Professional Documents
Culture Documents
Chapter 9 Quiz
Chapter 9 Quiz
2. According to the _______ integrity constraint, values appearing in given attributes of any tuple
in the referencing relation must also appear in defined attributes of at least one tuple in the
referenced relation.
Ans: Referential
3. This occurred when putting important data into the database is not possible due to the lack of
other data in the database.
4. It is a method of organizing the data into more than one related tables to limit data redundancy.
Ans: Normalization
5. It indicates the number of occurrences that one entity has relative to some other and might defined
for every association link among the association and the entity.
Ans: Cardinality
6. A type of data management problems that is efficient information systems captures and stores
data only once and makes this single source available to all users who need it.
7. A type of conceptual models that is far more flexible by allowing users to create new and unique
paths through the database to solve a wider range of business problems
8. A type of features that is captures statistics on what data are being used, when they are used,
and who uses them
9. A way in users that systems professionals prepare this program send data access requests (calls)
to the DBMS, which validates the requests and retrieves the data for processing presence of the
DBMS is transparent to the users.
10. Among the three levels for views, what level that there is only one conceptual view for a
database?
Ans: SELECT
12. The stems from limitations in flat-file management technology that require data files
to be structured to the unique needs of the primary user.
13. ________ data is the existence of multiple values for a particular attribute in a specific record.
14. Under this approach, remote users send request via terminals for data to the central site, which
processes the requests and transmits the data back to the user.
16. The hierarchical data model is called ________ because traversing it requires following a
predefined path.
17. It is the presence of complete and accurate data at all remote sites.
18. It is a variation of the hierarchal model. The principal distinguishing feature between the two is
that the network model allows a child record to have multiple parents.
19. ________ are effective in companies in which there exists a high degree of data sharing but no
primary user.
20. ______ occurs because there is mutual exclusion of data, and the transactions are in a wait state
until the locks are removed.
Ans: DEADLOCK