click below
click below
Normal Size Small Size show me how
Stack #4039651
Question | Answer |
---|---|
_____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information. | Structured data |
_____ data exists in a format that does not lend itself to processing that yields information. | Unstructured |
_____ data exist in the format in which they were collected. | Unstructured |
Unstructured | _____ exists when different versions of the same data appear in different places. |
_____ exists when different versions of the same data appear in different places. | Data inconsistency |
Data inconsistency | _____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. |
_____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. | Data integrity |
Data integrity | _____ is the body of information and facts about a specific subject. |
_____ is the body of information and facts about a specific subject. | Knowledge |
Knowledge | _____ is the result of revealing the meaning of raw facts. |
_____ is the result of revealing the meaning of raw facts. | Information |
Information | _____ provide a description of the data characteristics and the set of relationships that link the data found within the database. |
_____ provide a description of the data characteristics and the set of relationships that link the data found within the database. | Metadata |
Metadata | _____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed. |
_____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed. | Performance tuning |
Performance tuning | _____ serve as the intermediary between the user and the database. |
_____ serve as the intermediary between the user and the database. | DBMSs |
DBMSs | A _____ is a character or group of characters that has a specific meaning. |
A _____ is a character or group of characters that has a specific meaning. | Field |
Field | A _____ is a collection of related records. |
A _____ is a collection of related records. | File |
File | A _____ is a logically connected set of one or more fields that describes a person, place, or thing. |
A _____ is a logically connected set of one or more fields that describes a person, place, or thing. | Record |
Record | A data warehouse contains historical data obtained from the _____. |
A data warehouse contains historical data obtained from the _____. | Operational databases |
Operational databases | A desktop database is a _____ database. |
A desktop database is a _____ database. | Single-user |
Single-user | A workgroup database is a(n) _____ database. |
A workgroup database is a(n) _____ database. | Multiuser |
Multiuser | A(n) _____ database is used by an organization and supports many users across many departments. |
A(n) _____ database is used by an organization and supports many users across many departments. | Enterprise |
Enterprise | A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization. |
A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization. | Workgroup |
Workgroup | A(n) _____ might be written by a programmer or it might be created through a DBMS utility program. |
A(n) _____ might be written by a programmer or it might be created through a DBMS utility program. | Application |
Application | Accurate, relevant, and timely information is the key to _____. |
Accurate, relevant, and timely information is the key to _____. | Good decision making |
Good decision making | An XML database supports the storage and management of _____ XML data. |
An XML database supports the storage and management of _____ XML data. | Semistructured |
Semistructured | Data is said to be verifiable if _____. |
Data is said to be verifiable if _____. | The data is obtained from trusted sources |
The data is obtained from trusted sources | End-user data is _____. |
End-user data is _____. | raw facts of interest to the end user |
raw facts of interest to the end user | Most data that can be encountered are best classified as _____. |
Most data that can be encountered are best classified as _____. | Unstructured |
Unstructured | The database structure in a DBMS is stored as a _____. |
The database structure in a DBMS is stored as a _____. | Collection of files |
Collection of files | The organization of data within folders in a manual file system is determined by _______. |
The organization of data within folders in a manual file system is determined by _______. | Its expected use |
Its expected use | The response of the DBMS to a query is the ___________. |
The response of the DBMS to a query is the ___________. | Query result set |
Query result set | The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment. |
The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment. | Database system |
Database system | Which of the following is true of spreadsheet applications? |
Which of the following is true of spreadsheet applications? | They enhance the user’s ability to understand the data. |
They enhance the user’s ability to understand the data. | Which of the following refers to the situation where different versions of the same data are stored at different places because they weren’t updated consistently? |
Which of the following refers to the situation where different versions of the same data are stored at different places because they weren’t updated consistently? | Data redundancy |
Data redundancy | _____ are important because they help to ensure data integrity. |
_____ are important because they help to ensure data integrity. | Constraints |
Constraints | _____ are normally expressed in the form of rules. |
_____ are normally expressed in the form of rules. | Constraints |
Constraints | A noun in a business rule translates to a(n) _____ in the data model. |
A noun in a business rule translates to a(n) _____ in the data model. | Entity |
Entity | A verb associating two nouns in a business rule translates to a(n) _____ in the data model. |
A verb associating two nouns in a business rule translates to a(n) _____ in the data model. | Relationship |
Relationship | A(n) _____ enables a database administrator to describe schema components. |
A(n) _____ enables a database administrator to describe schema components. | Data definition language (DDL) |
Data definition language (DDL) | A(n) _____ is a restriction placed on the data. |
A(n) _____ is a restriction placed on the data. | Constraint |
Constraint | A(n) _____ is anything about which data are to be collected and stored. |
A(n) _____ is anything about which data are to be collected and stored. | Entity |
Entity | A(n) _____ is bidirectional. |
A(n) _____ is bidirectional. | Relationship |
Relationship | A(n) _____ is the equivalent of a field in a file system. |
A(n) _____ is the equivalent of a field in a file system. | Attribute |
Attribute | A(n) _____ represents a particular type of object in the real world. |
A(n) _____ represents a particular type of object in the real world. | Entity |
Entity | A(n) _____ enables a database administrator to describe schema components. |
A(n) _____ enables a database administrator to describe schema components. | Data definition language (DDL) |
Data definition language (DDL) | A(n) _____'s main function is to help one understand the complexities of the real-world environment. |
A(n) _____'s main function is to help one understand the complexities of the real-world environment. | Model |
Model | In the _____ model, each parent can have many children, but each child has only one parent. |
In the _____ model, each parent can have many children, but each child has only one parent. | Hierarchical |
Hierarchical | In the _____ model, the basic logical structure is represented as an upside-down tree. |
In the _____ model, the basic logical structure is represented as an upside-down tree. | Hierarchical |
Hierarchical | In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent. |
In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent. | Network |
Network | MySQL is an example of the _____. |
MySQL is an example of the _____. | Relational data model |
Relational data model | Oracle 12c, MS SQL Server, and Tamino are examples of _____ data models. |
Oracle 12c, MS SQL Server, and Tamino are examples of _____ data models. | XML Hybrid |
