Pack
WGU C170 AND C468
DATA MANAGEMENT APPLICATION ALREADY PASSED
[Montrer plus]DATA MANAGEMENT APPLICATION ALREADY PASSED
[Montrer plus]AREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
Aperçu 4 sur 31 pages
Ajouter au panierAREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
AREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
Aperçu 4 sur 31 pages
Ajouter au panierAREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
Syntax for updating a specific column in a specific row - UPDATE <table> 
SET <atrribute> = <value> 
WHERE <primary key> = <value>; 
Syntax for deleting a row - DELETE FROM <TableName> 
WHERE <PrimaryKey> = <#>; 
Syntax for creating a view - CREATE VIE...
Aperçu 1 sur 2 pages
Ajouter au panierSyntax for updating a specific column in a specific row - UPDATE <table> 
SET <atrribute> = <value> 
WHERE <primary key> = <value>; 
Syntax for deleting a row - DELETE FROM <TableName> 
WHERE <PrimaryKey> = <#>; 
Syntax for creating a view - CREATE VIE...
Access plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
Aperçu 2 sur 13 pages
Ajouter au panierAccess plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
Access plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
Aperçu 2 sur 13 pages
Ajouter au panierAccess plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
A salesperson is authorized to sell many products and a product can be sold by many salespersons. 
Which kind of binary relationship does this scenario describe? 
One-to-one 
One-to-many 
Many-to-many 
One-to-one binary - Many-to-many 
Which two examples are attributes? 
Choose 2 answers 
A person a...
Aperçu 3 sur 19 pages
Ajouter au panierA salesperson is authorized to sell many products and a product can be sold by many salespersons. 
Which kind of binary relationship does this scenario describe? 
One-to-one 
One-to-many 
Many-to-many 
One-to-one binary - Many-to-many 
Which two examples are attributes? 
Choose 2 answers 
A person a...
DML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
Aperçu 2 sur 5 pages
Ajouter au panierDML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
DML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
Aperçu 2 sur 5 pages
Ajouter au panierDML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
Aperçu 2 sur 6 pages
Ajouter au panierAn entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
Aperçu 2 sur 6 pages
Ajouter au panierAn entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
First Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a comp...
Aperçu 2 sur 13 pages
Ajouter au panierFirst Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a comp...
Interface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different i...
Aperçu 1 sur 3 pages
Ajouter au panierInterface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different i...
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
Aperçu 2 sur 7 pages
Ajouter au panier1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
Aperçu 2 sur 7 pages
Ajouter au panier1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
Informatics -"The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology -"The branch" 
electronic healthcare record, your clinical decisions support tools...
Aperçu 3 sur 17 pages
Ajouter au panierInformatics -"The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology -"The branch" 
electronic healthcare record, your clinical decisions support tools...
c. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
Aperçu 3 sur 21 pages
Ajouter au panierc. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
c. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
Aperçu 3 sur 21 pages
Ajouter au panierc. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
1.1.1 - Conceptual Schema - ER Model 
Tables: Customer, DonutOrder, Donut - Customer: 
PK - CustomerID 
Rest are customer related fields 
DonutOrder: 
FK - CustomerID, 
FK - DonutID 
Qty, SpecialNotes 
Donut: 
PK - DonutID 
Rest are donut fields 
Relationships: 
Customer - 1:n Identifying - DonutOrd...
Aperçu 2 sur 5 pages
Ajouter au panier1.1.1 - Conceptual Schema - ER Model 
Tables: Customer, DonutOrder, Donut - Customer: 
PK - CustomerID 
Rest are customer related fields 
DonutOrder: 
FK - CustomerID, 
FK - DonutID 
Qty, SpecialNotes 
Donut: 
PK - DonutID 
Rest are donut fields 
Relationships: 
Customer - 1:n Identifying - DonutOrd...
First Normal Form -- when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form -- when all non-key columns depend on the whole primary key 
- cannot depend on part of a compos...
Aperçu 2 sur 13 pages
Ajouter au panierFirst Normal Form -- when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form -- when all non-key columns depend on the whole primary key 
- cannot depend on part of a compos...
access plan - A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
algorithms - A process or set of operations in a calculation. 
automatic query optim...
Aperçu 1 sur 3 pages
Ajouter au panieraccess plan - A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
algorithms - A process or set of operations in a calculation. 
automatic query optim...
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur jessybrown. Stuvia facilite les paiements au vendeur.
Non, vous n'achetez ce résumé que pour $23.49. Vous n'êtes lié à rien après votre achat.
4.6 étoiles sur Google & Trustpilot (+1000 avis)
65040 résumés ont été vendus ces 30 derniers jours
Fondée en 2010, la référence pour acheter des résumés depuis déjà 15 ans