- Normalization works through a series of stages called normal forms.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- Normalization is a process that is used for changing attributes to entities.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- In order to meet performance requirements, portions of the database design may need to be occasionallydenormalized.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- Denormalization produces a lower normal form.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- Normalization is a very important database design ingredient, and the highest level is always the most desirable.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Moderate REF: p.202
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Database Tables and Normalization
- Reporting anomalies in a table can cause a multitude of problems for managers and can be fixed through applicationprogramming.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.205
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Need For Normalization
- Data redundancy produces data anomalies.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.206
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Need For Normalization
- The objective of normalization is to ensure that each table conforms to the concept of well-formed relations.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.206
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Relational models view data as part of a table or collection of tables in which all key values must be identified.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.208
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Repeating groups must be eliminated by ensuring that each row defines a single entity.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.208
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A dependency of one nonprime attribute on another nonprime attribute is a partial dependency.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.210
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Dependency diagrams are very helpful in getting a bird’seye view of all the relationships among a table’s attributes.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.210
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Dependencies that are based on only a part of a composite primary key are called transitive dependencies.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.210
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- All relational tables satisfy the 1NF requirements.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.211
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- In the context of partial dependencies, data redundancies occur because every row entry requires duplication ofdata.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.211
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Since a partial dependency can exist only if a table’s primary key is composed of several attributes, if a table in 1NFhas a single-attribute primary key, then the table is automatically in 2NF.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Moderate REF: p.212
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: The Normalization Process
- It is possible for a table in 2NF to exhibit transitive dependency, where the primary key may rely on one or morenonprime attributes to functionally determine other nonprime attributes.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Moderate REF: p.212
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: The Normalization Process
- A determinant is any attribute whose value determines other values within a column.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.213
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Data stored at their highest level of granularity are said to be atomic data.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving the Design
- Atomic attributes are attributes that can be further subdivided.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving the Design
- A table is in BCNF if every determinant in the table is a foreign key.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- A table is in fourth normal form if it is in third normal form and has no independent multivalued dependencies.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- Normalization represents a micro view of the entities within the ERD.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Normalization and Database Design
- The combination of normalization and ER modeling yields a useful ERD, whose entities can be translated intoappropriate relationship structures.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.229
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Normalization and Database Design
- A good relational DBMS excels at managing denormalized relations.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.229
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- The advantage of higher processing speed must be carefully weighed against the disadvantage of data anomalies.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.229
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- Normalization purity is often easy to sustain in the modern database environment.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.231
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- Unnormalized database tables often lead to various data redundancy disasters in production databases.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.232
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- Attributes should clearly define participation, connectivity, and document cardinality.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.233
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data-Modeling Checklist
- Normalization works through a series of stages called normal forms. For most purposes in business databasedesign, stages are as high as you need to go in the normalization process.
- two three
- four d. five
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- From a structural point of view, 3NF is better than .
- 4NF 2NF
- 5NF d. 6NF
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- From a structural point of view, 2NF is better than .
- 1NF 3NF
- 4NF d. BCNF
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- An attribute that is part of a key is known as a(n)
- important nonprime
- prime d. entity
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- A table that displays data redundancies yields .
- consistencies anomalies
- fewer attributes d. more entities
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.205
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Need For Normalization
- Data redundancy produces .
- slower lookups robust design
- efficient storage use d. data integrity problems
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.206
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Need For Normalization
- Attribute A attribute B if all of the rows in the table that agree in value for attribute A also agree in valuefor attribute B.
- determines derives from
- controls d. owns
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.207
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: The Normalization Process
- Some very specialized applications may require normalization beyond the .
- 1NF 2NF
- 3NF d. 4NF
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.207
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Of the following normal forms, is mostly of theoretical interest.
- 1NF 3NF
- BCNF d. DKNF
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.207
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A table that has all key attributes defined, has no repeating groups, and all its attributes are dependent on theprimary key is said to be in .
- 1NF 2NF
- 3NF d. 4NF
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.207
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A(n) exists when there are functional dependencies such that XY is functionally dependent on WZ, X isfunctionally dependent on W, and XY is the primary key.
- atomic attribute repeating group
- partial dependency d. transitive dependency
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.207
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A(n) exists when there are functional dependencies such that Y is functionally dependent on X, Z isfunctionally dependent on Y, and X is the primary key.
- partial dependency repeating group
- atomic attribute d. transitive dependency
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.208
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A derives its name from the fact that a collection of multiple entries of the same type can exist for anysingle key attribute occurrence.
- partial dependency transitive dependency
- repeating group d. primary key
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.208
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A relational table must not contain a(n) .
- entity attribute
- relationship d. repeating group
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.208
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- In a(n) diagram, the arrows above the attributes indicate all desirable dependencies.
- Chen dependency
- functionality d. ER
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.210
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Dependencies based on only a part of a composite primary key are known as
- primary partial
- incomplete d. composite
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.211
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have
based on this composite candidate key even when the primary key chosen is a single attribute.
- Boyce-Codd normal forms redundancies
- time-variances d. partial dependencies
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.215
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A table that is in 2NF and contains no transitive dependencies is said to be in .
- 1NF 2NF
- 3NF d. 4NF
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.215
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Improving leads to more flexible queries.
- atomicity normalization
- denormalization d. derived attribute
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving the Design
- An atomic attribute .
- cannot exist in a relational table cannot be further subdivided
- displays multiplicity d. is always chosen to be a foreign key
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving the Design
- The most likely data type for a surrogate key is .
- character date
- logical d. numeric
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving the Design
- Granularity refers to .
- the size of a tableb. the level of detail represented by the values in a table’srow
- the number of rows in atabled. the number of attributes represented in a table
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving the Design
- From a system functionality point of view, attribute values can be calculated when they are needed to writereports or invoices.
- derived atomic
- granular d. historical
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.217
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving The Design
- In a real-world environment, we must strike a balance between design integrity and .
- robustness flexibility
- uniqueness d. ease of use
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.220
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Surrogate Key Considerations
- For most business transactional databases, we should normalize relations into .
- 1NF 2NF
- 3NF d. 6NF
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.220
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- To generate a surrogate key, Microsoft Access uses a(n) data type.
- character sequence
- AutoNumber d. identity
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.220
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Surrogate Key Considerations
- A table where every determinant is a candidate key is said to be in .
- BCNF 2NF
- 1NF d. 4NF
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.221
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- BCNF can be violated only if the table contains more than one
- primary candidate
- foreign d. secondary
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.221
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- When a table contains only one candidate key, are considered to be equivalent.
- the 1NF and the 2NF the 3NF and the BCNF
- the 4NF and the 3NF d. the BCNF and the DKNF
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.221
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- In a situation, one key determines multiple values of two other attributes and those attributes areindependent of each other.
- multivalued dependency transitive dependency
- partial dependency d. functional dependency
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.225
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- A table where all attributes are dependent on the primary key but are independent of each other, and no rowcontains two or more multivalued facts about an entity is said to be in .
- 1NF 2NF
- 3NF d. 4NF
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- A table is in 4NF if it is in 3NF, and .
- all attributes must be dependent on the primary key and must be dependent on each other
- all attributes are unrelated
- it has no multivalued dependencies
- no column contains the same values
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- When designing a database, you should .
- make sure that entities are in normal form before table structures are created
- create table structures then normalize the database
- only normalize the database when performance problems occur
- consider more important issues such as performance before normalizing
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.226
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Normalization and Database Design
- An example of denormalization is using a denormalized table to hold report data. This is required whencreating a tabular report in which the columns represent data that are stored in the table as rows.
- transitive 3NF
- component d. temporary
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.231
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- The conflicts between design efficiency, information requirements, and performance are often resolved through_____.
- compromises that include normalization conversion from 2NF to 3NF
- compromises that include denormalization d. conversion from 3NF to 4NF
ANSWER: c
PTS: 1 DIF: Difficulty: Moderate REF: p.231
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Denormalization
- Data warehouse routinely uses structures in its complex, multilevel, multisource data environment.
- 1NF 2NF
- 3NF d. 4NF
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.232
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- databases reflect the ever-growing demand for greater scope and depth in the data on which decisionsupport systems increasingly rely.
- Normalized Data warehouse
- Temporary d. Report
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.232
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- If database tables are treated as though they were files in a file system, the never has a chance todemonstrate its superior data-handling capabilities.
ANSWER: RDBMS
relational database management system
relational database management system (RDBMS)RDBMS (relational database management system)
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database and Normalization
- The price paid for increased performance through denormalization is a larger amount of .
ANSWER: redundancy
data redundancy
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- In order to meet requirements, you may have to denormalize some portions of a database design.
ANSWER: performance
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- is a process to help reduce the likelihood of data anomalies.
ANSWER: Normalization
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- Any attribute that is at least part of a key is known as a (n)_____ .
ANSWER: prime attribute
key attribute
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- When designing a new database structure based on the business requirements of the end users, the databasedesigner will construct a data model using a technique such as .
ANSWER: Crow’s Foot notation ERDs
PTS: 1 DIF: Difficulty: Easy REF: p.202
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Database Tables and Normalization
- The is central to a discussion of normalization.
ANSWER: concept of keys
PTS: 1 DIF: Difficulty: Easy REF: p.206
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- A dependency based on only a part of a composite primary key is called a (n)_____ .
ANSWER: partial dependency
PTS: 1 DIF: Difficulty: Easy REF: p.210
NAT: BUSPROG: Technology STATE: DISC: Information technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- The problem with transitive dependencies is that they still yield data .
ANSWER: anomalies
PTS: 1 DIF: Difficulty: Easy REF: p.210
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- All relational tables satisfy the
ANSWER: 1NF
first normal form
first normal form (1NF)
1NF (first normal form)
PTS: 1 DIF: Difficulty: Easy REF: p.211
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Because a partial dependency can exist only when a table’s primary key is composed of several attributes, a tablewhose key consists of only a single attribute is automatically in 2NF once it is in 1NF.
