A5324_C4
The database approach has several unique characteristics not found in traditional (flat-file) systems, specifically file-oriented systems. Which one of the following statements does not apply to the database model? (p.135) a. Database systems increase user interface with the system through increased accessibility and flexibility. b. Database systems contain a data definition language that helps describe each schema and subschema. c. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. d. A primary goal of database systems is to minimize data redundancy. e. Database systems have data independence; that is, the data and the programs are maintained separately, except during processing. X
? Database systems increase user interface with the system through increased accessibility and flexibility
Which one of the following is not a control involved in maintaining database integrity and availability (Supp Reading 4 p.5) a. minimization of nonsystem tool access b. database reorganization c. enforced standards d. all of the other items are such controls x e. establish access controls f. establish data backup and recovery
? all of the other items are such controls
A company needs to have information processed at its home office and at five locations around the state. The database that must be used for this configuration would be a. Any of these can be used. b. Centralized. c. Replicated. d. Partitioned.
Any of these can be used.
In an inventory system on a database management system (DBMS), one stored record contains part number, part name, part color, and part weight. These individual items are called a. Attributes. b. Bytes. c. Stored files. d. Occurrences.
Attributes
That element of a DBMS that provides a description of every item stored in the database is the a. DD b. DME c. DML d. DS e. DBA
DD
Several language interfaces exist in a database management system. These typically include a data-definition language (DDL), a data control language (DCL), a data-manipulation language (DML), and a database query language (DQL). What language interface would a database administrator use to establish the structure of database tables? a. DDL. b. DCL. c. DQL. d. DML.
DDL
That element of a DBMS that describes the location of the data in a database is the a. DD b. DML c. DBA d. DME e. DS
DS
If an auditor needed to know the details of a number of specific data elements contained in a database, the auditor could probably find all of this information in a a. Data encryption. b. Decision table. c. Data dictionary. d. Database schema.
Data dictionary.
If an auditor needed to know the details of a number of specific data elements contained in a database, the auditor could probably find all of this information in a a. Data dictionary. b. Decision table. c. Data encryption. d. Database schema.
Data dictionary.
Of the following, the greatest advantage of a database (server) architecture is a. Backup and recovery procedures are minimized. b. Multiple occurrences of data items are useful for consistency checking. c. Conversion to a database system is inexpensive and can be accomplished quickly. d. Data redundancy can be reduced.
Data redundancy can be reduced.
Which of the following is a characteristic of a relational database system a. Tables in 1:M associations are linked by embedding the primary key of the M side tables into the 1 side table as a foreign key. b. Tables are linked to other related table through pointers. c. Each table must contain an attribute whose value is unique. d. A parent table may be related to many child tables, but a child table may have only one parent.
Each table must contain an attribute whose value is unique
In a hierarchical database model, it is impossible for a segment to have multiple parents. a. False b. True
False
For those instances where individual users may be granted summary and statistical query access to confidential data to which they normally are denied access, which type of control is most suitable? a. User-defined procedures b. Inference controls c. Data encryption d. Biometric devices
Inference controls
Tables that are similar to flat file structures are used in database management systems (DBMS) when a a. Simple network structure is employed. b. Relational database model is selected for use. c. Complex network structure is employed. d. Network-based structure is used and a complex database schema is developed.
Relational database model is selected for use.
Which statement is false? a. The DBMS does not control access to the database. b. During processing, the DBMS periodically makes backup copies of the physical database c. The DBMS is special software that is programmed to know which data elements each user is authorized to access. d. User programs send requests for data to the DBMS.
The DBMS does not control access to the database.
Which of the following database models is considered to be the most versatile? a. The tree model. b. The network model. c. The hierarchical model. d. The relational model.
The relational model.
