CAS CS 73532

subject Type Homework Help
subject Pages 18
subject Words 2220
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
SQL Server built-in system function names start with the @@ symbol.
Microsoft Access wizards allow easy building of forms and reports.
A combination key is a group of attributes that uniquely identifies a row.
A data warehouse is a database system that has data, programs, and personnel
specialized in Business Intelligence (BI) processing.
page-pf2
JDBC drivers only exist for a limited number of DBMS products at this time.
Linked lists can be used to keep records in a logical order even if they are not
necessarily in physical order.
A report that is sent to users on a predetermined schedule is called a push report.
To represent a 1:1 binary relationship in a relational database design, the key of one
table is placed into the second table.
page-pf3
Multivalued dependencies create anomalies so serious that multivalued dependencies
must always be eliminated.
The MySQL transaction isolation level can be manually set using a MySQL SET
{SCOPE} TRANSACTION ISOLATION LEVEL {LEVEL OPTION} command.
In a database, each table stores data about a different type of thing.
page-pf4
OLE DB objects are COM objects.
A database design may be part of a new systems development project.
In Oracle Database recovery facilities, control files are small files that describe the
name, contents, and locations of various files used by Oracle Database.
ADO.NET provides the capability to create and process in-memory databases called
DataSets.
page-pf5
If a table meets the minimum definition of a relation, it has an effective or appropriate
structure.
SQL triggers are created using the SQL ADD TRIGGER statement.
Normalization requires applications to use more complex SQL since they will need to
write subqueries and joins to recombine data stored in separate relations.
page-pf6
Information systems must be both developed and used to help businesses reach their
goals and objectives.
SQL Server supports three types of indexes: clustered, unclustered, and random.
The SQL INSERT statement can be used to populate normalized tables.
According to ANSI SQL, the serializable isolation level will not allow phantom reads,
dirty reads, and nonrepeatable reads.
page-pf7
E-R models use an identifying relationship to connect entities that are ID-dependent.
A WHERE clause can contain only one condition.
Any table that meets the definition of a relation is said to be in first normal form (1NF).
In market basket analysis, support is defined as the probability that two items will be
purchased together.
page-pf8
SQL Server user variables and parameters start with the @ symbol.
XML Schema is a synonym for Document Type Declaration (DTD).
Referential integrity constraints should disallow adding a new row to a child table when
the foreign key does not match a primary key value in the parent table.
page-pf9
The PL/SQL keyword ISTHERE is used to test for the existence of a condition.
Microsoft Access is a low-end product intended for individuals and small workgroups.
Which schema privilege should not be specifically assigned to a user account?
A) SELECT
B) CREATE
C) GRANT
D) Both A and B are correct
page-pfa
In UML-style E-R diagrams, which of the following would be considered a class
attribute of the entity class CUSTOMER?
A) Customer Name (meaning, the first and last name of the customer)
B) Customer Address (meaning, the street, city, state, and zip code of the customer's
residence)
C) Customer Count (meaning, the count of the number of customers)
D) Customer Number (meaning, an assigned number to uniquely identify a customer)
In Microsoft Visio 2013, for a Relationship object relationship that is many-mandatory
on the child side of the relationship, the correct setting in the Symbol menu is
________.
A) 1 and only 1
B) 1 or more
C) Zero or 1
D) Zero or more
A document database may use either XML or JSON as the basis for storing data.
page-pfb
A combination of two or more columns used to identify particular rows in a relation is a
________.
A) record
B) composite key
C) foreign key
D) surrogate key
In an SQL query, which SQL keyword is used to specify the column names to be used
in a join?
A) FROM
B) JOIN
C) SELECT
D) WHERE
page-pfc
The binary constraint must not indicates that ________.
A) a specific binary relationship must not be included in a ternary relationship
B) a table includes values that must not occur in a binary relationship
C) a table includes values that must not occur in a ternary relationship
D) a binary relationship includes value combinations that must not occur in a ternary
relationship
The SQL keyword used to limit column values to specific values is ________.
A) CONSTRAINT
B) CHECK
C) NOT NULL
D) UNIQUE
In the MySQL Workbench, a 1:N identifying relationship between two tables that do
not contain the needed primary and foreign keys is created using ________.
A) the 1:N Identifying Relationship button
page-pfd
B) the 1:N Non-identifying Relationship button
C) the N:M Identifying Relationship button
D) the Place a Relationship Using Existing Columns button
If the values in an SQL view are not changeable through the view itself, you may still
be able to update the view by using unique application logic. In this case, the specific
logic is placed in ________.
A) a BEFORE trigger
B) an INSTEAD OF trigger
C) an AFTER trigger
D) Depending on the specific logic, either A or B can be used.
In IDEF1X, extended E-R model ID-dependent relationships are called ________.
A) nonidentifying connection relationships
B) identifying connection relationships
C) nonspecific relationships
page-pfe
D) category clusters
Each of the following is a way of inserting data into a Microsoft Access table except
________.
A) Datasheet view
B) a data entry form
C) QBE
D) SQL
In Microsoft Visio 2013, the data models in this book are created using ________.
