Database Systems Design, Implementation, & Management 13th Edition Test Bank

Page 1

Database Systems Design, Implementation, & Management 13th Edition Test Bank

richard@qwconsultancy.com

1|Pa ge


Chapter 01: Database Systems True / False 1. Data and information are essentially the same thing. a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 2. Data processing can be as simple as organizing data to reveal patterns. a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 3. Data is the result of processing raw facts to reveal its meaning. a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 4. When data are entered into a form and saved, they are placed in the underlying database as knowledge. a. True b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 5. Data constitute the building blocks of information. a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 6. Metadata describe the data characteristics and the set of relationships that links the data found within the database. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 01: Database Systems ANSWER: True DIFFICULTY: Easy REFERENCES: 1-3 Introducing the Database LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 7. The only way to access the data in a database is through the DBMS. a. True b. False ANSWER: True DIFFICULTY: Moderate REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 8. Database programming languages receive all application requests and translate them into the complex operations required to fulfill those requests. a. True b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 9. The DBMS reveals much of the database’s internal complexity to the application programs and users. a. True b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 10. One disadvantage of the DBMS is that it increases the risk of data security breaches. a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 11. An operational database is sometimes referred to as an enterprise database. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 01: Database Systems ANSWER: False DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 12. A data warehouse can store data derived from many sources. a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 13. Structure is based on the type of processing to be performed on the data. a. True b. False ANSWER: True DIFFICULTY: Moderate REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 14. Corporations use only structured data. a. True b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 15. Field refers to a collection of related records. a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 1-5b Computerized File Systems LEARNING OBJECTIVES: 01.04 - See how modern databases evolved from file systems 16. Structural dependence exists when it is possible to make changes in the file structure without affecting the application program’s ability to access the data. a. True b. False ANSWER: False Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 01: Database Systems DIFFICULTY: Moderate REFERENCES: 1-6a Structural and Data Dependence LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 17. One disadvantage of a database system over previous data management approaches is increased costs. a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 1-7c Managing the Database System: A Shift in Focus LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 18. Data anomaly is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 19. An advantage of database systems is that you needn't perform frequent updates and apply latest patches. a. True b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 1-7c Managing the Database System: A Shift in Focus LEARNING OBJECTIVES: 01.06 - Outline the main components of the database system 20. One advantage of a database system over previous data management approaches is that the database system is considerably less complex. a. True b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 1-7c Managing the Database System: A Shift in Focus LEARNING OBJECTIVES: 01.06 - Outline the main components of the database system Multiple Choice 21. _____ is the result of revealing the meaning of raw facts. a. End-user data b. An encoded sample c. An encrypted bit d. Information ANSWER: d DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 01: Database Systems REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 22. _____ is the body of information and facts about a specific subject. a. Validation b. A format c. Knowledge d. A database ANSWER: c DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 23. Accurate, relevant, and timely information is the key to ____. a. data management b. good decision making c. knowledge d. understanding ANSWER: b DIFFICULTY: Moderate REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 24. End-user data is _____. a. knowledge about the end users b. raw facts of interest to the end user c. information about a specific subject d. accurate, relevant and timely information ANSWER: b DIFFICULTY: Easy REFERENCES: 1-3 Introducing the Database LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 25. _____ provide a description of the data characteristics and the set of relationships that link the data found within the database. a. Queries b. End-user data c. Metadata d. Schemas ANSWER: c DIFFICULTY: Easy REFERENCES: 1-3 Introducing the Database LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 26. _____ serve as the intermediary between the user and the database. a. DBMSs b. Metadata c. End-user data d. Programming languages ANSWER: a DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 01: Database Systems 27. The database structure in a DBMS is stored as a _____. a. single file b. collection of files c. set of key/value pairs d. collection of queries ANSWER: b DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 28. A(n) _____ might be written by a programmer or it might be created through a DBMS utility program. a. query b. operating system c. database management system d. application ANSWER: d DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 29. _____ exists when different versions of the same data appear in different places. a. Data inconsistency b. Poor data security c. Structural dependence d. Conceptual dependence ANSWER: a DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 30. The response of the DBMS to a query is the ___________ a. ad hoc query b. ad hoc response c. query result set d. integrated view of the data ANSWER: c DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 31. A(n) _____ database is used by an organization and supports many users across many departments. a. desktop b. workgroup c. enterprise d. transactional ANSWER: c DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 01: Database Systems 32. A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization. a. desktop b. workgroup c. enterprise d. transactional ANSWER: b DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 33. A workgroup database is a(n) _____ database. a. single-user b. multiuser c. desktop d. distributed ANSWER: b DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 34. A desktop database is a _____ database. a. single-user b. multiuser c. workgroup d. distributed ANSWER: a DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 35. A data warehouse contains historical data obtained from the _____. a. operational databases b. desktop database c. enterprise databases d. workgroup databases ANSWER: a DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 36. _____ data exist in the format in which they were collected. a. Structured b. Semistructured c. Unstructured d. Historical ANSWER: c DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 01: Database Systems 37. _____ data exist in a format that does not lend itself to processing that yields information. a. Structured b. Semistructured c. Unstructured d. Historical ANSWER: c DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 38. _____ are the result of formatting disorganized data in order to facilitate storage, use and generation of information. a. Structured data b. Raw data c. Unstructured data d. Obsolete data ANSWER: a DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 39. Most data that can be encountered are best classified as _____. a. structured b. semistructured c. unstructured d. historical ANSWER: b DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 40. An XML database supports the storage and management of _____ XML data. a. structured b. multistructured c. fullystructured d. semistructured ANSWER: d DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 41. The organization of data within folders in a manual file system is determined by _______. a. its date of creation b. its expected use c. the title of the documents in the folder d. the data processing specialist ANSWER: b DIFFICULTY: Moderate REFERENCES: 1-5a Manual File Systems LEARNING OBJECTIVES: 01.04 - See how modern databases evolved from file systems 42. A _____ is a logically connected set of one or more fields that describes a person, place, or thing. a. database b. column Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 01: Database Systems c. record d. file ANSWER: c DIFFICULTY: Easy REFERENCES: 1-5b Computerized File Systems LEARNING OBJECTIVES: 01.04 - See how modern databases evolved from file systems 43. A _____ is a collection of related records. a. schema b. field c. column d. file ANSWER: d DIFFICULTY: Easy REFERENCES: 1-5b Computerized File Systems LEARNING OBJECTIVES: 01.04 - See how modern databases evolved from file systems 44. A _____ is a character or group of characters that has a specific meaning. a. database b. field c. record d. file ANSWER: b DIFFICULTY: Easy REFERENCES: 1-5b Computerized File Systems LEARNING OBJECTIVES: 01.04 - See how modern databases evolved from file systems 45. Which of the following is true of spreadsheet applications? a. They provide enhanced security and robust data sharing features. c. They are a better alternative to databases.

b. They do not allow manipulation of data once entered. d. They enhance the user's ability to understand the data.

ANSWER: d DIFFICULTY: Moderate REFERENCES: 1-5c File System Redux: Modern End-User Productivity LEARNING OBJECTIVES: 01.04 - See how modern databases evolved from file systems 46. Which of the following refers to the situation where different versions of the same data are stored at different places because they weren’t updated consistently? a. Data query b. Data integrity c. Data dictionary d. Data redundancy ANSWER: d DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 47. Data is said to be verifiable if: a. the data always yields consistent results. c. the data is obtained from trusted sources. ANSWER: a Copyright Cengage Learning. Powered by Cognero.

b. the data cannot be changed or manipulated. d. the data is stored in different places within the database.

Page 9


Chapter 01: Database Systems DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 48. _____ is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions. a. Data integrity b. Data anomaly c. Data ubiquity d. Data quality ANSWER: a DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 49. The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment. a. structured data b. transaction c. management system d. database system ANSWER: d DIFFICULTY: Moderate REFERENCES: 1-7a The Database System Environment LEARNING OBJECTIVES: 01.06 - Outline the main components of the database system 50. _____ relates to the activities that make the database execute transactions more efficiently in terms of storage and access speed. a. Performance tuning b. Database design c. Query access d. Database management ANSWER: a DIFFICULTY: Moderate REFERENCES: 1-7b DBMS Functions LEARNING OBJECTIVES: 01.06 - Outline the main components of the database system Completion 51. _____ is the result of processing raw data to reveal its meaning. ANSWER: Information DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 52. To reveal meaning, information requires _____. ANSWER: context DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 53. Raw data must be properly _____ for storage, processing and presentation. Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 01: Database Systems ANSWER: formatted DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 54. Information is produced by processing _____. ANSWER: data DIFFICULTY: Easy REFERENCES: 1-2 Data versus Information LEARNING OBJECTIVES: 01.01 - Define the difference between data and information 55. _____ is data about data through which the end-user data are integrated and managed. ANSWER: Metadata DIFFICULTY: Easy REFERENCES: 1-3 Introducing the Database LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 56. A(n) _____ is a collection of programs that manages the database structure and controls access to the data stored in the database. ANSWER: DBMS (database management system) database management system (DBMS) database management system DBMS DIFFICULTY: Easy REFERENCES: 1-3 Introducing the Database LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 57. A(n) _____ is a spur-of-the-moment question. ANSWER: ad hoc query DIFFICULTY: Moderate REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 58. A(n) _____ is a specific request issued to the DBMS for data manipulation. ANSWER: query DIFFICULTY: Easy REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 59. _____ databases focus primarily on storing data used to generate information required to make tactical or strategic decisions. ANSWER: Analytical DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 01: Database Systems REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 60. _____ is a special language used to represent and manipulate data elements in a textual format. ANSWER: XML (Extensible Markup Language) Extensible Markup Language (XML) Extensible Markup Language XML DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 61. _____ exists when it is possible to make changes in the data storage characteristics without affecting an application program’s ability to access data. ANSWER: Data independence DIFFICULTY: Moderate REFERENCES: 1-6a Structural and Data Dependence LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 62. The term _____ refers to scattered locations storing the same basic data. ANSWER: islands of information DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 63. _____ exists when different and conflicting versions of the same data appear in different places. ANSWER: Data inconsistency DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 64. _____ exists when the same data are stored unnecessarily at different places. ANSWER: Data redundancy DIFFICULTY: Easy REFERENCES: 1-6b Data Redundancy LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 65. A(n) _____ develops when all required changes in the redundant data are not made successfully. ANSWER: data anomaly anomaly DIFFICULTY: Easy REFERENCES: 1-6c Data Anomalies LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 66. The DBMS uses the _____ to look up the required data component structures and relationships, thus relieving Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 01: Database Systems programmers from having to code such complex relationships in each program. ANSWER: data dictionary DIFFICULTY: Easy REFERENCES: 1-7b DBMS Functions LEARNING OBJECTIVES: 01.06 - Outline the main components of the database system 67. _____ relates to activities that make a database operate more efficiently in terms of storage and access speed. ANSWER: Performance tuning DIFFICULTY: Easy REFERENCES: 1-7b DBMS Functions LEARNING OBJECTIVES: 01.06 - Outline the main components of the database system 68. Web and mobile technologies that enable “anywhere, anytime, always on” human interactions are forms of _____. ANSWER: social media DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 69. A database that is created and maintained using services such as Microsoft Azure or Amazon AWS is called a(n) _____ database. ANSWER: cloud DIFFICULTY: Easy REFERENCES: 1-3b Types of Databases LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 70. When a database stores the majority of data in RAM rather than in hard disks, it is referred to as a(n) _____ database. ANSWER: in-memory DIFFICULTY: Easy REFERENCES: 1-8 Preparing for Your Database Professional LEARNING OBJECTIVES: 01.07 - Describe the main functions of a database management system (DBMS) Essay 71. Describe what metadata are and what value they provide to the database system. ANSWER: The metadata describe the data characteristics and the set of relationships that links the data found within the database. For example, the metadata component stores information such as the name of each data element, the type of values (numeric, dates, or text) stored on each data element, and whether the data element can be left empty. The metadata provide information that complements and expands the value and use of the data. In short, metadata present a more complete picture of the data in the database. Given the characteristics of metadata, you might hear a database described as a “collection of self-describing data.” DIFFICULTY: Moderate REFERENCES: 1-3 Introducing the Database LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 01: Database Systems 72. What are the advantages of having the DBMS between the end user’s applications and the database? ANSWER: Having a DBMS between the end user’s applications and the database offers some important advantages. First, the DBMS enables the data in the database to be shared among multiple applications or users. Second, the DBMS integrates the many different users’ views of the data into a single all-encompassing data repository. DIFFICULTY: Moderate REFERENCES: 1-3a Role and Advantages of the DBMS LEARNING OBJECTIVES: 01.02 - Describe what a database is, the various types of databases, and why they are valuable assets for decision making 73. Discuss some considerations when designing a database. ANSWER: Proper database design requires the designer to identify precisely the database’s expected use. Designing a transactional database emphasizes accurate and consistent data and operational speed. Designing a data warehouse database emphasizes the use of historical and aggregated data. Designing a database to be used in a centralized, single-user environment requires a different approach from that used in the design of a distributed, multiuser database. Designing appropriate data repositories of integrated information using the two-dimensional table structures found in most databases is a process of decomposition. The integrated data must be decomposed properly into its constituent parts, with each part stored in its own table. Further, the relationships between these tables must be carefully considered and implemented so the integrated view of the data can be re-created later as information for the end user. A well-designed database facilitates data management and generates accurate and valuable information. A poorly designed database is likely to become a breeding ground for difficultto-trace errors that may lead to bad decision making—and bad decision making can lead to the failure of an organization. Database design is simply too important to be left to luck. That’s why college students study database design, why organizations of all types and sizes send personnel to database design seminars, and why database design consultants often make an excellent living. DIFFICULTY: Moderate REFERENCES: 1-4 Why Database Design Is Important LEARNING OBJECTIVES: 01.03 - Explain the importance of database design 74. What are the problems associated with file systems? How do they challenge the types of information that can be created from the data as well as the accuracy of the information? ANSWER: The following problems associated with file systems, whether created by DP specialists or through a series of spread-sheets, severely challenge the types of information that can be created from the data as well as the accuracy of the information:

Lengthy development times. The first and most glaring problem with the file system approach is that even the simplest data-retrieval task requires extensive programming. With the older file systems, programmers had to specify what must be done and how to do it. Difficulty of getting quick answers. The need to write programs to produce even the simplest reports makes ad hoc queries impossible. Harried DP specialists who worked with mature file systems often received numerous requests for new reports. They were often forced to say that the report will be ready “next week” or even “next month.” If you need the information now, getting it next week or next month will not serve your information needs. Complex system administration. System administration becomes more difficult as the

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 01: Database Systems number of files in the system expands. Even a simple file system with a few files requires creating and maintaining several file management programs. Each file must have its own file management programs that allow the user to add, modify, and delete records; to list the file contents; and to generate reports. Because ad hoc queries are not possible, the file reporting programs can multiply quickly. The problem is compounded by the fact that each department in the organization “owns” its data by creating its own files. • Lack of security and limited data sharing. Another fault of a file system data repository is a lack of security and limited data sharing. Data sharing and security are closely related. Sharing data among multiple geographically dispersed users introduces a lot of security risks. In terms of spreadsheet data, while many spreadsheet programs provide rudimentary security options, they are not always used, and even when they are, they are insufficient for robust data sharing among users. In terms of creating data management and reporting programs, security and data-sharing features are difficult to program and consequently are often omitted from a file system environment. Such features include effective password protection, the ability to lock out parts of files or parts of the system itself, and other measures designed to safeguard data confidentiality. Even when an attempt is made to improve system and data security, the security devices tend to be limited in scope and effectiveness. • Extensive programming. Making changes to an existing file structure can be difficult in a file system environment. DIFFICULTY: Moderate REFERENCES: 1-6 Problems with File System Data Processing LEARNING OBJECTIVES: 01.05 - Understand flaws in file system data management 75. Discuss any three functions performed by the DBMS that guarantee the integrity and consistency of the data in the database. ANSWER: (answers may vary) •

Data dictionary management. The DBMS stores definitions of the data elements and their relationships (metadata) in a data dictionary. In turn, all programs that access the data in the database work through the DBMS. The DBMS uses the data dictionary to look up the required data component structures and relationships, thus relieving you from having to code such complex relationships in each program. Additionally, any changes made in a database structure are automatically recorded in the data dictionary, thereby freeing you from having to modify all of the programs that access the changed structure. In other words, the DBMS provides data abstraction, and it removes structural and data dependence from the system. Data storage management. The DBMS creates and manages the complex structures required for data stor-age, thus relieving you from the difficult task of defining and programming the physical data characteristics. A modern DBMS provides storage not only for the data but for related data-entry forms or screen definitions, report definitions, data validation rules, procedural code, structures to handle video and picture formats, and so on. Data storage management is also important for database performance tuning. Performance tuning relates to the activities that make the database perform more efficiently in terms of storage and access speed. Although the user sees the database as a single data storage unit, the DBMS actually stores the database in multiple physical data files. Such data files may even be stored on different storage media. Therefore, the DBMS doesn’t have to wait for one disk request to finish before the next one starts. In other words, the DBMS can fulfill database requests concurrently.

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 01: Database Systems •

Data transformation and presentation. The DBMS transforms entered data to conform to required data structures. The DBMS relieves you of the chore of distinguishing between the logical data format and the physical data format. That is, the DBMS formats the physically retrieved data to make it conform to the user’s logical expectations. Security management. The DBMS creates a security system that enforces user security and data privacy. Security rules determine which users can access the database, which data items each user can access, and which data operations (read, add, delete, or modify) the user can perform. This is especially important in multiuser database systems.

DIFFICULTY: Moderate REFERENCES: 1-7b DBMS Functions LEARNING OBJECTIVES: 01.07 - Describe the main functions of a database management system (DBMS)

Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 02: Data Models True / False 1. A data model is usually graphical. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 2. An implementation-ready data model needn't necessarily contain enforceable rules to guarantee the integrity of the data. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 3. An implementation-ready data model should contain a description of the data structure that will store the end-user data. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 4. Within the database environment, a data model represents data structures with the purpose of supporting a specific problem domain. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 5. Even when a good database blueprint is available, an applications programmer’s view of the data should match that of the manager and the end user. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 2-2 The Importance of Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 6. In the context of data models, an entity is a person, place, thing, or event about which data will be collected and stored. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 02: Data Models b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 7. Database designers determine the data and information that yield the required understanding of the entire business. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 2-4 Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 8. Business rules apply to businesses and government groups, but not to other types of organizations such as religious groups or research laboratories. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 2-4 Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 9. Business rules must be rendered in writing. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-4 Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 10. A disadvantage of the relational database management system (RDBMS) is its inability to hide the complexities of the relational model from the user. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 11. In an SQL-based relational database, each table is dependent on every other table. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 02: Data Models REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 12. In an SQL-based relational database, rows in different tables are related based on common values in common attributes. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 13. Each row in the relational table is known as an entity instance or entity occurrence in the ER model. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 14. M:N relationships are not appropriate in a relational model. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 15. In Chen notation, entities and relationships have to be oriented horizontally; not vertically. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 16. Today, most relational database products can be classified as object/relational. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-5e Object/Relational and XML LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 17. The network model has structural level dependence. Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 02: Data Models a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 2-5g Data Models: A Summary LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 18. The external model is the representation of the database as “seen” by the DBMS. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 2-6a The External Model LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction 19. The hierarchical model is software-independent. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 2-6 Degrees of Data Abstraction LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction 20. The relational model is hardware-dependent and software-independent. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 2-6 Degrees of Data Abstraction LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction Multiple Choice 21. A(n) _____’s main function is to help one understand the complexities of the real-world environment. a. node b. entity c. model d. database ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 22. A(n) _____ is anything about which data are to be collected and stored. a. attribute b. entity c. relationship d. constraint ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 02: Data Models DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 23. A(n) _____ represents a particular type of object in the real world. a. attribute b. entity c. relationship d. node ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 24. A(n) _____ is the equivalent of a field in a file system. a. attribute b. entity c. relationship d. constraint ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 25. A(n) _____ is bidirectional. a. attribute b. entity c. relationship d. constraint ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 26. A(n) _____ is a restriction placed on the data. a. attribute b. entity c. relationship d. constraint ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 27. _____ are important because they help to ensure data integrity. a. Attributes b. Entities c. Relationships d. Constraints ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 28. _____ are normally expressed in the form of rules. Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 02: Data Models a. Attributes b. Entities c. Relationships d. Constraints ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 29. Students and classes have a _____ relationship. a. one-to-one b. one-to-many c. many-to-one d. many-to-many ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-3 Data Model Basic Building Blocks LEARNING OBJECTIVES: 02.02 - Describe the basic data-modeling building blocks 30. Which of the following is true of business rules? a. They allow the designer to set company policies with regard to data. b. They allow the designer to develop business processes. c. They can serve as a communication tool between the users and designers. d. They provide a framework for the company’s self-actualization. ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 2-4a Discovering Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 31. A noun in a business rule translates to a(n) _____ in the data model. a. entity b. attribute c. relationship d. constraint ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 2-4b Translating Business Rules into Data Model Components LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 32. A verb associating two nouns in a business rule translates to a(n) _____ in the data model. a. entity b. attribute c. relationship d. constraint ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-4b Translating Business Rules into Data Model Components LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 33. In the _____ model, the basic logical structure is represented as an upside-down tree. a. hierarchical b. network c. relational d. entity relationship ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 02: Data Models DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 34. In the _____ model, each parent can have many children, but each child has only one parent. a. hierarchical b. network c. relational d. entity relationship ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 35. The hierarchical data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 36. In the _____ model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent. a. hierarchical b. network c. object-oriented d. entity relationship ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 37. The object-oriented data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 38. VMS/VSAM is an example of the _____. a. hierarchical model b. file system data model c. relational data model d. XML data model ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 02: Data Models 39. Oracle 12c, MS SQL Server, and Tamino are examples of _____ data models. a. hierarchical b. file system c. relational d. XML Hybrid ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 40. MySQL is an example of the _____. a. hierarchical model b. file system data model c. relational data model d. XML data model ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 41. A(n) _____ enables a database administrator to describe schema components. a. extensible markup language (XML) b. data definition language (DDL) c. unified modeling language (UML) d. query language ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 42. The relational data model was developed in the _____. a. 1960s b. 1970s c. 1980s d. 1990s ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 43. The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with text. a. hierarchical b. network c. object-oriented d. entity relationship ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 44. A(n) _______ enables a database administrator to describe schema components. a. extensible markup language (XML) b. data definition language (DDL) c. unified modeling language (UML) d. query language ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 02: Data Models DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 45. The _____ model uses the term connectivity to label the relationship types. a. relational b. network c. object-oriented d. entity relationship ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 46. The _____ data model is said to be a semantic data model. a. relational b. network c. object-oriented d. entity relationship ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-5d The Object-Oriented Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 47. The _____ data model uses the concept of inheritance. a. relational b. network c. object-oriented d. entity relationship ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 2-5d The Object-Oriented Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 48. Which of the following types of HDFS nodes stores all the metadata about a file system? a. Data node b. Client node c. Name node d. Map node ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 2-5f Emerging Data Models: Big Data and NoSQL LEARNING OBJECTIVES: 02.05 - List emerging alternative data models and the needs they fulfill 49. Which of the following is true of NoSQL databases? a. They do not support distributed database architectures. b. They are not based on the relational model. c. They are geared toward transaction consistency rather than d. They do not support very large amounts of performance. sparse data. ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 2-5f Emerging Data Models: Big Data and NoSQL LEARNING OBJECTIVES: 02.05 - List emerging alternative data models and the needs they fulfill Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 02: Data Models 50. Which of the following types of HDFS nodes acts as the interface between the user application and the HDFS? a. Data node b. Client node c. Name node d. Map node ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 2-5f Emerging Data Models: Big Data and NoSQL LEARNING OBJECTIVES: 02.05 - List emerging alternative data models and the needs they fulfill Completion 51. A(n) _____ is a relatively simple representation of more complex real-world data structures. ANSWER: data model DIFFICULTY: Difficulty: Easy REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 52. A(n) _____ is a brief, precise, and unambiguous description of a policy, procedure, or principle within a specific organization. ANSWER: business rule DIFFICULTY: Difficulty: Easy REFERENCES: 2-4 Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 53. A(n) _____ in a hierarchical model is the equivalent of a record in a file system. ANSWER: segment DIFFICULTY: Difficulty: Easy REFERENCES: 2-5 The Evolution of Data Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 54. A(n) _____ is the conceptual organization of an entire database as viewed by a database administrator. ANSWER: schema DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 55. A(n) _____ defines the environment in which data can be managed and is used to work with the data in the database. ANSWER: data manipulation language (DML) DIFFICULTY: Difficulty: Easy REFERENCES: 2-5a Hierarchical and Network Models LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 56. The relational model’s foundation is a mathematical concept known as a(n) _____. ANSWER: relation DIFFICULTY: Difficulty: Easy REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 02: Data Models 57. Each row in a relation is called a(n) _____. ANSWER: tuple DIFFICULTY: Difficulty: Easy REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 58. Each column in a relation represents a(n) _____. ANSWER: attribute DIFFICULTY: Difficulty: Easy REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 59. Each row in the relational table is known as a(n) _____. ANSWER: entity instance DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 60. In _____, a three-pronged symbol represents the “many” side of the relationship. ANSWER: Crow’s Foot notation DIFFICULTY: Difficulty: Easy REFERENCES: 2-5c The Entity Relationship Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 61. A(n) _____ is a collection of similar objects with a shared structure and behavior. ANSWER: class DIFFICULTY: Difficulty: Easy REFERENCES: 2-5d The Object-Oriented Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 62. In object-oriented terms, a(n) _____ defines an object’s behavior. ANSWER: method DIFFICULTY: Difficulty: Easy REFERENCES: 2-5d The Object-Oriented Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 63. _____ is a language based on OO concepts that describes a set of diagrams and symbols used to graphically model a system. ANSWER: UML (Unified Modeling Language) Unified Modeling Language (UML) Unified Modeling Language UML DIFFICULTY: Difficulty: Easy REFERENCES: 2-5d The Object-Oriented Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 02: Data Models 64. The term _____ is used to refer to the task of creating a conceptual data model that could be implemented in any DBMS. ANSWER: logical design DIFFICULTY: Difficulty: Easy REFERENCES: 2-6b The Conceptual Model LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction 65. The _____ is the representation of a database as “seen” by the DBMS. ANSWER: internal model DIFFICULTY: Difficulty: Easy REFERENCES: 2-6c The Internal Model LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction 66. One of the limitations of the _____ model is that there is a lack of standards. ANSWER: hierarchical DIFFICULTY: Easy REFERENCES: 2-5g Data Models: A Summary LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 67. The _____ model is the end users’ view of the data environment. ANSWER: external DIFFICULTY: Easy REFERENCES: 2-6a The External Model LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction 68. An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chosen database. ANSWER: schema DIFFICULTY: Easy REFERENCES: 2-6c The Internal Model LEARNING OBJECTIVES: 02.06 - Explain how data models can be classified by their level of abstraction 69. From a database point of view, the collection of data becomes meaningful only when it reflects properly defined _____. ANSWER: business rules DIFFICULTY: Moderate REFERENCES: 2-4 Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 70. The movement to find new and better ways to manage large amounts of web- and sensor-generated data and derive business insight from it, while simultaneously providing high performance and scalability at a reasonable cost is referred to as "_____." ANSWER: Big Data DIFFICULTY: Easy REFERENCES: 2-5f Emerging Data Models: Big Data and NoSQL LEARNING OBJECTIVES: 02.05 - List emerging alternative data models and the needs they fulfill Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 02: Data Models Essay 71. What components should an implementation-ready data model contain? ANSWER: An implementation-ready data model should contain at least the following components: A description of the data structure that will store the end-user data. A set of enforceable rules to guarantee the integrity of the data. A data manipulation methodology to support the real-world data transformations. DIFFICULTY: Difficulty: Moderate REFERENCES: 2-1 Data Modeling and Data Models LEARNING OBJECTIVES: 02.01 - Discuss data modeling and why data models are important 72. What do business rules require to be effective? ANSWER: To be effective, business rules must be easy to understand and widely disseminated to ensure that every person in the organization shares a common interpretation of the rules. Business rules describe, in simple language, the main and distinguishing characteristics of the data as viewed by the company. DIFFICULTY: Difficulty: Moderate REFERENCES: 2-4 Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 73. What are the sources of business rules, and what is the database designer’s role with regard to business rules? ANSWER: The main sources of business rules are company managers, policy makers, department managers, and written documentation such as a company’s procedures, standards, and operations manuals. A faster and more direct source of business rules is direct interviews with end users. Unfortunately, because perceptions differ, end users are sometimes a less reliable source when it comes to specifying business rules. For example, a maintenance department mechanic might believe that any mechanic can initiate a maintenance procedure, when actually only mechanics with inspection authorization can perform such a task. Such a distinction might seem trivial, but it can have major legal consequences. Although end users are crucial contributors to the development of business rules, it pays to verify end-user perceptions. Too often, interviews with several people who perform the same job yield very different perceptions of what the job components are. While such a discovery may point to “management problems,” that general diagnosis does not help the database designer. The database designer’s job is to reconcile such differences and verify the results of the reconciliation to ensure that the business rules are appropriate and accurate. DIFFICULTY: Difficulty: Moderate REFERENCES: 2-4a Discovering Business Rules LEARNING OBJECTIVES: 02.03 - Define what business rules are and how they influence database design 74. Describe the three parts involved in any SQL-based relational database application. ANSWER: From an end-user perspective, any SQL-based relational database application involves three parts: a user interface, a set of tables stored in the database, and the SQL “engine.” Each of these parts is explained below. 1. The end-user interface. Basically, the interface allows the end user to interact with the data (by automatically generating SQL code). Each interface is a product of the software vendor’s idea of meaningful interaction with the data. You can also design your own customized interface with the help of application generators that are now standard fare in the database software arena. 2. A collection of tables stored in the database. In a relational database, all data are Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 02: Data Models perceived to be stored in tables. The tables simply “present” the data to the end user in a way that is easy to understand. Each table is independent. Rows in different tables are related by common values in common attributes. 3. SQL engine. Largely hidden from the end user, the SQL engine executes all queries, or data requests. Keep in mind that the SQL engine is part of the DBMS software. The end user uses SQL to create table structures and to perform data access and table maintenance. The SQL engine processes all user requests—largely behind the scenes and without the end user’s knowledge. Hence, SQL is said to be a declarative language that tells what must be done but not how. DIFFICULTY: Difficulty: Moderate REFERENCES: 2-5b The Relational Model LEARNING OBJECTIVES: 02.04 - Understand how the major data models evolved 75. Describe the three basic characteristics of Big Data databases. ANSWER: Douglas Laney, a data analyst from the Gartner Group, first described the basic characteristics of Big Data databases4: volume, velocity, and variety, or the 3 Vs. • Volume refers to the amounts of data being stored. With the adoption and growth of the Internet and social media, companies have multiplied the ways to reach customers. Over the years, and with the benefit of technological advances, data for millions of e-transactions were being stored daily on company databases. Furthermore, organizations are using multiple technologies to interact with end users and those technologies are generating mountains of data. This ever-growing volume of data quickly reached petabytes in size, and it’s still growing. • Velocity refers not only to the speed with which data grows but also to the need to process this data quickly in order to generate information and insight. With the advent of the Internet and social media, business response times have shrunk considerably. Organizations need not only to store large volumes of quickly accumulating data but also need to process such data quickly. The velocity of data growth is also due to the increase in the number of different data streams from which data is being piped to the organization (via the web, e-commerce, Tweets, Facebook posts, emails, sensors, GPS, and so on). • Variety refers to the fact that the data being collected comes in multiple different data formats. A great portion of these data comes in formats not suitable to be handled by the typical operational databases based on the relational model. The 3 Vs framework illustrates what companies now know, that the amount of data being collected in their databases has been growing exponentially in size and complexity. DIFFICULTY: Moderate REFERENCES: 2-5f Emerging Data Models: Big Data and NoSQL LEARNING OBJECTIVES: 02.05 - List emerging alternative data models and the needs they fulfill

