CAPP 41547

subject Type Homework Help
subject Pages 19
subject Words 2109
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In a common form of RFM analysis, customers with an R score of 5 are in the 20% of
customers who have the most recent orders.
The SQL built-in function MIN obtains the smallest value in a numeric column.
MySQL uses the MySQL TODAYS_DATE() function to provide the value of the
current date.
A functional dependency is a relationship between attributes such that if we know the
value of one attribute, we can determine the value of the other attribute.
page-pf2
Java programs that access a database from an applet must use a Type 2 JDBC driver.
Cascading deletions are generally not used with relationships for weak child entities.
An OLAP cube is limited to three axes.
The CODASYL DBTG model structured data relationships as a tree structure.
page-pf3
Microsoft Excel 2013 allows us to connect directly to an SQL Server 2014 database
when building a PivotTable.
In Microsoft Visio 2013, the Crow's Foot Database Notation stencil objects include a
Recursive Relationship object.
A durable transaction is one for which all committed changes are permanent.
page-pf4
The type of failure that occurs when Oracle Database itself fails due to an operating
system or computer hardware failure is called an instance failure.
The transaction boundaries are the essential information that the DBMS needs from the
application programs to enforce different locking strategies.
Discriminator attributes can be represented in relational designs.
In Microsoft Access, the primary key must be set as a field property while the table is in
Design View.
page-pf5
SQL, although very popular, has never become a national standard.
To have SQL automatically eliminate duplicate rows from a result, use the keyword
DISTINCT with the FROM keyword.
A relation is in 4NF when multivalued dependencies are isolated in their own relation.
page-pf6
In a 1:1 relationship, the foreign key is defined as an alternate key to make the DBMS
enforce uniqueness.
If the Web server and the DBMS are running on the same server, the system has a
three-tier architecture.
To add a NOT NULL column to a table, we first add a NULL column, then we insert
values into every row, and finally we change the NULL constraint to NOT NULL.
SQL statements that can be used to create referential integrity statements for normalized
tables are created during the normalization process.
page-pf7
Functional dependencies can involve groups of attributes.
Business Intelligence (BI) systems support operational activities.
The MySQL Installer for Linux can be used to install the MySQL Workbench.
With Oracle Database, using a sequence does not guarantee valid surrogate key values.
page-pf8
IDEF1X identifying connection relationships correspond to ID-dependent relationships
in the extended E-R model.
All relations are tables, but not all tables are relations.
In a relational database design, all relationships are expressed by creating a foreign key.
page-pf9
A composite identifier is defined as a composite attribute that is an identifier.
A multilevel index that allows both sequential and direct processing of data records is
called a C-tree.
In Microsoft Visio 2013, we can create data models using Entity and Relationship
objects.
All Oracle Database triggers work at the row level.
page-pfa
A referential integrity constraint limits the values of a foreign key.
ADO provides access to OLE functionality to programming languages that ordinarily
could not access OLE functions.
Basic Web pages are created using Hypertext Markup Language (HTML).
page-pfb
A database management system (DBMS) creates, processes and administers databases.
The MySQL Workbench is the main utility used to implement MySQL security.
In Microsoft Visio 2013, the Crow's Foot Database Notation stencil objects include
________.
A) an Entity object
B) a Relationship object
C) a Dynamic connector object
D) Both A and B are correct
page-pfc
The "value" in a key value database can be ________.
A) any string value only
B) any numeric value only
C) any value of any size or type
D) any list of values only
Market basket analysis is ________.
A) a data mart specific technique
B) a reporting technique
C) an OLAP application
D) a data mining technique
When you are given a set of tables and asked to create a database to store their data, the
first step is to ________.
A) assess the existing tables' structure and content
B) design the database structure
page-pfd
C) create one or more new tables
D) move the data into the new database
A stored program that is attached to a table or view is called ________.
A) a CHECK constraint
B) a view
C) embedded SQL
D) a trigger
An artificial column added to a relation to serve as the primary key is a ________.
A) composite key
B) candidate key
C) foreign key
D) surrogate key
page-pfe
A database designed to implement requirements for a reporting application needed by
the Sales department is a database being designed ________.
A) from existing non-database data
B) as a new systems development project
C) as a redesign of an existing database
D) Both A and B are correct
In an SQL query, which SQL keyword is used with GROUP BY to select groups
meeting specified criteria?
