Reference no: EM131144607
QUESTION 1
Denormalization is never a good practice.
True
False
QUESTION 2
The purpose of concurrency control is:
a. preventing users from working on a database concurrently.
b. ensuring that one user's work does not influence another user's work inappropriately.
c. providing an opportunity for users to work on databases concurrently.
d. stopping all concurrent transactions.
QUESTION 3
Locks placed automatically by the DBMS are called:
a. implicit locks.
b. explicit locks.
c. automated locks.
d. DBMS locks.
QUESTION 4
Locks placed by the user for exclusive rights to the data are called:
a. implicit locks.
b. explicit locks.
c. user-defined locks.
d. exclusive locks.
QUESTION 5
A pointer into a set of rows that are the result set from an SQL SELECT statement is called a:
a. SQL pointer.
b. selector.
c. row pointer.
d. cursor.
QUESTION 6
Reprocessing is not typically the best method of recovery from a failure in a multiuser system.
True
False
QUESTION 7
"User-defined function" and "stored procedure" are synonyms.
True
False
QUESTION 8
The standard developed in the early 90's to provide a DBMS-independent means for processing relational database data is:
a. ADO
b. AMP
c. ODBC
d. API
QUESTION 9
A database system that has data, programs, and personnel specializing in the preparation of data for BI processing is called:
a. a data mart.
b. an ETL system.
c. OLAP
QUESTION 10
Dimensional database use which type of design:
A. Normalized database design
B. Star schema
C. Operational database design
D. Dimensional schema
QUESTION 11
Describe the lost update problem.
QUESTION 12
What is the difference between authentication and authorization?
QUESTION 13
What is an SQL injection attack?
QUESTION 14
What are six problems with using operational data for BI processing?
QUESTION 15
What is a data mart?
QUESTION 16
What is the difference between a database and a DBMS?
QUESTION 17
What is a surrogate key?
QUESTION 18
Discuss three reasons to learn SQL even though Microsoft Access provides us with a Query Wizard?
QUESTION 19
List and describe the three types of binary relationships.
Explore the legal and ethical issues surrounding employee
: Analyze and apply the concepts of freedom versus responsibility and ethical decision making. Analyze and evaluate laws that protect against discrimination in the workplace.
|
Describe the key characteristics of a whistleblower
: Describe the key characteristics of a whistleblower, and briefly summarize one (1) researched instance of whistleblowing in one (1) publicly traded company within the last 12 months. Include the details of the issue that the whistleblower reported..
|
Page numbers are included in a citation when
: Page numbers are included in a citation when- An example of a secondary source is- When creating the reference page, you should remember to do the following:
|
Describe law enforcement operations enforcement strategies
: You will describe the law enforcement operations, enforcement strategies, subsequent prosecution of the case, etc. Also, you will relate the reported or projected impact of the case on drug supply reduction in the targeted jurisdiction. Supplement..
|
What is difference between authentication and authorization
: What is the difference between authentication and authorization? What are six problems with using operational data for BI processing? What is an SQL injection attack? What is the difference between a database and a DBMS?
|
How we as a society deal with the risk of natural disasters
: How should we, as a society, deal with the risk of natural disasters ? - What should we do differently from what we do now .
|
How do you access the templates
: You are about to create your first PowerPoint presentation and you want to utilize the default templates to help you in your slide design. How do you access the templates?
|
Do you believe that having internet access
: Do you believe that having Internet access, as the author suggests, is not a convenience or luxury, but a human right? List one benefit that closing the digital divide might provide (e.g. economic growth).
|
What is expected value of the npv for each of the projects
: What is the expected value of the NPV for each of the projects - what is the standard deviation of the NPV for each of the projects?
|