Chapter 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.

True

Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.

True

Migrating a traditional database design to the web can require design modification, additional software, and some added expense.

True

The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.

True

A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data. a. data logger framework b. database management system c. integrated development environment d. advanced host controller system

database management system (DBMS)

A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form. a. 12 b. 24 c. 30 d. 32

32

Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____. a. two digits for the year, two for the month, and two for the day (YYMMDD) b. two digits for the day, two for the month, and four for the year (DDMMYYYY) c. four digits for the year, two for the month, and two for the day (YYYYMMDD) d. four digits for the year, two for the month, and four for the day (YYYYMMDDDD)

four digits for the year, two for the month, and two for the day (YYYYMMDD)

_____, a coding method that uses one byte per character, is used on most personal computers. a. ASCII (American Standard Code for Information Interchange) b. EBCDIC (Extended Binary Coded Decimal Interchange Code) c. Unicode d. ISO (International Organization for Standardization) 10646

ASCII (American Standard Code for Information Interchange)

Web-based designs are dependent on a specific combination of hardware and software.

False

Cipher codes distinguish items by using a series of subgroups of digits.

False: Significant digit codes

A common field is an attribute that appears in only one entity.

False: appears in more than one entity

In a table or file, each column represents a record and each row represents a field.

False: columns are fields, rows are records

Like a primary key, a foreign key must be unique.

False: doesn't have to be unique

A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.

False: no nonkey fields are dependent on one another

A primary key is composed of exactly two fields.

False: only composed of one field (column)

A web-based data design requires users to have powerful workstations.

False: only need web browser & internet connection

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

False: repeating groups can occur any number of times

The three normal forms constitute a progression in which the second normal form represents the best design.

False: third normal form is the best design

46. A table is in _____ if it does not contain a repeating group. a. second normal form b. first normal form c. third normal form d. fourth normal form

First normal form

In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables. a. secondary key b. candidate key c. combination key d. foreign key

Foreign key

_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise. a. Scalability b. Compatibility c. Cardinality d. Functionality

Scalability

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____. a. viewport b. schema c. framework d. cell

Schema

A(n) _____ allows a user to specify a task without specifying how the task will be accomplished. a. procedural language b. query by example language c. query language d. imperative language

Query language

In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup. a. recovery procedures b. market basket analysis c. crow's foot notation d. a standard notation format

Recovery procedures

In an entity-relationship diagram, entities are commonly represented as _____. a. triangles b. circles c. rectangles d. hexagons

Rectangles

One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems. a. candidate integrity b. foreign integrity c. referential integrity d. combinatorial integrity

Referential integrity

A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key. a. second normal form b. zeroth normal form c. third normal form d. fourth normal form

Second normal form

A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records. a. no-frills key b. super key c. secondary key d. foreign key

Secondary key

_____ are numbers or letters assigned in a specific order. a. Sequence codes b. Category codes c. Significant digit codes d. Derivation codes

Sequence codes

Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.

True

Binary digits have only _____ possible value(s). a. one b. two c. three d. four

Two (zero or one)

45. A table design that contains a repeating group is called _____. a. normalized b. unnormalized c. unsynchronized d. synchronized

Unnormalized

At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____. a. Y2K issue b. H2R issue c. 2D issue d. 2DGT issue

Y2K issue

Compared with character-based formats, a _____ offers a more efficient storage method. a. foreign storage format b. unary storage format c. tertiary storage format d. binary storage format

Binary storage format

In the accompanying figure, any field that serves as a primary key is called a _____. a. candidate key b. secondary key c. combination key d. foreign key

Candidate key

_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity. a. Scalability b. Compatibility c. Cardinality d. Functionality

Cardinality

_____ use a keyword to encode a number. a. Cipher codes b. Identifier codes c. Action codes d. Associative codes

Cipher codes

A _____ is a set of letters or numbers that represents a data item. a. business glossary b. data dictionary c. mnemonic d. code

Code

If a primary key combines two or more fields, then it is called a _____. a. foreign key b. composite key c. dedicated key d. candidate key

Composite key

A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities. a. big O notation b. dark resistor's notation c. crow's foot notation d. hash topology notation

Crow's foot notation

A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways. a. data structure b. data roster c. data object d. data log

Data Structure

A _____ controls database operations, including storing, retrieving, updating, and deleting data. a. data manipulation language b. data device language c. data definition language d. data query language

Data manipulation language

54. A _____ is designed to serve the needs of a specific department, such as sales, marketing, or finance. a. data mart b. data frame c. pseudo-data d. metadata

Data mart

A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company. a. data warehouse b. data frame c. pseudo-data d. metadata

Data warehouse

Typically, a database management system is managed by a person called _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user. a. database administrator b. business intelligence analyst c. database consumer d. big data analyst

Database administrator (DBA)

_____ combine data from different item attributes, or characteristics, to build a code. a. Sequence codes b. Category codes c. Significant digit codes d. Derivation codes

Derivation codes

_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers. a. ASCII (American Standard Code for Information Interchange) b. EBCDIC (Extended Binary Coded Decimal Interchange Code) c. Unicode d. ISO (International Organization for Standardization)

EBCDIC (Extended Binary Coded Decimal Interchange Code)

The inherent efficiency of high-volume processing on larger computers is called _____. a. monopoly b. economy of scope c. cardinality d. economy of scale

Economy of Scale

EBCDIC and ASCII both require _____ bits for storage of each character. a. six b. eight c. twelve d. sixteen

Eight (8)

_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data. a. Encapsulation b. Normalization c. Standardization d. Encryption

Encryption

A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities. a. entity-relationship diagram (ERD) b. illustration flow chart c. query relationship diagram (QRD) d. data chart

Entity-relationship diagram (ERD)

_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard. a. Java runtime environment (JRE) b. Java eclipse framework connectivity (JEFC) c. Java virtual machine (JVM) d. Java database connectivity (JDBC)

Java database connectivity (JDBC)

During the systems design phase, _____ are used to organize, access, and maintain data structures. a. glossary fields b. common fields c. content fields d. key fields

Key fields

The data mining technique that relies on association rule learning is often called _____. a. simulated analysis b. virtual storage analysis c. strategy-oriented analysis d. market basket analysis

Market basket analysis

To bridge the gap between a database and the Internet, it is necessary to use (a) _____, which is software that integrates different applications and allows them to exchange data. a. middleware b. stack c. server d. firmware

Middleware

Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember. a. harmonic b. sequence c. mnemonic d. rhapsodic

Mnemonic

Any field that is not a primary key or a candidate key is called a _____. a. no-frills field b. non-key field c. secondary field d. foreign field

Non-key field

_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database. a. Encapsulation b. Normalization c. Abstraction d. Encryption

Normalization

_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data. a. ActiveX data object (ADO) b. Java virtual connector (JVC) c. Open database connectivity (ODBC) d. Open embedded connectivity (OEC)

Open database connectivity (ODBC)

_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device. a. Logical storage b. Virtual storage c. Simulated storage d. Physical storage

Physical storage

In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity. a. primary key b. secondary key c. candidate key d. foreign key

Primary key

With a _____, users provide an example of the data requested. a. query language b. data table c. query by example language d. data frame

Query by example language

Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key. a. distinct notation format b. multifaceted notation format c. viewport notation format d. standard notation format

Standard notation format

A _____ specifies the fields and identifies the primary key in a particular file. a. frame design b. table design c. viewport d. window

Table design

Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.

True

To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.

True


संबंधित स्टडी सेट्स

Maternity and Women's Health Nursing

View Set

New Opportunities pre-intermediate Module 2-2

View Set