IS 475 - Final Exam
NoSQL Stands For ___
"Not only SQL"
What is the cardinality constraint for the following statement? A member can enroll in as many classes as they would like to this year. _____
0..M
Within the XML formatting rules, how many root elements can there be? 5 4 1 12 20
1
Which one is data, and which one is information? Products in the store supplied by 37 vendors Price of the products ranges from $5 to $300
1st is data 2nd is information
What does DDL stand for? A. Data Definition Language B. Database Design Language C. Data Description Language D. Data Design Language E. Digital Database Language
A
Which command is used to organize SQL results? a. ORDER BY b. SET BY c. ORGANIZE BY d. SORT BY e. None of the above
A
Which of the following is the correct format for data insertion? A. INSERT INTO Inventory VALUES ('0060','A029',10); B. INSERT INTO VALUES ('0050','G009',5); C. INSERT ('0050','G009',5); D. VALUES into INVENTORY (5, '0936','ABS'); E. INSERT INTO VALUES ('0060','A029',10);
A
Which would be the correct way to rename a column in SQL? a. Select product_name as 'Product' b. Select product_name as Product c. Select product_name as (Product) d. Select product_name as "Product"
A
Below are benefits of SQL EXCEPT? A. High training costs B . Increased productivity C. Improved application portability D. Reduced dependence on a single vendor E. Enhanced cross-system communications
A. high training costs
The ____________ framework of data quality categorizes the dimension of data retrieval.
Access
2. A ______ is used to simplify SQL commands.
Alias
A good business rule is Business-oriented Declartive and Precise Atomic and distinct All of the above None of the above
All of the above
What are the Data Quality Dimensions that a framework categorizes? Intrinsic Contextual Representation Access All of the above
All of the above
What is Data Governance used for? A. Improve data capture process B. Perform data quality audit C. Establish data stewardship program D. Apply total quality management (TQM) practices E. All of the above
All of the above
Which of the following are causes of poor data quality? Multiple data sources Volume of data Lack of organizational commitment Limited computing resources All of the above
All of the above
Which one of the following are different joining keywords in SQL? INNER JOIN LEFT JOIN RIGHT JOIN FULL OUTER JOIN All of these are JOIN keywords in SQL
All of these are JOIN keywords in SQL
Which of the following are not part of the security policies and procedures of data? Personnel controls Anti-theft controls Physical access controls Maintenance controls Data privacy controls
Anti-theft controls
Which of the following traits out of this list is a part of Contextual segment of Data Quality Dimensions? a) Appropriate amount b) Traceability c) Concisely-represented d) Interpretable e) Alignment
Appropriate amount
A disjointness generalization constraint specifies which one of the following: A. An entity can be a member of more than one subtype B. An entity can be a member of at most one subtype C. An entity does not inherit from a superclass D. The union of the subtypes partially covers their supertype E. None of the above
B
Fill in the blank: In a table, a _______ represents data values describing a real-world entity instance or relationship instance, and a ________ represents a property or characteristic of an entity or relationship type of interest. a. Attribute; relation b. Tuple; attribute c. Primary key; domain d. Domain; values e. Relation; tuple
B
Object-oriented concepts combine data and behavior via ____? a. propagation b. encapsulation c. normalization d. interfacing
B
When creating a table, what does 'NOT NULL' imply? A) The record in the table is blank B) The record in the table must have a value in it C) Only numbers can be input into the record of the table D) You must leave this record blank, and update it later E) You do not care what is input in this record
B
Which SQL constraints are used to uniquely identifies a row/record in another table? a. Unique b. Primary key c. Foreign key d. Index e. Distinct
B - primary key
What is the correct format order of SQL commands when using a select expression: A) Group BySelectWhereFROM B) Select From Where Group By C) FromSelectGroup ByWhere D) None of the Above E) The Order doesn't matter
B) SELECT FROM WHERE GROUP BY
Which of the following in an Entity Relationship Diagram is completely written with capital letters? Attributes Entity Types Relationship Types Multi-Valued Attributes Derived Attributes
B. Entity Types
Which of the following clauses forces the tuples resulting from a query to appear in a particular sorted order? a. SORT BY b. ORDER BY c. RULE BY d. GROUP BY e. LIST BY
B. Order By
Each of the following are security measures against application issues EXCEPT: Test Application Programs Building safeguards into the code Spam Filtering Better Training Educating the Users
Better training
What operator defines a range of values that the column values must fall in? Between Like Is In And
Between
Given the SQL script, are there any errors that could lead to an error when executed? SELECT ingredient FROM Recipe WHERE ingredient = 'Eggs' ORDER BY ingredient GROUP BY ingredient HAVING count(*) = 1; a. The Column names are not capitalized. b. A single quotation is used rather than a double quotation for 'Eggs.' c. Order By should be listed at the end of the script. d. Group by should be listed after Having. e. There is nothing wrong with the script and should run properly
