CIS 111 FINAL EXAM
CIS 111 Final Exam
1.
To delete a row
from the PRODUCT table, use the ____ command.
2.
The special
operator used to check whether a subquery returns any rows is ____.
3.
The ____ command
would be used to delete the table row where the P_CODE is 'BRT-345'.
4.
The SQL command
that lets you select attributes from rows in one or more tables is ____.
5.
The SQL command
that lets you insert rows into a table is ____.
6. The ____ special
operator is used to check whether an attribute value is null.
7. The SQL character data
format(s) is(are) ____.
8. To list all the contents
of the PRODUCT table, you would use ____.
9. The ANSI standard
defines ____ type(s) of outer join(s)
10. The ____ operator
could be used in place of INTERSECT if the RDBMS does not support it.
11. In Oracle, ____
make(s) it possible to merge SQL and traditional programming constructs, such
as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE
loops,) and error trapping.
12. The syntax for the
UNION query is ____.
13. A ____ join returns
rows with matching values and includes all rows from both tables (T1 and T2)
with unmatched values.
14. The primary objective
of database design is ____.
15. Installing the DBMS,
creating the database, and loading or converting the data are part of the ____
phase of the DBLC.
16. Creating the
conceptual design and selecting DBMS software are part of the ____ phase of the
DBLC.
17. The traditional SDLC
is divided into ____ phases.
18. A detailed system
specification is part of the ____ phase of the SDLC.
19. User requirements,
existing system evaluation, and logical system design are part of the ____
phase of the SDLC.
20. Lock ____ indicates
the level of lock use.
21. The implicit beginning
of a transaction is ____.
22. ____ means that data
used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.
23. A ____ lock locks the
entire table preventing access to any row by a transaction while another
transaction is using the table.
24. The information stored
in the ____ is used by the DBMS for a recovery requirement triggered by a
ROLLBACK statement, a programÆs abnormal termination, or a system failure such
as a network discrepancy or a disk crash.
25. A transaction is a
____ unit of work that must be either entirely completed or aborted.
26. A(n) ____ specifically
reserves access to the transaction that locked the object.
27. Data mining is part of
the ô____ö section of the business intelligence framework.
28. In a star schema,
dimensions are normally stored in ____.
29. A ____ schema is a
type of star schema in which the dimension tables can have their own dimension
tables.
30. A characteristic of
decision support data is ____.
31. Data ____ implies that
all business entities, data elements, data characteristics, and business
metrics are described in the same way throughout the enterprise.
32. In a star schema,
attributes are often used to search, filter, or classify ____.
33. Fact and dimension
tables are related by ____ keys.
34. Computed or derived
facts are sometimes called ____ to differentiate them from stored facts.
35. In a typical star
schema, each dimension record is related to thousands of ____ records.
36. What is the first step
in the exchange between a Web browser and a database?
37. A programming language
typically used for CGI scripts is ____.
38. In the ____ category,
the cloud service provider offers the capability to build and deploy consumer-created
applications using the providerÆs cloud infrastructure.
39. ODBC works on the ____
operating system.
40. MicrosoftÆs
alternative to Java is ____.
41. The Web browserÆs job
is to ____ the HTML code that it receives from the Web server.
42. ____ is a collection
of technologies used to access any type of data source and manage the data
through a common interface.
43. When introducing a
database into an organization, a(n) ____ impact is likely because the database
approach creates a more controlled and structured information flow and thus
affects people, functions, and interactions.
44. A(n) ____ data
dictionary is not updated automatically and usually requires a batch process to
be run.
45. A ____ is a named
collection of database access privileges that authorize a user to connect to
the database and use the database system resources.
46. ____ CASE tools
provide support for the planning, analysis, and design phases.
47. ____ are more detailed
and specific than policies and describe the minimum requirements of a given DBA
activity.
48. ____ CASE tools
provide support for the coding and implementation phases.
49. The ____ is
responsible for ensuring database security and integrity.
50. The person responsible
for the control of the centralized and shared database is the database ____.
No comments:
Post a Comment