Modern Database Management - Final Study S

Ace your homework & exams now with Quizwiz!

Which type of file is easiest to update? hashed sequential clustered indexed

*A. Hashed*

Given the functional dependency (A, B) → C, then ________. A) A and B together → C B) A → C C) B → A D) Both A and B are correct

A and B together -> C

Which of the following is true about the functional dependency (A, B) → (C, D)? A) A is the determinant of C. B) A and B together are determined by C and D together. C) A and B together determine D. D) C and D together determine A.

A and B together determine D

A relation is in second normal form (2NF) if and only if it is in 1NF and ________. A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every candidate key is a determinant

All non-key attributes are determined by the entire primary key

In which data model would a code table appear?

Physical

Ternary

The figure below is an example of mapping which type of relationship? A) First B) Second C) Unary D) Ternary

Which of the following is NOT true about the functional dependency A → (X, Y)? A) X is functionally dependent on A. B) A determines Y. C) X and Y together determine A. D) X and Y are functionally dependent on A.

X and Y together determine A

All of the following are valid datatypes in Oracle 11g EXCEPT: A) varchar2. B) boolean. C) blob. D) number

boolean

A determinant that determines all the other columns in a relation is a ________. A) record B) surrogate key C) foreign key D) candidate key

candidate key

An advantage of partitioning is: A) efficiency. B) remote optimization. C) extra space and update time. D) increase redundancy.

efficiency.

A constraint between two attributes is called a(n): A) functional relation. B) attribute dependency. C) functional dependency. D) functional relation constraint

functional dependency

While Oracle has responsibility for managing data inside a tablespace, the tablespace as a whole is managed by the: A) user. B) CEO. C) XML. D) operating system.

operating system

explain plan.

A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers and join tables to prepare query results is the:

An appropriate datatype for adding a sound clip would be: A) VarChar. B) Char. C) Blob. D) Date.

Blob

The normal form which removes any remaining functional dependencies because there was more than one primary key for the same nonkeys is called: A) fifth normal form. B) fourth normal form. C) Boyce-Codd normal form. D) sixth normal form.

Boyce-Codd normal form.

An appropriate datatype for one wanting a fixed-length type for last name would include: A) VarChar. B) Char. C) Blob. D) Date.

Char

Sensitivity testing involves:

Checking to see if missing data will greatly impact results

In the SQL language, the __________ statement is used to make table definitions.

Create table

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space

Data Integrity

Physical database design decisions must be made carefully because of impacts on:

Data accessibility, response times, security

A component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated:

Data integrity

The relational data model consists of which components?

Data structure, Data manipulation, and Data integrity

A detailed coding scheme recognized by system software for representing organizational data is called a:

Data type

The value a field will assume unless the user enters an explicit value for an instance of that field is called a:

Default value

If the removal of facts about one entity results in the unintentional loss of data about another entity, this is referred to as a(n) ________. A) normalization anomaly B) insertion anomaly C) update anomaly D) deletion anomaly

Deletion anomaly

A nonkey attribute is also called a(n): A) column. B) unimportant datum. C) descriptor. D) address.

Descriptor

The attribute on the left-hand side of the arrow in a functional dependency is the:

Determinant

A continguous section of disk storage space is called a(n):

Extent

The smallest unit of application data recognized by system software is a:

Field

A _________ is a technique for physically arranging the records of a file on secondary storage devices.

File organization

When all multivalued attributes have been removed from a relation, it is said to be in: first normal form second normal form Boyce-Codd normal form third normal form

First normal form

When all multivalued attributes have been removed from a relation, it is said to be in: A) first normal form. B) second normal form. C) Boyce-Codd normal form. D) third normal form

First normal form

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a:

Foreign key

A constraint between two attributes is called a(n): A) functional relation. B) attribute dependency. C) functional dependency. D) functional relation constraint

Functional dependency

Which type of file is easiest to update? A) Sequential B) Hashed C) Indexed D) Clustered

Hashed

An attribute that may have more than one meaning is call a:

Homonym

Which of the following is an objective of selecting a data type?

Improve data integrity

Which of the following is an objective of selecting a data type? A) Represent a small number of possible values B) Maximize storage space C) Limit security D) Improve data integrity

Improve data integrity

Candidate

In the figure below, Customer_ID in the CUSTOMER Table is which type of key? A) Composite B) Candidate C) Standard D) Grouped

TRUE.

