Skip to main content

INF503 Post Assement Quiz

 

1.       Structural dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data. False

2.       Structural dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data.  False

3.       Which of the following is a reason why a DBMS's daily operations must be clearly documented? Sol: Documentation of the daily operations help pinpoint causes and solutions of database problem

4.       The database structure in a DBMS is stored as a ANSWER: b. collection of files

5.       The Oracle ______  function compares an attribute or expression with a series of values and returns an associated value or a default value if no match is found. DECODE

6.       The _____ must be set large enough to permit as many data requests to be serviced from cache as possible. Data Cache

7.       During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented. Implementation

8.       In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools. information systems architecture

9.       The "_____" characteristic of a primary key states that the primary key must uniquely identify each entity instance, must be able to guarantee unique values, and must not contain nulls. unique values

10.   No matter what language you use, if it contains embedded SQL statements, it is called the _____ language. Host

11.   A(n) ____ is anything about which data are to be collected and stored. Entity

12.   In the Chen and Crow's Foot notations, an entity is represented with a rectangle containing the entity's name. True

13.   Which of the following is a characteristic of the XML metalanguage? It allows the definition of new tags.

14.   When performing user access management, a DBA defines each user to the database at the _____ levels. operating system and DBMS

15.  A _____key is defined as a key that is used strictly for data retrieval purposes. Sol. Secondary

16.  _____ fragmentation refers to the division of a relation into attribute subsets. Vertical

17.  _____ is a higher-level, object-oriented application interface used to access remote database servers. RDO

18.  A _____ is a dynamic table that not only contains the SQL query command to generate the rows, but also stores the actual rows. Materialized View

19.  The main disadvantage of using CGI scripts is that: they cause a resource bottleneck since they have to execute separately for each user request.

20.  database design is a(n) _____ process based on repetition. iterative

21.  In the Systems Development Life Cycle (SDLC), the design of the system's processes begins in the detailed systems design phase. False

22.  A null is created when you press the Enter key or the Tab key to move to the next entry without making a prior entry of any kind. True

23.  Relational models view data as part of a table or collection of tables in which all key values must be identified. True

24.  A(n) ________ is an orderly arrangement used to logically access rows in a table. Index

25.  The SQL cache stores the end-user written SQL False

26.  _____ tools focus on the strategic and tactical use of information.  Business intelligence

27.  A field-level lock allows concurrent transactions to access the same row, as long as they require the use of different fields within that row. True

28.  A(n) ______ is a tag that is used to associate a collection of nodes as being of the same type or belonging to the same group. Label

29.  A relational table must not contain a(n) Repeating group

30.  A table where all attributes are dependent on the primary key but are independent of each other, and no row contains two or more multivalued facts about an entity is said to be in _____. 4NF

31.  The Common Gateway Interface (CGI) is a newer web server interface standard that is much more efficient and faster than a dynamic link library (DLL). False.

32.  A system table space, a user data table space, an index table space, and a temporary table space are examples of _____. file groups

33.  Relational databases rely on unstructured data. False

34.  Business rules apply to businesses and government groups, but not to other types of organizations such as religious groups or research laboratories. False

35.  You can select partial table contents by naming the desired fields and by placing restrictions on the rows to be included in the output. True

36.  Which of the following refers to the situation where different versions of the same data are stored at different places because they weren't updated consistently? Data Redundancy

37.  Which command would be used to delete the table row where the P_CODE is 'BRT-345'? DELETE FROM PRODUCT WHERE P_CODE = 'BRT-345';

38.  The first step in developing the conceptual model using ER diagrams is to ________. identify, analyze, and refine the business rules

39.  A(n) _____ join will select only the rows with matching values in the common attribute(s).  natural

40.  ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equivalent to a COMMIT? The end of a program is successfully reached

41.  Disjoint subtypes are subtypes that contain nonunique subsets of the supertype entity set. False

42.  Relational data warehouses use the star schema design technique to handle multidimensional data. True

43.  The transaction processor (TP) is the software component found in each computer that requests data. True

44.  A derived attribute is indicated in the Chen notation by a _____ that connects the attribute and an entity. dashed line.

45.  The property of _____ enables an entity subtype to inherit the attributes and relationships of the supertype. inheritance

46.  When using a HDFS, the ______ node creates new files by communicating with the ______ node.  client; name

47.  SQL supports the conditional execution of procedures (IF-THEN-ELSE statements) that are typically supported by a programming language. False

48.  A _____ distributed database system will support different database management systems (DBMS) that may even support different models running under different computer systems. Fully heterogeneous

49.  In the wait/die scheme, the older transaction (lower timestamp) waits for the younger one to complete and release its locks.

50.  The ______ data model uses the concept of inheritance. object-oriented

51.   Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure. False

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh