CSC 2250 Final Study Guide

Ace your homework & exams now with Quizwiz!

transitive dependency

A ____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key.

composite

A _____ attribute can be further subdivided to yield additional attributes.

simple

A _____ attribute is one that cannot be subdivided.

repeating group

A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence.

weak

A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship.

superkey

A _____ is any key that uniquely identifies each row.

foreign key

A _____ is the primary key of one table that has been placed into another table to create a common attribute.

secondary

A _____ key is defined as a key that is used strictly for data retrieval purposes.

unary

A _____ relationship exists when an association is maintained within a single entity.

ternary

A _____ relationship exists when three entities are associated.

business

A ____________ rule is a brief and precise narrative of a policy, procedure, or principle within a specific organization's environment.

partial dependency

A dependency based on only a part of a composite primary key is called a ___________.

dashed line

A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity.

candidate

A primary key is a(n) _______ key chosen to be the primary means by which rows of a table are uniquely identified.

repeating group

A relational table must not contain a(n) ________.

degree

A relationship ______ indicates the number of entities or participants associated with a relationship.

classification

A relationship __________ is difficult to establish if only one side of the relationship is known.

entities

A relationship is an association between _____.

it has no multivalued dependencies

A table is in 4NF if it is in 3NF, and _______.

anomalies

A table that displays data redundancies yields _________.

1NF

A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key, is said to be in ____.

3NF

A table that is in 2NF and contains no transitive dependencies is said to be in ____.

4NF

A table where all attributes are dependent on the primary key are independent of each other, and no row contains two or more multivalued facts about an entity, is said to be in ____.

BCNF

A table where every determinant is a candidate key is said to be in ____.

existence

A weak entity must be _________-dependent

DSN

A(n) ____ is a unique name by which the data source will be known to ODBC, and therefore, to applications.

API

A(n) _____ can use a shared connection to the database instead of creating a new one every time.

workgroup

A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization.

data definition language (DDL)

A(n) _____ enables a database administrator to describe schema components.

DTD

A(n) _____ file provides the composition of the database's logical model and defines the syntax rules for an XML document.

DBMS

A(n) _____ is a collection of programs that manages the database structure and controls access to the data stored in the database.

class

A(n) _____ is a collection of similar objects with a shared structure and behavior.

index

A(n) _____ is an orderly arrangement used to logically access rows in a table.

entity

A(n) _____ is anything about which data are to be collected and stored.

attribute

A(n) _____ is the equivalent of a field in a file system.

domain

A(n) _____ is the set of possible values for a given attribute.

natural

A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s).

application

A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.

inner join

A(n) _____ only returns matched records from the tables that are being joined.

model

A(n) _____'s main function is to help one understand the complexities of the real-world environment.

unique

A(n) ______ index is an index in which the index key can have only one pointer value (row) associated with it.

query

A(n) ______ is a specific request issued to the DBMS for data manipulation.

required

A(n) _______ attribute is an attribute that must have a value.

partial dependency

A(n) _______ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally dependent on W, and XY is the primary key.

database

A(n) _________ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system.

business rule

A(n) ___________ is a brief, precise, and unambiguous description of a policy, procedure, or principle within a specific organization.

data dictionary

A(n) _____________ provides a detailed description of all tables found within the user/designer-created database.

CGI

APIs are faster than ____ scripts because the code resides in memory and there is no need to run an external program for each request.

logical data independence

According to Codd's _____ rule of relational database, "Application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns)."

entity names

According to the data-modeling checklist, _____ should be nouns that are familiar to business, should be short and meaningful, and should document abbreviations, synonyms, and aliases for each entity.

good decision making

Accurate, relevant, and timely information is the key to ____.

documentation

After testing is concluded, the final _________ is reviewed and printed and end users are trained.

1NF

All relational tables satisfy the _____ requirements.

ActiveX

Among client-side extensions, _____ is a Microsoft specification for writing programs that run inside the Internet Explorer browser.

iterative

An ERD is created through an ________ process.

semistructured

An XML database supports the storage and management of _____ XML data.

cannot be further subdivided

An atomic attribute ______.

atomicity

An attribute that cannot be further subdivided is said to display _____.

prime

An attribute that is part of a key is known as a(n) ______ attribute.

existence

An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence.

temporary

An example of denormalization is using a _______ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows.

planning

An initial assessment of the information flow-and-extent requirements must be made during the _______ portion of the Systems Development Life Cycle (SDLC).

schema

An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chosen database.

bridge

Another name for a composite entity is a(n) _____ entity.

web-to-database middleware

Another name for a database server-side extension program is _____.

prime attribute

Any attribute that is at least part of a key is known as a _________.

determinant

Any attribute whose value determines other values within a row is known as a _________.

determines

Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B.

candidate

BCNF can be violated only if the table contains more than one _______ key.

OLE-DB

Based on Microsoft's Component Object Model (COM), _____ is database middleware that adds object-oriented functionality for access to relational and nonrelational data.

primary

Because a partial dependency can exist only when a table's primary key is composed of several attributes, a table whose _______ key consists of only a single attribute is automatically in 2NF once it is in 1NF.

modules

Because real-world database design is generally done by teams, the database design is probably divided into major components known as ________.

information

Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design.

data integrity problems

Data redundancy produces ____.

2NF

Data warehouse routinely uses ____ structures in its complex, multilevel, multisource data environment.

Julian

Date attributes contain calendar dates stored in a special format known as the _____ date format.

partial

Dependencies based on only a part of a composite primary key are known as _______ dependencies.

analysis

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

verification process

During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.

column

Each table _____ represents an attribute.

HTTP GET

Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web server using the TCP/IP Internet protocol.

root element

Every XML document has a _____.

3NF

For most business transactional databases, we should normalize relations into ______.

1NF

From a structural point of view, 2NF is better than ____.

2NF

From a structural point of view, 3NF is better than _____.

derived

From a system functionally point of view, ______ attribute values can be calculated when they are needed to write reports or invoices.

the level of detail represented by the values in a table's row

Granularity refers to _________.

one

Ideally, an entity identifier is composed of _____ attribute(s).

optional to

If Tiny College has some departments that are classified as "research only" and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity.

partial dependencies

If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have ___ based on this composite candidate key, even when the primary key chosen is a single attribute.

recursive

If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship.

strong

If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity.

RDBMS

If database tables are treated as though they were files in a file system, the ___ never has a chance to demonstrate its superior data-handling capabilities.

atomicity

Improving ____ leads to more flexible queries.

small circle (O)

In Crow's Foot notation, an optional relationship between entities is shown by drawing a(n) __________ on the side of the optional entity.

database design

In DBLC, the phase after the database initial study is _____.

multivalued dependency

In a ______ situation, one key determines multiple values fo two other attributes and those attributes are independent of each other.

homonym

In a database context, the word _____ indicates the use of the same attribute name to label different attributes.

surrogate

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of _______ keys.

flexibility

In a real-world environment, we must strike a balance between design integrity and ______.

keys

In a relational model, ____ are also used to establish relationships among tables and to ensure the integrity of the data.

differential backup

In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.

dependency

In a(n) ______ diagram, the arrows above the attribute indicates all desirable dependencies

performance

In order to meet __________ requirements, you may have to denormalize some portions of a database design.

high processing speeds

In organizations that generate large number of transactions, _____ are often a top priority in database design.

DataSet

In the ADO.NET framework, the _____ is a disconnected, memory-resident representation of the database.

Command

In the ADO.NET framework, the _____ object contains the actual SQL code or a stored procedure call to be run by the database.

driver manager

In the ODBC architecture, a(n) _____ is in charge of managing all database connections.

4NF

In the _____, no row may contain two or more multivalued facts about an entity.

distributed database design

In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____.

data analysis and requirements

In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____.

(min, max)

In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities.

keys

In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable.

foreign

It becomes difficult to create a suitable _______ key when the related table uses a composite primary key.

entity

Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level.

relational data model

MySQL is an example of the _____.

provide fault tolerance.

NoSQL databases:

three

Normalization works through a series of stages called normal forms. For most purposes in business database design, ______ stages are as high as you need to go in the normalization process.

Windows

ODBC works on the _____ operating system.

UDA

ODBC, OLE-DB, and ADO.NET form the backbone of the ____ architecture.

DKNF

Of the following normal forms, _____ is mostly of theoretical interests.

JDBC

One of the advantages of _____ over other middleware is that it requires no configuration on the client side.

prototype

Programmers use database tools to ________ the applications during coding of the programs.

formatted

Raw data must be properly _________ for storage, processing and presentation.

integrity

Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null.

4NF

Some very specialized applications may require normalization beyond the ____.

many-to-many

Students and classes have a _____ relationship.

entity

The CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity.

rectangle

The Chen notation identifies a weak entity by using a double-walled entity ________.

solid

The Crow's Foot notation depicts the strong relationship with a(n) _____ line between the entities.

(1,1)

The Crow's foot symbol with two vertical parallel lines indicates _____ cardinality.

data dictionary

The DBMS uses the ____________ to look up the required data component structures and relationships, thus relieving programmers from having to code such complex relationships in each program.

.NET

The Microsoft ______ framework is a component-based platform for developing distributed, heterogeneous, interoperable applications aimed at manipulating any type of data over any network under any operating system and any programming language.

Core

The ODBC API standard defines three levels of compliance: _____, Level-1, and Level-2, which provide increasing levels of functionality.

NOT NULL

The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column.

object-oriented

The _____ data model is said to be a semantic data model.

object-oriented

The _____ data model uses the concept of inheritance.

system catalog

The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents.

XML schema

The _____ is an advanced data definition language that is used to describe the structure of XML data documents.

DataAdapter

The _____ is the most specialized object in the ADO.NET framework.

external

The _____ model is the end users' view of the data environment.

entity relationship

The _____ model uses the term connectivity to label the relationship types.

entity relationship

The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text.

UML

The _____ notation of entity-relationship modelling can be used for both conceptual and implementation modelling.

1:M

The _____ relationship is the "relational model ideal."

1:1

The _____ relationship should be rare in any relational database design.

concept of keys

The ________ is central to a discussion of normalization

logical design

The ___________ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.

conceptual design

The ______________ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.

normalization

The combination of ____________ and ER modeling yields a useful ERD, whose entities may now be translated into appropriate table structures.

M:N

The conceptual model can handle _____ relationships and multivalued attributes.

compromises that include denormalization

The conflicts between design efficiency, information requirements, and performance are often resolved through __________.

collection of files

The database structure in a DBMS is stored as a _____.

derived

The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application.

conceptual

The entity relationship diagram (ERD) represents the _____ database as viewed by the end user.

M:N

The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities.

optional

The existence of a(n) _____ entity indicates that its minimum cardinality is zero.

technical aspects of hardware and software requirements.

The feasibility study during the planning phase of the Systems Development Life Cycle (SDLC) must address the:

conceptual design

The first step in ______________ is to discover the data element characteristics.

creating a detailed narrative of the organization's description of operations

The first step in building an entity-relationship diagram (ERD) is _____.

identify, analyze, and refine the business rules

The first step in developing the conceptual model using ER diagrams is to _____.

identify the ER model's central entity

The first step in the ER model verification process is to _____.

installing the DBMS

The implementation and loading phase of the Database Life Cycle (DBLC) involves _____.

CASE-produced

The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain.

analysis

The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC).

they cause a resource bottleneck since they have to execute separately for each user request.

The main disadvantage of using CGI scripts is that:

introducing changes

The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____.

numeric

The most likely datatype for a surrogate key is ______.

its expected use

The organization of data within folders in a manual file system is determined by _______.

redundancy

The price paid for increased performance though denormalization is a larger amount of _________.

anomalies

The problem with transitive dependencies is that they still yield data __________.

foreign

The proper use of ________ keys is crucial to controlling data redundancy.

boundaries

The proposed system is subject to limits known as ________, which are external to the system.

scope

The system's _____ defines the extent of the design according to operational requirements.

cohesivity

The term ________ describes the strength of the relationships found among a module's entities.

display it in a standard formatted way.

