COSC 77532

subject Type Homework Help
subject Pages 27
subject Words 3174
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Information systems are used to support business processes.
SQL views can be used to layer built-in SQL functions.
When running the NetBeans IDE for the first time, use a file workspace named
NetBeansProjects.
A relational database stores data in the form of lists.
page-pf2
XML documents that do not conform to their DTD are said to be non-type-valid XML
documents.
One of the important properties of an attribute is whether or not it is required.
One of the four categories of NoSQL databases used in the text is the Column Family
database.
Microsoft Access queries cannot use previously stored view equivalent Access queries.
page-pf3
In a common form of RFM analysis, an RFM score of 5 1 1 means that the customer
orders frequently and orders items of high monetary value but has not ordered anything
for some time.
In Microsoft Access, a relationship is created by dragging a foreign key column and
dropping it on top of the corresponding primary key.
Data Mining uses sophisticated statistical and mathematical techniques to perform
what-if analyses, to make predictions, and to facilitate decision making.
page-pf4
To represent a 1:N relationship in the relational model, the key of the entity on the one
side of the relationship is placed as a foreign key in the entity on the many side of the
relationship.
Users should create a Data Models folder to hold EER models created with the MySQL
Workbench.
In XML Schema, the default cardinality of elements is 0.1.
For a 1:1 relationship, the key of each table should be placed in the other table as the
page-pf5
foreign key.
The term drill down refers to the capability of seeing the data in smaller and smaller
units.
Business Intelligence (BI) reporting systems can analyze data using standard SQL.
BI Reporting systems are intended to create meaningful information from disparate data
sources and to deliver that information to the proper users on a timely basis.
page-pf6
The most commonly used Web server on servers running the UNIX or Linux operating
system is Internet Information Services (IIS).
The SQL keyword ORDER BY can be used with SELECT statements that are retrieving
data from view instances to sort the results of the SELECT.
Although users use database systems, they are not considered part of a database system.
If the Web server and the DBMS are running on the same server, the system has a
page-pf7
three-tier architecture.
When using Microsoft Access and IIS, the Web pages that access the database cannot be
written using PHP.
The CAP theorem defines the three properties, one of which is authorization.
When using Microsoft Access and IIS, the ODBC data source should be a system data
source.
page-pf8
Transactions should be written to the log before they are applied to the database itself.
System requirements as documented by use cases, business rules, forms, reports, and
queries are sufficient to design the database without using a formal data model.
In the general division of labor between database applications and the DBMS, the
application program determines which tables need to be modified.
Every cell in a relation can hold only a single value.
page-pf9
In SQL, to refer to a range of values in a WHERE clause, use the WITHIN keyword.
XML stands for Extensible Markup Language.
Microsoft Access supports standard SQL view statements.
page-pfa
An information system is a set of components that interact to achieve some purpose or
goal.
In crow's foot E-R notation, a circle indicates a minimum cardinality of zero.
SQL is a data sublanguage, not a complete programming language.
In terms of database security, a user can be assigned many roles, and a role can be
assigned to many users.
page-pfb
In Microsoft Access, default values must be set as a field property while the table is in
Design View.
The key for an intersection relation is always the combination of the keys of the parent
entities.
Which of the following is not included in Michael Porter's list of support activities?
A) Technology management
B) Customer service
C) Human resources management
D) Firm infrastructure management
E) All of above are considered support activities.
page-pfc
To access documentation at the MySQL Web site:
A) use the Help | MySQL Workbench command.
B) use the Help | Help Index command.
C) use the Help | MySQL Website command.
D) use the Help | MySQL.com Website command.
E) go directly to the Web site http://dev.mysql.com/doc.
Which of the following data types used in SQL would define a numeric field of the
pattern 99.99?
A) integer(2,2)
B) integer(5,2)
C) numeric(2,2)
D) numeric(4,2)
E) numeric(5,2)
page-pfd
One Business Intelligence (BI) reporting system that uses extensions to SQL is:
A) cluster analysis.
