Tuesday, February 9, 2016

CIS 111 FINAL EXAM


BUY HERE


CIS 111 Final Exam
1.     To delete a row from the PRODUCT table, use the ____ command.
2.     The special operator used to check whether a subquery returns any rows is ____.
3.     The ____ command would be used to delete the table row where the P_CODE  is 'BRT-345'.
4.     The SQL command that lets you select attributes from rows in one or more tables is ____.
5.     The SQL command that lets you insert rows into a table is ____.
6.     The ____ special operator is used to check whether an attribute value is null.
7.     The SQL character data format(s) is(are) ____.
8.     To list all the contents of the PRODUCT table, you would use ____.
9.     The ANSI standard defines ____ type(s) of outer join(s)
10.   The ____ operator could be used in place of INTERSECT if the RDBMS does not support it.
11.   In Oracle, ____ make(s) it possible to merge SQL and traditional programming constructs, such as variables, conditional processing (IF-THEN-ELSE), basic loops (FOR and WHILE loops,) and error trapping.
12.   The syntax for the UNION query is ____.
13.   A ____ join returns rows with matching values and includes all rows from both tables (T1 and T2) with unmatched values.
14.   The primary objective of database design is ____.
15.   Installing the DBMS, creating the database, and loading or converting the data are part of the ____ phase of the DBLC.
16.   Creating the conceptual design and selecting DBMS software are part of the ____ phase of the DBLC.
17.   The traditional SDLC is divided into ____ phases.
18.   A detailed system specification is part of the ____ phase of the SDLC.
19.   User requirements, existing system evaluation, and logical system design are part of the ____ phase of the SDLC.
20.   Lock ____ indicates the level of lock use.
21.   The implicit beginning of a transaction is ____.
22.   ____ means that data used during the execution of a transaction cannot be used by a second transaction until the first one is completed.
23.   A ____ lock locks the entire table preventing access to any row by a transaction while another transaction is using the table.
24.   The information stored in the ____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a programÆs abnormal termination, or a system failure such as a network discrepancy or a disk crash.
25.   A transaction is a ____ unit of work that must be either entirely completed or aborted.
26.   A(n) ____ specifically reserves access to the transaction that locked the object.
27.   Data mining is part of the ô____ö section of the business intelligence framework.
28.   In a star schema, dimensions are normally stored in ____.
29.   A ____ schema is a type of star schema in which the dimension tables can have their own dimension tables.
30.   A characteristic of decision support data is ____.
31.   Data ____ implies that all business entities, data elements, data characteristics, and business metrics are described in the same way throughout the enterprise.
32.   In a star schema, attributes are often used to search, filter, or classify ____.
33.   Fact and dimension tables are related by ____ keys.
34.   Computed or derived facts are sometimes called ____ to differentiate them from stored facts.
35.   In a typical star schema, each dimension record is related to thousands of ____ records.
36.   What is the first step in the exchange between a Web browser and a database?
37.   A programming language typically used for CGI scripts is ____.
38.   In the ____ category, the cloud service provider offers the capability to build and deploy consumer-created applications using the providerÆs cloud infrastructure.
39.   ODBC works on the ____ operating system.
40.   MicrosoftÆs alternative to Java is ____.
41.   The Web browserÆs job is to ____ the HTML code that it receives from the Web server.
42.   ____ is a collection of technologies used to access any type of data source and manage the data through a common interface.
43.   When introducing a database into an organization, a(n) ____ impact is likely because the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions.
44.   A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run.
45.   A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
46.   ____ CASE tools provide support for the planning, analysis, and design phases.
47.   ____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
48.   ____ CASE tools provide support for the coding and implementation phases.
49.   The ____ is responsible for ensuring database security and integrity.
50.   The person responsible for the control of the centralized and shared database is the database ____.


No comments:

Post a Comment