XML Hybrid | Students and classes have a _____ relationship. |
Students and classes have a _____ relationship. | Many-to-many |
Many-to-many | The _____ data model is said to be a semantic data model. |
The _____ data model is said to be a semantic data model. | Object-oriented |
Object-oriented | The _____ data model uses the concept of inheritance. |
The _____ data model uses the concept of inheritance. | Object-oriented |
Object-oriented | The _____ model uses the term connectivity to label the relationship types. |
The _____ model uses the term connectivity to label the relationship types. | Entity relationship |
Entity relationship | The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text. |
The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text. | Entity relationship |
Entity relationship | The hierarchical data model was developed in the _____. |
The hierarchical data model was developed in the _____. | 1960s |
1960s | The object-oriented data model was developed in the _____. |
The object-oriented data model was developed in the _____. | 1980s |
1980s | The relational data model was developed in the _____. |
The relational data model was developed in the _____. | 1970s |
1970s | VMS/VSAM is an example of the _____. |
VMS/VSAM is an example of the _____. | File system data model |
File system data model | Which of the following is true of business rules? |
Which of the following is true of business rules? | They can serve as a communication tool between the users and designers. |
They can serve as a communication tool between the users and designers. | Which of the following is true of NoSQL databases? |
Which of the following is true of NoSQL databases? | They are not based on the relational model. |
They are not based on the relational model. | Which of the following types of HDFS nodes acts as the interface between the user application and the HDFS? |
Which of the following types of HDFS nodes acts as the interface between the user application and the HDFS? | Client node |
Client node | Which of the following types of HDFS nodes stores all the metadata about a file system? |
Which of the following types of HDFS nodes stores all the metadata about a file system? | Name node |
Name node | _____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. |
_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. | Outer joins |
Outer joins | _____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. |
_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. | Predicate |
Predicate | _____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. |
_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. | M:N |
M:N | _____ returns only the attributes requested, in the order in which they are requested. |
_____ returns only the attributes requested, in the order in which they are requested. | PROJECT |
PROJECT | _____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. |
_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. | SELECT |
SELECT | A _____ contains at least all of the attribute names and characteristics for each table in the system. |
A _____ contains at least all of the attribute names and characteristics for each table in the system. | Data dictionary |
Data dictionary | A _____ is any key that uniquely identifies each row. |
A _____ is any key that uniquely identifies each row. | Superkey |
Superkey | A _____ is the primary key of one table that has been placed into another table to create a common attribute. |
A _____ is the primary key of one table that has been placed into another table to create a common attribute. | Foreign key |
Foreign key | A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes. |
A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes. | Candidate |
Candidate | A _____ key is defined as a key that is used strictly for data retrieval purposes. |
A _____ key is defined as a key that is used strictly for data retrieval purposes. | Secondary |
Secondary | A(n) _____ is an orderly arrangement used to logically access rows in a table. |
A(n) _____ is an orderly arrangement used to logically access rows in a table. | Index |
Index | A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). |
A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). | Natural |
Natural | A(n) _____ only returns matched records from the tables that are being joined. |
A(n) _____ only returns matched records from the tables that are being joined. | Inner join |
According to Codd’s _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting colum | Logical data independence |
Logical data independence | According to Codd’s _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. |
According to Codd’s _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. | Nonsubversion |
Nonsubversion | Another name for a composite entity is a(n) _____ entity. |
Another name for a composite entity is a(n) _____ entity. | Bridge |
Bridge | Date attributes contain calendar dates stored in a special format known as the _____ date format. |
Date attributes contain calendar dates stored in a special format known as the _____ date format. | Julian |
Julian | Each table _____ represents an attribute. |
Each table _____ represents an attribute. | Column |
Column | In a database context, a(n) _____ indicates the use of different names to describe the same attribute. |
In a database context, a(n) _____ indicates the use of different names to describe the same attribute. | Synonym |
Synonym | In a database context, the word _____ indicates the use of the same attribute name to label different attributes. |
In a database context, the word _____ indicates the use of the same attribute name to label different attributes. | Homonym |
Homonym | In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. |
In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. | Keys |
Keys | Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. |
Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. | Integrity |
Integrity | The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. |
The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. | NOT NULL |
NOT NULL | The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. |
The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. | System catalog |
System catalog | The _____ relationship is the “relational model ideal.” |
The _____ relationship is the “relational model ideal.” | 1:M |
1:M | The _____ relationship should be rare in any relational database design. |
The _____ relationship should be rare in any relational database design. | 0.0423611111111111 |
0.0423611111111111 | The CUSTOMER table’s primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. |
The CUSTOMER table’s primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. | Entity |
Entity | To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. |
To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. | SELECT |
SELECT | When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. |
When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. | Union-compatible |
Union-compatible | When you define a table’s primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. |
When you define a table’s primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. | Unique |
Unique | _____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity. |
_____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity. | Cardinality |
Cardinality | A _____ attribute can be further subdivided to yield additional attributes. |
A _____ attribute can be further subdivided to yield additional attributes. | Composite |
Composite | A _____ attribute is one that cannot be subdivided. |
A _____ attribute is one that cannot be subdivided. | Simple |
Simple | A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship. |
A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship. | Weak |
Weak | A _____ relationship exists when an association is maintained within a single entity. |
A _____ relationship exists when an association is maintained within a single entity. | Unary |
Unary | A _____ relationship exists when three entities are associated. |
A _____ relationship exists when three entities are associated. | Ternary |
Ternary | A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity. |
A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity. | Dashed line |
Dashed line | A relationship is an association between _____. |
A relationship is an association between _____. | Entities |
Entities | A(n) _____ is the set of possible values for a given attribute. |
A(n) _____ is the set of possible values for a given attribute. | Domain |
Domain | An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence. |
An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence. | Existence |
Existence | Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design. |
Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design. | Information |
Information | Database design is a(n) _____ process based on repetition. |
Database design is a(n) _____ process based on repetition. | Iterative |
Iterative | Ideally, an entity identifier is composed of _____ attribute(s). |
Ideally, an entity identifier is composed of _____ attribute(s). | One |
One | If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship. |
If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship. | Recursive |
Recursive | If an entity can exist apart from all of its related entities, then it is existence-independent, and it |
If an entity can exist apart from all of its related entities, then it is existence-independent, and it | is referred to as a(n) _____ entity. |
is referred to as a(n) _____ entity. | Strong |
Strong | If Tiny College has some departments that are classified as “research only” and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity. |
If Tiny College has some departments that are classified as “research only” and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity. | Optional to |
Optional to | In organizations that generate a large number of transactions, _____ are often a top priority in database design. |
In organizations that generate a large number of transactions, _____ are often a top priority in database design. | High processing speeds |
High processing speeds | In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities. |
In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities. | (min, max) |
(min, max) | Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level. |
Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level. | Entity |
Entity | The _____ notation of entity-relationship modeling can be used for both conceptual and |
The _____ notation of entity-relationship modeling can be used for both conceptual and | implementation modeling. |
implementation modeling. | UML |
UML | The conceptual model can handle _____ relationships and multivalued attributes. |
The conceptual model can handle _____ relationships and multivalued attributes. | M:N |
M:N | The Crow’s foot symbol with two vertical parallel lines indicates _____ cardinality. |
The Crow’s foot symbol with two vertical parallel lines indicates _____ cardinality. | (1,1) |
(1,1) | The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application. |
The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application. | Derived |
Derived | The entity relationship diagram (ERD) represents the _____ database as viewed by the end user. |
The entity relationship diagram (ERD) represents the _____ database as viewed by the end user. | Conceptual |
Conceptual | The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities. |
The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities. | M:N |
M:N | The existence of a(n) _____ entity indicates that its minimum cardinality is zero. |
The existence of a(n) _____ entity indicates that its minimum cardinality is zero. | Optional |
Optional | The first step in building an entity-relationship diagram (ERD) is _____. |
The first step in building an entity-relationship diagram (ERD) is _____. | Creating a detailed narrative of the organization’s description of operations |
Creating a detailed narrative of the organization’s description of operations | To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible. |
To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible. | Binary |
Binary | When the specific cardinalities are not included on the diagram in Crow’s Foot notation, cardinality is implied by the use of _____. |
When the specific cardinalities are not included on the diagram in Crow’s Foot notation, cardinality is implied by the use of _____. | Symbols |
Symbols | When using the Crow’s Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity. |
When using the Crow’s Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity. | Solid |
Solid | _____ is the bottom-up process of identifying a higher-level, more generic entity supertype from lower-level entity subtypes. |
_____ is the bottom-up process of identifying a higher-level, more generic entity supertype from lower-level entity subtypes. | Generalization |
Generalization | A _____ is a primary key created by a database designer to simplify the identification of entity instances. |
A _____ is a primary key created by a database designer to simplify the identification of entity instances. | Surrogate key |
Surrogate key | A _____ key is a real-world, generally accepted identifier used to uniquely identify real-world objects. |
A _____ key is a real-world, generally accepted identifier used to uniquely identify real-world objects. | Natural |
Natural | A partial completeness constraint is represented by _____. |
A partial completeness constraint is represented by _____. | a single horizontal line under a circle |
a single horizontal line under a circle | A specialization hierarchy can have _____ level(s) of supertype/subtype relationships. |
A specialization hierarchy can have _____ level(s) of supertype/subtype relationships. | Many |
Many | A total completeness constraint is represented by a _____. |
A total completeness constraint is represented by a _____. | Double horizontal line under a circle |
Double horizontal line under a circle | A(n) _____ is the attribute in the supertype entity that determines to which entity subtype each supertype occurrence is related. |
A(n) _____ is the attribute in the supertype entity that determines to which entity subtype each supertype occurrence is related. | Subtype discriminator |
Subtype discriminator | A(n)_____ is a generic entity type that is related to one or more entity subtypes. |
A(n)_____ is a generic entity type that is related to one or more entity subtypes. | Entity supertype |
Entity supertype | According to the “preferably single-attribute” characteristic of a primary key, the primary key: |
According to the “preferably single-attribute” characteristic of a primary key, the primary key: | Should have the minimum number of attributes possible. |
Should have the minimum number of attributes possible. | An entity cluster is formed by combining multiple interrelated entities into _____. |
An entity cluster is formed by combining multiple interrelated entities into _____. | A single abstract entity object |
A single abstract entity object | At the implementation level, the supertype and its subtype(s) depicted in a specialization hierarchy maintain a(n) _____ relationship. |
At the implementation level, the supertype and its subtype(s) depicted in a specialization hierarchy maintain a(n) _____ relationship. | 0.0423611111111111 |
0.0423611111111111 | Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allowed only once in the _____ relationship. |
Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allowed only once in the _____ relationship. | M:N |
M:N | If one exists, a data modeler uses a _____ as the primary key of the entity being modeled. |
If one exists, a data modeler uses a _____ as the primary key of the entity being modeled. | Natural identifier |
Natural identifier | In the context of total completeness, in a(n) _____, every supertype occurrence is a member of only one subtype. |
In the context of total completeness, in a(n) _____, every supertype occurrence is a member of only one subtype. | disjoint constraint |
disjoint constraint | In the context of total completeness, in a(n) _____, every supertype occurrence is a member of at least one subtype. |
In the context of total completeness, in a(n) _____, every supertype occurrence is a member of at least one subtype. | overlapping constraint |
overlapping constraint | Nonoverlapping subtypes are subtypes that contain a(n) _____ subset of the supertype entity set. |
Nonoverlapping subtypes are subtypes that contain a(n) _____ subset of the supertype entity set. | unique |
unique | One important inheritance characteristic is that all entity subtypes inherit their _____ key attribute from their supertype. |
One important inheritance characteristic is that all entity subtypes inherit their _____ key attribute from their supertype. | primary |
primary | Overlapping subtypes are subtypes that contain _____ subsets of the supertype entity set. |
Overlapping subtypes are subtypes that contain _____ subsets of the supertype entity set. | nonunique |
nonunique | The _____ depicts the arrangement of higher-level entity supertypes (parent entities) and lower-level entity subtypes (child entities). |
The _____ depicts the arrangement of higher-level entity supertypes (parent entities) and lower-level entity subtypes (child entities). | specialization hierarchy |
specialization hierarchy | The “_____” characteristic of a primary key states that the primary key should not have embedded semantic meaning. |
The “_____” characteristic of a primary key states that the primary key should not have embedded semantic meaning. | nonintelligent |
nonintelligent | The “_____” characteristic of a primary key states that the primary key must uniquely identify each entity instance, must be able to guarantee unique values, and must not contain nulls. |
The “_____” characteristic of a primary key states that the primary key must uniquely identify each entity instance, must be able to guarantee unique values, and must not contain nulls. | unique values |
unique values | The “_____” characteristic of a primary key states that the selected primary key must not be composed of any attribute(s) that might be considered a violation. |
The “_____” characteristic of a primary key states that the selected primary key must not be composed of any attribute(s) that might be considered a violation. | security-compliant |
security-compliant | The default comparison condition for the subtype discriminator attribute is the _____ comparison. |
The default comparison condition for the subtype discriminator attribute is the _____ comparison. | equality |
equality | The extended entity relationship model (EERM) is sometimes referred to as the _____. |
The extended entity relationship model (EERM) is sometimes referred to as the _____. | enhanced entity relationship model |
enhanced entity relationship model | The most important characteristic of an entity is its _____ key, used to uniquely identify each entity instance. |
The most important characteristic of an entity is its _____ key, used to uniquely identify each entity instance. | primary |
primary | The property of _____ enables an entity subtype to inherit the attributes and relationships of the supertype. |
The property of _____ enables an entity subtype to inherit the attributes and relationships of the supertype. | inheritance |
inheritance | The purpose of an entity _____ is to simplify an entity-relationship diagram (ERD) and thus enhance its readability. |
The purpose of an entity _____ is to simplify an entity-relationship diagram (ERD) and thus enhance its readability. | cluster |
cluster | _____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely. |
_____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely. | Data warehouse |
Data warehouse | A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence. |
A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence. | Repeating group |
Repeating group | A relational table must not contain a(n) _____. |
A relational table must not contain a(n) _____. | Repeating group |
Repeating group | A table is in 4NF if it is in 3NF, and _____. |
A table is in 4NF if it is in 3NF, and _____. | It has no multivalued dependencies |
It has no multivalued dependencies | A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____. |
A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____. | 1NF |
1NF | A table that is in 2NF and contains no transitive dependencies is said to be in _____. |
A table that is in 2NF and contains no transitive dependencies is said to be in _____. | 3NF |
3NF | A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____. |
A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____. | 4NF |
4NF | A(n) _____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key. |
A(n) _____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key. | Transitive dependency |
Transitive dependency | An atomic attribute _____. |
An atomic attribute _____. | Cannot be further subdivided |
Cannot be further subdivided | An attribute that is part of a key is known as a(n) _____ attribute. |
An attribute that is part of a key is known as a(n) _____ attribute. | Prime |
Prime | An example of denormalization is using a _____ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows. |
An example of denormalization is using a _____ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows. | Temporary |
Temporary | Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B. |
Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B. | Determines |
Determines | BCNF can be violated only if the table contains more than one _____ key. |
BCNF can be violated only if the table contains more than one _____ key. | Candidate |
Candidate | Data warehouse routinely uses _____ structures in its complex, multilevel, multisource data environment. |
Data warehouse routinely uses _____ structures in its complex, multilevel, multisource data environment. | 2NF |
2NF | Dependencies based on only a part of a composite primary key are known as _____ dependencies. |
Dependencies based on only a part of a composite primary key are known as _____ dependencies. | Partial |
Partial | From a structural point of view, 2NF is better than _____. |
From a structural point of view, 2NF is better than _____. | 1NF |
1NF | From a structural point of view, 3NF is better than _____. |
From a structural point of view, 3NF is better than _____. | 2NF |
2NF | From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices. |
From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices. | Derived |
Derived | Granularity refers to _____. |
Granularity refers to _____. | The level of detail represented by the values in a table’s row |
The level of detail represented by the values in a table’s row | If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute. |
If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute. | Partial dependencies |
Partial dependencies | Improving _____ leads to more flexible queries. |
Improving _____ leads to more flexible queries. | Atomicity |
Atomicity | In a _____ situation, one key determines multiple values of two other attributes and those attributes are independent of each other. |
In a _____ situation, one key determines multiple values of two other attributes and those attributes are independent of each other. | Multivalued dependency |
Multivalued dependency | In a real-world environment, we must strike a balance between design integrity and _____. |
In a real-world environment, we must strike a balance between design integrity and _____. | Flexibility |
Flexibility | In a(n) _____ diagram, the arrows above the attributes indicate all desirable dependencies. |
In a(n) _____ diagram, the arrows above the attributes indicate all desirable dependencies. | Dependency |
Dependency | Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process. |
Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process. | Three |
Three | Of the following normal forms, _____ is mostly of theoretical interest. |
Of the following normal forms, _____ is mostly of theoretical interest. | DKNF |
DKNF | Some very specialized applications may require normalization beyond the _____. |
Some very specialized applications may require normalization beyond the _____. | 4NF |
4NF | The most likely data type for a surrogate key is _____. |
The most likely data type for a surrogate key is _____. | Numeric |
Numeric | To generate a surrogate key, Microsoft Access uses a(n) _____ data type. |
To generate a surrogate key, Microsoft Access uses a(n) _____ data type. | AutoNumber |
AutoNumber | When a table contains only one candidate key, _____ are considered to be equivalent. |
When a table contains only one candidate key, _____ are considered to be equivalent. | The 3NF and the BCNF |
The 3NF and the BCNF | _____ is a relational set operator. |
_____ is a relational set operator. | EXCEPT |
EXCEPT | _____ is a string function that returns the number of characters in a string value. |
_____ is a string function that returns the number of characters in a string value. | LENGTH |
LENGTH | A(n) _____ is a query that is embedded (or nested) inside another query. |
A(n) _____ is a query that is embedded (or nested) inside another query. | subquery |
subquery | A(n) _____ is an alternate name given to a column or table in any SQL statement. |
A(n) _____ is an alternate name given to a column or table in any SQL statement. | alias |
alias | A(n) _____ join performs a relational product (also known as the Cartesian product) of two tables. |
A(n) _____ join performs a relational product (also known as the Cartesian product) of two tables. | cross |
cross | A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. |
A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. | outer |
outer | A(n) _____ join will select only the rows with matching values in the common attribute(s). |
A(n) _____ join will select only the rows with matching values in the common attribute(s). | natural |
natural | A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. |
A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. | SELECT |
SELECT | According to the rules of precedence, which of the following computations should be completed first? |
According to the rules of precedence, which of the following computations should be completed first? | Operations within parentheses |
Operations within parentheses | How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18? |
How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18? | 144 |
144 | If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause. |
If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause. | JOIN ON |
JOIN ON | In Oracle, the _____ function converts a date to a character string. |
In Oracle, the _____ function converts a date to a character string. | TO_CHAR() |
TO_CHAR() | In subquery terminology, the first query in the SQL statement is known as the _____ query. |
In subquery terminology, the first query in the SQL statement is known as the _____ query. | outer |
outer | The _____ command defines a default value for a column when no value is given. |
The _____ command defines a default value for a column when no value is given. | DEFAULT |
DEFAULT | The _____ function returns the current system date in MS Access. |
The _____ function returns the current system date in MS Access. | DATE() |
DATE() | The _____ command restricts the selection of grouped rows based on a condition. |
The _____ command restricts the selection of grouped rows based on a condition. | HAVING |
HAVING | The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. |
The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. | DECODE |
DECODE | The special operator used to check whether a subquery returns any rows is _____. |
The special operator used to check whether a subquery returns any rows is _____. | EXISTS |
EXISTS | The special operator used to check whether an attribute value is within a range of values is _____. |
The special operator used to check whether an attribute value is within a range of values is _____. | BETWEEN |
BETWEEN | The special operator used to check whether an attribute value matches a given string pattern is _____. |
The special operator used to check whether an attribute value matches a given string pattern is _____. | LIKE |
LIKE | The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. |
The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. | COUNT |
COUNT | The SQL command that allows a user to permanently save data changes is _____. |
The SQL command that allows a user to permanently save data changes is _____. | COMMIT |
COMMIT | The SQL data manipulation command HAVING: |
The SQL data manipulation command HAVING: | restricts the selection of grouped rows based on a condition. |
restricts the selection of grouped rows based on a condition. | The syntax for a left outer join is _____. |
The syntax for a left outer join is _____. | SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition |
SELECT column-list FROM table1 LEFT [OUTER] JOIN table2 ON join-condition | What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE |
What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE | “old-style” join |
“old-style” join | When using a(n) _____ join, only rows from the tables that match on a common value are returned. |
When using a(n) _____ join, only rows from the tables that match on a common value are returned. | inner |
inner | When using the Oracle TO_DATE function, the code _____ represents a three-letter month name. |
When using the Oracle TO_DATE function, the code _____ represents a three-letter month name. | MON |
MON | Which comparison operator indicates a value is not equal? |
Which comparison operator indicates a value is not equal? | <> |
<> | Which is a feature of a correlated subquery? |
Which is a feature of a correlated subquery? | The outer subquery initiates the process of execution in a subquery. |
The outer subquery initiates the process of execution in a subquery. | Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? |
Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? | SELECT UNIQUE V_CODE FROM PRODUCT; |
SELECT UNIQUE V_CODE FROM PRODUCT; | _____ is a cursor attribute that returns TRUE if the last FETCH returned a row, and FALSE if not. |
_____ is a cursor attribute that returns TRUE if the last FETCH returned a row, and FALSE if not. | %FOUND |
%FOUND | A _____is a block of code containing standard SQL statements and procedural extensions that is stored and executed at the DBMS server. |
A _____is a block of code containing standard SQL statements and procedural extensions that is stored and executed at the DBMS server. | persistent storage module (PSM) |
persistent storage module (PSM) | A table can be deleted from the database by using the _____ TABLE command. |
A table can be deleted from the database by using the _____ TABLE command. | DROP |
DROP | A(n) _____ cursor is automatically created in procedural SQL when the SQL statement returns only one value. |
A(n) _____ cursor is automatically created in procedural SQL when the SQL statement returns only one value. | implicit |
implicit | All changes in a table structure are made using the _____ TABLE command, followed by a keyword that produces the specific changes a user wants to make. |
All changes in a table structure are made using the _____ TABLE command, followed by a keyword that produces the specific changes a user wants to make. | ALTER |
ALTER | In Oracle, _____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping. |
In Oracle, _____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping. | Procedural Language SQL |
Procedural Language SQL | In Oracle, _____ retrieves the current value of a sequence. |
In Oracle, _____ retrieves the current value of a sequence. | CURRVAL |
CURRVAL | No matter what language you use, if it contains embedded SQL statements, it is called the _____ language. |
No matter what language you use, if it contains embedded SQL statements, it is called the _____ language. | host |
host | Oracle recommends _____ for creating audit logs. |
Oracle recommends _____ for creating audit logs. | triggers |
triggers | SQL requires the use of the _____command to enter data into a table. |
SQL requires the use of the _____command to enter data into a table. | INSERT |
INSERT | The _____ command is used to restore the database to its previous condition. |
