Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Which of the following is not one of the main traits that defines Big Data: Q

ID: 3859818 • Letter: 1

Question

1. Which of the following is not one of the main traits that defines Big Data:

Question options:

A

Multiple venues of data relationships

B

Diverse variety in data formats

C

High velocity in data flow

D

Large volumes of digitally stored data

2.

For the following tables, which SQL command would:
List the Supplier Name and Item Description [ItemDesc] for each item the supermarket sales.

Question options:

A

SELECT SupName, ItemDesc FROM ITEM JOIN SUPPLIER ON supIDfk = supID

B

SELECT * from ITEM, SUPPLIER

C

LIST SupName, ItemDesc FROM ITEM, SUPPLIER where supIDfk = supID

D

SELECT SupName, ItemDesc FROM ITEM, SUPPLIER

3. ______________________ is a popular technology designed to efficiently process large amounts of diverse types of data. Words associated with this technology include 'Pig', 'Hive', 'Zookeeper'.

Question options:

A

data warehousing

B

hadoop

C

high speed SQL processing

D

data mining

4.

NoSQL databases are predicted to overtake relational database systems in the next few years.

Question options:

True

False

5.

Choose the answer that best maps the following ERD to tables.

Question options:

A

MOVIE(MovieID,Title,ReleaseDate,Director) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName) INTERSECTION(MovieID,ActorID)

B

MOVIE(MovieID,Title,ReleaseDate,Director) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName,MovieID)

C

MOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName) INTERSECTION(MovieID,ActorID,ActorLastName,ReleaseDate)

D

MOVIEINFO(MovieID, Title,ReleaseDate,Director, ActorLastname,ActorFirstName,AgentName)

E

MOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName)

6.

When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be:

Question options:

A

consistent

B

atomic

C

locked

D

logical

E

isolated

7.

What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?

Question options:

A

Unlocked reads

B

Serialized reads

C

Dirty reads

D

Nonrepeatable reads

E

Phantom reads

8.

The purpose of concurrency control is to:

Question options:

A

Ensure that no two SQL statements are executed at the same time.

B

Ensure that every input form has a corresponding output report.

C

Ensure that one user's work does not interfere with another's.

D

Ensure that resource locking is always used.

9.

Serializable prevents which of the following?

Question options:

A

Lost-update

B

Phantom read

C

Dirty read

D

Nonrepeatable read

E

All of the above

10.

Given the following security matrix, the GAMES table is accessed by how many forms?

Question options:

A

None

B

1

C

2

D

3

E

All tables

11.

SELECT ALL THAT APPLY:

Who is responsible for insuring the confidentiality of data in the Kennesaw Owlexpress database?

Remember: SELECT ALL THAT APPLY.

Question options:

A

Students

B

Database Administrators

C

Faculty

D

Database programmers

12.

What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?

Question options:

A

Unlocked reads

B

Nonrepeatable reads

C

Phantom reads

D

Dirty reads

E

Serialized reads

13.

Row level security is often implemented through the use of:

Question options:

A

SQL views

B

Prepared Queries

C

User profiles and assigned processing rights

D

Username and password

14.

HIPPA is related to:

Question options:

A

Police records

B

DNA databases

C

Bank records

D

healthcare data

15.

It is the KSU Fighting Owls football team's inaugural season and season tickets are in high demand. In fact, only one season ticket remains. Student A and Student B both want season tickets. Given the following, who gets the ticket?

Question options:

A

Student A and Student B both get the ticket

B

Not enough information to tell.

C

Student B

D

Student A

16.

SQL injections occur most often because of stolen passwords.

Question options:

A

True

B

False

17.

Which of the following about deadlocks is untrue?

Question options:

A

Most database systems automatically check for and resolve deadlocks.

B

Deadlocks occur when two transactions are each waiting for access to a table that the other one has locked.

C

Deadlocks rarely happen.

D

Serialized locking of all resources utilized by a transaction helps to prevent deadlocks.

18.

Which method can often tell if the backend of a web form is using SQL?

Question options:

A

Adding /sql onto the end of the Web form URL

B

Entering /sql?=' onto the end of the Web form URL

C

Entering a single quote into a username entry field on a web form

D

Entering 1=1 into a username entry field on a web form

19.

Database inference is easily solved by:

Question options:

A

Allowing users only access to aggregated data results

B

White listing

C

Prepared queries

D

There is not an easily implemented technology solution to prevent database inference

20.

