Modern Database Management - Final Study S
Which type of file is easiest to update? hashed sequential clustered indexed
*A. Hashed*
Given the functional dependency (A, B) → C, then ________. A) A and B together → C B) A → C C) B → A D) Both A and B are correct
A and B together -> C
Which of the following is true about the functional dependency (A, B) → (C, D)? A) A is the determinant of C. B) A and B together are determined by C and D together. C) A and B together determine D. D) C and D together determine A.
A and B together determine D
A relation is in second normal form (2NF) if and only if it is in 1NF and ________. A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every candidate key is a determinant
All non-key attributes are determined by the entire primary key
In which data model would a code table appear?
Physical
Ternary
The figure below is an example of mapping which type of relationship? A) First B) Second C) Unary D) Ternary
Which of the following is NOT true about the functional dependency A → (X, Y)? A) X is functionally dependent on A. B) A determines Y. C) X and Y together determine A. D) X and Y are functionally dependent on A.
X and Y together determine A
All of the following are valid datatypes in Oracle 11g EXCEPT: A) varchar2. B) boolean. C) blob. D) number
boolean
A determinant that determines all the other columns in a relation is a ________. A) record B) surrogate key C) foreign key D) candidate key
candidate key
An advantage of partitioning is: A) efficiency. B) remote optimization. C) extra space and update time. D) increase redundancy.
efficiency.
A constraint between two attributes is called a(n): A) functional relation. B) attribute dependency. C) functional dependency. D) functional relation constraint
functional dependency
While Oracle has responsibility for managing data inside a tablespace, the tablespace as a whole is managed by the: A) user. B) CEO. C) XML. D) operating system.
operating system
explain plan.
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers and join tables to prepare query results is the:
An appropriate datatype for adding a sound clip would be: A) VarChar. B) Char. C) Blob. D) Date.
Blob
The normal form which removes any remaining functional dependencies because there was more than one primary key for the same nonkeys is called: A) fifth normal form. B) fourth normal form. C) Boyce-Codd normal form. D) sixth normal form.
Boyce-Codd normal form.
An appropriate datatype for one wanting a fixed-length type for last name would include: A) VarChar. B) Char. C) Blob. D) Date.
Char
Sensitivity testing involves:
Checking to see if missing data will greatly impact results
In the SQL language, the __________ statement is used to make table definitions.
Create table
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space
Data Integrity
Physical database design decisions must be made carefully because of impacts on:
Data accessibility, response times, security
A component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated:
Data integrity
The relational data model consists of which components?
Data structure, Data manipulation, and Data integrity
A detailed coding scheme recognized by system software for representing organizational data is called a:
Data type
The value a field will assume unless the user enters an explicit value for an instance of that field is called a:
Default value
If the removal of facts about one entity results in the unintentional loss of data about another entity, this is referred to as a(n) ________. A) normalization anomaly B) insertion anomaly C) update anomaly D) deletion anomaly
Deletion anomaly
A nonkey attribute is also called a(n): A) column. B) unimportant datum. C) descriptor. D) address.
Descriptor
The attribute on the left-hand side of the arrow in a functional dependency is the:
Determinant
A continguous section of disk storage space is called a(n):
Extent
The smallest unit of application data recognized by system software is a:
Field
A _________ is a technique for physically arranging the records of a file on secondary storage devices.
File organization
When all multivalued attributes have been removed from a relation, it is said to be in: first normal form second normal form Boyce-Codd normal form third normal form
First normal form
When all multivalued attributes have been removed from a relation, it is said to be in: A) first normal form. B) second normal form. C) Boyce-Codd normal form. D) third normal form
First normal form
An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a:
Foreign key
A constraint between two attributes is called a(n): A) functional relation. B) attribute dependency. C) functional dependency. D) functional relation constraint
Functional dependency
Which type of file is easiest to update? A) Sequential B) Hashed C) Indexed D) Clustered
Hashed
An attribute that may have more than one meaning is call a:
Homonym
Which of the following is an objective of selecting a data type?
