This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
In Microsoft Visio 2013, Dynamic connector objects can be formatted with the line end
symbols needed to create IE Crow's Foot notation.
In relational terms as defined by E.F. Codd, a column is called an attribute.
Entities can be associated with one another in relationships.
SQL Server automatically creates an index on primary key fields only.
OLE DB can act as a wrapper for (covers) database native libraries so that the
functionality can be provided by OLE.
The SQL WHERE clause contains the condition that specifies which rows are to be
selected.
When the key of one table is placed into a second table to represent a relationship, the
key is called a relational key in the second table.
Deleting tables and relationships is basically a matter of dropping foreign key
constraints and then dropping the tables.
SQL triggers can be used when the DBMS receives an update request.
SQL is not a complete programming language. Rather it is a data sublanguage.
Because SQL statements are table-oriented, whereas programs are variable-oriented, the
results of SQL statements used in programs are treated as pseudofiles.
In RFM analysis, F stands for "how frequently."
In the SQL statement:
SELECT S1.CustName, S1.SalesRepNo FROM SALES S1;
the "S1" is called an alias.
In 1:N relationships, the table on the "one" side is called the parent.
The SQL keyword WHERE is used to specify the table(s) that contain(s) the data to be
retrieved.
A data model is a plan for a database design.
SQL views are updatable when the view is based on a single table with no computed
columns, and all non-null columns are present in the view.
An ad-hoc SQL query is typically written within an application program.
In SQL Server, SCROLL_LOCK is a version of pessimistic locking.
The PL/SQL keyword DECLARE is used to begin the basic PL/SQL block structure.
To create a new MySQL Workbench EER model, you can use the Create new EER
Model link on the Home page.
In addition to being a data sublanguage, SQL is also a programming language, like Java
or C#.
In E-R modeling, an attribute describes the characteristics of an entity.
Data mining is the application of mathematical and statistical techniques to find
patterns and relationships that can be used to classify and predict.
Graph databases are composed of three elements, one of which is the attribute.
An index is a table that cross-references record addresses with some attribute value.
An ADO.NET dataset can have primary and foreign keys, but ADO.NET does not
support referential integrity.
One means of processing an SQL Server database is to create application code in a
programming language and invoke SQL Server DBMS commands from that program.
When creating a new database in Oracle Database, two new account passwords are
automatically created in the database.
A foreign key is a key that does not belong in any table.
An entity that represents something that can exist on its own is called a strong entity.
One definition of information is knowledge derived from data.
When increasing cardinalities from 1:N to N:M, we basically create a new intersection
table, fill it with data and drop the old foreign key.
The MySQL Workbench is included in the MySQL Server Community Edition
installation.
A "simple object" can contain only simple attributes.
OLE DB is an object-oriented interface.
In OLE DB, all of an object's properties must be exposed in all interfaces, but not all
methods have to be exposed.
A relation is in 4NF if it is in BCNF and it has no multivalued dependencies.
Information systems are used to support business processes.
In database systems, indexes are held in the database.
When a table is created using existing data from multiple sources, you are likely to find
that the different sources code data in slightly different ways. This is an example of
________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
Which of the following is true about UML?
A) UML is a methodology for developing OOP systems.
B) UML is a set of tools to support the development OOP systems.
C) UML is primarily focused on database development.
D) Both A and B are correct.
A surrogate key should be considered when ________.
A) A relationship is N:M
B) A composite key is required
C) The key contains a lengthy text field
D) The key contains a number
RFM analysis is a way of analyzing and ranking customers based on on-line survey
data.
Data models are created during the ________ step of the SDLC.
A) system definition
B) requirements analysis
C) component design
D) implementation
In Oracle Database, to achieve transaction level consistency, which level of transaction
isolation must be used?
A) Read Committed
B) Serializable
C) Repeatable Read
D) Read-only
The classic systems analysis methodology is called the ________.
A) Systems Development Life Cycle (SDLC)
B) Analysis Development Life Cycle (ADLC)
C) Component Development Life Cycle (CDLC)
D) Information Development Life Cycle (IDLC)
In an SQL query, which SQL keyword is used to state the condition that specifies which
rows are to be selected?
A) SET
B) FROM
C) SELECT
D) WHERE
The active MySQL database is specified using ________.
A) the Set Schema command
B) the Set Database command
C) the Make Default Schema command
D) the Set as Default Schema command
Which of the following is not included in Michael Porter's list of support activities?
A) Technology management
B) Customer service
C) Human resources management
D) Firm infrastructure management
A line-item pattern must involve what kind of entity?
A) Strong entity
B) Supertype entity
C) Weak entity with one identifying relationship
D) Weak entity with two identifying relationships
The database management system (DBMS) is responsible for inserting, modifying,
reading, and deleting data.
Modern microcomputer personal DBMS products ________.
A) are supplied by several well-established manufacturers
B) were essentially made obsolete by Microsoft Access
C) have poor response time
D) are not true DBMS products
Which SQL keyword is used to impose restrictions on a table, data or relationship?
A) SET
B) CREATE
C) SELECT
D) CONSTRAINT
When changing column data types, which of the following data conversions will either
usually or always succeed?
A) Numeric → date
B) Date or money → char or varchar
C) Char or varchar → numeric
D) Char or varchar → date or money
User interviews are conducted during the ________ step of the SDLC.
A) system definition
B) requirements analysis
C) component design
D) implementation
Data warehouses use a(n) ________.
A) operational database
B) dimensional database
C) structured storage
D) object-relational data model
In the MySQL Table Editor, the abbreviation for NOT NULL is ________.
A) PK
B) NN
C) UQ
D) BIN
Microsoft Access database objects are displayed in the ________.
A) Navigation Pane
B) Browser Pane
C) Object Browser Pane
D) Gallery Pane
When a trigger is fired, the DBMS makes the appropriate data available to ________.
A) the SQL interpreter
B) the application code
C) the embedded SQL code
D) the trigger code
The GUI tool for creating a new index is the Oracle SQL Developer ________.
A) Edit Table table editor
B) Edit Index index editor
C) Edit Schema schema editor
D) Physical Design editor
Which of the following popular data mining techniques does not require special
software?
A) Decision tree analysis
B) Logistic regression analysis
C) Market basket analysis
D) Neural networks
The process of reading an actual database schema and producing a data model from that
schema is called ________.
A) data modeling
B) data engineering
C) reverse engineering
D) schema modeling
A database extracted from the operational database for BI purposes typically ________.
A) is an exact copy of the operational database
B) contains only the metadata from the operational database
C) combines all the data from the operational database into one large table
D) contains just part of the operational database
If a DEFAULT constraint is included when a new column is added to a table, the default
value is applied to ________.
A) all existing rows at the time the column is added
B) all new rows
C) all new rows but only after the UPDATE command is issued
D) Both A and B are correct
The first section of an XML document might be a ________.
A) Document Definition Section (DDS)
B) Document Type Declaration (DTD)
C) Data Type (DTYPE)
D) Document Type (DOCTYPE)
In an SQL query, which SQL keyword is used to determine if a column value is equal to
any one of a set of values?
A) AND
B) EXISTS
C) OR
D) IN
Which of the following are difficulties when changing the maximum cardinality from
1:1 to 1:N?
A) Preserving the existing tables
B) Preserving the existing relationships
C) Preserving the existing data
D) Both A and B are correct
Supertype/subtype entities are said to have a(n) ________ relationship.
A) HAS-A
B) IS-A
C) recursive
D) redundant
Databases are created in a DBMS during the ________ step of the SDLC.
A) system definition
B) requirements analysis
C) component design
D) implementation
The language available in SQL Server that adds programming constructs to the SQL
language is known as ________.
A) PL/SQL
B) C++
C) INTERACT-SQL
D) TRANSACT-SQL
You are creating a PRODUCT table using existing data from multiple sources.
Examining the data, you find that you have "large red hat", "large hat, red", "red hat
large" and "hat, large, red." This is an example of ________.
A) the multivalue, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
To arrange the PivotTable columns and rows in Microsoft Excel 2013, we use the
________.
A) PivotTable Control
B) PivotTable dialog box
C) PivotTable Field List
D) Pivot Table Wizard
The default cardinality for elements in an XML Schema is ________.
A) 0.1
B) 1.1
C) 1.N
D) M.N
Refer to the table above. What is the confidence of Drug B being purchased given that
Drug A has been purchased?
A) .200
B) .250
C) .333
D) .400
What is IDEF1X?
What is a data warehouse?
Why is operational data sometimes unusable for Business Intelligence use?
How does a DBMS store data on its direct access files?
Briefly explain the strategy of two-phased locking.
What are MUST NOT and MUST COVER constraints?
What are supertype and subtype entities? Include an example.
How is maximum cardinality expressed in IE Crow's Foot E-R diagrams?
Given the table CUSTOMER(CustID, Name, PhoneNumber, AccountBalance),
write the standard SQL query to retrieve the Name and PhoneNumber of customers
with a balance greater than 50.
What is the process for adding a NOT NULL column to a table?
What is metadata and how does it relate to the definition of a database?
Describe how to create a new database in MySQL Community Edition.
What is a functional dependency? Give an example not used in the text.
Briefly describe the various tasks of the primary key.
Describe how to get started creating a new database design in the MySQL Workbench.
In Microsoft Visio 2013, how do we create database designs?
Explain the concept of a foreign key.
Discuss workable data conversion and possible data loss when changing column data
types during a database redesign.
What is a distributed database?
The following database will be used in this question:
GENERAL SALES DATABASE:
SALESREP
CUSTOMER
Explain the use of the GROUP BY keyword. Include an example based on the
CUSTOMER table from the General Sales database.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.