Академический Документы
Профессиональный Документы
Культура Документы
groups Question 2
A(n) ____ frees programmers who write database access programs from having to engage in mundane data manipulation activities, such as adding new data and deleting existing data. Answer Selected Answer:
DBM S
Correct Answer:
DBM S
Question 3
A(n) ____ is a person, place, object, event, or idea for which you want to store and process data. Answer Selected Answer:
entit y
Correct Answer:
entit
y Question 4
A visual way to represent a database is with a(n) ____. Answer Selected Answer:
entity-relationship diagram
Correct Answer:
entity-relationship diagram
Question 5
During the ____ process, a database expert determines the structure of the required database. Answer Selected Answer:
database design
Correct Answer:
database design
Question 6
a larger file
Question 7
The ____ of an entity become the columns in the database table. Answer Selected Answer:
attribut es
Correct Answer:
attribut es
Question 8
relations hip
Correct Answer:
relations hip
Question 9
Popular ____ include Access, Oracle, DB2, MySQL, and SQL Server. Answer
Selected Answer:
DBM Ss
Correct Answer:
DBM Ss
Question 10
Storing the same data in more than one place is called ____. Answer Selected Answer:
redundan cy
Correct Answer:
redundan cy
Question 1
Two tables are considered to be ____ compatible if they have the same number of columns and their corresponding columns represent the same type of data. Answer Selected Answer:
unio n
Correct Answer:
unio
n Question 2
The product of two tables is also called the ____ product. Answer Selected Answer:
Cartesi an
Correct Answer:
Cartesi an
Question 3
Using the product operator, if table A has 4 rows and table B has 4 rows, the number of rows in the product of these two tables is ____. Answer Selected Answer:
1 6
Correct Answer:
1 6
Question 4
tupl es
Correct Answer:
tupl es
Question 5
You can restrict the output from a join to include only certain columns by using the ____ command. Answer Selected Answer:
PROJE CT
Correct Answer:
PROJE CT
Question 6
A query that changes data is a(n) ____ query. Answer Selected Answer: Correct Answer: upda te
upda te
Question 7
When duplicate column names exist in a database and you need to indicate the column to which you are referring, ____. Answer
Selected Answer:
write both the table name and the column name, separated by a period
Correct Answer:
write both the table name and the column name, separated by a period
Question 8
The ____ key of a table is the column or collection of columns that uniquely identifies a given row in that table. Answer Selected Answer:
prima ry
Correct Answer:
prima ry
Question 9
The compound criteria (conditions) are created by using ____. Answer Selected Answer:
AND or OR
Correct Answer:
AND or OR
Question 10
Count, Sum, Avg, Max, and Min are a few of the built-in statistics or ____ functions that can be used in a query. Answer Selected Answer:
aggreg ate
Correct Answer:
aggreg ate
Storing the same data in more than one place is called ____. Answer Selected Answer:
redundan cy
Correct Answer:
redundan cy
Question 2
Popular ____ include Access, Oracle, DB2, MySQL, and SQL Server. Answer Selected Answer:
DBM Ss
Correct Answer:
DBM Ss
Question 3
A(n) ____ frees programmers who write database access programs from having to engage in mundane data manipulation activities, such as adding new data and deleting existing data. Answer Selected Answer:
DBM S
Correct Answer:
DBM S
Question 4
A(n) ____ is the computer counterpart to an ordinary paper file you might keep in a file cabinet or an accounting ledger. Answer Selected Answer:
data file
Correct Answer:
data file
Question 5
A good ____ should provide an opportunity for users to incorporate integrity constraints when they design the database. Answer Selected Answer:
DBM S
Question 6
A database has ____ if the data in it satisfies all established integrity constraints. Answer Selected Answer:
integri ty
Correct Answer:
integri ty
Question 7
In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having its own collection of files.
Correct Answer:
In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having its own collection of files.
