A5324_C4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The database approach has several unique characteristics not found in traditional (flat-file) systems, specifically file-oriented systems. Which one of the following statements does not apply to the database model? (p.135) a. Database systems increase user interface with the system through increased accessibility and flexibility. b. Database systems contain a data definition language that helps describe each schema and subschema. c. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. d. A primary goal of database systems is to minimize data redundancy. e. Database systems have data independence; that is, the data and the programs are maintained separately, except during processing. X

? Database systems increase user interface with the system through increased accessibility and flexibility

Which one of the following is not a control involved in maintaining database integrity and availability (Supp Reading 4 p.5) a. minimization of nonsystem tool access b. database reorganization c. enforced standards d. all of the other items are such controls x e. establish access controls f. establish data backup and recovery

? all of the other items are such controls

A company needs to have information processed at its home office and at five locations around the state. The database that must be used for this configuration would be a. Any of these can be used. b. Centralized. c. Replicated. d. Partitioned.

Any of these can be used.

In an inventory system on a database management system (DBMS), one stored record contains part number, part name, part color, and part weight. These individual items are called a. Attributes. b. Bytes. c. Stored files. d. Occurrences.

Attributes

That element of a DBMS that provides a description of every item stored in the database is the a. DD b. DME c. DML d. DS e. DBA

DD

Several language interfaces exist in a database management system. These typically include a data-definition language (DDL), a data control language (DCL), a data-manipulation language (DML), and a database query language (DQL). What language interface would a database administrator use to establish the structure of database tables? a. DDL. b. DCL. c. DQL. d. DML.

DDL

That element of a DBMS that describes the location of the data in a database is the a. DD b. DML c. DBA d. DME e. DS

DS

If an auditor needed to know the details of a number of specific data elements contained in a database, the auditor could probably find all of this information in a a. Data encryption. b. Decision table. c. Data dictionary. d. Database schema.

Data dictionary.

If an auditor needed to know the details of a number of specific data elements contained in a database, the auditor could probably find all of this information in a a. Data dictionary. b. Decision table. c. Data encryption. d. Database schema.

Data dictionary.

Of the following, the greatest advantage of a database (server) architecture is a. Backup and recovery procedures are minimized. b. Multiple occurrences of data items are useful for consistency checking. c. Conversion to a database system is inexpensive and can be accomplished quickly. d. Data redundancy can be reduced.

Data redundancy can be reduced.

Which of the following is a characteristic of a relational database system a. Tables in 1:M associations are linked by embedding the primary key of the M side tables into the 1 side table as a foreign key. b. Tables are linked to other related table through pointers. c. Each table must contain an attribute whose value is unique. d. A parent table may be related to many child tables, but a child table may have only one parent.

Each table must contain an attribute whose value is unique

In a hierarchical database model, it is impossible for a segment to have multiple parents. a. False b. True

False

For those instances where individual users may be granted summary and statistical query access to confidential data to which they normally are denied access, which type of control is most suitable? a. User-defined procedures b. Inference controls c. Data encryption d. Biometric devices

Inference controls

Tables that are similar to flat file structures are used in database management systems (DBMS) when a a. Simple network structure is employed. b. Relational database model is selected for use. c. Complex network structure is employed. d. Network-based structure is used and a complex database schema is developed.

Relational database model is selected for use.

Which statement is false? a. The DBMS does not control access to the database. b. During processing, the DBMS periodically makes backup copies of the physical database c. The DBMS is special software that is programmed to know which data elements each user is authorized to access. d. User programs send requests for data to the DBMS.

The DBMS does not control access to the database.

Which of the following database models is considered to be the most versatile? a. The tree model. b. The network model. c. The hierarchical model. d. The relational model.

The relational model.

Which of the following is a level of the database that is defined by the data definition language? a. user view b. all are levels or views of the database c. internal view d. schema

all are levels or views of the database

If a company is using a DBMS system, user access can be controlled which of the following levels? a. transaction and the database b. program and data field c. transaction d. data field e. all of the other items can be controlled levels

all of the other items can be controlled levels

If a company is using a DBMS system, user access can be controlled which of the following levels? a. data field b. transaction c. program and data field d. transaction and the database e. all of the other items can be controlled levels

all of the other items can be controlled levels

Which of the following is not an access control in a database system? a. passwords b. voice prints c. database authorization table d. antivirus software

antivirus software

An inventory table in a relational database system contains values for items such as part number, part name, description, color, and quantity. These individual items are called a. record types b. occurrences c. attributes d. bytes

