A document containing 6 sets of multiple choice questions for a CIS 111 Midterm Exam was summarized as follows:
The document contains 240 multiple choice questions divided into 6 sets covering topics related to databases, data models, normalization, and relational databases. The questions assess understanding of key concepts such as data modeling, database design, normalization, and relational databases.
For more course tutorials visit
www.newtonhelp.com
DescriptionReviews (1)
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
CIS 111 STUDY Redefined Education--cis111study.comclaric192
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across several different sites.
CIS 111 STUDY Become Exceptional--cis111study.comclaric102
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across several different sites.
• Question 5 ____ relates to the activities that make the database perform more efficiently in terms of storage and access speed.
• Question 6 A(n) ____ database supports a relatively small number of users (usually fewer than 50) or a specific depa
CIS 111 STUDY Achievement Education--cis111 study.comclaric153
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
CIS 111 STUDY Introduction Education--cis111study.comclaric262
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across several different sites.
• Question 5 ____ relates to the activities that make the database perform more efficiently in terms of storage and access speed.
• Question 6 A(n) ____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization.
• Question 7 A ____ is a character or group of characters that has a specific meaning.
• Question 8 ____ exists when different versions of the same data appear in different places.
• Question 9 The ____ model is the end users’ view of the data environment.
• Question 10 A(n) ____ represents a particular type of object
The document contains questions and answers related to database concepts. It discusses the advantages of databases, the relationship between data and information, entity relationship diagrams, different types of database relationships like one-to-one, one-to-many and many-to-many, and key concepts like entities, attributes, keys and relationships. Examples are provided to illustrate one-to-one, one-to-many and many-to-many relationships. Symbols used in ER diagrams and their meanings are defined.
A document containing 6 sets of multiple choice questions for a CIS 111 Midterm Exam was summarized as follows:
The document contains 240 multiple choice questions divided into 6 sets covering topics related to databases, data models, normalization, and relational databases. The questions assess understanding of key concepts such as data modeling, database design, normalization, and relational databases.
For more course tutorials visit
www.newtonhelp.com
DescriptionReviews (1)
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
CIS 111 STUDY Redefined Education--cis111study.comclaric192
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across several different sites.
CIS 111 STUDY Become Exceptional--cis111study.comclaric102
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across several different sites.
• Question 5 ____ relates to the activities that make the database perform more efficiently in terms of storage and access speed.
• Question 6 A(n) ____ database supports a relatively small number of users (usually fewer than 50) or a specific depa
CIS 111 STUDY Achievement Education--cis111 study.comclaric153
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
CIS 111 STUDY Introduction Education--cis111study.comclaric262
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across several different sites.
• Question 5 ____ relates to the activities that make the database perform more efficiently in terms of storage and access speed.
• Question 6 A(n) ____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization.
• Question 7 A ____ is a character or group of characters that has a specific meaning.
• Question 8 ____ exists when different versions of the same data appear in different places.
• Question 9 The ____ model is the end users’ view of the data environment.
• Question 10 A(n) ____ represents a particular type of object
The document contains questions and answers related to database concepts. It discusses the advantages of databases, the relationship between data and information, entity relationship diagrams, different types of database relationships like one-to-one, one-to-many and many-to-many, and key concepts like entities, attributes, keys and relationships. Examples are provided to illustrate one-to-one, one-to-many and many-to-many relationships. Symbols used in ER diagrams and their meanings are defined.
For more course tutorials visit
uophelp.com is now newtonhelp.com
www.newtonhelp.com
DescriptionReviews (2)
This Tutorial contains 4 Set of Final Exam (Approximately – 200 MCQ)
CIS – 111 Week 11 Final Exam
• Question 1 Which query will output the table contents when the value of P_PRICE is less than or equal to 10?
This document discusses databases and the relational database model. It covers key concepts like data, records, fields, and tables. It also explains entity relationship diagrams and how they are used to represent relationships between entities. Different types of relationships like one-to-one, one-to-many, and many-to-many are defined. An example entity relationship diagram is provided for a company database with employees, departments, and projects. Finally, it shows how to design tables from an entity relationship diagram by creating fields for each entity's attributes and adding foreign keys to represent relationships between tables.
FOR MORE CLASSES VISIT
www.cis336.com
CIS 336 Final Exam
Question 1. 1. (TCO 1) A DBMS performs several important functions that guarantee the integrity and consistency of the data in the database. Which of the following is NOT one of those functions?
The document discusses database normalization. It introduces the concept and defines normalization as organizing data to minimize duplication by isolating data across multiple tables and defining relationships between them. It also covers the different normal forms (1st, 2nd, 3rd, and Boyce-Codd), when to normalize data, and provides a real-world school data example to demonstrate normalization concepts.
The document contains 4 multiple choice questions about Excel. Question 1 asks about the file type in Excel where you work and store data, with the correct answer being "workbook". Question 2 asks about the purpose of the Merge and Center button, with the answer being "False". Question 3 asks about the bar that displays the formula in the active cell, with the answer being "Formula". Question 4 asks about accessing the Show Formulas option, with the correct tab being "Formulas".
This document summarizes and compares Bayesian linear regression models and ordered probit/logit models for modeling student test scores, an ordinal discrete variable. It describes analyzing data on 631 student scores and characteristics from two Portuguese high schools. Both linear and ordered regression models were fit to the data and compared based on their predictive performance and computational efficiency. The document outlines the different Bayesian prior distributions tested in the linear models and explains how ordered probit and logit models account for the ordinal nature of the score variable through cumulative link functions.
The document discusses normalization and its objectives. It defines normalization as a bottom-up approach to database design that examines relationships between attributes. The key goals of normalization are to minimize data redundancy and anomalies. It describes three common normal forms - 1NF, 2NF, 3NF - with each form addressing different types of dependencies and anomalies. The document outlines the normalization process, which transforms relations through a series of normal forms, starting with the unnormalized form and progressing to third normal form.
This document compares two approaches for handling incomplete data and generating decision rules: 1) Rough set theory, which fills missing values and performs attribute reduction, and 2) Random tree classification in data mining, which ignores missing values. It uses a heart disease dataset with missing values to test the approaches in ROSE2 and WEKA. The results show that random tree classification ignoring missing values produces more accurate decision rules than rough set theory filling missing values.
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT’S ACADEMIC PERFORMANCE cscpconf
Educational data mining is used to study the data available in the educational field and bring
out the hidden knowledge from it. Classification methods like decision trees, rule mining,
Bayesian network etc can be applied on the educational data for predicting the students
behavior, performance in examination etc. This prediction will help the tutors to identify the
weak students and help them to score better marks. The C4.5 decision tree algorithm is applied
on student’s internal assessment data to predict their performance in the final exam. The
outcome of the decision tree predicted the number of students who are likely to fail or pass. The
result is given to the tutor and steps were taken to improve the performance of the students who
were predicted to fail. After the declaration of the results in the final examination the marks
obtained by the students are fed into the system and the results were analyzed. The comparative
analysis of the results states that the prediction has helped the weaker students to improve and
brought out betterment in the result. To analyse the accuracy of the algorithm, it is compared
with ID3 algorithm and found to be more efficient in terms of the accurately predicting the
outcome of the student and time taken to derive the tree.
This document summarizes several major data classification techniques, including decision tree induction, Bayesian classification, rule-based classification, classification by back propagation, support vector machines, lazy learners, genetic algorithms, rough set approach, and fuzzy set approach. It provides an overview of each technique, describing their basic concepts and key algorithms. The goal is to help readers understand different data classification methodologies and which may be suitable for various domain-specific problems.
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION cscpconf
Feature clustering is a powerful method to reduce the dimensionality of feature vectors for text
classification. In this paper, Fast Fuzzy Feature clustering for text classification is proposed. It
is based on the framework proposed by Jung-Yi Jiang, Ren-Jia Liou and Shie-Jue Lee in 2011.
The word in the feature vector of the document is grouped into the cluster in less iteration. The
numbers of iterations required to obtain cluster centers are reduced by transforming clusters
center dimension from n-dimension to 2-dimension. Principle Component Analysis with slit
change is used for dimension reduction. Experimental results show that, this method improve
the performance by significantly reducing the number of iterations required to obtain the cluster
center. The same is being verified with three benchmark datasets
Modeling Text Independent Speaker Identification with Vector QuantizationTELKOMNIKA JOURNAL
Speaker identification is one of the most important technologies nowadays. Many fields such as
bioinformatics and security are using speaker identification. Also, almost all electronic devices are using
this technology too. Based on number of text, speaker identification divided into text dependent and text
independent. On many fields, text independent is mostly used because number of text is unlimited. So, text
independent is generally more challenging than text dependent. In this research, speaker identification text
independent with Indonesian speaker data was modelled with Vector Quantization (VQ). In this research
VQ with K-Means initialization was used. K-Means clustering also was used to initialize mean and
Hierarchical Agglomerative Clustering was used to identify K value for VQ. The best VQ accuracy was
59.67% when k was 5. According to the result, Indonesian language could be modelled by VQ. This
research can be developed using optimization method for VQ parameters such as Genetic Algorithm or
Particle Swarm Optimization.
