MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
An entity instance of a subtype represents the same entity instance of a supertype. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 2. |
An ERD that has had the entities clustered will display more entities. |
| A. | True |
| B. | False |
| Answer» C. | |
| 3. |
Total specialization is represented by double lines between the supertype and subtype on an EER. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
Data descriptions are stored in a central location called the depository. |
| A. | True |
| B. | False |
| Answer» C. | |
| 5. |
Stored representations of objects and events that have meaning and importance in the user's environment are known as a database. |
| A. | True |
| B. | False |
| Answer» C. | |
| 6. |
Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
Incorrect data is easy to detect. |
| A. | True |
| B. | False |
| Answer» C. | |
| 8. |
With concurrent processing involving updates, a database with concurrency control will be compromised due to interference between users. |
| A. | True |
| B. | False |
| Answer» C. | |
| 9. |
A disaster recovery plan does not need to include the shipment of database backups to other sites. |
| A. | True |
| B. | False |
| Answer» C. | |
| 10. |
Databases are not the property of a single function or individual within the organization. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 11. |
Data modeling and database design are key responsibilities of data and data base administration. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 12. |
Information repositories are replacing data dictionaries in many organizations. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 13. |
Queries that do full table scans should be avoided. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 14. |
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 15. |
Another name for multimedia data is unstructured data. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 16. |
The most common source of database failures in an organization is the failure to implement a strong database administration function. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 17. |
The primary mechanism for providing context for data is metadata. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 18. |
A workgroup typically comprises between 25 and 100 persons. |
| A. | True |
| B. | False |
| Answer» C. | |
| 19. |
The source of the data is sometimes called the system of record. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 20. |
Data quality problems currently cost U.S. businesses some $60 million each year (Hudica, 2003). |
| A. | True |
| B. | False |
| Answer» C. | |
| 21. |
Stand-alone databases exhibit many of the same advantages common to file processing systems. |
| A. | True |
| B. | False |
| Answer» C. | |
| 22. |
The database approach requires additional costs and risks. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 23. |
Data scrubbing can help upgrade data quality; it is not a long-term solution to the data quality problem. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 24. |
Every key used to join the fact table with a dimensional table should be a surrogate key. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 25. |
Derived data are detailed, current data intended to be the single, authoritative source for all decision support applications. |
| A. | True |
| B. | False |
| Answer» C. | |
| 26. |
Joining is the process of partitioning data according to predefined criteria. |
| A. | True |
| B. | False |
| Answer» C. | |
| 27. |
The role of the ETL process is to identify erroneous data and to fix them. |
| A. | True |
| B. | False |
| Answer» C. | |
| 28. |
Data in the data warehouse are loaded and refreshed from operational systems. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 29. |
Star schema is suited to online transaction processing, and therefore is generally used in operational systems, operational data stores, or an EDW. |
| A. | True |
| B. | False |
| Answer» C. | |
| 30. |
Periodic data are data that are physically altered once added to the store. |
| A. | True |
| B. | False |
| Answer» C. | |
| 31. |
A transaction log shows before and after images of records that have been modified by transactions. |
| A. | True |
| B. | False |
| Answer» C. | |
| 32. |
The greatest threat to business security is often internal rather than external. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 33. |
Authorization tables contain highly sensitive data and should be protected by stringent security rules. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 34. |
An enterprise data model is a relational model that shows the high-level entities for the organization and associations among those entities. |
| A. | True |
| B. | False |
| Answer» C. | |
| 35. |
Independent data marts are often created because an organization focuses on a series of short-term business objectives. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 36. |
Data in operational systems are typically fragmented and inconsistent. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 37. |
Most operational systems are based on the use of transient data. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 38. |
Two basic constructs to link one piece of data with another piece of data: sequential storage and pointers. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 39. |
Denormalization and clustering can work well to minimize data access time for small records. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 40. |
The presentation logic component is responsible for formatting and presenting data on the user's screen or other output device, and for managing user input from a keyboard or other input device. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 41. |
Every time attribute A appears, it is matched with the same value of attribute B, but not the same value of attribute C. Therefore, it is true that: |
| A. | A B. |
| B. | A C. |
| C. | A (B,C). |
| D. | (B,C) A. |
| Answer» B. A C. | |
| 42. |
Scalar aggregate are multiple values returned from an SQL query that includes an aggregate function. |
| A. | True |
| B. | False |
| Answer» C. | |
| 43. |
A relation is considered a: |
| A. | Column. |
| B. | one-dimensional table. |
| C. | two-dimensional table. |
| D. | three-dimensional table. |
| Answer» D. three-dimensional table. | |
| 44. |
The different classes of relations created by the technique for preventing modification anomalies are called: |
| A. | normal forms. |
| B. | referential integrity constraints. |
| C. | functional dependencies. |
| D. | None of the above is correct. |
| Answer» B. referential integrity constraints. | |
| 45. |
A primary key is a composite key that was selected to be the main identifier for the relation. |
| A. | True |
| B. | False |
| Answer» C. | |
| 46. |
The EXISTS keyword will be true if: |
| A. | any row in the subquery meets the condition only. |
| B. | all rows in the subquery fail the condition only. |
| C. | both of these two conditions are met. |
| D. | neither of these two conditions is met. |
| Answer» B. all rows in the subquery fail the condition only. | |
| 47. |
The use of the double NOT EXISTS can be used to find rows that do not match some specified condition. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 48. |
When two transactions are being processed against the database at the same time they are termed concurrent transactions. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 49. |
The lost update problem is when User A reads data that have been processed by a portion of a transaction from User B. |
| A. | True |
| B. | False |
| Answer» C. | |
| 50. |
The JVM (Java virtual machine) interprets Java bytecode at run time. |
| A. | True |
| B. | False |
| Answer» B. False | |