120D Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A table is in first normal form when it is a. free of repeating group data b. free of transitive dependencies c. free of partial dependencies d. free of update anomalies e. none of the above

a. free of repeating group data

Entities are a. nouns that are depicted by rectangles on an entity relationship diagram b. data that describe the characteristics of properties of resources c. associations among elements d. sets of data needed to make a decision

a. nouns that are depicted by rectangles on an entity relationship diagram

The update anomaly in unnormalized databases a. occurs because of data redundancy b. complicates adding records to the database c. may result in the loss of important data d. often results in excessive record insertions

a. occurs because of data redundancy

In the relational database model all of the following are true except a. data is presented to users as tables b. data can be extracted from specified rows from specified tables c. a new table can be built by joining two tables d. only one-to-many relationships can be supported

d. only one-to-many relationships can be supported

T/F: A customer name and an unpaid balance is an example of a one-to-many relationship.

False

T/F: A database has a Customer table and an Invoice table, in which an invoice can be associated with only one invoice. However, a customer may be associated with one or more invoices. A third table is required to link the table Customer and the table Invoice.

False

T/F: A join builds a new table by creating links.

False

T/F: A recovery module suspends all data processing while the system reconciles its journal files against the database.

False

T/F: A table in third normal form is free of partial dependencies, multiple dependencies, and transitive dependencies.

False

T/F: An entity is any physical thing about which the organization wishes to capture data.

False

T/F: Data access methods allow records to be located, stored and retrieved.

False

T/F: Data manipulation language allows users of the database to define the structure of the database

False

T/F: Database authorization tables determine the type of access by listing every single user of the database by last name or by identification number

False

T/F: Field names in a database must be unique.

False

T/F: GAS can be used with simple data structures but not complex structures

False

T/F: In the relational model, a data element is called a relation.

False

T/F: Primary keys must be a single field (attribute).

False

T/F: The database approach to data management is sometimes called the flat file approach

False

T/F: The deletion anomaly is the least important of the problems affecting unnormalized databases.

False

T/F: The physical database is an abstract representation of the database.

False

T/F: The recovery module refers to making periodic backups of entire database which is stored in a secure, remote location.

False

T/F: The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.

False

T/F: Time stamping is a control that is used to ensure database partitioning.

False

T/F: Under the database approach, data is viewed as proprietary or owned by users.

False

T/F: VSAM file structures are most effective where rapid access to individual records is a priority need.

False

T/F: When a large portion of the file is to be processed in one operation such as payroll, sequential data structures are an inefficient method of organizing a file.

False

Which characteristic is associated with the database approach to data management? a. data sharing b. multiple storage procedures c. data redundancy d. excessive storage costs

a. data sharing

An inventory record contains part number, part name, part color, and part weight. These individual items are called a. fields. b. stored files. c. bytes. d. occurrences.

a. fields.

T/F: A deadlock is a phenomenon that prevents the processing of transactions involved in the deadlock.

True

T/F: A lockout is a software control that prevents multiple users from simultaneous access to data that is being modified.

True

T/F: A major difference between the database and flat-file models is the pooling of data into a common shared database.

True

T/F: An ER diagram is a graphical representation of a data model.

True

T/F: An advantage of using an indexed random file structure is that records are easily added and deleted.

True

T/F: Backup policy should balance inconvenience of frequent activity against business disruption caused by system failure.

True

T/F: Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.

True

T/F: Data normalization groups data attributes into tables in accordance with specific design objectives.

True

T/F: Databases reduce the redundancy of the information stored

True

T/F: EAM's allow auditors to identify significant transactions for substantive testing.

True

T/F: Generalized audit software packages are used to assist the auditor in performing substantive tests.

True

T/F: IT auditors must have a deep understanding of the client's database

True

T/F: One-to-one relationships may be created to improve the performance of the database.

True

T/F: Table names in a database must be unique

True

T/F: The hierarchical database model forces users to navigate between data elements using predefined structured paths.

True

T/F: The language to extract information from a database is called data query language

True

T/F: The two fundamental components of data structures are organization and access method.

True

T/F: Two tables in a one-to-one relationship have the same primary key.

True

T/F: View integration combines the data needs to all users into a single-entity wide schema.

True

T/F: View modeling begins by identifying the primary entities of the business function in question.

True

Which statement is true about a hashing structure? a. The same address could be calculated for two records. b. Storage space is used efficiently. c. Records cannot be accessed rapidly. d. A separate index is required.

a. The same address could be calculated for two records.

Pointers can be used for all of the following except a. to locate the subschema address of the record. b. to locate the physical address of the record. c. to locate the relative address of the record. d. to locate the logical key of the record.

a. to locate the subschema address of the record.

