Deck 9: Database Management Approaches

Full screen (f)
exit full mode
Question
If the client only performs the presentation functions (and not the business functions),then the client is known as a thin client.
Use Space or
up arrow
down arrow
to flip the card.
Question
A distributed database is a single logical database that is physically divided among computers at several sites on a network.
Question
In a DDBMS,the site where the user is located is called the local site.
Question
Access to a data warehouse is accomplished through the use of OLAP software.
Question
In objected-oriented DBMSs,the term class refers to the general structure of an object.
Question
On a client/server network,the server is a computer that provides data to the clients.
Question
A local deadlock involves one transaction that requires a record held by a second transaction at one site,while the second transaction requires a record held by the first transaction at a different site.
Question
Extensible Markup Language (XML) is a metalanguage.
Question
In the URL,http://www.irs.gov/individuals/index.html,the location path on the Web server is individuals.
Question
In objected-oriented DBMSs,the actions defined for a class are known as macros.
Question
Access delay refers to the fixed amount of time that is required for every message.
Question
In order to view and analyze higher levels of aggregate data,you must drill down the data.
Question
A file server stores the files required by the users on a network.
Question
A global deadlock occurs at a single site in a distributed database.
Question
The server is also known as a front-end processor or front-end machine.
Question
When relational databases store complex objects,these special data types are known as CLOBs.
Question
One approach you can use to model all the various aspects of software development for object-oriented systems is known as UML.
Question
Accessing data using messages over a network takes approximately the same amount of time as accessing data on a disk.
Question
A characteristic of a DDBMS that states that users do not need to be aware of the location of the data in a database is known as replication transparency.
Question
If users are unaware of fragmentation,the DDBMS has fragmentation transparency.
Question
It is possible for local DBMSs to commit updates at some sites and undo updates at other sites. This inconsistency can be prevented by using a ____.

A)two-step rollback
B)two-phase commit
C)two-phase rollback
D)two-phase transaction
Question
A DDBMS that has at least two sites at which the local DBMSs are different is known as a ____.

A)homogeneous DDBMS
B)heterogeneous DDBMS
C)holistic DDBMS
D)heuristic DDBMS
Question
The site that initiates the update in a two-phase commit is known as the ____.

A)director
B)initiator
C)coordinator
D)leader
Question
When users are unaware of the steps taken by the DDBMS to update the various copies of data,this characteristic of the DDBMS is called ____.

A)location transparency
B)fragmentation transparency
C)replication transparency
D)update transparency
Question
____ is the data communication method used by Web clients and Web servers to exchange data on the Internet.

A)UML
B)HTTP
C)URL
D)IIS
Question
____ implies that the performance of functions such as adding sites,changing versions of DBMSs,creating backups,and modifying hardware should not require planned shutdowns of the entire distributed database.

A)Continuous operation
B)Local autonomy
C)Location transparency
D)Fragmentation transparency
Question
Each digital document on the Web is called a ____.

A)Web server
B)Web browser
C)client
D)Web page
Question
The formula for message transmission time is: communication time = access delay + (data volume / X),where X represents ____.

A)transmission rate
B)length of transmission
C)lag time
D)seek time
Question
Because the clients and the server perform different functions and can run two different operating systems,there is an arrangement of client/server architecture known as ____.

A)single-tier architecture
B)two-tier architecture
C)three-tier architecture
D)four-tier architecture
Question
____ implies that no site should depend on another site to perform its database functions.

A)No reliance on a central site
B)Local autonomy
C)Continuous operation
D)Fragmentation transparency
Question
____ implies that users should not need to be concerned with the location of any specific data in the database.

A)Fragmentation transparency
B)Replication transparency
C)Location transparency
D)Update transparency
Question
_____ is a standard interface that provides the capability necessary for Web browsers to communicate with server-side extensions.

A)Common Gateway Interface
B)Operating System Interface
C)Web Server Interface
D)Procedural Interface
Question
When the data is organized by entity rather than by the application that uses the data,it is called ____.

A)table-oriented
B)row-oriented
C)column-oriented
D)subject-oriented
Question
Computers in a network communicate through ____.

A)tokens
B)messages
C)notes
D)letters
Question
When a centralized database becomes unavailable for any reason,no users can continue processing. In contrast,if a local database in a distributed database becomes unavailable,only users who need that data are affected. Because of this,distributed databases have a(n) ____ advantage over a centralized database.