ANSWER: primary
PTS: 1 DIF: Difficulty: Easy REF: p.212
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- Any attribute whose value determines other values within a row is known as a .
ANSWER: determinant
PTS: 1 DIF: Difficulty: Easy REF: p.213
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: The Normalization Process
- An attribute that cannot be further subdivided is said to display .
ANSWER: atomicity
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving The Design
- refers to the level of detail represented by the values stored in a table’s row.
ANSWER: Granularity
PTS: 1 DIF: Difficulty: Easy REF: p.216
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving The Design
- In a real-world environment, changing granularity requirements might dictate changes in primary key selection, andthose changes might ultimately require the use of __
ANSWER: surrogate
PTS: 1 DIF: Difficulty: Easy REF: p.217
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Improving The Design
- It becomes difficult to create a suitable key when the related table uses a composite primary key.
ANSWER: foreign
PTS: 1 DIF: Difficulty: Easy REF: p.219
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Surrogate Key Considerations
- When a nonkey attribute is the determinant of a key attribute, the table is in 3NF but not in .
ANSWER: BCNF
Boyce-Codd normal form
Boyce-Codd normal form
(BCNF)BCNF (Boyce-Codd normal form)
PTS: 1 DIF: Difficulty: Easy REF: p.221
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Surrogate Key Considerations
- In the , no row may contain two or more multivalued facts about an entity.
ANSWER: 4NF
fourth normal form
fourth normal form (4NF)
4NF (fourth normal form)
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Higher-Level Normal Forms
- An ERD is created through a (n)________
ANSWER: iterative
PTS: 1 DIF: Difficulty: Easy REF: p.226
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Normalization and Database Design
- The combination of and ER modeling yields a useful ERD, whose entities may now be translated intoappropriate table structures.
ANSWER: normalization
PTS: 1 DIF: Difficulty: Easy REF: p.229
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Normalization and Database Design
- Unnormalized tables yield no simple strategies for creating virtual tables known as .
ANSWER: views
PTS: 1 DIF: Difficulty: Easy REF: p.232
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Denormalization
- According to the data-modeling checklist, should be nouns that are familiar to business, should be short andmeaningful, and should document abbreviations, synonyms, and aliases for each entity.
ANSWER: entity names
PTS: 1 DIF: Difficulty: Easy REF: p.233
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data-Modeling Checklist
- Explain normalization and its different forms.
ANSWER: Normalization is a process for evaluating and correcting table structures to minimize data redundancies,thereby reducing the likelihood of data anomalies. The normalization process involves assigningattributes to tables based on the concept of determination. Normalization works through a series ofstages called normal forms. The first three stages are described as first normal form (1NF), secondnormal form (2NF), and third normal form (3NF). From a structural point of view, 2NF is better than1NF, and 3NF is better than 2NF. For most purposes in business database design, 3NF is as high as youneed to go in the normalization process. However, you will discover that properly designed 3NFstructures also meet the requirements of fourth normal form (4NF).
PTS: 1 DIF: Difficulty: Moderate REF: p.202
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Database Tables and Normalization
- What characteristics do tables that conform to the concept of well-informed relations have?
ANSWER: Tables that conform to the concept of well-informed relations have the following characteristics:
- Each table represents a single subject.
- No data item will be unnecessarily stored in more than one table. This results in tables that havelower redundancies. The reason for this requirement is to ensure that the data is updates in onlyone place.
- All nonprime attributes in a table are dependent on the primary key alone. The reason for thisrequirement is to ensure that the data is uniquely identifiable by a primary key value.
- Each table is void of insertion, update, or deletion anomalies, which ensure the integrity andconsistency of the data.
PTS: 1 DIF: Difficulty: Moderate REF: p.206
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: The Normalization Process
- Describe a dependency diagram and explain its purpose.
ANSWER: Dependency diagrams are very helpful in getting a bird’s eye view of all the relationships among atable’s attributes, and their use makes it less likely that you will overlook an important dependency.The following are features of a dependency diagram:
- The primary key attributes are bold, underlined, and shaded in a different color.
- The arrows above the attributes indicate all desirable dependencies—that is, dependencies basedon the primary key.
- The arrows below the dependency diagram indicate less desirable dependencies. Two types ofsuch dependencies exist:
- Partial dependencies. A dependency based on only a part of a composite primary key is apartial dependency.
- Transitive dependencies. A transitive dependency is a dependency of one nonprime attributeon another nonprime attribute. The problem with transitive dependencies is that they still yielddata anomalies.
PTS: 1 DIF: Difficulty: Moderate REF: p.210
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: The Normalization Process
- What steps are involved in the conversion to third normal form?
ANSWER: Step 1: Make New Tables to Eliminate Transitive Dependencies
For every transitive dependency, write a copy of its determinant as a primary key for a new table. Adeterminant is any attribute whose value determines other values within a row. If you have threedifferent transitive dependencies, you will have three different determinants. As with the conversion to2NF, it is important for the determinant remain in the original table to serve as a foreign key.