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 03: The Relational Database Model True / False 1. The practical significance of taking the logical view of a database is that it serves as a reminder of the simple file concept of data storage. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 3-1 A Logical View of Data LEARNING OBJECTIVES: 03.01 - Describe the relational database model’s logical structure 2. You can think of a table as a persistent representation of a logical relation. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 3. The order of the rows and columns is important to the DBMS. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 4. Character data can contain any character or symbol intended for mathematical manipulation. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 5. Each table in a relational database must have a primary key. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 03: The Relational Database Model 6. The row’s range of permissible values is known as its domain. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 7. The idea of determination is unique to the database environment. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 3-2a Dependencies LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 8. Only a single attribute, not multiple attributes, can define functional dependence. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 3-2a Dependencies LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 9. If the attribute (B) is functionally dependent on a composite key (A) but not on any subset of that composite key, the attribute (B) is fully functionally dependent on (A). a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 3-2a Dependencies LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 10. A null is created when you press the Enter key or the Tab key to move to the next entry without making a prior entry of any kind. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 03: The Relational Database Model and characteristics of a relational table 11. Depending on the sophistication of the application development software, nulls can create problems when functions such as COUNT, AVERAGE, and SUM are used. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 12. RDBMSs enforce integrity rules automatically. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-3 Integrity Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 13. Relational algebra defines the theoretical way of manipulating table contents using relational operators. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-4 Relational Algebra LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 14. The SELECT operator yields a vertical subset of a table. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 15. The DIFFERENCE operator subtracts one table from the other. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 16. In a natural join, the column on which the join was made occurs twice in the new table. Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 03: The Relational Database Model a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 17. The DIVIDE operation uses one single-column table (e.g., column “a”) as the divisor and one two-column table (e.g., columns “a” and “b”) as the dividend. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 18. A data dictionary is sometimes described as “the database designer’s database” because it records the design decisions about tables and their structures. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 19. The one-to-many (1:M) relationship is easily implemented in the relational model by putting the foreign key of the “1” side in the table of the “many” side as a primary key. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 3-6a The 1:M Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 20. As rare as 1:1 relationships should be, certain conditions absolutely require their use. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 3-6b The 1:1 Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 03: The Relational Database Model 21. _____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false. a. Predicate b. Database c. Relational d. Index ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-1 A Logical View of Data LEARNING OBJECTIVES: 03.01 - Describe the relational database model’s logical structure 22. Each table _____ represents an attribute. a. column b. row c. dimension d. value ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 23. Date attributes contain calendar dates stored in a special format known as the _____ date format. a. Epoch b. calendar c. Julian d. logical ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 24. In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable. a. relations b. keys c. indexes d. logical structures ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-2 Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 25. A _____ is any key that uniquely identifies each row. a. superkey b. special key c. foreign key d. candidate key ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 03: The Relational Database Model 26. A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes. a. secondary b. candidate c. primary d. foreign ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 27. A _____ is the primary key of one table that has been placed into another table to create a common attribute. a. superkey b. composite primary key c. candidate key d. foreign key ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 28. A _____ key is defined as a key that is used strictly for data retrieval purposes. a. lookup b. foreign c. candidate d. secondary ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 29. Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null. a. integrity b. uniqueness c. model d. attribute ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-3 Integrity Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 30. The CUSTOMER table’s primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity. a. entity b. referential c. relational d. null ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 3-3 Integrity Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 03: The Relational Database Model 31. The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column. a. UNIQUE b. NOT NULL c. VALUE d. EMPTY ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-3 Integrity Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 32. To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN. a. INTERSECT b. UNION c. DIFFERENCE d. SELECT ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-4 Relational Algebra LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 33. _____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition. a. INTERSECT b. UNION c. DIFFERENCE d. SELECT ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 34. _____ returns only the attributes requested, in the order in which they are requested. a. PROJECT b. SELECT c. UNION d. DIFFERENCE ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 35. When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____. a. intersect-compatible b. union-compatible c. difference-compatible d. select-compatible ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 36. A(n) _____ join links tables by selecting only the rows with common values in their common attribute(s). a. attribute b. unique Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 03: The Relational Database Model c. foreign d. natural ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 37. _____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems. a. Inner joins b. Outer joins c. Equijoins d. Theta joins ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 38. A(n) _____ only returns matched records from the tables that are being joined. a. outer join b. inner join c. equijoin d. theta join ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 39. A _____ contains at least all of the attribute names and characteristics for each table in the system. a. data dictionary b. relational schema c. logical schema d. database ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 40. The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents. a. database tuple b. systematic database c. unique index d. system catalog ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 41. In a database context, the word _____ indicates the use of the same attribute name to label different attributes. a. redundancy b. homonym c. duplicate d. synonym ANSWER: b DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 03: The Relational Database Model REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 42. In a database context, a(n) _____ indicates the use of different names to describe the same attribute. a. entity b. duplicate c. synonym d. homonym ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 43. The _____ relationship is the “relational model ideal.” a. 1:1 b. 1:M c. M:1 d. M:N ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 3-6 Relationships within the Relational Database LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 44. The _____ relationship should be rare in any relational database design. a. 1:1 b. 1:M c. M:1 d. M:N ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-6 Relationships within the Relational Database LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 45. _____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities. a. 1:N b. M:1 c. M:N d. 1:1 ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 3-6c The M:N Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 46. Another name for a composite entity is a(n) _____ entity. a. bridge b. linked c. directive d. associative ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 3-6c The M:N Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 03: The Relational Database Model 47. A(n) _____ is an orderly arrangement used to logically access rows in a table. a. primary rule b. superkey c. relationship d. index ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 3-8 Indexes LEARNING OBJECTIVES: 03.07 - Explain the purpose of indexing in a relational database 48. When you define a table’s primary key, the DBMS automatically creates a(n) _____ index on the primary key column(s) you declared. a. key b. composite c. unique d. primary ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 3-8 Indexes LEARNING OBJECTIVES: 03.07 - Explain the purpose of indexing in a relational database 49. According to Codd’s _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns). a. distribution independence b. logical data independence c. comprehensive data sublanguage d. integrity independence ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 3-9 Codd’s Relational Database Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 50. According to Codd's _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database. a. nonsubversion b. information c. guaranteed access d. view updating ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 3-9 Codd’s Relational Database Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table Completion 51. A table is also called a(n) _____ because the relational model’s creator, E. F. Codd, used the two terms as synonyms. ANSWER: relation DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 03: The Relational Database Model and characteristics of a relational table 52. In a relational table, each column has a specific range of values known as the _____ domain. ANSWER: attribute DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 53. A primary key is a(n) _____ key chosen to be the primary means by which rows of a table are uniquely identified. ANSWER: candidate DIFFICULTY: Difficulty: Easy REFERENCES: 3-1a Tables and Their Characteristics LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 54. In a relational model, _____ are used to establish relationships among tables and to ensure the integrity of the data. ANSWER: keys DIFFICULTY: Difficulty: Easy REFERENCES: 3-2 Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 55. To avoid nulls, some designers use special codes, known as _____, to indicate the absence of some value. ANSWER: flags DIFFICULTY: Difficulty: Easy REFERENCES: 3-3 Integrity Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 56. The relational operators have the property of _____; that is, the use of relational algebra operators on existing relations (tables) produces new relations. ANSWER: closure DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 57. PRODUCT yields all possible pairs of rows from two tables, also known as the _____ product. ANSWER: Cartesian DIFFICULTY: Difficulty: Moderate REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 58. _____ is the real power behind the relational database, allowing the use of independent tables linked by common attributes. ANSWER: JOIN DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 03: The Relational Database Model REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 59. A(n) _____ links tables on the basis of an equality condition that compares specified columns of each table. ANSWER: equijoin DIFFICULTY: Difficulty: Easy REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 60. A(n) ______ provides a detailed description of all tables found within the user/designer-created database. ANSWER: data dictionary DIFFICULTY: Difficulty: Easy REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 61. The _____ catalog can be described as a detailed system data dictionary that describes all objects within the database, including data about table names, the table’s creator and creation date, the number of columns in each table, the data type corresponding to each column, index filenames, index creators, authorized users, and access privileges. ANSWER: system DIFFICULTY: Difficulty: Easy REFERENCES: 3-5 The Data Dictionary and the System Catalog LEARNING OBJECTIVES: 03.04 - Explain the purpose and components of the data dictionary and system catalog 62. The _____ relationship is the relational database norm. ANSWER: 1:M DIFFICULTY: Difficulty: Moderate REFERENCES: 3-6a The 1:M Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 63. _____ relationships cannot be implemented as such in the relational model. ANSWER: M:N DIFFICULTY: Difficulty: Moderate REFERENCES: 3-6c The M:N Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 64. If one department chair—a professor—can chair only one department, and one department can have only one department chair. The entities PROFESSOR and DEPARTMENT exhibit a(n) _____ relationship. ANSWER: 1:1 DIFFICULTY: Difficulty: Moderate REFERENCES: 3-6b The 1:1 Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 65. One characteristic of generalization hierarchies is that they are implemented as _____ relationships. ANSWER: 1:1 Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 03: The Relational Database Model DIFFICULTY: Difficulty: Moderate REFERENCES: 3-6b The 1:1 Relationship LEARNING OBJECTIVES: 03.05 - Identify appropriate entities and then the relationships among the entities in the relational database model 66. The proper use of _____ keys is crucial to controlling data redundancy. ANSWER: foreign DIFFICULTY: Difficulty: Easy REFERENCES: 3-7 Data Redundancy Revisited LEARNING OBJECTIVES: 03.06 - Describe how data redundancy is handled in the relational database model 67. Proper data _____ design requires carefully defined and controlled data redundancies to function properly. ANSWER: warehousing DIFFICULTY: Difficulty: Easy REFERENCES: 3-7 Data Redundancy Revisited LEARNING OBJECTIVES: 03.06 - Describe how data redundancy is handled in the relational database model 68. A(n) _____ index is an index in which the index key can have only one pointer value (row) associated with it. ANSWER: unique DIFFICULTY: Difficulty: Easy REFERENCES: 3-8 Indexes LEARNING OBJECTIVES: 03.07 - Explain the purpose of indexing in a relational database 69. An index key can have multiple _____ (a composite index). ANSWER: attributes DIFFICULTY: Difficulty: Easy REFERENCES: 3-8 Indexes LEARNING OBJECTIVES: 03.07 - Explain the purpose of indexing in a relational database 70. Dr. Codd’s _____ rule of relational database states that every value in a table is guaranteed to be accessible through a combination of table name, primary key value, and column name. ANSWER: guaranteed Access DIFFICULTY: Difficulty: Moderate REFERENCES: 3-9 Codd’s Relational Database Rules LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table Essay 71. What is a key and how is it important in a relational model? ANSWER: In a relational model, keys are important because they are used to ensure that each row in a table is uniquely identifiable. They are also used to establish relationships among tables and to ensure the integrity of the data. A key consists of one or more attributes that determine other attributes. For example, an invoice number identifies all of the invoice attributes, such as the invoice date and the customer name. DIFFICULTY: Difficulty: Moderate REFERENCES: 3-2 Keys Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 03: The Relational Database Model LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 72. Define entity integrity. What are the two requirements to ensure entity integrity? ANSWER: Entity integrity is the condition in which each row (entity instance) in the table has its own unique identity. To ensure entity integrity, the primary key has two requirements: (1) all of the values in the primary key must be unique. (2) no key attribute in the primary key can contain a null. DIFFICULTY: Difficulty: Moderate REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 73. Describe the use of null values in a database. ANSWER: Null values are problematic in a relational model. A null is the absence of any data value, and it is never allowed in any part of the primary key. From a theoretical perspective, it can be argued that a table that contains a null is not properly a relational table at all. From a practical perspective, however, some nulls cannot be reasonably avoided. For example, not all students have a middle initial. As a general rule, nulls should be avoided as much as reasonably possible. In fact, an abundance of nulls is often a sign of a poor design. Also, nulls should be avoided in the database because their meaning is not always identifiable. For example, a null could represent: • An unknown attribute value. • A known, but missing, attribute value. • A “not applicable” condition. DIFFICULTY: Difficulty: Moderate REFERENCES: 3-2b Types of Keys LEARNING OBJECTIVES: 03.02 - Identify the relational model’s basic components and explain the structure, contents, and characteristics of a relational table 74. Describe the use of the INTERSECT operator. ANSWER: INTERSECT yields only the rows that appear in both tables. As with UNION, the tables must be union-compatible to yield valid results. For example, you cannot use INTERSECT if one of the attributes is numeric and one is character-based. For the rows to be considered the same in both tables and appear in the result of the INTERSECT, the entire rows must be exact duplicates. DIFFICULTY: Difficulty: Moderate REFERENCES: 3-4b Relational Set Operators LEARNING OBJECTIVES: 03.03 - Use relational database operators to manipulate relational table contents 75. Define an index. Explain the role of indexes in a relational database. ANSWER: An index is an orderly arrangement used to logically access rows in a table. From a conceptual point of view, an index is composed of an index key and a set of pointers. The index key is, in effect, the index’s reference point. More formally, an index is an ordered arrangement of keys and pointers. Each key points to the location of the data identified by the key. DBMSs use indexes for many different purposes. An index can be used to retrieve data more efficiently. Indexes can also be used by a DBMS to retrieve data ordered by a specific attribute or attributes. For example, creating an index on a customer’s last name will allow you to retrieve the customer data alphabetically by the customer’s last name. Also, an index key can be composed of one or more attributes. Indexes play an important role Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 03: The Relational Database Model in DBMSs for the implementation of primary keys. When you define a table’s primary key, the DBMS automatically creates a unique index on the primary key column(s) you declared. DIFFICULTY: Difficulty: Moderate REFERENCES: 3-8 Indexes LEARNING OBJECTIVES: 03.07 - Explain the purpose of indexing in a relational database

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 04: Entity Relationship (ER) Modeling True / False 1. The entity relationship model (ERM) is dependent on the database type. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1 The Entity Relationship Model LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 2. The Crow’s Foot notation is less implementation-oriented than the Chen notation. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1 The Entity Relationship Model LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 3. An entity in the entity relationship model corresponds to a table in the relational environment. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1a Entities LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 4. In the entity relationship model, a table row corresponds to an entity instance. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1a Entities LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 5. In the Chen and Crow’s Foot notations, an entity is represented with a rectangle containing the entity’s name. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1a Entities LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 6. In the original Chen notation, each attribute is represented by an oval with the attribute name connected to an entity rectangle with a line. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 04: Entity Relationship (ER) Modeling b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 7. Software vendors have adopted the Chen representation because of its compact representation. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 8. A composite identifier is a primary key composed of more than one attribute. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 9. The Crow's Foot notation easily identifies multivalued attributes. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 10. Composite attributes make it easier to facilitate detailed queries. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 11. Connectivities and cardinalities are established by concise statements known as business rules. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 04: Entity Relationship (ER) Modeling into the database design process 12. In Chen notation, there is no way to represent cardinality. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 13. In implementation terms, an entity is existence-dependent if it has a mandatory primary key. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1e Existence Dependence LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 14. A weak relationship exists if the primary key of the related entity contains at least one primary key component of the parent entity. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1f Relationship Strength LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 15. A weak entity has a primary key that is partially or totally derived from the parent entity in the relationship. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 4-1g Weak Entities LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 16. In a 1:M relationship, to avoid the possibility of referential integrity errors, the data of the "1" side must be loaded first. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1f Relationship Strength LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 17. Relationships between entities always operate in one direction. Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 04: Entity Relationship (ER) Modeling a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 18. The existence of a mandatory relationship indicates that the minimum cardinality is 0 or 1 for the mandatory entity. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 19. Referential integrity and participation are both bidirectional, meaning that they must be addressed in both directions along a relationship. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 4-1j Recursive Relationships LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 20. To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the relationships are mandatory or optional. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1k Associative (Composite) Entities LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation Multiple Choice 21. The entity relationship diagram (ERD) represents the _____ database as viewed by the end user. a. condensed b. physical c. logical d. conceptual ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 4-1 The Entity Relationship Model LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 22. The _____ notation of entity-relationship modelling can be used for both conceptual and implementation modelling. a. Bachman b. UML Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 04: Entity Relationship (ER) Modeling c. Chen d. Crow's Foot ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 4-1 The Entity Relationship Model LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 23. A(n) _____ is the set of possible values for a given attribute. a. domain b. range c. identifier d. key ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 24. Ideally, an entity identifier is composed of _____ attribute(s). a. one b. two c. three d. six ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 25. A _____ attribute can be further subdivided to yield additional attributes. a. composite b. simple c. single-valued d. multivalued ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 26. A _____ attribute is one that cannot be subdivided. a. composite b. simple c. single-valued d. multivalued ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 27. The conceptual model can handle _____ relationships and multivalued attributes. a. 1:1 b. M:N c. 1:M d. 1:N ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 04: Entity Relationship (ER) Modeling 28. A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity. a. single line b. dashed line c. double dashed line d. double line ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 29. The decision to store _____ attributes in database tables depends on the processing requirements and the constraints placed on a particular application. a. multivalued b. derived c. single-valued d. composite ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 30. A relationship is an association between _____. a. objects b. entities c. databases d. fields ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 4-1c Relationships LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 31. _____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity. a. Connectivity b. Relationship c. Dependence d. Cardinality ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 32. In the entity relationship diagram (ERD), cardinality is indicated using the _____ notation, where max is the maximum number of associated entities and min represents the minimum number of associated entities. a. (max, min) b. (min, max) c. [min ... max] d. {min|max} ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 04: Entity Relationship (ER) Modeling 33. When the specific cardinalities are not included on the diagram in Crow's Foot notation, cardinality is implied by the use of _____. a. symbols b. attributes c. images d. tables ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 34. Knowing the minimum and maximum number of _____ occurrences is very helpful at the application software level. a. object b. attribute c. data d. entity ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 35. An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity occurrence. a. existence b. relationship c. business d. data ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 4-1e Existence Dependence LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 36. If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity. a. weak b. alone c. unary d. strong ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 4-1e Existence Dependence LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 37. A _____ entity has a primary key that is partially or totally derived from the parent entity in the relationship. a. strong b. weak c. business d. child ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 4-1f Relationship Strength Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 04: Entity Relationship (ER) Modeling LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 38. The existence of a(n) _____ entity indicates that its minimum cardinality is zero. a. ternary b. optional c. strong d. weak ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 39. A _____ relationship exists when an association is maintained within a single entity. a. unary b. ternary c. strong d. weak ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 4-1i Relationship Degree LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 40. A _____ relationship exists when three entities are associated. a. unary b. strong c. ternary d. weak ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 4-1i Relationship Degree LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 41. If an employee within an EMPLOYEE entity has a relationship with itself, that relationship is known as a _____ relationship. a. self b. self-referring c. looping d. recursive ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1j Recursive Relationships LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 42. To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible. a. unary b. binary c. strong d. weak ANSWER: b DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 04: Entity Relationship (ER) Modeling REFERENCES: 4-1i Relationship Degree LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 43. The entity relationship model uses the associative entity to represent a(n) _____ relationship between two or more entities. a. M:N b. 1:M c. N:1 d. M:1 ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1k Associative (Composite) Entities LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 44. When using the Crow's Foot notation, the associative entity is indicated by _____ relationship lines between the parents and the associative entity. a. dotted b. double c. triple d. solid ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 4-1k Associative (Composite) Entities LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 45. The first step in building an entity-relationship diagram (ERD) is _____. a. developing the initial ERD b. creating a detailed narrative of the organization’s description of operations c. identifying the attributes and primary keys that adequately describe the entities d. identifying the business rules based on the description of operations ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 4-2 Developing an ER Diagram LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 46. The Crow’s foot symbol with two vertical parallel lines indicates _____ cardinality. a. (0,N) b. (1,N) c. (1,1) d. (0,1) ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 47. If Tiny College has some departments that are classified as “research only” and do not offer courses, the COURSE entity of the college database would be _____ the DEPARTMENT entity. a. existence-dependent on b. independent of Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 04: Entity Relationship (ER) Modeling c. mandatory for d. optional to ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 4-2 Developing an ER Diagram LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 48. In organizations that generate large number of transactions, _____ are often a top priority in database design. a. relationships among entities b. logical design standards c. naming conventions d. high processing speeds ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 4-3 Database Design Challenges: Conflicting Goals LEARNING OBJECTIVES: 04.04 - Understand that real-world database design often requires the reconciliation of conflicting goals 49. Complex _____ requirements may dictate data transformations, and they may expand the number of entities and attributes within the design. a. information b. entity c. design d. processing ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 4-3 Database Design Challenges: Conflicting Goals LEARNING OBJECTIVES: 04.04 - Understand that real-world database design often requires the reconciliation of conflicting goals 50. Database design is a(n) _____ process based on repetition. a. sequential b. iterative c. linear d. intermittent ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 4-2 Developing an ER Diagram LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process Completion 51. _____ are characteristics of entities. ANSWER: Attributes DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 52. A(n) _____ attribute is an attribute that must have a value. ANSWER: required DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 04: Entity Relationship (ER) Modeling LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 53. _____ are underlined in an ER diagram. ANSWER: Identifiers DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 54. A person’s Social Security number would be an example of a(n) _____ attribute. ANSWER: single-valued DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 55. A(n) _____ attribute need not be physically stored within the database. ANSWER: derived DIFFICULTY: Difficulty: Easy REFERENCES: 4-1b Attributes LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 56. A relationship _____ is difficult to establish if only one side of the relationship is known. ANSWER: classification DIFFICULTY: Difficulty: Easy REFERENCES: 4-1c Relationships LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 57. When indicating cardinality, the first value represents the _____ number of associated entities. ANSWER: minimum DIFFICULTY: Difficulty: Easy REFERENCES: 4-1d Connectivity and Cardinality LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 58. The concept of relationship strength is based on how the _____ of a related entity is defined. ANSWER: primary key DIFFICULTY: Difficulty: Easy REFERENCES: 4-1f Relationship Strength LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 59. A(n) _____ relationship is also known as an identifying relationship. ANSWER: strong DIFFICULTY: Difficulty: Easy REFERENCES: 4-1f Relationship Strength LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 04: Entity Relationship (ER) Modeling into the database design process 60. The Crow’s Foot notation depicts the strong relationship with a(n) _____ line between the entities. ANSWER: solid DIFFICULTY: Difficulty: Easy REFERENCES: 4-1f Relationship Strength LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 61. A weak entity must be _____-dependent. ANSWER: existence DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1g Weak Entities LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 62. The Chen notation identifies a weak entity by using a double-walled entity _____. ANSWER: rectangle DIFFICULTY: Difficulty: Easy REFERENCES: 4-1g Weak Entities LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 63. Participation is _____ if one entity occurrence does not require a corresponding entity occurrence in a particular relationship. ANSWER: optional DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 64. In Crow’s Foot notation, an optional relationship between entities is shown by drawing a(n) _____ on the side of the optional entity. ANSWER: small circle (O) DIFFICULTY: Difficulty: Easy REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 65. Failure to understand the distinction between mandatory and optional _____ in relationships might yield designs in which awkward (and unnecessary) temporary rows (entity instances) must be created just to accommodate the creation of required entities. ANSWER: participation DIFFICULTY: Difficulty: Easy REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 04: Entity Relationship (ER) Modeling 66. A relationship _____ indicates the number of entities or participants associated with a relationship. ANSWER: degree DIFFICULTY: Difficulty: Easy REFERENCES: 4-1i Relationship Degree LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 67. A(n) _____ process is based on repetition of processes and procedures. ANSWER: iterative DIFFICULTY: Difficulty: Easy REFERENCES: 4-2 Developing an ER Diagram LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 68. Identifying the attributes of entities helps in the better understanding of _____ among entities. ANSWER: relationships DIFFICULTY: Difficulty: Easy REFERENCES: 4-2 Developing an ER Diagram LEARNING OBJECTIVES: 04.03 - See how ERD components affect database design and implementation 69. _____ not only helps database designers to stay on track during the design process, it also enables them to pick up the design thread when the time comes to modify the design. ANSWER: Documentation DIFFICULTY: Difficulty: Easy REFERENCES: 4-3 Database Design Challenges: Conflicting Goals LEARNING OBJECTIVES: 04.04 - Understand that real-world database design often requires the reconciliation of conflicting goals 70. In organizations that generate large numbers of transactions, _____ processing speeds are often a top priority in database design, which result in minimal access time. ANSWER: high DIFFICULTY: Difficulty: Moderate REFERENCES: 4-3 Database Design Challenges: Conflicting LEARNING OBJECTIVES: 04.04 - Understand that real-world database design often requires the reconciliation of conflicting goals Essay 71. Explain multivalued attributes with the help of examples. How are multivalued attributes indicated in the Chen Entity Relationship model? ANSWER: Multivalued attributes are attributes that can have many values. For instance, a person may have several college degrees, and a household may have several different phones, each with its own number. Similarly, a car's color may be subdivided into many colors for the roof, body, and trim. In the Chen Entity Relationship model, multivalued attributes are shown by a double line connecting the attribute to the entity. DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1b Attributes Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 04: Entity Relationship (ER) Modeling LEARNING OBJECTIVES: 04.01 - Identify the main characteristics of entity relationship components 72. What is a weak relationship? Provide an example. ANSWER: A weak relationship, also known as a non-identifying relationship, exists if the primary key of the related entity does not contain a primary key component of the parent entity. By default, relationships are established by having the primary key of the parent entity appear as a foreign key (FK) on the related entity (also known as the child entity). For example, suppose the 1:M relationship between COURSE and CLASS is defined as: COURSE (CRS_CODE, DEPT_CODE, CRS_DESCRIPTION, CRS_CREDIT) CLASS (CLASS_CODE, CRS_CODE, CLASS_SECTION, CLASS_TIME, ROOM_CODE, PROF_NUM) In this case, a weak relationship exists between COURSE and CLASS because CRS_CODE (the primary key of the parent entity) is only a foreign key in the CLASS entity. In this example, the CLASS primary key did not inherit a primary key component from the COURSE entity. DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1f Relationship Strength LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 73. Explain mandatory participation in an entity relationship. ANSWER: Mandatory participation means that one entity occurrence requires a corresponding entity occurrence in a particular relationship. If no optionality symbol is depicted with the entity, the entity is assumed to exist in a mandatory relationship with the related entity. If the mandatory participation is depicted graphically, it is typically shown as a small hash mark across the relationship line, similar to the Crow's Foot depiction of a connectivity of 1. The existence of a mandatory relationship indicates that the minimum cardinality is at least 1 for the mandatory entity. DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1h Relationship Participation LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 74. What is a ternary relationship? Provide some business rules examples that specify the need for a ternary or higherorder relationship. ANSWER: A ternary relationship implies an association among three different entities. Although most relationships are binary, the use of ternary and higher-order relationships does allow the designer some latitude regarding the semantics of a problem. Some business rules examples that specify the need for a ternary relationship are: • A DOCTOR writes one or more PRESCRIPTIONs. • A PATIENT may receive one or more PRESCRIPTIONs. • A DRUG may appear in one or more PRESCRIPTIONs. (Assume that the business rule states that each prescription contains only one drug. In short, if a doctor prescribes more than one drug, a separate prescription must be written for each drug.) DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1i Relationship Degree LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process 75. Explain recursive relationships with the help of an example. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 04: Entity Relationship (ER) Modeling ANSWER:

A recursive relationship is one in which a relationship can exist between occurrences of the same entity set. Such a condition is found within a unary relationship. For example, a 1:M unary relationship can be expressed by "an EMPLOYEE may manage many EMPLOYEEs, and each EMPLOYEE is managed by one EMPLOYEE." Finally, the M:N unary relationship may be expressed by "a COURSE may be a prerequisite to many other COURSEs, and each COURSE may have many other COURSEs as prerequisites." DIFFICULTY: Difficulty: Moderate REFERENCES: 4-1j Recursive Relationships LEARNING OBJECTIVES: 04.02 - Describe how relationships between entities are defined, refined, and incorporated into the database design process

