ALA- Databases

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Given the Four V's of Big Data, which of the following organizations most likely uses Big Data?

A leading news website that uses data about its visitors' and followers' activities to shape its news coverage, customize news alerts, and gain advertisers and subscribers.

What are the primary layers of database security?

Access level Database level Perimeter level

Which of the following is an example of an organization analyzing predictive behavior with the goal of creating new offerings?

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

Which of the following improvements might be the direct outcome of a data quality audit?

Corrections in source data issues and ways to examine data over time Recommendations for a new data management design and prescriptions for preserving data quality Elimination of redundant metadata and strengthened referential integrity

Brooks Accounting is no stranger to audits—for their customers. Managers discovered some issues in services and billing they suspected were linked to their database practices rather than to employee competence. Brooks hired an outside firm to perform a data quality audit. Which statement best describes how the audit process identified problems?

Data profiling analyzed the accounting firm's data sources.

Which statement best summarizes how organizations use data warehouses?

Data warehouses are used to store data from multiple sources for collective analysis

Which of the following is a task that data administration would be responsible for?

Defining policies stating that employees may not share data with people who are not employees of the organization. Deciding that the organization will begin collecting and storing users' locations upon the release of the next generation software for its mobile app. Determining that two-factor identification must be used to access data that the company has determined to be confidential.

Which of the following statements correctly describes referential integrity?

For referential integrity to exist, data on both sides of the table relationship must be present. Referential integrity applies to data quality within the structure of a relational database.

Why is online analytical processing (OLAP) software included in many business intelligence (BI) software applications?

It allows for sophisticated data and trend analysis, data modeling, and forecasting. It allows users to view data from different perspectives or angles and gain new insights. It allows reports and analytics to be exported to more user-friendly, front-end tools.

Why is online analytical processing (OLAP) software included in many business intelligence (BI) software applications?

It allows users to view data from different perspectives or angles and gain new insights. It allows reports and analytics to be exported to more user-friendly, front-end tools. It allows for sophisticated data and trend analysis, data modeling, and forecasting.

How does the structure of an online analytical processing (OLAP) database shape its core functionality?

Its use of data cubes allows users to conduct complex queries, analyses, and modeling by taking multiple dimensions of data (types or levels) into account and viewing data from multiple viewpoints or "slices" (such as by date and location).

Which of the following are primary goals of database normalization?

Maintain data consistency. Reduce data redundancy. Avoid anomalies during database operations

Which of the following are examples of data objects that a relational database management system (RDBMS) may include?

Names of customers and records of when merchandise was returned Addresses of the company's wholesalers and the number of items in a company's inventory

Why is it important for all organizations, no matter how small, to create and implement organizational information policies?

Organizational data are a critical asset; it is important to ensure its security.

Which of the following statements describe the capabilities of relational database management system (RDBMS)?

RDBMS allow users to view, add, revise, and remove data. RDBMS have features that support the quality and security of data.

Which of the following are roles of AI in data management?

Reducing errors in data Extracting and structuring data from various media Optimizing database resources

For which task is a data mart more useful or appropriate than a data warehouse?

Resolving a current problem with a specific type of inventory, purchase transaction, or supply chain

Characteristics of Big Data

The data are from structured and unstructured sources and exist in multiple forms. The data are measured in terabytes (trillions of bytes) or even larger units.

A mid-sized independent hardware store has recently merged with a large national chain. The local owners have long used a reliable database to manage inventory. Their database has been essential in balancing orders for seasonal merchandise with the problem of limited shelf space. The merger will soon entail managing many more types of data, as the national chain has approved lists of suppliers, precise requirements for recording transactions, specific human resources procedures, and more. Which statement best summarizes what the local managers will be able to do for the first time when they start using the parent company's database management system (DBMS)?

The managers will be able to create, edit, and store data in a secure manner across all data types required by the parent company.

Why must database administrators (DBA) be trained or experienced in using an organization's specific database platform?

They must troubleshoot or solve problems with the database when necessary.

What is the primary role of a database administrator (DBA)?

To monitor the database and ensure that it functions when needed

What security measures are commonly used at the perimeter level of database security?

VPNs Firewalls

In which of the following scenarios is denormalization beneficial?

Where data retrieval speed is prioritized In data warehousing scenarios

Establishing how an organization manages its data and making sure the organization adheres to these methods is a function called ______.

data administration

Organizations use data warehouses mainly to ______.

facilitate the analysis of data from multiple sources

Organizations perform data quality audits in order to ______.

gain an overall assessment of the strengths and weaknesses of their data

A company's periodic web mining exercise to determine its best-selling products resulted in the discovery that a product sold in conjunction with a movie released 10 years ago has recently become coveted by nostalgia fans. The company redesigned its website so that interested consumers can purchase the product right on the homepage. This company has used web mining to ______.

improve site usability

Businesses can use in-memory computing to conduct or support almost any task that ______.

involves the near-instantaneous processing and analysis of huge volumes of data

Which database design strategy is likely to be used where transaction integrity is critical?

normalization

Analytic platforms are designed to ______.

quickly gather and analyze specific organizational data to provide information that guides decision making

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

big data


Ensembles d'études connexes

NCLEX mental health questions for exam 2

View Set

Management Final Exam; ch. 3, 11, 12, 13, 14, 15, 16

View Set

Culture & Diversity NCLEX Questions

View Set

Physics Final Unit 1: Laws of Motion & Mechanics

View Set

ICS2 Official Practice Test Domain 6: Identity and Access Management

View Set

Chapter 17 - Preoperative Nursing Management

View Set

FRSC 675 Forensic Serology and DNA Analysis Exam 1 Review

View Set