B) OLAP.
C) regression analysis.
D) RFM analysis.
E) All of the above
Which of the following is true about representing a weak entity with the relational
model?
A) If the weak entity is existence-dependent, the key of the parent must be part of the
key of the weak entity.
B) If the strong entity has a minimum cardinality of 1, the key of the weak entity must
be part of the strong entity.
C) If the weak entity is ID-dependent, the key of the weak entity must be part of the key
of the parent entity.
D) If the weak entity is ID-dependent, the key of the parent entity must be part of the
key of the weak entity.
E) If the parent entity is existence-dependent, then the minimum cardinality of the weak
entity is zero.
page-pfe
The order of the columns returned by an SQL SELECT statement is determined by the:
A) ORDER BY clause.
B) SORT BY clause.
C) order they are listed in following SELECT.
D) order they are listed in following WHERE.
E) order they are listed in following FROM.
By default, when Microsoft Access creates a relationship between two tables, it creates
a(n):
A) 1:1 relationship.
B) 1:N relationship.
C) N:M relationship.
D) association relationship.
E) recursive relationship.
page-pff
Business Intelligence (BI) systems fall into which of the following categories?
A) Processing
B) Reporting
C) Data mining
D) Both A and B
E) Both B and C
Which of the following is not one of the five SQL built-in functions?
A) MODE
B) SUM
C) COUNT
D) MAX
E) AVG
The statement
page-pf10
SELECT STUDENT.StudentNumber, STUDENT.StudentName,
FROM STUDENT
WHERE STUDENT.StudentNumber = S12345678;
is an example of:
A) QBE.
B) SQL.
C) QLE.
D) C++.
E) Java.
Refer to the table above.What is the support for Drug A and Drug B?
A) .025
B) .075
C) .100
D) .125
E) .200
page-pf11
Microsoft Access can be used to build a prototype database, which allows users:
A) to draw a crow's foot E-R diagram themselves.
B) to normalize the tables in the E-R diagram.
C) to validate the data model by demonstrating the consequences of data modeling
decisions.
D) to determine the functional dependencies in the data model.
E) to determine the appropriate primary and foreign keys in the data model.
Because SQL stored procedures allow and encourage code sharing among developers,
stored procedures give database application developers the advantages of ________.
A) less work
B) standardized processing
C) specialization among developers
D) A and B
E) A, B, and C
page-pf12
Each attribute of an entity becomes a(n) ________ of a table.
A) column
B) primary key
C) foreign key
D) alternate key
E) B or D
A dashed line between entities indicates:
A) a unique identifier.
B) a minimum cardinality of zero.
C) a minimum cardinality of one.
D) an identifying relationship.
E) a nonidentifying relationship.
Which of the following is an SQL trigger that Oracle supports?
A) BEFORE
page-pf13
B) INSTEAD OF
C) AFTER
D) B and C only
E) A, B, and C
Snowflake schemas have normalized:
A) fact tables.
B) dimension tables.
C) map tables.
D) reduce tables.
E) None of the above
The number of entity classes involved in a relationship is known as the relationship's:
A) maximum cardinality.
B) minimum cardinality.
page-pf14
C) ordinality.
D) degree.
E) class.
Which of the following is the correct technique for representing a 1:N relationship in
the relational model?
A) The key of the entity on the one side is placed into the relation for the entity on the
many side.
B) The key of the child is placed into the relation of the parent.
C) The key of either relation can be placed into the other relation.
D) The key of the entity on the many side is placed into the relation for the entity on the
one side.
E) An intersection relation is created, and the keys from both parent entities are placed
as keys in the intersection relation.
SOAP has become ________.
A) just a name, not an acronym
B) a standard protocol for sending any type of message
page-pf15
C) an old technology replaced by XML
D) A and B
E) A, B, and C
To use the Access 2013 database in an Excel 2013 PivotTable, it is generally useful to:
A) create a view-equivalent query in Access to organize the data.
