Compare data warehouse from data lake

Assignment Help Basic Computer Science
Reference no: EM133047492

Database Management Systems

Part 1: Selection and Yes/No questions

1. A collection of facts and figures is known to be as:

A. Data

B. Database

C. Sequenced data

D. Structured data

2. Logical structure of the database can be depicted through its

A. Domain

B. Data model

C. Architecture

D. Schemas

3. A database architecture that is considered highly modifiable is known as

A. ER database architecture

B. Object based architecture

C. 1 tier architecture

D. Multi-tier architecture

4. A tier in which the database resides along with the query processing languages is called

A. Application tier

B. Data tier

C. Presentation tier

D. Model tier

5. Type data abstraction which allows the conceptual representation of data in database management system is considered as

A. logical design model

B. data model

C. interface model

D. user friendly model

6. Identification, aggregation and instantiation are abstraction concepts used in

A. intension and extension models

B. classes and nodes models

C. concrete models

D. semantic data models

7. Process of abstraction in which the objects and classes are identified with some kind of identifier is classified as

A. classification

B. instantiation

C. identification

D. exception abstract

8. Application server in a three-tier architecture, communicates with a database system to access

A. Data

B. Query

C. Compiler

D. Retrieval

9. Business logic of the application says what actions to carry out under what conditions, is embedded in

A. Multiple servers

B. Multiple clients

C. Transaction server

D. Application server

10. Term that says what actions to carry out under what conditions, is known as the

A. Data logic

B. Business logic

C. Computing logic

D. File logic

11. Application resides at the client machine and invokes database system functionality at the server machine through query statement, is the type known as

A. One-tier architecture

B. Two-tier architecture

C. Three-tier architecture

D. NO-tier architecture

12. In the data model, the inherent constraints are classified as

A. flat constraints

B. parallel constraints

C. explicit constraints

D. implicit constraints

13. Type of constraint in which value of each attribute (X) must be an indivisible value from domain (X) is classified as

A. explicit constraint

B. implicit constraint

C. domain constraint

D. range constraint

14. In the data model schemas, the constraints that are expressed directly are classified as

A. explicit constraints

B. implicit constraints

C. flat constraints

D. parallel constraints

15. Constraint which is used to specify the consistency in two or more relations among tuples is classified as

A. primary integrity constraint

B. entity integrity constraint

C. referential integrity constraint

D. null integrity constraint

16. Database user assigns entities to a given entity set, in the type of generalization's constraints

A. Data-defined

B. User-defined

C. System-defined

D. Condition-defined

17. By default, the generalization type applied is

A. Dependent specialization

B. Partial specialization

C. Complete specialization

D. Total specialization

18. An abstraction through which relationships are treated as higher-level entities, is known as

A. Aggregation

B. Tabulation

C. Simulation

D. Patriotization

19. the user-defined constraints on generalization, the lower level entity sets can be of type

A. 2 types

B. 3 types

C. 4 types

D. 5 types

20. Like attribute inheritance, the inheritance that applies through all tiers of lower-level entity sets, is known to be

A. Participation inheritance

B. Execution inheritance

C. Existence inheritance

D. Dependency inheritance

21. In database management systems, the record which contains all the data regarding tuples of database is called

A. statement record

B. environment record

C. description record

D. connection record

22. Type of iterator which is used to list the types of attributes that are included in the query result is called

A. positional iterator

B. named iterator

C. unnamed iterator

D. non-positioned iterator

23. Variable in DBMS used to communicate error conditions between database management system and program are

A. SQLCODE

B. SQLSECTION

C. SQLSTATE

D. both b and c

24. In database management system, if the cursor is to be moved to next rows in queries result then the command is classified as

A. OPEN CURSOR command

B. FETCH command

C. UPDATE command

D. CLOSE CURSOR command

25. General purpose programming languages such as COBOL and ADA is classified as

A. server language

B. client language

C. host language

D. referential language

Part II.

1. Who is a DBA? What are the responsibilities of a DBA?

2. What is a data model? List the types of data model used.

3. Compare Data warehouse from Data Lake.

4. Compare SQL from NoSQL database management system?

Reference no: EM133047492

Questions Cloud

Assignment on pestel analysis : 1. Choose a local product or service (from your country) than half page a
Compute NPV and Advice management accordingly : In the 4th year, this machine will call for an overhaul to cost ksh.80000. Compute NPV and Advice management accordingly
Describe three separate and distinct programs : Provide visual of your organizational structure after one year of start-up (organizational chart):- Note the key duties and responsibilities of all of your staf
Calculate total indirect manufacturing costs for the day : The following financial data pertains to costs incurred in one day of operations. Calculate total indirect manufacturing costs for the day
Compare data warehouse from data lake : Logical structure of the database can be depicted through its. By default, the generalization type applied is. Compare Data warehouse from Data Lake.
Common techniques for data analysis and mining : Briefly explain what are they, when to use each for business, main differences/similarities, and are they dependable on each other?
Ceo action using kant categorical imperative : You, the CEO, discover that the supplier you have been using for your APPLEBABY juice has been supplying sugar water, not apple juice.
Importance of scada to cybersecurity : Provide a description of what SCADA systems are, how they are integrated into IT systems, the importance of SCADA to cybersecurity
What price is Payout stock selling for today : The dividend will be $4 per share, and there are 50,000 shares of stock outstanding. What price is Payout stock selling for today

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create you help me make a uml class diagram

Create you help me make a UML Class diagram based on the following requirements. An organization has been entrusted with developing a system that maintains

  Displays a suffix of the specified length

suffix_of_length(length) : Displays a suffix of the specified length from the current string. If the length is

  Relationship between cybersecurity and risk management

Based on your article review and the assigned reading, discuss the relationship between cybersecurity and risk management.

  How is a repeater different from an amplifier

What do we mean when we say that a switch can filter traffic? Why is filtering important?

  Distinguish between due care and due diligence.

Distinguish between due care and due diligence.

  What is qualitative research

What is qualitative research? What does qualitative research involve?

  Medium-sized telecommunications equipment manufacturer

senior member of the finance team assigned to lead the investment committee of a medium-sized telecommunications equipment manufacturer.

  Program that reads a sequence of integers into an array

Write a program that reads a sequence of integers into an array and that computes the alternating sum of all elements in the array

  View items-make purchase and client register

Web Customer uses our web site to make purchases online. Top level functionality given by the web site are View Items, Make Purchase and Client Register.

  Calculate a range of how many years of school an employer

Calculate a range of how many years of school an employer would require. An employer could simply pay all types the same amount. How much would an employer pay?

  Perspective of the internal data management consultant

You may write in the first person for this assignment, taking the perspective of the internal data management consultant. Your paper should meet the following requirements:

  What information was targeted

What information was targeted? What changes did the organization made to ensure that this vulnerability has been controlled?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd