COMPSCI 99562

subject Type Homework Help
subject Pages 19
subject Words 2219
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Dimensional databases are used for analytical data processing.
One weakness of UML-style E-R diagrams is that there is no means of distinguishing
between a weak entity that is ID-dependent and a weak entity that is not ID-dependent.
To determine the number and type of columns in a table, use the SQL construct
COUNT(*).
Denormalization is the process of joining previously normalized tables back together.
page-pf2
The Java JRE is installed directly from the Java download page at www.oracle.com.
When decreasing maximum cardinalities, there will always be data loss.
To limit the number of rows retrieved from a table, use the SQL TOP keyword.
When viewing a table in the GUI tools table design window in SQL Server, the primary
key is indicated by a black arrow.
page-pf3
The purpose of a database is to help people keep track of things.
Null values are a problem because they are ambiguous.
Microsoft Access 2013 uses the Access 2003 .mdb file format as the default file format
for database files.
page-pf4
An intersection table is always ID-dependent on both of its parent tables.
To represent a 1:N relationship in a relational database design, an intersection table is
created.
A single relationship class involves only one entity class.
Instead of creating a new database instance in Oracle Database, it is preferable to create
a new tablespace.
page-pf5
If you see a column name Notes, it is likely that this is a general-purpose remarks
column.
In representing a 1:N relationship in a relational database design, the key of the table
representing the entity on the "many" side is placed as a foreign key in the table
representing the entity on the "one" side of the relationship.
One example of a database design using an ID-dependent relationship is the association
pattern.
page-pf6
An identifier of an entity instance must consist of one and only one attribute.
Twitter and Facebook use NoSQL databases.
The design produced by reverse engineering may be described as a table-relationship
diagram.
NoSQL really stands for "Not only SQL."
page-pf7
A complex element must have more than one simple element.
HTML is defined by the World Wide Web Consortium (W3C).
All commercial DBMS products use some version of "username and password" as part
of their security features.
page-pf8
The SQL command CREATE USER VIEW is used to create a virtual table.
Explicit locks are locks that are placed automatically by the DBMS.
There are three types of recursive relationships: 1:1, 1:N, and N:M.
The DBMS ranked as having the "least power and features" in the text is Microsoft
Access.
page-pf9
An intersection table can have additional attributes besides the keys of its parent tables.
Data values to be added to a table are specified by using the SQL VALUES clause.
MySQL supports AFTER triggers.
To drop a nonkey column from a table, no preliminary steps are needed and we can
simply use the ALTER TABLE DROP COLUMN statement.
page-pfa
ODBC works with table-like data sources such as relational databases and spreadsheets.
SQL was developed by IBM in the late 1970s.
Installing PHP using the Microsoft Web Platform Installer always installs the most
current version of PHP.
page-pfb
The UNION of two relations A and B consists of all rows that are either in relation A or
in relation B or both.
When MySQL Server Administration is opened in the MySQL Workbench, the
Startup/Shutdown page is initially displayed.
JSP pages ________.
A) are automatically compiled by the servlet processor as needed
B) are required to be compiled by the developer before being made public
C) are automatically checked for syntax errors by the servlet as they are written
D) uses more memory than CGI files
page-pfc
Which trigger type(s) does MySQL not support?
A) BEFORE
B) AFTER
C) INSTEAD OF
D) Both A and B are correct
Unlike the anomalies from functional dependencies, the anomalies from ________ are
so serious that they should always be eliminated.
A) general purpose remarks columns
B) sales orders and line items
C) association patterns
D) multivalued dependencies
We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is an example of ________.
page-pfd
A) dirty data
B) inconsistent data
C) nonintegrated data
D) a "wrong format" problem
The MySQL statement to delete a stored procedure already in the database is ________.
A) CREATE PROCEDURE
B) ALTER PROCEDURE
C) DROP PROCEDURE
D) CLOSE PROCEDURE
Which of the following is a type of element in an XML Schema?
A) Simple
B) Composite
C) Compound
D) Primitive
page-pfe
Which of the following Oracle Database structures is a logical subdivision of an Oracle
Database database instance that is used to group related tables, views, and other similar
objects?
A) Namespace
B) Filespace
C) Tablespace
D) Dataspace
Recovering a database via rollforward involves ________.
A) restoring the database from the save and reprocessing all the transactions since the
save
B) restoring the database from the save and reapplying all the changes made by
transactions since the save
C) undoing the changes made by erroneous or partially processed transactions and
restarting the valid transactions that were in process at the time of the failure
D) re-creating the database by re-entering all of the data from the beginning, and then
reprocessing all of the transactions
page-pff
Data structures are typically used to ________.
