A set of requirements that is necessary to support the operations of a particular database user is known as a(n) ____.
a.
user view
c.
user attribute
b.
user table
d.
user field
____ 12. The properties of the entities you choose as you design the user view will become the ____ in the appropriate tables.
a.
rows
c.
data
b.
columns
d.
DBMS
____ 13. If each employee works in a single department and each department has only one employee, the relationship between employees and departments is ____.
a.
one-to-one
c.
many-to-one
b.
one-to-many
d.
many-to-many
____ 14. A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a person’s Social Security number.
a.
surrogate key
c.
artificial key
b.
weak entity
d.
natural key
____ 15. Combining the following two tables would result in ____.
Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum)
Employee (EmployeeNum, LastName, FirstName, Street, City, State, Zip)
a.
Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, (Street, City, Zip) )
b.
Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, Zip)
c.
Employee (EmployeeNum, LastName, FirstName, Street, City State, Zip, WageRate, SocSecNum)
d.
Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, EmployeeNum, LastName, FirstName, Street, City, State, Zip )
____ 16. Convert the following table to first normal form:
Branch (BranchNum, BranchName, (BookCode, Title, OnHand) )
a.
Branch (BranchNum, BranchName)
Book (BookCode, Title)
b.
Branch (BranchNum, BranchName)
c.
Book (BookCode, Title)
d.
Branch (BranchNum, BranchName, BookCode, Title, OnHand )
____ 17. When implementing the physical-level design, for secondary keys, you must ensure that it is possible to retrieve data rapidly on the basis of a value of the ____ key.
a.
primary
c.
alternate
b.
secondary
d.
foreign
____ 18. After the information-level design is completed, ____ is the next step.
a.
The physical-level design
c.
The DBMS-level design
b.
The modality-level design
d.
The table-level design
____ 19. In the standard E-R diagrams, relationships are drawn as ____, with lines connecting the entities involved in relationships.
a.
rectangles
c.
circles
b.
diamonds
d.
squares
____ 20. An entity that exists to implement a many-to-many relationship is called a(n) ____.
a.
composite entity
c.
complicated entity
b.
complex entity
d.
circular entity
____ 21. ____ means that an entity has a minimum cardinality of one.
a.
The entity is required in the relationship.
b.
The entity is not required in the relationship.
c.
The entity should not be in the relationship as an attribute.
d.
The entity must be listed with all ones in the data fields.
____ 22. Data about the data in a database is known as ____.
a.
backup
c.
metadata
b.
hyperdata
d.
rollback
____ 23. ____ denies access by other users to data while the DBMS processes one user's updates to the database.
a.
Batch processing
c.
Journaling
b.
Biometrics
d.
Locking
____ 24. If two or more users are waiting for the other user to release a lock before they can proceed, this is known as a ____.
a.
commit
c.
deadlock
b.
timestamp
d.
transaction
____ 25. ____ is the process of returning the database to a state that is known to be correct from a state known to be incorrect.
a.
Recovery
c.
Encryption
b.
Concurrent update
d.
Batch processing
____ a database reverses encryption.
a.
Locking
c.
Synchronizing
b.
Decrypting
d.
Timestamping
____ 27. A string of characters assigned by the DBA to a database that the user must enter to access the database is known as a ____.
a.
DBMS name
c.
password
b.
DBA right
d.
table name
____ 28. ____ identify users by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics.
a.
Passwords
c.
Econometrics
b.
Data dictionaries
d.
Biometrics
____ 29. A(n) ____ is a snapshot of certain data in a database at a given moment in time.
a.
encryption
c.
authorization
b.
authentication
d.
view
____ 30. ____ locks forbid any other user from accessing the data in any way.
a.
Shared
c.
Limited
b.
Exclusive
d.
Concurrent
____ integrity is the constraint that says that the values in foreign keys must match values already in the database.
a.
Parallel
c.
Conditional
b.
Relational
d.
Referential
____ 32. The ____ establishes the naming conventions for tables, fields, and indexes in the data dictionary.
a.
users
c.
DBA
b.
DBMS
d.
programmers
____ 33. After the database designers complete the information-level design, the DBA does the ____-level design.
a.
physical
c.
logical
b.
information
d.
graphical