Question 8
relations hip
Correct Answer:
relations hip
Question 9
____ are screen objects used to maintain, view, and print data from a database. Answer Selected Answer:
For ms
Correct Answer:
For ms
Question 10
During the ____ process, a database expert determines the structure of the required database. Answer Selected Answer:
database design
Correct Answer:
database design
OK Question 1
Two tables are considered to be ____ compatible if they have the same number of columns and their corresponding columns represent the same type of data. Answer Selected Answer:
unio n
Correct Answer:
unio n
Question 2
If you are sorting records by more than one field, the more important field is called the ____. Answer Selected Answer:
Correct Answer:
Question 3
Based on the Customer table below, which command lists all information from the table concerning customer 524? CustomerNum CustomerName Street City State Zip 462 Bargains Galore 3829 Central Grove FL 33321
Correct Answer:
Question 4
You can restrict the output from a join to include only certain columns by using the ____ command. Answer Selected Answer:
PROJE CT
Correct Answer:
PROJE CT
Question 5
The product of two tables is also called the ____ product. Answer Selected Answer:
Cartesi an
Correct Answer:
Cartesi an
Question 6
The ____ command within relational algebra takes a vertical subset of a table. Answer Selected Answer: Correct Answer: SELEC T
PROJE CT
Question 7
The ____ key of a table is the column or collection of columns that uniquely identifies a given row in that table. Answer Selected Answer:
prima ry
Correct Answer:
prima ry
Question 8
The ____ operator is performed by the SUBTRACT command in relational algebra. Answer Selected Answer:
differen ce
Correct
Answer:
differen ce
Question 9
A ____ query creates a new table using the query results. Answer Selected Answer:
maketable
Correct Answer:
maketable
Question 10
The ____ operator is used to concatenate every row in the first table with every row in the second table. Answer Selected Answer: Correct Answer: union
produ ct
When you use a name containing a space in Access SQL, you must ____. Answer
Selected Answer:
Correct Answer:
Question 2
Correct Answer:
Question 3
Customer ( CustomerNum, CustomerName, Street, City, State, Zip, Balance, CreditLimit, RepNum ) Based on the code above, list the number, name, and balance of all customers with balances greater than or equal to $1,000 and less than or equal to $5,000. Answer Selected Answer: Correct Answer: SELECT CustomerName, Balance FROM Customer WHERE Balance BETWEEN 1000 AND 5000 ;
SELECT CustomerNum, CustomerName, Balance FROM Customer WHERE Balance BETWEEN 1000 AND 5000 ;
Question 4
Customer ( CustomerNum, CustomerName, Street, City, State, Zip, Balance, CreditLimit, RepNum ) Based on the code above, list the number, name, street, and credit limit of all customers. Order the customers by name within descending credit limit. Answer Selected Answer:
SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit DESC, CustomerName ;
Correct Answer:
SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit DESC, CustomerName ;
Question 5
The basic form of an SQL retrieval command is ____. Answer Selected Answer:
SELECT-FROMWHERE
Correct Answer:
SELECT-FROMWHERE
Question 6
You can save the results of a query as a table by including the ____ clause in the query. Answer
UPDA TE
INTO
Question 7
Student (StudentID, FirstName, LastName, Street, City, State, Zip) Based on the code above, list the complete student table. Answer Selected Answer:
Correct Answer:
Question 8
Customer ( CustomerNum, CustomerName, Street, City, State, Zip, Balance, CreditLimit, RepNum ) Based on the code above, list the number, name, and available credit for all customers with credit limits that exceed their balances. Answer Selected Answer:
Correct Answer:
Question 9
When used after the word SELECT, the ____ symbol indicates that you want to include all fields in the query results in the order in which you described them to the DBMS when you created the table. Answer Selected Answer: Correct Answer:
Question 10
In MySQL, the ____ is used as a wildcard to represent any collection of characters. Answer Selected Answer:
Correct Answer:
When used after the word SELECT, the ____ symbol indicates that you want to include all fields in the query results in the order in which you described them to the DBMS when you created the table. Answer
