CAPP 36183

subject Type Homework Help
subject Pages 15
subject Words 1840
subject Authors Stephen Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The "____" characteristic of a primary key states the following:
The PK should not have embedded semantic meaning. An attribute with embedded
semantic meaning is probably better used as a descriptive characteristic of the entity
rather than as an identifier.
a. unique values
b. nonintelligent
c. preferably single-attribute
d. security compliant
The ____ object is the in-memory representation of the data in the database.
a. Command
b. DataReader
c. DataAdapter
d. DataSet
How many rows would be returned from a cross join of tables A and B, if A contains 8
rows and B contains 18?
page-pf2
a. 8
b. 18
c. 26
d. 144
____ are more detailed and specific than policies and describe the minimum
requirements of a given DBA activity.
a. Guidelines
b. Standards
c. Procedures
d. Documentation
Assume you are using the INTERSECT operator to combine the results from two tables
with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table
contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Dunne
and Olowski are included in the CUSTOMER table as well as in the CUSTOMER_2
table. How many records are returned when using the INTERSECT operator?
a. 0
page-pf3
b. 2
c. 7
d. 10
ROLAP extends ____ so that it can differentiate between access requirements for data
warehouse data and operational data.
a. SQL
b. OLAP
c. DDS
d. BI
Granularity refers to ____.
a. the size of a table
b. the level of detail represented by the values stored in a table's row
c. the number of attributes in a table
d. the number of rows in a table
page-pf4
____ logic, used extensively in mathematics, provides a framework in which an
assertion (statement of fact) can be verified as either true or false.
a. Predicate
b. Database
c. Relational
d. Index
____ are normally expressed in the form of rules.
a. Attributes
b. Entities
c. Relationships
d. Constraints
page-pf5
The ____ approach to scheduling concurrent transactions assigns a global unique stamp
to each transaction.
a. scheduled
b. table-locking
c. unique
d. timestamping
Which query will use the given columns and column aliases from the PRODUCT table
to determine the total value of inventory held on hand and display the results in a
column labeled TOTVALUE?
a. SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH*P_PRICE AS TOTVALUE
FROM PRODUCT;
b. SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH=P_PRICE AS TOTVALUE
FROM PRODUCT;
c. SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH/P_PRICE AS TOTVALUE
FROM PRODUCT;
d. SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH-P_PRICE AS TOTVALUE
FROM PRODUCT;
page-pf6
____ are an advantage of a DDBMS.
a. Reduced operating costs
b. Simplicity of management and control
c. Decreased storage requirements
d. Decreased training costs
The SQL character data format(s) is(are) ____.
a. CHAR and VARCHAR
b. VARCHAR only
c. Alphanumeric
d. CHAR only
The ____ is a shared, reserved memory area that stores the most recently executed SQL
statements or PL/SQL procedures, including triggers and functions.
a. buffer cache
b. procedure cache
page-pf7
c. data cache
d. permanent storage
Which of the following is an example of structured data?
a. A Web page
b. An e-mail
c. A memo
d. A spreadsheet
____, also known as RESTRICT, yields values for all rows found in a table that satisfy
a given condition.
a. INTERSECT
b. UNION
c. DIFFERENCE
d. SELECT
page-pf8
An example of a command you would use when making changes to a PRODUCT table
is ____.
a. CHANGE PRODUCT SET P_INDATE = '18-JAN-2004' WHERE P_CODE =
'13-Q2/P2';
b. ROLLBACK PRODUCT SET P_INDATE = '18-JAN-2004' WHERE P_CODE =
'13-Q2/P2';
c. EDIT PRODUCT SET P_INDATE = '18-JAN-2004' WHERE P_CODE =
'13-Q2/P2';
d. UPDATE PRODUCT SET P_INDATE = '18-JAN-2004' WHERE P_CODE =
'13-Q2/P2';
The term "____"is used to label any condition in which one or more optional
relationships exist.
a. participation
b. optionality
c. cardinality
d. connectivity
page-pf9
Since it is used to link the tables that originally were related in a M:N relationship, the
composite entity structure includesas foreign keysat least the ____ keys of the tables
that are to be linked.
a. composite
b. super
c. primary
d. unique
A table that displays data redundancies yields ____.
