Topic 3 Flashcards

1
Q

_____ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false

a. Predicate
b. Database
c. Relational
d. Index

A

Predicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each table _____ represents an attribute

a. column
b. row
c. dimension
d. value

A

column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Date attributes contain calendar dates stored in a special format known as the _____ date format

a. Epoch
b. calendar
c. Julian
d. logical

A

Julian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable

a. relations
b. keys
c. indexes
d. logical structures

A

keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ is any key that uniquely identifies each row

a. superkey
b. special key
c. foreign key
d. candidate key

A

superkey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____ key can be described as a minimal superkey, a superkey without any unnecessary attributes

a. secondary
b. candidate
c. primary
d. foreign

A

candidate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ is the primary key of one table that has been placed into another table to create a common attribute

a. superkey
b. composite primary key
c. candidate key
d. foreign key

A

foreign key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ key is defined as a key that is used strictly for data retrieval purposes

a. lookup
b. foreign
c. candidate
d. secondary

A

secondary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Referential _____ dictates that the foreign key must contain values that match the primary key in the related table, or must contain null

a. integrity
b. uniqueness
c. model
d. attribute

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The CUSTOMER table’s primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of _____ integrity

a. entity
b. referential
c. relational
d. null

A

entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The _____ constraint can be placed on a column to ensure that every row in the table has a value for that column

a. UNIQUE
b. NOT NULL
c. VALUE
d. EMPTY

A

NOT NULL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To be considered minimally relational, the DBMS must support the key relational operators _____, PROJECT, and JOIN

a. INTERSECT
b. UNION
c. DIFFERENCE
d. SELECT

A

SELECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition

a. INTERSECT
b. UNION
c. DIFFERENCE
d. SELECT

A

SELECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ returns only the attributes requested, in the order in which they are requested

a. PROJECT
b. SELECT
c. UNION
d. DIFFERENCE

A

PROJECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible domains, they are said to be _____

a. intersect-compatible
b. union-compatible
c. difference-compatible
d. select-compatible

A

union-compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A (n) _____ join links tables by selecting only the rows with common values in their common attribute(s)

a. attribute
b. unique
c. foreign
d. natural

A

natural

17
Q

_____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems

a. Inner joins
b. Outer joins
c. Equijoins
d. Theta joins

A

Outer joins

18
Q

A (n) _____ only returns matched records from the tables that are being joined

a. outer join
b. inner join
c. equijoin
d. theta join

A

inner join

19
Q

A _____ contains at least all of the attribute names and characteristics for each table in the system

a. data dictionary
b. relational schema
c. logical schema
d. database

A

data dictionary

20
Q

The _____ is actually a system-created database whose tables store the user/designer-created database characteristics and contents

a. database tuple
b. systematic database
c. unique index
d. system catalog

A

system catalog

21
Q

In a database context, the word _____ indicates the use of the same attribute name to label different attributes

a. redundancy
b. homonym
c. duplicate
d. synonym

A

homonym

22
Q

In a database context, a(n) _____ indicates the use of different names to describe the same attribute

a. entity
b. duplicate
c. synonym
d. homonym

A

synonym

23
Q

The _____ relationship is the “relational model ideal.”

a. 1:1
b. 1:M
c. M:1
d. M:N

A

1:M

24
Q

The _____ relationship should be rare in any relational database design

a. 1:1
b. 1:M
c. M:1
d. M:N

A

1:1

25
Q

_____ relationships can be implemented by creating a new entity in 1:M relationships with the original entities

a. 1:N
b. M:1
c. M:N
d. 1:1

A

M:N

26
Q

Another name for a composite entity is a (n) _____ entity

a. bridge
b. linked
c. directive
d. associative

A

bridge

27
Q

A (n) _____ is an orderly arrangement used to logically access rows in a table

a. primary rule
b. superkey
c. relationship
d. index

A

index

28
Q

When you define a table’s primary key, the DBMS automatically creates a (n) _____ index on the primary key column(s) you declared

a. key
b. composite
c. unique
d. primary

A

unique

29
Q

According to Codd’s _____ rule of relational databases, application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns)

a. distribution independence
b. logical data independence
c. comprehensive data sublanguage
d. integrity independence

A

logical data independence

30
Q

According to Codd’s _____ rule of relational databases, if the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database

a. nonsubversion
b. information
c. guaranteed access
d. view updating

A

nonsubversion