TEXT SENTIMENTS FOR FORUMS HOTSPOT DETECTIONijistjournal
The user generated content on the web grows rapidly in this emergent information age. The evolutionary changes in technology make use of such information to capture only the user’s essence and finally the useful information are exposed to information seekers. Most of the existing research on text information processing, focuses in the factual domain rather than the opinion domain. In this paper we detect online hotspot forums by computing sentiment analysis for text data available in each forum. This approach analyses the forum text data and computes value for each word of text. The proposed approach combines K-means clustering and Support Vector Machine with PSO (SVM-PSO) classification algorithm that can be used to group the forums into two clusters forming hotspot forums and non-hotspot forums within the current time span. The proposed system accuracy is compared with the other classification algorithms such as Naïve Bayes, Decision tree and SVM. The experiment helps to identify that K-means and SVM-PSO together achieve highly consistent results.
Investigation and application of Personalizing Recommender Systems based on A...Eswar Publications
To aid in the decision-making process, recommender systems use the available data on the items themselves. Personalized recommender systems subsequently use this input data, and convert it to an output in the form of ordered lists or scores of items in which a user might be interested. These lists or scores are the final result the user will be presented with, and their goal is to assist the user in the decision-making process. The application of recommender systems outlined was just a small introduction to the possibilities of the extension. Recommender
systems became essential in an information- and decision-overloaded world. They changed the way users make decisions, and helped their creators to increase revenue at the same time.
This document provides an overview of approaches to analyzing survey data. It discusses preparing for analysis, including different data types, simple and hierarchical data structures, and objectives like population description or comparison. It also covers coding, weighting, and ranking data. The document then discusses doing the analysis, focusing on tabular methods like one-way tables, cross-tabulation, and looking for respondent groups. It emphasizes preparing thoroughly and working systematically to produce compatible outputs and discuss key findings.
IRJET- Text Document Clustering using K-Means Algorithm IRJET Journal
This document discusses using the K-Means clustering algorithm to cluster text documents and compares it to using K-Means clustering with dimension reduction techniques. It uses the BBC Sports dataset containing 737 documents in 5 classes. The document outlines preprocessing the text, creating a document term matrix, applying K-Means clustering, and using dimension reduction techniques like InfoGain before clustering. It evaluates the different methods using precision, recall, accuracy, and F-measure, finding that K-Means with InfoGain dimension reduction outperforms standard K-Means clustering.
This document discusses using classification algorithms to analyze a dataset about interest in vacations. It compares the decision tree and naive Bayes classification models based on accuracy. For the decision tree model, the accuracy was about 45% while sensitivity was around 70%. For the naive Bayes model, the accuracy was higher at about 60% and the sensitivity was 87.5%. Overall, the naive Bayes classification model had better predictive performance than the decision tree model based on this vacation interest dataset.
This document describes a simulator for database aggregation using metadata. The simulator sits between an end-user application and a database management system (DBMS) to intercept SQL queries and transform them to take advantage of available aggregates using metadata describing the data warehouse schema. The simulator provides performance gains by optimizing queries to use appropriate aggregate tables. It was found to improve performance over previous aggregate navigators by making fewer calls to system tables through the use of metadata mappings. Experimental results showed the simulator solved queries faster than alternative approaches by transforming queries to leverage aggregate tables.
CIS 111 STUDY Education Your Life--cis111studythomashard44
This document contains information about a midterm exam for CIS 111, including 6 sets of multiple choice questions. It also contains information about 2 assignments for CIS 111 - the first involves developing a database design for a college tracking students, courses, and instructors, and the second involves modifying the initial database design based on additional requirements from the college.
CIS 111 STUDY Inspiring Innovation--cis111study.comKeatonJennings90
This document contains information about a midterm exam for CIS 111, including 6 sets of multiple choice questions. It also contains information about 2 assignments for CIS 111 - the first involves developing a database design for a college tracking students, courses, and instructors, and the second involves modifying the initial database design based on additional requirements from the college.
This document provides an overview of a tutorial for the CIS 111 Midterm Exam, which contains 6 sets of approximately 240 multiple choice questions. It also includes information about two lab assignments - one on creating a database design in Visio and modifying it based on additional requirements, and another on setting up EasyPHP and MySQL and researching MySQL capabilities. Finally, it outlines two written assignments - one on database normalization and another on business intelligence and data warehousing. The tutorial aims to help students prepare for the midterm and complete the course labs and assignments on conceptual database design, normalization, SQL, and using data for decision making.
For more course tutorials visit
uophelp.com is now newtonhelp.com
www.newtonhelp.com
DescriptionReviews (2)
This Tutorial contains 4 Set of Final Exam (Approximately – 200 MCQ)
CIS – 111 Week 11 Final Exam
• Question 1 Which query will output the table contents when the value of P_PRICE is less than or equal to 10?
This document discusses databases and the relational database model. It covers key concepts like data, records, fields, and tables. It also explains entity relationship diagrams and how they are used to represent relationships between entities. Different types of relationships like one-to-one, one-to-many, and many-to-many are defined. An example entity relationship diagram is provided for a company database with employees, departments, and projects. Finally, it shows how to design tables from an entity relationship diagram by creating fields for each entity's attributes and adding foreign keys to represent relationships between tables.
FOR MORE CLASSES VISIT
www.cis336.com
CIS 336 Final Exam
Question 1. 1. (TCO 1) A DBMS performs several important functions that guarantee the integrity and consistency of the data in the database. Which of the following is NOT one of those functions?
The document discusses database normalization. It introduces the concept and defines normalization as organizing data to minimize duplication by isolating data across multiple tables and defining relationships between them. It also covers the different normal forms (1st, 2nd, 3rd, and Boyce-Codd), when to normalize data, and provides a real-world school data example to demonstrate normalization concepts.
The document contains 4 multiple choice questions about Excel. Question 1 asks about the file type in Excel where you work and store data, with the correct answer being "workbook". Question 2 asks about the purpose of the Merge and Center button, with the answer being "False". Question 3 asks about the bar that displays the formula in the active cell, with the answer being "Formula". Question 4 asks about accessing the Show Formulas option, with the correct tab being "Formulas".
This document summarizes and compares Bayesian linear regression models and ordered probit/logit models for modeling student test scores, an ordinal discrete variable. It describes analyzing data on 631 student scores and characteristics from two Portuguese high schools. Both linear and ordered regression models were fit to the data and compared based on their predictive performance and computational efficiency. The document outlines the different Bayesian prior distributions tested in the linear models and explains how ordered probit and logit models account for the ordinal nature of the score variable through cumulative link functions.
The document discusses normalization and its objectives. It defines normalization as a bottom-up approach to database design that examines relationships between attributes. The key goals of normalization are to minimize data redundancy and anomalies. It describes three common normal forms - 1NF, 2NF, 3NF - with each form addressing different types of dependencies and anomalies. The document outlines the normalization process, which transforms relations through a series of normal forms, starting with the unnormalized form and progressing to third normal form.
This document compares two approaches for handling incomplete data and generating decision rules: 1) Rough set theory, which fills missing values and performs attribute reduction, and 2) Random tree classification in data mining, which ignores missing values. It uses a heart disease dataset with missing values to test the approaches in ROSE2 and WEKA. The results show that random tree classification ignoring missing values produces more accurate decision rules than rough set theory filling missing values.
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT’S ACADEMIC PERFORMANCE cscpconf
Educational data mining is used to study the data available in the educational field and bring
out the hidden knowledge from it. Classification methods like decision trees, rule mining,
Bayesian network etc can be applied on the educational data for predicting the students
behavior, performance in examination etc. This prediction will help the tutors to identify the
weak students and help them to score better marks. The C4.5 decision tree algorithm is applied
on student’s internal assessment data to predict their performance in the final exam. The
outcome of the decision tree predicted the number of students who are likely to fail or pass. The
result is given to the tutor and steps were taken to improve the performance of the students who
were predicted to fail. After the declaration of the results in the final examination the marks
obtained by the students are fed into the system and the results were analyzed. The comparative
analysis of the results states that the prediction has helped the weaker students to improve and
brought out betterment in the result. To analyse the accuracy of the algorithm, it is compared
with ID3 algorithm and found to be more efficient in terms of the accurately predicting the
outcome of the student and time taken to derive the tree.
This document summarizes several major data classification techniques, including decision tree induction, Bayesian classification, rule-based classification, classification by back propagation, support vector machines, lazy learners, genetic algorithms, rough set approach, and fuzzy set approach. It provides an overview of each technique, describing their basic concepts and key algorithms. The goal is to help readers understand different data classification methodologies and which may be suitable for various domain-specific problems.
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION cscpconf
Feature clustering is a powerful method to reduce the dimensionality of feature vectors for text
classification. In this paper, Fast Fuzzy Feature clustering for text classification is proposed. It
is based on the framework proposed by Jung-Yi Jiang, Ren-Jia Liou and Shie-Jue Lee in 2011.
The word in the feature vector of the document is grouped into the cluster in less iteration. The
numbers of iterations required to obtain cluster centers are reduced by transforming clusters
center dimension from n-dimension to 2-dimension. Principle Component Analysis with slit
change is used for dimension reduction. Experimental results show that, this method improve
the performance by significantly reducing the number of iterations required to obtain the cluster
center. The same is being verified with three benchmark datasets
Modeling Text Independent Speaker Identification with Vector QuantizationTELKOMNIKA JOURNAL
Speaker identification is one of the most important technologies nowadays. Many fields such as
bioinformatics and security are using speaker identification. Also, almost all electronic devices are using
this technology too. Based on number of text, speaker identification divided into text dependent and text
independent. On many fields, text independent is mostly used because number of text is unlimited. So, text
independent is generally more challenging than text dependent. In this research, speaker identification text
independent with Indonesian speaker data was modelled with Vector Quantization (VQ). In this research
VQ with K-Means initialization was used. K-Means clustering also was used to initialize mean and
Hierarchical Agglomerative Clustering was used to identify K value for VQ. The best VQ accuracy was
59.67% when k was 5. According to the result, Indonesian language could be modelled by VQ. This
research can be developed using optimization method for VQ parameters such as Genetic Algorithm or
Particle Swarm Optimization.
