CAPP 27619

subject Type Homework Help
subject Pages 15
subject Words 2023
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A______ index is based on 0 and 1 bits to represent a given condition.
a. logical
b. multidimensional
c. normal
d. bitmapped
The database structure in a DBMS is stored as a_____________ .
a. single file
b. collection of files
c. set of key/value pairs
d. collection of queries
In the context of RAID levels, striped arrays provide:
a. increased read performance and fault tolerance.
b. increased fault tolerance but decreased performance.
c. increased read performance but no fault tolerance.
page-pf2
d. neither fault tolerance nor good performance.
_____________can render data useless to unauthorized users who might have violated
some of the database security layers.
a. Data encryption
b. Access rights
c. Physical security
d. Password security
HTML is designed to facilitate the extraction and manipulation of data from structured
documents over the Internet.
a. True
b. False
page-pf3
The________ statement in SQL combines rows from two queries and returns only the
rows that appear in the first set but not in the second.
a. UNION
b. UNION ALL
c. INTERSECT
d. MINUS
The reliance on________ as the design methodology for relational databases is seen as
a stumbling block to its use in OLAP systems.
a. normalization
b. denormalization
c. star schema
d. multidimensional schema
page-pf4
Data __________implies that all business entities, data elements, data characteristics,
and business metrics are described in the same way throughout the enterprise.
a. visualization
b. analytics
c. mining
d. integration
The assignment of access rights may restrict operations on predetermined objects such
as databases, tables, views, queries, and reports.
a. True
b. False
Disaster management includes all the end-user activities designed to secure data
availability before a physical disaster or a database integrity failure.
a. True
b. False
page-pf5
An implementation-ready data model needn't necessarily contain enforceable rules to
guarantee the integrity of the data.
a. True
b. False
Implementing nonoverlapping subtypes requires the use of one discriminator attribute
for each subtype.
a. True
b. False
The DBMS guarantees that the semantic meaning of a transaction truly represents the
real-world event.
a. True
page-pf6
b. False
You cannot insert a row containing a null attribute value using SQL.
a. True
b. False
To implement a small database, a database designer must know the "1" and the "M"
sides of each relationship and whether the relationships are mandatory or optional.
a. True
b. False
page-pf7
Lock___________ indicates the level of lock use.
a. granularity
b. shrinking
c. growing
d. serializability
The SQL execution activities are performed by the query optimizer.
a. True
b. False
End-user data is______ .
a. knowledge about the end users
b. raw facts of interest to the end user
c. information about a specific subject
d. accurate, relevant and timely information
page-pf8
A persistent stored module is stored and executed on the database client machine.
a. True
b. False
A web server is the main hub through which all Internet services are accessed.
a. True
b. False
When introducing a database into an organization, the database approach creates a more
controlled and structured information flow and thus affects people, functions, and
interactions. This leads to a(n)_________ impact of the new database system.
a. cultural
page-pf9
b. managerial
c. technical
d. operational
_____ distributed database management system (DDBMS) integrate multiple instances
of the same DBMS over a network.
a. Homogeneous
b. Heterogeneous
c. Fully heterogeneous
d. Combination
In the ADO.NET framework, the__________ object is the in-memory representation of
the data in the database.
a. Command
b. DataReader
c. DataAdapter
d. DataSet
page-pfa
Security breaches can yield a database whose integrity is either preserved or corrupted.
a. True
b. False
"All users must have passwords" is an example of a______________ .
a. rule
b. policy
c. standard
d. procedure
page-pfb
The hierarchical data model was developed in the _____________.
a. 1960s
b. 1970s
c. 1980s
d. 1990s
An example of a command a user would use when making changes to a PRODUCT
table is________________ .
a. CHANGE PRODUCT
SET P_INDATE = "18-JAN-2004" WHERE P_CODE = "13-Q2/P2";
b. ROLLBACK PRODUCT
SET P_INDATE = "18-JAN-2004" WHERE P_CODE = "13-Q2/P2";
c. EDIT PRODUCT
SET P_INDATE = "18-JAN-2004" WHERE P_CODE = "13-Q2/P2";
d. UPDATE PRODUCT
SET P_INDATE = "18-JAN-2004" WHERE P_CODE = "13-Q2/P2";
page-pfc
"Unioncompatible" means that the_________________ .
a. names of the relation attributes can be different, but the data types must be alike
b. names of the relation attributes must be the same, but the data types can be different
c. names of the relation attributes must be the same and their data types must be alike
d. number of attributes must be the same, but the names and data types can be different
A data store is used by data analysts to create queries that access the database.
a. True
b. False
During decentralized design, after the___________ has been completed, all modules
are integrated into one conceptual model.
a. declaration process
b. verification process
c. conceptual process
d. logical process
page-pfd
In an SQL-based relational database, rows in different tables are related based on
common values in common attributes.
a. True
b. False
In the original Chen notation, each attribute is represented by an oval with the attribute
name connected to an entity rectangle with a line.
a. True
b. False
Normalization works through a series of stages called normal forms. For most purposes
in business database design,_______ stages are as high as you need to go in the
page-pfe
normalization process.
a. two
b. three
c. four
d. five
A(n)__________ is an alternate name given to a column or table in any SQL statement.
a. alias
b. data type
c. stored function
d. trigger
____________distributed database systems integrate different types of centralized
database management systems (DBMS) over a network.
a. Homogeneous
b. Heterogeneous
page-pff
c. Fully homogeneous
d. Combination
The SQL data type DATE stores date in the____________ date format.
A(n)__________ character is a symbol that can be used as a general substitute for other
characters or commands.
When the critical application code is isolated in a single program,
____________improves.
page-pf10
A(n)___________ request is a low-level read or write data access operation to or from
computer devices.
A weak entity must be ____________-dependent.
In a 1:M relationship, a user must always create the table for the________side first.
page-pf11
The_________ protocol is used by a DP to roll transactions back and forward with the
help of the system's transaction log entries.
What is JavaScript? How does it work?
Which command is used to save changes to the database? What is the syntax for this
command?
page-pf12
______________completeness means that not every supertype occurrence is a member
of a subtype.
________________is the process the DBMS uses to verify that only registered users
access the database.
page-pf13
The syntax of the DECODE function starts with____________ .
_______________could become a very technical job that affects not only the
accessibility of the data in the storage device(s) but also the performance of the system.
What is data visualization? Name different techniques of data visualization.
page-pf14
If a distributed database management system (DDBMS) exhibits___________
transparency, a user does not need to know that the data are partitionedmeaning the
table's rows and columns are split vertically or horizontally and stored among multiple
sites.
What is a schema? How many schemas can be used in one database?
The DSO's activities are often classified as__________ management, which includes all
DBA activities designed to ensure data availability following a physical calamity or a
database integrity failure.
page-pf15
In an Oracle sequence, the___________ pseudo-column retrieves the current value of a
sequence.
What do business rules require to be effective?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.