Which of the following functionsare NOT performed by a database administrator? 1
ID: 3615300 • Letter: W
Question
Which of the following functionsare NOT performed by a database administrator?
1) The EntityRelation Model models
a) Entities, Relationships and Processes
b) Entities and Relationships
c) Relationships
d) Entities
2) Softwarepackages designed to store and manage databases
a) Database
b) DBMS
c) Data model
d) Data
3) The mostwidely used conceptual model is the ____ model.
a) implementation
b) ER
c) Object Oriented
d) internal
Which feature of database provides conversion frominconsistent state of DB to a consistent state ensuring minimum data loss?
a) User accessible catalog
b) Data processing
c) Recovery service
d) Authorization service
Which of the following is INCORRECT statement concerning thedatabase design process?
a) During requirements collection and analysis phase, one cangather the data requirements of database users.
b) By referring to a high level data model, it is possible tounderstand the data requirements of the users, entity types, relationships andconstraints.
c) Transformation of the high level data model into theimplementation data model is called logical design or data model mapping.
d) During the logical design phase of internal storagestructures, access paths and file organization for the database files arespecified.
An instance is
a) a particular occurance of an entity
b) a special type of relation
c) an attribute of an entity
d) any particular entity
A Foreign Key is
a) A field in a table that matches a key field in another table
b) A field in a table that contains data that is also containedelsewhere in another table
c) A field in a table that has the same name as a key field inanother table
d) A field in a table that has the same name as a key field inanother table
A________is used to maintain a connection between the usersof the database system.
a) mail server
b) file server
c) client-server
d) none of the given
Making a change to the conceptual schema of a database butnot affecting the existing external schemas is an example of
a) Physical data independence
b) Logical data independence
c) Functional dependency
d) Concurrency control
Controlling redundancy in a database management system DOESNOT help to
a) avoid duplication
b) avoid unnecessary wastage of storagespace
c) avoid unauthorised access to data
d) avoid inconsistency among data
Which of the following functions are NOT performed by adatabase administrator?
a) Planning, designing and implementingdatabase systems
b) Establishing standards and procedures for database systems
c) Communicating with database users
d) Allocation of storage locations and data structures
Within a table, each primary key value ____.
a) is a minimal superkey
b) is always the first field in each table
c) must be numeric
d) must be unique
Who is responsible for authorizing access to the database,for coordinating and monitoring its use?
a) Database Designer
b) Da
Explanation / Answer
Which of the following functionsare NOT performed by a database administrator?
2) Software packages designed to store and manage databases
b) DBMS
3) The mostwidely used conceptual model is the ____ model.
c) Object Oriented
Which of the following is INCORRECT statement concerning thedatabase design process?
d) During the logical design phase ofinternal storage structures, access paths and file organization forthe database files are specified.
An instance is
a) a particular occurance of anentity
A Foreign Key is
a) A field in a table that matches akey field in another table
A________is used to maintain a connection between the users ofthe database system.
d) none of the given
Which of the following functions are NOT performed by a databaseadministrator?
c) Communicating with databaseusers
Within a table, each primary key value ____.
d) must be unique
Who is responsible for authorizing access to the database, forcoordinating and monitoring its use?
b) Database Administrator
A primary key is an attribute (or set of attributes) that hasbeen chosen for an entity, whose values are used to uniquelyidentify a particular instance of an entity.
a) True
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.