Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Humanities
Q:
Cloud services allow any organization to quickly and economically add information technology services such as applications, storage, servers, processing power, databases, and infrastructure to its IT portfolio.
Q:
Many companies are already working on the development of a new breed of services based on XML and Web technologies.
Q:
To be able to use a DTD file to define elements within an XML document, the DTD must be stored within that XML document.
Q:
The first line of an XML document represents the document declaration, and it is mandatory.
Q:
HTML is designed to facilitate the exchange of structured documents, such as orders and invoices, over the Internet.
Q:
ColdFusion is a Web application server.
Q:
A Web browser's function is to display a page on the client computer. The browser, through its use of HTML, does not have computational abilities beyond formatting output text and accepting form field inputs.
Q:
The only time the client and server computers communicate is when the client requests a page -when the user clicks a link- and the server sends the requested page to the client.
Q:
The label "stateless system" indicates that, at any given time, a Web server knows the status of the clients communicating with it.
Q:
The browser's interpretation and presentation capabilities are sufficient to develop Web-based applications.
Q:
APIs are implemented as dynamic-link libraries that are dynamically invoked when needed.
Q:
An API uses script files that perform specific functions on the client's parameters that are passed to the Web server.
Q:
The CGI is a newer Web-server interface standard that is much more efficient and faster than a dynamic link library (DLL).
Q:
Extending the Web server functionality implies that the Web server and the Web-to-database middleware will properly communicate with each other.
Q:
A client-side extension is a program that interacts directly with the Web server to handle specific types of requests.
Q:
A database server-side extension is known as Web-to-database middleware.
Q:
When an end user uses a Web browser to dynamically query a database, the client browser actually requests a Web page.
Q:
The Web has helped create a new information dissemination standard.
Q:
The Web server is the main hub through which all Internet services are accessed.
Q:
The effects of bad database design, implementation, and management are multiplied in an environment in which transactions may be measured in hundreds of thousands per day, rather than in hundreds per day.
Q:
Whether you purchase online or by standing in line, the system-level transaction details are essentially the same and they require the same basic database structures and relationships.
Q:
The creation and management of user interfaces and database connectivity are not affected by the Web's existence.
Q:
Most database professionals do not consider the DBMS connection to the Internet to be a critical element in IS development.
Q:
Many organizations rely on their IT departments to create universal data access architectures based on Internet standards.
Q:
Java applications are compiled and stored in the Web browser.
Q:
A good API makes it easy to develop a program by providing all of the building blocks.
Q:
An API (application programming interface) is defined as a set of routines, protocols, and tools for building software applications.
Q:
Usually, the native database connectivity interface provided by the vendor is not the only way to connect to a database; most current DBMS products support other database connectivity standards, the most common being ODBC.
Q:
Database connectivity software is also known as database middleware because it interfaces between the application program and the database.
Q:
The DO-UNDO-REDO protocol defines three types of operations. What are they?
Q:
What is transaction transparency? What are some of the basic concepts that you should know to understand how transactions are managed in a DDBMS?
Q:
Describe performance transparency and heterogeneity transparency.
Q:
Explain the difference between homogeneous and heterogeneous distributed database systems.
Q:
A fully distributed database management system must perform all of the functions of a centralized DBMS. What are these functions?
Q:
The ____________________ commit protocolguarantees that if a portion of a transaction operation cannot be committed, all changes made at the other sites participating in the transaction will be undone to maintain a consistent database state.
Q:
The database description, known as the distributed ____________________ schema, is the common database schema used by local TPs to translate user requests into subqueries (remote requests) that will be processed by different DPs.
Q:
The ____________________ fragment condition indicates that each row is unique, regardless of the fragment in which it is located.
Q:
If a DDBMS exhibits ____________________ transparency, the user does not need to know that the data are partitionedmeaning the table's rows and columns are split vertically or horizontally and stored among multiple sites.
Q:
Typically, the __________________________________________________ scenario requires a network file server running conventional applications that are accessed through a network.
Q:
The __________________________________________________ scenario is typical of most mainframe and midrange server computer DBMSs.
Q:
A transaction processor is also known as the ____________________ processor.
Q:
In a DDBMS, ____________________ control is used to manage simultaneous data access and ensure data consistency across database fragments.
Q:
In a DDBMS, query ____________________ is used to find the best access strategy.
Q:
In a DDBMS, ____________________ occurs to determine the data location of local and remote fragments.
Q:
____________________ management ensures that data move from one consistent state to another, including synchronization of local and remote transactions.
Q:
One of the advantages of a DDBMS is processor ____________________.
Q:
One of the advantages of a DDBMS is less danger of a single-____________________ failure.
Q:
A user-friendly ____________________ is one advantage of a DDBMS.
Q:
One of the advantages of a DDBMS is ____________________ operating cost.
Q:
A(n) ____ database stores each database fragment at a single site.a. partially replicated b. unreplicated c. fully replicatedd. partitioned
Q:
The ____ rule requires that all copies of data fragments be identical.a. shared fragment b. mutual consistency c. horizontal fragmentationd. replication
Q:
____ fragmentation refers to the division of a relation into attribute subsets.a. Data b. Horizontal c. Verticald. Mixed
Q:
____ fragmentation refers to the division of a relation into subsets of tuples.a. Vertical b. Horizontal c. Datad. Mixed
Q:
____ fragmentation allows you to break a single object into two or more segments or fragments.a. Horizontal b. Vertical c. Datad. Mixed
Q:
____ is the delay imposed by the amount of time required for a data packet to make a round trip from point A to point B.a. Data distribution b. Replica transparency c. Network latencyd. Network partitioning
Q:
The objective of ____ optimization is to minimize the total cost associated with the execution of a request.a. data b. remote c. transactiond. query
Q:
The ____ guarantees that if a portion of a transaction operation cannot be committed, all changes made at the other sites participating in the transaction will be undone to maintain a consistent database state.a. DO-UNDO-REDO protocol b. two-phase commit protocol (2PC) c. coordinator protocold. write-ahead protocol
Q:
The ability to execute a ____ request provides fully distributed database processing because you can partition a database table into several fragments.a. distributed b. transaction c. fragmentedd. transparent
Q:
A distributed ____ allows a transaction to reference several different remote database processing sites.a. request b. site c. data locationd. transaction
Q:
A ____ contains the description of the entire database as seen by the database administrator.a. distributed global dictionary b. distributed data dictionary c. distributed global schemad. distributed data schema
Q:
____ transparency exists when the end user or programmer must specify both the fragment names and their locations.a. Local mapping b. Location c. Performanced. Transaction
Q:
____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify where these fragments are located.a. Transaction b. Location c. Local mappingd. Fragmentation
Q:
____ transparency is the highest level of transparency. The end user or programmer does not need to know that a database is partitioned.a. Performance b. Fragmentation c. Locationd. Local mapping
Q:
____ transparency allows the integration of several different local DBMSs under a common, or global, schema.a. Transaction b. Performance c. Distributiond. Heterogeneity
Q:
____ transparency allows the system to perform as if it were a centralized database management system.a. Heterogeneity b. Distribution c. Performanced. Failure
Q:
____ transparency ensures that the system will continue to operate in the event of a node failure.a. Transaction b. Distribution c. Failured. Performance
Q:
____ transparency allows a transaction to update data at several network sites.a. Transaction b. Distribution c. Failured. Performance
Q:
____ transparency allows a distributed database to be treated as a single logical database.a. Distributionb. Transaction c. Failured. Performance
Q:
A ____ distributed database system will support different DBMSs that may even support different models running under different computer systems.a. fully heterogeneous b. fully homogeneous c. homogeneousd. heterogeneous
Q:
____ distributed database systems integrate different types of centralized DBMSs over a network.a. Homogeneous b. Heterogeneous c. Fully homogeneousd. Combination
Q:
____ distributed database systems integrate only one type of centralized DBMS over a network.a. Homogeneous b. Heterogeneous c. Fully heterogeneousd. Combination
Q:
The ____ scenario describes a fully distributed DBMS with support for multiple data processors and transaction processors at multiple sites.
a. multiple-site processing, single-site data
b. single-site processing, multiple-site data
c. single-site processing, single-site data
d. multiple-site processing, multiple-site data
Q:
Under the ____ scenario, multiple processes run on different computers sharing a single data repository.
a. single-site processing, single-site data
b. multiple-site processing, single-site data
c. single-site processing, multiple-site data
d. multiple-site processing, multiple-site data
Q:
The ____ processor is the software component residing on each computer that stores and retrieves data located at the site.a. transactionb. network c. datad. management
Q:
The ____ processor is the software component found in each computer that requests data. It receives and processes the application's data requests.a. database b. transaction c. datad. network
Q:
A distributed database is composed of several parts known as database ____.a. sections b. fragments c. partitionsd. parts
Q:
____ are an advantage of a DDBMS.a. Reduced operating costs b. Simplicity of management and control c. Decreased storage requirementsd. Decreased training costs
Q:
____ is a disadvantage of a DDBMS.a. Processor independence b. The graphical user interface c. Securityd. Data access that is too rapid
Q:
____ is a disadvantage of a DDBMS.
a. Data is located near the "greatest demand" site
b. Growth facilitation
c. Danger of a single-point failure
d. Lack of standards
Q:
A remote transaction, composed of several requests, may access data at multiple sites.