SlideShare a Scribd company logo
1 of 19
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 1 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
2014
Fall
Database
Systems
SEC.01
Assignments Take Test: 5451 Q3H
Take Test: 5451 Q3Take Test: 5451 Q3
Description This Quiz is due by 11:59PM on November 8th.
You may use the text and class
materials on the exam, but you may not give or receive aid, nor
may you use
online resources.
Instructions
Multiple
Attempts
Not allowed. This test can only be taken once.
Force
Completion
This test can be saved and resumed later.
Save All AnswersSave All Answers Save and SubmitSave and
Submit
A point of synchronization between the database and the
transaction log is called a(n):
before-image.
after-image.
recovery.
checkpoint.
None of these
Question 1 2.5 points Save AnswerSave Answer
An ACID transaction is one that is:
atomic.
consistent.
isolated.
durable.
All of these
Question 2
2.5 points Save AnswerSave Answer
As far as Microsoft Access is concerned, there are no:
recursive relationships.
1:1 relationships.
N:1 relationships.
1:N relationships.
N:M relationships.
Question 3
2.5 points Save AnswerSave Answer
By default, when Microsoft Access creates a relationship
between two tables, it creates a(n):
1:1 relationship.
N:M relationship.
1:N relationship.
recursive relationship.
association relationship.
Question 4 2.5 points Save AnswerSave Answer
The most commonly web server program is:
MySQL
Microsoft Access
Apache
every consequence of data values must originate in the
definition of determinants and
keys.
php
Question 5
2.5 points Save AnswerSave Answer
??
Question Completion Status:
https://nccu.blackboard.com/webapps/assessment/take/launch.js
p?course_assessment_id=_124305_1&course_id=_1410180_1&c
ontent_id=_1748910_1&step=null#
https://nccu.blackboard.com/webapps/blackboard/execute/cours
eMain?course_id=_1410180_1
https://nccu.blackboard.com/webapps/assessment/take/launch.js
p?course_assessment_id=_124305_1&course_id=_1410180_1&c
ontent_id=_1748910_1&step=null#contextMenu
https://nccu.blackboard.com/webapps/blackboard/content/listCo
ntent.jsp?course_id=_1410180_1&content_id=_1673778_1&mo
de=reset
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 2 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Ensuring that each SQL statement independently processes
consistent rows is known as:
process level consistency.
transaction level consistency.
independent consistency.
serializable consistency.
statement level consistency.
Question 6 2.5 points Save AnswerSave Answer
Given the PRODUCT and SUPPLIER entities in the figure
below, which of the following would
represent the correct placement of foreign keys?
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber)PRODUCT_SUPPLIER (ProductID, SupplierID)
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber)PRODUCT_SUPPLIER (ProductID, SupplierID)
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber, ProductID)
Question 7 2.5 points Save AnswerSave Answer
Given the entities PRODUCT and SUPPLIER shown in the
figure below, which of the following
would represent the correct placement of foreign keys?
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber, ProductID)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost)SUPPLIER
(SupplierID, ContactName,
PhoneNumber)
PRODUCT (ProductID, Description, Cost,
SupplierID)SUPPLIER (SupplierID, ContactName,
PhoneNumber, ProductID)
PRODUCT (ProductID, Description, Cost,
ContactName)SUPPLIER (SupplierID,
ContactName, PhoneNumber)
Question 8 2.5 points Save AnswerSave Answer
Given the generic relation: GENERIC (PKey1, PKey2,
Attribute1, Attribute2, Attribute3),
and the functional dependencies: (PKey1, PKey2) → Attribute1
and PKey2 → (Attribute2,
Attribute3), which of the following is true?
GENERIC is not fully normalized.
PKey1 is a determinant.
PKey2 is a candidate key.
GENERIC is in DK/NF.
All of these
Question 9 2.5 points Save AnswerSave Answer
Given TABLE_A (Attribute1, Attribute2, Attribute3) and
TABLE_B (Attribute4, Attribute5,
Attribute6) shown in the figure below, which of the following
would display the correct
placement of foreign keys in the relational model?
TABLE _A (Attribute1, Attribute2, Attribute3, Attribute4,
Attribute5)TABLE _B (Attribute4,
Attribute5, Attribute6)
TABLE _A (Attribute1, Attribute2, Attribute3,
Attribute6)TABLE _B (Attribute4, Attribute5,
Attribute6)
TABLE _A (Attribute1, Attribute2, Attribute3)TABLE _B
(Attribute4, Attribute5, Attribute6)
TABLE_A (Attribute1, Attribute2, Attribute3)TABLE _B
(Attribute4, Attribute5,
Attribute6, Attribute1)
TABLE _A (Attribute1, Attribute2, Attribute3,
Attribute4)TABLE _B (Attribute4, Attribute5,
Attribute6, Attribute1)
Question 10 2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 3 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Preventing multiple applications from obtaining copies of the