TEXT SENTIMENTS FOR FORUMS HOTSPOT DETECTIONijistjournal
The user generated content on the web grows rapidly in this emergent information age. The evolutionary changes in technology make use of such information to capture only the user’s essence and finally the useful information are exposed to information seekers. Most of the existing research on text information processing, focuses in the factual domain rather than the opinion domain. In this paper we detect online hotspot forums by computing sentiment analysis for text data available in each forum. This approach analyses the forum text data and computes value for each word of text. The proposed approach combines K-means clustering and Support Vector Machine with PSO (SVM-PSO) classification algorithm that can be used to group the forums into two clusters forming hotspot forums and non-hotspot forums within the current time span. The proposed system accuracy is compared with the other classification algorithms such as Naïve Bayes, Decision tree and SVM. The experiment helps to identify that K-means and SVM-PSO together achieve highly consistent results.
Investigation and application of Personalizing Recommender Systems based on A...Eswar Publications
To aid in the decision-making process, recommender systems use the available data on the items themselves. Personalized recommender systems subsequently use this input data, and convert it to an output in the form of ordered lists or scores of items in which a user might be interested. These lists or scores are the final result the user will be presented with, and their goal is to assist the user in the decision-making process. The application of recommender systems outlined was just a small introduction to the possibilities of the extension. Recommender
systems became essential in an information- and decision-overloaded world. They changed the way users make decisions, and helped their creators to increase revenue at the same time.
This document provides an overview of approaches to analyzing survey data. It discusses preparing for analysis, including different data types, simple and hierarchical data structures, and objectives like population description or comparison. It also covers coding, weighting, and ranking data. The document then discusses doing the analysis, focusing on tabular methods like one-way tables, cross-tabulation, and looking for respondent groups. It emphasizes preparing thoroughly and working systematically to produce compatible outputs and discuss key findings.
IRJET- Text Document Clustering using K-Means Algorithm IRJET Journal
This document discusses using the K-Means clustering algorithm to cluster text documents and compares it to using K-Means clustering with dimension reduction techniques. It uses the BBC Sports dataset containing 737 documents in 5 classes. The document outlines preprocessing the text, creating a document term matrix, applying K-Means clustering, and using dimension reduction techniques like InfoGain before clustering. It evaluates the different methods using precision, recall, accuracy, and F-measure, finding that K-Means with InfoGain dimension reduction outperforms standard K-Means clustering.
This document discusses using classification algorithms to analyze a dataset about interest in vacations. It compares the decision tree and naive Bayes classification models based on accuracy. For the decision tree model, the accuracy was about 45% while sensitivity was around 70%. For the naive Bayes model, the accuracy was higher at about 60% and the sensitivity was 87.5%. Overall, the naive Bayes classification model had better predictive performance than the decision tree model based on this vacation interest dataset.
This document describes a simulator for database aggregation using metadata. The simulator sits between an end-user application and a database management system (DBMS) to intercept SQL queries and transform them to take advantage of available aggregates using metadata describing the data warehouse schema. The simulator provides performance gains by optimizing queries to use appropriate aggregate tables. It was found to improve performance over previous aggregate navigators by making fewer calls to system tables through the use of metadata mappings. Experimental results showed the simulator solved queries faster than alternative approaches by transforming queries to leverage aggregate tables.
CIS 111 STUDY Education Your Life--cis111studythomashard44
This document contains information about a midterm exam for CIS 111, including 6 sets of multiple choice questions. It also contains information about 2 assignments for CIS 111 - the first involves developing a database design for a college tracking students, courses, and instructors, and the second involves modifying the initial database design based on additional requirements from the college.
CIS 111 STUDY Inspiring Innovation--cis111study.comKeatonJennings90
This document contains information about a midterm exam for CIS 111, including 6 sets of multiple choice questions. It also contains information about 2 assignments for CIS 111 - the first involves developing a database design for a college tracking students, courses, and instructors, and the second involves modifying the initial database design based on additional requirements from the college.
This document provides an overview of a tutorial for the CIS 111 Midterm Exam, which contains 6 sets of approximately 240 multiple choice questions. It also includes information about two lab assignments - one on creating a database design in Visio and modifying it based on additional requirements, and another on setting up EasyPHP and MySQL and researching MySQL capabilities. Finally, it outlines two written assignments - one on database normalization and another on business intelligence and data warehousing. The tutorial aims to help students prepare for the midterm and complete the course labs and assignments on conceptual database design, normalization, SQL, and using data for decision making.
CIS 111 STUDY Knowledge Specialist--cis111study.comchrysanthemu86
FOR MORE CLASSES VISIT
www.cis111study.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
What is the most common database query languageQuestion 1 answer.docxkendalfarrier
This document contains 74 multiple choice questions about various topics related to databases, programming, and software engineering. The questions cover SQL, data structures, algorithms like sorting and merging, object-oriented principles, UML diagrams, and user interface design.
A foreign key is a column that references the primary key of another table. It must match a value in the referenced primary key. Unlike primary keys, foreign keys can contain null values. Primary keys uniquely identify rows in a table, while foreign keys reference primary keys to link data between tables.
This document summarizes an algorithm for efficiently refining why-not questions on top-k queries. It begins by executing a top-k query and identifying a missing object m. It then samples potential replacements for m from a restricted sample space and computes m's new ranking if modified to each sample value. The refined query with the smallest penalty, which returns m in the results, is returned as the answer. The algorithm improves efficiency by skipping unnecessary ranking computations and is tested on a basketball player database, demonstrating effectiveness. It answers why-not questions faster than without optimization techniques.
Efficient Refining Of Why-Not Questions on Top-K Queriesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The document describes the teaching and examination scheme for a database systems course. It includes information on lectures, tutorials, practical sessions, exam structure, reference books, list of experiments, course outcomes, database keys, and the teaching faculty member. The examination scheme divides marks between an end semester exam, progressive assessments, and a practical exam. Reference books and list of experiments are also provided to guide students. Primary keys, foreign keys, and other course concepts are briefly defined.
The document discusses plans for a database project for Kudler Fine Foods to support an online ordering system, noting that it will allow customers to place orders online and have them ready for pickup, as well as expanding their customer base. It analyzes the necessary database tables, including tables for products, customers, orders, and additional tables needed like one to reserve inventory and track shipping methods. The goal of the online ordering system is to boost profits by increasing the customer base and making the ordering process more convenient.
This document provides an introduction to data structures and algorithms. It defines key concepts like data structures, algorithms, complexity analysis and asymptotic notations. It discusses different types of data structures like linear and non-linear as well as common operations. It also explains algorithm development, best case, worst case and average case analysis, and commonly used notations like Big-O, Omega, Theta and Little-o to analyze asymptotic time and space complexities of algorithms.
For more course tutorials visit
www.newtonhelp.com
DescriptionReviews (1)
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240 MCQ)
Set 1
• Question 1____ provide(s) a description of the data characteristics and the set of relationships that link the data found within the database.
• Question 2 A desktop database is a ____ database.
bis 155 week 1 ilab data analysis with spreadsheets with lab,bis 155 week 1 quiz data analysis with spreadsheets with lab,bis 155 week 1 to week 5 all quiz,bis 155 week 1 to week 7 all discussions,devry bis 155 week 1,bis 155 week 1,devry bis 155,bis 155,devry bis 155 week 1 tutorial,devry bis 155 week 1 assignment,devry bis 155 week 1 help
Question 1 The syntax for accessing a class (struct) member .docxmakdul
Question 1
The syntax for accessing a class (struct) member using the operator -> is ____.
A.
pointerVariableName.classMemberName
B.
pointerVariableName->classMemberName
C.
pointerVariableName&->classMemberName
Question 2
Operations, such as finding the height, determining the number of nodes, checking whether the tree is empty, tree traversal, and so on, on AVL trees cannot be implemented the same way they are implemented on binary trees.
True
False
Question 3
The expression vecCont.empty() empties the vector container of all elements.
True
False
Question 4
Because a queue is an important data structure, the Standard Template Library (STL) provides a class to implement queues in a program.
True
False
Question 5
Every call to a recursive function requires the system to allocate memory for the local variables and formal parameters
True
False
Question 6
A linked list is a collection of ____.
A.
classes
B.
addresses
C.
nodes
Question 7
The deque class is a type of container adapter.
True
False
Question 8
The binary search algorithm uses the ____ technique to search the list.
A.
conquer-and-resign
B.
divide-and-conquer
C.
divide-and-divide
Question 9
Containers are essentially used ____.
A.
to manage objects of a given type
B.
to manipulate data
C.
to update objects that are part of a given set of elements
Question 10
The header node is placed at the ____ of a list.
A.
end
B.
beginning
C.
middle
Question 11
The use of a queue structure ensures that the items are processed in the order they are received.
True
False
Question 12
The analysis of algorithms enables programmers to decide which algorithm to use for a specific application.
True
False
Question 13
To define new classes, you create new ____ files.
A.
placeholder
B.
friend
C.
header
Question 14
Containers are class templates.
True
False
Question 15
Default arguments can be used with an overloaded operator.
True
False
Question 16
In breadth first traversal, starting at the first vertex, the graph is traversed as little as possible.
True
False
Question 17
The number of key comparisons in a sequential search depends on the value of the search item.
True
False
Question 18
____ iterators are forward iterators that can also iterate backward over the elements.
A.
Output
B.
Input
C.
Bidirectional
Question 19
We can traverse a singly linked list backward starting from the last node.
True
False
Question 20
In the random probing method, the ith slot in the probe sequence is ____.
A.
(h(X) % HTSize) + ri
B.
(h(X) + ri) % HTSize
C.
(h(X) + HTSize) % ri
D.
(h(X) % ri) + HTSize
Question 21
With the help of the ____, two values can be combined into a single unit and, therefore, can be treated as one unit.
A.
class unit
B.
class pair
C.
class double
D.
class tuple
Question 22
The operation ____ r ...
aturday, 28 September 2013, 0929 AMCompleted onSunday, 29 Sep.docxcelenarouzie
aturday, 28 September 2013, 09:29 AM
Completed on
Sunday, 29 September 2013, 01:57 PM
Time taken
1 day 4 hours
Marks
27/70
Grade
38.57
out of a maximum of 100 (
39
%)
Question
1
Marks: 1 dont do this to me like bruce wayne did he a bad one
Structures can be stacked or connected to one another at their ____.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
2
Marks: 1
As a general rule, an
eof
question should always come immediately after an input statement because the end-of-file condition will be detected at input.
Answer:
Correct
Marks for this submission: 1/1.
Question
3
Marks: 1
From the 1950s, when businesses began to use computers to help them perform many jobs, through the 1970s, almost all interactive dialogues between people and computers took place at the ____.
Choose one answer.
Correct
Marks for this submission: 1/1.
Question
4
Marks: 1
____ refers to how the internal statements of a method serve to accomplish the method’s purpose.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
5
Marks: 1
____ involves combining two or more files while maintaining the sequential order.
Choose one answer.
Correct
Marks for this submission: 1/1.
Question
6
Marks: 1
All methods require a
this
reference.
Answer:
Correct
Marks for this submission: 1/1.
Question
7
Marks: 1
An array is a/an ____ of values in computer memory.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
8
Marks: 1
The most common way to declare a destructor explicitly is to use an identifier that consists of ____.
Choose one answer.
Correct
Marks for this submission: 1/1.
Question
9
Marks: 1
The following pseudocode is an example of a/an ____ structure.
get number
while number is positive
add to sum
get number
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
10
Marks: 1
The
do
loop is a variation of the ____ loop.
Choose one answer.
Correct
Marks for this submission: 1/1.
Question
11
Marks: 1
An array whose elements you can access using a single subscript is a/an ____ array.
Choose one answer.
Correct
Marks for this submission: 1/1.
Question
12
Marks: 1
The keyword that is NOT included in a single-alternative selection is ____.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
13
Marks: 1
Arrays, unlike simple built-in types, are ____.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
14
Marks: 1
When you ____ records, you store a list of key fields paired with the storage address for the corresponding data record.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
15
Marks: 1
A ____ allows users to interact with a program in a graphical environment.
Choose one answer.
Incorrect
Marks for this submission: 0/1.
Question
16
Marks: 1
____ errors are relatively easy to locate and correct because the compiler or interpreter you use highlights every error.
Choo.
This paper discusses techniques for visualizing sets and the relationships between elements of sets. It categorizes set visualization techniques, identifies common tasks involving set data, and outlines open problems. Some potential ways to improve existing techniques include using interaction, coordinated views, small multiples, hybrid representations, and analytical methods to transform large set data before visualization. The key challenge is that no single technique supports all tasks, so the appropriate technique depends on the problem and data characteristics.
Question 1 A highly organized collection of data is a database man.docxhildredzr1di
Question 1
A highly organized collection of data is a database management system.
True
False
Question 2
Financial data residing in a database is not a corporate resource.
True
False
Question 3
Modality is the maximum number of entity occurrences involved in a relationship.
True
False
Question 4
Unary relationships contain one entity type.
True
False
Question 5
In a database, if there is more than one candidate key one MUST be identified as a primary key.
True
False
Question 6
A concurrency problem is defined as multiple data sets stored in the database.
True
False
Question 7
The most significant problem with data redundancy in a database is data integrity.
True
False
Question 8
Data redundancy can result in requiring unnecessary storage space for the database.
True
False
Question 9
Many-many relationships should be converted to associative entities on an Entity-Relationship diagram.
True
False
Question 10
There are two modes of data access known as sequential and direct access.
True
False
Question 11
Data within a database is typically controlled and manipulated by:
A.
MY SQL Workbench
B.
Database Management Software
C.
MS Word
D.
MS Excel
Question 12
A unique identifier of an entity is ____
A.
Relationship
B.
Cardinality
C.
Attribute
D.
Binary
Question 13
In an M-M relationship, the combination of or the association between two entities is known as ____
A.
Cardinality
B.
Modality
C.
Associative entity
D.
Intersection data
Question 14
A ________ relationship associates occurrences of an entity type with other occurrences of the same entity type.
A.
Binary
B.
Tertiary
C.
Unary
D.
Secondary
Question 15
How many entity types are involved in a tertiary relationship?
A.
1
B.
2
C.
3
D.
4
Question 16
The means by which an analyst records, documents, and diagrams the business environment is known as ________.
A.
Relationship Identification
B.
Data Association
C.
Data Analysis
D.
Data modeling
Question 17
In a DBMS, Referential Integrity contains three rules which are:
A.
Restrict
B.
Cascade
C.
Set-to-null
D.
Read
E.
All of the above
F.
A, B, and C
Question 18
The process of arranging attributes of entities in a given business environment into database structures is known as:
A.
Physical Database design
B.
Database structuring
C.
Logical Database design
D.
Relationship mapping
Question 19
Each row of a database is known as a ______
A.
File
B.
Field
C.
Entity
D.
Record
Question 20
An entity’s attribute in a database management system is referred to as a ________.
A.
Record
B.
Relationship
C.
Field
D.
Row
Question 21
A foreign key is defined as _________.
A.
The key attribute of an entity
B.
An identifier of the relationship
C.
Primary key of an entity
D.
Primary key of a relation that appears in another relation
Ques.
The document discusses different types of data models including conceptual, logical, and physical models. It describes conceptual models as focusing on business significance without technical details, logical models as adding more structure and relationships from a business perspective, and physical models as depicting the actual database layout. The document also covers other data modeling techniques such as hierarchical, network, object-oriented, relational, and dimensional modeling. Dimensional modeling structures data into facts and dimensions for efficient data warehousing.
Similar to Cis 111 Enhance teaching / snaptutorial.com (20)
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
1. CIS 111 Midterm Exam (6 Set)
For more classes visit
www.snaptutorial.com
This Tutorial contains 6 Set of Midterm Exam (Approximately – 240
MCQ)
Set 1
• Question 1____ provide(s) a description of the data
characteristics and the set of relationships that link the data found
within the database.
• Question 2 A desktop database is a ____ database.
• Question 3 End-user data is ____.
• Question 4 A ____ database supports data distributed across
several different sites.
• Question 5 ____ relates to the activities that make the
database perform more efficiently in terms of storage and access
speed.
• Question 6 A(n) ____ database supports a relatively small
number of users (usually fewer than 50) or a specific department
within an organization.
• Question 7 A ____ is a character or group of characters that
has a specific meaning.
• Question 8 ____ exists when different versions of the same
data appear in different places.
• Question 9 The ____ model is the end users’ view of the data
environment.
• Question 10 A(n) ____ represents a particular type of object in
the real world.
• Question 11 A(n) ____ is anything about which data are to be
collected and stored.
2. • Question 12 A verb associating two nouns in a business rule
translates to a(n) ____ in the data model.
• Question 13 A(n) ____ is a restriction placed on the data.
• Question 14 In the ____ model, the basic logical structure is
represented as an upside-down tree.
• Question 15 In the ____ model, the user perceives the
database as a collection of records in 1:M relationships, where each
record can have more than one parent.
• Question 16 A noun in a business rule translates to a(n) ____
in the data model.
• Question 17 A(n) ____ join only returns matched records
from the tables that are being joined.
• Question 18 A ____ is any key that uniquely identifies each
row.
• Question 19 The ____ constraint can be placed on a column to
ensure that every row in the table has a value for that column.
• Question 20 In an outer join, the matched pairs would be
retained and any unmatched values in the other table would be left
____.
• Question 21 ____ combines all rows from two tables,
excluding duplicate rows.
• Question 22 Since it is used to link the tables that originally
were related in a M:N relationship, the composite entity structure
includes—as foreign keys—at least the ____ keys of the tables that
are to be linked.
• Question 23 ____ yields only the rows that appear in both
tables.
• Question 24 A(n) ____ is an ordered arrangement of keys and
pointers.
• Question 25 A ____ relationship exists when an association is
maintained within a single entity.
• Question 26 A ____ relationship exists when three entities are
associated.
• Question 27 A ____ identifier is composed of more than one
attribute.
