Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

Preview Test: BISM7206 Semester One Final Examination 2021

QUESTION 1

Big Data

a. relies on the use of structured data

b. relies on the use of unstructured data

c. captures data in whatever format it naturally exists

d. imposes a structure on data when it is captured

QUESTION 2

If a table has multiple candidate keys and one of those candidate keys is a composite key, the table can have _____ based on this composite candidate key even when the primary key chosen is a single attribute.

a. redundancies

b. partial dependencies

c. Boyce-Codd normal forms

d. time-variances

QUESTION 3

Which of the following contains a single-part primary key that serves as an index for the fact table and also contains other fields associated with the primary key value?

a. star table

b. dimension table

c. fact table

d. relational table

QUESTION 4

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

a. Compliance

b. Integrity

c. Privacy

d. Confidentiality

QUESTION 5

A DBMS uses a  __________  technique to identify a synchronisation point between the database and the transaction log Ñle.

a. checkpointing

b. backup

c. change log

d. recovery

QUESTION 6

Data redundancy produces _____.

a. data integrity problems

b. efficient storage use

c. slower lookups

d. robust design

QUESTION 7

Which of the following queries will display rows in the PRODUCT table with a COLOUR_CODE not equal to 5555?

a. SELECT P_DESCRIPT, P_PRICE, COLOUR_CODE

FROM PRODUCT

WHERE COLOUR_CODE ≠ 5555;

b. SELECT P_DESCRIPT, P_PRICE, COLOUR_CODE

FROM PRODUCT

WHERE COLOUR_CODE >< 5555;

c. SELECT P_DESCRIPT, P_PRICE, COLOUR_CODE

FROM PRODUCT

WHERE COLOUR_CODE NOT = 5555;

d. SELECT P_DESCRIPT, P_PRICE, COLOUR_CODE

FROM PRODUCT

WHERE COLOUR_CODE <> 5555;

QUESTION 8

_____ can render data useless to unauthorized users who might have violated some of the database security layers.

a. Physical security

b. Access rights

c. Data encryption

d. Password security

QUESTION 9

What is the first query known as in an SQL subquery?

a. left

b. base

c. outer

d. inner

QUESTION 10

Hadoop is generally used with a set of other related products that interact and complement each other to create an
entire suite of applications and tools. This is also known as a(n) ____________?

a. ecosystem

b. big data system

c. database environment

d. applications system

QUESTION 11

A distributed _____ can reference several different local or remote data processing sites.

a. request

b. transaction

c. data location

d. site

QUESTION 12

A(n) ____ condition occurs when two or more transactions wait for each other to unlock data.

a. exclusive lock

b. deadlock

c. two-phase lock

d. binary lock

QUESTION 13

_____ are designed for presenting data to the end user in a variety of ways.

a. Data analysis tools

b. ETL tools

c. Data stores

d. Data visualization tools

QUESTION 14

In business analytics, ______ uses data to understand the past and present.

a. Descriptive analytics

b. Predictive analytics

c. Prescriptive analytics

d. Diagnostic analytics

QUESTION 15

From a structural point of view, 3NF is better than _____.

a. 4NF

b. 2NF

c. 5NF

d. 6NF

QUESTION 16

A _____ contains the description of the entire database as seen by the database administrator.

a. distributed global dictionary

b. distributed global schema

c. distributed data dictionary

d. distributed data schema

QUESTION 17

In the context of security controls, what technique is used to determine whether a user is who he or she claims to be?

a. Confidentiality

b. Authorization

c. Authentication

d. Encryption

QUESTION 18

Which of the following statements is correct for the SQL data manipulation command HAVING?

a. restricts the selection of rows based on a conditional expression.

b. groups the selected rows based on one or more attributes.

c. modifies an attribute’s values in one or more table’s rows.

d. restricts the selection of grouped rows based on a condition.

QUESTION 19

The first step in developing the conceptual model using Entity Relationship Diagrams is to _____.

a. initial Entity Relationship diagram

b. identify, analyze, and refine the business rules

c. normalize the entities

d. define the attributes, primary keys, and foreign keys for each of the entities

QUESTION 20

The SQL command that allows a user to permanently save data changes is _____.

a. INSERT

b. COMMIT

c. UPDATE

d. SELECT

QUESTION 21

The reliance on _____ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems.

a. star schema

b. normalization

c. multidimensional schema

d. denormalization

QUESTION 22

The special operator used to check whether a subquery returns any rows is _____.

a. BETWEEN

b. IN

c. LIKE

d. EXISTS

QUESTION 23

A table that is in 2NF and contains no transitive dependencies is said to be in _____.

a. 1NF

b. 2NF

c. 3NF

d. 4NF

QUESTION 24

A trigger can be used as a security measure in which of the following ways?

a. To control database transactions

b. To check for viruses

c. To execute a special procedure

d. To control error handling

QUESTION 25

In business analytics, ______ analyses data relating to past performance.

a. Predictive analytics

b. Descriptive analytics

c. Diagnostic analytics

d. Prescriptive analytics

QUESTION 26

Fact and dimension tables are related by _____ keys.

a. ign

b. primary

c. linked

d. shared

QUESTION 27

In business intelligence framework, data are captured from an operational database and placed in _____.

a. dashboard

b. relational database

c. decision support system

d. data warehouse

QUESTION 28

One of the steps in the conceptual database design is:

a. check integrity constraints

b. check entity relationship model for dependencies

c. check for future growth

d. check model for redundancy

QUESTION 29

_____ transparency allows a physically dispersed database to be managed as though it were centralized.

a. Distribution

b. Transaction

c. Performance

d. Failure

QUESTION 30

In the context of Big Data, _____ refers to the trustworthiness or correctness of a set of data.

a. variability

b. viability

c. value

d. veracity