Step 2: Reassign Corresponding Dependent Attributes
Identify the attributes that are dependent on each determinant identified in Step 1. Place the dependentattributes in the new tables with their determinants and remove them from their original tables.
PTS: 1 DIF: Difficulty: Moderate REF: p.213
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: The Normalization Process
- Explain the Boyce-Codd normal form (BCNF). How is it related to other normal forms?
ANSWER: A table is in Boyce-Codd normal form (BCNF) when every determinant in the table is a candidate key.A candidate key has the same characteristics as a primary key, but for some reason, it was not chosento be the primary key. Clearly, when a table contains only one candidate key, the 3NF and the BCNFare equivalent. In other words, BCNF can be violated only when the table contains more than onecandidate key. Most designers consider the BCNF to be a special case of the 3NF. In fact, if thetechniques shown in this chapter are used, most tables conform to the BCNF requirements once the3NF is reached.
PTS: 1 DIF: Difficulty: Moderate REF: p.221
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Higher-Level Normal Forms
- Explain how database designers design and normalize databases.
ANSWER: First, an ERD is created through an iterative process. Database designers begin by identifying relevantentities, their attributes, and their relationships. Then they use the results to identify additional entitiesand attributes. The ERD provides the big picture, or macro view, of an organization’s data requirementsand operations. Second, normalization focuses on the characteristics of specific entities; that is,normalization represents a micro view of the entities within the ERD. Also, the normalization processmight yield additional entities and attributes to be incorporated into the ERD. Therefore, it is difficult toseparate normalization from ER modeling; the two techniques are used in an iterative and incrementalprocess.
©2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
CHAPTER 7: INTRODUCTION TO STRUCTURED QUERY LANGUAGE (SQL)
- A database language enables the user to perform complex queries designed to transform the raw data into usefulinformation.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.247
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.247
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- The ANSI prescribes a standard SQL–the current fully approved version is known as SQL07.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.248
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- The ANSI SQL standards are also accepted by the ISO.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.248
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- Data type selection is usually dictated by the nature of the data and by the intended use.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.252
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- Only numeric data types can be added and subtracted in SQL.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.252
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- Entity integrity is enforced automatically when the primary key is specified in the CREATE TABLE commandsequence.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.258
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- The CHECK constraint is used to define a condition for the values that the attribute domain cannot have.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.260
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- You cannot insert a row containing a null attribute value using SQL.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.264
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- SQL requires the use of the ADD command to enter data into a table.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.264
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- Any changes made to the contents of a table are not physically saved on disk until you use the SAVE <table name>command.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.265
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- To list the contents of a table, you must use the DISPLAY command.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.266
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- The COMMIT command does not permanently save all changes. In order to do that, you must use SAVE.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.266
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- All SQL commands must be issued on a single line.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.267
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- Although SQL commands can be grouped together on a single line, complex command sequences are best shown on separate lines, with space between the SQL command and the command’s components.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Moderate REF: p.267
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Command
- If you have not yet used the COMMIT command to store the changes permanently in the database, you canrestore the database to its previous condition with the ROLLBACK command.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.269
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- You can select partial table contents by naming the desired fields and by placing restrictions on the rows to beincluded in the output.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.271
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- Oracle users can use the Access QBE (query by example) query generator.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.271
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- Mathematical operators cannot be used to place restrictions on character-based attributes.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.273
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- String comparisons are made from left to right.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.274
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- Date procedures are often more software-specific than other SQL procedures.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.274
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- SQL allows the use of logical restrictions on its inquiries such as OR, AND, and NOT.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.277
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- ANSI-standard SQL allows the use of special operators in conjunction with the WHERE clause.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.279
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- The conditional LIKE must be used in conjunction with wildcard characters.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.280
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- Most SQL implementations yield case-insensitive searches.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.281
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- Some RDBMSs, such as Microsoft Access, automatically make the necessary conversions to eliminate casesensitivity.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.281
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- The COUNT function is designed to tally the number of non-null “values” of an attribute, and is often used inconjunction with the DISTINCT clause.
- True
- False
ANSWER: True
PTS: 1 DIF: Difficulty: Easy REF: p.293
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional select Query Keywords
- An alias cannot be used when a table is required to be joined to itself in a recursive query.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Moderate REF: p.303
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Joining Database Tables
- When joining three or more tables, you need to specify a join condition for one pair of tables.
- True
- False
ANSWER: False
PTS: 1 DIF: Difficulty: Easy REF: p.303
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Joining Database Tables
- The SQL data manipulation command HAVING:
- restricts the selection of rows based on a conditional expression.
- restricts the selection of grouped rows based on a condition.
- modifies an attribute’s values in one or more table’s rows.
- groups the selected rows based on one or more attributes.
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.248
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- The SQL command that allows a user to permanently save data changes is .
- INSERT SELECT
- COMMIT d. UPDATE
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.248
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- The constraint assigns a value to an attribute when a new row is added to a table.
- CHECK UNIQUE
- NOT NULL d. DEFAULT
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.260
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- The constraint assigns a value to an attribute when a new row is added to a table.