B) store the needed data in an Excel worksheet.
C) store the needed data in a Word document.
D) store the needed data in a PowerPoint slide show.
E) store the needed data in a Visio diagram.
The component of a database that makes it self-describing is the:
A) related tables.
B) applications.
C) library.
page-pf16
D) data set.
E) metadata.
In Microsoft Access, tables are added to a Query window by:
A) selecting the tables from the Use Table dialog box.
B) selecting the tables from the Show Table dialog box.
C) selecting the tables from the Tables section of the Navigation Pane.
D) selecting the tables from the Queries section of the Navigation Pane.
E) selecting the tables from the Relationships window.
Problematic data include so-called "dirty data."
page-pf17
Microsoft Access 2013 database files are stored using the file extension:
A) .adb.
B) .asp.
C) .accdb.
D) .mdb.
E) .sql.
In crow's foot style E-R diagrams, a hash mark across the relationship line near an
entity indicates:
A) a minimum cardinality of zero.
B) a minimum cardinality of one.
C) a maximum cardinality of one.
D) a maximum cardinality of many.
E) Both B and C
page-pf18
Data warehouses use a(n):
A) operational database.
B) dimensional database.
C) structured storage.
D) Either A or B
E) All of the above
To get data after opening a connection, a PHP program needs to:
A) open the connection.
B) test the connection.
C) query the database.
D) process the query results.
E) close the connection.
Data mining applications are used to accomplish which of the following tasks?
A) Perform what-if analysis
page-pf19
B) Make predications
C) Facilitate decision making
D) Both A and B
E) All of the above
In the MySQL Table Editor, the abbreviation for AUTO_INCREMENT is:
A) PK
B) NN
C) UQ
D) BIN
E) AI
Which of the following is the easiest tool for doing database development with Oracle
Database?
A) The Oracle Database XE 11.2 utility
B) The Oracle SQL*Plus command utility program
page-pf1a
C) The Oracle SQL Developer
D) A and C
E) A, B and C
What concurrent processing problem occurs when a transaction reads a changed record
that has not been committed to the database?
A) Nonrepeatable reads
B) Phantom reads
C) Dirty reads
D) Serialized reads
E) Unlocked reads
What is the least restrictive isolation level that will prevent phantom read problems?
A) Read Committed
B) Serializable
C) Read Uncommitted
page-pf1b
D) Atomic Read
E) Repeatable Read
Which of the following is a task performed by the driver according to the ODBC
standard?
A) Determines the appropriate DBMS
B) Validates the format of the ODBC command received from the application
C) Converts data source error codes into ODBC standard error codes
D) Verifies the application to the data source
E) Converts the data source into an SQL-compliant data structure
To deal with data values that change over time, dimensional databases use a(n)
________.
page-pf1c
Users can click the ________ button to enable or disable the SQL editor windows set of
outlining and auto-completion features.
A relational database stores data in the form of ________.
With PHP, we enclose PHP commands in between the ________ and ________
symbols.
In Microsoft Visio 2013, how do we create data models?
page-pf1d
The SQL statement ________ is used to delete a view from a database.
Standard SQL defines four ________, which specify which of the concurrency control
problems are allowed to occur.
What is a stored procedure?
page-pf1e
How are SQL views handled in Microsoft Access?
The ________ is a representation of the content, relationships, and constraints of the
data needed to support the system requirements.
Microsoft Access 2013 can be used to prototype databases for ________.
page-pf1f
Even when using Microsoft Access and IIS, we should still use a basic Web home page
named ________.
Explain the representation of ID-dependent weak entities using the relational model.
________ are descriptions of the ways users will employ the features and functions of
the new information system.
page-pf20
Describe how to set table properties in a MySQL Workbench database design.
A commonly used Web server on servers running the Linux operating system is
________.
What is a surrogate key and how does Microsoft Access 2013 create surrogate keys?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.