In the figure below, each employee has exactly one manager. Answer : T / F

COMPOSITE

In the figure below, the primary key for "Order Line" is which type of key? A) Composite B) Foreign C) Standard D) Grouped

An associative entity

In the figure below, what is depicted? A) A one-to-one relationship B) A unary relationship C) A one-to-many relationship D) An associative entity

Recursive foreign

In the figure below, what type of key is depicted? A) Primary B) Recursive primary C) Composite D) Recursive foreign

Strong entity/weak entity

In the figure below, what type of relationship do the relations depict? A) Strong entity/weak entity B) Multivalued C) Composite foreign key D) One-to-many

one-to-Many

In the figure below, what type of relationship do the relations depict? A) Strong entity/weak entity B) One-to-many C) Ternary D) Many-to-many

A domain definition consists of the following components EXCEPT: domain name data type integrity constraints size

Integrity constraints

An index on columns from two or more tables that come from the same domain of values is called a:

Join index

All of the following are the main goals of normalization EXCEPT: A) minimize data redundancy. B) simplify the enforcement of referential integrity. C) maximize storage space. D) make it easier to maintain data

Maximize Storage Pace

All of the following are that main goals of normalization EXCEPT: A. minimize data redundancy. B. simplify the enforcement of referential integrity. C. maximize storage space. D. make it easier to maintain data.

Maximize storage space

Which of the following are properties of relations? A) Each attribute has the same name. B) No two rows in a relation are identical. C) There are multivalued attributes in a relation. D) All columns are numeric

No two rows in a relation are identical.

While Oracle has responsibility for managing data inside a tablespace, the tablespace as a whole is managed by the:

Operating system

In which data model would a code table appear? A) Conceptual B) Logical C) Physical D) Data layout

Physical

A ________ is a field of data used to locate a related field or record.

Pointer

An attribute (or attributes) that uniquely identifies each row in a relation is called a:

Primary key

________ partitioning is a method in which each partition is defined by a range of values for one or more columns of a normalized table

Range

A ________ limits the set of permissible values a field may assume.

Range control

An integrity control supported by a DBMS is:

Range control

Ensures that a value of a field exists in another database table

Referential integrity

A rule that states that each foreign key value must match a primary key value in the other relation is called the: A. referential integrity constraint. B. key match rule. C. entity key group rule. D. foreign/primary match rule

Referential integrity constraint

A component is always used in only one item.

Referring to the figure below, which of the following is NOT true? A) A component is part of an item. B) A component is always used in only one item. C) A component can be part of an item. D) A component may be used in many items

A two-dimensional table of data is called a:

Relation

Which of the following violates the atomic property of relations? A) Sam B) Hinz C) Sam Hinz D) Atomic

Sam Hinz

A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form?

Second

One field or combination of fields for which more than one record may have the same combination of values is called a(n):

Secondary key

________ is often used to decide whether or not missing data can be ignored

Sensitivity testing

Which type of file is most efficient with storage space? Clustered Indexed Sequential Hashed

Sequential

Which type of file is most efficient with storage space? A) Sequential B) Hashed C) Indexed D) Clustered

Sequential

Two or more attributes having different names but the same meaning are called:

Synonyms

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is call a:

Tablespace

________ partitioning distributes the columns of a table into several separate physical records. A) Horizontal B) Crossways C) Vertical D) Final

Vertical

A relation that contains minimal redundancy and allows easy use is considered to be: A) clean. B) simple. C) complex. D) well-structured.

Well-structured

All of the following are common denormalization opportunities EXCEPT: A) two entities with a one-to-one relationship. B) a one-to-many relationship. C) a many-to-many relationship with nonkey attributes. D) reference data.

a one-to-many relationship

An alternative name for an attribute is called a(n): A) synonym. B) alias. C) alternate attribute. D) related characteristic

alias

If a table is designed so that every determinant is a candidate key, then that relation is in ________. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Boyce-Codd Normal Form

boyce codd normal form

Which of the following is not true about a relation? A) Has rows containing data about an entity B) Has columns containing data about attributes of the entity C) Has cells that hold only a single value D) Can have two identical rows

can have two identical rows

A(n) ________ is defined by the tables and column of columns by which the tables are joined

cluster

A method to allow adjacent secondary memory space to contain rows from several tables is called: A) cluttering. B) clustering. C) concatenating. D) compiling.

