ALREADY GRADED A+
By default, when Microsoft Access creates a relationship between two tables it creates a(n)
________ relationship. 1:N
For a(n) ________ weak entity, it is necessary to add the key of the parent entity to the weak
entity's relation so that this added attribute becomes part of the weak entity's key. ID-
Dependent
The recovery method where the database is restored using the saved data, and all transactions
since the save are reapplied is called ________ recovery. rollforward
Microsoft Access 2019 can secure databases by using ________ to encrypt and decrypt the
database files. passwords
The recovery method in which we undo the changes that erroneous or partially processed
transactions have made in the database is called ________ recovery. rollback
Microsoft Access 2019 can secure database files by creating ________. trusted locations
Database administrators must make sure that ________ and ________ techniques and
procedures are operating to protect the database in case of failure and to recover it as quickly
and accurately as possible when necessary. backup; recovery
Serializable transactions are created by having a(n) ________ phase, in which locks are
obtained, and a(n) ________ phase, in which locks are released. growing; shrinking
, A(n) ________ cursor takes a snapshot of a relation and processes that snapshot, while changes
from other sources are not visible to this type of cursor. static
Transaction results are kept in a(n) ________, which contains records of the data changes in
chronological order. log
One of the major tasks of the database administration is called ________ control, which allows
multiple users to access the database simultaneously. concurrency
Database administrators must make sure that ________ measures are in place and enforced so
that only authorized users can take authorized actions at appropriate times. security
Business Intelligence (BI) systems obtain data in ________ different ways. three
Distributed databases can be distributed by partitioning and ________. replication
Business Intelligence (BI) ________ uses sophisticated statistical and mathematical techniques
to perform what-if analyses, to make predictions, and to facilitate decision making. data
mining
________ provides the ability to sum, count, average and perform other simple arithmetic
operations on groups of data. OLAP (online analytical processing)
Problematic data are called ________. dirty data
Objects have ________, which are computer programs that perform some task. methods