Database Management - Quiz Questions (1-4)

Ace your homework & exams now with Quizwiz!

A open-source DBMS is: A free source-code RBMS that provides the functionality of an SQL-compliant DBMS A beta release of a commercial RDBMS An object-oriented database management system Source code for a commercial RDBMS

A free source-code RBMS that provides the functionality of an SQL-compliant DBMS

What will returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2 A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries A listing of all drivers A listing of the number of deliveries greater than 2 A listing of all drivers who made more than 2 deliveries

A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries

What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no; A listing of all drivers who made deliveries to state = 'MA', sorted by driver number A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state A count of all of the deliveries made to state = 'MA' by all drivers A listing of driver numbers

A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state

A property or characteristic of an entity type that is of interest to the organization is called a(n): Co-existing entity Primary key Relation Attribute

Attribute

The property by which subtype entities possess the values of all attributes of a supertype is called: Hierarchy reception Class management Attribute inheritance Generalization

Attribute inheritance

A device to measure or detect fingerprints or signatures is called a(n) ____________ device Biometric View Ink Laser

Biometric

A join operation: Brings together data with a common domain to be combined into a single table or view Causes two tables with a common domain to be combined into a single table or view Causes two disparate tables to be combined into a single table or view Is used to combine indexing operations

Causes two tables with a common domain to be combined into a single table or view

A primary key that consists of more than one attribute is called a: Foreign key Composite key Multivalued key Cardinal key

Composite key

Whether in top-down or bottom-up modeling approaches, a primary key that consists of more than one attribute is called a: Foreign key Composite key Multivalued key Cardinal key

Composite key

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions Logging Concurrency control Transaction authorization Multiple management

Concurrency control

In the SQL language, the _________ statement is used to make table definitions Create session Create table Create index

Create table

What does this represent? ABC011 Ian ACB012 June ABC013 Carl ABCO15 Rita Information Knowledge Wisdom Data

Data

Data modeling may be the most important part of the systems development process because: Data characteristics are important in the design on programs and other system components The data in a system are generally less complex than the processes and play a central role in development It is the easiest Limited program maintenance

Data characteristics are important in the design on programs and other system components

Including data capture controls (i.e., dropdown lists) helps reduce _________ deteriorated data problems External data source Inconsistent metadata Data entry Lack of organizational commitment

Data entry

___________ is a component of the relationship data model included to specify business rules to maintain the integrity of data when they are manipulated Business rule constraint Data integrity Business integrity Data structure

Data integrity

Converting data from the format of its source to the format of its destination is called: Data transformation Data loading Data scrubbing Data storage

Data transformation

__________ is a technical function responsible for database design, security, and disaster recovery Data administration Database administration Tech support Operations

Database administration

Which of the following functions develop integrity controls? Database planning Database analysis Database implementation Database design

Database design

The coding or scrambling of data so that humans cannot read them is called: Demarcation Hiding Encoding Encryption

Encryption

The logical representation of an organization's data is called an: Entity-relationship model Database model Relationship systems design Database entity diagram

Entity-relationship model

T/F: A member of a subtype does NOT necessarily have to be a member of the supertype

False

T/F: An enterprise data model describes the scope of data for only one information system

False

T/F: In MySQL workbench, Views are generally stored under tables

False

T/F: In the figure below, Name would be an ideal identifier STUDENT SID Name Address (Street, City, State, ZipCode)

False

T/F: The following code is an example of a Subquery: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID;

False

T/F: The following two SQL statements will produce different results: Select last_name, first_name from customer where state = 'MA' or state = 'NY' or state = 'NJ' or state = 'NH' or state = 'CT'; Select last_name, first_name from customer where state in ('MA','NY','NJ','NH','CT');

False

T/F: The physical structure and storage organization of the database is decided upon during the implementation phase of the systems development life cycle

False

T/F: There can be multivalued attributes in a relation

False

An attribute in a relation of a database that serves as a the primary key of another relation in the same database is called a: Link attribute Link key Foreign key Foreign attribute

Foreign key

A constraint between two attributes is called a(n): Functional relation Attribute dependency Functional dependency Functional relation constraint

Functional dependency

Which of the following finds all group meeting stated conditions? SELECT WHERE HAVING FIND

HAVING

Data governance can be defined as: A means to slow down the speed of data High-level organizational groups and processes that oversee data stewardship A government task force for defining data quality A means to increase the speed of data

High-level organizational groups and processes that oversee data stewardship

This represents: Agent No Agent Name ABC011 Ian ABC012 Carl ABC013 Deb ABC015 Jim Data Information Knowledge Wisdom

