MIS 564 Final Exam Practice 1 Week 7 with Answers

$35.00

Category:

Description

MIS 564 Final Exam Practice 1 – Week 7

Final Exam Practice

  1. (CO A) A reference repository that holds metadata about all the databases, their component parts, the data in the databases, and the security details.
  2. (CO A) Responsible for data strategy, information architecture, and establishing the policies and procedures used by an entire organization for its data use and management.
  3. (CO A) Responsible for the development and day-to-day administration and maintenance of a database.
  4. (CO A) Responsible for the efficiency and optimization, access rights, and monitoring of a specific database, as well as participating in the DDLC for new databases.
  5. (CO A) An organization where the DA reports to a project manager and a data administration manager.
  6. (CO A) Between a DA and a DBA, excellent communication skills are critical for which position?
  7. (CO A) The DDLC is what and composed of what states?
  8. (CO D) A query language used to locate and retrieve nodes in an XML document:
  9. (CO D) XSL is comprised of what three parts?
  10. (CO D) An XML based web feed used to publish dynamic material
  11. (CO D) A database management system optimized to store, retrieve, and update XML documents natively:
  12. (CO D) A language used to describe another language
  13. (CO D) Embeds information about the data it holds in a hierarchical format which is self describing.
  14. (CO D) A closed markup language used to render data on a web browser.
  15. (CO D) Embeds XML file that associates a namespace with an XML document and describes the legal format, structure, content, and semantics of the document.
  16. (CO F) Techniques and technologies used to exploit large data stores in order to support decision making
  17. (CO F) OLAP
  18. (CO F) The two approaches that are used to exploit a datastore
  19. (CO F) A RDBMS where the multidimensional model is imposed on a relational model.
  20. (CO F) Name two ROLAP schemas.
  21. (CO F) The five data mining functions include:
  22. (CO F) An exchange of information, or conversation, between two applications is called
  23. (CO F) A computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network.
  24. (CO F) A small data item stored on the user’s computer by a web browser used for session tracking, authentication, storing site preferences, etc.
  25. (CO F) An application that manages the content of a website, including concurrent updates, imposing format consistency, and content versioning.
  26. (CO F) A web application is an example of what kind of architecture?
  27. (CO F) Name at least 3 web browser-to-DBMS server connectivity tools.
  28. (CO A) Domain
  29. (CO A) Primary Key
  30. (CO A) List the Relational Algebra Operators
  31. (CO A) A Join is
  32. (CO A) The SQL Constraints are
  33. (CO A) A View
  34. (CO A) NULL
  35. (CO A) What are the SQL Security Commands?
  36. (CO B) File servers, DBMS servers, 2-tiered, and 3-tiered are examples of
  37. (CO B) Super computers are used in which architecture?
  38. (CO B) A Distributed Database
  39. (CO B) Distributed Database Fragmentation techniques
  40. (CO B) Replication database
  41. (CO D) What is a TPS?
  42. (CO D) What are the desirable corporate data attributes? (Sharable, transportable, secure, accurate, timely, and relevant)
  43. (CO D) An Attribute
  44. (CO D) An Entity
  45. (CO D) Four building blocks of a data model:
  46. (CO D) Data Modeling
  47. (CO D) Describe the cardinality relationships.
  48. (CO D) A Generalization
  49. (CO D) Functional Dependency.
  50. (CO D) A relation is in 2-NF if,
  51. (CO D) A relation is in 3-NF if,
  52. (CO D) Goals of Normalization
  53. (CO E) The transaction manager
  54. (CO E) Used to solve concurrency issues
  55. (CO E) When 2 users lock resources needed by each other so neither can progress it is called
  56. (CO E) The 4 primary attributes a DBMS Transaction Manager enforces for any transaction
  57. (CO E) When an outcome is determined by the sequence or timing of events instead of deterministic processing, it is called a
  58. (CO E) A recovery procedure which backs out unwanted change in a database is called
  59. (CO E) A recovery procedure which uses a prior saved database state and applies after image records from update transactions
  60. (CO E) Verifying a user is who they say they are is
  61. (CO E) Authorization is
  62. (CO G) What managers are involved in database access?
  63. (CO G) An attribute used to narrow down the search space when accessing a row with a specific value for the attribute.
  64. (CO G) When we access the disk, we are accessing what kind of memory?
  65. (CO G) An index structure that is efficient for both sequential and direct file access is
  66. (CO G) A standard format used to represent written text in many different languages
  67. (CO G) A redundant array of independent disks
  68. (CO G) Which RAID levels are not good for applications with heavy update requirements?
  69. (CO G) What technique uses a function to convert a field into an address to promote direct accessing?