• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/897

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

897 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

1) The purpose of a database is to help people keep track of things

Asnwer: TRUE

2) In a database, each table stores data about a different type of thing.

Answer: TRUE

3) In a database, each row in a spreadsheet has data about a particular instance.

Answer: FALSE

4) In every database, not just the databases discussed in this book, table names are capitalized.

Answer: FALSE
5) A database shows data in tables and the relationships among the rows in those tables.
Answer: TRUE
6) Data is recorded facts and figures; information is knowledge derived from data.
Answer: TRUE
7) Databases record data in such a way that they can produce information.
Answer: TRUE

8) Enterprise Resource Planning (ERP) is an example of a data mining application.

Answer: FALSE

9) Databases are a key component of e-commerce order entry, billing, shipping and customer support.

Answer: TRUE
10) The largest databases in e-commerce are the order entry databases.
Answer: FALSE
11) The e-commerce companies use Web activity databases to determine which items on a Web page are popular and successful.
Answer: TRUE
12) Small databases typically have simple structures.
Answer: FALSE
13) A database system is typically defined as its four components: users, database applications, the DBMS and the databases.
Answer: TRUE
14) A database system as typically defined can be modified to include CODASYL.
Answer: FALSE
15) Applications are computer programs used directly by users.
Answer: TRUE
16) In a database system, applications write data to the database.
Answer: FALSE
17) Sequenced Query Language (SQL) is an internationally recognized standard language that is understood by all commercial database management system products.
Answer: FALSE

18) In database systems, indexes are held by the database.

Answer: TRUE
19) A database management system (DBMS) creates, processes and administers databases.
Answer: TRUE
20) The database management system (DBMS) is responsible for inserting, modifying, reading, and deleting data.
Answer: TRUE

21) The database application is responsible for concurrency control.

Answer: FALSE

22) The database management system (DBMS) is responsible for enforcing referential integrity constraints.

Answer: TRUE
23) Referential integrity constraints are rules about what data values are allowed in certain columns.
Answer: TRUE
24) A database is a self-describing collection of non-integrated tables.
Answer: FALSE
25) Integrated tables store both data and the relationships among the data.
Answer: TRUE
26) Microsoft Access is just a DBMS.
Answer: FALSE
27) Microsoft Access is a low-end product intended for individuals and small workgroups.
Answer: TRUE
28) The current DBMS engine in Microsoft Access is called ADE.
Answer: TRUE
29) In Microsoft Access, you can use the Oracle DBMS in place of the ADE DBMS.
Answer: FALSE
30) In an Enterprise-class database system, a database application interacts with the DBMS.
Answer: TRUE
31) In an Enterprise-class database system, a database application accesses the database data.
Answer: FALSE
32) In an Enterprise-class database system, business users interact directly with the DBMS, which directly accesses the database data.
Answer: FALSE

33) All database applications get and put database data by sending SQL statements to the DBMS.

Answer: TRUE
34) The DBMS ranked as having the "most power and features" in the text is IBM's DB2.
Answer: FALSE
35) The DBMS ranked as being the "most difficult to use" in the text is Oracle Corporation's Oracle Database.
Answer: TRUE
36) The DBMS ranked as being the "easiest to use" in the text is Microsoft's SQL Server.
Answer: FALSE
37) The DBMS ranked as having the "least power and features" in the text is Microsoft Access.
Answer: TRUE
38) A database is called "self-describing" because it reduces data duplication.
Answer: FALSE

39) The description of a database's structure that is stored within the database itself is called the "metadata."

Answer: TRUE
40) In a database processing system, indexes are held by the database management system (DBMS).
Answer: TRUE
41) Database design is important, and fortunately it is simple to do.
Answer: FALSE

42) A database design may be part of a new systems development project.

Answer: TRUE
43) A database design is rarely a redesign of an existing database.
Answer: FALSE
44) Information systems that stored groups of records in separate files were called file processing systems.
Answer: TRUE
45) Data Language/I (DL/I) structured data relationships as a tree structure.
Answer: TRUE
46) The CODASYL DBTG mode structured data relationships as a tree structure.
Answer: FALSE
47) The relational model was first proposed in 1970 by E. F. Codd at IBM.
Answer: TRUE

48) The 1977 edition of this text contained a chapter on the relational model, and that chapter was reviewed by E. F. Codd.

Answer: TRUE

49) dBase was the first PC-based DBMS to implement true relational algebra on a PC.

Answer: FALSE

50) Paradox is the only major survivor of the "bloodbath of PC DBMS products."
Answer: FALSE
51) Business organizations have resisted adopting object-oriented database systems because the cost of purchasing OODBMS packages is prohibitively high.
Answer: FALSE
52) Bill Gates has said that "XML is the lingua-franca of the Internet Age."
Answer: TRUE
53) XML Web services allow database processing to be shared across the Internet.
Answer: TRUE
54) The NoSQL movement should really be called a NoRelational movement.
Answer: TRUE
55) Twitter and Facebook use NoSQL databases.
Answer: TRUE
56) The purpose of a database is to:
A) help people keep track of things.
B) store data in tables.
C) create tables of rows and columns.
D) maintain data on different things in different tables.
E) All of the above.
Answer: A
57) A database stores:
A) data.
B) relationships.
C) metadata.
D) A and B
E) A, B, and C
Answer: E
58) A database records:
A) facts.
B) figures.
C) information.
D) A and B
E) A, B, and C
Answer: D

59) A sales contact manager used by a salesperson is an example of a(n) ________.
A) single-user database application
B) multiuser database application
C) e-commerce database application
D) A or B
E) Any of A, B, or C

Answer: A
60) A Customer Resource Management (CRM) system is an example of a(n) ________.
A) single-user database application
B) multiuser database application
C) e-commerce database application
D) A or B
E) Any of A, B, or C
Answer: B

61) An online drugstore such as Drugstore.com is an example of a(n) ________.
A) single-user database application
B) multiuser database application
C) e-commerce database application
D) A or B
E) Any of A, B, or C

Answer: C

62) The industry standard supported by all major DBMSs that allows tables to be joined together is called ________.
A) Sequential Query Language (SQL)
B) Structured Question Language (SQL)
C) Structured Query Language (SQL)
D) Relational Question Language (RQL)
E) Relational Query Language (RQL)

Answer: C
63) A program whose job is to create, process and administer databases is called a ________.
A) Database Modeling System
B) Database Management System
C) Data Business Model System
D) Relational Model Manager
E) Data Business Management Service
Answer: B
64) Microsoft Access includes:
A) a DBMS.
B) an application generator.
C) a Web server.
D) A and B
E) A, B, and C
Answer: D

65) Microsoft Access may use which of the following DBMS engines?
A) ADE
B) SQL Server
C) Oracle
D) A and B
E) A, B, and C
Answer: D
66) Which of the following are basic components of an enterprise-class database system?
A) The user
B) The database application
C) The database management system (DBMS)
D) The database
E) All of the above
Answer: E
67) In an enterprise-class database system, ________.
A) the database application(s) interact(s) with the DBMS
B) the database application(s) access(es) the database data
C) the DBMS accesses the database data
D) A and B
E) A and C
Answer: E
68) In an enterprise-class database system, the database application ________.
A) creates queries
B) creates forms
C) creates reports
D) A and B
E) B and C
Answer: E

69) In an enterprise-class database system,are created by ________.
A) the user
B) the database application
C) the database management system (DBMS)
D) the database
E) All of the above

Answer: B
70) In database systems, the DBMS ________.
A) inserts data
B) modifies data
C) reads data
D) deletes data
E) All of the above
Answer: E

71) In database systems, the DBMS enforces rules about which data can be written in certain columns. The rules are known as ________.
A) data insertion control
B) data modification control
C) data reading control
D) concurrency control
E) referential integrity constraints

Answer: E
72) In database systems, the DBMS enforces rules about which user can perform which action when. The rules are known as ________.
A) data insertion control
B) data modification control
C) data reading control
D) concurrency control
E) referential integrity constraints
Answer: D
73) A database is considered "self-describing" because ________.
A) all the users' data is in one place
B) it reduces data duplication
C) it contains a description of its own structure
D) it contains a listing of all the programs that use it
E) All of the above
Answer: C
74) A database consists of integrated tables, which store ________.
A) data
B) relationships among the data
C) forms
D) A and B
E) All of the above
Answer: D
75) In database systems, the database ________.
A) holds user data
B) holds metadata
C) holds indexes
D) holds stored procedures
E) All of the above
Answer: E
76) A database may contain ________.
A) tables
B) metadata
C) triggers
D) stored procedures
E) All of the above
Answer: E
77) A database may be designed ________.
A) from existing data
B) as a new systems development project
C) as a redesign of an existing database
D) A and B
E) A, B, and C
Answer: E
78) A database designed using spreadsheets from the Sales department is a database being designed ________.
A) from existing data
B) as a new systems development project
C) as a redesign of an existing database
D) A and B
E) A, B, and C
Answer: A
79) A database designed to implement requirements for a reporting application needed by the Sales department is a database being designed ________.
A) from existing non-database data
B) as a new systems development project
C) as a redesign of an existing database
D) A and B
E) A, B, and C
Answer: B

80) A database designed to combine two databases used by the Sales department is a database being designed ________.
A) from existing data
B) as a new systems development project
C) as a redesign of an existing database
D) A and B
E) A, B, and C

Answer: C
81) Database professionals use ________ as specific data sources for studies and analyses.
A) data marts
B) normalization
C) data models
D) entity-relationship data modeling
E) data migration
Answer: A
82) Database professionals use a set of principles called ________ to guide and assess database design.
A) data marts
B) normalization
C) data models
D) entity-relationship data modeling
E) data migration
Answer: B
83) A very popular development technique used by database professionals for database design is known as ________.
A) data marts
B) normalization
C) data models
D) entity-relationship data modeling
E) data migration
Answer: D

84) A very popular development technique used by database professionals to adopt a database design to a new or changing requirement is known as ________.
A) data marts
B) normalization
C) data models
D) entity-relationship data modeling
E) data migration

Answer: E
85) The predecessor(s) of database processing was (were) ________.
A) file managers
B) hierarchical models
C) network models
D) the relational data model
E) All of the above were predecessors of database processing.
Answer: A
86) The relational model ________.
A) was first proposed in 1970
B) was developed by E. F. Codd
C) was developed at IBM
D) resulted in the DBMS product DB2
E) All of the above
Answer: E
87) Modern microcomputer personal DBMS products ________.
A) are supplied by several well-established manufacturers
B) were essentially made obsolete by Microsoft Access
C) have poor response time
D) are not true DBMS products
E) are really just programming languages with generalized file-processing capabilities
Answer: B