Improve data integrity
Which of the following is an objective of selecting a data type? A) Represent a small number of possible values B) Maximize storage space C) Limit security D) Improve data integrity
Improve data integrity
Candidate
In the figure below, Customer_ID in the CUSTOMER Table is which type of key? A) Composite B) Candidate C) Standard D) Grouped
TRUE.
In the figure below, each employee has exactly one manager. Answer : T / F
COMPOSITE
In the figure below, the primary key for "Order Line" is which type of key? A) Composite B) Foreign C) Standard D) Grouped
An associative entity
In the figure below, what is depicted? A) A one-to-one relationship B) A unary relationship C) A one-to-many relationship D) An associative entity
Recursive foreign
In the figure below, what type of key is depicted? A) Primary B) Recursive primary C) Composite D) Recursive foreign
Strong entity/weak entity
In the figure below, what type of relationship do the relations depict? A) Strong entity/weak entity B) Multivalued C) Composite foreign key D) One-to-many
one-to-Many
In the figure below, what type of relationship do the relations depict? A) Strong entity/weak entity B) One-to-many C) Ternary D) Many-to-many
A domain definition consists of the following components EXCEPT: domain name data type integrity constraints size
Integrity constraints
An index on columns from two or more tables that come from the same domain of values is called a:
Join index
All of the following are the main goals of normalization EXCEPT: A) minimize data redundancy. B) simplify the enforcement of referential integrity. C) maximize storage space. D) make it easier to maintain data
Maximize Storage Pace
All of the following are that main goals of normalization EXCEPT: A. minimize data redundancy. B. simplify the enforcement of referential integrity. C. maximize storage space. D. make it easier to maintain data.
Maximize storage space
Which of the following are properties of relations? A) Each attribute has the same name. B) No two rows in a relation are identical. C) There are multivalued attributes in a relation. D) All columns are numeric
No two rows in a relation are identical.
While Oracle has responsibility for managing data inside a tablespace, the tablespace as a whole is managed by the:
Operating system
In which data model would a code table appear? A) Conceptual B) Logical C) Physical D) Data layout
Physical
A ________ is a field of data used to locate a related field or record.
Pointer
An attribute (or attributes) that uniquely identifies each row in a relation is called a:
Primary key
________ partitioning is a method in which each partition is defined by a range of values for one or more columns of a normalized table
Range
A ________ limits the set of permissible values a field may assume.
Range control
An integrity control supported by a DBMS is:
Range control
Ensures that a value of a field exists in another database table
Referential integrity
A rule that states that each foreign key value must match a primary key value in the other relation is called the: A. referential integrity constraint. B. key match rule. C. entity key group rule. D. foreign/primary match rule
Referential integrity constraint
A component is always used in only one item.
Referring to the figure below, which of the following is NOT true? A) A component is part of an item. B) A component is always used in only one item. C) A component can be part of an item. D) A component may be used in many items
A two-dimensional table of data is called a:
Relation
Which of the following violates the atomic property of relations? A) Sam B) Hinz C) Sam Hinz D) Atomic
Sam Hinz
A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?
Second
One field or combination of fields for which more than one record may have the same combination of values is called a(n):
Secondary key
________ is often used to decide whether or not missing data can be ignored
Sensitivity testing
Which type of file is most efficient with storage space? Clustered Indexed Sequential Hashed
Sequential
Which type of file is most efficient with storage space? A) Sequential B) Hashed C) Indexed D) Clustered
Sequential
Two or more attributes having different names but the same meaning are called:
Synonyms
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is call a:
Tablespace
________ partitioning distributes the columns of a table into several separate physical records. A) Horizontal B) Crossways C) Vertical D) Final
Vertical
A relation that contains minimal redundancy and allows easy use is considered to be: A) clean. B) simple. C) complex. D) well-structured.
