MIS Chapter 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

A group of similar rows or records is known as _________. A prototype A table A field An attribute A cluster

A table

Which of the following is an example of a database management system? MS Excel BigData NoSQL Access MS Visio

Access

When using the relational model to represent two tables, one must ________. Add a foreign key to one of the tables Have more than two primary keys in the model Establish only N:M relationships between the tables Use metadata instead of foreign keys Minimize the number of columns in the second table

Add a foreign key to one of the tables

Browser-based applications ________. Need to be preinstalled on the users' computers Run within a corporate network that is protected from the Internet Eliminate the need to check for data consistency Are more vulnerable to security threats than are traditional applications Do not need to be encrypted

Are more vulnerable to security threats than are traditional applications

The term ________ implies that either all transactions relate to a traditional relational DBMS are processed or none of them are processed. Consistent Atomic Durable Isolated Ironic

Atomic

Which of the following is the smallest element in a database? Field Record Byte Metadata Zetta

Byte

In a database, ________ are grouped into columns. Fields Records Bytes Files Nibbles

Bytes

A primary key in a database is a ________. Group of rows that identifies a unique table or file Column or group of columns that identifies a unique row in a table Group of fields or columns that represent metadata Group of tables or files formed to identify a unique field or row Group of records that identifies similar attribute

Column or group of columns that identifies a unique row in a table

Identify the first step in transforming a data model into a relational database design. Representing the entity relationships Normalizing the data and files Creating foreign keys Create a table for each entity Creating data triggers for export

Create a table for each entity

The forked lines on the lines representing relationship between two related entities are referred to as ________. Identifiers Foreign keys Crow's feet Entities Switch

Crow's feet

A data integrity problem will occur only if ________. A database has multiple administrators Data are duplicated in a database The database is very complex There are complex relationships between entities in a database The database has too many keys

Data are duplicated in a database

In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. Data integrity problem Crow's-foot paradigm Adaption conflict Security problem Data loopback problem

Data integrity problem

A ________ describes the data and relationships that will be stored in a database. Data aggregator Query model Data model Data application Data-tree model

Data model

Ryan, a database administrator, is in the process of designing his company's database. Which of the following would Ryan have had to create before he began designing? Data aggregator Query model Data model Data application Data tunnel outlay

Data model

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. Database application Database design Data field Data model Data bridge

Database application

________ is the process of converting a data model into tables, relationships, and data constraints. Database design Database querying Data mining Database aggregation Database cross modeling

Database design

A(n) ________ is a program used to create, process, and administer a database. Operating system Database management system Information system Database system Operating system driver

Database management system

For Falon Security, the primary purpose of creating a database of video information is to ________. Keep track of a single theme Eliminate concern about the lost update problem Enable querying based on video characteristics Avoid the use of spreadsheets Encrypt data streams

Enable querying based on video characteristics

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on daily basis, and employee name. These aspects that Brad wants to track are called ________. Identifiers Records Primary keys Entities Quarks

Entities

In a data model, a(n) ________ is something that a user wants to track. Record Byte Entity Primary key Quark

Entity

Which of the following is a developmental task of database administration? Evaluating an application design Monitoring backup procedures Conducting training for users Managing configuration changes in systems Testing backup procedures

Evaluating an application design

A DBMS and database are synonymous terms that can be used interchangeably. True False

False

A logical representation of database data, called the data model, is constructed by developers after building a database. True False

False

Browser applications are thin-clients applications that need to be preinstalled on the users' computers. True False

False

Each table in a database must have at foreign key True False

False

Managing the impact of database structural changes on applications and users is an operational task for a database administrator. True False

False

Most traditional databases use the internet to transmit traffic back and forth between the users' computer and the DBMS server. True False

False

The accuracy of a database design is not dependent on the corresponding data model. True False

False

The easiest time to change the database structure is after the data modeling stage. True False

False

The lost-update problem can be resolved by implementing single-user database processing. True False

False

The columns in a database are also called ________. Records Tables Files Fields Verticals

Fields

Which of the following data elements is placed higher than records in the database hierarchy? File Field Character Byte Bit

File

Columns that are keys to different tables than the ones in which they reside are called ________. Attributes Foreign keys Primary keys Internal records Nonlocal keys