Question 2
Part (PartNum, Description, OnHand, Class, Warehouse, Price ) Based on the code above, list the descriptions of all parts that are not in Warehouse 3. Answer Selected Answer:
Correct Answer:
Question 3
Many versions of SQL require you to end a command with a ____. Answer Selected Answer:
semicolon (;)
Correct Answer:
semicolon (;)
Question 4
Customer ( CustomerNum, CustomerName, Street, City, State, Zip, Balance, CreditLimit, RepNum ) Based on the code above, list the number, name, and complete address of every customer located on a street that contains the letters Oxford. Answer Selected Answer:
SELECT CustomerNum, CustomerName, Street, City, State, Zip FROM Customer WHERE Street LIKE %Oxford% ;
Correct Answer:
SELECT CustomerNum, CustomerName, Street, City, State, Zip FROM Customer WHERE Street LIKE %Oxford% ;
Question 5
Part (PartNum, Description, OnHand, Class, Warehouse, Price ) Based on the code above, find how many parts are in item class HW. Answer Selected Answer:
Correct Answer:
Question 6
You can save the results of a query as a table by including the ____ clause in the query. Answer Selected Answer:
INT
O Correct Answer:
INT O
Question 7
To add new data to a table, use the ____ command. Answer Selected Answer:
INSE RT
Correct Answer:
INSE RT
Question 8
Customer ( CustomerNum, CustomerName, Street, City, State, Zip, Balance, CreditLimit, RepNum ) Based on the code above, list the number, name, street, and credit limit of all customers. Order the customers by name within descending credit limit. Answer Selected Answer:
SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit DESC, CustomerName ;
Correct Answer:
SELECT CustomerNum, CustomerName, Street, CreditLimit FROM Customer ORDER BY CreditLimit DESC, CustomerName ;
Question 9
To use a wildcard, include the ____ operator in the WHERE clause. Answer Selected Answer:
LIK E
Correct Answer:
LIK E
Question 10
Student (StudentID, FirstName, LastName, Street, City, State, Zip) Based on the code above, find the name of the student whose ID is 1167. Answer Selected Answer:
Correct Answer:
The statement, ____, removes the table LargeCust from a DBMS. Answer Selected Answer: Correct Answer: DELETE TABLE LargeCust ;
Question 2
The CHECK clause can be included in the ____ command. Answer Selected Answer:
CREATE TABLE
Correct Answer:
CREATE TABLE
Question 3
In SQL, you use the CHECK clause to enforce ____ integrity. Answer Selected Answer:
legalvalues
Correct Answer:
legalvalues
Question 4
A(n) ____ is an action that occurs automatically in response to an associated database operation such as an INSERT, UPDATE, or DELETE command. Answer Selected Answer:
trigg er
Correct Answer:
trigg er
Question 5
To create the primary key clause for the Orders table on the OrderNum and PartNum fields, the correct statement is ____. Answer Selected Answer: Correct Answer: PRIMARY KEY (Orders, OrderNum, PartNum)
Question 6
To create an index for the Customer table named RepBal with the keys RepNum and Balance and with the balances listed in descending order, the command is ____. Answer Selected Answer:
Correct Answer:
Question 7
The ____ statement will take away user privileges to the database. Answer
Selected Answer:
REVO KE
Correct Answer:
REVO KE
Question 8
To use a stored procedure in MySQL, a user enters the word _____ followed by the procedure name. Answer Selected Answer:
CAL L
Correct Answer:
CAL L
Question 9
Essentially, setting the value in a given field to ____ is similar to not entering a value in it at all. Answer Selected Answer:
nu ll
Correct Answer:
nu ll
Question 10
serv er
Correct Answer:
serv er
Friday, September 23, 2011 5:29:48 AM EDT OK 2.5 out of 2.5 points
To create an index for the Customer table named RepBal with the keys RepNum and Balance and with the balances listed in descending order, the command is ____. Answer Selected Answer:
Correct Answer:
Question 2
The statement, ____, removes the table LargeCust from a DBMS. Answer Selected Answer:
Correct Answer:
Question 3
If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file called a(n) ____. Answer Selected Answer:
stored procedure
Correct Answer:
stored procedure
Question 4
In Access, many macro actions require additional information, called _____ to complete the action. Answer Selected Answer:
argume nts
Correct Answer:
argume nts
Question 5
In SQL, you use the CHECK clause to enforce ____ integrity. Answer Selected Answer:
legalvalues
