AIS ch 9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

10. Users access the database a. by direct query b. by developing operating software c. by constantly interacting with systems programmers d. all of the above

a. by direct query

4. Which characteristic is associated with the database approach to data management? a. data sharing b. multiple storage procedures c. data redundancy d. excessive storage costs

a. data sharing

11. The Data Definition Language a. identifies, for the Database Management System, the names and relationships of all data elements, records, and files that comprise the database b. inserts database commands into application programs to enable standard programs to interact with and manipulate the database c. permits users to process data in the database without the need for conventional programs d. describes every data element in the database

a. identifies, for the Database Management System, the names and relationships of all data elements, records, and files that comprise the database

36. Entities are a. nouns that are depicted by rectangles on an entity relationship diagram b. data that describe the characteristics of properties of resources c. associations among elements d. sets of data needed to make a decision

a. nouns that are depicted by rectangles on an entity relationship diagram

20. The update anomaly in unnormalized databases a. occurs because of data redundancy b. complicates adding records to the database c. may result in the loss of important data d. often results in excessive record insertions

a. occurs because of data redundancy

29. An example of a distributed database is a. partitioned database b. centralized database c. networked database d. all are examples of distributed databases

a. partitioned database

8. A description of the physical arrangement of records in the database is a. the internal view b. the conceptual view c. the subschema d. the external view

a. the internal view

27. All of the following are elements of the DBMS which facilitate user access to the database except a. query language b. data access language c. data manipulation language d. data definition language

b. data access language

32. The advantages of a partitioned database include all of the following except a. user control is enhanced b. data transmission volume is increased c. response time is improved d. risk of destruction of entire database is reduced

b. data transmission volume is increased

38. All of the following are advantages of a partitioned database except a. increased user control by having the data stored locally b. deadlocks are eliminated c. transaction processing response time is improved d. partitioning can reduce losses in case of disaster

b. deadlocks are eliminated

35. Data concurrency a. is a security issue in partitioned databases b. is implemented using timestamping c. may result in data lockout d. occurs when a deadlock is triggered

b. is implemented using timestamping

22. The deletion anomaly in unnormalized databases a. is easily detected by users b. may result in the loss of important data c. complicates adding records to the database d. requires the user to perform excessive updates

b. may result in the loss of important data

13. Which statement is not correct? A query language like SQL a. is written in a fourth-generation language b. requires user familiarity with COBOL c. allows users to retrieve and modify data d. reduces reliance on programmers

b. requires user familiarity with COBOL

3. Which of the following is not a problem usually associated with the flat-file approach to data management? a. data redundancy b. restricting access to data to the primary user c. data storage d. currency of information

b. restricting access to data to the primary user

15. In a hierarchical model a. links between related records are implicit b. the way to access data is by following a predefined data path c. an owner (parent) record may own just one member (child) record d. a member (child) record may have more than one owner (parent)

b. the way to access data is by following a predefined data path

33. A replicated database is appropriate when a. there is minimal data sharing among information processing units b. there exists a high degree of data sharing and no primary user c. there is no risk of the deadlock phenomenon d. most data sharing consists of read-write transactions

b. there exists a high degree of data sharing and no primary user

19. In a relational database a. the user's view of the physical database is the same as the physical database b. users perceive that they are manipulating a single table c. a virtual table exists in the form of rows and columns of a table stored on the disk d. a programming language (COBOL) is used to create a user's view of the database

b. users perceive that they are manipulating a single table

30. Data currency is preserved in a centralized database by a. partitioning the database b. using a lockout procedure c. replicating the database d. implementing concurrency controls

b. using a lockout procedure

16. Which term is not associated with the relational database model? a. tuple b. attribute c. collision d. relation

c. collision

34. What control maintains complete, current, and consistent data at all information processing units? a. deadlock control b. replication control c. concurrency control d. gateway control

