COMP 19798

subject Type Homework Help
subject Pages 15
subject Words 1837
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Normalization is a process that is used for changing attributes to entities.
a. True
b. False
The data cache caches system catalog data and the contents of the indexes.
a. True
b. False
___________transparency is the highest level of transparency. The end user or
programmer does not need to know that a database is partitioned.
a. Performance
b. Fragmentation
c. Location
d. Local mapping
page-pf2
______________are written instructions that describe a series of steps to be followed
during the performance of a given activity.
a. Policies
b. Standards
c. Guidelines
d. Procedures
The World Wide Web is the repository for distributed data.
a. True
b. False
The Systems Development Life Cycle (SDLC) provides the big picture within which
the database design and application development can be mapped out and evaluated.
page-pf3
a. True
b. False
A weak relationship exists if the primary key of the related entity contains at least one
primary key component of the parent entity.
a. True
b. False
In the context of database usage monitoring, a(n)__________ is a file that automatically
records a brief description of the database operations performed by all users.
a. change tracker
b. digital footprint
c. paper trail
d. audit log
page-pf4
OLAP systems are designed to use both operational and data _____ data.
The response of the DBMS to a query is the_________ .
a. ad hoc query
b. ad hoc response
c. query result set
d. integrated view of the data
The____________ component of a CASE tool produces the information system's
input/output formats.
a. analysis
b. graphics
c. program document generator
page-pf5
d. screen painter and report generator
In the single-site processing, single-site data (SPSD) scenario, all processing must be
done on the end user's side of the system.
a. True
b. False
BCNF can be violated only if the table contains more than one ______________-key.
a. primary
b. candidate
c. foreign
d. secondary
page-pf6
__________is the body of information and facts about a specific subject.
a. Validation
b. A format
c. Knowledge
d. A database
A DBA determines the initial size of the data files that make up the database; however,
as required, the data files can automatically expand in predefined increments known
as_______ .
a. procedure cache
b. buffer cache
c. supplements
d. extends
The special operator used to check whether an attribute value is within a range of values
is ____________.
page-pf7
a. BETWEEN
b. NULL
c. LIKE
d. IN
You can select partial table contents by naming the desired fields and by placing
restrictions on the rows to be included in the output.
a. True
b. False
A(n)________ only returns matched records from the tables that are being joined.
a. outer join
b. inner join
c. equijoin
d. theta join
page-pf8
Each row in the relational table is known as an entity instance or entity occurrence in
the ER model.
a. True
b. False
Normalization works through a series of stages called normal forms.
a. True
b. False
A relationship is an association between__________ .
a. objects
b. entities
page-pf9
c. databases
d. fields
A field-level lock allows concurrent transactions to access the same row, as long as they
require the use of different fields within that row.
a. True
b. False
The SQL cache stores the end-user written SQL.
a. True
b. False
page-pfa
Relational algebra defines the theoretical way of manipulating table contents using
relational operators.
a. True
b. False
The multiuser DBMS must implement controls to ensure serializability and isolation of
transactions, in addition to atomicity and durability, in order to guard the database's
consistency and integrity.
a. True
b. False
Bill Inmon and Chuck Kelley created a set of 12 rules to define a(n)_____________ .
a. data warehouse
b. multidimensional cube
c. OLAP tool
d. star schema
page-pfb
As rare as 1:1 relationships should be, certain conditions absolutely require their use.
a. True
b. False
A growing phase in a two-phase lock is when a transaction acquires all the required
locks without locking any data.
a. True
b. False
Date procedures are often more software-specific than other SQL procedures.
a. True
page-pfc
b. False
Converting a database format from 1NF to 2NF is a complex process.
a. True
b. False
A(n)__________ is the set of possible values for a given attribute.
a. domain
b. range
c. identifier
d. key
page-pfd
___________serve as the intermediary between the user and the database.
a. DBMSs
b. Metadata
c. End-user data
d. Programming languages
In Oracle, the_________ command is used to change the display for a column, for
example, to place a $ in front of a numeric value.
a. DISPLAY
b. FORMAT
c. CHAR
d. CONVERT
A(n)____________ occurs when a transaction executes a query at time t1, and then it
runs the same query at time t2, yielding additional rows that satisfy the query.
a. phantom read
page-pfe
b. dirty read
c. uncommitted dependency
d. nonrepeatable read
The proposed system is subject to limits known as_________ , which are external to the
system.
With the exception of the database __________process, most RDBMS vendors use
SQL that deviates little from the ANSI standard SQL.
page-pff
Information is produced by processing_________________ .
Explain the "no change over time" characteristic of a primary key.
A(n)____________ relationship is also known as an identifying relationship.
Most multiuser_______________ automatically initiate and enforce locking
procedures, where all locking information is managed by the lock manager.
page-pf10
_____ makes a copy of a table and places it in a different location to improve access
time.
Typically, the___________ scenario requires a network file server running conventional
applications that are accessed through a network.
page-pf11
A fully distributed database management system must perform all of the functions of a
centralized database management system (DBMS). What are these functions?
A person's Social Security number would be an example of a(n)__________ attribute.
page-pf12
The problem with transitive dependencies is that they still yield data_____________- .
A_______________ rule is a brief and precise narrative of a policy, procedure, or
principle within a specific organization's environment.
What are some reasons for studying file systems?
page-pf13
Subtypes that contain nonunique subsets of the supertype entity set are known
as______________ subtypes.
The command, coupled with appropriate search conditions, is an incredibly powerful
tool that enables a user to transform data into information.
The proper use of ____________keys is crucial to controlling data redundancy.
A(n)_________ attribute need not be physically stored within the database.
page-pf14
Explain the features provided by web application servers.
_________are usually provided by the database management system (DBMS) to check
for access violations.
page-pf15
Because real-world database design is generally done by teams, the database design is
probably divided into major components known as____________ .

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.