Well-structured
All of the following are common denormalization opportunities EXCEPT: A) two entities with a one-to-one relationship. B) a one-to-many relationship. C) a many-to-many relationship with nonkey attributes. D) reference data.
a one-to-many relationship
An alternative name for an attribute is called a(n): A) synonym. B) alias. C) alternate attribute. D) related characteristic
alias
If a table is designed so that every determinant is a candidate key, then that relation is in ________. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Boyce-Codd Normal Form
boyce codd normal form
Which of the following is not true about a relation? A) Has rows containing data about an entity B) Has columns containing data about attributes of the entity C) Has cells that hold only a single value D) Can have two identical rows
can have two identical rows
A(n) ________ is defined by the tables and column of columns by which the tables are joined
cluster
A method to allow adjacent secondary memory space to contain rows from several tables is called: A) cluttering. B) clustering. C) concatenating. D) compiling.
clustering
A method to allow adjacent secondary memory space to contain rows from several tables is called: concatenating. clustering. cluttering. compiling
clustering
A combination of two or more columns used to identify particular rows in a relation is a ________. A) record B) composite key C) foreign key D) surrogate key
composite key
A primary key that consists of MORE THAN ONE ATTRIBUTE IS CALLED A: A) foreign key. B) composite key. C) multivalued key. D) cardinal key.
composite key
In the SQL language, the ________ statement is used to make table definitions. A) create session B) create table C) create index D) select
create table
When a regular entity type contains a multivalued attribute, one must: A) create a single relation with multiple lines for each instance of the multivalued attribute. B) create two new relations, one containing the multivalued attribute. C) create two new relations, both containing the multivalued attribute. D) delete the relation and start over.
create two new relations, one containing the multivalued attribute.
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A) query design B) programmer productivity C) data integrity D) data integration
data integrity
The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A. query design B. programmer productivity C. data integrity D. data integration
data integrity
________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated. A) Business rule constraint B) Data integrity C) Business integrity D) Data structure
data integrity
________ can be built into the physical structure of fields for many database management systems
data integrity controls
A form of denormalization where the same data are purposely stored in multiple places in the database is called: data replication advanced placement data duplication horizontal partitioning
data replication
A form of denormalization where the same data are purposely stored in multiple places in the database is called: A) data duplication. B) data replication. C) advanced placement. D) horizontal partitioning
data replication.
A ________ is a detailed coding scheme recognized by system software, such as a DBMS, for representing organizational data A) DBMS code. B) data type. C) SQL. D) DB layout.
data type
A detailed coding scheme recognized by system software for representing organizational data is called a(n): A) DBMS code. B) data type. C) SQL. D) DB layout.
data type
The value a field will assume unless the user enters an explicit value for an instance of that field is called a: default value range control null value gurand
default value
________ problems are encountered when removing data with transitive dependencies. A) Insertion B) Modification C) Deletion D) Merging
deletion
Designing physical files requires ________ of where and when data are used in various ways. keys hints descriptions maps
descriptions
Designing physical files requires ________ of where and when data are used in various ways. A) maps B) descriptions C) keys D) hints
descriptions
A nonkey attribute is also called a(n): A) column. B) unimportant datum. C) descriptor. D) address.
descriptor
Given the functional dependency A → (B, C), A is a(n) ________. A) independent variable B) dependent variable C) determinant D) composite determinant
determinant
Given the functional dependency (A, B) → C, (A, B) is a ________. A) dependent variable B) determinant C) composite determinant D) Both B and C are correct
determinant AND composite determinant
The attribute on the left-hand side of the arrow in a functional dependency is the: A) candidate key. B) determinant. C) foreign key. D) primary key.
determinate
In most cases, the goal of ________ dominates the design process. A. efficient data processing B. quick pointer updates C. security D. shorter design times
efficient data processing
In most cases, the goal of ________ dominates the design process. A) efficient data processing B) security C) quick pointer updates D) shorter design times
efficient data processing
A factor to consider when choosing a file organization is: A) inefficient data retrieval. B) DDL. C) efficient storage. D) DML.
efficient storage.