88) Business organizations have resisted adopting object-oriented database management systems because ________.
A) object-oriented programming uses simplified data structures that fit easily into relational databases
B) the cost of purchasing OODBMS packages is prohibitively high
C) the cost of converting data from relational databases to OODBMSs is too high
D) most large organizations have older applications that are not based on object oriented programming
E) C and D
Answer: E
89) For database development, the most important Web-related technology to emerge in recent years is:
A) FTP.
B) HTTP.
C) XML.
D) OODBMS.
E) All of the above.
Answer: C
90) For database development, a challenge to the relational model and the use of SQL. This challenge is known as:
A) the Web services movement.
B) the NoSQL movement.
C) the SOAP movement.
D) the NoSOAP movement.
E) the UDDI movement.
Answer: C
1) SQL stands for Standard Query Language.
Answer: FALSE
2) SQL includes a data definition language, a data manipulation language, and SQL/Persistent stored modules.
Answer: TRUE
3) SQL is only a data manipulation language (DML).
Answer: FALSE
4) The American National Standards Institute (ANSI) maintains the standards for SQL.
Answer: TRUE
5) SQL was developed by IBM in the late 1970s.
Answer: TRUE
6) SQL is not a complete programming language. Rather it is a data sublanguage.
Answer: TRUE
7) In addition to being a data sublanguage, SQL is also a programming language, like Java or C#.
Answer: FALSE
8) SQL commands can be embedded in application programs.
Answer: TRUE
9) SQL, although very popular, has never become a national standard.
Answer: FALSE
10) The SQL keyword SELECT is used to specify the columns to be listed in the query results.
Answer: TRUE
11) The SQL keyword WHERE is used to specify the table(s) that contain(s) the data to be retrieved.
Answer: FALSE
12) The SQL keyword FROM is used to specify the table to be used.
Answer: TRUE
13) SQL can only query a single table.
Answer: FALSE
14) SQL statements end with a colon.
Answer: FALSE
15) The columns to be obtained by an SQL command are listed after the FROM keyword.
Answer: FALSE
16) To remove duplicate rows from the result of a query, specify the SQL DISTINCT keyword.
Answer: TRUE
17) To obtain all columns, use an asterisk (*) wildcard character instead of listing all the column names.
Answer: TRUE
18) The SQL WHERE clause contains the condition that specifies which rows are to be selected.
Answer: TRUE
19) The result of an SQL SELECT operation can contain duplicate rows.
Answer: TRUE
20) To have SQL automatically eliminate duplicate rows from a result, use the keyword DISTINCT with the FROM keyword.
Answer: FALSE
21) An asterisk (*) following the SELECT verb means that all columns are to be displayed.
Answer: TRUE
22) The WHERE clause contains the condition that specifies which columns are to be selected.
Answer: FALSE
23) The rows of the result table can be sorted by the values in one or more columns.
Answer: TRUE
24) Sorting is specified by the use of the SORT BY phrase.
Answer: FALSE
25) To sort the rows of the result table, the ORDER BY clause is specified.
Answer: FALSE
26) Columns can be sorted in descending sequence by using the SQL DESC keyword.
Answer: TRUE
27) A WHERE clause can contain only one condition.
Answer: FALSE
28) When two conditions must both be true for the rows to be selected, the conditions are separated by the SQL AND keyword.
Answer: TRUE
29) To refer to a set of values needed for a condition, use the SQL IN operator.
Answer: TRUE
30) To exclude one or more values using a condition, the SQL OUT keyword must be used.
Answer: FALSE
31) To refer to a set of values in a condition, the values are placed inside parentheses ( ) and separated by commas.
Answer: TRUE
32) The condition in WHERE clauses can refer to a set of values by using the IN operator.
Answer: TRUE
33) The SQL keyword LIKE is used in SQL expressions to select on partial values.
Answer: TRUE
34) The SQL wildcard character "%" represents a series of one or more unspecified characters.
Answer: TRUE
35) The SQL wildcard character "#" indicates a single, unspecified character in a specific location in an SQL query.
Answer: FALSE
36) The Microsoft Access wildcard character "*" (asterisk) indicates a sequence of one or more unspecified characters in a Microsoft Access SQL query.
Answer: TRUE
37) The Microsoft Access wildcard character "_" (underscore) indicates a single, unspecified character in a specific location in a Microsoft Access SQL query.
Answer: FALSE
38) The SQL built-in function ADDUP totals values in numeric columns.
Answer: FALSE
39) The SQL built-in function AVG computes the average of values in numeric columns.
Answer: TRUE
40) The SQL built-in function MOST obtains the largest value in a numeric column.
Answer: TRUE
41) The SQL built-in function MIN obtains the smallest value in a numeric column.
Answer: TRUE
42) The SQL built-in function COUNT computes the number of rows in a query.
Answer: TRUE
43) The built-in function SUM can be used with any column.
Answer: FALSE
44) The clause SELECT COUNT (*) results in a table with a single row and a single column.
Answer: TRUE
45) Arithmetic in SQL statements is limited to the operations provided by the built-in functions.
Answer: FALSE
46) The SQL keyword GROUP BY instructs the DBMS to group together those rows that have the same value in a column.
Answer: TRUE
47) A WHERE clause can contain another SELECT statement enclosed in parentheses.
Answer: TRUE
48) A SELECT statement used in a WHERE clause is called a subquery.
Answer: TRUE
49) A nested SELECT statement (one that appears within the WHERE clause of another SQL statement) is called a subquery and must be enclosed in parentheses.
Answer: TRUE
50) Only two tables can be queried by using a subquery.
Answer: FALSE
51) An alternative to combining tables by a subquery is to use a join.
Answer: TRUE
52) When people use the term "join" they normally mean an "equijoin."
Answer: TRUE
53) Two or more tables are joined by giving the table names in the WHERE clause and specifying the equality of the respective column names as a condition in the GROUP BY clause.
Answer: FALSE
54) The names of tables to be joined in an SQL query are listed in the FROM clause.
Answer: TRUE
55) In an SQL query, a join operation is achieved by specifying the equality of the respective column names as a condition in the WHERE clause.
Answer: TRUE
56) Every subquery can be alternatively expressed by a join.
Answer: FALSE
57) While many subqueries can be alternatively written as joins, correlated subqueries do work that cannot be duplicated as a join.
Answer: TRUE
58) The SQL syntax JOIN . . . ON can be used as alternate way of writing an SQL join statement.
Answer: TRUE
59) Joins that show only matching rows from the joined tables in their results are called inner joins.
Answer: TRUE
60) Joins that show the matching rows from the joined tables plus unmatched rows from one other table in their results are called outer joins.
Answer: TRUE
61) Outer joins can be either up joins or down joins.
Answer: FALSE
62) SQL is a ________.
A) data sublanguage
B) product of IBM research
C) national standard
D) combination that includes a data definition language and a data manipulation language
E) All of the above
Answer: E
63) When making an SQL query, we are using SQL as a(n) ________.
A) DDL
B) DML
C) embedded language
D) SET
E) WHERE
Answer: B
64) In an SQL query, which SQL keyword actually creates the query?
A) EXISTS
B) FROM
C) SELECT
D) SET
E) WHERE
Answer: C
65) In an SQL query, which SQL keyword is used to specify the table(s) to be used?
A) EXISTS
B) FROM
C) SELECT
D) SET
E) WHERE
Answer: B
66) In an SQL query, which SQL keyword must be used to remove duplicate rows from the result table?
A) DELETE
B) DISTINCT
C) NOT EXISTS
D) UNIQUE
E) KEY
Answer: B
67) In an SQL query, which of the following symbols is used by ANSI SQL to represent all the columns in a single table?
A) _ (underscore)
B) ? (question mark)
C) * (asterisk)
D) % (percent)
E) # (pound)
Answer: C
68) In an SQL query, which SQL keyword is used to state the condition that specifies which rows are to be selected?
A) EXISTS
B) FROM
C) SELECT
D) SET
E) WHERE
Answer: E
69) In an SQL query, which SQL keyword is used to join two conditions that both must be true for the rows to be selected?
A) AND
B) EXISTS
C) HAVING
D) IN
E) OR
Answer: A
70) In an SQL query, which SQL keyword is used to determine if a column value is equal to any one of a set of values?
A) AND
B) EXISTS
C) HAVING
D) IN
E) OR
Answer: D
71) In an SQL query, which of the following symbols is used by ANSI SQL to represent a single unspecified character?
A) _ (underscore)
B) ? (question mark)
C) * (asterisk)
D) % (percent)
E) # (pound)
Answer: A
72) In an SQL query, which of the following symbols is used by Microsoft Access to represent a single unspecified character?
A) _ (underscore)
B) ? (question mark)
C) * (asterisk)
D) % (percent)
E) # (pound)
Answer: B
73) In an SQL query, which SQL keyword is used to sort the result table by the values in one or more columns?
A) GROUP BY
B) ORDER BY
C) SELECT
D) SORT BY
E) WHERE
Answer: B
74) Given a table with the structure: EMPLOYEE (EmpNo, Name, Salary, HireDate), which of the following would find all employees whose name begins with the letter "S" using standard SQL?
A) SELECT *
FROM EMPLOYEE
WHERE Name IN ['S'];
B) SELECT EmpNo
FROM EMPLOYEE
WHERE Name LIKE 'S';
C) SELECT *
FROM Name
WHERE EMPLOYEE LIKE 'S*';
D) SELECT *
FROM EMPLOYEE
WHERE Name LIKE 'S%';
E) None of the above.
Answer: D
75) Given a table with the structure: EMPLOYEE (EmpNo, Name, Salary, HireDate), which of the following would find all employees whose name begins with the letter "S" using Microsoft Access?
A) SELECT *
FROM EMPLOYEE
WHERE Name IN ['S'];
B) SELECT EmpNo
FROM EMPLOYEE
WHERE Name LIKE 'S';
C) SELECT *
FROM Name
WHERE EMPLOYEE LIKE 'S*';
D) SELECT *
FROM EMPLOYEE
WHERE Name LIKE 'S%';
E) None of the above.
Answer: C
76) In an SQL query, which built-in function is used to total numeric columns?
A) AVG
B) COUNT
C) MAX
D) MEAN
E) SUM
Answer: E
77) In an SQL query, which built-in function is used to compute the average value of numeric columns?
A) AVG
B) MEAN
C) MAX
D) MIN
E) SUM
Answer: A
78) In an SQL query, which built-in function is used to obtain the largest value of numeric columns?
A) AVG
B) COUNT
C) MAX
D) MIN
E) SUM
Answer: C
79) In an SQL query, which built-in function is used to obtain the smallest value of numeric columns?
A) AVG
B) COUNT
C) MAX
D) MIN
E) SUM
Answer: D
80) In an SQL query, the built-in functions SUM and AVG work with columns containing data of which of the following data types?
A) Integer
B) Numeric
C) Char
D) A and B
E) A, B, and C
Answer: D
81) In an SQL query, which built-in function is used to compute the number of rows in a table?
A) AVG
B) COUNT
C) MAX
D) MIN
E) MEAN
Answer: B
82) In an SQL query, the built-in function COUNT works with columns containing data of which of the following data types?
A) Integer
B) Numeric
C) Char
D) A and B
E) A, B, and C
Answer: E
83) In an SQL query, which SQL keyword is used with built-in functions to group together rows that have the same value in a specified column?
A) GROUP BY
B) ORDER BY
C) SELECT
D) SORT BY
E) DISTINCT SET
Answer: A
84) In an SQL query, which SQL keyword is used with GROUP BY to select groups meeting specified criteria?
A) AND
B) EXISTS
C) HAVING
D) IN
E) WHERE
Answer: C
85) Given a table with the structure: EMPLOYEE (EmpNo, Name, Salary, HireDate), which of the following is not a valid ANSI SQL command?
A) SELECT *
FROM EMPLOYEE
WHERE Name LIKE 'Ja%';
B) SELECT COUNT(*)
FROM EMPLOYEE
WHERE Salary < 30000;
C) SELECT COUNT(EmpNo)
FROM EMPLOYEE;
D) SELECT HireDate, COUNT(*)
FROM EMPLOYEE
WHERE Salary < 30000;
E) SELECT HireDate, COUNT(*)
FROM EMPLOYEE
GROUP BY HireDate;
Answer: D

88) In an SQL query, which SQL keyword is used to implement a subquery?
A) GROUP BY
B) HAVING
C) ORDER BY
D) SELECT
E) SORT BY

Answer: D

89) When one SQL query is embedded in another SQL query, this is referred to as a ________.
A) subset
B) join
C) WHERE Query
D) subquery

E) set query
Answer: D
90) When one SQL query is embedded in another SQL query, the second SQL query is embedded in the ________ of the first query.
A) SELECT
B) FROM
C) WHERE
D) GROUP BY
E) HAVING
Answer: C
91) When one SQL query is embedded in another SQL query, the first SQL query can still contain an SQL ________ clause.
A) FROM THE
B) WHERE THE
C) ORDER BY
D) GROUP BY
E) C and D
Answer: E
92) In an SQL query, which SQL keyword is used to specify the names of tables to be joined?
A) FROM
B) HAVING
C) JOIN
D) SELECT
E) WHERE
Answer: A
93) In an SQL query, which SQL keyword is used to specify the column names to be used in a join?
A) FROM
B) HAVING
C) JOIN
D) SELECT
E) WHERE
Answer: E
94) Regarding the interchangeability of subqueries and joins,
A) a join can always be used as an alternative to a subquery, and a subquery can always be used as an alternative to a join.
B) a join can sometimes be used as an alternative to a subquery, and a subquery can sometimes be used as an alternative to a join.
C) a join can always be used as an alternative to a subquery, and a subquery can sometimes be used as an alternative to a join.
D) a join can sometimes be used as an alternative to a subquery, and a subquery can always be used as an alternative to a join.
E) a join can never be used as an alternative to a subquery, and a subquery can never be used as an alternative to a join.
Answer: B
95) In an SQL query of two tables, which SQL keyword indicates that we want data from all the rows of one table to be included in the result, even if the row does not correspond to any data in the other table?
A) LEFT JOIN
B) RIGHT JOIN
C) INCLUDE
D) A and B
E) A, B, and C
Answer: D
1) All relations are tables, but not all tables are relations.
Answer: TRUE
2) A relation is a three-dimensional table.
Answer: FALSE
3) A characteristic of a relation is that the cells of the relation hold a single value.
Answer: TRUE
4) A characteristic of a relation is that the rows of a relation may hold identical values.
Answer: FALSE
5) A relation is a table composed of columns and rows.
Answer: TRUE
6) In relational terms as defined by E.F. Codd, a row is called a tuple.
Answer: TRUE
7) In relational terms as defined by E.F. Codd, a column is called an attribute.
Answer: TRUE
8) The columns of a relation are sometimes called tuples.
Answer: FALSE
9) A tuple is a group of one or more columns that uniquely identifies a row.
Answer: FALSE
10) A functional dependency is a relationship between attributes such that if we know the value of one attribute, we can determine the value of the other attribute.
Answer: TRUE
11) If by knowing the value of A we can find the value of B, then we would say that B is functionally dependent on A.
Answer: TRUE
12) In functional dependencies, the attribute whose value is known or given is referred to as the determinant.
Answer: TRUE
13) Attribute Y is functionally dependent on attribute X if the value of attribute X determines the value of Y.
Answer: TRUE
14) The functional dependency noted as A → B means that the value of A can be determined from the value of B.
Answer: FALSE
15) In the functional dependency shown as A → B, B is the determinant.
Answer: FALSE
16) Functional dependencies can involve groups of attributes.
Answer: TRUE
17) Given the functional dependency (A, B) → C, the attributes (A, B) are referred to as a composite determinant.
Answer: TRUE
18) Given the functional dependency A → (B, C), then it is true that A → B and A → C.
Answer: TRUE
19) Given the functional dependency (A, B) → C, then it is true that A → C and B → C.
Answer: FALSE
20) Given the functional dependency A → B, then it is necessarily true that B → A.
Answer: FALSE
21) A determinant of a functional dependency may or may not be unique in a relation.
Answer: TRUE
22) A key is a combination of one or more columns that is used to identify particular rows in a relation.
Answer: TRUE
23) A row can be uniquely identified by a key.
Answer: TRUE
24) A combination key is a group of attributes that uniquely identifies a row.
Answer: FALSE
25) A key can be composed of a group of attributes taken together.
Answer: TRUE
26) It is possible to have a relation that does not have a key.
Answer: FALSE
27) A candidate key is one of a group of keys that may serve as the primary key in a relation.
Answer: TRUE
28) A relation can have only one candidate key.
Answer: FALSE
29) A primary key is a candidate key that has been selected to uniquely identify rows in a relation.
Answer: TRUE
30) A surrogate key is an artificial column that is added to a relation to be its primary key.
Answer: TRUE
31) Surrogate keys usually slow performance.
Answer: FALSE
32) Surrogate keys are normally not shown on forms or reports.
Answer: TRUE
33) A foreign key is one or more columns in one relation that also is the primary key in another table.
Answer: TRUE
34) A referential integrity constraint is used to make sure the values of a foreign key match a valid value of a primary key.
Answer: TRUE
35) A constraint that requires an instance of an entity to exist in one relation before it can be referenced in another relation is called an insertion anomaly.
Answer: FALSE
36) A referential integrity constraint limits the values of a foreign key.
Answer: TRUE
37) If a table meets the minimum definition of a relation, it has an effective or appropriate structure.
Answer: FALSE
38) Undesirable consequences of changing the data in a relation are called "modification anomalies."
Answer: TRUE
39) A deletion anomaly exists when deleting data about one entity results in the loss of data about another entity.
Answer: TRUE
40) Relations are classified into "normal forms" based on the types of modification anomalies that they are vulnerable to.
Answer: TRUE
41) Any table that meets the definition of a relation is said to be in first normal form (1NF).
Answer: TRUE
42) Any table that meets the definition of a relation is in 2NF.
Answer: FALSE
43) A relation is in 2NF if and only if it is in 1NF and all non-key attributes are determined by the entire primary key.
Answer: TRUE
44) A relation is in 3NF if and only if it is in 2NF and there are no non-key attributes determined by another non-key attribute.
Answer: TRUE
45) The condition that a non-key attribute determines another non-key attribute is known as transitive dependency.
Answer: TRUE
46) An attribute is considered to be a non-key attribute when it is a non-prime attribute, which means that the attribute is not contained in any candidate key.
Answer: TRUE
47) Candidate keys are called interlocking candidate keys when they share one or more attributes.
Answer: FALSE
48) A relation is in Boyce-Codd Normal Form (BCNF) if and only if it is in 3NF and every determinant is a candidate key.
Answer: TRUE
49) A defining requirement for Boyce-Codd Normal Form (BCNF) is that every candidate key must be a determinant.
Answer: FALSE
50) Every time we break up a relation during the normalization process, we may have to create a referential integrity constraint.
Answer: TRUE
51) The essence of normalization is taking a relation that is not in BCNF and breaking it into multiple relations such that each one is in BCNF.
Answer: TRUE
52) When designing or normalizing relations, each relation should have only one theme.
Answer: TRUE
53) A multivalued dependency exists when a determinant is matched to a set of values.
Answer: TRUE
54) The multivalued dependency noted as A → → B, means that the value of A determines a set of values of B.
Answer: TRUE
55) A relation is in 4NF when multivalued dependencies are isolated in their own relation.
Answer: TRUE
56) A relation is in 4NF if it is in BCNF and it has no multivalued dependencies.
Answer: TRUE
57) Domain/key normal form requires that every constraint be a logical consequence of the definition of domains and keys.
Answer: TRUE
58) A relation that is in domain/key normal form is assured to be free from all anomalies.
Answer: TRUE
59) A relation ________.
A) has rows containing data about an entity
B) has columns containing data about attributes of the entity
C) has cells that hold only a single value
D) has no two identical rows
E) All of the above.
Answer: E
60) In a relation ________.
A) entities in a column vary as to kind
B) the order of the columns is important
C) the order of the rows is unimportant
D) more than one column can use the same name
E) All of the above.
Answer: C
61) A relation is also known as a(n) ________.
A) table
B) tuple
C) relationship
D) attribute
E) field
Answer: A
62) A tuple is also known as a(n) ________.
A) table
B) relation
C) row
D) field
E) file
Answer: C
63) An attribute is also known as a(n) ________.
A) table
B) relation
C) row
D) field
E) file
Answer: D
64) Saying that two entities are functionally dependent means that ________.
A) the entities are always connected by a mathematical equation
B) for one of the entities, if we are given the value of that entity, we can determine the value of one other entity
C) for both of the entities, if we are given the value of one entity, we can determine the value of the other entity
D) the functional dependency will have to be removed through normalization
E) All of the above.
Answer: B
65) Given the functional dependency A → (B, C), A is a(n) ________.
A) independent variable
B) dependent variable
C) determinant
D) composite determinant
E) C and D
Answer: C
66) Given the functional dependency (A, B) → C, (A, B) is a(n) ________.
A) independent variable
B) dependent variable
C) determinant
D) composite determinant
E) C and D
Answer: E
67) Given the functional dependency (A, B) → C, then ________.
A) A → B
B) A → C
C) B → A
D) B → C
E) None of the above is correct.
Answer: E
68) Which of the following is true about the functional dependency A → (X, Y)?
A) X is functionally dependent on A.
B) A determines Y.
C) A is a determinant.
D) X and Y are functionally dependent on A.
E) All of the above.
Answer: E
69) Which of the following is true about the functional dependency (A, B) → (C, D)?
A) A is the determinant of C.
B) A and B together are determined by C and D together.
C) A and B together determine D.
D) C and D together determine A.
E) A determines B.
Answer: C
70) The only reason(s) for having relations is to ________.
A) store instances of functional dependencies
B) store equation components
C) store equation results
D) B and C
E) A, B, and C
Answer: A
71) A combination of one or more columns used to identify particular rows in a relation is a ________.
A) record
B) field
C) key
D) tuple
E) dependency
Answer: C
72) A combination of two or more columns used to identify particular rows in a relation is a ________.
A) record
B) field
C) composite key
D) foreign key
E) surrogate key
Answer: C
73) A determinant that determines all the other columns in a relation is a ________.
A) record
B) field
C) foreign key
D) candidate key
E) surrogate key
Answer: D
74) When designing a database, one of the candidate keys in a relation is selected as the ________.
A) composite key
B) primary key
C) foreign key
D) surrogate key
E) dependency
Answer: B
75) An artificial column added to a relation to serve as the primary key is a ________.
A) composite key
B) candidate key
C) foreign key
D) surrogate key
E) dependency
Answer: D
76) A key consisting of one or more columns that is a primary key in another relation is a ________.
A) composite key
B) candidate key
C) foreign key
D) surrogate key
E) dependency
Answer: C
77) Referential integrity constraints are used to limit the possible values of a ________.
A) composite key
B) candidate key
C) foreign key
D) surrogate key
E) dependency
Answer: C
78) A ________ is used to limit the possible values of a(n) foreign key.
A) composite key
B) surrogate key
C) functional dependency
D) referential integrity constraint
E) normal form
Answer: D
79) Normalization is a process used to deal with which of the following modification anomalies?
A) Insertion anomaly
B) Update anomaly
C) Deletion anomaly
D) A and B
E) A, B, and C
Answer: E
80) If the removal of facts about one entity results in the unintentional loss of data about another entity, this is referred to as a(n) ________.
A) normalization anomaly
B) insertion anomaly
C) update anomaly
D) deletion anomaly
E) removal anomaly
Answer: D
81) Suppose that you need to update one value of the column SalesCost in a relation. The way the relation is constructed, this value actually needs to be changed in three different rows. However, you only change the value in two of the rows. You have just created an a(n) ________.
A) normalization anomaly
B) insertion anomaly
C) update anomaly
D) deletion anomaly
E) removal anomaly
Answer: C
82) A table that meets the definition of a relation is in ________.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Boyce-Codd Normal Form
E) Fourth Normal Form
Answer: A
83) A relation is in second normal form (2NF) if and only if it is in 1NF and ________.
A) all non-key attributes are determined by the entire primary key
B) there are no non-key attributes determined by another non-key attribute
C) every attribute is a candidate key
D) every candidate key is a determinant
E) every determinant is a candidate key
Answer: A
84) A relation is in third normal form (3NF) if and only if it is in 2NF and ________.
A) all non-key attributes are determined by the entire primary key
B) there are no non-key attributes determined by another non-key attribute
C) every attribute is a candidate key
D) every candidate key is a determinant
E) every determinant is a candidate key
Answer: B
85) A relation is in Boyce-Codd normal form (BCNF) if and only if it is in 3NF and ________.
A) all non-key attributes are determined by the entire primary key
B) there are no non-key attributes determined by another non-key attribute
C) every attribute is a candidate key
D) every candidate key is a determinant
E) every determinant is a candidate key
Answer: E
86) If a table is designed so that every determinant is a candidate key, then that relation is in ________.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Boyce-Codd Normal Form
E) Fourth Normal Form
Answer: D
87) If a relation is in BCNF, and each multivalued dependency has been moved to a relation of its own, then the first relation is in ________.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Boyce-Codd Normal Form
E) Fourth Normal Form
Answer: E
88) A relation is in fourth normal form if it is in BCNF and it has no ________.
A) transitive dependencies
B) multivalued dependencies
C) partial dependencies
D) deletion dependencies
E) referential integrity conflicts
Answer: B