The web browser's job is to interpret the HTML code that it receives from a web server and to:

SELECT

To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN.

AutoNumber

To generate a surrogate key, Microsoft Access uses a(n) ____ data type.

binary

To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible.

views

Unnormalized tables yield no simple strategies for creating virtual tables known as _____.

XSLT

Using _____, you can extract data from an XML document and convert it into a text file.

It is slower than CGI scripts.

What is a disadvantage of using an API web-server interface?

BCNF

When a nonkey attribute is the determinant of a key attribute, the table is in 3NF but not in ______.

the 3NF and the BCNF

When a table contains only one candidate key, _____ are considered to be equivalent.

make sure that entities are in normal form before table structures are created

When designing a database, you should ______.

Crow's Foot notation ERDs

When designing a new database structure based on the business requirements of the end users, the database designer will construct a data model using a technique such as _____.

minimum

When indicating cardinality, the first value represents the _________ number of associated entities.

hardware

When selecting DBMS _______, items to consider include processors, RAM, and disk space.

symbols

When the specific cardinalities are not included on the diagram in Crow's Foot notation, cardinality is implied by the use of _____.

solid

When using the Crow's Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity.

unique

When you define a table's primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared.

ActiveX

Which is a client-side extension?

It allows the definition of new tags.

Which of the following is a characteristic of the XML metalanguage?

Memory chip errors

Which of the following is a hardware-induced database failure?

Common Gateway Interface

Which of the following is a well-defined web-server interface?

It provides security and authentication of users through user IDs and passwords.

Which of the following is true of a web application server?

metadictionaries

XML is used to create _________, or vocabularies for entire industries.

closing

XML tags must be well formed, that is, each opening tag must have a corresponding _________ tag.

improve processing capabilities of a browser.

You must use plug-ins and other client-side extensions to:

UML

____ is a language based on OO concepts that describes a set of diagrams and symbols used to graphically model a system.

ADO

____ provides a unified interface to access data from any programming language that uses the underlying OLE-DB objects.

Outer joins

_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems.

Constraints

_____ are normally expressed in the form of rules.

Structured data

_____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information.

Data encryption

_____ can render data useless to unauthorized users who might have violated some of the database security layers.

VBScript

_____ code is embedded inside an HTML page and is activated by triggering events such as clicking on a link.

Unstructured

_____ data exist in a format that does not lend itself to processing that yields information.

Unstructured

_____ data exist in the format in which they were collected.

Data inconsistency

_____ exists when different versions of the same data appear in different places.

Cardinality

_____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity.

UDA

_____ is a collection of technologies used to access any type of data source and manage the data through a common interface.

RDO

_____ is a higher-level, object-oriented application interface used to access remote database servers.

JavaScript

_____ is a scripting language that allows web authors to design interactive sites.

Virtualization

_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources.

ColdFusion/JRun

_____ is a web application server that provides the ability to connect web servers to multiple data sources.

Java

_____ is an object-oriented programming language developed by Sun Microsystems that runs on top of web browser software.

Data integrity

_____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

Knowledge

_____ is the body of information and facts about a specific subject.

Predicate

_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false.

Granularity

_____ refers to the level of detail represented by the values stored in a table's row.

Performance tuning

_____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed.

M:N

_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities.

PROJECT

_____ returns only the attributes requested, in the order in which they are requested.

DBMSs

_____ serve as the intermediary between the user and the database.

SELECT

_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition.

SDS

______ refer to a cloud computing-base data management service that provides relational data storage, access, and management to companies of all sizes without the typical high costs of in house hardware, software, infrastructure, and personnel.

