Section 2 study guide Bus 391
A DBMS and database are synonymous terms that can be used interchangeably. True False
False
A computer with two CPUs is called a(n) dual-core computer. True False
False
Cache memory is also called "the brain" of a computer. True False
False
Database design is easy and can be explained in a paragraph. True False
False
Managing the impact of database structural changes on applications and users is an operational task for a database administrator. True False
False
Most traditional databases use the Internet to transmit traffic back and forth between the users' computers and the DBMS server. True False
False
The accuracy of a database design is not dependent on the corresponding data model. True False
False
The cache and main memory are nonvolatile, meaning their contents survive when power is off. True False
False
Web applications are programs that are written to use a particular operating system. True False
False
Which of the following is NOT a valid type of relationship? A.Many-to-one B.One-to-one C.Many-to-many D.One-to-many E.None-to-none
None-to-none
________ is the process of converting a poorly-structured table into two or more well-structured tables. A.Refactoring B.Banding C.Normalization D.Standardization E.Optimization
Normalization
________ is the process of converting a data model into tables, relationships, and data constraints. A.Database querying B.Database design C.Database cross modeling D.Database aggregation E.Data mining
Database design
________ in an E-R diagram refer to the least number of entities required in a relationship. A.Foreign keys B.Minimum cardinalities C.Minimum candidate keys D.Chernozem cardinalities E.Primary keys
Minimum cardinalities
________ is the combination of the real physical world with interactive virtual images or objects. A.Sense of presence B.Virtual reality (VR) C.Mixed reality (MR) D.RealityE.Augmented reality (AR)
Mixed reality (MR)
________ applications are programs that are written to use a particular operating system. A.Web B.Browser C.Native D.Enterprise E.Thin-client
Native
Which of the following is a purpose of "application programs"?A.View data; insert new, update existing, and delete existing data B.Provide security, data consistency, and special purpose processing like handleout-of-stock situations C.Granting access to the users D.Search based upon data values provided by the user E.Structured presentation of data using sorting, grouping, filtering, and other operations
Provide security, data consistency, and special purpose processing like handleout-of-stock situations
Which of the following tasks cannot be performed using a list but can be managed through databases? A.To delete B.To modify the data that is already present C.To keep track of student registration D.To perform some calculations like addition and subtraction E.To store the grades of students
To keep track of student registration
A (bring your own device) BYOD policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business. True False
True
A line in an entity-relationship (E-R) diagram is used to represent the relationships between two entities. True False
True
An operating system is a program that controls a computer's resources. True False
True
Databases that have both primary and foreign keys are called relational databases. True False
True
In the future, your house will be so smart it will analyze you. True False
True
It is to the users advantage to have a working knowledge of database developments. True False
True
Locking must be used to coordinate the activities of users in order to prevent the lost-update problem. True False
True
Native applications are developed by professional programmers only. True False
True
One of the functions of a DBMS is to provide tools to assist in the administration of a database. True False
True
Open source succeeds because of collaboration. True False
True
Reports refer to the structured presentation of data using sorting, grouping, filtering, and other operations. True False
True
SQL is an international standard language for processing a database. True False
True
Some governments are launching their own cryptocurrencies. True False
True
The main memory of a computer is also called random access memory (RAM). True False
True
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A.Auditors B.Users C.Designers D.Administrators E.Developers
Users
Which of the following is an international standard language for processing a database? A.Cassandra B.SQL C.Relational LM D.DB2 E.MS Access
SQL
A database is used instead of a spreadsheet when ________. A.structures of data lists are simple B.lists of data involve a single theme C.lists involve data with multiple themes D.users do not want to store all data in one place E.users have a small amount of data to store
lists involve data with multiple themes
A data model is a ________. A.array of data variables B.set of programs used to retrieve data C.repository of unprocessed data D.logical representation of database data E.collection of isolated databases
logical representation of database data
Which of the following is an example of storage hardware in computers? A.projector B.plotter C.Web camera D.inkjet printer E.magnetic disk
magnetic disk
The CPU stores the results of computations in ________. A.network cards B.secondary memory C.main memory D.SSD storage E.floppy disks
main memory
A ________ is equivalent to 1,024 kilobytes. A.zettabyte B.terabyte C.kilobyte D.megabyte E.gigabyte
megabyte
Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A.client operating system B.mobile system C.native application D.nonmobile system E.virtual private network
mobile system
Browser applications are thin-client applications that ________. A.use COBOL as the standard language for user-side processing B.are processed using VisualBasic and C++ C.do not need to be encrypted D.need not be preinstalled on the users' computers E.depend on internal networks and not the Internet to transmit data
need not be preinstalled on the users' computers
If a database table contains redundant or duplicate data, it can be converted into two tables with better structure through __________. A.cardinality B.data modeling C.normalization D.data integrity E.creating relationships
normalization
Virtualization is the process by which ________. A.one physical computer hosts many different virtual computers within it B.many computers are used to control a server C.a single operating system is licensed for multiple computers D.a single server is used to host the operations of a workstation E.a single operating system is shared by multiple users
one physical computer hosts many different virtual computers within it
Which of the following devices is an example of a storage hardware device? A.random access memory B.the system bus C.central processing unit D.optical disk E.barcode scanner
optical disk
Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a columnlabeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. A.functionally dependent record B.secondary key C.foreign key D.primary key E.key attribute
primary key
The modification or deletion of data in a database is an example of ________ operations of a database management system. A.administrative B.technical C.processing D.statistical E.analytical
processing
The elements that make up a database application are: forms, application programs, reports, and __________. A.backups B.queries C.performance monitors D.data views E.relationships
queries
Main memory is also known as ________. A.read-only memory B.random access memory C.cache memory D.optical memory E.the system bus
random access memory
The rows in a database are also called ________. A.laterals B.records C.files D.fields E.tables
records
In an E-R diagram, a line between two entities represents a(n) ________. A.cardinality B.relationship C.attribute D.branch E.identifier
relationship
All the following are characteristics of native applications EXCEPT __________. A.developed in complex, sophisticated programming languages B.high development cost C.distributed via a company store web site (such as iTunes) D.runs seamlessly on any device under the browser E.developed by skilled professional programmers
runs seamlessly on any device under the browser
Which of the following terms refers to a collection of servers?A.firmware B.server farm C.parallel nodes D.server database E.shareware
server farm
he process of normalization constructs tables such that every table has a ________. A.foreign key B.one-to-one relationship between entities C.specialized graphical query D.single theme E.minimized metadata footprint
single theme
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A.arrow B.double line C.triangle D.small oval E.vertical bar
small oval
If a list deals with one theme but is long, put it into a __________. A.cell B.separate column C.spreadsheet D.single list E.database column
spreadsheet
The three essential elements of the definition of a database are __________. A.tables; metadata; validation rules B.fields; relationship among fields in tables; metadata C.tables; relationship among rows in tables; metadata D.tables; relationship among rows in tables; validation rules E.validation rules; data; tables
tables; relationship among rows in tables; metadata
Server infrastructure is delivered as a service via the Internet and often referred to as ________. A.main memory B.the cloud C.computer hardware D.secondary memory E.SSD storage
the cloud
All of these issues are results of data integrity problems except ________, A.the system will develop a poor reputation B.inconsistent results C.incorrect results D.the system will give users too much information E.users lose confidence in the data
the system will give users too much information
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A.wave B.vertical bar C.arrow D.triangular block E.small oval
vertical bar
________ is a completely computer-generated virtual world with interactive digital objects. A.Virtual reality (VR) B.Mixed reality (MR) C.Sense of presence D.Augmented reality (AR) E.Reality
Virtual reality (VR)
An important advantage of __________ is that the browser provides a generally consistent environment in which to execute. A.open source applications B.closed source applications C.native applications D.custom-developed applications E.Web applications
Web applications
Current 3D printing technology __________. A.is basically focused on toy manufacturing B.is unable to create objects with much strength C.can print in an array of materials D.is limited to plastic materials E.is unlikely to affect existing industries significantly
can print in an array of materials
A ________ is also called "the brain" of the computer. A.thumb drive B.CMOS C.network card D.central processing unit E.motherboard
central processing unit
A primary key in a database is a ________. A.group of records that identifies similar attribute B.group of fields or columns that represent metadata C.group of rows that identifies a unique table or file D.column or group of columns that identifies a unique row in a table E.group of tables or files formed to identify a unique field or row
column or group of columns that identifies a unique row in a table
Identify the first step in transforming a data model into a relational database design. A.creating foreign keys B.normalizing the data and files C.representing the entity relationships D.creating data triggers for export E.creating a table for each entity
creating a table for each entity
The angled lines on the lines representing relationship between two related entities are referred to as ________. A.identifiers B.foreign keys C.entities D.switch E.crow's feet
crow's feet
Each entity in a database has a unique attribute called a(n) ________. A.prime value B.index field C.public key D.foreign key E.identifier
identifier
The major elements in a mobile system include all the following EXCEPT __________. A.users in motion B.cloud-based resources C.in-place users D.wireless connectivity E.mobile devices
in-place users
All of the following are benefits to using cryptocurrencies except ________. A.it is faster and easier to use than traditional payment methods B.there is protection from inflation C.it cannot be seized by the government D.there are no taxes E.it is insured by the Federal Reserve Bank
it is insured by the Federal Reserve Bank
Mobile systems offer the potential of ________, which is data delivered to the user at the precise time it is needed. A.cluster data B.convenient data C.just-in-time data D.granular data E.clean data
just-in-time data
The purpose of a database is to __________. A.eliminate the need to learn about spreadsheets B.keep track of things that share a single theme C.eliminate the need to learn programming D.keep track of things that involve multiple themes E.make the use of the cloud more straightforwardly
keep track of things that involve multiple themes
Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program.When Toby buys the program, he will actually be buying the software ________. A.license B.patent C.copyright D.code E.trademark
license
Which of the following statements is true? A."If the structure of a list is simple enough, it will be necessary to use database technology." B."Professionals rarely use spreadsheets to keep track of things." C."Setting up different forms of data in separate spreadsheets is an effective way to keep trackof that data." D."If the structure of a list is simple enough, there is no need to use databasetechnology." E."Databases are not used to keep track of things."
"If the structure of a list is simple enough, there is no need to use database technology."
All of the following are disruptive forces to change business except ________. A.Internet of Things B.2D printing C.self-driving cars D.digital reality devices E.cryptocurrencies
2D printing
________ reality is the altering of reality by overlaying digital information on real-world objects. A.Virtual B.Augmented C.Actual D.Enhanced E.Mixed
Augmented
________ is the altering of reality by overlaying digital information on real-world objects. A.Reality B.Augmented reality (AR) C.Virtual reality (VR) D.Sense of presence E.Mixed reality (MR)
Augmented reality (AR)
Which of the following is NOT a capability of mobile device management (MDM) software? A.Install and update software. B.Perform a back-up of the device. C.Restoring a device. D.Automate sending of text messages on behalf of the user. E.Reporting usage of the device.
Automate sending of text messages on behalf of the user.
The DBMS does not provide applications for which operation?A.Automatically correcting data B.Deleting data C.Modifying data D.Reading data E.Inserting data
Automatically correcting data
Which of the following is NOT correct regarding browser-based database applications? A.Forms, reports, and queries are displayed and processed using HTML. B.Browser-based applications are thin-client applications. C.Browser-based applications are thick-client applications. D.Languages like C# and Java are used for server-side processing. E.JavaScript is the standard language for user-side processing.
Browser-based applications are thick-client applications.
Which of the following statements about software is true? A.Buying software means you own the software code. B.It is perfectly fine for an organization to buy one copy of a software product and copy it on to allits computers. C.Operating systems for clients and servers is identical. D.Organizations make a lot of money selling licenses to open source software. E.Buying software means you own a license to use the software.
Buying software means you own a license to use the software.
Which of the following statements about client and server computers is correct? A.Clients place requests with servers and servers return data. B.Servers use the services that clients provide through a network. C.Clients are organized in farms, but servers can be located only in the cloud. D.Servers are less powerful than clients. E.A tablet is an example of a server.
Clients place requests with servers and servers return data.
Which of the following is a characteristic of volatile memory?A.Files are stored permanently. B.It should be purged at least once a year. C.Contents are lost when power is off. D.Processor heats up during the operation. E.Processing of data is very slow.
Contents are lost when power is off.
________ are digital-only currencies. A.Cryptocurrencies B.Online payments C.E-wallets D.E-checks E.Debit cards
Cryptocurrencies
Which of the following statements is correct? A.The user does not need to dedicate special time to reviewing the data model. B.A database is a model of how only managers view their business world. C.If corrections are needed in the database structure, the requirements step is the best time todo this. D.Do not proceed with database design unless the data model is accurate. E.If the data model is incorrect, the database can still be used successfully.
Do not proceed with database design unless the data model is accurate.
hich of the following is the most controlling BYOD policy? A.For the company to offer coffee shop style networking. B.If the employee signs on to the company's network, they are financially responsible for anydamage done. C.The company creates special logins for BYOD. D.For the organization to sniff employees' mobile traffic. E.For an organization to declare that it owns any device that employees connect to itsnetwork.