- CHECK UNIQUE
- NOT NULL d. DEFAULT
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.260
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- The SQL command that allows a user to list the contents of a table is .
- INSERT SELECT
- COMMIT d. UPDATE
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.266
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- In Oracle, the command is used to change the display for a column, for example, to place a $ in front of anumeric value.
- DISPLAY FORMAT
- CHAR d. CONVERT
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.267
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- UPDATE tablename
*****
[WHERE conditionlist];
The command replaces the ***** in the syntax of the UPDATE command, shown above.
- SET columnname = expression columnname = expression
- expression = columnname d. LET columnname = expression
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.268
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Commands
- An example of a command a user would use when making changes to a PRODUCT table is .
- CHANGE PRODUCT
SET P_INDATE = ‘18-JAN-2004’WHERE P_CODE = ‘13-Q2/P2’;
- ROLLBACK PRODUCT
SET P_INDATE = ‘18-JAN-2004’WHERE P_CODE = ‘13-Q2/P2’;
- EDIT PRODUCT
SET P_INDATE = ‘18-JAN-2004’WHERE P_CODE = ‘13-Q2/P2’;
- UPDATE PRODUCT
SET P_INDATE = ‘18-JAN-2004’WHERE P_CODE = ‘13-Q2/P2’;
ANSWER: d
PTS: 1 DIF: Difficulty: Moderate REF: p.268
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Commands
- The command is used to restore the database to its previous condition.
- COMMIT; RESTORE; COMMIT; BACKUP;
- COMMIT; ROLLBACK; d. ROLLBACK;
ANSWER: d
PTS: 1 DIF: Difficulty: Easy REF: p.269
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- Some RDBMSs, such as Oracle, automatically data changes when issuing data definition commands.
- COMMIT ROLLBACK
- UNSAVE d. UPDATE
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.269
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- When a user issues the DELETE FROM tablename command without specifying a WHERE condition, .
- no rows will be deleted the first row will be deleted
- the last row will be deleted d. all rows will be deleted
ANSWER: d
PTS: 1 DIF: Difficulty: Moderate REF: p.270
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Commands
- The command would be used to delete the table row where the P_CODE is ‘BRT-345’.
- DELETE FROM PRODUCT
WHERE P_CODE = ‘BRT-345’;
- REMOVE FROM PRODUCTWHERE P_CODE = ‘BRT-345’;
- ERASE FROM PRODUCT
WHERE P_CODE = ‘BRT-345’;
- ROLLBACK FROM PRODUCTWHERE P_CODE = ‘BRT-345’;
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.270
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Commands
- A(n) is a query that is embedded inside another query.
- alias operator
- nested d. view
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.270
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- Which of the following queries will output the table contents when the value of V_CODE is equal to 21344?
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE <> 21344;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE <= 21344;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE = 21344;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE => 21344;
ANSWER: c
PTS: 1 DIF: Difficulty: Moderate REF: p.271
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- Which of the following is used to select partial table contents?
- SELECT <column(s)>
FROM <Table name>
BY <Conditions>;
- LIST <column(s)>
FROM <Table name>
BY <Conditions>;
- SELECT <column(s)>
FROM <Table name>
WHERE <Conditions>;
- LIST<column(s)>
FROM <Table name>
WHERE <Conditions>;
ANSWER: c
PTS: 1 DIF: Difficulty: Moderate REF: p.271
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- Which of the following queries will output the table contents when the value of V_CODE is not equal to 21344?
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE <> 21344;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE <= 21344;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE = 21344;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE => 21344;
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.271
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- Which of the following queries will output the table contents when the value of the character field P_CODE
isalphabetically less than 1558-QW1?
- SELECT P_CODE, P_DESCRIPT, P_QOH, P_MIN, P_PRICEFROM PRODUCT
WHERE P_CODE <‘1558-QW1’;
- SELECT P_CODE, P_DESCRIPT, P_QOH, P_MIN, P_PRICEFROM PRODUCT
WHERE P_CODE = [1558-QW1];
- SELECT P_CODE, P_DESCRIPT, P_QOH, P_MIN, P_PRICEFROM PRODUCT
WHERE P_CODE = (1558-QW1);
- SELECT P_CODE, P_DESCRIPT, P_QOH, P_MIN, P_PRICEFROM PRODUCT
WHERE P_CODE = {1558-QW1};
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.273
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- Which of the following queries will list all the rows in which the inventory stock dates occur on or after January 20,2016?
- SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATEFROM PRODUCT
WHERE P_INDATE >= ‘20-JAN-2016’;
- SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATEFROM PRODUCT
WHERE P_INDATE >= $20-JAN-2010$;
- SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATEFROM PRODUCT
WHERE P_INDATE <= ‘20-JAN-2010’;
- SELECT P_DESCRIPT, P_QOH, P_MIN, P_PRICE, P_INDATEFROM PRODUCT
WHERE P_INDATE >= {20-JAN-2010};
ANSWER: a
PTS: 1 DIF: Difficulty: Moderate REF: p.274
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- Which of the following queries will use the given columns and column aliases from the PRODUCT table todetermine the total value of inventory held on hand?
- SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH/P_PRICEFROM PRODUCT;
- SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH=P_PRICEFROM PRODUCT;
- SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH*P_PRICEFROM PRODUCT;
- SELECT P_DESCRIPT, P_QOH, P_PRICE, P_QOH-P_PRICEFROM PRODUCT;
ANSWER: c
PTS: 1 DIF: Difficulty: Moderate REF: p.275
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- A(n) is an alternate name given to a column or table in any SQL statement.
- alias data type
- stored function d. trigger
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.275
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- Which of the following queries uses the correct SQL syntax to list the table contents for either V_CODE = 21344or V_CODE = 24288?
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE = 21344OR V_CODE <= 24288;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE = 21344OR V_CODE => 24288;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE = 21344OR V_CODE > 24288;
- SELECT P_DESCRIPT, P_INDATE, P_PRICE, V_CODEFROM PRODUCT
WHERE V_CODE = 21344OR V_CODE = 24288;
ANSWER: d
PTS: 1 DIF: Difficulty: Moderate REF: p.277
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Select Queries
- According to the rules of precedence, which of the following computations should be completed first?
- performing additions and subtractions
- performing multiplications and divisions
- performing operations within parentheses
- performing power operations
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.277
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- The special operator used to check whether an attribute value is within a range of values is .
- BETWEEN NULL
- LIKE d. IN
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.279
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- The special operator used to check whether an attribute value matches a given string pattern is .
- BETWEEN IS NULL
- LIKE d. IN
ANSWER: c
PTS: 1 DIF: Difficulty: Easy REF: p.279
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- The special operator used to check whether a subquery returns any rows is .
- BETWEEN EXISTS
- LIKE d. IN
ANSWER: b
PTS: 1 DIF: Difficulty: Easy REF: p.279
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- All changes in a table structure are made using the command, followed by a keyword that produces thespecific changes a user wants to make.
- ALTER TABLE UPDATE TABLE
- COOMIT TABLE d. ROLLBACK TABLE
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.283
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- A table can be deleted from the database by using the
- DROP TABLE DELETE TABLE
- MODIFY TABLE d. ERASE TABLE
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.290
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Data Definition Commands
- The SQL query to output the contents of the EMPLOYEE table sorted by last name, first name, and initial is
_____.
- SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONEFROM EMPLOYEE
LIST BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
- SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONEFROM EMPLOYEE
ORDER BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
- SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONEFROM EMPLOYEE
DISPLAY BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
- SELECT EMP_LNAME, EMP_FNAME, EMP_INITIAL, EMP_AREACODE, EMP_PHONEFROM EMPLOYEE
SEQUENCE BY EMP_LNAME, EMP_FNAME, EMP_INITIAL;
ANSWER: b
PTS: 1 DIF: Difficulty: Moderate REF: p.291
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Additional Select Query Keywords
- Which of the following queries is used to list a unique value for V_CODE, where the list will produce only a list ofthose values that are different from one another?
- SELECT ONLY V_CODE
FROM PRODUCT;
- SELECT UNIQUE V_CODEFROM PRODUCT;
- SELECT DIFFERENT V_CODEFROM PRODUCT;
- SELECT DISTINCT V_CODEFROM PRODUCT;
ANSWER: d
PTS: 1 DIF: Difficulty: Moderate REF: p.292
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Additional Select Query Keywords
- The SQL aggregate function that gives the number of rows containing non-null values for a given column is
.
- COUNT MIN
- MAX d. SUM
ANSWER: a
PTS: 1 DIF: Difficulty: Easy REF: p.293
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Select Query Keyword
- The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME,V_AREACODE, V_PHONE, and V_CONTACT fields from the VENDOR table where the values of V_CODEmatch is .
- SELECT P_DESCRIPT, P_PRICE, V_NAME, V_CONTACT, V_AREACODE, V_PHONEFROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE <> VENDOR.V_CODE;
- SELECT P_DESCRIPT, P_PRICE, V_NAME, V_CONTACT, V_AREACODE, V_PHONEFROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE = VENDOR.V_CODE;
- SELECT P_DESCRIPT, P_PRICE, V_NAME, V_CONTACT, V_AREACODE, V_PHONEFROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE <= VENDOR.V_CODE;
- SELECT P_DESCRIPT, P_PRICE, V_NAME, V_CONTACT, V_AREACODE, V_PHONEFROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE => VENDOR.V_CODE;
ANSWER: b
PTS: 1 DIF: Difficulty: Moderate REF: p.301
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Additional Select Query Keyword
- The query to join the P_DESCRIPT and P_PRICE fields from the PRODUCT table and the V_NAME,V_AREACODE, V_PHONE and V_CONTACT fields from the VENDOR table, where the values of V_CODEmatch and the output is ordered by the price is .
