11/6/14, 10:21 AMTake Test: 5451 Q3
Page 1 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.jsp?course_assessment_id=_124305_1&course_id=_1410180_1&content_id=_1748910_1&step=null
2014
Fall
Database
Systems
SEC.01
Assignments Take Test: 5451 Q3H
Take Test: 5451 Q3Take Test: 5451 Q3
Description This Quiz is due by 11:59PM on November 8th. You may use the text and class
materials on the exam, but you may not give or receive aid, nor may you use
online resources.
Instructions
Multiple
Attempts
Not allowed. This test can only be taken once.
Force
Completion
This test can be saved and resumed later.
Save All AnswersSave All Answers Save and SubmitSave and Submit
A point of synchronization between the database and the transaction log is called a(n):
before-image.
after-image.
recovery.
checkpoint.
None of these
Question 1 2.5 points Save AnswerSave Answer
An ACID transaction is one that is:
atomic.
consistent.
isolated.
durable.
All of these
Question 2
2.5 points Save AnswerSave Answer
As far as Microsoft Access is concerned, there are no:
recursive relationships.
1:1 relationships.
N:1 relationships.
1:N relationships.
N:M relationships.
Question 3
2.5 points Save AnswerSave Answer
By default, when Microsoft Access creates a relationship between two tables, it creates a(n):
1:1 relationship.
N:M relationship.
1:N relationship.
recursive relationship.
association relationship.
Question 4 2.5 points Save AnswerSave Answer
The most commonly web server program is:
MySQL
Microsoft Access
Apache
every consequence of data values must originate in the definition of determinants and
keys.
php
Question 5
2.5 points Save AnswerSave Answer
??
Question Completion Status:
https://nccu.blackboard.com/webapps/assessment/take/launch.jsp?course_assessment_id=_124305_1&course_id=_1410180_1&content_id=_1748910_1&step=null#
https://nccu.blackboard.com/webapps/blackboard/execute/courseMain?course_id=_1410180_1
https://nccu.blackboard.com/webapps/assessment/take/launch.jsp?course_assessment_id=_124305_1&course_id=_1410180_1&content_id=_1748910_1&step=null#contextMenu
https://nccu.blackboard.com/webapps/blackboard/content/listContent.jsp?course_id=_1410180_1&content_id=_1673778_1&mode=reset
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 2 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.jsp?course_assessment_id=_124305_1&course_id=_1410180_1&content_id=_1748910_1&step=null
Ensuring that each SQL statement independently processes consistent rows is known as:
process level consistency.
transaction level consistency.
independent consistency.
serializable consistency.
statement level consistency.
Question 6 2.5 points Save AnswerSave Answer
Given the PRODUCT and SUPPLIER entities in the figure below, which of the following would
represent the correct placement of foreign keys?
PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName,
PhoneNumber)PRODUCT_SUPPLIER (ProductID, Supplie.
11614, 1021 AMTake Test 5451 Q3Page 1 of 7httpsnccu.docx
1. 11/6/14, 10:21 AMTake Test: 5451 Q3
Page 1 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
2014
Fall
Database
Systems
SEC.01
Assignments Take Test: 5451 Q3H
Take Test: 5451 Q3Take Test: 5451 Q3
Description This Quiz is due by 11:59PM on November 8th.
You may use the text and class
materials on the exam, but you may not give or receive aid, nor
may you use
online resources.
Instructions
Multiple
Attempts
Not allowed. This test can only be taken once.
Force
Completion
2. This test can be saved and resumed later.
Save All AnswersSave All Answers Save and SubmitSave and
Submit
A point of synchronization between the database and the
transaction log is called a(n):
before-image.
after-image.
recovery.
checkpoint.
None of these
Question 1 2.5 points Save AnswerSave Answer
An ACID transaction is one that is:
atomic.
consistent.
isolated.
durable.
All of these
Question 2
2.5 points Save AnswerSave Answer
As far as Microsoft Access is concerned, there are no:
recursive relationships.
1:1 relationships.
N:1 relationships.
1:N relationships.
N:M relationships.
Question 3
2.5 points Save AnswerSave Answer
3. By default, when Microsoft Access creates a relationship
between two tables, it creates a(n):
1:1 relationship.
N:M relationship.
1:N relationship.
recursive relationship.
association relationship.
Question 4 2.5 points Save AnswerSave Answer
The most commonly web server program is:
MySQL
Microsoft Access
Apache
every consequence of data values must originate in the
definition of determinants and
keys.
php
Question 5
2.5 points Save AnswerSave Answer
??
Question Completion Status:
https://nccu.blackboard.com/webapps/assessment/take/launch.js
p?course_assessment_id=_124305_1&course_id=_1410180_1&c
ontent_id=_1748910_1&step=null#
https://nccu.blackboard.com/webapps/blackboard/execute/cours
eMain?course_id=_1410180_1
5. PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber, ProductID)
Question 7 2.5 points Save AnswerSave Answer
Given the entities PRODUCT and SUPPLIER shown in the
figure below, which of the following
would represent the correct placement of foreign keys?
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber, ProductID)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber, ProductID)
PRODUCT (ProductID, Description, Cost,
ContactName)SUPPLIER (SupplierID,
ContactName, PhoneNumber)
Question 8 2.5 points Save AnswerSave Answer
Given the generic relation: GENERIC (PKey1, PKey2,
6. Attribute1, Attribute2, Attribute3),
and the functional dependencies: (PKey1, PKey2) → Attribute1
and PKey2 → (Attribute2,
Attribute3), which of the following is true?
GENERIC is not fully normalized.
PKey1 is a determinant.
PKey2 is a candidate key.
GENERIC is in DK/NF.
All of these
Question 9 2.5 points Save AnswerSave Answer
Given TABLE_A (Attribute1, Attribute2, Attribute3) and
TABLE_B (Attribute4, Attribute5,
Attribute6) shown in the figure below, which of the following
would display the correct
placement of foreign keys in the relational model?
TABLE _A (Attribute1, Attribute2, Attribute3, Attribute4,
Attribute5)TABLE _B (Attribute4,
Attribute5, Attribute6)
TABLE _A (Attribute1, Attribute2, Attribute3,
Attribute6)TABLE _B (Attribute4, Attribute5,
Attribute6)
TABLE _A (Attribute1, Attribute2, Attribute3)TABLE _B
(Attribute4, Attribute5, Attribute6)
TABLE_A (Attribute1, Attribute2, Attribute3)TABLE _B
(Attribute4, Attribute5,
Attribute6, Attribute1)
TABLE _A (Attribute1, Attribute2, Attribute3,
Attribute4)TABLE _B (Attribute4, Attribute5,
Attribute6, Attribute1)
Question 10 2.5 points Save AnswerSave Answer
7. 11/6/14, 10:21 AMTake Test: 5451 Q3
Page 3 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Preventing multiple applications from obtaining copies of the
same record when the record
is about to changed is called:
serialized reading.
lost updating.
concurrent processing.
resource locking.
block factoring.
Question 11
2.5 points Save AnswerSave Answer
SQL statements can be run individually or as part of a related
group of SQL statements
known as a(n):
Commandset.
Script.
Scriptset.
Resultset.
Result.
Question 12
2.5 points Save AnswerSave Answer
The fundamental rule of normalization can be stated as:
8. every table must meet the definition of a relation.
every determinant must be a candidate key.
every constraint must be a determinant.
every key must be a candidate key.
every domain must be a logical consequence of the constraints.
Question 13 2.5 points Save AnswerSave Answer
The purpose of concurrency control is to:
ensure that one user's work does not interfere with another's.
ensure that triggers do not invoke stored procedures.
ensure that each form has a corresponding report.
ensure that ASPs do not duplicate JSPs.
ensure that stored procedures do not invoke triggers.
Question 14 2.5 points Save AnswerSave Answer
The recovery technique in which the database is returned to a
known state and then all
valid transactions are reapplied to the database is known as:
checkpointing.
rollforward.
rollback.
reprocessing.
transaction logging.
Question 15
2.5 points Save AnswerSave Answer
The term DBA refers to the:
data business administrator.
data business auditor.
database accessor.
database auditor.
database administrator.
9. Question 16 2.5 points Save AnswerSave Answer
To create a 1:1 relationship between two tables in Microsoft
Access:
the Indexed property of the foreign key column must be set to
Yes (No Duplicates).
the Indexed property of the foreign key column must be set to
No.
the Data Type of the foreign key column must be set to
AutoNumber.
the Smart Tag property of the foreign key column must be set to
Foreign Key.
the Indexed property of the foreign key column must be set to
Yes (Duplicates OK).
Question 17 2.5 points Save AnswerSave Answer
What concurrent processing problem occurs when a transaction
rereads data and finds new
rows that were inserted by a different transaction since the prior
read?
Question 18
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 4 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Phantom reads
10. Unlocked reads
Serialized reads
Nonrepeatable reads
Dirty reads
What is the least restrictive isolation level that will prevent
dirty reads?
Read Committed
Read Uncommitted
Atomic Read
Repeatable Read
Serializable
Question 19
2.5 points Save AnswerSave Answer
What is the least restrictive isolation level that will prevent
nonrepeatable reads?
Repeatable Read
Read Uncommitted
Read Committed
Serializable
Atomic Read
Question 20
2.5 points Save AnswerSave Answer
What is the least restrictive isolation level that will prevent
phantom read problems?
Read Committed
Repeatable Read
Atomic Read
Serializable
Read Uncommitted
Question 21
11. 2.5 points Save AnswerSave Answer
What relationship pattern is illustrated in the following schema?
VehicleID in CAR must exist in VehicleID in
VEHICLE VehicleID in TRUCK must exist in VehicleID in
VEHICLE
Strong entity relationship
Intersection relationship
Recursive relationship
Supertype/subtype relationship
Association relationship
Question 22
2.5 points Save AnswerSave Answer
Th most commonly used language to manipulate data in a
database is:
Ruby
SQL
C++
Microsoft Access
Question 23
2.5 points Save AnswerSave Answer
When a transaction functions in such a way that either all of the
transaction actions are
completed or none of them will be, the transaction is said to be:
logical.