89) A relation is in domain/key normal form if ________.
A) every key of the relation is a logical consequence of the definition of constraints and determinants
B) every key of the relation is a logical consequence of the definition of constraints and domains
C) every constraint on the relation is a logical consequence of the definition of keys and determinants
D) every constraint on the relation is a logical consequence of the definition of keys and domains
E) every domain of the relation is a logical consequence of the definition of keys and constraints

Answer: D
90) In general, each relation should have ________.
A) one and only one theme
B) one or more themes
C) exactly two themes
D) one or two themes
E) exactly three themes
Answer: A
1) When you are given a set of tables and asked to create a database to store their data, the first step is to assess the tables' structure and content.
Answer: TRUE
2) The first step in assessing table structure is to count rows and examine columns.
Answer: TRUE
3) To count the number of rows in a table, use the SQL construct COUNT(ROWS).
Answer: FALSE
4) To determine the number and type of columns in a table, use the SQL construct COUNT(*).
Answer: FALSE
5) To limit the number of rows retrieved from a table, use the SQL TOP keyword.
Answer: TRUE
6) When examining data values as a part of assessing table structure, you should try to determine two types of dependencies: functional dependencies and functional dependencies.
Answer: TRUE
7) When examining data values as a part of assessing table structure, you should try to determine three types of keys: the primary key, any candidate keys and any foreign keys.
Answer: TRUE
8) The second step in assessing table structure is to examine data values and determine dependencies and keys.
Answer: TRUE
9) When examining data values as a part of assessing table structure, you should try to determine functional dependencies.
Answer: TRUE
10) When examining data values as a part of assessing table structure, you should try to determine multivalued dependencies.
Answer: TRUE
11) When examining data values as a part of assessing table structure, you should try to determine the table's primary key.
Answer: TRUE
12) When examining data values as a part of assessing table structure, there is no need to try to determine candidate keys other than the table's primary key.
Answer: FALSE
13) When examining data values as a part of assessing table structure, there is no need to try to determine foreign keys.
Answer: FALSE
14) The third step in assessing table structure is to check the validity of presumed referential integrity constraints.
Answer: TRUE
15) The elimination of modification anomalies and the reduction of duplicated data are advantages of normalization.
Answer: TRUE
16) Database design varies depending on whether you're building an updatable database or a read-only database.
Answer: TRUE
17) Normalization eliminates modification anomalies and data duplication.
Answer: FALSE
18) The presence of one or more foreign keys in a relation means that we cannot eliminate duplicated data in that table.
Answer: TRUE
19) Normalization requires applications to use more complex SQL since they will need to write subqueries and joins to recombine data stored in separate relations.
Answer: TRUE
20) Relations are sometimes left unnormalized to improve performance.
Answer: TRUE
21) Relations in BCNF have no modification anomalies in regard to functional dependencies.
Answer: TRUE
22) A defining requirement for BCNF is that every determinant must be a candidate key.
Answer: TRUE
23) The SQL INSERT statement can be used to populate normalized tables.
Answer: TRUE
24) The SQL DELETE TABLE statement can be used to remove unneeded tables after the normalized tables are created and populated.
Answer: FALSE
25) SQL statements that can be used to create referential integrity statements for normalized tables are created during the normalization process.
Answer: TRUE
26) The standard sales order/line item pattern is a classic example of unneeded normalization.
Answer: FALSE
27) Multivalued dependencies create anomalies so serious that multivalued dependencies must always be eliminated.
Answer: TRUE
28) Writing SQL subqueries and joins against normalized tables is simple compared to the code that must be written to handle anomalies from multivalued dependencies.
Answer: TRUE
29) To eliminate multivalued dependencies, normalize your tables so that they are all in BCNF.
Answer: FALSE
30) Creating a read-only database is a job often given to beginning database professionals.
Answer: TRUE
31) Read-only databases are often updated.
Answer: FALSE
32) Design guidelines and priorities are the same whether you're working with an updatable database or a read-only database.
Answer: FALSE
33) Normalization is an advantage for a read-only database.
Answer: FALSE
34) Denormalization is the process of joining previously normalized tables back together.

Answer: TRUE

35) Denormalization reduces the complexity of the SQL statements needed in an application to read required data.
Answer: TRUE
36) Denormalization is simple—join the data together and store it in a table.
Answer: TRUE
37) Read-only databases seldom use more than one copy of a set of same data.
Answer: FALSE
38) Read-only databases often use several copies of a set of the same data, where each copy is modified for a specific use.
Answer: TRUE
39) Multivalued dependencies show up under a different name as the multivalued, multicolumn problem.
Answer: TRUE
40) The multivalued, multicolumn problem occurs when a set of columns are used to store data that should actually be in one column.
Answer: TRUE
41) One situation created by the multivalued, multicolumn problem is that the maximum number of data values for an attribute is limited.
Answer: TRUE
42) If you have a table with a set of columns named "Child01", "Child02" and "Child03", the table has the multivalued, multicolumn problem.
Answer: TRUE
43) When you are creating a database from existing data, you will have only minor problems with inconsistent values.
Answer: FALSE
44) An inconsistent values problem is created when different users have coded the same data entries differently.
Answer: TRUE
45) The problem of misspelled data entries is an entirely different problem than the inconsistent values problem.
Answer: FALSE
46) You are creating a BOAT table using existing data from multiple sources, and you find that you have "power boat blue", "boat, power, blue" and "blue power boat" as data values for the same column. This is an example of the inconsistent values problem.
Answer: TRUE
47) A missing value is called a null value.
Answer: TRUE
48) Null values are a problem because they are ambiguous.
Answer: TRUE
49) A null value in a column may indicate that there is no appropriate value for that attribute.
Answer: TRUE
50) A null value in a column may indicate that there is an appropriate value for that attribute, but it is unknown.
Answer: TRUE
51) A null value in a column may indicate that there is an appropriate value for that attribute, and although the value is known no one has entered the value into the database.
Answer: TRUE
52) Most DBMS products will let you define a primary key on a column that contains null values.
Answer: FALSE
53) The SQL IS NULL keyword can be used to count the number of nulls in a column.
Answer: TRUE
54) General-purpose remarks columns rarely contain important data.
Answer: FALSE
55) The problem with a general-purpose remarks column is that the data it contains are likely to be verbal, inconsistent and stored in a verbose manner.
Answer: TRUE
56) If you see a column name Notes, it is likely that this is a general-purpose remarks column.
Answer: TRUE
57) When you are given a set of tables and asked to create a database to store their data, the first step is to ________.
A) assess the existing tables' structure and content
B) design the database structure
C) create one or more new tables
D) move the data into the new database
E) design the applications that will use the database
Answer: A
58) The first step in assessing table structure includes ________.
A) counting rows
B) examining columns
C) examining data values
D) A and B
E) B and C
Answer: D
59) The second step in assessing table structure includes ________.
A) counting rows
B) examining columns
C) examining data values
D) A and B
E) B and C
Answer: C
60) During the second step of assessing table structure, you are trying to determine ________.
A) multivalued dependencies
B) functional dependencies
C) foreign keys
D) A and B
E) A, B, and C
Answer: E
61) During the second step of assessing table structure, you are trying to determine ________.
A) primary keys
B) candidate keys
C) foreign keys
D) A and B
E) A, B, and C
Answer: E
62) To count the number of rows in a table, use the SQL construct ________.
A) SELECT *
B) SELECT TOP n *
C) SELECT COUNT(TOP n)
D) SELECT COUNT(*)
E) SELECT COUNT *
Answer: D
63) The SQL function COUNT ________.
A) counts the number of columns in a table
B) counts the number of rows in a table
C) counts the number of tables in a database
D) A and C
E) B and C
Answer: B
64) To limit the number of rows retrieved from a table, use the SQL construct ________.
A) SELECT *
B) SELECT TOP n *
C) SELECT COUNT(TOP n)
D) SELECT COUNT(*)
E) SELECT COUNT *
Answer: B
65) The SQL keyword TOP ________.
A) limits the number of columns retrieved from a table
B) limits the number of rows retrieved from a table
C) limits the number of tables retrieved from a database
D) A and C
E) B and C
Answer: B

67) The advantages of normalization include ________.
A) the elimination of modification anomalies
B) the elimination of duplicated data
C) more complex SQL for multitable subqueries and joins
D) A and B
E) A, B, and C
Answer: A
68) The disadvantages of normalization include ________.
A) the elimination of modification anomalies
B) the elimination of duplicated data
C) more complex SQL for multitable subqueries and joins
D) A and B
E) A, B, and C
Answer: C
69) The presence of one or more foreign keys in a relation prevents ________.
A) the elimination of modification anomalies
B) the elimination of duplicated data
C) more complex SQL for multitable subqueries and joins
D) A and B
E) A, B, and C
Answer: B
70) Anomalies caused by functional dependencies can be eliminated by putting tables into ________.
A) 1NF
B) 2NF
C) 3NF
D) BCNF
E) 4NF
Answer: D
71) The defining characteristic of BCNF is that a table is in BCNF if ________.
A) all rows are unique
B) all columns are consistent
C) the primary key is a candidate key
D) all determinants are candidate keys
E) all candidate keys are determinants
Answer: D
72) A classic example of unneeded normalization is when we are dealing with ________.
A) ZIP codes
B) sales orders and line items
C) association patterns
D) multivalued dependencies
E) general purpose remarks columns
Answer: A
73) Unlike the anomalies from functional dependencies, the anomalies from ________ are so serious that they should always be eliminated.
A) ZIP codes
B) sales orders and line items
C) association patterns
D) multivalued dependencies
E) general purpose remarks columns
Answer: D
74) Read-only databases are used for ________.
A) updating
B) querying
C) reporting
D) A and B
E) B and C
Answer: E
75) For a number of reasons, ________ is not often an advantage for a read-only database.
A) updating
B) normalization
C) denormalization
D) A and B
E) B and C
Answer: B
76) ________ is the process of joining two or more tables and storing the result as a single table.
A) Querying
B) Normalization
C) Denormalization
D) A and B
E) B and C
Answer: C
77) An advantage of denormalization is ________.
A) faster updating
B) faster querying
C) less complex SQL in application code
D) A and B
E) B and C
Answer: E
78) A table designed to store PhoneNumber01, PhoneNumber02 and PhoneNumber03 contains ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: A
79) A form of multivalued dependency is found in ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: A
80) When a table is created using existing data from multiple sources, you are likely to find that the different sources code data in slightly different ways. This is an example of ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: B
81) You are creating a PRODUCT table using existing data from multiple sources. Examining the data, you find that you have "large red hat", "large hat, red", "red hat large" and "hat, large, red." This is an example of ________.
A) the multivalue, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: B
82) The problem of misspelled data entries is really the same as ________.
A) the multivalue, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: B
83) When a table is created using existing data from multiple sources, you are likely to find that some data values have never been provided. This is an example of ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: C
84) When a table is created using existing data from multiple sources, you are likely to find that some data values have never been provided. This is an example of ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: C
85) Reviewing the work done on a table that was created using existing data from multiple sources, you are likely to find that some data values that were provided were never entered into the table. This is an example of ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: C
86) A missing value is called a(n) ________.
A) empty value
B) null value
C) missing value
D) Any of A, B, or C can be used.
E) None of the above is correct.
Answer: B
87) A null value can indicate which of the following conditions?
A) The value is inappropriate.
B) The value is appropriate but unknown.
C) The value is appropriate and known, but not entered into the database.
D) A, B, and C
E) None of the above is correct.
Answer: D
88) To check for null values in a column in a table, use the SQL phrase ________.
A) IS
B) IS NOT
C) IS NULL
D) COUNT(IS NOT)
E) COUNT(IS NULL)
Answer: C
89) The SQL keyword IS NULL can be used to ________.
A) count the number of columns in a table
B) count the number of rows in a table
C) count the number of null values in a column
D) A and C
E) B and C
Answer: C
90) Reviewing the work done on a table that was created using existing data from multiple sources, you find that a column name Remarks has been included, and it is populated with inconsistent and verbose verbal data. This is an example of ________.
A) the multivalued, multicolumn problem
B) the inconsistent values problem
C) the missing values problem
D) the general-purpose remarks column problem
E) None of the above is correct.
Answer: D
1) A data model is a plan for a database design.
Answer: TRUE
2) The method of constructing data models used in the text is the extended entity-relationship (E-R) model.
Answer: TRUE
3) An entity is something that users want to track.
Answer: TRUE
4) Entities of a given type are grouped into entity classes.
Answer: TRUE
5) An entity class is described by the structure of the entities in that class.