same record when the record
is about to changed is called:
serialized reading.
lost updating.
concurrent processing.
resource locking.
block factoring.
Question 11
2.5 points Save AnswerSave Answer
SQL statements can be run individually or as part of a related
group of SQL statements
known as a(n):
Commandset.
Script.
Scriptset.
Resultset.
Result.
Question 12
2.5 points Save AnswerSave Answer
The fundamental rule of normalization can be stated as:
every table must meet the definition of a relation.
every determinant must be a candidate key.
every constraint must be a determinant.
every key must be a candidate key.
every domain must be a logical consequence of the constraints.
Question 13 2.5 points Save AnswerSave Answer
The purpose of concurrency control is to:
ensure that one user's work does not interfere with another's.
ensure that triggers do not invoke stored procedures.
ensure that each form has a corresponding report.
ensure that ASPs do not duplicate JSPs.
ensure that stored procedures do not invoke triggers.
Question 14 2.5 points Save AnswerSave Answer
The recovery technique in which the database is returned to a
known state and then all
valid transactions are reapplied to the database is known as:
checkpointing.
rollforward.
rollback.
reprocessing.
transaction logging.
Question 15
2.5 points Save AnswerSave Answer
The term DBA refers to the:
data business administrator.
data business auditor.
database accessor.
database auditor.
database administrator.
Question 16 2.5 points Save AnswerSave Answer
To create a 1:1 relationship between two tables in Microsoft
Access:
the Indexed property of the foreign key column must be set to
Yes (No Duplicates).
the Indexed property of the foreign key column must be set to
No.
the Data Type of the foreign key column must be set to
AutoNumber.
the Smart Tag property of the foreign key column must be set to
Foreign Key.
the Indexed property of the foreign key column must be set to
Yes (Duplicates OK).
Question 17 2.5 points Save AnswerSave Answer
What concurrent processing problem occurs when a transaction
rereads data and finds new
rows that were inserted by a different transaction since the prior
read?
Question 18
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 4 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Phantom reads
Unlocked reads
Serialized reads
Nonrepeatable reads
Dirty reads
What is the least restrictive isolation level that will prevent
dirty reads?
Read Committed
Read Uncommitted
Atomic Read
Repeatable Read
Serializable
Question 19
2.5 points Save AnswerSave Answer
What is the least restrictive isolation level that will prevent
nonrepeatable reads?
Repeatable Read
Read Uncommitted
Read Committed
Serializable
Atomic Read
Question 20
2.5 points Save AnswerSave Answer
What is the least restrictive isolation level that will prevent
phantom read problems?
Read Committed
Repeatable Read
Atomic Read
Serializable
Read Uncommitted
Question 21
2.5 points Save AnswerSave Answer
What relationship pattern is illustrated in the following schema?
VehicleID in CAR must exist in VehicleID in
VEHICLE VehicleID in TRUCK must exist in VehicleID in
VEHICLE
Strong entity relationship
Intersection relationship
Recursive relationship
Supertype/subtype relationship
Association relationship
Question 22
2.5 points Save AnswerSave Answer
Th most commonly used language to manipulate data in a
database is:
Ruby
SQL
C++
Microsoft Access
Question 23
2.5 points Save AnswerSave Answer
When a transaction functions in such a way that either all of the
transaction actions are
completed or none of them will be, the transaction is said to be:
logical.
atomic.
consistent.
locked.
isolated.
Question 24
2.5 points Save AnswerSave Answer
When distributed databases create copies of the database on
different servers, thisis known
as:
replication.
Question 25
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 5 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
replication.
partitioning.
disbursing.
distributed two-phase locking.
None of these
Whether a lock applies to data at the record level, page level,
table level, or database level
is referred to as:
lock exclusivity.
lock phasing.
lock granularity.
serializable locking.
lock sharing.
Question 26
2.5 points Save AnswerSave Answer
The most commonly used database program in websites is:
MySQL
PHP
Oracle
DK/NF
Microsoft SQL Server 2
Question 27
2.5 points Save AnswerSave Answer
Which normal form is defined as any table meeting the
definition of a relation?
DK/NF
4NF
BCNF
1NF
2NF
Question 28
2.5 points Save AnswerSave Answer
What programming language is most often used to pass user
input from a web interface to
a database?
Access
PHP
Oracle
Java
Question 29
