Examen Theory BASE DE DATOS

studied byStudied by 13 people
5.0(1)
get a hint
hint

While B tree structure is suitable for identifying indexing keys, for non-identifying indexing keys the B+ tree structure is preferable.

1 / 196

Tags & Description

Studying Progress

0%
New cards
197
Still learning
0
Almost done
0
Mastered
0
197 Terms
1
New cards

While B tree structure is suitable for identifying indexing keys, for non-identifying indexing keys the B+ tree structure is preferable.

TRUE

New cards
2
New cards

In a direct addressing organization, the privileged key is always an identifier.

TRUE

New cards
3
New cards

Distributed free space technique enables the update operation with fewer accesses in non-consecutive sequential organizations (as long as the sorting key is not modified).

TRUE

New cards
4
New cards

The bi-directional B+ tree can rotate both to the left node and to the right node.

FALSE

New cards
5
New cards

In a direct addressing organization, there are no collisions or overflows.

FALSE

New cards
6
New cards

The addressing space N must always be less than or equal to the cardinality of the domain on which the hashing key is defined. TRUE

TRUE

New cards
7
New cards

Saturation overflow management policies in hashed organizations increase the density of the data area.

TRUE

New cards
8
New cards

An index on the primary key is always a primary index

TRUE

New cards
9
New cards

The ideal density measures the goodness of the physical-logical design.

TRUE

New cards
10
New cards

The serial organization does not privilege any search key.

TRUE

New cards
11
New cards

In ORACLE, every tablespace is associated with a data file (datafile), and any data file can contain objects from different tablespaces

FALSE

New cards
12
New cards

In a non-identifying selection on serial organization, the greater  the number of search keys involved, the greater the cost of the process.

FALSE

New cards
13
New cards

A simple hashed organization has as many privileged search keys as attributes included in the Hashing Key.

FALSE

New cards
14
New cards

The search in a  multi-key hashed organization can only be carried out if it has been provided a value for each of the keys involved in the hashing.

FALSE

New cards
15
New cards

Although one session is keeping an RS lock on some rows of a table, another session can acquire an RX lock on the rest of the rows of that table and then delete some of them.

TRUE

New cards
16
New cards

All transactional databases must meet the ACID characteristics: availability, clarity, integrity and durability.

FALSE

New cards
17
New cards

B-tree is an ordered, balanced index which density can drop to 50%.

TRUE

New cards
18
New cards

Oracle's "hints" report on physical structures recommended by the DBMS to improve efficiency, so that the user can implement an improved physical design.

FALSE

New cards
19
New cards

SQL injection is a technique to protect the confidentiality of the database.

FALSE

New cards
20
New cards

Simple hashed organization has as many privileged keys as attributes included in the Hashing Key

FALSE

New cards
21
New cards

Overflow management with “bucket chaining” (extension) is a saturation type policy.

FALSE

New cards
22
New cards

Although one session is keeping an RS look on same of rows of a table, another session can acquire an RX lock of the rest of the rows of that table and then delete some of them.

TRUE

New cards
23
New cards

An expanded record is the one growing (in size) when an update is applied to it.

FALSE

New cards
24
New cards

Consecutive serial organization optimizes space usage.

TRUE

New cards
25
New cards

The selection of records through non-privileged search keys in any base organization (send, sequential, hashed) involves performing a full scan on the file.

TRUE

New cards
26
New cards

In a non-consecutive organization, smaller bucket space produces higher density

FALSE

New cards
27
New cards

Initially (before opening the file) the real density of a consecutive serial file is equal to the density of the same file with a consecutive sequential organization.

TRUE

New cards
28
New cards

In oracle, the parameters of PCTFREE and PCTUSED are complementary (add up to 100%).

FALSE

New cards
29
New cards

In a sequential organization, the sorting key should be an identifier (unless it compromises several fields).

FALSE

New cards
30
New cards

he bitmap processed with trivalued logic is a multikey index.

TRUE

New cards
31
New cards

A distributed database must always meet the three features defined by the CAP triangle (Consistency, Availability and Partition tolerance).

FALSE

New cards
32
New cards

In a direct addressing organization, the privilege key is always an identifier.

TRUE

New cards
33
New cards

In ORACLE, every tablespace is associated with a datafile and any datafile can contain objects from different tablespaces.

FALSE

New cards
34
New cards

n a cluster, every insertion operation involves a location operation.

TRUE

New cards
35
New cards

The ideal density (of a record) is always greater than or equal to the real density.

TRUE

New cards
36
New cards

Overflow management with “bucket chaining” (extensions) is a saturation type policy).

FALSE

New cards
37
New cards

In a non-consecutive sequential file, the virtual directory supports inserting empty buckets anywhere in the file.

TRUE

New cards
38
New cards

In a direct addressing organization, there are no collisions or overflows.

FALSE

New cards
39
New cards

The difference between B tree and B* tree is structural (node design), and so B* tree has a higher order (for the same file and indexation key)

FALSE

New cards
40
New cards

An index on an alternative superkey is a secondary index.

FALSE

New cards
41
New cards

The concept of 'bucket extent' in non-consecutive organizations is analogous to the concept of 'blocking factor' in consecutive organizations.

TRUE

New cards
42
New cards

The 'cell partitioning' is part of the binary search algorithm, which divides the search space in half on each access.

FALSE

New cards
43
New cards

Searching using secondary indexes can return a multiple result (several addresses), and if they were too many addresses, it could be less efficient than a full scan.

TRUE

New cards
44
New cards

The selection of records through non-privileged search keys in any base organization (serial, sequential, hashed) involves performing a FULL SCAN of the file.

TRUE

New cards
45
New cards

Overflow management with “bucket chaining” (extensions) is a saturation type policy.

FALSE

New cards
46
New cards

Initially (before operating the file) the real density of a consecutive serial file is equal to the density of the same file with consecutive sequential organization.

TRUE

New cards
47
New cards

A 'partial index' only indexes some privileged records, and therefore searches using it can fail, requiring a secondary retrieval mechanism.

TRUE

New cards
48
New cards

In Relative Direct Addressing, the hash key is the bucket address

FALSE

New cards
49
New cards

A good hash function can improve density

TRUE

New cards
50
New cards

Higher BS will result in higher density and more overflow records

FALSE

New cards
51
New cards

Values that produce the same address for a given hash are called homonymous keys

FALSE

New cards
52
New cards

For the update, if the new record doesn't fit, will it be located and rewritten?

FALSE

New cards
53
New cards

We have a parent overflow policy that is based on the zone in which the overflow record will be stored

TRUE

New cards
54
New cards

If the overflow register does not conform to the new computed address, it will be called bounce

TRUE

New cards
55
New cards

Through chained saturation, individual (flyover) records are pointed (record chaining), therefore requiring relative double-precision pointers

TRUE

New cards
56
New cards

Will auxiliary storage result in decreased efficiency of the location?

TRUE

New cards
57
New cards

In record chaining, the records in the overflow area are stored serially

TRUE

New cards
58
New cards

The symbolic identifier pointer, which is a logical identification of a record, is used to identify physical records

FALSE

New cards
59
New cards

Is input a file consisting of inputs?

FALSE

New cards
60
New cards

INDEX is a file consisting of entries and its entries are related to a single record

TRUE

New cards
61
New cards

Is one of the disadvantages of indices that the hit ratio will increase using the index?

FALSE

New cards
62
New cards

Index requires auxiliary storage

TRUE

New cards
63
New cards

Simple dense index cost depending on its structure

TRUE

New cards
64
New cards

Depending on the coverage of the index, they could be primary and Partial index

FALSE

New cards
65
New cards

Binary tree on secondary storage, showing neighborhood and balance problems?

TRUE

New cards
66
New cards

Does the relational DBMS use logical (symbolic) pointers and is it a truly accessible technology?

TRUE

New cards
67
New cards

Relational DBMS developed in the late 60's, and used during the 70's?

FALSE

New cards
68
New cards

Oracle V1-V2 as the first "commercial" RDBMS was born during 1978-79 ?

TRUE

New cards
69
New cards

DBMS is a collection of information that is organized so that it can be easily accessed, managed and updated?

FALSE

New cards
70
New cards

PL/SQL is an extension of SQL?

TRUE

New cards
71
New cards

In 1983 the client-server architecture and the distributed database were introduced in oracle?

FALSE

New cards
72
New cards

Does each data file have a segment and each segment consists of several extensions?

TRUE

New cards
73
New cards

Within the table space, only one data file can be included

FALSE

New cards
74
New cards

DB-block can take one of five sizes: 4 KB, 8 KB, 16 KB, 32 KB and 64 KB ?

TRUE

New cards
75
New cards

Isn't it necessary for a DBA to master database technologies?

TRUE

New cards
76
New cards

Can the table space be temporary?

TRUE

New cards
77
New cards

Is the index selection problem (ISP) part of the logical design?

FALSE

New cards
78
New cards

Clustered Bitmap Should it be applied on volatile objects?

FALSE

New cards
79
New cards

Should a cluster be created before creating the table?

TRUE

New cards
80
New cards

One of the advantages of clustering is that access to the combined rows is much more efficient?

TRUE

New cards
81
New cards

Can the cluster be indexed or hashed and the logs kept sorted in their bucket?

TRUE

New cards
82
New cards

Do HINTS allow the DBMS to automatically choose when planning how to solve the sentence?

FALSE

New cards
83
New cards

Variety is not a feature of big data?

FALSE

New cards
84
New cards

Big data is a set of techniques and technologies required to process high volumes of data?

TRUE

New cards
85
New cards

Classic RDBMS have partition tolerance and availability in CAP theorem

FALSE

New cards
86
New cards

Real-Time Analytic Processing is good for long term decisions?

FALSE

New cards
87
New cards

In OLTP sometimes integrity could be lost?

FALSE

New cards
88
New cards

The cluster can be indexed, or hashed , and records can be kept sorted in their bucket?

TRUE

New cards
89
New cards

One of the advantages of clusters is that access to combined rows is much more efficient?

TRUE

New cards
90
New cards

The cluster ensures that none of the joint rows for any given value of the cluster is physically stored within

FALSE

New cards
91
New cards

If we are using connection string, it is better not to use try {…} catch {…} structure?

FALSE

New cards
92
New cards

Granting minimum privileges can be beneficial for preventing sql injection?

TRUE

New cards
93
New cards

Creating views for running queries, and to_do tables for batching writes can not help preventing sql injection

FALSE

New cards
94
New cards

Clustered Bitmap Should be applied on volatile objects?

FALSE

New cards
95
New cards

Tablespace can be temporal ?

TRUE

New cards
96
New cards

Inside table space, only one datafiles can be included

FALSE

New cards
97
New cards

Each data file has a segment and each segment consist of several extensions?

TRUE

New cards
98
New cards

Binary tree on secondary storage, shows vicinity and balancing problems?

TRUE

New cards
99
New cards

Index requires Auxiliary Storage

TRUE

New cards
100
New cards

Entry is an archive consisting of entries?

FALSE

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 1180 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 32 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4218 people
Updated ... ago
4.8 Stars(43)

Explore top flashcards

flashcards Flashcard35 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard63 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard31 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard69 terms
studied byStudied by 293 people
Updated ... ago
4.8 Stars(5)
flashcards Flashcard68 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard91 terms
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 72 people
Updated ... ago
4.8 Stars(8)
flashcards Flashcard317 terms
studied byStudied by 93 people
Updated ... ago
5.0 Stars(1)