The most common form of database security is implemented by:

Question options:

A

Pessimistic record locking

B

Table encryption

C

Complex SQL processing

D

Username/password

21.

SELECT ALL THAT APPLY.

Relationships when mapped to tables are expressed by:

Remember: SELECT ALL THAT APPLY.

Question options:

A

foreign keys

B

duplicate columns

C

data types

D

primary keys

22.

It is the KSU Fighting Owls football team's inaugural season and season tickets are in high demand. In fact, only one season ticket remains. Student A and Student B both want season tickets. From the following scenario, who gets the ticket?

Question options:

A

Both Student A and student B get the ticket

B

Student B

C

Student A

D

Not enough information to tell

23.

The recommended procedure for preventing SQL injections is:

Question options:

A

Prepared queries

B

Black listing

C

SQL mapping

D

White listing

24.

The process of tracking who accesses a database and which resources are accessed is called
_________________________ and the information obtained from this tracking is recorded in a ____________________.

Question options:

A

auditing, log file

B

auditing, archive file

C

tracking, log file

D

tracking, archive file

25.

Another name for a transaction is:

Question options:

A

SQL command

B

Concurrency control

C

Logical Unit of Work

D

Concurrent user action

26.

A

A professor may teach one or more classes but a student must take one or more classes. A class must be taught by one professor but a class may or may not have students.

B

A professor is required to teach at least one class and students must take at least one class.

C

A professor must teach one or more classes and a class must be taught by one professor. A student may take one or more classes but a class must have one or more students.

D

A professor may teach one or more classes and a student may take one or more classes. A class must be taught by one professor and a class must have at least one student.

27.

Given the following Security matrix, which is the most most complex form to implement?

Question options:

A

PrintedTicket

B

TicketForm

C

SpectatorInformationForm

D

SeatsForm

28.

Normalization answers which question:

Question options:

A

How many candidate keys are needed?

B

What should the primary key be?

C

How many tables?

D

What is the cardinality?

E

What are the functional dependencies?

29.

Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update?

Question options:

A

pessimistic locking

B

optmistic locking

C

lost-update

D

deadlock

30.

Given the following security matrix, which form(s) are not able to alter table data for any table?

Question options:

A

SeatsForm,TicketForm,GamesForm

B

GamesForm, PrintedTicket , SeatAvailabilityReport

C

SeatsForm, SeatAvailabilityForm

D

TicketForm

31.

The best method of providing access to end users to data contained in a database is:

Question options:

A

A multi-layer architecture composed of a middle layer that communicates with the database

B

a Web form connected to the database

C

A secure user login to the database system

D

A client app that is installed on the end users' PC or other device that establishes an ODBC connection to the database

32.

A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am.
The latest full backup is restored.

Then _______________________________ is done

in a process known as _________________________.

Question options:

A

reprocessing, roll forward

B

recovery, roll forward

C

reprocessing, rollback

D

recovery, redo

E

recovery, rollback

A

Multiple venues of data relationships

B

Diverse variety in data formats

C

High velocity in data flow

D

Large volumes of digitally stored data

Explanation / Answer

1a)option A
because we can say data is Big data if it satifies 4 criteria.
v pow (4)===volume ,velocity,variety,verocity
volume=data should be in large volume
velocity=with high speed
varity=different formats of data
verocity=faith we should have that is big data


2a)option A
because all the 3 options are invalid options
if we want data from multiple table we should use joins ..the only query where join is there is first option

3a)option B
hadoop is open source technology which comes with all these technologies in it like pig hive zookeper
4a)False
because there is need for use for relational data base
relational data bases are depends on specific schema..most of the organization data are in specific format ..so relational databases are used ever.
5a)option B atomic
a transcation shoudl satifies 4 properites
atomicity
consistancy
isolation
durability
in that atomicity is the transaction is fully completed or stops

8a)option D
concurancy control is used for multiple transactions not conflict with other by uses of locking
9ans)All the above.
the puprose of seriaizaton is eventhough the transaction is cuncurent for each individual user his transaction is serial
11 ans)optio B
for every database the database administrator is responsible for every security issuses

13 ans)option A
row level security can be implemented by using sql views ..views are nothing but logical creation of table from different table colums

14 ans)option D
hippa is generally related to healthcare data

16 ans)opton A
sql injuction is some code included in transaction to stolen user password by unauthenticate person
17 ans)D option

5 ans)option B
because if we want to acces both table there should be one critera som we use id of both
10 ans)opton c
15 ans)option A
the next chance handled by student A