Chapter 4 InfoSys

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A credit card company wants to spot elusive patterns in credit card transaction records to be able to block fraudulent transactions. This company should use ________. A) data mining B) data modeling C) data drudging D) data transformation

Answer: A

A database schema is used to ________. A) graphically document a data model B) record details of the fields in a table C) create a backup of a database D) identify redundant information in a database

Answer: A

A central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning is called a ________. A) data warehouse B) data dictionary C) data model D) database shard

Answer: A

A drawback of the hierarchical database was that ________. A) it was ineffective at handling many-to-many relationships B) it did not mimic every detail of an organizational chart C) it worked only for one-to-one relationships D) it failed to reduce redundancies introduced by file systems

Answer: A

A field or a group of fields that make a record unique in a table is called a(n) ________. A) primary key B) autonumber C) central entity D) attribute record

Answer: A

A person who ensures that people adhere to the definitions for the master data in their organizational units is called a(n) ________. A) data steward B) database administrator C) information systems educator D) management analyst

Answer: A

An operational database is not a good candidate for high-level management reporting because it is not equipped to ________. A) handle complex queries for strategic planning B) support what-if type questioning C) manipulate information related to business performance D) return high-quality information

Answer: A

Batch processing is defined as ________. A) the sequential execution of operations on each record in a large set B) the arrangement of data in a table as records and fields C) the removal of duplicates from a set of data D) the strategy of defining and linking records

Answer: A

Database architecture that has multidimensional data grouped in logical dimensions, such as sales by product, city, region, and country, is called ________. A) data cubes B) operational database C) data warehouse appliance D) data mining

Answer: A

Databases are created and handled using ________. A) database management software B) database architecture software C) data modeling software D) data definition software

Answer: A

Databases that are smaller than enterprise databases and focus on their creators' specific information requirements are known as ________. A) shadow systems B) data warehouses C) data stewards D) referential schemas

Answer: A

How is metadata related to information? A) It helps clarify the nature of the information. B) It helps gather unstructured information. C) It organizes unstructured information to form structured information. D) It removes redundant data from unstructured information.

Answer: A

In a relational database, information is organized into tables in which each row represents a(n) ________. A) record B) field C) attribute D) primary key

Answer: A

In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key-department ID. In the student table, department ID is a ________. A) foreign key B) primary key C) complex key D) functional key

Answer: A

Pieces of information that cannot be linked together are called ________. A) unstructured information B) semi-structured information C) structured information D) secure information

Answer: A

SQL links tables together by ________. A) using primary keys and foreign keys B) using data stored in cloud computers C) assigning incremental numbers to records D) assigning XML tags to the tables

Answer: A

Shadow systems focus on ________. A) specific information requirements of an individual or department B) improving the scalability of relational databases C) intelligence gathering and strategic planning D) reducing redundancies in relational data

Answer: A

Structured information can be defined as data ________. A) that can be organized into hierarchies B) that cannot be linked together C) about data that clarifies the nature of the information D) that is difficult to break down

Answer: A

Structured query language is a standard query language ________. A) used to manipulate information in relational databases B) that uses the signals transmitted via the phone to access databases C) that offers voice commands as a means to access a database D) used to enhance security, plan capacity requirements, and design backup

Answer: A

The process by which users are directed to a copy of the database when the main one fails is called ________. A) mirroring B) threading C) tuning D) scaling

Answer: A

The process of retrieving data from multiple sources to be loaded into a data warehouse is called ________. A) extraction B) transformation C) loading D) normalization

Answer: A

Which of the following ensures that there will be minimum redundancy in a relational database? A) foreign keys B) autonumbers C) functionally independent attributes D) one to one relationships

Answer: A

Which of the following is used to spot trends, identify patterns, generate reports for compliance purposes, do research, and plan strategies? A) data warehouse B) operational database C) data dictionary D) transaction database

Answer: A

While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report's properties. What type of information is Ashley adding to her report? A) metadata B) count data C) boolean data D) binary data

Answer: A

________ is a process that refines entities and their relationships to help minimize duplication of information in tables. A) Normalization B) Autonumbering C) Querying D) Data modeling

Answer: A

________ refers to collections of data that are so enormous in size, so varied in content, and so fast to accumulate that they are difficult to store and analyze using traditional approaches. A) Big data B) Data cube C) Meta data D) Shard

Answer: A

________ specifies the characteristics of a field, such as the type of data it will hold. A) Data definition B) A record C) Database architecture D) An entity

