ACCT 351 Chapter 4 Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the Customer table above, "Customer #" is best described as - an attribute, a primary key, and a foreign key - a foreign key. - an attribute. - a primary key.

- an attribute, a primary key, and a foreign key

Which of the following is false regarding a well-structured relational database? All nonkey attributes in a table must describe a characteristic of the object identified by the primary key. A foreign key cannot be null. A primary key cannot be null. Every column in a row must be single valued.

A foreign key cannot be null.

Which would not generally be considered a data dictionary output report? a list of all synonyms for the data elements in a particular file a list of cash balances in the organization's bank accounts a list of all programs in which a data element is used a list of all data elements used by a particular user

A list of cash balances in the organization's bank accounts

Using the database depicted above, "Date" is best described as a non-key attribute. a foreign key. a primary key. an attribute.

A non-key attribute.

A relational database in which vendor data is not maintained independently of purchase order data will most likely result in an update anomaly. an integrity anomaly. a delete anomaly. an insert anomaly.

An insert anomaly

The schema that provides an organization-wide view of the entire database is known as the internal-level schema. external-level schema. logical view of the database. conceptual-level schema.

Conceptual-level schema

Which of the following would not be one of the well-structured tables in a well-designed relational database used to generate this sales invoice? Customer Order Sales Order Customer Sales

Customer Order

Which of the following would not be one of the well-structured tables in a well-designed relational database used to generate this sales invoice? Customer Sales Sales Order Customer Order

Customer Order

Creating an empty table in a relational database requires use of the ________, and populating that table requires the use of ________. DQL; SQL DDL; DML DDL; DQL DML; DDA

DDL; DML

When the human resources manager wants to build a data dictionary, the manager would use which language? Data Report Language Data Manipulation Language Data Definition Language Data Query Language

Data Definition Language

When the human resources manager wants to add a new employee to the sales department, the manager would use which language? Data Manipulation Language Data Query Language Data Report Language Data Definition Language

Data Manipulation Language

When the human resources manager wants to gather data about salary and start date by employees and by departments, the manager would use which language? Data Manipulation Language Data Definition Language Data Query Language Data Report Language

Data Query Language

What acts as an interface between the database and the various application programs? database management system data warehouse database administrator database system

Database management system

The problem of losing desired information from a database when an unwanted record is purged from the database is referred to as the ________ anomaly. erase purge delete integrity

Delete

Identify one potential drawback in the design and implementation of database systems for accounting. - Relational DBMS query languages will allow financial reports to be prepared to cover whatever time periods managers want to examine. Relational DBMS can accommodate multiple views of the same underlying data; therefore, tables storing information about assets can include data about both historical and replacement costs. Double-entry accounting relies on redundancy as part of the accounting process, but well-designed database systems reduce and attempt to eliminate redundancy. Relational DBMS provide the capability of integrating financial and operational data.

Double-entry accounting relies on redundancy as part of the accounting process, but well-designed database systems reduce and attempt to eliminate redundancy.

________ in a well-structured relational database. Every table must be related to all other tables One table must be related to at least one other table One table must be related to all other tables Every table must be related to at least one other table

Every table must be related to at least one other table

Identify one potential outcome of the insert anomaly. inconsistent data unintentional loss of data inability to add new data None of these

Inability to add new data

Abby Burke has created custom statues made out of scrap metal for over ten years. Abby has kept detailed records of every statue she has ever created. For every sale, she obtains the customer's name and address, a description of the statue, and a picture of the statue sold to the customer. Her unique style has recently attracted the attention of several celebrities. Ready to take her business to the next level, Abby has hired you to construct an accounting information system, which she wants modeled after her paper records. As you look over her records, you realize that some customers bought multiple statues at the same time. For example, Yasmeen Ghuari bought a Tin Man Status, a flying horseman statue, and a terrier statue. You realize that in these cases, a single written record will have to be translated into multiple sales records. This is an example of what type of problem in the existing records? referential integrity insert anomaly update anomaly entity integrity

Insert anomaly

Inability to add new data to a database without violating the basic integrity of the database is referred to as the delete anomaly. update anomaly. integrity anomaly. insert anomaly.

Insert anomaly

Emma Kolb is a system analyst at a manufacturing company located in the Midwest. She has been asked to analyze the company's accounting information system and to recommend cost-effective improvements. After noting that the production and sales departments use database systems that are entirely separated, she recommends that they be combined. Implementation of her recommendation would benefit the company by contributing to data integration. redundancy. qualifications. independence.

Integration

A low-level view of the database that describes how the data are actually stored and accessed is the conceptual-level schema. external-level schema. internal-level schema. subschema.

Internal-level schema.

Which statement is true regarding file systems? Transaction files are permanent. Multiple master files create problems with data consistency. Individual records are never deleted in a master file. Transaction files are similar to ledgers in a manual AIS.

Multiple master files create problems with data consistency.

The technique of using queries to investigate hypothesized relationships among data is called online analytical processing. data mining. data analysis. business intelligence.

Online analytical processing

Pat Owen is chair of the National Grizzly Society, which maintains a database of all grizzly bears within the United States. One table will store the name, birth date, and other characteristics of all of the grizzly bears that have been registered. Each grizzly bear is uniquely identified by a registration number. A second table will contain data that link each grizzly bear to its male and female parents by means of their registration numbers. The entities described by the second table are registration numbers. names. parental relationships. grizzly bears.

