Package deal
WGU C170 AND C468
DATA MANAGEMENT APPLICATION ALREADY PASSED
[Show more]DATA MANAGEMENT APPLICATION ALREADY PASSED
[Show more]AREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
Preview 4 out of 31 pages
Add to cartAREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
AREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
Preview 4 out of 31 pages
Add to cartAREA - In DB2, a named section of permanent storage space that is reserved to store the 
database. 
associative entity - See composite entity. 
bridge entity - See composite entity. 
candidate key - A minimal superkey; that is, a key that does not contain a subset of attributes 
that is itself a sup...
Syntax for updating a specific column in a specific row - UPDATE <table> 
SET <atrribute> = <value> 
WHERE <primary key> = <value>; 
Syntax for deleting a row - DELETE FROM <TableName> 
WHERE <PrimaryKey> = <#>; 
Syntax for creating a view - CREATE VIE...
Preview 1 out of 2 pages
Add to cartSyntax for updating a specific column in a specific row - UPDATE <table> 
SET <atrribute> = <value> 
WHERE <primary key> = <value>; 
Syntax for deleting a row - DELETE FROM <TableName> 
WHERE <PrimaryKey> = <#>; 
Syntax for creating a view - CREATE VIE...
Access plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
Preview 2 out of 13 pages
Add to cartAccess plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
Access plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
Preview 2 out of 13 pages
Add to cartAccess plan -A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
Alias -An alternative name for a column or table in a SQL statement. 
ALTER TABLE -Th...
A salesperson is authorized to sell many products and a product can be sold by many salespersons. 
Which kind of binary relationship does this scenario describe? 
One-to-one 
One-to-many 
Many-to-many 
One-to-one binary - Many-to-many 
Which two examples are attributes? 
Choose 2 answers 
A person a...
Preview 3 out of 19 pages
Add to cartA salesperson is authorized to sell many products and a product can be sold by many salespersons. 
Which kind of binary relationship does this scenario describe? 
One-to-one 
One-to-many 
Many-to-many 
One-to-one binary - Many-to-many 
Which two examples are attributes? 
Choose 2 answers 
A person a...
DML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
Preview 2 out of 5 pages
Add to cartDML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
DML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
Preview 2 out of 5 pages
Add to cartDML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows return...
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
Preview 2 out of 6 pages
Add to cartAn entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
Preview 2 out of 6 pages
Add to cartAn entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf...
First Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a comp...
Preview 2 out of 13 pages
Add to cartFirst Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a comp...
Interface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different i...
Preview 1 out of 3 pages
Add to cartInterface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different i...
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
Preview 2 out of 7 pages
Add to cart1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
Preview 2 out of 7 pages
Add to cart1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by una...
Informatics -"The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology -"The branch" 
electronic healthcare record, your clinical decisions support tools...
Preview 3 out of 17 pages
Add to cartInformatics -"The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology -"The branch" 
electronic healthcare record, your clinical decisions support tools...
c. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
Preview 3 out of 21 pages
Add to cartc. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
c. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
Preview 3 out of 21 pages
Add to cartc. Data Mining -Which of the following uses database applications to sift through large amounts 
of data and looks for previously hidden trends? 
a. Evidence-Based Practice 
b. Quantitative Analysis 
c. Data Mining 
d. Digital Library 
c. To promote desired clinical outcomes -A nurse is reviewing a ...
1.1.1 - Conceptual Schema - ER Model 
Tables: Customer, DonutOrder, Donut - Customer: 
PK - CustomerID 
Rest are customer related fields 
DonutOrder: 
FK - CustomerID, 
FK - DonutID 
Qty, SpecialNotes 
Donut: 
PK - DonutID 
Rest are donut fields 
Relationships: 
Customer - 1:n Identifying - DonutOrd...
Preview 2 out of 5 pages
Add to cart1.1.1 - Conceptual Schema - ER Model 
Tables: Customer, DonutOrder, Donut - Customer: 
PK - CustomerID 
Rest are customer related fields 
DonutOrder: 
FK - CustomerID, 
FK - DonutID 
Qty, SpecialNotes 
Donut: 
PK - DonutID 
Rest are donut fields 
Relationships: 
Customer - 1:n Identifying - DonutOrd...
First Normal Form -- when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form -- when all non-key columns depend on the whole primary key 
- cannot depend on part of a compos...
Preview 2 out of 13 pages
Add to cartFirst Normal Form -- when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form -- when all non-key columns depend on the whole primary key 
- cannot depend on part of a compos...
access plan - A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
algorithms - A process or set of operations in a calculation. 
automatic query optim...
Preview 1 out of 3 pages
Add to cartaccess plan - A set of instructions generated at application compilation time that is created and 
managed by a DBMS. The access plan predetermines how an application's query will access the 
database at run time. 
algorithms - A process or set of operations in a calculation. 
automatic query optim...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller jessybrown. Stuvia facilitates payment to the seller.
No, you only buy these notes for $23.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
72001 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now