Correct Answer:
legalvalues
Question 6
To use a stored procedure in MySQL, a user enters the word _____ followed by the procedure name. Answer Selected Answer:
CAL L
Correct Answer:
CAL L
Question 7
The CHECK clause can be included in the ____ command. Answer Selected Answer:
CREATE TABLE
Correct Answer:
CREATE TABLE
Question 8
The SQL command for deleting the Warehouse field from the Part table is ____. Answer
Selected Answer:
Correct Answer:
Question 9
In MySQL, you use the _____ command to produce a list of tables. Answer Selected Answer:
SHOW TABLES
Correct Answer:
SHOW TABLES
Question 10
To insert a new field in a table, the ____ keyword should be used with the ALTER TABLE command. Answer Selected Answer:
AD D
Correct Answer:
AD D
Friday, September 23, 2011 6:02:12 AM EDT OK 2.5 out of 2.5 points
From all the ____ keys, one is chosen to be the primary key. Answer Selected Answer:
candida te
Correct Answer:
candida te
Question 2
Second normal form can be defined as a table that is in first normal form but that contains no ____. Answer Selected Answer: Correct Answer: nonkey columns
partial dependencies
Question 3
A table is in first normal form if it does not contain ____. Answer Selected Answer:
repeating groups
Correct Answer:
repeating groups
Question 4
Correct Answer:
Question 5
A(n) ____ is a column or collection of columns on which all columns in the table are functionally dependent. Answer Selected Answer:
candidate key
Correct Answer:
candidate key
Question 6
Potential problems in the design of a relational database are known as ____. Answer Selected Answer:
update anomalies
Correct Answer:
update anomalies
Question 7
If there is more than one possible choice for the primary key, and one of the possibilities is chosen to be the primary key, the other choices are referred to as ____. Answer Selected Answer:
alternate keys
Correct Answer:
alternate keys
Question 8
The fact that column B is functionally dependent on column A can be written as ____. Answer Selected Answer:
A B
Correct Answer:
A B
Question 9
If B (an attribute) is functionally dependent on A, we can also say that ____. Answer Selected Answer:
A functionally
A functionally determines B
Question 10
Correct Answer:
Question 1
A table is in fourth normal form when it is in third normal form and there are no ____. Answer Selected Answer:
multivalued dependencies
Correct Answer:
multivalued dependencies
Question 2
If there is more than one possible choice for the primary key, and one of the possibilities is chosen to be the primary key, the other choices are referred to as ____. Answer Selected Answer:
alternate keys
Correct Answer:
alternate keys
Question 3
nonkey attribute
Correct Answer:
nonkey attribute
Question 4
From all the ____ keys, one is chosen to be the primary key. Answer
Selected Answer:
candida te
Correct Answer:
candida te
Question 5
Correct Answer:
Question 6
Potential problems in the design of a relational database are known as ____. Answer Selected Answer:
update anomalies
Correct Answer:
update anomalies
Question 7
If B (an attribute) is functionally dependent on A, we can also say that ____. Answer Selected Answer:
A functionally determines B
Correct Answer:
A functionally determines B
Question 8
____ normal form has an additional condition that the only determinants the table contains are candidate keys. Answer Selected Answer:
Thir d
Correct Answer:
Thir d
Question 9
A table that contains a repeating group is called a(n) ____. Answer Selected Answer:
unnormalized relation
Correct Answer:
unnormalized relation
Question 10
A(n) ____ is a column or collection of columns on which all columns in the table are functionally dependent. Answer Selected Answer:
candidate key
Correct Answer:
candidate key
When designing a database, you might find it helpful to design a(n) ____ to obtain the required information from users. Answer Selected Answer: Correct Answer: E-R diagram
survey form
Question 2
square corners
Correct
Answer:
square corners
Question 3
In IDEF1X, the ____ is the symbol for category. Answer Selected Answer: Correct Answer: rectan gle
circle
Question 4
A subtype is also called a(n) ____ in IDEF1X terminology. Answer Selected Answer:
catego ry
Correct Answer:
catego ry
Question 5
A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a persons Social Security number. Answer Selected Answer:
natural key
Correct Answer:
natural key
Question 6