The _____ command is used to restore the database to its previous condition. | ROLLBACK |
ROLLBACK | The _____ command permanently saves all changes-such as rows added, attributes modified, and rows deleted-made to any table in the database. |
The _____ command permanently saves all changes-such as rows added, attributes modified, and rows deleted-made to any table in the database. | COMMIT |
COMMIT | The _____ constraint is used to validate data when an attribute value is entered. |
The _____ constraint is used to validate data when an attribute value is entered. | CHECK |
CHECK | The _____ pseudo-column is used to select the next value from a sequence. |
The _____ pseudo-column is used to select the next value from a sequence. | NEXTVAL |
NEXTVAL | The _____ specification creates an individual index on a respective attribute; use it to avoid having duplicated values in a column. |
The _____ specification creates an individual index on a respective attribute; use it to avoid having duplicated values in a column. | UNIQUE |
UNIQUE | The CREATE TABLE command lets you define constraints when you use the CONSTRAINT keyword, known as a(n) _____ constraint. |
The CREATE TABLE command lets you define constraints when you use the CONSTRAINT keyword, known as a(n) _____ constraint. | table |
table | The Oracle equivalent to an MS Access AutoNumber is a(n) _____. |
The Oracle equivalent to an MS Access AutoNumber is a(n) _____. | sequence |
sequence | The Oracle string concatenation function is _____. |
The Oracle string concatenation function is _____. | || |
|| | The PL/SQL block starts with the _____ section. |
The PL/SQL block starts with the _____ section. | DECLARE |
DECLARE | The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables. |
The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables. | base |
base | The _____ constraint assigns a value to an attribute when a new row is added to a table. |
The _____ constraint assigns a value to an attribute when a new row is added to a table. | DEFAULT |
DEFAULT | Using the _____command, SQL indexes can be created on the basis of any selected attribute. |
Using the _____command, SQL indexes can be created on the basis of any selected attribute. | CREATE INDEX |
CREATE INDEX | When a user issues the DELETE FROM tablename command without specifying a WHERE condition, _____. |
When a user issues the DELETE FROM tablename command without specifying a WHERE condition, _____. | all rows will be deleted |
all rows will be deleted | When writing SQL table-creating command sequences, the entire table definition is enclosed in _____. |
When writing SQL table-creating command sequences, the entire table definition is enclosed in _____. | parentheses |
parentheses | When you create a new database, the RDBMS automatically creates the data _____ tables in which to store the metadata and creates a default database administrator. |
When you create a new database, the RDBMS automatically creates the data _____ tables in which to store the metadata and creates a default database administrator. | dictionary |
dictionary | Which command would be used to delete the table row where the P_CODE is ‘BRT-345’? |
Which command would be used to delete the table row where the P_CODE is ‘BRT-345’? | DELETE FROM PRODUCT WHERE P_CODE = ‘BRT-345’; |
DELETE FROM PRODUCT WHERE P_CODE = ‘BRT-345’; | Which SQL format would be best used for a small, numeric data type? |
Which SQL format would be best used for a small, numeric data type? | SMALLINT |
SMALLINT | Which statement describes a feature of Oracle sequences? |
Which statement describes a feature of Oracle sequences? | Dropping a sequence does not delete values assigned to table attributes; it deletes only the sequence object from the database. |
Dropping a sequence does not delete values assigned to table attributes; it deletes only the sequence object from the database. | Words used by a system that cannot be used for any other purpose are called _____ words. For example, in Oracle SQL, the word INITIAL cannot be used to name tables or columns. |
Words used by a system that cannot be used for any other purpose are called _____ words. For example, in Oracle SQL, the word INITIAL cannot be used to name tables or columns. | reserved |
reserved | You cannot have an invalid entry in the foreign key column; at the same time, you cannot delete a vendor row as long as a product row references that vendor. This is known as _____. |
You cannot have an invalid entry in the foreign key column; at the same time, you cannot delete a vendor row as long as a product row references that vendor. This is known as _____. | referential integrity |
referential integrity | _____ are required to prevent another transaction form reading inconsistent data. |
_____ are required to prevent another transaction form reading inconsistent data. | Locks |
Locks | _____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. |
_____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. | Isolation |
Isolation | _____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. |
_____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. | Inconsistent retrieval |
Inconsistent retrieval | _____ requires that all operations of a transaction be completed. |
_____ requires that all operations of a transaction be completed. | Atomicity |
Atomicity | A _____ lock allows concurrent transactions to access different rows of the same table. |
A _____ lock allows concurrent transactions to access different rows of the same table. | row-level |
row-level | A _____ lock will lock the entire diskpage. |
A _____ lock will lock the entire diskpage. | page-level |
page-level | A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table. |
A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table. | table-level |
table-level | A consistent database state is one in which all _____. |
A consistent database state is one in which all _____. | data integrity constraints are satisfied |
data integrity constraints are satisfied | A diskpage, or page, is the equivalent of a _____. |
A diskpage, or page, is the equivalent of a _____. | diskblock |
diskblock | A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time. |
A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time. | serializability and isolation |
serializability and isolation | A(n) _____ condition occurs when two or more transactions wait for each other to unlock data. |
A(n) _____ condition occurs when two or more transactions wait for each other to unlock data. | deadlock |
deadlock | A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock. |
A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock. | shared |
shared | A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock. |
A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock. | shrinking |
shrinking | A(n) _____ specifically reserves access to the transaction that locked the object. |
A(n) _____ specifically reserves access to the transaction that locked the object. | exclusive lock |
exclusive lock | ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements _____ and ROLLBACK. |
ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements _____ and ROLLBACK. | COMMIT |
COMMIT | As long as two transactions, T1 and T2, access _____ data, there is no conflict, and the order of execution is irrelevant to the final outcome. |
As long as two transactions, T1 and T2, access _____ data, there is no conflict, and the order of execution is irrelevant to the final outcome. | unrelated |
unrelated | In the optimistic approach, during the _____ phase, changes are permanently applied to the database. |
In the optimistic approach, during the _____ phase, changes are permanently applied to the database. | write |
write | In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values. |
In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values. | read |
read | In the wait/die scheme, the: |
In the wait/die scheme, the: | older transaction waits for the younger one to complete and release its locks. |
older transaction waits for the younger one to complete and release its locks. | Lock _____ indicates the level of lock use. |
