BIS 320 BIS320 Final Exam Answers (Indiana Wesleyan University)

BIS 320 BIS320 Final Exam Answers (Indiana Wesleyan University)

soffix

  • $30.00


BIS 320 Final Exam Managerial Relational Database Systems

  1. The data format for SQL character is _____
  2. The data cache or  _____ is a shared, reserved memory area that stores the most recently accessed data blocks in RAM.
  3. A table where every determinant is a candidate key is said to be in _____.
  4. _____ can serve as a test vehicle for companies exploring the potential benefits of data warehouses.
  5. What is a rule that applies to the two-phase locking protocol?
  6. On the client side, the objective is to generate an SQL query that returns a correct answer in the least amount of time, using a minimum amount of resources at the server end. The activities required to achieve this goal are commonly referred to as _____ tuning.
  7. A centralized database management is subject to a problem such as _____.
  8. Assume you are using the UNION ALL operator to combine the results from two tables with identical structure, CUSTOMER and CUSTOMER_2. The CUSTOMER table contains 10 rows, while the CUSTOMER_2 table contains 7 rows. Customers Dunne and Olowski are included in the CUSTOMER table as well as in the CUSTOMER_2 table. How many records are returned when using the UNION ALL operator?
  9. If an entity can exist apart from all of its related entities, then it is existence-independent, and it is referred to as a(n) _____ entity.
  10. If one exists, a data modeler uses a _____ as the primary key of the entity being modeled
  11. The ODBC API standard defines three levels of compliance: _____, Level-1, and Level-2, which provide increasing levels of functionality.
  12. _____ can render data useless to unauthorized users who might have violated some of the database security layers.
  13. _____ transparency exists when the end user or programmer must specify both the fragment names and their locations.
  14. Fact and dimension tables are related by _____ keys
  15. A verb associating two nouns in a business rule translates to a(n)           in the data model.
  16. The implicit beginning of a transaction is _____.
  17. _____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false.
  18. NoSQL databases:
  19. The conceptual model can handle _____ relationships and multivalued attributes.
  20. A(n) occurs when a transaction executes a query at time t1, and then it runs the same query at time t2, yielding additional rows that satisfy the query.
  21. The SQL command that allows a user to list the contents of a table is _____.
  22. In Oracle, the _____ function converts a date to a character string.
  23. _____ distributed database management system (DDBMS) integrate multiple instances of the same DBMS over a network.
  24. Data is said to be verifiable if:
  25. A specialization hierarchy can have _____ level(s) of supertype/subtype relationships.
  26. When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.
  27. ____ is a cursor attribute that returns TRUE if the last FETCH returned a row, and FALSE if not.
  28. Overlapping subtypes are subtypes that contain _____ subsets of the supertype entity set.
  29. A table that displays data redundancies yields _____.
  30. In RAID level 5,:
  31. A _____ is optimized for decision support and is generally represented by a data warehouse or a data mart.
  32. The Oracle _____ function returns the current date.
  33. In the             model, the user perceives the database as a collection of records in 1:M relationships, where each record can have more than one parent.
  34. You must use plug-ins and other client-side extensions
  35. ____ is a collection of technologies used to access any type of data source and manage the data through a common interface.
  36. re especially useful when you are trying to determine what values in related tables cause referential integrity problems.
  37. The _____ schema must support complex (non-normalized) data representations
  38. From a structural point of view, 3NF is better than _____.
  39. ____ returns only the attributes requested, in the order in which they are requested
  40. The ______ data model uses the concept of inheritance
  41. The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____.
  42. ____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity.
  43. The LIKE conditional operator is used by the _____ OPERAND1.
  44. Which of the following refers to the situation where different versions of the same data are stored at different places because they weren’t updated consistently?
  45. In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.
  46. Before converting a table into 3NF, it is imperative that the table already be in _____.
  47. A transaction is a _____ unit of work that must be either entirely completed or aborted
  48. Which of the following is a hardware-induced database failure?
  49. ________ are the result of formatting disorganized data in order to facilitate storage, use and generation of information.
  50. In Oracle, _____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping.

We Also Recommend


Sale

Unavailable

Sold Out