a. consistencies
b. anomalies
c. fewer attributes
d. more entities
page-pfa
All primary key entries are unique, and no part of a primary key may be ____.
a. zero
b. a foreign key
c. null
d. a candidate key
Based on Microsoft's Component Object Model (COM), ____ is database middleware
that adds object-oriented functionality for access to relational and nonrelational data.
a. MS-DB
b. OLE-DB
c. COM-DBv
d. ODBC
Dependencies based on only a part of a composite primary key are called ____
dependencies.
a. primary
b. partial
page-pfb
c. incomplete
d. composite
____ is/are the central activity during the parsing phase in query processing.
a. Database statistics
b. Data sparsity
c. SQL query
d. Query optimization
Complex ____ requirements may dictate data transformations, and they may expand the
number of entities and attributes within the design.
a. information
b. entity
c. design
d. processing
page-pfc
A derived attribute is indicated in the Chen model by a ____.
a. single line
b. dashed line
c. circle
d. double line
The World Wide Web (the Web) is the repository for distributed data.
The most likely data type for a surrogate key is ____.
a. Character
b. Date
page-pfd
c. Logical
d. Numeric
Of the following normal forms, ____ is mostly of theoretical interest.
a. 1NF
b. 3NF
c. BCNF
d. DKNF
A(n) ____ is an alternate name given to a column or table in any SQL statement.
a. alias
b. data type
c. stored function
d. trigger
page-pfe
As long as two transactions, T1 and T2, access ____data, there is no conflict, and the
order of execution is irrelevant to the final outcome.
a. shared
b. common
c. unrelated
d. locked
The ____ cache is used as a temporary storage area for ORDER BY or GROUP BY
operations, as well as for index-creation functions.
a. data
b. SQL
c. sort
d. optimizer
page-pff
Most DBMSs operate in one of two optimization modes: cost-based or rule-based.
Others automatically determine the ____ based on whether database statistics are
available.
a. data cache
b. SQL cache
c. sort cache
d. optimization mode
What is a rule that applies to the two-phase locking protocol?
a. Two transactions cannot have conflicting locks.
b. No unlock operation can precede a lock operation in a different transaction.
c. No data is affected until all locks are released.
d. No data is affected until the transaction is in its locked position.
When selecting a foreign key placement for a 1:1 relationship, place the PK of the
entity on the mandatory side in the entity on the optional side as a FK, and make the FK
mandatory when ____.
a. one side is mandatory and the other side is optional
page-pf10
b. one side participates in another relationship
c. both sides are optional
d. both sides are mandatory
An entity cluster is considered "virtual" or "____________________" in the sense that
it is not actually an entity in the final ERD.
____________________ can take place at any of the following levels: database, table,
page, row, or field.
Training principles and methodologies are planned during the implementation phase.
page-pf11
____________________ are special instructions for the optimizer that are embedded
inside the SQL command text.
The data cache caches system catalog data and the contents of the indexes.
____________________ not only helps you stay on track during the design process, it
also enables you and your coworkers to pick up the design thread when the time comes
to modify the design.
page-pf12
One advantage of a database system over previous data management approaches is that
the database system is considerably less complex.
Overlapping subtypes are subtypes that contain a unique subset of the supertype entity
set.
A conditional expression is normally expressed within the ____________________ or
HAVING clauses of a SQL statement.
Use __________________________________________________ to provide balance
page-pf13
between performance and fault tolerance.
Using the ____________________ command, SQL indexes can be created on the basis
of any selected attribute.
A data model is usually graphical.
If T1 has not unlocked data item Y, T2 cannot begin; if T2 has not unlocked data item
X, T1 cannot continue. Consequently, T1 and T2 each wait for the other to unlock the
required data item. Such a deadlock is also known as a(n) ____________________.
page-pf14
An operational database is sometimes referred to as an enterprise database.
A(n) ____________________ join performs a relational product (also known as the
Cartesian product) of two tables.
Physical design becomes simpler when data is distributed at different locations.
page-pf15
The storage locations for multiple backups must include sites inside and outside the
organization.
The DBA must review the database application design to ensure that transactions are
____________________, meaning that they do not overload the DBMS.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.