A) the Chen's Database Notation template
B) the UML database Notation template
C) the IDEF1X Database Notation template
D) the Crow's Foot Database Notation template
page-pff
Which type of backup in SQL Server will create a backup of the entire database?
A) Full backup
B) Transaction backup
C) Database backup
D) Complete backup
Which of the following does not describe a user-defined function?
A) It computes a numeric value
B) It can be called by name from within an SQL statement
C) It may have input parameters passed to it
D) It returns an output value to the calling statement
page-pf10
The DBMS creates ________, also called blocks, on its direct access fields.
A) psuedo records
B) physical records
C) secondary file records
D) key file records
In Microsoft Access, tables are added to a Query window by ________.
A) selecting the tables from the Use Table dialog box
B) selecting the tables from the Show Table dialog box
C) selecting the tables from the Tables section of the Navigation Pane
D) selecting the tables from the Queries section of the Navigation Pane
A collection of records and the N:M relationships between them is a ________.
A) simple network
B) complex network
C) compound network
page-pf11
D) logical network
Which of the following is known to be true if the command EXECabcCust @Cost = 5
is used in SQL to invoke a stored procedure in Microsoft SQL Server?
A) The name of the stored procedure is abcCust.
B) The name of the stored procedure is abc.
C) The parameter Cost is given a value of 5.
D) Both A and C are correct.
Complex networks can be represented by reducing them to simple networks, which
requires the introduction of a(n) ________.
A) association record
B) link record
C) intersection record
D) sequential record
page-pf12
Business Intelligence (BI) systems fall into which of the following categories?
A) Processing
B) Reporting
C) Data mining
D) Both B and C are correct
The intermediary between the application and the DBMS drivers in the ODBC
architecture is the ________.
A) driver manager
B) DBMS
C) ODBC driver
D) data source
page-pf13
The Oracle database PL/SQL statement used to test for a condition and then direct when
blocks of code should be run depending on the outcome of the test is ________.
A) DECLARE
B) BEGIN
C) IF...THEN...ELSE...END IF
D) LOOP
A classic example of unneeded normalization is when we are dealing with ________.
A) ZIP codes
B) sales orders and line items
C) association patterns
D) multivalued dependencies
A referential integrity constraint policy that insures that foreign key values in a table are
correctly maintained when there is a change to the primary key value in the parent table
is called ________.
A) incremental updates
page-pf14
B) incremental deletes
C) cascading updates
D) cascading deletes
In an SQL query, which SQL keyword is used to sort the result table by the values in
one or more columns?
A) GROUP BY
B) ORDER BY
C) SELECT
D) SORT BY
Which of the following is not a true statement about the current version of UML?
A) UML places a filled-in diamond on the parent of a weak entity.
B) UML provides a means to document exclusivity among subtypes.
C) UML uses the label <identifying> to document an ID-dependent relationship.
D) UML shows the cardinality on the parent entity of a weak entity as simply "1."
page-pf15
Based on the tables below, which of the following SQL statements would increase the
balance of the Gonzales account by $100 to a total of $450?
GENERAL SALES DATABASE:
SALESREP
CUSTOMER
A) SELECT Gonzales
FROM CUSTOMER
INSERT VALUES PLUS (100) INTO Balance;
B) SELECT Gonzales
FROM CUSTOMER
INSERT VALUES (450) INTO Balance;
C) INSERT INTO CUSTOMER VALUES (450)
SELECT Balance
WHERE CustName = 'Gonzales';
D) UPDATE CUSTOMER
page-pf16
SET Balance = 450
WHERE CustName = 'Gonzales';
The IIS Web server is managed using the ________.
A) Microsoft Internet Information Service (IIS) Manager
B) Microsoft SQL Server Management Studio
C) Microsoft Visual Studio
D) Microsoft IIS Workbench
You have been given two tables, CUSTOMER and SALE. You want to check the
referential integrity constraint:
SALE.CustomerNumber must exist in CUSTOMER.CustomerNumber
You run the following SQL query:
SELECT CustomerNumber
FROM SALE
WHERE CustomerNumber NOT IN
(SELECT CustomerNumber
page-pf17
FROM CUSTOMER);
What is shown in the results of this query?
A) All values of CustomerNumber that match the constraint.
B) All values of CustomerNumber that violate the constraint.
C) All values of CustomerNumber where
SALE.CustomerNumber = CUSTOMER.CustomerNumber.
D) All values of Customer number that are in CUSTOMER but not in SALE.
In a relational database design, all relationships are expressed by ________.
A) creating a primary key
B) creating a foreign key
C) creating a supertype
D) creating a subtype
A very popular development technique used by database professionals for database
design is known as ________.
page-pf18
A) database extraction
B) normalization
C) data models
D) entity-relationship data modeling
Which of the following is not true about locks?
A) Locks with large granularity are easier for the DBMS to administer.
B) Locks with small granularity cause more conflicts.
C) Locks may have a database-level granularity.
D) Locks may have a table-level granularity.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.