2.5 points Save AnswerSave Answer
Which of the following is not true of database recovery through
reprocessing?
Reprocessing makes use of a database save.
Reprocessing takes the same amount of time as did processing
in the first place.
Reprocessing will always return the database to its exact
previous state.
Reprocessing requires a record of all transactions since the last
time the database was
saved.
All of these are true of reprocessing.
Question 30 2.5 points Save AnswerSave Answer
Which of the following is the correct technique for representing
a 1:N relationship in the
relational model?
The key of either relation can be placed into the other relation.
The key of the entity on the one side is placed into the relation
for the entity on
the many side.
The key of the child is placed into the relation of the parent.
The key of the entity on the many side is placed into the
relation for the entity on
the one side.
An intersection relation is created and the keys from both parent
entities are placed as
keys in the intersection relation.
Question 31
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 6 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Which of the following is the correct technique for representing
a M:N relationship using
the relational model?
An intersection relation is created and the key of either entity is
placed as a key in both
the intersection relation and in the other relation.
An intersection relation is created with a surrogate key, which
is placed in each of the
parent entities.
An intersection relation is created and the keys of both parent
entities are placed as a
composite key in the intersection relation.
The key from either relation is placed as a foreign key in the
other relation.
None of these
Question 32 2.5 points Save AnswerSave Answer
Which of the following is the first step in representing entities
using the relational model?
Define a primary key.
Determine identifiers.
Determine foreign keys.
Examine the entity against normalization criteria.
Define a table for each entity.
Question 33
2.5 points Save AnswerSave Answer
Which of the following is true about a shared lock?
It is more restrictive than an implicit lock.
It locks the item from all access.
It allows only two transactions to update a record
simultaneously.
It allows reads to the locked item.
It must use a two-phase locking scheme.
Question 34
2.5 points Save AnswerSave Answer
Which of the following is true about representing a weak entity
with the relational model?
If the weak entity is ID-dependent, the key of the parent entity
must be part of the key
of the weak entity.
If the weak entity is ID-dependent, the key of the weak entity
must be part of the key of
the parent entity.
If the parent entity is existence-dependent, then the minimum
cardinality of the weak
entity is zero.
If the strong entity has a minimum cardinality of 1, the key of
the weak entity must be
part of the strong entity.
If the weak entity is existence-dependent, the key of the parent
must be part of the key
of the weak entity.
Question 35
2.5 points Save AnswerSave Answer
Which of the following is true when representing a 1:1 binary
relationship using the
relational model?
The key of the entity with the highest minimum cardinality must
be placed in the other
entity as a foreign key.
The key of either entity is placed in the other as a foreign key.
Both entities must have the same primary key.
The key of each entity must be placed in the other as a foreign
key.
The key of the entity with the most attributes must be placed in
the other entity as a
foreign key.
Question 36
2.5 points Save AnswerSave Answer
Which of the following is not a means of processing databases?
Internet applications using ASP
Internet applications using JSP
Applications invoking stored procedures
Programs coded in C#
All of these are means of processing a database.
Question 37 2.5 points Save AnswerSave Answer
What language is most often used to pass SQL query results to a
user's web interface?
Perl
Python
Linux
Question 38
2.5 points Save AnswerSave Answer
11/6/14, 10:21 AMTake Test: 5451 Q3
Page 7 of
7https://nccu.blackboard.com/webapps/assessment/take/launch.j
sp?course_assessment_id=_124305_1&course_id=_1410180_1&
content_id=_1748910_1&step=null
Click Save and Submit to save and submit. Click Save All
Answers to save all answers.
Save All AnswersSave All Answers Save and SubmitSave and
Submit
Linux
php
Which of the following would be a reason to denormalize a
relation?
Relax security
Lack of design time
End user preference
Improve performance
None of these
Question 39 2.5 points Save AnswerSave Answer
Which type of lock assumes that no conflicts will occur?
Optimistic locks
Explicit locks
Shared locks
Granular locks
Open locks
Question 40
2.5 points Save AnswerSave Answer
Save and Submit

