COSC 79558

subject Type Homework Help
subject Pages 17
subject Words 2062
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The default isolation level in Oracle Database is Read Committed, which provides
statement level isolation.
Graph databases are composed of three elements, one of which is the edge.
SQL triggers are used for providing default values, validity checking, updating views,
and performing referential integrity actions.
In addition to the standard SQL Server 2014 tools, SQL statements such as CREATE
TABLE can now also be executed by using Microsoft's PowerShell.
page-pf2
MySQL indexes can be created by using the GUI MySQL Table Editor or an SQL
statement.
Because SQL statements are table-oriented, whereas programs are variable-oriented, the
results of SQL statements used in programs are accessed using an SQL cursor.
The SQL keyword SELECT is used to specify the columns to be listed in the query
results.
page-pf3
Java programs tend to execute faster than programs compiled into machine-dependent
code because the Java virtual machine only has to interpret the bytecode.
Problematic data include so-called dirty data.
In Microsoft Visio 2013, the cardinalities of the relationshipare set using the Set Begin
Symbol and Set End Symbol commands.
The method of constructing data models used in the text is the extended
entity-relationship (E-R) model.
page-pf4
In Microsoft Access, a relationship is created by dragging a foreign key column and
dropping it on top of the corresponding primary key.
A dirty read happens when one transaction reads a changed record that has not been
committed to the database.
A database shows data in tables and the relationships among the rows in those tables.
page-pf5
The database management system (DBMS) is responsible for enforcing referential
integrity constraints.
A multivalued dependency exists when a determinant is matched to a set of values.
To eliminate multivalued dependencies, normalize your tables so that they are all in
BCNF.
Oracle Database uses the SQL ALTERTABLE command to change the structure of a
table.
page-pf6
A common default Web page name recognized by most Web servers is FirstPage.html.
To create an OLAP report for an SQL Server 2014 database, use the PivotTable tool in
SQL Server 2014.
Microsoft uses the term object as a general name for various parts of a Microsoft
Access 2013 database.
page-pf7
SQL commands can be embedded in application programs.
In supervised data mining, statistical techniques are used to estimate the parameters of
the model.
Microsoft Visio 2013 is a component of Microsoft Office 2013.
The MySQL Schema Privileges Select "ALL" button marks all MySQL privileges for
assignment to the user.
page-pf8
Referential integrity constraints are rules about what data values are allowed in certain
columns.
In two-phase locking, all locks are released during the contracting phase.
Each physical record is addressed by its sequential record number (SRN).
SQL Server logins can be based on Windows Operating System security or SQL
server-specific security.
page-pf9
With SQL Server, the preferred way to create database structures is with SQL
statements.
Any table that meets the definition of a relation is in 2NF.
Given the functional dependency (A, B) → C, the attributes (A, B) are referred to as a
composite determinant.
page-pfa
In Oracle Database recovery facilities, OnLine ReDo files are backup log files
maintained separately and not necessarily on disk media.
Which of the following is not true about two-phased locking?
A) Cannot obtain a new lock once a lock has been released
B) Uses only shared locks
C) Has a growing phase
D) Has a shrinking phase
During the database redesign process, you discover that when an ORDER is deleted, its
corresponding entries in the LINE_ITEM table are not deleted (but you would like them
to be). In order to fix, this, you use what SQL syntax?
A) ON UPDATE CASCADE
B) ON DELETE CASCADE
C) CASCADE CONSTRAINTS
D) DEFAULT
page-pfb
Dimensional databases are used to track historical data, and therefore must have a(n)
________.
A) time dimension
B) customer dimension
C) sales dimension
D) order dimension
Which of the following is not a component of a computer-based information system?
A) Hardware
B) Software
C) The inventory in the warehouse
D) Data
page-pfc
Database professionals use a set of principles called ________ to guide and assess
database design.
A) database extraction
B) normalization
C) data models
D) entity-relationship data modeling
Which of the following does not describe a user-defined function?
A) It computes a numeric value
B) It can be called by name from within an SQL statement
C) It may have input parameters passed to it
D) It returns an output value to the calling statement
SQL is a ________.
A) data sublanguage
page-pfd
B) data manipulation language
C) data definition language
D) programming language
Which of the following is a common supervised data mining technique?
A) Cluster analysis
B) Regression analysis
C) RFM analysis
D) SQL analysis
The program that manages the various virtual machines (which can of course be
running their own DBMS installation) running on a physical machine is called a
________.
A) supervisor
B) hypervisor
C) virtual operating system
D) virtual DBMS
page-pfe
To check for null values in a column in a table, use the SQL phrase ________.
A) IS
B) IS NOT
C) IS NULL
D) COUNT(NULL)
Support for a scrollable cursor is a sign of what type of conformance in a DBMS
driver?
A) Level 1 API
B) Extended SQL Grammar
C) Core API
D) Level 2 API
page-pff
A tuple is also known as a ________.
A) table
B) relation
C) row
D) field
Business organizations have resisted adopting object-oriented database management
systems because ________.
A) the cost of purchasing OODBMS packages is prohibitively high
B) the cost of converting data from relational databases to OODBMSs is too high
C) most large organizations have older applications that are not based on object
oriented programming
D) Both B and C are correct
In IDEF1X, extended E-R model 1:1 relationships are called ________.
A) nonidentifying connection relationships
page-pf10
B) identifying connection relationships
C) nonspecific relationships
D) category clusters
SOAP has become ________.
A) just a name, not an acronym
B) a standard protocol for sending any type of message
C) an old technology replaced by XML
D) Both A and B are correct
What type of JDBC driver is known as a JDBC-ODBC bridge?
A) Type 1 driver
B) Type 2 driver
C) Type 3 driver
D) Type 4 driver
page-pf11
Maximum cardinality refers to ________.
A) the most instances of one entity class that can be involved in a relationship instance
with another entity class
B) the minimum number of entity classes involved in a relationship
C) whether or not an instance of one entity class is required to be related to an instance
of another entity class
D) whether or not an entity is a weak entity
In an SQL query, which of the following symbols is used by Microsoft Access to
represent a single unspecified character?
A) _ (underscore)
B) ? (question mark)
C) * (asterisk)
D) % (percent)
page-pf12
Using only SQL Server tools, you can enter data into a table by ________.
A) entering it into a table grid in the Microsoft SQL Server Management Studio
B) using INSERT statements through the Microsoft SQL Server Management Studio
C) using an SQL Server form
D) Both A and B are correct
In the MapReduce process, the first step is the ________ step.
A) column
B) reduce
C) column family
D) map
ADO.NET in-memory databases are called ________.
page-pf13
A) adoBases
B) adoDatabases
C) DataSets
D) dotNetDatabases
Which of the following is not true about OLE DB?
A) Scripting languages can access OLE DB.
B) OLE DB is object-oriented.
C) OLE DB can access ODBC data sources.
D) OLE DB can access non-relational data sources.
To create a new MySQL Workbench EER model, you can use ________.
A) the add Model link on the Home page
B) the File | New Model command
C) the Start new EER command
page-pf14
D) Both A or B are correct
In an enterprise-class database system, reports are created by ________.
A) the user
B) the database application
C) the database management system (DBMS)
D) the database
Suppose you have created a data model for an airline based on a variety of forms,
reports, user interviews, data sources, etc. Your client comes forward with a new
desired report that includes passenger weights and a relationship between passengers
and employees, neither of which is in your E-R diagram. You should ________.
A) create a new, separate E-R diagram with just the new information
B) add the relationship and the weight attribute to the existing data model
C) add the relationship but not the weight attribute
D) add the weight attribute but not the relationship
page-pf15
The "R" in RFM analysis stands for ________.
A) rank
B) recent
C) relationship
D) readiness
SOAP originally stood for ________.
A) Simple Operational Application Protocol
B) Standard Operational Application Protocol
C) Simple Object Application Protocol
D) Simple Object Access Protocol
page-pf16
In Microsoft Access, referential integrity constraints are created ________.
A) by checking the Enforce Referential Integrity check box in the Edit Relationships
dialog box
B) by setting a property value on the foreign key in the table which contains it
C) by setting a property value on the primary key in the Relationships window
D) by setting a property value on the foreign key in the Relationships window.
You are given an E-R diagram with two entities, ORDER and CUSTOMER, as shown
above, and are asked to draw the relationship between them. If a given customer can
place only one order and a given order can be placed by at most one customer, which of
the following should be indicated in the relationship symbol between the two entities?
A) N:M
B) 1:1
C) 1:N
D) N:1
page-pf17
An occurrence of a particular entity is called an ________.
A) entity class
B) entity relationship
C) entity instance
D) entity attribute
Based on the table below, a function to compute a 10% late penalty on a customer's
balance would have how many input parameters?
CUSTOMER
A) 0
B) 1
C) 2
D) it doesn't matter

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.