COP 37664

subject Type Homework Help
subject Pages 13
subject Words 2008
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
_______________is a disadvantage of a distributed database management system
(DDBMS).
a. Processor dependence
b. Lack of graphical user interface
c. Security lapse
d. Increased danger of a single-point failure
Granularity refers to__________ .
a. the size of a table
b. the level of detail represented by the values in a table's row
c. the number of attributes represented in a table
d. the number of rows in a table
The__________ data model uses the concept of inheritance.
a. relational
b. network
page-pf2
c. object-oriented
d. entity relationship
Which of the following queries will list all the rows in which the inventory stock dates
occur on or after January 20, 2010?
a. SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATE FROM
PRODUCT
WHERE P_INDATE >= "20-JAN-2010";
b. SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATE FROM
PRODUCT
WHERE P_INDATE >= $20-JAN-2010$;
c. SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATE FROM
PRODUCT
WHERE P_INDATE <= "20-JAN-2010";
d. SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATE FROM
PRODUCT
WHERE P_INDATE >= {20-JAN-2010};
page-pf3
The idea of determination is unique to the database environment.
a. True
b. False
_________________transparency allows the system to operate as if it were a
centralized database management system.
a. Heterogeneity
b. Distribution
c. Performance
d. Failure
In Oracle,_________ make(s) it possible to merge SQL and traditional programming
constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops
(FOR and WHILE loops,) and error trapping.
a. cursor-style processing
b. stored procedures
c. embedded SQL
page-pf4
d. Procedural Language SQL
Which of the following types of HDFS nodes acts as the interface between the user
application and the HDFS?
a. Data node
b. Client node
c. Name node
d. Map node
Data constitute the building blocks of information.
a. True
b. False
page-pf5
Which of the following is a characteristic of the XML metalanguage?
a. It is concerned with the way data are displayed.
b. It allows the definition of new tags.
c. You can use the // symbol for entering a comment in the XML document.
d. It can be used as a replacement of HTML.
To test a trigger, one should use the EXECUTE TRIGGER comman
d.
a. True
b. False
Data is said to be verifiable if:
a. the data always yields consistent results.
b. the data cannot be changed or manipulated.
c. the data is obtained from trusted sources.
page-pf6
d. the data is stored in different places within the database.
The only way to access the data in a database is through the DBMS.
a. True
b. False
_____________can serve as a test vehicle for companies exploring the potential
benefits of data warehouses.
a. Data networks
b. Data marts
c. Data cubes
d. OLAPs
page-pf7
A good API makes it easy to develop a program by providing all of the building blocks.
a. True
b. False
User-access management is a subset of_____________ .
a. password protection
b. authorization management
c. data integrity management
d. managerial control
The relational model is hardware-dependent and software-independent.
a. True
b. False
page-pf8
A(n)___________ lock exists when concurrent transactions are granted read access on
the basis of a common lock.
a. shared
b. exclusive
c. binary
d. two-phase
The conceptual model can handle_________________ relationships and multivalued
attributes.
a. 1:1
b. M:N
c. 1:M
d. 1:N
page-pf9
The DBA interacts with the end user by providing data and information support services
to the organization's departments.
a. True
b. False
An index scan is less efficient than a full table scan.
a. True
b. False
Entity integrity is enforced automatically when the primary key is specified in the
CREATE TABLE command sequence.
a. True
b. False
page-pfa
________logic, used extensively in mathematics, provides a framework in which an
assertion (statement of fact) can be verified as either true or false.
a. Predicate
b. Database
c. Relational
d. Index
A client-side extension is a program that interacts directly with the web server to handle
specific types of requests.
a. True
b. False
DBMS implementations are typically similar in complexity to two-tier client/server
configurations.
page-pfb
a. True
b. False
Which of the following is a feature of oracle sequences?
a. Oracle sequences are tied to columns and tables.
b. Oracle sequences generate a character string that can be assigned to tables.
c. An oracle sequence uses the identity column anytime.
d. An oracle sequence can be created and deleted roperty to automatically number rows.
The__________ must be set large enough to permit as many data requests to be
serviced from cache as possible.
a. data cache
b. SQL cache
c. sort cache
d. optimizer mode
page-pfc
A data warehouse designer must define common business dimensions that will be used
by a data analyst to narrow a search, group information, or describe attributes.
a. True
b. False
A row-level trigger is assumed if we omit the FOR EACH ROW keywords and a
statement-level trigger required the use of the FOR EACH ROW keyword.
a. True
b. False
A table is in fourth normal form if it is in third normal form and has no independent
multivalued dependencies.
a. True
page-pfd
b. False
The combination of______________ and ER modeling yields a useful ERD, whose
entities may now be translated into appropriate table structures.
The Chen notation identifies a weak entity by using a double-walled
entity______________ .
Explain normalization and its different forms.
page-pfe
The____________ is the result of adding more semantic constructs to the original entity
relationship (ER) model.
Define entity integrity. What are the two requirements to ensure entity integrity?
page-pff
Explain the difference between homogeneous and heterogeneous distributed database
management systems (DDBMS).
If T1 has not unlocked data item Y, T2 cannot begin; if T2 has not unlocked data item
X, T1 cannot continue. Consequently, T1 and T2 each wait for the other to unlock the
required data item. Such a deadlock is also known as a(n) _____.
In the OLE-DB model, the ___________acts like a data consumer of the data provider
and as a data provider for the data consumer (end-user application).
page-pf10
The database description, known as the distributed__________ schema, is the common
database schema used by local transaction processors (TPs) to translate user requests
into subqueries that will be processed by different data processors (DPs).
What are the factors affecting the purchasing decision for DBMS software?
page-pf11
When a nonkey attribute is the determinant of a key attribute, the table is in 3NF but not
in___________ .
Explain the concept of data analytics. What are the various tools of data analytics?
page-pf12
A(n)_____________________ is a collection of programs that manages the database
structure and controls access to the data stored in the database.
When using a subquery, the output of a(n)__________ query is used as the input for the
outer query.
page-pf13
The_________ condition is generally composed of an equality comparison between the
foreign key and the primary key of related tables.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.