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 05: Advanced Data Modeling True / False 1. The entity supertype contains common characteristics, and the entity subtypes each contain their own unique characteristics. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-1a Entity Supertypes and Subtypes LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 2. Entity supertypes and subtypes are organized in a specialization hierarchy. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 3. The relationships depicted within the specialization hierarchy are sometimes described in terms of “is-a” relationships. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 4. Within a specialization hierarchy, a supertype can exist only within the context of a subtype. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 5. One important inheritance characteristic is that all entity subtypes inherit their primary key attribute from their supertype. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 05: Advanced Data Modeling ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 6. A subtype contains attributes that are common to all of its supertypes. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 7. At the implementation level, the supertype and its subtype(s) depicted in the specialization hierarchy maintain a 1:1 relationship. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 8. Entity subtypes do not inherit the relationships in which the supertype entity participates. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 9. In specialization hierarchies with multiple levels of supertype and subtypes, a lower-level subtype can inherit only a few of the attributes and relationships from its upper-level supertypes. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 05: Advanced Data Modeling represented in ERDs and EERDs 10. The property of a subtype discriminator enables an entity supertype to inherit the attributes and relationships of the subtype. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 5-1d Subtype Discriminator LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 11. An entity supertype can have disjoint or overlapping entity subtypes. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 12. Disjoint subtypes are subtypes that contain nonunique subsets of the supertype entity set. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 13. Overlapping subtypes are subtypes that contain a unique subset of the supertype entity set. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 14. Implementing overlapping subtypes requires the use of one discriminator attribute for each subtype. a. True b. False ANSWER: True Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 05: Advanced Data Modeling DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 15. The completeness constraint can be partial or total. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 16. Specialization is the top-down process of identifying lower-level, more specific entity subtypes from a higher-level entity supertype. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1g Specialization and Generalization LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 17. An entity cluster is a "virtual" entity type used to represent multiple entities and relationships in the ERD. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-2 Entity Clustering LEARNING OBJECTIVES: 05.02 - Use entity clusters to represent multiple entities and relationships in an entity relationship 18. The function of the primary key is to describe an entity. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 19. To model time-variant data, one must create a new entity in an M:N relationship with the original entity. a. True Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 05: Advanced Data Modeling b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 5-4b Design Case 2: Maintaining History of Time-Variant Data LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases 20. A design trap occurs when a relationship is improperly or incompletely identified and is therefore represented in a way that is not consistent with the real world. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 5-4c Design Case 3: Fan Traps LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases Multiple Choice 21. The extended entity relationship model (EERM) is sometimes referred to as the _____. a. enclosed entity relationship model b. enhanced entity relationship model c. entity clustering relationship model d. extended entity relationship diagram ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-1 The Extended Entity Relationship Model LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 22. A(n)_____ is a generic entity type that is related to one or more entity subtypes. a. subtype discriminator b. inheritance c. specialization hierarchy d. entity supertype ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-1a Entity Supertypes and Subtypes LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 23. The _____ depicts the arrangement of higher-level entity supertypes (parent entities) and lower-level entity subtypes (child entities). a. subtype discriminator b. inheritance c. specialization hierarchy d. entity supertype ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 05: Advanced Data Modeling represented in ERDs and EERDs 24. Within a specialization hierarchy, every subtype can have _____ supertype(s) to which it is directly related. a. zero b. only one c. one or many d. many ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 25. A specialization hierarchy can have _____ level(s) of supertype/subtype relationships. a. zero b. only one c. one or many d. many ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 26. The property of _____ enables an entity subtype to inherit the attributes and relationships of the supertype. a. subtype discriminator b. inheritance c. specialization hierarchy d. entity supertype ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 27. One important inheritance characteristic is that all entity subtypes inherit their _____ key attribute from their supertype. a. primary b. natural c. foreign d. surrogate ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 28. At the implementation level, the supertype and its subtype(s) depicted in a specialization hierarchy maintain a(n) _____ relationship. a. self-referencing b. 1:1 c. 1:M d. M:N Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 05: Advanced Data Modeling ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-1c Inheritance LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 29. A(n) _____ is the attribute in the supertype entity that determines to which entity subtype each supertype occurrence is related. a. subtype discriminator b. inheritance discriminator c. specialization hierarchy d. entity supertype ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 5-1d Subtype Discriminator LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 30. The default comparison condition for the subtype discriminator attribute is the _____ comparison. a. nonequality b. less than c. greater than d. equality ANSWER: d DIFFICULTY: Difficulty:Easy REFERENCES: 5-1d Subtype Discriminator LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 31. Which of the following is a specialization hierarchy disjoint constraint scenario in case of partial completeness? a. Subtype discriminator can be null. b. Subtype discriminator cannot be null. c. Each supertype occurrence is a member of only one subtype. d. Each supertype occurrence is a member of at least one subtype. ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 32. Which of the following is a specialization hierarchy overlapping constraint scenario in case of partial completeness? a. Subtype sets are unique. b. Supertype has optional subtypes. c. Subtype discriminators cannot be null. d. Subtype does not have a supertype. ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 05: Advanced Data Modeling DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 33. Nonoverlapping subtypes are subtypes that contain a(n) _____ subset of the supertype entity set. a. entity b. subtypes c. unique d. nonunique ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 34. Overlapping subtypes are subtypes that contain _____ subsets of the supertype entity set. a. null b. exclusive c. solitary d. nonunique ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 35. A total completeness constraint is represented by a _____. a. smaller circle inside a bigger circle b. rhombus inside a circle c. double horizontal line under a circle d. single horizontal line above a circle ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 36. A partial completeness constraint is represented by _____. a. a dotted line b. two dashed lines c. a single horizontal line under a circle d. a double horizontal line over a circle ANSWER: c DIFFICULTY: Difficulty:Easy REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 05: Advanced Data Modeling represented in ERDs and EERDs 37. In the context of total completeness, in a(n) _____, every supertype occurrence is a member of only one subtype. a. foreign key constraint b. nonunique constraint c. overlapping constraint d. disjoint constraint ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 38. In the context of total completeness, in a(n) _____, every supertype occurrence is a member of at least one subtype. a. unique constraint b. disjoint constraint c. overlapping constraint d. foreign key constraint ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 39. _____ is the bottom-up process of identifying a higher-level, more generic entity supertype from lower-level entity subtypes. a. Specialization b. Generalization c. Normalization d. Total completeness ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-1g Specialization and Generalization LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 40. The purpose of an entity _____ is to simplify an entity-relationship diagram (ERD) and thus enhance its readability. a. constraint b. cluster c. interface d. discriminator ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-2 Entity Clustering LEARNING OBJECTIVES: 05.02 - Use entity clusters to represent multiple entities and relationships in an entity relationship Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 05: Advanced Data Modeling 41. An entity cluster is formed by combining multiple interrelated entities into _____. a. a single abstract entity object b. multiple abstract entity objects c. a single entity object d. multiple entity objects ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 5-2 Entity Clustering LEARNING OBJECTIVES: 05.02 - Use entity clusters to represent multiple entities and relationships in an entity relationship 42. The most important characteristic of an entity is its _____ key, used to uniquely identify each entity instance. a. primary b. natural c. foreign d. surrogate ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 5-3 Entity Integrity: Selecting Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 43. A _____ key is a real-world, generally accepted identifier used to uniquely identify real-world objects. a. primary b. natural c. foreign d. surrogate ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-3a Natural Keys and Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 44. If one exists, a data modeler uses a _____ as the primary key of the entity being modeled. a. foreign key b. combination key c. surrogate key d. natural identifier ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-3a Natural Keys and Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 45. A _____ is a primary key created by a database designer to simplify the identification of entity instances. a. composite key b. compound key c. natural key d. surrogate key ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-3d When to Use Surrogate Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 46. Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allowed only once in the _____ relationship. a. 0:1 b. 1:1 c. 1:M d. M:N Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 05: Advanced Data Modeling ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-3c When to Use Composite Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 47. The “_____” characteristic of a primary key states that the selected primary key must not be composed of any attribute(s) that might be considered a violation. a. unique values b. nonintelligent c. preferably single-attribute d. security-compliant ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 48. The “_____” characteristic of a primary key states that the primary key must uniquely identify each entity instance, must be able to guarantee unique values, and must not contain nulls. a. unique values b. nonintelligent c. preferably single-attribute d. security-complaint ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 49. According to the “preferably single-attribute” characteristic of a primary key, the primary key: a. must be able to guarantee unique attribute values. b. should have the minimum number of attributes possible. c. should have embedded semantic meaning associated with each attribute. d. must be composed of attributes that are free from security risks or violations. ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 50. The “_____” characteristic of a primary key states that the primary key should not have embedded semantic meaning. a. unique values b. nonintelligent c. preferably single-attribute d. security-compliant ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them Completion 51. The _____ is the result of adding more semantic constructs to the original entity relationship (ER) model. ANSWER: extended entity relationship model (EERM) Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 05: Advanced Data Modeling EERM (extended entity relationship model) extended entity relationship model EERM DIFFICULTY: Difficulty: Easy REFERENCES: 5-1 The Extended Entity Relationship Model LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 52. Disjoint subtypes are also known as _____ subtypes. ANSWER: non-overlapping nonoverlapping DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 53. Subtypes that contain nonunique subsets of the supertype entity set are known as _____ subtypes. ANSWER: overlapping DIFFICULTY: Difficulty: Easy REFERENCES: 5-1e Disjoint and Overlapping Constraints LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 54. The _____ specifies whether each entity supertype occurrence must also be a member of at least one subtype. ANSWER: completeness constraint DIFFICULTY: Difficulty: Easy REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 55. _____ completeness means that not every supertype occurrence is a member of a subtype. ANSWER: Partial DIFFICULTY: Difficulty: Easy REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 56. _____ completeness means that every supertype occurrence must be a member of at least one subtype. ANSWER: Total DIFFICULTY: Difficulty: Easy REFERENCES: 5-1f Completeness Constraint LEARNING OBJECTIVES: 05.01 Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 05: Advanced Data Modeling Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 57. Specialization is based on grouping _____ characteristics and relationships of the subtypes. ANSWER: unique DIFFICULTY: Difficulty: Easy REFERENCES: 5-1g Specialization and Generalization LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 58. An entity cluster is considered “virtual” or “_____” in the sense that it is not actually an entity in the final ERD. ANSWER: abstract DIFFICULTY: Difficulty: Easy REFERENCES: 5-2 Entity Clustering LEARNING OBJECTIVES: 05.02 - Use entity clusters to represent multiple entities and relationships in an entity relationship 59. Usually, a data modeler uses a natural identifier as the _____ of the entity being modeled, assuming that the entity has a natural identifier. ANSWER: primary key DIFFICULTY: Difficulty: Easy REFERENCES: 5-3a Natural Keys and Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 60. Unique values can be better managed when they are _____, because the database can use internal routines to implement a counter-style attribute that automatically increments values with the addition of each new row. ANSWER: numeric DIFFICULTY: Difficulty: Easy REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 61. Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allowed _____ in the M:N relationship. ANSWER: only once once DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3c When to Use Composite Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 62. Composite keys are useful as identifiers of weak entities, where the weak entity has a strong _____ relationship with the parent entity. ANSWER: identifying DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3c When to Use Composite Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 05: Advanced Data Modeling 63. A weak entity in a strong identifying relationship with a parent entity is normally used to represent a(n) _____ that is represented in the data model as two separate entities. ANSWER: real-world object DIFFICULTY: Difficulty: Easy REFERENCES: 5-3c When to Use Composite Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 64. One practical advantage of a(n) _____ key is that because it has no intrinsic meaning, values for it can be generated by the DBMS to ensure that unique values are always provided. surrogate ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 5-3d When to Use Surrogate Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 65. While using a surrogate key, one must ensure that the candidate key of the entity in question performs properly through the use of the “_____” and “not null” constraints. ANSWER: unique index DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3d When to Use Surrogate Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 66. From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes. ANSWER: time-variant DIFFICULTY: Difficulty: Easy REFERENCES: 5-4b Design Case 2: Maintaining History of Time-Variant Data LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases 67. A(n) _____ occurs when a relationship is improperly or incompletely identified and is therefore represented in a way that is not consistent with the real world. ANSWER: design trap DIFFICULTY: Difficulty: Easy REFERENCES: 5-4c Design Case 3: Fan Traps LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases 68. The main concern with redundant relationships is that they remain _____ across the model. ANSWER: consistent DIFFICULTY: Difficulty: Moderate REFERENCES: 5-4d Design Case 4: Redundant Relationships LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases 69. _____ keys work with primary keys to properly implement relationships in the relational model. ANSWER: Foreign DIFFICULTY: Difficulty: Easy REFERENCES: 5-4a Design Case 1: Implementing 1:1 Relationships LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 05: Advanced Data Modeling 70. A(n) _____ occurs when you have one entity in two 1:M relationships to other entities, thus producing an association among the other entities that is not expressed in the model. ANSWER: fan trap DIFFICULTY: Difficulty: Moderate REFERENCES: 5-4c Design Case 3: Fan Traps LEARNING OBJECTIVES: 05.04 - Apply flexible solutions for special data-modeling cases Essay 71. What do specialization hierarchies do? ANSWER: Entity supertypes and subtypes are organized in a specialization hierarchy, which depicts the arrangement of higher-level entity supertypes (parent entities) and lower-level entity subtypes (child entities). Specialization hierarchies enable the data model to capture additional semantic content (meaning) into the ERD. A specialization hierarchy provides the means to: • Support attribute inheritance. • Define a special supertype attribute known as the subtype discriminator. • Define disjoint/overlapping constraints and complete/partial constraints. DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1b Specialization Hierarchy LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 72. Differentiate between specialization and generalization. ANSWER: Specialization is the top-down process of identifying lower-level, more specific entity subtypes from a higher-level entity supertype. Specialization is based on grouping the unique characteristics and relationships of the subtypes. On the other hand, generalization is the bottom-up process of identifying a higher-level, more generic entity supertype from lowerlevel entity subtypes. Generalization is based on grouping the common characteristics and relationships of the subtypes. DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1g Specialization and Generalization LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs 73. Explain the two criteria that help a designer in determining when to use subtypes and supertypes. ANSWER: Two criteria help a designer determine when to use subtypes and supertypes: 1. There must be different, identifiable kinds or types of an entity in the user’s environment. 2. The different kinds or types of instances should each have one or more attributes that are unique to that kind or type of instance. DIFFICULTY: Difficulty: Moderate REFERENCES: 5-1a Entity Supertypes and Subtypes LEARNING OBJECTIVES: 05.01 Describe the main extended entity relationship (EER) model constructs and how they are represented in ERDs and EERDs Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 05: Advanced Data Modeling 74. Explain the “no change over time” characteristic of a primary key. ANSWER: If an attribute has semantic meaning, it might be subject to updates, which is why names do not make good primary keys. If a primary key is subject to change, the foreign key values must be updated, thus adding to the database work load. Furthermore, changing a primary key value means that one is basically changing the identity of an entity. In short, the PK should be permanent and unchangeable. DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3b Primary Key Guidelines LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them 75. In which two cases are composite primary keys particularly useful? ANSWER: Composite primary keys are particularly useful in two cases: 1. As identifiers of composite entities, in which each primary key combination is allowed only once in the M:N relationship. 2. As identifiers of weak entities, in which the weak entity has a strong identifying relationship with the parent entity. DIFFICULTY: Difficulty: Moderate REFERENCES: 5-3c When to Use Composite Primary Keys LEARNING OBJECTIVES: 05.03 - Describe the characteristics of good primary keys and how to select them

Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 06: Normalization of Database Tables True / False 1. Normalization works through a series of stages called normal forms. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 2. Normalization is a process that is used for changing attributes to entities. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 3. In order to meet performance requirements, portions of the database design may need to be occasionally denormalized. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 4. Denormalization produces a lower normal form. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 5. The objective of normalization is to ensure that each table conforms to the concept of well-formed relations. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 6. Relational models view data as part of a table or collection of tables in which all key values must be identified. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 06: Normalization of Database Tables b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 7. Repeating groups must be eliminated by ensuring that each row defines a single entity. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 8. A dependency of one nonprime attribute on another nonprime attribute is a partial dependency. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 9. Dependency diagrams are very helpful in getting a bird’s-eye view of all the relationships among a table’s attributes. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 10. Dependencies that are based on only a part of a composite primary key are called transitive dependencies. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 11. All relational tables satisfy the 1NF requirements. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 06: Normalization of Database Tables ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 12. In the context of partial dependencies, data redundancies occur because every row entry requires duplication of data. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 13. Since a partial dependency can exist only if a table's primary key is composed of several attributes, if a table in 1NF has a single-attribute primary key, then the table is automatically in 2NF. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3b Conversion to Second Normal Form (2NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 14. It is possible for a table in 2NF to exhibit transitive dependency, where the primary key may rely on one or more nonprime attributes to functionally determine other nonprime attributes. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3b Conversion to Second Normal Form (2NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 15. Data stored at their highest level of granularity are said to be atomic data. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 16. A table is in BCNF if every determinant in the table is a foreign key. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 06: Normalization of Database Tables ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 6-6a The Boyce-Codd Normal Form LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 17. A table is in fourth normal form if it is in third normal form and has no independent multivalued dependencies. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-6b Fourth Normal Form (4NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 18. Normalization represents a micro view of the entities within the ERD. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-7 Normalization and Database Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 19. The combination of normalization and ER modeling yields a useful ERD, whose entities can be translated into appropriate table structures. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 6-7 Normalization and Database Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 20. Normalization purity is often easy to sustain in the modern database environment. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 6-8 Denormalization LEARNING OBJECTIVES: 06.05 - Identify situations that require denormalization to generate information efficiently Multiple Choice 21. From a structural point of view, 3NF is better than _____. a. 2NF b. 3NF c. 5NF d. 6NF ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 06: Normalization of Database Tables DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 22. Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages are as high as you need to go in the normalization process. a. two b. three c. four d. five ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 23. From a structural point of view, 2NF is better than _____. a. 1NF b. 3NF c. 4NF d. BCNF ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 24. An attribute that is part of a key is known as a(n) _____ attribute. a. important b. nonprime c. prime d. entity ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 25. Attribute A _____ attribute B if all of the rows in the table that agree in value for attribute A also agree in value for attribute B. a. determines b. derives from c. controls d. owns ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 26. Some very specialized applications may require normalization beyond the _____. a. 1NF b. 2NF c. 3NF d. 4NF ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 06: Normalization of Database Tables LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 27. Of the following normal forms, _____ is mostly of theoretical interest. a. 1NF b. 3NF c. BCNF d. DKNF ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 28. A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on the primary key is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.02 - Identify and describe each of the normal forms: 1NF, 2NF, 3NF, BCNF, and 4NF 29. A(n) _____ exists when there are functional dependencies such that Y is functionally dependent on X, Z is functionally dependent on Y, and X is the primary key. a. partial dependency b. repeating group c. atomic attribute d. transitive dependency ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 30. A _____ derives its name from the fact that a collection of multiple entries of the same type can exist for any single key attribute occurrence. a. partial dependency b. transitive dependency c. repeating group d. primary key ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 31. A relational table must not contain a(n) _____. a. entity b. attribute c. relationship d. repeating group ANSWER: d DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 06: Normalization of Database Tables REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 32. In a(n) _____ diagram, the arrows above the attributes indicate all desirable dependencies. a. Chen b. dependency c. functionality d. ER ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 33. Dependencies based on only a part of a composite primary key are known as _____ dependencies. a. primary b. partial c. incomplete d. composite ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 34. If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute. a. Boyce-Codd normal forms b. redundancies c. time-variances d. partial dependencies ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 6-3c Conversion to Third Normal Form (3NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 35. A table that is in 2NF and contains no transitive dependencies is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 6-3c Conversion to Third Normal Form (3NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 36. Improving _____ leads to more flexible queries. a. atomicity b. normalization c. denormalization d. derived attribute ANSWER: a DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 06: Normalization of Database Tables REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 37. An atomic attribute _____. a. cannot exist in a relational table b. cannot be further subdivided c. displays multiplicity d. is always chosen to be a foreign key ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 38. The most likely data type for a surrogate key is _____. a. character b. date c. logical d. numeric ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 39. Granularity refers to _____. a. the size of a table

b. the level of detail represented by the values in a table's row d. the number of rows in a table

c. the number of attributes represented in a table ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures

40. From a system functionality point of view, _____ attribute values can be calculated when they are needed to write reports or invoices. a. derived b. atomic c. granular d. historical ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 41. In a real-world environment, we must strike a balance between design integrity and _____. a. robustness b. flexibility c. uniqueness d. ease of use ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 6-5 Surrogate Key Considerations LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 06: Normalization of Database Tables 42. To generate a surrogate key, Microsoft Access uses a(n) _____ data type. a. character b. sequence c. AutoNumber d. identity ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 6-5 Surrogate Key Considerations LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 43. BCNF can be violated only if the table contains more than one _____ key. a. primary b. candidate c. foreign d. secondary ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 6-6a The Boyce-Codd Normal Form LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 44. When a table contains only one candidate key, _____ are considered to be equivalent. a. the 1NF and the 2NF b. the 3NF and the BCNF c. the 4NF and the 3NF d. the BCNF and the DKNF ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 6-6a The Boyce-Codd Normal Form LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 45. In a _____ situation, one key determines multiple values of two other attributes and those attributes are independent of each other. a. multivalued dependency b. transitive dependency c. partial dependency d. functional dependency ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 6-6b Fourth Normal Form (4NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 46. A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____. a. 1NF b. 2NF c. 3NF d. 4NF ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 6-6b Fourth Normal Form (4NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 06: Normalization of Database Tables 47. A table is in 4NF if it is in 3NF, and _____. a. all attributes must be dependent on the primary key and must be dependent on each other b. all attributes are unrelated c. it has no multivalued dependencies d. no column contains the same values ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.02 - Identify and describe each of the normal forms: 1NF, 2NF, 3NF, BCNF, and 4NF 48. An example of denormalization is using a _____ denormalized table to hold report data. This is required when creating a tabular report in which the columns represent data that are stored in the table as rows. a. transitive b. 3NF c. component d. temporary ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 6-8 Denormalization LEARNING OBJECTIVES: 06.05 - Identify situations that require denormalization to generate information efficiently 49. Data warehouse routinely uses _____ structures in its complex, multilevel, multisource data environment. a. 1NF b. 2NF c. 3NF d. 4NF ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 6-8 Denormalization LEARNING OBJECTIVES: 06.05 - Identify situations that require denormalization to generate information efficiently 50. _____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely. a. Normalized b. Data warehouse c. Temporary d. Report ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 6-8 Denormalization LEARNING OBJECTIVES: 06.05 - Identify situations that require denormalization to generate information efficiently Completion 51. If database tables are treated as though they were files in a file system, the _____ never has a chance to demonstrate its superior data-handling capabilities. ANSWER: RDBMS relational database management system relational database management system (RDBMS) RDBMS (relational database management system) DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 06: Normalization of Database Tables LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 52. The price paid for increased performance through denormalization is a larger amount of _____. ANSWER: redundancy data redundancy DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 53. A dependency based on only a part of a composite primary key is called a(n) _____. ANSWER: partial dependency DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 54. In order to meet _____ requirements, you may have to denormalize some portions of a database design. ANSWER: performance DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 55. _____ is a process to help reduce the likelihood of data anomalies. ANSWER: Normalization DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 56. Any attribute that is at least part of a key is known as a(n) _____. ANSWER: prime attribute key attribute DIFFICULTY: Difficulty: Easy REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 57. When designing a new database structure based on the business requirements of the end users, the database designer will construct a data model using a technique such as _____. Crow's Foot notation ERDs ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 6-2 The Need for Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 58. The _____ is central to a discussion of normalization. concept of keys ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 06: Normalization of Database Tables 59. All relational tables satisfy the _____ requirements. ANSWER: 1NF first normal form first normal form (1NF) 1NF (first normal form) DIFFICULTY: Difficulty: Easy REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.02 - Identify and describe each of the normal forms: 1NF, 2NF, 3NF, BCNF, and 4NF 60. Because a partial dependency can exist only when a table's primary key is composed of several attributes, a table whose _____ key consists of only a single attribute is automatically in 2NF once it is in 1NF. ANSWER: primary DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3b Conversion to Second Normal Form (2NF) LEARNING OBJECTIVES: 06.02 - Identify and describe each of the normal forms: 1NF, 2NF, 3NF, BCNF, and 4NF 61. Any attribute whose value determines other values within a row is known as a(n) _____. ANSWER: determinant DIFFICULTY: Difficulty: Easy REFERENCES: 6-3c Conversion to Third Normal Form (3NF) LEARNING OBJECTIVES: 06.02 - Identify and describe each of the normal forms: 1NF, 2NF, 3NF, BCNF, and 4NF 62. An attribute that cannot be further subdivided is said to display _____. ANSWER: atomicity DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 63. _____ refers to the level of detail represented by the values stored in a table's row. ANSWER: Granularity DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 64. In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of _____ keys. ANSWER: surrogate DIFFICULTY: Difficulty: Easy REFERENCES: 6-4 Improving the Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 65. It becomes difficult to create a suitable _____ key when the related table uses a composite primary key. ANSWER: foreign DIFFICULTY: Difficulty: Easy REFERENCES: 6-5 Surrogate Key Considerations Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 06: Normalization of Database Tables LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 66. In the _____, no row may contain two or more multivalued facts about an entity. ANSWER: 4NF fourth normal form fourth normal form (4NF) 4NF (fourth normal form) DIFFICULTY: Difficulty: Moderate REFERENCES: 6-6b Fourth Normal Form (4NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 67. An ERD is created through a(n) _____ process. ANSWER: iterative DIFFICULTY: Difficulty: Easy REFERENCES: 6-7 Normalization and Database Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 68. The combination of _____ and ER modeling yields a useful ERD, whose entities may now be translated into appropriate table structures. ANSWER: normalization DIFFICULTY: Difficulty: Easy REFERENCES: 6-7 Normalization and Database Design LEARNING OBJECTIVES: 06.04 - Apply normalization rules to evaluate and correct table structures 69. Unnormalized tables yield no simple strategies for creating virtual tables known as _____. views ANSWER: DIFFICULTY: Difficulty:Easy REFERENCES: 6-8 Denormalization LEARNING OBJECTIVES: 06.05 - Identify situations that require denormalization to generate information efficiently 70. According to the data-modeling checklist, _____ should be nouns that are familiar to business, should be short and meaningful, and should document abbreviations, synonyms, and aliases for each entity. ANSWER: entity names DIFFICULTY: Difficulty: Easy REFERENCES: 6-9 Data-Modeling Checklist LEARNING OBJECTIVES: 06.06 - Use a data-modeling checklist to check that the ERD meets a set of minimum requirements Essay 71. Explain normalization and its different forms. ANSWER: Normalization is a process for evaluating and correcting table structures to minimize data redundancies, thereby reducing the likelihood of data anomalies. The normalization process involves assigning attributes to tables based on the concept of determination. Normalization works through a series of stages called normal forms. The first three stages are described as first normal form (1NF), second normal form (2NF), and third normal form (3NF). From a structural point of view, 2NF is better than 1NF, and 3NF is better than 2NF. For most Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 06: Normalization of Database Tables purposes in business database design, 3NF is as high as you need to go in the normalization process. However, you will discover that properly designed 3NF structures also meet the requirements of fourth normal form (4NF). DIFFICULTY: Difficulty: Moderate REFERENCES: 6-1 Database Tables and Normalization LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 72. What characteristics do tables that conform to the concept of well-informed relations have? ANSWER: Tables that conform to the concept of well-informed relations have the following characteristics: 1. Each table represents a single subject. 2. No data item will be unnecessarily stored in more than one table. This results in tables that have lower redundancies. The reason for this requirement is to ensure that the data is updates in only one place. 3. All nonprime attributes in a table are dependent on the primary key alone. The reason for this requirement is to ensure that the data is uniquely identifiable by a primary key value. 4. Each table is void of insertion, update, or deletion anomalies, which ensure the integrity and consistency of the data. DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3 The Normalization Process LEARNING OBJECTIVES: 06.01 - Explain normalization and its role in the database design process 73. Describe a dependency diagram and explain its purpose. ANSWER: Dependency diagrams are very helpful in getting a bird’s eye view of all the relationships among a table’s attributes, and their use makes it less likely that you will overlook an important dependency. The following are features of a dependency diagram: 1. The primary key attributes are bold, underlined, and shaded in a different color. 2. The arrows above the attributes indicate all desirable dependencies—that is, dependencies based on the primary key. 3. The arrows below the dependency diagram indicate less desirable dependencies. Two types of such dependencies exist: a. Partial dependencies. A dependency based on only a part of a composite primary key is a partial dependency. b. Transitive dependencies. A transitive dependency is a dependency of one nonprime attribute on another nonprime attribute. The problem with transitive dependencies is that they still yield data anomalies. DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3a Conversion to First Normal Form (1NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 74. What steps are involved in the conversion to third normal form? ANSWER: Step 1: Make New Tables to Eliminate Transitive Dependencies For every transitive dependency, write a copy of its determinant as a primary key for a new table. A determinant is any attribute whose value determines other values within a row. If Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 06: Normalization of Database Tables you have three different transitive dependencies, you will have three different determinants. As with the conversion to 2NF, it is important for the determinant remain in the original table to serve as a foreign key. Step 2: Reassign Corresponding Dependent Attributes Identify the attributes that are dependent on each determinant identified in Step 1. Place the dependent attributes in the new tables with their determinants and remove them from their original tables. DIFFICULTY: Difficulty: Moderate REFERENCES: 6-3c Conversion to Third Normal Form (3NF) LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms 75. Explain the Boyce-Codd normal form (BCNF). How is it related to other normal forms? ANSWER: A table is in Boyce-Codd normal form (BCNF) when every determinant in the table is a candidate key. A candidate key has the same characteristics as a primary key, but for some reason, it was not chosen to be the primary key. Clearly, when a table contains only one candidate key, the 3NF and the BCNF are equivalent. In other words, BCNF can be violated only when the table contains more than one candidate key. Most designers consider the BCNF to be a special case of the 3NF. In fact, if the techniques shown in this chapter are used, most tables conform to the BCNF requirements once the 3NF is reached. DIFFICULTY: Difficulty: Moderate REFERENCES: 6-6a The Boyce-Codd Normal Form LEARNING OBJECTIVES: 06.03 - Explain how normal forms can be transformed from lower normal forms to higher normal forms

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 07: Introduction to Structured Query Language (SQL) True / False 1. A database language enables the user to perform complex queries designed to transform the raw data into useful information. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 2. SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 3. The ANSI SQL standards are also accepted by the ISO. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 4. The COMMIT command does not permanently save all changes. In order to do that, you must use SAVE. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 5. All SQL commands must be issued on a single line. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-2 Basic SELECT Queries LEARNING OBJECTIVES: 07.02 - Join multiple tables in a single SQL query 6. Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command’s components. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 07: Introduction to Structured Query Language (SQL) b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-2 Basic SELECT Queries LEARNING OBJECTIVES: 07.02 - Join multiple tables in a single SQL query 7. An alias cannot be used when a table is required to be joined to itself in a recursive query. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 7-4h Recursive Joins LEARNING OBJECTIVES: 07.02 - Join multiple tables in a single SQL query 8. Oracle users can use the Access QBE (query by example) query generator. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-6a Selecting Rows with Conditional Restrictions LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 9. You can select partial table contents by naming the desired fields and by placing restrictions on the rows to be included in the output. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-6a Selecting Rows with Conditional Restrictions LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 10. Comparison operators cannot be used to place restrictions on character-based attributes. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-6b Using Comparison Operators on Character Attributes LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 11. String comparisons are made from left to right. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-6b Using Comparison Operators on Character Attributes Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 07: Introduction to Structured Query Language (SQL) LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 12. Date procedures are often more software-specific than other SQL procedures. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-6c Using Comparison Operators on Dates LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 13. SQL allows the use of logical restrictions on its inquiries such as OR, AND, and NOT. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-6d Logical Operators: AND, OR, and NOT LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 14. You cannot insert a row containing a null attribute value using SQL. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 15. ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 16. The conditional LIKE must be used in conjunction with wildcard characters. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 17. Most SQL implementations yield case-insensitive searches. a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 07: Introduction to Structured Query Language (SQL) ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 18. Some RDBMSs, such as Microsoft Access, automatically make the necessary conversions to eliminate case sensitivity. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 19. The COUNT function is designed to tally the number of non-null "values" of an attribute, and is often used in conjunction with the DISTINCT clause. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 7-7a Aggregate Functions LEARNING OBJECTIVES: 07.04 - Aggregate data across groups of rows 20. Numeric functions take one numeric parameter and return one value. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 7-9b Numeric Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation Multiple Choice 21. The SQL data manipulation command HAVING: a. restricts the selection of rows based on a conditional b. restricts the selection of grouped rows based on a expression. condition. c. modifies an attribute’s values in one or more table’s d. groups the selected rows based on one or more rows. attributes. ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 22. The SQL command that allows a user to permanently save data changes is _____. a. INSERT b. SELECT c. COMMIT d. UPDATE Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 07: Introduction to Structured Query Language (SQL) ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 23. The _____ command defines a default value for a column when no value is given. a. CHECK b. UNIQUE c. NOT NULL d. DEFAULT ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 24. The _____ command restricts the selection of grouped rows based on a condition. a. DISPLAY b. HAVING c. FROM d. CONVERT ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 25. A(n) _____ query specifies which data should be retrieved and how it should be filtered, aggregated, and displayed. a. INSERT b. SELECT c. COMMIT d. UPDATE ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 7-1b SQL Queries LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 26. A(n) _____ is an alternate name given to a column or table in any SQL statement. a. alias b. data type c. stored function d. trigger ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-3a Using Column Aliases LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 27. According to the rules of precedence, which of the following computations should be completed first? a. Additions and subtractions b. Multiplications and divisions c. Operations within parentheses d. Power operations ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 7-3c Arithmetic Operators: The Rule of Precedence LEARNING OBJECTIVES: 07.02 - Join multiple tables in a single SQL query Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 07: Introduction to Structured Query Language (SQL) 28. Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another? a. SELECT ONLY V_CODE b. SELECT UNIQUE V_CODE FROM PRODUCT; FROM PRODUCT; c. SELECT DIFFERENT V_CODE d. SELECT DISTINCT V_CODE FROM PRODUCT; FROM PRODUCT; ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 7-3e Listing Unique Values LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 29. When using a(n) _____ join, only rows from the tables that match on a common value are returned. a. full b. outer c. inner d. set ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 7-4 FROM Clause Options LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 30. A(n) _____ join will select only the rows with matching values in the common attribute(s). a. natural b. outer c. full d. cross ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 7-4a Natural Join LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 31. If a designer wishes to create an inner join, but the two tables do not have a commonly named attribute, he can use a(n) _____ clause. a. OF b. USING c. HAS d. JOIN ON ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 7-4c JOIN ON Syntax LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 32. A(n) _____ join returns not only the rows matching the join condition (that is, rows with matching values in the common columns) but also the rows with unmatched values. a. outer b. inner c. equid. cross ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-4e Outer Joins LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 33. The syntax for a left outer join is _____. Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 07: Introduction to Structured Query Language (SQL) a. SELECT FROM WHERE c. SELECT WHERE

column-list table1 OUTER JOIN table2 LEFT join-condition column-list LEFT table1 = table

b. SELECT FROM ON d. SELECT FROM WHERE

column-list table1 LEFT [OUTER] JOIN table2 join-condition column-list table1 LEFT table2 [JOIN] join-condition

ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 7-4e Outer Joins LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 34. A(n) _____ join performs a relational product (also known as the Cartesian product) of two tables. a. full b. cross c. natural d. equiANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 7-4f Cross Join LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 35. How many rows would be returned from a cross join of tables A and B, if A contains 8 rows and B contains 18? a. 8 b. 18 c. 26 d. 144 ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 7-4f Cross Join LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 36. Which comparison operator indicates a value is not equal? a. < b. <= c. >= d. <> ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 7-6a Selecting Rows with Conditional Restrictions LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 37. What type of command does this SQL statement use? SELECT P_CODE, P_DESCRIPT, P_PRICE_V_NAME FROM PRODUCT, VENDOR WHERE PRODUCT.V_CODE=VENDOR. V_CODE a. set operator b. natural join c. "old-style" join d. procedural statement ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 7-6e Old-Style Joins LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 07: Introduction to Structured Query Language (SQL) 38. The special operator used to check whether an attribute value is within a range of values is _____. a. BETWEEN b. NULL c. LIKE d. IN ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 39. The special operator used to check whether an attribute value matches a given string pattern is _____. a. BETWEEN b. IS NULL c. LIKE d. IN ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 40. The SQL aggregate function that gives the number of rows containing non-null values for a given column is _____. a. COUNT b. MIN c. MAX d. SUM ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-7a Aggregate Functions LEARNING OBJECTIVES: 07.04 - Aggregate data across groups of rows 41. A(n) _____ is a query that is embedded (or nested) inside another query. a. alias b. operator c. subquery d. view ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 7-8 Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries 42. In subquery terminology, the first query in the SQL statement is known as the _____ query. a. outer b. left c. inner d. base ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-8 Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries 43. The special operator used to check whether a subquery returns any rows is _____. a. BETWEEN b. EXISTS c. LIKE d. IN ANSWER: b DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 07: Introduction to Structured Query Language (SQL) REFERENCES: 7-8g Correlated Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries 44. Which is a feature of a correlated subquery? a. The inner subquery executes first.

b. The outer subquery initiates the process of execution in a subquery. d. The outer subquery executes independent of the inner subquery.

c. The inner subquery initiates the process of execution in a subquery. ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 7-8g Correlated Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries

45. The _____ function returns the current system date in MS Access. a. TO_DATE() b. SYSDATE() c. DATE() d. TODAY() ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 7-9a Date and Time Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 46. When using the Oracle TO_DATE function, the code _____ represents a three-letter month name. a. MON b. MM3 c. MONTH d. MM ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-9a Date and Time Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 47. _____ is a string function that returns the number of characters in a string value. a. LENGTH b. SUBSTRING c. CONCAT d. UCASE ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-9c String Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 48. The Oracle _____ function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. a. NVL b. TO_CHAR c. DECODE d. CONVERT ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 7-9c String Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 07: Introduction to Structured Query Language (SQL) 49. In Oracle, the _____ function converts a date to a character string. a. CONVERT() b. TO_DATE c. TO_CHAR() d. TO_STRING() ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 7-9d Conversion Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 50. _____ is a relational set operator. a. EXCEPT b. PLUS c. ALL d. EXISTS ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 7-10 Relational Set Operators LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation Completion 51. The basic SQL vocabulary has fewer than _____words. ANSWER: 100 one hundred a hundred DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 52. The _____ specification is used to avoid having duplicated values in a column. UNIQUE ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 53. In the SQL environment, the word _____ covers both questions and actions. ANSWER: query DIFFICULTY: Difficulty: Easy REFERENCES: 7-1b SQL Queries LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 54. A(n) _____ character is a symbol that can be used as a general substitute for other characters or commands. ANSWER: wildcard wild card DIFFICULTY: Difficulty: Easy REFERENCES: 7-3 SELECT Statement Options LEARNING OBJECTIVES: 07.02 - Join multiple tables in a single SQL query 55. The _____ condition is generally composed of an equality comparison between the foreign key and the primary key of Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 07: Introduction to Structured Query Language (SQL) related tables. join ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 7-4 FROM Clause Options LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 56. A(n) _____ order sequence is a multilevel ordered sequence that can be created easily by listing several attributes, separated by commas, after the ORDER BY clause. ANSWER: cascading DIFFICULTY: Difficulty: Easy REFERENCES: 7-5 ORDER BY Clause Options LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 57. An alias is especially useful when a table must be joined to itself in a(n) _____ query. ANSWER: recursive DIFFICULTY: Difficulty: Easy REFERENCES: 7-4h Recursive Joins LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 58. The _____ command, coupled with appropriate search conditions, is an incredibly powerful tool that enables a user to transform data into information. ANSWER: SELECT DIFFICULTY: Difficulty: Easy REFERENCES: 7-6 WHERE Clause Options LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 59. A specialty field in mathematics, known as _____ algebra, is dedicated to the use of logical operators. ANSWER: Boolean DIFFICULTY: Difficulty: Easy REFERENCES: 7-6d Logical Operators: AND, OR, and NOT LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 60. In SQL, all _____ expressions evaluate to true or false. ANSWER: conditional DIFFICULTY: Difficulty: Easy REFERENCES: 7-6d Logical Operators: AND, OR, and NOT LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 61. Rows can be grouped into smaller collections quickly and easily using the _____ clause within the SELECT statement. ANSWER: GROUP BY DIFFICULTY: Difficulty: Easy REFERENCES: 7-7b Grouping Data LEARNING OBJECTIVES: 07.04 - Aggregate data across groups of rows 62. The _____ clause of the GROUP BY statement operates very much like the WHERE clause in the SELECT statement. Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 07: Introduction to Structured Query Language (SQL) ANSWER: HAVING DIFFICULTY: Difficulty: Easy REFERENCES: 7-7c HAVING Clause LEARNING OBJECTIVES: 07.04 - Aggregate data across groups of rows 63. A(n) _____, also known as a nested query or an inner query, is a query that is embedded (or nested) inside another query. ANSWER: subquery DIFFICULTY: Difficulty: Easy REFERENCES: 7-8 Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries 64. DATE() and SYSDATE are special functions that return today’s date in MS Access and _____, respectively. ANSWER: Oracle DIFFICULTY: Difficulty: Easy REFERENCES: 7-9a Date and Time Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 65. _____ functions allow you to take a value of a given data type and convert it to the equivalent value in another data type. ANSWER: Conversion DIFFICULTY: Difficulty: Easy REFERENCES: 7-9d Conversion Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 66. “_____” means that the names of the relation attributes must be the same and their data types must be alike. ANSWER: Union-compatible DIFFICULTY: Difficulty: Easy REFERENCES: 7-10 Relational Set Operators LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 67. The _____ statement in SQL combines rows from two queries and returns only the rows that appear in the first set but not in the second. ANSWER: EXCEPT DIFFICULTY: Difficulty: Easy REFERENCES: 7-10 Relational Set Operators LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 68. The _____ operator could be used in place of INTERSECT if the DBMS does not support it. ANSWER: IN DIFFICULTY: Difficulty: Easy REFERENCES: 7-10e Syntax Alternatives LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 69. The _____ operator could be used in place of EXCEPT (MINUS) if the DBMS does not support it. ANSWER: NOT IN Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 07: Introduction to Structured Query Language (SQL) DIFFICULTY: Difficulty: Easy REFERENCES: 7-10 Relational Set Operators LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation 70. The syntax of the EXCEPT statement in Oracle is _____. ANSWER: query EXCEPT query DIFFICULTY: Difficulty: Easy REFERENCES: 7-10d Except (Minus) LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation Essay 71. Explain the SQL function categories. ANSWER: • SQL functions fit into several broad categories: 1. Data definition language (DDL): it includes commands to create database objects such as tables, indexes, and views, as well as commands to define access rights to those databases objects. 2. Data manipulation language (DML): it includes commands to insert, update, delete, and retrieve data within the database tables. 3. Transaction control language (TCL): the DML commands in SQL are executed within the context of a transaction, which is a logical unit of work composed of one or more SQL statements, as defined by business rules (see Chapter 10, Transaction Management and Concurrency Control). SQL provides commands to control the processing of these statements an indivisible unit of work. These will be discussed in Chapter 8, after you learn about the DML commands that compose a transaction. 4. Data control language (DCL): data control commands are used to control access to data objects, such as giving a one user permission to only view the PRODUCT table, and giving another use permission to change the data in the PRODUCT table. DIFFICULTY: Difficulty: Moderate REFERENCES: 7-1 Introduction to SQL LEARNING OBJECTIVES: 07.01 - Retrieve specified columns of data from a database 72. What are the wildcard characters that are used with the LIKE command? Provide one or more examples of each. ANSWER: The LIKE special operator is used in conjunction with wildcards to find patterns within string attributes. Standard SQL allows a user to use the percentage sign (%) and underscore (_) wildcard characters to make matches when the entire string is not known: % means any and all following or preceding characters are eligible. For example: 'J%' includes Johnson, Jones, Jernigan, July, and J-231Q. Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 07: Introduction to Structured Query Language (SQL) 'Jo%' includes Johnson and Jones. '%n' includes Johnson and Jernigan. _ means any one character may be substituted for the underscore. For example: '_23-456-6789' includes 123-456-6789, 223-456-6789, and 323-456-6789. '_23-_56-678_' includes 123-156-6781, 123-256-6782, and 823-956-6788. '_o_es' includes Jones, Cones, Cokes, totes, and roles. DIFFICULTY: Difficulty: Moderate REFERENCES: 7-6f Special Operators LEARNING OBJECTIVES: 07.03 - Restrict data retrievals to rows that match complex criteria 73. What is a subquery? What is always executed first? ANSWER: A subquery, also known as a nested query or an inner query, is a query that is embedded (or nested) inside another query. The inner query is always executed first by the RDBMS. DIFFICULTY: Difficulty: Moderate REFERENCES: 7-8 Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries 74. What are the four different types of results that can be returned from a subquery? ANSWER: A subquery can return one or more values. One single value (one column and one row): This subquery is used anywhere a single value is expected, as in the right side of a comparison expression. An example is the preceding UPDATE subquery, in which an average price is assigned to the product’s price. When a value is assigned to an attribute, a single value is assigned and not a list of them. Therefore, the subquery must return only one value (one column, one row). If the query returns multiple values, the DBMS generates an error. A list of values (one column and multiple rows): This type of subquery is used anywhere a list of values is expected, such as when using the IN clause—for example, when comparing the vendor code to a list of vendors. Again, in this case, there is only one column of data with multiple value instances. This type of subquery is used frequently in combination with the IN operator in a WHERE conditional expression. A virtual table (multicolumn, multirow set of values): This type of subquery can be used anywhere a table is expected, such as when using the FROM clause. The fourth result that a subquery can return is no value at all. It is called NULL. DIFFICULTY: Difficulty: Moderate REFERENCES: 7-8 Subqueries LEARNING OBJECTIVES: 07.05 - Create subqueries to preprocess data for inclusion in other queries 75. Describe the important features and applications of SQL functions. ANSWER: SQL functions are very useful tools. Functions always use a numerical, date, or string value. The value may be part of the command itself (a constant or literal) or it may be an attribute located in a table. Therefore, a function may appear anywhere in a SQL statement where a value or an attribute can be used. There are many types of SQL functions, such as arithmetic, trigonometric, string, date, and time functions. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 07: Introduction to Structured Query Language (SQL) These functions are useful when all employees need to be ordered by year of birth, or when a marketing department wants to generate a list of all customers ordered by zip code and the first three digits of their telephone numbers. In both of these cases, data elements that are not present as such in the database will be required; instead, an SQL function that can be derived from an existing attribute is required. DIFFICULTY: Difficulty: Moderate REFERENCES: 7-9 SQL Functions LEARNING OBJECTIVES: 07.06 - Identify and use a variety of SQL functions for string, numeric, and date manipulation

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 08: Advanced SQL True / False 1. A view is a virtual table based on a SELECT query. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-5 Virtual Tables: Creating a View LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 2. A sequence is not associated with a table and can be dropped from a database with a DROP SEQUENCE command. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-6 Sequences LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 3. To remedy the lack of procedural functionality in SQL, and to provide some standardization within the many vendor offerings, the SQL-99 standard defined the use of persistent stored modules. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 4. SQL supports the conditional execution of procedures (IF-THEN-ELSE statements) that are typically supported by a programming language. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 5. A persistent stored module is stored and executed on the database client machine. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 08: Advanced SQL 6. Every PL/SQL block must be given a name. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 7. In Oracle, you can use the SQL*Plus command SHOW ERRORS to help you diagnose errors found in PL/SQL blocks. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 8. The most useful feature of PL/SQL blocks is that they let a designer create code that can be named, stored, and executed by the DBMS. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 9. Automating business procedures and automatically maintaining data integrity and consistency are trivial in a modern business environment. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 10. The DECLARE section in the trigger is used to declare any variables used inside the trigger code. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 08: Advanced SQL PL/SQL functions 11. A trigger is procedural SQL code that is automatically invoked by the RDBMS upon the occurrence of a given data manipulation event. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 12. Triggers can only be used to update table values. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 13. A statement-level trigger is assumed if a designer omits the FOR EACH ROW keywords. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 14. A row-level trigger is assumed if we omit the FOR EACH ROW keywords and a statement-level trigger required the use of the FOR EACH ROW keyword. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 15. MySQL allows multiple triggering conditions per trigger. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 08: Advanced SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 16. BEFORE means before the changes are made in memory but after the changes are permanently saved to disk. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 17. Just like database triggers, stored procedures are stored in the database. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7b Stored Procedures LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 18. One of the major advantages of stored procedures is that they can be used to encapsulate and represent business transactions. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 8-7b Stored Procedures LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 19. Stored procedures must have at least one argument. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7b Stored Procedures LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 20. An explicit cursor must return two or more rows. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 8-7c PL/SQL Processing with Cursors Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 08: Advanced SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions Multiple Choice 21. When you create a new database, the RDBMS automatically creates the data _____ tables in which to store the metadata and creates a default database administrator. a. index b. chapter c. dictionary d. appendix ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 8-1b Creating the Database LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 22. Which SQL format would be best used for a small, numeric data type? a. INTEGER b. SMALLINT c. NUMERIC(L,D) d. CHAR(L) ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 8-1d Data Types LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 23. When writing SQL table-creating command sequences, the entire table definition is enclosed in _____. a. asterisks b. commas c. quotations d. parentheses ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 24. The _____ specification creates an individual index on a respective attribute; use it to avoid having duplicated values in a column. a. UNIQUE b. NOT NULL c. UPDATE d. VARCHAR ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 25. Words used by a system that cannot be used for any other purpose are called _____ words. For example, in Oracle SQL, the word INITIAL cannot be used to name tables or columns. a. reserved b. unique c. null d. character ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 08: Advanced SQL LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 26. You cannot have an invalid entry in the foreign key column; at the same time, you cannot delete a vendor row as long as a product row references that vendor. This is known as _____. a. batch updating b. referential integrity c. authentication d. cross joining ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 27. The _____ constraint assigns a value to an attribute when a new row is added to a table. a. NOT NULL b. CASCADE c. UNIQUE d. DEFAULT ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-2b SQL Constraints LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 28. The _____ constraint is used to validate data when an attribute value is entered. a. UNIQUE b. CASCADE c. CHECK d. SET NULL ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 8-2b SQL Constraints LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 29. The CREATE TABLE command lets you define constraints when you use the CONSTRAINT keyword, known as a(n) _____ constraint. a. column b. table c. index d. cell ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 8-2b SQL Constraints LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 30. Using the _____ command, SQL indexes can be created on the basis of any selected attribute. a. CREATE INDEX b. UPDATE CASCADE c. SELECT d. VARCHAR ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-2d SQL Indexes LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 31. All changes in a table structure are made using the _____ TABLE command, followed by a keyword that produces the specific changes a user wants to make. Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 08: Advanced SQL a. ALTER b. COMMIT c. UPDATE d. ROLLBACK ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-3 Altering Table Structures LEARNING OBJECTIVES: 08.03 - Manipulate the structure of existing tables to add, modify, and remove columns and constraints 32. A table can be deleted from the database by using the _____ TABLE command. a. DROP b. DELETE c. MODIFY d. ERASE ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-3e Deleting a Table from the Database LEARNING OBJECTIVES: 08.03 - Manipulate the structure of existing tables to add, modify, and remove columns and constraints 33. SQL requires the use of the _____ command to enter data into a table. a. INSERT b. SELECT c. COMMIT d. NOT NULL ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-4a Adding Table Rows LEARNING OBJECTIVES: 08.04 - Use SQL to do data manipulation (insert, update, and delete rows of data) 34. The _____ command permanently saves all changes—such as rows added, attributes modified, and rows deleted— made to any table in the database. a. COMMIT b. SELECT c. ROLLBACK d. UPDATE ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-4c Saving Table Changes LEARNING OBJECTIVES: 08.04 - Use SQL to do data manipulation (insert, update, and delete rows of data) 35. Which command would be used to delete the table row where the P_CODE is 'BRT-345'? a. DELETE FROM PRODUCT b. REMOVE FROM PRODUCT WHERE P_CODE = 'BRT-345'; WHERE P_CODE = 'BRT-345'; c. ERASE FROM PRODUCT d. ROLLBACK FROM PRODUCT WHERE P_CODE = 'BRT-345'; WHERE P_CODE = 'BRT-345'; ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 8-4e Deleting Table Rows LEARNING OBJECTIVES: 08.04 - Use SQL to do data manipulation (insert, update, and delete rows of data) 36. When a user issues the DELETE FROM tablename command without specifying a WHERE condition, _____. a. no rows will be deleted b. the first row will be deleted Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 08: Advanced SQL c. the last row will be deleted d. all rows will be deleted ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-4e Deleting Table Rows LEARNING OBJECTIVES: 08.04 - Use SQL to do data manipulation (insert, update, and delete rows of data) 37. The _____ command is used to restore the database to its previous condition. a. ROWCOUNT b. BACKUP c. COMMIT d. ROLLBACK ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-4f Restoring Table Contents LEARNING OBJECTIVES: 08.04 - Use SQL to do data manipulation (insert, update, and delete rows of data) 38. The tables on which a view, or a virtual table derived from a SELECT query, are based are called _____ tables. a. indexed b. core c. relation d. base ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-5 Virtual Tables: Creating a View LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 39. The Oracle equivalent to an MS Access AutoNumber is a(n) _____. a. auto-number b. sequence c. TO_NUMBER function d. trigger ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 8-6 Sequences LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 40. Which statement describes a feature of Oracle sequences? a. Oracle sequences are tied to columns and b. Oracle sequences generate a character string that can be tables. assigned to tables. c. An Oracle sequence uses the identity d. Dropping a sequence does not delete values assigned to column property to automatically number table attributes; it deletes only the sequence object from the rows. database. ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-6 Sequences LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 41. The _____ pseudo-column is used to select the next value from a sequence. a. CURRVAL b. NEXTVAL c. NEXT d. GET_NEXT ANSWER: b Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 08: Advanced SQL DIFFICULTY: Difficulty: Easy REFERENCES: 8-6 Sequences LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 42. In Oracle, _____ retrieves the current value of a sequence. a. NEXTVAL b. CURRVAL c. VARCHAR d. VARCHAR2 ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 8-6 Sequences LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 43. In Oracle, _____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping. a. dynamic SQL b. stored procedures c. embedded SQL d. Procedural Language SQL ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 44. A _____ is a block of code containing standard SQL statements and procedural extensions that is stored and executed at the DBMS server. a. cursor-style process b. statement-level trigger c. base table d. persistent storage module (PSM) ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 45. The PL/SQL block starts with the _____ section. a. IS b. OPEN c. DECLARE d. BEGIN ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 46. The Oracle string concatenation function is _____. a. CONCAT b. + c. || d. && ANSWER: c DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 08: Advanced SQL REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 47. Oracle recommends _____ for creating audit logs. a. triggers b. stored procedures c. stored functions d. tables ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 48. A(n) _____ cursor is automatically created in procedural SQL when the SQL statement returns only one value. a. implicit b. dynamic c. explicit d. static ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 8-7c PL/SQL Processing with Cursors LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 49. _____ is a cursor attribute that returns TRUE if the last FETCH returned a row, and FALSE if not. a. %ROWCOUNT b. %NOTFOUND c. %FOUND d. %ISOPEN ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7c PL/SQL Processing with Cursors LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 50. No matter what language you use, if it contains embedded SQL statements, it is called the _____ language. a. base b. static c. host d. view ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 8-8 Embedded SQL LEARNING OBJECTIVES: 08.07 - Create embedded SQL Completion 51. A(n) _____-length character data type, like VARCHAR, is typically specified with a maximum length. ANSWER: variable DIFFICULTY: Difficulty: Easy REFERENCES: 8-1d Data Types LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 08: Advanced SQL 52. _____ is the process the DBMS uses to verify that only registered users access the database. ANSWER: Authentication DIFFICULTY: Difficulty: Easy REFERENCES: 8-1b Creating the Database LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 53. A(n) _____ is a logical group of database objects, such as tables and indexes, that are related to each other. ANSWER: schema DIFFICULTY: Difficulty: Easy REFERENCES: 8-1c The Database Schema LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 54. U.S. state abbreviations are always two characters, so _____(2) is a logical choice for the data type representing a state column. ANSWER: CHAR DIFFICULTY: Difficulty: Easy REFERENCES: 8-1d Data Types LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 55. The SQL data type DATE stores date in the _____ date format. ANSWER: Julian DIFFICULTY: Difficulty: Easy REFERENCES: 8-1d Data Types LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 56. To make the SQL code more _____, most SQL programmers use one line per column (attribute) definition. ANSWER: readable DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 57. In a 1:M relationship, a user must always create the table for the "_____" side first. ANSWER: 1 one DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 58. _____ words are words used by SQL to perform specific functions. ANSWER: Reserved DIFFICULTY: Difficulty: Easy REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 59. If the NOT NULL and UNIQUE specifications are not supported when using a command sequence, use _____ Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 08: Advanced SQL without the specifications. ANSWER: PRIMARY KEY DIFFICULTY: Difficulty: Moderate REFERENCES: 8-2a CREATE TABLE command LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 60. A common practice is to create a(n) _____ on any field that is used as a search key, in comparison operations in a conditional expression, or when a user wants to list rows in a specific order. ANSWER: index DIFFICULTY: Difficulty: Easy REFERENCES: 8-2d SQL Indexes LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 61. To delete an index, one must use the _____ command. ANSWER: DROP INDEX DIFFICULTY: Difficulty: Easy REFERENCES: 8-2d SQL Indexes LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 62. If a user adds a new column to a table that already has rows, the existing rows will default to a value of _____ for the new column. ANSWER: null DIFFICULTY: Difficulty: Easy REFERENCES: 8-3c Adding a Column LEARNING OBJECTIVES: 08.03 - Manipulate the structure of existing tables to add, modify, and remove columns and constraints 63. A table can be deleted from the database by using the _____ command. ANSWER: DROP TABLE DIFFICULTY: Difficulty: Easy REFERENCES: 8-3e Deleting a Table from the Database LEARNING OBJECTIVES: 08.03 - Manipulate the structure of existing tables to add, modify, and remove columns and constraints 64. In an INSERT command, a user can indicate just the attributes that have required values by listing the _____ inside parentheses after the table name. ANSWER: names DIFFICULTY: Difficulty: Easy REFERENCES: 8-4a Adding Table Rows LEARNING OBJECTIVES: 08.03 - Manipulate the structure of existing tables to add, modify, and remove columns and constraints 65. A(n) _____ routine pools multiple transactions into a single batch to update a master table field in a single operation. ANSWER: batch update DIFFICULTY: Difficulty: Easy REFERENCES: 8-5a Updatable Views Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 08: Advanced SQL LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 66. A(n) _____ view is a view that can be used to update attributes in the base table(s) that are used in the view. ANSWER: updatable DIFFICULTY: Difficulty: Easy REFERENCES: 8-5a Updatable Views LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 67. In MS Access, a designer can use the _____ data type to define a column in his table that will be automatically populated with unique numeric values. ANSWER: AutoNumber DIFFICULTY: Difficulty: Moderate REFERENCES: 8-6 Sequences LEARNING OBJECTIVES: 08.05 - Use SQL to create database views, including updatable views 68. Using Oracle _____, a designer can write a PL/SQL code block by enclosing the commands inside BEGIN and END clauses. ANSWER: SQL*Plus DIFFICULTY: Difficulty: Easy REFERENCES: 8-7 Procedural SQL LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 69. A row-level trigger requires use of the _____ keywords and is executed once for each row affected by the triggering statement. ANSWER: FOR EACH ROW DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 70. _____ is the term used to describe an environment in which the SQL statement is not known in advance and is generated at run time. Dynamic SQL ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 8-8 Embedded SQL LEARNING OBJECTIVES: 08.07 - Create embedded SQL Essay 71. What is a schema? How many schemas can be used in one database? ANSWER: In the SQL environment, a schema is a logical group of database objects—such as tables and indexes—that are related to each other. Usually, the schema belongs to a single user or application. A single database can hold multiple schemas that belong to different users or applications. Schemas are useful in that they group tables by owner (or function) and enforce a first level of security by allowing each user to see only the tables that belong to that user. DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 08: Advanced SQL REFERENCES: 8-1c The Database Schema LEARNING OBJECTIVES: 08.01 - Use SQL to create a table manually 72. How can a table be deleted from the database? Provide an example. ANSWER: A table can be deleted from the database using the DROP TABLE command. For example, a user can delete the PART table with the following command: DROP TABLE PART; The user can drop a table only if it is not the “one” side of any relationship. If the user tries to drop a table otherwise, the RDBMS will generate an error message indicating that a foreign key integrity violation has occurred. DIFFICULTY: Difficulty: Moderate REFERENCES: 8-3e Deleting a Table from the Database LEARNING OBJECTIVES: 08.04 - Use SQL to do data manipulation (insert, update, and delete rows of data) 73. Which command is used to save changes to the database? What is the syntax for this command? ANSWER: Any changes made to the table contents are not saved on disk until a user closes the database, closes the program he or she is using, or uses the COMMIT command. If the database is open and a power outage or some other interruption occurs before the user issues the COMMIT command, the user's changes will be lost and only the original table contents will be retained. The COMMIT command permanently saves all changes—such as rows added, attributes modified, and rows deleted— made to any table in the database. The syntax for the COMMIT command is: COMMIT [WORK] DIFFICULTY: Difficulty: Moderate REFERENCES: 8-4c Saving Table Changes LEARNING OBJECTIVES: 08.03 - Manipulate the structure of existing tables to add, modify, and remove columns and constraints 74. How are triggers critical to proper database operation and management? ANSWER: - Triggers can be used to enforce constraints that cannot be enforced at the DBMS design and implementation levels. - Triggers add functionality by automating critical actions and providing appropriate warnings and suggestions for remedial action. In fact, one of the most common uses for triggers is to facilitate the enforcement of referential integrity. - Triggers can be used to update table values, insert records in tables, and call other stored procedures. DIFFICULTY: Difficulty: Moderate REFERENCES: 8-7a Triggers LEARNING OBJECTIVES: 08.06 - Use Procedural Language SQL (PL/SQL) to create triggers, stored procedures, and PL/SQL functions 75. Summarize the hierarchy of steps involved in creating and running an executable program with embedded SQL statements. ANSWER: While the steps required to create and execute a program consisting of embedded SQL statements vary from one programming language to another, the following steps are Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 08: Advanced SQL considered as a general standard. a) The programmer writes embedded SQL code within the host language instructions. The code follows the standard syntax required for host language and embedded SQL. b) A preprocessor is used to transform the embedded SQL into specialized procedure calls that are DBMS-specific and language-specific. The preprocessor is provided by the DBMS vendor and is specific to the host language. c) The program is compiled using the host language compiler. The compiler creates an object code module for the program containing the DBMS procedure calls. d) The object code is linked to the respective library modules and generates the executable program. This process binds the DBMS procedure calls to the DBMS run-time libraries. Additionally, the binding process typically creates an “access plan” module that contains instructions to run the embedded code at run time. e) The executable is run, and the embedded SQL statement retrieves data from the database. DIFFICULTY: Difficulty: Moderate REFERENCES: 8-8 Embedded SQL LEARNING OBJECTIVES: 08.07 - Create embedded SQL