A)local control of data
B)increasing database capacity
C)system availability
D)added efficiency
Question
If the client,in a client/server system,performs the business functions (calculations,etc.),then this client is known as a(n) ____.

A)thin client
B)fat client
C)maximum client
D)minimum client
Question
Which of the following is an advantage of distributed databases?

A)Local control of data
B)Easier updates of replicated data
C)More complex query processing
D)More complex treatment of concurrent updates
Question
____ is the ability of a computer system to continue to function well as utilization of the system increases.

A)Data fragmentation
B)Data mining
C)Scalability
D)Polymorphism
Question
____ is a metalanguage derived from a restricted subset of SGML,and designed for the exchange of data on the Web.

A)UML
B)URL
C)XML
D)HTTP
Question
When users interact with an RDBMS,they use transactions. These types of systems are called ____ systems.

A)OLTP
B)ODBMS
C)OLAP
D)ODBC
Question
A(n) ______________________________ is one in which data and the actions that operate on the data are encapsulated into objects.
Question
In an object-oriented DBMS,methods are defined during the ____________________ process.
Question
With respect to the definition of data warehouse,____ means that data in a data warehouse represents snapshots of data at various points in time in the past.

A)nonvolatile
B)time-variant
C)subject-oriented
D)integrated
Question
____ refers to the association of an operation to actual program code.

A)Attaching
B)Matching
C)Linking
D)Binding
Question
E-commerce between organizations is called ____________________.
Question
In ____ systems,data and actions are encapsulated.

A)relational
B)object-oriented
C)network
D)parallel
Question
Uncovering new knowledge,patterns,trends,and rules from the data stored in a data warehouse is known as ____.

A)fragmentation transparency
B)replication transparency
C)polymorphism
D)data mining
Question
A ____ is a subject-oriented,integrated,time-variant,nonvolatile collection of data in support of management's decision-making process.

A)data warehouse
B)thin client
C)back-end processor
D)fat client
Question
In an object-oriented DBMS,a(n) ____________________ is the set of values that are permitted for an attribute.
Question
In ____ systems,you create actions as part of data manipulation rather than as part of the data definition.

A)object-oriented
B)relational
C)parallel
D)simple
Question
A(n) _________________________ is a DBMS capable of supporting and manipulating distributed databases.
Question
To execute the steps in a method,the user sends a(n) ____________________ to the object.
Question
A(n) ____________________ DDBMS is a database that has the same local DBMS at each site.
Question
A(n) ____ consists of rows that contain consolidated and summarized data.

A)class
B)data model
C)fact table
D)object
Question
In a three-tier client/server architecture,the clients perform the presentation functions,a database server performs the database functions,and separate computers called ____________________ perform the business functions and serve as an interface between clients and the database server.
Question
With respect to the definition of data warehouse,____ means that the data is read-only.

A)time-variant
B)integrated
C)nonvolatile
D)subject-oriented
Question
With respect to the definition of data warehouse,____ means that data is stored in one place,even though it originates from everywhere in the organization and from a variety of external sources.

A)time-variant
B)nonvolatile
C)subject-oriented
D)integrated
Question
Each ____ contains a single-part primary key that serves as an index for the fact table and also contains other fields associated with the primary key value.

