Exam 4: The Relational Model 3: Advanced Topics
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model 1: Introduction, QBE, and Relational Algebra50 Questions
Exam 3: The Relational Model 2: SQL75 Questions
Exam 4: The Relational Model 3: Advanced Topics50 Questions
Exam 5: Database Design 1: Normalization50 Questions
Exam 6: Database Design 2: Design Method75 Questions
Exam 7: Dbms Functions50 Questions
Exam 8: Database Administration50 Questions
Exam 9: Database Management Approaches75 Questions
Select questions type
Access has a tool called the ____________________, which allows you to easily print detailed documentation concerning any table, query, report, form, or other object in the database.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Documenter
Which rule uses a foreign key in Table B to ensure that the field matches a primary key field in Table A?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
In SQL, what type of integrity are you enforcing by using the CHECK clause?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
When a new table is added or deleted, or the structure of a table is changed, where does the DBMS record these changes?
(Multiple Choice)
4.8/5
(42)
You use the __________ statement to give users privileges to the database.
(Short Answer)
4.8/5
(29)
When you create an index whose key has a single field, you have created what is called a single-column index.
(True/False)
4.8/5
(38)
A value of ________ is used when a value is missing, unknown, or inapplicable.
(Short Answer)
4.8/5
(33)
When you create a query that involves a view, the DBMS immediately executes the query you created.
(True/False)
4.7/5
(34)
Where can you save a query if you anticipate running it often?
(Multiple Choice)
4.8/5
(29)
Within relational model systems on both mainframes and personal computers, the main mechanism for increasing the efficiency with which data is retrieved from the database is the ____________________.
(Short Answer)
4.7/5
(40)
What are the advantages of having views only contain the fields required by a given user?
(Essay)
4.9/5
(32)
In a system catalog, the ____________________ table contains information about the tables known to SQL.
(Short Answer)
4.8/5
(39)
You can take away user privileges to the database using the ____________ statement.
(Short Answer)
4.7/5
(31)
Which of the following is an action that occurs automatically in response to an associated database operation such as an INSERT, UPDATE, or DELETE command?
(Multiple Choice)
4.8/5
(41)
In Access, a(n) ____________________ enables you to add logic to table events such as adding, changing, or deleting data.
(Short Answer)
4.7/5
(41)
Referential integrity is specified using the FOREIGN KEY clause in the CREATE TABLE command.
(True/False)
5.0/5
(41)
The following command will enable Jones to retrieve data from the Customer table, but not to take any other action: GRANT SELECT ON Customer To Jones ;
(True/False)
4.7/5
(41)
In SQL, you specify _____________ integrity using a FOREIGN KEY clause in either the CREATE TABLE or ALTER TABLE commands.
(Short Answer)
4.8/5
(42)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)