Data Management Foundations - D426

Is software that helps business users interact with database systems
Database application
Query processor
Logical design
Analysis
Responsible for securing the database system against unauthorized users. A database administrator enforces procedures for user access and database system availability.
Query processor
Database administrator
Storage manager
Transaction manager
Nterprets queries, creates a plan to modify the database or retrieve data, and returns query results to the application. The query processor performs query optimization to ensure the most efficient instructions are executed on the data.
Transaction manager
Database administrator
Storage manager
Query processor
Many database users should have limited access to specific tables, columns, or rows of a database. Database systems authorize individual users to access specific data.
Rules
Database administrator
Authorization
Analysis
Translates the query processor instructions into low-level file-system commands that modify or retrieve data. Database sizes range from megabytes to many terabytes, so the storage manager uses indexes to quickly locate data.
Transaction manager
Storage manager
Query processor
Database administrator
Ensures transactions are properly executed. The transaction manager prevents conflicts between concurrent transactions. The transaction manager also restores the database to a consistent state in the event of a transaction or system failure.
Database administrator
query processor
Storage manager
Transaction manager
Inserts rows into a table.
DELETE
UPDATE
INSERT
SELECT
Retrieves data from a table.
INSERT
SELECT
UPDATE
DELETE
Modifies data in a table.
UPDATE
SELECT
DELETE
INSERT
Deletes rows from a table.
INSERT
SELECT
UPDATE
DELETE
Stores integer values
DATE
VARCHAR
DECIMAL
INT
Stores fractional numeric values
INT
DECIMAL
VARCHAR
DATE
stores year, month, and day.
INT
DECIMAL
VARCHAR
DATE
Specifies database requirements without regard to a specific database system. Requirements are represented as entities, relationships, and attributes.
Analysis
Logical design
Physical design
Implements database requirements in a specific database system.
Analysis
Logical design
Physical design
Adds indexes and specifies how tables are organized on storage media
Analysis
Logical design
Physical design
To simplify the use of SQL with a general-purpose language, database programs typically use an application programming interface
Cell
Row
API
DDL
An ordered collection of elements enclosed in parentheses.
Tuple
Table
Column
Data type
Manages database transactions
Data Definition Language (DDL)
Data Query Language (DQL)
Data Manipulation Language (DML)
Data Control Language (DCL)
Data Transaction Language (DTL)
Defines the structure of the database.
Data Definition Language (DDL)
Data Query Language (DQL)
Data Manipulation Language (DML)
Data Control Language (DCL)
Retrieves data from the database.
Data Transaction Language (DTL)
Data Definition Language (DDL)
Data Query Language (DQL)
Data Control Language (DCL)
Data independence
Rule 1
Rule 5
Rule 7
Rule 4
TINYINT
1 Byte
2 Byte
3 Byte
4 Byte
8 Byte
SMALLINT
1 Byte
2 Byte
3 Byte
4 Byte
INTEGER or INT
1 Byte
2 Byte
3 Byte
4 Byte
Divides one numeric value by another and returns the integer remainder
^
%
=
!=
Compares two values for inequality
%
=
^
!=
The UPDATE statement modifies existing rows in a table. The UPDATE statement uses the ___ clause to specify the new column values
FROM
SET
DELETE
MERGE
The DELETE statement deletes existing rows in a table. The ___ keyword is followed by the table name whose rows are to be deleted
FROM
SET
DELETE
MERGE
Deletes all rows from a table.
DELETE
MERGE
FROM
TRUNCATE
Consists of multiple columns
Primary key
Composite primary key
Simple primary key
Foreign key
Column, or group of columns, that refer to a primary key
Composite primary key
Simple primary key
Foreign key
Candidate key
Rejects an insert, update, or delete that violates referential integrity
CASCADE
SET DEFULT
RESTRICT
SET NULL
Propagates primary key changes to foreign keys.
RESTRICT
CASCADE
SET DEFULT
SET NULL
ABS
Returns the lowercase
Returns the string without leading and trailing spaces
Returns the hour, minute, or second from time
Returns the absolute value
TRIM
Returns the absolute value
Returns the lowercase
Returns the string without leading and trailing spaces
Returns the hour, minute, or second from time
Computes the arithmetic mean of all the values in the set
COUNT
MAX
AVG
SUM
Finds the maximum value in the set
COUNT
MIN
MAX
AVG
A SELECT statement that combines data from two tables, known as the left table and right table, into a single result. The tables are combined by comparing columns from the left and right tables, usually with the = operator.
INSERT
ADD
TRUNCATE
JOIN
A subquery, sometimes called a
Nested query
Outer query
Second query
Foreign query
An alias is a temporary name assigned to a column or table. The ___ keyword follows a column or table name to create an alias.
FROM
AS
BY
JOIN
A person, place, product, concept, or activity
Entity
Relationship
Attribute
A descriptive property of an entity
ER diagram
Relationship
Attribute
Reflexive relationship
Analysis steps
Discover entities, relationships, and attributes
Implement entities
Logical design steps
Distinguish strong and weak entities
Apply normal form
The least number of instances of one entity that can relate to a single instance of another entity.
Subtype entity
Relationship maximum
Relationship minimum
IsA relationship
Depicts cardinality as a circle (zero), a short line (one), or three short lines (many)
Intangible entity
ER Diagram
Crows foot
IsA relationship
An equijoin compares columns of two tables with the ___ operator
+
=
-
>
Primary key values should be easy to type and store. Small values are easy to specify in an SQL WHERE clause and speed up query processing
EASY
STABLE
MEANINGLESS
SIMPLE
A single-column primary key created by the database designer when no suitable single-column or composite primary key exists
Foreign key
Composite key
Fake key
Artificial key
Rules for designing tables with less redundancy
Simple Forms
Normal Forms
Boyce-Codd normal form
Functional dependence
Normalization eliminates redundancy by ____ a table into two or more tables
Inner joining
Self joining
Cascading
Decomposing
In a hash index, index entries are assigned to
Tables
Buckets
Bits
Cells
{"name":"Data Management Foundations - D426", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"is software that helps business users interact with database systems, responsible for securing the database system against unauthorized users. A database administrator enforces procedures for user access and database system availability., nterprets queries, creates a plan to modify the database or retrieve data, and returns query results to the application. The query processor performs query optimization to ensure the most efficient instructions are executed on the data.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker