Erstellt von Joshua Arteaga
vor mehr als 6 Jahre
|
||
Redundancy wastes space because you are storing different types of data in the same place.
When you need to change data, redundancy makes your changes more cumbersome
and time-consuming.
An entity is also defined as an attribute.
An attribute is a characteristic or property of an entity.
An attribute is known as a row in most databases.
A database will not only hold information about multiple types of entities, but also
information about the relationships among these multiple entities.
Each table in a database represents two or more entities.
The relationship between different entities (in different tables) is handled by their
common columns.
Software packages, called database management systems, can do the job of
manipulating databases for you.
Programs created with Visual Basic, Java, Perl, PHP, or C++ can access the database
directly, rather than having to access it through the DBMS.
To create forms to use with a database you must write a program.
Sharing data is one advantage of database processing.
An advantage of using the database approach to processing is that it facilitates
Consistency.
A DBA can assign passwords to prevent unauthorized users from accessing the data.
There is a greater impact of failure in a nondatabase, file-oriented system.
Storing the same data in more than one place is called ____.
A(n) ____ is also called a field or column in many database systems.
. A(n) ____ is a person, place, object, event, or idea for which you want to store and
process data.
A(n) ____ is the computer counterpart to an ordinary paper file you might keep in a
file cabinet or an accounting ledger.
The ____ of an entity become the columns in the database table.
Unlike a typical data file, a database can store information about multiple ____.
A visual way to represent a database is with a(n) ____.
Popular ____ include Access, Oracle, DB2, MySQL, and SQL Server.
During the ____ process, a database expert determines the structure of the required
database.
____ are screen objects used to maintain, view, and print data from a database.
. An integrity constraint is a rule that ____.
A database has ____ if the data in it satisfies all established integrity constraints.
____ is the prevention of unauthorized access to the database.
A(n) ____ frees programmers who write database access programs from having to engage in mundane data manipulation activities, such as adding new data and deleting existing data.
A person who is in charge of a database within an organization is often called the
database ___
A good ____ should provide an opportunity for users to incorporate integrity
constraints when they design the database.
A DBMS lets you assign users to ____.
____ is a property that lets you change the structure of the database without requiring
you to change the programs that access the database.
One disadvantage of a database system is
In a(n) ____________________ relationship between two entities, each occurrence of the first entity is related to many occurrences of the second entity and each occurrence of the second entity is related to only one occurrence of the first entity.
A program, or collection of programs, through which users interact with a database is
known as a(n) _
In an E-R diagram, ____________________ represent entities.
In an E-R diagram, ____________________ represent relationships between connected entities.
In an E-R diagram, the ____________________ at the end of a line indicates the “many” part of the one-to-many relationship between two entities.
A group of people in charge of a database within an organization is often called the
____________________.
The problem of inconsistency in data is a direct result of
Eliminating ____________________ not only saves space but also makes the process of
updating data much simpler.
A good _________________________ has many features that allow users to gain access
to data in a database without having to do any programming.
A database file requires a large amount of disk space and internal __________
A relational database handles entities, attributes, and relationships by storing each
entity in its own table.
The attributes of an entity become the fields or columns in a table
Each column in a table should have a unique name, and entries in each column should
all “match” this column name.
In a relation, the order of the columns is important.
In a relation, the order of rows is important.
A relational database is a collection of relations.
An unnormalized relation is a table that has more than one row.
A column whose value uniquely identifies a given row in the table is the secondary key.
A query is a question represented in a way that the DBMS can recognize and process.
QBE is a visual approach to writing queries.
Access automatically adds double quotation marks around values in the design grid that are formatted as Short Text fields when you run the query or move the insertion point to another cell in the design grid.
The comparison operators are +, *, %, and /.
The comparison operators are also known as relational operators.
In an AND criterion, the overall criterion is true if either of the individual criteria is true.
The concept of grouping means that statistics will be calculated for individual records.
A relation is a(n) ____.
Based on the statement below, which of the following is the primary key?
Rep (RepNum, LastName, FirstName, Street, City, State, PostalCode Commission,
Rate)
When duplicate column names exist in a database and you need to indicate the column
to which you are referring,
Rows are also called
The ____ key of a table is the column or collection of columns that uniquely identifies
a given row in that table.
The compound criteria (conditions) are created by using ____.
Count, Sum, Avg, Max, and Min are a few of the built-in statistics or ____ functions
that can be used in a query.
If you are sorting records by more than one field, the more important field is called
the ____.
A query that changes data is a(n) ____ query.
A ____ query creates a new table using the query results.
SQL uses commands to create tables, update tables, and retrieve data from tables.
You can use the SQL CREATE TABLE command to insert rows into a table.
A valid name for a table might be tbl$Student.
CHAR data types are numbers without a decimal part.
Fields will appear in the query results in the order in which they are listed in the SELECT clause.
In a SELECT statement, the WHERE clause is mandatory.
Instead of listing all the field names in the SELECT clause, you can use the @ symbol.
A simple condition includes the field name, a comparison operator, and either another field name or a value.
There are two versions of the “not equal to” operator: <> and !=.
When you connect simple conditions using the AND operator, all the simple conditions must be false for the compound condition to be true.
Preceding a condition by the NOT operator reverses the truth or falsity of the original condition.
The BETWEEN operator is an essential feature of SQL.
You can combine values in character fields.
The IN operator provides a concise way of phrasing certain conditions.
There is no difference between the COUNT function and the SUM function.
You can use the GROUP BY clause and the ORDER BY clause in the same SELECT
Statement.
The HAVING clause is to groups what the WHERE clause is to rows.
When rows are grouped, one line of output is produced for each group.
A WHERE and a HAVING clause cannot be included in the same query.
For each pair of tables to be joined, a condition must be included indicating how the
tables are related.
When you use a name containing a space in Access SQL, you must ____.
Many versions of SQL require you to end a command with a ____.
The basic form of an SQL retrieval command is ____.
When used after the word SELECT, the ____ symbol indicates that you want to include
all fields in the query results in the order in which you described them to the DBMS
when you created the table.
To use a wildcard, include the ____ operator in the WHERE clause.
. In versions of SQL other than Access, the ____ is used as a wildcard to represent any
collection of characters.
In Access SQL, the ____ is used as a wildcard to represent any individual character.
The ____ function calculates the number of entries in a table.
when a subquery is used, ____ is(are) evaluated first.
The ____ clause can be used to create groups of records.
When rows are grouped, ____.
To make changes to existing data in a table, you would use the ____ command.
To add new data to a table, use the ____ command.
You can save the results of a query as a table by including the ____ clause in the
Query.
Based on the code above, list the number, name, credit limit, and balance for all
customers with credit limits that exceed their balances.
Based on the code above, list the number, name, and balance of all customers with
balances greater than or equal to $2,000 and less than or equal to $5,000.
Based on the code above, list the number, name, and available credit for all customers
with credit limits that exceed their balances.
Based on the code above, list the number, name, and complete address of every
customer located on a street that contains the letters “Oxford”.
Based on the code above, list the number, name, street, and credit limit of all
customers. Order the customers by name within descending credit limit.
Based on the code above, for each sales rep, list the rep number, the number of
customers assigned to the rep, and the average balance of the rep’s customers. Group
the records by rep number and order the records by rep number.
Based on the code above, list the number and name of all customers that are either
represented by sales rep 30 or that currently have orders on file, or both.
Based on the code above, list the descriptions of all items that are located in
Storehouse3 and for which there are more than 20 units on hand.
Based on the code above, list the descriptions of all items that are located in
Storehouse 3 or for which there are more than 20 units on hand, or both.
Based on the code above, list the descriptions of all items that are not in Storehouse 3. Based on the code above, list the descriptions of all items that are not in Storehouse
Based on the code above, find how many items are in category TOY.
Based on the code above, list the complete student table.
Based on the code above, list the name of every student whose postal code is 10113.
Based on the code above, find the name of the student whose ID is 1167.
Based on the code above, change the postal code of the student with ID 11433 to
14455.
Based on the code above, delete any row in the OrderLine table in which the item
number is MT03.
Views cannot be used to examine table data.
An individual can use a view to create reports, charts, and other objects that show database data.
A view is a physical table in the DBMS.
To create a view in Access, you simply create and then save a query.
One advantage of using views is that they provide data dependence.
One advantage of a view is that different users can view the same data in different ways.
Indexes can increase the efficiency with which data is retrieved from the database.
When you create an index whose key has a single field, you have created what is called a single-column index.
The command DEL INDEX CustList; would remove the index named CustList.
The following command will enable Jones to retrieve data from the Customer table, but not to take any other action: GRANT SELECT ON Customer Jones ;
Referential integrity is specified using the FOREIGN KEY clause in the SELECT command.
Legal-values integrity is the property that states that no record can exist in the database with a value in the field other than one of the legal values.
Information about tables in the database is kept in the system catalog.
A stored procedure is placed on a client computer.
Access supports stored procedures.
The ____ command will create an application program's or individual user's picture of the database.
A row-and-column subset ____ consists of a subset of the rows and columns in some individual table.
To create an index named RepBal with the keys RepNum and Balance and with the balances listed in descending order, the command is ____.
The ____ statement will take away user privileges to the database.
In Access, a key symbol appears in the row selector of the field that is the ____ key.
To create the primary key clause for the Customer table on the CustomerNum field, the correct statement is ____.
To create the primary key clause for the OrderLine table on the OrderNum and ItemNum fields, the correct statement is ____.
Essentially, setting the value in a given field to ____ is similar to not entering a value in it at all.
Which of the following statement fragments will only allow a CreditLimit of $5,000, $7,500, or $15,000?
The CHECK clause can be included in the ____ command.
In SQL, you use the CHECK clause to enforce ____ integrity.
A table that is in first normal form is better than one that is in second normal form.
To correct update anomalies in a database, tables must be converted into various types of normal forms.
If B is functionally dependent on A, you can also say that B functionally determines A.
Functional dependencies can be determined by looking at sample data.
Removal of repeating groups is the starting point in the quest to create tables that are as free of problems as possible.
In general, when converting a non-first normal form table to first normal form, the primary key will usually include the original primary key concatenated with the key to the repeating group.
A table that is in first normal form may contain problems that will require you to restructure it.
If the primary key of a table contains only a single column, the table is automatically in first normal form.
In a dependency diagram, the arrows below the boxes indicate the normal dependencies.
Tables that are in second normal form do not contain problems.
The most recent definition of third normal form is referred to as the Boyce-Codd normal form.
. The primary key in a table will be a determinant.
Converting to third normal form always avoids the problems related to dependencies.
The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process.
By splitting relations to achieve third normal form tables, you create the need to express interrelation constraints.
Potential problems in the design of a relational database are known as ____.
The fact that column B is functionally dependent on column A can be written as ____
If B (an attribute) is functionally dependent on A, we can also say that ____.
The ____ is a column (or collection of columns) A such that all other columns are functionally dependent on A and no subcollection of the columns in A has this property.
The definition for ____ also defines a candidate key.
A(n) ____ is a column or collection of columns on which all columns in the table are functionally dependent.
An alternate key is a ____
A table is in first normal form if it does not contain ____.
A table that contains a repeating group is called a(n) ____.
If there is more than one possible choice for the primary key, and one of the possibilities is chosen to be the primary key, the others are referred to as ____.
From all the ____ keys, one is chosen to be the primary key.
Which of the following contains a repeating group?
Orders (OrderNum, OrderDate, (ItemNum, NumOrdered) )
Orders (OrderNum, ItemNum, NumOrdered )
Orders (OrderNum, OrderDate)
Orders (OrderNum, OrderDate, ItemNum, NumOrdered )
A column is a nonkey column if it is ____.
Another name for a nonkey column is a ____.
30. Second normal form can be defined as a table that is in first normal form but that
contains no ____.
The information-level design methodology involves representing the individual user
view as a collection of tables, refining them to eliminate any problems, and then
merging them into a cumulative design.
A design that supports all user views is called a constructive design.
The second step in creating a user view is to represent the user view as a collection of tables.
The first step in creating a user view is to normalize the tables.
When provided with a user view or some sort of stated requirement, you must develop a collection of tables that will support it.
The primary key is a unique identifier.
The basic relationships among entities are: one-to-many, many-to-many, and one-to one.
In a one-to-many relationship, the primary key of the “many” table becomes the foreign key of the “one” table.
Careful planning in the early stages of the normalization process will usually avoid the need to consider fourth normal form.
You create a many-to-many relationship by creating a new table whose primary key is the combination of the primary keys of the original tables.
There are two types of primary keys that you can use in your database design.
A foreign key is a column or collection of columns in one table that is required to match the value of the primary key for some row in another table, or be null.
In DBDL, you represent a table by listing all columns and then underlining the primary key.
In an entity-relationship diagram, rectangles represent foreign keys.
When you use an E-R diagram to represent a database, it visually illustrates all the information listed in the DBDL.
In an E-R diagram, a dashed line represents an identifying relationship and a solid line
represents a nonidentifying relationship.
Nulls are used when a value is either unknown or inapplicable.
When you combine third normal form tables, the result will always be in third normal form.
The use of an “m” and an “n” in an E-R diagram indicates a many-to-many relationship.
A weak entity is a column or collection of columns that could have been chosen as a primary key, but was not.
A set of requirements that is necessary to support the operations of a particular database user is known as a(n) ____.
he properties of the entities you choose as you design the user view will become the ____ in the appropriate tables.
If each employee works in a single department and each department has only one employee, the relationship between employees and departments is ____.
A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a person’s Social Security number.
A column that you create for an entity to serve solely as the primary key and that is visible to users is called a(n) ____.