Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The creation of intermediate entities occurs during the logical database design phase for an enterprise. It is used to resolve which types of relationships?

A.

One-to-many and recursive

B.

Complex, recursive, and many-to-many

C.

Redundant, recursive, and one-to-many

D.

One-to-many and one-to-one

Full Access
Question # 5

Consider the following database information:

domain s_id: integer domain grd: fixed length

character string length 1

STUDENT_GRADE(

Student_Number: s_id NOT NULL

Grade: grd ) Primary Key

Student_Number

During which phase of the database design process would this information be developed?

A.

Logical

B.

Physical

C.

Conceptual

D.

Implementation

Full Access
Question # 6

The exhibit shows a table called Recreation Relation that relates a unique student identification number and a sports activity with a fee for participating in that activity. The Student_ID and Activity columns in the table are used together as a composite key. Which statement about the relation is correct?

A.

Activity_Fee is a determinant of Activity.

B.

Activity_Fee is partially dependent on the key.

C.

The table contains a transitive dependency.

D.

Activity_Fee is a determinant of Activity and Student_ID.

Full Access
Question # 7

Which of the following best describes the information contained in the data dictionary (or system catalog)?

A.

Metadata

B.

Data model

C.

Table data

D.

Metafile

Full Access
Question # 8

Which relational algebraic operation is used to select specific columns (attributes) from a relation?

A.

Union

B.

Difference

C.

Projection

D.

Intersection

Full Access
Question # 9

Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?

A.

Backups

B.

User views

C.

Encryption

D.

Integrity controls

Full Access
Question # 10

NULL) Primary Key Class_Num

Consider the Information Engineering diagram shown in the exhibit. Which DBDL definition best describes this diagram?

A.

BUILDING(Building_ID, Bldg_Name, Location, Room_Count)

Primary Key Building_ID RESIDENT(R_ID, Room_Num,

Res_Name, Building_ID) Primary Key R_ID

B.

BUILDING(Building_ID, Bldg_Name, Location, Room_Count)

Primary Key BUILDING RESIDENT(R_ID, Room_Num,

Res_Name, Building_ID) Primary Key RESIDENT

C.

BUILDING(Building_ID, Bldg_Name, Location, Room_Count) Primary Key BUILDING ForeignKey BUILDING(Building_ID) references RESIDENT(Building_ID) RESIDENT(R_ID, Room_Num, Res_Name, Building_ID) Primary Key RESIDENT

D.

BUILDING(Building_ID, Bldg_Name, Location, Room_Count)

Primary Key Building_ID RESIDENT(R_ID, Room_Num,

Res_Name, Building_ID) Primary Key R_ID Foreign Key

Building_ID references BUILDING(Building_ID)

Full Access
Question # 11

Your enterprise has created a database and database application. The testing phase for the project has started. Which of the following best describes white-box testing of the projects software?

A.

The database designer tests the software because he or she is able to make necessary changes to the underlying code for the software.

B.

A user who has no knowledge of the softwares underlying code tests the software.

C.

Someone other than the database designer tests the software. This person has no access to the underlying code and attempts to use the software only in ways not considered by the software designers.

D.

A person tests the software and submits suggestions to the software's underlying code. This person is someone other than the database designer, but has access to the softwares underlying code.

Full Access
Question # 12

Which database security technique prevents invalid data from being entered into the database?

A.

File locking

B.

User authorization

C.

Parity checks

D.

Integrity controls

Full Access
Question # 13

Which characteristic is an advantage of a database management system?

A.

Data files are owned and maintained by the users.

B.

Database administration is simplified.

C.

A standard method can be used to access the database.

D.

Data is decentralized.

Full Access
Question # 14

The exhibit shows a table called Housing Relation that relates a unique student identification number with a dormitory building and a room fee for that building. Each building charges only one fee and a student can live in only one building. The key for the Housing Relation is Student_ID.

This table is in which normal form?

A.

1NF

B.

1NFand2NF

C.

1NF,2NFand3NF

D.

1NF,2NF,3NFandBCNF

Full Access
Question # 15

Consider the Recreation relation shown in the exhibit. You need to apply a SQL statement to the

Recreation relation that will return the following data:

Which SQL statement applied to the Recreation relation will return this data?

A.

SELECT Activity FROM Recreation;

B.

SELECT DISTINCT Activity FROM Recreation;

C.

SELECT Activity FROM Recreation

WHERE NOT LIKE Activity;

D.

SELECT Activity FROM Recreation

WHERE DISTINCT Activity;

Full Access
Question # 16

Which of the following occurs in a relation when records are added or removed?

A.

The number of domains changes.

B.

The attributes in the domain change.

C.

The cardinality of the relation is fixed but the degree varies.

D.

The degree of the relation is fixed but the cardinality varies.

Full Access
Question # 17

Which type of dependency occurs when one attribute of a composite key is removed and the dependency still exists?

A.

1:1

B.

Transitive

C.

Functional

D.

Partial functional

Full Access
Question # 18

What improvement can be made to file-based databases to overcome their limitations?

A.

Implement a tabular structure.

B.

Gather files in a distributed repository.

C.

Use a hierarchical database file system.

D.

Tightly couple database structure to database application programs.

Full Access