C
The six clauses of the SELECT statement must be coded in the following order: A)SELECT, FROM, GROUP BY, HAVING, WHERE, ORDER BY B)SELECT, FROM, WHERE, ORDER BY, GROUP BY, HAVING C)SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY D)SELECT, FROM ORDER BY, WHERE, GROUP BY, HAVING E)SELECT, WHERE, FROM, ORDER BY, GROUP BY, HAVING
C
What is the advantage of an object-oriented database design? A. Inclusion of more semantic information in the database B. Permit the extensibility of base data types, thereby increasing both the functionality C. Both A and B D. Opposition from the firmly established RDBMSs E. None
C
Which of these speakers did we not watch regarding the Dark Side of Data? A. Jennifer Golbeck B. Malte Spitz C. Tim Smith D. Alessandro Acquisti E. Ben Goldacre
C
Which of the following is a way data could be misused? A) Using SQL to analyze and draw conclusions from the data B) Assuring results are statistically significant C) Ignoring results that are counter intuitive D) Discussing the data with well-informed individuals E) Creating visual descriptions of the data
C) Ignoring results that are counter intuitive
Multiple Choice: What are three types of data integration approaches discussed in class? A) consolidation, federation, and propaganda B) limitation, normalization, and consolidation C) consolidation, federation, and propagation D) consolidation, propagation, and admiration E) propagation, innovation, and regulation
C) consolidation, federation, and propagation
Which of the following would be classified as a property or characteristic of an entity type or relationship type that is of interest to the organization? A. Entity Type B. Relationship Type C. Attribute D. Instance E. Degree
C. Attribute
Which of the following are NOT causes of poor data quality? A) Duplicates data B) Ambiguous data C) Unique data D) Inconsistency E) None of the above
C. Unique data
When using order by function, where do you put the group by function? A. Before the order by B. After the order by C. You don't need a group by function D. Order by needs to be used in a subquery E. Group by and order by need to be used in a subquery
C. You dont need a group by function
Which relationship type creates a new relation table? A. One-to-Many B. One-to-One C. Many-to-Many D. All of the above E. None of the above
C. many-to-many
4. SQL offers a number of built-in functions. The _______ function returns the number of tuples or values specified in a query.
COUNT
Which choice is not part of SQL constraints? UNIQUE NOT NULL PRIMARY KEY CREATE DEFAULT
CREATE
Ther are different frameworks that categorize the different dimensions of data quality. Intrinsic is: Data in a certain context How data is represented Charateristics of data Data retrieval None of the above
Charateristics of data
Which security goal should ALH Enterprises focus on if their goal is to protect their data from unauthorized access? Integrity Confidentiality Compliance Diligence Availability
Confidentiality
What are some of the dark sides to big data?
Confidentiality, privacy, and anonymity
A database design process determines the _____ of a database system. Content and Structure Creativity and Market Appeal Security and Reliability Cost and Function Legality and Regulations
Content and Structure
Which of the following is NOT a characteristic of business rules? Declared to control/influence business behavior Expressed in terms familiar to end users Created solely by upper management Automated through DBMS software Consisting of data name and data definition
Created solely by upper management
LDA is a method of semantic analysis that extracts themes from a dataset and utilizes topic models. It stands for which of the following: A. Local Data Access B. Latent Digital Allotment C. Linear Direction Allocation D. Latent Dirichlet Allocation E. Leading Dimension Assessment
D
What does a well-designed database do? A)Facilitates data management B)Write queries C)Generates accurate and valuable information D)A and C E)B and C
D
Which of the SQL command(s) would you use to eliminate duplicate rows and display a unique list of values for "Names"? A) SELECT DISTINCT Names B) GROUP BY Names C) DELETE FILES DUPLICATE Names D) Both A and B E) None of the above
D
Which of the following is not a part of the security policies and procedures? a. Personnel controls b. Data privacy controls c. Physical access controls d. Data leak controls e. Maintenance controls
D - data leak controls
Which of the following best describes the term compliance with regards to data security goals? A)Protecting data against unauthorized access B)Keeping data consistent and free of errors or anomalies C)Accessibility of data whenever required by authorized users D)Activities that meet data privacy and security reporting guidelines E)Maintaining the size of data on a cloud platform
D) Activities that meet data privacy and security reporting guidelines
Data Manipulation Language (DML) is: a ) command that visualizes a database b ) command that controls a database c ) command that define a database d ) command that maintain and query a database e ) command that simplifies a database
D.