12. atomic.
consistent.
locked.
isolated.
Question 24
2.5 points Save AnswerSave Answer
When distributed databases create copies of the database on
different servers, thisis known
as:
replication.
Question 25
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 5 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
replication.
partitioning.
disbursing.
distributed two-phase locking.
None of these
Whether a lock applies to data at the record level, page level,
table level, or database level
is referred to as:
13. lock exclusivity.
lock phasing.
lock granularity.
serializable locking.
lock sharing.
Question 26
2.5 points Save AnswerSave Answer
The most commonly used database program in websites is:
MySQL
PHP
Oracle
DK/NF
Microsoft SQL Server 2
Question 27
2.5 points Save AnswerSave Answer
Which normal form is defined as any table meeting the
definition of a relation?
DK/NF
4NF
BCNF
1NF
2NF
Question 28
2.5 points Save AnswerSave Answer
What programming language is most often used to pass user
14. input from a web interface to
a database?
Access
PHP
Oracle
Java
Question 29
2.5 points Save AnswerSave Answer
Which of the following is not true of database recovery through
reprocessing?
Reprocessing makes use of a database save.
Reprocessing takes the same amount of time as did processing
in the first place.
Reprocessing will always return the database to its exact
previous state.
Reprocessing requires a record of all transactions since the last
time the database was
saved.
All of these are true of reprocessing.
Question 30 2.5 points Save AnswerSave Answer
Which of the following is the correct technique for representing
a 1:N relationship in the
relational model?
The key of either relation can be placed into the other relation.
The key of the entity on the one side is placed into the relation
for the entity on
15. the many side.
The key of the child is placed into the relation of the parent.
The key of the entity on the many side is placed into the
relation for the entity on
the one side.
An intersection relation is created and the keys from both parent
entities are placed as
keys in the intersection relation.
Question 31
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 6 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Which of the following is the correct technique for representing
a M:N relationship using
the relational model?
An intersection relation is created and the key of either entity is
placed as a key in both
the intersection relation and in the other relation.
An intersection relation is created with a surrogate key, which
is placed in each of the
parent entities.
An intersection relation is created and the keys of both parent
entities are placed as a
composite key in the intersection relation.
The key from either relation is placed as a foreign key in the
other relation.
16. None of these
Question 32 2.5 points Save AnswerSave Answer
Which of the following is the first step in representing entities
using the relational model?
Define a primary key.
Determine identifiers.
Determine foreign keys.
Examine the entity against normalization criteria.
Define a table for each entity.
Question 33
2.5 points Save AnswerSave Answer
Which of the following is true about a shared lock?
It is more restrictive than an implicit lock.
It locks the item from all access.
It allows only two transactions to update a record
simultaneously.
It allows reads to the locked item.
It must use a two-phase locking scheme.
Question 34
2.5 points Save AnswerSave Answer
Which of the following is true about representing a weak entity
with the relational model?
If the weak entity is ID-dependent, the key of the parent entity
must be part of the key
of the weak entity.
If the weak entity is ID-dependent, the key of the weak entity
must be part of the key of
the parent entity.
If the parent entity is existence-dependent, then the minimum
17. cardinality of the weak
entity is zero.
If the strong entity has a minimum cardinality of 1, the key of
the weak entity must be
part of the strong entity.
If the weak entity is existence-dependent, the key of the parent
must be part of the key
of the weak entity.
Question 35
2.5 points Save AnswerSave Answer
Which of the following is true when representing a 1:1 binary
relationship using the
relational model?
The key of the entity with the highest minimum cardinality must
be placed in the other
entity as a foreign key.
The key of either entity is placed in the other as a foreign key.
Both entities must have the same primary key.
The key of each entity must be placed in the other as a foreign
key.
The key of the entity with the most attributes must be placed in
the other entity as a
foreign key.
Question 36
2.5 points Save AnswerSave Answer
Which of the following is not a means of processing databases?
Internet applications using ASP
Internet applications using JSP
Applications invoking stored procedures
Programs coded in C#
All of these are means of processing a database.
18. Question 37 2.5 points Save AnswerSave Answer
What language is most often used to pass SQL query results to a
user's web interface?
Perl
Python
Linux
Question 38
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 7 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Click Save and Submit to save and submit. Click Save All
Answers to save all answers.
Save All AnswersSave All Answers Save and SubmitSave and
Submit
Linux
php
Which of the following would be a reason to denormalize a
relation?
19. Relax security
Lack of design time
End user preference
Improve performance
None of these
Question 39 2.5 points Save AnswerSave Answer
Which type of lock assumes that no conflicts will occur?
Optimistic locks
Explicit locks
Shared locks
Granular locks
Open locks
Question 40
2.5 points Save AnswerSave Answer
Save and Submit