• Register
1,240 points
10 6 4

Q. Which of the following conditions should exist if an associative entity is to be created?

All of the above: All the relationships for the participating entities are many-to-many The new associative entity has independent meaning The new associative entity participates in independent relationships

Q. A ____ database supports data distributed across several different sites.

distributed

Q. An attacker inserts SQL database commands into a data input field of an order form used by a Webbased application. When submitted, these commands are executed on the remote database server, causing customer contact information from the database to be sent to the malicious user‘s Web browser. Which practice would have prevented this exploit?

Implementing clientside validation.

Q. The ____ serve(s) as the intermediary between the user and the database.

DBMS

Q. A(n) ____ might be written by a programmer or it might be created through a DBMS utility program.

application program

Q. An XML database supports the storage and management of _____ XML data.

semistructured

Q. The database structure in a DBMS is stored as a ____.

collection of files

Q. What do database designers use to construct databases?

Entity Relationship Diagrams

Q. A(n) _____ is anything about which data are to be collected and stored.

entity

Q. What database engine is used for the DHCP database in Windows Server 2012 R2?

Jet

Q. The number of entity types that participate in a relationship is called the:

degree

Q. The logical arrangement of data in a database is called the database model.

TRUE

Q. Which operation will allow you to extract data from more than one table?

Join

Q. The WITH CHECK option of the CREATE VIEW statement A) prevents users from using the view without the appropriate authorization B) prevents an update from being performed through the view if it causes a row to no longer be included in the view C) prevents rows from being deleted through the view D) prevents rows from being inserted through the view

B) prevents an update from being performed through the view if it causes a row to no longer be included in the view

Q. After you create a query, what must you do in order to see the results?

run the query

​Q. One column of a table in a relational database is called a(n) ____.

attribute

Q. If you define a column with a default value, that value is used whenever a row a. with a zero value for that column is added to the table b. is added to the table c. in the table is updated d. that doesn‘t include a value for that column is added to the table

that doesn‘t include a value for that column is added to the table

Q. Data processing can be as simple as organizing data to reveal patterns.

TRUE

Q. What is data redundancy, and which characteristics of the file system can lead to it?

Unnecessarily storing same data at different places. Islands of information: scattered data locations. -poor data security -data inconsistency -data anomaly

Q. Which of the following best describes a byte in a database? A) It is a character of data. B) It is a group of rows. C) It is a collection of data. D) It is a group of columns.

It is a character of data.

Q. The terms data model and database model are often used interchangeably.

TRUE

Q. Which of the following best describes the metadata in a database?

special data that describes the structure of a database

Q. Which of the following would not be considered a database data type?​​

SELECT

Q. The idea of determination is unique to the database environment. T/F

FALSE

Q. TRUE or FALSE: A hierarchical database uses many-to-many relationships.

“FALSE: ~ A hierarchical database uses ONE-to-many relationship ~ A network database uses many-to-many relationships.“

Q. ____ 1. Some ____ database modeling concepts can be expressed only using the Chen notation. a. developmental c. actual b. conceptual d. specific

b. conceptual

Q. The primary objective of database design is ____. A. To create the most efficient database possible B. To create complete, normalized, nonredundant, and fully integrated conceptual, logical, and physical database models C. To create the fastest queries D. To be able to add data quickly

B. To create complete, normalized, nonredundant, and fully integrated conceptual, logical, and physical database models

Q. One disadvantage of the DBMS is that it increases the risk of data security breaches.(T/F)

FALSE

Q. In a relational database design, all relationships are expressed by ________. A) creating a primary key B) creating a foreign key C) creating a supertype D) creating a subtype

