Advanced Data Management Exam 4: Chapters 10-14

Ace your homework & exams now with Quizwiz!

comprehensive

A characteristic of reconciled data that means the data reflect an enterprise-wide view is:

concrete

A class that has direct instances is called a(n) ________ class.

smart card

A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n):

concurrency transparency.

A design goal for distributed databases that states that although a distributed database runs many transactions, it appears that a given transaction is the only one in the system is called:

replication transparency.

A design goal for distributed databases to allow programmers to treat a data item replicated at several sites as though it were at one site is called:

biometric

A device to measure or detect fingerprints or signatures is called a(n) ________ device.

class diagram.

A diagram that shows the static structure of an object-oriented model is called a(n):

transaction

A discrete unit of work that must be processed completely or not at all within a computer system is called a

synchronous

A form of distributed database in which all data across a network are kept continuously updated, so a user can access any data anywhere on the network and get the same answer is called a(n) ________ distributed database.

object diagram.

A graph of instances that are compatible within a class diagram is called a(n):

semijoin

A joining operation in which only the joining attribute from one site is transmitted to the other site is called a(n):

incremental

A method of capturing only the changes that have occurred in the source data since the last capture is called ________ extract.

composition

A part object which belongs to only one whole object and which lives and dies with the whole object is called a:

data dictionary

A repository of information about a database that documents data elements of a database is called a

explanatory

A researcher trying to explain why sales of garden supplies in Hawaii have decreased would be an example of ________ data mining.

excellent

A synchronized replication strategy has a(n) ________ reliability.

data scrubbing.

A technique using artificial intelligence to upgrade the quality of raw data is called:

data scrubbing.

A technique using pattern recognition to upgrade the quality of raw data is called:

aborted

A transaction that terminates abnormally is called a(n) ________ transaction.

To cause special handling procedures to be executed

A trigger can be used as a security measure in which of the following ways?

abstract operation

A(n) ________ defines the form or protocol of an operation, but not its implementation.

state

A(n) ________ encompasses an object's properties and the values of those properties.

object

A(n) ________ is a concept, abstraction, or thing that has a state, behavior, and identity.

decentralized database

A(n) ________ is a database stored on multiple computers in multiple locations that are NOT connected by a data communications link.

association

A(n) ________ is a named relationship between or among classes.

two-phase lock

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

class-scope attribute

A(n) ________ is an attribute of a class that specifies a value common to an entire class.

association

A(n) ________ is shown as a solid line between the participating classes.

heartbeat query

A(n) ________ is submitted by a DBA to test the current performance of a database or predict the response time for queries.

exclusive lock

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

information repository

A(n) ________ stores metadata about an organization's data and data processing resources.

all subclasses have been specified, and no others are expected.

According to the UML Notation Guide, complete means:

a descendant may be descended from more than one of the subclasses.

According to the UML Notation Guide, overlapping means:

Not Only Structured Query Language.

According to your text, NoSQL stands for:

decreased communication among the users, analysts, designers, and programmers.

All of the following are benefits of object-oriented modeling EXCEPT:

descriptive analytics

Allowing users to dive deeper into the view of data with online analytical processing (OLAP) is an important part of:

veracity and value

Although volume, variety, and velocity are considered the initial three v dimensions, two additional Vs of big data were added and include:

refresh mode.

An approach to filling a data warehouse that employs bulk rewriting of the target data periodically is called:

class

An association ________ is an association that has attributes or operations of its own.

journalizing facility.

An audit trail of database changes is kept by a:

to database management systems.

An information repository supplies information:

difficult

An integrated partition strategy is ________ to manage

a free source-code RBMS that provides the functionality of an SQL-compliant DBMS

An open-source DBMS is:

class-scope operation.

An operation that applies to a class rather than an object instance is a(n):

constructor operation

An operation that creates a new instance of a class is called a(n):

versioning

An optimistic approach to concurrency control is called:

lazy commit

An optimization strategy that allows sites that can update to proceed and other sites to catch up is called:

100 gigabytes of data in the enterprise data warehouse.

An organization should have one data warehouse administrator for every:

MongoDB.

