NAME

Question types


Start with


Question limit

of 28 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. slock
  2. 2nd normal form
  3. 2 tier
  4. grant option
  5. 3rd normal form
  1. a is good for building departmental applications, such as decision support and groupware, however doesn't scale well
  2. b -WITH GRANT OPTION permits a user to pass privileges to another user
  3. c -shared and read locks; with a slock in place, other slocks can be put on the same item, but no Xlocks
  4. d a table that is in 2NF for which no non-PK column is transitively dependent on the PK
    In other words, the 3NF is violated when a non-PK column is a fact about another non-PK column
  5. e a table that is in 1NF for which every non-PK column is fully functionally dependent on the PK
    In other words, the 2NF is violated when a non-PK column is a fact about part of the primary key

5 Multiple choice questions

  1. is supperior for handling large scale internet and intranet applications
  2. these are the basic building blocks of a data model. they are the things about which data should be stored, something we need to describe. its the same as a table
  3. the client in the two-tier model of C\S is also called a ____ ____, because most of the processing runs on the client side
  4. lower data redundancy, centralizes data, increased data accuracy and standardization, more consistent data.
  5. supports multiple data re3quests for data at multiple locations. each request is for data on a single server

5 True/False questions

  1. granularity of locks-WITH GRANT OPTION permits a user to pass privileges to another user

          

  2. Referential Integritymaintains the accuracy of the database. its application means that every foreign key in a table has an identical primary key in that soame table or another table

          

  3. entity integrityensures that every row has a unique, non-null primary key.

          

  4. DMLdata manipulation language- is used to maintain and query a database

          

  5. verificationapproach to data analysis is driven by a hypothesis about some relationship in the data