ISE224 Chapter 1
What are the four components of a database system?
1. User 2. Database application 3. Database management system (DBMS) 4. Database The user interacts with the database application, which interacts with the DBMS, which controls the database. The functions of the database application include creating and processing forms, creating and transmitting queries and creating and processing reports. The DBMS creates databases, tables and supporting structures, manages database data, enforces rules and provides security. The database stores user data, database metadata, indexes, triggers, stored procedures and application metadata.
What components are included in a database?
1. user data 2. metadata 3. indexes and other overhead data 4. application metadata. User data is the data from the user's environment that they want to track. Metadata is data about the structure of the database. Indexes and other overhead data are structures that the database uses to improve performance. Finally, the application metadata is data about forms, reports, and other application components that some databases, particularly those created with desktop DBMS products, store with the database.
Why do we say a database is self-describing and why is this an advantage?
A database is considered self-describing because it contains a description of its own structure within the database itself. This description is called the metadata, and it is stored in specialized tables in relational databases. The advantage is that the database is self-documenting, and that a knowledgeable user or a database designer can easily access the metadata. All DBMS vendors provide tools to access the metadata within their products.
What are referential integrity constraints? Give an example.
A referential integrity constraint is a rule that restricts certain actions on the database data. A referential integrity constraint is used to ensure that the values in a field in one table have matching tables in a corresponding field in another table. These constraints are enforced by the DBMS, which will not allow changes to the values of the database that would result in violations of this rule. For example, a database has an EMPLOYEE table and a VEHICLE table that are used to store data on employees and the vehicles that they are assigned to drive. The EMPLOYEE table has a column called EmployeeID that is used to distinguish one employee record from another. The VEHICLE table also has an EmployeeID column that is used to associate a vehicle with the appropriate employee. A referential integrity constraint could be used to prevent a vehicle from being assigned to an employee with an EmployeeID that does not appear in the EMPLOYEE table by requiring that all values in EmployeeID in the VEHICLE table have a matching value in EmployeeID in the EMPLOYEE table.
A database designed using spreadsheets from the Sales department is a database being designed ________. A) from existing data B) as a new systems development project C) as a redesign of an existing database D) as a NoSQL database
A) A database designed using spreadsheets from the Sales department is a database being designed from existing data.
59) A sales contact manager used by a salesperson is an example of a(n) ________. A) single-user database application B) multiuser database application C) e-commerce database application D) data mining application
A) A sales contact manager used by a salesperson is an example of a single-user database application
Database professionals use ________ as specific data sources for studies and analyses. A) data marts B) normalization C) data models D) entity-relationship data modeling
A) Database professionals use data marts as specific data sources for studies and analyses.
The predecessors of database processing were ________. A) file managers B) hierarchical models C) network models D) relational data models
A) The predecessors of database processing were file managers.
The purpose of a database is to ________. A) help people keep track of things B) store data in tables C) create tables of rows and columns D) maintain data on different things in different tables
A) the purpose of a database is to help people keep track of things.
A Customer Resource Management (CRM) system is an example of a(n) ________. A) single-user database application B) multiuser database application C) e-commerce database application D) digital dashboard
B) A Customer Resource Management (CRM) system is an example of a multiuser database application.
A database consists of integrated tables, which store ________. A) reports B) data and relationships among the data C) forms D) Both A and C are correct
B) A database consists of integrated tables, which store data and relationships among the data.
A(n) _______________ is used by a senior manager to extract, summarize, and consolidate operational databases. A) data mining application B) digital dashboard C) e-commerce site application D) customer relationship management application
B) A digital dashboard is used by a senior manager to extract, summarize and consolidate operational databases.
A program whose job is to create, process and administer databases is called a ________. A) database modeling system B) database management system C) data business model system D) relational model manager
B) A program whose job is to create, process and administer databases is called a database management system.
Database professionals use a set of principles called ________ to guide and assess database design. A) database extraction B) normalization C) data models D) entity-relationship data modeling
B) Database professionals use a set of principles called normalization to guide and assess database design.
For database development, a challenge to the relational model and the use of SQL is known as ________. A) the Web services movement B) the NoSQL movement C) the SOAP movement D) the XML movement
B) For database development, a challenge to the relational model and the use of SQL is known as the NoSQL movement.
