Applied Database Management Exam Questions - 1194 Verified Questions

Page 1


Applied Database Management

Exam Questions

Course Introduction

Applied Database Management focuses on the practical concepts and techniques needed to design, implement, and manage databases in real-world environments. The course covers relational database models, SQL programming, data normalization, and querying skills, while also introducing students to database administration, security, data backup, and recovery processes. Through case studies and hands-on projects, students gain experience in designing efficient database solutions that meet organizational needs, integrating database management systems with applications, and leveraging advanced tools to support data-driven decision making.

Recommended Textbook

Database Systems Design Implementation and Management 13th Edition by Carlos Coronel

Available Study Resources on Quizplus

16 Chapters

1194 Verified Questions

1194 Flashcards

Source URL: https://quizplus.com/study-set/1337 Page 2

Chapter 1: Database Systems

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26666

Sample Questions

Q1) An operational database is sometimes referred to as an enterprise database.

A)True

B)False

Answer: False

Q2) A(n) _____ database supports a relatively small number of users (usually fewer than 50) or a specific department within an organization.

A) desktop

B) workgroup

C) enterprise

D) transactional

Answer: B

Q3) _____ provide a description of the data characteristics and the set of relationships that link the data found within the database.

A) Queries

B) End-user data

C) Metadata

D) Schemas

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Data Models

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26667

Sample Questions

Q1) Each column in a relation represents a(n) _____.

Answer: attribute

Q2) One of the limitations of the _____ model is that there is a lack of standards.

Answer: hierarchical

Q3) The _____ model is the end users' view of the data environment.

Answer: external

Q4) Today, most relational database products can be classified as object/relational. A)True

B)False

Answer: True

Q5) The _____ model uses the term connectivity to label the relationship types. A) relational B) network

C) object-oriented

D) entity relationship

Answer: D

Q6) A(n) _____ is a collection of similar objects with a shared structure and behavior. Answer: class

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: The Relational Database Model

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26668

Sample Questions

Q1) _____ are especially useful when you are trying to determine what values in related tables cause referential integrity problems.

A) Inner joins

B) Outer joins

C) Equijoins

D) Theta joins

Answer: B

Q2) Dr. Codd's _____ rule of relational database states that every value in a table is guaranteed to be accessible through a combination of table name, primary key value, and column name.

Answer: guaranteed Access

Q3) The _____ relationship is the "relational model ideal."

A) 1:1

B) 1:M

C) M:1

D) M:N

Answer: B

Q4) An index key can have multiple _____ (a composite index).

Answer: attributes

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Entity Relationship Er Modeling

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26669

Sample Questions

Q1) The entity relationship model (ERM) is dependent on the database type.

A)True

B)False

Q2) _____ expresses the minimum and maximum number of entity occurrences associated with one occurrence of the related entity.

A) Connectivity

B) Relationship

C) Dependence

D) Cardinality

Q3) A weak relationship exists if the primary key of the related entity contains at least one primary key component of the parent entity.

A)True

B)False

Q4) Connectivities and cardinalities are established by concise statements known as business rules.

A)True

B)False

Q5) Identifying the attributes of entities helps in the better understanding of _____ among entities.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Advanced Data Modeling

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26670

Sample Questions

Q1) From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes.

Q2) Implementing overlapping subtypes requires the use of one discriminator attribute for each subtype.

A)True

B)False

Q3) The _____ is the result of adding more semantic constructs to the original entity relationship (ER) model.

Q4) In which two cases are composite primary keys particularly useful?

Q5) A _____ is a primary key created by a database designer to simplify the identification of entity instances.

A) composite key

B) compound key

C) natural key

D) surrogate key

Q6) _____ completeness means that every supertype occurrence must be a member of at least one subtype.

Q7) What do specialization hierarchies do?

Q8) Explain the "no change over time" characteristic of a primary key.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Normalization of Database Tables

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26671

Sample Questions

Q1) Any attribute that is at least part of a key is known as a(n) _____.

Q2) Explain normalization and its different forms.

Q3) From a structural point of view, 2NF is better than _____.

A) 1NF

B) 3NF

C) 4NF

D) BCNF

Q4) A table is in BCNF if every determinant in the table is a foreign key.

A)True

B)False

Q5) In order to meet performance requirements, portions of the database design may need to be occasionally denormalized.

A)True

B)False

Q6) Repeating groups must be eliminated by ensuring that each row defines a single entity.

A)True

B)False

Q7) In the _____, no row may contain two or more multivalued facts about an entity.

Q8) What steps are involved in the conversion to third normal form?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Introduction to Structured Query Language Sql

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26672

Sample Questions

Q1) The _____ command defines a default value for a column when no value is given.

A) CHECK

B) UNIQUE

C) NOT NULL

D) DEFAULT

Q2) The _____ operator could be used in place of INTERSECT if the DBMS does not support it.

Q3) Numeric functions take one numeric parameter and return one value.

A)True

B)False

Q4) An alias cannot be used when a table is required to be joined to itself in a recursive query.

A)True

B)False

Q5) A(n) _____ is a query that is embedded (or nested) inside another query.

A) alias

B) operator

C) subquery

D) view

Q6) What is a subquery? What is always executed first?

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Advanced Sql

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26673

Sample Questions

Q1) A(n) _____ routine pools multiple transactions into a single batch to update a master table field in a single operation.

Q2) The Oracle string concatenation function is _____.

A) CONCAT

B) +

C) ||

D) &&

Q3) The tables on whicha view, or a virtual tablederived froma SELECT query, are based are called _____tables.

A) indexed

B) core

C) relation

D) base

Q4) To make the SQL code more _____, most SQL programmers use one line per column (attribute) definition.

Q5) BEFORE means before the changes are made in memory but after the changes are permanently saved to disk.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Database Design

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26674

Sample Questions

Q1) Training principles and methodologies are planned during the _____ phase of the Systems Development Life Cycle (SDLC).

A) maintenance

B) implementation

C) analysis

D) detailed systems design

Q2) The term "database development" is used to describe the process of database design and implementation.

A)True

B)False

Q3) During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented.

A) detailed systems design

B) analysis

C) maintenance

D)  implementation

Q4) _____ are usually provided by the database management system (DBMS) to check for access violations.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Transaction Management and Concurrency Control

Available Study Resources on Quizplus for this Chatper

74 Verified Questions

74 Flashcards

Source URL: https://quizplus.com/quiz/26675

Sample Questions

Q1) ANSI has defined standards that govern SQL database transactions. Transaction support is provided by two SQL statements _____ and ROLLBACK.

A) RETRIEVE

B) ASSIGN

C) UPDATE

D) COMMIT

Q2) The DBMS uses the information stored in the _____log for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.

Q3) A lock guarantees the open use of a data item to multiple transactions.

A)True

B)False

Q4) One of the three most common data integrity and consistency problems is _____.

A) lost updates

B) disk failures

C) user errors

D) deadlocks

Q5) What are database checkpoints?

Q6) As a rule, a(n) _____ must unlock the object after its termination.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Database Performance Tuning and Query

Optimization

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26676

Sample Questions

Q1) Most current-generation relational DBMSs perform automatic query optimization at the client end.

A)True

B)False

Q2) One of the main functions of a database system is to provide timely answers to end users.

A)True

B)False

Q3) A(n) _____ request is a low-level read or write data access operation to or from computer devices.

Q4) End users and the DBMS interact through the use of _____ to generate information.

Q5) In standard SQL, the optimizer hintFIRST_ROWS is generally used for _____ mode processes.

A) batch

B) interactive

C) transaction

D) real-time

Q6) _____ is evaluated based on client perspective.

Page 13

Q7) List and describe some typical DBMS processes.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Distributed Database Management Systems

Available Study Resources on Quizplus for this Chatper

74 Verified Questions

74 Flashcards

Source URL: https://quizplus.com/quiz/26677

Sample Questions

Q1) The level of transparency supported by the distributed database management system remains the same for all systems.

A)True

B)False

Q2) A fully distributed database management system (DBMS) must perform all the functions of a centralized DBMS, and it must handle all necessary functions imposed by the distribution of data and processing.

A)True

B)False

Q3) A distributed _____ can reference several different local or remote data processing sites.

A) request

B) site

C) data location

D) transaction

Q4) Data _____ describes the process of deciding where to locate data.

Q5) A transaction processor is also known as the _____ processor.

Q6) The distributed database system must be _____ of the computer system hardware.

Q7) Explain the three types of operations defined by the DO-UNDO-REDO protocol.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Business Intelligence and Data Warehouses

Available Study Resources on Quizplus for this Chatper

74 Verified Questions

74 Flashcards

Source URL: https://quizplus.com/quiz/26678

Sample Questions

Q1) _____ functionality ranges from simple data gathering and transformation to very complex data analysis and presentation.

Q2) _____ tools focus on the strategic and tactical use of information.

A) Business

B) Relational database management

C) Business intelligence

D) Networking

Q3) What is data visualization? Name different techniques of data visualization.

Q4) Normalizing fact tables improves data access performance and saves data storage space.

A)True

B)False

Q5) _____ is a measurement of the density of the data held in the data cube and is computed by dividing the total number of actual values in the cube by the total number of cells in the cube.

Q6) _____ is a collection of concepts, techniques, and processes for the proper identification, definition, and management of data elements within an organization.

Q7) ______ is a method or process of government.

Q8) Describe the use of SQL in relation to ROLAP.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Big Data and Nosql

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/26679

Sample Questions

Q1) ______ isthe coexistence of a variety of data storage and data management technologies within an organization's infrastructure.

Q2) _____ are like attributes; they are the data that we need to store about the node.

Q3) Characteristics that are important in working with data in the relational database model also apply to Big Data.

A)True

B)False

Q4) Scaling out is keeping the same number of systems, but migrating each system to a larger one.

A)True

B)False

Q5) A block report is used to let the name node know that the data mode is still available.

A)True

B)False

Q6) WithinHadoop, is used for producing data pipeline tasks that transform data in a series of steps.

Q7) WithinHadoop, can transfer data in both directions - into and out of HDFS.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Database Connectivity and Web Technologies

Available Study Resources on Quizplus for this Chatper

73 Verified Questions

73 Flashcards

Source URL: https://quizplus.com/quiz/26680

Sample Questions

Q1) Having a web-based database interface eliminates the design and implementation issues of a database system.

A)True

B)False

Q2) The Common Gateway Interface (CGI) is a newer web server interface standard that is much more efficient and faster than a dynamic link library (DLL).

A)True

B)False

Q3) The first line of an XML document represents the document declaration, and it is mandatory.

A)True

B)False

Q4) ODBC works on the _____ operating system.

A) Kronos

B) UNIX

C) Windows

D) Mac

Q5) _____ webpages are at the heart of current generation websites.

Q6) What are the main types of objects in the OLE-DB model? Explain.

Page 17

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Database Administration and Security

Available Study Resources on Quizplus for this Chatper

74 Verified Questions

74 Flashcards

Source URL: https://quizplus.com/quiz/26681

Sample Questions

Q1) User-access management is a subset of _____.

A) password protection

B) authorization management

C) data integrity management

D) managerial control

Q2) _____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

A) Integrity

B) Compliance

C) Availability

D) Confidentiality

Q3) A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

Q4) A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

A)True

B)False

Q5) A(n) _____ physically stores the database's data.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Turn static files into dynamic content formats.

Create a flipbook