• Question 28 A ____ should be a derived attribute.
3. • Question 29 If an entity can exist apart from one or more
related entities, it is said to be ____-independent.
• Question 30 An entity is said to be ____-dependent if it can
exist in the database only when it is associated with another related
entity occurrence.
• Question 31 A ____ entity has a primary key that is partially
or totally derived from the parent entity in the relationship.
• Question 32 The M:N relationship between STUDENT and
CLASS must be divided into two 1:M relationships through the use of
the ENROLL entity; the ENROLL entity is ____.
• Question 33 From a strictly database point of view, ____
attribute values can be calculated when they are needed to write
reports or invoices.
• Question 34 A table that displays data redundancies yields
____.
• Question 35 A table that has all key attributes defined, has no
repeating groups, and all its attributes are dependent on the primary
key, is said to be in ____.
• Question 36 The most likely data type for a surrogate key is
____.
• Question 37 ____ databases reflect the ever-growing demand
for greater scope and depth in the data on which decision support
systems increasingly rely.
• Question 38 A table that is in 1NF and includes no partial
dependencies is said to be in ____.
• Question 39 Normalization works through a series of stages
called normal forms. For most purposes in business database design,
____ stages are as high as you need to go in the normalization
process.
• Question 40 1NF, 2NF, and 3NF are ____.
Set 2
Question 1 Correct ____ is used to reveal the meaning of data.
4. . Question 2 Correct A(n) ____ database is designed to support a
company’s day-to-day operations.
. Question 3 Correct ____ exists when different versions of the same
data appear in different places.
. Question 4 Correct A desktop database is a ____ database.
. Question 5 Correct A(n) ____ database supports a relatively small
number of users (usually fewer than 50) or a specific department
within an organization.
. Question 6 Correct A ____ database supports data distributed across
several different sites.
. Question 7 Correct End-user data is ____.
. Question 8 Correct A ____ is a character or group of characters that
has a specific meaning.
. Question 9 Correct The ____ data model uses the concept of
inheritance.
. Question 10 Correct In the ____ model, the user perceives the
database as a collection of records in 1:M relationships, where each
record can have more than one parent.
. Question 11 Correct A(n) ____ represents a particular type of object
in the real world.
. Question 12 Correct A(n) ____ is a restriction placed on the data.
. Question 13 Correct A(n) ____’s main function is to help you
understand the complexities of the real-world environment.
. Question 14 Correct A noun in a business rule translates to a(n) ____
in the data model.
. Question 15 Incorrect In the ____ model, each parent can have many
children, but each child has only one parent.
. Question 16 Correct A verb associating two nouns in a business rule
translates to a(n) ____ in the data model.
. Question 17 Correct A ____ is any key that uniquely identifies each
row.
. Question 18 Correct Referential ____ means that if the foreign key
contains a value, that value refers to an existing valid tuple (row) in
another relation.
. Question 19 Correct A(n) ____ is an ordered arrangement of keys
and pointers.
5. . Question 20 Correct Any attribute that is part of a key is known as a
____.
. Question 21 Correct All primary key entries are unique, and no part
of a primary key may be ____.
. Question 22 Correct Since it is used to link the tables that originally
were related in a M:N relationship, the composite entity structure
includes—as foreign keys—at least the ____ keys of the tables that
are to be linked.
. Question 23 Correct A ____ contains at least all of the attribute
names and characteristics for each table in the system.
. Question 24 Correct The ____ constraint can be placed on a column
to ensure that every row in the table has a value for that column.
. Question 25 Correct Ideally, an entity identifier is composed of ____
attribute(s).
. Question 26 Correct A relationship is an association between ____.
. Question 27 Correct Another word for existence-independent is
____.
. Question 28 Correct If an entity can exist apart from one or more
related entities, it is said to be ____-independent.
. Question 29 Correct Knowing the ____ number of entity
occurrences is very helpful at the application software level.
. Question 30 Correct A ____ relationship exists when an association
is maintained within a single entity.
. Question 31 Correct A ____ identifier is composed of more than one
attribute.
. Question 32 Correct A ____ should be a derived attribute.
. Question 33 Correct An atomic attribute ____.
. Question 34 Correct A table that has all key attributes defined, has
no repeating groups, and all its attributes are dependent on the
primary key, is said to be in ____.
. Question 35 Correct A relational table must not contain a(n) ____.
. Question 36 Correct Normalization works through a series of stages
called normal forms. For most purposes in business database design,
____ stages are as high as you need to go in the normalization
process.
. Question 37 Correct Normalization represents a micro view of the
____ within the ERD.
6. . Question 38 Incorrect A table that is in 2NF and contains no
transitive dependencies is said to be in ____.
. Question 39 Correct The most likely data type for a surrogate key is
____.
. Question 40 Correct ____ databases reflect the ever-growing
demand for greater scope and depth in the data on which decision
support systems increasingly rely.
Set 3
• Question 1 A(n) ____ database supports a relatively small number
of users (usually fewer than 50) or a specific department within an
organization.
• Question 2 A ____ database supports data distributed across several
different sites.
• Question 3 ____ provide(s) a description of the data characteristics
and the set of relationships that link the data found within the
database.
• Question 4 ____ is the body of information and facts about a
specific subject.
• Question 5 A ____ is a logically connected set of one or more fields
that describes a person, place, or thing.
• Question 6 End-user data is ____.
• Question 7 ____ relates to the activities that make the database
perform more efficiently in terms of storage and access speed.
• Question 8 The ____ structure is quite different from that of an
operational or transactional database.
• Question 9 A(n) ____ is bidirectional.
• Question 10 In the ____ model, the user perceives the database as a
collection of records in 1:M relationships, where each record can have
more than one parent.
• Question 11 A(n) ____’s main function is to help you understand
the complexities of the real-world environment.
• Question 12 In the ____ model, the basic logical structure is
represented as an upside-down tree.
7. • Question 13 ____ are important because they help to ensure data
integrity.
• Question 14 The ____ model is the end users’ view of the data
environment.
• Question 15 A noun in a business rule translates to a(n) ____ in the
data model.
• Question 16 A(n) ____ represents a particular type of object in the
real world.
• Question 17 Since it is used to link the tables that originally were
related in a M:N relationship, the composite entity structure
includes—as foreign keys—at least the ____ keys of the tables that
are to be linked.
• Question 18 Referential ____ means that if the foreign key contains
a value, that value refers to an existing valid tuple (row) in another
relation.
• Question 19 All primary key entries are unique, and no part of a
primary key may be ____.
• Question 20 A ____ contains at least all of the attribute names and
characteristics for each table in the system.
• Question 21 In the context of a database table, the statement ―A
____ B‖ indicates that if you know the value of attribute A, you can
look up the value of attribute B.
• Question 22 A(n) ____ is an ordered arrangement of keys and
pointers.
• Question 23 In an outer join, the matched pairs would be retained
and any unmatched values in the other table would be left ____.
• Question 24 ____ combines all rows from two tables, excluding
duplicate rows.
• Question 25 Another word for existence-independent is ____.
• Question 26 An entity is said to be ____-dependent if it can exist in
the database only when it is associated with another related entity
occurrence.
• Question 27 A derived attribute ____.
• Question 28 Knowing the ____ number of entity occurrences is
very helpful at the application software level.
• Question 29 A ____ relationship exists when three entities are
associated.
8. • Question 30 If an entity can exist apart from one or more related
entities, it is said to be ____-independent.
• Question 31 A ____ should be a derived attribute.
• Question 32 A relationship is an association between ____.
• Question 33 Before converting a table into 3NF, it is imperative the
table already be in ____.
• Question 34 From a structural point of view, 2NF is better than
____.
• Question 35 For most business transactional databases, we should
normalize relations into ____.
• Question 36 ____ databases reflect the ever-growing demand for
greater scope and depth in the data on which decision support systems
increasingly rely.
• Question 37 A table that displays data redundancies yields ____.
• Question 38 A ____ exists when there are functional dependencies
such that Y is functionally dependent on X and Z is functionally
dependent on Y, and X is the primary key.
• Question 39 A table that has all key attributes defined, has no
repeating groups, and all its attributes are dependent on the primary
key, is said to be in ____.
• Question 40 Normalization works through a series of stages called
normal forms. For most purposes in business database design, ____
stages are as high as you need to go in the normalization process.
Set 4
• Question 1 ____ provide(s) a description of the data
characteristics and the set of relationships that link the data found
within the database.
• Question 2 ____ data exist in a format that does not lend itself
to processing that yields information.
• Question 3 A ____ is a logically connected set of one or more
fields that describes a person, place, or thing.
• Question 4 End-user data is ____.
9. • Question 5 ____ relates to the activities that make the
database perform more efficiently in terms of storage and access
speed.
• Question 6 A ____ is a character or group of characters that
has a specific meaning.
• Question 7 A desktop database is a ____ database.
• Question 8 A ____ database supports data distributed across
several different sites.
• Question 9 A(n) ____ enables a database administrator to
define schema components.
• Question 10 A(n) ____ is anything about which data are to be
collected and stored.
• Question 11 A verb associating two nouns in a business rule
translates to a(n) ____ in the data model.
• Question 12 A(n) ____’s main function is to help you
understand the complexities of the real-world environment.
• Question 13 A(n) ____ model represents a global view of the
database as viewed by the entire organization.
• Question 14 The ____ model is the end users’ view of the data
environment.