Hypertext Transport Protocol (HTTP) is a technology used to ________. A) connect servers to a client in a Client-Server architecture B) connect to web pages over the Internet C) connect applications to a DBMS D) connect hardware devices to a computer system
B) Hypertext Transport Protocol (HTTP) is a technology used to connect to web pages over the Internet.
In an enterprise-class database system, reports are created by ________. A) the user B) the database application C) the database management system (DBMS) D) the database
B) In an enterprise-class database system, reports are created by the database application.
Which of the following database systems is not enterprise-class? A) Microsoft SQL Server B) Microsoft Access C) Oracle Database D) IBM DB2
B) Microsoft Access is not an enterprise-class database.
Modern microcomputer personal DBMS products ________. A) are supplied by several well-established manufacturers B) were essentially made obsolete by Microsoft Access C) have poor response time D) are not true DBMS products
B) Modern microcomputer personal DBMS products were essentially made obsolete by Microsoft Access
Which of the following statements is not true for primary keys in a relational database system? A) They can be used to create relationships between tables. B) They must contain numeric data. C) They uniquely identify a row in a table. D) They can be part of relational integrity constraints.
B) Primary keys in a relational database system to not have to contain numeric data.
Which of the following statements is not true for an enterprise-class database system? A) The database application(s) interact(s) with the DBMS. B) The database application(s) directly access(es) the database data. C) The DBMS accesses the database data. D) The application generates SQL statements.
B) The database application does NOT directly access the database data.
A database is considered self-describing because ________. A) all the users' data is in one place B) it reduces data duplication C) it contains a description of its own structure D) it contains a listing of all the programs that use it
C) A database is considered self-describing because it contains a description of its own structure.
A database designed to combine two databases used by the Sales department is a database being designed ________. A) from existing data B) as a new systems development project C) as a redesign of an existing database D) Both A and B are correct
C) A database is designed to combine two databases used by the sales department is a database being designed as a redesign of an existing database.
An online drugstore such as Drugstore.com is an example of a(n) ________. A) single-user database application B) multiuser database application C) e-commerce database application D) enterprise resource planning system
C) An online drugstore such as Drugstore.com is an example of an e-commerce database application.
This database component is used to maintain database accuracy and enforce data constraints. A) tables B) metadata C) triggers D) stored procedures
C) Database triggers are used to maintain database accuracy and enforce data constraints.
Which of the following is not an XML Web service standard? A) SOAP B) WSDL C) Ethernet D) UDDI
C) Ethernet is not an XML Web service standard.
For database development, the most important Web-related technology to emerge in recent years is ________. A) FTP B) HTTP C) XML D) OODBMS
C) For database development, the most important Web-related technology to emerge in recent years is XML.
The industry standard supported by all major DBMSs that allows tables to be joined together is called ________. A) Sequential Query Language (SQL) B) Structured Question Language (SQL) C) Structured Query Language (SQL) D) Standard Question Language (SQL)
C) The industry standard supported by all major DBMSs that allows tables to be joined together is called Structured Query Language (SQL).
Which statement is not true about the relational model? A) It was first proposed in 1970. B) It was developed by E. F. Codd. C) It was developed at Oracle. D) It resulted in the DBMS product DB2.
C) the relational model was NOT developed at Oracle (it was developed at IBM)
57) A database stores ________. A) data B) relationships C) applications D) Both A and B are correct
D) A database stores both data and relationships.
A very popular development technique used by database professionals for database design is known as ________. A) database extraction B) normalization C) data models D) entity-relationship data modeling
D) A very popular development technique used by database professionals for database design is known as entity-relationship data modeling.
A very popular development technique used by database professionals to adopt a database design to a new or changing requirement is known as ________. A) normalization B) data models C) entity-relationship data modeling D) database migration
D) A very popular development technique used by database professionals to adopt a database design to a new or changing requirement is known as database migration.
Business organizations have resisted adopting object-oriented database management systems because ________. A) the cost of purchasing OODBMS packages is prohibitively high B) the cost of converting data from relational databases to OODBMSs is too high C) most large organizations have older applications that are not based on object oriented programming D) Both B and C are correct
D) Business organizations have resisted adopting object-oriented database management systems because the cost of converting data from relational databases to OODBMSs is too high and most large organizations have older applications that are not based on object oriented programming.
In database systems, the DBMS enforces rules about which data can be written in certain columns. These rules are known as ________. A) data insertion control B) data modification control C) concurrency control D) referential integrity constraints
D) In database systems, the DBMS enforces rules about which data can be written in certain columns. These rules are known as referential integrity constraints
In database systems, the DBMS enforces rules about which user can perform which action when. The rules are known as ________. A) referential integrity constraints B) data modification control C) data reading control D) concurrency control
D) In database systems, the DBMS enforces rules about which user can perform which action when. The rules are known as concurrency control
Microsoft Access includes ________. A) a DBMS B) an application generator C) a Web server D) Both A and B are correct
D) Microsoft Access includes both a DBMS and an application generator.
Microsoft Access may use which of the following DBMS engines? A) ADE B) SQL Server C) Oracle D) Both A and B are correct
D) Microsoft Access may use either ADE or an SQL Server.
This database component can be used as part of applications and for administration tasks. A) tables B) metadata C) triggers D) stored procedures
D) Stored procedures can be used as part of applications and for administration tasks.
58) Which of the following statements is true about Web 2.0? A) It requires the Android Operating System. B) It allows users to add content to Web sites. C) Twitter and Facebook are examples of Web 2.0 sites. D) Both B and C are correct
D) Web 2.0 allows users to add content to Web sites. Twitter and Facebook are examples of Web 2.0 sites.
What are the three types of database design situations?
Database designs can be based on: 1. existing data 2. new systems development 3. database redesign Database designs from existing data may be based on data in spreadsheets or other data tables, or on data extracted from other databases. New systems development gathers user requirements for needed applications and designs a database to meet those requirements. Database redesign may be needed to migrate existing databases to a newer DBMS, or to integrate multiple existing databases.
A database design is rarely a redesign of an existing database.
FALSE
A database is a self-describing collection of non-integrated tables.
FALSE
Database design is important, and fortunately it is simple to do.
FALSE
Microsoft Access is just a DBMS.
FALSE
Paradox is the only major survivor of the "bloodbath of PC DBMS products."
FALSE
a surrogate key is a key typically used in place of a foreign key
FALSE
according to the text, IBM's DB2 is the DBMS with the most power and features
FALSE
according to the text, Microsoft's SQL server is the easiest DBMS to use
FALSE
applications usually write data directly to the database
FALSE
business organizations have resisted adopting object-oriented database systems because the cost of purchasing OODBMS packages is prohibitively high
FALSE
the CODASYL DBTG model structured data relationships as a tree structure
FALSE
dBase was the first PC-based DBMS to implement true relational algebra on a PC.
FALSE R:base was the first
Sequenced Query Language (SQL) is an internationally recognized standard language that is understood by all commercial database management system products.
FALSE SQL = STRUCTURED Query Language
In an enterprise-class database system, a database application accesses the database data.
FALSE User --> Database Application --> DBMS --> Database
In an enterprise-class database system, business users interact directly with the DBMS, which directly accesses the database data.
FALSE User --> Database Application --> DBMS --> Database
A database is called self-describing because it reduces data duplication.
FALSE it is self-describing because it includes metadata (data describing the data)
Enterprise Resource Planning (ERP) is an example of a data mining application
FALSE ERP is an example of a database application
in every database, not just the databases discussed in this book, table names are capitalized
FALSE naming conventions of this textbook are classified by: table names written in all caps and column names written with each word capitalized
What is metadata and how does it relate to the definition of a database?
Metadata is data about the structure of the database itself. This includes data about the names of all tables and columns in the database, the data type of each column in each table, and the properties of the tables and the columns, etc. Metadata accounts for the self-describing aspect of the definition of a database as a "self-describing collection of integrated tables."
Briefly describe the function of the DBMS in a database system.
The DBMS creates the database and the tables and structures within it. The DBMS also reads and updates the database data. It receives requests from application programs to perform data maintenance tasks. These requests are translated into actions that are performed on the database. In addition to maintaining the user data within the database, the DBMS also maintains the database structures. The DBMS also enforces any rules that have been defined to govern the values of the data, such as data type requirements and referential integrity constraints. The DBMS controls concurrency issues, which deal with the unwanted interruption of one user's work by another user's work. As the only point of entry into the database, the DBMS also provides security for the database to restrict users' access to only the data that they have authority to read or modify. Finally, the DBMS is responsible for the creation of backup copies of the database data and for restoring the database in case a recovery is required.
Briefly describe the function of an application program in a database system.
