CDA 74228

subject Type Homework Help
subject Pages 20
subject Words 2259
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
While many subqueries can be alternatively written as joins, correlated subqueries do
work that cannot be duplicated as a join.
An information system is a set of components that interact to achieve some purpose or
goal.
SQL stands for Standard Query Language.
The description of a database's structure that is stored within the database itself is called
the metadata.
page-pf2
The elimination of modification anomalies and the reduction of duplicated data are
advantages of normalization.
A means must be created to recover all test databases to their original state during the
redesign testing process.
When transforming supertype/subtype entities into a relational database design, all of
the attributes for the supertype table are placed into the subtype relations.
page-pf3
The PL/SQL keyword RETURN is used to exit a block of code and terminate whatever
code structure is running.
A surrogate key is appropriate when the primary key of a table contains a lengthy text
field.
Michael Porter includes manufacturing operations in his list of primary activities.
All database applications get and put database data by sending SQL statements to the
DBMS.
page-pf4
The Oracle DBMS supports the SQL BEFORE trigger.
Cascading deletions are generally not used with relationships between strong entities.
Entities of a given type are grouped into entity classes.
In the MySQL Workbench, a 1:N non-identifying relationship between two tables that
page-pf5
already contain the needed primary and foreign keys is created using the Place a
Relationship Using Existing Columns button.
Microsoft Access SQL commands are run within the SQL View of a Query window.
Relationships among instances of a single entity class are called redundant
relationships.
A determinant of a functional dependency may or may not be unique in a relation.
page-pf6
XML Schemas consist of elements, attributes, and properties.
Every DBMS product uses the same API.
An identifier of an entity instance is one or more attributes that name or identify entity
instances.
Most of NoSQL nonrelational database methodologies are known as structured storage.
page-pf7
Surrogate keys are normally not shown on forms or reports.
Most data mining techniques are simple and easy to use.
The functional dependency noted as A → B means that the value of A can be
determined from the value of B.
page-pf8
XML documents that do not conform to their DTD are said to be non-type-valid XML
documents.
Denormalization is simplejoin the data together and store it in a table.
Sorting is specified by the use of the SORT BY phrase.
In SQL Server, it is not possible to make dirty reads.
page-pf9
The WHERE clause contains the condition that specifies which columns are to be
selected.
In the event of an application failure, Oracle Database uses the in-memory rollback
segments and OnLine ReDo files to recover.
A WHERE clause can contain another SELECT statement enclosed in parentheses.
page-pfa
The first step in using a JDBC driver is to establish a connection.
Type 2 JDBC drivers access ODBC data sources over a network.
To add a NULL column to a table, we simply use the MODIFY TABLE statement.
A computer-based information system has four components.
page-pfb
Extended E-R model weak, but non-ID-dependent relationships are called
nonidentifying connection relationships in IDEF1X.
Control files, as used by Oracle Database's backup and recovery features, contain
records of database changes.
Minimum cardinality refers to ________.
A) the most instances of one entity class that can be involved in a relationship with one
instance of another entity class
B) the minimum number of entity classes involved in a relationship
C) whether or not an instance of one entity class is required to be related to an instance
of another entity class
D) whether or not an entity is a weak entity
page-pfc
Describe the steps in assessing table structure when you are given a set of tables and
asked to construct a new database to store the existing data.
A Business Intelligence (BI) reporting system ________.
A) creates meaningful information from disparate data sources
B) delivers information to users at the DBA's convenience
C) uses statistical procedures to predict future events
D) uses operational data
When running a correlated subquery, the DBMS ________.
page-pfd
A) runs the lower SELECT statement by itself and then sends the results to the upper
SELECT statement.
B) runs the upper SELECT statement by itself and then sends the results to the lower
SELECT statement.
C) alternates running the lower SELECT statement with running the upper SELECT
statement based on each result of the lower SELECT statement
D) Either A or B may be used depending on the query.
A hybrid object is a semantic object that contains at least one ________.
A) single-value group attribute that includes a multi-value semantic object attribute
B) single-value group attribute that includes any semantic object attribute
C) multiple-value group attribute that includes a multi-value semantic object attribute
D) multiple-value group attribute that includes any semantic object attribute
Which of the following Oracle Database PL/SQL statements is not used to create a
block of code that repeats while some condition is true?
A) FOR
B) WHILE
page-pfe
C) BEGIN
D) LOOP
In the MySQL Workbench, a 1:N identifying relationship between two tables that
already contain the needed primary and foreign keys is created using ________.
A) the 1:N Identifying Relationship button
B) the 1:N Non-identifying Relationship button
C) the N:M Identifying Relationship button
D) the Place a Relationship Using Existing Columns button
Which of the following statements is not true for an enterprise-class database system?
