Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Which of the following functions is NOT performed by the file manager? a. cre

ID: 3529355 • Letter: 1

Question

1. Which of the following functions is NOT performed by the file manager? a. creating a file b. tracking of free pages c. retrieval of a record from a file d. updating a record in a file 2. Accessing data it is fastest when a. accessed directly on a magnetic disk b. accessed one page at time c. there is a single, not a composite primary key d. accessed from main memory 3. A particular record is requested by a. the file manager b. the disk manager c. a DBMS d. an SQL query 4. When a page is requested a. the page number is converted to a physical address b. the primary key from the requested page is used to locate the page c. the disk manager must notify the file manger of the physical location of the page d. the disk manager must allocate a page address from the set of unused page addresses e. the DBMS calls the page manager 5. In order to improve the rotation speed of a disk one can a. cluster records b. use indexes c. use direct accessing d. buy a faster disk drive e. reset the disk's rpm parameter 6. Direct address accessing a. is the fastest form of data access b. is used most often when the primary key is a SSN (due to its unique numbering schema) c. is helpful when you typically access a record using two or more different fields d. requires the use of VSAM e. only works for magnetic disk drives 7. A B-Tree a. is a form of an index structure b. can be used for both sequential and direct accessing c. uses pointers d. the logical ordering of a sequence set is also the physical ordering of the file e. all of the above 8. When selecting a storage device for specific data one should consider a. volatility of data b. indexing structure c. use of multimedia and other non-traditional data types d. volume of data e. a and d 9. If you used a RAID device and implemented striping how many disks would you actually stripe your data across when using 7 disks? a. two at a time b. 6 c. 7 d. none, RAID uses mirroring not striping e. none of the above 10. What type of architecture is most used for large scale transaction processing a. Remote job entry b. Personal c. Host/terminal d. Client/server 11. In a Client/Server environment a. PCs are often used b. data are processed remotely c. data are stored locally d. requires replication independence e. A browser is required 12. Mary is told she is working at a dumb terminal a. she should be insulted that the firm thinks so little of her work b. she has a menu system and a GUI c. she is unable to backup her system from her terminal d. she is probably in a host/terminal environment e. she has no disk drive 13. A file/server configuration should be use a. when your files have a lot of graphics or video in them b. when many people utilize the same files c. when you have a highly secured LAN d. when files are small and not used often e. when files are frequently exchanged 14. A three tier model most typically is comprised of: a. clients, servers, and backup devices b. clients, application servers, and data servers c. clients, mainframes, and LAN d. clients, RAID devices, and file servers e. monitor, keyboard and mouse 15. In a client server situation, a thick client a. handles both the processing and the storage of the data b. handles most of the processing but little of the storage c. handles the communication protocols necessary to interface with the server d. is a high speed client 16. A database is said to have become meet the requirements of transparency when a. the users no longer see the database system as something different from the other systems with which they work b. the users know where all the data are stored and processed c. the system can be used independently of the location of the data d. the system is accessible whenever it is required e. the API smoothly handles all hardware required modifications 17. Which of the following is not likely to be a simple service for a customer object? a. creating a new customer b. removing a customer c. changing a customer's phone number d. accessing a customer 18. Some shortcomings of the relational model are: a. Each table needs a unique primary key b. Robust numeric data is not accommodated by the relational model well c. When a query requires several tables to be joined performance can degrade d. SQL is not standardized well enough to be utilized in the global market place e. b and c 19. Some of the UML predefined diagrams include: a. data flow diagrams b. component models c. entity relationship models d. object oriented models e. b and d 20. An attribute in the relational data modeling terminology is a(n) _____ in OO terminology a. object b. descriptor c. attribute d. class e. object identifer 21. To uniquely identify an instance of an object a. a primary key is established b. an attribute along with the table name is used c. the value generated by the Object Identification method is used d. an object identifier created by the system e. an object candidate key is nominated 22. It is believe that OO will lead to increased productivity due to: a. the inheritance property b. the reusability of objects c. decreased training needs for programmers d. easy interface to Web applications e. easy implementation with Java 23. When translating between an OO model to a relational model a. each attribute maps to one column b. classes can be mapped vertically (meaning each class of object becomes its own table that can be linked to its superclass via a primary key) c. the methods become relationships d. The object identification key becomes the primary key e. foreign keys are deleted 24. With what type of data does OLAP typically work? a. object oriented b. summarized c. continuous d. drill-down e. multidimensional 25. A large snack company wants to start analyzing consumer trends in specialty potato chip purchasing. To do this you may suggest that the company use: a. an object-relational models b. data mining c. rotational and drill down technologies d. data cleansing and extraction e. k-means centroids 26. Which of the following is not a data mining function a. sequential pattern identification b. clustering c. Prediction d. pattern recognition e. none of the above 27. A data dictionary for a datawarehouse is not likely to include the following information: a. the operating system from which the data originated b. the clustering of the data c. how the data were transformed d. the frequency in which the data are extracted from an operating system e. the predictive index 28. You are in a spelling bee. First you compete at the local level, the winners of the local levels move to the state level rounds, then the region and finally the national spelling bee This is an example of what kind of model for organizing information? a. matrix b. parallel c. hierarchical d. linear e. overlay 29. The Web is an example of: a. universal standards b. a client/server system c. a PHP script d. a Java Script e. a Java applet 30. Which reason below is NOT a reason for a Web browser to be a popular interface to database applications? a. lower training costs b. straightforward application development c. one-time installation d. good security features e. standard interface 31. Which of the following is true about CGI? a. scales well to handle high transaction volumes b. combines HTML, scripting, and server-side components c. sits between the browser request and the data required d. has restricted portability due to its links with Microsoft's Web Servers e. must be written in Perl 32. Which of the following is true about PHP? a. developed by Codd in the early 90's b. is free c. is executed by the client before sending a request to the server d. is embedded within an HTML page e. b and d 33. To indicate that the remainder of a line is a comment in PHP you would use: a. * b. // c. ... d. <?comment ... /?