• Question 15 A(n) ____ is a restriction placed on the data.
• Question 16 ____ are important because they help to ensure
data integrity.
• Question 17 A ____ contains at least all of the attribute names
and characteristics for each table in the system.
• Question 18 Any attribute that is part of a key is known as a
____.
• Question 19 ____ combines all rows from two tables,
excluding duplicate rows.
• Question 20 A(n) ____ is perceived as a two-dimensional
structure composed of rows and columns.
• Question 21 In the context of a database table, the statement
―A ____ B‖ indicates that if you know the value of attribute A, you
can look up the value of attribute B.
• Question 22 Since it is used to link the tables that originally
were related in a M:N relationship, the composite entity structure
10. includes—as foreign keys—at least the ____ keys of the tables that
are to be linked.
• Question 23 A(n) ____ join only returns matched records
from the tables that are being joined.
• Question 24 In an outer join, the matched pairs would be
retained and any unmatched values in the other table would be left
____.
• Question 25 A ____ identifier is composed of more than one
attribute.
• Question 26 An entity is said to be ____-dependent if it can
exist in the database only when it is associated with another related
entity occurrence.
• Question 27 Another word for existence-independent is ____.
• Question 28 A ____ relationship exists when an association is
maintained within a single entity.
• Question 29 Knowing the ____ number of entity occurrences
is very helpful at the application software level.
• Question 30 A ____ relationship exists when three entities are
associated.
• Question 31 A ____ should be a derived attribute.
• Question 32 Ideally, an entity identifier is composed of ____
attribute(s).
• Question 33 An atomic attribute ____.
• Question 34 A table that is in 2NF and contains no transitive
dependencies is said to be in ____.
• Question 35 ____ databases reflect the ever-growing demand
for greater scope and depth in the data on which decision support
systems increasingly rely.
• Question 36 A table that displays data redundancies yields
____.
• Question 37 A table that has all key attributes defined, has no
repeating groups, and all its attributes are dependent on the primary
key, is said to be in ____.
• Question 38 Normalization represents a micro view of the
____ within the ERD.
11. • Question 39 A ____ exists when there are functional
dependencies such that Y is functionally dependent on X and Z is
functionally dependent on Y, and X is the primary key.
• Question 40 A relational table must not contain a(n) ____.
Set 5
• Question 1 A(n) ____ database supports a relatively small
number of users (usually fewer than 50) or a specific department
within an organization.
• Question 2 A(n) ____ database is designed to support a
company’s day-to-day operations.
• Question 3 ____ provide(s) a description of the data
characteristics and the set of relationships that link the data found
within the database.
• Question 4 The response of the DBMS to a query is the ____.
• Question 5 A workgroup database is a(n)____ database.
• Question 6 The ____ structure is quite different from that of
an operational or transactional database.
• Question 7 ____ is used to reveal the meaning of data.
• Question 8 A desktop database is a ____ database.
• Question 9 A verb associating two nouns in a business rule
translates to a(n) ____ in the data model.
• Question 10 A(n) ____ is anything about which data are to be
collected and stored.
• Question 11 In the ____ model, the basic logical structure is
represented as an upside-down tree.
• Question 12 A(n) ____ enables a database administrator to
define schema components.
• Question 13 A(n) ____ represents a particular type of object in
the real world.
• Question 14 The ____ model is the end users’ view of the data
environment.
• Question 15 A(n) ____’s main function is to help you
understand the complexities of the real-world environment.
• Question 16 Students and classes have a ____ relationship.
12. • Question 17 A(n) ____ join only returns matched records
from the tables that are being joined.
• Question 18 A(n) ____ is an ordered arrangement of keys and
pointers.
• Question 19 ____ combines all rows from two tables,
excluding duplicate rows.
• Question 20 In the relational model, ____ are important
because they are used to ensure that each row in a table is uniquely
identifiable.
• Question 21 A ____ is any key that uniquely identifies each
row.
• Question 22 The ____ constraint can be placed on a column to
ensure that every row in the table has a value for that column.
• Question 23 A ____ contains at least all of the attribute names
and characteristics for each table in the system.
• Question 24 ____ yields only the rows that appear in both
tables.
• &
*****************************************
CIS 111 Week 2 Assignment 1 Business Rules
and Data Models (2 Papers)
For more classes visit
www.snaptutorial.com
This Tutorial contains 2 Papers
Assignment 1: Business Rules and Data Models
Suppose a local college has tasked you to develop a database that will
keep track of students and the courses that they have taken. In
13. addition to tracking the students and courses, the client wants the
database to keep track of the instructors teaching each of the courses.
Use the internet to research the types of information that a college
would want to track in a database. Focus your attention on
information that could represent entities within a database as well as
attributes of such entities.
Write a two to three (2-3) page paper in which you:
Describe the purpose of the database.
Based on your research and / or common knowledge of a college and
the information tracked by a college, describe the entities of the
database and the attributes of each entity.
Based on your research and / or common knowledge of a college and
the information tracked by a college, describe the business rules that
could impact the structure of the database.
Determine the information that the conceptual model of the database
would include and determine the information that the physical model
of the database would include.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Describe the role of databases and database management systems in
managing organizational data and information.
Compose conceptual data modeling techniques to capture the
information requirements.
14. Use technology and information resources to research issues in
database systems.
Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
*****************************************
CIS 111 Week 3 Lab 1 Creating a Database
Design in Visio (2 Set)
For more classes visit
www.snaptutorial.com
This Tutorial contains 2 Set of Solution/Paper for this lab
Lab 1: Creating a Database Design in Visio
This assignment contains two (2) Sections: Visio Diagram and Design
Summary. You must submit both sections as separate files in order to
complete this assignment.
Use ―Appendix A: Designing Databases with Visio Professional: A
Tutorial,‖ located in the online course shell to help you complete
Section 1: Visio Database Design. (Note: This tutorial focuses on the
use of Microsoft Visio. Open source applications are not covered in
Appendix A; however, the use of open source applications within labs
is permitted.)
Use the scenario from Assignment 1: Business Rules and Data
Models to complete the lab:
Suppose a local college has tasked you to develop a database that will
keep track of students and the courses that they have taken. In
15. addition to tracking the students and courses, the client wants the
database to keep track of the instructors teaching each of the courses.
Section 1: Visio Diagram
(Microsoft Visio or equivalent)
Use Microsoft Visio (or open source equivalent) in which you:
Create a database diagram with the entities and attributes that the
scenario identified (i.e., a college tracking students, courses, and
instructors).
Section 1 of your assignment must follow these formatting
requirements:
Submit the Visio diagram as a Visio file.
Section 2: Design Summary
(Microsoft Word or equivalent)
Write a one (1) page paper in which you:
Discuss the degree to which you believe the Visio diagram reflects the
database design.
Section 2 of your assignment must follow these formatting
requirements:
Submit the design summary as a Microsoft Word file.
Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page is not included in the required assignment page
length.
The specific course learning outcomes associated with this
assignment are:
Describe the role of databases and database management systems in
managing organizational data and information.
16. Compose conceptual data modeling techniques to capture the
information requirements.
Use technology and information resources to research issues in
database systems.
Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
*****************************************
CIS 111 Week 4 Lab 2 Modifying a Database
Design in Visio
For more classes visit
www.snaptutorial.com
This Tutorial contains 2 Set of Solution/Paper for this lab
Lab 2: Modifying a Database Design in Visio
This assignment contains two (2) Sections: Modified Visio Diagram
and Design Summary. You must submit both sections as separate files
in order to complete this assignment.
Use ―Appendix A: Designing Databases with Visio Professional: A
Tutorial,‖ located in the online course shell to help you complete
Section 1: Modified Visio Database Design. (Note: This tutorial
focuses on the use of Microsoft Visio. Open source applications are
not covered in Appendix A. However, the use of open source
applications within labs is permitted.)
After reviewing your database design from Lab 1: Creating a
Database Design in Visio, the college has provided more information
for the database that they want developed:
17. For each student, the college needs to track the student ID, student
names, addresses, start date, phone numbers and types (such as
mobile, home, work), email addresses and types (such as personal,
school, work), gender, and birth date.
For each course, the college needs to track the course ID, course
name, department, quarters offered, sections, and instructor teaching
each course.
For each instructor, the college needs to track the instructor ID, name,
address, phone numbers and types (such as mobile, home, work),
email addresses and types (such as personal, school, work), gender,
birth date, and the courses that each instructor is qualified to teach.
Additionally, the college needs to track the final grades for each
student after each course has completed.
Section 1: Modified Visio Diagram
(Microsoft Visio or equivalent)
Use Microsoft Visio (or open source equivalent) in which you:
Modify the database diagram from Lab 1 with the entities and
attributes that the scenario identified (i.e., a college tracking students,
courses, and instructors).
Create the appropriate relationships between each entity within the
diagram.
Section 1 of your assignment must follow these formatting
requirements:
Submit the Visio diagram as a Visio file.
Section 2: Design Summary
(Microsoft Word or equivalent)
Write a one to two (1-2) page paper in which you:
Discuss the degree to which you believe the Visio diagram reflects the
database design.
Describe any assumptions that you had to make about the business
rules to in order to create the Visio diagram and the associated
relationships.
18. Section 2 of your assignment must follow these formatting
requirements:
Submit the design summary as a Microsoft Word file.
Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page is not included in the required assignment page
length.
The specific course learning outcomes associated with this
assignment are:
Describe the role of databases and database management systems in
managing organizational data and information.
Recognize the historical development of database management
systems and logical data models.
Compose conceptual data modeling techniques to capture the
information requirements.
Use technology and information resources to research issues in
database systems.
Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
*****************************************
CIS 111 Week 5 Lab 3 EasyPHP and MySQL
Setup
For more classes visit
www.snaptutorial.com
Lab 3: Lab 3: EasyPHP and MySQL Setup
19. • Install EasyPHP and MySQL and take a screen shot that shows the
MySQL prompt on your screen. (Note: You must include the screen
shot which shows that MySQL is installed on your computer as part
of your assignment. An installation guide to aid the installation of
EasyPHP and MySQL is located in the online course shell.)
• Research the capabilities of MySQL.
Write a one to two (1-2) page paper in which you:
1. Describe your experiences related to your setup of MySQL. Include
any difficulties or issues that you had encountered during the
installation.
2. Based on your post-installation research, describe the main
capabilities of MySQL.
3. Describe the approach that you would take to go from a conceptual
or logical model that you created in Visio to the implementation of
that database structure in MySQL. Determine the additional
information that you will need to implement the database design in a
database management system.
4. Include the screen shot which shows that MySQL is installed on
your computer.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
• Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
• Describe the role of databases and database management systems in
managing organizational data and information.
20. • Recognize the historical development of database management
systems and logical data models.
• Use technology and information resources to research issues in
database systems.
• Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
EasyPHP and MySQL Setup
Install EasyPHP and MySQL and take a screen shot that shows the
MySQL prompt on your screen. (Note: You must include the screen
shot which shows that MySQL is installed on your computer as part
of your assignment. An installation guide to aid the installation of
EasyPHP and MySQL is located in the online course shell.)
Research the capabilities of MySQL.
Write a one to two (1-2) page paper in which you:
Describe your experiences related to your setup of MySQL. Include
any difficulties or issues that you had encountered during the
installation.
Based on your post-installation research, describe the main
capabilities of MySQL.
Describe the approach that you would take to go from a conceptual or
logical model that you created in Visio to the implementation of that
database structure in MySQL. Determine the additional information
that you will need to implement the database design in a database
management system.
Include the screen shot which shows that MySQL is installed on your
computer.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
21. Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Describe the role of databases and database management systems in
managing organizational data and information.
Recognize the historical development of database management
systems and logical data models.
Use technology and information resources to research issues in
database systems.
Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
*****************************************
CIS 111 Week 6 Assignment 2 Normalization (2
Papers)
For more classes visit
www.snaptutorial.com
This Tutorial contains 2 Papers
Assignment 2: Normalization
Suppose that you are the database developer for a local college. The
Chief Information Officer (CIO) has asked you to provide a summary
of normalizing database tables that the IT staff will use in the
upcoming training session.
22. Write a two to three (2-3) page paper in which you:
1. Describe the steps that you would use in order to convert database
tables to the First Normal Form, the Second Normal Form, and the
Third Normal Form.
2. Provide one (1) example that is relevant to a college environment
that illustrates reasons for converting database tables to the First,
Second, and Third Normal Forms.
3. Explain typical situations when denormalizing a table is acceptable.
Provide one (1) example of denormalizing a database table to justify
your response.
4. Explain the significant manner in which business rules impact both
database normalization and the decision to denormalize database
tables.
5. Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
• Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
• Recognize the purpose and principles of normalizing a relational
database structure.
• Design a relational database so that it is at least in 3NF.
• Use technology and information resources to research issues in
database systems.
• Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
23. *****************************************
CIS 111 Week 7 Lab 4 Structured Query
Language (SQL) (2 Papers)
For more classes visit
www.snaptutorial.com
Lab 4: Structured Query Language (SQL)
Refer to the database design crested in Lab 2: Modifying a Database
Design in Visio to complete this Lab.
Perform the following steps in MySQL:
Create the tables and relationships from the database design discussed
in Lab 2.
Add at least five (5) records into each table (Note: You must
determine the field values).
Create a query with all fields from the student table, where the
student's last name is "Smith".
Create a query that includes students’ first names, last names, and
phone numbers.
Create a query that includes instructors' first names, last names, and
courses they teach.
Include the following screen shots in a Microsoft Word document to
show the completion of the steps above:
Screen shot depicting the tables created within MySQL.
Screen shots depicting the records added into each table.
Screen shots depicting the SQL code and the query results from each
of the queries created.
Your assignment must follow these formatting requirements:
24. Submit the lab as a Microsoft Word document.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page is not included in the required assignment page
length.
The specific course learning outcomes associated with this
assignment are:
Prepare database design documents using the data definition, data
manipulation, and data control language components of the SQL
language.
Grading for this assignment will be based on the creation of the tables
and queries, using the following rubric.
*****************************************
CIS 111 Week 9 Assignment 3 Business
Intelligence and Data Warehouses (2 Papers)
For more classes visit
www.snaptutorial.com
This Tutorial contains 2 Papers
Assignment 3: Business Intelligence and Data Warehouses
Businesses today are extremely reliant on large amounts of data for
making intelligent business decisions. Likewise, the data warehouses
are often structured in a manner that optimizes processing large
amounts of data.
Write a two to three (2-3) page paper in which you:
25. 1. Outline the main differences between the structure of a relational
database optimized for online transactions versus a data warehouse
optimized for processing and summarizing large amounts of data.
2. Outline the main differences between database requirements for
operational data and for decision support data.
3. Describe three (3) examples in which databases could be used to
support decision making in a large organizational environment.
4. Describe three (3) examples in which data warehouses and data
mining could be used to support data processing and trend analysis in
large organizational environment.
5. Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
• Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
• Describe the role of databases and database management systems in
managing organizational data and information.
• Distinguish the role of databases and database management systems
in the context of enterprise systems.
• Use technology and information resources to research issues in
database systems.
• Write clearly and concisely about relational database management
systems using proper writing mechanics and technical style
conventions.
*****************************************
CIS 111 Week 11 Final Exam (4 Set)
26. For more classes visit
www.snaptutorial.com
This Tutorial contains 4 Set of Final Exam (Approximately – 200
MCQ)
CIS – 111 Week 11 Final Exam
• Question 1 Which query will output the table contents when
the value of P_PRICE is less than or equal to 10?
• Question 2 The SQL command that lets you select attributes
from rows in one or more tables is ____.
• Question 3 To list all the contents of the PRODUCT table,
you would use ____.
• Question 4 To delete a row from the PRODUCT table, use the
____ command.
• Question 5 The SQL character data format(s) is(are) ____.
• Question 6 A table can be deleted from the database by using
the ____ command.
• Question 7 The special operator used to check whether a
subquery returns any rows is ____.
• Question 8 The ____ special operator is used to check whether
an attribute value is null.
• Question 9 The ____ operator could be used in place of
INTERSECT if the RDBMS does not support it.
• Question 10 The syntax for the UNION query is ____.
• Question 11 The ANSI standard defines ____ type(s) of outer
join(s)
• Question 12 A ____ join returns rows with matching values
and includes all rows from both tables (T1 and T2) with unmatched
values.
• Question 13 When using a(n) ____ join, only rows that meet
the given criteria are returned.
27. • Question 14 Analyzing the company situation is part of the
____ phase of the DBLC.
• Question 15 Creating the conceptual design and selecting
DBMS software are part of the ____ phase of the DBLC.
• Question 16 Evaluation, maintenance, and enhancement are
part of the ____ phase of the SDLC.
• Question 17 The primary objective of database design is ____.
• Question 18 Installation and fine tuning are part of the ____
phase of the SDLC.
• Question 19 The traditional SDLC is divided into ____
phases.
• Question 20 Lock ____ indicates the level of lock use.
• Question 21 The information stored in the ____ is used by the
DBMS for a recovery requirement triggered by a ROLLBACK
statement, a program’s abnormal termination, or a system failure such
as a network discrepancy or a disk crash.
• Question 22 A ____ lock prevents the use of any tables in the
database from one transaction while another transaction is being
processed.
• Question 23 The implicit beginning of a transaction is ____.
• Question 24 A(n) ____ condition occurs when two or more
transactions wait for each other to unlock data.
• Question 25 A consistent database is ____.
• Question 26 A transaction is a ____ unit of work that must be
either entirely completed or aborted.
• Question 27 A data mart is part of the ―____‖ section of the
business intelligence framework.
• Question 28 A characteristic of operational data is ____.
• Question 29 From the data analyst’s point of view, decision
support data differ from operational data in three main areas: time
span, granularity, and ____.
• Question 30 In a star schema, attributes are often used to
search, filter, or classify ____.
• Question 31 Data ____ implies that all business entities, data
elements, data characteristics, and business metrics are described in
the same way throughout the enterprise.
• Question 32 A characteristic of decision support data is ____.
28. • Question 33 The ____ contains business data extracted from
the operational database and from external data sources.
• Question 34 A ____ schema is a type of star schema in which
the dimension tables can have their own dimension tables.
• Question 35 Computed or derived facts are sometimes called
____ to differentiate them from stored facts.
• Question 36 A programming language typically used for CGI
scripts is ____.
• Question 37 Based on Microsoft’s Component Object Model
(COM), ____ is database middleware that adds object-oriented
functionality for access to relational and nonrelational data.
• Question 38 ____ is a collection of technologies used to
access any type of data source and manage the data through a
common interface.
