CPSC6620 Final Practice Questions

Ace your homework & exams now with Quizwiz!

Which property of the CAP theorem assumes that all transaction operations take place at the same time in all nodes, as if they were executing in a single-node database?

Consistency

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

Corrupting

A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date. T/F

False

A system maintenance activity generated in response to changes in the business environment is referred to as corrective maintenance.T/F

False

A weak relationship exists if the primary key of the related entity contains at least one primary key component of the parent entity.T/F

False

_____ fragmentation refers to the division of a relation into subsets of tuples.

Horizontal

All relational tables satisfy the 1NF requirements.T/F

True

The completeness constraint can be partial or total.T/F

True

The only way to access the data in a database is through the DBMS.T/F

True

The attribute hierarchy provides a top-down data organization that is used for two main purposes: _____ and drill-down/roll-up data analysis.

aggregation

Distributed processing does not require:

an existing distributed database.

Big Data ______.

captures data in whatever format it naturally exists

A(n) _____ is optimized for decision support and is generally represented by a data warehouse or a data mart.

data store

Decision support data tends to be non-normalized, _____, and pre-aggregated.

duplicated

During the ____ phase, the DBMS retrieves the data and sends the result set back to the client.

fetch

In standard SQL, the optimizer hint FIRST_ROWS is generally used for _____ mode processes.

interactive

A disadvantage of a distributed database management system (DDBMS) is:

lack of standards.

Improving _____ leads to more flexible queries.

normalization

The reliance on _____ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems.

normalization

In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values.

read

The _____ cache is used as a temporary storage area for ORDER BY or GROUP BY operations, as well as for index-creation functions.

sort

"A password must have a minimum of five characters" is an example of a _____.

standard

The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.

transaction log

At the implementation level, the supertype and its subtype(s) depicted in a specialization hierarchy maintain a(n) _____ relationship.

1:1

The _____ relationship should be rare in any relational database design.

1:1

A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____.

1NF

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

Confidentiality

_____ fragmentation allows a user to break a single object into two or more segments, or fragments.

Data

_____ is a relational set operator.

EXCEPT

An alias cannot be used when a table is required to be joined to itself in a recursive query.T/F

False

Normalization is a process that is used for changing attributes to entities.T/F

False

Normalizing fact tables improves data access performance and saves data storage space.T/F

False

Structural dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data.T/F

False

The external model is the representation of the database as "seen" by the DBMS.T/F

False

If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause.

JOIN ON

_____ transparency allows the system to operate as if it were a centralized database management system.

Performance

_____ is the central activity during the parsing phase in query processing.

Query optimization

_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

Standards

Which of the following is a specialization hierarchy disjoint constraint scenario in case of partial completeness?

Subtype discriminator can be null.

Which is a feature of a correlated subquery?

The outer subquery initiates the process of execution in a subquery.

_____ transparency allows data to be updated simultaneously at several network sites.

Transaction

What rule applies to the two-phase locking protocol?

Two transactions cannot have conflicting lock.

Which of the following is polyglot persistence?

Uses multiple data storage technologies

The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables.

base

A _____ attribute can be further subdivided to yield additional attributes.

composite

The entity relationship diagram (ERD) represents the _____ database as viewed by the end user.

conceptual

When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.

cultural

The _____ schema must support complex (non-normalized) data representations.

decision support database

The basic star schema has four components: facts, _____, attributes, and attribute hierarchies.

dimensions

A diskpage, or page, is the equivalent of a _____.

diskblock

In a star schema, attributes are often used to search, filter, or classify _____.

facts

If there is no index, the DBMS will perform a _____ scan.

full table

From the performance point of view, _____ databases eliminate disk access bottlenecks.

in-memory

The _____ manager is responsible for assigning and policing the locks used by transactions.

lock

Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role.

managerial

The _____ rule requires that all copies of data fragments be identical.

mutual consistency

In the wait/die scheme, the:

older transaction waits for the younger one to complete and release its locks.

When performing user access management, a DBA defines each user to the database at the _____ levels.

operating system and DBMS

An attribute that is part of a key is known as a(n) _____ attribute.

prime

A _____ lets a single SQL statement access the data that are to be processed by a single remote database processor.

remote request

The SQL data manipulation command HAVING:

restricts the selection of grouped rows based on a condition.

A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock.

shrinking

The implicit beginning of a transaction is when _____.

the first SQL statement is encountered

The _____ approach to scheduling concurrent transactions assigns a global unique stamp to each transaction.

time stamping

A distributed _____ can reference several different local or remote data processing sites.

transaction

Operational data are commonly stored in many tables, and the stored data represents information about a given _____ only.

transaction

In the context of Big Data, ______ relates to changes in meaning.

variability


Related study sets

Fed. Income Tax Individuals - Exam #1

View Set

cross-cultural psych: ch 7 motivation and behavior

View Set

CH 10 Section 2: Structural Approaches

View Set