> e. */.../* 34. The JDBC interface ResultSet does which of the following: a. executes a SQL statement to create a result b. returns the rows when a query is executed c. executes a stored script d. checks for error messages as a result of a Java script e. formats a table for a browser to display 35. Ignore this problem Which of the following is unlikely to occur during a typical interaction with CORBA and a Web server? a. browser downloads HTML b. browser retrieves CGI from server c. browser loads applet d. applet invokes CORBA server objects e. server invokes PHP 36. XML is primarily used: a. to store data b. to exchange data c. to enhance EDI capabilities d. to query databases e. to extend data 37. XML is: a. derived from SGML b. compatible with HTML c. uses ANSI X.12 standards d. uses tags that preserve the meaning of the about data e. a and d 38. Which of the following is NOT a major advantage of SGML for data management a. re-use b. reduce c. revision d. flexibility e. object-orientation 39. An XML data schema a. a document that defines how data will appear b. a national standards c. must be shared between firms if they plan to exchange data in the XML format d. is not case sensitive e. required for all XML files 40. Which of the following is considered a major gain when XML is introduced a. lower network congestion b. hardware independence c. software independence d. More precise searches e. All of the above 41. XSL is a. a style sheet used to display XML data b. defines the tags that are utilized in a DTD c. defines format of data for presentation d. defines the tags that are utilized in XML e. a and c 42. XSL can be split into three languages. Which one is NOT of these languages: a. XSLD b. XSLF c. Xpath d. XSLT 43. DB2XML can a. map XML to hierarchical tree structures b. generate a DTD for an XML document c. transform and display XML using a style sheet d. capture HTML and convert it into XML e. b and c 44. XML is: a. SGML compatible b. HTML compatible c. SQL compatible d. based on objects and cases e. JavaScript compliant 45. The main advantage of EDI is: a. reduced need for paper transactions b. standards have already been established for most EDI scripts c. used by about 80% of all firms d. used primarily via modem connections e. low implementation costs 46. Examples of a technical strategy for maintaining integrity are: a. enforcement of privacy laws b. frequency of password changes c. validation rules d. data backup procedures e. biometrics 47. When a transaction places a Slock on a database item, which of the following is a legal or valid action for another transaction to take a. view the record b. place another Slock on the record c. place a Xlock on the record d. Update the database item e. a and b 48. _____ is used to undo unwanted database changes a. backward recovery b. forward recovery c. UNCOMMIT d. reprocessing transaction e. REVOKE 49. What is not a problem associated with poor data management? a. essential data missing from the database b. inability to locate data c. system down time d. inconsistencies in representations e. redundant data 50. What is a system level data administrator not likely to be responsible for? a. overall policies b. monitoring database use c. specifying an information architecture for the organization d. non-electronic corporate data 51. What is not part of the database development life cycle? a. Project planning b. Requirements c. Definition d. Database testing e. Operations 52. When monitoring the performance of a database and its access patterns one would not look at: a. type of transactions being processed b. response time c. robustness of data dictionary d. number of disk accesses e. they would look at all of the above 53. Poor data management can result in: a. inaccurate data b. breaches of security c. data loss d. duplication of data e. all of the above 54. A data dictionary is used to: a. access external databases b. as a journaling facility c. to track all database and their components d. to resolve deadlocks e. check the spelling of data as they are entered 55. A system level data administrator would be involved in: a. optimizing databases for different environments b. creating data access tables c. monitoring a department's database use d. formulating a data strategy e. creating linked lists 56. When considering various database software, the prime issue one might consider would be a. how much training on the system costs b. how often it needs to be backed up c. how many users will access the database simultaneously d. how often passwords can be changed e. whether it supports nested queries 57. If your data model only has two entities, how many times can you relate the two entities a. 1 b. 3 (1:1, 1:m, m:m) c. 4 (1:1, 1:m, m:1, m:m) d. as many as is appropriate e. 6 (1:1, 1:m, m:m and reflexive variations of each) 58. When defining a table using the create statement when would you use not null? a. on all foreign keys b. when a value is stored in the first column of a table c. when you want data entered into the particular column for each row in the table d. when a value might not be appropriate e. for all associative entity mappings

Explanation / Answer

1. Which of the following functions is NOT performed by the file manager?


b. tracking of free pages


2. Accessing data it is fastest when


d. accessed from main memory


3. A particular record is requested by


a. the file manager


4. When a page is requested


c. the disk manager must notify the file manger of the physical location of the page



5. In order to improve the rotation speed of a disk one can


e. reset the disk's rpm parameter



6. Direct address accessing

a. is the fastest form of data access


7. A B-Tree


e. all of the above


8. When selecting a storage device for specific data one should consider

e. a and d


9. If you used a RAID device and implemented striping how many disks would you actually stripe your data across when using 7 disks?


c. 7

10. What type of architecture is most used for large scale transaction processing


d. Client/server


11. In a Client/Server environment

b. data are processed remotely