Answer: TRUE

6) An entity instance is the occurrence of a particular entity.
Answer: TRUE
7) An entity instance of an entity class is the representation of a particular entity and is described by the values of the attributes of the entity.
Answer: TRUE
8) An identifier of an entity instance is one or more attributes that name or identify entity instances.
Answer: TRUE
9) A compound identifier is an identifier consisting of two or more attributes.
Answer: FALSE
10) In E-R modeling, an attribute describes the characteristics of an entity.
Answer: TRUE
11) In E-R modeling, entities within an entity class may have different attributes.
Answer: FALSE
12) An identifier of an entity instance must consist of one and only one attribute.
Answer: FALSE
13) A composite identifier is defined as a composite attribute that is an identifier.
Answer: FALSE
14) An identifier serves the same role for a table that a key does for an entity.
Answer: FALSE
15) Entities can be associated with one another in relationships.
Answer: TRUE
16) The degree of a relationship is the number of entity classes in the relationship.
Answer: TRUE
17) A binary relationship is a relationship between two or more entities.
Answer: FALSE
18) Relationships of degree two are referred to as binary relationships.
Answer: TRUE
19) E-R modeling recognizes both relationship classes and relationship instances.
Answer: TRUE
20) In today's E-R models, attributes of relationships are still used.
Answer: FALSE
21) A single relationship class involves only one entity class.
Answer: FALSE
22) A binary relationship is a relationship based on numerical entity instance identifiers.
Answer: FALSE
23) The degree of a relationship is expressed as the relationship's maximum cardinality.
Answer: FALSE
24) When transforming a data model into a relational design, relationships of all degrees are treated as combinations of binary relationships.
Answer: TRUE
25) The principal difference between an entity and a table is that you can express a relationship between entities without using foreign keys.
Answer: TRUE
26) When designing a database, first identify the entities, then determine the attributes, and finally create the relationships.
Answer: FALSE
27) The notation 1:N shows the relationship's maximum cardinality.
Answer: TRUE
28) Relationships are classified by their cardinality.
Answer: TRUE
29) A relationship's maximum cardinality indicates the maximum number of entities that can participate in the relationship.
Answer: FALSE
30) In an E-R model, the three types of maximum cardinality are 1:1, 1:N and N:M.
Answer: TRUE
31) In a 1:N relationship, the term parent refers to the N side of the relationship.
Answer: FALSE
32) In a 1:N relationship, the parent entity is on the one side of the relationship, and the child entity is on the many side of the relationship.
Answer: TRUE
33) A relationship's minimum cardinality indicates the number of entity instances that must participate in the relationship.
Answer: TRUE
34) A relationship's minimum cardinality indicates whether or not an entity must participate in the relationship.
Answer: TRUE
35) In an E-R model, the three types of minimum cardinality are mandatory, optional and indeterminate.
Answer: FALSE
36) An entity that represents something that can exist on its own is called a strong entity.
Answer: TRUE
37) E-R models use an identifying relationship to connect entities that are ID-dependent.
Answer: TRUE
38) An ID-dependent entity is an entity whose identifier includes the identifier of another entity.
Answer: TRUE
39) ID-dependent entities are associated by a nonidentifying relationship.
Answer: FALSE
40) A weak entity is an entity that cannot exist in the database without (and is logically dependent upon) another type of entity also existing in the database.
Answer: TRUE
41) ID-dependent entities are a common type of weak entity.
Answer: TRUE
42) All weak entities must have a minimum cardinality of 1 on the entity on which it depends.
Answer: TRUE
43) Subtype entities contain only attributes unique to the subtypes.
Answer: TRUE
44) An attribute that determines which subtype is appropriate is called a discriminator.
Answer: TRUE
45) An exclusive subtype pattern has one supertype entity that relates to one or more subtype entities.
Answer: FALSE
46) Entities with an IS-A relationship should have the same identifier.
Answer: TRUE
47) One example of a database design using an ID-dependent relationship is the association pattern.
Answer: TRUE
48) One example of a database design using a strong relationship is the multivalued attribute pattern.
Answer: FALSE
49) One example of a database design using an ID-dependent relationship is the archetype/instance pattern.
Answer: TRUE
50) Data modelers agree that weak, non-ID-dependent entities exist and are important.
Answer: FALSE
51) Entities containing optional sets of attributes are often represented using subtypes.
Answer: FALSE
52) The supremetype entity contains the attributes that are common to all subtypes.
Answer: FALSE
53) An attribute that determines which subtype is appropriate is called a discriminator.
Answer: TRUE
54) Subtypes can be exclusive or inclusive.
Answer: TRUE
55) Relationships between supertypes and subtypes are called IS-A relationships.
Answer: TRUE
56) Relationships among instances of a single entity class are called redundant relationships.
Answer: FALSE
57) There are three types of recursive relationships: 1:1, 1:N and N:M.
Answer: TRUE
58) Recursive relationships only exist for one-to-one relationships.
Answer: FALSE
59) Which of the following is not a key element of an E-R model?
A) Identifiers
B) Entities
C) Objects
D) Attributes
E) Relationships
Answer: C
60) Entities of a given type are grouped into an ________.
A) entity class
B) entity relationship
C) entity instance
D) entity attribute
E) None of the above.
Answer: A
61) The occurrence of a particular entity is called an ________.
A) entity class
B) entity relationship
C) entity instance
D) entity attribute
E) None of the above.
Answer: C
62) The characteristics of a thing are described by its ________.
A) identifiers
B) entities
C) objects
D) attributes
E) relationships
Answer: D
63) Attributes may be ________.
A) composite
B) element
C) multivalued
D) A and C
E) B and C
Answer: D
64) An identifier may be ________.
A) composite
B) a single attribute
C) a relationship
D) A and B
E) A, B, and C
Answer: D
65) A composite attribute is an attribute that ________.
A) is multivalued
B) describes a characteristic of the relationship
C) consists of a group of attributes
D) is calculated at run-time
E) is an identifier
Answer: C
66) For a relationship to be considered a binary relationship it must satisfy which of the following conditions?
A) It must involve exactly two entity classes.
B) It must have a maximum cardinality of 1:1.
C) It must have a maximum cardinality of 1:N.
D) A and B
E) A and C
Answer: A
67) Common variants of the E-R model include:
A) IE Crow's Foot
B) IDEF1X
C) UML
D) A and B
E) A, B, and C
Answer: E
68) Maximum cardinality refers to ________.
A) the most instances of one entity class that can be involved in a relationship instance with another entity class
B) the minimum number of entity classes involved in a relationship
C) whether or not an instance of one entity class is required to be related to an instance of another entity class
D) whether or not an entity is a weak entity
E) None of the above.
Answer: A
70) You are given an E-R diagram with two entities, ORDER and CUSTOMER, as shown above, and are asked to draw the relationship between them. If a given customer can place many orders and a given order can be placed by at most one customer, which of the following should be indicated in the relationship symbol between the two entities?
A) 0:1
B) 1:1
C) 1:N
D) N:1
E) N:M
Answer: D
71) You are given an E-R diagram with two entities, ORDER and CUSTOMER, as shown above, and are asked to draw the relationship between them. If a given customer can place many orders and a given order can be placed by one or more customers, which of the following should be indicated in the relationship symbol between the two entities?
A) 0:1
B) 1:1
C) 1:N
D) N:1
E) N:M
Answer: E
72) Minimum cardinality refers to ________.
A) the most instances of one entity class that can be involved in a relationship with one instance of another entity class
B) the minimum number of entity classes involved in a relationship
C) whether or not an instance of one entity class is required to be related to an instance of another entity class
D) whether or not an entity is a weak entity
E) None of the above.
Answer: C
73) In a minimum cardinality, minimums are generally stated as ________.
A) 0
B) 1
C) N
D) A or B
E) A, B, or C
Answer: D
74) A hash mark across the relationship line near an entity indicates ________.
A) a maximum cardinality of "zero"
B) a maximum cardinality of "one"
C) a minimum cardinality of "optional"
D) a minimum cardinality of "required"
E) None of the above.
Answer: D
75) A circle across the relationship line near an entity indicates ________.
A) a maximum cardinality of "zero"
B) a maximum cardinality of "one"
C) a minimum cardinality of "optional"
D) a minimum cardinality of "required"
E) None of the above.
Answer: C
77) You are given an E-R diagram with two entities, ORDER and CUSTOMER, as shown above. What does the symbol next to the CUSTOMER entity indicate?
A) A maximum cardinality of "zero"
B) A maximum cardinality of "one"
C) A minimum cardinality of "optional"
D) A minimum cardinality of "required"
E) None of the above.
Answer: D
78) An entity whose identifier includes the identifier of another entity is a(n) ________.
A) strong entity
B) weak entity
C) ID-dependent entity
D) A and C
E) B and C
Answer: E
79) An entity whose existence depends on the presence of another entity but whose identifier does not include the identifier of the other entity is a(n) ________.
A) strong entity
B) weak entity
C) ID-dependent entity
D) A and C
E) B and C
Answer: B
80) Which of the following is considered to be a weak entity?
A) ID-dependent entity
B) subtype entity
C) association entity
D) B and C
E) A, B, and C
Answer: E
81) An entity that holds specialized attributes that distinguish it from one or more other similar entities is a ________.
A) supertype
B) subtype
C) discriminator
D) A and C
E) B and C
Answer: B
82) Which of the following is not true about subtype entities?
A) Subtypes may be exclusive.
B) The supertype and subtypes will have the same identifier.
C) Subtypes are used to avoid a situation in which some attributes are required to be null.
D) Subtypes have attributes that are required by the supertype.
E) Subtypes can produce a closer-fitting data model.
Answer: E
83) An attribute that determines which subtype should be used is a ________.
A) supertype
B) subtype
C) discriminator
D) A and C
E) B and C
Answer: C
84) Discriminators can be ________.
A) exclusive only
B) inclusive only
C) decisive only
D) A or B
E) B or C
Answer: D
85) Supertype/subtype entities are said to have a(n) ________ relationship.
A) HAS-A
B) IS-A
C) recursive
D) redundant
E) multivalue
Answer: B
86) To represent an association pattern in an E-R model, ________.
A) create a new ID-dependent entity with a 1:1 relationship to one other entity
B) create a new weak, but not ID-dependent entity with a 1:1 relationship to one other entity
C) create a new strong entity with a 1:1 relationship to one other entity
D) create a new ID-dependent entity with a 1:N relationship to one of two parent entities
E) create a new weak, but not ID-dependent entity with a 1:N relationship to one of two parent entities
Answer: D
87) To represent a multivalued attribute in an E-R model, ________.
A) create a new ID-dependent entity with a 1:N relationship
B) create a new weak, but not ID-dependent entity with a 1:N relationship
C) create a new strong entity with a 1:1 relationship
D) create a new ID-dependent entity with a 1:1 relationship
E) create a new weak, but not ID-dependent entity with a 1:1 relationship
Answer: A
88) To represent an archetype/instance pattern in an E-R model, ________.
A) create a new ID-dependent entity with a 1:N relationship
B) create a new weak, but not ID-dependent entity with a 1:N relationship
C) create a new strong entity with a 1:1 relationship
D) create a new ID-dependent entity with a 1:1 relationship
E) create a new weak, but not ID-dependent entity with a 1:1 relationship
Answer: A
89) When an entity has a relationship to itself, we have a(n) ________.
A) supertype/subtype relationship
B) archetype/instance relationship
C) recursive relationship
D) A or C
E) B or C
Answer: C
90) Recursive relationships can have which of the following maximum cardinalities?
A) 1:1
B) 1:N
C) N:M
D) A or B
E) A, B, or C
Answer: E
1) The first step in the database design process is to create tables and columns from entities and attributes.
Answer: TRUE
2) When creating a relational database design from E-R diagrams, first create a relation for each relationship.
Answer: FALSE
3) Each entity in the extended E-R model is represented as a table in the relational database design.
Answer: TRUE
4) An entity needs to be examined according to normalization criteria before creating a table from it in the relational database design.
Answer: FALSE
5) When creating a table in the relational database design from an entity in the extended E-R model, the attributes of the entity become the rows of the table.
Answer: FALSE
6) By default, the identifier of the entity becomes the foreign key of the corresponding table.
Answer: FALSE
7) The ideal primary key is short, numeric, and fixed.
Answer: TRUE
8) A surrogate key is appropriate when the primary key of a table contains a lengthy text field.
Answer: TRUE
9) One of the important properties of an attribute is whether or not it is required.
Answer: TRUE
10) A surrogate key is a unique, system-supplied identifier used as the primary key of a table.
Answer: TRUE
11) The values of a surrogate key have no meaning to the users.
Answer: TRUE
12) A surrogate key should be considered when the key contains a lengthy text field.
Answer: TRUE
13) Whether or not an attribute is required is determined during the database modeling phase.
Answer: FALSE
14) A null value is an attribute value that has been set to zero.
Answer: FALSE
15) Data types are consistent across all DBMS products.
Answer: FALSE
16) A default value is the value the user enters into the row the first time the user enters data.
Answer: FALSE
17) A data constraint is a limitation on data values.
Answer: TRUE
18) The last step in creating a table is to verify table normalization.
Answer: TRUE
19) One of the important properties of a column is whether or not it can have a NULL value.
Answer: TRUE
20) A foreign key is a key that does not belong in any table.
Answer: FALSE
21) In a relational database design, all relationships are expressed by creating a foreign key.
Answer: TRUE
22) When the key of one table is placed into a second table to represent a relationship, the key is called a "relational key" in the second table.
Answer: FALSE
23) To represent a 1:1 binary relationship in a relational database design, the key of one table is placed into the second table.
Answer: TRUE
24) When placing a foreign key for a 1:1 relationship, the key of either table can be used as the foreign key in the other table.
Answer: TRUE
25) In a 1:1 relationship, the foreign key is defined as an alternate key to make the DBMS enforce uniqueness.
Answer: TRUE
26) In a 1:N relationship, the term "parent" refers to the table on the "many" side of the relationship.
Answer: FALSE
27) In 1:N relationships, the table on the "one" side is called the parent.
Answer: TRUE
28) In representing a 1:N relationship in a relational database design, the key of the table representing the parent entity is placed as a foreign key in the table representing the child entity.
Answer: TRUE
29) In representing a 1:N relationship in a relational database design, the key of the table representing the entity on the "many" side is placed as a foreign key in the table representing the entity on the "one" side of the relationship.
Answer: FALSE
30) To represent a 1:N relationship in a relational database design, an intersection table is created.
Answer: FALSE
31) In 1:N relationships, the table on the "many" side is called the child.
Answer: TRUE
32) To represent a one-to-many relationship in a relational database design, the key of the child table is placed as a foreign key into the other table.
Answer: FALSE
33) To represent an M:N relationship in a relational database design, a table is created to represent the relationship itself.

