CAS CS 86430

subject Type Homework Help
subject Pages 26
subject Words 4048
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Unless it is being used to copy data from one table to another, the SQL INSERT
statement can be used to insert only a single row into a table.
A business process is a set of activities that transforms materials into products.
Rows in a table can be changed by using the SQL UPDATE statement.
A key can be composed of a group of attributes taken together.
page-pf2
To run an SQL script, click the "Execute SQL Script (or selected portion)" button on the
MySQL Workbench.
The NextVal method provides the next value in a sequence.
With ODBC, only a single driver is needed to handle all data source types, such as
Oracle, DB2, and Access.
Copies of each database record or page before being changed by a transaction that are
saved for use in database recovery are called before images.
page-pf3
Like all ID-dependent relationships, the parents of an association table are required.
The SQL Server default when creating a new database is to create two data files and
one log file for each database.
In general, optimistic locking is the preferred technique for Internet databases.
page-pf4
One important result of OLE DB is that data does not have to be moved or converted
from one form to another.
The SQL Server DBMS supports the SQL BEFORE trigger.
Business Intelligence (BI) reporting systems can analyze data using standard SQL.
The result of an SQL SELECT operation can contain duplicate rows.
page-pf5
SQL Server automatically makes determinations of whether or not to promote or
demote a lock.
Rows can be removed from a table by using the SQL DELETE statement.
The word key indicates a field or fields whose value uniquely or nonuniquely identifies
a record or set of records.
page-pf6
An attribute is considered to be a non-key attribute when it is a non-prime attribute,
which means that the attribute is not contained in any candidate key.
The security provided by the DBMS often has to be augmented by additional security
features within the application program.
The e-commerce companies use Web activity databases to determine which items on a
Web page are popular and successful.
A tree structure cannot be represented using indexes.
page-pf7
When recovering a database in SQL Server, it is possible to process the log to a
particular point in time or to a transaction mark.
An asterisk (*) following the SELECT verb means that all columns are to be displayed.
The SQL keyword CHECK is used to limit column values to specific values.
page-pf8
The PL/SQL keywords FOR, WHILE, and LOOP are used to create blocks of code that
repeat until an ending condition is reached.
The IDEF1X equivalent of the extended E-R model subtype is the category entity, and
category entities are placed in categorization clusters.
Data mining is the application of mathematical and statistical techniques to find
patterns and relationships that can be used to classify and predict future outcomes.
Maximum cardinalities are represented in UML-style E-R diagrams with the same
notation (1:1, 1:N, N:M) as in traditional E-R diagrams.
page-pf9
The multivalued, multicolumn problem occurs when a set of columns are used to store
data that should actually be in one column.
An alternative to combining tables by a subquery is to use a join.
In SQL Server, a differential backup makes a copy of the entire database.
page-pfa
MySQL users should always be given the GRANT OPTION for each schema.
In IDEF1X, a base domain can have any of the following except a ________.
A) data type
B) value list
C) range definition
D) default value
A stored procedure can be stored in a text file and run with the Microsoft SQL Server
Management Studio. If we are running the code that creates this procedure for the third
time, it must start with ________.
A) RUN PROCEDURE
B) CREATE PROCEDURE
C) ALTER PROCEDURE
D) MODIFY PROCEDURE
page-pfb
The MySQL SQL/PSM statement used to test for a condition and then direct which
blocks of code should be run depending on the outcome of the test is ________.
A) DECLARE
B) BEGIN
C) IF...THEN...ELSE...END IF
D) REPEAT
Given the functional dependency (A, B) → C, (A, B) is a ________.
A) dependent variable
B) determinant
C) composite determinant
D) Both B and C are correct
page-pfc
Refer to the table above.What is the support for Drug A and Drug B?
A) .025
B) .075
C) .100
D) .125
A composite object is a semantic object that contains ________.
A) single-value, simple or group attributes, but no object attributes
B) at least one object attribute
C) at least one multi-value, simple or group attribute but no object attributes
D) at least one multi-value, object attribute
Which of the following is true about JSP code?
A) It must be written in Java or JavaScript.
B) It does not have access to HTTP functionality.
C) It must be coded as complete Java classes and methods.
page-pfd
D) It is automatically converted into Java servlets.
The MySQL SQL/PSM code structure defines variables with the keyword ________.
A) DECLARE
B) BEGIN
C) IF...THEN...ELSE...END IF
D) VAR
Which of the following is allowed by "Repeatable Read Isolation"?
A) Nonrepeatable reads
B) Dirty reads
C) Phantom reads
D) Both A and B are correct
page-pfe
Which of the following is not an ANSI SQL trigger?
A) BEFORE UPDATE
B) INSTEAD OF UPDATE
C) AFTER INSERT
D) INSTEAD OF CONSTRAINT
Recovering a database via reprocessing involves ________.
A) restoring the database from the save and reprocessing all the transactions since the
save
B) restoring the database from the save and reapplying all the changes made by
transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and
restarting the valid transactions that were in process at the time of the failure
D) recreating the database by reentering all of the data from the beginning, and then
reprocessing all of the transactions
page-pff
The Oracle tool used to copy data into a database table from a spreadsheet is called the
________.
A) Spreadsheet Wizard
B) Data Import Wizard
C) Database Configuration Assistant
D) Enterprise Manager Database Express
Hardware specifications are determined during the ________ step of the SDLC.