For an organization to declare that it owns any device that employees connect to itsnetwork.
Which of the following is NOT an operation performed by a database developer? A.Create tables B.Queries the table data C.Create relationships and other structures D.Grants access permission to a database E.Modify an existing table
Grants access permission to a database
The __________ will allow all the devices in your home to be connected and will enable it to see what, how, and when you do things and anticipate your needs. A.relaxation of BYOD policies B.advances in self-driving cars C.capacity of 3D printing D.improvements in vertical-market software E.Internet of Things
Internet of Things
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A.Internet of things (IoT) B.visual mapping C.self-driving cars D.3D printing E.automated guided vehicles
Internet of things (IoT)
What is cardinality? A.It is the process of creating a representation of data. B.It is the process by which tables are redesigned. C.It helps to describe the relationship between two entities. D.It defines the foreign keys of a table. E.It corrects and makes the data effective.
It helps to describe the relationship between two entities.
Which of the below defines an identifier? A.It describes characteristics of the entity. B.It is an attribute or group of attributes whose value is associated with one and only oneentity instance. C.It may represent a physical object, logical construct, or transaction. D.It is basically a form of an entity-relationship data model. E.It is something that a user wants to track.
It is an attribute or group of attributes whose value is associated with one and only oneentity instance.
Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which ofthe following is TRUE of the source code for Carter's program? A.It is highly protected and obtained only by having a license. B.It is available to the public. C.It is less stable and platform dependent. D.It cannot be compiled. E.It is available only to carefully vetted contractors.
It is available to the public.
Which of the following is NOT a major element of a mobile system?A.Wireless connectivity B.Cloud-based resource C.Mobile devices D.Users in motion E.Light laptops
Light laptops
________ is a version of Unix that was developed by an open source community. A.SPX B.Android C.Mac OS D.Symbian OS E.Linux
Linux
Which of the following is an advantage of employee use of mobile systems at work? A.Greater support costs B.Compatibility problems C.Loss of control D.Reduced support costs E.Data loss or damage
Reduced support costs
Which of the following is TRUE of single-user databases? A.The application, the DBMS, and the database all reside on the user's computer. B.They use JavaScript for user-side processing. C.The Internet is used to access the DBMS server computer. D.They run on clustered Linux or Unix systems E.They are displayed and processed using HTML5, CSS3, and JavaScript.
The application, the DBMS, and the database all reside on the user's computer.
Which of the following is TRUE about the database development process? A.Changing a relationship from 1:N to N:M in an existing database is a complex and lengthyprocess. B.User review of the data model is avoided as it is not helpful in data modeling. C.The database structure is easy to change during the data modeling stage. D.Databases are easier to develop than spreadsheets. E.Normalization is unnecessary for large databases.
The database structure is easy to change during the data modeling stage.
Why is user involvement critical for database development?A.Because they use the system. B.The design of the database depends on how users view their business environment. C.The data model states it is important. D.Because users design the system. E.The executive board says it is critical.
The design of the database depends on how users view their business environment.
Web applications are characterized by which of the following?A.They are expensive to develop and support. B.They are highly secure and easy to use. C.They can be run on multiple operating systems without modifications. D.They can use the unique capabilities of the hardware device. E.They can run only on a single type of device.
They can be run on multiple operating systems without modifications.
Web applications are characterized by which of the following?A.They are expensive to develop and support. B.They can be run on multiple operating systems without modifications. C.They can use the unique capabilities of the hardware device. D.They are highly secure and easy to use. E.They can run only on a single type of device.
They can be run on multiple operating systems without modifications.
Which of the following is TRUE of N:M relationships? A.They can have more than one entity on each side of the relationship. B.They are the same as N:N relationships. C.They represent minimum cardinalities in a relationship. D.They connect different data types. E.They are also called one-to-many relationships.
They can have more than one entity on each side of the relationship.
Which of the following statements is TRUE about native applications? A.They can be developed by less skilled, lesser-paid employees. B.They are run exclusively through a Web browser. C.The cost of native applications is low. D.They only run on the operating system for which they are programmed. E.The limits on native applications are usually technological, not budgetary.
They only run on the operating system for which they are programmed.
Which of the following is likely to occur in the future? A.Web applications will disappear. B.Your car knows exactly when to self-start so it is warm when you get in. C.Students no longer need to cultivate personal creativity and problem-solving skills D.Future jobs will require less technical skills. E.Workers will still need to go in to work to access data.