B

Q. Which database tool is best for simple flat files that involve calculations? a. Database software b. Spreadsheet software c. Word processing software d. DBMS

b

Q. Data constitute the building blocks of information.

TRUE

Q. A database is used instead of a spreadsheet when ________. A) lists of data involve a single theme B) structures of data lists are simple C) lists involve data with multiple themes D) users do not want to store all data in one place

c

Q. Which of these is the current standard database type used on microcomputers? hierarchical relational network object-oriented

relational

Q. A(n) ____ is a system-generated primary key that is usually hidden from users. a. weak entity b. surrogate key c. natural key d. artificial key

b. surrogate key

Q. If a column is defined as NUMBER(5,2), which of the following is true? The column can store a total of 7 digits, with 5 on the left side of the decimal point, and 2 on the right. The column can store a total of 7 digits, all of them on the right side of the decimal point. The column can store a total of 5 digits, with 3 on the left side of the decimal point, and 2 on the right. The column can store a total of 5 digits, all of them on the left side of the decimal point.

The column can store a total of 5 digits, with 3 on the left side of the decimal point, and 2 on the right.

Q. The _____ relationship should be rare in any relational database design. a. 1:1 b. 1:M c. M:1 d. M:N

ANSWER: a

Q. Users employ ________ computers for word processing, spreadsheets, database access, and so forth.

client

Q. The whois database provides the following information except:

A. domain name B. registrant C. name server addresses D. the annual cost to rent the domain name

Q. The whois database provides the following information except:

The annual cost to rent the domain name

Q. Forward auctions are auctions that sellers use as a channel to many potential buyers.

t

Q. Inadequate database capacity is an example of the ________ dimension of business problems.

technology

Q. When a question is asked of a database using a select query, the answer is returned as a datasheet.

TRUE

Q. Which is NOT a component of a database that describes how data is stored?

report

Q. In a database, a table can be defined as a data category.

FALSE

Q. Dependencies based on only a part of a composite primary key are known as _____ dependencies.

Partial

Q. Which of the following is not a stage in the development of a database system? A) Requirements analysis B) Validation C) Component design D) Implementation E) All of the above are stages in the development of a database system.

B) Validation

Q. Some very specialized applications may require normalization beyond the _____.

4Nf

Q. Which of the following sources constitutes the internal database of a company? A) commercial online databases B) conversations on social media C) the company‘s sales records D) reports sold by market research firms E) the Web

C) the company‘s sales records

Q. Which type of database model connects data in different files through the use of a key field?

relational database

Q. You have recently discovered that a network attack has compromised your database server. In the process, customer credit card numbers might have been taken by an attacker. You have stopped the attack and put measures in place to prevent the same incident from occuring in the future. What else might you be legally required to do?

Contact your customers to let them know of the security breach

Q. Which of the following is not true about representing subtypes in a relational database design?

All of the attributes of the supertype are added to the subtype relations.

Q. What is the purpose of a DBMS‘s data definition function?

Structuring the database

Q. Browser applications are thin-client applications that ________. Use COBOL as the standard language for user-side processing Are processed using VisualBasic and C++ Need not be preinstalled on the users‘ computer Depend on internal networks and not the internet to transmit data Do not need to be encrypted

Need not be preinstalled on the users‘ computer

Q. What happens to the original data in database indexing?

It is copied to the index.

Q. In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

VBScript

Q. With VTP, where is the VLAN database stored? A) On the router responsible for maintaining the VTP database. B) On the switch that is known as the stack master. C) On the switch that is configured as the trunk root. D) On the designated VLAN server for the network.

On the switch that is known as the stack master.

Q. Good database performance is easy to evaluate. a. True b. False ANSWER

FALSE

Q. Special data that describe the data contained in a database are called ________.

metadata

Q. Which of the following terms refers to commands that are used to create or modify database tables?

DDL

Q. These types of databases are also called information utilities or data banks.

Commerical

Q. Which of the following is NOT a cost and/or risk of the database approach?

Improved responsiveness

Q. What does a relational database use to uniquely identify each row in a table? a) indexes b) foreign keys c) non-primary keys d) primary keys

d) primary keys

Q. Each entity in a database has a unique attribute called a(n) ________. Select one: a. public key b. foreign key c. index field d. identifier

d. identifier

1,240 points
10 6 4