A)primary table
B)fact table
C)dimension table
D)star table
Question
Web pages that display the same content for all Web clients are called ____________________ Web pages.
Question
____________________ implies that you define an object to contain both the data and its associated actions.
Question
The ____________________ symbol in a class diagram indicates whether other classes can view or update the value in the attribute.
Question
Explain the difference between a Web page,a Web server,and a Web client.
Question
What is the purpose of the following UML diagrams: class,use case,sequence,and activity?
Question
With ____________________ visibility,only the class itself can view or update the value in the attribute.
Question
On a class diagram,the lines joining the classes represent the relationships and are called ____________________.
Question
Discuss the differences between how client-side extensions and server-side extensions are created and executed,including the kinds of languages used to create them.
Question
On a class diagram,a(n) ____________________ symbol precedes each attribute.
Question
With ____________________ visibility,any other class can view or update the value of an attribute.
Question
____________________ are restrictions placed on the data that can be stored in the database.
Question
What are the advantages of a client/server system?
Question
If one class is a subclass of a second class,the second class is called a(n) ____________________ of the first class.
Question
With ____________________ visibility,only the class itself or public or protected subclasses of the class can view or update the value in the attribute.
Question
With respect to UML,the type of diagram most relevant to database design is the ____________________.
Question
____________________ indicates the number of objects that can be related to an individual object at the other end of the relationship.
Question
What are the advantages of distributed databases?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Database Management Approaches
1
If the client only performs the presentation functions (and not the business functions),then the client is known as a thin client.
True
2
A distributed database is a single logical database that is physically divided among computers at several sites on a network.
True
3
In a DDBMS,the site where the user is located is called the local site.
True
4
Access to a data warehouse is accomplished through the use of OLAP software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
In objected-oriented DBMSs,the term class refers to the general structure of an object.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
On a client/server network,the server is a computer that provides data to the clients.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
A local deadlock involves one transaction that requires a record held by a second transaction at one site,while the second transaction requires a record held by the first transaction at a different site.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Extensible Markup Language (XML) is a metalanguage.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
In the URL,http://www.irs.gov/individuals/index.html,the location path on the Web server is individuals.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
In objected-oriented DBMSs,the actions defined for a class are known as macros.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Access delay refers to the fixed amount of time that is required for every message.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
In order to view and analyze higher levels of aggregate data,you must drill down the data.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
A file server stores the files required by the users on a network.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
A global deadlock occurs at a single site in a distributed database.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
The server is also known as a front-end processor or front-end machine.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
When relational databases store complex objects,these special data types are known as CLOBs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
One approach you can use to model all the various aspects of software development for object-oriented systems is known as UML.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Accessing data using messages over a network takes approximately the same amount of time as accessing data on a disk.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
A characteristic of a DDBMS that states that users do not need to be aware of the location of the data in a database is known as replication transparency.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
If users are unaware of fragmentation,the DDBMS has fragmentation transparency.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
It is possible for local DBMSs to commit updates at some sites and undo updates at other sites. This inconsistency can be prevented by using a ____.

A)two-step rollback
B)two-phase commit
C)two-phase rollback
D)two-phase transaction
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
A DDBMS that has at least two sites at which the local DBMSs are different is known as a ____.

A)homogeneous DDBMS
B)heterogeneous DDBMS
C)holistic DDBMS
D)heuristic DDBMS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
The site that initiates the update in a two-phase commit is known as the ____.

A)director
B)initiator
C)coordinator
D)leader
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
When users are unaware of the steps taken by the DDBMS to update the various copies of data,this characteristic of the DDBMS is called ____.

A)location transparency
B)fragmentation transparency
C)replication transparency
D)update transparency
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
____ is the data communication method used by Web clients and Web servers to exchange data on the Internet.

A)UML
B)HTTP
C)URL
D)IIS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
____ implies that the performance of functions such as adding sites,changing versions of DBMSs,creating backups,and modifying hardware should not require planned shutdowns of the entire distributed database.

A)Continuous operation
B)Local autonomy
C)Location transparency
D)Fragmentation transparency
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Each digital document on the Web is called a ____.

A)Web server
B)Web browser
C)client
D)Web page
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
The formula for message transmission time is: communication time = access delay + (data volume / X),where X represents ____.

A)transmission rate
B)length of transmission
C)lag time
D)seek time
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
Because the clients and the server perform different functions and can run two different operating systems,there is an arrangement of client/server architecture known as ____.

A)single-tier architecture
B)two-tier architecture
C)three-tier architecture
D)four-tier architecture
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
____ implies that no site should depend on another site to perform its database functions.

A)No reliance on a central site
B)Local autonomy
C)Continuous operation
D)Fragmentation transparency
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
____ implies that users should not need to be concerned with the location of any specific data in the database.

A)Fragmentation transparency
B)Replication transparency
C)Location transparency
D)Update transparency
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
_____ is a standard interface that provides the capability necessary for Web browsers to communicate with server-side extensions.

A)Common Gateway Interface
B)Operating System Interface
C)Web Server Interface
D)Procedural Interface
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
When the data is organized by entity rather than by the application that uses the data,it is called ____.

A)table-oriented
B)row-oriented
C)column-oriented
D)subject-oriented
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Computers in a network communicate through ____.

A)tokens
B)messages
C)notes
D)letters
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
When a centralized database becomes unavailable for any reason,no users can continue processing. In contrast,if a local database in a distributed database becomes unavailable,only users who need that data are affected. Because of this,distributed databases have a(n) ____ advantage over a centralized database.

