Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Which of the following is a characteristic of databases?

A) Many users can use the same database at the same time

B) Different database entities can be connected to provide more information

C) Relevant business data are stored in a database

D) All of the above

2. A(n) ____ enables a database administrator to define schema components.

A) extensible markup language (XML)

B) data definition language (DDL)

C) unified modeling language (UML)

D) query language

3. Advantages of a DBMS are:

A) Improved data sharing and data security

B) Better data integration

C) Minimized data inconsistency and increase end-user productivity

D) Improved data access and decision making

E) All of the above

4. In a relational table the order of the rows and columns are immaterial to the DBMS

True

False

Use the following to answer Questions 5-8

The following data are in the tables Employee (primary key: Empno) and Department (primary key: Deptno). The questions refer to row numbers of this table. The first row of each table is row #1. Empdeptno in table Employee is a foreign key that refers to Deptno in the table Department. Deptmgr in the table Department is a foreign key that refers to Empno in the table Employee.

Table Employee:

Empno

Empname

Empdeptno

Empsalary

Emptitle

555

Kearny

200

7000

Manager

666

Williams

100

8000

Manager

777

Haberle

200

5000

Clerk

888

Haberle

200

5000

Clerk

 

Johnson

300

4000

Analyst

889

Dupont

400

 

 

 

McCabe

400

6000

Programmer

999

Lopez

 

9000

Manager

Table Department:

Deptno

Deptname

Deptcity

Deptmgr

100

Logistic

Wichita

666

200

Finance

Boise

555

300

Marketing

Pierre

666

5. Which of the following statements is true?

A. Row #7 of table Employee violates neither the entity integrity rule nor the referential integrity rule.
B. Row #7 of table Employee violates the entity integrity rule.
C. Row #7 of table Employee violates the referential integrity rule.
D. Row #7 of table Employee violates both the entity integrity rule and the referential integrity rule.

6. An inner join only returns matched records from the tables that are being joined.

True

False

7. Which of the following columns of the table Department is a foreign key?

A. Deptno
B. Deptname
C. Deptcity
D. Deptmgr

8. The values shown in the table Department:

A. violate neither the entity integrity rule nor the referential integrity rule
B. violate the entity integrity rule
C. violate the referential integrity rule
D. violates both the entity integrity rule and the referential integrity rule

9. In the relational model, ____ are important because they are used to ensure that each row in a table is uniquely identifiable.

A) Relations
B) Indexes
C) Keys
D) Logical structures

10. Entity Supertype Contains unique characteristics of each entity subtype

True

False

11. The ____ is not supported directly in the relational environment.

A) M:N
B) 1:M
C) M:1
D) 1:1

12. A ____ occurs when you have one entity in two 1:M relationships to other entities, thus producing an association among the other entities that is not expressed in the model.

A) Surrogate primary keys
B) time-variant data
C) Design trap
D) Fan trap

Use the following to answer questions 13- 14:

A database table consists of the following columns: employee's name, SS#, job-title, hiring-date, years-in-job, base-salary. A bonus calculation program, a personnel promotion application program, and a payroll application program all use this table. To implement a policy change in personnel promotion, the following column is added to the table: highest-college-degree. This new column is not used by the payroll program or by the bonus calculation program.

13. The following application program will be modified to accommodate the change to the database table:

A) The bonus calculation program
B) The personnel promotion application program
C) The payroll application program
D) All of the above

14. The ability to add the new column without requiring changes to all of the application programs strongly relates to the following feature of modern database systems:

A) Nonprocedural programming
B) Transaction processing
C) Data independence
D) Data sharing

15. The following step occurs first in the process of building an ERD: ____.

A) Develop the initial ERD.
B) Identify the business rules based on the description of operations.
C) Identify the attributes and primary keys that adequately describe the entities.
D) Create a detailed narrative of the organization's description of operations.

16. Entity Relationship Diagrams are input to the following phase of Database Development:

A) Logical Database Design
B) Conceptual Data Modeling
C) Physical Database Design
D) Distributed Database Design

17. When the PK of one entity does not contain the PK of a related entity, the relationship is ____.

A) Weak
B) Strong
C) Neutral
D) Missing

18. In Crow's Foot notation, the symbol

Denotes one or many; the "many" side is optional

True

False

19. The three stage process in natural joins are:

A) Product, Union, Project
B) Product, Select, Intersect
C) Product, Select, Project

20. Composite attribute can be subdivided

True

False

21. In a supertype subtype relationship

A) Subtype entities inherit attributes and relationships of supertype
B) All entity subtypes inherit their primary key attribute from their supertype
C) Entity subtypes inherit all relationships in which supertype entity participates
D) All of the above.

22. Characteristics of Primary Key include:

a. Must have unique values and should be intelligent
b. Should be nonintelligent and not change over time
c. Must not change over time and composed of several attribute

23. Third Normal Form is often as high as needed in normalization

True

False

24. Entities corresponds to table and not to row in relational environment

True

False

25. The ________________ key is an attribute or a combination of attributes in one table whose values must either match the primary key in another table or be be null

A) Super Key
B) Candidate Key
C) Primary Key
D) Foreign Key
E) Secondary Key

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91520065
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Engineering

What are some analysis and crime investigative methods that

What are some analysis and crime investigative methods that could be used in identifying gangs and/or gang activities?

Refer to the cyclic redundancy check crc codes discussed in

Refer to the Cyclic Redundancy Check (CRC) codes discussed in the textbook and follow the conventions used in the textbook. Consider the 5-bit generator, G=10011, and suppose that D has the value 1010101011. What is the ...

Explain why a successful information security program is

Explain why a successful information security program is the shared responsibility of an organizations three communities of interest.

Take the input of numbers and reverse the order of elements

Take the input of numbers and reverse the order of elements in that vector using recursion.

Tests can determine with some degree of accuracy whether a

Tests can determine, with some degree of accuracy, whether a subject indeed has the disease for which s/he is being tested. For instance, a new screening procedure for heart disease was tested on 100 patients with heart ...

A set of coins makes change fornbspnnbspif the sum of the

A set of coins makes change for n if the sum of the values of the coins is n. For example, if you have 1-cent, 2-cent and 4-cent coins, the following sets make change for 7: 7 1-cent coins 5 1-cent, 1 2-cent coins 3 1-ce ...

Restaurant management database project the restaurant

Restaurant Management Database Project : The restaurant maintains the catalog for the list of food and beverage items that it provides. Apart from providing food facility at their own premises, the restaurant takes order ...

Explain the difference between penetration tests and

Explain the difference between penetration tests and security tests. Emphasize that this book will explain things from a security testing perspective.

Directionspick one topic for word and one topic

Directions Pick one topic for Word and one topic for PowerPoint to discuss. Word Watermark: What is the purpose of watermark for a document? What do you consider when you work on a watermark in Word? Newsletter: What are ...

Given the following table keynbspand fds repair

Given the following table, key and FDs, REPAIR (RepairInvoiceNumber, RepairDate, RepairCost, RepairEmployeeName, RepairEmployeePhone, SerialNumber, Type, TankCapacity) Candidate Keys: RepairInvoiceNumber, and (RepairDate ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As