CMCS 56512

subject Type Homework Help
subject Pages 14
subject Words 1770
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Both distributed processing and distributed databases require a network of
interconnected components.
a. True
b. False
Normalizing fact tables improves data access performance and saves data storage space.
a. True
b. False
Dependency diagrams are very helpful in getting a bird'seye view of all the
relationships among a table's attributes.
a. True
b. False
page-pf2
One of the advantages of ______________over other middleware is that it requires no
configuration on the client side.
a. ODBC
b. JDBC
c. OLE-DB
d. ADO.NET
The________ approach to scheduling concurrent transactions assigns a global unique
stamp to each transaction.
a. scheduled
b. table-locking
c. unique
d. timestamping
Structural dependence exists when it is possible to make changes in the file structure
without affecting the application program's ability to access the data.
page-pf3
a. True
b. False
In the context of the database design process, the conceptual design step that identifies
ER modules and validates insert, update, and delete rules is_____________ .
a. database analysis and requirements
b. ER modeling and normalization
c. data model verification
d. distributed database design
The traditional Systems Development Life Cycle (SDLC) is divided into
___________phases.
a. two
b. three
c. four
d. five
page-pf4
The storage locations for multiple backups must include sites inside and outside the
organization.
a. True
b. False
Composite primary keys are particularly useful as identifiers of composite entities,
where each primary key combination is allowed only once in ________the relationship.
a. 0:1
b. 1:1
c. 1:M
d. M:N
page-pf5
A system maintenance activity generated in response to changes in the business
environment is referred to as corrective maintenance.
a. True
b. False
Business rules apply to businesses and government groups, but not to other types of
organizations such as religious groups or research laboratories.
a. True
b. False
The DBA or security officer must secure an insurance policy to provide financial
protection in the event of a database failure.
a. True
b. False
page-pf6
ANSI defines four events that signal the end of a transaction. Of the following events,
which is defined by ANSI as being equivalent to a ROLLBACK?
a. Five SQL statements are executed.
b. The end of a program is successfully reached.
c. The program is abnormally terminated.
d. The database is shut down for maintenance.
In the context of the Oracle Enterprise Manager, a(n)_____________ is a named
collection of database access privileges that authorize a user to connect to the database
and use the database system resources.
a. license
b. role
c. profile
d. quota
page-pf7
A system is always at some stage of SDLC because every request for structural changes
requires retracing the steps of the Systems Development Life Cycle (SDLC).
a. True
b. False
The_______________ processor is the software component residing on each computer
that stores and retrieves data located at the site.
a. transaction
b. network
c. data
d. management
The DIFFERENCE operator subtracts one table from the other.
a. True
b. False
page-pf8
The SQL command that allows a user to list the contents of a table is____________ .
a. INSERT
b. SELECT
c. COMMIT
d. UPDATE
A workgroup database is a(n)________ database.
a. single-user
b. multiuser
c. desktop
d. distributed
page-pf9
A disadvantage of the relational database management system (RDBMS) is its inability
to hide the complexities of the relational model from the user.
a. True
b. False
The conditional LIKE must be used in conjunction with wildcard characters.
a. True
b. False
Some RDBMSs, such as Microsoft Access, automatically make the necessary
conversions to eliminate case sensitivity.
a. True
b. False
page-pfa
To simplify the conceptual design, most higher-order relationships are decomposed into
appropriate equivalent__________relationships whenever possible.
a. unary
b. binary
c. strong
d. weak
A partial completeness constraint is represented by_____________ .
a. a dotted line
b. two dashed lines
c. a single horizontal line under a circle
d. a double horizontal line over a circle
Backups must be clearly identified through detailed descriptions and date information,
assuring that the correct backup is used to recover the database.
a. True
page-pfb
b. False
Decentralized design is typical of relatively simple, small databases and can be
successfully done by a single person.
a. True
b. False
The entity relationship diagram (ERD) represents the_________ database as viewed by
the end user.
a. condensed
b. physical
c. logical
d. conceptual
page-pfc
Maximizing disk contention is one of the general recommendations for the physical
storage of databases.
a. True
b. False
The logical systems design is created during the________ phase of the Systems
Development Life Cycle (SDLC).
a. planning
b. analysis
c. implementation
d. maintenance
An application programming interface (API) uses script files that perform specific
functions based on the client's parameters that are passed to the web server.
a. True
page-pfd
b. False
A table is in BCNF if every determinant in the table is a candidate key.
a. True
b. False
The feasibility study during the planning phase of the Systems Development Life Cycle
(SDLC) must address the:
a. requirements of the current system's end users.
b. problems and constraints related to the company situation.
c. questions about modification and replacement of existing system.
d. technical aspects of hardware and software requirements.
page-pfe
Good database performance starts with good database design.
a. True
b. False
The traditional Systems Development Life Cycle (SDLC) phases are_________ ,
analysis, detailed systems design, implementation, and maintenance.
In a heavily used database management system (DBMS), the prevention and detection
of________ constitutes an important DBMS function.
In the context of ensuring integrity of a database, a(n)____________ transaction is one
page-pff
that does not overload the DBMS.
A(n) _____ is a program written in a programming language that is not compiled, but is
interpreted and executed at run time.
_____ use web-based technologies to present key business performance indicators or
information in a single integrated view, generally using graphics in a clear, concise, and
easy to understand manner.
An index key can have multiple___________ (a composite index).
page-pf10
A system will perform best when its hardware and software resources are__________ .
_________________are characteristics of entities.
The____________ forces the log entry to be written to permanent storage before the
actual operation takes place.
page-pf11
Describe the use of SQL in relation to ROLAP.
List and describe some typical DBMS processes.
page-pf12
___________________management ensures that data move from one consistent state to
another.
ODBC, OLE-DB, and ADO.NET form the backbone of the_____________
architecture.
Rows can be grouped into smaller collections quickly and easily using the__________-
clause within the SELECT statement.
page-pf13
In which two cases are composite primary keys particularly useful?
Making sure that the final product meets user and system requirements is the most
critical__________ phase.
Open Database Connectivity (ODBC), a superset of the SQL Access Group Call Level
Interface (CLI), is implemented by___________ .

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.