While B tree structure is suitable for identifying indexing keys, for non-identifying indexing keys the B+ tree structure is preferable.
TRUE
2
New cards
In a direct addressing organization, the privileged key is always an identifier.
TRUE
3
New cards
Distributed free space technique enables the update operation with fewer accesses in non-consecutive sequential organizations (as long as the sorting key is not modified).
TRUE
4
New cards
The bi-directional B+ tree can rotate both to the left node and to the right node.
FALSE
5
New cards
In a direct addressing organization, there are no collisions or overflows.
FALSE
6
New cards
The addressing space N must always be less than or equal to the cardinality of the domain on which the hashing key is defined. TRUE
TRUE
7
New cards
Saturation overflow management policies in hashed organizations increase the density of the data area.
TRUE
8
New cards
An index on the primary key is always a primary index
TRUE
9
New cards
The ideal density measures the goodness of the physical-logical design.
TRUE
10
New cards
The serial organization does not privilege any search key.
TRUE
11
New cards
In ORACLE, every tablespace is associated with a data file (datafile), and any data file can contain objects from different tablespaces
FALSE
12
New cards
In a non-identifying selection on serial organization, the greater the number of search keys involved, the greater the cost of the process.
FALSE
13
New cards
A simple hashed organization has as many privileged search keys as attributes included in the Hashing Key.
FALSE
14
New cards
The search in a multi-key hashed organization can only be carried out if it has been provided a value for each of the keys involved in the hashing.
FALSE
15
New cards
Although one session is keeping an RS lock on some rows of a table, another session can acquire an RX lock on the rest of the rows of that table and then delete some of them.
TRUE
16
New cards
All transactional databases must meet the ACID characteristics: availability, clarity, integrity and durability.
FALSE
17
New cards
B-tree is an ordered, balanced index which density can drop to 50%.
TRUE
18
New cards
Oracle's "hints" report on physical structures recommended by the DBMS to improve efficiency, so that the user can implement an improved physical design.
FALSE
19
New cards
SQL injection is a technique to protect the confidentiality of the database.
FALSE
20
New cards
Simple hashed organization has as many privileged keys as attributes included in the Hashing Key
FALSE
21
New cards
Overflow management with “bucket chaining” (extension) is a saturation type policy.
FALSE
22
New cards
Although one session is keeping an RS look on same of rows of a table, another session can acquire an RX lock of the rest of the rows of that table and then delete some of them.
TRUE
23
New cards
An expanded record is the one growing (in size) when an update is applied to it.
FALSE
24
New cards
Consecutive serial organization optimizes space usage.
TRUE
25
New cards
The selection of records through non-privileged search keys in any base organization (send, sequential, hashed) involves performing a full scan on the file.
TRUE
26
New cards
In a non-consecutive organization, smaller bucket space produces higher density
FALSE
27
New cards
Initially (before opening the file) the real density of a consecutive serial file is equal to the density of the same file with a consecutive sequential organization.
TRUE
28
New cards
In oracle, the parameters of PCTFREE and PCTUSED are complementary (add up to 100%).
FALSE
29
New cards
In a sequential organization, the sorting key should be an identifier (unless it compromises several fields).
FALSE
30
New cards
he bitmap processed with trivalued logic is a multikey index.
TRUE
31
New cards
A distributed database must always meet the three features defined by the CAP triangle (Consistency, Availability and Partition tolerance).
FALSE
32
New cards
In a direct addressing organization, the privilege key is always an identifier.
TRUE
33
New cards
In ORACLE, every tablespace is associated with a datafile and any datafile can contain objects from different tablespaces.
FALSE
34
New cards
n a cluster, every insertion operation involves a location operation.
TRUE
35
New cards
The ideal density (of a record) is always greater than or equal to the real density.
TRUE
36
New cards
Overflow management with “bucket chaining” (extensions) is a saturation type policy).
FALSE
37
New cards
In a non-consecutive sequential file, the virtual directory supports inserting empty buckets anywhere in the file.
TRUE
38
New cards
In a direct addressing organization, there are no collisions or overflows.
FALSE
39
New cards
The difference between B tree and B\* tree is structural (node design), and so B\* tree has a higher order (for the same file and indexation key)
FALSE
40
New cards
An index on an alternative superkey is a secondary index.
FALSE
41
New cards
The concept of 'bucket extent' in non-consecutive organizations is analogous to the concept of 'blocking factor' in consecutive organizations.
TRUE
42
New cards
The 'cell partitioning' is part of the binary search algorithm, which divides the search space in half on each access.
FALSE
43
New cards
Searching using secondary indexes can return a multiple result (several addresses), and if they were too many addresses, it could be less efficient than a full scan.
TRUE
44
New cards
The selection of records through non-privileged search keys in any base organization (serial, sequential, hashed) involves performing a FULL SCAN of the file.
