Deck 3: The Relational Model: SQL

Full screen (f)
exit full mode
Question
In Microsoft Access, you can identify all the objects that depend on a particular query, as well as all the objects that the query depends on.
Use Space or
up arrow
down arrow
to flip the card.
Question
Some enterprise-level systems refer to the catalog as the _____.

A)data dictionary
B)journal
C)data log
D)before image
Question
In an enterprise-level DBMS, each task that a user completes, such as selecting a product for an order, is called a _____.

A)snapshot
B)replica
C)transaction
D)branch
Question
What type of database update occurs when multiple users make updates to the same database at the same time?

A)batch
B)random
C)sequential
D)concurrent
Question
_____ is the process of returning a database that has encountered a problem to a state known to be correct.

A)Committing
B)Recovery
C)Cataloging
D)Isolating
Question
One of the key services of a DBMS is to analyze overall hard drive usage.
Question
Many database management systems maintain catalogs of information as special, hidden tables.
Question
Which of the following is information that Access system catalogs do not maintain?

A)tables and fields included in the database
B)properties of the relationships between tables
C)indexed fields
D)users, user groups, and privileges
Question
In a database catalog, _____ includes information about table relationships, views, indexes, and properties.

A)an after image
B)metadata
C)authentication
D)a transaction
Question
How does Access handle concurrent updates?

A)with file-level locking
B)with record-level locking
C)restricting the database to one user at a time
D)through timestamping
Question
_____ occurs when multiple users make updates to the same database at the same time.

A)Data recovery
B)Atomicity
C)Concurrent update
D)Rollback
Question
Microsoft Access allows concurrent updates to different records of the same table.
Question
Which of the following is information that the Access Database Documenter does not provide?

A)all objects in the database
B)relationships between tables
C)fields in each table
D)data in each field
Question
Database security can be defined as prevention of changes to the structure of a database.
Question
_____ are actions that are performed on resources or files at the server.

A)HTTP methods
B)SQL keywords
C)Solution stacks
D)SQL scripts
Question
Which of the following Access tools shows the database schema?

A)system catalog
B)Navigation pane
C)Relationship report
D)Object Dependencies pane
Question
A(n) _____ contains software components that are well documented and have a proven track record of working well together.

A)solution stack
B)web app
C)enterprise-level system
D)HTTP method
Question
Which of the following is not a common service provided by a database management system?

A)Update and retrieve data.
B)Provide catalog services.
C)Recover data.
D)Format user views, forms, and reports.
Question
Which of the following is a database-as-a-service product?

A)Apache Database Service
B)SQL Server
C)Amazon Relational Database Service
D)Oracle
Question
The acronym CRUD stands for _____.

A)commit, recover, undo, and decrypt
B)catalog, report, user, data
C)create, read, update, and delete
D)credentials, read-only, unique, double
Question
Which Access feature restricts a field to a special format for entering data?

A)Validation Text property
B)Input Mask
C)Object Dependencies
D)Lookup properties
Question
Which authentication tool identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

A)smart cards
B)data dictionaries
C)authorization
D)biometrics
Question
What Access tool can you use to find and fix corrupt data within a database?

A)Database Documenter
B)Validation properties
C)Compact and Repair
D)Back Up Database
Question
For which of the following tasks is data independence not a consideration?

A)changing a field property
B)modifying relationships
C)adding a new field
D)updating a record
Question
Which of the following does a DBMS log typically not include for each transaction?

A)user responsible for the transaction
B)before image
C)after image
D)transaction ID
Question
Which Microsoft Access tool helps you identify all objects dependent on a particular table, query, form, or report?

A)Object Dependencies
B)Relationship report
C)Navigation pane
D)Database Dependencies
Question
What type of constraints help to ensure the accuracy and consistency of field values?

A)key integrity constraints
B)security constraints
C)referential constraints
D)data integrity constraints
Question
If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?

A)legal values
B)fieldname
C)expression
D)integrity
Question
To support data independence, you should _____ in an SQL SELECT command.

A)use the * (asterisk) wildcard to represent all fields
B)avoid using more than five fields
C)explicitly list all the required fields
D)only list fields from a single table
Question
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

A)data type
B)legal value
C)format
D)secondary
Question
In Microsoft Access, what do you need to decrypt an encrypted database?

A)128-bit decryption software
B)a password
C)an administrator account
D)backup software
Question
When you run a recovery program that applies the after images of committed transactions from the log to bring a database up to date, what method of recovery are you using?

A)after recovery
B)forward recovery
C)backward recovery
D)rollback
Question
Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?

A)biometrics
B)sign-in
C)smart card
D)password
Question
Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?

A)field independence
B)data independence
C)data integrity constraints
D)key integrity constraints
Question
What technique is used to identify the person who is attempting to access the DBMS?

A)encryption
B)authentication
C)synchronization
D)viewing
Question
What do key integrity constraints consist of?

A)smart card limitations
B)primary key and alternate key constraints
C)primary key and foreign key constraints
D)authorization permissions
Question
Which Microsoft Access feature do you use to set legal value constraints?

A)Format
B)Data Macros
C)data type assignment
D)Validation Text property
Question
Which of the following is not a common security feature used by database management systems?

A)encryption
B)backward recovery
C)authentication
D)authorization
Question
Which of the following features does an enterprise-level DBMS use to avoid the costly and time-consuming task of having users redo their work?

A)encryption
B)record-level locking
C)phantom reads
D)journaling
Question
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?

A)encryption
B)authentication
C)authorization
D)privacy
Question
What do you call applying and reconciling updates from various copies of a database with the master copy?

A)synchronization
B)replication
C)atomicity
D)authentication
Question
Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.
Question
Identify the type of change that generally requires the most rework to existing programs and queries in a database and explain whether making the change is worthwhile.
Question
_____ is a popular website for hosting projects that use the Git language for version control.

A)WINS
B)Amazon Relational Database Service
C)BitBucket
D)HTTP
Question
_____ means that a copy of a database is distributed to other computers or locations.

A)Data independence
B)Database replication
C)Database integrity
D)Data recovery
Question
Compare traditional database replication with distributed databases.
Question
Explain how privacy and security are related and give two examples of federal requirements for keeping data private.
Question
Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.
Question
What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy?

A)traditional database replication
B)distributed database model
C)local database model
D)enterprise replication
Question
Which of the following demonstrates the concept of a distributed database?

A)ACID
B)Git
C)CRUD
D)LAMP
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: The Relational Model: SQL
1
In Microsoft Access, you can identify all the objects that depend on a particular query, as well as all the objects that the query depends on.
True
2
Some enterprise-level systems refer to the catalog as the _____.

A)data dictionary
B)journal
C)data log
D)before image
A
3
In an enterprise-level DBMS, each task that a user completes, such as selecting a product for an order, is called a _____.

A)snapshot
B)replica
C)transaction
D)branch
C
4
What type of database update occurs when multiple users make updates to the same database at the same time?

A)batch
B)random
C)sequential
D)concurrent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
_____ is the process of returning a database that has encountered a problem to a state known to be correct.

A)Committing
B)Recovery
C)Cataloging
D)Isolating
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
One of the key services of a DBMS is to analyze overall hard drive usage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Many database management systems maintain catalogs of information as special, hidden tables.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is information that Access system catalogs do not maintain?

A)tables and fields included in the database
B)properties of the relationships between tables
C)indexed fields
D)users, user groups, and privileges
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In a database catalog, _____ includes information about table relationships, views, indexes, and properties.

A)an after image
B)metadata
C)authentication
D)a transaction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
How does Access handle concurrent updates?

A)with file-level locking
B)with record-level locking
C)restricting the database to one user at a time
D)through timestamping
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
_____ occurs when multiple users make updates to the same database at the same time.

A)Data recovery
B)Atomicity
C)Concurrent update
D)Rollback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Microsoft Access allows concurrent updates to different records of the same table.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is information that the Access Database Documenter does not provide?

A)all objects in the database
B)relationships between tables
C)fields in each table
D)data in each field
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Database security can be defined as prevention of changes to the structure of a database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
_____ are actions that are performed on resources or files at the server.

A)HTTP methods
B)SQL keywords
C)Solution stacks
D)SQL scripts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following Access tools shows the database schema?

A)system catalog
B)Navigation pane
C)Relationship report
D)Object Dependencies pane
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) _____ contains software components that are well documented and have a proven track record of working well together.

A)solution stack
B)web app
C)enterprise-level system
D)HTTP method
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a common service provided by a database management system?

A)Update and retrieve data.
B)Provide catalog services.
C)Recover data.
D)Format user views, forms, and reports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a database-as-a-service product?

A)Apache Database Service
B)SQL Server
C)Amazon Relational Database Service
D)Oracle
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The acronym CRUD stands for _____.

A)commit, recover, undo, and decrypt
B)catalog, report, user, data
C)create, read, update, and delete
D)credentials, read-only, unique, double
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Which Access feature restricts a field to a special format for entering data?

A)Validation Text property
B)Input Mask
C)Object Dependencies
D)Lookup properties
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which authentication tool identifies users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics?

A)smart cards
B)data dictionaries
C)authorization
D)biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
What Access tool can you use to find and fix corrupt data within a database?

A)Database Documenter
B)Validation properties
C)Compact and Repair
D)Back Up Database
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
For which of the following tasks is data independence not a consideration?

A)changing a field property
B)modifying relationships
C)adding a new field
D)updating a record
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following does a DBMS log typically not include for each transaction?

A)user responsible for the transaction
B)before image
C)after image
D)transaction ID
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which Microsoft Access tool helps you identify all objects dependent on a particular table, query, form, or report?

A)Object Dependencies
B)Relationship report
C)Navigation pane
D)Database Dependencies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What type of constraints help to ensure the accuracy and consistency of field values?

A)key integrity constraints
B)security constraints
C)referential constraints
D)data integrity constraints
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?

A)legal values
B)fieldname
C)expression
D)integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
To support data independence, you should _____ in an SQL SELECT command.

A)use the * (asterisk) wildcard to represent all fields
B)avoid using more than five fields
C)explicitly list all the required fields
D)only list fields from a single table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

A)data type
B)legal value
C)format
D)secondary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In Microsoft Access, what do you need to decrypt an encrypted database?

A)128-bit decryption software
B)a password
C)an administrator account
D)backup software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
When you run a recovery program that applies the after images of committed transactions from the log to bring a database up to date, what method of recovery are you using?

A)after recovery
B)forward recovery
C)backward recovery
D)rollback
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?

A)biometrics
B)sign-in
C)smart card
D)password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?

A)field independence
B)data independence
C)data integrity constraints
D)key integrity constraints
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
What technique is used to identify the person who is attempting to access the DBMS?

A)encryption
B)authentication
C)synchronization
D)viewing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What do key integrity constraints consist of?

A)smart card limitations
B)primary key and alternate key constraints
C)primary key and foreign key constraints
D)authorization permissions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which Microsoft Access feature do you use to set legal value constraints?

A)Format
B)Data Macros
C)data type assignment
D)Validation Text property
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is not a common security feature used by database management systems?

A)encryption
B)backward recovery
C)authentication
D)authorization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following features does an enterprise-level DBMS use to avoid the costly and time-consuming task of having users redo their work?

A)encryption
B)record-level locking
C)phantom reads
D)journaling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?

A)encryption
B)authentication
C)authorization
D)privacy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What do you call applying and reconciling updates from various copies of a database with the master copy?

A)synchronization
B)replication
C)atomicity
D)authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Identify the type of change that generally requires the most rework to existing programs and queries in a database and explain whether making the change is worthwhile.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
_____ is a popular website for hosting projects that use the Git language for version control.

A)WINS
B)Amazon Relational Database Service
C)BitBucket
D)HTTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
_____ means that a copy of a database is distributed to other computers or locations.

A)Data independence
B)Database replication
C)Database integrity
D)Data recovery
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Compare traditional database replication with distributed databases.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain how privacy and security are related and give two examples of federal requirements for keeping data private.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy?

A)traditional database replication
B)distributed database model
C)local database model
D)enterprise replication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following demonstrates the concept of a distributed database?

A)ACID
B)Git
C)CRUD
D)LAMP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.