The application program is responsible for CREATING & PROCESSING FORMS. The application displays the form to the user, allows the user to complete the data entry, evaluates the form to determine which data management tasks need to be performed, and transmits the appropriate requests to the DBMS. The application CREATES & TRANSMITS QUERIES. The queries are requests for data that are created in a language like SQL, and transmitted to the DBMS to have the requested data returned to the application program. The application also CREATES & PROCESSES REPORTS. The query to retrieve the necessary data for the report is sent to the DBMS. When the DBMS returns the needed data, the application manipulates it as necessary to create the requested report. The application program also applies application logic to control the manipulation of data in accordance with the business rules. Finally, the application program is responsible for providing control. Control must be exercised to allow the users to make choices for functions and tasks as appropriate for their jobs as well as to manage the activities of the DBMS.
Briefly describe the history of database processing.
The predecessor of database processing was file processing, where data were maintained on magnetic tape. Database processing as we know it today became possible with the availability of direct access disk storage in the 1960s. Using this storage, both the hierarchical and network data model were developed. In 1970, E. F. Codd of IBM proposed the relational model, which is the standard model used today. Current DBMSs such as DB2, Oracle and SQL Server are based on the relational model. The appearance of microcomputer-based DBMSs in the 1980s led to a "bloodbath" from which Microsoft Access emerged as the dominant PC workstation DBMS. More recent events include the introduction of object-oriented DBMSs (OODBMSs), and the development of tools such as XML to allow the use of database systems over the Internet.
What is the purpose of a database, and how does the database accomplish this purpose?
The purpose of a database is to help people keep track of things. It accomplishes this by storing data in tables. Similar to a spreadsheet, each table has rows and columns. A database usually has multiple tables to keep track of different but related things. For example, we might have a CUSTOMER table to keep track of customers and a PRODUCT table to keep track of the things we sell. Each row in each table holds data about a particular instance (i.e., one customer or one product). The database also stores the links between the tables, so that we can track which customers bought which products (note: this will require an additional table if one customer can buy more than one product and one product can be sold to more than one customer).
A database design may be part of a new systems development project
true
All database applications send and receive database data by sending SQL statements to the DBMS.
true
Bill Gates has said that "XML is the lingua-franca of the Internet Age."
true
Data Language / I (DL/I) structured data relationships are as a tree structure
true
Databases are a key component of e-commerce order entry, billing, shipping and customer support.
true
Databases based on the CODASYL standard are based on the network data model.
true
Databases record data in such a way that they can produce information.
true
Each row in a database table is also known as a record.
true
In Microsoft Access, you can use ODBC to connect to SQL Server in place of the ADE database engine.
true
In an enterprise-class database system, a database application interacts with the DBMS
true
Knowledge workers are programmers who write applications that process the database.
true
Microsoft Access is a low-end product intended for individuals and small workgroups.
true
The current DBMS engine in Microsoft Access is called ADE.
true
The database management system (DBMS) is responsible for enforcing referential integrity constraints.
true
The database management system (DBMS) is responsible for inserting, modifying, reading, and deleting data.
true
The description of a database's structure that is stored within the database itself is called the metadata.
true
The largest databases in e-commerce are the order entry databases.
true
The purpose of a database is to help people keep track of things
true
Twitter and Facebook use NoSQL databases
true
XML Web services allow database processing to be shared across the Internet.
true
a database management system (DBMS) creates, processes, and administers databases
true
a database shows data in tables as well as the relationships among the rows in those tables
true
a database system is typically defined as its four components: 1. users 2. database applications 3. the DBMS 4. the databases
true
according to the text, Microsoft Access has the least power and features of any major DBMS
true
according to the text, Oracle Corporation's Oracle Database is considered the most difficult DBMS to use
true
applications are computer programs used directly by users
true
data is recorded in facts & figures; information is knowledge derived from data
true
e-commerce companies use web activity databases to determine which items on a Web page are popular and successful
true
in a database, each table stores data about a different type of thing
true
in database systems, indexes are held in the database
true
indexes are data structures that speed database searches
true
integrated tables store both data and the relationships among the data
true
like a spreadsheet, a database table has rows and columns
true
referential integrity constraints are rules about what data values are allowed in certain columns
true
the 1977 edition of this text contained a chapter on the relational model, and that chapter was reviewed by E.F. Codd
true
the NoSQL movement could also be called the NoRelational movement
true
the relational model was first proposed in 1970 by E.F. Codd at IBM
true