A) unbalance a B-Tree
B) represent simple and complex networks
C) enhance database security
D) fry an egg
Business Intelligence (BI) systems do which of the following?
A) Analyze current and past activities
B) Predict future events
C) Record and process transactions
D) Both A and B are correct
page-pf10
Refer to the table above. What is the lift for Drug B being purchased given that Drug A
has been purchased?
A) .200
B) .250
C) .333
D) .667
If the removal of facts about one entity results in the unintentional loss of data about
another entity, this is referred to as a(n) ________.
A) normalization anomaly
B) insertion anomaly
C) update anomaly
D) deletion anomaly
Suppose your company stores EMPLOYEE and CUSTOMER data in separate tables. If
you want to find all customers who are not also employees, which SQL keyword would
you most likely use?
A) INTERSECT
page-pf11
B) UNION
C) EXCEPT
D) UNION ALL
A program whose job is to create, process and administer databases is called a
________.
A) Database Modeling System
B) Database Management System
C) Data Business Model System
D) Relational Model Manager
Ensuring that all rows impacted by the actions of a transaction are protected from
changes until the entire transaction is completed is called ________.
A) statement level consistency
B) optimistic locking
C) transaction level consistency
page-pf12
D) durable transactions
Which of the following is true about XSLT?
A) It can be used to materialize XML documents into HTML.
B) XSLT processors are context oriented.
C) It is a non-declarative transformation language.
D) Both A and B are correct
Which of the following is not true of DBMS security features?
A) Users may be assigned to one or more roles.
B) A role may be assigned to only one user.
C) Both users and roles can have many permissions.
D) Objects have many permissions.
page-pf13
Applet bytecode is transmitted to the user's computer via ________.
A) the JDBC driver
B) the Java virtual machine
C) HTTP
D) the bytecode interpreter
When creating SQL Server tables in a database, SQL statements can now also be
submitted by using ________.
A) Internet Explorer
B) Microsoft PowerShell
C) Microsoft Excel
D) PL/SQL
page-pf14
In the database redesign process, an SQL tool that is useful for testing whether or not
certain conditions or assumptions are valid is ________.
A) UPDATE
B) DROP TABLE
C) CREATE TRIGGER
D) NOT EXISTS
Which of the following does a User Requirements Document (URD) typically NOT
contain?
A) A data model
B) Functional requirements
C) The scope of the work to be done
D) Project delivery requirements
A report generated by a reporting system is delivered to the appropriate users via an
electronic display customized for each user. This system uses which of the following
media?
A) Paper
page-pf15
B) Web portal
C) Digital dashboard
D) E-mail
A data warehouse database differs from an operational database because ________.
A) data warehouse data are not stored in tables
B) data warehouse databases do not have metadata
C) data warehouse data are often stored in a dimensional database
D) efficiency does not matter in a data warehouse
Given the SQL statement
CREATE TABLE SALESREP (
SalesRepNo int NOT NULL,
RepName char(35) NOT NULL,
HireDate date NOT NULL,
page-pf16
CONSTRAINT SalesRepPK PRIMARY KEY (SalesRepNo),
CONSTRAINT SalesRepAK1 UNIQUE (RepName)
);
we know that ________.
A) RepName is the primary key
B) RepName is a foreign key
C) RepName is a candidate key
D) RepName is a surrogate key
The use of the XML Schema expression minOccurs="0" ________.
A) is an XML Schema default
B) is required as there are no defaults in an XML Schema
C) is similar to the SQL schema NULL constraint
D) indicates that no value can be placed there
When changing the minimum cardinality on the parent side of the relationship from
page-pf17
zero to one, the foreign key ________.
A) must be changed from NULL to NOT NULL
B) must be changed from NOT NULL to NULL
C) must be changed to a composite key
D) must be changed to a surrogate key
OLAP stands for ________.
A) OnLine Analytical Processing
B) OffLine Analytical Processing
C) OnLine Analysis Process
D) Old, Lazy And Particular
The reports generated by a reporting system can be classified as any of the following
except ________.
A) static
B) dynamic
page-pf18
C) fluid
D) push
Business Intelligence (BI) systems are information systems that help users analyze and
use data.
Assuming the "Quantity" column of an ORDER table contains integer data, what does
COUNT(Quantity) compute?
A) The number of rows in the ORDER table
B) The number of non-zero values in the Quantity column
C) The number of distinct values in the Quantity column
D) The number of non-null values in the Quantity column
page-pf19
A very popular development technique used by database professionals to adopt a
database design to a new or changing requirement is known as ________.
A) normalization
B) data models
C) entity-relationship data modeling
D) database migration
An identifier may be ________.
A) composite
B) optional
C) a relationship
D) minimal

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.