More Related Content

Similar to 11614, 1021 AMTake Test 5451 Q3Page 1 of 7httpsnccu.docx

Software Testing: Application And Script Independent Automation Framework: Th...
Software Testing: Application And Script Independent Automation Framework: Th...Software Testing: Application And Script Independent Automation Framework: Th...
Software Testing: Application And Script Independent Automation Framework: Th...
guest0efb5e
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questions
Dr P Deepak
 
Introduction to Data Warehousing
Introduction to Data WarehousingIntroduction to Data Warehousing
Introduction to Data Warehousing
Edureka!
 
Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07
Steve Feldman
 

Similar to 11614, 1021 AMTake Test 5451 Q3Page 1 of 7httpsnccu.docx (20)

Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Data stage interview questions and answers|DataStage FAQS
Data stage interview questions and answers|DataStage FAQSData stage interview questions and answers|DataStage FAQS
Data stage interview questions and answers|DataStage FAQS
 
Software Testing: Application And Script Independent Automation Framework: Th...
Software Testing: Application And Script Independent Automation Framework: Th...Software Testing: Application And Script Independent Automation Framework: Th...
Software Testing: Application And Script Independent Automation Framework: Th...
 
Rspec
RspecRspec
Rspec
 
Acceptance Test Driven Development at StarWest 2014
Acceptance Test Driven Development at StarWest 2014Acceptance Test Driven Development at StarWest 2014
Acceptance Test Driven Development at StarWest 2014
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questions
 
Checkpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo downloadCheckpoint 156-315.80 free demo download
Checkpoint 156-315.80 free demo download
 
Microsoft az-900 Dumps
Microsoft az-900 DumpsMicrosoft az-900 Dumps
Microsoft az-900 Dumps
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questions
 
Introduction to Data Warehousing
Introduction to Data WarehousingIntroduction to Data Warehousing
Introduction to Data Warehousing
 
Database normalisation
Database normalisationDatabase normalisation
Database normalisation
 
midterm_fa07.pdf
midterm_fa07.pdfmidterm_fa07.pdf
midterm_fa07.pdf
 
GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Per...
GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Per...GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Per...
GlobalLogic Test Automation Online TechTalk “Test Driven Development as a Per...
 
Investigating the Quality Aspects of Crowd-Sourced Developer Forum: A Case St...
Investigating the Quality Aspects of Crowd-Sourced Developer Forum: A Case St...Investigating the Quality Aspects of Crowd-Sourced Developer Forum: A Case St...
Investigating the Quality Aspects of Crowd-Sourced Developer Forum: A Case St...
 
Quizine: An online Test
Quizine: An online TestQuizine: An online Test
Quizine: An online Test
 
Optimizing Your Agile Testing Processes
Optimizing Your Agile Testing ProcessesOptimizing Your Agile Testing Processes
Optimizing Your Agile Testing Processes
 
Database normalisation
Database normalisationDatabase normalisation
Database normalisation
 
Practical SQL query monitoring and optimization
Practical SQL query monitoring and optimizationPractical SQL query monitoring and optimization
Practical SQL query monitoring and optimization
 
Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07Sfeldman performance bb_worldemea07
Sfeldman performance bb_worldemea07
 
Test-Driven Development Introduction
Test-Driven Development IntroductionTest-Driven Development Introduction
Test-Driven Development Introduction
 

More from hyacinthshackley2629

Your company nameYour nameInstruction Page1. O.docx
Your company nameYour nameInstruction Page1. O.docxYour company nameYour nameInstruction Page1. O.docx
Your company nameYour nameInstruction Page1. O.docx
hyacinthshackley2629
 
Your Company NameYour Company NameBudget Proposalfor[ent.docx
Your Company NameYour Company NameBudget Proposalfor[ent.docxYour Company NameYour Company NameBudget Proposalfor[ent.docx
Your Company NameYour Company NameBudget Proposalfor[ent.docx
hyacinthshackley2629
 
Your company is a security service contractor that consults with bus.docx
Your company is a security service contractor that consults with bus.docxYour company is a security service contractor that consults with bus.docx
Your company is a security service contractor that consults with bus.docx
hyacinthshackley2629
 
Your company You are a new Supply Chain Analyst with the ACME.docx
Your company   You are a new Supply Chain Analyst with the ACME.docxYour company   You are a new Supply Chain Analyst with the ACME.docx
Your company You are a new Supply Chain Analyst with the ACME.docx
hyacinthshackley2629
 
Your Communications PlanDescriptionA.What is your .docx
Your Communications PlanDescriptionA.What is your .docxYour Communications PlanDescriptionA.What is your .docx
Your Communications PlanDescriptionA.What is your .docx
hyacinthshackley2629
 
Your Communication InvestigationFor your mission after reading y.docx
Your Communication InvestigationFor your mission after reading y.docxYour Communication InvestigationFor your mission after reading y.docx
Your Communication InvestigationFor your mission after reading y.docx
hyacinthshackley2629
 
Your Communications PlanFirst step Choose a topic. Revi.docx
Your Communications PlanFirst step Choose a topic. Revi.docxYour Communications PlanFirst step Choose a topic. Revi.docx
Your Communications PlanFirst step Choose a topic. Revi.docx
hyacinthshackley2629
 
Your coffee franchise cleared for business in both countries (Mexico.docx
Your coffee franchise cleared for business in both countries (Mexico.docxYour coffee franchise cleared for business in both countries (Mexico.docx
Your coffee franchise cleared for business in both countries (Mexico.docx
hyacinthshackley2629
 

More from hyacinthshackley2629 (20)

Your company nameYour nameInstruction Page1. O.docx
Your company nameYour nameInstruction Page1. O.docxYour company nameYour nameInstruction Page1. O.docx
Your company nameYour nameInstruction Page1. O.docx
 
Your Company NameYour Company NameBudget Proposalfor[ent.docx
Your Company NameYour Company NameBudget Proposalfor[ent.docxYour Company NameYour Company NameBudget Proposalfor[ent.docx
Your Company NameYour Company NameBudget Proposalfor[ent.docx
 
Your company recently reviewed the results of a penetration test.docx
Your company recently reviewed the results of a penetration test.docxYour company recently reviewed the results of a penetration test.docx
Your company recently reviewed the results of a penetration test.docx
 
Your company wants to explore moving much of their data and info.docx
Your company wants to explore moving much of their data and info.docxYour company wants to explore moving much of their data and info.docx
Your company wants to explore moving much of their data and info.docx
 
Your company plans to establish MNE manufacturing operations in Sout.docx
Your company plans to establish MNE manufacturing operations in Sout.docxYour company plans to establish MNE manufacturing operations in Sout.docx
Your company plans to establish MNE manufacturing operations in Sout.docx
 
Your company just purchased a Dell server MD1420 DAS to use to store.docx
Your company just purchased a Dell server MD1420 DAS to use to store.docxYour company just purchased a Dell server MD1420 DAS to use to store.docx
Your company just purchased a Dell server MD1420 DAS to use to store.docx
 
your company is moving to a new HRpayroll system that is sponsored .docx
your company is moving to a new HRpayroll system that is sponsored .docxyour company is moving to a new HRpayroll system that is sponsored .docx
your company is moving to a new HRpayroll system that is sponsored .docx
 
Your company is considering the implementation of a technology s.docx
Your company is considering the implementation of a technology s.docxYour company is considering the implementation of a technology s.docx
Your company is considering the implementation of a technology s.docx
 
Your company is a security service contractor that consults with bus.docx
Your company is a security service contractor that consults with bus.docxYour company is a security service contractor that consults with bus.docx
Your company is a security service contractor that consults with bus.docx
 
Your company has just sent you to a Project Management Conference on.docx
Your company has just sent you to a Project Management Conference on.docxYour company has just sent you to a Project Management Conference on.docx
Your company has just sent you to a Project Management Conference on.docx
 
Your company has designed an information system for a library.  The .docx
Your company has designed an information system for a library.  The .docxYour company has designed an information system for a library.  The .docx
Your company has designed an information system for a library.  The .docx
 
Your company has had embedded HR generalists in business units for t.docx
Your company has had embedded HR generalists in business units for t.docxYour company has had embedded HR generalists in business units for t.docx
Your company has had embedded HR generalists in business units for t.docx
 
Your company You are a new Supply Chain Analyst with the ACME.docx
Your company   You are a new Supply Chain Analyst with the ACME.docxYour company   You are a new Supply Chain Analyst with the ACME.docx
Your company You are a new Supply Chain Analyst with the ACME.docx
 
Your company has asked that you create a survey to collect data .docx
Your company has asked that you create a survey to collect data .docxYour company has asked that you create a survey to collect data .docx
Your company has asked that you create a survey to collect data .docx
 
Your Communications PlanDescriptionA.What is your .docx
Your Communications PlanDescriptionA.What is your .docxYour Communications PlanDescriptionA.What is your .docx
Your Communications PlanDescriptionA.What is your .docx
 
Your community includes people from diverse backgrounds. Answer .docx
Your community includes people from diverse backgrounds. Answer .docxYour community includes people from diverse backgrounds. Answer .docx
Your community includes people from diverse backgrounds. Answer .docx
 
