CSC 2250 Final Study Guide
transitive dependency
A ____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key.
composite
A _____ attribute can be further subdivided to yield additional attributes.
simple
A _____ attribute is one that cannot be subdivided.
repeating group
A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence.
weak
A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship.
superkey
A _____ is any key that uniquely identifies each row.
foreign key
A _____ is the primary key of one table that has been placed into another table to create a common attribute.
secondary
A _____ key is defined as a key that is used strictly for data retrieval purposes.
unary
A _____ relationship exists when an association is maintained within a single entity.
ternary
A _____ relationship exists when three entities are associated.
business
A ____________ rule is a brief and precise narrative of a policy, procedure, or principle within a specific organization's environment.
partial dependency
A dependency based on only a part of a composite primary key is called a ___________.
dashed line
A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity.
candidate
A primary key is a(n) _______ key chosen to be the primary means by which rows of a table are uniquely identified.
repeating group
A relational table must not contain a(n) ________.
degree
A relationship ______ indicates the number of entities or participants associated with a relationship.
classification
A relationship __________ is difficult to establish if only one side of the relationship is known.
entities
A relationship is an association between _____.
it has no multivalued dependencies
A table is in 4NF if it is in 3NF, and _______.
anomalies
A table that displays data redundancies yields _________.
1NF
A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key, is said to be in ____.
3NF
A table that is in 2NF and contains no transitive dependencies is said to be in ____.
4NF
A table where all attributes are dependent on the primary key are independent of each other, and no row contains two or more multivalued facts about an entity, is said to be in ____.
BCNF
A table where every determinant is a candidate key is said to be in ____.
existence
A weak entity must be _________-dependent
DSN
A(n) ____ is a unique name by which the data source will be known to ODBC, and therefore, to applications.
API
A(n) _____ can use a shared connection to the database instead of creating a new one every time.
workgroup
A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization.
data definition language (DDL)
A(n) _____ enables a database administrator to describe schema components.
DTD
A(n) _____ file provides the composition of the database's logical model and defines the syntax rules for an XML document.
DBMS
A(n) _____ is a collection of programs that manages the database structure and controls access to the data stored in the database.
class
A(n) _____ is a collection of similar objects with a shared structure and behavior.
index
A(n) _____ is an orderly arrangement used to logically access rows in a table.
entity
A(n) _____ is anything about which data are to be collected and stored.
attribute
A(n) _____ is the equivalent of a field in a file system.
domain
A(n) _____ is the set of possible values for a given attribute.
natural
A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s).
application
A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
inner join
A(n) _____ only returns matched records from the tables that are being joined.
model
A(n) _____'s main function is to help one understand the complexities of the real-world environment.
unique
A(n) ______ index is an index in which the index key can have only one pointer value (row) associated with it.
query
A(n) ______ is a specific request issued to the DBMS for data manipulation.
required
A(n) _______ attribute is an attribute that must have a value.
partial dependency
A(n) _______ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally dependent on W, and XY is the primary key.
database
A(n) _________ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system.
business rule
A(n) ___________ is a brief, precise, and unambiguous description of a policy, procedure, or principle within a specific organization.
data dictionary
A(n) _____________ provides a detailed description of all tables found within the user/designer-created database.
CGI
APIs are faster than ____ scripts because the code resides in memory and there is no need to run an external program for each request.
logical data independence
According to Codd's _____ rule of relational database, "Application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns)."
entity names
According to the data-modeling checklist, _____ should be nouns that are familiar to business, should be short and meaningful, and should document abbreviations, synonyms, and aliases for each entity.
good decision making
Accurate, relevant, and timely information is the key to ____.
documentation
After testing is concluded, the final _________ is reviewed and printed and end users are trained.
1NF
All relational tables satisfy the _____ requirements.
ActiveX
Among client-side extensions, _____ is a Microsoft specification for writing programs that run inside the Internet Explorer browser.
iterative
An ERD is created through an ________ process.
semistructured
An XML database supports the storage and management of _____ XML data.
cannot be further subdivided
An atomic attribute ______.
atomicity
An attribute that cannot be further subdivided is said to display _____.
prime
An attribute that is part of a key is known as a(n) ______ attribute.
existence
An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence.
temporary
An example of denormalization is using a _______ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows.
planning
An initial assessment of the information flow-and-extent requirements must be made during the _______ portion of the Systems Development Life Cycle (SDLC).
schema
An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chosen database.
bridge
Another name for a composite entity is a(n) _____ entity.
web-to-database middleware
Another name for a database server-side extension program is _____.
prime attribute
Any attribute that is at least part of a key is known as a _________.
determinant
Any attribute whose value determines other values within a row is known as a _________.
determines
Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B.
candidate
BCNF can be violated only if the table contains more than one _______ key.
OLE-DB
Based on Microsoft's Component Object Model (COM), _____ is database middleware that adds object-oriented functionality for access to relational and nonrelational data.
primary
Because a partial dependency can exist only when a table's primary key is composed of several attributes, a table whose _______ key consists of only a single attribute is automatically in 2NF once it is in 1NF.
modules
Because real-world database design is generally done by teams, the database design is probably divided into major components known as ________.
information
Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design.
data integrity problems
Data redundancy produces ____.
2NF
Data warehouse routinely uses ____ structures in its complex, multilevel, multisource data environment.
Julian
Date attributes contain calendar dates stored in a special format known as the _____ date format.
partial
Dependencies based on only a part of a composite primary key are known as _______ dependencies.
analysis
Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).
verification process
During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.
column
Each table _____ represents an attribute.
HTTP GET
Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web server using the TCP/IP Internet protocol.
root element
Every XML document has a _____.
3NF
For most business transactional databases, we should normalize relations into ______.
1NF
From a structural point of view, 2NF is better than ____.
2NF
From a structural point of view, 3NF is better than _____.
derived
From a system functionally point of view, ______ attribute values can be calculated when they are needed to write reports or invoices.
the level of detail represented by the values in a table's row
Granularity refers to _________.
one
Ideally, an entity identifier is composed of _____ attribute(s).
optional to
If Tiny College has some departments that are classified as "research only" and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity.
partial dependencies
If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have ___ based on this composite candidate key, even when the primary key chosen is a single attribute.
recursive
If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship.
strong
If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity.
RDBMS
If database tables are treated as though they were files in a file system, the ___ never has a chance to demonstrate its superior data-handling capabilities.
atomicity
Improving ____ leads to more flexible queries.
small circle (O)
In Crow's Foot notation, an optional relationship between entities is shown by drawing a(n) __________ on the side of the optional entity.
database design
In DBLC, the phase after the database initial study is _____.
multivalued dependency
In a ______ situation, one key determines multiple values fo two other attributes and those attributes are independent of each other.
homonym
In a database context, the word _____ indicates the use of the same attribute name to label different attributes.
surrogate
In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of _______ keys.
flexibility
In a real-world environment, we must strike a balance between design integrity and ______.
keys
In a relational model, ____ are also used to establish relationships among tables and to ensure the integrity of the data.
differential backup
In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.
dependency
In a(n) ______ diagram, the arrows above the attribute indicates all desirable dependencies
performance
In order to meet __________ requirements, you may have to denormalize some portions of a database design.
high processing speeds
In organizations that generate large number of transactions, _____ are often a top priority in database design.
DataSet
In the ADO.NET framework, the _____ is a disconnected, memory-resident representation of the database.
Command
In the ADO.NET framework, the _____ object contains the actual SQL code or a stored procedure call to be run by the database.
driver manager
In the ODBC architecture, a(n) _____ is in charge of managing all database connections.
4NF
In the _____, no row may contain two or more multivalued facts about an entity.
distributed database design
In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____.
data analysis and requirements
In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____.
