D427 /C170 WGU DATA MANAGEMENT – APPLICATIONS QUESTIONS
AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)|ALREADY
GRADED A+
A salesperson is authorized to sell many products and a product can be sold by many salespersons.
Which kind of binary relationship does this scenario describe?
One-to-one
One-to-many
Many-to-many
One-to-one binary - CORRECT ANSWER✔✔Many-to-many
Which two examples are attributes?
Choose 2 answers
A person attending a meeting
An employee number
A sales meeting
A meeting code - CORRECT ANSWER✔✔An employee number
A meeting code
Which delete rule sets column values in a child table to a missing value when the matching data is deleted
from the parent table?
Restrict
Cascade
Matching
Set-to-Null - CORRECT ANSWER✔✔Set-to-Null
Refer to the given SQL statement.
CREATE TABLE member
(
,member_id INT UNSIGNED NOT NULL AUTO_INCREMENT,
PRIMARY KEY (member_id),
last_name VARCHAR(20) NOT NULL,
first_name VARCHAR(20) NOT NULL,
suffix VARCHAR(5) NULL,
expiration DATE NULL,
email VARCHAR(100) NULL,
street VARCHAR(50) NULL,
city VARCHAR(50) NULL,
state VARCHAR(2) NULL,
zip VARCHAR(10) NULL,
phone VARCHAR(20) NULL,
interests VARCHAR(255) NULL
);
Which two columns are created as something other than variable-length strings in this statement?
Choose 2 answers
member_id
last name
suffix
expiration
email
city - CORRECT ANSWER✔✔member_id
expiration
Employee_ID Employee_Name Office_Address
12342 Jacob 54123 Main Street
12346 Michael 354 Center Avenue
12846 Ethan 54123 Main Street
12887 Joshua 54123 Main Street
12894 Daniel 354 Center Avenue
13097 Alexander 354 Center Avenue
13112 Anthony 54123 Main Street
13411 William 354 Center Avenue
13987 Christopher 354 Center Avenue
13998 Matthew 54123 Main Street
, This database table has ten different employee numbers in the first column. Employee_ID is the primary
key. In addition, it has ten different names in the second column and two office addresses repeated five
times each in the third column.
Which action should be used to translate this data into third normal form?
Move the data from the third column into the first column.
Move the data from the third column into its own table.
Move the data from the first two columns into separate tables.
Move the data from the second column into the third column. - CORRECT ANSWER✔✔Move the data
from the third column into its own table.
A database manager starts to convert data that has been normalized into a form that conforms to the
relational model. A simple primary key has been established and all the repeating groups have been
deleted.
In which form is this data?
First normal form
Second normal form
Third normal form
Fourth normal form - CORRECT ANSWER✔✔Second normal form
Two attributes in two related tables have the exact same domain of values. The attribute is a primary key
in one table.
Which kind of key is the attribute in the other table?
Foreign
Primary
Compound
Composite - CORRECT ANSWER✔✔Foreign
When a product is deleted from the product table, all corresponding rows for the product in the pricing
table are deleted automatically as well.
What is this referential integrity technique called?
AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)|ALREADY
GRADED A+
A salesperson is authorized to sell many products and a product can be sold by many salespersons.
Which kind of binary relationship does this scenario describe?
One-to-one
One-to-many
Many-to-many
One-to-one binary - CORRECT ANSWER✔✔Many-to-many
Which two examples are attributes?
Choose 2 answers
A person attending a meeting
An employee number
A sales meeting
A meeting code - CORRECT ANSWER✔✔An employee number
A meeting code
Which delete rule sets column values in a child table to a missing value when the matching data is deleted
from the parent table?
Restrict
Cascade
Matching
Set-to-Null - CORRECT ANSWER✔✔Set-to-Null
Refer to the given SQL statement.
CREATE TABLE member
(
,member_id INT UNSIGNED NOT NULL AUTO_INCREMENT,
PRIMARY KEY (member_id),
last_name VARCHAR(20) NOT NULL,
first_name VARCHAR(20) NOT NULL,
suffix VARCHAR(5) NULL,
expiration DATE NULL,
email VARCHAR(100) NULL,
street VARCHAR(50) NULL,
city VARCHAR(50) NULL,
state VARCHAR(2) NULL,
zip VARCHAR(10) NULL,
phone VARCHAR(20) NULL,
interests VARCHAR(255) NULL
);
Which two columns are created as something other than variable-length strings in this statement?
Choose 2 answers
member_id
last name
suffix
expiration
city - CORRECT ANSWER✔✔member_id
expiration
Employee_ID Employee_Name Office_Address
12342 Jacob 54123 Main Street
12346 Michael 354 Center Avenue
12846 Ethan 54123 Main Street
12887 Joshua 54123 Main Street
12894 Daniel 354 Center Avenue
13097 Alexander 354 Center Avenue
13112 Anthony 54123 Main Street
13411 William 354 Center Avenue
13987 Christopher 354 Center Avenue
13998 Matthew 54123 Main Street
, This database table has ten different employee numbers in the first column. Employee_ID is the primary
key. In addition, it has ten different names in the second column and two office addresses repeated five
times each in the third column.
Which action should be used to translate this data into third normal form?
Move the data from the third column into the first column.
Move the data from the third column into its own table.
Move the data from the first two columns into separate tables.
Move the data from the second column into the third column. - CORRECT ANSWER✔✔Move the data
from the third column into its own table.
A database manager starts to convert data that has been normalized into a form that conforms to the
relational model. A simple primary key has been established and all the repeating groups have been
deleted.
In which form is this data?
First normal form
Second normal form
Third normal form
Fourth normal form - CORRECT ANSWER✔✔Second normal form
Two attributes in two related tables have the exact same domain of values. The attribute is a primary key
in one table.
Which kind of key is the attribute in the other table?
Foreign
Primary
Compound
Composite - CORRECT ANSWER✔✔Foreign
When a product is deleted from the product table, all corresponding rows for the product in the pricing
table are deleted automatically as well.
What is this referential integrity technique called?