Final Exam Flashcards
What happens when there is a violation of normal form to fix it?
Usually ends up in creating a new table
if something is in first normal form is it garenteed to be in second?
yes
if its a has a composite key which normal form is in play
2nd and boyce codd
- The__________ determines the common attribute or attributes by looking for identically named attributes and compatible data types.
natural join
When using a subquery, the output of a(n)_________ query is used as the input for the outer query.
inner
- The _________ clause is used to restrict the output of a GROUP BY query by applying a conditional criteria to the grouped rows.
HAVING
- The IN subquery uses a(n)___________ operator.
equality
- The use of the____________ operator allows you to compare a single value with a list of values returned by the first subquery (sqA) using a comparison operator other than EQUALS.
ALL
- A(n)_____________subquery is a subquery that executes once for each row in the outer query.
correlated
- The___________ statement combines the output of two SELECT queries.
UNION
- A(n)____________ query can be used to produce a relation that retains the duplicate rows.
UNION ALL
- The____________ statement can be used to combine rows from two queries, returning only the rows that appear in both sets.
INTERSECT
- If the DBMS does not support the INTERSECT statement, one can use a(n)__________ subquery to achieve the same result.
IN
- A(n)___________view is a view that can be used to update attributes in the base table(s) that are used in the view.
updatable
- A(n)____________ routine pools multiple transactions into a single batch to update a master table field in a single operation.
batch update
- A row-level trigger requires use of the___________ keywords and is executed once for each row affected by the triggering statement.
FOR EACH ROW
- When the critical application code is isolated in a single program, ____________ improves.
maintenance and logic control
_____ is the term used to describe an environment in which the SQL statement is not known in advance and is generated at run time.
Dynamic SQL
A stored function uses the ____ statement to return a value.
return
___is the process that establishes the need for an information system and its extent.
Systems analysis
the traditional systems Development Life Cycle (SDLC) phases are ___, detailed systems design, implementation , and maintenance.
planning
an initial assessment of the information flow-and-extent requirements must be made during the __ portion of the Systems development life cycle(sdlc)
planning
After testing is concluded, the final __ is reviewed and printed and end users are trained.
documentation
the advent of very sophisticated application generators and ___ has substantially decreased coding and testing time
debugging tools
The system and operational costs are addressed by the ___ during the planning phase of the Systems development life cycle SDLC
feasibility study
___ are usually provided by the database management system to check for access violations
Audit trails
The___ describes the general conditions in which a company operates, it organizational structure, and its mission
company situation
the system’s ____ defines the extent of the design according to operational requirements.
scope
The proposed system is subject to limits known as ____, which are external to the system
boundaries
Making sure that the final product meets user and system requirements is the most critical ___ phase.
Database Life Cycle(DBLC)
Programmers use database tools to ___ the applications during coding of the programs.
prototype
___allows the assignment of access rights to specific authroized users.
Password security
The ___ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.
conceptual design
The first step in ___ is to discover the data element characteristics
conceptual desing