attributes

Which of the following is not a test of access controls? a. encryption controls b. backup controls c. inference controls d. biometric controls

backup controls

One way in which users can access the database is by a. by developing operating software b. by direct query c. by constantly interacting with systems programmers d. none of these are correct

by direct query

Which term is not associated with the relational database model? a. collision b. relation c. attribute d. tuple

collision

What control maintains complete, current, and consistent data at all information processing units? a. deadlock control b. gateway control c. concurrency control d. replication control

concurrency control

All of the following are elements of the DBMS which facilitate user access to the database except a. data access language b. query language c. data definition language d. data manipulation language

data access language

A particular entity in a database is logically defined by which of the following? a. data record b. database. c. record type d. data attribute e. entity

data attribute

All of the following are basic data management tasks except a. data deletion b. data retrieval c. data storage d. data attribution

data attribution

In the relational database model a. data is represented as a tree structure b. the user perceives that files are linked using pointers c. data is represented on two-dimensional tables d. relationships are explicit

data is represented on two-dimensional tables

Which procedure will prevent two end users from accessing the same data element at the same time? a. data replication b. data lockout c. data redundancy d. none of these is correct

data lockout

The task of searching the database to locate a stored record for processing is called a. data deletion b. data retrieval c. data storage d. data attribution

data retrieval

Which characteristic is associated with the database approach to data management? a. multiple storage procedures b. excessive storage costs c. data redundancy d. data sharing

data sharing

The advantages of a partitioned database include all of the following except a. data transmission volume is increased b. response time is improved c. risk of destruction of entire database is reduced d. user control is enhanced

data transmission volume is increased

Where are database access permissions defined a. database schema b. database authority table c. application programs d. operating system e. systems manual

database authority table

Which of the following is not a basic database backup and recovery feature? a. checkpoint b. database authority table c. backup database d. transaction log

database authority table

The functions of a database administrator are a. database operations, database maintenance, and data input preparation. b. database design, database implementation, and database planning, c. database planning, data input preparation, and database design. d. database design, database operation, and equipment operations. e. data input preparation, database design, and database operation.

database design, database implementation, and database planning,

The data manipulation language a. transfers data to the buffer area for manipulation b. enables application programs to interact with and manipulate the database c. describes every data element in the database d. defines the database to the database management system

enables application programs to interact with and manipulate the database

Which of the following is not a responsibility of the database management system? a. ensure that the internal schema and external schema are consistent b. provide an interface between the users and the physical database c. authorize access to portions of the database d. provide recovery from a disaster

ensure that the internal schema and external schema are consistent

Which backup technique is most appropriate for sequential batch systems? a. grandparent-parent-child approach b. direct backup c. remote site, intermittent backup d. staggered backup approach

grandparent-parent-child approach

The data definition language a. describes every data element in the database b. permits users to process data in the database without the need for conventional programs c. identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database d. inserts database commands into application programs to enable standard programs to interact with and manipulate the database

identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database

The feature of a relational database the allows rapid searches for detailed data is the ability to used a. something other than the other items listed b. pointers c. partitioning d. tuples e. networking f. indexing

indexing

The feature of a relational database the allows rapid searches for detailed data is the ability to used a. pointers b. something other than the other items listed c. partitioning d. indexing e. tuples f. networking

indexing

Data concurrency a. is a security issue in partitioned databases b. may result in data lockout c. is implemented using timestamping d. occurs when a deadlock is triggered

is implemented using timestamping

The feature of a relational database that allows users to access related data elements that are not stored together is know as: a. tupling b. indexing c. pointing d. partitioning e. searching f. joining g. networking h. embracing

joining

The feature of a relational database that allows users to access related data elements that are not stored together is know as: (Supp Reading 4 p.4) a. embracing b. joining c. tupling d. searching e. pointing f. indexing g. networking h. partitioning

joining

In a batch processing system using a direct access file system a. backups are created using the grandfather-father-son approach b. if the master file is destroyed, it cannot be reconstructed c. processing a transaction file against a maser file creates a backup file d. master files are usually backed up immediately before an update run

master files are usually backed up immediately before an update run

If the database is inadvertently destroyed or fails, you better hope it is not a a. network database b. tree data base c. relational database d. imbedded database e. hierarchical database

network database

The process used to speed up user queries of a database is known as a. stratification b. partitioning c. normalization d. revision e. atomization

normalization

In the relational database model all of the following are true except a. data can be extracted from specified rows from specified tables b. only one-to-many relationships can be supported c. data are presented to users as tables d. a new table can be built by joining two tables

only one-to-many relationships can be supported

A database system that has several remote users networked together, but each user site stores a unique portion of the database is called a a. partitioned database. b. replicated data processing network. c. hybrid system d. recentralized network e. multidrop data network

partitioned database

An example of a distributed database is a. networked database b. partitioned database c. centralized database d. all are examples of distributed databases

partitioned database

Partitioned databases are most effective when a. primary users of the data are clearly identifiable. b. all of the above. c. users in the system need to share common data. d. read-only access is needed at each site.

primary users of the data are clearly identifiable.