When a DBMS creates a(n) ____ key, it is usually an automatic numbering data type, such as the Access AutoNumber data type. Answer Selected Answer:
surroga te
Correct Answer:
surroga te
Question 7
The properties of the entities you choose as you design the user view will become the ____ in the appropriate tables. Answer Selected Answer:
colum ns
Correct Answer:
colum ns
Question 8
The crucial issue in making the determination between a single many-tomany-to-many relationship and two (or three) many-to-many relationships is the ____. Answer Selected Answer: Correct Answer: data dependence
independenc e
Question 9
On an E-R diagram, the number closest to the rectangle represents ____ cardinality. Answer Selected Answer:
maximu m
Correct Answer:
maximu m
Question 10
A(n) ____ is a system-generated primary key that is usually hidden from users. Answer Selected Answer: Correct Answer: artificial key
surrogate key
Friday, October 21, 2011 12:35:01 AM EDT OK In IDEF1X, the ____ is the symbol for category. Answer Selected Answer:
circl e
Correct Answer:
circl e Question 2
____ means that an entity has a minimum cardinality of one. Answer Selected Answer:
Correct Answer:
Question 3
The properties of the entities you choose as you design the user view will become the ____ in the appropriate tables. Answer Selected Answer:
colum ns
Correct Answer:
colum ns
Question 4
On an E-R diagram, the number closest to the relationship represents ____ cardinality. Answer Selected Answer: Correct Answer: maximu m
minimu m
Question 5
A set of requirements that is necessary to support the operations of a particular database user is known as a(n) ____. Answer Selected Answer:
user view
Correct Answer:
user view
Question 6
A(n) ____ is a system-generated primary key that is usually hidden from users. Answer Selected Answer: Correct Answer: artificial key
surrogate key
Question 7
After the information-level design is completed, the ____ is the next step. Answer Selected Answer:
physical-level design
Correct Answer:
physical-level design
Question 8
An entity that exists to implement a many-to-many relationship is called a(n) ____. Answer Selected Answer:
composite entity
Correct Answer:
composite entity
Question 9
If each employee works in a single department and each department has only one employee, the relationship between employees and departments is ____. Answer Selected Answer:
one-toone
Correct Answer:
one-toone
Question 10
square corners
Correct Answer:
square corners
____ integrity implies that the value entered for any field should be consistent with the data type for that field. Answer Selected Answer: Correct Format
Answer:
Data type
Question 2
____ contain information about table relationships, views, indexes, users, privileges, and replicated data. Answer Selected Answer:
Catalo gs
Correct Answer:
Catalo gs
Question 3
The technique for identifying the person who is attempting to access the DBMS is known as ____. Answer Selected Answer:
authenticat ion
Correct Answer:
authenticat ion
Question 4
A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a database ____. Answer
Selected Answer:
passwo rd
Correct Answer:
passwo rd
Question 5
Data about the data in a database is known as ____. Answer Selected Answer:
metada ta
Correct Answer:
metada ta
Question 6
____ denies access by other users to data while the DBMS processes one user's updates to the database. Answer Selected Answer:
Locki ng
Correct Answer:
Locki ng
Question 7
The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates. Answer Selected Answer:
backward recovery
Correct Answer:
backward recovery
Question 8
After a DBMS detects a deadlock, the ____ should break the deadlock. Answer Selected Answer:
DBM S
Correct Answer:
DBM S
Question 9
To break a deadlock, the DBMS chooses one deadlocked user to be the ____. Answer Selected Answer:
victi m
Correct Answer:
victi m
Question 10
A(n) ____ is a snapshot of certain data in a database at a given moment in time. Answer Selected Answer:
vie w
Correct Answer:
vie w
Question 1
To break a deadlock, the DBMS chooses one deadlocked user to be the ____. Answer Selected Answer:
victi m
Correct Answer:
victi m
Question 2
Data about the data in a database is known as ____. Answer Selected Answer:
metada ta
Correct Answer:
metada ta
Question 3
Decrypti ng
Correct Answer:
Decrypti ng
Question 4
The DBA usually creates groups of users called ____. Answer Selected Answer:
workgrou ps
Correct Answer:
