fiiiiinal 507

Flag question: Question 1

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Question 11 pts

The SQL COUNT function gives the number of rows containing non-null values for a given column.

Group of answer choices

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

True

False

Flag question: Question 2

Question 21 pts

All SQL commands must be issued on a single line.

Group of answer choicesTrueFalse

Flag question: Question 3

Question 31 pts

Consider the following tableTable name: TENANT| ID |

NAME

| RENT || 18 | Alex | 219 || 31 | Rose | 250 || 77 | Alex | 300 || 41 | Mary | 280 || 81 | Rose | 240 |Which query returns the following?| ID | NAME | RENT || 18 | Alex | 219 || 81 | Rose | 240 || 31 | Rose | 250 || 41 | Mary | 280 || 77 | Alex | 300 |

Group of answer choices

SELECT * FROM TENANT ORDER BY RENT

SELECT RENT FROM TENANT ORDER BY RENT

SELECT * ORDER BY RENT FROM TENANT

SELECT ORDER BY RENT FROM TENANT *

Flag question: Question 4

Question 41 pts

Which of the following better describes the result of SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id2?

Group of answer choices

Only the values of table1 with id matching id2 from table2.

Rows match the join condition and rows in table1 with unmatched id on table2.

Rows match the join condition and rows in table2 with unmatched id2 on table1.

Rows in table1 with unmatched id on table2.

Flag question: Question 5

Question 51 pts

Some rows of the STUDENT table are given below:

NAME

1992

MD

PHY

2001

PSI

2001

CODE

DEPARTMENT

GPA

YEAR

291

ALEX

PSI

3.1

1992

938

MICHELE

PHY

2.3

931

JHON

MD

3.3

2001

182

JOE

3.4

2002

190

REY

2.0

330

RON

3.9

You want to get a list of the maximum GPA of each department with an average GPA of 2.4, but only for students after 2004. Which of the following gets the desired result?

Group of answer choices

SELECT MAX(GPA) FROM STUDENT WHERE AVG(GPA) > 2.4 GROUP BY DEPARTMENT HAVING YEAR > 2004

SELECT MAX(GPA) FROM STUDENT WHERE YEAR > 2004 AND AVG(GPA) > 2.4 GROUP BY DEPARTMENT

SELECT MAX(GPA) FROM STUDENT WHERE YEAR > 2004 GROUP BY DEPARTMENT HAVING AVG(GPA) > 2.4

SELECT MAX(GPA) FROM STUDENT WHERE YEAR < 2004 GROUP BY DEPARTMENT HAVING AVG(GPA) > 2.4

Flag question: Question 6

Question 61 pts

The Systems Development Life Cycle (SDLC) traces the history of an organization’s system.

Group of answer choicesTrueFalse

Flag question: Question 7

Question 71 pts

. In most modern relational DBMSs, a new database

implementation

requires the creation of special storage-related constructs to house the end-user tables.

Group of answer choicesTrueFalse

Flag question: Question 8

Question 81 pts

The selection of DBMS software is critical to the information system’s smooth operation.

Group of answer choicesTrueFalse

Flag question: Question 9

Question 91 pts

__ is the process that establishes the need for an information system and its extent.

Group of answer choices

Information system

Systems

analysis

Systems development

Database development

Flag question: Question 10

Question 101 pts

As a database architect, you usually explain that applications transform data into the information that forms the basis for decision making within the framework of __.

Group of answer choices

Database analysis

Information system

Systems development.

Systems analysis

Flag question: Question 11

Question 111 pts

The Systems Development Life Cycle (SDLC) is divided into __ phases.

Group of answer choices

Six

Two

Five

Four

Flag question: Question 12

Question 121 pts

The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC).

Group of answer choicesanalysisimplementation

planning

maintenance

Flag question: Question 13

Question 131 pts

Evaluation, maintenance, and enhancement are done during the __ phase of the Systems Development Life Cycle (SDLC).

Group of answer choices

detailed systems design

maintenanceimplementationanalysis

Flag question: Question 14

Question 141 pts

Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC).

Group of answer choices

testing and evaluation

implementation and loading

database initial study

database design

Flag question: Question 15

Question 151 pts

In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.

Group of answer choices

transaction log backup

differential backup

adaptive backup

conservative backup

Flag question: Question 16

Question 161 pts

The first step of the conceptual design is __?

Group of answer choices

Data model verification

Entity relationship modeling and normalization

Data analysis and requirements

Distributed database design

Flag question: Question 17

Question 171 pts

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

Group of answer choicesTrueFalse

Flag question: Question 18

Question 181 pts

Who would be most likely responsible for the security and integrity of a database management system (DBMS)?

Group of answer choices

Database security officer

Backup administrator

Chief operations officer

IT support admin

Flag question: Question 19

Question 191 pts

Which of the following is an example of a security vulnerability that may exist on an operating system?

Group of answer choices

Trojan horses

IP spoofing

The user sets a blank password.

The user copies data to a flash drive.

Flag question: Question 20

Question 201 pts

A company has deployed a distributed database management system (DDBMS) and has hired a team of database administrators. The executive head of the IT department has asked for an updated list of new hires and realized that there may be a need for additional positions to improve and ensure the security of the new DDBMS and its data. What role can the company hire for that will directly impact the technological aspects of the new DDBMS?

Group of answer choices

CIO

ISSO

DBA

DSO

Flag question: Question 2

1

Question 211 pts

The IT team is already at length to incorporate multiple security configurations across multiple server hosts and storage devices that the processes are becoming convoluted for the team. How can the team create something a few times that can be replicated across the systems to standardize the most common of system configuration settings?

Group of answer choices

Build standard security policies

Install network firewalls

Install anti-virus software

Apply operating system patches

Flag question: Question 22

Question 221 pts

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

Group of answer choices

Corrupting

Preserving

Destructive

Debilitative

Flag question: Question 23

Question 231 pts

A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.

Group of answer choices

dynamic

active

static

passive

Flag question: Question 24

Question 241 pts

As the company rolls out the new database management system, it seems that the systems engineering team must always add more resources like storage or virtual servers because the database design did not account for many things. One example was the storage size. Executive management reminded the IT department that the new database system should encompass all data that require database processing features and services because it aligns with the company’s goals. How can the IT department team avoid situations like this even before company managers suggest critical success factors?

Group of answer choices

Review the Information Engineering processes

Review the strategic plan

Review the information systems architecture.

Review the company mission and goals

Flag question: Question 25

Question 251 pts

The DBA must reserve more primary memory at start up so that the Oracle database can improve overall performance. Since the memory preference requires a custom configuration, how can the DBA apply this setting properly?

Group of answer choices

Setup the authorization manager

Configure the security component

Edit the initialization parameters

Assign an administrator

Still stressed with your coursework?
Get quality coursework help from an expert!