COSC 84866

subject Type Homework Help
subject Pages 12
subject Words 1546
subject Authors Carlos Coronel Steven Morris

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
"A password must have a minimum of five characters" is an example of
a________________ .
a. policy
b. rule
c. procedure
d. standard
Normalization purity is often easy to sustain in the modern database environment.
a. True
b. False
A ___________join returns rows with matching values and includes all rows from both
tables (T1 and T2) with unmatched values.
a. natural
b. cross
c. full outer
d. left outer
page-pf2
The main disadvantage of using CGI scripts is that:
a. they cause a resource bottleneck since they have to execute separately for each user
request.
b. they are specific to the web server and to the operating system, thus being platform
dependent.
c. an error in one script can damage and bring down the web server completely.
d. they do not have the capability to process forms or prepare outputs based on form
data.
Among the three levels of compliance of the ODBC API standards, Level-1 provides
support for procedural SQL and cursors.
a. True
b. False
page-pf3
An optimistic approach is based on the assumption that the majority of the database
operations do not conflict.
a. True
b. False
Unary relationships are common in manufacturing industries.
a. True
b. False
The________ relationship is the "relational model ideal."
a. 1:1
b. 1:M
c. M:1
d. M:N
page-pf4
An implicit cursor is automatically created in procedural SQL when the SQL statement
returns only one value.
a. True
b. False
When using the Crow's Foot notation, the associative entity is indicated by
__________relationship lines between the parents and the associative entity.
a. dotted
b. double
c. triple
d. solid
page-pf5
The level of transparency supported by the distributed database management system
remains the same for all systems.
a. True
b. False
A(n)______________ join returns not only the rows matching the join condition (that
is, rows with matching values in the common columns) but also the rows with
unmatched values.
a. outer
b. inner
c. equi-
d. cross
Overlapping subtypes are subtypes that contain a unique subset of the supertype entity
set.
a. True
b. False
page-pf6
The____________ table space is used for transaction-recovery purposes.
a. system
b. user data
c. temporary
d. rollback segment
_____ deals with ensuring that data is protected against unauthorized access, and if the
data are accessed by an authorized user, that the data are used only for an authorized
purpose.
a. Integrity
b. Compliance
c. Availability
d. Confidentiality
page-pf7
The row's range of permissible values is known as its domain.
a. True
b. False
Distribution transparency is supported by a distributed data dictionary.
a. True
b. False
A table is in 4NF if it is in 3NF, and_________________ .
a. all attributes must be dependent on the primary key and must be dependent on each
other
b. all attributes are unrelated
c. it has no multivalued dependencies
d. no column contains the same values
page-pf8
"Should the existing system be replaced?" is a question that is asked during
the_________ stage of the Systems Development Life Cycle (SDLC).
a. planning
b. analysis
c. implementation
d. maintenance
One of the advantages of a distributed database management system (DDBMS) is
security.
a. True
b. False
page-pf9
____________are more detailed and specific than policies and describe the minimum
requirements of a given DBA activity.
a. Guidelines
b. Standards
c. Procedures
d. Documentations
In the context of partial dependencies, data redundancies occur because every row entry
requires duplication of data.
a. True
b. False
In Oracle, the __________function converts a date to a character string.
a. CONVERT()
b. TO_DATE
c. TO_CHAR()
d. TO_STRING()
page-pfa
The syntax for a left outer join is .
a. SELECT column-list
FROM table1 OUTER JOIN table2 LEFT
WHERE join-condition
b. SELECT column-list
FROM table1 LEFT [OUTER] JOIN table2
ON join-condition
c. SELECT column-list
WHERE LEFT table1 = table 2
d. SELECT column-list
FROM table1 LEFT table2 [JOIN]
WHERE join-condition
Character field comparisons are faster than numeric, date, and NULL comparisons.
a. True
page-pfb
b. False
____________yields better performance.
a. Denormalization
b. Normalization
c. Atomization
d. Compression
To list all the contents of the PRODUCT table, a user would use___________ .
a. LIST * FROM PRODUCT
b. SELECT * FROM PRODUCT
c. DISPLAY * FROM PRODUCT
d. SELECT ALL FROM PRODUCT
page-pfc
A plug-in is an external application that is automatically invoked by a web browser
when needed.
a. True
b. False
During the implementation phase of the Systems Development Life Cycle (SDLC), the
hardware, database management system (DBMS) software, and application programs
are installed, and the database design is implemented.
a. True
b. False
The network model has structural level dependence.
a. True
b. False
page-pfd
Systems analysis establishes the need for an information system and its extent.
a. True
b. False
Dependencies can be identified with the help of a dependency_______________ .
Database__________ activities can be divided into those taking place either on the
client side or on the server side.
page-pfe
What are the wildcard characters that are used with the LIKE command? Provide one or
more examples of each.
In Crow's Foot notation, an optional relationship between entities is shown by drawing
a(n)_______ on the side of the optional entity.
page-pff
The____________ relationship is the relational database norm.
A(n)____________ links tables on the basis of an equality condition that compares
specified columns of each table.
The_____________ goal is to design an enterprise-wide database based on a specific
data model but independent of physical-level details.
page-pf10
_____________provides a unified interface to access data from any programming
language that uses the underlying OLE- DB objects.
______________webpages are at the heart of current generation websites.
______________is another name for table space.
What are the classical approaches to database design?
page-pf11
________________allow end users to access the database without being able to
download the information from their workstations.
A common practice is to create a(n)________________ on any field that is used as a
search key, in comparison operations in a conditional expression, or when a user wants
to list rows in a specific order.
page-pf12
A relationship_____________ is difficult to establish if only one side of the relationship
is known.
The system and operational costs are addressed by the _________during the planning
phase of the Systems Development Life Cycle (SDLC).

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.