Exam 14: Database Design

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Domain integrity means that a primary key cannot take on the NULL value.

(True/False)
4.8/5
(30)

Table look-up files contain relatively static data that can be shared by applications to maintain consistency and improve performance.

(True/False)
4.7/5
(25)

The ______________________ key for a record must never be allowed to have a NULL value.

(Short Answer)
4.9/5
(35)

The principal sadvantage of ___________________ (conventional files or databases) is the ability to share the same data across multiple applications and systems.

(Short Answer)
4.8/5
(42)

A referential integrity error exists when a foreign key value in one table has no matching primary key value in the related table.

(True/False)
4.7/5
(35)

Realistically, most organizations build several databases, each one sharing data with several information systems. Thus, there will be some ____________ between databases.

(Short Answer)
4.9/5
(40)

_________________________ keys are pointers to the records of a different file in a database. These keys are how the database links the records of one type to those of another type.

(Short Answer)
4.8/5
(32)

A data definition language (DDL) is used by the DBMS to physically establish record types, fields, and structural relationships. Additionally, the DDL defines views of the database.

(True/False)
4.8/5
(40)

DML commands may be "called" from programming languages.

(True/False)
4.8/5
(39)

Some metadata is stored in the actual database, while other metadata is stored in the CASE tool repositories.

(True/False)
4.8/5
(36)

A file that contains records that describe business events is what type of file?

(Multiple Choice)
4.8/5
(46)

Horizontal distribution of the data has specific columns of tables assigned to specific databases and servers.

(True/False)
4.8/5
(44)

When a computer program "reads" a record from a database, it actually retrieves a group or ________________________ of records at a time.

(Short Answer)
4.8/5
(35)

________________________________ are programs embedded within a table that are automatically invoked by updates to another table.

(Short Answer)
4.7/5
(35)

Many CASE tools can generate SQL code for creating a database from a CASE-based database schema.

(True/False)
4.9/5
(36)

You see a return to conventional file-based architectures today because they are better technology for client/server and network computing architectures.

(True/False)
4.8/5
(37)

One or more database administrators (DBAs) are responsible for the database technology, database design and construction consultation, security, backup and recovery, and performance tuning.

(True/False)
4.9/5
(38)

The principal advantage of database systems is the ability to share the same data across multiple applications and systems.

(True/False)
4.7/5
(46)

When a database is implemented on a single server regardless of the number of physical locations that may require access to it is known as:

(Multiple Choice)
4.9/5
(40)

_________________________ files or tables contain records that are relatively permanent. Thus, once a record has been added, it remains in the system indefinitely. The values of fields for the record will change over its lifetime, but the individual records are retained indefinitely.

(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 268
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)