• Question 39 What is the first step in the exchange between a
Web browser and a database?
• Question 40 ____ is an OO programming language developed
by Sun Microsystems that runs on top of the Web browser software.
• Question 41 A server-side extension ____.
• Question 42 In the ____ category, the cloud service provider
offers the capability to build and deploy consumer-created
applications using the provider’s cloud infrastructure.
• Question 43 ____ are written instructions that describe a
series of steps to be followed during the performance of a given
activity.
• Question 44 The DBA’s ____ role covers activities involving
the use of the DBMS.
• Question 45 ____ activities cover all tasks directly related to
the day-to-day operations of the DBMS and its applications.
• Question 46 ____ are more detailed and specific than policies
and describe the minimum requirements of a given DBA activity.
• Question 47 The person responsible for the control of the
centralized and shared database is the database ____.
• Question 48 The ____ is responsible for ensuring database
security and integrity.
• Question 49 Current data distribution philosophy makes it
easy for ____ end users to access the database.
29. • Question 50 ____ are general statements of direction or action
that communicate and support DBA goals.
Set 2
Week 11 Final Exam
• Question 1 A(n) ____ is an alternate name given to a column
or table in any SQL statement.
• Question 2 The SQL command that lets you insert rows into a
table is ____.
• Question 3 The special operator used to check whether a
subquery returns any rows is ____.
• Question 4 The ____ special operator is used to check whether
an attribute value is null.
• Question 5 To delete a row from the PRODUCT table, use the
____ command.
• Question 6 The special operator used to check whether an
attribute value is within a range of values is ____.
• Question 7 The ____ command is used to restore the table’s
contents to their previous values.
• Question 8 Which of the following is used to select partial
table contents?
• Question 9 In Oracle, ____ make(s) it possible to merge SQL
and traditional programming constructs, such as variables, conditional
processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,)
and error trapping.
• Question 10 A ____ join returns rows with matching values
and includes all rows from both tables (T1 and T2) with unmatched
values.
• Question 11 The syntax for the UNION query is ____.
• Question 12 A(n) ____ join will select only the rows with
common values in the common attribute(s).
30. • Question 13 The ANSI standard defines ____ type(s) of outer
join(s)
• Question 14 The primary objective of database design is ____.
• Question 15 Installing the DBMS, creating the database, and
loading or converting the data are part of the ____ phase of the
DBLC.
• Question 16 The process of creating an information system is
known as ____ development.
• Question 17 Evaluation, maintenance, and enhancement are
part of the ____ phase of the SDLC.
• Question 18 Analyzing the company situation is part of the
____ phase of the DBLC.
• Question 19 There are ____ stages in the DBLC.
• Question 20 ____ are required to prevent another transaction
from reading inconsistent data.
• Question 21 A consistent database is ____.
• Question 22 A ____ lock allows concurrent transactions to
access different rows of the same table.
• Question 23 A ____ lock locks the entire table preventing
access to any row by a transaction while another transaction is using
the table.
• Question 24 The implicit beginning of a transaction is ____.
• Question 25 A ____ lock prevents the use of any tables in the
database from one transaction while another transaction is being
processed.
• Question 26 Lock ____ indicates the level of lock use.
• Question 27A characteristic of decision support data is ____.
• Question 28 Analyzing decision support data to generate
information is part of ____.
• Question 29 The ____ contains business data extracted from
the operational database and from external data sources.
• Question 30 ____ are in charge of presenting the data to the
end user in a variety of ways.
• Question 31 A characteristic of operational data is ____.
• Question 32 The basic star schema has four components:
facts, ____, attributes, and attribute hierarchies.
31. • Question 33 Fact and dimension tables are related by ____
keys.
• Question 34 A ____ schema is a type of star schema in which
the dimension tables can have their own dimension tables.
• Question 35 Computed or derived facts are sometimes called
____ to differentiate them from stored facts.
• Question 36 ____ is embedded inside an HTML page and is
activated by triggering events such as clicking on a link.
• Question 37 ____ is a collection of technologies used to
access any type of data source and manage the data through a
common interface.
• Question 38 The Web browser’s job is to ____ the HTML
code that it receives from the Web server.
• Question 39 A programming language typically used for CGI
scripts is ____.
• Question 40 Which of the following is a well-defined Web-
server interface?
• Question 41 A server-side extension ____.
• Question 42 Of the following, what is one of the benefits of
rapid development at manageable costs for Internet technologies?
• Question 43 The person responsible for the control of the
centralized and shared database is the database ____.
• Question 44 A(n) ____ data dictionary is not updated
automatically and usually requires a batch process to be run.
• Question 45 ____ is a named collection of database access
privileges that authorize a user to connect to the database and use the
database system resources.
• Question 46 When introducing a database into an
organization, a(n) ____ impact is likely because the database
approach creates a more controlled and structured information flow
and thus affects people, functions, and interactions.
• Question 47 A(n) ____ data dictionary is automatically
updated by the DBMS with every database access.
• Question 48 ____ CASE tools provide support for the
planning, analysis, and design phases.
• Question 49 The ____ is responsible for ensuring database
security and integrity.
32. • Question 50 ____ activities cover all tasks directly related to
the day-to-day operations of the DBMS and its applications.
Set 3
Question 1 To delete a row from the PRODUCT table, use the ____
command.
Question 2 The special operator used to check whether a subquery
returns any rows is ____.
Question 3 The ____ command would be used to delete the table row
where the P_CODE is 'BRT-345'.
Question 4 The SQL command that lets you select attributes from
rows in one or more tables is ____.
Question 5 The SQL command that lets you insert rows into a table is
____.
Question 6 The ____ special operator is used to check whether an
attribute value is null.
Question 7 The SQL character data format(s) is(are) ____.
Question 8 To list all the contents of the PRODUCT table, you would
use ____.
Question 9 The ANSI standard defines ____ type(s) of outer join(s)
Question 10 The ____ operator could be used in place of
INTERSECT if the RDBMS does not support it.
Question 11 In Oracle, ____ make(s) it possible to merge SQL and
traditional programming constructs, such as variables, conditional
processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,)
and error trapping.
Question 12 The syntax for the UNION query is ____.
Question 13 A ____ join returns rows with matching values and
includes all rows from both tables (T1 and T2) with unmatched
values.
Question 14 Question 15 Installing the DBMS, creating the database,
and loading or converting the data are part of the ____ phase of the
DBLC.
33. Question 16 Creating the conceptual design and selecting DBMS
software are part of the ____ phase of the DBLC.
Question 17 The traditional SDLC is divided into ____ phases.
Question 18 A detailed system specification is part of the ____ phase
of the SDLC.
Question 19 User requirements, existing system evaluation, and
logical system design are part of the ____ phase of the SDLC.
Question 20 Lock ____ indicates the level of lock use.
Question 21 The implicit beginning of a transaction is ____.
Question 22 ____ means that data used during the execution of a
transaction cannot be used by a second transaction until the first one
is completed.
Question 23 A ____ lock locks the entire table preventing access to
any row by a transaction while another transaction is using the table.
Question 24 The information stored in the ____ is used by the DBMS
for a recovery requirement triggered by a ROLLBACK statement, a
program’s abnormal termination, or a system failure such as a
network discrepancy or a disk crash.
Question 25 A transaction is a ____ unit of work that must be either
entirely completed or aborted.
Question 26 A(n) ____ specifically reserves access to the transaction
that locked the object.
Question 27 Data mining is part of the ―____‖ section of the business
intelligence framework.
Question 28 Question 29 A ____ schema is a type of star schema in
which the dimension tables can have their own dimension tables.
Question 30 A characteristic of decision support data is ____.
Question 31 Data ____ implies that all business entities, data
elements, data characteristics, and business metrics are described in
the same way throughout the enterprise.
Question 32 In a star schema, attributes are often used to search, filter,
or classify ____.
Question 33 Fact and dimension tables are related by ____ keys.
Question 34 Computed or derived facts are sometimes called ____ to
differentiate them from stored facts.
Question 35 In a typical star schema, each dimension record is related
to thousands of ____ records.
34. Question 36 What is the first step in the exchange between a Web
browser and a database?
Question 37 A programming language typically used for CGI scripts
is ____.
Question 38 In the ____ category, the cloud service provider offers
the capability to build and deploy consumer-created applications
using the provider’s cloud infrastructure.
Question 39 ODBC works on the ____ operating system.
Question 40 Microsoft’s alternative to Java is ____.
Question 41 The Web browser’s job is to ____ the HTML code that it
receives from the Web server.
Question 42 ____ is a collection of technologies used to access any
type of data source and manage the data through a common interface.
Question 43 When introducing a database into an organization, a(n)
____ impact is likely because the database approach creates a more
controlled and structured information flow and thus affects people,
functions, and interactions.
Question 44 A(n) ____ data dictionary is not updated automatically
and usually requires a batch process to be run.
Question 45 A ____ is a named collection of database access
privileges that authorize a user to connect to the database and use the
database system resources.
Question 46 ____ CASE tools provide support for the planning,
analysis, and design phases.
Question 47 ____ are more detailed and specific than policies and
describe the minimum requirements of a given DBA activity.
Question 48 ____ CASE tools provide support for the coding and
implementation phases.
Question 49 The ____ is responsible for ensuring database security
and integrity.
Question 50 The person responsible for the control of the centralized
and shared database is the database ____.
*****************************************