Test 1 Flashcards

1
Q

1.) The__________ determines the common attribute or attributes by looking for identically named attributes and compatible data types.

A

natural join

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using a subquery, the output of a(n)_________ query is used as the input for the outer query.

A

inner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The_________clause is used to restrict the output of a GROUP BY query by applying a conditional criteria to the grouped rows.

A

HAVING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The IN subquery uses a(n)___________ operator.

A

equality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The use of the____________ operator allows you to compare a single value with a list of values returned by the first subquery (sqA) using a comparison operator other than EQUALS.

A

ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n)_____________subquery is a subquery that executes once for each row in the outer query.

A

correlated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The___________ statement combines the output of two SELECT queries.

A

UNION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A(n)____________ query can be used to produce a relation that retains the duplicate rows.

A

UNION ALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The____________ statement can be used to combine rows from two queries, returning only the rows that appear in both sets.

A

INTERSECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If the DBMS does not support the INTERSECT statement, one can use a(n)__________ subquery to achieve the same result.

A

IN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n)___________view is a view that can be used to update attributes in the base table(s) that are used in the view.

A

updatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n)____________ routine pools multiple transactions into a single batch to update a master table field in a single operation.

A

batch update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A row-level trigger requires use of the___________ keywords and is executed once for each row affected by the triggering statement.

A

FOR EACH ROW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When the critical application code is isolated in a single program,____________improves.

A

maintenance and logic control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is the term used to describe an environment in which the SQL statement is not known in advance and is generated at run time.

A

Dynamic SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ is the process that establishes the need for, and the extent of, and information system.

A

Systems analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The traditional Systems Development Life Cycle (SDLC) phases are ____, detailed systems design, implementation, and maintenance.

A

planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. An initial assessment of the information flow-and-extent requirements must be made during the ______ portion of the Systems Development Life Cycle (SDLC).
A

planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. After testing is concluded, the final ______ is reviewed and printed and end users are trained.
A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. The advent of very sophisticated application generators and ______ has substantially decreased coding and testing time.
A

debugging tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. The system and operational costs are addressed by the ______ during the planning phase of the Systems Development Life Cycle (SDLC).
A

feasibility study

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. ______ are usually provided by the database management system (DBMS) to check for access violations
A

Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. The ______ describes the general conditions in which a company operates, its organizational structure, and its mission.
A

company situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. The system’s ______ defines the extent of the design according to operational requirements.
A

scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
10. The proposed system is subject to limits known as ______, which are external to the system.
boundaries
26
11. Making sure that the final product meets user and system requirements is the most critical ___ phase.
Database Life Cycle (DBLC)
27
Programmers use database tools to ______ the applications during coding of the programs.
prototype
28
______ allows the assignment of access rights to specific authorized users
Password security
29
The ______ stage uses data modeling to create an abstract database structure that represents real- world objects in the most realistic way possible.
conceptual design
30
The first step in ______ is to discover the data element characteristics.
conceptual design
31
A designer must have a thorough understanding of the company’s data types, extent, and uses in order to develop an accurate ______.
data model
32
From a database point of view, the collection of data becomes meaningful only when the _____ are defined.
business rules
33
A ______ rule is a brief and precise narrative of a policy, procedures, or principle within a specific organization’s environment.
business rule
34
Because real world database design is generally done by teams, the database design is probably divided into major components known as ______.
modules
35
A (n) ______ is an information system component that handles a specific business function, such as inventory, orders, or payroll.
module
36
______ is the first stage in the database design process.
conceptual design
37
The term ______ describes the extent to which modules are independent of one another
module coupling
38
The term ______ describes the strength of the relationships found among a module’s entities
cohesivity
39
The ______ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.
logical design
40
______ could become a very technical job that affects not only the accessibility of the data in the storage device (s) but also the performance of the system
Physical design
41
___________ requires that all operations of a transaction be completed.
. Atomicity
42
__________ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
c. Isolation
43
All transactions must display __________.
. atomicity, durability, consistency, and isolation
44
A single-user database system automatically ensures ________________ of the database, because only one transaction is executed at a time.
serializability and isolation
45
The ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements: ____________ and ROLLBACK.
COMMIT
46
ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a COMMIT?
The end of a program is successfully reached.
47
ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a ROLLBACK?
The program is abnormally terminated.
48
The implicit beginning of a transaction is ______________.
when the first SQL statement is encountered
49
The information stored in the ___________ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program’s abnormal termination, or a system failure such as a network discrepancy or a disk crash.
transaction log
50
One of the three most common data integrity and consistency problems is ___________.
lost updates
51
_____________ occurs when a transaction accesses data before and after one or more other transactions finish working with such data.
Inconsistent retrievals
52
As long as two transactions, T1 and T2, access ____________ data, there is no conflict, and the order of execution is irrelevant to the final outcome.
unrelated
53
A ___________ lock prevents the use of any tables in the database from one transaction while another transaction is being processed.
database-level
54
______________ are required to prevent another transaction from reading inconsistent data.
Locks
55
The ____________ manager is responsible for assigning and policing the locks used by the transactions.
lock
56
Lock _______________ indicates the level of lock use.
granularity
57
A_____________ lock locks the entire table preventing access to any row by a transaction while another transaction is using the table.
table-level
58
A___________ lock locks the entire diskpage.
page-level
59
A diskpage, or page, is the equivalent of a ___________.
diskblock
60
A __________ lock allows concurrent transactions to access different rows of the same table.
row-level
61
A(n) __________ lock has only two stages (0 and 1).
binary
62
A(n) _____________ specifically reserves access to the transaction that locked the object.
exclusive lock
63
End users and the DBMS interact through the use of _____to generate information.
Queries
64
A system will perform best when its hardware and software resources are _________.
optimized
65
Database __________ activities can be divided into those taking place either on the client side or on the server side.
performance tuning
66
_________ is another name for table space.
File group
67
The ______ cache is a shared, reserved memory area that stores the most recently executed SQL statements or PL/SQL procedures, including triggers and functions.
SQL
68
A (n) request is a low-level read or write data access operation to or from computer devices.
input/output (mouse, Keyboard, Speakers)
69
DBMS query processing has phases.
3, 1. Parsing -Chooses the most efficient access/execution plan 2. Execution- DBMS executes the sql query using the chosen execution plan 3. Fetching- DBMS fetches the data and sends the result set back to the client
70
The __________ analyzes the SQL query and finds the most efficient way to access the data.
query optimizer
71
________ are ordered sets of values that are crucial in speeding up data access.
Indexes
72
A ________ is good for simple and fast lookup operations based on equality conditions.
hash index
73
_________ are special instructions for the optimizer that are embedded inside the SQL command text.
Optimizer hints
74
_________ is a measure of the likelihood that an index will be used in query processing.
Index selectivity
75
___________ is evaluated based on client perspective.
SQL performance tuning
76
___________ is an index based on a specific SQL function or expression.
function-based index
77
A condition expression is normally expressed with the _______ or HAVING clauses of a SQL statement.
WHERE
78
____________ helps provide a balance between performance and fault tolerance.
RAID Redundant Array of Independant Disks
79
The ______ table space is the most frequently accessed table space and should be stored in its own volume.
system