Your Communications Plan Please respond to the following.docx
Your Communications Plan Please respond to the following.docxYour Communications Plan Please respond to the following.docx
Your Communications Plan Please respond to the following.docx
 
Your Communication InvestigationFor your mission after reading y.docx
Your Communication InvestigationFor your mission after reading y.docxYour Communication InvestigationFor your mission after reading y.docx
Your Communication InvestigationFor your mission after reading y.docx
 
Your Communications PlanFirst step Choose a topic. Revi.docx
Your Communications PlanFirst step Choose a topic. Revi.docxYour Communications PlanFirst step Choose a topic. Revi.docx
Your Communications PlanFirst step Choose a topic. Revi.docx
 
Your coffee franchise cleared for business in both countries (Mexico.docx
Your coffee franchise cleared for business in both countries (Mexico.docxYour coffee franchise cleared for business in both countries (Mexico.docx
Your coffee franchise cleared for business in both countries (Mexico.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

11614, 1021 AMTake Test 5451 Q3Page 1 of 7httpsnccu.docx

  • 1. 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 1 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null 2014 Fall Database Systems SEC.01 Assignments Take Test: 5451 Q3H Take Test: 5451 Q3Take Test: 5451 Q3 Description This Quiz is due by 11:59PM on November 8th. You may use the text and class materials on the exam, but you may not give or receive aid, nor may you use online resources. Instructions Multiple Attempts Not allowed. This test can only be taken once. Force Completion
  • 2. This test can be saved and resumed later. Save All AnswersSave All Answers Save and SubmitSave and Submit A point of synchronization between the database and the transaction log is called a(n): before-image. after-image. recovery. checkpoint. None of these Question 1 2.5 points Save AnswerSave Answer An ACID transaction is one that is: atomic. consistent. isolated. durable. All of these Question 2 2.5 points Save AnswerSave Answer As far as Microsoft Access is concerned, there are no: recursive relationships. 1:1 relationships. N:1 relationships. 1:N relationships. N:M relationships. Question 3 2.5 points Save AnswerSave Answer
  • 3. By default, when Microsoft Access creates a relationship between two tables, it creates a(n): 1:1 relationship. N:M relationship. 1:N relationship. recursive relationship. association relationship. Question 4 2.5 points Save AnswerSave Answer The most commonly web server program is: MySQL Microsoft Access Apache every consequence of data values must originate in the definition of determinants and keys. php Question 5 2.5 points Save AnswerSave Answer ?? Question Completion Status: https://nccu.blackboard.com/webapps/assessment/take/launch.js p?course_assessment_id=_124305_1&course_id=_1410180_1&c ontent_id=_1748910_1&step=null# https://nccu.blackboard.com/webapps/blackboard/execute/cours eMain?course_id=_1410180_1
  • 4. https://nccu.blackboard.com/webapps/assessment/take/launch.js p?course_assessment_id=_124305_1&course_id=_1410180_1&c ontent_id=_1748910_1&step=null#contextMenu https://nccu.blackboard.com/webapps/blackboard/content/listCo ntent.jsp?course_id=_1410180_1&content_id=_1673778_1&mo de=reset 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 2 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null Ensuring that each SQL statement independently processes consistent rows is known as: process level consistency. transaction level consistency. independent consistency. serializable consistency. statement level consistency. Question 6 2.5 points Save AnswerSave Answer Given the PRODUCT and SUPPLIER entities in the figure below, which of the following would represent the correct placement of foreign keys? PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber)PRODUCT_SUPPLIER (ProductID, SupplierID) PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber)PRODUCT_SUPPLIER (ProductID, SupplierID)
  • 5. PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber) PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber) PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID) Question 7 2.5 points Save AnswerSave Answer Given the entities PRODUCT and SUPPLIER shown in the figure below, which of the following would represent the correct placement of foreign keys? PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID) PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber) PRODUCT (ProductID, Description, Cost)SUPPLIER (SupplierID, ContactName, PhoneNumber) PRODUCT (ProductID, Description, Cost, SupplierID)SUPPLIER (SupplierID, ContactName, PhoneNumber, ProductID) PRODUCT (ProductID, Description, Cost, ContactName)SUPPLIER (SupplierID, ContactName, PhoneNumber) Question 8 2.5 points Save AnswerSave Answer Given the generic relation: GENERIC (PKey1, PKey2,