TRUE
45
New cards
Overflow management with “bucket chaining” (extensions) is a saturation type policy.
FALSE
46
New cards
Initially (before operating the file) the real density of a consecutive serial file is equal to the density of the same file with consecutive sequential organization.
TRUE
47
New cards
A 'partial index' only indexes some privileged records, and therefore searches using it can fail, requiring a secondary retrieval mechanism.
TRUE
48
New cards
In Relative Direct Addressing, the hash key is the bucket address
FALSE
49
New cards
A good hash function can improve density
TRUE
50
New cards
Higher BS will result in higher density and more overflow records
FALSE
51
New cards
Values that produce the same address for a given hash are called homonymous keys
FALSE
52
New cards
For the update, if the new record doesn't fit, will it be located and rewritten?
FALSE
53
New cards
We have a parent overflow policy that is based on the zone in which the overflow record will be stored
TRUE
54
New cards
If the overflow register does not conform to the new computed address, it will be called bounce
TRUE
55
New cards
Through chained saturation, individual (flyover) records are pointed (record chaining), therefore requiring relative double-precision pointers
TRUE
56
New cards
Will auxiliary storage result in decreased efficiency of the location?
TRUE
57
New cards
In record chaining, the records in the overflow area are stored serially
TRUE
58
New cards
The symbolic identifier pointer, which is a logical identification of a record, is used to identify physical records
FALSE
59
New cards
Is input a file consisting of inputs?
FALSE
60
New cards
INDEX is a file consisting of entries and its entries are related to a single record
TRUE
61
New cards
Is one of the disadvantages of indices that the hit ratio will increase using the index?
FALSE
62
New cards
Index requires auxiliary storage
TRUE
63
New cards
Simple dense index cost depending on its structure
TRUE
64
New cards
Depending on the coverage of the index, they could be primary and Partial index
FALSE
65
New cards
Binary tree on secondary storage, showing neighborhood and balance problems?
TRUE
66
New cards
Does the relational DBMS use logical (symbolic) pointers and is it a truly accessible technology?
TRUE
67
New cards
Relational DBMS developed in the late 60's, and used during the 70's?
FALSE
68
New cards
Oracle V1-V2 as the first "commercial" RDBMS was born during 1978-79 ?
TRUE
69
New cards
DBMS is a collection of information that is organized so that it can be easily accessed, managed and updated?
FALSE
70
New cards
PL/SQL is an extension of SQL?
TRUE
71
New cards
In 1983 the client-server architecture and the distributed database were introduced in oracle?
FALSE
72
New cards
Does each data file have a segment and each segment consists of several extensions?
TRUE
73
New cards
Within the table space, only one data file can be included
FALSE
74
New cards
DB-block can take one of five sizes: 4 KB, 8 KB, 16 KB, 32 KB and 64 KB ?
TRUE
75
New cards
Isn't it necessary for a DBA to master database technologies?
TRUE
76
New cards
Can the table space be temporary?
TRUE
77
New cards
Is the index selection problem (ISP) part of the logical design?
FALSE
78
New cards
Clustered Bitmap Should it be applied on volatile objects?
FALSE
79
New cards
Should a cluster be created before creating the table?
TRUE
80
New cards
One of the advantages of clustering is that access to the combined rows is much more efficient?
TRUE
81
New cards
Can the cluster be indexed or hashed and the logs kept sorted in their bucket?
TRUE
82
New cards
Do HINTS allow the DBMS to automatically choose when planning how to solve the sentence?
FALSE
83
New cards
Variety is not a feature of big data?
FALSE
84
New cards
Big data is a set of techniques and technologies required to process high volumes of data?
TRUE
85
New cards
Classic RDBMS have partition tolerance and availability in CAP theorem
FALSE
86
New cards
Real-Time Analytic Processing is good for long term decisions?
FALSE
87
New cards
In OLTP sometimes integrity could be lost?
FALSE
88
New cards
The cluster can be indexed, or hashed , and records can be kept sorted in their bucket?
TRUE
89
New cards
One of the advantages of clusters is that access to combined rows is much more efficient?
TRUE
90
New cards
The cluster ensures that none of the joint rows for any given value of the cluster is physically stored within
FALSE
91
New cards
If we are using connection string, it is better not to use try {…} catch {…} structure?
FALSE
92
New cards
Granting minimum privileges can be beneficial for preventing sql injection?
TRUE
93
New cards
Creating views for running queries, and to_do tables for batching writes can not help preventing sql injection
FALSE
94
New cards
Clustered Bitmap Should be applied on volatile objects?
FALSE
95
New cards
Tablespace can be temporal ?
TRUE
96
New cards
Inside table space, only one datafiles can be included
FALSE
97
New cards
Each data file has a segment and each segment consist of several extensions?
TRUE
98
New cards
Binary tree on secondary storage, shows vicinity and balancing problems?