A) system definition
B) requirements analysis
C) component design
D) implementation
In Microsoft Visio 2010, which object can be formatted with the line end symbols
needed to create IE Crow's Foot notation?
A) Relationship connector object
page-pf10
B) Category object
C) Parent to category connector object
D) Category to child connector object
Which of the following is the default transaction isolation level for SQL Server?
A) Repeatable Read
B) Read Committed
C) Serializable
D) Read Uncommitted
In an SQL query, which SQL keyword is used to specify the names of tables to be
joined?
A) FROM
B) HAVING
C) JOIN
D) WHERE
page-pf11
When a transaction reads a row that has been changed, but the change has not been
committed, this is known as a ________.
A) Clean read
B) Dirty read
C) Nonrepeatable read
D) Phantom read
DBMSs associated with the NoSQL movement use all of the following kinds of
database management systems except ________.
A) Key-Value
B) Document
C) Relational
D) Graph
page-pf12
DBMS objects are displayed ________.
A) in the Navigation Pane
B) in the Object Browser
C) in the tabbed database window
D) in the tabbed document window
In UML, an attribute that is accessible and can be changed by any method of any object
is said to be ________.
A) private
B) exclusive
C) protected
D) public
In a B-Tree whose top entry contains the values 47 and 88, the middle arrow allows
page-pf13
access to all records whose key field values are ________.
A) less than 47
B) greater than 47 and less than 88
C) greater than 47 and less than or equal to 88
D) greater than 88
The Oracle Database variant of SQL with additional procedural language components is
________.
A) T-SQL
B) PL/SQL
C) My/SQL
D) MS/SQL
Which of the following is the easiest tool for creating a database with Oracle Database?
A) The Oracle Enterprise Manager Database Express
B) The Oracle SQL*Plus command utility program
page-pf14
C) The Oracle Database Configuration Assistant
D) The Oracle SQL Developer
Business Intelligence (BI) reporting systems can do all of the following operations
except ________.
A) filter data
B) group data
C) modify data
D) sort data
A set of SQL statements stored in an application written in a standard programming
language is called ________.
A) a stored procedure
B) a view
C) embedded SQL
D) a trigger
page-pf15
When one SQL query is embedded in another SQL query to simulate a join, the second
SQL query is embedded in the ________ of the first query.
A) SELECT
B) FROM
C) WHERE
D) HAVING
Which of the following is true about indexes in SQL Server?
A) SQL Server automatically creates indexes for columns appearing in WHERE clauses
in queries.
B) SQL Server pads all indexes.
C) SQL Server supports filling up to a limit of 70 percent.
D) SQL Server automatically creates indexes for foreign keys.
page-pf16
When a transaction rereads data that has been changed and finds changes due to
committed transactions, this is known as a ________.
A) Clean read
B) Dirty read
C) Nonrepeatable read
D) Phantom read
In Microsoft Access, relationships between tables are created ________.
A) by the Relationships button on the Create command tab
B) by the Relationships button on the Home command tab
C) in the Relationships window
D) in the Table window of the table containing the primary key
The MySQL keyword to create a cursor is ________.
A) DECLARE CURSOR {CursorName}
page-pf17
B) OPEN {CursorName}
C) FETCH
D) CLOSE {CursorName}
By default, the E-R diagrams created in the MySQL Workbench use ________.
A) IE Crow's Foot notation
B) IDEF1X notation
C) UML notation
D) Microsoft Visio 2013 Arrow notation
What are the IDEF1X equivalents of 1:1, 1:N and N:M relationships?
page-pf18
How does Michael Porter define support business activities? What do they include?
What are the three types of database design situations?
page-pf19
What are the five steps or stages of the systems development life cycle (SDLC)?
Discuss the DBMS security model.
page-pf1a
Describe how to create and run an SQL query in MySQL Server Community Edition.
Briefly explain the process for importing spreadsheet data into a SQL Server table, and
indicate some of the pitfalls or potential problems.
page-pf1b
Compare and contrast servlets and applets.
Explain the concept of a surrogate key.
Briefly explain the process for configuring MySQL for importing Excel 2013
spreadsheet data into a SQL Server table, then discuss the import process using the
MySQL for Excel Add-In.
page-pf1c
How is minimum cardinality expressed in IE Crow's Foot E-R diagrams?
Discuss the role of backup and test databases in database redesign.
page-pf1d
Briefly define the three problems that can occur because of concurrent processing that
are addressed by resource locking.
What is ADO.NET and what is an ADO.NET DataSet?
page-pf1e
Explain how to work around the SQL Server IDENTITY constraint when
non-sequential data must be entered.
Which are more commonly used: implicit or explicit locks? Why?
page-pf1f
Describe and discuss the main elements of the Entity-Relationship (E-R) model.
Include an example.
Specify the four categories of NoSQL databases used in the text, and give an example
of each.
page-pf20
What are the Java JVM, JRE, SDK, and NetBeans? How do they relate?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.