What is the best key-value database?

Database Management system h.w. questions. Please help?

  • A set of requirements that is necessary to support the operations of a particular database user is known as a(n) ____. a. user view c. user attribute b. user table d. user field ____ 12. The properties of the entities you choose as you design the user view will become the ____ in the appropriate tables. a. rows c. data b. columns d. DBMS ____ 13. If each employee works in a single department and each department has only one employee, the relationship between employees and departments is ____. a. one-to-one c. many-to-one b. one-to-many d. many-to-many ____ 14. A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a person’s Social Security number. a. surrogate key c. artificial key b. weak entity d. natural key ____ 15. Combining the following two tables would result in ____. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum) Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip) a. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, (Street, City, Zip) ) b. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, Zip) c. Employee (EmployeeNum, LastName, FirstName, Street, City State, Zip, WageRate, SocSecNum) d. Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, EmployeeNum, LastName, FirstName, Street, City, State, Zip ) ____ 16. Convert the following table to first normal form: Branch (BranchNum, BranchName, (BookCode, Title, OnHand) ) a. Branch (BranchNum, BranchName) Book (BookCode, Title) b. Branch (BranchNum, BranchName) c. Book (BookCode, Title) d. Branch (BranchNum, BranchName, BookCode, Title, OnHand ) ____ 17. When implementing the physical-level design, for secondary keys, you must ensure that it is possible to retrieve data rapidly on the basis of a value of the ____ key. a. primary c. alternate b. secondary d. foreign ____ 18. After the information-level design is completed, ____ is the next step. a. The physical-level design c. The DBMS-level design b. The modality-level design d. The table-level design ____ 19. In the standard E-R diagrams, relationships are drawn as ____, with lines connecting the entities involved in relationships. a. rectangles c. circles b. diamonds d. squares ____ 20. An entity that exists to implement a many-to-many relationship is called a(n) ____. a. composite entity c. complicated entity b. complex entity d. circular entity ____ 21. ____ means that an entity has a minimum cardinality of one. a. The entity is required in the relationship. b. The entity is not required in the relationship. c. The entity should not be in the relationship as an attribute. d. The entity must be listed with all ones in the data fields. ____ 22. Data about the data in a database is known as ____. a. backup c. metadata b. hyperdata d. rollback ____ 23. ____ denies access by other users to data while the DBMS processes one user's updates to the database. a. Batch processing c. Journaling b. Biometrics d. Locking ____ 24. If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ____. a. commit c. deadlock b. timestamp d. transaction ____ 25. ____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect. a. Recovery c. Encryption b. Concurrent update d. Batch processing ____ a database reverses encryption. a. Locking c. Synchronizing b. Decrypting d. Timestamping ____ 27. A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____. a. DBMS name c. password b. DBA right d. table name ____ 28. ____ identify users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics. a. Passwords c. Econometrics b. Data dictionaries d. Biometrics ____ 29. A(n) ____ is a snapshot of certain data in a database at a given moment in time. a. encryption c. authorization b. authentication d. view ____ 30. ____ locks forbid any other user from accessing the data in any way. a. Shared c. Limited b. Exclusive d. Concurrent ____ integrity is the constraint that says that the values in foreign keys must match values already in the database. a. Parallel c. Conditional b. Relational d. Referential ____ 32. The ____ establishes the naming conventions for tables, fields, and indexes in the data dictionary. a. users c. DBA b. DBMS d. programmers ____ 33. After the database designers complete the information-level design, the DBA does the ____-level design. a. physical c. logical b. information d. graphical

  • Answer:

    you do know if we answer this what ever grade you get, you wouldn't deserve right?

Angelina at Yahoo! Answers Visit the source

Was this solution helpful to you?

Related Q & A:

Just Added Q & A:

Find solution

For every problem there is a solution! Proved by Solucija.

  • Got an issue and looking for advice?

  • Ask Solucija to search every corner of the Web for help.

  • Get workable solutions and helpful tips in a moment.

Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.