This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
The same data might be simultaneously structured and unstructured depending on the
intended processing.
a. True
b. False
In DBLC, the phase after the database initial study is ___________.
a. operation
b. database design
c. database initial study
d. implementation and loading
Stored procedures help reduce code duplication by means of code isolation and code
sharing.
a. True
b. False
Explanatory analytics employs mathematical and statistical algorithms, neural
networks, artificial intelligence, and other advanced modeling tools to create actionable
predictive models based on available data.
a. True
b. False
If Tiny College has some departments that are classified as "research only" and do not
offer courses, the COURSE entity of the college database would be
________________the DEPARTMENT entity.
a. existence-dependent on
b. independent of
c. mandatory for
d. optional to
Time stamping demands a lot of system resources because many transactions might
have to be stopped, rescheduled, and stamped.
a. True
b. False
When an end user uses a web browser to dynamically query a database, the client
browser actually requests a web page from the web server.
a. True
b. False
__________________ activities cover all tasks directly related to the day-to-day
operations of the DBMS and its applications.
a. Backup and recovery
b. System support
c. Performance monitoring and tuning
d. Security auditing and monitoring
Ideally, an entity identifier is composed of ____________attribute(s).
a. three
b. one
c. two
d. six
In implementation terms, an entity is existence-dependent if it has a mandatory primary
key.
a. True
b. False
The database initial study phase of the Database Life Cycle (DBLC)
involves___________ .
a. defining objectives
b. introducing changes
c. testing the database
d. installing the DBMS
Software vendors have adopted the Chen representation because of its compact
representation.
a. True
b. False
_______________-data exist in the format in which they were collected.
a. Structured
b. Semistructured
c. Unstructured
d. Historical
In the Systems Development Life Cycle (SDLC), problems defined during the planning
phase are examined in greater detail during the analysis phase.
a. True
b. False
Multidimensional data analysis techniques include advanced computational functions.
a. True
b. False
The term______________ refers to scattered locations storing the same basic data.
The " __________________" characteristic of a primary key states that the primary key
must uniquely identify each entity instance, must be able to guarantee unique values,
and must not contain nulls.
a. unique values
b. nonintelligent
c. preferably single-attribute
d. security-complaint
The "______________ " characteristic of a primary key states that the primary key
should not have embedded semantic meaning.
a. unique values
b. nonintelligent
c. preferably single-attribute
d. security-compliant
In the entity relationship model, a table row corresponds to an entity instance.
a. True
b. False
The main purpose of a backup is to guarantee database restoration following a hardware
or software failure.
a. True
b. False
The majority of primary memory resources will be allocated to the__________ cache.
a. data
b. SQL
c. sort
d. optimizer
MySQL allows multiple triggering conditions per trigger.
a. True
b. False
A(n)________ might be written by a programmer or it might be created through a
DBMS utility program.
a. query
b. operating system
c. database management system
d. application
In the prognosis phase, the data-mining findings are used to predict future behavior and
forecast business outcomes.
a. True
b. False
The scheduler establishes the order in which the operations within concurrent
transactions are executed.
a. True
b. False
The Common Gateway Interface (CGI) is a newer web server interface standard that is
much more efficient and faster than a dynamic link library (DLL).
a. True
b. False
Fully equivalent means that the optimized query results are always the same as the
original query.
a. True
b. False
In a(n)__________ diagram, the arrows above the attributes indicate all desirable
dependencies.
a. Chen
b. dependency
c. functionality
d. ER
____________keys work with primary keys to properly implement relationships in the
relational model.
a. Foreign
b. Composite
c. Natural
d. Surrogate
In the relational model,___________ are important because they are used to ensure that
each row in a table is uniquely identifiable.
a. relations
b. keys
c. indexes
d. logical structures
Distributed data access was needed to support geographically dispersed business units.
a. True
b. False
Within the data security framework,__________ is concerned with keeping data
consistent and free of errors or anomalies.
The DBA must review the database application design to ensure that transactions
are_____________ , meaning that they mirror real-world events.
In_________________________ , a threepronged symbol represents the "many" side of
the relationship.
Any attribute whose value determines other values within a row is known as
a___________ .
How do transaction recovery procedures use the deferred-write and write-through
techniques to recover transactions?
Explain the concept of logical design and list the steps involved.
__________________-is a measure of the likelihood that an index will be used in query
processing.
Disjoint subtypes are also known as_____________ subtypes.
How can queries be written to perform the fastest when equality and inequality
comparisons are needed?
Performance monitoring and ___________activities are designed to ensure that the
DBMS, utilities, and applications maintain satisfactory performance levels.
The relational operators have the property of__________ ; that is, the use of relational
algebra operators on existing relations (tables) produces new relations.
In SQL, all_____________ expressions evaluate to true or false.
To avoid nulls, some designers use special codes, known as__________ , to indicate the
absence of some value.
_______________control is important because the simultaneous execution of
transactions over a shared database can create several data integrity and consistency
problems.
What steps are involved in the conversion to third normal form?
When indicating cardinality, the first value represents the_________ number of
associated entities.
The basic SQL vocabulary has fewer than ______________words.
Describe performance transparency and heterogeneity transparency.
List and briefly describe the three types of system maintenance activities.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.