c. concurrency control

1. All of the following are basic data management tasks except a. data deletion b. data storage c. data attribution d. data retrieval

c. data attribution

17. In the relational database model a. relationships are explicit b. the user perceives that files are linked using pointers c. data is represented on two-dimensional tables d. data is represented as a tree structure

c. data is represented on two-dimensional tables

1. Which procedure will prevent two end users from accessing the same data element at the same time? a. data redundancy b. data replication c. data lockout d. none of the above

c. data lockout

21. The most serious problem with unnormalized databases is the a. update anomaly b. insertion anomaly c. deletion anomaly d. none of the above

c. deletion anomaly

12. The Data Manipulation Language a. defines the database to the Database Management System b. transfers data to the buffer area for manipulation c. enables application programs to interact with and manipulate the database d. describes every data element in the database

c. enables application programs to interact with and manipulate the database

7. Which of the following is not a responsibility of the Database Management System? a. provide an interface between the users and the physical database b. provide security against a natural disaster c. ensure that the internal schema and external schema are consistent d. authorize access to portions of the database

c. ensure that the internal schema and external schema are consistent

39. Each of the following is a relational algebra function except a. join b. project c. link d. restrict

c. link

24. Which of the following is not a common form of conceptual database model? a. hierarchical b. network c. sequential d. relational

c. sequential

9. Which of the following may provide many distinct views of the database? a. the schema b. the internal view c. the user view d. the conceptual view

c. the user view

14. Which duty is not the responsibility of the Database Administrator? a. to develop and maintain the Data Dictionary b. to implement security controls c. to design application programs d. to design the subschema

c. to design application programs

26. Which statement is false? a. The DBMS is special software that is programmed to know which data elements each user is authorized to access. b. User programs send requests for data to the DBMS. c. During processing, the DBMS periodically makes backup copies of the physical database. d. The DBMS does not control access to the database.

d. The DBMS does not control access to the database.

28. Which of the following is a level of the database that is defined by the data definition language? a. user view b. schema c. internal view d. all are levels or views of the database

d. all are levels or views of the database

25. Which of the following is a relational algebra function? a. restrict b. project c. join d. all are relational algebra functions

d. all are relational algebra functions

23. Which statement is correct? a. in a normalized database, data about vendors occur in several locations b. the accountant is responsible for database normalization c. in a normalized database, deletion of a key record could result in the destruction of the audit trail d. connections between M:M tables is provided by a link table

d. connections between M:M tables is provided by a link table

2. The task of searching the database to locate a stored record for processing is called a. data deletion b. data storage c. data attribution d. data retrieval

d. data retrieval

37. A user view a. presents the physical arrangement of records in a database for a particular user b. is the logical abstract structure of the database c. specifies the relationship of data elements in the database d. defines how a particular user sees the database

d. defines how a particular user sees the database

18. In the relational database model all of the following are true except a. data is presented to users as tables b. data can be extracted from specified rows from specified tables c. a new table can be built by joining two tables d. only one-to-many relationships can be supported

d. only one-to-many relationships can be supported

6. The textbook refers to four interrelated components of the database concept. Which of the following is not one of the components? a. the Database Management System b. the Database Administrator c. the physical database d. the conceptual database

d. the conceptual database

5. Which characteristic is not associated with the database approach to data management? a. the ability to process data without the help of a programmer b. the ability to control access to the data c. constant production of backups d. the inability to determine what data is available

d. the inability to determine what data is available


Set pelajaran terkait

D072 Fundamentals for Success in Business Review Unit 4

View Set

Info and Network Security Chapter 2

View Set

SPINAL CORD/NERVES True and False

View Set

Insurance 2-40, 200 question exam simulator

View Set

MIIM - 532 - Topic 5: Sexual Reproduction

View Set

Chpt 6 Review Questions - Network Design Elements

View Set

History and Systems of Psychology 1

View Set

Test 4: Toddler/Preschool - Growth/Development

View Set