QUESTION 4 First normal form disallows: composite attributes multivalued attribu
ID: 3711900 • Letter: Q
Question
QUESTION 4
First normal form disallows:
composite attributes
multivalued attributes
nested relations
All of the above.
3 points
QUESTION 5
Second normal form all attributes depend on nothing but the key.
True
False
3 points
QUESTION 6
Indexes are used to speed up record retrieval in response to certain search conditions
True
False
3 points
QUESTION 7
Index structures do not provide secondary access paths
True
False
3 points
QUESTION 8
Any field can be used to create an index
True
False
3 points
QUESTION 9
A ________ Index is an order file with two fields. A primary Key and a pointer to a disk block.
3 points
QUESTION 10
Dynamic multilevel indexes use B trees.
True
False
3 points
QUESTION 11
You cannot do indexes on multiple attributes.
True
False
3 points
QUESTION 12
_______ indexes are another type of index.
3 points
QUESTION 13
An index used in SQL server that uses all of the fields in a query is called a _________ index.
3 points
QUESTION 14
A transaction is a local unit of database processing.
True
False
3 points
QUESTION 15
The lost update problem is:
Occurs when two transactions that access the same database items have operations in sequence.
Occurs when two transactions that access the same database items have operations interleaved.
Occurs when two transactions that access the same database items have operations out of order.
Occurs when two transactions that access the same database items have operations that are distinct from each other.
3 points
QUESTION 16
The _________ log keeps track or transaction operations.
3 points
QUESTION 17
ACID means
Atomicity, Concurrency, isolation, and durability.
Atomicity, Concurrency, independent, and durability.
Atomicity, conistency, isolation, and durability.
Atomicity, Concurrency, isolation, and dependability.
3 points
QUESTION 18
repeatable read is the highest level of transaction support that allows no dirty reads, nonrepeatable reads, or phantoms to occur.
True
False
3 points
QUESTION 19
Serializable is the highest level of transaction support that allows no dirty reads, nonrepeatable reads, or phantomsto occur.
True
False
3 points
QUESTION 20
A ________ follows an event-condition-action model.
3 points
QUESTION 21
Temporal databases require some aspect of time when organizing information.
True
False
3 points
QUESTION 22
Time is not considered as an ordered sequence of points.
True
False
3 points
QUESTION 23
bitemporal time uses:
uses valid time and transaction time
uses space time and transaction time
uses valid time and trigger time
uses valid time and invalid time
3 points
QUESTION 24
Spatial databases support information about objects in time.
True
False
3 points
QUESTION 25
Spatial databases support information about objects in multidimensional space.
True
False
3 points
QUESTION 26
A ____________ database uses facts and rules.
3 points
QUESTION 27
XML and JSON
use self describing documents
dynamic web pages
all of the above
none of the above.
3 points
QUESTION 28
Conditions for well formed XML documents
Begins with XML declaration
Syntaxically correct
Valid (must follow a particular schema)
All of the above.
3 points
QUESTION 29
A XML ___________ defines a set of commands that can be used.
3 points
QUESTION 30
XML Query language standards are
Xpath
Xquery
none of the above
both 1 and 2 are correct.
3 points
QUESTION 31
XML Queries may use a ________ expression.
3 points
QUESTION 32
NOSQL means
Not only SQL
Never a SQL
T-SQL
PL/SQL
3 points
QUESTION 33
Cassandra
uses concepts from both key value store and column-bases systems.
uses concepts from onlykey value store .
uses concepts from column-bases systems.
none of the above.
3 points
QUESTION 34
Neo4j is a graph bases NOSQL system.
True
False
3 points
QUESTION 35
Voldemort is a
on demand system
open source key value system
undesirable attribute in a database
row based sql system
3 points
QUESTION 36
Hbase stored multiple versions of data items.
True
False
3 points
QUESTION 37
Hbase does not use apache zookeeper and HDFS.
True
False
3 points
QUESTION 38
Marklogic is a XML bases NOSQL database that uses Xquery.
True
False
3 points
QUESTION 39
To insert a lot of data into a marklogic database.
have a lot of people key in the data.
use the marklogic data pump.
use T-SQL
use PL/SQL
3 points
QUESTION 40
Marklogic uses both d-nodes and e-nodes in a cluster.
True
False
3 points
QUESTION 41
Data Mining is the discovery of new information in term of patterns or rules from vast amounts of data.
True
False
3 points
QUESTION 42
A _____ _______ is a historical database designed for decision support.
3 points
QUESTION 43
Classification is not the process of learning a model that is able to describe different classes of data.
True
False
3 points
QUESTION 44
______ Clusering is a popular data mining algorithm.
3 points
QUESTION 45
Some commerical data mining tools are:
Intelligent miner
Polyanalyst
Enterprise miner
all of the above
3 points
QUESTION 46
Database security is NOT a broad area, it is very specific.
True
False
3 points
QUESTION 47
Some types of database control measures are:
Access control
Inference control
Flow control
All of the above
3 points
QUESTION 48
The concept of privacy goes beyond security.
True
False
3 points
QUESTION 49
The most common threat to a database system is _____ ________.
3 points
QUESTION 50
Risks associated with SQL Injection:
Denial of Service
T-SQL not working.
Oracle not being able to sell products.
ACID being upheld.
composite attributes
multivalued attributes
nested relations
All of the above.
Explanation / Answer
If you post more than 1 question, as per chegg guidelines I have to solve only first question.
Ques 4. Answer : (d) All of the above
1NF states that the domain of an attribute should only contain atomic value i.e : only single values. So, there should no attributes which is composite, multivalued ot nested.
Ques 5. False
They can also depend on other attributes besids the key.
Ques 35 Answer : (b) open source key value system
Voldermort is a distributed key-value storage system
Ques 49. Excessive Priveledges
If there are a lot of priveledges to the database, then the security of the database is at risk as someone can get into the database and misuse the information.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.