Professional Documents
Culture Documents
EXAMINATION
Computer Science
3413 FA
SUBJECT
Type of Examination:
Computer Science
DEPARTMENT OF
Dr. F. Allaire
INSTRUCTOR
Only the last two pages of this examination paper MAY be taken from the examination
room.
The Department of Computer Science regards cheating as a serious matter, one
requiring strong counteraction. The Department requires its instructors to report
all instances of cheating to the Chairman, who shall seek a severe penalty
consistent with the offense and the evidence, up to and including expulsion from
the University, under the terms and procedures of the Lakehead University Code
of Student Behavior and Disciplinary Procedures, 1985.
Students please note:
YOU MUST count the number of pages in this question paper BEFORE beginning to
write, and report any discrepancy immediately to a proctor.
This is page 1 of 8
Name __________________________________
Page 2
Name __________________________________
Page 3
Organizations adopt data mart architectures because it
is easier to have separate, small data warehouses than to
get all organizational parties to agree to one view of
the organization in a central data warehouse.
TRUE
FALSE
An operational data store is typically a relational
database and normalized, but it is tuned for decisionmaking applications.
TRUE
FALSE
Logical data marts are physically separate databases
from the enterprise data warehouse.
TRUE
FALSE
Scalable technology is critical to a data mart.
TRUE
FALSE
SHORT ANSWER: Write the word or phrase from this exams final page that best
completes each statement or answers the question. [30 marks ]
Databases are an organized collection of ________
_____________ data.
____________________________ .
Name __________________________________
Page 4
Adding the keyword _______________ to an SQL
query will eliminate duplicate rows from the query result
set.
Controls incorporated into a data management system
that restrict access to data are called
_________ __________ .
The coding or scrambling of data so that humans
cannot read them is called _____.
A ______________ _________________ measures
or detects personal characteristics such as fingerprints.
An audit trail of transactions and database changes is
kept by a _________________ _________________.
A(n) _____________ _____________ is a facility by
which the DBMS refuses to accept any new
transactions.
The _____________________________________ is
a set of commands used to define a database.
_________________________________________ .
a ________________ _________________.
______________ ___________________ is a
constraint that specifies that the value of an attribute
in one relation depends upon the presence of that value
as a primary key in the same or other relation.
Name __________________________________
Page 5
MULTIPLE CHOICE: Choose the one alternative that best completes the statement or
answers the question. [15 marks]
Data modeling may be the most important part of the
systems development process because:
A)
data characteristics are important in the design
of programs and other systems components.
B)
the data in a system are generally less complex
than processes, and play a central role in development.
C)
data are less stable than processes.
D)
it is the easiest
Which of the following is NOT a characteristic of a good
business rule?
A)
Declarative
B)
Atomic
C)
Inconsistent
D)
Expressible
An entity type whose existence depends on another
entity type is called a(n) _____ entity.
A)
strong
B)
weak
C)
codependent
D)
variant
A property or characteristic of an entity type that is of
interest to the organization is called a(n):
A)
attribute.
B)
coexisting entity.
C)
relationship.
D)
cross-function.
A persons name, birthday, and social security number
are all examples of :
A)
attributes.
B)
entities.
C)
relationships.
D)
descriptors.
An attribute that can be broken down into smaller parts
is called a(n) _____ attribute.
A)
associative
B)
simple
C)
composite
D)
complex
An attribute that can be calculated from related attribute
values is called a(n) _____ attribute.
A)
simple
B)
composite
C)
multivalued
D)
derived
Name __________________________________
Page 6
In order to establish client/server security:
A)
Network security must be established
B)
Biometric authentication must be used
C)
Server security must be established
D)
Both A and C
High quality data are data that are
A)
Accurate
B)
Consistent
C)
Available in a timely fashion
D)
All of the above
One characteristic of quality data which pertains to the
expectation for the time between when data are expected
and when they are available for use is:
A)
Currency
B)
Consistency
C)
Referential Integrity
D)
Timeliness
A person assigned the responsibility of ensuring data
quality in the organization is called a(n):
A)
Data steward
B)
Data manager
C)
Database administrator
D)
Business analyst
When creating a sound data model, entity types should
represent and be named after:
A)
The role that the entity plays in a context
B)
The underlying object
C)
Random events
D)
Actors
The major advantage of data propagation is:
A)
Real-time cascading of data changes throughout
the organization.
B)
Duplication of non-redundant data
C)
The ability to have trickle-feeds
D)
None of the above
An approach to filling a data warehouse that employs
bulk rewriting of the target data periodically is called:
A)
dump mode.
B)
overwrite mode.
C)
refresh mode.
D)
update mode.
Data may be loaded from the staging area into the
warehouse by following:
A)
SQL Commands (Insert/Update)
B)
Special load utilities
C)
Custom-written routines
D)
All of the above
Name __________________________________
Page 7
Security at Lakehead U maintains a list of parking tickets issued to vehicles parked illegally on campus. The
following table shows a portion of this list for Sept.-Nov. 2010. Attribute names are abbreviated to conserve space.
a.
Convert this table to first normal form by entering appropriate data into the table.
b.
What are the functional dependencies in this 1NF relation?
c.
What are the determinants in this 1NF relation?
d.
Draw a dependency diagram that shows all the functional dependencies in this 1NF relation, based on the
sample data shown.
e.
Give an example of two anomalies that can result in using this 1NF relation.
f.
Develop a set of relations in 3NF containing the same information as your 1NF table. Include in your set a
new column with the heading Violation which contains the reason for each ticket. Values in this column are: expired
parking meter (ticket code 1), no parking permit (ticket code 2) and handicap violation (ticket code 3).
g.
Draw an E-R diagram with the appropriate cardinality notations.
h.
Explain why the anomalies you listed in e. no longer are possible.
i.
Explain two problems with this design and how it can be repaired.
2.
For these SQL commands, DO NOT use INNER JOIN or NATURAL JOIN ala MSAccess, but rather express these
join conditions as a part of the WHERE clause.
a.
Write an SQL command to display the order number, customer number, order date, and items ordered
(Product ID and Description) for orders numbered 1101 to 1122 inclusive.
b.
List, in alphabetical order, the names of all employees (managers) who are now supervising people with skill
ID BS12; List each managers name only once, even if that manager supervises several people with this skill.
c.
Redo b, but this time include the managers themselves if they have skill BS12, even though none of the
employees they manage has skill BS12
d
Write an SQL query to produce a list of all products (Product ID and Description), and the number of times
each product has been ordered in the last 6 months.(todaysDate() - order.OrderDate <=183)
e.
Display the pairs of names of customers who live in the same zip code. Make sure that each pair of such
customers is listed only once, and customers who are the only one in a zip code are not listed at all.
features
file description
files
FROM
growing; shrinking
industry specific
journalizing facility
locked
logically related
metadata
one-row
ORDER BY
personal
redundancy
referential integrity
relation
restore/rerun
rows
SELECT
share
SORT BY
subtype
supertype
transaction boundary
true
universal
values
WHERE