View the step-by-step solution to:

Question

Question 1

  1. On a client/server network, the server is a computer that provides data to the

clients.

  • True
  • False

  • 1 points 

    Question 2

    1. In ____ systems, data and actions are encapsulated.
    2. a. parallel
    3. b. network
    4. c. object-oriented
    5. d. relational

    1 points 

    Question 3

    1. If the client, in a client/server system, performs the business functions (calculations, etc.), then this client is known as a(n) ____.
    2. a. minimum client
    3. b. maximum client
    4. c. fat client
    5. d. thin client

    1 points 

    Question 4

    1. When the data is organized by entity rather than by the application that uses the data, it is called ____.
    2. a. table-oriented
    3. b. column-oriented
    4. c. row-oriented
    5. d. subject-oriented

    1 points 

    Question 5

    1. If each employee works in a single department and each department has only one employee, the relationship between employees and departments is ____.
    2. a. one-to-one
    3. b. many-to-many
    4. c. one-to-many
    5. d. many-to-one

    1 points 

    Question 6

    1. The following is an example of DBDL documentation for an Employee table ____.
    2. a. Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip, (WageRate, SocSecNum, DepartmentNum) )
    3. b. Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip, WageRate, SocSecNum, DepartmentNum)
    4. AK SocSecNum
    5. SK LastName
    6. FK DepartmentNum ® Department
    7. c. Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip)
    8. d. Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip)

    1 points 

    Question 7

    1. One guideline for writing programs for concurrent updates in a PC-based DBMS states that if an update transaction must lock more than one row in the same table, the whole table must be locked.
    2. True
    3. False

    1 points 

    Question 8

    1. The DBMS accomplishes ____ by reading the log for the problem transactions and applying the before images to undo their updates.
    2. a. concurrent update
    3. b. authentication
    4. c. backward recovery
    5. d. batch processing

    1 points 

    Question 9

    1. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum)
    2. Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip)
    3. If you combine the two tables shown above, the result would be ____.
    4. a. Employee (EmployeeNum, LastName, FirstName, Street, City State, Zip, WageRate, SocSecNum)
    5. b. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, EmployeeNum, LastName, FirstName, Street, City, State, Zip )
    6. c. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, Zip)
    7. d. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, (Street, City, Zip) )

    1 points 

    Question 10

    1. The information-level design methodology involves representing the individual user view as a collection of tables, refining them to eliminate any problems, and then merging them into a cumulative design.
    2. True
    3. False

    1 points 

    Question 11

    1. ____ contain information about table relationships, views, indexes, users, privileges, and replicated data.
    2. a. Workgroups
    3. b. Journals
    4. c. Datalists
    5. d. Catalogs

    1 points 

    Question 12

    1. In DBDL, you represent a table by listing all columns and then underlining the primary key.
    2. True
    3. False

    1 points 

    Question 13

    1. A column that you create for an entity to serve solely as the primary key and that is visible to users is called a(n) ____.
    2. a. natural key
    3. b. surrogate key
    4. c. artificial key
    5. d. synthetic key

    1 points 

    Question 14

    1. The second step in creating a user view is to normalize the tables.
    2. True
    3. False

    1 points 

    Question 15

    1. A table is in first normal form if it does not contain ____.
    2. a. repeating groups
    3. b. dependencies
    4. c. a primary key
    5. d. anomalies

    1 points 

    Question 16

    1. ____ integrity implies that the value entered for any field should be consistent with the data type for that field.
    2. a. Format
    3. b. Data type
    4. c. Secondary
    5. d. Legal value

    1 points 

    Question 17

    1. Potential problems in the design of a relational database are known as ____.
    2. a. modification anomalies
    3. b. relational anomalies
    4. c. update anomalies
    5. d. select anomalies

    1 points 

    1 points 

    Question 19

    1. An alternate key is a ____.
    2. a. surrogate key
    3. b. row that could be a primary key but was not chosen
    4. c. column that could be a primary key but was not chosen
    5. d. natural key

    1 points 

    Question 20

    1. In a DDBMS, the site where the user is located is called the local site.
    2. True
    3. False

    1 points 

    Question 21

    1. An alternative to the primary key of a table is listed with the ____ abbreviation in DBDL.
    2. a. FK
    3. b. AK
    4. c. PK
    5. d. SK

    1 points 

    Question 22

    1. The catalog is maintained by ____.
    2. a. the user
    3. b. the author of the tables in the database
    4. c. the DBMS
    5. d. the database administrator

    1 points 

    Question 23

    1. The more important it is to avoid redoing work, the more often you should make backups.
    2. True
    3. False

    1 points 

    Question 24

    1. A table that is in first normal form is better than one that is in second normal form.
    2. True
    3. False

    1 points 

    Question 25

    1. Partial dependencies are dependencies on only a portion of the ____.
    2. a. first column or attribute
    3. b. intelligent key
    4. c. index key
    5. d. primary key

    1 points 

    Question 26

    1. After the information-level design is completed, the ____ is the next step.
    2. a. table-level design
    3. b. modality-level design
    4. c. DBMS-level design
    5. d. physical-level design

    1 points 

    Question 27

    1. Second normal form can be defined as a table that is in first normal form but that contains no ____.
    2. a. nonkey columns
    3. b. alternate keys
    4. c. interrelation constraints
    5. d. partial dependencies

    1 points 

    Question 28

    1. In some database systems, such as Microsoft Access, users can access and update metadata about fields, tables, relationships, and indexes.
    2. True
    3. False

    1 points 

    Question 29

    1. ____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.
    2. a. Replication
    3. b. Commit
    4. c. Recovery
    5. d. Rollback

    1 points 

    Question 30

    1. Data about the data in a database is known as ____.
    2. a. hyperdata
    3. b. basedata
    4. c. metadata
    5. d. universaldata

    1 points 

    Question 31

    1. A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a person's Social Security number.
    2. a. natural key
    3. b. synthetic key
    4. c. surrogate key
    5. d. artificial key

    1 points 

    Question 32

    1. Removal of repeating groups is the starting point in the quest to create tables that are as free of problems as possible.
    2. True
    3. False

    1 points 

    Question 33

    1. Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.
    2. a. single-tier architecture
    3. b. two-tier architecture
    4. c. three-tier architecture
    5. d. four-tier architecture

    1 points 

    Question 34

    1. In the standard E-R diagrams, relationships are drawn as ____, with lines connecting the entities involved in relationships.
    2. a. circles
    3. b. rectangles
    4. c. squares
    5. d. diamonds

    1 points 

    Question 35

    1. If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ____.
    2. a. timestamp
    3. b. deadlock
    4. c. commit
    5. d. transaction

    1 points 

    Question 36

    Recently Asked Questions

    Why Join Course Hero?

    Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

    • -

      Study Documents

      Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

      Browse Documents
    • -

      Question & Answers

      Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

      Ask a Question
    Let our 24/7 Computer Science tutors help you get unstuck! Ask your first question.
    A+ icon
    Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
    Answers in as fast as 15 minutes
    A+ icon
    Ask Expert Tutors