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 09: Database Design True / False 1. Systems analysis establishes the need for an information system and its extent. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 2. The term “database development” is used to describe the process of database design and implementation. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 3. The primary objective in database design is to create complete, normalized, nonredundant, and fully integrated conceptual, logical, and physical database models. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 4. The implementation phase of database design includes creating the database storage structure and loading the database, but does not provide for data management. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 5. The Systems Development Life Cycle (SDLC) traces the history of an information system. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-2 The Systems Development Life Cycle Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 09: Database Design LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 6. The Systems Development Life Cycle (SDLC) is a sequential process rather than an iterative process. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2 The Systems Development Life Cycle LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 7. The Systems Development Life Cycle's (SDLC's) planning phase yields a general overview of the company and its objectives. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-2a Planning LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 8. In the Systems Development Life Cycle (SDLC), problems defined during the planning phase are examined in greater detail during the analysis phase. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-2b Analysis LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 9. The analysis phase of the Systems Development Life Cycle (SDLC) involves a cycle of coding, testing, and debugging. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 10. In the Systems Development Life Cycle(SDLC), the design of the system's processes begins in the detailed systems design phase. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 9-2c Detailed Systems Design LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 11. In the detailed systems design phase of the Systems Development Life Cycle (SDLC), steps are laid out for the Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 09: Database Design conversion of a database from an old system to a new system. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-2c Detailed Systems Design LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 12. The database contents might be loaded interactively or in batch mode using a variety of methods and devices including customized user programs. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 13. A system is always at some stage of SDLC because every request for structural changes requires retracing the steps of the Systems Development Life Cycle (SDLC). a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-2e Maintenance LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 14. A system maintenance activity generated in response to changes in the business environment is referred to as corrective maintenance. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 9-2e Maintenance LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 15. The overall purpose of the database initial study is to create the conceptual design. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3a The Database Initial Study LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 16. After the initial declarations in Database Life Cycle (DBLC), the database designer must carefully probe in order to generate additional information that will help define the problem within the larger framework of company operations. a. True Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 09: Database Design b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-3a The Database Initial Study LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 17. In most modern relational DBMSs, a new database implementation requires the creation of special storage-related constructs to house the end-user tables. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 9-3c Implementation and Loading LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 18. Data integrity is enforced by the database management system (DBMS) through the proper use of primary and foreign key rules. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 19. The testing and evaluation phase of the Database Life Cycle (DBLC) occurs after applications programming. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 20. Evaluation of database performance is rendered easier by the fact there are no standards to measure it. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework Multiple Choice 21. The process of creating an information system is known as _____. a. systems development b. database development c. network development d. enterprise development Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 09: Database Design ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 22. The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases. a. two b. three c. four d. five ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 9-2 The Systems Development Life Cycle LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 23. Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 9-2b Analysis LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 24. Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. detailed systems design d. implementation ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 25. “Should the existing system be replaced?” is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2a Planning LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 26. “What are the requirements of the current system’s end users?” is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance ANSWER: b DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 09: Database Design REFERENCES: 9-2b Analysis LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 27. The result of the _____ phase of the Systems Development Life Cycle (SDLC) should be a better understanding of the system's functional areas, actual and potential problems, and opportunities. a. analysis b. implementation c. detailed systems design d. maintenance ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2b Analysis LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 28. The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC). a. planning b. analysis c. implementation d. maintenance ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 9-2b Analysis LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 29. The _____ phase of the Systems Development Life Cycle (SDLC) includes all the necessary technical specifications for the screens, menus, reports, and other devices used to make the system more efficient. a. analysis b. implementation c. detailed systems design d. maintenance ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2c Detailed Systems Design LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 30. Training principles and methodologies are planned during the _____ phase of the Systems Development Life Cycle (SDLC). a. maintenance b. implementation c. analysis d. detailed systems design ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2c Detailed Systems Design LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 31. During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented. a. detailed systems design b. analysis c. maintenance d. implementation ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 09: Database Design 32. The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC). a. analysis b. detailed systems design c. implementation d. maintenance ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 33. The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain. a. database-produced b. network-produced c. CASE-produced d. design-produced ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 9-2e Maintenance LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 34. In DBLC, the phase after the database initial study is _____. a. operation b. database design c. database initial study d. implementation and loading ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 9-3b Database Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 35. The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3 The Database Life Cycle LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 36. Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. implementation and loading d. testing and evaluation ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3 The Database Life Cycle LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 37. Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC). a. database initial study b. database design c. operation d. testing and evaluation Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 09: Database Design ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3 The Database Life Cycle LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 38. _____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources. a. Normalization b. Virtualization c. Specialization d. Generalization ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 9-3c Implementation and Loading LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 39. The implementation and loading phase of the Database Life Cycle (DBLC) involves _____. a. defining objectives b. introducing changes c. testing the database d. installing the DBMS ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3c Implementation and Loading LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 40. In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____. a. database analysis and requirements b. ER modeling and normalization c. data model verification d. distributed database design ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 9-4d Distributed Database Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 41. In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____. a. data analysis and requirements b. entity relationship modeling and normalization c. data model verification d. distributed database design ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 9-4a Data Analysis and Requirements LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 42. _____ can render data useless to unauthorized users who might have violated some of the database security layers. a. Data encryption b. Access rights c. Physical security d. Password security ANSWER: a DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 09: Database Design REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 43. Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints. a. programmer b. manager c. database administrator d. systems administrator ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 44. In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up. a. transaction log backup b. conservative backup c. differential backup d. adaptive backup ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 45. Which of the following is a hardware-induced database failure? a. Memory chip errors b. Viruses c. Malware d. Abortion due to deadlock ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 46. The last step in the Database Life Cycle (DBLC) is _____. a. maintenance and evolution b. operation c. testing and evaluation d. implementation and loading ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 9-3f Maintenance and Evolution LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 47. The first step in developing the conceptual model using ER diagrams is to _____. a. normalize the entities b. complete the initial ER diagram c. identify, analyze, and refine the d. define the attributes, primary keys, and foreign keys for each of business rules the entities ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 9-4b Entity Relationship Modeling and Normalization LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 48. The first step in the ER model verification process is to _____. Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 09: Database Design a. identify each module and its components b. identify the ER model's central entity c. verify all processes against the ER model d. identify each module's internal transaction requirements ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 9-4c Data Model Verification LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 49. _____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance. a. Conceptual design b. Network design c. Logical design d. Physical design ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 9-7 Physical Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 50. During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model. a. declaration process b. verification process c. conceptual process d. logical process ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 9-9 Centralized versus Decentralized Design LEARNING OBJECTIVES: 09.06 - Distinguish between centralized and decentralized conceptual database design Completion 51. A(n) _____ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system. ANSWER: database DIFFICULTY: Difficulty: Easy REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 52. _____ is the process that establishes the need for, and the extent of, an information system. ANSWER: Systems analysis DIFFICULTY: Difficulty: Easy REFERENCES: 9-1 The Information System LEARNING OBJECTIVES: 09.01 - Describe the role of database design as the foundation of a successful information system 53. The traditional Systems Development Life Cycle (SDLC) phases are _____, analysis, detailed systems design, implementation, and maintenance. ANSWER: planning Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 09: Database Design DIFFICULTY: Difficulty: Easy REFERENCES: 9-2 The Systems Development Life Cycle LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 54. An initial assessment of the information flow-and-extent requirements must be made during the _____ portion of the Systems Development Life Cycle (SDLC). ANSWER: planning DIFFICULTY: Difficulty: Easy REFERENCES: 9-2a Planning LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 55. After testing is concluded, the final _____ is reviewed and printed and end users are trained. ANSWER: documentation DIFFICULTY: Difficulty: Easy REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 56. The advent of very sophisticated application generators and _____ has substantially decreased coding and testing time. ANSWER: debugging tools DIFFICULTY: Difficulty: Easy REFERENCES: 9-2d Implementation LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 57. The system’s _____ defines the extent of the design according to operational requirements. ANSWER: scope DIFFICULTY: Difficulty: Easy REFERENCES: 9-3a The Database Initial Study LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 58. The proposed system is subject to limits known as _____, which are external to the system. ANSWER: boundaries DIFFICULTY: Difficulty: Easy REFERENCES: 9-3a The Database Initial Study LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 59. _____ are usually provided by the database management system (DBMS) to check for access violations. ANSWER: Audit trails DIFFICULTY: Difficulty: Easy REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 60. _____ allow end users to access the database without being able to download the information from their workstations. ANSWER: Diskless workstations DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 09: Database Design 61. The _____ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible. ANSWER: conceptual design DIFFICULTY: Difficulty: Easy REFERENCES: 9-4 Conceptual Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 62. The first step in _____ is to discover the data element characteristics. ANSWER: conceptual design DIFFICULTY: Difficulty: Easy REFERENCES: 9-4a Data Analysis and Requirements LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 63. A designer must have a thorough understanding of the company's data types, extent, and uses in order to develop an accurate _____. ANSWER: data model DIFFICULTY: Difficulty: Easy REFERENCES: 9-4a Data Analysis and Requirements LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 64. A(n) _____ rule is a brief and precise narrative of a policy, procedure, or principle within a specific organization's environment. ANSWER: business rule DIFFICULTY: Difficulty: Easy REFERENCES: 9-4a Data Analysis and Requirements LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 65. Because real-world database design is generally done by teams, the database design is probably divided into major components known as _____. ANSWER: modules DIFFICULTY: Difficulty: Easy REFERENCES: 9-4c Data Model Verification LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 66. A(n) _____ is an information system component that handles a specific business function, such as inventory, orders, or payroll. ANSWER: module DIFFICULTY: Difficulty: Easy REFERENCES: 9-4c Data Model Verification LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 67. The term _____ describes the strength of the relationships found among a module’s entities. ANSWER: cohesivity DIFFICULTY: Difficulty: Easy REFERENCES: 9-4c Data Model Verification Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 09: Database Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 68. When selecting DBMS _____, items to consider include processors, RAM, and disk space. ANSWER: hardware DIFFICULTY: Difficulty: Easy REFERENCES: 9-5 DBMS Software Selection LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 69. The _____ goal is to design an enterprise-wide database based on a specific data model but independent of physicallevel details. ANSWER: logical design DIFFICULTY: Difficulty: Easy REFERENCES: 9-6 Logical Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 70. _____ could become a very technical job that affects not only the accessibility of the data in the storage device(s) but also the performance of the system. ANSWER: Physical design DIFFICULTY: Difficulty: Easy REFERENCES: 9-7 Physical Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework Essay 71. List and briefly describe the three types of system maintenance activities. ANSWER: The three types of maintenance activities are: 1. Corrective maintenance in response to systems errors. 2. Adaptive maintenance due to changes in the business environment. 3. Perfective maintenance to enhance the system. DIFFICULTY: Difficulty: Moderate REFERENCES: 9-2e Maintenance LEARNING OBJECTIVES: 09.02 - Describe the five phases in the Systems Development Life Cycle (SDLC) 72. List and describe the different levels at which database backups can be performed. ANSWER: A full backup, or dump, of the entire database. In this case, all database objects are backed up in their entirety. A differential backup of the database, in which only the objects that have been updated or modified since the last full backup are backed up. A transaction log backup, which backs up only the transaction log operations that are not reflected in a previous backup copy of the database. In this case, no other database objects are backed up. DIFFICULTY: Difficulty: Moderate REFERENCES: 9-3d Testing and Evaluation LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 73. What are the factors affecting the purchasing decision for DBMS software? Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 09: Database Design ANSWER:

Cost: This includes the original purchase price, along with maintenance, operational, license, installation, training, and conversion costs. DBMS features and tools: Some database software includes a variety of tools that facilitate application development. For example, the availability of query by example (QBE), screen painters, report generators, application generators, and data dictionaries helps to create a more pleasant work environment for both the end user and the application programmer. Database administrator facilities, query facilities, ease of use, performance, security, concurrency control, transaction processing, and third-party support also influence DBMS software selection. Underlying model: This can be hierarchical, network, relational, object/relational, or objectoriented. Portability: A DBMS can be portable across platforms, systems, and languages.

DBMS hardware requirements: Items to consider include processor(s), RAM, disk space, and so on. DIFFICULTY: Difficulty: Moderate REFERENCES: 9-5 DBMS Software Selection LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 74. Explain the concept of logical design and list the steps involved. ANSWER: Logical design is the second stage in the database design process. The logical design goal is to design an enterprise-wide database that is based on a specific data model but independent of physical-level details. Logical design requires that all objects in the conceptual model be mapped to the specific constructs used by the selected database model. The logical design is generally performed in the following four steps: 1. Mapping the conceptual model to logical model components 2. Validating the logical model using normalization 3. Validating the logical model integrity constraints 4. Validating the logical model against user requirements DIFFICULTY: Difficulty: Moderate REFERENCES: 9-6 Logical Design LEARNING OBJECTIVES: 09.03 - Design databases using the six phases in the Database Life Cycle (DBLC) framework 75. Explain the differences between a centralized and decentralized approach to database design. ANSWER: Centralized design is productive when the data component has a relatively small number of objects and procedures. The design can be carried out and represented in a fairly simple database. Centralized design is typical of relatively simple, small databases and can be successfully done by a single database administrator or by a small, informal design team. The company operations and the scope of the problem are sufficiently limited to allow even a single designer to define the problem(s), create the conceptual design, verify the conceptual design with the user views, define system processes and data constraints to ensure the efficacy of the design, and ensure that the design will comply with all the requirements. On the other hand, decentralized design might be used when the system’s data component Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 09: Database Design has a considerable number of entities and complex relations on which very complex operations are performed. Decentralized design is also often used when the problem itself is spread across several operational sites and each element is a subset of the entire data set. In large and complex projects, the database typically cannot be designed by only one person. Instead, a carefully selected team of database designers tackles a complex database project. Within the decentralized design framework, the database design task is divided into several modules. Once the design criteria have been established, the lead designer assigns design subsets or modules to design groups within the team. DIFFICULTY: Difficulty: Moderate REFERENCES: 9-9 Centralized versus Decentralized Design LEARNING OBJECTIVES: 09.06 - Distinguish between centralized and decentralized conceptual database design

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 10: Transaction Management and Concurrency Control True / False 1. Most real-world database transactions are formed by only one database request. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-1 What Is a Transaction? LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 2. Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be semantically correct. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1a Evaluating Transaction Results LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 3. The DBMS guarantees that the semantic meaning of a transaction truly represents the real-world event. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-1a Evaluating Transaction Results LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 4. Atomicity indicates the permanence of the database's consistent state. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 5. Serializability means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 6. Durability requires that all portions of the transaction must be treated as a single, logical unit of work in which all Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 10: Transaction Management and Concurrency Control operations are applied and completed to produce a consistent database. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 7. The multiuser DBMS must implement controls to ensure serializability and isolation of transactions, in addition to atomicity and durability, in order to guard the database's consistency and integrity. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 8. The phenomenon of uncommitted data occurs when two transactions are executed concurrently and the first transaction is rolled back after the second transaction has already accessed the uncommitted data—thus violating the isolation property of transactions. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 10-2b Uncommitted Data LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 9. The scheduler establishes the order in which the operations within concurrent transactions are executed. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-2d The Scheduler LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 10. A scheduler facilitates data isolation to ensure that two transactions do not update the same data element at the same time. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-2d The Scheduler LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 11. A lock guarantees the open use of a data item to multiple transactions. a. True Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 10: Transaction Management and Concurrency Control b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-3 Concurrency Control with Locking LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 12. In a page-level lock, the DBMS will lock an entire diskpage. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 13. A field-level lock allows concurrent transactions to access the same row, as long as they require the use of different fields within that row. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 14. A shared lock produces no conflict as long as all the concurrent transactions are read-write only. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3b Lock Types LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 15. A growing phase in a two-phase lock is when a transaction acquires all the required locks without locking any data. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3c Two-Phase Locking to Ensure Serializability LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 16. Time stamps must only have the single property of uniqueness. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-4 Concurrency Control with Time Stamping Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 10: Transaction Management and Concurrency Control LEARNING OBJECTIVES: 10.05 - Describe how stamping methods are used for concurrency control 17. Time stamping demands a lot of system resources because many transactions might have to be stopped, rescheduled, and restamped. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-4 Concurrency Control with Time Stamping LEARNING OBJECTIVES: 10.05 - Describe how stamping methods are used for concurrency control 18. An optimistic approach is based on the assumption that the majority of the database operations do not conflict. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 10-5 Concurrency Control with Optimistic Methods LEARNING OBJECTIVES: 10.06 - Describe how optimistic methods are used for concurrency control 19. When using an optimistic approach, during the read phase, a transaction reads the database, executes the needed computations, and makes the updates to a private copy of the database values. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 10-5 Concurrency Control with Optimistic Methods LEARNING OBJECTIVES: 10.06 - Describe how optimistic methods are used for concurrency control 20. The serializable isolation level is the least restrictive level defined by the ANSI SQL standard. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 10-6 ANSI Levels of Transaction Isolation LEARNING OBJECTIVES: 10.07 - List and explain the ANSI levels of transaction isolation Multiple Choice 21. Transaction is a _____ unit of work that must be either entirely completed or aborted. a. time b. practical c. logical d. physical ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 10-1 What Is a Transaction? LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 10: Transaction Management and Concurrency Control 22. _____ requires that all operations of a transaction be completed. a. Specificity b. Atomicity c. Durability d. Time stamping ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 23. A consistent database state is one in which all _____. a. tables have foreign keys b. data integrity constraints are satisfied c. table are normalized d. SQL statements only update one table at a time ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 10-1 What Is a Transaction? LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 24. _____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. a. Serializability b. Atomicity c. Isolation d. Time stamping ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 25. A single-user database system automatically ensures_____ of the database, because only one transaction is executed at a time. a. serializability and durability b. atomicity and isolation c. serializability and isolation d. atomicity and serializability ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.02 - Identify the four properties of a database transaction 26. ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements _____ and ROLLBACK. a. RETRIEVE b. ASSIGN c. UPDATE d. COMMIT ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 10-1c Transaction Management with SQL LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 27. Of the following events, which is defined by ANSI as being equivalent to a COMMIT? a. Five SQL statements are executed. b. The end of a program is successfully reached. c. The program is abnormally terminated. d. The database is shut down for maintenance. Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 10: Transaction Management and Concurrency Control ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 10-1c Transaction Management with SQL LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 28. Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK? a. Five SQL statements are executed. b. The end of a program is successfully reached. c. All changes are aborted and returned to a previous consistent d. The database is shut down for state. maintenance. ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 10-1c Transaction Management with SQL LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 29. The implicit beginning of a transaction is when _____. a. a database is started b. a table is accessed for the first time c. the first SQL statement is encountered d. the COMMIT command is issued ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 10-1c Transaction Management with SQL LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 30. The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash. a. data dictionary b. metadata c. rollback manager d. transaction log ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1d The Transaction Log LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 31. One of the three most common data integrity and consistency problems is _____. a. lost updates b. disk failures c. user errors d. deadlocks ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 10-2a Lost Updates LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 32. _____ occurs when a transaction accesses data before and after one or more other transactions finish working with such data. a. Inconsistent retrieval b. The phenomena of uncommitted data c. Lost update problems d. Dirty read problems ANSWER: a DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 10: Transaction Management and Concurrency Control REFERENCES: 10-2c Inconsistent Retrievals LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 33. As long as two transactions, T1 and T2, access _____ data, there is no conflict, and the order of execution is irrelevant to the final outcome. a. shared b. common c. unrelated d. locked ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 10-2d The Scheduler LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 34. _____ are required to prevent another transaction form reading inconsistent data. a. Locks b. Schedules c. Stamps d. Logs ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 10-3 Concurrency Control with Locking LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 35. The _____ manager is responsible for assigning and policing the locks used by transactions. a. transaction b. database c. lock d. schedule ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 10-3 Concurrency Control with Locking LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 36. Lock _____ indicates the level of lock use. a. granularity b. shrinking c. growing d. serializability ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 37. A _____ lock will lock the entire table, preventing access to any row by a transaction while another transaction is using the table. a. database-level b. table-level c. page-level d. row-level ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 38. A _____ lock will lock the entire diskpage. Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 10: Transaction Management and Concurrency Control a. transaction-level b. table-level c. page-level d. row-level ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 39. A diskpage, or page, is the equivalent of a _____. a. database table b. disk sector c. database schema d. diskblock ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 40. A _____ lock allows concurrent transactions to access different rows of the same table. a. database table b. table-level c. page-level d. row-level ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 41. A(n) _____ specifically reserves access to the transaction that locked the object. a. shared lock b. exclusive lock c. binary lock d. deadlock ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 10-3b Lock Types LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 42. A(n) _____ lock exists when concurrent transactions are granted read access on the basis of a common lock. a. shared b. exclusive c. binary d. two-phase ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 10-3b Lock Types LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 43. What rule applies to the two-phase locking protocol? a. Two transactions cannot have b. No unlock operation can precede a lock operation in a different conflicting lock. transaction. c. No data is affected until all locks are d. No data is affected until the transaction is in its locked position. released. ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 10: Transaction Management and Concurrency Control DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3c Two-Phase Locking to Ensure Serializability LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 44. A(n) _____ phase in a two phase lock is when a transaction releases all locks and cannot obtain a new lock. a. growing b. shrinking c. locking d. unlocking ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 10-3c Two-Phase Locking to Ensure Serializability LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 45. A(n) _____ condition occurs when two or more transactions wait for each other to unlock data. a. deadlock b. exclusive lock c. binary lock d. two-phase lock ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 10-3d Deadlocks LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 46. The _____ approach to scheduling concurrent transactions assigns a global unique stamp to each transaction. a. scheduled b. table-locking c. unique d. time stamping ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 10-4 Concurrency Control with Time Stamping LEARNING OBJECTIVES: 10.05 - Describe how stamping methods are used for concurrency control 47. In the wait/die scheme, the: a. older transaction rolls back the younger transaction b. younger, preempted transaction is rescheduled and reschedules it. using the same time stamp. c. older transaction waits for the younger one to d. younger and older transactions both wait complete and release its locks. indefinitely to be released. ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 10-4a Wait/Die and Wound/Wait Schemes LEARNING OBJECTIVES: 10.05 - Describe how stamping methods are used for concurrency control 48. In the optimistic approach, during the_____ phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values. a. read b. validation c. write d. shared ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 10-5 Concurrency Control with Optimistic Methods Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 10: Transaction Management and Concurrency Control LEARNING OBJECTIVES: 10.06 - Describe how optimistic methods are used for concurrency control 49. In the optimistic approach, during the _____ phase, changes are permanently applied to the database. a. read b. validation c. write d. shared ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 10-5 Concurrency Control with Optimistic Methods LEARNING OBJECTIVES: 10.06 - Describe how optimistic methods are used for concurrency control 50. The _____ isolation level ensures that queries return consistent results. a. read uncommitted b. read committed c. serializable d. repeatable read ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 10-6 ANSI Levels of Transaction Isolation LEARNING OBJECTIVES: 10.07 - List and explain the ANSI levels of transaction isolation Completion 51. Although the DBMS is designed to recover a database to a previous consistent state when an interruption prevents the completion of a required set of transactions, the transactions themselves are defined by the end user or programmer and must be _____ correct. ANSWER: semantically DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1a Evaluating Transaction Results LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 52. If a(n) _____ is issued before the termination of a transaction, the DBMS will restore the database only for that particular transaction, rather than for all transactions, in order to maintain the durability of the previous transactions. ANSWER: ROLLBACK DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1d The Transaction Log LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 53. The objective of _____ control is to ensure the serializability of transactions in a multiuser database environment. ANSWER: concurrency DIFFICULTY: Difficulty: Easy REFERENCES: 10-2 Concurrency Control LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 54. The _____ occurs when two concurrent transactions, T1 and T2, are updating the same data element and one of the updates is lost. ANSWER: lost update problem DIFFICULTY: Difficulty: Easy REFERENCES: 10-2a Lost Updates Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 10: Transaction Management and Concurrency Control LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 55. The scheduler’s main job is to create a(n) _____ of a transaction’s operation, in which the interleaved executions of transactions yield the same results as if the transactions were executed in serial order. ANSWER: serializable schedule DIFFICULTY: Difficulty: Easy REFERENCES: 10-2d The Scheduler LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 56. The _____ interleaves the execution of database operations to ensure serializability. ANSWER: scheduler DIFFICULTY: Difficulty: Easy REFERENCES: 10-2d The Scheduler LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 57. To determine the appropriate order of the operations, the scheduler bases its actions on concurrency control algorithms, such as _____ or time stamping methods. ANSWER: locking DIFFICULTY: Difficulty: Easy REFERENCES: 10-2d The Scheduler LEARNING OBJECTIVES: 10.03 - Explain concurrency control and its role in maintaining database integrity 58. Most multiuser _____ automatically initiate and enforce locking procedures, where all locking information is managed by the lock manager. ANSWER: DBMSs database management systems database management systems (DBMSs) DIFFICULTY: Difficulty: Easy REFERENCES: 10-3 Concurrency Control with Locking Methods LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 59. _____ can take place at any of the following levels: database, table, page, row, or field. ANSWER: Locking DIFFICULTY: Difficulty: Easy REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 60. _____-level locks are less restrictive than database-level locks, but they create traffic jams when many transactions are waiting to access the same table. ANSWER: Table DIFFICULTY: Difficulty: Easy REFERENCES: 10-3a Lock Granularity LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 61. As a rule, a(n) _____ must unlock the object after its termination. ANSWER: transaction DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 10: Transaction Management and Concurrency Control REFERENCES: 10-3b Lock Types LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 62. The _____ rule states that only one transaction at a time can own an exclusive lock on the same object. ANSWER: mutual exclusive DIFFICULTY: Difficulty: Easy REFERENCES: 10-3b Lock Types LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 63. If T1 has not unlocked data item Y, T2 cannot begin; if T2 has not unlocked data item X, T1 cannot continue. Consequently, T1 and T2 each wait for the other to unlock the required data item. Such a deadlock is also known as a(n) _____. ANSWER: deadly embrace DIFFICULTY: Difficulty: Easy REFERENCES: 10-3d Deadlocks LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 64. Uniqueness ensures that no equal time stamp values can exist, and _____ ensures that time stamp values always increase. ANSWER: monotonicity DIFFICULTY: Difficulty: Moderate REFERENCES: 10-4 Concurrency Control with Time Stamping Methods LEARNING OBJECTIVES: 10.05 - Describe how stamping methods are used for concurrency control 65. In a heavily used database management system (DBMS), the prevention and detection of _____ constitutes an important DBMS function. ANSWER: deadlocks DIFFICULTY: Difficulty: Easy REFERENCES: 10-3d Deadlocks LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 66. A(n) ______ occurs when a transaction executes a query at time T1, and it runs the same query at same time T2, yielding additional rows that satisfy the query. ANSWER: phantom read DIFFICULTY: Difficulty: Moderate REFERENCES: 10-6 ANSI Levels of Transaction Isolation LEARNING OBJECTIVES: 10.07 - List and explain the ANSI levels of transaction isolation 67. _____ ensure that a disk physical failure will not impair the DBMS's ability to recover data. ANSWER: Redundant transaction logs DIFFICULTY: Difficulty: Moderate REFERENCES: 10-7a Transaction Recovery LEARNING OBJECTIVES: 10.08 - Describe the role of database recovery management in maintaining database integrity 68. Database transaction _____ restores a database from an inconsistent state to a previously consistent state. ANSWER: recovery Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 10: Transaction Management and Concurrency Control DIFFICULTY: Difficulty: Easy REFERENCES: 10-7a Transaction Recovery LEARNING OBJECTIVES: 10.08 - Describe the role of database recovery management in maintaining database integrity 69. The DBMS uses the information stored in the _____ log for a recovery requirement triggered by a ROLLBACK statement, a program’s abnormal termination, or a system failure such as a network discrepancy or a disk crash. ANSWER: transaction DIFFICULTY: Difficulty: Easy REFERENCES: 10-7a Transaction Recovery LEARNING OBJECTIVES: 10.08 - Describe the role of database recovery management in maintaining database integrity 70. The _____ protocol ensures that transaction logs are always written before any database data is actually updated. ANSWER: write-ahead-log DIFFICULTY: Difficulty: Moderate REFERENCES: 10-7a Transaction Recovery LEARNING OBJECTIVES: 10.08 - Describe the role of database recovery management in maintaining database integrity Essay 71. What is transaction isolation and why it is important? ANSWER: Isolation means that the data used during the execution of a transaction cannot be used by a second transaction until the first one is completed. In other words, if transaction T1 is being executed and is using the data item X, that data item cannot be accessed by any other transaction (T2 ... Tn) until T1 ends. This property is particularly useful in multiuser database environments because several users can access and update the database at the same time. DIFFICULTY: Difficulty: Moderate REFERENCES: 10-1b Transaction Properties LEARNING OBJECTIVES: 10.01 - Describe the database transaction management process 72. How does a shared/exclusive lock schema increase the lock manager’s overhead? ANSWER: The type of lock held must be known before a lock can be granted. Three lock operations exist: READ_LOCK to check the type of lock, WRITE_LOCK to issue the lock, and UNLOCK to release the lock. The schema has been enhanced to allow a lock upgrade from shared to exclusive and a lock downgrade from exclusive to shared. DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3b Lock Types LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 73. What are the three basic techniques to control deadlocks? ANSWER: 1. Deadlock prevention. A transaction requesting a new lock is aborted when there is the possibility that a deadlock can occur. If the transaction is aborted, all changes made by this transaction are rolled back and all locks obtained by the transaction are released. The transaction is then rescheduled for execution. Deadlock prevention works because it avoids the conditions that lead to deadlocking. 2. Deadlock detection. The DBMS periodically tests the database for deadlocks. If a deadlock is found, the “victim” transaction is aborted (rolled back and restarted) and the other transaction continues. Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 10: Transaction Management and Concurrency Control 3. Deadlock avoidance. The transaction must obtain all of the locks it needs before it can be executed. This technique avoids the rolling back of conflicting transactions by requiring that locks be obtained in succession. However, the serial lock assignment required in deadlock avoidance increases action response times. DIFFICULTY: Difficulty: Moderate REFERENCES: 10-3d Deadlocks LEARNING OBJECTIVES: 10.04 - Describe how locking methods are used for concurrency control 74. What are database checkpoints? ANSWER: Database checkpoints are operations in which the DBMS writes all of its updated buffers to disk. While this is happening, the DBMS does not execute any other requests. A checkpoint operation is also registered in the transaction log. As a result of this operation, the physical database and the transaction log will be in sync. This synchronization is required because update operations update the copy of the data in the buffers and not in the physical database. Checkpoints are automatically scheduled by the DBMS several times per hour. Checkpoints also play an important role in transaction recovery. DIFFICULTY: Difficulty: Moderate REFERENCES: 10-7a Transaction Recovery LEARNING OBJECTIVES: 10.08 - Describe the role of database recovery management in maintaining database integrity 75. How do transaction recovery procedures use the deferred-write and write-through techniques to recover transactions? ANSWER: The database recovery process involves bringing the database to a consistent state after a failure. Transaction recovery procedures generally make use of deferred-write and writethrough techniques. When the recovery procedure uses a deferred-write technique, the transaction operations do not immediately update the physical database. Instead, only the transaction log is updated. The database is physically updated only after the transaction reaches its commit point, using information from the transaction log. If the transaction aborts before it reaches its commit point, no changes need to be made to the database because it was never updated. The recovery process for all started and committed transactions follows these steps: 1. Identify the last checkpoint in the transaction log. This is the last time transaction data were physically saved to disk. 2. For a transaction that started and was committed before the last checkpoint, nothing needs to be done because the data are already saved. 3. For a transaction that performed a commit operation after the last checkpoint, the DBMS uses the transaction log records to redo the transaction and update the database, using the “after” values in the transaction log. The changes are made in ascending order, from oldest to newest. 4. For any transaction that had a ROLLBACK operation after the last checkpoint or that was left active before the failure occurred, nothing needs to be done because the database was never updated. When the recovery procedure uses a write-through technique, the database is immediately updated by transaction operations during the transaction’s execution, even before the transaction reaches its commit point. If the transaction aborts before it reaches its commit Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 10: Transaction Management and Concurrency Control point, a ROLLBACK or undo operation needs to be done to restore the database to a consistent state. In that case, the ROLLBACK operation will use the transaction log “before” values. The recovery process follows these steps: 1. Identify the last checkpoint in the transaction log. This is the last time transaction data were physically saved to disk. 2. For a transaction that started and was committed before the last checkpoint, nothing needs to be done because the data are already saved. 3. For a transaction that was committed after the last checkpoint, the DBMS redoes the transaction, using the “after” values of the transaction log. Changes are applied in ascending order, from oldest to newest. 4. For any transaction that had a ROLLBACK operation after the last checkpoint or that was left active before the failure occurred, the DBMS uses the transaction log records to ROLLBACK or undo the operations, using the “before” values in the transaction log. Changes are applied in reverse order, from newest to oldest. DIFFICULTY: Difficulty: Moderate REFERENCES: 10-7a Transaction Recovery LEARNING OBJECTIVES: 10.08 - Describe the role of database recovery management in maintaining database integrity

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 11: Database Performance Tuning and Query Optimization True / False 1. One of the main functions of a database system is to provide timely answers to end users. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-1 Database Performance-Tuning Concepts LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 2. Good database performance is easy to evaluate. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 11-1 Database Performance-Tuning Concepts LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 3. All factors must be checked to ensure that each system component operates at its optimum level and has sufficient resources to minimize the occurrence of bottlenecks. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-1 Database Performance-Tuning Concepts LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 4. DBMS implementations are typically similar in complexity to two-tier client/server configurations. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 11-1a Performance Tuning: Client and Server LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 5. A table space has the same meaning as a file extent. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 6. The data cache caches system catalog data and the contents of the indexes. a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 11: Database Performance Tuning and Query Optimization b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 7. The SQL cache stores the end-user written SQL. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 8. To work with data, the DBMS must retrieve the data from permanent storage and place it in RAM. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 9. The purpose of an I/O operation is to move data to and from different computer components or devices. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 10. Working with data in the data cache is many times faster than working with data in the data files. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 11. Fully equivalent means that the optimized query results are always the same as the original query. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-2a SQL Parsing Phase LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 11: Database Performance Tuning and Query Optimization 12. The SQL execution activities are performed by the query optimizer. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 11-2a SQL Parsing Phase LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 13. All transaction management commands are processed during the parsing and execution phases of query processing. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-2b SQL Execution Phase LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 14. An index scan is less efficient than a full table scan. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 15. Indexes do not facilitate join operations. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 16. The B-tree index is used mainly in tables in which column values repeat a relatively small number of times. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 17. The primary factor in determining the most efficient access plan is the I/O cost. a. True b. False ANSWER: True Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 11: Database Performance Tuning and Query Optimization DIFFICULTY: Difficulty: Easy REFERENCES: 11-4 Optimizer Choices LEARNING OBJECTIVES: 11.04 - Differentiate between a rule-based optimizer and a cost-based optimizer 18. Most current-generation relational DBMSs perform automatic query optimization at the client end. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 11-5 SQL Performance Tuning LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 19. Maximizing disk contention is one of the general recommendations for the physical storage of databases. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 20. RAID systems use a single disk to create storage volumes. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance Multiple Choice 21. On the client side, the objective is to generate an SQL query that returns a correct answer in the least amount of time, using a minimum amount of resources at the server end. The activities required to achieve this goal are commonly referred to as _____ tuning. a. client SQL b. database SQL c. SQL performance d. DBMS performance ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 11-1a Performance Tuning: Client and Server LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 22. On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way possible, while making optimum use of existing resources. The activities required to achieve this goal are commonly referred to as _____ tuning. a. client and server b. database SQL c. SQL performance d. DBMS performance ANSWER: d Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 11: Database Performance Tuning and Query Optimization DIFFICULTY: Difficulty: Easy REFERENCES: 11-1a Performance Tuning: Client and Server LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 23. When moving data from permanent storage to RAM, an I/O disk operation retrieves a(n): a. entire table. b. entire physical disk block. c. single row containing the attribute requested. d. single attribute requested only. ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 24. A DBA determines the initial size of the data files that make up the database; however, as required, the data files can automatically expand in predefined increments known as _____. a. procedure cache b. buffer cache c. supplements d. extents ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 25. A(n) _____ is a logical grouping of several data files that store data with similar characteristics. a. procedure cache b. table space c. data cache d. listener ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 26. A system table space, a user data table space, an index table space, and a temporary table space are examples of _____. a. procedure caches b. file groups c. data caches d. operation modes ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 27. The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files. a. after; before b. after; after c. before; before d. before; after ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 11-1b DBMS Architecture Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 11: Database Performance Tuning and Query Optimization LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 28. To work with data, a DBMS must retrieve the data from _____ and place them in _____. a. data files; procedure cache b. RAM; data cache c. permanent storage; RAM d. temporary files; procedure cache ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 29. The data cache or _____ is a shared, reserved memory area that stores the most recently accessed data blocks in RAM. a. buffer cache b. procedure cache c. SQL cache d. permanent storage ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 30. The _____ is a shared, reserved memory area that stores the most recently executed SQL statements or PL/SQL procedures, including triggers and functions. a. buffer cache b. procedure cache c. data cache d. permanent storage ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 31. To generate database object statistics manually, following syntax should be used in Oracle: a. ANALYZE <TABLE/INDEX> object_name; b. CREATE <TABLE/INDEX> object_name; c. ANALYZE <TABLE/INDEX> object_name d. CREATE <TABLE/INDEX> object_name COMPUTE STATISTICS; COMPUTE STATISTICS; ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 11-1d Database Statistics LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 32. The _____ process analyzes SQL queries and finds the most efficient way to access data. a. optimizer b. scheduler c. listener d. user ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 33. Automatic query optimization means that the: a. optimization takes place at compilation time by the Copyright Cengage Learning. Powered by Cognero.

b. DBMS finds the most cost-effective access path Page 6


Chapter 11: Database Performance Tuning and Query Optimization programmer. without user intervention. c. optimization process is scheduled and selected by the d. database access strategy is defined when the end user or programmer. program is executed. ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-1c Database Query Optimization Modes LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 34. The DBMS _____ the SQL query and chooses the most efficient access/execution plan. a. parses b. executes c. fetches d. processes ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 11-2 Query Processing LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 35. Which of the following is the first step of query processing at the DBMS server end? a. Executing b. Parsing c. Fetching d. Delivering ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-2 Query Processing LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 36. During the ____ phase, the DBMS retrieves the data and sends the result set back to the client. a. parse b. execute c. fetch d. process ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 11-2 Query Processing LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 37. If there is no index, the DBMS will perform a _____ scan. a. loop b. range c. row ID table access d. full table ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 38. _____ refers to the number of different values a column could possibly have. a. Database statistics b. Data sparsity c. Bitmap index d. Clustering ANSWER: b DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 11: Database Performance Tuning and Query Optimization REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 39. Bitmap indexes tend to use less space than a _____ because they use bits instead of bytes to store their data. a. hash index b. sparse index c. B-tree index d. reverse index ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 40. Knowing the sparsity of a column helps you decide whether the use of _____ is appropriate. a. query processing b. query optimization c. an index d. a full table scan ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 41. _____ is the central activity during the parsing phase in query processing. a. Clustering b. Partitioning c. Query validation d. Query optimization ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 11-4 Optimizer Choices LEARNING OBJECTIVES: 11.04 - Differentiate between a rule-based optimizer and a cost-based optimizer 42. When setting optimizer hints, _____ instructs the optimizer to minimize the overall execution time, that is, to minimize the time it takes to return the total number of rows in the query result set. This hint is generally used for batch mode processes. a. ALL_ROWS b. FIRST_ROWS c. INDEX(P_QOH_NDX) d. OPTIMIZATION_ROWS ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 11-4a Using Hints to Affect Optimizer Choices LEARNING OBJECTIVES: 11.04 - Differentiate between a rule-based optimizer and a cost-based optimizer 43. In standard SQL, the optimizer hint FIRST_ROWS is generally used for _____ mode processes. a. batch b. interactive c. transaction d. real-time ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 11-4a Using Hints to Affect Optimizer Choices LEARNING OBJECTIVES: 11.04 - Differentiate between a rule-based optimizer and a cost-based optimizer 44. In standard SQL, the optimizer hint ALL_ROWS is generally used for _____ mode processes. Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 11: Database Performance Tuning and Query Optimization a. interactive b. real-time c. batch d. transaction ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 11-4a Using Hints to Affect Optimizer Choices LEARNING OBJECTIVES: 11.04 - Differentiate between a rule-based optimizer and a cost-based optimizer 45. The LIKE conditional operator is used by the _____ OPERAND1. a. P_PRICE b. V_STATE c. P_QOH d. V_CONTACT ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 11-5b Conditional Expressions LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 46. The _____ must be set large enough to permit as many data requests to be serviced from cache as possible. a. data cache b. SQL cache c. sort cache d. optimizer mode ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 47. The majority of primary memory resources will be allocated to the _____ cache. a. data b. SQL c. sort d. optimizer ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 48. The _____ cache is used as a temporary storage area for ORDER BY or GROUP BY operations, as well as for indexcreation functions. a. data b. SQL c. sort d. optimizer ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 49. From the performance point of view, _____ databases eliminate disk access bottlenecks. a. RAID b. distributed c. index-organized d. in-memory ANSWER: d DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 11: Database Performance Tuning and Query Optimization REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 50. In the context of RAID levels, _____ refers to writing the same data blocks to separate drives. a. striping b. mirroring c. partitioning d. aggregating ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance Completion 51. End users and the DBMS interact through the use of _____ to generate information. ANSWER: queries DIFFICULTY: Difficulty: Easy REFERENCES: 11-1 Database Performance-Tuning Concepts LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 52. A system will perform best when its hardware and software resources are _____. ANSWER: optimized DIFFICULTY: Difficulty: Easy REFERENCES: 11-1 Database Performance-Tuning Concepts LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 53. Database _____ activities can be divided into those taking place either on the client side or on the server side. ANSWER: performance tuning DIFFICULTY: Difficulty: Easy REFERENCES: 11-1a Performance Tuning: Client and Server LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 54. _____ is another name for table space. ANSWER: File group DIFFICULTY: Difficulty: Easy REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 55. A(n) _____ request is a low-level read or write data access operation to or from computer devices. ANSWER: input/output I/O DIFFICULTY: Difficutly: Moderate REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 56. DBMS query processing has _____ phases. ANSWER: 3 Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 11: Database Performance Tuning and Query Optimization three DIFFICULTY: Difficulty: Easy REFERENCES: 11-2 Query Processing LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 57. The _____ analyzes the SQL query and finds the most efficient way to access the data. ANSWER: query optimizer DIFFICULTY: Difficulty: Easy REFERENCES: 11-2a SQL Parsing Phase LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 58. Once an SQL statement is transformed, the DBMS creates what is commonly known as a(n) _____ plan. ANSWER: access execution DIFFICULTY: Difficulty: Easy REFERENCES: 11-2a SQL Parsing Phase LEARNING OBJECTIVES: 11.02 - Describe how a DBMS processes SQL queries in each of its three phases 59. _____ are ordered sets of values that are crucial in speeding up data access. ANSWER: Indexes DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 60. A(n) _____ is good for simple and fast lookup operations based on equality conditions. ANSWER: hash index DIFFICULTY: Difficulty: Easy REFERENCES: 11-3 Indexes and Query Optimization LEARNING OBJECTIVES: 11.03 - Explain the role of indexes in speeding up data access 61. _____ is a measure of the likelihood that an index will be used in query processing. ANSWER: Index selectivity DIFFICULTY: Difficulty: Easy REFERENCES: 11-5a Index Selectivity LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 62. _____ is evaluated based on client perspective. SQL performance tuning ANSWER: DIFFICULTY: Difficulty: Easy REFERENCES: 11-5 SQL Performance Tuning LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 63. A(n)_____ is an index based on a specific SQL function or expression. ANSWER: function-based index DIFFICULTY: Difficulty: Easy REFERENCES: 11-5a Index Selectivity Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 11: Database Performance Tuning and Query Optimization LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 64. A conditional expression is normally expressed within the _____ or HAVING clauses of a SQL statement. ANSWER: WHERE DIFFICULTY: Difficulty: Moderate REFERENCES: 11-5b Conditional Expressions LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 65. ______ helps provide a balance between performance and fault tolerance. ANSWER: RAID Redundant array of independent disks RAID (redundant array of independent disks) DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 66. The _____ table space is the most frequently accessed table space and should be stored in its own volume. ANSWER: system DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 67. The _____ cache is used as a temporary storage area for ORDER BY or GROUP BY operations, as well as for indexcreation functions. ANSWER: sort DIFFICULTY: Difficulty: Moderate REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 68. The _____ segment table space is used for transaction-recovery purposes. ANSWER: rollback DIFFICULTY: Difficulty: Easy REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 69. A(n) _____ table stores the end-user data and the index data in consecutive locations on permanent storage. ANSWER: index-organized clustered index DIFFICULTY: Difficulty: Moderate REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 70. In a level _____ RAID, the data and the parity data is striped across separate drives. ANSWER: 5 five DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 11: Database Performance Tuning and Query Optimization REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance Essay 71. List and describe some typical DBMS processes. ANSWER: Listener: The listener process listens for clients’ requests and handles the processing of the SQL requests to other DBMS processes. Once a request is received, the listener passes the request to the appropriate user process. User: The DBMS creates a user process to manage each client session. Therefore, when users log on to the DBMS, they are assigned a user process. This process handles all requests the users submit to the server. There are many user processes—at least one per logged-in client. Scheduler: The scheduler process organizes the concurrent execution of SQL requests. Lock manager: This process manages all locks placed on database objects, including disk pages. Optimizer: The optimizer process analyzes SQL queries and finds the most efficient way to access the data. DIFFICULTY: Difficulty: Moderate REFERENCES: 11-1b DBMS Architecture LEARNING OBJECTIVES: 11.01 - Identify the procedures involved in database performance tuning 72. Describe query optimization and the modes that an optimizer can operate in. ANSWER: Query optimization is the central activity during the parsing phase in query processing. In this phase, the DBMS must choose what indexes to use, how to perform join operations, which table to use first, and so on. Each DBMS has its own algorithms for determining the most efficient way to access the data. The query optimizer can operate in one of two modes: A rule-based optimizer uses preset rules and points to determine the best approach to execute a query. The rules assign a “fixed cost” to each SQL operation; the costs are then added to yield the cost of the execution plan. For example, a full table scan has a set cost of 10, while a table access by row ID has a set cost of 3. A cost-based optimizer uses sophisticated algorithms based on statistics about the objects being accessed to determine the best approach to execute a query. In this case, the optimizer process adds up the processing cost, the I/O costs, and the resource costs (RAM and temporary space) to determine the total cost of a given execution plan. DIFFICULTY: Difficulty: Moderate REFERENCES: 11-4 Optimizer Choices LEARNING OBJECTIVES: 11.04 - Differentiate between a rule-based optimizer and a cost-based optimizer 73. Why do we need to optimize a DBMS with SQL performance tuning, even though they automatically optimize SQL queries? ANSWER: There is considerable room for improvement since the DBMS uses general optimization techniques rather than focus on specific techniques dictated by the special circumstances of the query execution. A poorly written SQL query can, and usually will, bring the database system to its knees from a performance point of view. The majority of current database performance problems are related to poorly written SQL code. Therefore, although a DBMS provides general optimizing services, a carefully written query almost always outperforms a Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 11: Database Performance Tuning and Query Optimization poorly written one. DIFFICULTY: Difficulty: Moderate REFERENCES: 11-5 SQL Performance Tuning LEARNING OBJECTIVES: 11.05 - Describe some common practices used to write efficient SQL code 74. Summarize the steps required to formulate a query. ANSWER: Queries are usually written to answer questions. In order to formulate a query, the following steps are used. a) Identify what columns and computations are required: The first step is needed to determine those required data values that are to be returned. For example, one must determine if names and addresses alone need to be returned or is there a need to include computations as well while returning the output. Another important note in the first step is that the columns in the SELECT statement should return single values. b) Identify the source tables: Once the required columns are identified, the source tables used in the query can be determined. If certain attributes appear in more than one table try to use the least number of tables in the query to minimize the number of join operations. c) Determine how to join the tables: Once the tables needed in the query statement are determined, one needs to properly identify how to join the tables. In most cases, a natural join is used, but occasionally an outer join is used. d) Determine what selection criteria is used: Most queries involve some type of selection criteria. In this case, the operators and operands that are needed by the criteria are determined. The correct data type and the granularity of data in the comparison of criteria need to be ensured. e) Determine the order in which to display the output: In the final stage, the required output might be ordered by one or more columns. The ORDER BY clause is particularly used to order the required output in this way but is a very resourceintensive operation for the DBMS. DIFFICULTY: Difficulty: Moderate REFERENCES: 11-6 Query Formulation LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance 75. How should storage volumes be allocated for indexes, system, and high-usage tables? ANSWER: Assign separate data files in separate storage volumes for the indexes, system, and highusage tables. This ensures that index operations will not conflict with end-user data or data dictionary table access operations. Another advantage of this approach is that different disk block sizes in different volumes can be used. For example, the data volume can use a 16 K block size, while the index volume can use an 8 K block size. Remember that the index record size is generally smaller, and by changing the block size, contention is reduced and I/O operations are minimized. This is very important; many database administrators overlook indexes as a source of contention. By using separate storage volumes and different block sizes, the I/O operations on data and indexes will happen asynchronously; more importantly, the likelihood of write operations blocking read operations is reduced, as page locks tend to lock fewer records. DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 11: Database Performance Tuning and Query Optimization REFERENCES: 11-7 DBMS Performance Tuning LEARNING OBJECTIVES: 11.06 - Explain how to formulate queries and tune the DBMS for optimal performance

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 12: Distributed Database Management Systems True / False 1. A distributed database management system (DDBMS) governs the storage and processing of logically related data over interconnected computer systems. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-1 The Evolution of Distributed Database Management Systems LEARNING OBJECTIVES: 12.01 - Explain the purpose and function of distributed database management systems (DDBMSs) 2. Distributed data access was needed to support geographically dispersed business units. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-1 The Evolution of Distributed Database Management Systems LEARNING OBJECTIVES: 12.01 - Explain the purpose and function of distributed database management systems (DDBMSs) 3. Rapid ad hoc data became unnecessary in the quick-response decision-making environment. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 12-1 The Evolution of Distributed Database Management Systems LEARNING OBJECTIVES: 12.01 - Explain the purpose and function of distributed database management systems (DDBMSs) 4. The web is the repository for distributed data. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-1 The Evolution of Distributed Database Management Systems LEARNING OBJECTIVES: 12.01 - Explain the purpose and function of distributed database management systems (DDBMSs) 5. Current distributed database management system (DDBMS) are subject to some problems, such as the complexity of management and control. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 12: Distributed Database Management Systems LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 6. Distributed processing shares a database's logical processing among two or more physically independent sites that are connected through a network. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-3 Distributed Processing and Distributed Databases LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 7. One of the advantages of a distributed database management system (DDBMS) is that the data is located near the site with the least demand. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 8. One of the advantages of a distributed database management system (DDBMS) is security. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 9. Distributed processing does not require a distributed database, and a distributed database does not require distributed processing. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 12-3 Distributed Processing and Distributed Databases LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 10. In order to manage distributed data, copies or parts of the database processing functions must be distributed to all data storage sites. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-3 Distributed Processing and Distributed Databases LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 12: Distributed Database Management Systems 11. A database management system (DBMS) must have validation, transformation, and mapping functions, as well as other functions, in order to be classified as distributed. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 12. A fully distributed database management system (DBMS) must perform all the functions of a centralized DBMS, and it must handle all necessary functions imposed by the distribution of data and processing. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 13. The transaction processor (TP) is the software component found in each computer that requests data. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 14. A distributed database management system (DDBMS) must be communications-media-dependent. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 15. A transaction processor (TP) is the software component residing on each computer that stores and retrieves data located at the site. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 16. In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the system. a. True Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 12: Distributed Database Management Systems b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 12-6a Single-Site Processing, Single-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 17. Performance transparency ensures that the system finds the most cost-effective path to access remote data. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-7 Distributed Database Transparency Features LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 18. The level of transparency supported by the distributed database management system remains the same for all systems. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 19. Distribution transparency is supported by a distributed data dictionary. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 20. Distributed database systems do not require complex mechanisms to manage transactions and ensure the database's consistency and integrity. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 12-9 Transaction Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development Multiple Choice Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 12: Distributed Database Management Systems 21. A centralized database management is subject to a problem such as _____. a. growing numbers of remote locations b. maintaining and operating small database systems c. dependence on multiple sites d. organizational flexibility of the database ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 12-1 The Evolution of Distributed Database Management Systems LEARNING OBJECTIVES: 12.01 - Explain the purpose and function of distributed database management systems (DDBMSs) 22. A disadvantage of a distributed database management system (DDBMS) is: a. slower data access. b. site additions affects other operations. c. processor dependence. d. lack of standards. ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 23. A distributed database is composed of several parts known as database _____. a. sections b. fragments c. partitions d. parts ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-3 Distributed Processing and Distributed Databases LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 24. Distributed processing does not require: a. processing function distribution to all storage sites. b. an existing distributed database. c. interconnected networks of components. d. multiple sites to share processing chores. ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-3 Distributed Processing and Distributed Databases LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 25. A database management system needs _____ to prepare the data for presentation to the end user or to an application program. a. security b. concurrency control c. formatting d. I/O interface ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 26. The _____ processor is the software component found in each computer that requests data. It receives and processes the application's data requests. a. database b. transaction c. data d. network Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 12: Distributed Database Management Systems ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 27. In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote access from other independent database management systems in the network. a. transaction processor b. application processor c. transaction manager d. data processor ANSWER: d DIFFICULTY: Difficutly: Moderate REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 28. Under the _____ scenario, all record- and file-locking activities are performed at the end-user location. a. single-site processing, single-site data b. multiple-site processing, single-site data c. single-site processing, multiple-site data d. multiple-site processing, multiple-site data ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-6b Multiple-Site Processing, Single-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 29. _____ distributed database management systems (DDBMS) integrate multiple instances of the same DBMS over a network. a. Homogeneous b. Heterogeneous c. Fully heterogeneous d. Combination ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 12-6c Multiple-Site Processing, Multiple-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 30. A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems. a. fully heterogeneous b. fully homogeneous c. homogeneous d. heterogeneous ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 12-6c Multiple-Site Processing, Multiple-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 31. A DDBMS is subject to which restriction? a. Multiple instances of the same database should be integrated over a network. Copyright Cengage Learning. Powered by Cognero.

b. All database processing must be done at a single site. Page 6


Chapter 12: Distributed Database Management Systems c. Rapid ad hoc data access is not possible.

d. Remote data access is provided on a readonly basis.

ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 12-6c Multiple-Site Processing, Multiple-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 32. _____ transparency allows a physically dispersed database to be managed as though it were centralized. a. Distribution b. Transaction c. Failure d. Performance ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 12-7 Distributed Database Transparency Features LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 33. _____ transparency allows data to be updated simultaneously at several network sites. a. Transaction b. Distribution c. Failure d. Performance ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 12-7 Distributed Database Transparency Features LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 34. _____ transparency allows the system to operate as if it were a centralized database management system. a. Heterogeneity b. Distribution c. Performance d. Failure ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 12-7 Distributed Database Transparency Features LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 35. _____ transparency is the highest level of transparency. The end user or programmer does not need to know that a database is partitioned. a. Performance b. Fragmentation c. Location d. Local mapping ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 36. _____ transparency exists when the end user or programmer must specify the database fragment names but does not Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 12: Distributed Database Management Systems need to specify where these fragments are located. a. Transaction b. Location c. Local mapping d. Fragmentation ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 37. A distributed _____ contains the description of the entire database as seen by the database administrator. a. global index b. data dictionary c. global catalog d. data thesaurus ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 38. A _____ lets a single SQL statement access the data that are to be processed by a single remote database processor. a. remote request b. remote transaction c. distributed request d. distributed transaction ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 12-9a Distributed Requests and Distributed Transactions LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 39. A distributed _____ can reference several different local or remote data processing sites. a. request b. site c. data location d. transaction ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 12-9a Distributed Requests and Distributed Transactions LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 40. A _____ request lets a single SQL statement reference data located at several different local or remote DP sites. a. distributed b. transaction c. fragmented d. remote ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 12-9a Distributed Requests and Distributed Transactions LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 41. The _____ guarantees that if a portion of a transaction operation cannot be committed, all changes made at the other Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 12: Distributed Database Management Systems sites participating in the transaction will be undone to maintain a consistent database state. a. DO-UNDO-REDO protocol b. two-phase commit protocol (2PC) c. coordinator protocol d. write-ahead protocol ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-9c Two-Phase Commit Protocol LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 42. The objective of _____ optimization is to minimize the total cost associated with the execution of a request. a. data b. remote c. transaction d. query ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 12-10 Performance and Failure Transparency LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 43. _____ is the delay imposed by the amount of time required for a data packet to make a round trip from point A to point B. a. Data distribution b. Replica transparency c. Network latency d. Network partitioning ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 12-10 Performance and Failure Transparency LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 44. _____ fragmentation allows a user to break a single object into two or more segments, or fragments. a. Horizontal b. Vertical c. Data d. Request ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 12-11a Data Fragmentation LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 45. _____ fragmentation refers to the division of a relation into subsets of tuples. a. Vertical b. Horizontal c. Data d. Mixed ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-11a Data Fragmentation LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 12: Distributed Database Management Systems 46. _____ fragmentation refers to the division of a relation into attribute subsets. a. Data b. Horizontal c. Vertical d. Mixed ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 12-11a Data Fragmentation LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 47. The _____ rule requires that all copies of data fragments be identical. a. shared fragment b. mutual consistency c. horizontal fragmentation d. replication ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-11b Data Replication LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 48. A(n) _____ database stores each database fragment at a single site. a. partially replicated b. unreplicated c. fully replicated d. partitioned ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 12-11b Data Replication LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 49. During _____ data allocation, the database is divided into two or more disjointed parts (fragments) and stored at two or more sites. a. mixed b. replicated c. centralized d. partitioned ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 12-11c Data Allocation LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 50. Which property of the CAP theorem assumes that all transaction operations take place at the same time in all nodes, as if they were executing in a single-node database? a. Consistency b. Partition tolerance c. Availability d. Performance transparency ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 12-12 The CAP Theorem LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 12: Distributed Database Management Systems Completion 51. In a basic distributed processing environment, the distributed processing system shares the database chores among three sites connected through a(n) _____. ANSWER: communications network DIFFICULTY: Difficulty: Easy REFERENCES: 12-3 Distributed Processing and Distributed Databases LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 52. One of the advantages of a distributed database management system (DDBMS) is _____ operating cost. ANSWER: reduced lower DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 53. A user-friendly _____ is one advantage of a distributed database management system (DDBMS) . ANSWER: interface DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 54. One of the advantages of a distributed database management system (DDBMS) is less danger of a single-_____ failure. ANSWER: point DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 55. One of the advantages of a distributed database management system (DDBMS) is processor _____. ANSWER: independence DIFFICULTY: Difficulty: Easy REFERENCES: 12-2 DDBMS Advantages and Disadvantages LEARNING OBJECTIVES: 12.02 - Summarize the advantages and disadvantages of DDBMSs 56. _____ management ensures that data move from one consistent state to another. ANSWER: Transaction DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 57. In a distributed database management system (DDBMS), _____ occurs to determine the data location of local and remote fragments. ANSWER: mapping DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 12: Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 58. In a distributed database management system (DDBMS), query _____ is used to find the best access strategy. ANSWER: optimization DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 59. In a distributed database management system (DDBMS), _____ control is used to manage simultaneous data access and ensure data consistency across database fragments. ANSWER: concurrency DIFFICULTY: Difficulty: Easy REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 60. A transaction processor is also known as the _____ processor. ANSWER: application DIFFICULTY: Difficulty: Easy REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 61. The distributed database system must be _____ of the computer system hardware. ANSWER: independent DIFFICULTY: Difficulty: Easy REFERENCES: 12-5 DDBMS Components LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 62. The _____ scenario is typical of most mainframe and midrange UNIX/LINUX server database management systems (DBMS). ANSWER: single-site processing, single-site data SPSD single-site processing, single-site data (SPSD) DIFFICULTY: Difficulty: Easy REFERENCES: 12-6a Single-Site Processing, Single-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 63. Typically, the _____ scenario requires a network file server running conventional applications that are accessed through a network. ANSWER: multiple-site processing, single-site data MPSD multiple-site processing, single-site data (MPSD) DIFFICULTY: Difficulty: Easy REFERENCES: 12-6b Multiple-Site Processing, Single-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 12: Distributed Database Management Systems 64. The _____ fragment condition indicates that no row has a duplicate, regardless of the fragment in which it is located. ANSWER: unique DIFFICULTY: Difficulty: Moderate REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 65. The database description, known as the distributed _____ schema, is the common database schema used by local transaction processors (TPs) to translate user requests into subqueries that will be processed by different data processors (DPs). ANSWER: global DIFFICULTY: Difficulty: Easy REFERENCES: 12-8 Distribution Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 66. The _____ protocol is used by a DP to roll transactions back and forward with the help of the system's transaction log entries. ANSWER: DO-UNDO-REDO DO UNDO REDO do-undo-redo do undo redo DIFFICULTY: Difficulty: Easy REFERENCES: 12-9c Two-Phase Commit Protocol LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 67. The _____ forces the log entry to be written to permanent storage before the actual operation takes place. ANSWER: write-ahead protocol DIFFICULTY: Difficulty: Easy REFERENCES: 12-9c Two-Phase Commit Protocol LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 68. Data _____ describes the process of deciding where to locate data. ANSWER: allocation DIFFICULTY: Difficulty: Easy REFERENCES: 12-11c Data Allocation LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability 69. After an update, the originating DP node sends the changes to the replica nodes to ensure that data is immediately updated, during _____ replication. ANSWER: push DIFFICULTY: Difficulty: Moderate REFERENCES: 12-11b Data Replication LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 12: Distributed Database Management Systems availability 70. During _____ replication, after an update, the originating DP node sends “messages” to the replica nodes to notify them of the update. ANSWER: pull DIFFICULTY: Difficulty: Moderate REFERENCES: 12-11b Data Replication LEARNING OBJECTIVES: 12.06 - Describe how distributed database design balances performance, scalability, and availability Essay 71. A fully distributed database management system must perform all of the functions of a centralized database management system (DBMS). What are these functions? ANSWER: 1. Receive the request of an application or end user. 2. Validate, analyze, and decompose the request. The request might include mathematical and logical operations such as the following: Select all customers with a balance greater than $1,000. The request might require data from only a single table, or it might require access to several tables. 3. Map the request’s logical-to-physical data components. 4. Decompose the request into several disk I/O operations. 5. Search for, locate, read, and validate the data. 6. Ensure database consistency, security, and integrity. 7. Validate the data for the conditions, if any, specified by the request. 8. Present the selected data in the required format. DIFFICULTY: Difficulty: Moderate REFERENCES: 12-4 Characteristics of Distributed Database Management Systems LEARNING OBJECTIVES: 12.03 - Describe the characteristics and components of DDBMSs 72. Explain the difference between homogeneous and heterogeneous distributed database management systems (DDBMS). ANSWER: Homogeneous DDBMSs integrate multiple instances of the same DBMS over a network— for example, multiple instances of Oracle 11g running on different platforms. In contrast, heterogeneous DDBMSs integrate different types of DBMSs over a network, but all support the same data model. A fully heterogeneous DDBMS will support different DBMSs, each one supporting a different data model, running under different computer systems. DIFFICULTY: Difficulty: Moderate REFERENCES: 12-6c Multiple-Site Processing, Multiple-Site Data LEARNING OBJECTIVES: 12.04 - Explain how database implementation is affected by different levels of data and process distribution 73. Describe performance transparency and heterogeneity transparency. ANSWER: Performance transparency allows the system to perform as if it were a centralized DBMS. The system will not suffer any performance degradation due to its use on a network or because of the network’s platform differences. Performance transparency also ensures that the system will find the most cost-effective path to access remote data. The system should be able to “scale out” in a transparent manner, or increase performance capacity by adding more transaction or data-processing nodes, without affecting the overall performance of the system. Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 12: Distributed Database Management Systems Heterogeneity transparency (relational, network, and hierarchical) under a common, or global, schema. The DDBMS is responsible for translating the data requests from the global schema to the local DBMS schema.allows the integration of several different local DBMSs DIFFICULTY: Difficulty: Moderate REFERENCES: 12-7 Distributed Database Transparency Features LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 74. What is transaction transparency? What are some of the basic concepts that one should know to understand how transactions are managed in a distributed database management system (DDBMS)? ANSWER: Transaction transparency is a DDBMS property that ensures database transactions will maintain the distributed database’s integrity and consistency. It should be remembered that a DDBMS database transaction can update data stored in many different computers connected in a network. Transaction transparency ensures that the transaction will be completed only when all database sites involved in the transaction complete their part of the transaction. Distributed database systems require complex mechanisms to manage transactions and ensure the database’s consistency and integrity. To understand how the transactions are managed, the basic concepts governing remote requests, remote transactions, distributed transactions, and distributed requests should be known. DIFFICULTY: Difficulty: Moderate REFERENCES: 12-7 Distributed Database Transparency Features 12-9 Transaction Transparency LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 75. Explain the three types of operations defined by the DO-UNDO-REDO protocol. ANSWER: 1. DO performs the operation and records the “before” and “after” values in the transaction log. 2. UNDO reverses an operation, using the log entries written by the DO portion of the sequence. 3. REDO redoes an operation, using the log entries written by the DO portion of the sequence. DIFFICULTY: Difficulty: Moderate REFERENCES: 12-9c Two-Phase Commit Protocol LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 13: Business Intelligence and Data Warehouses True / False 1. Business intelligence is a framework that allows a business to transform data into information, information into knowledge, and knowledge into wisdom. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-2 Business Intelligence LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 2. Business intelligence (BI) architecture is composed of data, people, processes, and technology working together to facilitate and enhance a business’s management and governance. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 3. A data store is used by data analysts to create queries that access the database. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 4. Master data management’s main goal is to provide a partial and segmented definition of all data within an organization. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 5. Operational data and decision support data serve the same purpose. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-3a Operational Data versus Decision Support Data Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 13: Business Intelligence and Data Warehouses LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 6. Decision support data is a snapshot of the operational data at a given point in time. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-3a Operational Data versus Decision Support Data LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 7. Queries against operational data typically are broad in scope and high in complexity. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-3a Operational Data versus Decision Support Data LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 8. Data warehouse data are organized and summarized by table, such as CUSTOMER and ADDRESS. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-4 The Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 9. Relational data warehouses use the star schema design technique to handle multidimensional data. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-4b Twelve Rules That Define a Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 10. The data warehouse development life cycle differs from classical systems development. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-4b Twelve Rules That Define a Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 11. A data warehouse designer must define common business dimensions that will be used by a data analyst to expand a search. a. True Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 13: Business Intelligence and Data Warehouses b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 13-5c Attributes LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 12. By default, the fact table’s primary key is always formed by combining the superkeys pointing to the dimension tables to which they are related. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-5e Star Schema Representation LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 13. Normalizing fact tables improves data access performance and saves data storage space. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 13-5f Performance-Improving Techniques for the Star Schema LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 14. Periodicity, usually expressed as current year only, previous years, or all years, provides information about the time span of the data stored in a table. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-5f Performance-Improving Techniques for the Star Schema LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 15. Multidimensional data analysis techniques include advanced computational functions. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 13-6a Multidimensional Data Analysis Techniques LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 16. Advanced OLAP feature become more useful when access to them is kept simple. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 13: Business Intelligence and Data Warehouses REFERENCES: 13-6c Easy-to-Use End-User Interfaces LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 17. A star schema is designed to optimize data query operations rather than data update operations. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-6e Relational OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 18. ROLAP and MOLAP vendors are working toward the integration of their respective solutions within a unified decision support framework. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-6g Relational versus Multidimensional OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 19. The ROLLUP extension is used with the GROUP BY clause to generate aggregates by the listed columns, including the last one. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 13-8a The ROLLUP Extension LEARNING OBJECTIVES: 13.08 - Explain how SQL analytic functions are used to support data analytics 20. The CUBE extension enables you to get a subtotal for each column listed in the expression, in addition to a grand total for the last column listed. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 13-8b The CUBE Extension LEARNING OBJECTIVES: 13.08 - Explain how SQL analytic functions are used to support data analytics Multiple Choice 21. A(n) _____ is optimized for decision support and is generally represented by a data warehouse or a data mart. a. data store b. ETL tool c. data visualization d. data analysis tool ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 13: Business Intelligence and Data Warehouses LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 22. _____ are in charge of presenting data to the end user in a variety of ways. a. Data stores b. ETL tools c. Data visualization tools d. Data analysis tools ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 23. _____ provide a unified, single point of entry for information distribution. a. Decision support systems b. Portals c. Data warehouses d. Dashboards ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 24. In business intelligence framework, data are captured from a production system and placed in _____ on a near realtime basis. a. decision support system b. portal c. data warehouse d. dashboard ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 25. _____ tools focus on the strategic and tactical use of information. a. Business b. Relational database management c. Business intelligence d. Networking ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 26. Which of the following is a personal analytics vendor for BI applications? a. IBM b. Kognitio c. Netezza d. MicroStrategy ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-2d Business Intelligence Technology Trends Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 13: Business Intelligence and Data Warehouses LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 27. From a data analyst’s point of view, decision support data differ from operational data in three main areas: time span, granularity, and _____. a. usability b. dimensionality c. transaction processing d. sparsity ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-3a Operational Data versus Decision Support Data LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 28. Operational data are commonly stored in many tables, and the stored data represents information about a given _____ only. a. transaction b. database c. table d. concept ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-3a Operational Data versus Decision Support Data LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 29. The _____ schema must support complex (non-normalized) data representations. a. snowflake b. online analytical processing c. decision support database d. multidimensional database ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-3b Decision Support Database Requirements LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 30. Data _____ implies that all business entities, data elements, data characteristics, and business metrics are described in the same way throughout the enterprise. a. visualization b. analytics c. mining d. integration ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-4 The Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 31. _____ can serve as a test vehicle for companies exploring the potential benefits of data warehouses. a. Data networks b. Data marts c. Data cubes d. OLAPs ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-4a Data Marts LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 13: Business Intelligence and Data Warehouses 32. Bill Inmon and Chuck Kelley created a set of 12 rules to define a(n) _____. a. data warehouse b. multidimensional cube c. OLAP tool d. star schema ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-4b Twelve Rules That Define a Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 33. The basic star schema has four components: facts, _____, attributes, and attribute hierarchies. a. keys b. relationships c. cubes d. dimensions ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-5 Star Schemas LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 34. Computed or derived facts, at run time, are sometimes called _____ to differentiate them from stored facts. a. schemas b. attributes c. metrics d. dimensions ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-5a Facts LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 35. In a star schema, attributes are often used to search, filter, or classify _____. a. tables b. sales c. facts d. dimensions ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-5c Attributes LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 36. The attribute hierarchy provides a top-down data organization that is used for two main purposes: _____ and drilldown/roll-up data analysis. a. decomposition b. de-normalization c. normalization d. aggregation ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-5d Attribute Hierarchies LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 37. In star schema representation, a fact table is related to each dimension table in a _____ relationship. a. many-to-one (M:1) b. many-to-many (M:M) c. one-to many (1:M) d. one-to-one (1:1) ANSWER: a Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 13: Business Intelligence and Data Warehouses DIFFICULTY: Difficulty: Easy REFERENCES: 13-5e Star Schema Representation LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 38. Fact and dimension tables are related by _____ keys. a. shared b. primary c. foreign d. linked ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-5e Star Schema Representation LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 39. In a typical star schema, each dimension record is related to thousands of _____ records. a. attribute b. fact c. key d. primary ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-5e Star Schema Representation LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 40. A _____ schema is a type of star schema in which dimension tables can have their own dimension tables. a. snowflake b. starflake c. dimension d. matrix ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-5f Performance-Improving Techniques for the Star Schema LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 41. _____ splits a table into subsets of rows or columns and places the subsets close to the client computer to improve data access time. a. Normalization b. Meta modeling c. Replication d. Partitioning ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-5f Performance-Improving Techniques for the Star Schema LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 42. The reliance on _____ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems. a. normalization b. denormalization c. star schema d. multidimensional schema ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-6e Relational OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 13: Business Intelligence and Data Warehouses 43. Decision support data tends to be non-normalized, _____, and pre-aggregated. a. unique b. duplicated c. optimized d. sorted ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-6e Relational OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 44. _____ extends SQL so that it can differentiate between access requirements for data warehouse data and operational data. a. ROLAP b. OLAP c. DBMS d. BI ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-6e Relational OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 45. A _____ index is based on 0 and 1 bits to represent a given condition. a. logical b. multidimensional c. normal d. bitmapped ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-6e Relational OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 46. Conceptually, MDBMS end users visualize the stored data as a three-dimensional cube known as a _____. a. multi-cube b. database cube c. data cube d. hyper cube ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 13-6f Multidimensional OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 47. An multidimensional database management systems (MDBMS) uses proprietary techniques to store data in _____ ndimensional arrays. a. table-like b. matrix-like c. network-like d. cube-like ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-6f Multidimensional OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 48. A _____ is a dynamic table that not only contains the SQL query command to generate the rows, but also stores the actual rows. a. SQL view b. materialized view c. star schema d. data cube Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 13: Business Intelligence and Data Warehouses ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 13-8c Materialized Views LEARNING OBJECTIVES: 13.09 - Define data visualization and explain how it supports business intelligence 49. Data visualization has its roots in the _____ sciences, which focus on how the human brain receives, interprets, organizes, and processes information. a. cognitive b. developmental c. social d. health ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 13-9b The Science of Data Visualization LEARNING OBJECTIVES: 13.09 - Define data visualization and explain how it supports business intelligence 50. Which type of data describes numeric facts or measures that can be can be counted, ordered, and aggregated? a. qualitative b. ordinal c. nominal d. quantitative ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 13-9c Understanding the Data LEARNING OBJECTIVES: 13.09 - Define data visualization and explain how it supports business intelligence Completion 51. _____ is a term used to describe a comprehensive, cohesive, and integrated set of tools and processes used to capture, collect, integrate, store, and analyze data with the purpose of generating and presenting information used to support business decision making. ANSWER: Business intelligence DIFFICULTY: Difficulty: Easy REFERENCES: 13-2 Business Intelligence LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 52. _____ functionality ranges from simple data gathering and transformation to very complex data analysis and presentation. ANSWER: BI business intelligence DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 53. _____ use web-based technologies to present key business performance indicators or information in a single integrated view, generally using graphics in a clear, concise, and easy to understand manner. ANSWER: Dashboards DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 13: Business Intelligence and Data Warehouses LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 54. Data _____ tools are tools that provide advanced statistical analysis to uncover problems and opportunities hidden within business data. ANSWER: mining DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 55. _____ are quantifiable measurements (numeric or scale based) that assess a company’s effectiveness or success in reaching its strategic and operational goals. ANSWER: Key performance indicators KPI KPIs Key performance indicators (KPI) DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 56. _____ is a collection of concepts, techniques, and processes for the proper identification, definition, and management of data elements within an organization. ANSWER: Master data management MDM Master data management (MDM) DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 57. ______ is a method or process of government. ANSWER: Governance DIFFICULTY: Difficulty: Easy REFERENCES: 13-2a Business Intelligence Architecture LEARNING OBJECTIVES: 13.02 - Describe the architecture, reporting styles, evolution, and benefits of business intelligence 58. _____ means to decompose data into more atomic components or data at lower levels of aggregation. ANSWER: Drill down DIFFICULTY: Difficulty: Easy REFERENCES: 13-3a Operational Data versus Decision Support Data LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 59. To support a(n) _____ adequately, the DBMS might be required to support advanced storage technologies, and even more importantly, to support multiple-processor technologies, such as a symmetric multiprocessor (SMP) or a massively parallel processor (MPP). Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 13: Business Intelligence and Data Warehouses ANSWER:

VLDB very large database very large database (VLDB) DIFFICULTY: Difficulty: Moderate REFERENCES: 13-3b Decision Support Database Requirements LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 60. A(n)_____ is a read-only database optimized for data analysis and query processing. ANSWER: data warehouse DIFFICULTY: Difficulty: Easy REFERENCES: 13-4 The Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 61. A data _____ is a centralized, consolidated database that integrates data derived from the entire organization and from multiple sources with diverse formats. ANSWER: warehouse DIFFICULTY: Difficulty: Easy REFERENCES: 13-4 The Data Warehouse LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 62. A data _____ is a small, single-subject data warehouse subset that provides decision support to a small group of people. ANSWER: mart DIFFICULTY: Difficulty: Easy REFERENCES: 13-4a Data Marts LEARNING OBJECTIVES: 13.04 - Identify the purpose, characteristics, and components of a data warehouse 63. _____ are numeric measurements (values) that represent a specific business aspect or activity. ANSWER: Facts DIFFICULTY: Difficulty: Easy REFERENCES: 13-5a Facts LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 64. _____ are qualifying characteristics that provide additional perspectives to a given fact. ANSWER: Dimensions DIFFICULTY: Difficulty: Easy REFERENCES: 13-5b Dimensions LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 65. In multidimensional terms, the ability to focus on slices of the cube to perform a more detailed analysis is known as _____. ANSWER: slice and dice DIFFICULTY: Difficulty: Easy REFERENCES: 13-5c Attributes LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes

Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 13: Business Intelligence and Data Warehouses 66. The _____ hierarchy provides a top-down data organization that is used for two main purposes: aggregation and drilldown/roll-up data analysis. ANSWER: attribute DIFFICULTY: Difficulty: Easy REFERENCES: 13-5d Attribute Hierarchies LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 67. _____ makes a copy of a table and places it in a different location to improve access time. ANSWER: Replication DIFFICULTY: Difficulty: Easy REFERENCES: 13-5f Performance-Improving Techniques for the Star Schema LEARNING OBJECTIVES: 13.05 - Develop star and snowflake schemas for decision-making purposes 68. The most distinctive characteristic of modern OLAP tools is their capacity for _____ analysis. ANSWER: multidimensional DIFFICULTY: Difficulty: Easy REFERENCES: 13-6a Multidimensional Data Analysis Techniques LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 69. To deliver efficient decision support, OLAP tools must have advanced data _____ features. ANSWER: access DIFFICULTY: Difficulty: Easy REFERENCES: 13-6b Advanced Database Support LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining 70. _____ is a measurement of the density of the data held in the data cube and is computed by dividing the total number of actual values in the cube by the total number of cells in the cube. ANSWER: Sparsity DIFFICULTY: Difficulty: Easy REFERENCES: 13-6f Multidimensional OLAP LEARNING OBJECTIVES: 13.07 - Describe the role and functions of data analytics and data mining Essay 71. What is the difference between decision support data and operational data from the point of view of data analyst? ANSWER: From a data analyst’s point of view, decision support data differ from operational data in three main areas: time span, granularity, and dimensionality. Time span: Operational data cover a short time frame. In contrast, decision support data tend to cover a longer time frame. Granularity (level of aggregation): Decision support data must be presented at different levels of aggregation, from highly summarized to nearly atomic. Dimensionality: Operational data focus on representing individual transactions rather than the effects of the transactions over time. In contrast, data analysts tend to include many data dimensions and are interested in how the data relate over those dimensions. DIFFICULTY: Difficulty: Moderate REFERENCES: 13-3a Operational Data versus Decision Support Data Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 13: Business Intelligence and Data Warehouses LEARNING OBJECTIVES: 13.03 - Differentiate between operational data and decision support data 72. Describe the use of SQL in relation to ROLAP. ANSWER: Most decision support data requests require the use of multiple-pass SQL queries or multiple nested SQL statements. To answer this criticism, ROLAP extends SQL so that it can differentiate between access requirements for data warehouse data (based on the star schema) and operational data (normalized tables). A ROLAP system therefore can generate the SQL code required to access the star schema data. Query performance is also improved because the query optimizer is modified to identify the SQL code’s intended query targets. For example, if the query target is the data warehouse, the optimizer passes the requests to the data warehouse. However, if the end user performs drill-down queries against operational data, the query optimizer identifies that operation and properly optimizes the SQL requests before passing them to the operational DBMS. DIFFICULTY: Difficulty: Moderate REFERENCES: 13-6e Relational OLAP LEARNING OBJECTIVES: 13.08 - Explain how SQL analytic functions are used to support data analytics 73. What is the ROLLUP extension to the GROUP BY clause? Provide the syntax for this extension. ANSWER: The ROLLUP extension is used with the GROUP BY clause to generate aggregates by different dimensions. As you know, the GROUP BY clause will generate only one aggregate for each new value combination of attributes listed in the GROUP BY clause. The ROLLUP extension goes one step further; it enables you to get a subtotal for each column listed except for the last one, which gets a grand total instead. The syntax of the GROUP BY ROLLUP command sequence is as follows: SELECT column1 [, column2, ...], aggregate_function(expression) FROM table1 [, table2, …] [WHERE condition] GROUP BY ROLLUP (column1 [, column2, ...]) [HAVING condition] [ORDER BY column1 [, column2, …]] DIFFICULTY: Difficulty: Moderate REFERENCES: 13-8a The ROLLUP Extension LEARNING OBJECTIVES: 13.08 - Explain how SQL analytic functions are used to support data analytics 74. What is data visualization? Name different techniques of data visualization. ANSWER: Data visualization is the abstracting of data to provide information in a visual format that enhances a user's ability to effectively comprehend the meaning of the data. The goal of data visualization is to allow the user to see the big picture in the most efficient way possible. Data visualization aggregates the data into a format that provides at-a-glance insight into overall trends and patterns. Data visualization techniques, that can range from simple to very complex, include pie charts, line graphs, bar charts, scatter plots, gantt charts, and heat maps. DIFFICULTY: Difficulty: Moderate REFERENCES: 13-9 Data Visualization LEARNING OBJECTIVES: 13.09 - Define data visualization and explain how it supports business intelligence 75. Before you start with data visualization, you must understand the data. The same data can be presented in multiple ways. Explain the two types of data. ANSWER: In general, there are two types of data: Qualitative: describes qualities of the data. This type of data can be subdivided in two Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 13: Business Intelligence and Data Warehouses subtypes: • •

Nominal: This is data that can be counted but not ordered or aggregated. Examples: sex (male or female); student class (graduate or undergraduate). Ordinal: This is data that can be counted and ordered but not aggregated. Examples: rate your teacher (excellent, good, fair, poor), what is your family income (under 20,000, 20,001 to 40,000, 40,001 to 60,000, 60,001 or more).

Quantitative: describes numeric facts or measures of the data. This type of data can be counted, ordered and aggregated. Statisticians refer to this data as “interval and ratio” data. Examples of quantitative data include age, GPA, number of accidents, etc. DIFFICULTY: Difficulty: Moderate REFERENCES: 13-9c Understanding the Data LEARNING OBJECTIVES: 13.09 - Define data visualization and explain how it supports business intelligence

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 14: Big Data and NoSQL True / False 1. Lack of specificity is what leads to ambiguity in defining Big Data.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-1 Big Data LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 2. For a data set to be considered Big Data, it must display only one of the 3 Vs (volume, velocity and variety).

a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 14-1 Big Data LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 3. Scaling out is keeping the same number of systems, but migrating each system to a larger one.

a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 14-1a Volume LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 4. In many ways, the issues associated with volume and velocity are the same.

a. True b. False ANSWER: True DIFFICULTY: Moderate REFERENCES: 14-1b Velocity LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 5. The analysis of data to produce actionable results is feedback loop processing.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-1b Velocity LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 6. Relational databases rely on unstructured data.

a. True Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 14: Big Data and NoSQL b. False ANSWER: False DIFFICULTY: Moderate REFERENCES: 14-1c Variety LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 7. Big Data processing imposes a structure on the data as needed for applications as a part of retrieval and processing.

a. True b. False ANSWER: True DIFFICULTY: Moderate REFERENCES: 14-1c Variety LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 8. The ability to graphically present data in a way that makes it understandable is the concept of value.

a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 14-1d Other Characteristics LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 9. Characteristics that are important in working with data in the relational database model also apply to Big Data.

a. True b. False ANSWER: True DIFFICULTY: Moderate REFERENCES: 14-1d Other Characteristics LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 10. Hadoop is a database that has become the de facto standard for most Big Data storage and processing.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-2 Hadoop LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 11. Under the HDFS system, using a write-one, ready-many model simplifies concurrency issues.

a. True b. False ANSWER: DIFFICULTY: REFERENCES:

True Easy 14-2a HDFS

Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 14: Big Data and NoSQL LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 12. A block report is used to let the name node know that the data mode is still available.

a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 14-2a HDFS LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 13. A reduce function takes a collection of key-value pairs with the same key value and summarizes them into a single result.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-2b MapReduce LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 14. Hive is a good choice for jobs that require a small subset of data to be returned very quickly.

a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 15. Flume is a tool for converting data back and forth between a relational database and the HDFS.

a. True b. False ANSWER: False DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 16. Most NoSQL products run only in a Linux or Unix environment.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-3 NoSQL LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 17. Key-value and document databases are structurally similar. Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 14: Big Data and NoSQL a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-3b Document Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 18. A column family database is a NoSQL database model that organizes data in key-value pairs with keys mapped to a set of columns in the value component.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-3c Column-Oriented Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 19. Interest in graph databases can be tied to the area of social networks.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-3d Graph Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 20. The name, MongoDB, comes from the word humongous as its developers intended their new product to support extremely large data sets.

a. True b. False ANSWER: True DIFFICULTY: Easy REFERENCES: 14-5 Working with Document Databases Using MongoDB LEARNING OBJECTIVES: 14.07 - Understand how to work with document databases using MongoDB

Multiple Choice 21. ______ is NOT one of the "3 Vs" of Big Data. a. Volume b. Velocity

c. Validation

d. Variety

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-1 Big Data LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 14: Big Data and NoSQL 22. ______ is keeping the same number of systems, but migrating each system to a larger system. a. Clustering b. Scaling up

c. Streaming

d. Scaling out

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-1a Volume LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 23. ______ focuses on filtering data as it enters the system to determine which data to keep and which to discard. a. Scaling up b. Feedback loop processing

c. Stream processing

d. Scaling out

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-1b Velocity LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 24. A(n) ______ is a process or set of operations in a calculation. a. algorithm b. feedback loop

c. stream

d. structure

ANSWER: a DIFFICULTY: Easy REFERENCES: 14-1b Velocity LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 25. Big Data ______. a. relies on the use of structured data

c. relies on the use of unstructured data

b. captures data in whatever format it naturally exists d. imposes a structure on data when it is captured

ANSWER: b DIFFICULTY: Moderate REFERENCES: 14-1c Variety LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 26. In the context of Big Data, ______ relates to changes in meaning. a. variety b. variability

c. veracity

d. viability

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-1d Other Characteristics LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 27. In the context of Big Data, ______ refers to the trustworthiness of a set of data. a. value b. variability

c. veracity

d. viability

Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 14: Big Data and NoSQL ANSWER: c DIFFICULTY: Easy REFERENCES: 14-1d Other Characteristics LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 28. By default, Hadoop uses a replication factor of ______. a. one b. two

c. three

d. four

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-2a HDFS LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 29. Which of the following is NOT a key assumption of the Hadoop Distributed File System? a. High volume b. Write many, read-once

c. Streaming access

d. Fault-tolerance

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-2a HDFS LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 30. When using a HDFS, the ______ node creates new files by communicating with the ______ node.

a. client; name c. data; client

b. data; name d. host; client

ANSWER: a DIFFICULTY: Moderate REFERENCES: 14-2a HDFS LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 31. When using a HDFS, a heartbeat is sent every ______ to notify the name node that the data mode is still available. a. 3 hours b. 3 seconds

c. 6 hours

d. 6 seconds

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-2a HDFS LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 32. When using MapReduce, a _______ function takes a collection and data and sorts and filters it into a set of key-value pairs. a. reduce b. map

c. data ANSWER: DIFFICULTY: REFERENCES:

d. block b Easy 14-2b MapReduce

Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 14: Big Data and NoSQL LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 33. When using MapReduce, best practices suggest that the number of mappers on a given node should be ______. a. 50 or less b. over 100 but less than 300

c. 100 or less

d. at least 300

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-2b MapReduce LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 34. ______ processing occurs when a program runs from beginning to end without any user interaction. a. Hadoop b. Block

c. Hive

d. Batch

ANSWER: d DIFFICULTY: Easy REFERENCES: 14-2b MapReduce LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 35. Two of the most popular applications to simplify the process of creating MapReduce jobs are Hive and ______. a. Flume b. Pig

c. Sqoop

d. Impala

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 36. ______ is a tool for converting data back and forth between a relational database and the HDFS. a. Flume b. Pig

c. Sqoop

d. Impala

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 37. ______ was the first SQL on Hadoop application. a. Flume b. Pig

c. Sqoop

d. Impala

ANSWER: d DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 38. Which of the following is NOT one of the standard NoSQL categories? a. Document databases b. Column-oriented databases Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 14: Big Data and NoSQL c. Graph databases

d. Chart databases

ANSWER: d DIFFICULTY: Easy REFERENCES: 14-3 NoSQL LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 39. To query the value component of the pair when using a key-value database, use get or ______. a. store b. fetch

c. retrieve

d. gather

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-3a Key-Value Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 40. Document databases group documents into logical groups called ______. a. buckets b. sets

c. collections

d. blocks

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-3b Document Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 41. ______ minimizes the number of disk reads necessary to retrieve a row of data. a. Column-oriented database b. Row-centric storage

c. Column-family database

d. Column-centric storage

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-3c Column-Oriented Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 42. Modeling and storing data about relationships is the focus of ______ databases. a. key-value b. column-oriented

c. document d

d. graph

ANSWER: d DIFFICULTY: Easy REFERENCES: 14-3d Graph Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 43. Graph theory is a mathematical and computer science field that models relationships, or edges, between objects called ______. Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 14: Big Data and NoSQL a. maps c. buckets

b. scales d. nodes

ANSWER: d DIFFICULTY: Easy REFERENCES: 14-3d Graph Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 44. A query in a graph database is called a ______. a. schema b. hierarchy

c. traversal

d. script

ANSWER: c DIFFICULTY: Easy REFERENCES: 14-3d Graph Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 45. Data collected or aggregated around a central topic or entity is said to be ______ aware. a. aggregate b. transversally

c. feedback

d. visually

ANSWER: a DIFFICULTY: Easy REFERENCES: 14-3e Aggregate Awareness LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 46. A ______ is a programmed function within an object used to manipulate the data in that same object. a. batch b. method

c. block

d. node

ANSWER: b DIFFICULTY: Easy REFERENCES: 14-5b Example of a MongoDB Query Using find() LEARNING OBJECTIVES: 14.07 - Understand how to work with document databases using MongoDB 47. In MongoDB, ______ method retrieves objects from a collection that match the restrictions provided. a. count* b. read*

c. review[]

d. find()

ANSWER: d DIFFICULTY: Moderate REFERENCES: 14-5b Example of a MongoDB Query Using find() LEARNING OBJECTIVES: 14.07 - Understand how to work with document databases using MongoDB 48. In MongoDB, the ______ method is used to improve the readability of retrieved documents through the use of line breaks and indention. Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 14: Big Data and NoSQL a. pretty() c. break[]

b. clean* d. filter+

ANSWER: a DIFFICULTY: Moderate REFERENCES: 14-5b Example of a MongoDB Query Using find() LEARNING OBJECTIVES: 14.07 - Understand how to work with document databases using MongoDB 49. Neo4j is a ______ database. a. graph b. column family

c. key-value

d. row-centric

ANSWER: a DIFFICULTY: Moderate REFERENCES: 14-6 Working with Graph Databases Using Neo4j LEARNING OBJECTIVES: 14.08 - Understand how to work with graph databases using Neo4j 50. A(n) ______ is a tag that is used to associate a collection of nodes as being of the same type or belonging to the same group. a. edge b. key

c. label

d. bucket

ANSWER: c DIFFICULTY: Moderate REFERENCES: 14-6a Creating Nodes in Neo4j LEARNING OBJECTIVES: 14.08 - Understand how to work with graph databases using Neo4j

Completion 51. ______ is the Big Data 3 V that relates to the speed at which data is entering the system. ANSWER: Velocity DIFFICULTY: Easy REFERENCES: 14-1 Big Data LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 52. Scaling out is also referred to as _______. ANSWER: clustering DIFFICULTY: Moderate REFERENCES: 14-1a Volume LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 53. ______ refers to the analysis of the data to produce actionable results. ANSWER: Feedback loop processing DIFFICULTY: Easy REFERENCES: 14-1b Velocity LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 54. A method of text analysis that attempts to determine if a statement conveys a positive, negative, or neutral attitude is Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 14: Big Data and NoSQL referred to as ______ analysis. ANSWER: sentimental DIFFICULTY: Easy REFERENCES: 14-1d Other Characteristics LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 55. ______ is the coexistence of a variety of data storage and data management technologies within an organization’s infrastructure. ANSWER: Polyglot persistence DIFFICULTY: Easy REFERENCES: 14-1d Other Characteristics LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 56. Within MapReduce, a(n) ______ runs maps and reduces tasks on nodes. ANSWER: task tracker DIFFICULTY: Easy REFERENCES: 14-2b MapReduce LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 57. Most organizations that use Hadoop also use a set of other related products that interact and complement each other to produce an entire ______ of applications and tools. ANSWER: ecosystem DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 58. _______ languages allow the user to specify what they want, not how to get it which is very useful for query processing. ANSWER: Declarative DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 59. Within Hadoop, is used for producing data pipeline tasks that transform data in a series of steps. ANSWER: Pig DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 60. Within Hadoop, can transfer data in both directions - into and out of HDFS. ANSWER: Sqoop DIFFICULTY: Easy REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 61. ______ databases simply store data with no attempt to understand the contents of the value component or its meaning. Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 14: Big Data and NoSQL ANSWER:

Key-value KV DIFFICULTY: Easy REFERENCES: 14-3a Key-Value Databases LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 62. ______ is a human-readable text format for data interchange that defines attributes and values in a document. ANSWER: JavaScript Object Notation JSON DIFFICULTY: Easy REFERENCES: 14-3b Document Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 63. ______ do not store relationships as perceived in the relational model and generally have no support for join operations. ANSWER: Document databases DIFFICULTY: Easy REFERENCES: 14-3b Document Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 64. ______ refers to traditional, relational database technologies that use column-centric, not row-centric storage. ANSWER: Column-oriented database Columnar database DIFFICULTY: Easy REFERENCES: 14-3c Column-Oriented Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 65. In a column family database, a column that is composed of a group of other related columns is called a(n) ______. ANSWER: super column DIFFICULTY: Easy REFERENCES: 14-3c Column-Oriented Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 66. In a graph database, the representation of a relationship between nodes is called a(n) ______. ANSWER: edge DIFFICULTY: Easy REFERENCES: 14-3d Graph Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 67. _____ are like attributes; they are the data that we need to store about the node. ANSWER: Properties DIFFICULTY: Easy Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 14: Big Data and NoSQL REFERENCES: 14-3d Graph Databases LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational 68. A database model that attempts to provide ACID-compliant transactions across a highly distributed infrastructure is ______. ANSWER: NewSQL DIFFICULTY: Easy REFERENCES: 14-4 NewSQL Databases LEARNING OBJECTIVES: 14.06 - Describe the characteristics of NewSQL databases 69. ______ is used to extract knowledge from sources of data—NoSQL databases, Hadoop data stores, and data warehouses—to provide decision support to all organizational users. ANSWER: Data analytics DIFFICULTY: Easy REFERENCES: 14-6c Retrieving Relationship Data with MATCH LEARNING OBJECTIVES: 14.08 - Understand how to work with graph databases using Neo4j 70. The interactive, declarative query language in Neo4j is called ______. ANSWER: Cypher DIFFICULTY: Easy REFERENCES: 14-6a Creating Nodes in Neo4j LEARNING OBJECTIVES: 14.08 - Understand how to work with graph databases using Neo4j

Essay 71. Discuss the 3 Vs of Big Data. How has the definition of Big Data regarding these items changed over time? ANSWER: The three V’s are Volume, Velocity and Variety: Volume is the quantity of data to be stored and a key characteristic of Big Data. The storage capacities associated with Big Data are very large. As storage needs increase, they can be handled by scaling up or scaling out. Scaling up is keeping the same number of systems but migrating each to a larger system. Scaling out involves distributing data storage structures across a cluster of commodity servers. Velocity is the speed at which data enters the system and is another key characteristic. In many ways, the issues of velocity mirror those of volume. The velocity of processing can be broken down into two categories: stream and feedback loop. Variety refers to the vast array of formats and structures in which the data may be captured. Big Data requires that the data be captured in whatever format it naturally exists. DIFFICULTY: Moderate REFERENCES: 14-1 Big Data LEARNING OBJECTIVES: 14.01 - Explain the role of Big Data in modern business 72. Define the four key assumptions of the Hadoop Distributed File System (HDFS). ANSWER: High volume: The volume of data in Big Data applications is expected to be in terabytes, petabytes or larger. Hadoop assumes HDFS files will be extremely large Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 14: Big Data and NoSQL Write-once, ready-many: This model simplifies concurrent issues and improves overall data throughput. Using this model, a file is created, written to the file system and then closed. Once the file is closed, changes cannot be made to its contents which improves overall system performance and works well for the types of tasks performed by many Big Data applications. Streaming access: Unlike transaction processing systems, Big Data applications typically process entire files. Hadoop is optimized for batch processing of entire files as continuous streams of data. Fault tolerance: Hadoop is designed to be distributed across thousands of low-cost, commodity computers. The HDFS is designed to replicate data across many devices so that, when one fails, the data is still available from another device. By default, Hadoop uses a replication factor of three, meaning that each block of data is stored on three devices. DIFFICULTY: Moderate REFERENCES: 14-2a HDFS LEARNING OBJECTIVES: 14.03 - Explain how the core components of the Hadoop framework operate 73. Discuss the need for a Hadoop ecosystem and identify the key components. ANSWER: Because Hadoop is a very low-level tool requiring considerable effort to create, manage, and use, it presents quite a few obstacles. This has resulted in a host of related applications that attempt to make Hadoop easier to use and more accessible to users who are not skilled at complex Java programming. Most organizations that use Hadoop also use a set of other related products that interact and complement each other to produce an entire ecosystem of applications and tools. MapReduce simplification applications have been developed to simplify the process of creating MapReduce jobs. Two of the most popular are Hive and Pig. Data ingestion applications help to “ingest” or gather data into Hadoop from existing systems and include Flume. Sqoop is a tool for converting data back and forth between a relational database and HDFS. Direct query applications attempt to provide faster query access than is possible through MapReduce and include HBase and Impala. DIFFICULTY: Moderate REFERENCES: 14-2c Hadoop Ecosystem LEARNING OBJECTIVES: 14.04 - Identify the major components of the Hadoop ecosystem 74. What is NoSQL and what are the major NoSQL approaches (categories)? ANSWER: NoSQL is the unfortunate name given to a broad array of nonrelational database technologies that have developed to address Big Data challenges. The name is unfortunate because it does not describe what the NoSQL technologies are, but rather what they are not. Even that explanation is poor. Literally hundreds of products can be considered as NoSQL. Most of them fit into one of four categories: key-value data stores, document databases, columnoriented databases and graph databases. DIFFICULTY: Moderate REFERENCES: 14-3 NoSQL LEARNING OBJECTIVES: 14.05 - Summarize the four major approaches of the NoSQL data model and how they differ from the relational

Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 14: Big Data and NoSQL 75. Discuss NewSQL and what it attempts to do. ANSWER: NewSQL is a database model that attempts to provide ACID-compliant transactions across a highly distributed infrastructure and are the latest technologies to appear to appear in the data management arena to address Big Data problems. As a new category of data management products, NewSQL databases have not yet developed a track record of success and have been adopted by relatively few organizations. Because no technology can perfectly provide the advantages of both RDBMS and NoSQL, NewSQL has disadvantages, principally centered around its heavy use of in-memory storage. DIFFICULTY: Moderate REFERENCES: 14-4 NewSQL Databases LEARNING OBJECTIVES: 14.06 - Describe the characteristics of NewSQL databases

Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 15: Database Connectivity and Web Technologies True / False 1. Database connectivity software is also known as database middleware because it interfaces between the application program and the database. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-1 Database Connectivity LEARNING OBJECTIVES: 15.01 - Explain the purpose of standard database connectivity interfaces 2. A good API makes it easy to develop a program by providing all of the building blocks. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 3. Having a web-based database interface eliminates the design and implementation issues of a database system. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 15-2 Database Internet Connectivity LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 4. Whether you purchase online or by standing in line, the system-level transaction details are essentially the same, and they require the same basic database structures and relationships. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-2 Database Internet Connectivity LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 5. The effects of bad database design, implementation, and management are magnified in an environment in which the number of transactions is less than one hundred. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 15-2 Database Internet Connectivity Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 15: Database Connectivity and Web Technologies LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 6. The benefits of the web as a data access platform arise from its cross-platform functionality and the simplicity of its interface. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-2 Database Internet Connectivity LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 7. When an end user uses a web browser to dynamically query a database, the client browser actually requests a web page from the web server. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-2a Web-to-Database Middleware: Server-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 8. In the database query scenario, the web server generates the webpage contents before it sends the page to the client web browser. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2a Web-to-Database Middleware: Server-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 9. Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate with each other. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 10. The Common Gateway Interface (CGI) is a newer web server interface standard that is much more efficient and faster than a dynamic link library (DLL). a. True b. False Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 15: Database Connectivity and Web Technologies ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 11. An application programming interface (API) uses script files that perform specific functions based on the client’s parameters that are passed to the web server. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 12. The browser’s interpretation and presentation capabilities are sufficient to develop web-based applications. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 13. The label “stateless system” indicates that, at any given time, there is an open communication line between the server and each client accessing it. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 14. The only time the client and server computers communicate is when the client requests a page and the server sends the requested page to the client. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 15. The use of HTML does not equip a web browser with computational abilities beyond formatting output text and Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 15: Database Connectivity and Web Technologies accepting form field inputs. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 16. A plug-in is an external application that is automatically invoked by a web browser when needed. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 17. A client-side extension is a program that interacts directly with the web server to handle specific types of requests. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 18. A document type definition (DTD) can be referenced by many Extensible Markup Language (XML) documents of the same type. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 15-3a Document Type Definitions (DTD) and XML Schemas LEARNING OBJECTIVES: 12.05 - Explain how Extensible Markup Language (XML) is used for web database development 19. HTML is designed to facilitate the extraction and manipulation of data from structured documents over the Internet. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 15-3 Extensible Markup Language (XML) LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 15: Database Connectivity and Web Technologies 20. The first line of an XML document represents the document declaration, and it is mandatory. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 15-3 Extensible Markup Language (XML) LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development Multiple Choice 21. _____ is a collection of technologies used to access any type of data source and manage the data through a common interface. a. DAO b. UDA c. ODBC d. OLE-DB ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-1 Database Connectivity LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 22. ODBC works on the _____ operating system. a. Kronos b. UNIX c. Windows d. Mac ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 23. _____ is a higher-level, object-oriented application interface used to access remote database servers. a. UDA b. ODBC c. DAO d. RDO ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 24. In the ODBC architecture, a(n) _____ is in charge of managing all database connections. a. ODBC API b. DLL c. ODBC driver d. driver manager ANSWER: d DIFFICULTY: Difficulty: Moderate REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 15: Database Connectivity and Web Technologies ODBC, OLE, ADO.NET, and JDBC 25. The ODBC API standard defines three levels of compliance: _____, Level-1, and Level-2, which provide increasing levels of functionality. a. Elementary b. Basic c. Core d. Level-0 ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 26. Based on Microsoft’s Component Object Model (COM), _____ is database middleware that adds object-oriented functionality for access to relational and nonrelational data. a. MS-DB b. OLE-DB c. COM-DB d. ODBC ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-1c OLE-DB LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 27. In the ADO.NET framework, the _____ object contains the actual SQL code or a stored procedure call to be run by the database. a. Command b. DataReader c. DataAdapter d. DataSet ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 15-1d ADO.NET LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 28. In the ADO.NET framework, the _____ is a disconnected, memory-resident representation of the database. a. Command b. DataReader c. DataAdapter d. DataSet ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 15-1d ADO.NET LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 29. The _____ is the most specialized object in the ADO.NET framework. a. Command b. DataReader c. DataAdapter d. DataSet ANSWER: c DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 15: Database Connectivity and Web Technologies REFERENCES: 15-1d ADO.NET LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 30. _____ is an object-oriented programming language developed by Sun Microsystems that runs on top of web browser software. a. Visual Basic b. Java c. JavaScript d. VBScript ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-1e Java Database Connectivity (JDBC) LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 31. One of the advantages of _____ over other middleware is that it requires no configuration on the client side. a. ODBC b. JDBC c. OLE-DB d. ADO.NET ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 15-1e Java Database Connectivity (JDBC) LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 32. Another name for a database server-side extension program is _____. a. web server b. web application middleware c. web-to-database middleware d. database application server ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 15-2a Web-to-Database Middleware: Server-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 33. Which of the following is a well-defined web-server interface? a. Common Gateway Interface b. Tiny Internet Interface c. Windows NT d. Command Line Interface ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 34. The main disadvantage of using CGI scripts is that: a. they cause a resource bottleneck since they have to execute separately for each user request. c. an error in one script can damage and bring down the web server completely. Copyright Cengage Learning. Powered by Cognero.

b. they are specific to the web server and to the operating system, thus being platform dependent. d. they do not have the capability to process forms or prepare outputs based on form data. Page 7


Chapter 15: Database Connectivity and Web Technologies ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 35. A(n) _____ can use a shared connection to the database instead of creating a new one every time. a. DLL b. API c. web browser d. HTTP GET request ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 36. What is a disadvantage of using an API web-server interface? a. It is slower than CGI scripts. b. It is inefficient because it uses DLLs. c. An external program needs to run for each user d. An API error can bring down the entire web request. server. ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 37. Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web server using the TCP/IP Internet protocol. a. HTML b. XML c. HTTP GET d. API ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 38. The web browser’s job is to interpret the HTML code that it receives from a web server and to: a. develop web-based applications. b. display it in a standard formatted way. c. perform immediate data entry validation. d. extract details, such as order data, from it. ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 39. You must use plug-ins and other client-side extensions to: a. create an open communication line between a b. eliminate the need for running external programs for Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 15: Database Connectivity and Web Technologies server and its clients. each client request. c. improve processing capabilities of a browser. d. create dynamic web search pages. ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2c The Web Browser LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 40. Which is a client-side extension? a. ActiveX b. ODBC c. SQL*Net d. TCP/IP ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 41. Among client-side extensions, _____ is a Microsoft specification for writing programs that run inside the Internet Explorer browser. a. COBOL b. ActiveX c. JavaScript d. Visor.Net ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 42. _____ is a scripting language that allows web authors to design interactive sites. a. Visual Basic b. HTML c. JavaScript d. Java ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 43. Which of the following is true of a web application server? a. It is Microsoft’s implementation of a superset of the SQL Access Group CLI standard for database access. c. It runs on the client machine, freeing server resources.

b. It is automatically invoked by the browser when needed. d. It provides security and authentication of users through user IDs and passwords.

ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 15-2e Web Application Servers LEARNING OBJECTIVES: 15.04 - Identify the services provided by web application servers Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 15: Database Connectivity and Web Technologies 44. _____ code is embedded inside an HTML page and is activated by triggering events such as clicking on a link. a. XML b. SQL c. Visual Basic d. VBScript ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 45. _____ is a web application server that provides the ability to connect web servers to multiple data sources. a. MS Access b. ColdFusion/JRun c. FoxPro d. dBase ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-2e Web Application Servers LEARNING OBJECTIVES: 15.04 - Identify the services provided by web application servers 46. Which of the following is a characteristic of the XML metalanguage? a. It is concerned with the way data are displayed. b. It allows the definition of new tags. c. You can use the // symbol for entering a comment in the XML d. It can be used as a replacement of document. HTML. ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 15-3 Extensible Markup Language (XML) LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 47. Every XML document has a _____. a. root element b. base tag c. schema d. DTD ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 15-3 Extensible Markup Language (XML) LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 48. A(n) _____ file provides the composition of the database’s logical model and defines the syntax rules for an XML document. a. XMLD b. XHTML c. DTD d. meta ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 15-3a Document Type Definitions (DTD) and XML Schemas LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 15: Database Connectivity and Web Technologies 49. The _____ is an advanced data definition language that is used to describe the structure of XML data documents. a. XHTML b. HTML schema c. DTD d. XML schema ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 15-3a Document Type Definitions (DTD) and XML Schemas LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 50. Using _____, you can extract data from an XML document and convert it into a text file. a. XMLD b. XSLT c. DTD d. XML schema ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 15-3b XML Presentation LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development Completion 51. ODBC, OLE-DB, and ADO.NET form the backbone of the _____ architecture. ANSWER: UDA Universal Data Access (UDA) Universal Data Access DIFFICULTY: Difficulty: Easy REFERENCES: 15-1 Database Connectivity LEARNING OBJECTIVES: 15.01 - Explain the purpose of standard database connectivity interfaces 52. Open Database Connectivity (ODBC), a superset of the SQL Access Group Call Level Interface (CLI), is implemented by _____. ANSWER: Microsoft DIFFICULTY: Difficulty: Moderate REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 53. A(n) _____ is a unique name by which the data source will be known to ODBC, and therefore, to applications. ANSWER: DSN data source name data source name (DSN) DIFFICULTY: Difficulty: Easy REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 54. In the context of OLE-DB, a(n) _____ is an object (application or process) that requests and uses data. ANSWER: consumer Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 15: Database Connectivity and Web Technologies DIFFICULTY: Difficulty: Easy REFERENCES: 15-1c OLE-DB LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 55. In the OLE-DB model, the _____ acts like a data consumer of the data provider and as a data provider for the data consumer (end-user application). ANSWER: service provider DIFFICULTY: Difficulty: Easy REFERENCES: 15-1c OLE-DB LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 56. A(n) _____ is a program written in a programming language that is not compiled, but is interpreted and executed at run time. ANSWER: script DIFFICULTY: Difficulty: Easy REFERENCES: 15-1c OLE-DB LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 57. _____ provides a unified interface to access data from any programming language that uses the underlying OLE-DB objects. ANSWER: ActiveX Data Objects ADO ActiveX Data Objects (ADO) DIFFICULTY: Difficulty: Easy REFERENCES: 15-1c OLE-DB LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 58. The Microsoft _____ framework is a component-based platform for developing distributed, heterogeneous, interoperable applications aimed at manipulating any type of data over any network under any operating system and any programming language. ANSWER: .NET DIFFICULTY: Difficulty: Moderate REFERENCES: 15-1d ADO.NET LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 59. _____ is an application programming interface that allows a Java program to interact with a wide range of data sources (relational databases, tabular data sources, spreadsheets, and text files). ANSWER: Java Database Connectivity JDBC Java Database Connectivity (JDBC) DIFFICULTY: Difficulty: Easy REFERENCES: 15-1e Java Database Connectivity (JDBC) LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 15: Database Connectivity and Web Technologies ODBC, OLE, ADO.NET, and JDBC 60. _____ webpages are at the heart of current generation websites. ANSWER: Dynamic DIFFICULTY: Difficulty: Easy REFERENCES: 15-2a Web-to-Database Middleware: Server-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 61. APIs are faster than _____ scripts because the code resides in memory and there is no need to run an external program for each request. ANSWER: CGI Common Gateway Interface Common Gateway Interface (CGI) DIFFICULTY: Difficulty: Easy REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 62. Regardless of the type of web server interface used, a web-to-database _____ program must be able to connect with a database. ANSWER: middleware DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2b Web Server Interfaces LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 63. A web _____ server is a middleware application that expands the functionality of web servers by linking them to a wide range of services. ANSWER: application DIFFICULTY: Difficulty: Easy REFERENCES: 15-2e Web Application Servers LEARNING OBJECTIVES: 15.04 - Identify the services provided by web application servers 64. To prevent the server from performing all data validation, _____ data input validation is one of the most basic requirements for web applications. ANSWER: client-side client side clientside DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 65. XML is derived from the _____, an international standard for the publication and distribution of highly complex technical documents. ANSWER: Standard Generalized Markup Language SGML Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 15: Database Connectivity and Web Technologies Standard Generalized Markup Language (SGML) DIFFICULTY: Difficulty: Easy REFERENCES: 15-3 Extensible Markup Language (XML) LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 66. XML tags must be well formed, that is, each opening tag must have a corresponding _____ tag. ANSWER: closing DIFFICULTY: Difficulty: Easy REFERENCES: 15-3 Extensible Markup Language (XML) LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 67. A(n) _____ provides limited additional semantic value to XML, such as data type support or data validation rules. ANSWER: DTD document type definition document type definition (DTD) DIFFICULTY: Difficulty: Easy REFERENCES: 15-3a Document Type Definitions (DTD) and XML Schemas LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 68. A DBMS that supports _____ exchanges can integrate with external systems such as the web, mobile data, and legacy systems, thus enabling the creation of new types of systems. ANSWER: XML DIFFICULTY: Difficulty: Moderate REFERENCES: 15-3c XML Applications LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 69. XML is used to create _____, or vocabularies for entire industries. ANSWER: metadictionaries DIFFICULTY: Difficulty: Moderate REFERENCES: 15-3c XML Applications LEARNING OBJECTIVES: 15.05 - Explain how Extensible Markup Language (XML) is used for web database development 70. _____ refer to a cloud computing-base data management service that provides relational data storage, access, and management to companies of all sizes without the typical high costs of in house hardware, software, infrastructure, and personnel. ANSWER: SQL data services (SDS) SQL data services SDS DIFFICULTY: Difficulty: Moderate REFERENCES: 15-4e SQL Data Services LEARNING OBJECTIVES: 15.06 - Describe the advantages and disadvantages of using cloud computing for the database-as-a-service Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 15: Database Connectivity and Web Technologies Essay 71. What are the components in the basic ODBC architecture? ANSWER: The basic ODBC architecture has three main components: a high-level ODBC API through which application programs access ODBC functionality, a driver manager that is in charge of managing all database connections, and an ODBC driver that communicates directly to the DBMS. DIFFICULTY: Difficulty: Moderate REFERENCES: 15-1b ODBC, DAO, and RDO LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 72. What are the main types of objects in the OLE-DB model? Explain. ANSWER: The functionality of OLE-DB model is divided into two types of objects: consumers and providers. 1. Consumers are objects (applications or processes) that request and use data. Consumers request data by invoking the methods exposed by the data provider objects (public interface) and passing the required parameters. 2. Providers are objects that manage the connection with a data source and provide data to the consumers. Providers are divided into two categories: data providers and service providers. • •

Data providers provide data to other processes. Database vendors create data provider objects that expose the functionality of the underlying data source (relational, object-oriented, text, and so on). Service providers provide additional functionality to consumers. The service provider is located between the data provider and the consumer. The service provider requests data from the data provider, transforms the data, and then provides the transformed data to the data consumer. In other words, the service provider acts like a data consumer of the data provider and as a data provider for the data consumer (end-user application). For example, a service provider could offer cursor management services, transaction management services, query processing services, and indexing services.

DIFFICULTY: Difficulty: Moderate REFERENCES: 15-1c OLE-DB LEARNING OBJECTIVES: 15.02 - Describe the functionality and features of various database connectivity technologies: ODBC, OLE, ADO.NET, and JDBC 73. What is a server-side extension? Explain. ANSWER: A server-side extension is a program that interacts directly with the web server to handle specific types of requests. A server-side extension program retrieves the data from databases and passes the retrieved data to the web server, which in turn sends the data to the client’s browser for display. A server-side extension makes it possible to retrieve and present the query results, but more importantly, it provides its services to the web server in a way that is totally transparent to the client browser. In short, the server-side extension adds significant functionality to the Web server, and therefore to the Internet. DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 15


Chapter 15: Database Connectivity and Web Technologies REFERENCES: 15-2a Web-to-Database Middleware: Server-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 74. What is JavaScript? How is JavaScript code activated? ANSWER: JavaScript is a scripting language (one that enables the execution of a series of commands or macros) that allows web authors to design interactive sites. JavaScript code is embedded in the web page and executed after a specific event, such as a mouse click on an object or a page being loaded from the server into memory. DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2d Client-Side Extensions LEARNING OBJECTIVES: 15.03 - Describe how web-to-database middleware is used to integrate databases with the Internet 75. Identify the basic features provided by web application servers. ANSWER: Web application servers provide features such as: - An integrated development environment with session management and support for persistent application variables. - Security and authentication of users through user IDs and passwords. - Computational languages to represent and store business logic in the application server. - Automatic generation of HTML pages integrated with Java, JavaScript, VBScript, ASP, and so on. - Performance and fault-tolerant features. - Database access with transaction management capabilities. - Access to multiple services, such as file transfers (FTP), database connectivity, e-mail, and directory services. DIFFICULTY: Difficulty: Moderate REFERENCES: 15-2e Web Application Servers LEARNING OBJECTIVES: 15.04 - Identify the services provided by web application servers

Copyright Cengage Learning. Powered by Cognero.

Page 16


Chapter 16: Database Administration and Security True / False 1. An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-2 The Need for a Database and Its Role in an Organization LEARNING OBJECTIVES: 16.02 - Describe the role of the database in supporting operational, tactical, and strategic decision-making 2. Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 16-3 Introduction of a Database: Special Considerations LEARNING OBJECTIVES: 16.03 - Describe the impact that the introduction of a DBMS has on technological, managerial, and cultural aspects of an organization 3. The DBA interacts with the end user by providing data and information support services to the organization’s departments. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 4. In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 5. The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 1


Chapter 16: Database Administration and Security REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 6. Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 7. A full backup, or database dump, produces a complete copy of the entire database. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 8. Incremental backups produce a backup of all data. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 9. Concurrent backups take place while the user is working on the database. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 10. Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 11. The storage locations for multiple backups must include sites inside and outside the organization. Copyright Cengage Learning. Powered by Cognero.

Page 2


Chapter 16: Database Administration and Security a. True b. False ANSWER: True DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 12. The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 13. The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 14. The DBA must supervise the installation of all software and hardware designated to support the data administration strategy. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 15. The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 16. Testing procedures and standards must already be in place before any application program can be approved for use in the company. a. True Copyright Cengage Learning. Powered by Cognero.

Page 3


Chapter 16: Database Administration and Security b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 17. System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications. a. True b. False ANSWER: True DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 18. A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Easy REFERENCES: 16-6b Security Vulnerabilities LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 19. A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 16-6b Security Vulnerabilities LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 20. A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date. a. True b. False ANSWER: False DIFFICULTY: Difficulty: Moderate REFERENCES: 16-7a The Data Dictionary LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration Multiple Choice 21. In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an Copyright Cengage Learning. Powered by Cognero.

Page 4


Chapter 16: Database Administration and Security organization's: a. lower levels. b. top levels. c. target markets. d. customer base. ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 16-1 Data as a Corporate Asset LEARNING OBJECTIVES: 16.01 - Describe the impact of data quality on a company’s assets and competitive position 22. At the level of middle management, the database must be able to provide _____. a. frameworks for defining and enforcing b. data necessary for tactical decisions and planning organizational policies c. feedback to monitor whether a company is d. access to external and internal data to identify growth achieving its goals opportunities ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 16-2 The Need for a Database and Its Role in an Organization LEARNING OBJECTIVES: 16.02 - Describe the role of the database in supporting operational, tactical, and strategic decision-making 23. When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system. a. cultural b. managerial c. technical d. operational ANSWER: a DIFFICULTY: Difficulty: Moderate REFERENCES: 16-3 Introduction of a Database: Special Considerations LEARNING OBJECTIVES: 16.03 - Describe the impact that the introduction of a DBMS has on technological, managerial, and cultural aspects of an organization 24. The person responsible for the control of the centralized and shared database is the database _____. a. analyst b. administrator c. programmer d. user ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-4 The Evolution of Database Administration LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 25. Database administration operations are commonly defined and divided according to the phases of the _____. a. SLA b. DBLC c. SDLC d. MRA ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-4 The Evolution of Database Administration LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator Copyright Cengage Learning. Powered by Cognero.

Page 5


Chapter 16: Database Administration and Security 26. A data administrator is also known as a(n) _____. a. data security officer b. systems administrator c. information resource manager d. information engineering officer ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 16-4 The Evolution of Database Administration LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 27. The _____ administrator is responsible for strategic planning. a. system b. data c. database d. program ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-5 The Database Environment’s Human Component LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 28. Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role. a. operative b. arbitration c. technical d. managerial ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 29. _____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. a. Guidelines b. Standards c. Procedures d. Documentations ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 30. “All users must have passwords” is an example of a _____. a. rule b. policy c. standard d. procedure ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 31. "A password must have a minimum of five characters" is an example of a _____. a. policy b. rule c. procedure d. standard ANSWER: d DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 6


Chapter 16: Database Administration and Security REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 32. Instructions to create a password are an example of a _____. a. rule b. policy c. standard d. procedure ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 33. In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management. a. database programmer b. systems analyst c. data administrator d. database security officer ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 34. Which of the following is a reason why a DBMS's daily operations must be clearly documented? a. Documentation of the daily operations help a b. Documentation of the daily operations help manage company set its long-term goals. the manual data resources of a company. c. Documentation of the daily operations help d. Documentation of the daily operations help free the pinpoint causes and solutions of database DBA from many lower-level technology-oriented problems. tasks. ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 35. A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time. a. access b. completion c. application d. communications ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 36. _____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications. a. Backup and recovery b. System support c. Performance monitoring and tuning d. Security auditing and monitoring ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role Copyright Cengage Learning. Powered by Cognero.

Page 7


Chapter 16: Database Administration and Security LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 37. _____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. a. Integrity b. Compliance c. Availability d. Confidentiality ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 16-6 Security LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 38. _____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. a. Debilitative b. Preserving c. Corrupting d. Destructive ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 16-6b Security Vulnerabilities LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 39. When performing user access management, a DBA defines each user to the database at the _____ levels. a. application and DBMS b. operating system and DBMS c. operating system and application d. application and network ANSWER: b DIFFICULTY: Difficulty: Moderate REFERENCES: 16-6c Database Security LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 40. User-access management is a subset of _____. a. password protection b. authorization management c. data integrity management d. managerial control ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-6c Database Security LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 41. In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users. a. change tracker b. digital footprint c. paper trail d. audit log ANSWER: d DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 8


Chapter 16: Database Administration and Security REFERENCES: 16-6c Database Security LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 42. A(n) _____ data dictionary is automatically updated by the DBMS with every database access. a. dynamic b. active c. passive d. static ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-7a The Data Dictionary LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 43. A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run. a. active b. passive c. static d. dynamic ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-7a The Data Dictionary LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 44. _____ CASE tools provide support for the planning, analysis, and design phases. a. Front-end b. Back-end c. Vertical d. Horizontal ANSWER: a DIFFICULTY: Difficulty: Easy REFERENCES: 16-7b Case Tools LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 45. _____ CASE tools provide support for the coding and implementation phases. a. Front-end b. Back-end c. Vertical d. Horizontal ANSWER: b DIFFICULTY: Difficulty: Easy REFERENCES: 16-7b Case Tools LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 46. The _____ component of a CASE tool produces the information system’s input/output formats. a. analysis b. graphics c. program document generator d. screen painter and report generator ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 16-7b Case Tools LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 47. _____ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals. Copyright Cengage Learning. Powered by Cognero.

Page 9


Chapter 16: Database Administration and Security a. Access Management b. Business Intelligence c. Information engineering (IE) d. MOLAP ANSWER: c DIFFICULTY: Difficulty: Moderate REFERENCES: 16-8 Developing a Data Administration Strategy LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 48. In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools. a. access plan b. active data dictionary c. information systems architecture d. security policy ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 16-8 Developing a Data Administration Strategy LEARNING OBJECTIVES: 16.06 - Identify the standards, strategies, and tools used in database administration 49. A(n) _____ is a logical storage area in Oracle. a. audit log b. datafile c. schema d. tablespace ANSWER: d DIFFICULTY: Difficulty: Easy REFERENCES: 16-10c Creating Tablespaces and Datafiles LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle 50. One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time. a. security component b. authorization manager c. initialization parameters d. administrator ANSWER: c DIFFICULTY: Difficulty: Easy REFERENCES: 16-10e Customizing the Database Initialization Parameters LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle Completion 51. In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined. ANSWER: data-profiling DIFFICULTY: Difficulty: Easy REFERENCES: 16-1 Data as a Corporate Asset LEARNING OBJECTIVES: 16.01 - Describe the impact of data quality on a company’s assets and competitive position 52. In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory. ANSWER: operational DIFFICULTY: Difficulty: Easy Copyright Cengage Learning. Powered by Cognero.

Page 10


Chapter 16: Database Administration and Security REFERENCES: 16-2 The Need for a Database and Its Role in an Organization LEARNING OBJECTIVES: 16.02 - Describe the role of the database in supporting operational, tactical, and strategic decision-making 53. In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the “who, what, when, where, and how” of data usage. ANSWER: privacy DIFFICULTY: Difficulty: Easy REFERENCES: 16-2 The Need for a Database and Its Role in an Organization LEARNING OBJECTIVES: 16.02 - Describe the role of the database in supporting operational, tactical, and strategic decision-making 54. The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization. ANSWER: technological DIFFICULTY: Difficulty: Easy REFERENCES: 16-3 Introduction of a Database: Special Considerations LEARNING OBJECTIVES: 16.03 - Describe the impact that the introduction of a DBMS has on technological, managerial, and cultural aspects of an organization 55. In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks. ANSWER: cloud DIFFICULTY: Difficulty: Easy REFERENCES: 16-4 The Evolution of Database Administration LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 56. In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator. ANSWER: systems DIFFICULTY: Difficulty: Easy REFERENCES: 16-4 The Evolution of Database Administration LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 57. The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap. ANSWER: DA data administrator DIFFICULTY: Difficulty: Easy REFERENCES: 16-4 The Evolution of Database Administration LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 58. Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____. ANSWER: strategic DIFFICULTY: Difficulty: Easy REFERENCES: 16-2 The Need for a Database and Its Role in an Organization Copyright Cengage Learning. Powered by Cognero.

Page 11


Chapter 16: Database Administration and Security 16-5 The Database Environment’s Human Component LEARNING OBJECTIVES: 16.02 - Describe the role of the database in supporting operational, tactical, and strategic decision-making 16.04 - Describe the managerial and technical roles of the database administrator 59. The DSO’s activities are often classified as _____ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure. ANSWER: disaster DIFFICULTY: Difficulty: Easy REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 60. In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS. ANSWER: efficient DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 61. The DBA must review the database application design to ensure that transactions are _____, meaning that they mirror real-world events. ANSWER: correct DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 62. Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels. ANSWER: tuning DIFFICULTY: Difficulty: Easy REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 63. Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies. ANSWER: integrity DIFFICULTY: Difficulty: Easy REFERENCES: 16-6 Security LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals 64. A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions. ANSWER: vulnerability DIFFICULTY: Difficulty: Easy REFERENCES: 16-6b Security Vulnerabilities LEARNING OBJECTIVES: 16.05 - Describe the processes and systems in the information security framework that support the three database security goals Copyright Cengage Learning. Powered by Cognero.

Page 12


Chapter 16: Database Administration and Security 65. A(n) _____ physically stores the database’s data. ANSWER: datafile DIFFICULTY: Difficulty: Easy REFERENCES: 16-10c Creating Tablespaces and Datafiles LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle 66. In the context of Oracle Enterprise Manager, a(n) _____ is a uniquely identifiable object that allows a given person to log on to the database. ANSWER: user DIFFICULTY: Difficulty: Easy REFERENCES: 16-10d Managing Users and Establishing Security LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle 67. In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources. ANSWER: role DIFFICULTY: Difficulty: Easy REFERENCES: 16-10d Managing Users and Establishing Security LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle 68. In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource a given user can access. ANSWER: profile DIFFICULTY: Difficulty: Easy REFERENCES: 16-10d Managing Users and Establishing Security LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle 69. In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____. ANSWER: role DIFFICULTY: Difficulty: Easy REFERENCES: 16-10d Managing Users and Establishing Security LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle 70. Each database has an associated _____ file that is read at instance startup, stores run-time configuration parameters, and is used to set the working environment for the database. ANSWER: initialization DIFFICULTY: Difficulty: Easy REFERENCES: 16-10e Customizing the Database Initialization Parameters LEARNING OBJECTIVES: 16.08 - Perform various technical tasks of database administration with Oracle Essay 71. Describe the DBA’s managerial role. ANSWER: As a manager, the DBA must concentrate on the control and planning of database Copyright Cengage Learning. Powered by Cognero.

Page 13


Chapter 16: Database Administration and Security administration. Therefore, the DBA is responsible for: - Coordinating, monitoring, and allocating database administration resources: people and data. - Defining goals and formulating strategic plans for database administration. DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 72. Explain user requirements gathering as part of the DBA's end-user support services. ANSWER: The DBA must work with end users to help gather the data required to identify and describe their present and future information needs. The DBA’s communication skills are important in working closely with people who have varying computer backgrounds and communication styles. DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 73. Explain conflict and problem resolution as part of the DBA’s end-user support services. ANSWER: Finding solutions to end users’ problems in one department might trigger conflicts with other departments. End users are typically concerned with their own data needs rather than those of others, and they might not consider how their data may affect other departments within the organization. When conflicts arise, the DBA must have the authority and responsibility to resolve them. DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 74. Describe the need for convenient and safe backup storage. ANSWER: Multiple backups of the same data are required, and each backup copy must be stored in a different location. The storage locations must include sites inside and outside the organization. (Keeping different backups in the same place defeats the purpose of having multiple backups.) The storage locations must be properly prepared, and they may include fire-safe and quakeproof vaults as well as humidity and temperature controls. The DBA must establish a policy to respond to two questions: (1) Where are the backups to be stored? (2) How long are backups to be stored? DIFFICULTY: Difficulty: Moderate REFERENCES: 16-5a The DBA’s Managerial Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator 75. The testing and evaluation of a database application cover all aspects of the system—from the simple collection and creation of data to its use and retirement. What is covered by the evaluation process? ANSWER: - Technical aspects of both the applications and the database; backup and recovery, security and integrity, use of SQL, and application performance must be evaluated - Evaluation of the written documentation and procedures to ensure that they are accurate and easy to follow - Observance of standards for naming, documenting, and coding - Checking for data duplication conflicts with existing data - The enforcement of all data validation rules DIFFICULTY: Difficulty: Moderate Copyright Cengage Learning. Powered by Cognero.

Page 14


Chapter 16: Database Administration and Security REFERENCES: 16-5b The DBA’s Technical Role LEARNING OBJECTIVES: 16.04 - Describe the managerial and technical roles of the database administrator

Copyright Cengage Learning. Powered by Cognero.

Page 15


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.