5 Written questions
5 Matching questions
- grant option
- entity integrity
- a -WITH GRANT OPTION permits a user to pass privileges to another user
- b -defines users privaledges
- c -no other transaction can issure either a slock or xlock on that item. before a transaction can write to a database item, it must be granted Xlock on that item
- d data manipulation language- is used to maintain and query a database
- e ensures that every row has a unique, non-null primary key.
5 Multiple choice questions
- 3-tier moves the application logic to the server, known as a ___-___ or thick-server architecture
- a table in which the intersection of each row and column contains one and only one value
In other words, there should be no « multi-valued » attributes in a table
- supports multiple data re3quests for data at multiple locations. each request is for data on a single server
- is good for building departmental applications, such as decision support and groupware, however doesn't scale well
- Extraction: Pulling data from existing systems.
Transformation: Data must be standardized and follow consistent coding schemes.
Cleaning: Removing errors, inconsistencies, or redundancies.
Loading: Copying operational data in the data warehouse (archival, current, or ongoing).
Scheduling: Refreshing the warehouse.
Metadata: Data dictionary containing facts about the data in the warehouse.
5 True/False questions
Referential Integrity → maintains the accuracy of the database. its application means that every foreign key in a table has an identical primary key in that soame table or another table
data mining → the search for relationships and patterns that exist in large databases but are hidden in the vast amounts of data
dirstributed request → supports multiple data re3quests for data at multiple locations. each request is for data on a single server
slock → -no other transaction can issure either a slock or xlock on that item. before a transaction can write to a database item, it must be granted Xlock on that item
revoke → -removes privaledges, When a user's privileges are revoked, so are all those privileges which were passed on by this user.