A table is in third normal form when it is a. free of repeating group data b. free of transitive dependencies c. free of partial dependencies d. free of deletion anomalies e. none of the above

b. free of transitive dependencies

The deletion anomaly in unnormalized databases a. is easily detected by users b. may result in the loss of important data c. complicates adding records to the database d. requires the user to perform excessive updates

b. may result in the loss of important data

In a relational database a. the user's view of the physical database is the same as the physical database b. users perceive that they are manipulating a single table c. a virtual table exists in the form of rows and columns of a table stored on the disk d. a programming language (COBOL) is used to create a user's view of the database

b. users perceive that they are manipulating a single table

Generalized audit software packages perform all of the following tasks except a. recalculate data fields b. compare files and identify differences c. stratify statistical samples d. analyze results and form opinions

d. analyze results and form opinions

A transitive dependency a. is a database condition that is resolved through special monitoring software. b. is a name given to one of the three anomalies that result from unnormalized database tables. c. can exist only in a table with a composite primary key. d. cannot exist in tables that are normalized at the 3NF level. e. is none of the above.

d. cannot exist in tables that are normalized at the 3NF level.

Which statement is not true? Embedded audit modules a. can be turned on and off by the auditor. b. reduce operating efficiency. c. may lose their viability in an environment where programs are modified frequently. d. identify transactions to be analyzed using white box tests.

d. identify transactions to be analyzed using white box tests.

Which of the following statements is not true? a. Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records. b. Indexed random files use disk storage space efficiently. c. Indexed random files are efficient when processing a large portion of a file at one time. d. Indexed random files are easy to maintain in terms of adding records.

c. Indexed random files are efficient when processing a large portion of a file at one time.

Database anomalies are symptoms of structural problems within tables called a. tuples b. dependencies c. collisions d. Attributes

c. collisions

In the relational database model a. relationships are explicit b. the user perceives that files are linked using pointers c. data is represented on two-dimensional tables d. data is represented as a tree structure

c. data is represented on two-dimensional tables

The most serious problem with unnormalized databases is the a. update anomaly b. insertion anomaly c. deletion anomaly d. none of the above

c. deletion anomaly

A table is in second normal form when it is a. free of repeating group data b. free of transitive dependencies c. free of partial dependencies d. free of insert anomalies e. none of the above

c. free of partial dependencies

Each of the following is a relational algebra function except a. join b. project c. link d. restrict

c. link

In a hashing structure, a. two records can be stored at the same address. b. pointers are used to indicate the location of all records. c. pointers are used to indicate the location of a record with the same address as another record. d. all locations on the disk are used for record storage.

c. pointers are used to indicate the location of a record with the same address as another record.

Which statement is not correct? The VSAM structure a. is used for very large files that need both direct access and batch processing. b. may use an overflow area for records. c. provides an exact physical address for each record. d. is appropriate for files that require few insertions or deletions.

c. provides an exact physical address for each record.

Which of the following is not a common form of conceptual database model? a. hierarchical b. network c. sequential d. relational

c. sequential

Which statement is correct? a. in a normalized database, data about vendors occur in several locations b. the accountant is responsible for database normalization c. in a normalized database, deletion of a key record could result in the destruction of the audit trail d. connections between M:M tables are provided by a link table

d. connections between M:M tables are provided by a link table

A user view a. presents the physical arrangement of records in a database for a particular user b. is the logical abstract structure of the database c. specifies the relationship of data elements in the database d. defines how a particular user sees the database

d. defines how a particular user sees the database

It is appropriate to use a sequential file structure when a. records are routinely inserted. b. single records need to be retrieved. c. records need to be scanned using secondary keys. d. a large portion of the file will be processed in one operation.

d. a large portion of the file will be processed in one operation.

Which of the following is a relational algebra function? a. restrict b. project c. join d. all are relational algebra functions

d. all are relational algebra functions

Pointers are used a. to link records within a file. b. to link records between files. c. to identify records stored in overflow. d. all of the above.

d. all of the above.

View modeling includes a. constructing a data model showing entity associations. b. constructing the physical database. c. preparing the user views. d. all of the above.

d. all of the above.


Ensembles d'études connexes

Chapter 34: HF Evolve Practice Questions

View Set

Chapter 18: Postpartum Psychosocial Adaptations

View Set

MAN 4701 FSU Daniels Ch. 18 Dynamic Study Module and Study Plan Questions

View Set

The Americans Chapter 14 Section 3 Terms+Questions

View Set

(Complete) Chapter 05: Receivables and Sales

View Set