Information

Data that describes the properties of other data are: Logical Metadata Physical Relationships

Metadata

___________ are anomalies that can be caused by editing data in tables Insertion Deletion Modification Creation

Modification

The entity integrity rule states that: No primary key attribute can be null Referential integrity must be maintained across all entities Each entity must have a primary key A primary key must have only one attribute

No primary key attribute can be null

The last part of the SQL query to be read is the ___________ statement SELECT FROM WHERE ORDER BY

ORDER BY

Which of the following are goals of the normalization process? Minimize data redundancy Complicate the referential integrity constraints Improve efficiency of update, insert and delete functions Only A and C

Only A and C

The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID; All rows of the Order_T Table regardless of matches with the Customer_T Table All rows of the Customer_T Table regardless of matches with the Order_T Table Only rows that match both Customer_T and Order_T Tables Only rows that don't match both Customer_T and Order_T Tables

Only rows that match both Customer_T and Order_T Tables

Which of the following MySQL commands is used to recover a transactions? REVOKE DROP GRANT ROLLBACK

ROLLBACK

A two-dimensional table of data sometimes is called a: Group Set Declaration Relation

Relation

__________________ are established between entities in a well-structured database model so that the desired information can be retrieved Entities Relationships Lines Attributes

Relationships

A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? Drop user businessanalyst@localhost Delete update privilege on schema Withdraw update privilege from businessanalyst@localhost Revoke update on schema from businessanalyst@localhost

Revoke update on schema from businessanalyst@localhost

The process of defining one or more subtypes of a supertype and forming relationships is called: Specialization Generalization Creating discord Selecting classes

Specialization

The most common type of entities are: Strong Weak Associative Dependent

Strong

A simultaneous relationship between the instances of three entity types is called a ____________ relationship Binary Ternary Unary Primary

Ternary

A candidate key must satisfy all of the following conditions EXCEPT: The key must uniquely identify the row The key must indicate the row's position in the table The key must be non-redundant Each non-key attribute is functionally dependent upon it

The key must indicate the row's position in the table

3NF is achieved when The table is in 2NF and any transitive dependencies have been removed The table is in 2NF and non key columns all depend on the key The table is in 2NF and every determinant is a candidate key The table is in 2NF and all occurrences of a row must have the same number of columns

The table is in 2NF and any transitive dependencies have been removed

A good definition of 1NF is that There are no transitive dependencies There are no multi-valued attributes There is only one key All non keyed fields are dependent on the key

There are no multi-valued attributes

T/F: A database table is defined using the data definition language (DDL)

True

T/F: A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants

True

T/F: A person is an example of an entity

True

T/F: A procedure is run by calling it by its name

True

T/F: A single occurrence of an entity is called an entity instance

True

T/F: A well-structured relations contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies

True

T/F: Data modeling is about documenting rules and policies of an organization that govern data

True

T/F: Entity clustering is a methodology for grouping one of more entity types and associated relationships into a single abstract entity type

True

T/F: Figuring out what attributes you want in your query before you write the query will help with query writing

True

T/F: In an E-R diagram, an associative entity is represented by a rounded rectangle

True

T/F: In order to find out what customers have not placed an order for particular item, one might use the NOT qualifier along with EXISTS

True

T/F: Once executed, procedures and functions will be stored in the schema, which eliminates the need to execute them again each time a query is executed

True

T/F: One property of a relation is that each attribute within a relation has a unique name

True

T/F: Target and Sony Playstation experienced data breaches due to poor database administration

True

T/F: The default primary key for an associative relation consists of the two primary key attributes from the other two relations

True

T/F: The default value of autocommit in MySQL is 1

True

T/F: The user interface includes languages, menus, and other facilities by which users interact with various system components

True

T/F: To write a query involving a unary relationship, it is a good practice to create two tables based on the original table

True

T/F: Views can be used to improve database security

True

T/F: When creating tables, it's important to decide which columns will allow null values before the table is created

True

Because applications are often developed independently in file processing systems: The data is always non-redundant Unplanned duplicate data files are the rule rather than the expectation Data can always be shared with others There is a large volume of file I/O

Unplanned duplicate data files are the rule rather than the expectation


Related study sets

Exam 3 Study Guide : Introduction to Business

View Set

PREPU: Ch. We 60 Assessment of Neurologic Function

View Set

South Africa - Apartheid & Mandela

View Set

Managerial Test One BJU Cassarow

View Set