary many-to-many relationship to relations, a recursive foreign key is used.

false

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):

fat client.

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a:

fat client.

When all multivalued attributes have been removed from a relation, it is said to be in:

first normal form.

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a:

foreign key.

The normal form which deals with multivalued dependencies is called:

fourth normal form.

A constraint between two attributes is called a(n):

functional dependency.

SQL-invoked routines can be:

functions or procedures.

A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a:

hash index table.

Data governance can be defined as:

high-level organizational groups and processes that oversee data stewardship.

Data that are accurate, consistent, and available in a timely fashion are considered:

high-quality.

Distributing the rows of data into separate files is called:

horizontal partitioning.

The best place to improve data entry across all applications is:

in the database definitions

One major advantage of the outer join is that:

information is not lost.

A domain definition consists of all of the following components EXCEPT:

integrity constraints.

Data quality is important for all of the following reasons EXCEPT:

it provides a stream of profit.

An index on columns from two or more tables that come from the same domain of values is called a:

join index.

An audit trail of database changes is kept by a:

journalizing facility.

A form of database design which maps conceptual requirements is called:

logical designs.

All of the following are the main goals of normalization EXCEPT:

maximize storage space.

The architecture that most applications use that separates the business logic, presentation logic, and database logic is called:

model-view-controller.

The most commonly used form of join operation is the:

natural join.

Which Java method retrieves the next row of a cursor?

next()

The entity integrity rule states that:

no primary key attribute can be null.

All of the following are popular architectures for Master Data Management EXCEPT:

normalization.

Durability means that:

once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction.

The following code would include:SELECT Customer_T.CustomerID, Order_T.CustomerID,CustomerName, OrderIDFROM Customer_T, Order_TWHERE Customer_T.CustomerID = Order_T. CustomerID;

only rows that match both Customer_T and Order_T Tables.

While Oracle has responsibility for managing data inside a tablespace, the tablespace, as a whole, is managed by the:

operating system.

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called:

parallel query processing.

A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a ________ dependency.

partial functional

In the ________ approach, one consolidated record is maintained from which all applications draw data.

persistent

In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record.

persistent

A(n) ________ is a field of data used to locate a related field or record.

pointer

All of the following are advantages of stored procedures EXCEPT:

portability.

An attribute (or attributes) that uniquely identifies each row in a relation is called a

primary key.

All of the following are key components of a web application EXCEPT:

processing-logic server.

Sarbanes-Oxley Act was enacted to ensure the integrity of:

public companies' financial statements.

A rule that states that each foreign key value must match a primary key value in the other relation is called the:

referential integrity constraint.

When incorrect data have been introduced, the database is best recovered by:

restarting from the most recent checkpoint and processing subsequent transactions.

Data quality ROI stands for:

risk of incarceration.

While triggers run automatically, ________ do not and have to be called.

routines

All of the following are part of the coding structure for triggers EXCEPT:

selection.

An operation to join a table to itself is called a(n):

self-join.

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process, and output electronic data in a secure manner is called a(n):

smart card.

One simple task of a data quality audit is to:

statistically profile all files.

A type of query that is placed within a WHERE or HAVING clause of another query is called a:

subquery.

The following code is an example of a:SELECT CustomerName, CustomerAddress, CustomerCity, CustomerState,CustomerPostalCodeFROM Customer_TWHERE Customer_T.CustomerID =(SELECT Order_T.CustomerIDFROM Order_TWHERE OrderID = 1008);

subquery.

Two or more attributes having different names but the same meaning are called:

synonyms.

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n):

tablespace.

A candidate key must satisfy all of the following conditions EXCEPT:

the key must indicate the row's position in the table.

All of the following are disadvantages to cloud-based computing EXCEPT:

the visibility of costs of data management is better.

External data sources present problems for data quality because:

there is a lack of control over data quality.

A PC configured to handle user interfaces with limited local storage is called a(n):

thin client.

One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is:

timeliness.

A method for handling missing data is to:

track missing data with special reports.

A discrete unit of work that must be processed completely or not at all within a computer system is called a:

transaction

A functional dependency between two or more nonkey attributes is called a:

transitive dependency.

A named set of SQL statements that are considered when a data modification occurs are called:

triggers.

A primary key is an attribute that uniquely identifies each row in a relation.

true

The outer join syntax does not apply easily to a join condition of more than ________ tables.

two

Quality data can be defined as being:

unique.

All of the following are guidelines for better query design EXCEPT:

use a lot of self-joins.

Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by:

using the CASE key word in a statement.

A relation that contains minimal redundancy and allows easy use is considered to be:

well-structured.

Horizontal partitioning makes sense:

when different categories of a table's rows are processed separately.


Set pelajaran terkait

Ch 1 Intro to Enterprise Systems for Management

View Set

Series 66 Unit 1 Checkpoint Exam

View Set