A primary key whose value is unique across all relations is called a(n): A) global primary key. B) inter-table primary key. C) enterprise key. D) foreign global key
enterprise key
The ________ states that no primary key attribute may be null. A) referential integrity constraint B) entity integrity rule C) partial specialization rule D) range domain rule
entity integrity rule
A relation is in domain/key normal form if ________. A) every key of the relation is a logical consequence of the definition of constraints and determinants B) every key of the relation is a logical consequence of the definition of constraints and domains C) every constraint on the relation is a logical consequence of the definition of keys and determinants D) every constraint on the relation is a logical consequence of the definition of keys and domains
every constraint on the relation is a logical consequence of the definition of keys and domains
A relation is in Boyce-Codd normal form (BCNF) if and only if it is in 3NF and ________. A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every determinant is a candidate key
every determinant is a candidate key
A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers and join tables to prepare query results is the: A) explain plan. B) show optimization. C) explain query. D) analyze query
explain plan
A contiguous section of disk storage space is called a(n): sector tablespace extent track
extent
A contiguous section of disk storage space is called a(n): A) track. B) sector. C) extent. D) tablespace.
extent
A disadvantage of partitioning is: A) simplicity. B) remote optimization. C) extra space and update time. D) shorter technology spans.
extra space and update time
A disadvantage of partitioning is:
extra space and update time.
An attribute is also known as a ________. A) table B) relation C) row D) field
field
The smallest unit of application data recognized by system software is a: A) field. B) row. C) data type. D) column.
field
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. A) physical pointer B) retrieval program C) file organization D) update program
file organization
A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices.
file organization
A table that meets the definition of a relation is in ________. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Boyce-Codd Normal Form
first normal form
Saying that two entities are functionally dependent means that ________. A) the entities are always connected by a mathematical equation B) for one of the entities, if we are given the value of that entity, we can determine the value of one other entity C) for both of the entities, if we are given the value of one entity, we can determine the value of the other entity D) the functional dependency will have to be removed through normalization.
for one of the entities, if we are given the value of that entity, we can determine the value of one other entity
A key consisting of one or more columns that is a primary key in another relation is a ________. A) composite key B) candidate key C) foreign key D) surrogate key
foreign key
An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A) link attribute. B) link key. C) foreign key. D) foreign attribute.
foreign key
Referential integrity constraints are used to limit the possible values of a ________. A) composite key B) candidate key C) foreign key D) surrogate key
foriegn key
If a relation is in BCNF, and each multivalued dependency has been moved to a relation of its own, then the first relation is in ________. A) Third Normal Form B) Boyce-Codd Normal Form C) Fourth Normal Form D) Domain/key normal form
fourth normal form
The normal form which deals with multivalued dependencies is called: A) fifth normal form. B) fourth normal form. C) Boyce-Codd normal form. D) sixth normal form.
fourth normal form.
A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) hash index table
hash index table
In which type of file is multiple key retrieval not possible? A) Sequential B) Hashed C) Indexed D) Clustered
hashed
A routine that converts a primary key value into a relative record number is called a(n)______
hashing algorithm
A(n) ________ is a routine that converts a primary key value into a relative record number. index pointer program hashing algorithm record index calculator pointing algorithm
hashing algorithm
A(n) ________ is a routine that converts a primary key value into a relative record number. A) record index calculator B) index pointer program C) hashing algorithm D) pointing algorithm
hashing algorithm
A file organization where files are not stored in any particular order is considered a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) heap file organization
heap file organization
A(n) ________ overrides whatever query plan Oracle would naturally create for a query based upon the query optimizer.
hint
An attribute that may have more than one meaning is called a(n): A) homonym. B) alias. C) double defined attribute. D) synonym.
homonym
Distributing the rows of data into separate files is called ________
horizontal partitioning
Distributing the rows of data into separate files is called: normalization file allocation vertical partitioning horizontal partitioning
horizontal partitioning.
Distributing the rows of data into separate files is called: A) normalization. B) horizontal partitioning. C) vertical partitioning. D) file allocation.
horizontal partitioning.
A table or other data structure used to determine the location of rows in a file that satisfy some condition is called a(n)______
index
Having to enter facts about two entities when we want to enter facts about only one is an example of ________. A) insertion anomaly B) update anomaly C) deletion anomaly D) normalization anomaly
insertion anomaly
A domain definition consists of all of the following components EXCEPT: A) domain name. B) data type. C) integrity constraints. D) size.
integrity constraints
An index on columns from two or more tables that come from the same domain of values is called a(n) ________ index
join
An index on columns from two or more tables that come from the same domain of values is called a: A) bitmap index. B) multivalued index. C) join index. D) transaction index
join index.
A combination of one or more columns used to identify particular rows in a relation is a ________. A) record B) field C) key D) tuple
key
Because data table row locations are dictated by the hashing algorithm, only one ________ can be used for hashing-based retrieval
key
The need to ________ relations commonly occurs when different views need to be integrated. A) metadata B) system C) drop D) merge
merge
________ are anomalies that can be caused by editing data in tables. A) Insertion B) Deletion C) Modification D) Creation
modification
A relation is in fourth normal form if it is in BCNF and it has no ________. A) transitive dependencies B) multivalued dependencies C) partial dependencies D) deletion dependencies
multivalued dependencies
All of the following are horizontal partitioning methods in Oracle EXCEPT: A) key range partitioning. B) hash partitioning. C) multivalued partitioning. D) composite partitioning
multivalued partitioning
The entity integrity rule states that: A) no primary key attribute can be null. B) referential integrity must be maintained across all entities. C) each entity must have a primary key. D) a primary key must have only one attribute
no primary key attribute can be null.
A requirement to begin designing physical files and databases is: A. normalized relations. B. physical tables created. C. implementation complete. D. all datatypes determined
normalized relations
A requirement to begin designing physical files and databases is: A) normalized relations. B) physical tables created. C) implementation complete. D) all datatypes determined.
normalized relations
In general, each relation should have ________. A) one and only one theme B) one or more themes C) exactly two themes D) one or two themes
one and only theme
Understanding the steps involved in transforming EER diagrams into relations is important because: A) one must be able to check the output of a CASE tool. B) there are rarely legitimate alternatives from which to choose. C) CASE tools can model any situation. D) CASE tools model hypothetical business problems
one must be able to check the output of a CASE tool.
A strategy for breaking apart queries and running each part on separate processors is called
parallel query processing
A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: A) multiple partition queries. B) perpendicular query processing. C) parallel query processing. D) query optimization.
parallel query processing.
A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a ________ dependency. A) partial key-based B) partial functional C) cross key D) merged relation
partial functional
________ database specification indicates all the parameters for data storage that are then input to database implementation. A) Logical B) Physical C) Schematic D) Conceptual
physical
A(n) ________ is a field of data used to locate a related field or record.
pointer
A(n) ________ is a field of data used to locate a related field or record. A) key B) index C) lock D) pointer
pointer
An attribute (or attributes) that uniquely identifies each row in a relation is called a: A) column. B) foreign field. C) primary key. D) duplicate key.
primary key
When designing a database, one of the candidate keys in a relation is selected as the ________. A) composite key B) primary key C) foreign key D) surrogate key
primary key
A ________ limits the set of permissible values a field must assume
range control
An integrity control supported by a DBMS is: A) substitute estimates. B) security. C) range control. D) GUI guards.
range control
A ________ is used to limit the possible values of a foreign key. A) composite key B) surrogate key C) functional dependency D) referential integrity constraint
referential integrity constraint
A rule that states that each foreign key value must match a primary key value in the other relation is called the: A) referential integrity constraint. B) key match rule. C) entity key group rule. D) foreign/primary match rule.
referential integrity constraint.