Your car knows exactly when to self-start so it is warm when you get in.
he data and relationships that will be stored in a database can be depicted using __________. A.minimum cardinalities B.identifiers C.attributes D.a data model E.an entity
a data model
Which of the following statements refers to server virtualization?A.a server computer that hosts one or more other server computers B.a personal computer, such as a desktop or portable computer, that hosts several differentoperating systems C.a server can connect to multiple networks at the same time D.a server that hosts many versions of desktop operating systems E.a storage area that loses its contents when the power is off
a server computer that hosts one or more other server computers
A group of similar rows or records is known as ________. A.an attribute B.a cluster C.a table D.a field E.a prototype
a table
When using the relational model to represent two tables, one must ________. A.establish only N:M relationships between the tables B.have more than two primary keys in the model C.minimize the number of columns in the second table D.add a foreign key to one of the tables E.use metadata instead of foreign keys
add a foreign key to one of the tables
Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks areperformed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A.system software B.network connection C.application software D.firmware E.operating system
application software
Bits are used for computer data because they ________. A.represent the orientation of a nonoptical media B.have an infinite number of states C.are easy to represent physically D.can have more than two values at a time E.are represented exclusively as letters of the alphabet
are easy to represent physically
Browser-based applications ________. A.do not need to be encrypted B.need to be preinstalled on the users' computers C.eliminate the need to check for data consistency D.run within a corporate network that is protected from the Internet E.are more vulnerable to security threats than are traditional applications
are more vulnerable to security threats than are traditional applications
Entities in a data model have ________ that describe the characteristics of the entity. A.primary keys B.characters C.codes D.attributes E.scribes
attributes
Web applications are typically limited by the capabilities of the ________. A.hardware B.operating system C.browser D.motherboard E.programming language
browser
The limits on creating native applications are usually ________, not technological. A.in finding skilled programmers B.budgetary C.based on complexity D.based on an executive board decision E.based on requirements
budgetary
Which of the following is the smallest element in a database?A.metadata B.field C.zetta D.byte E.record
byte
Bits are grouped into 8-bit chunks called ________. A.switches B.kilobytes C.bytes D.nibbles E.strings
bytes
In a database, ________ are grouped into columns. A.fields B.files C.records D.bytes E.nibbles
bytes
In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A.data integrity problem B.adaptation conflict C.crow's-foot paradigm D.security problem E.data loopback problem
data integrity problem
Data integrity problems are likely to occur when __________. A.minimum cardinalities are not met B.normal forms are used C.data is duplicated D.the data design has a N:M relationship E.attribute conflicts are not resolved
data is duplicated
Disruptive forces that have the potential to disrupt business as we know it include all of the following EXCEPT __________. A.3D printing B.self-driving vehicles C.Internet of Things D.cryptocurrencies E.data mining applications
data mining applications
A ________ describes the data and relationships that will be stored in a database. A.data-tree model B.data model C.data application D.data aggregator E.query model
data model
The designers of a database typically begin by developing a __________ to construct a logical representation of the database before it is implemented. A.3D representation B.network diagram C.process model D.line drawing E.data model
data model
Metadata is/are ________. A.data that are encrypted B.data that describes data C.codes used for server-side processing D.more important data E.error logs of databases
data that describes data
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A.database application B.data model C.data bridge D.database design E.data field
database application
A(n) ________ is a program used to create, process, and administer a database. A.database system B.database management system C.information system D.operating system driver E.operating system
database management system
In a data model, a(n) ________ is something that a user wants to track. A.byte B.record C.quark D.primary key E.entity
entity
In data modeling, a(n) __________ is something that the users want to store data about. A.attribute B.entity C.foreign key D.primary key E.relationship
entity
Which of the following is a developmental task of database administration? A.conducting training for users B.managing configuration changes in systems C.evaluating an application design D.testing backup procedures E.monitoring backup procedures
evaluating an application design
The columns in a database are also called ________. A.records B.fields C.files D.verticals E.tables
fields
Columns that are keys to different tables than the ones in which they reside are called ________. A.internal records B.nonlocal keys C.primary keys D.attributes E.foreign keys
foreign keys
Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data? A.forms B.queries C.reports D.operations E.triggers
forms
All of the following are functions of the DBMS except ________. A.processing the database B.getting the users to use the database C.creating the database D.modifying the database E.providing tools to administer the database
getting the users to use the database
The disadvantages of employees using their own mobile devices at work include all the following EXCEPT __________. A.greater support costs B.loss of control C.greater employee satisfaction D.risk of infection E.compatibility problems
greater employee satisfaction