Type
Quiz
Book Title
Database Concepts 7th Edition
ISBN 13
978-0133544626

CAPP 73429

August 22, 2017
MySQL Community Server 5.6 requires that the .NET Framework version 4.5.1 be
installed.
Excel 2013 allows us to connect directly to an Access 2013 database when building a
PivotTable.
If you need to create a primary key that is a composite key using SQL, the key may be
defined when the table is created using the CREATE TABLE statement.
Subtype entities may be either exclusive or inclusive.
All type-valid XML documents are required to have a DTD.
The SQL GROUP BY keyword can be used to group rows by common values.
In SQL, the WHERE clause is used to specify which columns will be included in the
result.
The IIS Web server is automatically installed when the Windows operating system is
installed, and no additional steps are necessary to either install or activate it.
In Microsoft Visio 2013, clicking the File command tab opens the Backstage view.
When using Microsoft Access and IIS, a good basic ASCII text editor for producing
HTML is FrontPage.
XML documents and XML Schemas are created in different languages.
Installing PHP using the Microsoft Web Platform Installer installs the most current
version of PHP.
BI reporting systems summarize the current status of business activities and compare
that status with past events but not with predicted future activities.
SQL query results are displayed in a tabbed Resultset window.
Data is added to a table using the SQL INSERT command.
Which of the following problems associated with storing data in a list is avoided by
storing data in a relational database?
A) Maintaining the data may require changing the same data value in many locations
B) Inconsistency when a data item is used multiple times
C) Inability to store partial data
D) Duplication of data items
E) All of the above
A report generated by a reporting system is delivered to the appropriate users via a
printed report. This system uses which of the following report modes?
A) Push
B) Pull
C) Query
D) OLAP
E) None of the above
Which of the following is an SQL trigger that Microsoft SQL Server supports?
A) BEFORE
B) INSTEAD OF
C) AFTER
D) B and C only
E) A, B, and C
The ODBC standard defines a way to:
A) start transactions.
B) rollback transactions.
C) create a connection.
D) issue SQL commands.
E) All of the above
An SQL virtual table is called a(n):
A) CHECK constraint.
B) view.
C) embedded SQL statement.
D) trigger.
E) stored procedure.
Which of the following is the correct SQL clause to restrict the results of a SELECT
query to only records that have a value in the range of 10 to 50 in the Hours column?
A) WHERE Hours = MIN(10) and MAX(50)
B) WHERE Hours IN [10, 50]
C) WHERE Hours = 10 and Hours = 50
D) WHERE Hours BETWEEN 10 AND 50
E) WHERE Hours RANGE 10 TO 50
Concurrent processing of a database only poses problems when two or more processes
attempt to use the same data.
Given the tables
PRODUCT (ProductID, Description, Cost)
SUPPLIER (SupplierID, ContactName, PhoneNumber)
as shown in the figure below, which of the following would represent the correct
placement of foreign keys?
A) PRODUCT (ProductID, Description, Cost)
SUPPLIER (SupplierID, ContactName, PhoneNumber)
B) PRODUCT (ProductID, Description, Cost, SupplierID)
SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID)
C) PRODUCT (ProductID, Description, Cost)
SUPPLIER (SupplierID, ContactName, PhoneNumber)
PRODUCT_SUPPLIER (ProductID, SupplierID)
D) PRODUCT (ProductID, Description, Cost, SupplierID)
SUPPLIER (SupplierID, ContactName, PhoneNumber)
E) PRODUCT (ProductID, Description, Cost)
SUPPLIER (SupplierID, ContactName, PhoneNumber)
PRODUCT_SUPPLIER (ProductID, SupplierID )
Microsoft Access queries:
A) can use previously stored view equivalent Access queries.
B) cannot use previously stored view equivalent Access queries for any purpose.
C) cannot use previously stored view equivalent Access queries to hide rows.
D) cannot use previously stored view equivalent Access queries to hide columns.
E) cannot use previously stored view equivalent Access queries to hide complicated
SQL syntax.
Below installing the NetBeans IDE, we have to install ________.
A) the Java JRE
B) the Java SDK
C) the Java JDK
D) the Java SRE
E) Any of the above will work.
Data mining techniques are used to find patterns and relationships that can be used to:
A) report.
B) classify.
C) predict.
D) Both B and C
E) All of the above
Which of the following is not a basic component of a database system?
A) Database
B) User
C) ERD
D) DBMS
E) Data applications
Which of the following is an account name for which you would enter a password to
connect to a workspace in Oracle SQL Developer?
A) Your own personal login
B) The user login associated with the workspace
C) INTERNAL
D) A and B
E) A, B and C
For database/XML applications, a good rule to follow is that elements are used to carry
data and attributes are used to carry metadata.
We have obtained access to the company's operational data. In one record, we find that
a customer's age has been recorded as "337." This is an example of:
A) dirty data.
B) inconsistent data.
C) non-integrated data.
D) a "wrong format" problem.
E) a "too much data" problem.
Which SQL keyword is used to apply conditions to restrict groups that appear in the
results of a SELECT query that uses GROUP BY?
A) WHERE
B) HAVING
C) LIKE
D) SORT
E) DISTINCT
In the Entity-Relationship data model, all instances of an entity of a given type are
grouped into:
A) entity objects.
B) class objects.
C) entity classes.
D) identifiers.
E) entity attributes.
SQL views are constructed from:
A) CREATE statements.
B) INSERT statements.
C) UPDATE statements.
D) SELECT statements.
E) VIEW statements.
When working with Microsoft Access on a Windows operating system, a simple but
usable ASCII text editor is:
A) Microsoft Word.
B) Notepad.
C) Wordpad.
D) Microsoft Frontpage.
E) Microsoft Visual Studio .NET.
The term DBA refers to the:
A) database accessor.
B) database auditor.
C) data business auditor.
D) database administrator.
E) data business administrator.
Which of the following is true about stored procedures?
A) Stored procedures cannot be passed parameters like a regular application function.
B) Stored procedures are stored as an embedded function in the application program.
C) Stored procedures are stored in the database.
D) Stored procedures are invoked automatically by the DBMS when specific events
occur.
E) All of the above are true about stored procedures.
In Microsoft Visio 2013, clicking the FILE command tab opens:
A) the File menu.
B) the Backstage view.
C) the Open dialog box.
D) the Save As dialog box.
E) the Save dialog box.
Given only the following excerpt of an E-R model:
Which of the following is known to be true?
A) There are more instances of ENTITY A than there are instances of ENTITY B in the
user's environment.
B) A single instance of ENTITY B may be related to many instances of ENTITY A.
C) A single instance of ENTITY A must be related to many instances of ENTITY B.
D) ENTITY A has a minimum cardinality of one.
E) The degree of the relationship is "many."
Microsoft Access is a(n) ________, which combines a DBMS and an application
generator.
Hadoop is a(n) ________.
Microsoft Access SQL commands are run in the ________ of a Query window.
Users log into MySQL 5.6 Community Server Edition using the ________ dialog box.
Microsoft Access 2013 can secure databases by using ________ to encrypt and decrypt
the database files.
Systems analysis and design is the process of ________ and ________ information
systems.
In the snowflake schema, the ________ tables are normalized.
When the primary key of one relation is placed in a second relation to represent a
relationship, the attribute in the second relation is called a(n) ________ key.
Excel 2013 allows us to ________ to an Access 2013 database when building a
PivotTable.
An important improvement of XML Schema over DTDs is that XML Schema are
________.
The recovery method where the database is restored using the saved data, and all
transactions since the save are reapplied is called ________ recovery.
The SQL keyword(s) ________ mean(s) that a value must be supplied before a new row
can be created.
A computer-based information system has ________ components.
Microsoft Access 2013 can secure databases by deploying databases packaged with a(n)
________.
How can XML be used with a DBMS?
Microsoft Access 2013 uses ________ form and report editors.