Ch. 9, Ch. 9 True/ False, Chapter 9, System Analysis and Design - Chapter 7, Chapter 7, Quiz 6, FinalTestReview_Version_2

¡Supera tus tareas y exámenes ahora con Quizwiz!

1. List and briefly describe the four components of a database management system.

1. Application Program Interface -- allows programming language interface to write scripts and logic to produce results based on complex logic. 2. End-user query processor -- this provides the SQL statements to query and update the database. 3. Administrative interface -- provides the functionality to create the schema and change the database configuration parameters. 4. Database access and control logic -- this is the actual DB engine which updates the database and retrieves results.

14. A relational database table is in ____ normal form if it has no repeating fields or groups of fields, and hence all rows have the same columns. a. first c. third b. second d. fourth

A

2. Which of the following is NOT a component or function of a typical database management system (DBMS)? a. Low-level process management c. Application program interface b. End-user query processor d. Administrative interface

A

20. A ____ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access. a. single c. partitioned b. replicated d. cloud-based

A

21. A ____ database server architecture runs the greatest risk of service disruption in the event of a server failure. a. single c. partitioned b. replicated d. cloud-based

A

30. What is the name of a general control technique used to ensure that entered data is correct? a. Data validation control c. Data acceptance control b. Data access control d. Data completeness control

A

35. Which of the following can be classified as privileged users? a. System programmers, application programmers, and system administrators b. Technical users and security personnel c. System operators and clerks d. Administrators and accountants

A

38. Using digital signatures is primarily a technique to ____. a. verifying who sent a document b. allow for remote signatures on official documents c. electronically send a signature d. digitize (scan) a signed document

A

5. A(n) ____ is a field or set of fields used to uniquely identify each row. a. primary key c. object identifier b. foreign key d. attribute

A

6. ____ are a critical element of relational database design because they are the bases for representing relationships among tables. a. Keys c. Fields b. Attributes d. Tables

A

7. One column of a table in a relational database is called a(n) ____. a. attribute c. tuple b. relation d. element

A

Microsoft SQL Server is an example of what?​

A database management system

19. _______ is the process of allowing or restricting a specific user's access to specific resources.

Authorization

13. Referential integrity is normally enforced by the ____. a. application programmer c. operating system b. database management system d. user

B

16. A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key. a. first c. third b. second d. fourth

B

23. Database synchronization should be implemented when using a(n) ____ database server architecture. a. single c. partitioned b. replicated d. cloud-based

B

25. A ____ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups. a. single c. replicated b. partitioned d. cloud-based

B

27. An integrity control that verifies the data in one field against the data in other fields is called a ____ control. a. completeness c. value b. field combination d. data validation

B

3. In a relational database, a row can be referred to as a(n) ____. a. field c. attribute b. tuple d. relation

B

33. Which user is known to the system and is authorized to access all or certain parts of it? a. Authorized user c. Valid user b. Registered user d. Authenticated user

B

36. When the data is encrypted with the public key in asymmetric encryption , it is decrypted with a(n) ____ key. a. asymmetric c. public b. private d. symmetric

B

37. A ____ is an institution's name and public key, which is encrypted and certified by a third party. a. private key c. certifying authority b. digital certificate d. digital key

B

8. A(n) ____ is a field or set of fields stored in one table that also exists as a primary key in another table. a. primary key c. object identifier b. foreign key d. column

B

1. A(n) ____ describes the structure, content, and access controls of a physical data store or database. a. relation c. schema b. DBMS d. attribute

C

10. All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique. a. columns c. rows b. foreign keys d. values

C

11. An separate relation must be created to store the attributes of a ____ relationship among two other classes. a. one-to-one c. many-to-many b. one-to-many d. not any (not necessary)

C

17. A relational database table is in ____ normal form if no non-key field is functionally dependent on any other non-key field.

C

19. What can be said about the following relational database table (key is underlined): (Choose the most correct answer) StudentID, Name, Major, CreditsCompleted, GPA, AcademicStanding a. Not in any valid normal form b. In First Normal Form c. In First and Second Normal Form d. In First, Second and Third Normal Form

C

22. A ____ database server architecture stores different parts of a database on different servers. a. single c. partitioned b. replicated d. cloud-based

C

24. A significant disadvantage of a single server database architecture is that it ____. a. must be located on the same local area network (LAN) as all database users b. requires partitioning the schema among user groups c. can result in an overloaded network d. is relatively expensive

C

28. What is a control that checks the value of a field to ensure that it is within the correct range? a. Answer control c. Value limit control b. Completeness control d. High-low control

C

32. Three types of users that are considered in the design of a security system are ____. a. manager user, technical user, and clerical user b. technical user, authorized user, and privileged user c. unauthorized user, registered user, and privileged user d. supervisor user, administration user, and operational user

C

34. A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. supervisor user c. privileged user b. database administrator d. technical user

