1. Which of the following is not one of the main traits that defines Big Data:
|A||Multiple venues of data relationships|
|B||Diverse variety in data formats|
|C||High velocity in data flow|
|D||Large volumes of digitally stored data|
For the following tables, which SQL command would:
List the Supplier Name and Item Description [ItemDesc] for each item the supermarket sales.
|A||SELECT SupName, ItemDesc FROM ITEM JOIN SUPPLIER ON supIDfk = supID|
|B||SELECT * from ITEM, SUPPLIER|
|C||LIST SupName, ItemDesc FROM ITEM, SUPPLIER where supIDfk = supID|
|D||SELECT SupName, ItemDesc FROM ITEM, SUPPLIER|
3. ______________________ is a popular technology designed to efficiently process large amounts of diverse types of data. Words associated with this technology include ‘Pig’, ‘Hive’, ‘Zookeeper’.
|C||high speed SQL processing|
NoSQL databases are predicted to overtake relational database systems in the next few years.
Choose the answer that best maps the following ERD to tables.
|A||MOVIE(MovieID,Title,ReleaseDate,Director) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName) INTERSECTION(MovieID,ActorID)|
|C||MOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName) INTERSECTION(MovieID,ActorID,ActorLastName,ReleaseDate)|
|D||MOVIEINFO(MovieID, Title,ReleaseDate,Director, ActorLastname,ActorFirstName,AgentName)|
When a transaction functions in such a way that either all of the transaction actions are completed or none of them will be, the transaction is said to be:
What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database?
The purpose of concurrency control is to:
|A||Ensure that no two SQL statements are executed at the same time.|
|B||Ensure that every input form has a corresponding output report.|
|C||Ensure that one user’s work does not interfere with another’s.|
|D||Ensure that resource locking is always used.|
Serializable prevents which of the following?
|E||All of the above|
Given the following security matrix, the GAMES table is accessed by how many forms?
SELECT ALL THAT APPLY:
Who is responsible for insuring the confidentiality of data in the Kennesaw Owlexpress database?
Remember: SELECT ALL THAT APPLY.
What concurrent processing problem occurs when a transaction rereads data and finds new rows that were inserted by a different transaction since the prior read?
Row level security is often implemented through the use of:
|C||User profiles and assigned processing rights|
|D||Username and password|
HIPPA is related to:
It is the KSU Fighting Owls football team’s inaugural season and season tickets are in high demand. In fact, only one season ticket remains. Student A and Student B both want season tickets. Given the following, who gets the ticket?
|A||Student A and Student B both get the ticket|
|B||Not enough information to tell.|
SQL injections occur most often because of stolen passwords.
Which of the following about deadlocks is untrue?
|A||Most database systems automatically check for and resolve deadlocks.|
|B||Deadlocks occur when two transactions are each waiting for access to a table that the other one has locked.|
|C||Deadlocks rarely happen.|
|D||Serialized locking of all resources utilized by a transaction helps to prevent deadlocks.|
Which method can often tell if the backend of a web form is using SQL?
|A||Adding /sql onto the end of the Web form URL|
|B||Entering /sql?=’ onto the end of the Web form URL|
|C||Entering a single quote into a username entry field on a web form|
|D||Entering 1=1 into a username entry field on a web form|
Database inference is easily solved by:
|A||Allowing users only access to aggregated data results|
|D||There is not an easily implemented technology solution to prevent database inference|
The most common form of database security is implemented by:
|A||Pessimistic record locking|
|C||Complex SQL processing|
SELECT ALL THAT APPLY.
Relationships when mapped to tables are expressed by:
Remember: SELECT ALL THAT APPLY.
It is the KSU Fighting Owls football team’s inaugural season and season tickets are in high demand. In fact, only one season ticket remains. Student A and Student B both want season tickets. From the following scenario, who gets the ticket?
|A||Both Student A and student B get the ticket|
|D||Not enough information to tell|
The recommended procedure for preventing SQL injections is:
The process of tracking who accesses a database and which resources are accessed is called
_________________________ and the information obtained from this tracking is recorded in a ____________________.
|A||auditing, log file|
|B||auditing, archive file|
|C||tracking, log file|
|D||tracking, archive file|
Another name for a transaction is:
|C||Logical Unit of Work|
|D||Concurrent user action|
|A||A professor may teach one or more classes but a student must take one or more classes. A class must be taught by one professor but a class may or may not have students.|
|B||A professor is required to teach at least one class and students must take at least one class.|
|C||A professor must teach one or more classes and a class must be taught by one professor. A student may take one or more classes but a class must have one or more students.|
|D||A professor may teach one or more classes and a student may take one or more classes. A class must be taught by one professor and a class must have at least one student.|
Given the following Security matrix, which is the most most complex form to implement?
Normalization answers which question:
|A||How many candidate keys are needed?|
|B||What should the primary key be?|
|C||How many tables?|
|D||What is the cardinality?|
|E||What are the functional dependencies?|
Which locking methods employs the use of making a copy of the original records and checking for changes to that record before committing an update?
Given the following security matrix, which form(s) are not able to alter table data for any table?
|B||GamesForm, PrintedTicket , SeatAvailabilityReport|
The best method of providing access to end users to data contained in a database is:
|A||A multi-layer architecture composed of a middle layer that communicates with the database|
|B||a Web form connected to the database|
|C||A secure user login to the database system|
|D||A client app that is installed on the end users’ PC or other device that establishes an ODBC connection to the database|
A database system crashes and needs to be restored to its state at the time of the crash. A complete backup of the database is done once a day. The crash occurred at 12 noon. The last full backup was done at 4:00 am.
The latest full backup is restored.
Then _______________________________ is done
in a process known as _________________________.
|A||reprocessing, roll forward|
|B||recovery, roll forward|
Show transcribed image text
Was this answer helpful?
Question 1: Answer (a) Multiple venues of data relationships
Question 2: Answer (a)
Question 3: Answer (b) hadoop
Question 4: False
Question 5: Answer (E) MOVIE(MovieID,Title,ReleaseDate,Director,ActorID) ACTOR(ActorID,ActorLastname,ActorFirstName,AgentName)
Question 6: Answer (b) atomic
Question 7: Answer (c) Dirty reads
Question 8: Answer (c) Ensure that one user’s work does not interfere with another’s.
Question 9: Answer (d) Nonrepeatable read
Question 10: Answer (b) 1
Question 11: Answer (b) Database Administrators
Quesiton 12: Answer (c) Phantom reads
Question 13: Answer (a) SQL query
Question 14: Answer (d) healthcare data
Question 16: true
Question 17: Answer (a)Most database systems automatically check for and resolve deadlocks.
Question 18: Answer: (a) Adding /sql onto the end of the Web form URL
Question 19: Answer (d) There is not an easily implemented technology solution to prevent database inference
Question 20: Answer (b) Table encryption
Question 21: Answer (a), (b) foreign keys, duplicate columns
Question 22: Answer (a) Both Student A and student B get the ticket
15% off for this assignment.
Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!
Information about customers is confidential and never disclosed to third parties.
No missed deadlines – 97% of assignments are completed in time.
We complete all papers from scratch. You can get a plagiarism report.
If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.