Database quiz study

Ace your homework & exams now with Quizwiz!

What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2 A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries A listing of all drivers A listing of the number of deliveries greater than 2 A listing of all drivers who made more than 2 deliveries

A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries

What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = 'MA' group by driver_no A listing of all drivers who made deliveries to state = 'MA', sorted by driver number A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state A count of all of the deliveries made to state = 'MA' by all drivers A listing of driver numbers

A listing of each driver who made deliveries to state = 'MA' as well as the number of deliveries that each driver has made to that state

A property or characteristic of an entity type that is of interest to the organization is call a(n): co-existing entity primary key relation attribute

Attribute

In the SQL language, the ________ statement is used to make table definitions. create session create table create index create index

Create table

________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated. Business rule constraint Data integrity Business integrity Data structure

Data integrity

________ is a technical function responsible for database design, security, and disaster recovery. Data administration Database administration Tech support Operations

Database administration

Which of the following functions develop integrity controls? Database planning Database analysis Database implementation Database design

Database design

A member of a subtype does NOT necessarily have to be a member of the supertype. (T/F)

False

An enterprise data model describes the scope of data for only one information system. (T/F)

False

In MySQL workbench, Views are generally stored under tables. (T/F)

False

The following code is an example of a Subquery. SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID (T/F)

False

The following two SQL statements will produce different results. Select last_name, first_name from customer where state = 'MA' or state = 'NY' or state = 'NJ' or state = 'NH' or state = 'CT'; Select last_name, first_name from customer where state in ('MA','NY','NJ','NH','CT') (T/F)

False

The physical structure and storage organization of the database is decided upon during the implementation phase of the systems development life cycle. (T/F)

False

There can be multivalued attributes in a relation. (T/F)

False

Total specialization has 1 line

False

When transforming a one-to-one relationship, a new relation is always created. (T/F)

False

Which of the following finds all groups meeting stated conditions? SELECT WHERE HAVING FIND

HAVING

Data that describes the properties of other data are: metadata logical physical relationships

Metadata

________ are anomalies that can be caused by editing data in tables. Insertion Deletion Modification Creation

Modification

The last part of an SQL query to be read is the _____________statement. SELECT FROM WHERE ORDER BY

ORDER BY

Which of the following are goals of the normalization process? Minimize data redundancy Complicate the referential integrity constraints Improve efficiency of update, insert and delete functions Only A and C

Only A and C (Minimize data redundancy & Improve efficiency of update, insert and delete functions)

Which of the following MySQL commands is used to recover a transaction? REVOKE DROP GRANT ROLLBACK

ROLLBACK

_____________ are established between entities in a well-structured database model so that the desired information can be retrieved. Entities Relationships Lines attributes

Relationships

A business analyst has the privilege to view and update a particular schema. Which of the following SQL statements will change privileges such that he/she cannot update anymore? Drop user businessanalyst@localhost Delete update privilege on schema Withdraw update privilege from businessanalyst@localhost Revoke update on schema from businessanalyst@localhost

Revoke update on schema from businessanalyst@localhost

The most common type of entities are: Strong Weak Associative Dependent

Strong

A simultaneous relationship between the instances of three entity types is called a ______________ relationship. binary ternary unary primary

Ternary

A database table is defined using the data definition language (DDL). (T/F)

True

A deadlock results when two or more transactions need a common resource, but neither can proceed until the other releases the resource it wants. (T/F)

True

A person is an example of an entity. (T/F)

True

A procedure is run by calling it by its name. (T/F)

True

A single occurrence of an entity is called an entity instance. (T/F)

True

A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies. (T/F)

True

Data modeling is about documenting rules and policies of an organization that govern data. (T/F)

True

Entity clustering is a methodology for grouping one or more entity types and associated relationships into a single abstract entity type. (T/F)

True

Figuring out what attributes you want in your query before you write the query will help with query writing. (T/F)

True

In an E-R diagram, an associative entity is represented by a rounded rectangle. (T/F)

True

In order to find out what customers have not placed an order for a particular item, one might use the NOT qualifier along with EXISTS. (T/F)

True

Once executed, procedures and functions will be stored in the schema, which eliminates the need to execute them again each time a query is executed. (T/F)

True

One property of a relation is that each attribute within a relation has a unique name. (T/F)

True

Target and Sony Playstation experienced data breaches due to poor database administration. (T/F)

True

The default primary key for an associative relation consists of the two primary key attributes from the other two relations. (T/F)

True

The default value of autocommit in MySQL is 1. (T/F)

True

The user interface includes languages, menus, and other facilities by which users interact with various system components. (T/F)

True

To write a query involving a unary relationship, it is a good practice to create two tables based on the original table. (T/F)

True

Views can be used to improve database security. (T/F)

True

When creating tables, it's important to decide which columns will allow null values before the table is created. (T/F)

True

An open-source DBMS is: a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. a beta release of a commercial RDBMS. an object-oriented database management system. source code for a commercial RDBMS.

a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.