C

4. Data elements in a relational database are organized into ____. a. attributes c. tables b. objects d. tuples

C

9. Each class on an class diagram is represented by a(n) ____ in a relational database. a. attribute c. table b. row d. column

C

12. ____ is a consistent relational database state in which every foreign key value also exists as a primary key value. a. First normal form (1NF) c. Function dependency b. Database synchronization d. Referential integrity

D

15. ____ is a one-to-one correspondence between two field values. a. First normal form c. Referential integrity b. Second normal form d. Functional dependency

D

26. Which is NOT an objective of integrity controls? a. Allow only valid business transactions b. Ensure that transactions are recorded completely c. Protect the assets of the organization d. Ensure a stable functioning operating environment

D

29. What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered? a. Secure control c. Comprehensive control b. Total control d. Completeness control

D

31. Which of the following is NOT a factor that affects the risk of fraud? a. Separation of duties c. Asset reconciliation b. Monitoring d. Authorization of users

D

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.​

False

Every table in a relational database must have a foreign key.​

False

In a one-to-many association the primary key of the "many" class is placed as a foreign key in the "one" class.​

False

Including a total amount field as the sum of other fields in a table is a violation of second normal form.​

False

Problem domain modeling and database normalization are incompatible techniques for relational database design.​

False

Relationships in a relational database are usually represented by embedding a foreign key in each participating table.​

False

The domain data in a database is sometimes referred to as metadata.​

False

7. A relational database table is in ____________________ normal form if it has no repeating fields or groups of fields, i.e. if it has the same number of columns for every row.

First

___________ is where the value in one field determines the value in another field in the same record.​

Functional dependency

5. _________________________ is a consistent relational database state in which every foreign key value also exists as a primary key value.

Referential integrity

1. A(n) ____________________ describes the structure, content, and access controls of a physical data store or database.

Schema

10. _______ database server architecture is poorly suited to applications that must be available on a seven-day, 24-hour basis.

Single

A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.​

True

A relational database management system stores data in tables.​

True

A relational database table is in third normal form (3NF) if it is in second normal form (2NF) and if no non-key field is functionally dependent on any other non-key field.​

True

Classes that participate in a classification hierarchy can be represented within a relational database as a set of tables with the primary key of the general class table replicated in the other tables.​

True

In an iterative approach to software development, it is usually best to develop the database in the first few iterations.​

True

Referential integrity is a consistent relational database state in which every foreign key value also exists as a primary key value.​

True

Relationships between tables is usually indicated through the use of a foreign key.​

True

14. A(n) ______ control restricts which persons or programs can add, modify or view information.

access

20. A(n) ____________________ is the list of users who have rights to access the system and data.

access control list

18. ____________________ is the process of identifying a user to verify that he or she can have access to the system.

authentication

9. A data type that is defined by extending or combining other data types is called a(n) ______ data type.

complex

11. When it is necessary to update one database copy with changes made to the other database, it is called _________.

database Synchronization

Referential integrity is normally enforced by the ____.​

database management system

22. The encoding of a message with a private key is called ____________________.

digital signing

4. A(n) ____________________ is a field or set of fields stored in one table that also exist as a primary key in another table.

foreign key

16. A model of fraud that states that opportunity, motivation, and rationalization must all exist for fraud to occur is called the ________.

fraud triangle

12. A(n) ______ control is a control that rejects invalid inputs, prevent unauthorized outputs, and protects data and programs against tampering.

integrity

A separate relation must be created to store the attributes of a ____ relationship among two other classes.

many-to-many

6. Non-key ("bad") redundancy can be systematically identified and eliminated from a relational database by ____________________ of the database.

normalization

2. A(n) _______ is the database component that actually stores the raw bytes of data.

physical data store

A(n) ____ is a field or set of fields used to uniquely identify each row.​

primary key

8. A data type that is supported directly by computer hardware or a programming language is called a(n) _______ data type.

primitive

17. A control that protects the assets of an organization against all threats, primarily external threats is called ______ control.

security

21. In ____________________ encryption, the same key encrypts and decrypts the data.

symmetric

3. In a database a two-dimensional data structure consisting of columns and rows is called a(n) _______.

table

Each class on an class diagram is represented by a(n) ____ in a relational database.​

table

15. A technique where all updates to a database are recorded with who, when, and how information is called ________.

transaction logging

13. A control that checks the value of a field to ensure that it is within the correct range is a(n) _______ control.

value limit


Conjuntos de estudio relacionados

Exam 1: Ch.1 Cellular Function & Ch.2 Immunity

View Set

A & P 1 lecture notes 1-9 (Final Exam)

View Set

Pediatric success, Saunders & Davis test 2 questions

View Set

Nutrition - Chapter 2 (Planning a Healthy Diet)

View Set

Business Law II Chapter 32 Practice Questions

View Set