Answer: TRUE

34) To represent an M:N relationship in a relational database design, an intersection table is created.
Answer: TRUE
35) To represent an M:N relationship in a relational database design, in essence it is reduced to two 1:N relationships.
Answer: TRUE
36) The key of an intersection table is always the combination of the keys of both parents.
Answer: TRUE
37) In many-to-many relationships in a relational database design, the primary keys of both tables are joined into a composite primary key in the intersection table.
Answer: TRUE
38) An intersection table is always ID-dependent on both of its parent tables.
Answer: TRUE
39) An intersection table can have additional attributes besides the keys of its parent tables.
Answer: FALSE
40) Like all ID-dependent relationships, the parents of an association table are required.
Answer: TRUE
41) Association tables sometimes connect more than two entities.
Answer: TRUE
42) An ID-dependent table can be used to represent multivalued attributes.
Answer: TRUE
43) All identifying relationships are 1:N.
Answer: TRUE
44) When creating a table for an ID-dependent entity, both the key of the parent and the key of the entity itself must appear in the table.
Answer: TRUE
45) The design transformation for all IS-A relationships can be summarized by the phrase "place the key of the parent table in the child table."
Answer: FALSE
46) When transforming an ID-dependent E-R data model relationship into a relational database design where the child entity is designed to use a surrogate key, the relationship changes to a weak but not ID-dependent relationship.
Answer: TRUE
47) When transforming supertype/subtype entities into a relational database design, an entity is created for the supertype only.
Answer: FALSE
48) When transforming supertype/subtype entities into a relational database design, the key of the supertype table is placed into the subtype table typically as the key.
Answer: TRUE
49) To represent an IS-A relationship in a relational database design, the IS-A relationship must be converted into a HAS-A relationship.
Answer: FALSE
50) Discriminator attributes can be represented in relational designs.
Answer: FALSE
51) When transforming supertype/subtype entities into a relational database design, all of the attributes for the supertype table are placed into the subtype relations.
Answer: FALSE
52) When transforming an extended E-R model into a relational database design, recursive relationships are treated fundamentally the same as other HAS-A relationships.
Answer: TRUE
53) Recursive M:N relationships are represented with an intersection table that shows pairs of related rows from a single table.
Answer: TRUE
54) Referential integrity constraints should disallow adding a new row to a child table when the foreign key does not match a primary key value in the parent table.
Answer: TRUE
55) A referential integrity constraint policy that insures that foreign key values in a table are correctly maintained when there is a change to the primary key value in the parent table is called cascading changes.
Answer: FALSE
56) A referential integrity constraint policy that insures that all rows containing a particular foreign key value in a table are eliminated from the table when the row containing the corresponding primary key value in a parent table is eliminated from the database is called cascading deletes.
Answer: TRUE
57) When the parent entity is required (M) in a relationship, every row of the child table must have a valid, non-null value of the foreign key.
Answer: TRUE
58) Cascading deletions are generally not used with relationships between strong entities.
Answer: TRUE
59) Cascading deletions are generally not used with relationships for weak child entities.
Answer: FALSE
60) If the parent is required, then a new child row must be created with a valid foreign key value.
Answer: TRUE
61) When the parent entity has a surrogate key, the enforcement actions are the same for both parent and child.
Answer: FALSE
62) When the child entity is required (M) in a relationship, there needs to be at least one child row for each parent row at all times.
Answer: TRUE
63) It is easy to enforce the referential integrity actions for M-M relationships.
Answer: FALSE
64) Which of the following is not a step in the database design process?
A) Create tables and columns from entities and attributes
B) Select primary keys
C) Represent relationships
D) Create constraints and triggers
E) All of the above are steps in the database design process.
Answer: D
65) The first step in transforming an extended E-R model into a relational database design is to ________.
A) create a table for each relationship
B) evaluate the entities against the normalization criteria
C) create a table for each entity
D) remove any recursive relationships
E) document referential integrity constraints
Answer: C
66) Each attribute of an entity becomes a(n) ________ of a table.
A) column
B) primary key
C) foreign key
D) alternate key
E) B or D
Answer: A
67) The identifier of the entity becomes the ________ of the corresponding table.
A) primary key
B) foreign key
C) supertype
D) subtype
E) either A or B
Answer: A
68) The ideal primary key is ________.
A) short
B) numeric
C) fixed
D) A and B
E) A, B, and C
Answer: E
69) A surrogate key should be considered when ________.
A) a relationship is M:N
B) a composite key is required
C) the key contains a lengthy text field
D) the key contains a number
E) an index needs to be created
Answer: C
70) Which of the following is not true about surrogate keys?
A) They are identifiers that are supplied by the system, not the users.
B) They have no meaning to the users.
C) They are nonunique within a table.
D) They can be problematic when combining databases.
E) The DBMS will not allow their values to be changed.
Answer: C
71) One of the important properties of a column is whether or not it is ________.
A) found in more than one entity
B) required
C) character or numeric
D) subject to normalization
E) subject to denormalization
Answer: B
72) In a relational database design, all relationships are expressed by ________.
A) creating a primary key
B) creating a foreign key
C) creating a supertype
D) creating a subtype
E) creating a line between entities
Answer: B
73) When representing a 1:1 relationship in a relational database design, ________.
A) the key of each table must be placed as foreign keys into the other
B) the key of either table may be placed as a foreign key into the other
C) the key of both tables must be the same
D) the intersection table gets the key from both relations
E) B and C
Answer: B
74) To represent a one-to-many relationship in a relational database design, ________.
A) the key of the child is placed as a foreign key into the parent
B) the key of the parent is placed as a foreign key into the child
C) an intersection table must be created
D) the key of the table on the "many" side is placed in the table on the "one" side
E) the keys of both tables are joined into a composite key
Answer: B
75) When representing a one-to-many relationship in a relational database design, ________.
A) the parent is always on the one side of the "one-to-many" relationship
B) the child is always on the one side of the "one-to-many" relationship
C) either parent or child can be on the one side of the "one-to-many" relationship, and the choice is arbitrary
D) either parent or child can be on the one side of the "one-to-many" relationship, and special criteria indicate which table should be on the one side
E) None of the above is correct.
Answer: A
76) Many-to-many relationships are represented by ________.
A) two tables with an M:N relationship
B) two tables with a 1:N relationship
C) an intersection table which has M:N relationships with the two tables
D) an intersection table which has 1:N relationships with the two tables
E) two intersection tables which each have 1:N relationships with the two tables
Answer: D
77) In many-to-many relationships in a relational database design, ________.
A) the key of the child is placed as a foreign key into the parent
B) the key of the parent is placed as a foreign key into the child
C) the keys of both tables are placed in a third table
D) the keys of both tables are joined into a composite key
E) C and D
Answer: E
78) In many-to-many relationships in a relational database design, ________.
A) the intersection table is ID-dependent on one of the parents
B) the intersection table is ID-dependent on both of the parents
C) the minimum cardinality from the intersection table to the parents is always M
D) A and B
E) B and C
Answer: E
79) In relational database design, ID-dependent entities are used to ________.
A) represent N:M relationships
B) handle associative relationships
C) handle multivalued attributes
D) handle archetype/instance relationships
E) All of the above.
Answer: E
80) When transforming an E-R data model into a relational database design, the key of the parent entity should be placed as part of the primary key into the child entity ________.
A) when the child entity is ID-dependent
B) when the child entity is non-ID-dependent
C) when the child entity has a 1:1 relationship with the parent entity
D) when the child entity has a 1:N relationship with the parent entity
E) when the child entity has a recursive relationship with the parent entity
Answer: A
81) When transforming an ID-dependent E-R data model relationship into a relational database design and the parent entity has a surrogate primary key and the child entity has a data identifier, then the primary key of the child table should be ________.
A) the parent's surrogate key + the child's data key
B) the parent's surrogate key + a surrogate key in the child
C) either A or B will work, and neither way is preferable
D) either A or B will work, but method A is preferable
E) either A or B will work, but method B is preferable
Answer: E
82) When transforming an ID-dependent E-R data model relationship into a relational database design and the child entity is designed to use a surrogate key, then ________.
A) the parent entity must also use a surrogate key
B) the relationship remains an ID-dependent relationship
C) the relationship changes to a non-ID-dependent relationship
D) A and B
E) A and C
Answer: C
83) Which of the following is not true about representing subtypes in a relational database design?
A) One table is created for the supertype and one for each subtype.
B) All of the attributes of the supertype are added to the subtype relations.
C) The key of the supertype is made the key of the subtypes.
D) A subtype and its supertype are representations of the same underlying table.
E) An instance of the supertype may be related to one instance each of several subtypes.
Answer: B
84) In a supertype-subtype structure, discriminator attributes ________.
A) are easily represented in a relational design
B) cannot be represented in a relational design
C) require application logic to determine which subtypes correspond to a specific supertype instance
D) A and C
E) B and C
Answer: E
85) Which of the following is not true of recursive relationships?
A) When the recursive relationship is M:N, an intersection table is created.
B) The rows of a single table can play two different roles.
C) The techniques for representing the tables are the same as for non-recursive relationships except the rows are in the same table.
D) Recursive relationships can be 1:1, 1:N, or M:N relationships.
E) Even when the relationship is 1:N, a new table must be defined to represent the relationship.
Answer: E
86) Which of the following is not true of ternary relationships?
A) Can be treated as a collection of binary relationships
B) Are represented in the same way as binary relationships
C) Must involve at least one M:N relationship
D) Involve three entities of different logical types
E) Often require documentation of special considerations as business rules
Answer: C
87) The binary constraint MUST NOT indicates that ________.
A) a specific binary relationship must not be included in a ternary relationship
B) a table includes values that must not occur in a binary relationship
C) a table includes values that must not occur in a ternary relationship
D) a binary relationship includes value combinations that must not occur in a binary relationship
E) a binary relationship includes value combinations that must not occur in a ternary relationship
Answer: E
88) The binary constraint MUST COVER indicates that ________.
A) a specific binary relationship must be included in a ternary relationship
B) a table includes values that must occur in a binary relationship
C) a table includes values that must occur in a ternary relationship
D) a binary relationship includes value combinations that must occur in a binary relationship
E) a binary relationship includes a set of value combinations that must all occur in a ternary relationship
Answer: E
89) To which of the following actions are referential integrity constraints not applied?
A) create
B) insert
C) modify
D) delete
E) Referential integrity constraints are applied to all of the listed actions.
Answer: A
90) A referential integrity constraint policy that insures that foreign key values in a table are correctly maintained when there is a change to the primary key value in the parent table is called ________.
A) incremental updates
B) incremental deletes
C) controlled key adjustments
D) cascading updates
E) cascading deletes
Answer: D
91) A referential integrity constraint policy that insures that all rows containing a particular foreign key value in a table are eliminated from the table when the row containing the corresponding primary key value in a parent table is eliminated from the database is called ________.
A) incremental updates
B) incremental deletes
C) controlled key adjustments
D) cascading updates
E) cascading deletes
Answer: E
92) A referential integrity constraint policy that guarantees that a row in a parent table always has a required entry in a child table ________.
A) is known as a minimum cardinality enforcement action
B) needs to be documented by the database development team
C) is enforced in most DBMS products
D) A and B
E) A, B, and C
Answer: D
93) When transforming an ID-dependent E-R data model relationship into a relational database design, the referential integrity constraints should allow ________.
A) parent updates to cascade
B) child updates to cascade
C) child deletes to cascade
D) A and B
E) A, B, and C
Answer: A
1) The SQL CREATE TABLE statement is used to name a new table and describe the table's columns.
Answer: TRUE
2) The SQL keyword CONSTRAINT is used to define one of five types of constraints.
Answer: TRUE
3) The SQL keyword PRIMARY KEY is used to designate the column(s) that are the primary key for the table.
Answer: TRUE
4) The SQL keyword CONSTRAINT is used to limit column values to specific values.
Answer: TRUE
5) The SQL keyword CONSTRAINT is used in conjunction with the SQL keywords PRIMARY KEY and FOREIGN KEY.
Answer: TRUE
6) One advantage of using the CONSTRAINT command to define a primary key is that the database designer controls the name of the constraint.
Answer: TRUE
7) The SQL keyword UNIQUE is used to define alternative keys.
Answer: TRUE
8) If the table PRODUCT has a column PRICE, and PRICE has the data type Numeric (8,2), the value 98765 stored in that field will be displayed by the DBMS as 98765.00.
Answer: FALSE
9) If the table ITEM has a column WEIGHT, and WEIGHT has the data type Numeric (7,2), the value 4321 with be displayed by the DBMS as 43.21.
Answer: TRUE
10) The SQL keyword CHECK is used to limit column values to specific values.
Answer: TRUE
11) The SQL keyword MODIFY is used to change the structure, properties or constraints of a table.
Answer: FALSE
12) Data values to be added to a table are specified by using the SQL VALUES clause.
Answer: TRUE
13) The SQL keyword DELETE is used to delete a table's structure.
Answer: FALSE
14) When the correct SQL command is used to delete a table's structure, the command can only be used with a table that has already had its data removed.
Answer: FALSE
15) One or more rows can be added to a table by using the SQL INSERT statement.
Answer: TRUE
16) Unless it is being used to copy data from one table to another, the SQL INSERT statement can be used to insert only a single row into a table.
Answer: TRUE
17) Rows in a table can be changed by using the SQL UPDATE statement.
Answer: TRUE
18) The SQL SET keyword is used to specify a new value when changing a column value.
Answer: TRUE
19) The SQL keyword MODIFY is used to change a column value.
Answer: FALSE
20) Rows can be removed from a table by using the SQL DELETE statement.
Answer: TRUE
21) An SQL virtual table is called a view.
Answer: TRUE
22) The SQL command CREATE USER VIEW is used to create a virtual table.
Answer: FALSE
23) SQL views are constructed from SELECT statements.
Answer: TRUE
24) According to the SQL-92, statements used to construct views cannot contain the WHERE clause.
Answer: FALSE
25) The SQL command SELECT is used to retrieve view instances.

Answer: TRUE

26) The values in an SQL view are not always changeable through the view itself.
Answer: TRUE
27) SQL views can be used to hide columns.
Answer: TRUE
28) SQL views can be used to provide a level of insulation between data processed by applications and the data actually stored in the database tables.
Answer: TRUE
29) If the values in an SQL view are changeable through the view itself, the SQL command UPDATE is used to change the values.
Answer: TRUE
30) The values in an SQL view are always changeable through the view itself.
Answer: FALSE
31) SQL views are updatable when the view is based on a single table with no computed columns, and all non-null columns are present in the view.
Answer: TRUE
32) Because SQL statements are table-oriented, whereas programs are variable-oriented, the results of SQL statements used in programs are treated as pseudofiles.
Answer: TRUE
33) A set of SQL statements stored in an application written in a standard programming language is called embedded SQL.

