NAME

Question types


Start with


Question limit

of 28 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. 3rd normal form
  2. grant
  3. revoke
  4. xlock
  5. 3 tier
  1. a -removes privaledges, When a user's privileges are revoked, so are all those privileges which were passed on by this user.
  2. b is supperior for handling large scale internet and intranet applications
  3. c a table that is in 2NF for which no non-PK column is transitively dependent on the PK
    In other words, the 3NF is violated when a non-PK column is a fact about another non-PK column
  4. d -no other transaction can issure either a slock or xlock on that item. before a transaction can write to a database item, it must be granted Xlock on that item
  5. e -defines users privaledges

5 Multiple choice questions

  1. is good for building departmental applications, such as decision support and groupware, however doesn't scale well
  2. approach to data analysis sifts through the data in search of frequently occurring patterns and trends
  3. - the analysis of business operations with the intentino of making timely and accurate analysis-based decisions
  4. ensures that every row has a unique, non-null primary key.
  5. a table in which the intersection of each row and column contains one and only one value
    In other words, there should be no « multi-valued » attributes in a table

5 True/False questions

  1. 2nd normal forma table that is in 2NF for which no non-PK column is transitively dependent on the PK
    In other words, the 3NF is violated when a non-PK column is a fact about another non-PK column

          

  2. dirstributed requestsupports multiple data re3quests for data at multiple locations. each request is for data on a single server

          

  3. grant option-WITH GRANT OPTION permits a user to pass privileges to another user

          

  4. thin-clientan ______ helps you speed up retrieval. You should ____ a column if you use it frequently and easy access is desired

          

  5. verification-WITH GRANT OPTION permits a user to pass privileges to another user