1) _______ logic, used extensively in mathematics, provides a framework in which an assertion (statement of fact) can be verified as either true or false.
A) Predicate
B) Database
C) Relational
D) Index
2) The relational database model enables you to view data _____ rather than ____.
A) relationally, hierarchically
B) hierarchically, relationally
C) physically, logically
D) logically, physically
3) The relational model's creator, E.F. Codd, used the term relation as a synonym for ____.
A) index
B) key
C) table
D) relationship
4) A(n) _____ is perceived as a two-dimensional structure composed of rows and columns.
A) table
B) rowset
C) attribute
D) intersection
5) Date attributes contain calendar dates stored in a special format known as the _____ date format.
A) Epoch
B) Calendar
C) Julian
D) Logical
6) ________ data can have only a true or false (yes or no) condition.
A) Logical
B) Chatacyer
C) Date
D) Numeric
7) In the relational model, _____ are important because they are used to ensure that each row in a table is uniquely identifiable.
A) relations
B) keys
C) indexes
D) logical structures
8) In the context of a database table, the statement "A ______ B" indicates that if you know the value of attribute A, you can look up the value of attribute B.
A) contains
B) is related to
C) owns
D) determines
9) The attribute B is _____ the attribute A if each value in column A determines one and only one value in column B.
A) logically dependent on
B) owned by
C) determined by
D) functionally dependent on
10) Any attribute that is part of a key is known as a _____.
A) key attribute
B) logical attribute
C) key determiner
D) selector
11) If the attribute (B) is functionally dependent on a composite key (A) but not on any subset of that _____ key, the attribute (B) is fully functionally dependent on (A).
A) foreign
B) unique
C) composite
D) complete
12) A _____ is nay key that uniquely identifies each row.
A) superkey
B) special
C) selective
D) candidate
13) No data entry at all is known as a(n) _______.
A) nil
B) null
C) empty
D) Zero
14) Controlled _____ makes a relational database work.
B) logic
C) chaos
D) redundancy
15) Referential _____ means that if the foreign key contains a value, that value refers to an existing valid tuple (row) in another relation.
A) integrity
B) uniqueness
C) direction
D) Relations
16) A _____ key is defined as a key that is used strictly for data retrieval purposes.
A) lookup
B_ foreign
C) candidate
D) Secondary
17) A _____ key can be described as a super key without unnecessary attributes, that is, a minimal super key.
A) secondary
B) candidate
C) primary
D) Foreign
18) All primary key entries are unique, and no part of a primary key may be _____.
A) zero
B) a foreign key
C) null
D) a candidate key
19) A CUSTOMER table's primary key is CUS_CODE. The CUSTOMER primary key column has no null entries, and all entries are unique. This is an example of ______ integrity.
A) entity
B) referential
C) complete
D) Null
20) The ______ constraint can be placed on a column to ensure that every row in the table has a value for that column.
A) HAS VALUE
B) NOT NULL
C) MUST HAVE VALUE
D) NOT EMPTY
21) To be considered minimally relational, the DBMS must support the key relational operators _______, PROJECT, and JOIN.
A) INTERSECT
B) UNION
C) DIFFERENCE
D) SELECT
22) ______, also known as RESTRICT, yields values for all rows found in a table that satisfy a given condition.
22) ________ yields a vertical subset of a table.
A) PROJECT
B) SELECT
C) UNION
D) DIFFERENCE
24) _______ combines all rows from two tables, excluding duplicate rows.
25) __________ yields only the rows that appear in both tables
26) A(n) ________ join links tables by selecting only the rows with common values in their common attribute(s).
A) equal
C) foreign
D) natural
27) The equijoin takes its name from the comparison operator ______ used in the condition.
A) *
B) <
C) =
D) >
28) In an outer join, the matched pairs would be retained and any unmatched values in the other table would be left ______.
A) in another table
C) out of the results
D) with matching values from the original table
29) A(n) __________ join only returns matched records from the tables that are being joined.
A) outer
B) inner
C) direct
D) union
30) A ______ contains at least all of the attribute names and characteristics for each table in the system.
A) data dictionary
B) relational schema
C) logical schema
D) join
31) The ______ is actually a system-created database whose tables store the user/designer-created database characteristics and contents.
A) meta dictionary
B) schema
C) dictionary
D) system catalog
32) In a database context, the word ______ indicates the use of the same attribute name to label different attributes.
A) redundancy
B) homonym
C) duplicate
D) synonym
33) In a database context, a(n) ________ indicates the use of different names to describe the same attribute.
B) duplicate
C) synonym
D) homonym
34) The _____ relational type is the "relational model ideal."
A) 1:1
B) 1:M
C) M:1
D) M:N
35) The ______ relationship should be rare in any relational database design.
36) Since it is used to link tables that originally were related in a M:N relationship, the composite entity structure includes--as foreign keys--at least the _____ keys of the tables that are to be linked.
A) composite
B) super
D) unique
37) Another name for a composite entity is a ______ entity.
A) bridge
B) linked
C) directive
D) referring
38) A(n) _________ is an ordered arrangement of keys and pointers.
B) superkey
C) relationship
D) index
39) When you define a table's primary key, the DBMS automatically creates a(n) ______ index on the primary key column(s) you declared.
A) key
B) incomplete
C) unique
D) primary
40) Codd's Rule of _____ states: Application programs and ad hoc facilities are logically unaffected when changes are made to the table structures that preserve the original table values (changing order of columns or inserting columns).
A) Nonsubversion
B) Logical Data Independence
C) Comprehensive Data Sublanguage
D) Integrity Independence
41) Codd's Rule of ________ states: If the system supports low-level access to the data, users must not be allowed to bypass the integrity rules of the database.