Foreign keys

Relational databases represent relationships using _________. Foreign keys File systems Metadata Primary keys Trees

Foreign keys

Which of the following is used to process and display browser database application forms, reports, and queries? C++ HTML COBOL VisualBasic DB2

HTML

A database is used instead of a spreadsheet when ________. Lists of data involve a single theme Structures of data lists are simple Lists involve data with multiple themes Users do not want to store all data in one place Users have a small amount of data to store

Lists involve data with multiple themes

A data model is a ________. Logical representation of database data Repository of unprocessed data Collection of isolated databases Set of programs used to retrieve data Array of data variables

Logical representation of database data

Charles and Irene are editors at a content development firm. Both of them, unknowingly, are working on the same copy of the annual report. Irene finishes editing the report and saves her copy; Charles saves his report an hour after Irene. Charles's report overwrites Irene's, and her changes are lost. This scenario is an example of the ________. Lost-update problem Crow's-foot paradigm Bullwhip effect Update query problem Bait-and-switch problem

Lost-update problem

Which of the following database administrations tasks is related to adaption? Monitoring backup procedures Conducting training for users Monitoring database performance Managing configuration changes in systems Conducting data audit requirements

Managing configuration changes in systems

Constraints on the minimum number of entities in a relationship are called ________ cardinalities. Specific Minimum Primary Critical Plank

Minimum

________ in an E-R diagram refer to the least number of entities required in a relationship. Minimum candidate keys Primary keys Foreign keys Minimum Chernozem cardinalities

Minimum

Identify an open source DBMS product. MySQL DB2 Access Oracle Database TableOS

MySQL

Acelane Inc., unlike its competitors, procures raw material from multiple suppliers. Each supplier in turn supplies raw material to many buyers, including Acelane. This is an example of a(n) ________ relationship. 1:N 1:1 N:M M:1 N:1

N:M

Browser applications are thin-client applications that ________. Use COBOL as the standard language for user-side processing Are processed using VisualBasic and C++ Need not be preinstalled on the users' computer Depend on internal networks and not the internet to transmit data Do not need to be encrypted

Need not be preinstalled on the users' computer

________is the process of converting a poorly-structured table into two or more well-structured tables Optimization Normalization Refactoring Standardization Banding

Normalization

Jed is a database administrator for a mid-sized computer component manufacturer. Part of his duties include managing security, tacking problems, and monitoring the performance of the database. This is an example of Jed's ________ tasks. Development Adaption Backup and recovery Operation Data audit

Operation

Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. Primary key Key attribute Foreign key Functionally dependent record Secondary key

Primary key

The modification or deletion of data in a database is an example of ________ operations of a database management system. Statistical Analytical Administrative Processing Technical

Processing

A(n) ________ is a request for data from a database. Form Report Query Application DB pull

Query

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database. Report Data model Database administrative function Query Pull function

Query

The rows in a database are also called ________. Records Tables Files Fields Laterals

Records

In an E-R diagram, a line between two entities represents a(n) ________. Attribute Identifier Cardinality Relationship Branch

Relationship

Which of the following is an international standard language for processing a database? Cassandra DB2 SQL MS Access Relational LM

SQL

Which of the following notations is an E-R diagram means that the entity is optional and a relationship need not have an entity of the type? Vertical bar Arrow Double line Small oval Triangle

Small oval

Browser-based applications ________. Are thick-client applications Can display only static content Support graphical queries Process queries using C++ Process queries without using SQL

Support graphical queries

Which of the following is TRUE of single-user databases? They are displayed and processed using HTML5, CSS3, and JavaScript. They use JavaScript for user-side processing. The Internet is used to access the DBMS server computer. The application, the DBMS, and the database all reside on the user's computer. They run on clustered Linux or Unix systems

The application, the DBMS, and the database all reside on the user's computer.

Which of the following is TRUE of traditional database application programs? Application forms, reports, and queries are displayed and processed using a browser application. The application logic is contained in a program on the client-side computer. They are written in object-oriented languages such as C++ and VisualBasic. They are thin-client applications that need not be preinstalled on the users' computers. They are cloud-based applications that need not be preinstalled on the user's computers.