Lock _____ indicates the level of lock use. | granularity |
granularity | Of the following events, which is defined by ANSI as being equivalent to a COMMIT? |
Of the following events, which is defined by ANSI as being equivalent to a COMMIT? | The end of a program is successfully reached. |
The end of a program is successfully reached. | Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK? |
Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK? | All changes are aborted and returned to a previous consistent state. |
All changes are aborted and returned to a previous consistent state. | One of the three most common data integrity and consistency problems is _____. |
One of the three most common data integrity and consistency problems is _____. | lost updates |
lost updates | The _____ approach to scheduling concurrent transactions assigns a global unique stamp to each transaction. |
The _____ approach to scheduling concurrent transactions assigns a global unique stamp to each transaction. | time stamping |
time stamping | The _____ isolation level ensures that queries return consistent results. |
The _____ isolation level ensures that queries return consistent results. | repeatable read |
repeatable read | The _____ manager is responsible for assigning and policing the locks used by transactions. |
The _____ manager is responsible for assigning and policing the locks used by transactions. | lock |
lock | The implicit beginning of a transaction is when _____. |
The implicit beginning of a transaction is when _____. | the first SQL statement is encountered |
the first SQL statement is encountered | The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program’s abnormal termination, or a system failure such as a network discrepancy or a disk crash. |
The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program’s abnormal termination, or a system failure such as a network discrepancy or a disk crash. | transaction log |
transaction log | Transaction is a _____ unit of work that must be either entirely completed or aborted. |
Transaction is a _____ unit of work that must be either entirely completed or aborted. | logical |
logical | What rule applies to the two-phase locking protocol? |
What rule applies to the two-phase locking protocol? | Two transactions cannot have conflicting locks. |
Two transactions cannot have conflicting locks. | _____ is the central activity during the parsing phase in query processing. |
_____ is the central activity during the parsing phase in query processing. | Query validation |
Query validation | _____ refers to the number of different values a column could possibly have. |
_____ refers to the number of different values a column could possibly have. | Data sparsity |
Data sparsity | A DBA determines the initial size of the data files that make up the database; however, as required, the data files can automatically expand in predefined increments known as _____. |
A DBA determines the initial size of the data files that make up the database; however, as required, the data files can automatically expand in predefined increments known as _____. | extents |
extents | A system table space, a user data table space, an index table space, and a temporary table space are examples of _____. |
A system table space, a user data table space, an index table space, and a temporary table space are examples of _____. | file groups |
file groups | A(n) _____ is a logical grouping of several data files that store data with similar characteristics. |
A(n) _____ is a logical grouping of several data files that store data with similar characteristics. | table space |
table space | Automatic query optimization means that the: |
Automatic query optimization means that the: | DBMS finds the most cost-effective access path without user intervention. |
DBMS finds the most cost-effective access path without user intervention. | Bitmap indexes tend to use less space than a _____ because they use bits instead of bytes to store their data. |
Bitmap indexes tend to use less space than a _____ because they use bits instead of bytes to store their data. | B-tree index |
B-tree index | During the ____ phase, the DBMS retrieves the data and sends the result set back to the client. |
During the ____ phase, the DBMS retrieves the data and sends the result set back to the client. | fetch |
fetch | From the performance point of view, _____ databases eliminate disk access bottlenecks. |
From the performance point of view, _____ databases eliminate disk access bottlenecks. | in-memory |
in-memory | If there is no index, the DBMS will perform a _____ scan. |
If there is no index, the DBMS will perform a _____ scan. | full table |
full table | In standard SQL, the optimizer hint ALL_ROWS is generally used for _____ mode processes. |
In standard SQL, the optimizer hint ALL_ROWS is generally used for _____ mode processes. | batch |
batch | In standard SQL, the optimizer hint FIRST_ROWS is generally used for _____ mode processes. |
In standard SQL, the optimizer hint FIRST_ROWS is generally used for _____ mode processes. | interactive |
interactive | In the context of RAID levels, _____ refers to writing the same data blocks to separate drives. |
In the context of RAID levels, _____ refers to writing the same data blocks to separate drives. | mirroring |
mirroring | Knowing the sparsity of a column helps you decide whether the use of _____ is appropriate. |
Knowing the sparsity of a column helps you decide whether the use of _____ is appropriate. | an index |
On the client side, the objective is to generate an SQL query that returns a correct answer in the least amount of time, using a minimum amount of resources at the server end. The activities required to achieve this goal are commonly referred to as _____ | SQL performance |
DBMS performance | The _____ cache is used as a temporary storage area for ORDER BY or GROUP BY operations, as well as for index-creation functions. |
The _____ cache is used as a temporary storage area for ORDER BY or GROUP BY operations, as well as for index-creation functions. | sort |
sort | The _____ is a shared, reserved memory area that stores the most recently executed SQL statements or PL/SQL procedures, including triggers and functions. |
The _____ is a shared, reserved memory area that stores the most recently executed SQL statements or PL/SQL procedures, including triggers and functions. | procedure cache |
procedure cache | The _____ must be set large enough to permit as many data requests to be serviced from cache as possible. |
The _____ must be set large enough to permit as many data requests to be serviced from cache as possible. | data cache |
data cache | The _____ process analyzes SQL queries and finds the most efficient way to access data. |
The _____ process analyzes SQL queries and finds the most efficient way to access data. | optimizer |
optimizer | The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files. |
The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files. | after; before |
after; before | The data cache or _____ is a shared, reserved memory area that stores the most recently accessed data blocks in RAM. |
The data cache or _____ is a shared, reserved memory area that stores the most recently accessed data blocks in RAM. | buffer cache |
buffer cache | The DBMS _____ the SQL query and chooses the most efficient access/execution plan. |
The DBMS _____ the SQL query and chooses the most efficient access/execution plan. | parses |
parses | The majority of primary memory resources will be allocated to the _____ cache. |
The majority of primary memory resources will be allocated to the _____ cache. | data |
data | To generate database object statistics manually, following syntax should be used in Oracle: |
To generate database object statistics manually, following syntax should be used in Oracle: | ANALYZE <TABLE/INDEX>object_name COMPUTE STATISTICS; |
ANALYZE <TABLE/INDEX>object_name COMPUTE STATISTICS; | To work with data, a DBMS must retrieve the data from _____ and place them in _____. |
