This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
While many subqueries can be alternatively written as joins, correlated subqueries do
work that cannot be duplicated as a join.
An information system is a set of components that interact to achieve some purpose or
goal.
SQL stands for Standard Query Language.
The description of a database's structure that is stored within the database itself is called
the metadata.
The elimination of modification anomalies and the reduction of duplicated data are
advantages of normalization.
A means must be created to recover all test databases to their original state during the
redesign testing process.
When transforming supertype/subtype entities into a relational database design, all of
the attributes for the supertype table are placed into the subtype relations.
The PL/SQL keyword RETURN is used to exit a block of code and terminate whatever
code structure is running.
A surrogate key is appropriate when the primary key of a table contains a lengthy text
field.
Michael Porter includes manufacturing operations in his list of primary activities.
All database applications get and put database data by sending SQL statements to the
DBMS.
The Oracle DBMS supports the SQL BEFORE trigger.
Cascading deletions are generally not used with relationships between strong entities.
Entities of a given type are grouped into entity classes.
In the MySQL Workbench, a 1:N non-identifying relationship between two tables that
already contain the needed primary and foreign keys is created using the Place a
Relationship Using Existing Columns button.
Microsoft Access SQL commands are run within the SQL View of a Query window.
Relationships among instances of a single entity class are called redundant
relationships.
A determinant of a functional dependency may or may not be unique in a relation.
XML Schemas consist of elements, attributes, and properties.
Every DBMS product uses the same API.
An identifier of an entity instance is one or more attributes that name or identify entity
instances.
Most of NoSQL nonrelational database methodologies are known as structured storage.
Surrogate keys are normally not shown on forms or reports.
Most data mining techniques are simple and easy to use.
The functional dependency noted as A → B means that the value of A can be
determined from the value of B.
XML documents that do not conform to their DTD are said to be non-type-valid XML
documents.
Denormalization is simplejoin the data together and store it in a table.
Sorting is specified by the use of the SORT BY phrase.
In SQL Server, it is not possible to make dirty reads.
The WHERE clause contains the condition that specifies which columns are to be
selected.
In the event of an application failure, Oracle Database uses the in-memory rollback
segments and OnLine ReDo files to recover.
A WHERE clause can contain another SELECT statement enclosed in parentheses.
The first step in using a JDBC driver is to establish a connection.
Type 2 JDBC drivers access ODBC data sources over a network.
To add a NULL column to a table, we simply use the MODIFY TABLE statement.
A computer-based information system has four components.
Extended E-R model weak, but non-ID-dependent relationships are called
nonidentifying connection relationships in IDEF1X.
Control files, as used by Oracle Database's backup and recovery features, contain
records of database changes.
Minimum cardinality refers to ________.
A) the most instances of one entity class that can be involved in a relationship with one
instance of another entity class
B) the minimum number of entity classes involved in a relationship
C) whether or not an instance of one entity class is required to be related to an instance
of another entity class
D) whether or not an entity is a weak entity
Describe the steps in assessing table structure when you are given a set of tables and
asked to construct a new database to store the existing data.
A Business Intelligence (BI) reporting system ________.
A) creates meaningful information from disparate data sources
B) delivers information to users at the DBA's convenience
C) uses statistical procedures to predict future events
D) uses operational data
When running a correlated subquery, the DBMS ________.
A) runs the lower SELECT statement by itself and then sends the results to the upper
SELECT statement.
B) runs the upper SELECT statement by itself and then sends the results to the lower
SELECT statement.
C) alternates running the lower SELECT statement with running the upper SELECT
statement based on each result of the lower SELECT statement
D) Either A or B may be used depending on the query.
A hybrid object is a semantic object that contains at least one ________.
A) single-value group attribute that includes a multi-value semantic object attribute
B) single-value group attribute that includes any semantic object attribute
C) multiple-value group attribute that includes a multi-value semantic object attribute
D) multiple-value group attribute that includes any semantic object attribute
Which of the following Oracle Database PL/SQL statements is not used to create a
block of code that repeats while some condition is true?
A) FOR
B) WHILE
C) BEGIN
D) LOOP
In the MySQL Workbench, a 1:N identifying relationship between two tables that
already contain the needed primary and foreign keys is created using ________.
A) the 1:N Identifying Relationship button
B) the 1:N Non-identifying Relationship button
C) the N:M Identifying Relationship button
D) the Place a Relationship Using Existing Columns button
Which of the following statements is not true for an enterprise-class database system?