Data Definition Language (DDL) consists of the SQL commands are used to define a database, including A. Creating B. altering C.A & B D. All E. None
D. All
Which of the following is true about Completeness and Consistency Checks? A. All entity types have a key attribute (identifier) B. All relationship types connect entity types C. All relationship types' names are unique D. All are correct. E. None
D. All are correct
Which SQL constraint uniquely identifies a row/record in another table? A. NOT NULL B. DEFAULT C. UNIQUE D. FOREIGN KEY E. PRIMARY KEY
D. FOREIGN KEY
Multiple Choice: In order to eliminate possible duplicates in a select clause, you must specify which operation? DISTINCT WHERE ORDER BY HAVING GROUP BY
DISTINCT
When creating a SQL query, you are worried about duplicate results. What command should you add to your code to ensure this doesn't happen? A) INNER JOIN B) SUM C) DELETE CASCADE D) DISTINCT E) COUNT
DISTINCT
When showing a Derived Attribute it is seen as a A. Solid Circle B. Dashed Circle C. Underline text only D. Bold Letters E. Double Circle
Dashed Circle
2. ______________ consists of the SQL commands used to define a database, including Creating, altering, dropping tables and established constraints.
Data Definition Language
4. The data integration technique of duplicating data across databases with near real-time delay is known as ____ ___________.
Data Propagation
Describe the differences between the three techniques for data integration
Data consolidation - consolidate data into centralized database Data federation - virtual view of data Data propagation - duplicate data across databases
______ ______ is the ability of an object to hide data from other objects.
Data hiding
Which of the following is NOT considered a database security feature? a. Integrity controls b. Authorization rules c. Encryption d. Data safe connect e. All of the above can be considered database security features
Data safe connect
Which of the following is not an example of security policies and procedures? Personnel controls Physical access controls Data Sharding Maintenance controls Data privacy controls
Data sharding
What does a dotted ellipse represent in an ER-Diagram? Unique key attribute Primary key attribute Foreign key attribute Multi-valued attribute Derived attribute
Derived attribute
What are the 3 ETL Activities? A.Extract data, Take out data, Unload transformed data B. Extract data, Transform data, Lose all data C. Extract computer , Transform data, Load transformed data D. Transform data, Extract data, Do not transform data E. Extract data, Transform data, Load transformed data
E
What are the rules of ER modeling? A. Each entity type should have more than one attributes B. Each statement in the specification should be located in the ERD. C. Each ERD construct should be located somewhere in the requirement specification. D. No duplicated entity or relationship name. E.All of the above
E
What does a Data Definition Language consist of: A. Creating Tables B. Altering Tables C. Dropping Tables D. Establishing Constraints E. All of The Above
E
Which is an importance of data models? A. A communication tool B. Give an overall view of the database C. Organize data for various users D. Are an abstraction for the creation of good database E. All of the above
E
Which is not a PRO of Data Federation? A. Data always current when requested. B. Works well for read-only applications because only requested data needs to be retrieved. C. Ideal when copies of source data are not allowed. D. When data integration needs cannot be anticipated. E. Heavy workloads possible for each request due to performing all integration tasks for each request.
