CAPP 88659

subject Type Homework Help
subject Pages 9
subject Words 1150
subject Authors Stephen Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A ____ schema is a type of star schema in which the dimension tables can have their
own dimension tables.
a. snowflake
b. starflake
c. mesh
d. matrix
Assume you are using the UNION ALL operator to combine the results from two tables
with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table
contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Dunne
and Olowski are included in the CUSTOMER table as well as in the CUSTOMER_2
table. How many records are returned when using the UNION ALL operator?
a. 7
b. 10
c. 15
d. 17
Current data distribution philosophy makes it easy for ____end users to access the
database.
page-pf2
a. limited
b. unauthorized
c. authorized
d. any
The implicit beginning of a transaction is ____.
a. when the database is started
b. when a table is accessed for the first time
c. when the first SQL statement is encountered
d. when the COMMIT command is issued
The following SQL statement uses a(n) ____.
SELECT P_CODE, P_DESCRIPT, P_PRICE, V_NAME
FROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE = VENDOR.V_CODE;
page-pf3
a. set operator
b. natural join
c. "old-style" join
d. procedural statement
The ____ pseudo-column is used to select the next value from a sequence.
a. CURRVAL
b. NEXTVAL
c. NEXT
d. GET_NEXT
The ____ relationship should be rare in any relational database design.
a. 1:1
b. 1:M
c. M:1
d. M:N
page-pf4
The traditional SDLC is divided into ____ phases.
a. two
b. three
c. four
d. five
____ relates to the activities that make the database perform more efficiently in terms of
storage and access speed.
a. Performance tuning
b. Database design
c. Query access
d. Database management
page-pf5
The DBA's ____ role covers activities involving the use of the DBMS.
a. administrative
b. arbitration
c. technical
d. managerial
____ transparency allows the integration of several different local DBMSs under a
common, or global, schema.
a. Transaction
b. Performance
c. Distribution
d. Heterogeneity
Coding, testing, and debugging are part of the ____ phase of the SDLC.
a. planning
page-pf6
b. analysis
c. detailed systems design
d. implementation
One of the three most common data integrity and consistency problems is ____.
a. lost updates
b. disk failures
c. user errors
d. deadlocks
Producing the required information flow is part of the ____ phase of the DBLC.
a. database initial study
b. database design
c. operation
d. testing and evaluation
page-pf7
Evaluation, maintenance, and enhancement are part of the ____ phase of the SDLC.
a. planning
b. maintenance
c. detailed systems design
d. implementation
A(n) ____ planis a set of instructions generated at application compilation time that
predetermines how the application will access the database at run time.
a. access
b. completion
c. application
d. communications
page-pf8
A characteristic of operational data is ____.
a. summarized data
b. hundreds of gigabytes
c. high normalization
d. historic data
____ is the body of information and facts about a specific subject.
a. Data
b. Information
c. Knowledge
d. A database
Some common physical security practices found in large database installations include
secured entrances, password-protected workstations, ____, closed-circuit video, and
voice-recognition technology.
a. drug testing
b. fingerprinting
page-pf9
c. electronic personnel badges
d. retina scans
User-access management is a subset of ____.
a. password protection
b. authorization management
c. data integrity
d. managerial control
Java applications are compiled and stored in the Web browser.
page-pfa
The DBMS guarantees that the semantic meaning of a transaction truly represents the
real-world event.
One of the advantages of a DDBMS is processor ____________________.
____________________deals with the rights of individuals and the organization to
determine the "who, what, when, where, and how" of data usage.
A system maintenance activity generated in response to changes in the business
environment is referred to as corrective maintenance.
page-pfb
The implementation phase of database design includes creating the database storage
structure and loading the database, but does not provide for data management.
If the DBMS does not support the INTERSECT statement, you can use a(n)
____________________ subquery to achieve the same result.
One important inheritance characteristic is that all entity subtypes inherit their primary
key attribute from their supertype.
page-pfc
Entity integrity is enforced automatically when the primary key is specified in the
CREATE TABLE command sequence.
In a relational table, each column has a specific range of values known as the
____________________ domain.
Why do we need to optimize a DBMS with SQL performance tuning, even though they
automatically optimize SQL queries?
page-pfd
The index key can have multiple attributes, this is called a(n) ____________________
index.
One of the advantages of a DDBMS is that the data is located near the site with the least
demand.
By default, Oracle automatically creates ____________________ and SYS user IDs
that have administrative privileges with every new database you create.
Good database performance is easy to evaluate.
page-pfe
A(n) ____________________ query can be used to produce a relation that retains the
duplicate rows.
A distributed database system requires functional characteristics that can be grouped
and described as transparency features.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.