A) The database application(s) interact(s) with the DBMS.
B) The database application(s) directly access(es) the database data.
C) The DBMS accesses the database data.
D) The application generates SQL statements.
page-pff
A null value can indicate which of the following conditions?
A) The value is incorrect.
B) The value is appropriate but unknown.
C) The value has been updated.
D) The value can never be changed.
For a Web server running the Linux operating system, the Web server typically used is
________.
A) the IIS Web server
B) the Apache Web server
C) the Tomcat Web server
D) the ASP.NET Web server
page-pf10
A collection of records and the 1:N relationships between them is a ________.
A) simple network
B) complex network
C) compound network
D) logical network
Which SQL keyword is used to change the values of an entire column?
A) CHANGE
B) INSERT
C) SELECT
D) SET
In an SQL query, which SQL keyword must be used to remove duplicate rows from the
result table?
A) DELETE
B) DISTINCT
page-pf11
C) UNIQUE
D) KEY
Which of the following is not true about XML?
A) It is a subset of SGML.
B) Additional standards and capabilities have been added to XML processing.
C) It is a hybrid of document processing and database processing.
D) It is a subset of HTML.
Which type of lock prevents all types of access to the locked resource?
A) Exclusive lock
B) Shared lock
C) Explicit lock
D) Implicit lock
page-pf12
RFM analysis is a way of analyzing and ranking customers based on online survey data.
Which of the following is not a common variant of the E-R model?
A) IE Crow's Foot
B) IDEF1X
C) UML
D) Object-oriented
In UML notation, the relationship line in a relationship between two strong entities is
labeled as ________.
A) <persistent>
B) <identifying>
C) <nonidentifying>
page-pf13
D) There is no label used.
In UML-style E-R diagrams, the second segment of an entity class contains ________.
A) the name of the entity
B) the cardinalities of the entity
C) relationships
D) entity attributes
The data model produced by reverse engineering is a(n) ________.
A) conceptual schema
B) internal schema
C) dependency graph
D) table-relationship diagram
page-pf14
When an entity has a relationship to itself, we have a(n) ________.
A) supertype/subtype relationship
B) archetype/instance relationship
C) recursive relationship
D) Both A and C are correct
The characteristics of a thing are described by its ________.
A) identifiers
B) entities
C) objects
D) attributes
page-pf15
Which of the following is a type of cursor concurrency that causes SQL Server to place
an update lock on a row when the row is read?
A) SCROLL_LOCK
B) Optimistic
C) Serializable
D) Read only
In IDEF1X, extended E-R model supertype entities are called ________.
A) generic entities
B) category entities
C) nonspecific entities
D) category clusters
The main MySQL GUI utility is ________.
A) MySQL Management Studio
B) MySQL Developer
page-pf16
C) My SQL Workbench
D) Both A and B are correct
Support for subqueries and creating indexes is a sign of what type of SQL grammar
conformance in a DBMS driver?
A) Level 2 API Grammar
B) Minimum SQL Grammar
C) Core SQL Grammar
D) Extended SQL Grammar
XML documents can be automatically generated from database data.
page-pf17
The CAP Theorem defines three properties of distributed database systems, which are
________.
A) consistency, always-on, properties
B) competency, always-on, properties
C) consistency, availability, partition tolerance
D) competency, availability, partition tolerance
When increasing cardinalities from 1:N to N:M, which of the following steps is not
included in the process? (The order of the steps listed below is not relevant, only the
steps themselves.)
A) Create an intersection table
B) Populate the intersection table
C) Drop the old foreign key
D) Drop the primary key
In an SQL query, which built-in function is used to obtain the largest value of numeric
columns?
A) AVG
page-pf18
B) COUNT
C) MAX
D) MIN
Which type(s) of index in SQL Server has/have a bottom level that does not contain
data but has pointers to the data?
A) Clustered
B) Nonclustered
C) Unique
D) Both A and B are correct
Data mining applications are used accomplish all of the following tasks except
________.
A) update the database
B) make predications
C) facilitate decision making
page-pf19
D) perform what-if analysis
A missing value is called a(n) ________.
A) empty value
B) null value
C) missing value
D) deleted value
Which of the following is not a possible step in the database redesign process?
A) Checking whether certain conditions or assumptions about the data are valid
B) Reverse engineering the data model
C) Revising user account name policies
D) Maintaining backups of the existing database
page-pf1a
One Business Intelligence (BI) reporting system that uses extensions to SQL is
________.
A) cluster analysis
B) OLAP
C) regression analysis
D) RFM analysis

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.