E
Which of the following is NOT a key characteristic of a database? A. Self-describing collection of data B. Related data C. Integrated data D. Shared data E. Interactive data
E
Which symbol have we not used in this class to notate an ERD? A. Rectangle B. Ellipse C. Diamond D. Upside-down Triangle E. Trapezoid
E
Which SQL statement is used to extract data from a database? a. WHERE b. FROM b. INSERT d. GROUP BY e. SELECT
E. Select
Problems of using a File system are mentioned below EXCEPT? A. Data Inconsistency B. Data Redundancy C. Limited Data Integration D. Ineffective/inefficient System Maintenance E. Easy for data querying and retrieval
E. easy for data querying and retrieval
____ is defined as the ability to hide the object's internal details, including its attributes and methods.
Encapsulation
Multiple Choice: What does the abbreviation, XML, stand for? Xtreme Markup Language Extensible Markup Language Extra Manipulation Language Xtreme Manipulation Language Extended Marking Language
Extensible Markup Language
What causes of Poor Data Quality A. Multiple data sources B. Volume of data C. External data sources D. Limited computing resources E. A, B and C F. All
F
(T/F) Two entities can't have more than one type of relationship between them.
False
1) (T/F) Data includes raw facts, are building blocks of information, and enables knowledge creation.
False
1. T/F - A multi-valued attribute is signified by a dotted ellipse, while a derived attribute is shown through a double-lined ellipse.
False
1. T/F: Data insufficiency is a major problem of the file-processing approach.
False
1. T/F: Looking at the ER diagram above, the attribute "Experience" is NOT a derived attribute.
False
1.T/F when creating a logical schema multi-valued attributes don't get their own table.
False
2. T/F: The only operator that can signify Not equal to is "!=".
False
2. True or False? Client and server processes cannot reside in the same computer.
False
3. True or False: XML is not case-sensitive.
False
4. True or False: A client is a process that provides requested services for clients.
False
: Causality - Cannot be explained, or rationalized by "theories" T/F
False
Data consolidation provides a virtual view of data without creating one centralized database. T/F
False
Function like calculate average and maximum price for product can be included in ER diagram? T/F
False
Legal Values and temporal constraints can be included/modeled in ER models. T/F
False
T/F An entity type is represented by a diamond shape in an ERD.
False
T/F Consistency checks require that all relationship types and attribute names are not unique.
False
T/F): Two entities can only have one type of relationship between them.
False
T/F: An attribute is described only once in the model and the database.
False
T/F: An example of a business rule would be, "Friday is business casual dress day."
False
T/F: Data is a set of values of qualitative variables.
False
T/F: Variable Character Field is a set of character data of determinate length
False
To transform a 1-to-1 relationship type, a new relation is created with both primary keys as foreign keys in the new relation. T/F
False
True or False: In SQL, char(50) and varchar(50) are exactly the same.
False
True or False: Security goals include confidentiality, compliance, integrity, availability, and accuracy.
False
True or false? SQL has a strict case-sensitive structure that must be followed.
False
Which of the following is not an aggregation function in SQL? SUM() COUNT() AVG() GETDATE() MAX()
GETDATE()
Which is the default "Join" operation? Inner join Left outer join Right outer join Outer join All of the above
Inner join
When creating a database, which of the fields do not require the use of quotation marks? Char Varchar Integer Date Time
Integer
What are the 4 data quality dimensions?
Intrinsic, Contextual, Representation, Access
What are the four different dimensions of data quality?
Intrinsic, Contextual, Representation, Access
SQL offers a number of built-in functions EXCEPT: COUNT SUM MED MAX MIN
MED
Data Definition Language (DDL) consists of the SQL commands used to define a database including all of these except: A) Creating B) Modifying C) Altering D) Dropping tables E) Established constraints
Modifying
Which of the following is NOT part of Representation in Data Quality Dimensions? Interpretable Easily-understandable Concisely represented Objectivity Consistency
Objectivity
A single teacher can teach multiple classes would best fit which cardinality?
One-to-many
Multiple Choice - Which of the following is NOT a security vulnerability regarding application issues? Bugs SQL injection Social engineering Non-validated inputs Packet sniffers
Packet sniffers
Developed by ___ in 1976, ER is the most popular conceptual model in database design Michael Afton Peter Chen Jamie Vaughn Claire McField Paul Geller
Peter Chen
Data Federation provides a virtual view of the data warehouse, creating a centralized database. What approach does it use? Push Approach Pull Approach Decentralized Full Update Strategy Real-time Data
Pull Approach
By using in your SQL query, you can get rid of duplicate results. a. SELECT EXACT b. SELECT MAX c. SELECT DISTINCT d. SELECT MIN e. A AND B
SELECT DISTINCT
Which choice is not a characteristic of an Objected-Oriented Data Model? Support the representation of complex objects Capable of defining new data types as well as the operations to be performed Support encapsulation Exhibit inheritance Support a combination of a start tag, content and end tag
