T2 Case Problem1: Slate & Pencil Tutoring
The _____ relationship should be rare in any relational database design. a. 1:1 b. 1:M c. M:1 d. M:N
1:1
The _____ relationship is the "relational model ideal." a. 1:1 b. 1:M c. M:1 d. M:N
1:M
A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes Answers: a. foreign b. candidate c. secondary d. primary
Candidate
Date attributes contain calendar dates stored in a special format known as the _____ date format. a. Julian b. calendar c. Epoch d. logical
Julian
_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. a. 1:N b. M:1 c. 1:1 d. M:N
M:N
The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. Answers: a. NOT NULL b. VALUE c. UNIQUE d. EMPTY
NOT NULL
A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). Answers: a. foreign b. attribute c. natural d. unique
Natural
_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. a. Equijoins b. Outer joins c. Theta joins d. Inner joins
Outer joins
_____ returns only the attributes requested, in the order in which they are requested. a. DIFFERENCE b. UNION c. PROJECT d. SELECT
PROJECT
_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. a. Predicate b. Relational c. Database d. Index
Predicate
To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. a. UNION b. DIFFERENCE c. SELECT d. INTERSECT
SELECT
_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. a. UNION b. INTERSECT c. SELECT d. DIFFERENCE
SELECT
A _____ is any key that uniquely identifies each row a. foreign key b. superkey c. special key d. candidate key
Superkey
Another name for a composite entity is a(n) _____ entity. a. bridge b. associative c. directive d. linked
bridge
Each table _____ represents an attribute.
column
A _____ contains at least all of the attribute names and characteristics for each table in the system a. database b. data dictionary c. logical schema d. relational schema
data dictionary
The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. a. referential b. entity c. null d. relational
entity
A _____ is the primary key of one table that has been placed into another table to create a common attribute a. foreign key b. candidate key c. composite primary key d. superkey
foreign key
In a database context, the word _____ indicates the use of the same attribute name to label different attributes. a. duplicate b. redundancy c. synonym d. homonym
homonym
A(n) _____ is an orderly arrangement used to logically access rows in a table. a. primary rule b. superkey c. relationship d. index
index
A(n) _____ only returns matched records from the tables that are being joined. a. equijoin b. theta join c. outer join d. inner join
inner join
Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. Answers: a. model b. integrity c. uniqueness d. attribute
integrity
In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. a. keys b. indexes c. relations d. logical structures
keys
According to Codd's _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns). a. comprehensive data sublanguage b. distribution independence c. logical data independence d. integrity independence
logical data independence
According to Codd's _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. a. nonsubversion b. information c. guaranteed access d. view updating
nonsubversion
A _____ key is defined as a key that is used strictly for data retrieval purposes. a. foreign b. candidate c. secondary d. lookup
secondary
In a database context, a(n) _____ indicates the use of different names to describe the same attribute. a. homonym b. duplicate c. entity d. synonym
synonym
The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. a. system catalog b. unique index c. database tuple d. systematic database
system catalog
When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. a. union-compatible b. difference-compatible c. select-compatible d. intersect-compatible
union-compatible
When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. a. composite b. unique c. key d. primary
unique