Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (2023)

1. Which of the following is not one of the main traits that defines Big Data:

Question options:

AMultiple venues of data relationships
BDiverse variety in data formats
CHigh velocity in data flow
DLarge volumes of digitally stored data

2.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (1)

For the following tables, which SQL command would:
List the Supplier Name and Item Description [ItemDesc] for each item the supermarket sales.

Question options:

ASELECT SupName, ItemDesc FROM ITEM JOIN SUPPLIER ON supIDfk = supID
BSELECT * from ITEM, SUPPLIER
CLIST SupName, ItemDesc FROM ITEM, SUPPLIER where supIDfk = supID
DSELECT SupName, ItemDesc FROM ITEM, SUPPLIER

3. ______________________ is a popular technology designed to efficiently process large amounts of diverse types of data. Words associated with this technology include ‘Pig’, ‘Hive’, ‘Zookeeper’.

Question options:

Adata warehousing
Bhadoop
Chigh speed SQL processing
Ddata mining

4.

NoSQL databases are predicted to overtake relational database systems in the next few years.

Question options:

True
False

5.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (2)

Choose the answer that best maps the following ERD to tables.

Question options:

AMOVIE(MovieID,Title,ReleaseDate,Director) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName) INTERSECTION(MovieID,ActorID)
BMOVIE(MovieID,Title,ReleaseDate,Director) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName,MovieID)
CMOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName) INTERSECTION(MovieID,ActorID,ActorLastName,ReleaseDate)
DMOVIEINFO(MovieID, Title,ReleaseDate,Director, ActorLastname,ActorFirstName,AgentName)
EMOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName)

6.

When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be:

Question options:

Aconsistent
Batomic
Clocked
Dlogical
Eisolated

7.

What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?

Question options:

AUnlocked reads
BSerialized reads
CDirty reads
DNonrepeatable reads
EPhantom reads

8.

The purpose of concurrency control is to:

Question options:

AEnsure that no two SQL statements are executed at the same time.
BEnsure that every input form has a corresponding output report.
CEnsure that one user’s work does not interfere with another’s.
DEnsure that resource locking is always used.

9.

Serializable prevents which of the following?

Question options:

(Video) MKTG-3315 Chapter 1

ALost-update
BPhantom read
CDirty read
DNonrepeatable read
EAll of the above

10.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (3)

Given the following security matrix, the GAMES table is accessed by how many forms?

Question options:

ANone
B1
C2
D3
EAll tables

11.

SELECT ALL THAT APPLY:

Who is responsible for insuring the confidentiality of data in the Kennesaw Owlexpress database?

Remember: SELECT ALL THAT APPLY.

Question options:

AStudents
BDatabase Administrators
CFaculty
DDatabase programmers

12.

What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?

Question options:

AUnlocked reads
BNonrepeatable reads
CPhantom reads
DDirty reads
ESerialized reads

13.

Row level security is often implemented through the use of:

Question options:

ASQL views
BPrepared Queries
CUser profiles and assigned processing rights
DUsername and password

14.

HIPPA is related to:

Question options:

APolice records
BDNA databases
CBank records
Dhealthcare data

15.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (4)

It is the KSU Fighting Owls football team’s inaugural season and season tickets are in high demand. In fact, only one season ticket remains. Student A and Student B both want season tickets. Given the following, who gets the ticket?

Question options:

AStudent A and Student B both get the ticket
BNot enough information to tell.
CStudent B
DStudent A

16.

SQL injections occur most often because of stolen passwords.

Question options:

ATrue
BFalse

17.

Which of the following about deadlocks is untrue?

Question options:

AMost database systems automatically check for and resolve deadlocks.
BDeadlocks occur when two transactions are each waiting for access to a table that the other one has locked.
CDeadlocks rarely happen.
DSerialized locking of all resources utilized by a transaction helps to prevent deadlocks.

18.

Which method can often tell if the backend of a web form is using SQL?

Question options:

AAdding /sql onto the end of the Web form URL
BEntering /sql?=’ onto the end of the Web form URL
CEntering a single quote into a username entry field on a web form
DEntering 1=1 into a username entry field on a web form

19.

Database inference is easily solved by:

Question options:

AAllowing users only access to aggregated data results
BWhite listing
CPrepared queries
DThere is not an easily implemented technology solution to prevent database inference

20.

The most common form of database security is implemented by:

Question options:

APessimistic record locking
BTable encryption
CComplex SQL processing
DUsername/password

21.

SELECT ALL THAT APPLY.

(Video) Sustainable Business, Living, and Industry 4 0 Development

Relationships when mapped to tables are expressed by:

Remember: SELECT ALL THAT APPLY.

Question options:

Aforeign keys
Bduplicate columns
Cdata types
Dprimary keys

22.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (5)

It is the KSU Fighting Owls football team’s inaugural season and season tickets are in high demand. In fact, only one season ticket remains. Student A and Student B both want season tickets. From the following scenario, who gets the ticket?