Support a combination of a start tag, content and end tag
1. True or False: The purpose of a database is to store, manipulate, and retrieve data in organizations.
TRUE
Which of the following is the correct definition of Inheritance within Database Design? An object within the hierarchy that is ready to become the king when the old king is gone Receiving money or valuables from a family member when they pass away. The ability for an object within the hierarchy to inherit data from the class above it. The inclusion of more semantic information in a database An object that avoids the join operator
The ability for an object within the hierarchy to inherit data from the class above it.
What is a disadvantage of object oriented database design? A)More semantic information can be included. B)Complex objects are supported. C)There is no standard ad hoc query language. D)OODMBS can allow for a more realistic representation of real-world objects. E)Application development time is faster.
There is no standard ad hoc query language
Which of the following best describes the purpose of the GROUP BY clause for sql statements? To list a certain attribute in ascending or descending order To aggregate records based on a specified column To list a condition for a specified column To split the data into groups based on a condition To build clusters based on algorithms for analysis
To aggregate records based on a specified column
% Matches Any Substring, And _ Matches Any (Single) Character T/F
True
(T/F) One important component of DBMS is the query processor that takes care of the actual execution of queries by calling on the storage manager to retrieve the data requested.
True
(T/F) The right outer join and left outer join operators can be used interchangeably as long as the correct table is named.
True
1. T/F - A subtype entity inherits values of all attributes of the supertype
True
1. T/F Subtypes are able to have relationships with other subtypes
True
1. T/F: Business rules must have impacts on an organization's database, and define the situation of a transaction to be accepted or rejected.
True
1. T/F: Information should be accurate, timely, and relevant to enable good decision making
True
1. T/F: The Database design process consists of Conceptual Database Design, Logical Database Design, and Physical Database Design.
True
1. T/F: The Entity Relational Diagram contains an entity type, a relationship type, and its respective attributes.
True
1. True or False: A database is a collection of related data items within a specific business process or problem setting.
True
1. True or False: Data is collected and analyzed to create information suitable for making decisions.
True
1. True or False: Database is a superior approach to the file system.
True
2. True/False: SQL has become the de facto standard language for creating and querying relational databases.
True
3. An entity has data components and relationships but lacks manipulative ability.
True
3. T/F When using federation as a data integration technique all data is stored without actually creating one centralized database.
True
3. T/F: A class can be viewed as a template that can be used to create/instantiate objects of the same type.
True
3. T/F: Applications and databases traditionally are organized around domains such as accounting, human resources, logistics and CRM.
True
3. True/False: Data consolidation pushes all data into a centralized database similar to a data warehouse.
True
4) (T/F) Data includes raw facts, are building blocks of information, and includes data management (generation, storage, and retrieval of data).
True
4. T/F: MySQL is an example of a relational database management system.
True
4. T/F: Security is the extent to which access to data is restricted appropriately to main its security?
True
4. TRUE or FALSE: The following SQL commands are in correct order: select, from, where, group by, having, order by.
True
4.) T/F: An example of information is "On average, 52 customers come to the store every day, and about 30% will purchase something."
True
INSERT INTO Inventory (Quantity, Stack_No, Product_ID) VALUES (9, '0011','A002'); And INSERT INTO Inventory VALUES ('0011','A002',9); These two statements do the same thing: T/F
True
In a logical schema, the columns are known as attribute and the rows are known as tuples. T/F
True
Metadata refers to data that describes important properties, characteristics, or structure of the data of interest
True
T/F - A subtype does not have its own primary key, since it is inherited from the supertype.
True
T/F : A class is a collection of similar objects with shared structure (attributes) and behavior (methods)
True
T/F : Data can be seen as stored representations of objects or events.
True
T/F : SQL stands for Structured Query Language.
True
T/F Security Policy is the Collection of standards, policies, and procedures created to guarantee Securit
True
T/F When creating a logical schema where an entity has a multi-valued attribute, create a new table that Includes the primary key from the original table and the multi-valued attribute. List both as primary keys in the new table.
True
T/F: A one-to-many cardinality is where entity A is associated with any number of entities in B and an entity B is associated with at most one entity in
True
T/F: Accuracy is the extent to which data is certified, error-free, correct, flawless and reliable
True
T/F: Data consolidation involves ETL activities.
True
T/F: Data includes raw facts, building blocks of information, and data management.
True
T/F: Metadata, also referred to as schema, is data about data?
True
T/F: Subquery can be used as a comparison value and temporary table
True
T/F: Using virtual private networks (VPNs) can prevent network issues
True
T/F: When creating logical schema, in a one-to-many relationship, the primary key of the one relationship side becomes a foreign key in the many relationship side.
True
T/F: You must use quotation marks for the date datatype in MySQL.
True
To manage and safeguard data quality a data governance culture should be put in place assigning clear roles and responsibilities. T/F
True
True or False, there are at least 2 ways to write an Inner Join statement that will result in the same table.
True
True or False- You can use IS NULL or NOT NULL in the WHERE clause.
True
True or False: A many to many relationship type does not need its own table.
True
True or False: XML data is hierarchically structured.
True
True/False: The HAVING clause can only appear in conjunction with a GROUP BY clause.
True
When converting an ER diagram into logical schema, list a composite attributes by its sub attributes. True False
True
A Combination of a start tag, content and end tag is called a(n) __________.
XML element
Which of the following best describes the role of a Database Administrator (DBA)? a.) translates conceptual data model into a logical and internal data model b.) responsible for the implementation and monitoring of the database c.) develops database applications in a programming language such as Java or Python d.) run the application to perform specific database operations. e.) None of these describe a Database Administrator
b
An entity type in an ER model is usually given a name (noun, singular, upper-case letters) and placed inside a ______. a) Circle b) Diamond c) Rectangle d) Hexagon e) None of the above
c) Rectangle
Which of the following are not part of security goals with data? a. Confidentiality b. Compliance c.Integrity d. Availability e. Cultural
cultural
A person responsible for ensuring that organizational applications properly support the organization's enterprise goals is a
data steward
___ is data that suffer from inaccuracies and inconsistencies.
dirty data
In a disjoint specialization, an entity can be a member of at most one subtype of the specialization relationship.
disjoint
Which of the following is true regarding naming a constraint, rather than leaving it anonymous? a) It would be difficult to modify a constraint in the future if it is not named b) If a query (insert, update, delete) violates a constraint, SQL will generate an error message that will contain the constraint name c) The error message will be easier to understand if the constraint name is clear and descriptive d) When a constraint is created without a name, the DBMS will assign one e) All of the above
e) All of the above
Which of the following is the correct way to identify the primary key in MySQL? a. Prj_No char(3) primary key b. Prj_No char(3) DEFAULT= 'primary key' c. CONSTRAINT PK_Project primary key(Prj_No) d. Prj_No char(3) references primary key e. Both a. and c.
e. Both a and c
Query processor assists in the execution of database queries such as a. retrieval of data b. insertion of data c. update of data d. removal of data e. all of the above
e. all of the above
The OO Data Model is capable of exhibiting inheritance and supporting _______
encapsulation
A person, place, item, event, or concept about which we want to preserve data is referred to as an
entity
2. True or False: A server is any process that requests specific services from server processes.
false
True or False: The difference between an entity and an object, is an object has data components and relationships, but lacks manipulative ability.
false
3. Data quality determines the ______ of the data to the business.
intrinsic value
A one-to-one relationship type can be viewed as a special case of ________ relationship type.
one-to-many
3. Data profiling needs to be completed ____________.
periodically
Data _____ is a multi-dimensional concept.
quality
When working in MySQLWorkbench, you must ____________ the schemas section in order to see any new tables you may have created.
refresh
2. Fill in the Blank: Subqueries are an alternate way of _________ data from multiple tables.
returning
Metadata is also known as what? a ) big data b ) schema c ) attribute d ) syntax e ) database
schema
Main Cause of Security Vulnerability are mentioned EXCEPT? A. Technical: Flaw in the system B. Managerial: Insufficient user knowledge C. Cultural: Bad user practices D. Procedural: Insufficient security requirement E. Software: Outdated operating system
software outdated operating system
What inherits all attributes of a supertype?
subtype
Fill in the Blank: Data Propagation allows for _____ propagation of updates/events in the source system to the target system.
synchronous
The class describes a ______ of object.
type