4
1) In a relational database, requiring that every record in a table have a unique identifier is called the A) entity integrity rule. B) referential integrity rule. C) unique primary key rule. D) foreign key rule.
a
12) A data warehouse A) is primarily used for analysis rather than transaction processing. B) stores transaction processing records in hard copy. C) replaces traditional transaction processing databases. D) increases the speed of transaction processing.
a
12) The data dictionary usually is maintained A) automatically by the DBMS. B) by the database administrator. C) by the database programmers. D) by top management.
a
15) Which would not generally be considered a data dictionary output report? A) a list of cash balances in the organization's bank accounts B) a list of all programs in which a data element is used C) a list of all synonyms for the data elements in a particular file D) a list of all data elements used by a particular user
a
16) Creating an empty table in a relational database requires use of the ________, and populating that table requires the use of ________. A) DDL; DML B) DQL; SQL C) DDL; DQL D) DML; DDA
a
18) If a national sales tax were implemented, which language would be used to add a new field in the sales table to track the sales tax due? A) Data Definition Language B) Data Manipulation Language C) Data Query Language D) Data Update Language
a
2) The problem of changes being incorrectly recorded in a database is known as A) an update anomaly. B) an insert anomaly. C) a delete anomaly. D) a memory anomaly.
a
21) In a well-designed and normalized database, which of the following attributes would be a foreign key in a cash receipts table? A) customer number B) cash receipt date C) remittance advice number D) customer check number
a
3) The logical view of a database system refers to A) how a user or programmer conceptually organizes and understands the data. B) how the DBMS accesses data for a certain application program. C) how and where the data are physically arranged and stored. D) how master files store data values used by more than one application program.
a
4) The ________ handles the link between the way data are physically stored and each user's logical view of that data. A) database management software (DBMS) B) database manager C) data warehouse D) data dictionary
a
8) The update anomaly in non-normalized database tables A) occurs because of data redundancy. B) restricts addition of new fields or attributes. C) results in records that cannot be updated. D) is usually easily detected by users.
a
You explain to Kai that every customer must be identified by a unique customer number in the AIS. You are referring to the A) entity integrity rule. B) referential integrity rule. C) update anomaly. D) insert anomaly.
a
11) Which of the following would not be found in a data dictionary entry for a data item? A) records containing a specific data item B) physical location of the data C) source of the data item D) field type
b
17) When the human resources manager wants to gather data about salary and start date by employees and by departments, the manager would use which language? A) Data Manipulation Language B) Data Query Language C) Data Report Language D) Data Definition Language
b
18) How do users retrieve data stored in a database? A) by viewing the appropriate data tables B) by executing a query C) by performing a search D) by specifying the primary keys
b
2) The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the A) entity integrity rule. B) referential integrity rule. C) unique primary key rule. D) foreign key rule.
b
20) A ________ is an abstract representation of a database's contents. A) schema B) logical data model C) physical view D) data dictionary
b
20) Which of the following elements link rows in one table to rows in another table? A) primary keys B) foreign keys C) semantic keys D) link keys
b
3) In a well-structured database, the constraint that ensures the consistency of the data is known as the A) entity integrity rule. B) referential integrity rule. C) unique primary key rule. D) foreign key rule.
b
3) Which statement is true regarding file systems? A) Transaction files are similar to ledgers in a manual AIS. B) Multiple master files create problems with data consistency. C) Transaction files are permanent. D) Individual records are never deleted in a master file. Answer: B
b
4) All of the following are benefits of the database approach except A) data integration and sharing. B) decentralized management of data. C) minimal data redundancy. D) cross-functional analysis and reporting.
b
4) Inability to add new data to a database without violating the basic integrity of the database is referred to as the A) update anomaly. B) insert anomaly. C) integrity anomaly. D) delete anomaly.
b
5) A relational database in which customer data is not maintained independently of sales invoice data will most likely result in A) an update anomaly. B) an insert anomaly. C) a delete anomaly. D) an integrity anomaly.
b
5) The logical structure of a database is described by the A) data dictionary. B) schema. C) database management system. D) context diagram.
b
1) The physical view of a database system refers to A) how a user or programmer conceptually organizes and understands the data. B) how the DBMS accesses data for a certain application program. C) how and where the data are physically arranged and stored. D) how master files store data values used by more than one application program.
c
1) Using a file-oriented approach to data and information, data is maintained in A) a centralized database. B) many interconnected files. C) many separate files. D) a decentralized database.
c
1) What acts as an interface between the database and the various application programs? A) data warehouse B) database administrator C) database system D) database management system
c
19) In a well-structured relational database, A) foreign keys cannot be null. B) there must be at least two foreign keys. C) every column in a row must be single valued. D) one table must be related to all other tables.
c
3) The ________ is responsible for the database. A) database master B) database manager C) database administrator D) data coordinator
c
6) In the database design approach known as normalization, the first assumption made about data is A) there is no redundancy in the data. B) the delete anomaly will not apply since all customer records will be maintained indefinitely. C) everything is initially stored in one large table. D) the data will not be maintained in 3NF tables.
c
6) The problem of losing desired information from a database when an unwanted record is purged from the database is referred to as the ________ anomaly. A) purge B) erase C) delete D) integrity
c
6) The schema that provides an organization-wide view of the entire database is known as the A) external-level schema. B) internal-level schema. C) conceptual-level schema. D) logical view of the database.
c
7) A set of individual user views of the database is called the A) conceptual-level schema. B) internal-level schema. C) external-level schema. D) meta-schema.
c
7) Identify one potential outcome of the delete anomaly. A) inconsistent data B) inability to add new data C) unintentional loss of data D) none of the above
c
7) Merlin Frodo has been doing custom piercings and tattoos for over thirty years. His home and place of business is a garage in the harbor district of Seattle, Washington. He keeps meticulous records of every job he has ever completed. These have been entered into a computerized accounting information system that his accountant refers to as a "data warehouse." Merlin is considering adding scarification to his service offerings and has asked his accountant to identify past customers who might be likely candidates for this service. Merlin wants his accountant to engage in A) customer auditing. B) customer resource management. C) data mining. D) enterprise resource planning.
c
7) The database design method in which a designer uses knowledge about business processes to create a diagram of the elements to be included in the database is called A) normalization. B) decentralization. C) geometric data modeling. D) semantic data modeling.
c
8) A low-level view of the database that describes how the data are actually stored and accessed is the A) conceptual-level schema. B) subschema. C) internal-level schema. D) external-level schema.
c
9) Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema. A) external B) conceptual C) internal D) meta
c
1) What acts as an interface between the database and the various application programs? A) data warehouse B) database administrator C) database system D) database management system
d
13) Reports produced using the data dictionary could include all of the following except a list of A) programs where a data item is used. B) synonyms for the data items in a particular file. C) outputs where a data element is used. D) the schemas included in a database.
d
19) ________ is a feature in many database systems that simplifies the creation of reports by allowing users to specify the data elements desired and the format of the output. A) Report printer B) Report creator C) Report generator D) Report writer
d
2) File-oriented approaches create problems for organizations because of A) multiple transaction files. B) a lack of sophisticated file maintenance software. C) multiple users. D) multiple master files.
d
3) The ________ occurs when more than one occurrence of a specific data item in a database exists. A) inconsistency anomaly B) insert anomaly C) delete anomaly D) update anomaly
d