Answer: TRUE

34) Because SQL statements are table-oriented, whereas programs are variable-oriented, the results of SQL statements used in programs are accessed using an SQL cursor.
Answer: TRUE
35) A stored program that is attached to a table or view is called a stored procedure.
Answer: FALSE
36) SQL triggers use the ANSI SQL keywords BEFORE, INSTEAD OF, and AFTER.
Answer: TRUE
37) SQL triggers can be used with SQL operations INSERT, UPDATE, and DELETE.
Answer: TRUE
38) SQL triggers can be used when the DBMS receives an INSERT request.
Answer: TRUE
39) SQL triggers are used for providing default values, validity checking, updating views, and performing referential integrity actions.
Answer: TRUE
40) The Oracle DBMS supports the SQL BEFORE trigger.
Answer: TRUE
41) The SQL Server DBMS supports the SQL BEFORE trigger.
Answer: FALSE
42) SQL triggers can be used when the DBMS receives an insert request.
Answer: TRUE
43) To set a column value to an initial value that is selected according to some business logic, you would use the SQL DEFAULT constraint with the CREATE TABLE command.
Answer: FALSE
44) SQL triggers are created using the SQL ADD TRIGGER statement.
Answer: FALSE
45) If the values in an SQL view are not changeable through the view itself, you may still be able to update the view by using unique application logic. In this case, the specific logic is placed in an INSTEAD OF trigger.
Answer: TRUE
46) If a trigger is being written to enforce referential integrity actions, you cannot use an INSTEAD OF trigger.
Answer: FALSE
47) When a trigger is fired, the DBMS makes the appropriate data available to the trigger code.
Answer: TRUE
48) A stored program that is stored within the database and compiled when used is called a trigger.
Answer: FALSE
49) Stored procedures have the advantage of greater security, decreased network traffic, SQL optimized by the DBMS compiler, and code sharing.
Answer: TRUE
50) Unlike application code, stored procedures are never distributed to the client computers.
Answer: TRUE
51) Because SQL stored procedures allow and encourage code sharing among developers, stored procedures give database application developers the advantages of less work, standardized processing, and specialization among developers.
Answer: TRUE
52) Which SQL keyword is used to name a new table and describe the table's columns?
A) SET
B) CREATE
C) SELECT
D) ALTER
E) CONSTRAINT
Answer: B
53) If the table PRODUCT has a column PRICE that has the data type Numeric (8,2), the value 12345 will be displayed by the DBMS as ________.
A) 123.45
B) 12345
C) 12345.00
D) 123450.00
E) 00012345
Answer: A
54) Which SQL keyword is used to impose restrictions on a table, data or relationship?
A) SET
B) CREATE
C) SELECT
D) ALTER
E) CONSTRAINT
Answer: E
55) One advantage of using the CONSTRAINT phrase to define a primary key is that the database designer controls the ________.
A) name of the primary key
B) name of the foreign key
C) name of the constraint
D) A and B
E) A, B, and C
Answer: C

58) The SQL keyword used to limit column values to specific values is ________.
A) CONSTRAINT
B) CHECK
C) NOT NULL
D) UNIQUE
E) UPDATE
Answer: B
59) Which SQL keyword is used to change the structure, properties or constraints of a table?
A) SET
B) CREATE
C) SELECT
D) ALTER
E) CONSTRAINT
Answer: D
60) Which SQL keyword is used to delete a table's structure?
A) DELETE
B) DROP
C) DISPOSE
D) ALTER
E) MODIFY
Answer: B
61) When the correct SQL command is used to delete a table's structure, what happens to the data in the table?
A) If the deleted table was a parent table, the data is added to the appropriate rows of the child table.
B) If the deleted table was a child table, the data is added to the appropriate rows of the parent table.
C) The data in the table is also deleted.
D) Nothing because there was no data in the table since only an empty table can be deleted.
E) A and B
Answer: C
62) Which SQL keyword is used to add one or more rows of data to a table?
A) DELETE
B) INSERT
C) SELECT
D) SET
E) UPDATE
Answer: B
63) Which SQL keyword is used to change one or more rows in a table?
A) MODIFY
B) INSERT
C) SELECT
D) CHANGE
E) UPDATE
Answer: E
64) Which SQL keyword is used to change the values of an entire column?
A) CHANGE
B) INSERT
C) SELECT
D) SET
E) MODIFY
Answer: D
65) Which keyword is used to remove one or more rows from a table?
A) DELETE
B) INSERT
C) ERASE
D) SET
E) UPDATE
Answer: A

67) An SQL virtual table is called ________.
A) a CHECK constraint
B) a view
C) embedded SQL
D) a trigger
E) a stored procedure
Answer: B
68) The SQL command used to create a virtual table is ________.
A) CREATE VTABLE
B) CREATE VIEW
C) VTABLE
D) VIEW
E) NEWLOOK
Answer: B
69) SQL views are constructed from ________.
A) CREATE statements
B) INSERT statements
C) UPDATE statements
D) SELECT statements
E) VIEW statements
Answer: D
70) According to the SQL-92, statements used to construct views cannot contain ________.
A) the SELECT clause
B) the FROM clause
C) the WHERE clause
D) the ORDER BY clause
E) SQL view statements can use all of the listed clauses.
Answer: D
71) Which SQL statement is used to retrieve view instances?
A) CREATE
B) DELETE
C) INSERT
D) SELECT
E) UPDATE
Answer: D
72) SQL views are used ________.
A) to hide columns
B) to show results of computed columns
C) to hide complicated SQL statements
D) to provide a level of indirection between data processed by applications and the data actually stored in the database tables
E) SQL views are used for all of the above.
Answer: E
73) If the values in an SQL view are changeable through the view itself, which SQL statement is used to change the values?
A) CREATE
B) DELETE
C) INSERT
D) SELECT
E) UPDATE
Answer: E
74) SQL views are always updatable when ________.
A) the view is based on a single table with no computed columns, and all non-null columns are present in the view
B) the view is based on any number of tables, with or without computed columns, and the INSTEAD OF trigger is defined for the view
C) the view is based on multiple tables, the update is being done on the most subordinate table, and the rows of that table can be uniquely identified
D) A and B
E) A, B, and C
Answer: D
75) A set of SQL statements stored in an application written in a standard programming language is called ________.
A) a CHECK constraint
B) a view
C) embedded SQL
D) a trigger
E) a stored procedure
Answer: C
76) Because SQL statements are set-oriented, whereas programs are element-oriented, the results of SQL statements used in programs are treated as ________.
A) tables
B) columns
C) rows
D) files
E) pseudofiles
Answer: E
77) Because SQL statements are table-oriented, whereas programs are element-oriented, the results of SQL statements used in programs are accessed using ________.
A) standard programming tools
B) custom written programming tools
C) an SQL cursor
D) an SQL trigger
E) an SQL stored procedure
Answer: C
78) A stored program that is attached to a table or view is called ________.
A) a CHECK constraint
B) a view
C) embedded SQL
D) a trigger
E) a stored procedure
Answer: D
79) Which of the following is not an ANSI SQL trigger?
A) BEFORE UPDATE
B) INSTEAD OF UPDATE
C) BEFORE INSERT
D) INSTEAD OF CONSTRAINT
E) AFTER DELETE
Answer: D
80) Which of the following is an SQL trigger Oracle supports?
A) BEFORE
B) INSTEAD OF
C) AFTER
D) B and C only
E) A, B, and C
Answer: E
81) Which of the following is an SQL trigger Microsoft SQL Server supports?
A) BEFORE
B) INSTEAD OF
C) AFTER
D) B and C only
E) A, B, and C
Answer: D
82) SQL triggers can be used when the DBMS receives a(n) ________ request.
A) INSERT
B) UPDATE
C) DELETE
D) A and B
E) A, B, and C
Answer: E
83) SQL triggers are used for ________.
A) validity checking
B) providing default values
C) updating views
D) A and B
E) A, B, and C
Answer: E
84) When a trigger is fired, the DBMS makes the appropriate data available to ________.
A) the SQL interpreter
B) the application code
C) the embedded SQL code
D) the trigger code
E) the stored procedure code
Answer: D
85) SQL triggers are created using ________.
A) the SQL CREATE TRIGGER statement
B) the SQL ADD TRIGGER statement
C) the SQL TRIGGER statement
D) the SQL ADD CONSTRAINT TRIGGER statement
E) the SQL CONSTRAINT TRIGGER statement
Answer: A
86) To set a column value to an initial value that is selected according to some business logic, you would use:
A) the SQL DEFAULT constraint with the CREATE TABLE command.
B) an SQL view.
C) embedded SQL.
D) an SQL trigger.
E) an SQL stored procedure.
Answer: D
87) If the values in an SQL view are not changeable through the view itself, you may still be able to update the view by using unique application logic. In this case, the specific logic is placed in ________.
A) a BEFORE trigger
B) an INSTEAD OF trigger
C) an AFTER trigger
D) Depending on the specific logic, either A or B can be used.
E) Depending on the specific logic, any of A, B, or C can be used.
Answer: B
88) A stored program that is attached to the database is called ________.
A) a CHECK constraint
B) a view
C) embedded SQL
D) a trigger
E) a stored procedure
Answer: E
89) Stored procedures have the advantage of ________.
A) greater security
B) decreased network traffic
C) SQL optimized by the DBMS compiler
D) code sharing
E) All of the above
Answer: E
90) Because SQL stored procedures allow and encourage code sharing among developers, stored procedures give database application developers the advantages of ________.
A) less work
B) standardized processing
C) specialization among developers
D) A and B
E) A, B, and C
Answer: E
1) Database redesign is rarely needed because databases are usually built correctly the first time.
Answer: FALSE
2) In a real sense, information systems and organizations do not just influence each other, but rather they create each other.
Answer: TRUE
3) A continuous circular process of changes in user behaviors and change in the information systems they use is a natural outcome of information system use.
Answer: TRUE
4) The continuous circular process of changes is known as the Systems Development Life Cycle (SDLC).
Answer: TRUE
5) Database redesign is equally difficult whether or not the database has data in it.
Answer: FALSE
6) In the database redesign process, it is often useful to test whether certain conditions or assumptions are valid before proceeding with the redesign.
Answer: TRUE
7) In the database redesign process, two SQL tools are useful for testing whether or not certain conditions or assumptions are valid: uncorrelated subqueries and EXISTS/NOT EXISTS.
Answer: FALSE
8) A correlated subquery looks very different from a noncorrelated subquery.
Answer: FALSE
9) Correlated subqueries can be used to verify functional dependencies.
Answer: TRUE
10) In a correlated subquery, the same table is used in the upper and lower SELECT statements.
Answer: TRUE
11) In the SQL statement: SELECT S1.CustName, S1.SalesRepNo FROM SALES S1; the "S1"
is called an alias.
Answer: TRUE
12) In a correlated subquery, the DBMS can run the lower SELECT statement by itself and then send the results to the upper SELECT statement.
Answer: FALSE
13) In a correlated subquery, the DBMS must run the lower SELECT statement as a process that is nested within the upper SELECT statement.
Answer: TRUE
14) There is a common trap in writing a correlated subquery, which will cause no rows to ever be displayed in the results.
Answer: TRUE
15) Although correlated subqueries are useful in database redesign, they cannot be used to verify functional dependencies.
Answer: FALSE
16) When using queries with EXISTS and NOT EXISTS, the processing of the associated SELECT statements must be nested.
Answer: TRUE
17) The use of a double nested set of NOT EXISTS SELECT statements can be used to find rows that meet some specified condition for every row in a table.
Answer: TRUE
18) The use of a double nested set of NOT EXISTS SELECT statements is a famous pattern in SQL use.
Answer: TRUE
19) EXISTS and NOT EXISTS are actually just another form of correlated subqueries.
Answer: TRUE
20) Because EXISTS and NOT EXISTS are forms of correlated subqueries, the processing of the associated SELECT statements must be nested.
Answer: TRUE
21) The EXISTS keyword will be true if any row in the subquery meets the condition.
Answer: TRUE
22) The NOT EXISTS keyword will be true if any row in the subquery fails to meet the condition.
Answer: FALSE
23) A double nested set of NOT EXISTS SELECT statements can be used to find rows that meet some specified condition for every row in a table.
Answer: TRUE
24) When using a double nested set of NOT EXISTS SELECT statements, a row that does not match any row matches every row.
Answer: TRUE
25) The use of a double nested set of NOT EXISTS SELECT statements is so rare that even if you are a professional database developer you will probably never see it used.
Answer: FALSE
26) There is no good SQL command that can be used to change table names.
Answer: TRUE
27) The process of reading an actual database schema and producing a data model from that schema is called reverse engineering.
Answer: TRUE
28) The data model produced by reverse engineering is a true conceptual schema.
Answer: FALSE
29) The data model produced by reverse engineering may include some entities that should not appear in the data model.
Answer: TRUE
30) The design produced by reverse engineering may be described as a table-relationship diagram.
Answer: TRUE
31) The authors refer to the data model produced by reverse engineering as the RE data model.
Answer: TRUE
32) Because of the need to know the functional dependencies in a database, it is a good idea to create a dependency graph.
Answer: TRUE
33) Dependency graphs are graphical displays like bar charts.
Answer: FALSE
34) Typically, there are at least four different copies of the database schema used in the redesign process.
Answer: FALSE
35) A means must be created to recover all test databases to their original state during the redesign testing process.
Answer: TRUE
36) Even if an organization has a very large database, it will be possible to make a complete backup copy of the operational database prior to making structure changes.
Answer: FALSE
37) SQL contains an SQL command RENAME TABLENAME that can be used to change table names.
Answer: FALSE
38) SQL Server 2012 contains a system-stored procedure named sp_rename that can be used to change table names.
Answer: TRUE
39) Changing table names is complicated by the fact that constraints and triggers are often associated with the table and will also need to be changed.
Answer: TRUE
40) In order to minimize the need to change table names, some organizations have a policy that no user or application should ever employ the true name of a table, but use views as table aliases instead.
Answer: TRUE
41) To add a NULL column to a table, we simply use the MODIFY TABLE statement.
Answer: FALSE
42) If a DEFAULT constraint is included when a new column is added to a table, the default value is only applied to new rows and not to the existing rows at the time the new column is added.
Answer: TRUE
43) To add a NOT NULL column to a table, we first add a NULL column, then we insert values into every row, and finally we change the NULL constraint to NOT NULL.
Answer: TRUE
44) To drop a nonkey column from a table, no preliminary steps are needed and we can simply use the ALTER TABLE DROP COLUMN statement.
Answer: TRUE
45) To drop a foreign key column from a table, no preliminary steps are needed and we can simply use the ALTER TABLE DROP COLUMN statement.
Answer: FALSE
46) To drop a primary key column from a table the primary key constraint must first be dropped, but this does not require that related foreign keys based on the column be dropped.
Answer: FALSE
47) To drop a constraint, no preliminary steps are needed and we can simply use the ALTER TABLE DROP CONSTRAINT statement.
Answer: TRUE
48) Converting date, money or other more specific data types to char or varchar will usually succeed.
Answer: TRUE
49) To change the minimum cardinality on the parent side from zero to one, the foreign key, which would have been NULL, must be changed to NOT NULL.
Answer: TRUE
50) Depending on the DBMS, when changing the minimum cardinality on the parent side from zero to one, the foreign key constraint that defines the relationship may have to be dropped before the change is made and re-added afterwards.
Answer: TRUE
51) There are several difficulties with increasing cardinalities from 1:1 to 1:N, one of which is preserving the existing relationships.
Answer: FALSE
52) When increasing cardinalities from 1:N to N:M, we basically create a new intersection table, fill it with data and drop the old foreign key.
Answer: TRUE
53) When decreasing cardinalities, there will always be data loss.
Answer: TRUE
54) Adding new tables and relationships to a database is difficult.
Answer: FALSE
55) Deleting tables and relationships is basically a matter of dropping foreign key constraints and then dropping the tables.
Answer: TRUE
56) Database redesign is fairly easy when ________.
A) information systems and organizations influence each other
B) the design was done correctly the first time
C) there is no data in the database
D) good backups of the database are available
E) All of the above
Answer: C
57) Which of the following is not a possible step in the database redesign process?
A) Checking whether certain conditions or assumptions about the data are valid
B) Reverse engineering the data model
C) Testing proposed changes
D) Maintaining backups of the existing database
E) All of the above are possible steps in the database redesign process.
Answer: E
58) In the database redesign process, before proceeding with the redesign it is often useful to ________.
A) check whether certain conditions or assumptions about the data are valid
B) find out why the design was not done properly the first time
C) stop information systems and users from influencing each other
D) set standards for user behavior
E) All of the above
Answer: A
59) In the database redesign process, SQL tools that are useful for testing whether or not certain conditions or assumptions are valid are ________.
A) correlated subqueries
B) EXISTS
C) NOT EXISTS
D) B and C
E) A, B, and C
Answer: E
60) In a correlated subquery of a database that has tables TableOne and TableTwo, if table TableOne is used in the upper SELECT statements, then which table is used in the lower SELECT statement?
A) TableOne
B) TableTwo
C) both TableOne and TableTwo
D) either TableOne or TableTwo
E) neither TableOne nor TableTwo
Answer: A
61) In the SQL statements SELECT C1.CustName, C1.SalesRepNo / FROM CUSTOMER C1; the "C1" is called a(n) ________.
A) term
B) alias
C) convention
D) phrase
E) label
Answer: B
62) When running a correlated subquery, the DBMS ________.
A) runs the lower SELECT statement by itself and then sends the results to the upper SELECT statement.
B) runs the upper SELECT statement by itself and then sends the results to the lower SELECT statement.
C) alternates running the lower SELECT statement with running the upper SELECT statement based on each result of the lower SELECT statement
D) Either A or B may be used depending on the query.
E) None of the above describes how a correlated subquery is run by the DBMS.
Answer: C
63) When running a correlated subquery, the DBMS always uses ________.
A) regular processing
B) nested processing
C) "quick and dirty" processing
D) SQL-92 processing
E) a form of processing that is specific to the DBMS product
Answer: B
65) SQL queries that use EXISTS and NOT EXISTS are ________.
A) normal subqueries
B) correlated subqueries
C) uncorrelated subqueries
D) constraint dependent subqueries
E) constraint independent subqueries
Answer: B
66) When running an SQL query that uses EXISTS, the EXISTS keyword will be true if ________.
A) any row in the subquery meets the condition
B) all rows in the subquery meet the condition
C) no row in the subquery meets the condition
D) any row in the subquery fails to meet the condition
E) all rows in the subquery fail to meet the condition
Answer: A
67) When running an SQL query that uses NOT EXISTS, the NOT EXISTS keyword will be true if ________.
A) any row in the subquery meets the condition
B) all rows in the subquery meet the condition
C) no row in the subquery meets the condition
D) any row in the subquery fails to meet the condition
E) all rows in the subquery fail to meet the condition
Answer: E
68) A double nested set of NOT EXISTS SELECT statements is ________.
A) a famous pattern in SQL
B) regularly used
C) rarely used to nonexistent in the real world
D) A and B
E) A and C
Answer: D
69) In a double nested set of NOT EXISTS SELECT statements, ________.
A) if a row does not match any row, then it matches every row
B) if a row matches any row, then it matches every row
C) if a row does not match any row, then it does not match every row
D) if a row matches any row, then it does not match every row
E) if a row does not match any row, then referential integrity has been broken
Answer: A
70) The process of reading an actual database schema and producing a data model from that schema is called ________.
A) data modeling
B) data engineering
C) reverse engineering
D) schema modeling
E) schema engineering
Answer: C
71) The data model produced by reverse engineering is not truly a logical model because it will contain tables for ________.
A) strong entities
B) weak non-ID-dependent entities
C) ID-dependent entities
D) intersection tables
E) supertype/subtype tables
Answer: D
72) The data model produced by reverse engineering is a(n) ________.
A) conceptual schema
B) internal schema
C) dependency graph
D) table-relationship diagram
E) entity-relationship diagram
Answer: D
73) Because of the need to know the functional dependencies in a database, it is a good idea to create a(n) ________.
A) conceptual schema
B) internal schema
C) dependency graph
D) table-relationship diagram
E) entity-relationship diagram
Answer: C
74) A dependency graph should include:
A) tables
B) views
C) triggers
D) A and B
E) A, B, and C
Answer: E
75) Which of the following different copies of the database schema is/are typically used in the database redesign process?
A) Small test database
B) Large test database
C) Operational database
D) A and B
E) A, B, and C
Answer: E
76) In order to make sure the database redesign is working properly during the redesign testing process, a means must be created to ________.
A) reverse engineer all test databases
B) graph dependencies in all test databases
C) recover all test databases to their original state
D) A and B
E) A, B, and C
Answer: C
77) To change a table name, we ________.
A) use the SQL RENAME TABLE command
B) use the SQL ALTER TABLENAME command
C) use the SQL MODIFY TABLENAME command
D) create a new table, move the data, and drop the old table
E) None of the above is the correct way to change a table name.
Answer: D
78) When making any change to the database structure, we may need to check for effects of the change on ________.
A) data
B) foreign keys
C) constraints
D) triggers
E) All of the above may need to be checked.
Answer: E
79) To add a NULL column to a table, we ________.
A) use the REVISE TABLE command
B) use the ALTER TABLE command
C) use the MODIFY TABLE command
D) create a new table with the NULL column, move the other data, and drop the old table
E) None of the above is the correct way to add a NULL column.
Answer: B
80) If a DEFAULT constraint is included when a new column is added to a table, the default value is applied to ________.
A) all existing rows at the time the column is added
B) all new rows
C) all new rows but only after the UPDATE command is issued
D) A and B
E) A and C
Answer: B
81) To add a NOT NULL column to a table, we ________.
A) use the REVISE TABLE command
B) use the ALTER TABLE command
C) use the MODIFY TABLE command
D) create a new NULL column, insert data values into every row, and change the NULL constraint to NOT NULL
E) None of the above is the correct way to add a NOT NULL column to a table.
Answer: D
82) When dropping a nonkey column from a table, which of the following steps is (are) included in the process? (The order of the steps listed below is not relevant, only the steps themselves.)
A) Drop any column constraints from the table
B) Drop the column from the table
C) Drop any foreign keys constraints based on the column
D) A and B
E) A, B, and C
Answer: B
83) When dropping a primary key column from a table, which of the following steps is (are) included in the process? (The order of the steps listed below is not relevant, only the steps themselves.)
A) Drop the primary key constraint from the table
B) Drop the primary key column from the table
C) Drop the foreign keys in other tables based on the primary key column
D) A and B
E) A, B, and C
Answer: E
84) When dropping a foreign key column from a table, which of the following steps is (are) included in the process? (The order of the steps listed below is not relevant, only the steps themselves.)
A) Drop the foreign key constraint from the table
B) Drop the foreign key column from the table
C) Drop the primary key in the other table referenced by the referential integrity constraint
D) A and B
E) A, B, and C
Answer: D
85) Changing cardinalities ________.
A) never occurs in database redesign
B) rarely occurs in database redesign
C) commonly occurs in database redesign
D) always occurs in database redesign
E) cannot be done once a database is implemented
Answer: C
86) When changing column data types, which of the following data conversions will either usually or always succeed?
A) Numeric → char or varchar
B) Date or money → char or varchar
C) Char or varchar → numeric, date or money
D) A and B
E) A, B, and C
Answer: D
87) When changing the minimum cardinality on the parent side of the relationship from zero to one, the foreign key ________.
A) must be changed from NULL to NOT NULL
B) must be changed from NOT NULL to NULL
C) must be changed to a composite key
D) must be changed to a surrogate key
E) does not change

