UPDATE A+ GRADED
One likely problem when operational data is integrated into the data warehouse
includes variation in terms of different departmental recording of data, data type
and structure. T status of an order may be indicated with text labels as "open",
"received", or "closed" in one department while another department has it as "1",
"2", or "4". Student status can be defined as "Freshman", "Sophomore" or
Senior" in the Accounting department and as "FR", "SO" or "SR" in the
Computing dept. An ID number field may be stored in one database as a string of
numbers and dashes (XXXXXXX-XXXX-XX-X), in another as a string of numbers
without the dashes (XXXXXXXXXXX).
These examples are indication that most of the data transformation problems are
related to all of the following EXCEPT______.
Select one:
a. Incompatible data formats
b. Use of synonyms and homonyms
c. Inconsistent modification
Inconsistent modification formats
_____ is a meta-language used to represent and manipulate data elements.
Select one:
a. XML
b. XHTML
c. XML Schemas
d. HTML
XML
_____ provides the semantics that facilitates the sharing, exchange, and
manipulation of structured documents over organisational boundaries.
Select one:
a. HTML
b. XHTML
c. XML
d. XML Schemas
XML
___ can be placed on any fields in the file that is unordered.
Select one:
a. The candidate index
b. The primary index
,c. The multi-level index
d. The secondary index
The secondary index
____ are places on unique fields and they are used to locate a specific record
pointed to by the index.
Select one:
a. Primary indexes
b. Single-level indexes
c. Secondary indexes
d. Multi-Level indexes
Primary indexes
____ can be placed on any field in the file that is unordered.
Select one:
a. Multi-Level indexes
b. Secondary indexes
c. Single-level indexes
d. Primary indexes
Secondary indexes
____ interleaves the execution of the database operations belonging to several
concurrent transactions to ensure the _____of transactions.
Select one:
a. Scheduler and isolation
b. Scheduler and consistency
c. Scheduler and Atomicity
d. Scheduler and serializability
Scheduler and serializability
____ stores a processed version of SQL that is ready for execution by the DBMS.
Select one:
a. Buffer cache
b. Data cache
c. Procedure cache
d. Extends cache
Procedure cache
_____ activities cover all tasks directly related to the day-to-day operations of the
DBMS and its applications.
Select one:
a. Security auditing and monitoring
b. System support
c. Performance monitoring and tuning
d. Backup and recovery
System support
,_____ allows the translation of the company's strategic goals into the data and
applications that will help the company achieve those goals.
Select one:
a. MOLAP
b. Access Management
c. Business Intelligence
d. Information engineering (IE)
Information engineering (IE)
_____ are in charge of presenting data to the end user in a variety of ways.
Select one:
a. Data stores
b. Data analysis tools
c. Data visualization tools
d. ETL tools
Data visualization tools
_____ are more detailed and specific than policies and describe the minimum
requirements of a given DBA activity.
Select one:
a. Documentations
b. Standards
c. Guidelines
d. Procedures
Standards
_____ CASE tools provide support for the coding and implementation phases.
Select one:
a. Vertical
b. Back-end
c. Front-end
d. Horizontal
Back-end
_____ CASE tools provide support for the planning, analysis, and design phases.
Select one:
a. Front-end
b. Vertical
c. Horizontal
d. Back-end
Front-end
_____ Code is embedded inside an HTML page and is activated by triggering
events such as clicking on a link.
Select one:
, a. SQL
b. VBScript
c. XML
d. Visual Basic
VBScript
_____ component of star schema allows the data warehouse and online
transaction processing (OLAP) systems to use a carefully defined path that will
govern how data are to be decomposed and aggregated for drill-down and roll-up
operations.
Select one:
a. Attribute hierarchy
b. Dimension
c. Attribute
d. Fact
Attribute hierarchy
_____ deals with ensuring that data is protected against unauthorized access,
and if the data are accessed by an authorized user, that the data are used only for
an authorized purpose.
Select one:
a. Integrity
b. Compliance
c. Confidentiality
d. Availability
Confidentiality
_____ describes the extent to which modules are independent of one another.
Select one:
a. Module coupling
b. Module collaboration
c. Module connectivity
d. Module cohesive
Module coupling
_____ distributed database management systems (DDBMS) integrate multiple
instances of the same DBMS over a network.
Select one:
a. Heterogeneous
b. Combination
c. Homogeneous
d. Fully heterogeneous
Homogeneous
_____ extends SQL so that it can differentiate between access requirements for
data warehouse data and operational data.
Select one: