The entity integrity rule requires that ____.
all primary key entries are unique
a part of the key may be null
foreign key values do not reference primary key values
duplicate object values are allowed
The referential integrity rule requires that ____.
every null foreign key value must refer-ence an existing primary key value
an attribute have a corresponding value
every non-null foreign key value reference an existing primary key value
you delete a row in one table whose primary key does not have a matching foreign key value in another table
The extended entity relationship model (EERM) is sometimes referred to as the ____.
entity relationship model
enhanced entity relationship model
entity clustering relationship model
extended entity relationship diagram
The ____ depicts the arrangement of higher-level entity supertypes (parent entities) and lower-level entity subtypes (child entities).
subtype discriminator
inheritance
specialization hierarchy
entity supertype
Every subtype can have ____ supertype to which it is directly related.
none
only one
one or many
many
A specialization hierarchy can have ____ levels of supertype/subtype relationships.
The property of ____ enables an entity subtype to inherit the attributes and relationships of the su-pertype.
One important inheritance characteristic is that all entity subtypes inherit their ____ attribute from their supertype.
primary key
natural key
foreign key
Surrogate key
What feature is a DDBMS disadvantage?
Processor independence
User-friendly interface
Security
Faster data access
What feature is a DDBMS advantage?
Reduced operating cost
Complexity of management and control
Increased storage requirements
Increased training cost
A database is composed of several parts known as database ____.
sections
fragments
partitions
parts
Under the ____ scenario, multiple processes run on different computers sharing a single data repository.
single-site processing, single-site data
multiple-site processing, single-site data
single-site processing, multiple-site data
multiple-site processing, multiple-site data
The ____ scenario describes a fully distributed DBMS with support for multiple data processors and transaction processors at multiple sites.
____ distributed database systems integrate only one type of centralized DBMS over a network.
Homogeneous
Heterogeneous
Fully heterogeneous
Fully homogeneous
____ transparency allows the integration of several different local DBMSs under a common, or global, schema.
Transaction
Performance
Distribution
Heterogeneity
The ____ contains the description of the entire database as seen by the database administrator.
distributed global dictionary
distributed data dictionary
distributed global schema
distributed data schema
____ fragmentation allows us to break a single object into two or more segments or fragments.
Horizontal
Vertical
Data
Mixed
With ____ data allocation, the database is divided into several disjointed parts and stored at sev-eral sites.
centralized
decentralized
partitioned
replicated
The ____ rule requires that all copies of data fragments be identical.
shared fragment
mutual consistency
horizontal fragmentation
replication
Which of the following is a problem with a centralized database?
High cost
Good performance from remote locations
Poor performance from the main location
Lack of storage
The components of a data warehouse are ____.
integrated
volatile
object-oriented
Which of the following is a rule that defines the data warehouse?
Environments are integrated
Data warehouse contains historical data over a long time horizon
Data are object-oriented
Data are subject-oriented
Which of the following is a characteristic of an OLAP?
Uses single dimensional data analysis techniques
Provides introductory database support and complex end user interfaces
Provides introductory end-user interfaces
Supports client/server architecture
____ data must conform to uniform structures and formats to avoid data conflicts.
Data mart
Database
Data warehouse
Data analysis
Multidimensional data analysis refers to the processing of data such that data are viewed as part of the ____ structure.
semidimensional
multidimensional
one-dimensional
two-dimensional
MOLAP extends OLAP functionality to multidimensional ____ management systems.
online
database
processing
data
MOLAP's premise is that ____ databases are best suited to manage, store, and analyze multi-dimensional data.
relational
The ____ hierarchy provides a top-down data organization that is used for two main purposes: aggregation and drill-down/roll-up data analysis.
dimensional
attribute
During the data ____ phase of data mining, common characteristics or patterns are identified.
analysis
preparation
extraction
acquisition
During the ____ phase of data mining, the data-mining findings are used to predict future behav-ior and forecast business outcomes.
analysis and classification
prognosis
knowledge acquisition
The ____ schema creates the near equivalent of a multidimensional database schema from the existing relational database.
star
square
OLAP
ROLAP
____ backups take place while the user is working on the database.
Full
Incremental
Concurrent
Sequential
A ____ is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
user
role
profile
manager
At the level of top management, the database must be able to ____.
represent and support the company operations as closely as possible
deliver the data necessary for tactical decisions and planning
produce query results within specified performance levels
provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
As a manager, the DBA must concentrate on the ____ dimensions of the database administration function.
control and planning
conflict and problem resolution
policies and standards
security and privacy
User-access management is a subset of ____.
password protection
authorization management
data integrity
managerial control
Classifying users into ____, according to common access needs, facilitates the DBA’s job of controlling and managing the access privileges of individual users.
user groups
authorization schemes
policy definitions