Test 1 Flashcards

1
Q

1.) The__________ determines the common attribute or attributes by looking for identically named attributes and compatible data types.

A

natural join

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using a subquery, the output of a(n)_________ query is used as the input for the outer query.

A

inner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The_________clause is used to restrict the output of a GROUP BY query by applying a conditional criteria to the grouped rows.

A

HAVING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The IN subquery uses a(n)___________ operator.

A

equality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The use of the____________ operator allows you to compare a single value with a list of values returned by the first subquery (sqA) using a comparison operator other than EQUALS.

A

ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n)_____________subquery is a subquery that executes once for each row in the outer query.

A

correlated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The___________ statement combines the output of two SELECT queries.

A

UNION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A(n)____________ query can be used to produce a relation that retains the duplicate rows.

A

UNION ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The____________ statement can be used to combine rows from two queries, returning only the rows that appear in both sets.

A

INTERSECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If the DBMS does not support the INTERSECT statement, one can use a(n)__________ subquery to achieve the same result.

A

IN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n)___________view is a view that can be used to update attributes in the base table(s) that are used in the view.

A

updatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n)____________ routine pools multiple transactions into a single batch to update a master table field in a single operation.

A

batch update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A row-level trigger requires use of the___________ keywords and is executed once for each row affected by the triggering statement.

A

FOR EACH ROW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When the critical application code is isolated in a single program,____________improves.

A

maintenance and logic control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is the term used to describe an environment in which the SQL statement is not known in advance and is generated at run time.

A

Dynamic SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ is the process that establishes the need for, and the extent of, and information system.

A

Systems analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The traditional Systems Development Life Cycle (SDLC) phases are ____, detailed systems design, implementation, and maintenance.

A

planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. An initial assessment of the information flow-and-extent requirements must be made during the ______ portion of the Systems Development Life Cycle (SDLC).
A

planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. After testing is concluded, the final ______ is reviewed and printed and end users are trained.
A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. The advent of very sophisticated application generators and ______ has substantially decreased coding and testing time.
A

debugging tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. The system and operational costs are addressed by the ______ during the planning phase of the Systems Development Life Cycle (SDLC).
A

feasibility study

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. ______ are usually provided by the database management system (DBMS) to check for access violations
A

Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. The ______ describes the general conditions in which a company operates, its organizational structure, and its mission.
A

company situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. The system’s ______ defines the extent of the design according to operational requirements.
A

scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. The proposed system is subject to limits known as ______, which are external to the system.
A

boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Making sure that the final product meets user and system requirements is the most critical ___ phase.
A

Database Life Cycle (DBLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Programmers use database tools to ______ the applications during coding of the programs.

A

prototype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

______ allows the assignment of access rights to specific authorized users

A

Password security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The ______ stage uses data modeling to create an abstract database structure that represents real- world objects in the most realistic way possible.

A

conceptual design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The first step in ______ is to discover the data element characteristics.

A

conceptual design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A designer must have a thorough understanding of the company’s data types, extent, and uses in order to develop an accurate ______.

A

data model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

From a database point of view, the collection of data becomes meaningful only when the _____ are defined.

A

business rules

33
Q

A ______ rule is a brief and precise narrative of a policy, procedures, or principle within a specific organization’s environment.

A

business rule

34
Q

Because real world database design is generally done by teams, the database design is probably divided into major components known as ______.

A

modules

35
Q

A (n) ______ is an information system component that handles a specific business function, such as inventory, orders, or payroll.

A

module

36
Q

______ is the first stage in the database design process.

A

conceptual design

37
Q

The term ______ describes the extent to which modules are independent of one another

A

module coupling

38
Q

The term ______ describes the strength of the relationships found among a module’s entities

A

cohesivity

39
Q

The ______ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.

A

logical design

40
Q

______ could become a very technical job that affects not only the accessibility of the data in the storage device (s) but also the performance of the system

A

Physical design

41
Q

___________ requires that all operations of a transaction be completed.

A

. Atomicity

42
Q

__________ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.

A

c. Isolation

43
Q

All transactions must display __________.

