IST 210- Final Exam – Flashcards

Unlock all answers in this set

Unlock answers
question
(T/F) Database connectivity software is also known as database middleware because it interfaces between the application program and the database.
answer
True
question
(T/F) Usually, the native database connectivity interface provided by the vendor is not the only way to connect to a database; most current DBMS products support other database connectivity standards, the most common being ODBC.
answer
True
question
(T/F) An API (application programming interface) is defined as a set of routines, protocols, and tools for building software applications.
answer
True
question
(T/F) The effects of bad database design, implementation, and management are multiplied in an environment in which transactions may be measured in hundreds of thousands per day, rather than in hundreds per day.
answer
True
question
(T/F) A database language enables the user to create database and table structures to perform basic data management chores.
answer
True
question
(T/F) SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words.
answer
False
question
(T/F) Data type selection is usually dictated by the nature of the data and by the intended use.
answer
True
question
(T/F) SQL requires the use of the ADD command to enter data into a table.
answer
False
question
(T/F) You cannot insert a row containing a null attribute value using SQL.
answer
False
question
(T/F) All SQL commands must be issued on a single line.
answer
False
question
(T/F) Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command's components.
answer
True
question
(T/F) COUNT is designed to tally the number of non-null "values" of an attribute, and is often used in conjunction with the DISTINCT clause.
answer
True
question
The SQL command that lets you insert rows into a table is __________.
answer
INSERT
question
The SQL command that lets you permanently save data changes is __________.
answer
COMMIT
question
The SQL command that modifies an attribute's values in one or more table's rows is ___________.
answer
UPDATE
question
When you issue the DELETE FROM tablename command without specifying a WHERE condition _________________________________.
answer
all rows from the specified table will be deleted
question
Which of the following is used to select partial table contents?
answer
Placing restrictions on the rows to be included in the output; Use the WHERE clause to add conditional restrictions to the SELECT statement.
question
Which query will output the table contents when the value of V_CODE is equal to 21344?
answer
WHERE V_CODE = 21344
question
Which query will output the table contents when the value of P_PRICE is less than or equal to 10?
answer
WHERE P_PRICE <= 10
question
A(n)_______is an alternate name given to a column or table in any SQL statement.
answer
alias
question
Which query uses the correct SQL syntax to list the table contents for either V_CODE = 21344 or V_CODE = 24288?
answer
WHERE V_CODE = 21344 OR V_CODE = 24288
question
The special operator used to check whether an attribute value is within a range of values is ____________.
answer
BETWEEN
question
The special operator used to check for similar character strings is ______.
answer
LIKE
question
A table can be deleted from the database by using the______ ________ command.
answer
DROP TABLE
question
The SQL aggregate function that gives the number of rows containing non-null values for the given column is __________.
answer
COUNT
question
The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME, V_AREACODE, V_PHONE, and V_CONTACT fields from the VENDOR table where the values of V_CODE match is:
answer
WHERE PRODUCT.V_CODE = VENDOR.V_CODE
question
(T/F) One of the major advantages of stored procedures is that they can be used to encapsulate and represent business transactions.
answer
True
question
(T/F) Stored procedures help reduce code duplication by means of code isolation and code sharing
answer
True
question
(T/F) The DBMS must provide tools that give each level of management a different view of the data and support the required level of decision-making.
answer
True
question
(T/F) Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
answer
False
question
(T/F) Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
answer
False
question
At the level of middle management, the database must be able to _________.
answer
• Deliver the data necessary for tactical decisions and planning. • Monitor and control the allocation and use of company resources and evaluate the performance of the various departments. • Provide a framework for enforcing and ensuring the security and privacy of the data in the database.
question
When introducing a database into an organization, a(n) ___________ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.
answer
cultural
question
There is a growing trend toward _______________ in the data-management function.
answer
specialization
question
As a manager, the DBA must concentrate on the __________ _____ ___________ dimensions of the database administration function.
answer
control and planning
question
___________ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
answer
Standards
question
"All users must have passwords" is an example of a __________.
answer
policy
question
Current data distribution philosophy makes it easy for _____________ end users to access the database.
answer
authorized
question
A(n) _________ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.
answer
access
question
______________ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
answer
Confidentiality
question
____________ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
answer
Corrupting
question
_______ _______ management is designed to limit access to the database.
answer
User access
question
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ______________________, closed-circuit video, and voice-recognition technology.
answer
electronic personnel badges
question
User-access management is a subset of ________________________.
answer
authorization management
question
Classifying users into ________ _________ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users.
answer
user groups
question
(T/F) SAP is a portal vendor.
answer
False
question
(T/F) Decision support data are a snapshot of the operational data at a given point in time.
answer
True
question
(T/F) Once data enter the data warehouse, they are never removed.
answer
True
question
Data mining is part of the "__________________________" section of the business intelligence framework.
answer
data query and analysis tools
question
The _______ ________ contains business data extracted from the operational database and from external data sources.
answer
data store
question
__________________________are in charge of presenting the data to the end user in a variety of ways.
answer
Data presentation and visualization tools
question
A characteristic of decision support data is ________________.
answer
• An arrangement of computerized tools used to assist managerial decision making. • Precursors of modern BI systems. • Typically has a much narrower focus and reach than a BI solution.
question
Decision support data tend to be non-normalized, ___________, and pre-aggregated.
answer
duplicated
question
Computed or derived facts are sometimes called _________ to differentiate them from stored facts.
answer
metrics
question
Which of the following is true of business rules?
answer
They can serve as a communication tool between the users and designers.
question
The most important characteristic of an entity is its ___________ key, used to uniquely identify each entity instance.
answer
primary
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New