Answer: A

________ uses statistical techniques to explore a data warehouse and hunt for hidden patterns and relationships that are undetectable in routine reports. A) Data mining B) Data extracting C) Data modeling D) Data normalizing

Answer: A

A data model that graphically shows the tables, attributes, keys, and logical relationships for a database is called a ________. A) data graph B) shadow schema C) database schema D) referential schema

Answer: C

A foreign key is ________. A) an attribute that is present in only one table B) a primary key which appears as an attribute in a different table C) a unique value or attribute that determines a primary key D) a field, or a group of fields, that makes each record unique in a table

Answer: B

An approach that attempts to achieve consistent and uniform definitions for entities and their attributes across all business units is called ________. A) normalization B) master data management C) data modeling D) database mirroring

Answer: B

Documentation that contains the details of each field in every table, including user-friendly descriptions of the field's meaning, is known as ________. A) database schema B) data dictionary C) data model D) data definition

Answer: B

In Robin Dave Hospital, visiting physicians use different spreadsheets to record the name, address, mobile number, and email of clients. These individual spreadsheets are then compiled by a data-entry operator into one spreadsheet. What type of information does the compiled spreadsheet represent? A) unstructured information B) semi-structured information C) structured information D) secure information

Answer: B

Julian, a database administrator, prepares data to be loaded to a data warehouse. He checks the zip code field against a reference database of zip codes to ensure that it conforms to standards. The zip codes that aren't in the standard format are reformatted. This process is called ________. A) extraction B) transformation C) loading D) normalization

Answer: B

Retrieval is very fast through data cubes because ________. A) data cubes use a separate server which is tuned for fast retrieval and reporting B) data cubes group data in logical dimensions, such as sales by product, city, region, and country C) data cubes represent information in the form of objects, using object-oriented programming languages to access them D) data cubes organize data by attaching XML tags to them

Answer: B

The database model that organizes information into tables of records that are connected to one another by linking a field in one table to a field in another table is called ________. A) hierarchical database B) relational database C) network database D) object-oriented database

Answer: B

The database performance tuning process takes into account ________. A) the system's capacity of scaling B) the kind of data accessed by the end users C) the language used by users to access the database D) the security permissions accorded to different users

Answer: B

The early file processing systems were very difficult to maintain because of ________. A) complicated tables and fields with no metadata B) data dependency between the programs and files C) frequent software upgrades D) lack of database administrators and IT personnel

Answer: B

To collate innovative ideas for an important business project, a manager creates a database which is not integrated into the enterprise database. The new database is an example of a(n) ________. A) mirror database B) shadow system C) information system D) data warehouse

Answer: B

Trekking blindly into terabytes of data to sniff out meaningless relationships that occur just by accident is called ________. A) data mining B) data drudging C) data modeling D) normalizing

Answer: B

What is the drawback of using Social Security Numbers (SSN) as the primary key for tables of employees, hospital patients, students, or cable TV customers? A) Typing the nine digit SSN numbers is laborious and time consuming. B) Non-U.S. citizens may not have an SSN. C) It is not a confidential identification number. D) It is not a unique identification number.

Answer: B

When building a warehouse, the process of reformatting data so that it conforms to set standards is called ________. A) extraction B) transformation C) loading D) normalization

Answer: B

Which database architecture is popularly used for organizing complex data types such as graphics and multimedia? A) stratified database B) object-oriented database C) network database D) relational database

Answer: B

Which of the following database architectures works well for one-to-many relationships, but is not effective with many-to-many relationships? A) network database B) hierarchical database C) object-oriented database D) cluster database

Answer: B

Which of the following databases resembles an organizational chart? A) network database B) hierarchical database C) stratified database D) cluster database

Answer: B

Which of the following is a characteristic of structured information? A) It cannot be linked together to enable searching and sorting. B) It can be broken down into component parts and organized in hierarchies. C) It is contained in physical data storage such as printouts. D) It only includes homogenous data types in one set of information.

Answer: B

Which of the following technologies is better equipped than relational databases to handle big data? A) MySQL B) Hadoop C) ETL D) SQL Server

Answer: B

Which of the following uses databases without boundaries? A) a government website offering information to visitors B) a social networking website C) a bank website D) a management information system

Answer: B

Which type of database architecture does Oracle use? A) network database B) relational database C) hierarchical database D) object-oriented database

Answer: B

White and Brown, a legal firm, stores details of each case in physical files and folders. The firm has a back room stacked with boxes containing hundreds of files. White and Brown's storage structure resembles ________. A) semi-structured information B) unstructured information C) meta data D) relational data

Answer: B

________ takes advantage of signals transmitted via the phone to access a database, retrieve account information, and enter data. A) Structured query language B) Interactive voice response C) Electronic reported outcome D) Dialog system

Answer: B

A company maintains a centralized repository of information from internal sources, competitor information, census reports, and metadata from documents and multimedia. This is known as a ________. A) data dictionary B) data model C) data warehouse D) database shard

Answer: C

A model used for planning the organization's database that identifies what kind of information is needed, what entities will be created, and how they are related to one another is called a(n) ________. A) archiving model B) functional model C) data model D) hierarchical model

Answer: C

A separate file processing system leads to the creation of redundant information because ________. A) it does not allow changes to be made to existing file structures B) computer programs create a fresh record for each task C) each set of computer programs operates on its own records D) different sets of computer programs process files in a similar manner

Answer: C

A system's ability to handle rapidly increasing demand is called ________. A) load balancing B) parallelism C) scalability D) caching

Answer: C

Aban Constructions Limited, a construction company, maintains data in the form of records within tables, and the tables are interconnected by linking matching fields. Which type of database architecture does Aban Constructions Limited use? A) hierarchical database B) network database C) relational database D) object-oriented database

Answer: C

An attribute of an entity in a table is called a ________. A) record B) subset C) field D) character

Answer: C

Flippy, an online shoe store, uses an information system to store sales transactions with clearly defined fields for date, customer number, item number, invoice number, and amount. What type of information resource does Flippy use? A) unstructured information B) semi-structured information C) structured information D) shard information

Answer: C

In comparison with unstructured information, semi-structured information ________. A) is more difficult to break down B) has no inherent order C) is easier to query and aggregate D) is more difficult to link together

Answer: C

Kris, an IT manager at Park Infosystems, is handling four projects simultaneously. Each project has loaned and shared resources from other teams. The relationship between Kris and the project that he is working on represents a ________. A) one-to-many relationship B) many-to-one relationship C) many-to-many relationship D) one-to-one relationship

Answer: C

Making changes to an integrated database is considered a challenge because ________. A) it requires extensive changes to the source code B) it renders data obsolete C) it takes less time from IT but more from the end users D) it exposes the database to external threats

Answer: C

One of the uses of databases without boundaries is in ________. A) handling online transactions of e-commerce websites B) hunting for hidden patterns and relationships in large amounts of data C) handling unstructured data during emergency disaster relief situations D) forming bridging databases between data warehouses and operational databases

Answer: C

Which of the following database architectures relies on a cooperating collection of existing databases? A) data mining B) data cubes C) virtual federated warehouse D) data warehouse appliance

Answer: C

Which of the following do database developers use to avoid anomalies that result when users try to insert, edit, or delete data? A) autonumbering B) accuracy checks C) normalization D) referential integrity

Answer: C

Which of the following is a disadvantage of using shadow systems? A) Shadow systems are difficult to create, deploy, and maintain. B) Shadow systems cannot be developed by individuals or departments to handle specific information requirements. C) Shadow systems contain information that is not consistent with the corporate database. D) Shadow systems require extensive IT support and documentation.

Answer: C

Which of the following is a function of normalization? A) assigning primary keys B) assigning incremental numbers to records C) minimizing duplication of information D) decreasing the functional dependency of data

Answer: C

Which of the following is the best way to handle complex relationships, such as the data for a company where employees can be assigned to more than one project, and each project can have more than one employee assigned to it? A) creating two or more records for the employee, each of which lists a different project B) including multiple project fields, such as project 1, project 2, and so on, for the employee C) normalizing the relationship between "employees" records and "projects" records D) making the relationship between "employees" records and "projects" records hierarchically dependent

Answer: C

________ ensures that every foreign key entry actually exists as a primary key entry in its main table. A) Scalability B) Database schema C) Referential integrity D) Database integration

Answer: C

A representation of an entity in a meaningful way, which includes the attributes of the entity, is called a ________. A) field B) primary key C) data definition D) record

Answer: D

An integrated collection of information that is logically related and stored in such a way as to minimize duplication and facilitate rapid retrieval is called a ________. A) dataset B) data dictionary C) data definition D) database

Answer: D

Databases in which people outside the enterprise enter and manage most of the records are termed as ________. A) outsourced databases B) external databases C) data warehouses D) databases without boundaries

Answer: D

In Aster Limited, the HR department did not include interns as employees in their database, while the finance department included them. Such inconsistencies can be avoided through ________. A) shadow system B) normalization C) database schema D) master data management

Answer: D

In enterprise information management, data ownership issues arise because ________. A) data is often taken from external sources B) the quality of data varies across departments C) data is often stored in databases on external servers D) data is shared by all the stakeholders in the organization