clustering

A method to allow adjacent secondary memory space to contain rows from several tables is called: concatenating. clustering. cluttering. compiling

clustering

A combination of two or more columns used to identify particular rows in a relation is a ________. A) record B) composite key C) foreign key D) surrogate key

composite key

A primary key that consists of MORE THAN ONE ATTRIBUTE IS CALLED A: A) foreign key. B) composite key. C) multivalued key. D) cardinal key.

composite key

In the SQL language, the ________ statement is used to make table definitions. A) create session B) create table C) create index D) select

create table

When a regular entity type contains a multivalued attribute, one must: A) create a single relation with multiple lines for each instance of the multivalued attribute. B) create two new relations, one containing the multivalued attribute. C) create two new relations, both containing the multivalued attribute. D) delete the relation and start over.

create two new relations, one containing the multivalued attribute.

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A) query design B) programmer productivity C) data integrity D) data integration

data integrity

The storage format for each attribute from the logical data model is chosen to maximize ________ and minimize storage space. A. query design B. programmer productivity C. data integrity D. data integration

data integrity

________ is a component of the relational data model included to specify business rules to maintain the integrity of data when they are manipulated. A) Business rule constraint B) Data integrity C) Business integrity D) Data structure

data integrity

________ can be built into the physical structure of fields for many database management systems

data integrity controls

A form of denormalization where the same data are purposely stored in multiple places in the database is called: data replication advanced placement data duplication horizontal partitioning

data replication

A form of denormalization where the same data are purposely stored in multiple places in the database is called: A) data duplication. B) data replication. C) advanced placement. D) horizontal partitioning

data replication.

A ________ is a detailed coding scheme recognized by system software, such as a DBMS, for representing organizational data A) DBMS code. B) data type. C) SQL. D) DB layout.

data type

A detailed coding scheme recognized by system software for representing organizational data is called a(n): A) DBMS code. B) data type. C) SQL. D) DB layout.

data type

The value a field will assume unless the user enters an explicit value for an instance of that field is called a: default value range control null value gurand

default value

________ problems are encountered when removing data with transitive dependencies. A) Insertion B) Modification C) Deletion D) Merging

deletion

Designing physical files requires ________ of where and when data are used in various ways. keys hints descriptions maps

descriptions

Designing physical files requires ________ of where and when data are used in various ways. A) maps B) descriptions C) keys D) hints

descriptions

A nonkey attribute is also called a(n): A) column. B) unimportant datum. C) descriptor. D) address.

descriptor

Given the functional dependency A → (B, C), A is a(n) ________. A) independent variable B) dependent variable C) determinant D) composite determinant

determinant

Given the functional dependency (A, B) → C, (A, B) is a ________. A) dependent variable B) determinant C) composite determinant D) Both B and C are correct

determinant AND composite determinant

The attribute on the left-hand side of the arrow in a functional dependency is the: A) candidate key. B) determinant. C) foreign key. D) primary key.

determinate

In most cases, the goal of ________ dominates the design process. A. efficient data processing B. quick pointer updates C. security D. shorter design times

efficient data processing

In most cases, the goal of ________ dominates the design process. A) efficient data processing B) security C) quick pointer updates D) shorter design times

efficient data processing

A factor to consider when choosing a file organization is: A) inefficient data retrieval. B) DDL. C) efficient storage. D) DML.

efficient storage.

A primary key whose value is unique across all relations is called a(n): A) global primary key. B) inter-table primary key. C) enterprise key. D) foreign global key

enterprise key

The ________ states that no primary key attribute may be null. A) referential integrity constraint B) entity integrity rule C) partial specialization rule D) range domain rule

entity integrity rule

A relation is in domain/key normal form if ________. A) every key of the relation is a logical consequence of the definition of constraints and determinants B) every key of the relation is a logical consequence of the definition of constraints and domains C) every constraint on the relation is a logical consequence of the definition of keys and determinants D) every constraint on the relation is a logical consequence of the definition of keys and domains

every constraint on the relation is a logical consequence of the definition of keys and domains