They are written in object-oriented languages such as C++ and VisualBasic.

Which of the following is TRUE of N:M relationships? They are the same as N:N relationships They represent minimum cardinalities in a relationship They are also called one-to-many relationships They can have more than one entity on each side of the relationship They connect different data types

They can have more than one entity on each side of the relationship

Which of the following is TRUE of in-memory DBMS products? They support or extend the relational model They do not provide ACID transaction support They are a hotbed of development MongoDB is an in-memory DBMS product They are low-volume, but high integrity DBMS product

They support or extend the relational model

Traditional database application programs are ________. Browser-based and display dynamic content Written in languages such as HTML5 and JavaScript Entirely dependent on the database server for application logic Thick applications that need to be installed on users' computers Cloud-based applications

Thick applications that need to be installed on users' computers

A foreign key is a key of a different (foreign) table than the one in which it resides. True False

True

A group of similar rows or records in a table is called a file. True False

True

A line in an entity-relationship (E-R) diagram is used to represent the relationship between two entities True False

True

A user must have user account credentials to access and process a database. True False

True

An identifier is an attribute or a group of attributes whose value is associated with one and only one entity instance. True False

True

Lists that involve data with multiple themes can be stored in a spreadsheet. True False

True

Locking must be used to coordinate the activities of users in order to prevent the lost-update problem. True False

True

Metadata refers to special data that describes the structure of a database. True False

True

One of the functions of a DBMS is to provide tools to assist in the administration of a database. True False

True

Reports refer to the structured presentation of data using sorting, grouping, filtering, and other operations. True False

True

SQL is an international standard language for processing a database. True False

True

The crow's-foot notation in an E-R diagram shows the maximum number of entities that can be involved in a relationship. True False

True

The data integrity problem occurs only if data are duplicated. True False

True

The purpose of a database is to keep track of lists of data that involve multiple themes. True False

True

To modify an existing table, a developer can open the metadata form for that table and add a new row of metadata True False

True

________ are the final judges as to wha data the database should contain and how the records in that database should be related to one another. Administrators Developers Users Designers Auditors

Users

In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. Small oval Vertical bar Arrow Triangular block Wave

Vertical bar

The term ________ implies that either all transactions related to a traditional relational DBMS are processed or none of them are processed. consistent atomic durable isolated iconic

atomic

Entities in a data model have ________ that describe the characteristics of the entity. characters primary keys codes attributes scribes

attributes

Metadata is/are ________. codes used for server-side processing error logs of databases data that describes data data that are encrypted more important data

data that describes data

Sonya is the database administrator for RedTriangle media. She is responsible for validating the data model to be used by the DBMS, and specifying the database requirements to endure all appropriate user input is considered. This is an example of Sonya's ________ tasks. development recovery adaptation operation data audit

development

For Falcon Security, the primary purpose of creating a database of video information is to ________. keep track of a single theme eliminate concern about the lost update problem enable querying based on video characteristics avoid the use of spreadsheets encrypt data streams

enable querying based on video characteristics

Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data? reports forms queries operations triggers

forms

Each entity in a database has a unique attribute called a(n) ________. public key identifier foreign key index field prime value

identifier

The process of normalization constructs tables such that every table has a ________. one-to-one relationship between entities single theme foreign key specialized graphical query minimized metadata footprint

single theme

A significant difference between using Access versus Mongo DB to store Falcon Security's video information is: with Mongo DB the video footage and the metadata are stored in separate databases, while in Access the video footage and the metadata are stored in the same database with Mongo DB the video footage and the metadata are stored in the same database, while in Access the video footage and the metadata are stored in separate databases there is no significant difference in using Access versus Mongo DB for storing Falcon's video information Mongo DB cannot be used for querying because it is a NoSQL database Access can retrieve data more quickly than Mongo DB

with Mongo DB the video footage and the metadata are stored in the same database, while in Access the video footage and the metadata are stored in separate databases


Conjuntos de estudio relacionados

Chapter 2: Theory of Program Testing

View Set

A&P II Ch. 27 The Male Reproductive System

View Set

Structural and Functional Divisions of Nervous System

View Set