- SELECT P_DESCRIPT, PRODUCT.P_PRICE, VENDOR.V_NAME,VENDOR.V_CONTACT, VENDOR.V_AREACODE, VENDOR.V_PHONE
FROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE <> VENDOR.V_CODE;ORDER BY PRODUCT.P_PRICE;
- SELECT P_DESCRIPT, PRODUCT.P_PRICE, VENDOR.V_NAME,VENDOR.V_CONTACT, VENDOR.V_AREACODE, VENDOR.V_PHONE
FROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE => VENDOR.V_CODE;ORDER BY PRODUCT.P_PRICE;
- SELECT P_DESCRIPT, PRODUCT.P_PRICE, VENDOR.V_NAME,VENDOR.V_CONTACT, VENDOR.V_AREACODE, VENDOR.V_PHONE
FROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE <= VENDOR.V_CODE;ORDER BY PRODUCT.P_PRICE;
- SELECT P_DESCRIPT, PRODUCT.P_PRICE, VENDOR.V_NAME,VENDOR.V_CONTACT,
VENDOR.V_AREACODE, VENDOR.V_PHONEFROM PRODUCT, VENDOR
WHERE PRODUCT.V_CODE = VENDOR.V_CODE;ORDER BY PRODUCT.P_PRICE;
ANSWER: d
PTS: 1 DIF: Difficulty: Moderate REF: p.302
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Additional Select Query Keyword
- The basic SQL vocabulary has fewer than
ANSWER: 100
one hundred
a hundred
PTS: 1 DIF: Difficulty: Easy REF: p.247
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- In the SQL environment, the word covers both questions and actions.
ANSWER: query
PTS: 1 DIF: Difficulty: Easy REF: p.248
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Introduction to SQL
- A(n) is a logical group of database objects, such as tables and indexes, that are related to each other.
ANSWER: schema
PTS: 1 DIF: Difficulty: Easy REF: p.251
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- With the exception of the database process, most RDBMS vendors use SQL that deviates little from theANSI standard SQL.
ANSWER: creation
creating
PTS: 1 DIF: Difficulty: Easy REF: p.251
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- ___ is the process the DBMS uses to verify that only registered users access the database.
ANSWER: Authentication
PTS: 1 DIF: Difficulty: Easy REF: p.251
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- S. state abbreviations are always two characters, so (2) is a logical choice for the data type representing astate column.
ANSWER: CHAR
PTS: 1 DIF: Difficulty: Easy REF: p.252
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- The SQL data type DATE stores date in the date format.
ANSWER: Julian
PTS: 1 DIF: Difficulty: Easy REF: p.254
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- To make SQL code more _______, most SQL programmers use one line per column (attribute) definition.
ANSWER: readable
PTS: 1 DIF: Difficulty: Easy REF: p.255
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- In a 1:M relationship, a user must always create the table for the side first.
ANSWER: 1
one
PTS: 1 DIF: Difficulty: Easy REF: p.256
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- The specification is used to avoid having duplicated values in a column.
ANSWER: UNIQUE
PTS: 1 DIF: Difficulty: Easy REF: p.257
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- __ words are words used by SQL to perform specific functions.
ANSWER: Reserved
PTS: 1 DIF: Difficulty: Easy REF: p.258
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- A common practice is to create a(n) on any field that is used as a search key, in comparison operations in aconditional expression, or when a user wants to list rows in a specific order.
ANSWER: index
PTS: 1 DIF: Difficulty: Easy REF: p.263
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- To delete an index, one must use the
ANSWER: DROP INDEX
PTS: 1 DIF: Difficulty: Easy REF: p.264
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Definition Commands
- In an INSERT command, a user can indicate just the attributes that have required values by listing the insideparentheses after the table name.
ANSWER: attribute names
names
PTS: 1 DIF: Difficulty: Easy REF: p.265
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- A(n) character is a symbol that can be used as a general substitute for other characters or commands.
ANSWER: wildcard
wild card
PTS: 1 DIF: Difficulty: Easy REF: p.266
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- A(n) , also known as a nested query or an inner query, is a query that is embedded (or nested) inside anotherquery.
ANSWER: subquery
PTS: 1 DIF: Difficulty: Easy REF: p.270
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Data Manipulation Commands
- The command, coupled with appropriate search conditions, is an incredibly powerful tool that enables a userto transform data into information.
ANSWER: SELECT
PTS: 1 DIF: Difficulty: Easy REF: p.271
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- DATE() and SYSDATE are special functions that return today’s date in MS Access and , respectively.
ANSWER: Oracle
PTS: 1 DIF: Difficulty: Easy REF: p.276
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- In SQL, all expressions evaluate to true or false.
ANSWER: conditional
PTS: 1 DIF: Difficulty: Easy REF: p.278
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- A specialty field in mathematics, known as algebra, is dedicated to the use of logical operators.
ANSWER: Boolean
PTS: 1 DIF: Difficulty: Easy REF: p.278
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- If a user adds a new column to a table that already has rows, the existing rows will default to a value of forthe new column.
ANSWER: null
PTS: 1 DIF: Difficulty: Easy REF: p.285
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Data Definition Commands
- A table can be deleted from the database by using the
ANSWER: DROP TABLE
PTS: 1 DIF: Difficulty: Easy REF: p.290
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Data Definition Commands
- A(n) order sequence is a multilevel ordered sequence that can be created easily by listing several attributes,separated by commas, after the ORDER BY clause.