A relation is in Boyce-Codd normal form (BCNF) if and only if it is in 3NF and ________. A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every determinant is a candidate key

every determinant is a candidate key

A command used in Oracle to display how the query optimizer intends to access indexes, use parallel servers and join tables to prepare query results is the: A) explain plan. B) show optimization. C) explain query. D) analyze query

explain plan

A contiguous section of disk storage space is called a(n): sector tablespace extent track

extent

A contiguous section of disk storage space is called a(n): A) track. B) sector. C) extent. D) tablespace.

extent

A disadvantage of partitioning is: A) simplicity. B) remote optimization. C) extra space and update time. D) shorter technology spans.

extra space and update time

A disadvantage of partitioning is:

extra space and update time.

An attribute is also known as a ________. A) table B) relation C) row D) field

field

The smallest unit of application data recognized by system software is a: A) field. B) row. C) data type. D) column.

field

A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices. A) physical pointer B) retrieval program C) file organization D) update program

file organization

A(n) ________ is a technique for physically arranging the records of a file on secondary storage devices.

file organization

A table that meets the definition of a relation is in ________. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Boyce-Codd Normal Form

first normal form

Saying that two entities are functionally dependent means that ________. A) the entities are always connected by a mathematical equation B) for one of the entities, if we are given the value of that entity, we can determine the value of one other entity C) for both of the entities, if we are given the value of one entity, we can determine the value of the other entity D) the functional dependency will have to be removed through normalization.

for one of the entities, if we are given the value of that entity, we can determine the value of one other entity

A key consisting of one or more columns that is a primary key in another relation is a ________. A) composite key B) candidate key C) foreign key D) surrogate key

foreign key

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a: A) link attribute. B) link key. C) foreign key. D) foreign attribute.

foreign key

Referential integrity constraints are used to limit the possible values of a ________. A) composite key B) candidate key C) foreign key D) surrogate key

foriegn key

If a relation is in BCNF, and each multivalued dependency has been moved to a relation of its own, then the first relation is in ________. A) Third Normal Form B) Boyce-Codd Normal Form C) Fourth Normal Form D) Domain/key normal form

fourth normal form

The normal form which deals with multivalued dependencies is called: A) fifth normal form. B) fourth normal form. C) Boyce-Codd normal form. D) sixth normal form.

fourth normal form.

A file organization that uses hashing to map a key into a location in an index where there is a pointer to the actual data record matching the hash key is called a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) hash index table

hash index table

In which type of file is multiple key retrieval not possible? A) Sequential B) Hashed C) Indexed D) Clustered

hashed

A routine that converts a primary key value into a relative record number is called a(n)______

hashing algorithm

A(n) ________ is a routine that converts a primary key value into a relative record number. index pointer program hashing algorithm record index calculator pointing algorithm

hashing algorithm

A(n) ________ is a routine that converts a primary key value into a relative record number. A) record index calculator B) index pointer program C) hashing algorithm D) pointing algorithm

hashing algorithm

A file organization where files are not stored in any particular order is considered a: A) hashed file organization. B) hash key. C) multi-indexed file organization. D) heap file organization

heap file organization

A(n) ________ overrides whatever query plan Oracle would naturally create for a query based upon the query optimizer.

hint

An attribute that may have more than one meaning is called a(n): A) homonym. B) alias. C) double defined attribute. D) synonym.

homonym

Distributing the rows of data into separate files is called ________

horizontal partitioning

Distributing the rows of data into separate files is called: normalization file allocation vertical partitioning horizontal partitioning

horizontal partitioning.

Distributing the rows of data into separate files is called: A) normalization. B) horizontal partitioning. C) vertical partitioning. D) file allocation.

horizontal partitioning.

A table or other data structure used to determine the location of rows in a file that satisfy some condition is called a(n)______

index

Having to enter facts about two entities when we want to enter facts about only one is an example of ________. A) insertion anomaly B) update anomaly C) deletion anomaly D) normalization anomaly

insertion anomaly

A domain definition consists of all of the following components EXCEPT: A) domain name. B) data type. C) integrity constraints. D) size.

integrity constraints

An index on columns from two or more tables that come from the same domain of values is called a(n) ________ index

join

An index on columns from two or more tables that come from the same domain of values is called a: A) bitmap index. B) multivalued index. C) join index. D) transaction index

join index.

