Computer Science Chapter 4 An Computer That Connected Network And

subject Type Homework Help
subject Pages 9
subject Words 1632
subject Authors Mary Z. Last, Philip J. Pratt

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 4: The Relational Model 3: Advanced Topics
True / False
1. Views cannot be used to examine table data.
a.
True
b.
False
2. An individual can use a view to create reports, charts, and other objects that show database data.
a.
True
b.
False
3. A view is a physical table in the DBMS.
a.
True
b.
False
4. To create a view in Access, you simply create and then save a query.
a.
True
b.
False
5. One advantage of using views is that they provide data dependence.
a.
True
b.
False
6. One advantage of a view is that different users can view the same data in different ways.
a.
True
b.
False
7. Indexes can increase the efficiency with which data is retrieved from the database.
page-pf2
Chapter 4: The Relational Model 3: Advanced Topics
a.
True
b.
False
8. When you create an index whose key has a single field, you have created what is called a single-column index.
a.
True
b.
False
9. The command DEL INDEX CustList; would remove the index named CustList.
a.
True
b.
False
10. The following command will enable Jones to retrieve data from the Customer table, but not to take any other
action: GRANT SELECT ON Customer Jones ;
a.
True
b.
False
11. Referential integrity is specified using the FOREIGN KEY clause in the SELECT command.
a.
True
b.
False
12. Legal-values integrity is the property that states that no record can exist in the database with a value in the field other
than one of the legal values.
a.
True
b.
False
13. Information about tables in the database is kept in the system catalog.
a.
True
page-pf3
Chapter 4: The Relational Model 3: Advanced Topics
b.
False
14. A stored procedure is placed on a client computer.
a.
True
b.
False
15. Access supports stored procedures.
a.
True
b.
False
Multiple Choice
16. The ____ command will create an application program's or individual user's picture of the database.
a.
CREATE INDEX
b.
SELECT INDEX
c.
SELECT VIEW
d.
CREATE VIEW
17. A row-and-column subset ____ consists of a subset of the rows and columns in some individual table.
a.
view
b.
trigger
c.
index
d.
catalog
18. To create an index named RepBal with the keys RepNum and Balance and with the balances listed in descending
order, the command is ____.
a.
CREATE INDEX RepBal ON Customer (RepNum, Balance) ;
b.
CREATE INDEX RepBal Customer (RepNum DESC) ;
c.
CREATE INDEX ON Customer (RepNum, Balance ASC) ;
d.
CREATE INDEX RepBal ON Customer (RepNum, Balance DESC) ;
page-pf4
Chapter 4: The Relational Model 3: Advanced Topics
19. The ____ statement will take away user privileges to the database.
a.
SELECT
b.
INDEX
c.
DEL
d.
REVOKE
20. In Access, a key symbol appears in the row selector of the field that is the ____ key.
a.
index
b.
catalog
c.
Foreign
d.
Primary
21. To create the primary key clause for the Customer table on the CustomerNum field, the correct statement is ____.
a.
PRIMARY KEY (CustomerNum)
b.
PRIMARY KEY (Customer, CustomerNum)
c.
KEY (CustomerNum)
d.
PRIMARY (CustomerNum)
22. To create the primary key clause for the OrderLine table on the OrderNum and ItemNum fields, the correct statement
is ____.
a.
PRIMARY KEY (OrderLine, OrderNum, ItemNum)
b.
KEY (OrderNum, ItemNum)
c.
PRIMARY KEY (OrderNum, ItemNum)
d.
PRIMARY (OrderNum, ItemNum)
23. Essentially, setting the value in a given field to ____ is similar to not entering a value in it at all.
a.
N/A
b.
nil
c.
null
page-pf5
Chapter 4: The Relational Model 3: Advanced Topics
d.
0
24. Which of the following statement fragments will only allow a CreditLimit of $5,000, $7,500, or $15,000?
a.
(CreditLimit IN (5000, 7500, 15000))
b.
CHECK ((5000, 7500, 15000))
c.
CHECK (CreditLimit LIKE (5000, 7500, 15000))
d.
CHECK (CreditLimit IN (5000, 7500, 15000))
25. The CHECK clause can be included in the ____ command.
a.
SELECT TABLE
b.
ALTER TABLE
c.
DROP TABLE
d.
DELETE TABLE
26. In SQL, you use the CHECK clause to enforce ____ integrity.
a.
referential
b.
legal-values
c.
entity
d.
catalog
27. To insert a new field in a table, the ____ keyword should be used with the ALTER TABLE command.
a.
INSERT
b.
ADD
c.
INCLUDE
d.
ALTER
28. The SQL command for deleting the Storehouse field from the Item table is ____.
a.
ALTER TABLE Item DELETE Storehouse ;
b.
ALTER TABLE Item DROP COLUMN Storehouse ;
c.
ALTER Item DELETE Storehouse ;
page-pf6
Chapter 4: The Relational Model 3: Advanced Topics
d.
ALTER TABLE DELETE Storehouse ;
29. The statement, ____, removes the table Smaller from a DBMS.
a.
DELETE TABLE Smaller ;
b.
DROP TABLE Smaller ;
c.
REMOVE TABLE Smaller ;
d.
RID TABLE Smaller ;
30. In a client/server system, the database resides on a computer called the ____.
a.
index
b.
documenter
c.
server
d.
client
31. In a client/server system, users access the database through ____.
a.
triggers
b.
documenters
c.
servers
d.
clients
32. If you anticipate running a particular query often, you can improve overall performance by saving the query in a
special file called a(n) ____.
a.
index
b.
stored procedure
c.
trigger
d.
view
33. A(n) ____ is a computer that is connected to a network and has access through the server to the database.
a.
client
b.
view
page-pf7
Chapter 4: The Relational Model 3: Advanced Topics
c.
index
d.
trigger
34. A(n) ____ is an action that occurs automatically in response to an associated database operation such as an INSERT,
UPDATE, or DELETE command.
a.
stored procedure
b.
trigger
c.
view
d.
index
35. A trigger is stored and compiled on the ____.
a.
client
b.
Web
c.
index
d.
server
Completion
36. Within relational model systems on both mainframes and personal computers, the main mechanism for increasing the
efficiency with which data is retrieved from the database is the ____________________.
37. The field or combination of fields on which an index is built is called the ____________________ key.
38. A(n) ____________________ index is an index with more than one key field.
page-pf8
Chapter 4: The Relational Model 3: Advanced Topics
39. Within an organization, the ____________________ determines the types of access various users can have to the
database.
40. ____________________ is the prevention of unauthorized access to the database.
41. The type of field for which you should never allow nulls is the ____________________.
42. In Access, you can restrict the legal values accepted by a field by entering an appropriate ____________________
that data entered in the field must follow.
43. In a system catalog, the ____________________ table contains information about the tables known to SQL.
44. Access has a tool called the ____________________, which allows you to easily print detailed documentation
concerning any table, query, report, form, or other object in the database.
45. In Access, a(n) ____________________ enables you to add logic to table events such as adding, changing, or deleting
data
46. What are the advantages of having views only contain the fields required by a given user?
page-pf9
47. Explain what is meant by a null value. Is a null value the same as a value of zero?
48. What is the difference between entity integrity and referential integrity?
49. Discuss what are validation rules and validation text.
50. Discuss what you can do if you need to change a table’s structure in ways that are beyond the capabilities of
your DBMS.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.