Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CIW 1D0-541 Exam - Cheat-Test.com

Free 1D0-541 Sample Questions:

Q: 1
Which three pieces of information did E.F. Codd describe as necessary to retrieve a data value from a relational database?

A. Attribute, domain, and tuple
B. Entity, relation name, and domain
C. Table name, primary key, and entity
D. Attribute, relation name, and primary key

Answer: D

Q: 2
Which pair of relational algebraic operations requires union compatibility?

A. Union and join
B. Selection and projection
C. Intersection and difference
D. Cartesian product and intersection

Answer: C

Q: 3
Which term describes one or more database operations that are executed as a single unit?

A. Update
B. Transaction
C. Encapsulation
D. Operational group

Answer: B

Q: 4
Which statement best describes a candidate key?
A. It is the primary key for an entity.
B. It uniquely identifies every instance of an entity.
C. One or more keys are joined together to form a composite key.
D. One or more keys may be used to form a primary key.

Answer: D

Q: 5
Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?

A. Backups
B. User views
C. Encryption
D. Integrity controls

Answer: C

Q: 6
Which process is used to prevent the current database operation from reading or writing a data item while that data item is being accessed by another operation?

A. Lock
B. Deadlock
C. Time stamp
D. Transaction

Answer: A

Q: 7
Which of the following best describes the two-tier database architecture?

A. The user accesses a database server using a terminal.
B. The user interface, data-processing logic, database access and data validation functions are performed on a mainframe server.
C. The user interface and data validation functions are performed by the client whereas the data-processing logic is performed on a server.
D. The user interface and data-processing logic are performed by the client whereas the server handles database access and data validation functions.

Answer: D

Q: 8
Your enterprise must decide whether to use a database management system. Which of the following best describes the functionality of a DBMS?

A. A DBMS provides the ability to control data access and limit the number of users at one time.
B. A DBMS provides the ability to maintain databases while providing increased security for the database.
C. A DBMS allows users to access the database while allowing the database administrator to define views particular to individual sets of users.
D. A DBMS provides the ability to define, create and maintain databases while providing controlled access to databases.

Answer: D

Q: 9
Which concurrency control method should be used only when conflicts between transactions rarely occur?

A. Locking
B. Time stamps
C. Optimistic
D. Serialization

Answer: C

Q: 10
Consider the following database information:

domain s_id: integer
domain grd: fixed length character string length 1

STUDENT_GRADE(
Student_Number: s_id NOT NULL
Grade: grd )
Primary Key Student_Number

During which phase of the database design process would this information be developed?

A. Logical
B. Physical
C. Conceptual
D. Implementation

Answer: A

Q: 11
Which of the following best describes a composite key?

A. A composite key is a primary key that consists of the first two attributes of a relation.
B. A composite key is a primary or foreign key defined by its parent keys.
C. A composite key is a foreign key that consists of the same attributes as the primary key from a related table.
D. A composite key is a primary or foreign key that consists of two or more attributes of a relation.

Answer: D

Q: 12
Your enterprise has reached the conceptual design phase for a database project. What is the desired goal at the end of this design phase?

A. A set of normalized relations
B. A reviewed entity-relationship (ER) model
C. An entity-relationship (ER) model with no redundant data
D. A set of denormalized relations

Answer: B

Q: 13
Which subset of Structured Query Language (SQL) is used to limit access to a database or its data?

A. Data Markup Language
B. Data Control Language
C. Data Formatting Language
D. Data Manipulation Language

Answer: B

Q: 14
Which of the following definitions best describes an entity?

A. A relation
B. Data about data
C. Data stored in a table column
D. An item about which information is stored

Answer: D

Q: 15
Which of the following occurs in a relation when records are added or removed?

A. The number of domains changes.
B. The attributes in the domain change.
C. The cardinality of the relation is fixed but the degree varies.
D. The degree of the relation is fixed but the cardinality varies.

Answer: D

Q: 16
What is the most important service provided by a database management system?

A. Provides support for a data manipulation language
B. Allows users to store data in a distributed data repository
C. Provides support for data formatting language commands
D. Translates procedural commands into non-procedural commands

Answer: A

Q: 17
Which database architecture is best suited to implementation in the World Wide Web environment?

A. Two-tier using thin client
B. Three-tier using fat client
C. Three-tier using thin client
D. Centralized mainframe with terminal client

Answer: C


© 2014 Cheat-Test.com, All Rights Reserved