An Entity Supertype Can Have Disjoint Or Overlapping Entity Subtypes

subject Type Homework Help
subject Pages 13
subject Words 1719
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A(n)_________ specifically reserves access to the transaction that locked the object.
a. shared lock
b. exclusive lock
c. binary lock
d. deadlock
Which of the following is a client-side extension?
a. ActiveX
b. ODBC
c. SQL*Net
d. TCP/IP
System support activities cover all tasks directly related to the day-to-day operations of
a DBMS and its applications.
a. True
b. False
page-pf2
An entity supertype can have disjoint or overlapping entity subtypes.
a. True
b. False
_______________transparency exists when the end user or programmer must specify
both the fragment names and their locations.
a. Local mapping
b. Location
c. Performance
d. Fragmentation
page-pf3
The ___________table space is used to store the data dictionary tables.
a. system
b. user data
c. temporary
d. rollback segment
The objective of normalization is to ensure that each table conforms to the concept of
well-formed relations.
a. True
b. False
The security, privacy, and integrity of data in a database are of minimal concern to
DBAs who manage current DBMS installations.
a. True
b. False
page-pf4
The_______________- data type is considered compatible with VARCHAR(35).
a. DATE
b. INT
c. TINYINT
d. CHAR(15)
Producing the required information flow is part of the _________phase of the Database
Life Cycle (DBLC).
a. database initial study
b. database design
c. operation
d. testing and evaluation
page-pf5
A data administrator is also known as a(n)______ .
a. data security officer
b. systems administrator
c. information resource manager
d. information engineering officer
All transactions must display______________ .
a. atomicity, consistency, and durability
b. durability and isolation
c. consistency, durability, and isolation
d. atomicity, durability, consistency, and isolation
Timestamps must only have the single property of uniqueness.
a. True
b. False
page-pf6
Physical design becomes simpler when data is distributed at different locations.
a. True
b. False
Each statement inside the PL/SQL code must end with a period (".").
a. True
b. False
Which of the following is an advantage associated with a distributed database
management system (DDBMS)?
a. Reduced operating costs
b. Simplicity of management and control
page-pf7
c. Decreased storage requirements
d. Decreased training costs
The primary factor in determining the most efficient access plan is the I/O cost.
a. True
b. False
_______________fragmentation refers to the division of a relation into subsets of
tuples.
a. Vertical
b. Horizontal
c. Data
d. Mixed
page-pf8
The DIVIDE operation uses one singlecolumn table (e.g., column "a") as the divisor
and one twocolumn table (e.g., columns "a" and "b") as the dividend.
a. True
b. False
RDBMSs enforce integrity rules automatically.
a. True
b. False
Within a specialization hierarchy, a supertype can exist only within the context of a
subtype.
a. True
b. False
page-pf9
The effects of bad database design, implementation, and management are magnified in
an environment in which the number of transactions is less than one hundred.
a. True
b. False
A(n)___________ is a logical grouping of several data files that store data with similar
characteristics.
a. procedure cache
b. table space
c. data cache
d. listener
page-pfa
Business intelligence is a framework that allows a business to transform data into
information, information into knowledge, and knowledge into wisdom.
a. True
b. False
ANSI-standard SQL allows the use of special operators in conjunction with the
WHERE clause.
a. True
b. False
_________________security breaches include database access by computer viruses and
by hackers whose actions are designed to destroy or alter data.
a. Debilitative
b. Preserving
c. Corrupting
d. Destructive
page-pfb
A system table space, a user data table space, an index table space, and a temporary
table space are examples of _____.
a. procedure caches
b. file groups
c. data caches
d. operation modes
Within the database environment, a data model represents data structures with the
purpose of supporting a specific problem domain.
a. True
b. False
page-pfc
Most SQL implementations yield case-insensitive searches.
a. True
b. False
If one exists, a data modeler uses a ___________as the primary key of the entity being
modeled.
a. foreign key
b. combination key
c. surrogate key
d. natural identifier
The system's_________ defines the extent of the design according to operational
requirements.
page-pfd
A(n)____________ is the conceptual organization of an entire database as viewed by a
database administrator.
Using Oracle___________ , a designer can write a PL/SQL code block by enclosing the
commands inside BEGIN and END clauses.
______________-level locks are less restrictive than database-level locks, but they
create traffic jams when many transactions are waiting to access the same table.
__________________-is a special language used to represent and manipulate data
elements in a textual format.
page-pfe
Proper data___________ design requires carefully defined and controlled data
redundancies to function properly.
____________is the real power behind the relational database, allowing the use of
independent tables linked by common attributes.
One practical advantage of a(n)___________ key is that because it has no intrinsic
meaning, values for it can be generated by the DBMS to ensure that unique values are
always provided.
page-pff
The_______________ , also known as the information resource manager (IRM),
usually reports directly to top management and is given a higher degree of
responsibility and authority than the DBA, although the two roles can overlap.
Database transaction_____________ restores a database from an inconsistent state to a
previously consistent state.
If database tables are treated as though they were files in a file system,
the____________ never has a chance to demonstrate its superior data-handling
capabilities.
page-pf10
A___________ is an information system component that handles a specific business
function, such as inventory, orders, or payroll.
Define an index. Explain the role of indexes in a relational database.
page-pf11
______________exists when the same data are stored unnecessarily at different places.
The___________- clause of the GROUP BY statement operates very much like the
WHERE clause in the SELECT statement.
In a distributed database management system (DDBMS), query ____________is used
to find the best access strategy.
page-pf12
Describe an entity cluster.
What is transaction isolation and why it is important?
The__________ fragment condition indicates that no row has a duplicate, regardless of
the fragment in which it is located.
page-pf13
DBMS query processing has ___________phases.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.