A) AND
B) WHERE
C) HAVING
D) IN
page-pff
In IDEF1X, extended E-R model subtype entities are grouped into ________.
A) generic entities
B) category entities
C) nonspecific entities
D) category clusters
E) There is no equivalent IDEF1X term.
Integrated tables store both data and the relationships among the data.
Which of the following is true about ODBC?
A) ODBC has experienced little practical success.
B) ODBC requires developers to have a thorough knowledge of many DBMS native
libraries.
C) ODBC can be used to access data from spreadsheets.
D) ODBC has an object-oriented interface.
page-pf10
Which of the following is not true about ADO.NET DataSets?
A) They can have multiple tables and relationships.
B) They can have foreign keys and surrogate keys.
C) They can support referential integrity actions.
D) Operations performed on DataSets are also performed on the data on disk.
The situation that occurs when two users are each waiting for a resource that the other
person has locked is known as a(n) ________.
A) lost update problem
B) deadlock
C) inconsistent read problem
D) checkpoint
page-pf11
Which of the following is true about stored procedures in Oracle Database?
A) They cannot invoke other procedures.
B) They must include the data type and length of parameters.
C) They can raise exceptions.
D) They do not contain variables.
Which of the following is true for a relation?
A) Entities in a column vary as to kind.
B) The order of the columns is important.
C) The order of the rows is unimportant.
D) More than one column can use the same name.
Semantic objects are said to be ________.
A) Semantically self-contained
B) Semantically complete
C) Semantically inclusive
page-pf12
D) Both A and B are correct
SQL Server tables can be created and modified using ________.
A) Enterprise Manager
B) Query Analyzer
C) Microsoft SQL Server Management Studio
D) Both A and B are correct
SQL views are constructed from ________.
A) CREATE statements
B) INSERT statements
C) UPDATE statements
D) SELECT statements
page-pf13
Which type of data repository is composed of metadata that is created automatically as
the system components are created?
A) Passive
B) Dynamic
C) Active
D) Automatic
In Oracle Database security, a System Privilege is the right to execute general tasks
such as performing some action on the database data.
The data model produced by reverse engineering is not truly a logical model because it
will contain ________.
A) tables for strong entities
B) supertype/subtype tables
page-pf14
C) tables for ID-dependent entities
D) intersection tables
Which of the following commands does Oracle Database not support?
A) CREATE TABLE
B) CREATE CONSTRAINT
C) ON DELETE CASCADE
D) ON UPDATE CASCADE
Microsoft Access 2013 database files are stored using the file extension of ________.
A) .adb
B) .asp
C) .accdb
D) .mdb
page-pf15
As compared to CGI files, JSP pages ________.
A) are less memory efficient
B) require more processor time
C) execute faster
D) keep more copies of a given page in memory
Requiring all application programs to lock resources in the same order is a technique
for preventing what problem?
A) Concurrent update
B) Lost update
C) Deadlock
D) Exclusive locks
page-pf16
Semantic objects are grouped into ________.
A) composites
B) entities
C) objects
D) classes
Each attribute of an entity becomes a(n) ________ of a table.
A) column
B) primary key
C) foreign key
D) alternate key
A new MySQL database is created using ________.
A) the New Database dialog tab
B) the Create Database command
C) the new_schema dialog tab
page-pf17
D) the Create Schema command
If by knowing the value of A we can find the value of B, then we would say that B is
functionally dependent on A.
MySQL does not have facilities for generating XML documents from database data.
In an SQL query, which built-in function is used to obtain the smallest value of numeric
columns?
A) AVG
B) COUNT
page-pf18
C) MAX
D) MIN
The advantages of normalization include ________.
A) the elimination of modification anomalies
B) the elimination of duplicated data
C) more complex SQL for multitable subqueries and joins
D) simpler SQL queries
Here is Market Basket data for 1,000 transactions at a Drug Store. All transactions
involve 1 or 2 drugs. Use the table below to answer the following questions.
Refer to the table above.What is the definition of support for Drug A and Drug B?
page-pf19
A) The probability that Drug A will be purchased.
B) The probability that Drug B will be purchased.
C) The probability that both Drug A and Drug B will be purchased.
D) The probability that Drug A will be purchased given that Drug B has been
purchased.
Which of the following is not true for an ideal primary key?
A) a composite of several long attributes
B) numeric
C) fixed
D) short

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.