An organization that decides to adopt the most popular NoSQL database management system would select:

Neo4j

An organization that requires a graph database that is highly scalable would select the ________ database management system.

Redis

An organization that requires a sole focus on performance with the ability for keys to include strings, hashes, lists, and sorted sets would select ________ database management system.

norm

An organization using HDFS realizes that hardware failure is a(n):

wide-column

Apache Cassandra is a leading producer of ________ NoSQL database management systems.

predictive analytics

Application of statistical and computational methods to predict data events is:

analysis and interpretation of data

At a basic level, analytics refers to:

large volumes of data with many different data types that are processed at very high speeds.

Big Data includes:

"

First degree or complete price discrimination relates to:

transactions do not have to be repeated

Forward recovery is faster than restore/rerun because:

external data source.

Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality.

securing the network between client and server.

Guidelines for server security should not include

Apache

Hive is a(n) ________ data warehouse software.

global

In a distributed database, a transaction that requires reference to data at one or more nonlocal sites is called a ________ transaction.

MOLAP

________ tools commonly load data into intermediate hypercube structures.

persistent

In the ________ approach, one consolidated record is maintained from which all applications draw data.

persistent

In the ________ approach, one consolidated record is maintained, and all applications draw on that one actual "golden" record.

Aggregation

In the figure below, what relationship is shown?

A faculty may advise up to a maximum of 10 students.

In the figure below, which of the following is true?

Students use various software tools for different courses.

In the figure below, which of the following is true?

link

In the following diagram, ________ objects are present (i.e., :Registration).

the connection requires full access to the database for dynamic pages

Security measures for dynamic Web pages are different from static HTML pages because:

gateways

Simple paths to other databases without the benefits of one logical database are called:

a data warehouse application.

Snapshot replication is most appropriate for:

Total Quality Management.

TQM stands for:

data management

The Hadoop Distributed File System (HDFS) is the foundation of a ________ infrastructure of Hadoop.

MapReduce

The Hadoop framework consists of the ________ algorithm to solve large scale problems.

key-value score.

The NoSQL model that includes a simple pair of a key and an associated collection of values is called a:

wide-column store

The NoSQL model that incorporates 'column families' is called a:

graph-oriented database

The NoSQL model that is specifically designed to maintain information regarding the relationships (often real-world instances of entities) between data items is called a:

is a notation useful for graphically depicting an object-oriented analysis or design model.

The Unified Modeling Language:

Platform for Privacy Preferences.

The W3C standard for Web privacy is called:

inconsistent read problem

The ________ occurs when one user reads data that have been partially updated by another user.

concurrency control

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

in the database definitions

The best place to improve data entry across all applications is:

encryption

The coding or scrambling of data so that humans cannot read them is called:

association role

The end of an association where it connects to a class is called a(n):

lock granularity.

The extent of the database resource that is included with each lock is called the level of:

user interfaces

User interaction integration is achieved by creating fewer ________ that feed different systems.

checkpoint facility

A DBMS periodically suspends all processing and synchronizes its files and journals through the use of a

distributed request

A ________ allows a single SQL statement to refer to tables in more than one remote DBMS.

recovery manager

A ________ is a DBMS module that restores the database to a correct condition when a failure occurs.

method

A ________ is the implementation of an operation.

poor

A centralized strategy has ________ expandability.

business rule constraint.

{disjoint, complete} is an example of a UML:

Query

Which of the following operations does NOT alter the state of an object?

Object class

Which of the following refers to a set of objects that share common structures and behaviors?

Polymorphism

________ means that the same operation can apply to two or more classes in different ways.

many data types.

Big data requires effectively processing:

does not require a strictly defined data model.

Big data:

objects

Both E-R model and object-oriented models are centered around:

data are stored, exchanged or presented in a format that is specified by its metadata.

Conformance means that:

authorization rules.

Controls designed to restrict access and activities are called:

data transformation.

Converting data from the format of its source to the format of its destination is called:

provides a virtual view of integrated data without actually creating one centralized database

Data federation is a technique which:

high level organizational groups and processes that oversee data stewardship

Data governance can be defined as:

SQL Commands (Insert/Update).