(min, max)
In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities.
keys
In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable.
foreign
It becomes difficult to create a suitable _______ key when the related table uses a composite primary key.
entity
Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level.
relational data model
MySQL is an example of the _____.
provide fault tolerance.
NoSQL databases:
three
Normalization works through a series of stages called normal forms. For most purposes in business database design, ______ stages are as high as you need to go in the normalization process.
Windows
ODBC works on the _____ operating system.
UDA
ODBC, OLE-DB, and ADO.NET form the backbone of the ____ architecture.
DKNF
Of the following normal forms, _____ is mostly of theoretical interests.
JDBC
One of the advantages of _____ over other middleware is that it requires no configuration on the client side.
prototype
Programmers use database tools to ________ the applications during coding of the programs.
formatted
Raw data must be properly _________ for storage, processing and presentation.
integrity
Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null.
4NF
Some very specialized applications may require normalization beyond the ____.
many-to-many
Students and classes have a _____ relationship.
entity
The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity.
rectangle
The Chen notation identifies a weak entity by using a double-walled entity ________.
solid
The Crow's Foot notation depicts the strong relationship with a(n) _____ line between the entities.
(1,1)
The Crow's foot symbol with two vertical parallel lines indicates _____ cardinality.
data dictionary
The DBMS uses the ____________ to look up the required data component structures and relationships, thus relieving programmers from having to code such complex relationships in each program.
.NET
The Microsoft ______ framework is a component-based platform for developing distributed, heterogeneous, interoperable applications aimed at manipulating any type of data over any network under any operating system and any programming language.
Core
The ODBC API standard defines three levels of compliance: _____, Level-1, and Level-2, which provide increasing levels of functionality.
NOT NULL
The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column.
object-oriented
The _____ data model is said to be a semantic data model.
object-oriented
The _____ data model uses the concept of inheritance.
system catalog
The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents.
XML schema
The _____ is an advanced data definition language that is used to describe the structure of XML data documents.
DataAdapter
The _____ is the most specialized object in the ADO.NET framework.
external
The _____ model is the end users' view of the data environment.
entity relationship
The _____ model uses the term connectivity to label the relationship types.
entity relationship
The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text.
UML
The _____ notation of entity-relationship modelling can be used for both conceptual and implementation modelling.
1:M
The _____ relationship is the "relational model ideal."
1:1
The _____ relationship should be rare in any relational database design.
concept of keys
The ________ is central to a discussion of normalization
logical design
The ___________ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.
conceptual design
The ______________ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.
normalization
The combination of ____________ and ER modeling yields a useful ERD, whose entities may now be translated into appropriate table structures.
M:N
The conceptual model can handle _____ relationships and multivalued attributes.
compromises that include denormalization
The conflicts between design efficiency, information requirements, and performance are often resolved through __________.
collection of files
The database structure in a DBMS is stored as a _____.
derived
The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application.
conceptual
The entity relationship diagram (ERD) represents the _____ database as viewed by the end user.
M:N
The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities.
optional
The existence of a(n) _____ entity indicates that its minimum cardinality is zero.
technical aspects of hardware and software requirements.
The feasibility study during the planning phase of the Systems Development Life Cycle (SDLC) must address the:
conceptual design
The first step in ______________ is to discover the data element characteristics.
creating a detailed narrative of the organization's description of operations
The first step in building an entity-relationship diagram (ERD) is _____.
identify, analyze, and refine the business rules
The first step in developing the conceptual model using ER diagrams is to _____.
identify the ER model's central entity
The first step in the ER model verification process is to _____.
installing the DBMS
The implementation and loading phase of the Database Life Cycle (DBLC) involves _____.
CASE-produced
The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain.
analysis
The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC).
they cause a resource bottleneck since they have to execute separately for each user request.
