CMCS 40203

subject Type Homework Help
subject Pages 13
subject Words 1937
subject Authors Stephen Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A(n) ____ phase in a two-phase lock is when a transaction releases all locks and cannot
obtain any new lock.
a. growing
b. shrinking
c. locking
d. unlocking
A ____ entity has a primary key that is partially or totally derived from the parent entity
in the relationship.
a. strong
b. weak
c. business
d. relationship
The ____________________ defines the portion of the database "seen" by the
application programs that produce information from the data.
page-pf2
On the server side, the DBMS environment must be properly configured to respond to
clients requests in the fastest way possible, while making optimum use of existing
resources. The activities required to achieve that goal are commonly referred to as ____
tuning.
a. client and server
b. database
c. SQL performance
d. DBMS performance
Another name for a composite entity is a ____ entity.
a. bridge
b. linked
c. directive
d. referring
page-pf3
A ____ is a named collection of settings that control how much of the database resource
a given user can use.
a. user
b. role
c. profile
d. manager
What is a disadvantage of using an API Web-server interface?
a. It is slower than CGI.
b. It is very inefficient because it uses DLLs.
c. You need to run an external program for each request.
d. An error can bring down the Web server.
A CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key
column has no null entries, and all entries are unique. This is an example of ____
integrity.
page-pf4
a. entity
b. referential
c. complete
d. null
A MOLAP system stores data in an MDBMS, using proprietary ____ and array
technology to simulate the multidimensional cube.
a. table
b. matrix
c. network
d. cube
A table can be deleted from the database by using the ____ command.
a. DROP TABLE
b. DELETE TABLE
c. MODIFY TABLE
page-pf5
d. ERASE TABLE
An implementation-ready data model should contain a description of the data structure
that will store the end-user data.
Most decision-support data are based on historical data obtained from ____.
a. operational databases
b. data warehouses
c. enterprise databases
d. workgroup databases
page-pf6
____ are written instructions that describe a series of steps to be followed during the
performance of a given activity.
a. Policies
b. Standards
c. Documentation
d. Procedures
The statement SELECT * FROM T1, T2 produces a(n) ____ join.
a. cross
b. natural
c. equi-
d. full
The ____ design is the process of selecting the data storage and data access
characteristics of the database.
a. time
b. network
page-pf7
c. logical
d. physical
Referential ____ means that if the foreign key contains a value, that value refers to an
existing valid tuple (row) in another relation.
a. integrity
b. uniqueness
c. direction
d. relations
A ____ attribute can be further subdivided to yield additional attributes.
a. composite
b. simple
c. single-valued
d. multivalued
page-pf8
A data mart is part of the "____" section of the business intelligence framework.
a. People
b. Management
c. Processes
d. Governance
The ability to execute a ____ request provides fully distributed database processing
because you can partition a database table into several fragments.
a. distributed
b. transaction
c. fragmented
d. transparent
page-pf9
A noun in a business rule translates to a(n) ____ in the data model.
a. entity
b. attribute
c. relationship
d. constraint
The ____is an advanced data definition language that is used to describe the structure
(elements, data types, relationship types, ranges, and default values) of XML data
documents.
a. XHTML
b. HTML schema
c. DTD
d. XML schema
The object-oriented data model was developed in the ____.
a. 1960s
b. 1970s
page-pfa
c. 1980s
d. 1990s
What is the last step in the exchange between a Web browser and a database?
a. The HTML output is displayed on the client computer's Web browser.
b. The middleware receives the query result and creates the HTML-formatted page.
c. The Web browser requests a page from a Web server.
d. The Web-to-database middleware uses ODBC to connect to the database.
When setting optimizer hints, ____ instructs the optimizer to minimize the time it takes
to process the first set of rows, that is, to minimize the time it takes to return only the
first set of rows in the query result set. This hint is generally used for interactive mode
processes.
a. ALL_ROWS
b. FIRST_ROWS
c. INDEX(P_QOH_NDX)
d. OPTIMIZATION_ROWS
page-pfb
A programming language typically used for CGI scripts is ____.
a. PERL
b. Java
c. SQL
d. JavaScript
A(n) ____ is a logical storage space in Oracle.
a. audit log
b. datafile
c. schema
d. tablespace
page-pfc
A(n) ____ lock exists when concurrent transactions are granted read access on the basis
of a common lock.
a. shared
b. exclusive
c. binary
d. two-phase
____ fragmentation refers to the division of a relation into attribute subsets.
a. Data
b. Horizontal
c. Vertical
d. Mixed
The primary objective of database design is ____.
a. to create the most efficient database possible
page-pfd
b. to create complete, normalized, nonredundant, and fully integrated conceptual,
logical, and physical database models
c. to create the fastest queries
d. to be able to add data quickly
The syntax for the UNION query is ____.
a. query + query
b. UNION (query, query)
c. UNION: query query
d. query UNION query
Describe the need for convenient and safe backup storage.
page-pfe
Database access can be controlled by placing limits on the use of the DBMS's query and
reporting tools.
In an INSERT command, you can indicate just the attributes that have required values
by listing the ____________________ inside parentheses after the table name.
Performance monitoring and ____________________ require much of the DBA's
attention and time. These activities are designed to ensure that the DBMS, utilities, and
applications maintain satisfactory performance levels.
page-pff
The DBA must define data views to protect and control the scope of the data that are
accessible to an authorized user.
Some designs use redundant relationships as a way to simplify the design.
Repeating groups must be eliminated by making sure that each row defines a single
entity.
____________________ words are words used by SQL to perform specific functions.
page-pf10
____________________ Web pages are at the heart of current generation Web sites.
Explain the differences between a centralized and decentralized approach to database
design.
page-pf11
What are the advantages of having the DBMS between the end user's applications and
the database?
Normalization should be part of the design process.
What is a ternary relationship? Provide some example business rules that specify the
need for a ternary or higher-order relationship.
page-pf12
Monitoring results to evaluate outcomes of the business decisions is outside the scope
of BI.
A DBMS that supports ____ exchanges can integrate with external systems such as the
Web, mobile data, and legacy systems, thus enabling the creation of new types of
systems.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.