workgrou ps
Question 5
A(n) ____ is a snapshot of certain data in a database at a given moment in time. Answer Selected Answer:
vie w
Correct Answer:
vie w
Question 6
If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ____. Answer Selected Answer:
deadlo ck
Correct Answer:
deadlo ck
Question 7
____ integrity implies that the value entered for any field should be consistent with the data type for that field. Answer Selected Answer:
Data type
Correct Answer:
Data
type Question 8
In order to accomplish serial processing of updates, many DBMSs use ____. Answer Selected Answer:
locki ng
Correct Answer:
locki ng
Question 9
The technique for identifying the person who is attempting to access the DBMS is known as ____. Answer Selected Answer:
authenticat ion
Correct Answer:
authenticat ion
Question 10
After a DBMS detects a deadlock, the ____ should break the deadlock. Answer Selected Answer:
DBM S
Correct Answer:
DBM S
After the database designers complete the information-level design, the DBA does the ____-level design. Answer Selected Answer:
physic al
Correct Answer:
physic al
Question 2
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content, such as information about programs and the various data items these programs access? Answer Selected Answer:
Data dictionary
Correct Answer:
Data dictionary
Question 3
____ integrity is the constraint that says that the values in foreign keys must match values already in the database. Answer Selected Answer:
Referent ial
Correct Answer:
Referent ial
Question 4
After the DBMS is purchased, the ____ has primary responsibility for installation and maintenance. Answer Selected Answer:
DB A
Correct Answer:
DB A
Question 5
Which of the following DBMS evaluation categories does the following question relate to: Does the vendor of the DBMS supply printed or online training manuals and how good are the manuals? Answer Selected Answer:
Correct Answer:
Which of the following DBMS evaluation categories does the following question relate to: How many files can you open at the same time? Answer Selected Answer:
Limitatio ns
Correct Answer:
Limitatio ns
Question 7
Tables with indexes allow faster searches, but slower performance on ____. Answer Selected Answer:
updat es
Correct Answer:
updat es
Question 8
The ____ is responsible for providing training in the use of the DBMS. Answer Selected Answer:
DB
A Correct Answer:
DB A
Question 9
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas? Answer Selected Answer:
Correct Answer:
Question 10
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so. Answer Selected Answer:
DB A
Correct Answer:
DB A
The ____ determines the access privileges for all users and enters the appropriate authorization rules in the DBMS catalog to ensure that users access the database only in ways in which they are entitled to do so. Answer Selected Answer:
DB A
Correct Answer:
DB A
Question 2
Which of the following DBMS evaluation categories does the following question relate to: Is it a simple catalog or can it contain more content, such as information about programs and the various data items these programs access? Answer Selected Answer:
Data dictionary
Correct Answer:
Data dictionary
Question 3
____ converts a table that is in third normal form to a table no longer in third normal form. Answer Selected Answer:
Denormalizat
Denormalizat ion
Question 4
Which of the following DBMS evaluation categories does the following question relate to: Does the DBMS allow partial copies and how does the DBMS handle updates to the same data from two or more replicas? Answer Selected Answer:
Correct Answer:
Question 5
Changing the database design to improve the performance is called ____ the design. Answer Selected Answer:
tunin g
Correct Answer:
tunin g
Question 6
A ____ is a place where a record of certain corporate data is kept. Answer Selected Answer:
data archive
Correct Answer:
data archive
Question 7
Which of the following DBMS evaluation categories does the following question relate to: On what operating system and hardware is the DBMS supported? Answer Selected Answer:
Limitatio ns
Correct Answer:
Limitatio ns
Question 8
The ____ is responsible for providing training in the use of the DBMS. Answer Selected Answer:
DB A
Correct Answer:
DB A
Question 9
Tables with indexes allow faster searches, but slower performance on ____. Answer Selected Answer:
updat es
Correct Answer:
updat es
Question 10
