COSC 81159

subject Type Homework Help
subject Pages 13
subject Words 1571
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
String comparisons are made from left to right.
a. True
b. False
______________returns only the attributes requested, in the order in which they are
requested.
a. PROJECT
b. SELECT
c. UNION
d. DIFFERENCE
A trigger is executed as part of the transaction that triggered it.
a. True
b. False
page-pf2
A database language enables the user to create database and table structures to perform
basic data management chores.
a. True
b. False
Unnormalized database tables often lead to various data redundancy disasters in
production databases.
a. True
b. False
Distributed processing does not require a distributed database, and a distributed
database does not require distributed processing.
a. True
b. False
page-pf3
In the_______ model, each parent can have many children, but each child has only one
parent.
a. hierarchical
b. network
c. relational
d. entity relationship
Incomplete or improper transactions can have a devastating effect on database integrity.
a. True
b. False
page-pf4
Only numeric data types can be added and subtracted in SQL.
a. True
b. False
A__________ lock locks the entire table preventing access to any row by a transaction
while another transaction is using the table.
a. database-level
b. table-level
c. page-level
d. row-level
The _______________command is used with the ALTER TABLE command to modify
the table by deleting a column.
a. DROP
b. REMOVE
c. DELETE
d. ERASE
page-pf5
A desktop database is a_______ database.
a. single-user
b. multiuser
c. workgroup
d. distributed
A dependency based on only a part of a composite primary key is known as a partial
dependency.
a. True
b. False
page-pf6
MySQL is an example of the____________ .
a. hierarchical model
b. file system data model
c. relational data model
d. XML data model
What is a disadvantage of using an API web-server interface?
a. It is slower than CGI scripts.
b. It is inefficient because it uses DLLs.
c. An external program needs to run for each user request.
d. An API error can bring down the entire web server.
ANSI defines four events that signal the end of a transaction. Of the following events,
which is defined by ANSI as being equivalent to a COMMIT?
a. Five SQL statements are executed.
b. The end of a program is successfully reached.
page-pf7
c. The program is abnormally terminated.
d. The database is shut down for maintenance.
_________________are the result of formatting disorganized data in order to facilitate
storage, use and generation of information.
a. Structured data
b. Raw data
c. Unstructured data
d. Obsolete data
When using the Oracle TO_NUMBER function to convert a character string into a
number,_______________ represents a digit.
a. 0
b. 9
c. $
d. #
page-pf8
A determinant is any attribute whose value determines other values within a column.
a. True
b. False
The Systems Development Life Cycle's (SDLC's) planning phase yields a general
overview of the company and its objectives.
a. True
b. False
When using an optimistic approach, during the read phase, a transaction reads the
database, executes the needed computations, and makes the updates to a private copy of
the database values.
a. True
page-pf9
b. False
A table that displays data redundancies yields___________- .
a. consistencies
b. anomalies
c. fewer attributes
d. more entities
In business intelligence framework, data are captured from a production system and
placed in___________ on a near real- time basis.
a. decision support system
b. portal
c. data warehouse
d. dashboard
page-pfa
Surrogate primary keys are especially helpful when there is no______________ key.
a. primary
b. natural
c. foreign
d. composite
Selecting database management system (DBMS) software is part of the_________
phase of the Database Life Cycle (DBLC).
a. database initial study
b. database design
c. implementation and loading
d. testing and evaluation
page-pfb
A document type definition (DTD) can be referenced by many Extensible Markup
Language (XML) documents of the same type.
a. True
b. False
All factors must be checked to ensure that each system component operates at its
optimum level and has sufficient resources to minimize the occurrence of bottlenecks.
a. True
b. False
The browser's interpretation and presentation capabilities are sufficient to develop
webbased applications.
a. True
b. False
page-pfc
_____________tools focus on the strategic and tactical use of information.
a. Business
b. Relational database management
c. Business intelligence
d. Networking
The___________ is the most specialized object in the ADO.NET framework.
a. Command
b. DataReader
c. DataAdapter
d. DataSet
An example of denormalization is using a_____________ denormalized table to hold
report data. This is required when creating a tabular report in which the columns
page-pfd
represent data that are stored in the table as rows.
a. transitive
b. 3NF
c. component
d. temporary
A __________lock prevents the use of any tables in the database from one transaction
while another transaction is being processed.
a. database-level
b. table-level
c. page-level
d. row-level
In the model, the basic logical structure is represented as an upside-down tree.
a. hierarchical
b. network
page-pfe
c. relational
d. entity relationship
Which of the following is true of spreadsheet applications?
a. They provide enhanced security and robust data sharing features.
b. They do not allow manipulation of data once entered.
c. They are a better alternative to databases.
d. They enhance the user's ability to understand the data.
A ___________lock allows concurrent transactions to access different rows of the same
table.
a. database-level
b. table-level
c. page-level
d. row-level
page-pff
The syntax of the MINUS statement in Oracle is______________ .
The__________ clause is used to restrict the output of a GROUP BY query by applying
a conditional criteria to the grouped rows.
A(n)__________ query can be used to produce a relation that retains the duplicate
rows.
page-pf10
Explain the three types of operations defined by the DO-UNDO-REDO protocol.
Data redundancies occur from_____________ of data on every row entry.
_____________allows the assignment of access rights to specific authorized users.
page-pf11
According to the data-modeling checklist,______________ should be nouns that are
familiar to business, should be short and meaningful, and should document
abbreviations, synonyms, and aliases for each entity.
XML tags must be well formed, that is, each opening tag must have a corresponding
_____________tag.
The term_____________ describes the extent to which modules are independent of one
another.
A(n)___________ , also known as a nested query or an inner query, is a query that is
embedded (or nested) inside another query.
page-pf12
In objectoriented terms, a(n)________________defines an object's behavior.
A(n)_________ routine pools multiple transactions into a single batch to update a
master table field in a single operation.
_______________is a process to help reduce the likelihood of data anomalies.
page-pf13
The ____________statement can be used to combine rows from two queries, returning
only the rows that appear in both sets.
Explain the two SQL functions.
Each row in a relation is called a(n)_______________ .

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.