IS212 Chapter 5
How many bits make up a byte?
8
record
A collection of data fields that are all related to one object, activity, or individual
What are the smallest piece of information in the data hierarchy?
Bits
In a database, bits can be organized into bytes, and each byte represents is a(n) ______.
Character
If you had a job where you were responsible for setting policies and managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data, you would be a ________.
Data lifecycle manager
A(n) __________ uses basic graphical symbols to show the organization of and relationships between data.
Entity-relationship diagram
A database, a database management system, and the application programs that use the data make up the communication environment in an organization. Review the Introduction in the text.
False
If an organization uses the traditional approach to data management, it would have multiple information systems sharing a pool of related data.
False
T/F: One of the primary disadvantages of a relational database is that it allows large amounts of redundancy among data.
False
In the relational database model, each row of a table represents a record.
False (entity)
The database approach to managing data is not as good as the traditional file-based approach, where each operational system uses its own data files.
False (it is better because multiple information systems can share a pool of related data)
Ron is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use "joining" to create his new database.
False (projecting)
With an in-memory database, the entire database is stored in cache memory, providing access to data at much faster rates than if data is stored on some form of secondary storage.
False (stored in random access memory)
Database management systems are often used with other software, but only when they act as a front-end application.
False (they act as either front-end application or back-end application)
Suppose we have a table that stores Instructors data. Within it, there is a field called "instructorID" that uniquely identifies each instructor record. This field is known as the ID key.
False (would be known as primary key)
Which of the following statements is true of a database?
It can contribute to organizational success by providing timely, accurate, and relevant information built on data.
If you wish to use a visual approach to query building, you would use ________.
Query by Example
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
SQL
In a data warehouse, during which stage of the ETL process is the data subjected to a series of rules or algorithms that will derive the data that's meant to be stored from the rest?
Transform
A DBMS is a group of programs used as an interface between a database and application programs or a database and the user.
True
A database administrator (DBA) is trained to apply database programming languages to craft a set of databases to meet an organization's needs.
True
Adherence to the standards defined in the data dictionary makes it easy to share data among various organizations.
True
Among the many challenges related to big data is the difficulty in distinguishing relevant data from irrelevant data and then deriving value from that relevant data.
True
An enterprise data model involves modeling the information needs of an entire organization.
True
If an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a data lake.
True
In a relational database model, the cost of performing data cleansing or data scrubbing can be quite high.
True
In the context of the relational database model, joining involves combining two or more tables.
True
Large database systems typically use schemas to define the tables and other database features associated with a person or user.
True
Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations.
True
The relational model is used to place data in two-dimensional tables.
True
Unstructured data comes from sources such as social media, email, and surveillance video.
True
While building a database, an organization must carefully consider content, access, logical structure, and physical organization.
True
Leila's employer, a major auto manufacturer, has asked her to capture and review the tsunami of social media posts and customer service emails about their company's latest recall. In terms of the characteristics of big data, Leila is dealing with ________.
Variety
entity
a general class of people, places, or things for which data is collected, stored, and maintained.
The _______________ allows users to relate data in new ways without having to redefine complex relationships.
ability to link relational tables
Hadoop
an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets.
SQL databases conform to ACID properties, which stands for _______.
atomicity, consistency, isolation, durability
William works at a paper goods distributor. He is responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in the organization. William is a ________.
data administrator
The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database is called ________.
data cleansing
Suppose you wish to find what tables are in a database, what fields they have, and how they are related. You would review the _____.
data dictionary
Sometimes incomplete, incorrect, inaccurate, or irrelevant data has to cleaned, which can be corrected or deleted through_______.
data scrubbing
A ______ is the highest level of data hierarchy.
database
A data definition language is a collection of instructions and commands used to __________.
define and describe data and relationships in a specific database
Data governance
defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization
data dictionary
detailed description of all data used in the database, and usually includes the name of the data item, the range of values that can be used, and more.
In relational database, projecting..
involves eliminating columns in a table
In relational database, what is selecting
involves eliminating rows according to certain criteria
A field
is typically a name, number, or combination of characters that describes an aspect of a business object, such as a location.
What are the four main categories of NoSQL
key value, document, graph, and column
_____ is a popular open-source DBMS.
mySQL
Each attribute in a ________ model can be constrained to a range of allowable values called a domain.
relational database
A _____ is a database system whose files have relationships to one another.
relational system
Data lifecycle manager
responsible for setting policies and managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data.
If you have weekly sales data and you wish to get monthly sales data, then use the ______ feature.
roll up
A data mart is a ______.
subset of a data warehouse
With Database as a Service, the database is stored on a service provider's server and accessed by the client over _______.
the Internet
A major advantage of NoSQL databases is
the horizontal scaling capability, which enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates.
A database should be designed to store all data relevant to the business and provide quick access and easy modification.
true
If "temperature" is an attribute, then "80 degrees" is a data item.
true
A primary key is a field or set of fields in a record that _______.
uniquely identifies the recofd
The primary key is
used to distinguish records so that they can be accessed, organized, and manipulated.