ANSWER: cascading
PTS: 1 DIF: Difficulty: Easy REF: p.291
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Select Query Keywords
- Rows can be grouped into smaller collections quickly and easily using the clause within the SELECTstatement.
ANSWER: GROUP BY
PTS: 1 DIF: Difficulty: Easy REF: p.297
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Select Query Keywords
- The clause of the GROUP BY statement operates very much like the WHERE clause in the SELECTstatement.
ANSWER: HAVING
PTS: 1 DIF: Difficulty: Easy REF: p.298
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Additional Select Query Keywords
- A(n) is performed when data are retrieved from more than one table at a time.
ANSWER: join
PTS: 1 DIF: Difficulty: Easy REF: p.300-301
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Joining Database Tables
- An alias is especially useful when a table must be joined to itself in a(n)
ANSWER: recursive
PTS: 1 DIF: Difficulty: Easy REF: p.303
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Joining Database Tables
- The condition is generally composed of an equality comparison between the foreign key and the primary keyof related tables.
ANSWER: join
PTS: 1 DIF: Difficulty: Moderate REF: p.301
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Joining Database Tables
- Explain the two SQL functions.
ANSWER: 1. SQL is a data definition language (DDL). It includes commands to create database objects such astables, indexes, and views, as well as commands to define access rights to those databases objects.
- SQL is a data manipulation language (DML). It includes commands to insert, update, delete, andretrieve data within the database tables.
PTS: 1 DIF: Difficulty: Moderate REF: p.247
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Introduction to SQL
- What is a schema? How many schemas can be used in one database?
ANSWER: In the SQL environment, a schema is a logical group of database objects—such as tables and indexes—that are related to each other. Usually, the schema belongs to a single user or application. A singledatabase can hold multiple schemas that belong to different users or applications. Schemas are useful inthat they group tables by owner (or function) and enforce a first level of security by allowing each userto see only the tables that belong to that user.
PTS: 1 DIF: Difficulty: Moderate REF: p.251
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Definition Commands
- Which command is used to save changes to the database? What is the syntax for this command?
ANSWER: Any changes made to the table contents are not saved on disk until a user closes the database, closesthe program he or she is using, or uses the COMMIT command. If the database is open and a poweroutage or some other interruption occurs before the user issues the COMMIT command, the user’schanges will be lost and only the original table contents will be retained. The syntax for the COMMITcommand is:
COMMIT [WORK]
The COMMIT command permanently saves all changes—such as rows added, attributes modified, androws deleted—made to any table in the database.
PTS: 1 DIF: Difficulty: Moderate REF: p.265-266
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Commands
- What is a subquery? When is it used? Does the RDBMS deal with subqueries any differently from normal queries?
ANSWER: A subquery, also known as a nested query or an inner query, is a query that is embedded (or nested)inside another query. The inner query is always executed first by the RDBMS.
In the SQL statement, INSERT INTO tablename SELECT columnlist FROM tableneme;, the INSERTportion represents the outer query, and the SELECT portion represents the subquery. A user can nestqueries (place queries inside queries) many levels deep; in every case, the output of the inner query isused as the input for the outer (higher-level) query.
PTS: 1 DIF: Difficulty: Moderate REF: p.270-271
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Data Manipulation Commands
- What are the wildcard characters that are used with the LIKE command? Provide one or more examples of each.
ANSWER: The LIKE special operator is used in conjunction with wildcards to find patterns within string attributes.Standard SQL allows a user to use the percentage sign (%) and underscore (_) wildcard characters tomake matches when the entire string is not known:
% means any and all following or preceding characters are eligible. For example:
‘J%’ includes Johnson, Jones, Jernigan, July, and J-231Q.
‘Jo%’ includes Johnson and Jones.
‘%n’ includes Johnson and Jernigan.
_ means any one character may be substituted for the underscore. For example:‘_23-456-6789’ includes 123-456-6789, 223-456-6789, and 323-456-6789.
‘_23-_56-678_’ includes 123-156-6781, 123-256-6782, and 823-956-6788.
‘_o_es’ includes Jones, Cones, Cokes, totes, and roles.
PTS: 1 DIF: Difficulty: Moderate REF: p.280
NAT: BUSPROG: Technology STATE: DISC: Information Technology
KEY: Bloom’s: Knowledge TOP: Select Queries
- How can a table be deleted from the database? Provide an example.
ANSWER: A table can be deleted from the database using the DROP TABLE command. For example, a user candelete the PART table with the following command:
DROP TABLE PART;
The user can drop a table only if it is not the “one” side of any relationship. If the user tries to drop atable otherwise, the RDBMS will generate an error message indicating that a foreign key integrityviolation has occurred.
PTS: 1 DIF: Difficulty: Moderate REF: p.290
NAT: BUSPROG: Analytic STATE: DISC: Information Technology
KEY: Bloom’s: Comprehension TOP: Additional Data Definition Commands