CS 58161

subject Type Homework Help
subject Pages 18
subject Words 1968
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
MySQL uses MySQL NEW transition variables with triggers to access new data
inserted into a table row.
IDEF1X category clusters may be either complete or incomplete.
The IDEF1X standard excludes the concept of domains found in the extended E-R
model.
When transforming supertype/subtype entities into a relational database design, an
entity is created for the supertype only.
page-pf2
Extended E-R model 1:1 relationships are called nonidentifying connection
relationships in IDEF1X.
An OLE DB service provider accepts data from an OLE DB tabular data provider.
IDEF1X entities are the same as the entities in the extended E-R model.
page-pf3
An inconsistent values problem is created when different users have coded the same
data entries differently.
The Microsoft SQL Server Management Studio Manager can be used to create a new
database.
If a trigger is being written to enforce referential integrity actions, you cannot use an
INSTEAD OF trigger.
A digital dashboard is an electronic display customized for an individual user.
page-pf4
Attributes preceded by a + are public.
In a common form of RFM analysis, an RFM score of {5 1 1} means that the customer
orders frequently and orders items of high monetary value but has not ordered anything
for some time.
Business organizations have resisted adopting object-oriented database systems because
the cost of purchasing OODBMS packages is prohibitively high.
page-pf5
An ADO.NET DataSet is connected to databases.
When using IIS, Microsoft recommends using the FastCGI protocol option when
installing PHP.
Apache is the Web server typically used on computers running the Linux operating
system.
UML-style E-R diagrams introduce object-oriented notation that is of limited practical
value in traditional, relational database design.
page-pf6
Database design varies depending on whether you're building an updatable database or
a read-only database.
Report management defines who gets the report, how often, and how it is to be
delivered.
With SQL Server, a clustered index has the data with, and in the same order as, the
bottom level of the index.
page-pf7
One deliverable from the requirements analysis step is a statement of requirements
(SOR).
XML provides a standardized, non-customizable way to describe the content of a
document.
In Oracle Database, triggers that are fired once for each row that is changed in a table
are called row triggers.
The SQL syntax JOIN . . . ON can be used as an alternate way of writing an SQL join
statement.
page-pf8
Every DBMS product has an application programming interface (API).
Each row in a database table is also known as a record.
In the database redesign process, it is often useful to test whether certain conditions or
assumptions are valid before proceeding with the redesign.
page-pf9
The Microsoft Access window Close button is actually a close-and-exit button.
In Microsoft Access, you can use ODBC to connect to SQL Server in place of the ADE
database engine.
MySQL backups are run on the Administration - Data Export tab of the Data Export
page.
In Oracle Database, indexes are created using the ALTER command.
page-pfa
SQL statements can be run individually or as part of a related group of SQL statements
known as a script.
To refer to a set of values needed for a condition, use the SQL IN operator.
Market basket analysis as described in the text uses the technique of conditional
probabilities.
Microsoft Access database objects are displayed in the Browser Pane.
page-pfb
The SQL keyword UNIQUE is used to define alternate keys.
Systems analysis and design is the process of creating and maintaining information
systems.
To represent a one-to-many relationship in a relational database design, the key of the
child table is placed as a foreign key into the other table.
page-pfc
A null value in a column may indicate that there is no appropriate value for that
attribute.
What name is so special to SQL Server that no stored procedure will work on a table
with that name, not even if it is enclosed in brackets?
A) NAME
B) UPDATE
C) TRANSACTION
D) KEY
Which standard interface in OLE DB is invoked to declare a forward-only cursor?
A) IRowSet
B) IAccessor
C) IColumnsInfo
D) adXact
page-pfd
XML Schema is used to define ________.
A) document content and structure
B) XQL queries
C) DOM-compliant parsers
D) DTDs
We have done an RFM analysis on our customer data. John Smith has a score of {5 1
1}. This means that John ________.
A) has ordered recently, and orders a lot when he orders
B) hasn't ordered recently, but orders a lot when he orders
C) has ordered recently, but doesn't order a lot when he orders
D) hasn't ordered recently, and doesn't order a lot when he orders
page-pfe
Referential integrity constraints are used to limit the possible values of a ________.
A) composite key
B) candidate key
C) foreign key
D) surrogate key
XML Schemas consist of ________.
