Browse Definitions :
Quiz

Quiz: Database II

Some of you may have found our "Quiz: Database Basics" not quite challenging enough, so here's a tougher one. Good luck!

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text somewhere in the definition.
OR
- Check your answers by using the answer key at the end of the quiz.

1) At this level of normalization, each column in a table that is not a determiner of the contents of another column, must itself be a function of the other columns in the table.
a) 1NF
b) 2NF
c) 3NF
d) DKNF

2) This method of online analytical processing stores data in both a relational and a multimdimensional database.
a) HOLAP
b) ROLAP
c) OLAP
d) DIMM

3) Which technology was Microsoft's first attempt at an object-oriented database interface?
a) MQSeries
b) ADO
c) DAO
d) UDA

4) What concept would a data modeler NOT be expected to know?
a) class
b) object
c) UML
d) FMP

5) Which of the following tree structures is unique in that the tree organization varies depending on which nodes are most frequently accessed?
a) B-tree
b) binary tree
c) quad tree
d) splay tree

6) The basic unit of this SQL variant is called a block.
a) PL/SQL
b) XQL
c) SQLJ
d) TMQL

7) The acronym ACID is typically used in reference to:
a) transactions
b) CRM analytics
c) data integrity
d) stubs

8) A Database Management System (DBMS) may be used by, or combined with, this type of transaction manager.
a) DB2
b) CICS
c) Oracle
d) Cognos

9) Encapsulation, types, classes, inheritance, overriding combined with late binding, and extensibility are all features of this type of database.
a) multidimensional database
b) relational database
c) object-oriented
d) open source

10) A programmer using this type of middleware might need the Interface Definition Language (IDL).
a) RPC
b) ORB
c) MUD
d) EAI

 

Scroll down for answer key:

 

 

 

 

 

 

 

ANSWERS: 1b;2a;3c;4d;5d;6a;7a;8b;9c;10b
Let us know how you did! [email protected]

This was last updated in August 2008

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close