Data may be loaded from the staging area into the warehouse by following

risk of incarceration.

Data quality ROI stands for:

it provides a stream of profit.

Data quality is NOT important for this reason:

data are copied from legacy system

Data quality problems can cascade when:

node decoupling.

Data replication allowing for each transition to proceed without coordination is called:

high-quality

Data that are accurate, consistent, and available in a timely fashion are considered:

external data source.

Datatype conflicts is an example of a(n) ________ reason for deteriorated data quality.

prescriptive

Descriptive, predictive, and ________ are the three main types of analytics.

pushes data to duplicate sites as an event occurs.

Event-driven propagation:

there is a lack of control over data quality

External data sources present problems for data quality because:

data entry

Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems

level of detail.

Informational and operational data does NOT differ in this way:

large number of slaves.

It is true that in an HDFS cluster the DataNodes are the:

single master server

It is true that in an HDFS cluster the NameNode is the:

formatting the hard drive.

Loading data into a data warehouse does NOT involve:

human error

Most data outages in organizations are caused by:

flexibility

NoSQL focuses on:

not based on the relational model.

NoSQL includes data storage and retrieval:

scaling out

NoSQL systems allow ________ by incorporating commodity servers that can be easily added to the architectural solution.

sharding

NoSQL systems enable automated ________ to allow distribution of the data among multiple nodes to allow servers to operate independently on the data located on it.

OO objects exhibits behavior.

Object-oriented model objects differ from E-R models because:

timeliness

One characteristic of quality data which pertains to the expectation for the time between when data are expected and when they are available for use is:

statistically profile all files.

One simple task of a data quality audit is to:

triggers

One way to generate, store, and forward messages for completed transactions to be broadcast across a network is through the use of:

check entered data immediately for quality against data in the database.

One way to improve the data capture process is to:

unique

Quality data can be defined as being:

usefulness

Regarding big data value, the primary focus is on:

there are no or few triggers.

Replication should be used when:

seconds

Research shows that if an online customer does not get the service he or she expects within a few ________, the customer will switch to a competitor.

public companies' financial statements

Sarbanes-Oxley Act was enacted to ensure the integrity of:

object diagram.

The following figure is an example of a(n):

exploratory

The goal of data mining related to analyzing data for unexpected relationships is:

method

The implementation of an operation is called a(n):

real-time cascading of data changes throughout the organization

The major advantage of data propagation is:

Master Data Management.

The methods to ensure the quality of data across various subject areas are called:

three phases

The object-oriented systems development cycle consists of:

descriptive analytics.

The oldest form of analytics is:

backing out the transaction.

The preferred method of fixing an aborted transaction is:

joining

The process of combining data from various sources into a single table or view is called:

overriding

The process of replacing a method inherited from a superclass by a more specific implementation of the method in a subclass is called:

aggregating

The process of transforming data from a detailed to a summary level is called:

data warehouse administrator

The role of a ________ emphasizes integration and coordination of metadata across many data sources.

unit of work.

The sequence of instructions required to process a transaction is called the:

global optimization.

The step in which a distributed database decides the order in which to execute the distributed query is called:

volume, variety, and velocity.

The three 'v's commonly associated with big data include:

Normalization

This is NOT a popular architectures for Master Data Management:

data rollup and integration.

This is NOT a way to consolidate data:

easier to set up than horizontal partitioning.

This is NOT an advantage of vertical partitioning:

personal finances.

This is NOT an application for big data and analytics:

reduced network traffic at prime time.

This is an advantage of data replication:

data lake

When a data repository (including internal and external data) does NOT follow a predefined schema, this is called a:

multiple classification.

When an object is an instance of more than one class, it is called:

prescriptive analytics.

When an organization must decide on optimization and simulation tools to make things happen it is using:

restarting from the most recent checkpoint and processing subsequent transactions.

When incorrect data have been introduced, the database is best recovered by:

descriptive analytics

When online analytical processing (OLAP) studies last year's sales, this represents:

schema on read.

When reporting and analysis organization of the data is determined when the data is used is called a:

dashed arrow

When specifying a business rule between graphical symbols, a ________ is drawn from one element to the other.

Data communication reliability

Which of the following are business conditions that encourage the use of distributed databases?

Apply TQM principles and practices.

Which of the following are key steps in a data quality program?

Same DBMS used at all locations

Which of the following characterizes homogeneous environments?

Heterogeneous; federated

Which of the following environments uses a different DBMS at each node and supports local databases for unique data requests?

Homogeneous; nonautonomous

Which of the following environments uses the same DBMS at each node with a central or master DBMS coordinating database access across nodes?

Organizational forces

Which of the following factors in deciding on database distribution strategies is related to autonomy of organizational units?

Database design

Which of the following functions develop integrity controls?

Database planning

Which of the following functions do cost/benefit models?

Database analysis

Which of the following functions model business rules?

A data transformation process

Which of the following is NOT a component of a repository system architecture?

User interface design

Which of the following is NOT an area of concern when trying to maintain a well-tuned database?

Maintaining a secure server

Which of the following is NOT true of poor data and/or database administration?

Table lookup

Which of the following is a basic method for single field transformation?

Operation

Which of the following is a function or service provided by all instances of a class?

Subject

Which of the following is a principal type of authorization table?

The analysis model is not formal enough to be implemented in a programming language.

Which of the following is a reason for using an object-oriented design?

Authentication of the client workstation

Which of the following is a type of network security?

Data can be stored to optimize local access.

Which of the following is true about horizontal partitioning?

Node decoupling

Which of the following is true of data replication?

Better local control

Which of the following is true of distributed databases?

Gateways

Which of the following supports a simple path to other databases, without the benefits of one logical database?

Loss of confidentiality

Which of the following threats involves outside parties using information to embarrass a company?

Bit-mapped index

Which type of index is commonly used in data warehousing environments?

Update

Which type of operation has side effects?

an unauthorized person may gain access to a view through experimentation.

While views promote security by restricting user access to data, they are not adequate security measures because:

data to computation.

With HDFS it is less expensive to move the execution of computation to data than to move the:

failure transparency

With ________, all of the actions of a transaction are either committed or not committed.

database destruction

With ________, the database itself is lost, destroyed, or cannot be read.

location transparency

With ________, users can act as if all the data were located at a single node.

target

With a pull strategy of replication, the ________ node determines when a database is updated.

Smartphones

________ are examples of Business Intelligences and Analytics 3.0 because they have millions of observations per second.

Word processing programs

________ are not used for querying and analyzing data stored in data warehouses.

Data propagation

________ duplicates data across databases.

Commit protocol

________ ensures that a transaction is successfully completed or else it is aborted.

Transaction processing

________ generally processes the largest quantities of data.

Variety

________ includes NoSQL accommodation of various data types.

Veracity

________ includes concern about data quality issues.

Velocity

________ includes the value of speed in a NoSQL database.

Multiplicity

________ indicates how many objects participate in a given relationship.

Local autonomy

________ is a design goal for a distributed database that says a site can independently administer and operate its database.

Location transparency

________ is a design goal for a distributed database, which says a user does not need to know the location of data to use the data.

Database administration

________ is a technical function responsible for database design, security, and disaster recovery.

Data warehousing

________ is an application that can effectively employ snapshot replication in a distributed environment.

Pig

________ is an important scripting language to help reduce the complexity of MapReduce.

Personal privacy

________ is arguably the most common concern by individuals regarding big data analytics.

creating foreign keys

________ is not a task of data cleansing:

Redis

________ is the most popular key-value store NoSQL database management system.

Encapsulation

________ is the technique of hiding the internal implementation details of an object from its external view.

Rollback

________ is used to undo unwanted database changes.


Related study sets

Chapter 3 Qu'est-ce que tu aimes faire

View Set

CH 25 Fetal Face and Neck Review Questions

View Set

Project Management Practice Quiz Chapter 1-2-3

View Set

Verbs: Past and Present Participle Forms

View Set

Chapter 8 - Location Planning & Analysis

View Set