The property by which subtype entities possess the values of all attributes of a supertype is called: hierarchy reception. class management. attribute inheritance. generalization.

attribute inheritance

A device to measure or detect fingerprints or signatures is called a(n) ________ device. biometric view ink laser

biometric

A join operation: brings together data from two different fields. causes two tables with a common domain to be combined into a single table or view. causes two disparate tables to be combined into a single table or view. is used to combine indexing operations.

causes two tables with a common domain to be combined into a single table or view.

A primary key that consists of more than one attribute is called a: foreign key. composite key. multivalued key. cardinal key.

composite key.

Whether in top-down or bottom-up modeling approaches, a primary key that consists of more than one attribute is called a: foreign key. composite key. multivalued key. cardinal key.

composite key.

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. logging concurrency control transaction authorization multiple management

concurrency control

Data modeling may be the most important part of the systems development process because: the data in a system are generally less complex than the processes and play a central role in development. data characteristics are important in the design of programs and other system components. it is the easiest. limited program maintenance

data characteristics are important in the design of programs and other system components.

Including data capture controls (i.e., dropdown lists) helps reduce ________ deteriorated data problems. external data source inconsistent metadata data entry lack of organizational commitment

data entry

Converting data from the format of its source to the format of its destination is called: data transformation. data loading. data scrubbing. data storage.

data transformation.

The coding or scrambling of data so that humans cannot read them is called: demarcation. hiding. encoding. encryption.

encryption

The logical representation of an organizations's data is called a(n): database model entity-relationship model relationship systems design database entity diagram

entity-relationship model

Getting poor data from a supplier is a(n) ________ reason for deteriorated data quality. external data source inconsistent metadata data entry problem lack of organizational commitment

external data source

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: link attribute. link key. foreign key. foreign attribute.

foreign key

A constraint between two attributes is called a(n): functional relation. attribute dependency. functional dependency. functional relation constraint.

functional dependency.

Data governance can be defined as: a means to slow down the speed of data. high-level organizational groups and processes that oversee data stewardship. a government task force for defining data quality. a means to increase the speed of data.

high-level organizational groups and processes that oversee data stewardship.

The entity integrity rule states that: no primary key attribute can be null. referential integrity must be maintained across all entities. each entity must have a primary key. a primary key must have only one attribute.

no primary key attribute can be null.

The following code would include: SELECT Customer_T.CustomerID, Order_T.CustomerID, CustomerName, OrderID FROM Customer_T, Order_T WHERE Customer_T.CustomerID = Order_T. CustomerID all rows of the Order_T Table regardless of matches with the Customer_T Table. all rows of the Customer_T Table regardless of matches with the Order_T Table. only rows that match both Customer_T and Order_T Tables. only rows that don't match both Customer_T and Order_T Tables.

only rows that match both Customer_T and Order_T Tables.

A two-dimensional table of data sometimes is called a: group. set. declaration. relation.

relation

The process of defining one or more subtypes of a supertype and forming relationships is called: specialization. generalization. creating discord. selecting classes.

specialization

A candidate key must satisfy all of the following conditions EXCEPT: the key must uniquely identify the row. the key must indicate the row's position in the table. the key must be nonredundant. each nonkey attribute is functionally dependent upon it.

the key must indicate the row's position in the table.

3NF is achieved when the table is in 2NF and any transitive dependencies have been removed the table is in 2NF and non key columns all depend on the key the table is in 2NF and every determinant is a candidate key the table is in 2NF and all occurrences of a row must have the same number of columns.

the table is in 2NF and any transitive dependencies have been removed

A good definition of 1NF is that there are no transitive dependencies there are no multi-valued attributes there is only one key all non keyed fields are dependent on the key

there are no multi-valued attributes

Because applications are often developed independently in file processing systems: the data is always non-redundant unplanned duplicate data files are the rule rather than the exception. data can always be shared with others there is a large volume of file I/O.

unplanned duplicate data files are the rule rather than the exception.


Related study sets

Refrigeration & A/C Technology 8th Edition _ Unit 09 (Oil Chemistry and Management)

View Set

Chapter 28: Preventing and Managing Aggressive Behavior

View Set

fahmy wiklikis - Russian- English

View Set

Marketing Research & Decision Making

View Set

Nevada statutes and codes common to life and health insurance only Quiz Questions Chapter Eleven

View Set

Microbio CHAPTER 1 If David's lesion is indeed being caused by a pathogenic organism, which of the following terms would be used to describe the relationship between David and the microbe?

View Set