Answer: D

One goal of normalization is to ________. A) duplicate essential information B) assign primary keys to every table C) reduce the number of foreign keys D) make data functionally dependent

Answer: D

Roman Jade, an interior decorations company, stores employee details in its employee information system. The birth date of each employee is stored along with other details, including employee names. The relationship between the employee names and employee birth dates is a ________. A) one-to-many relationship B) many-to-one relationship C) many-to-many relationship D) one-to-one relationship

Answer: D

What is the main drawback of using unstructured information? A) It hinders creativity. B) It is expensive to maintain. C) It cannot be used to store numerical information. D) It makes retrieving information very difficult.

Answer: D

When using databases without boundaries ________. A) data is not shared by stakeholders B) information is secure and cannot be accessed by people outside the enterprise C) enterprises control the distribution of data D) contributors feel strong ownership over their records

Answer: D

Which database architecture is especially used for managing web content and web-based resources? A) relational database B) hierarchical database C) object-oriented database D) XML database

Answer: D

Which of the following is a disadvantage of using shadow systems? A) longer time to retrieve information B) lack of stability and security C) requirement of tools that are not easily available D) lack of documentation and support

Answer: D

Which of the following is a good master data management strategy? A) upgrading technology B) creating shadow systems C) creating a database schema D) focusing on key areas

Answer: D

Which of the following is an early database approach that allowed flexible links to support many-to-many relationships? A) hierarchical database B) stratified database C) lean database D) network database

Answer: D

Which of the following is the most widely used database architecture? A) stratified database B) object-oriented database C) network database D) relational database

Answer: D

Which process assigns incremental numbers to records as they are created to ensure that each record has a unique primary key? A) normalization B) scaling C) standardization D) autonumbering

Answer: D

Which product allows voice commands, sequenced like a natural conversation, as a means to access a database? A) Yelp B) MySQL C) Oracle D) Siri

Answer: D

________ is a prepackaged data warehouse solution offered by vendors that includes the hardware and software, maintenance, and support. A) Virtual federated appliance B) Shadow systems C) Relational database D) Data warehouse appliance

Answer: D

A marketing representative who wants to put a positive spin on a tally of recent orders chooses to include orders that have been canceled in his report. This report exemplifies high-quality data.

Answer: FALSE

Companies often use different relational DBMS for their data warehouse and operational database.

Answer: FALSE

Database developers should use meaningful information for primary keys.

Answer: FALSE

In a table, a field can contain either numeric data or text but not a combination of both.

Answer: FALSE

In an organization, each employee might work for one or more projects, as well as for different managers. In such a case, the best approach by a database manager would be to create multiple records for the employee.

Answer: FALSE

Master data management has more to do with technology than people, processes, and governance.

Answer: FALSE

One of the disadvantages of interactive voice response (IVR) is that it cannot handle massive call volumes.

Answer: FALSE

Shards or slices of a database should be accessed from the same computer for improved performance.

Answer: FALSE

The data collected by online pop-up surveys can be considered to be high-quality data.

Answer: FALSE

The process of sequentially executing operations on each record in a large batch is called data integration.

Answer: FALSE

While creating a relational database for an organization, "Employees" would constitute one attribute with employee ID number, last name, first name, birth date, email address, and phone number as entities.

Answer: FALSE

A blog with a title, subtitle, content with date of creation, and a few images exemplifies semi-structured information.

Answer: TRUE

A network database supports many-to-many relationships.

Answer: TRUE

A relational database is less dependent on the hardware and its particular operating system.

Answer: TRUE

An organization's data warehouse contains information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning.

Answer: TRUE

Building interfaces, or bridges, between different databases to link common fields is an integration strategy.

Answer: TRUE

Changes to an integrated database take less time from IT but more from the end users.

Answer: TRUE

Data stewards ensure that people adhere to the definitions for the master data in their organizational units.

Answer: TRUE

During mergers, integration of multiple databases becomes a major challenge.

Answer: TRUE

Shadow systems are managed by individuals or departments and not by the central IT staff in an organization.

Answer: TRUE

To balance the information needs of multiple stakeholders, top-level managers need clear, consistent, and accurate reports that summarize information from across the enterprise.

Answer: TRUE

When a user clicks "SUBMIT" on a web-based survey, the record is inserted into the database through an SQL command.

Answer: TRUE


संबंधित स्टडी सेट्स

MKTG Exam 2 (quizzes 7.1 - 12.2)

View Set

Geo of Canada Final - Territorial North

View Set