CAPP 58739

subject Type Homework Help
subject Pages 25
subject Words 3296
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In Microsoft Access, foreign keys are designated by using the Foreign Key button in the
toolbar.
In regard to database security, neither the DBMS nor the database applications can
enforce processing responsibilities.
In two-phase locking, all locks are obtained during the growing phase.
In an E-R model, the three types of maximum cardinality are 1:1, 1:N, and N:M.
page-pf2
To exclude one or more values using a condition, the SQL OUT keyword must be used.
The classes of all entities to be stored in the database are labeled <<persistent>>.
Unlike application code, stored procedures are never distributed to the client computers.
In the MySQL Table Editor, the abbreviation PK stands for partial key.
page-pf3
In ODBC, the amount of work that the driver must do is largely determined by the
degree of SQL-compliance of the data source.
A null value is an attribute value that has been set to zero.
Columns can be sorted in descending sequence by using the SQL DESC keyword.
page-pf4
When creating a table for an ID-dependent entity, both the key of the parent and the key
of the entity itself must appear in the table.
According to the SQL-92 standard, statements used to construct views cannot contain
the WHERE clause.
Relationships of degree two are referred to as binary relationships.
NoSQL really stands of "Not only SQL."
page-pf5
The SQL keyword CONSTRAINT is used to limit column values to specific values.
A referential integrity constraint policy that insures that all rows containing a particular
foreign key value in a table are eliminated from the table when the row containing the
corresponding primary key value in a parent table is eliminated from the database is
called cascading deletes.
In the Microsoft SQL Server Management Studio, the amount to add to the surrogate
key value when adding a new row is specified by the increment property.
page-pf6
Extended E-R model 1:N relationships are called identifying connection relationships in
IDEF1X.
A null value in a column may indicate that there is an appropriate value for that
attribute, but it is unknown.
When using SQL Server, developers place explicit locks.
Oracle Database triggers BEFORE and AFTER are placed on tables, while the
INSTEAD OF trigger is placed on views.
page-pf7
One of the four categories of NoSQL databases used in the text is the Key-Value
database.
To change the minimum cardinality on the parent side from zero to one, the foreign key,
which would have been NULL, must be changed to NOT NULL.
IDEF1X nonspecific relationships correspond to N:M relationships in the extended E-R
model.
page-pf8
MySQL supports INSTEAD OF triggers.
Report systems include three functions: authoring, management, and delivery.
Entities with an IS-A relationship should have the same identifier.
The default cursor concurrency for a dynamic cursor in SQL Server is optimistic.
page-pf9
In unsupervised data mining, a model or hypothesis is created ahead of time.
MySQL restores are run on the Restore from Disk tab of the Data Export and Restore
page.
An exclusive lock locks the item from access of any type.
Joins that show only matching rows from the joined tables in their results are called
inner joins.
page-pfa
In an E-R model, the three types of minimum cardinality are mandatory, optional, and
indeterminate.
In a 1:N relationship, the parent entity is on the one side of the relationship, and the
child entity is on the many side of the relationship.
SQL can only query a single table.
page-pfb
One of the four categories of NoSQL databases used in the text is the Word Processing
database.
In Oracle Database backup and recovery facilities, a consistent backup is one in which
all uncommitted changes have been removed from the datafiles.
The MySQL statement BEGIN is used to define a set of MySQL procedure statements.
Apache is the Web server typically used on computers running the Windows operating
system.
page-pfc
Which of the following is the most restrictive transaction isolation level option
supported by SQL Server?
A) Repeatable Read
B) Read Committed
C) Serializable
D) Read Uncommitted
A version object ________.
A) may be a composite object
B) typically contains the archetype object in its identifier
C) typically is a simple object
D) produces archetype objects
page-pfd
The MySQL delimiter that must be used with MySQL procedures as used in this text is
________.
A) /
B) \
C) //
D) \\
Data mining techniques are used to find patterns and relationships that can be used to
________.
A) report
B) classify
C) predict
D) Both B and C are correct
This database component is used to maintain database accuracy and enforce data
constraints.
A) Tables
page-pfe
B) Metadata
C) Triggers
D) Stored procedures
To produce the set of customers with a R score of 2, the SQL SELECT TOP ________
PERCENT syntax should be used.
A) 50
B) 33
C) 25
D) 20
SOAP originally stood for ________.
A) Simple Operational Application Protocol
B) Standard Operational Application Protocol
C) Simple Object Application Protocol
D) Simple Object Access Protocol
page-pff
Which of the following tasks cannot be done using the Oracle SQL Developer GUI
features?
A) See the structure of a table
B) Add and remove columns from a table
C) Insert and delete data from a table
D) Create a new tablespace
Which of the following MySQL configuration settings are recommended for use with
this book?
A) Developer machine
B) Multifunction machine
C) Decision Support (DSS)/OLAP
D) Custom setup that only installs the needed components
page-pf10
In many-to-many relationships in a relational database design, ________.
A) the key of the child is placed as a foreign key into the parent
B) the key of the parent is placed as a foreign key into the child
C) the keys of both tables are placed in a third table
D) the keys of both entity tables are placed in each other
Suppose that you need to update one value of the column SalesCost in a relation. The
way the relation is constructed, this value actually needs to be changed in three different
rows. However, you only change the value in two of the rows. You have just created
a(n) ________.