Which of the following is a level of the database that is defined by the data definition language? a. user view b. all are levels or views of the database c. internal view d. schema
all are levels or views of the database
If a company is using a DBMS system, user access can be controlled which of the following levels? a. transaction and the database b. program and data field c. transaction d. data field e. all of the other items can be controlled levels
all of the other items can be controlled levels
If a company is using a DBMS system, user access can be controlled which of the following levels? a. data field b. transaction c. program and data field d. transaction and the database e. all of the other items can be controlled levels
all of the other items can be controlled levels
Which of the following is not an access control in a database system? a. passwords b. voice prints c. database authorization table d. antivirus software
antivirus software
An inventory table in a relational database system contains values for items such as part number, part name, description, color, and quantity. These individual items are called a. record types b. occurrences c. attributes d. bytes
attributes
Which of the following is not a test of access controls? a. encryption controls b. backup controls c. inference controls d. biometric controls
backup controls
One way in which users can access the database is by a. by developing operating software b. by direct query c. by constantly interacting with systems programmers d. none of these are correct
by direct query
Which term is not associated with the relational database model? a. collision b. relation c. attribute d. tuple
collision
What control maintains complete, current, and consistent data at all information processing units? a. deadlock control b. gateway control c. concurrency control d. replication control
concurrency control
All of the following are elements of the DBMS which facilitate user access to the database except a. data access language b. query language c. data definition language d. data manipulation language
data access language
A particular entity in a database is logically defined by which of the following? a. data record b. database. c. record type d. data attribute e. entity
data attribute
All of the following are basic data management tasks except a. data deletion b. data retrieval c. data storage d. data attribution
data attribution
In the relational database model a. data is represented as a tree structure b. the user perceives that files are linked using pointers c. data is represented on two-dimensional tables d. relationships are explicit
data is represented on two-dimensional tables
Which procedure will prevent two end users from accessing the same data element at the same time? a. data replication b. data lockout c. data redundancy d. none of these is correct
data lockout
The task of searching the database to locate a stored record for processing is called a. data deletion b. data retrieval c. data storage d. data attribution
data retrieval
Which characteristic is associated with the database approach to data management? a. multiple storage procedures b. excessive storage costs c. data redundancy d. data sharing
data sharing
The advantages of a partitioned database include all of the following except a. data transmission volume is increased b. response time is improved c. risk of destruction of entire database is reduced d. user control is enhanced
data transmission volume is increased
Where are database access permissions defined a. database schema b. database authority table c. application programs d. operating system e. systems manual
database authority table
Which of the following is not a basic database backup and recovery feature? a. checkpoint b. database authority table c. backup database d. transaction log
database authority table
The functions of a database administrator are a. database operations, database maintenance, and data input preparation. b. database design, database implementation, and database planning, c. database planning, data input preparation, and database design. d. database design, database operation, and equipment operations. e. data input preparation, database design, and database operation.
database design, database implementation, and database planning,
The data manipulation language a. transfers data to the buffer area for manipulation b. enables application programs to interact with and manipulate the database c. describes every data element in the database d. defines the database to the database management system
enables application programs to interact with and manipulate the database
Which of the following is not a responsibility of the database management system? a. ensure that the internal schema and external schema are consistent b. provide an interface between the users and the physical database c. authorize access to portions of the database d. provide recovery from a disaster
ensure that the internal schema and external schema are consistent
Which backup technique is most appropriate for sequential batch systems? a. grandparent-parent-child approach b. direct backup c. remote site, intermittent backup d. staggered backup approach
grandparent-parent-child approach
The data definition language a. describes every data element in the database b. permits users to process data in the database without the need for conventional programs c. identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database d. inserts database commands into application programs to enable standard programs to interact with and manipulate the database
identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database
The feature of a relational database the allows rapid searches for detailed data is the ability to used a. something other than the other items listed b. pointers c. partitioning d. tuples e. networking f. indexing
indexing
The feature of a relational database the allows rapid searches for detailed data is the ability to used a. pointers b. something other than the other items listed c. partitioning d. indexing e. tuples f. networking
indexing
Data concurrency a. is a security issue in partitioned databases b. may result in data lockout c. is implemented using timestamping d. occurs when a deadlock is triggered
is implemented using timestamping
The feature of a relational database that allows users to access related data elements that are not stored together is know as: a. tupling b. indexing c. pointing d. partitioning e. searching f. joining g. networking h. embracing
joining
The feature of a relational database that allows users to access related data elements that are not stored together is know as: (Supp Reading 4 p.4) a. embracing b. joining c. tupling d. searching e. pointing f. indexing g. networking h. partitioning
joining
In a batch processing system using a direct access file system a. backups are created using the grandfather-father-son approach b. if the master file is destroyed, it cannot be reconstructed c. processing a transaction file against a maser file creates a backup file d. master files are usually backed up immediately before an update run
master files are usually backed up immediately before an update run
If the database is inadvertently destroyed or fails, you better hope it is not a a. network database b. tree data base c. relational database d. imbedded database e. hierarchical database
network database
The process used to speed up user queries of a database is known as a. stratification b. partitioning c. normalization d. revision e. atomization
normalization
In the relational database model all of the following are true except a. data can be extracted from specified rows from specified tables b. only one-to-many relationships can be supported c. data are presented to users as tables d. a new table can be built by joining two tables
only one-to-many relationships can be supported
A database system that has several remote users networked together, but each user site stores a unique portion of the database is called a a. partitioned database. b. replicated data processing network. c. hybrid system d. recentralized network e. multidrop data network
partitioned database
An example of a distributed database is a. networked database b. partitioned database c. centralized database d. all are examples of distributed databases
partitioned database
Partitioned databases are most effective when a. primary users of the data are clearly identifiable. b. all of the above. c. users in the system need to share common data. d. read-only access is needed at each site.