Data warehouse

_______ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely.

In-memory databases

_______ refers to a type of database that stores most of its data in RAM rather than in hard disks.​

Attributes

________ are characteristics of entities.

Information

________ is the result of processing raw data to reveal its meaning.

Identifiers

_________ are underlined in an ER diagram.

Normalization

_________ is a process to help reduce the likehood of data anomalies.

Metadata

_________ is data about data through which the end-user data are integrated and managed.

Dynamic

_________ webpages are at the heart of current generation websites.

Audit trails

____________ are usually provided by the database management system (DBMS) to check for access violations.

Data redundancy

____________ exists when the same data are stored unnecessarily at different places.

Systems analysis

____________ is the process that establishes the need for, and the extent of, an information system.

Diskless workstations

______________ allow end users to access the database without being able to download the information from their workstations.

Password security

______________ allows the assignment of access rights to specific authorized users.

Physical design

______________ could become a very technical job that affects not only the accessibility of the data in the storage device(s) but also the performance of the system.

Data inconsistency

______________ exists when different and conflicting versions of the same data appear in different places.

planning

"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).

analysis

"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC).

maintenance and evolution

The last step in the Database Life Cycle (DBLC) is _____.

Physical design

_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.

Information

_____ is the result of revealing the meaning of raw facts.

Metadata

_____ provide a description of the data characteristics and the set of relationships that link the data found within the database.

field

A _____ is a character or group of characters that has a specific meaning.

file

A _____ is a collection of related records.

record

A _____ is a logically connected set of one or more fields that describes a person, place, or thing.

module

A ______ is an information system component that handles a specific business function, such as inventory, orders, or payroll.

data model

A designer must have a thorough understanding of the company's data types, extent, and uses in order to develop an accurate __________.

single-user

A desktop database is a _____ database.

entity

A noun in a business rule translates to a(n) _____ in the data model.

relationship

A verb associating two nouns in a business rule translates to a(n) _____ in the data model.

multiuser

A workgroup database is a(n) _____ database.

enterprise

A(n) _____ database is used by an organization and supports many users across many departments.

relationship

A(n) _____ is bidirectional.

implementation

Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC).

the data always yields consistent results.

Data is said to be verifiable if:

operational databases

Data warehouse contains historical data obtained from the _____.

attribute

Each column in a relation represents a(n) _______.

tuple

Each row in a relation is called a(n) ______.

raw facts of interest to the end user

End-user data is _____.

business rules

From a database point of view, the collection of data becomes meaningful only when it reflects properly defined _____.

hierarchical

In the _____ model, each parent can have many children, but each child has only one parent.

hierarchical

In the _____ model, the basic logical structure is represented as an upside-down tree.

network

In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent.

Database Life Cycle

Making sure that the final product meets user and system requirements is the most critical _________ phase.

semistructured

Most data that can be encountered are best classified as _____.

database administrator

Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints.

hierarchical

One of the limitations of the _____ model is that there is a lack of standards.

operation

Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC).

database design

Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC).

implementation

The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC).

systems development

The process of creating an information system is known as _____.

query result set

The response of the DBMS to a query is the ___________

database system

The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment.

islands of information

The term ______________ refers to scattered locations storing the same basic data.

five

The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases.

They can serve as a communication tool between the users and designers.

Which of the following is true of business rules?

They enhance the user's ability to understand the data.

Which of the following is true of spreadsheet applications?

Data redundancy

Which of the following refers to the situation where different versions of the same data are stored at different places because they weren't updated consistently?

Constraints

_____ are important because they help to ensure data integrity.


Related study sets

Psychology chapter 1 test questions (mod 1, 2, 3)

View Set

Chapter 1 Intro to insurance Test

View Set

3.3.11 Chapter 7 Coding Conditions of the blood and Immunological Systems

View Set

Economics - 1.2 Business Economics

View Set

Macroeconomics Chapter 13 True/False

View Set

Nclex- Saunders questions Diabetes with rationales

View Set

NCLEX/ATI/Text Questions - NSG 200 - Respiratory/Cardiovascular Assessment

View Set

Pharmacology Exam 1: ANS, Respiratory, Cardiac

View Set

Chapter 20: Transition to Parenthood

View Set

2.3 Classifications and data to review

View Set