A) The database application(s) interact(s) with the DBMS.
B) The database application(s) directly access(es) the database data.
C) The DBMS accesses the database data.
D) The application generates SQL statements.
A null value can indicate which of the following conditions?
A) The value is incorrect.
B) The value is appropriate but unknown.
C) The value has been updated.
D) The value can never be changed.
For a Web server running the Linux operating system, the Web server typically used is
________.
A) the IIS Web server
B) the Apache Web server
C) the Tomcat Web server
D) the ASP.NET Web server
A collection of records and the 1:N relationships between them is a ________.
A) simple network
B) complex network
C) compound network
D) logical network
Which SQL keyword is used to change the values of an entire column?
A) CHANGE
B) INSERT
C) SELECT
D) SET
In an SQL query, which SQL keyword must be used to remove duplicate rows from the
result table?
A) DELETE
B) DISTINCT
C) UNIQUE
D) KEY
Which of the following is not true about XML?
A) It is a subset of SGML.
B) Additional standards and capabilities have been added to XML processing.
C) It is a hybrid of document processing and database processing.
D) It is a subset of HTML.
Which type of lock prevents all types of access to the locked resource?
A) Exclusive lock
B) Shared lock
C) Explicit lock
D) Implicit lock
RFM analysis is a way of analyzing and ranking customers based on online survey data.
Which of the following is not a common variant of the E-R model?
A) IE Crow's Foot
B) IDEF1X
C) UML
D) Object-oriented
In UML notation, the relationship line in a relationship between two strong entities is
labeled as ________.
A) <persistent>
B) <identifying>
C) <nonidentifying>
D) There is no label used.
In UML-style E-R diagrams, the second segment of an entity class contains ________.
A) the name of the entity
B) the cardinalities of the entity
C) relationships
D) entity attributes
The data model produced by reverse engineering is a(n) ________.
A) conceptual schema
B) internal schema
C) dependency graph
D) table-relationship diagram
When an entity has a relationship to itself, we have a(n) ________.
A) supertype/subtype relationship
B) archetype/instance relationship
C) recursive relationship
D) Both A and C are correct
The characteristics of a thing are described by its ________.
A) identifiers
B) entities
C) objects
D) attributes
Which of the following is a type of cursor concurrency that causes SQL Server to place
an update lock on a row when the row is read?
A) SCROLL_LOCK
B) Optimistic
C) Serializable
D) Read only
In IDEF1X, extended E-R model supertype entities are called ________.
A) generic entities
B) category entities
C) nonspecific entities
D) category clusters
The main MySQL GUI utility is ________.
A) MySQL Management Studio
B) MySQL Developer
C) My SQL Workbench
D) Both A and B are correct
Support for subqueries and creating indexes is a sign of what type of SQL grammar
conformance in a DBMS driver?
A) Level 2 API Grammar
B) Minimum SQL Grammar
C) Core SQL Grammar
D) Extended SQL Grammar
XML documents can be automatically generated from database data.
The CAP Theorem defines three properties of distributed database systems, which are
________.
A) consistency, always-on, properties
B) competency, always-on, properties
C) consistency, availability, partition tolerance
D) competency, availability, partition tolerance
When increasing cardinalities from 1:N to N:M, which of the following steps is not
included in the process? (The order of the steps listed below is not relevant, only the
steps themselves.)
A) Create an intersection table
B) Populate the intersection table
C) Drop the old foreign key
D) Drop the primary key
In an SQL query, which built-in function is used to obtain the largest value of numeric
columns?
A) AVG
B) COUNT
C) MAX
D) MIN
Which type(s) of index in SQL Server has/have a bottom level that does not contain
data but has pointers to the data?
A) Clustered
B) Nonclustered
C) Unique
D) Both A and B are correct
Data mining applications are used accomplish all of the following tasks except
________.
A) update the database
B) make predications
C) facilitate decision making
D) perform what-if analysis
A missing value is called a(n) ________.
A) empty value
B) null value
C) missing value
D) deleted value
Which of the following is not a possible step in the database redesign process?
A) Checking whether certain conditions or assumptions about the data are valid
B) Reverse engineering the data model
C) Revising user account name policies
D) Maintaining backups of the existing database
One Business Intelligence (BI) reporting system that uses extensions to SQL is
________.
A) cluster analysis
B) OLAP
C) regression analysis
D) RFM analysis
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.