MPCS 44757

subject Type Homework Help
subject Pages 9
subject Words 848
subject Authors David J. Auer, David M. Kroenke

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The ideal primary key is short, numeric, and fixed.
Big Data is the name given to the enormous datasets generated by Web 2.0 applications.
Oracle Database triggers are PL/SQL or Java procedures that are invoked when
specified database activity occurs.
Market basket analysis is a data mining technique for determining which sets of
products customers tend to purchase at the same time.
page-pf2
When you are creating a database from existing data, you will have only minor
problems with inconsistent values.
The spreadsheet data must first be highlighted (selected) in order to be imported using
the MySQL for Excel Add-In.
The American National Standards Institute (ANSI) maintains the standards for SQL.
A key of an intersection table is always the combination of the keys of both parents.
page-pf3
A referential integrity constraint is used to make sure the values of a foreign key match
a valid value of a primary key.
Microsoft Access 2013 databases are stored using the file extension .accdb.
Extended E-R model N:M relationships are called nonidentifying connection
relationships in IDEF1X.
page-pf4
Business Intelligence (BI) reporting systems can analyze data using standard SQL.
When examining data values as a part of assessing table structure, there is no need to
try to determine foreign keys.
The default file extension for text files created for SQL Developer is .sql.
SQL triggers can be used when the DBMS receives an INSERT request.
page-pf5
The Microsoft Access application generator provides the ability to create and store
forms, reports, and queries.
Oracle Database uses a System Change Number (SCN) to identify before images in
rollback segments to prevent dirty reads.
An ADO.NET dataset can only be used with optimistic locking.
page-pf6
A database is a self-describing collection of non-integrated tables.
Locking hints included in an SQL statement will override locking behavior based on
explicit transaction isolation level statements.
For use with this book, it is recommended that MySQL be configured as a developer
machine.
Users log into MySQL Workbench using the Connect to Database and Connect to
MySQL Server dialog boxes.
page-pf7
Data warehouses are populated with data prepared by data extraction, transformation,
and load (ETL) programs.
A characteristic of a relation is that the cells of the relation hold a single value.
To support rollforward and rollback recovery, transactions must be written to a script
before they are applied to the database.
page-pf8
Attributes preceded by a # are private.
A continuous circular process of changes in user behaviors and change in the
information systems they use is a natural outcome of information system use.
An entity's minimum cardinality in a relationship indicates whether or not an entity
must participate in the relationship.
SQL Server supports three recovery models: simple, complex and bulk logged.
page-pf9
The Microsoft Access wildcard character "_" (underscore) indicates a single,
unspecified character in a specific location in a Microsoft Access SQL query.
Microsoft Visio 2013 can be used to create data models.
Data types are consistent across all DBMS products.
Enterprise Resource Planning (ERP) is an example of a data mining application.
page-pfa
The CAP theorem defines the three properties, one of which is partition tolerance.
XML documents that conform to their DTD are said to be type-valid XML documents.
To drop a primary key column from a table the primary key constraint must first be
dropped, but this does not require that related foreign keys based on the column be
dropped.
page-pfb
MySQL users may be granted MySQL server administrative roles.
With ODBC, a file data source is available only to the user that created it.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.