primary users of the data are clearly identifiable.
All of the following tests of controls will provide evidence that access to the data files is limited except a. attempting to retrieve unauthorized data via inference queries b. inspecting biometric controls c. comparing job descriptions with access privileges stored in the authority table d. reconciling program version numbers
reconciling program version numbers
Which of the following is not an advantage of a data base management system a. increased flexibility b. minimization of storage cost through data sharing c. increased data security d. data independence for applications e. reduced hardware cost
reduced hardware cost
Which statement is not correct? A query language like SQL a. is written in a fourth-generation language b. requires user familiarity with COBOL c. reduces reliance on programmers d. allows users to retrieve and modify data
requires user familiarity with COBOL
Which of the following is not a problem usually associated with the flat-file approach to data management? a. data storage b. currency of information c. data redundancy d. restricting access to data to the primary user
restricting access to data to the primary user
Which of the following is not a common form of conceptual database model? a. relational b. hierarchical c. network d. sequential
sequential
The textbook refers to four interrelated components of the database concept. Which of the following is not one of the components? a. the conceptual database b. the database administrator c. the database management system d. the physical database
the conceptual database
A description of the physical arrangement of records in the database is a. the subschema b. the internal view c. the external view d. the conceptual view
the internal view
When creating and controlling backups for a sequential batch system, a. off-site backups are not required b. backup files can never be used for scratch files c. the more significant the data, the greater the number of backup versions d. the number of backup versions retained depends on the amount of data in the file
the more significant the data, the greater the number of backup versions
Which of the following may provide many distinct views of the database? a. the internal view b. the conceptual view c. the user view d. the schema
the user view
In a hierarchical model a. a member (child) record may have more than one owner (parent) b. an owner (parent) record may own just one member (child) record c. the way to access data is by following a predefined data path d. links between related records are implicit
the way to access data is by following a predefined data path
A replicated database is appropriate when a. there exists a high degree of data sharing and no primary user b. there is no risk of the deadlock phenomenon c. most data sharing consists of read-write transactions d. there is minimal data sharing among information processing units
there exists a high degree of data sharing and no primary user
Which duty is not the responsibility of the database administrator? a. to design application programs b. to implement security controls c. to develop and maintain the data dictionary d. to design the subschema
to design application programs
The database attributes that individual users have permission to access are defined in the a. user manual. b. operating system c. user view. d. database schema. e. application listing.
user view.
In a relational database a. a programming language (COBOL) is used to create a user's view of the database b. a virtual table exists in the form of rows and columns of a table stored on the disk c. the user's view of the physical database is the same as the physical database d. users perceive that they are manipulating a single table
users perceive that they are manipulating a single table
Data currency is preserved in a centralized database by a. partitioning the database b. implementing concurrency controls c. using a lockout procedure d. replicating the database
using a lockout procedure
Audit objectives for the database management system include all of the following except a. verifying that the security group monitors and reports on fault tolerance violations b. ensuring that authorized users access only those files they need to perform their duties c. verifying that unauthorized users cannot access data files d. confirming that backup procedures are adequate
verifying that the security group monitors and reports on fault tolerance violations