Flag question: Question 1
Question 11 pts
The SQL COUNT function gives the number of rows containing non-null values for a given column.
Group of answer choices
True
False
Flag question: Question 2
Question 21 pts
All SQL commands must be issued on a single line.
Group of answer choicesTrueFalse
Flag question: Question 3
Question 31 pts
Consider the following tableTable name: TENANT| ID |
NAME
| RENT || 18 | Alex | 219 || 31 | Rose | 250 || 77 | Alex | 300 || 41 | Mary | 280 || 81 | Rose | 240 |Which query returns the following?| ID | NAME | RENT || 18 | Alex | 219 || 81 | Rose | 240 || 31 | Rose | 250 || 41 | Mary | 280 || 77 | Alex | 300 |
Group of answer choices
SELECT * FROM TENANT ORDER BY RENT
SELECT RENT FROM TENANT ORDER BY RENT
SELECT * ORDER BY RENT FROM TENANT
SELECT ORDER BY RENT FROM TENANT *
Flag question: Question 4
Question 41 pts
Which of the following better describes the result of SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id2?
Group of answer choices
Only the values of table1 with id matching id2 from table2.
Rows match the join condition and rows in table1 with unmatched id on table2.
Rows match the join condition and rows in table2 with unmatched id2 on table1.
Rows in table1 with unmatched id on table2.
Flag question: Question 5
Question 51 pts
Some rows of the STUDENT table are given below:
CODE |
DEPARTMENT |
GPA |
YEAR |
||||
291 |
ALEX |
PSI |
3.1 |
1992 |
|||
938 |
MICHELE |
PHY |
2.3 |
||||
931 |
JHON |
MD |
3.3 |
2001 |
|||
182 |
JOE |
3.4 |
2002 |
||||
190 |
REY |
2.0 |
|||||
330 |
RON |
3.9 |
You want to get a list of the maximum GPA of each department with an average GPA of 2.4, but only for students after 2004. Which of the following gets the desired result?
Group of answer choices
SELECT MAX(GPA) FROM STUDENT WHERE AVG(GPA) > 2.4 GROUP BY DEPARTMENT HAVING YEAR > 2004
SELECT MAX(GPA) FROM STUDENT WHERE YEAR > 2004 AND AVG(GPA) > 2.4 GROUP BY DEPARTMENT
SELECT MAX(GPA) FROM STUDENT WHERE YEAR > 2004 GROUP BY DEPARTMENT HAVING AVG(GPA) > 2.4
SELECT MAX(GPA) FROM STUDENT WHERE YEAR < 2004 GROUP BY DEPARTMENT HAVING AVG(GPA) > 2.4
Flag question: Question 6
Question 61 pts
The Systems Development Life Cycle (SDLC) traces the history of an organization’s system.
Group of answer choicesTrueFalse
Flag question: Question 7
Question 71 pts
. In most modern relational DBMSs, a new database
implementation
requires the creation of special storage-related constructs to house the end-user tables.
Group of answer choicesTrueFalse
Flag question: Question 8
Question 81 pts
The selection of DBMS software is critical to the information system’s smooth operation.
Group of answer choicesTrueFalse
Flag question: Question 9
Question 91 pts
__ is the process that establishes the need for an information system and its extent.
Group of answer choices
Information system
Systems
analysis
Systems development
Database development
Flag question: Question 10
Question 101 pts
As a database architect, you usually explain that applications transform data into the information that forms the basis for decision making within the framework of __.
Group of answer choices
Database analysis
Information system
Systems development.
Systems analysis
Flag question: Question 11
Question 111 pts
The Systems Development Life Cycle (SDLC) is divided into __ phases.
Group of answer choices
Six
Two
Five
Four
Flag question: Question 12
Question 121 pts
The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC).
Group of answer choicesanalysisimplementation
planning
maintenance
Flag question: Question 13
Question 131 pts
Evaluation, maintenance, and enhancement are done during the __ phase of the Systems Development Life Cycle (SDLC).
Group of answer choices
detailed systems design
maintenanceimplementationanalysis
Flag question: Question 14
Question 141 pts
Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC).
Group of answer choices
testing and evaluation
implementation and loading
database initial study
database design
Flag question: Question 15
Question 151 pts
In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.
Group of answer choices
transaction log backup
differential backup
adaptive backup
conservative backup
Flag question: Question 16
Question 161 pts
The first step of the conceptual design is __?
Group of answer choices
Data model verification
Entity relationship modeling and normalization
Data analysis and requirements
Distributed database design
Flag question: Question 17
Question 171 pts
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
Group of answer choicesTrueFalse
Flag question: Question 18
Question 181 pts
Who would be most likely responsible for the security and integrity of a database management system (DBMS)?
Group of answer choices
Database security officer
Backup administrator
Chief operations officer
IT support admin
Flag question: Question 19
Question 191 pts
Which of the following is an example of a security vulnerability that may exist on an operating system?
Group of answer choices
Trojan horses
IP spoofing
The user sets a blank password.
The user copies data to a flash drive.
Flag question: Question 20
Question 201 pts
A company has deployed a distributed database management system (DDBMS) and has hired a team of database administrators. The executive head of the IT department has asked for an updated list of new hires and realized that there may be a need for additional positions to improve and ensure the security of the new DDBMS and its data. What role can the company hire for that will directly impact the technological aspects of the new DDBMS?
Group of answer choices
CIO
ISSO
DBA
DSO
Flag question: Question 2
1
Question 211 pts
The IT team is already at length to incorporate multiple security configurations across multiple server hosts and storage devices that the processes are becoming convoluted for the team. How can the team create something a few times that can be replicated across the systems to standardize the most common of system configuration settings?
Group of answer choices
Build standard security policies
Install network firewalls
Install anti-virus software
Apply operating system patches
Flag question: Question 22
Question 221 pts
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
Group of answer choices
Corrupting
Preserving
Destructive
Debilitative
Flag question: Question 23
Question 231 pts
A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.
Group of answer choices
dynamic
active
static
passive
Flag question: Question 24
Question 241 pts
As the company rolls out the new database management system, it seems that the systems engineering team must always add more resources like storage or virtual servers because the database design did not account for many things. One example was the storage size. Executive management reminded the IT department that the new database system should encompass all data that require database processing features and services because it aligns with the company’s goals. How can the IT department team avoid situations like this even before company managers suggest critical success factors?
Group of answer choices
Review the Information Engineering processes
Review the strategic plan
Review the information systems architecture.
Review the company mission and goals
Flag question: Question 25
Question 251 pts
The DBA must reserve more primary memory at start up so that the Oracle database can improve overall performance. Since the memory preference requires a custom configuration, how can the DBA apply this setting properly?
Group of answer choices
Setup the authorization manager
Configure the security component
Edit the initialization parameters
Assign an administrator