- At which of the following levels is the actual data stored in a database? Physical
- Consider the first step involved in acquisition of data for warehouse:
“Extract data from multiple and heterogeneous sources.”
Which of the following steps will be the second step involved in acquisition of data for warehouse? Format data for consistency within a warehouse. - Consider the following example:
“The salary of an employee should not exceed the salary of the employee’s supervisor.”
Which of the following constraints is suitable for the given example? Transition - Consider the following options for mapping specialization or generalization: Multiple relations—superclass and subclasses
- Consider the following skills of a surgical technician:
Ability to work in groups
Possesses a calm nature
Excellent communication skills
Willingness to learn
The skills of a surgical technician are an example of which type of attribute? Multivalued attribute - Consider the following statement:
“If the validation phase is successful, the transaction updates are applied to the database; otherwise, the updates are discarded and the transaction is restarted.”
In which of the following phases of concurrency control protocol does this happen? Write - Due to which of the following actions does a checkpoint record in the log also include additional information, and this can facilitate undoing transaction operations in the event that a transaction must be rolled back? Force-write all main memory buffers that have been modified to disk.
- During which of the following steps do the database designers interview prospective database users to understand and document their data necessities? Requirements collection and analysis
- In which of the following categories do the physical design decisions for indexing fall?
Each correct answer represents a complete solution. Choose all that apply. ABDE - What are the NOSQL characteristics related to distributed databases and distributed systems?
Each correct answer represents a complete solution. Choose all that apply. High-performance data access Sharding of files Replication models Scalability - What challenges are faced by big data technologies when they are used for analytics applications? Inconsistent and incomplete information, Privacy and confidentiality, Heterogeneity of information
- What term is used for intermediate form of databases before they are cleansed, aggregated, and transformed into a data warehouse? ODS
- Which abstraction concept is needed to distinguish among database objects and classes, and to identify database objects? Identification
- Which of the following are steps of ER-to-relational mapping algorithm? ABCD
- Which of the following associations is represented as a line connecting the participating classes, and may optionally have a name? Binary
- Which of the following clauses assigns a variable to range over each of the individual elements in a sequence? FOR
- Which of the following constraints are possible constraints on a specialization? Overlapping, total Disjoint, total Overlapping, partial
- Which of the following constraints can be directly expressed in the schemas of the data model?
Each correct answer represents a complete solution. Choose all that apply. Entity integrity Key Domain - Which of the following functional dependencies occurs only in a relation that contains three or more attributes and an attribute is indirectly dependent on another attribute that is not part of the primary key? Transitive
- Which of the following functions does SQL allow to be blocked from public use, and an EXECUTE privilege is needed to have access to these functions? Mutator, Constructor , Observer
- Which of the following indexes requires that the ordering field of the data file has a distinct value for each record as well as records are of fixed length with two fields? Primary
- Which of the following interpretations are true of NULLs?
Each correct answer represents a complete solution. Choose all that apply. ACD - Which of the following is described in the given statement?
“Take immediate action to eliminate the attacker’s access to the system and to isolate or contain the problem to prevent further spread.” Confinement - Which of the following methods are used for collision resolution?
Each correct answer represents a complete solution. Choose all that apply. Multiple hashing
Chaining
Open addressing - Which of the following multiset operations do not eliminate duplicates?
Each correct answer represents a complete solution. Choose all that apply. INTERSECT ALL EXCEPT ALL UNION ALL - Which of the following operations takes the results of two queries and returns only those rows that appear in both result sets without eliminating duplicates? INTERSECT ALL
- Which of the following properties is enforced by the concurrency control subsystem of the DBMS? Isolation
- Which of the following rules states that a set of attributes always determines itself or any of its subsets? Reflexive
- Which of the following strategies updates a view as soon as the base tables are changed? Immediate update
- Which of the following techniques to make accessing data more efficient on HDDs deals with the incompatibility of speeds between a CPU and the electromechanical device? Buffering of data
- Which of the following types of actions are used to control discretionary database authorization?
Each correct answer represents a complete solution. Choose all that apply. Privilege granting Privilege revocation - Which of the following updates recomputes a view only upon demand? Lazy
- Which of the following violations will occur when a transaction may read a set of rows from a table, based on some condition specified in the SQL WHERE-clause? Phantom
- Which operation is used for inserting new data or new versions of existing data items? Put
- Which spatial operator provides a more specific description of the object’s geometry and measures some global properties of single objects? Metric
- Which stage of a distributed database query is performed locally? Local query optimization
- Which statistical model provides a framework in which term weighting, ranking of retrieved documents, and determining the relevance of feedback are possible? Vector space
- Which type of end user tries to learn most of the DBMS facilities to achieve their complex requirements?
This task contains the radio buttons and checkboxes for options. Sophisticated - Which type of XML document is formatted as XML document in order to exchange it over the Web? Data-centric
- Who communicates with all prospective database users to understand their requirements and to create a design that meets those requirements? Database designer
Other Links:
See other websites for quiz:
Check on QUIZLET