A) normalization anomaly
B) insertion anomaly
C) update anomaly
D) deletion anomaly
page-pf11
Which of the following is true of forward only cursors?
A) Current values for each row are retrieved when the application accesses a row.
B) All changes of any type from any source are visible.
C) Changes made by the transaction are visible only if they occur on rows ahead of the
cursor.
D) It requires the greatest overhead of any cursor type.
RFM analysis analyzes and ranks customers based on ________.
A) their purchasing patterns
B) their income status
C) their residential location.
D) their age
In an SQL query, which of the following symbols is used by ANSI SQL to represent all
the columns in a single table?
A) _ (underscore)
B) ? (question mark)
page-pf12
C) * (asterisk)
D) % (percent)
Simple networks can be represented by using ________.
A) indexes or linked lists
B) linked lists or sequential lists
C) sequential lists or indexes
D) complex networks
Graph databases are composed of ________.
A) Nodes, Properties, and Edges
B) Properties, Columns, and SuperColumns
C) Edges, Nodes, and Tables
D) Nodes, Columns, and Properties
page-pf13
In an SQL query, which SQL keyword is used to implement a subquery?
A) GROUP BY
B) HAVING
C) ORDER BY
D) SELECT
What term does MySQL use as a synonym for backup?
A) Replica
B) Export
C) Data export
D) Data export dump
page-pf14
When transforming an ID-dependent E-R data model relationship into a relational
database design, the referential integrity constraints should allow ________.
A) parent updates to cascade
B) child updates to cascade
C) child deletes to cascade
D) Both A and B are correct
Once processing rights have been defined, they may be implemented at any of these
levels except ________.
A) network
B) operating system
C) data
D) application
What type of attribute is composed of other attributes?
A) Simple
B) Group
page-pf15
C) Compound
D) Composite
A referential integrity constraint policy that guarantees that a row in a parent table
always has a required entry in a child table ________.
A) is known as a minimum cardinality enforcement action
B) needs to be documented by the database development team
C) is enforced in most DBMS products
D) Both A and B are correct
Which of the following is considered to be a weak entity?
A) A subtype entity
B) The archetype in an archetype/instance pattern
C) The association entity in an association pattern
D) The parent entity in a parent-child relationship
page-pf16
The MySQL keyword to actually start using a cursor is ________.
A) DECLARE CURSOR {CursorName}
B) OPEN {CursorName}
C) FETCH
D) CLOSE {CursorName}
Hadoop is a(n) ________.
A) RDMBS
B) OODBMS
C) distributed file system (DFS)
D) Web server
page-pf17
To limit the number of rows retrieved from a table, use the SQL construct ________.
A) SELECT *
B) SELECT TOP n *
C) SELECT COUNT(TOP n)
D) SELECT COUNT(*)
If T3 is a table with three columns C1, C2, and C3, where C1 is integer data, C2 is
character data, and C3 is date data, which of the following would be the proper
statement to have Oracle Database enter the date 02/10/03 into a row in table T3 while
making sure that it is formatted correctly as shown?
A) SET INTO T3 VALUES (101, 'Smith', '02/10/13');
B) SET INTO T3 VALUES (101, 'Smith', TO_DATE ('02/10/13', 'DD/MM/YY'));
C) INSERT INTO T3 VALUES (101, 'Smith', '02/10/2013');
D) INSERT INTO T3 VALUES (101, 'Smith', TO_DATE ('02/10/13', 'DD/MM/YY'));
Having to enter facts about two entities when we want to enter facts about only one is
an example of ________.
A) insertion anomaly
page-pf18
B) update anomaly
C) deletion anomaly
D) normalization anomaly
The metadata maintained by a reporting system database describes all of the following
except ________.
A) triggers
B) users
C) groups
D) reports
Which of the following is not a database administration responsibility of a DBA?
A) Managing the database structure
B) Writing the applications
C) Managing the DBMS
D) Maintaining the data repository
page-pf19
SQL statements can be passed to SQL Server using the ________.
A) Enterprise Manager
B) Query Analyzer
C) Microsoft SQL Server Management Studio
D) Both A and B are correct
One important difference between a relation and a column family is that ________.
A) the rows in a column family can have different numbers of columns
B) the columns in a column family are unnamed
C) all values in a column family must have the same timestamp
D) values in a column family must be strings
page-pf1a
The defining characteristic of BCNF is that a table is in BCNF if ________.
A) all rows are unique
B) all columns are consistent
C) the primary key is a candidate key
D) all determinants are candidate keys
According to the SQL-92 standard, statements used to construct views cannot contain
________.
A) the SELECT clause
B) the FROM clause
C) the WHERE clause
D) the ORDER BY clause
An entity whose existence depends on the presence of another entity but whose
identifier does not include the identifier of the other entity is a(n) ________.
A) strong entity
page-pf1b
B) weak entity
C) ID-dependent entity
D) subtype entity
What is SQL*Plus?
Briefly describe the history of database processing.
page-pf1c
Distinguish between the primary key and a candidate key.
What are SQL stored procedures and how are they used?
page-pf1d
Explain the purpose of transaction logs and checkpoints.
Using the VRG database as an example, briefly describe what a final database design
consists of.
What are tree, simple networks and complex networks?
page-pf1e
What is meant by the cardinality of a relationship?
What is a star schema?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.