A

. atomicity, durability, consistency, and isolation

44
Q

A single-user database system automatically ensures ________________ of the database, because only one transaction is executed at a time.

A

serializability and isolation

45
Q

The ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements: ____________ and ROLLBACK.

A

COMMIT

46
Q

ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a COMMIT?

A

The end of a program is successfully reached.

47
Q

ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK?

A

The program is abnormally terminated.

48
Q

The implicit beginning of a transaction is ______________.

A

when the first SQL statement is encountered

49
Q

The information stored in the ___________ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program’s abnormal termination, or a system failure such as a network discrepancy or a disk crash.

A

transaction log

50
Q

One of the three most common data integrity and consistency problems is ___________.

A

lost updates

51
Q

_____________ occurs when a transaction accesses data before and after one or more other transactions finish working with such data.

A

Inconsistent retrievals

52
Q

As long as two transactions, T1 and T2, access ____________ data, there is no conflict, and the order of execution is irrelevant to the final outcome.

A

unrelated

53
Q

A ___________ lock prevents the use of any tables in the database from one transaction while another transaction is being processed.

A

database-level

54
Q

______________ are required to prevent another transaction from reading inconsistent data.

A

Locks

55
Q

The ____________ manager is responsible for assigning and policing the locks used by the transactions.

A

lock

56
Q

Lock _______________ indicates the level of lock use.

A

granularity

57
Q

A_____________ lock locks the entire table preventing access to any row by a transaction while another transaction is using the table.

A

table-level

58
Q

A___________ lock locks the entire diskpage.

A

page-level

59
Q

A diskpage, or page, is the equivalent of a ___________.

A

diskblock

60
Q

A __________ lock allows concurrent transactions to access different rows of the same table.

A

row-level

61
Q

A(n) __________ lock has only two stages (0 and 1).

A

binary

62
Q

A(n) _____________ specifically reserves access to the transaction that locked the object.

A

exclusive lock

63
Q

End users and the DBMS interact through the use of _____to generate information.

A

Queries

64
Q

A system will perform best when its hardware and software resources are _________.

A

optimized

65
Q

Database __________ activities can be divided into those taking place either on the client side or on the server side.

A

performance tuning

66
Q

_________ is another name for table space.

A

File group

67
Q

The ______ cache is a shared, reserved memory area that stores the most recently executed SQL statements or PL/SQL procedures, including triggers and functions.

A

SQL

68
Q

A (n) request is a low-level read or write data access operation to or from computer devices.

A

input/output (mouse, Keyboard, Speakers)

69
Q

DBMS query processing has phases.

A

3,

  1. Parsing -Chooses the most efficient access/execution plan
  2. Execution- DBMS executes the sql query using the chosen execution plan
  3. Fetching- DBMS fetches the data and sends the result set back to the client
70
Q

The __________ analyzes the SQL query and finds the most efficient way to access the data.

A

query optimizer

71
Q

________ are ordered sets of values that are crucial in speeding up data access.

A

Indexes

72
Q

A ________ is good for simple and fast lookup operations based on equality conditions.

A

hash index

73
Q

_________ are special instructions for the optimizer that are embedded inside the SQL command text.

A

Optimizer hints

74
Q

_________ is a measure of the likelihood that an index will be used in query processing.

A

Index selectivity

75
Q

___________ is evaluated based on client perspective.

A

SQL performance tuning

76
Q

___________ is an index based on a specific SQL function or expression.

A

function-based index

77
Q

A condition expression is normally expressed with the _______ or HAVING clauses of a SQL statement.

A

WHERE

78
Q

____________ helps provide a balance between performance and fault tolerance.

A

RAID

Redundant
Array of
Independant
Disks

79
Q

The ______ table space is the most frequently accessed table space and should be stored in its own volume.

A

system