Answer: A

88) Which of the following are difficulties when changing the maximum cardinality from 1:1 to 1:N?
A) Preserving the existing tables
B) Preserving the existing relationships
C) Preserving the existing data
D) A and B
E) A, B, and C
Answer: B

89) When increasing cardinalities from 1:N to N:M, which of the following steps is/are included in the process? (The order of the steps listed below is not relevant, only the steps themselves.)
A) Create an intersection table
B) Populate the intersection table
C) Drop the old foreign key
D) A and B
E) A, B, and C
Answer: E
90) When decreasing cardinalities, there will always be ________.
A) relationship loss
B) foreign key loss
C) data loss
D) A and B
E) A, B, and C
Answer: C
91) When dropping tables and relationships, which of the following steps is/are included in the process? (The order of the steps listed below is not relevant, only the steps themselves.)
A) Drop the foreign key constraints from the tables
B) Drop the tables
C) Drop the primary key constraints from the tables
D) A and B
E) A, B, and C
Answer: D
1) Every DBMS product has an application programming interface (API).
Answer: TRUE
2) Every DBMS product uses the same API.
Answer: FALSE
3) ODBC stands for Open Database Connectivity.
Answer: TRUE
4) If a server is using a Microsoft Windows operating system, it is usually running Internet Information Server (IIS) as its Web server.
Answer: TRUE
5) The most commonly used Web server on servers running the Unix or Linux operating system is Internet Information Server (IIS).
Answer: FALSE
6) If the Web server and the DBMS are running on the same server, the system has a three-tier architecture.
Answer: FALSE
7) ODBC has not had practical success, but has shown great potential for future development.
Answer: FALSE
8) ODBC works with table-like data sources such as relational databases and spreadsheets.
Answer: TRUE
9) ODBC acts as a wrapper for OLE DB.
Answer: FALSE
10) With ODBC, a database and the DBMS that processes it are identified by the data source.
Answer: TRUE
11) With ODBC, the driver manager serves as an intermediary between the application and the DBMS drivers.
Answer: TRUE
12) With ODBC, only a single driver is needed to handle all data source types, such as Oracle, DB2, and Access.
Answer: FALSE
13) In ODBC, the amount of work that the driver must do is largely determined by the degree of SQL-compliance of the data source.
Answer: TRUE
14) A multiple-tier ODBC driver may reformat an SQL request, but it does not actually process the SQL statement.
Answer: TRUE
15) With ODBC, a file data source is available only to the user that created it.
Answer: FALSE
16) In general, the best type of ODBC data source to define for a Web application is a system data source.
Answer: TRUE
17) OLE DB objects are COM objects.
Answer: TRUE
18) OLE DB can be used to access ODBC data sources.
Answer: TRUE
19) OLE DB is an object-oriented interface.
Answer: TRUE
20) In OLE DB, a RecordSet is a more abstract representation of a rowset.
Answer: FALSE
21) Object classes have properties that represent characteristics of the objects in the class.
Answer: TRUE
22) One of the properties of all collections is Count, which is the number of objects in the collection.
Answer: TRUE
23) In OLE DB, all of an object's properties must be exposed in all interfaces, but not all methods have to be exposed.
Answer: FALSE
24) One important result of OLE DB is that data does not have to be moved or converted from one form to another.
Answer: TRUE
25) An OLE DB service provider accepts data from an OLE DB tabular data provider.
Answer: TRUE
26) ADO provides access to ODBC functionality to programming languages that ordinarily could not access ODBC functions.
Answer: FALSE
27) ADO is accessible from languages such as C++ and C#, but not Visual Basic or scripting languages.
Answer: FALSE
28) ADO was (and still is) frequently used for database applications.
Answer: TRUE
29) ADO.NET is a completely new product, with no connection to ADO except the similar name.
Answer: FALSE
30) ADO.NET provides the capability to create and process in-memory databases called DataSets.
Answer: TRUE
31) An ADO.NET DataSet has all the characteristics, features, and functions of a regular database.
Answer: TRUE
32) An ADO.NET DataSet is connected to databases.
Answer: FALSE
33) An ADO.NET dataset can have primary and foreign keys, but ADO.NET does not support referential integrity.
Answer: FALSE
34) Once an ADO.NET dataset is constructed, its contents can be formatted as an XML document with a single command.
Answer: TRUE
35) An ADO.NET dataset can only be used with optimistic locking.
Answer: TRUE
36) Only open source products may be used in conjunction with JDBC.
Answer: FALSE
37) To use JDBC, programs must be written in Java.
Answer: TRUE
38) JDBC drivers only exist for a limited number of DBMS products at this time.
Answer: FALSE
39) JDBC-ODBC bridge drivers resolve inconsistencies between Java and C/C++ to allow Java access to ODBC data sources.
Answer: TRUE
40) Type 2 JDBC drivers access ODBC data sources over a network.
Answer: FALSE
41) Type 4 JDBC drivers translate JDBC calls into a DBMS-independent network protocol.
Answer: FALSE
42) Java programs are compiled into machine-independent bytecode.
Answer: TRUE
43) Java programs tend to execute faster than programs compiled into machine-dependent code because the Java virtual machine only has to interpret the bytecode.
Answer: FALSE
44) An applet is a Java bytecode program that executes on the Web server.
Answer: FALSE
45) Applet bytecode is sent to the user's computer and is invoked using the HTTP protocol.
Answer: TRUE
46) Java programs that access a database from an applet must use a Type 2 JDBC driver.
Answer: FALSE
47) The first step in using a JDBC driver is to establish a connection.
Answer: FALSE
48) JSP can be coded only in Java and JavaScript.
Answer: FALSE
49) JSP pages are automatically re-compiled if the uncompiled JSP page is newer than the compiled version of the page.
Answer: TRUE
50) Basic Web pages are created using Hypertext Markup Language (HTML).
Answer: TRUE
51) HTML is defined by the World Wide Web Consortium (W3C).
Answer: TRUE
52) A common default Web page name recognized by most Web servers is FirstPage.html.
Answer: FALSE
53) Database processing and document processing are unrelated to one another.
Answer: FALSE
54) HTML is an application of a document markup language called Standard Generalized Markup Language (SGML).
Answer: TRUE
55) In the 1990s the database community and the document processing community created a standard called Expandable Markup Language (XML).
Answer: FALSE
56) XML provides a standardized, non-customizable way to describe the content of a document.
Answer: FALSE
57) Unlike SQL views, XML views are not limited to one multivalued path.
Answer: TRUE
58) SOAP was originally an XML-based standard for providing remote procedure calls over the Internet.
Answer: TRUE
59) XML designers created a system that allows document structure, data content, and materialization to be mixed.
Answer: FALSE
60) DTD stands for Document Type Declaration.
Answer: TRUE
61) Possible uses of XML go far beyond using it to display Web pages.
Answer: TRUE
62) All type-valid XML documents are required to have a DTD.
Answer: TRUE
63) XSLT is a declarative transformation language.
Answer: TRUE
64) XML documents that conform to their DTD are said to be type-valid XML documents.
Answer: TRUE
65) XML documents that do not conform to their DTD are said to be non-type-valid XML documents.
Answer: TRUE
66) XSLT is a robust and powerful transformation language that can be used to materialize XML documents into HTML.
Answer: TRUE
67) XSLT is a non-declarative transformation language.
Answer: FALSE
68) An XSLT stylesheet is used by XSLT to indicate how to transform the elements of an XML document into another format.
Answer: TRUE
69) An XSLT command embedded in the structure of an XSLT stylesheet is of the form {loop, action}.
Answer: FALSE
70) When XSLT actions are indicated in a loop, the loop ends with .
Answer: TRUE
71) XSLT processors are context oriented; that is, each statement is evaluated within the context of the match that has already been made.
Answer: TRUE
72) After an XSLT processor transforms an XML document into an HTML document, the HTML document is materialized using a browser.
Answer: TRUE
73) Most of today's Web browsers still lack a built-in XSLT processor.
Answer: FALSE
74) XML Schema is a synonym for Document Type Declaration (DTD).
Answer: FALSE
75) XML documents that conform to an XML Schema are validated against that schema.
Answer: TRUE
76) XML documents and XML Schemas are created in different languages.
Answer: FALSE
77) An important improvement of XML Schema over DTDs is that XML Schemas are themselves XML documents.
Answer: TRUE
78) The first statement of an XML document indicates the schema that will be used to validate the document.
Answer: FALSE
79) XML Schemas consist of elements, attributes, and properties.
Answer: FALSE
80) In XML Schema, there are two types of elements, simple and composite.
Answer: FALSE
81) Elements of complexType must have more than one simple element.
Answer: FALSE
82) For database/XML applications, a good rule to follow is that elements are used to carry data and attributes are used to carry metadata.
Answer: TRUE
83) In XML Schema, the default cardinality of elements is 0.1.
Answer: FALSE
84) In XML Schema, the default minimum cardinality can be overridden using the minOccurs attributes.
Answer: TRUE
85) Setting the minimum cardinality to 0 is similar to using a NULL constraint in SQL.
Answer: TRUE
86) An XML Schema where all the elements occur at the same level is called a structured schema.
Answer: FALSE
87) To eliminate definition duplication, XML Schema elements can be declared globally.
Answer: TRUE
88) SQL Server has facilities for generating XML documents from database data.
Answer: TRUE
89) Oracle requires the use of Java for generating XML documents from database data.
Answer: TRUE
90) MySQL Server does not have facilities for generating XML documents from database data.
Answer: FALSE
91) The SQL Server statement SELECT...FOR XML is used to place column data as elements in an XML document.
Answer: FALSE
92) The SQL Server statement SELECT ...FOR XML RAW tells SQL Server to place the data values from the columns in the table into XML elements.
Answer: TRUE
93) The SQL Server statement SELECT...FOR XML EXPLICIT is used to control placement of column data as either elements or attributes in an XML document.
Answer: TRUE
94) The SQL Server statement SELECT...FOR XML can only be used with a single table.
Answer: FALSE
95) XML processing provides a standardized facility to describe, validate, and materialize any database view.
Answer: TRUE
96) Few industries have shown an interest in developing XML industry standards.
Answer: FALSE
97) XML industry standards have been published for the Accounting industry.
Answer: TRUE
98) Xquery is a standard for expressing generalized queries on XML documents.
Answer: TRUE
99) XML Namespaces are used to define domains, support domains, and disambiguate terms.
Answer: TRUE
100) Which of the following can only interact with relational database and table-like data structures?
A) OLE DB
B) ODBC
C) ASP
D) ADO
E) All of the above
Answer: B
101) Which of the following is true about ODBC?
A) ODBC has experienced little practical success.
B) ODBC requires developers to have a thorough knowledge of many DBMS native libraries.
C) ODBC can be used to access data from spreadsheets.
D) ODBC has an object-oriented interface.
E) ODBC does not include facilities to return error messages.
Answer: C
102) According to the ODBC standard, which of the following is not part of the specification of a data source?
A) The associated DBMS
B) The database
C) The driver
D) The operating system
E) The network platform
Answer: C
103) The ODBC standard defines a means of doing which of the following?
A) Start transactions
B) Rollback transactions
C) Create a connection
D) Issue SQL commands
E) All of the above
Answer: E
104) Which of the following is a function performed by the driver manager in ODBC?
A) Submit SQL statements to the data source
B) Determine the type of DBMS that processes a given ODBC data source
C) Load the appropriate ODBC driver into memory
D) Convert data source error codes into ODBC error codes
E) B and C
Answer: E
105) The intermediary between the application and the DBMS drivers in the ODBC architecture is the ________.
A) driver manager
B) OLE DB interface
C) ODBC driver
D) data source
E) database connector
Answer: A
106) Which of the following is a task performed by the driver according to the ODBC standard?
A) Determines the appropriate DBMS
B) Validates the format of the ODBC command received from the application
C) Converts data source error codes into ODBC standard error codes
D) Verifies the application to the data source
E) Converts the data source into an SQL-compliant data structure
Answer: C
107) The ________ processes ODBC requests and submits specific SQL statements to a given type of data source.
A) driver manager
B) ADO
C) driver
D) source converter
E) ODBC translator
Answer: C
108) A data source that is fully SQL-compliant would use what type of DBMS driver?
A) Single-tier
B) Multiple-tier
C) SQL transform
D) Text-based
E) Conformance
Answer: B
109) How does an application determine the level of ODBC conformance available from a driver?
A) The application makes a call to the driver manager.
B) The application makes a call to the data source.
C) The application makes a call to the driver.
D) The developer must determine the level of conformance before the application is written.
E) It does not have to determine ODBC conformance since all ODBC drivers have the same functionality by definition.
Answer: C
110) Support for a scrollable cursor is a sign of what type of conformance in a DBMS driver?
A) Level 1 API
