CS 4420 Intro to Database Systems Final Chapter 9 and 11
A view can be built to present only the data to which a user requires access.
True
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
concurrency control
A repository of information about a database that documents data elements of a database is called a:
data dictionary.
The transaction log contains before and after images of records that have been modified.
False
Transient data are never changed.
False
The W3C standard for Web privacy is called:
Platform for Privacy Preferences.
Which of the following is a principal type of authorization table?
Subject
Which of the following is not a component of a repository system architecture?
A data transformation process
What is a journalizing facility?
A facility that maintains an audit trail of transactions and database changes.
What is backward and forward recovery?
Backward - DBMS undo unwanted changes to the database (Rollback) Foward - DBMS start with an earlier copy of the database (Rollfoward)
________ is an ill-defined term applied to databases where size strains the ability of commonly used relational DBMSs to manage the data.
Big data
Which of the following factors drive the need for data warehousing?
Businesses need an integrated view of company information.
Which of the following data-mining techniques identifies clusters of observations with similar characteristics?
Clustering and signal processing
A domain is a way to create a structure that acts like a table.
False
A checkpoint facility is a facility by which the DBMS refuses to accept any new transactions.
True
A data mart is a(n):
data warehouse that is limited in scope.
A repository of information about data is called a catalog.
False
An operational data store typically holds a history of snapshots of the state of an organization whereas an enterprise data warehouse does not typically contain history.
False
Controls incorporated into a data management system that restrict access to data are called authentication rules.
False
In order to perform a restore/rerun, the database must be mirrored.
False
Multidimensional OLAP (MOLAP) tools use variations of SQL and view the database as a relational database, in either a star schema or other normalized or denormalized set of tables.
False
The representation of data in a graphical format is called data mining.
False
What are some approaches to handling slowly changing dimensions?
Overwrite the current value with the new value. For each dimension attribute that changes, create a current value field and as many old value fields as we wish. Create a new dimension table row each time the dimension object changes.
What are integrity controls? Describe the different types.
Protects data from unauthorized use and update. Domain - User-defined data type, that can be in one place the domain definition. Assertions - Enforce certain desirable database conditions. Triggers - Used for security purposes. (Prohibit actions, special handling procedures to execute, and write to a log file)
OLAP tools that use the database as a traditional relational database are called:
ROLAP tools.
A corporate information factory (CIF) is a comprehensive view of organizational data in support of all user data requirements.
True
A shared lock allows other transactions to read but not update records in use.
True
Medical claims and pharmaceutical data would be an example of big data.
True
Open-source DBMS are free software that provide the core functionality of an SQL compliant DBMS.
True
Scalable technology is critical to a data mart.
True
The data administrator takes responsibility for the overall management of data resources.
True
The first line of defense for authentication is the use of passwords, which is a one-factor authentication scheme.
True
The need for data warehousing in an organization is driven by its need for an integrated view of high-quality data.
True
All of the following are ways to handle changing dimensions EXCEPT:
create a snowflake schema.
All of the following are some beneficial applications for real-time data warehousing EXCEPT:
data entry.
An operational data store (ODS) is a(n):
integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.
All of the following are limitations of the independent data mart EXCEPT:
it is often more expedient to build a data mart than a data warehouse.
Conformed dimensions allow users to do the following:
query across fact tables with consistency.
The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is:
subject-oriented.
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.
two-phase lock