CICS 11002

subject Type Homework Help
subject Pages 25
subject Words 3851
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A defining requirement for Boyce-Codd Normal Form (BCNF) is that every candidate
key must be a determinant.
Among its many functions, SQL*Plus is also a programming language.
In the Windows 8 or 8.1 OS, to start working with the MySQL Workbench use the
command Start | All Programs | MySQL | MySQL Workbench 6.1 CE.
To add a table to a database design, click the Place a New Table button, move the
cursor to the diagram area and click the left mouse button.
page-pf2
The SQL wildcard character "%" represents a series of one or more unspecified
characters.
Concurrency control measures are taken to ensure that one user's work has absolutely
no influence on another user's work.
In an Enterprise-class database system, a database application interacts with the DBMS.
page-pf3
Although Microsoft Excel 2013 will create a PivotTable report using SQL Server 2014
data, it does not have formatting tools that can be used with the report.
If you include a slash as the last line in an Oracle stored procedure, the procedure will
be compiled and stored when you run the block of code.
The DBA should periodically analyze run-time statistics of database performance to
help manage the DBMS.
An active data repository is one in which the metadata is automatically created as the
system components are created.
page-pf4
In the functional dependency shown as A → B, B is the determinant.
In a common form of RFM analysis, a score of 1 is "high" or "good" while a score of 5
is "low" or "bad."
The DBMS ranked as having the "most power and features" in the text is IBM's DB2.
page-pf5
The Microsoft SQL Server Management Studio cannot verify SQL statements until they
are executed.
When examining data values as a part of assessing table structure, there is no need to
try to determine candidate keys other than the table's primary key.
By default, the identifier of the entity becomes the foreign key of the corresponding
table.
Two-phased locking has a growing phase and a shrinking phase.
page-pf6
In SQL Server, insert and update triggers store old values in a pseudotable named
deleted.
An identifier serves the same role for a table that a key does for an entity.
A defining requirement for BCNF is that every determinant must be a candidate key.
page-pf7
In UML notation, the relationship line in a relationship with a non-ID-dependent weak
entity is labeled as <nonidentifying>.
United States ZIP codes are a classic example of unneeded normalization.
It is recommended that MySQL be used with the InnoDB storage engine.
The DBMS ranked as being the "most difficult to use" in the text is Oracle
Corporation's Oracle Database.
page-pf8
Joins that show the matching rows from the joined tables plus unmatched rows from
one other table in their results are called outer joins.
The PL/SQL keyword STOP HERE is used to complete the basic PL/SQL block
structure.
SQL Server AFTER triggers may be assigned to either tables or views.
SQL is only a data manipulation language (DML).
page-pf9
When two conditions must both be true for the rows to be selected, the conditions are
separated by the SQL AND keyword.
Databases are a key component of e-commerce order entry, billing, shipping and
customer support.
The DBMS ranked as being the "easiest to use" in the text is Microsoft's SQL Server.
page-pfa
Oracle Database only reads committed changes, and therefore dirty reads are not
possible.
For a workstation running the Windows operating system, a commonly used Web
browser is Microsoft Internet Explorer.
Databases based on the CODASYL standard are based on the network data model.
In an IDEF1X identifying connection relationship, ________.
A) the identifier of the child is always part of the identifier of the parent
B) the identifier of the parent is always part of the identifier of the child
page-pfb
C) the identifier of the parent is always the same as the identifier of the child
D) the identifier of the parent is optional
Which of the following is not a component of a data warehouse?
A) Data extract, transform, and load (ETL) preparation programs
B) Data warehouse data
C) Data warehouse metadata
D) Operational database updates
A data mart differs from a data warehouse in all the following ways except ________.
A) data marts use more operational data
B) it deals with a particular component or functional area of the business
C) data mart users do not have the data management expertise of data warehouse
employees
D) it has a smaller database
page-pfc
SQL triggers are not used for ________.
A) validity checking
B) providing default values
C) updating views
D) creating tables
An attribute is also known as a ________.
A) table
B) relation
C) row
D) field
page-pfd
Which PHP command displays the current configuration settings on the web page
________.
A) phpconfig( )
B) phpinfo( )
C) index.html
D) phptest.php
The "R" in RFM analysis stands for ________.
A) rank
B) recent
C) relationship
D) readiness
Oracle requires the use of Java for generating XML documents from database data.
page-pfe
An OLAP cube is called that because some products show OLAP displays on ________
axes.
A) one
B) two
C) three
D) four
DBMSs associated with the NoSQL movement are often known as ________.
A) RDBMSs
B) OODBMSs
C) SSDBMSs
D) structured storage
page-pff
In IDEF1X, a non-specific relationship is indicated by ________.
A) a hollow circle on each end of the solid relationship line
B) no circles on either end of the dotted relationship line
C) a solid circle on each end of the solid relationship line
D) a solid circle on each end of the dotted relationship line
Which of the following is not a key element of an E-R model?
A) Relationships
B) Entities
C) Objects
D) Attributes
A Java virtual machine is actually a ________.
A) program compiler
B) JDBC data source
C) bytecode interpreter
page-pf10
D) JDBC driver
Business Intelligence (BI) reporting systems are used to filter data, sort data, group
data, and make simple calculations based on the data.
When creating a T-SQL statement, you should ________.
A) predefine it graphically in Enterprise Manager
B) limit it to one table
C) limit it to two tables
D) end it with the semicolon normally used to terminate SQL statements
page-pf11
In order to make sure the database redesign is working properly during the redesign
testing process, a means must be created to ________.
A) reverse engineer all test databases
B) graph dependencies in all test databases
C) recover all test databases to their original state
D) re-interview all relevant users
The SQL keyword TOP ________.
A) limits the number of columns retrieved from a table
B) limits the number of rows retrieved from a table
C) limits the number of tables retrieved from a database
D) A and C
What type of attribute has a single element?
A) Single
B) Simple
page-pf12
C) Link
D) Compound
Reviewing the work done on a table that was created using existing data from multiple
sources, you are likely to find that some data values that were provided were never
entered into the table. This is an example of ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
In a doubly nested set of NOT EXISTS SELECT statements, ________.
A) if a row does not not match any row, then it matches every row
B) if a row matches any row, then it matches every row
C) if a row does not match any row, then it does not match every row
D) if a row matches any row, then it does not match every row
page-pf13
We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example of
________.
A) dirty data
B) inconsistent data
C) non-integrated data
D) a "wrong format" problem
Denormalization reduces the complexity of the SQL statements needed in an
application to read required data.
A doubly nested set of NOT EXISTS SELECT statements is ________.
page-pf14
A) a famous pattern in SQL
B) regularly used
C) rarely used to nonexistent in the real world
D) Both A and B are correct
The relationship between a parent object and its associated subtype objects is a(n)
________.
A) HAS-A relationship
B) WANTS-A relationship
C) NEEDS-A relationship
D) IS-A relationship
Specifying locking hints in which parameter in an SQL clause can modify locking
behavior in SQL Server?
A) SELECT
B) WITH
C) LOCK
page-pf15
D) HINT
A database designed using spreadsheets from the Sales department is a database being
designed ________.
A) from existing data
B) as a new systems development project
C) as a redesign of an existing database
D) as a NoSQL database
Which of the following statements is not true for primary keys in a relational database
system?
A) They can be used to create relationships between tables.
B) They must contain numeric data.
C) They uniquely identify a row in a table.
D) They can be part of relational integrity constraints.
page-pf16
You are given an E-R diagram with two entities, ORDER and CUSTOMER, as shown
above, and are asked to draw the relationship between them. If a given customer can
place many orders and a given order can be placed by one or more customers, which of
the following should be indicated in the relationship symbol between the two entities?
A) N:M
B) 1:1
C) 1:N
D) N:1
Which of the following is true about XML?
A) It allows the confounding of document structure, content, and format.
B) It is non-standardized to allow for extension by developers.
C) The structure of documents is formally defined.
D) XML tags, like some HTML tags, are vague and arbitrary.
page-pf17
Which of the following is not true about Tomcat?
A) It is a servlet processor.
B) It can be used as a standalone Web server.
C) It is often used in conjunction with Apache.
D) It is an applet processor.
Which of the following is not true about N:M recursive relationships?
A) Both foreign keys in the intersection table refer to the same table.
B) Since it is a recursive relationship, an intersection table is not needed.
C) The foreign keys in the intersection table can't refer to the same attribute in the
parent table.
D) Both B and C are correct.
Explain and contrast the results provided by the EXISTS, NOT EXISTS, and
doubly-nested NOT EXISTS keywords.
page-pf18
What format is used for weak entities in UML-style E-R diagrams?
Explain the process by which JSP pages are compiled.
page-pf19
Briefly define the four isolation levels and the problems they prevent.
What additional permissions must be assigned before a user can work with files on the
IIS Web server?
page-pf1a
What new contributions to data modeling do UML-style E-R diagrams introduce?
Briefly explain the different SQL Server backup types.
Briefly define and discuss what an information system is, the five components that
comprise an information system, and what the purpose of an information system is.
page-pf1b
Describe how to create relationships in a MySQL Workbench database design.
What are null values, and why are they a problem?
page-pf1c
Explain the Oracle Database PL/SQL Block Structure.
What components are included in a database?
page-pf1d
Explain the relationships among native DBMS libraries, ODBC, OLE DB, ADO, and
ADO.NET and why each led to the development of the next.
What are the elements of a graph database?
page-pf1e
Microsoft Access is considered a "personal database" product. What is a personal
database?
Explain the pragmatic reason for using surrogate keys.
page-pf1f
Explain the concept of serializable transactions.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.