A combination of one or more columns used to identify particular rows in a relation is a ________. A) record B) field C) key D) tuple

key

Because data table row locations are dictated by the hashing algorithm, only one ________ can be used for hashing-based retrieval

key

The need to ________ relations commonly occurs when different views need to be integrated. A) metadata B) system C) drop D) merge

merge

________ are anomalies that can be caused by editing data in tables. A) Insertion B) Deletion C) Modification D) Creation

modification

A relation is in fourth normal form if it is in BCNF and it has no ________. A) transitive dependencies B) multivalued dependencies C) partial dependencies D) deletion dependencies

multivalued dependencies

All of the following are horizontal partitioning methods in Oracle EXCEPT: A) key range partitioning. B) hash partitioning. C) multivalued partitioning. D) composite partitioning

multivalued partitioning

The entity integrity rule states that: A) no primary key attribute can be null. B) referential integrity must be maintained across all entities. C) each entity must have a primary key. D) a primary key must have only one attribute

no primary key attribute can be null.

A requirement to begin designing physical files and databases is: A. normalized relations. B. physical tables created. C. implementation complete. D. all datatypes determined

normalized relations

A requirement to begin designing physical files and databases is: A) normalized relations. B) physical tables created. C) implementation complete. D) all datatypes determined.

normalized relations

In general, each relation should have ________. A) one and only one theme B) one or more themes C) exactly two themes D) one or two themes

one and only theme

Understanding the steps involved in transforming EER diagrams into relations is important because: A) one must be able to check the output of a CASE tool. B) there are rarely legitimate alternatives from which to choose. C) CASE tools can model any situation. D) CASE tools model hypothetical business problems

one must be able to check the output of a CASE tool.

A strategy for breaking apart queries and running each part on separate processors is called

parallel query processing

A method that speeds query processing by running a query at the same time against several partitions of a table using multiprocessors is called: A) multiple partition queries. B) perpendicular query processing. C) parallel query processing. D) query optimization.

parallel query processing.

A functional dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key is called a ________ dependency. A) partial key-based B) partial functional C) cross key D) merged relation

partial functional

________ database specification indicates all the parameters for data storage that are then input to database implementation. A) Logical B) Physical C) Schematic D) Conceptual

physical

A(n) ________ is a field of data used to locate a related field or record.

pointer

A(n) ________ is a field of data used to locate a related field or record. A) key B) index C) lock D) pointer

pointer

An attribute (or attributes) that uniquely identifies each row in a relation is called a: A) column. B) foreign field. C) primary key. D) duplicate key.

primary key

When designing a database, one of the candidate keys in a relation is selected as the ________. A) composite key B) primary key C) foreign key D) surrogate key

primary key

A ________ limits the set of permissible values a field must assume

range control

An integrity control supported by a DBMS is: A) substitute estimates. B) security. C) range control. D) GUI guards.

range control

A ________ is used to limit the possible values of a foreign key. A) composite key B) surrogate key C) functional dependency D) referential integrity constraint

referential integrity constraint

A rule that states that each foreign key value must match a primary key value in the other relation is called the: A) referential integrity constraint. B) key match rule. C) entity key group rule. D) foreign/primary match rule.

referential integrity constraint.

A two-dimensional table of data sometimes is called a: A) group. B) set. C) declaration. D) relation.

relation

A tuple is also known as a ________. A) table B) relation C) row D) field

row

A relation that contains no multivalued attributes and has nonkey attributes solely dependent on the primary key but contains transitive dependencies is in which normal form? A) First B) Second C) Third D) Fourth

second

A ________ key is one field or a combination of fields for which more than one record may have the same combination of values

secondary

One field or combination of fields for which more than one record may have the same combination of values is called a(n): A) secondary key. B) index. C) composite key. D) linked key

secondary key

A form of database specification which maps conceptual requirements is called: A) logical specifications. B) response specifications. C) security specifications. D) physical specifications

security specifications

A key decision in the physical design process is: A. ignoring the size of the database. B. deciding the e-r diagrams. C. deciding on the monitor. D. selecting structures.