All of the following tests of controls will provide evidence that access to the data files is limited except a. attempting to retrieve unauthorized data via inference queries b. inspecting biometric controls c. comparing job descriptions with access privileges stored in the authority table d. reconciling program version numbers

reconciling program version numbers

Which of the following is not an advantage of a data base management system a. increased flexibility b. minimization of storage cost through data sharing c. increased data security d. data independence for applications e. reduced hardware cost

reduced hardware cost

Which statement is not correct? A query language like SQL a. is written in a fourth-generation language b. requires user familiarity with COBOL c. reduces reliance on programmers d. allows users to retrieve and modify data

requires user familiarity with COBOL

Which of the following is not a problem usually associated with the flat-file approach to data management? a. data storage b. currency of information c. data redundancy d. restricting access to data to the primary user

restricting access to data to the primary user

Which of the following is not a common form of conceptual database model? a. relational b. hierarchical c. network d. sequential

sequential

The textbook refers to four interrelated components of the database concept. Which of the following is not one of the components? a. the conceptual database b. the database administrator c. the database management system d. the physical database

the conceptual database

A description of the physical arrangement of records in the database is a. the subschema b. the internal view c. the external view d. the conceptual view

the internal view

When creating and controlling backups for a sequential batch system, a. off-site backups are not required b. backup files can never be used for scratch files c. the more significant the data, the greater the number of backup versions d. the number of backup versions retained depends on the amount of data in the file

the more significant the data, the greater the number of backup versions

Which of the following may provide many distinct views of the database? a. the internal view b. the conceptual view c. the user view d. the schema

the user view

In a hierarchical model a. a member (child) record may have more than one owner (parent) b. an owner (parent) record may own just one member (child) record c. the way to access data is by following a predefined data path d. links between related records are implicit

the way to access data is by following a predefined data path

A replicated database is appropriate when a. there exists a high degree of data sharing and no primary user b. there is no risk of the deadlock phenomenon c. most data sharing consists of read-write transactions d. there is minimal data sharing among information processing units

there exists a high degree of data sharing and no primary user

Which duty is not the responsibility of the database administrator? a. to design application programs b. to implement security controls c. to develop and maintain the data dictionary d. to design the subschema

to design application programs

The database attributes that individual users have permission to access are defined in the a. user manual. b. operating system c. user view. d. database schema. e. application listing.

user view.

In a relational database a. a programming language (COBOL) is used to create a user's view of the database b. a virtual table exists in the form of rows and columns of a table stored on the disk c. the user's view of the physical database is the same as the physical database d. users perceive that they are manipulating a single table

users perceive that they are manipulating a single table

Data currency is preserved in a centralized database by a. partitioning the database b. implementing concurrency controls c. using a lockout procedure d. replicating the database

using a lockout procedure

Audit objectives for the database management system include all of the following except a. verifying that the security group monitors and reports on fault tolerance violations b. ensuring that authorized users access only those files they need to perform their duties c. verifying that unauthorized users cannot access data files d. confirming that backup procedures are adequate

verifying that the security group monitors and reports on fault tolerance violations


Ensembles d'études connexes

Chapter 6 Foundations of Business

View Set

Chapters 14-16 APES Test Questions 70-121

View Set

Anatomy and Physiology Chapter 11 Mastering Questions

View Set

Life Insurance Policy provisions, exclusions, and phrohibitions

View Set

Ahora Escucha Drop down Activity Audio Textbook Hide details InstructionsYou will hear first José talking, then Anabela. As you listen, check off each person's favorite activities.

View Set

EAQs Fundamentals: Health and Physical Assessment

View Set

Chapter 9 Series 65 Financial Reporting

View Set

Simulation Lab 7.1: Module 07 Secure Switch Ports in Packet Tracer

View Set

U.S. History Andrew Jackson Summative

View Set

Declaration of Independence principles /Ideals

View Set