  • 6. Attribute1, Attribute2, Attribute3), and the functional dependencies: (PKey1, PKey2) → Attribute1 and PKey2 → (Attribute2, Attribute3), which of the following is true? GENERIC is not fully normalized. PKey1 is a determinant. PKey2 is a candidate key. GENERIC is in DK/NF. All of these Question 9 2.5 points Save AnswerSave Answer Given TABLE_A (Attribute1, Attribute2, Attribute3) and TABLE_B (Attribute4, Attribute5, Attribute6) shown in the figure below, which of the following would display the correct placement of foreign keys in the relational model? TABLE _A (Attribute1, Attribute2, Attribute3, Attribute4, Attribute5)TABLE _B (Attribute4, Attribute5, Attribute6) TABLE _A (Attribute1, Attribute2, Attribute3, Attribute6)TABLE _B (Attribute4, Attribute5, Attribute6) TABLE _A (Attribute1, Attribute2, Attribute3)TABLE _B (Attribute4, Attribute5, Attribute6) TABLE_A (Attribute1, Attribute2, Attribute3)TABLE _B (Attribute4, Attribute5, Attribute6, Attribute1) TABLE _A (Attribute1, Attribute2, Attribute3, Attribute4)TABLE _B (Attribute4, Attribute5, Attribute6, Attribute1) Question 10 2.5 points Save AnswerSave Answer
  • 7. 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 3 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null Preventing multiple applications from obtaining copies of the same record when the record is about to changed is called: serialized reading. lost updating. concurrent processing. resource locking. block factoring. Question 11 2.5 points Save AnswerSave Answer SQL statements can be run individually or as part of a related group of SQL statements known as a(n): Commandset. Script. Scriptset. Resultset. Result. Question 12 2.5 points Save AnswerSave Answer The fundamental rule of normalization can be stated as:
  • 8. every table must meet the definition of a relation. every determinant must be a candidate key. every constraint must be a determinant. every key must be a candidate key. every domain must be a logical consequence of the constraints. Question 13 2.5 points Save AnswerSave Answer The purpose of concurrency control is to: ensure that one user's work does not interfere with another's. ensure that triggers do not invoke stored procedures. ensure that each form has a corresponding report. ensure that ASPs do not duplicate JSPs. ensure that stored procedures do not invoke triggers. Question 14 2.5 points Save AnswerSave Answer The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as: checkpointing. rollforward. rollback. reprocessing. transaction logging. Question 15 2.5 points Save AnswerSave Answer The term DBA refers to the: data business administrator. data business auditor. database accessor. database auditor. database administrator.
  • 9. Question 16 2.5 points Save AnswerSave Answer To create a 1:1 relationship between two tables in Microsoft Access: the Indexed property of the foreign key column must be set to Yes (No Duplicates). the Indexed property of the foreign key column must be set to No. the Data Type of the foreign key column must be set to AutoNumber. the Smart Tag property of the foreign key column must be set to Foreign Key. the Indexed property of the foreign key column must be set to Yes (Duplicates OK). Question 17 2.5 points Save AnswerSave Answer What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read? Question 18 2.5 points Save AnswerSave Answer 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 4 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null Phantom reads
  • 10. Unlocked reads Serialized reads Nonrepeatable reads Dirty reads What is the least restrictive isolation level that will prevent dirty reads? Read Committed Read Uncommitted Atomic Read Repeatable Read Serializable Question 19 2.5 points Save AnswerSave Answer What is the least restrictive isolation level that will prevent nonrepeatable reads? Repeatable Read Read Uncommitted Read Committed Serializable Atomic Read Question 20 2.5 points Save AnswerSave Answer What is the least restrictive isolation level that will prevent phantom read problems? Read Committed Repeatable Read Atomic Read Serializable Read Uncommitted Question 21
  • 11. 2.5 points Save AnswerSave Answer What relationship pattern is illustrated in the following schema? VehicleID in CAR must exist in VehicleID in VEHICLE VehicleID in TRUCK must exist in VehicleID in VEHICLE Strong entity relationship Intersection relationship Recursive relationship Supertype/subtype relationship Association relationship Question 22 2.5 points Save AnswerSave Answer Th most commonly used language to manipulate data in a database is: Ruby SQL C++ Microsoft Access Question 23 2.5 points Save AnswerSave Answer When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be: logical.
  • 12. atomic. consistent. locked. isolated. Question 24 2.5 points Save AnswerSave Answer When distributed databases create copies of the database on different servers, thisis known as: replication. Question 25 2.5 points Save AnswerSave Answer 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 5 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null replication. partitioning. disbursing. distributed two-phase locking. None of these Whether a lock applies to data at the record level, page level, table level, or database level is referred to as:
  • 13. lock exclusivity. lock phasing. lock granularity. serializable locking. lock sharing. Question 26 2.5 points Save AnswerSave Answer The most commonly used database program in websites is: MySQL PHP Oracle DK/NF Microsoft SQL Server 2 Question 27 2.5 points Save AnswerSave Answer Which normal form is defined as any table meeting the definition of a relation? DK/NF 4NF BCNF 1NF 2NF Question 28 2.5 points Save AnswerSave Answer What programming language is most often used to pass user
  • 14. input from a web interface to a database? Access PHP Oracle Java Question 29 2.5 points Save AnswerSave Answer Which of the following is not true of database recovery through reprocessing? Reprocessing makes use of a database save. Reprocessing takes the same amount of time as did processing in the first place. Reprocessing will always return the database to its exact previous state. Reprocessing requires a record of all transactions since the last time the database was saved. All of these are true of reprocessing. Question 30 2.5 points Save AnswerSave Answer Which of the following is the correct technique for representing a 1:N relationship in the relational model? The key of either relation can be placed into the other relation. The key of the entity on the one side is placed into the relation for the entity on
  • 15. the many side. The key of the child is placed into the relation of the parent. The key of the entity on the many side is placed into the relation for the entity on the one side. An intersection relation is created and the keys from both parent entities are placed as keys in the intersection relation. Question 31 2.5 points Save AnswerSave Answer 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 6 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null Which of the following is the correct technique for representing a M:N relationship using the relational model? An intersection relation is created and the key of either entity is placed as a key in both the intersection relation and in the other relation. An intersection relation is created with a surrogate key, which is placed in each of the parent entities. An intersection relation is created and the keys of both parent entities are placed as a composite key in the intersection relation. The key from either relation is placed as a foreign key in the other relation.
  • 16. None of these Question 32 2.5 points Save AnswerSave Answer Which of the following is the first step in representing entities using the relational model? Define a primary key. Determine identifiers. Determine foreign keys. Examine the entity against normalization criteria. Define a table for each entity. Question 33 2.5 points Save AnswerSave Answer Which of the following is true about a shared lock? It is more restrictive than an implicit lock. It locks the item from all access. It allows only two transactions to update a record simultaneously. It allows reads to the locked item. It must use a two-phase locking scheme. Question 34 2.5 points Save AnswerSave Answer Which of the following is true about representing a weak entity with the relational model? If the weak entity is ID-dependent, the key of the parent entity must be part of the key of the weak entity. If the weak entity is ID-dependent, the key of the weak entity must be part of the key of the parent entity. If the parent entity is existence-dependent, then the minimum
  • 17. cardinality of the weak entity is zero. If the strong entity has a minimum cardinality of 1, the key of the weak entity must be part of the strong entity. If the weak entity is existence-dependent, the key of the parent must be part of the key of the weak entity. Question 35 2.5 points Save AnswerSave Answer Which of the following is true when representing a 1:1 binary relationship using the relational model? The key of the entity with the highest minimum cardinality must be placed in the other entity as a foreign key. The key of either entity is placed in the other as a foreign key. Both entities must have the same primary key. The key of each entity must be placed in the other as a foreign key. The key of the entity with the most attributes must be placed in the other entity as a foreign key. Question 36 2.5 points Save AnswerSave Answer Which of the following is not a means of processing databases? Internet applications using ASP Internet applications using JSP Applications invoking stored procedures Programs coded in C# All of these are means of processing a database.
  • 18. Question 37 2.5 points Save AnswerSave Answer What language is most often used to pass SQL query results to a user's web interface? Perl Python Linux Question 38 2.5 points Save AnswerSave Answer 11/6/14, 10:21 AMTake Test: 5451 Q3 Page 7 of 7https://nccu.blackboard.com/webapps/assessment/take/launch.j sp?course_assessment_id=_124305_1&course_id=_1410180_1& content_id=_1748910_1&step=null Click Save and Submit to save and submit. Click Save All Answers to save all answers. Save All AnswersSave All Answers Save and SubmitSave and Submit Linux php Which of the following would be a reason to denormalize a relation?
  • 19. Relax security Lack of design time End user preference Improve performance None of these Question 39 2.5 points Save AnswerSave Answer Which type of lock assumes that no conflicts will occur? Optimistic locks Explicit locks Shared locks Granular locks Open locks Question 40 2.5 points Save AnswerSave Answer Save and Submit