selecting structures

A key decision in the physical design process is: A) ignoring the size of the database. B) selecting structures. C) deciding on the monitor. D) deciding the e-r diagrams

selecting structures

The only reason(s) for having relations is to ________. A) store instances of functional dependencies B) store equation components C) store equation results D) Both B and C are correct

store instances of functional dependencies

An artificial column added to a relation to serve as the primary key is a ________. A) composite key B) candidate key C) foreign key D) surrogate key

surrogate key

Two or more attributes having different names but the same meaning are called: A) homonyms. B) aliases. C) synonyms. D) alternate attributes.

synonyms

A relation is also known as a(n) ________. A) table B) tuple C) relationship D) attribute

table

Data is represented in the form of: A) data trees. B) tables. C) data notes. D) chairs.

tables

A ________ is a named set of disk storage elements in which physical files for database tables may be stored

tablespace

Within Oracle, the named set of storage elements in which physical files for database tables may be stored is called a(n): A) extent. B) table. C) tablespace. D) partition

tablespace

A candidate key must satisfy all of the following EXCEPT: The key must uniquely identify the row The key must indicate the row's position in the table The key must be nonredundant Each nonkey attribute is functionally dependent One of the primary key.

the key must indicate the row's position in the table

A candidate key must satisfy all of the following conditions EXCEPT: A) the key must uniquely identify the row. B) the key must indicate the row's position in the table. C) the key must be nonredundant. D) each nonkey attribute is functionally dependent upon it.

the key must indicate the row's position in the table

Which of the following is true for a relation? A) Entities in a column vary as to kind. B) The order of the columns is important. C) The order of the rows is unimportant. D) More than one column can use the same name.

the order of the rows is uninmportant

A relation is in third normal form (3NF) if and only if it is in 2NF and ________. A) all non-key attributes are determined by the entire primary key B) there are no non-key attributes determined by another non-key attribute C) every attribute is a candidate key D) every candidate key is a determinant

there are no non-key attributes determined by another non-key attribute

A method for handling missing data is to: delete the associated row. track missing data with special reports perform insensitivity testing. substitute with random numbers for the missing data.

track missing data with special reports

A method for handling missing data is to: A) substitute with random numbers for the missing data. B) track missing data with special reports. C) perform insensitivity testing. D) delete the associated row

track missing data with special reports.

Database access frequencies are estimated from: random number generation security violations user logins transaction volumes

transaction volumes

Database access frequencies are estimated from: A) transaction volumes. B) user logins. C) security violations. D) random number generation

transaction volumes

A functional dependency between two or more nonkey attributes is called a: A) partial functional dependency. B) partial nonkey dependency. C) transitive dependency. D) partial transitive dependency.

transitive dependency

Denormalization is the process of transforming normalized relations into ________ physical record specifications

unnormalized

Suppose that you need to update one value of the column SalesCost in a relation. The way the relation is constructed, this value actually needs to be changed in three different rows. However, you only change the value in two of the rows. You have just created a(n) ________. A) normalization anomaly B) insertion anomaly C) update anomaly D) deletion anomaly

update anomaly

All of the following are objectives when selecting a data type *EXCEPT*: represent all possible values support all data manipulations improve data integrity use a lot of storage space

use a lot of storage space

All of the following are objectives when selecting a data type EXCEPT: A) represent all possible values. B) improve data integrity. C) support all data manipulations. D) use a lot of storage space

use a lot of storage space

________ distributes the columns of a table into several separate physical records

vertical partitioning

A relation that contains minimal redundancy and allows easy use is considered to be: A) clean. B) simple. C) complex. D) well-structured

well-structured

Horizontal partitioning makes sense: when only one category is allowed when partitions must be organized the same when less security is needed when different categories of a table's rows are processed separately

when different categories of a table's rows are processed separately

Horizontal partitioning makes sense: A) when different categories of a table's rows are processed separately. B) when less security is needed. C) when partitions must be organized the same. D) when only one category is allowed

when different categories of a table's rows are processed separately.

Indexes are most useful for columns that frequently appear in ________ clauses of SQL statements

where


Related study sets

Adaptive Quizzing Basics of Nursing Practice - Intermediate

View Set

Your Brain on Porn: Internet Pornography and the Emerging Science of Addiction

View Set

Media and Society test 3-quiz one

View Set

Financial Reporting II Chapter 12 LearnSmart

View Set

AP Question; Waste and Water Pollution

View Set