- One strategy to manage deadlocks is to let them occur and then have the DBMS detect and
break any deadlock.
- ____ is the ability of a computer system to continue to function well as utilization of the system increases.
- a. Data mining
- b. Scalability
- c. Polymorphism
- d. Data fragmentation
- A set of requirements that is necessary to support the operations of a particular database user is known as a(n) ____.
- a. user system
- b. user snapshot
- c. user view
- d. user window
- The ____ is a column (or collection of columns) A such that all other columns are functionally dependent on A and no subcollection of the columns in A has this property.
- a. functional key
- b. composite key
- c. primary key
- d. declared key
- In two-phase locking, the second phase is the shrinking phase.
- A column is a nonkey column if it is ____.
- a. a part of the primary key
- b. in second normal form
- c. not a part of the primary key
- d. in first normal form
- A(n) ____ is a column or collection of columns on which all columns in the table are functionally dependent.
- a. special key
- b. candidate key
- c. index key
- d. major key
- If there is more than one possible choice for the primary key, and one of the possibilities is chosen to be the primary key, the other choices are referred to as ____.
- a. contributory keys
- b. surrogate keys
- c. alternate keys
- d. intelligent keys
- When designing a database, you might find it helpful to design a(n) ____ to obtain the required information from users.
- a. survey form
- b. report
- c. IDEF1X diagram
- d. E-R diagram
- When a centralized database becomes unavailable for any reason, no users can continue processing. In contrast, if a local database in a distributed database becomes unavailable, only users who need that data are affected. Because of this, distributed databases have a(n) ____ advantage over a centralized database.
- a. increasing database capacity
- b. system availability
- c. local control of data
- d. added efficiency
- The properties of the entities you choose as you design the user view will become the ____ in the appropriate tables.
- a. rows
- b. records
- c. tuples
- d. columns
- When you use an E-R diagram to represent a database, it visually illustrates all the information listed in the DBDL.
- Computers in a network communicate through ____.
- a. notes
- b. messages
- c. tokens
- d. letters
- A distributed database is a single logical database that is physically divided among computers at several sites on a network.
- ____ implies that users should not need to be concerned with the location of any specific data in the database.
- a. Fragmentation transparency
- b. Update transparency
- c. Replication transparency
- d. Location transparency
- The basic relationships among entities are: one-to-many, many-to-many, and one-to-one.
- A(n) ____ is a snapshot of certain data in a database at a given moment in time.
- a. encryption
- b. authentication
- c. authorization
- d. view
- Each user transaction requires only one lock.
- If the primary key of a table contains only a single column, the table is automatically in third normal form.
- The fact that column B is functionally dependent on column A can be written as ____.
- a. B ® A
- b. B ® ® A
- c. A ® B
- d. A ® ® B
- A DDBMS that has at least two sites at which the local DBMSs are different is known as a ____.
- a. homogeneous DDBMS
- b. heterogeneous DDBMS
- c. holistic DDBMS
- d. heuristic DDBMS
- A global deadlock occurs at a single site in a distributed database.
- ____ implies that no site should depend on another site to perform its database functions.
- a. Continuous operation
- b. Local autonomy
- c. No reliance on a central site
- d. Fragmentation transparency
- Convert the following table to first normal form:
- Branch (BranchNum, BranchName, (BookCode, Title, CopyNum, Quality, Price) )
- a. Branch (BranchNum, BranchName, BookCode, Title, CopyNum, Quality, Price)
- b. Branch (BranchNum, BranchName)
- Book (BookCode, Title, CopyNum)
- c. Branch (BranchNum, BranchName)
- d. Book (BookCode, Title, Copynum)
- If users are unaware of fragmentation, the DDBMS has fragmentation transparency.
Solution: 37.True 38.b. Scalability 39.c. user view 40.c. primary key 41.True 42.c.not a part of the primary key 43.b.... View the full answer