The main disadvantage of using CGI scripts is that:
introducing changes
The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____.
numeric
The most likely datatype for a surrogate key is ______.
its expected use
The organization of data within folders in a manual file system is determined by _______.
redundancy
The price paid for increased performance though denormalization is a larger amount of _________.
anomalies
The problem with transitive dependencies is that they still yield data __________.
foreign
The proper use of ________ keys is crucial to controlling data redundancy.
boundaries
The proposed system is subject to limits known as ________, which are external to the system.
scope
The system's _____ defines the extent of the design according to operational requirements.
cohesivity
The term ________ describes the strength of the relationships found among a module's entities.
display it in a standard formatted way.
The web browser's job is to interpret the HTML code that it receives from a web server and to:
SELECT
To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN.
AutoNumber
To generate a surrogate key, Microsoft Access uses a(n) ____ data type.
binary
To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible.
views
Unnormalized tables yield no simple strategies for creating virtual tables known as _____.
XSLT
Using _____, you can extract data from an XML document and convert it into a text file.
It is slower than CGI scripts.
What is a disadvantage of using an API web-server interface?
BCNF
When a nonkey attribute is the determinant of a key attribute, the table is in 3NF but not in ______.
the 3NF and the BCNF
When a table contains only one candidate key, _____ are considered to be equivalent.
make sure that entities are in normal form before table structures are created
When designing a database, you should ______.
Crow's Foot notation ERDs
When designing a new database structure based on the business requirements of the end users, the database designer will construct a data model using a technique such as _____.
minimum
When indicating cardinality, the first value represents the _________ number of associated entities.
hardware
When selecting DBMS _______, items to consider include processors, RAM, and disk space.
symbols
When the specific cardinalities are not included on the diagram in Crow's Foot notation, cardinality is implied by the use of _____.
solid
When using the Crow's Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity.
unique
When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared.
ActiveX
Which is a client-side extension?
It allows the definition of new tags.
Which of the following is a characteristic of the XML metalanguage?
Memory chip errors
Which of the following is a hardware-induced database failure?
Common Gateway Interface
Which of the following is a well-defined web-server interface?
It provides security and authentication of users through user IDs and passwords.
Which of the following is true of a web application server?
metadictionaries
XML is used to create _________, or vocabularies for entire industries.
closing
XML tags must be well formed, that is, each opening tag must have a corresponding _________ tag.
improve processing capabilities of a browser.
You must use plug-ins and other client-side extensions to:
UML
____ is a language based on OO concepts that describes a set of diagrams and symbols used to graphically model a system.
ADO
____ provides a unified interface to access data from any programming language that uses the underlying OLE-DB objects.
Outer joins
_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems.
Constraints
_____ are normally expressed in the form of rules.
Structured data
_____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information.
Data encryption
_____ can render data useless to unauthorized users who might have violated some of the database security layers.
VBScript
_____ code is embedded inside an HTML page and is activated by triggering events such as clicking on a link.
Unstructured
_____ data exist in a format that does not lend itself to processing that yields information.
Unstructured
_____ data exist in the format in which they were collected.
Data inconsistency
_____ exists when different versions of the same data appear in different places.
Cardinality
_____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity.
UDA
_____ is a collection of technologies used to access any type of data source and manage the data through a common interface.
RDO
_____ is a higher-level, object-oriented application interface used to access remote database servers.
JavaScript
_____ is a scripting language that allows web authors to design interactive sites.
Virtualization
_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources.
ColdFusion/JRun
_____ is a web application server that provides the ability to connect web servers to multiple data sources.
Java
_____ is an object-oriented programming language developed by Sun Microsystems that runs on top of web browser software.
Data integrity
_____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
Knowledge
_____ is the body of information and facts about a specific subject.
Predicate
_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false.
Granularity
_____ refers to the level of detail represented by the values stored in a table's row.
Performance tuning
_____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed.
M:N
_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities.