Parental relationships

Identify the statement below that is false with regards to basic requirements of a relational database model. All non-key attributes in a table should describe a characteristic about the object identified by the primary key. Foreign keys, if not null, must have values that correspond to the value of a primary key in another table. Primary keys can be null. Every column in a row must be single-valued.

Primary keys can be null.

Tom Wilson is chairman of the Rare Car Club, where he maintains a database of registered rare cars and their history. One table will store the model, make, vehicle identification number, and other characteristics of all of the registered rare cars. Each rare car is uniquely identified by a registration number. A second table will contain data that link each rare car to its most recent estimated fair market value by means of their registration numbers. The entities described by the first table are estimated fair market value. rare cars. registration numbers. vehicle identification numbers.

Rare cars

The database design method in which a designer uses knowledge about business processes to create a diagram of the elements to be included in the database is called geometric data modeling. decentralization. semantic data modeling. normalization.

Semantic data modeling

Which of the statements below is incorrect? Semantic data modeling follows the rules of normalization in the design of a database. Semantic data modeling facilitates communicating with the intended users of the system. Semantic data modeling facilitates the efficient design of databases. Semantic data modeling allows a database designer to use knowledge about business processes to design the database.

Semantic data modeling follows the rules of normalization in the design of a database.

Mary Lamb is an insurance sales representative. Her company has provided her with a laptop computer that uses wireless connectivity to access the accounting information system from virtually anywhere in the country. She, and other sales reps, have access to view customer and insurance product information. All sales reps also have access that allows them to enter and cancel customer orders. The permissions for Mary define a ________ in the company's database management system. physical view data dictionary subschema conceptual-level schema

Subschema

Which statement below concerning the database management system (DBMS) is false? Users' requests for information are transmitted to the DBMS through application software. The DBMS automatically maintains the data dictionary. The DBMS automatically creates application software for users, based on data dictionary parameters. The DBMS uses special languages to perform specific functions.

The DBMS automatically creates application software for users, based on data dictionary parameters.

A fully normalized database is called third normal form (3NF). forth normal form (4NF). second normal form (2NF). first normal form (1NF).

Third normal form (3NF)

Data dictionary can be used as part of the audit trail. True False

True

Using the database depicted above, "Date" is best described as a non-key attribute. a foreign key. an attribute. a primary key.

a non-key attribute.

Using the database depicted above, in the Sales table, "Customer #" is best described as * an attribute, a primary key, and a foreign key * a foreign key. * an attribute. * a primary key.

an attribute.

The problem of changes being incorrectly recorded in a database is known as a delete anomaly. an insert anomaly. a memory anomaly. an update anomaly.

an update anomaly.

The use of a data warehouse in strategic decision making is often referred to as managerial accounting. business intelligence. data analysis. analytical modeling.

business intelligence.

The ________ is responsible for the database. database administrator database manager data coordinator database master

database administrator

The combination of the database, the DBMS, and the application programs that access the database through the DBMS is referred to as the database management system. data warehouse. database administrator. database system.

database system.

Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema. meta internal conceptual external

internal

A low-level view of the database that describes how the data are actually stored and accessed is the internal-level schema. external-level schema. subschema. conceptual-level schema.

internal-level schema.

Abby Burke has created custom statues made out of scrap metal for over ten years. Abby has kept detailed records of every statue she has ever created. For every sale, she obtains the customer's name and address, a description of the statue, and a picture of the statue sold to the customer. Her unique style has recently attracted the attention of several celebrities. Ready to take her business to the next level, Abby has hired you to construct an accounting information system, which she wants modeled after her paper records. You begin development of the relational database that will form the core of the AIS by envisioning the record stored in a single table with a column that represents each attribute. You then begin to break this table down into smaller tables. This process is called normalization. integration. optimization. minimization.

normalization.

The update anomaly in non-normalized database tables results in records that cannot be updated. restricts addition of new fields or attributes. is usually easily detected by users. occurs because of data redundancy.

occurs because of data redundancy.

Emma Kolb is a system analyst at a manufacturing company located in the Midwest. She has been asked to analyze the company's accounting information system and to recommend cost-effective improvements. After noting that the same production files have been saved and stored independently on several databases, she recommends that they be stored only once. Implementation of her recommendation would benefit the company by contributing to data integration. data independence. increase data sharing. reduce data redundancy.

reduce data redundancy.

In a well-structured database, the constraint that ensures the consistency of the data is known as the referential integrity rule. foreign key rule. entity integrity rule. unique primary key rule.

referential integrity rule.

The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the entity integrity rule. unique primary key rule. referential integrity rule. foreign key rule.

referential integrity rule.

Reports produced using the data dictionary could include all of the following except a list of programs where a data item is used. outputs where a data element is used. synonyms for the data items in a particular file. the schemas included in a database.

the schemas included in a database

Databases were originally developed to address which problem? - to address the proliferation of master files - to increase the speed that an organization could process transactions - to replace the double entry-system - to decrease the costs associated with manual accounting systems

to address the proliferation of master files

The ________ occurs when more than one occurrence of a specific data item in a database exists. delete anomaly update anomaly inconsistency anomaly insert anomaly

update anomaly


Kaugnay na mga set ng pag-aaral

QBank Questions: Course 101 Ch. 6

View Set

The art of public speaking chapter 10

View Set

Anatomy & Phys: Ch. 11.4-11.6 - The Nervous System

View Set

CompTIA A+ Questions and Answers

View Set