B) Extended SQL Grammar
C) Core API
D) Level 2 API
E) Core SQL Grammar
Answer: D
111) Support for subqueries and creating indexes is a sign of what type of SQL conformance in a DBMS driver?
A) Level 2 API
B) Minimum SQL Grammar
C) Core API
D) Extended SQL Grammar
E) Core SQL Grammar
Answer: E
112) A ________ data source can be shared among database users as long as they have the same DBMS driver and privilege to access the database.
A) file
B) common
C) shared
D) system
E) user
Answer: A
113) A data source that is local to a single computer and can be used by the operating system and any user on that computer is called a ________ data source.
A) file
B) common
C) shared
D) system
E) user
Answer: D
114) In general, for Web applications it is best to create what type of data source on the Web server?
A) File
B) Common
C) Shared
D) System
E) User
Answer: D
115) OLE DB breaks the features and functions of a DBMS into what type of objects?
A) COM
B) DBMS
C) MTS
D) ODBC
E) ASP
Answer: A
116) Which of the following is not true about OLE DB?
A) Scripting languages cannot access OLE DB.
B) OLE DB is object-oriented.
C) OLE DB can access ODBC data sources.
D) OLE DB can access non-relational data sources.
E) OLE DB is used as a wrapper for ADO objects.
Answer: E
117) The characteristics of an object are called ________.
A) classes
B) collections
C) methods
D) properties
E) procedures
Answer: D
118) The actions that an object can perform are called ________.
A) classes
B) collections
C) methods
D) properties
E) procedures
Answer: C
119) An important method of a collection is a(n) ________, which can be used to pass through or otherwise identify the items in the collection.
A) iterator
B) identifier
C) converter
D) transformer
E) signal
Answer: A
120) A set of objects and the properties and methods that they expose are known as a(n) ________.
A) provider
B) data consumer
C) implementation
D) instantiation
E) interface
Answer: E
121) Which of the following is a type of OLE DB data provider?
A) relational data provider
B) method provider
C) sequential data provider
D) tabular data provider
E) implementation provider
Answer: D
122) Which standard interface in OLE DB is invoked to declare a forward-only cursor?
A) IRowSet
B) IAccessor
C) IColumnsInfo
D) adXact
E) ADODB
Answer: A
123) Which of the following is not true of ADO?
A) ADO is a simple object model for OLE DB data consumers.
B) ADO can be used from VBScript and JavaScript.
C) ADO is harder to understand than OLE DB.
D) ADO can be called from languages such as Visual Basic.NET, Java and C#.
E) All of the above are true of ADO.
Answer: C
124) Which of the following is true about ADO.NET?
A) It is an improved and expanded version of ADO.
B) It facilitates the transformation of XML documents to and from relational database constructs.
C) It provides the ability to create and process in-memory databases.
D) A and B
E) A, B, and C
Answer: E
125) ADO.NET in-memory databases are called ________.
A) adoBases
B) adoDatabases
C) dotNetBases
D) dotNetDatabases
E) DataSets
Answer: E
126) An ADO.NET Data Provider is a(n) ________ that provides ADO.NET services.
A) class library
B) windows application
C) Web application
D) XML service
E) DND service
Answer: A
127) Which of the following is true about ADO.NET DataSets?
A) They can have multiple tables and relationships.
B) They can have foreign keys and surrogate keys.
C) They can support referential integrity actions.
D) A and B
E) A, B, and C
Answer: E
128) Which of the following is true of JDBC?
A) Programs must be written in Java.
B) JDBC only works with open-source products.
C) JDBC is only available for Unix-like operating systems, such as Linux.
D) JDBC is actually a DBMS.
E) B and C
Answer: A
129) What type of JDBC driver is known as a JDBC-ODBC bridge?
A) Type J-O driver
B) Type 1 driver
C) Type 2 driver
D) Type 3 driver
E) Type 4 driver
Answer: B
130) What type of JDBC driver connects to the native API of the DBMS?
A) Type J-O driver
B) Type 1 driver
C) Type 2 driver
D) Type 3 driver
E) Type 4 driver
Answer: C
131) What type of JDBC driver translates JDBC calls into DBMS-independent network protocols?
A) Type J-O driver
B) Type 1 driver
C) Type 2 driver
D) Type 3 driver
E) Type 4 driver
Answer: D
132) What type of JDBC driver translates JDBC calls into DBMS-specific network protocols?
A) Type J-O driver
B) Type 1 driver
C) Type 2 driver
D) Type 3 driver
E) Type 4 driver
Answer: E
133) A Java virtual machine is actually a ________.
A) program compiler
B) JDBC data source
C) bytecode interpreter
D) JDBC driver
E) servlet
Answer: C
134) Which of the following is true about bytecode interpretation?
A) It may be performed on the client.
B) It may be performed on the server.
C) It is slower than running a program compiled into machine code.
D) It increases portability.
E) All of the above.
Answer: E
135) Applet bytecode is transmitted to the user's computer via ________.
A) the JDBC driver
B) the Java virtual machine
C) HTTP
D) SQL
E) the bytecode interpreter
Answer: C
136) A(n) ________ is a Java program that is interpreted and executed by a bytecode interpreter on the Web server.
A) applet
B) Java virtual machine
C) servlet
D) HTTP
E) JDBC translator
Answer: C
137) In a three-tier or n-tier architecture, which type of JDBC driver can be used if the DBMS and the Web server are running on the same computer?
A) Type 1 driver
B) Type 2 driver
C) Type 3 driver
D) Type 4 driver
E) All of the above.
Answer: E
138) The first step in using a JDBC driver is to ________.
A) establish a connection to the database
B) load the driver
C) create a statement
D) call the DriverManager object
E) invoke the executeQuery method
Answer: B
139) The coding for Java Server Pages must be written in ________.
A) Java
B) JavaScript
C) C++
D) Visual Basic
E) Any of the above
Answer: A
140) Which of the following is true about JSP code?
A) It must be written in Java or JavaScript.
B) It does not have access to HTTP functionality.
C) It must be coded as complete Java classes and methods.
D) It is automatically converted into Java servlets.
E) All of the above.
Answer: D
141) Which of the following is not true about Tomcat?
A) It is a servlet processor.
B) it can be used as a standalone Web server.
C) It is often used in conjunction with Apache.
D) It is an applet processor.
E) It has limited Web server facilities.
Answer: D
142) JSP pages are ________.
A) automatically compiled by the servlet processor as needed
B) required to be compiled by the developer before being made public
C) automatically checked for syntax errors by the servlet as they are written
D) slower to execute but more memory efficient than CGI files
E) A and D
Answer: A
143) As compared to CGI files, JSP pages ________.
A) are less memory efficient
B) require more processor time
C) execute faster
D) keep more copies of a given page in memory
E) None of the above
Answer: C
144) In PHP, any programming language statements that are to be processed on the server must be enclosed in:
A)
Answer: D
145) The first PHP element to be created is the:
A) Command object.
B) Connection object.
C) Errors collection.
D) Parameters collection.
E) RecordSet object.
Answer: B
146) The final step of using a PHP connection to a DBMS is to:
A) open the connection.
B) test the connection.
C) query the database.
D) process the query results.
E) close the connection.
Answer: E
147) PDO stands for:
A) PHP Data Objects.
B) PHP Design Objects.
C) Personal Data Objects.
D) Personal Design Objects.
E) None of the above.
Answer: A
148) HTML is an application of ________.
A) SGML
B) XML
C) SOAP
D) XSLT
E) ADO.NET
Answer: A
149) XML stands for ________.
A) Experimental Markup Language
B) Extendable Markup Language
C) Extensible Markup Language
D) Active X-control Markup Language
E) Active X-control Management Language
Answer: C
150) Which of the following is true about XML?
A) It is a subset of SGML.
B) Additional standards and capabilities have been added to XML processing.
C) It is a hybrid of document processing and database processing.
D) A and B
E) A, B, and C
Answer: E
151) SOAP originally stood for ________.
A) Simple Operational Application Protocol
B) Standard Operational Application Protocol
C) Simple Object Application Protocol
D) Simple Object Access Protocol
E) Standard Object Access Protocol
Answer: D
152) SOAP has become ________.
A) just a name, not an acronym
B) a standard protocol for sending any type of message
C) an old technology replaced by XML
D) A and B
E) A, B, and C
Answer: D
153) Which of the following is true about XML?
A) It allows the confounding of document structure, content, and format.
B) It is non-standardized to allow for extension by developers.
C) The structure of documents is formally defined.
D) XML tags, like some HTML tags, are vague and arbitrary.
E) None of the above.
Answer: C
154) The first section of an XML document might be a ________.
A) Document Definition Section (DDS)
B) Document Type Declaration (DTD)
C) Data Type (DTYPE)
D) Document Type (DOCTYPE)
E) Type Declaration (TYPEDECL)
Answer: B
155) The document type declaration for an XML document begins with the keyword ________.
A) XML
B) DTD
C) TYPE
D) DOCTYPE
E) TYPEDECL
Answer: D
156) XML documents that conform to their DTD are said to be ________.
A) DTD-valid
B) XML-valid
C) DTD-compliant
D) not-type-valid
E) type-valid
Answer: E
157) XML documents that are not-type-valid can still be ________.
A) DTD-valid
B) XML-valid
C) DTD-compliant
D) XML-compliant
E) proper XML documents
Answer: E
158) Which of the following is not true about document type declarations for XML documents?
A) They are not required.
B) They are required for type-valid documents.
C) They cannot be contained inside the XML document.
D) Storing the DTD externally allows many documents to be validated against the same DTD.
E) The DTD can be extended by the developer with any elements he or she wants to include.
Answer: C
159) Which of the following is not true about XSLT?
A) It is a declarative language.
B) It is a transformation language.
C) It can materialize XML documents into HTML.
D) It can transform an XML document into another XML document with a different structure.
E) It requires the use of CSS.
Answer: E
160) Which of the following is true about XSLT?
A) It can be used to materialize XML documents into HTML.
B) XSLT processors are context oriented.
C) It is a non-declarative transformation language.
D) A and B
E) A, B, and C
Answer: D
161) XML Schema is used to define ________.
A) document content and structure
B) XQL queries
C) DOM-compliant parsers
D) DTDs
E) XPath searches
Answer: A
162) XML documents can be ________ against their XML Schema.
A) measured
B) grown
C) validated
D) browsed
E) All of the above
Answer: C
163) An important improvement of XML Schema over DTDs is that ________.
A) XML Schema can be stored external to the document
B) XML Schema support XQL queries
C) XML Schema are XML documents
D) XML Schema are not required
E) XML Schema can validate XML documents
Answer: C
164) The XML Schema "mother of all schemas" is located at ________.
A) a user-defined Web server for each organization
B) www.w3.org
C) www.google.com
D) www.microsoft.com
E) www.xmlschema.net
Answer: B
165) The XML Schema statement xmlns:xsd indicates that ________.
A) this XML Schema uses a labeled namespace called xsd
B) this XML Schema is validated at www.xsd.com
C) this XML Schema is validated at www.xmlns.com using the xsd XML Schema located there
D) this XML Schema is using a non-standard looping procedure, where xsd is the variable name of the loop increment
E) the value of the variable xmnls is being set equal to the value of the variable xsd
Answer: A
166) XML Schemas consist of ________.
A) elements
B) attributes
C) properties
D) A and B
E) A, B, and C
Answer: D
167) Which of the following is a type of element in an XML Schema?
A) simple
B) composite
C) compound
D) complex
E) A and D
Answer: E
168) XML Schema elements of the complexType may contain ________.
A) one simple element
B) one complexType element
C) more than one simple element
D) more than one complexType element
E) Any of the above
Answer: E
169) In an XML Schema, the tags ...<\xsd:ComplexType> indicate that:
A) a sequence of numbers is listed between the tags.
B) a sequence of letters or words is listed between the tags.
C) a set of elements will occur in a multi-layered format between the tags.
D) A or B
E) A, B, or C
Answer: C
170) In database/ XML applications, it is a recommended practice that ________.
A) elements carry data, and attributes carry metadata
B) elements carry metadata, and attributes carry data
C) elements and attributes carry data, and the XML Schema carry metadata
D) elements and attributes carry metadata, and the XML Schema carry data
E) either A or B
Answer: A
171) The default cardinality for elements in an XML Schema is ________.
A) 0.1
B) 1.1
C) 1.N
D) N.1
E) M.N
Answer: B
172) The use of the XML Schema expression minOccurs="0" ________.
A) is an XML Schema default
B) is required as there are no defaults in an XML Schema
C) is similar to the SQL schema NULL constraint
D) A and C
E) B and C
Answer: C
173) XML Schema that have all elements residing at the same level are called ________.
A) flat
B) structured
C) single-leveled
D) multi-leveled
E) styled
Answer: A

176) The SQL Server XML SELECT statements can be applied to ________.
A) single table SELECT statements
B) multiple table SELECT statements
C) XML Schema statements
D) A and B
E) A, B, and C
Answer: D
177) XML is important because XML processing provides a standardized facility to ________ any database view.
A) describe
B) validate
C) materialize
D) A and B
E) A, B, and C
Answer: E
178) The standard for locating particular elements within a document is called ________.
A) XML
B) XSL
C) XPath
D) SAX
E) DOM
Answer: C
179) XQuery is a standard for expressing ________.
A) queries as ADO.NET datasets
B) queries as XML documents
C) queries on SQL databases
D) A and B
E) A, B, and C

Answer: B