Question options:

ABoth Student A and student B get the ticket
BStudent B
CStudent A
DNot enough information to tell

23.

The recommended procedure for preventing SQL injections is:

Question options:

APrepared queries
BBlack listing
CSQL mapping
DWhite listing

24.

The process of tracking who accesses a database and which resources are accessed is called
_________________________ and the information obtained from this tracking is recorded in a ____________________.

Question options:

Aauditing, log file
Bauditing, archive file
Ctracking, log file
Dtracking, archive file

25.

Another name for a transaction is:

Question options:

ASQL command
BConcurrency control
CLogical Unit of Work
DConcurrent user action

26.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (6)

AA professor may teach one or more classes but a student must take one or more classes. A class must be taught by one professor but a class may or may not have students.
BA professor is required to teach at least one class and students must take at least one class.
CA professor must teach one or more classes and a class must be taught by one professor. A student may take one or more classes but a class must have one or more students.
DA professor may teach one or more classes and a student may take one or more classes. A class must be taught by one professor and a class must have at least one student.

27.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (7)

Given the following Security matrix, which is the most most complex form to implement?

Question options:

APrintedTicket
BTicketForm
CSpectatorInformationForm
DSeatsForm

28.

Normalization answers which question:

Question options:

AHow many candidate keys are needed?
BWhat should the primary key be?
CHow many tables?
DWhat is the cardinality?
EWhat are the functional dependencies?

29.

Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update?

Question options:

Apessimistic locking
Boptmistic locking
Clost-update
Ddeadlock

30.

Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (8)

Given the following security matrix, which form(s) are not able to alter table data for any table?

Question options:

ASeatsForm,TicketForm,GamesForm
BGamesForm, PrintedTicket , SeatAvailabilityReport
CSeatsForm, SeatAvailabilityForm
DTicketForm

31.

The best method of providing access to end users to data contained in a database is:

Question options:

AA multi-layer architecture composed of a middle layer that communicates with the database
Ba Web form connected to the database
CA secure user login to the database system
DA client app that is installed on the end users’ PC or other device that establishes an ODBC connection to the database

32.

A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am.
The latest full backup is restored.

Then _______________________________ is done

in a process known as _________________________.

(Video) Hanging with Ed(ucation): Introduction to Google Sites

Question options:

Areprocessing, roll forward
Brecovery, roll forward
Creprocessing, rollback
Drecovery, redo
Erecovery, rollback

Show transcribed image text

Expert Answer

  • Solved: 1. Which of the following is not one of the main traits that defines Big Data: - Coursemate (9)

    Anonymousanswered this

    Was this answer helpful?

    546 answers

    Question 1: Answer (a) Multiple venues of data relationships

    Question 2: Answer (a)

    Question 3: Answer (b) hadoop

    Question 4: False

    Question 5: Answer (E) MOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName)

    Question 6: Answer (b) atomic

    Question 7: Answer (c) Dirty reads

    Question 8: Answer (c) Ensure that one user’s work does not interfere with another’s.

    Question 9: Answer (d) Nonrepeatable read

    Question 10: Answer (b) 1

    Question 11: Answer (b) Database Administrators

    Quesiton 12: Answer (c) Phantom reads

    Question 13: Answer (a) SQL query

    Question 14: Answer (d) healthcare data

    Question 16: true

    Question 17: Answer (a)

    Most database systems automatically check for and resolve deadlocks.

    Question 18: Answer: (a) Adding /sql onto the end of the Web form URL

    Question 19: Answer (d) There is not an easily implemented technology solution to prevent database inference

    Question 20: Answer (b) Table encryption

    Question 21: Answer (a), (b) foreign keys, duplicate columns

    Question 22: Answer (a) Both Student A and student B get the ticket

15% off for this assignment.

Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!

(Video) Nicholas Christakis: Pandemics, Human Nature, and Our Evolutionary Blueprint.

Why US?

100% Confidentiality

Information about customers is confidential and never disclosed to third parties.

Timely Delivery

No missed deadlines – 97% of assignments are completed in time.

Original Writing

We complete all papers from scratch. You can get a plagiarism report.

Money Back

If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.

(Video) Beautician Job Interview Questions l #Salon interview beautician l Beauty Parlour girl Interview

Videos

1. Write a letter to your friend for congratulating him on his success
(Prepare Studies)
2. How To Write Orchestral Music - Epic Choir Basics & Tips On Making It Stand Out More
(Alex Moukala Tutorials)
3. March 3: Recorded webinar - Practical Experience Opportunities (Research, Internships, Study Abroad)
(Lund University)
4. 4.1.11 Churchill Breakfast Club: Leadership in the Age of Transparency
(ChurchillClub)
5. John McNair, PGA 2019 CATALYST Webinar Series
(SCPGA)
6. Military Intervention, Politics, and the Birth of Bangladesh
(Pakistonomy)
Top Articles
Latest Posts
Article information

Author: Eusebia Nader

Last Updated: 03/16/2023

Views: 5897

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.