Which of the following DBMS evaluation categories does the following question relate to: What types of files can you import or export? Answer Selected Answer:
Portabili ty
Correct Answer:
Portabili ty
With respect to the definition of data warehouse, ____ means that data in a data warehouse represents snapshots of data at various points in time in the past. Answer Selected Answer:
time-
timevariant
Question 2
When a centralized database becomes unavailable for any reason, no users can continue processing. In contrast, if a local database in a distributed database becomes unavailable, only users who need that data are affected. Because of this, distributed databases have a(n) ____ advantage over a centralized database. Answer Selected Answer:
system availability
Correct Answer:
system availability
Question 3
____ refers to the association of an operation to actual program code. Answer Selected Answer:
Bindi ng
Correct Answer:
Bindi ng
Question 4
In ____ systems, data and actions are encapsulated. Answer Selected Answer: Correct Answer: relational
objectoriented
Question 5
_____ is a standard interface that provides the capability necessary for Web browsers to communicate with server-side extensions. Answer Selected Answer:
Correct Answer:
Question 6
____ is the data communication method used by Web clients and Web servers to exchange data on the Internet. Answer Selected Answer:
HTT P
Correct Answer:
HTT P
Question 7
When users interact with an RDBMS, they use transactions. These types of systems are called ____ systems. Answer Selected Answer:
OLT P
Correct Answer:
OLT P
Question 8
With respect to the definition of data warehouse, ____ means that the data is read-only. Answer Selected Answer:
nonvolat ile
Correct Answer:
nonvolat ile
Question 9
____ is a metalanguage derived from a restricted subset of SGML, and designed for the exchange of data on the Web. Answer Selected Answer: Correct HTT P
Answer:
XML
Question 10
Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____. Answer Selected Answer: Correct Answer: three-tier architecture
two-tier architecture
Saturday, November 26, 2011 3:17:00 AM EST OK 2.5 out of 2.5 points
A(n) ____ consists of rows that contain consolidated and summarized data. Answer Selected Answer:
fact table
Correct Answer:
fact table
Question 2
____ is the ability of a computer system to continue to function well as utilization of the system increases. Answer
Selected Answer:
Scalabil ity
Correct Answer:
Scalabil ity
Question 3
Uncovering new knowledge, patterns, trends, and rules from the data stored in a data warehouse is known as ____. Answer Selected Answer:
data mining
Correct Answer:
data mining
Question 4
The formula for message transmission time is: communication time = access delay + (data volume / X), where X represents ____. Answer Selected Answer:
transmission rate
Correct Answer:
transmission rate
Question 5
_____ is a standard interface that provides the capability necessary for Web browsers to communicate with server-side extensions. Answer Selected Answer: Correct Answer: Web Server Interface
Question 6
When a centralized database becomes unavailable for any reason, no users can continue processing. In contrast, if a local database in a distributed database becomes unavailable, only users who need that data are affected. Because of this, distributed databases have a(n) ____ advantage over a centralized database. Answer Selected Answer:
system availability
Correct Answer:
system availability
Question 7
With respect to the definition of data warehouse, ____ means that data is stored in one place, even though it originates from everywhere in the organization and from a variety of external sources. Answer Selected Answer:
integrat ed
Correct Answer:
integrat ed
Question 8
When the data is organized by entity rather than by the application that uses the data, it is called ____. Answer Selected Answer:
subjectoriented
Correct Answer:
subjectoriented
Question 9
____ implies that the performance of functions such as adding sites, changing versions of DBMSs, creating backups, and modifying hardware should not require planned shutdowns of the entire distributed database. Answer Selected Answer:
Continuous operation
Correct Answer:
Continuous operation
Question 10
A DDBMS that has at least two sites at which the local DBMSs are different is known as a ____. Answer Selected Answer:
heterogeneous DDBMS
Correct Answer:
heterogeneous DDBMS