A) elements
B) attributes
C) properties
D) Both A and B are correct
A lock placed automatically by the DBMS is called a(n) ________ lock.
A) exclusive
B) explicit
C) shared
page-pff
D) implicit
A ________ is used to limit the possible values of a foreign key.
A) composite key
B) surrogate key
C) functional dependency
D) referential integrity constraint
Business Intelligence (BI) systems do which of the following?
A) Analyze current and past activities
B) Predict future events
C) Record and process transactions
D) Both A and B are correct
page-pf10
Which of the following is not an SQL trigger Oracle supports?
A) BEFORE
B) INSTEAD OF
C) AFTER
D) DURING
HTML is an application of ________.
A) SGML
B) XML
C) SOAP
D) XSLT
page-pf11
Which of the following is not a transaction isolation level supported by SQL Server?
A) Pessimistic
B) Read Committed
C) Serializable
D) Read Uncommitted
A parent object is also known as a(n) ________.
A) supertype object
B) child object
C) subtype object
D) multiple-value object
To represent a multivalued attribute in an E-R model, ________.
A) create a new ID-dependent entity with a 1:N relationship
B) create a new weak, but not ID-dependent entity with a 1:N relationship
C) create a new strong entity with a 1:1 relationship
page-pf12
D) create a new ID-dependent entity with a 1:1 relationship
The MySQL Workbench can be used to create ________.
A) data models
B) data designs
C) database models
D) database designs
Which of the following is (are) true about data mining applications?
A) They use sophisticated mathematical techniques.
B) They use sophisticated statistical techniques.
C) Their report delivery is more important than report delivery for reporting systems.
D) Both A and B are correct
page-pf13
In an SQL query, which built-in function is used to total numeric columns?
A) AVG
B) COUNT
C) MAX
D) SUM
A referential integrity constraint policy that insures that all rows containing a particular
foreign key value in a table are eliminated from the table when the row containing the
corresponding primary key value in a parent table is eliminated from the database is
called ________.
A) incremental updates
B) incremental deletes
C) cascading updates
D) cascading deletes
page-pf14
Which keyword is used to remove one or more rows from a table?
A) DELETE
B) INSERT
C) ERASE
D) SET
In the following sample document data (presented in MongoDB syntax), how many
documents are there?
{
_id: "Advisor1",
name: "Shire, Robert",
dept: "History",
yearHired: 1975
}
{
_id: 555667777,
name: "Tierney, Doris",
majors: ["Music", "Spanish"],
addresses: [
{
page-pf15
street: "14510 NE 4th Street",
city: "Bellevue",
state: "WA",
zip: "98005"
},
{
street: "335 Aloha Street",
city: "Seattle",
state: "WA",
zip: "98109"
}
],
advisorID: "Advisor1"
}
A) 2
B) 4
C) 6
D) 8
Which of the following is not true about ADO.NET?
A) It is an improved and expanded version of ADO.
page-pf16
B) It facilitates the transformation of XML documents to and from relational database
constructs.
C) It provides the ability to create and process in-memory databases.
D) Microsoft does not supply a data provider for Oracle database.
Which of the following is not true about PHP dynamic extension files (dll files)?
A) They can be shared by many applications.
B) They allow php to make application calls directly to the DBMS rather than using
ODBC.
C) There is no relationship between the php.ini file and the dll files.
D) They enable support for PHP Data Objects (PDO).
To represent an association pattern in an E-R model, ________.
A) create a new ID-dependent entity with a 1:1 relationship to one other entity
B) create a new weak, but not ID-dependent entity with a 1:1 relationship to one other
entity
C) create a new strong entity with a 1:1 relationship to one other entity
page-pf17
D) create a new ID-dependent entity with a N:1 relationships to two parent entities
In the MySQL Workbench, a 1:N non-identifying relationship between two tables that
already contain the needed primary and foreign keys is created using ________.
A) the 1:N Identifying Relationship button
B) the 1:N Non-identifying Relationship button
C) the N:M Identifying Relationship button
D) the Place a Relationship Using Existing Columns button
Which of the following is not true of stored procedures in Oracle Database?
A) They are programs.
B) They can have parameters.
C) They can be invoked remotely.
D) They can be written in C++.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.