To work with data, a DBMS must retrieve the data from _____ and place them in _____. | permanent storage; RAM |
permanent storage; RAM | When moving data from permanent storage to RAM, an I/O disk operation retrieves a(n): |
When moving data from permanent storage to RAM, an I/O disk operation retrieves a(n): | entire physical disk block. |
entire physical disk block. | When setting optimizer hints, _____ instructs the optimizer to minimize the overall execution time, that is, to minimize the time it takes to return the total number of rows in the query result set. This hint is generally used for batch mode processes. |
When setting optimizer hints, _____ instructs the optimizer to minimize the overall execution time, that is, to minimize the time it takes to return the total number of rows in the query result set. This hint is generally used for batch mode processes. | ALL_ROWS |
ALL_ROWS | Which of the following is the first step of query processing at the DBMS server end? |
Which of the following is the first step of query processing at the DBMS server end? | Parsing |
Parsing | _____ distributed database management systems (DDBMS) integrate multiple instances of the same DBMS over a network. |
_____ distributed database management systems (DDBMS) integrate multiple instances of the same DBMS over a network. | Homogeneous |
Homogeneous | _____ fragmentation allows a user to break a single object into two or more segments, or fragments. |
_____ fragmentation allows a user to break a single object into two or more segments, or fragments. | Data |
Data | _____ fragmentation refers to the division of a relation into attribute subsets. |
_____ fragmentation refers to the division of a relation into attribute subsets. | Vertical |
Vertical | _____ fragmentation refers to the division of a relation into subsets of tuples. |
_____ fragmentation refers to the division of a relation into subsets of tuples. | Horizontal |
Horizontal | _____ is the delay imposed by the amount of time required for a data packet to make a round trip from point A to point B. |
_____ is the delay imposed by the amount of time required for a data packet to make a round trip from point A to point B. | Network latency |
Network latency | _____ transparency allows a physically dispersed database to be managed as though it were centralized. |
_____ transparency allows a physically dispersed database to be managed as though it were centralized. | Distribution |
Distribution | _____ transparency allows data to be updated simultaneously at several network sites. |
_____ transparency allows data to be updated simultaneously at several network sites. | Transaction |
Transaction | _____ transparency allows the system to operate as if it were a centralized database management system. |
_____ transparency allows the system to operate as if it were a centralized database management system. | Performance |
Performance | _____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify where these fragments are located. |
_____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify where these fragments are located. | Location |
Location | _____ transparency is the highest level of transparency. The end user or programmer does not need to know that a database is partitioned. |
_____ transparency is the highest level of transparency. The end user or programmer does not need to know that a database is partitioned. | Fragmentation |
Fragmentation | A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems. |
A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems. | fully heterogeneous |
fully heterogeneous | A _____ lets a single SQL statement access the data that are to be processed by a single remote database processor. |
A _____ lets a single SQL statement access the data that are to be processed by a single remote database processor. | remote request |
remote request | A _____ request lets a single SQL statement reference data located at several different local or remote DP sites. |
A _____ request lets a single SQL statement reference data located at several different local or remote DP sites. | distributed |
distributed | A centralized database management is subject to a problem such as _____. |
A centralized database management is subject to a problem such as _____. | growing numbers of remote locations |
growing numbers of remote locations | A database management system needs _____ to prepare the data for presentation to the end user or to an application program. |
A database management system needs _____ to prepare the data for presentation to the end user or to an application program. | formatting |
formatting | A DDBMS is subject to which restriction? |
A DDBMS is subject to which restriction? | Remote data access is provided on a read-only basis. |
Remote data access is provided on a read-only basis. | A disadvantage of a distributed database management system (DDBMS) is: |
A disadvantage of a distributed database management system (DDBMS) is: | lack of standards. |
lack of standards. | A distributed _____ can reference several different local or remote data processing sites. |
A distributed _____ can reference several different local or remote data processing sites. | Data location |
Data location | A distributed _____ contains the description of the entire database as seen by the database administrator. |
A distributed _____ contains the description of the entire database as seen by the database administrator. | data dictionary |
data dictionary | A distributed database is composed of several parts known as database _____. |
A distributed database is composed of several parts known as database _____. | fragments |
fragments | A(n) _____ database stores each database fragment at a single site. |
A(n) _____ database stores each database fragment at a single site. | unreplicated |
unreplicated | Distributed processing does not require: |
Distributed processing does not require: | an existing distributed database. |
an existing distributed database. | During _____ data allocation, the database is divided into two or more disjointed parts (fragments) and stored at two or more sites. |
During _____ data allocation, the database is divided into two or more disjointed parts (fragments) and stored at two or more sites. | partitioned |
partitioned | In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote access from other independent database management systems in the network. |
In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote access from other independent database management systems in the network. | data processor |
data processor | The _____ guarantees that if a portion of a transaction operation cannot be committed, all changes made at the other sites participating in the transaction will be undone to maintain a consistent database state. |
The _____ guarantees that if a portion of a transaction operation cannot be committed, all changes made at the other sites participating in the transaction will be undone to maintain a consistent database state. | two-phase commit protocol (2PC) |
two-phase commit protocol (2PC) | The _____ processor is the software component found in each computer that requests data. It receives and processes the application’s data requests. |
The _____ processor is the software component found in each computer that requests data. It receives and processes the application’s data requests. | transaction |
transaction | The _____ rule requires that all copies of data fragments be identical. |
The _____ rule requires that all copies of data fragments be identical. | mutual consistency |
mutual consistency | The objective of _____ optimization is to minimize the total cost associated with the execution of a request. |
The objective of _____ optimization is to minimize the total cost associated with the execution of a request. | query |
query | Which property of the CAP theorem assumes that all transaction operations take place at the same time in all nodes, as if they were executing in a single-node database? |
Which property of the CAP theorem assumes that all transaction operations take place at the same time in all nodes, as if they were executing in a single-node database? | Consistency |