A two-dimensional table of data sometimes is called a: A) group. B) set. C) declaration. D) relation.
relation
A tuple is also known as a ________. A) table B) relation C) row D) field
row
A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form? A) First B) Second C) Third D) Fourth
second
A ________ key is one field or a combination of fields for which more than one record may have the same combination of values
secondary
One field or combination of fields for which more than one record may have the same combination of values is called a(n): A) secondary key. B) index. C) composite key. D) linked key
secondary key
A form of database specification which maps conceptual requirements is called: A) logical specifications. B) response specifications. C) security specifications. D) physical specifications
security specifications
A key decision in the physical design process is: A. ignoring the size of the database. B. deciding the e-r diagrams. C. deciding on the monitor. D. selecting structures.
selecting structures
A key decision in the physical design process is: A) ignoring the size of the database. B) selecting structures. C) deciding on the monitor. D) deciding the e-r diagrams
selecting structures
The only reason(s) for having relations is to ________. A) store instances of functional dependencies B) store equation components C) store equation results D) Both B and C are correct
store instances of functional dependencies
An artificial column added to a relation to serve as the primary key is a ________. A) composite key B) candidate key C) foreign key D) surrogate key
surrogate key
Two or more attributes having different names but the same meaning are called: A) homonyms. B) aliases. C) synonyms. D) alternate attributes.
synonyms
A relation is also known as a(n) ________. A) table B) tuple C) relationship D) attribute
table
Data is represented in the form of: A) data trees. B) tables. C) data notes. D) chairs.
tables
A ________ is a named set of disk storage elements in which physical files for database tables may be stored
tablespace
Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): A) extent. B) table. C) tablespace. D) partition
tablespace
A candidate key must satisfy all of the following EXCEPT: The key must uniquely identify the row The key must indicate the row's position in the table The key must be nonredundant Each nonkey attribute is functionally dependent One of the primary key.
the key must indicate the row's position in the table
A candidate key must satisfy all of the following conditions EXCEPT: A) the key must uniquely identify the row. B) the key must indicate the row's position in the table. C) the key must be nonredundant. D) each nonkey attribute is functionally dependent upon it.
the key must indicate the row's position in the table
Which of the following is true for a relation? A) Entities in a column vary as to kind. B) The order of the columns is important. C) The order of the rows is unimportant. D) More than one column can use the same name.
the order of the rows is uninmportant
A relation is in third normal form (3NF) if and only if it is in 2NF and ________. A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every candidate key is a determinant
there are no non-key attributes determined by another non-key attribute
A method for handling missing data is to: delete the associated row. track missing data with special reports perform insensitivity testing. substitute with random numbers for the missing data.
track missing data with special reports
A method for handling missing data is to: A) substitute with random numbers for the missing data. B) track missing data with special reports. C) perform insensitivity testing. D) delete the associated row
track missing data with special reports.
Database access frequencies are estimated from: random number generation security violations user logins transaction volumes
transaction volumes
Database access frequencies are estimated from: A) transaction volumes. B) user logins. C) security violations. D) random number generation
transaction volumes
A functional dependency between two or more nonkey attributes is called a: A) partial functional dependency. B) partial nonkey dependency. C) transitive dependency. D) partial transitive dependency.
transitive dependency
Denormalization is the process of transforming normalized relations into ________ physical record specifications
unnormalized
Suppose that you need to update one value of the column SalesCost in a relation. The way the relation is constructed, this value actually needs to be changed in three different rows. However, you only change the value in two of the rows. You have just created a(n) ________. A) normalization anomaly B) insertion anomaly C) update anomaly D) deletion anomaly
update anomaly
All of the following are objectives when selecting a data type *EXCEPT*: represent all possible values support all data manipulations improve data integrity use a lot of storage space
use a lot of storage space
All of the following are objectives when selecting a data type EXCEPT: A) represent all possible values. B) improve data integrity. C) support all data manipulations. D) use a lot of storage space
use a lot of storage space
________ distributes the columns of a table into several separate physical records
vertical partitioning
A relation that contains minimal redundancy and allows easy use is considered to be: A) clean. B) simple. C) complex. D) well-structured
well-structured
Horizontal partitioning makes sense: when only one category is allowed when partitions must be organized the same when less security is needed when different categories of a table's rows are processed separately
when different categories of a table's rows are processed separately
Horizontal partitioning makes sense: A) when different categories of a table's rows are processed separately. B) when less security is needed. C) when partitions must be organized the same. D) when only one category is allowed
when different categories of a table's rows are processed separately.
Indexes are most useful for columns that frequently appear in ________ clauses of SQL statements
where