A)local control of data
B)increasing database capacity
C)system availability
D)added efficiency
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
If the client,in a client/server system,performs the business functions (calculations,etc.),then this client is known as a(n) ____.

A)thin client
B)fat client
C)maximum client
D)minimum client
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is an advantage of distributed databases?

A)Local control of data
B)Easier updates of replicated data
C)More complex query processing
D)More complex treatment of concurrent updates
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
____ is the ability of a computer system to continue to function well as utilization of the system increases.

A)Data fragmentation
B)Data mining
C)Scalability
D)Polymorphism
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
____ is a metalanguage derived from a restricted subset of SGML,and designed for the exchange of data on the Web.

A)UML
B)URL
C)XML
D)HTTP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
When users interact with an RDBMS,they use transactions. These types of systems are called ____ systems.

A)OLTP
B)ODBMS
C)OLAP
D)ODBC
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
A(n) ______________________________ is one in which data and the actions that operate on the data are encapsulated into objects.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
In an object-oriented DBMS,methods are defined during the ____________________ process.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
With respect to the definition of data warehouse,____ means that data in a data warehouse represents snapshots of data at various points in time in the past.

A)nonvolatile
B)time-variant
C)subject-oriented
D)integrated
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
____ refers to the association of an operation to actual program code.

A)Attaching
B)Matching
C)Linking
D)Binding
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
E-commerce between organizations is called ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
In ____ systems,data and actions are encapsulated.

A)relational
B)object-oriented
C)network
D)parallel
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Uncovering new knowledge,patterns,trends,and rules from the data stored in a data warehouse is known as ____.

A)fragmentation transparency
B)replication transparency
C)polymorphism
D)data mining
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
A ____ is a subject-oriented,integrated,time-variant,nonvolatile collection of data in support of management's decision-making process.

A)data warehouse
B)thin client
C)back-end processor
D)fat client
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
In an object-oriented DBMS,a(n) ____________________ is the set of values that are permitted for an attribute.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
In ____ systems,you create actions as part of data manipulation rather than as part of the data definition.

A)object-oriented
B)relational
C)parallel
D)simple
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
A(n) _________________________ is a DBMS capable of supporting and manipulating distributed databases.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
To execute the steps in a method,the user sends a(n) ____________________ to the object.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
A(n) ____________________ DDBMS is a database that has the same local DBMS at each site.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) ____ consists of rows that contain consolidated and summarized data.

A)class
B)data model
C)fact table
D)object
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
In a three-tier client/server architecture,the clients perform the presentation functions,a database server performs the database functions,and separate computers called ____________________ perform the business functions and serve as an interface between clients and the database server.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
With respect to the definition of data warehouse,____ means that the data is read-only.

A)time-variant
B)integrated
C)nonvolatile
D)subject-oriented
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
With respect to the definition of data warehouse,____ means that data is stored in one place,even though it originates from everywhere in the organization and from a variety of external sources.

A)time-variant
B)nonvolatile
C)subject-oriented
D)integrated
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Each ____ contains a single-part primary key that serves as an index for the fact table and also contains other fields associated with the primary key value.

A)primary table
B)fact table
C)dimension table
D)star table
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Web pages that display the same content for all Web clients are called ____________________ Web pages.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
____________________ implies that you define an object to contain both the data and its associated actions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
The ____________________ symbol in a class diagram indicates whether other classes can view or update the value in the attribute.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Explain the difference between a Web page,a Web server,and a Web client.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
What is the purpose of the following UML diagrams: class,use case,sequence,and activity?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
With ____________________ visibility,only the class itself can view or update the value in the attribute.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
On a class diagram,the lines joining the classes represent the relationships and are called ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
Discuss the differences between how client-side extensions and server-side extensions are created and executed,including the kinds of languages used to create them.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
On a class diagram,a(n) ____________________ symbol precedes each attribute.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
With ____________________ visibility,any other class can view or update the value of an attribute.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ are restrictions placed on the data that can be stored in the database.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
What are the advantages of a client/server system?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
If one class is a subclass of a second class,the second class is called a(n) ____________________ of the first class.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
With ____________________ visibility,only the class itself or public or protected subclasses of the class can view or update the value in the attribute.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
With respect to UML,the type of diagram most relevant to database design is the ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ indicates the number of objects that can be related to an individual object at the other end of the relationship.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
What are the advantages of distributed databases?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.