PROJECT
_____ returns only the attributes requested, in the order in which they are requested.
DBMSs
_____ serve as the intermediary between the user and the database.
SELECT
_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition.
SDS
______ refer to a cloud computing-base data management service that provides relational data storage, access, and management to companies of all sizes without the typical high costs of in house hardware, software, infrastructure, and personnel.
Data warehouse
_______ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely.
In-memory databases
_______ refers to a type of database that stores most of its data in RAM rather than in hard disks.
Attributes
________ are characteristics of entities.
Information
________ is the result of processing raw data to reveal its meaning.
Identifiers
_________ are underlined in an ER diagram.
Normalization
_________ is a process to help reduce the likehood of data anomalies.
Metadata
_________ is data about data through which the end-user data are integrated and managed.
Dynamic
_________ webpages are at the heart of current generation websites.
Audit trails
____________ are usually provided by the database management system (DBMS) to check for access violations.
Data redundancy
____________ exists when the same data are stored unnecessarily at different places.
Systems analysis
____________ is the process that establishes the need for, and the extent of, an information system.
Diskless workstations
______________ allow end users to access the database without being able to download the information from their workstations.
Password security
______________ allows the assignment of access rights to specific authorized users.
Physical design
______________ could become a very technical job that affects not only the accessibility of the data in the storage device(s) but also the performance of the system.
Data inconsistency
______________ exists when different and conflicting versions of the same data appear in different places.
planning
"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).
analysis
"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC).
maintenance and evolution
The last step in the Database Life Cycle (DBLC) is _____.
Physical design
_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.
Information
_____ is the result of revealing the meaning of raw facts.
Metadata
_____ provide a description of the data characteristics and the set of relationships that link the data found within the database.
field
A _____ is a character or group of characters that has a specific meaning.
file
A _____ is a collection of related records.
record
A _____ is a logically connected set of one or more fields that describes a person, place, or thing.
module
A ______ is an information system component that handles a specific business function, such as inventory, orders, or payroll.
data model
A designer must have a thorough understanding of the company's data types, extent, and uses in order to develop an accurate __________.
single-user
A desktop database is a _____ database.
entity
A noun in a business rule translates to a(n) _____ in the data model.
relationship
A verb associating two nouns in a business rule translates to a(n) _____ in the data model.
multiuser
A workgroup database is a(n) _____ database.
enterprise
A(n) _____ database is used by an organization and supports many users across many departments.
relationship
A(n) _____ is bidirectional.
implementation
Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC).
the data always yields consistent results.
Data is said to be verifiable if:
operational databases
Data warehouse contains historical data obtained from the _____.
attribute
Each column in a relation represents a(n) _______.
tuple
Each row in a relation is called a(n) ______.
raw facts of interest to the end user
End-user data is _____.
business rules
From a database point of view, the collection of data becomes meaningful only when it reflects properly defined _____.
hierarchical
In the _____ model, each parent can have many children, but each child has only one parent.
hierarchical
In the _____ model, the basic logical structure is represented as an upside-down tree.
network
In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent.
Database Life Cycle
Making sure that the final product meets user and system requirements is the most critical _________ phase.
semistructured
Most data that can be encountered are best classified as _____.
database administrator
Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints.
hierarchical
One of the limitations of the _____ model is that there is a lack of standards.
operation
Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC).
database design
Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC).
implementation
The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC).
systems development
The process of creating an information system is known as _____.
query result set
The response of the DBMS to a query is the ___________
database system
The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment.
islands of information
The term ______________ refers to scattered locations storing the same basic data.
five
The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases.
They can serve as a communication tool between the users and designers.
Which of the following is true of business rules?
They enhance the user's ability to understand the data.
Which of the following is true of spreadsheet applications?
Data redundancy
Which of the following refers to the situation where different versions of the same data are stored at different places because they weren't updated consistently?
Constraints
_____ are important because they help to ensure data integrity.