Question
click below
click below
Question
Normal Size Small Size show me how
IST210Final
Question | Answer |
---|---|
T/F: Database connectivity software is also known as database middleware because it interfaces between the application program and the database. | TRUE |
T/F: Usually, the native database connectivity interface provided by the vendor is not the only way to connect to a database; most current DBMS products support other database connectivity standards, the most common being ODBC. | TRUE |
T/F: An API (application programming interface) is defined as a set of routines, protocols, and tools for building software applications. | TRUE |
T/F: The effects of bad database design, implementation, and management are multiplied in an environment in which transactions may be measured in hundreds of thousands per day, rather than in hundreds per day. | TRUE |
T/F: A database language enables the user to create database and table structures to perform basic data management chores. | TRUE |
T/F: SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words. | FALSE - easy, less than 100 words |
T/F: Data type selection is usually dictated by the nature of the data and by the intended use. | TRUE |
T/F: SQL requires the use of the ADD command to enter data into a table. | FALSE - INSERT |
T/F: You cannot insert a row containing a null attribute value using SQL. | FALSE |
T/F: All SQL commands must be issued on a single line. | FALSE |
T/F: Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command’s components. | TRUE |
T/F: COUNT is designed to tally the number of non-null "values" of an attribute, and is often used in conjunction with the DISTINCT clause. | TRUE |
T/F: One of the major advantages of stored procedures is that they can be used to encapsulate and represent business transactions. | TRUE |
T/F: Stored procedures help reduce code duplication by means of code isolation and code sharing. | TRUE |
T/F: The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making. | TRUE |
T/F: Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers. | FALSE |
T/F: Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure. | FALSE - DBA activities |
T/F: Decision support data are a snapshot of the operational data at a given point in time. | TRUE |
T/F: Once data enter the data warehouse, they are never removed. | TRUE |
The SQL command that lets you insert rows into a table is ____. | INSERT |
The SQL command that lets you permanently save data changes is ____. | COMMIT |
The SQL command that modifies an attribute’s values in one or more table’s rows is ____. | UPDATE |
When you issue the DELETE FROM tablename command without specifying a WHERE condition, ____. | All rows will be deleted from specified table |
Which of the following is used to select partial table contents? | SELECT cloumnlist FROM tablelist WHERE conditionslist |
Which query will output the table contents when the value of V_CODE is equal to 21344? | Select P_Descript, P_Indate, P_Price, V_Code From Product Where V_Code=21344 |
Which query will output the table contents when the value of P_PRICE is less than or equal to 10? | SELECT P_Descript, P_QOH, P_MIN, P_Price, P_INdate FROM Product WHERE P_Price <=10 |
A(n) ____ is an alternate name given to a column or table in any SQL statement. | ALIAS |
Which query uses the correct SQL syntax to list the table contents for either V_CODE = 21344 or V_CODE = 24288? | SELECT P_Descript, P_Price, P_INdate, V_CODE FROM Product WHERE V_Code=21344 or V_Code=24288 |
The special operator used to check whether an attribute value is within a range of values is ____. | IN (BETWEEN) |
The special operator used to check for similar character strings is ____. | LIKE |
A table can be deleted from the database by using the ____ command. | DROP TABLE |
The SQL aggregate function that gives the number of rows containing non-null values for the given column is ____. | COUNT |
The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME, V_AREACODE, V_PHONE, and V_CONTACT fields from the VENDOR table where the values of V_CODE match is ____. | SELECT P_Descript, P_Price,V_Name, V_Contact,V_Areacode, V_Phone FROM Product, Vendor WHERE Product.V_Code=Vendor.V_Code |
When introducing a database into an organization, a(n) ______ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. | CULTURAL |
There is a growing trend toward ____ in the data-management function. | SPECIALIZATION |
As a manager, the DBA must concentrate on the ______ dimensions of the database administration function. | CONTROL AND PLANNING |
are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. | STANDARDS |
“All users must have passwords” is an example of a ____. | POLICY |
A(n) ____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time. | ACCESS |
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. | CONFIDENTIALITY |
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. | CORRUPTED |
_____ management is designed to limit access to the database. | USER ACCESS |
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ___________, closed-circuit video, and voice-recognition technology, | ELECTRONIC PERSONAL BADGES |
User-access management is a subset of _____. | AUTHORIZED MANAGEMENT |
Classifying users into _____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users. | ROLES |
Data mining is part of the “____” section of the business intelligence framework. | KNOWLEDGE |
The ________ contains business data extracted from the operational database and from external data sources. | DECISION SUPPORT DATA |
____ are in charge of presenting the data to the end user in a variety of ways. | OPERATIONAL DATABASE |
A characteristic of decision support data is ________. | VERY LARGE AMOUNT OF DATA |
Which of the following is true of business rules? | They can serve as a communication tool between the user and designers |
Most important characteristic of an entity is ________, used to uniquely identify each entity instance | PRIMARY KEY |