Kitkat (Chapter 12,14)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.

users

The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

using the user interface

Data mining used in conjunction with Web site data is referred to as Web mining. _________________________

True

The characteristics of an entity are called ____.

attributes

The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

data dictionary

A ____ is responsible for maintaining a large, multiuser system.

system administrator

Each step of the ____ produces some type of documentation to pass on to the next step.

system development life cycle

____________________ script is a set of instructions written in a programming language and designed to accept data from and return data to a Web page visitor.

CGI (common gateway interface)

____ are useful for identifying procedures and summarizing the decision making process for one step of a system.

Decision tables

Explain in-memory databases

Designed to hold all data in the main memory of the computer, rather than on disk.

____________________ diagrams and data flow diagrams (DFDs) are used to model the entities (something, such as a person, object, or event, for which data is collected) in a system.

Entity relationship

A paperless office has been achieved through a variety of technologies and processing techniques.

False

If a field needs to store decimal places, the Long Integer field size can be used.

False

Neural networks is the field devoted to the study of robots—devices, controlled by a person or a computer, that can move and react to sensory input. _________________________

False

Normalization is usually viewed as a multistep process, from first normal form (1NF) to usually fifth normal form (5NF).

False

One advantage of playing against a computer is that even if the human player makes a mistake, there is still hope that the computer opponent will make its own mistake at a later time, to level the playing field in that game.

False

Software that connects two otherwise separate applications—such as a Web server and a DBMS—is referred to as interware. _________________________

False

The combination of hardware, software, and other resources used to facilitate communications and enhance productivity is collectively referred to as a(n) system development life cycle (SDLC). _________________________

False

The data dictionary resulting from the system analysis phase includes any instruments used in the data gathering stage, as well as the resulting diagrams, tables, trees, checklists, and other tools used to summarize and analyze the gathered data. _________________________

False

The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price.

False

The goal of business intelligence is to provide a detailed picture of an organization, its functions, and its systems, and the relationships among these items. _________________________

False

Views need to be designed to extract the needed information in as efficient a manner as possible.

False

With MOLAP (Multidimensional OLAP), the multidimensional information is stored in an existing relational database using tables to store the summary information. _________________________

False

Explain the feasibility report. Be sure to mention what it contains and at what stage of system development it is generated.

It is contained in 1. Preliminary Investigation phase. The systems analyst's findings on the status of the existing system, as well as the benefits and feasibility of changing to a new system.

____ is the phase of system development in which the problem area is studied in depth and the needs of system users are assessed.

System analysis

____ are made up of related records.

Tables

A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file. _________________________

True

A(n) geographic information system (GIS) is an information system that combines geographic information (such as maps and topology and terrain data) with other types of data in order to provide a better understanding of the relationships among the data. _________________________

True

After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary key so that a primary key for one table can be used to extract data from other tables as needed. _________________________

True

Data integrity refers to the accuracy of data.

True

Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.

True

Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.

True

N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.

True

Objects stored in an OODBMS can be retrieved using queries, such as with a(n) object query language (OQL)—an object-oriented version of SQL. _________________________

True

Some expert systems are designed to take the place of human experts, while others are designed to assist them.

True

The figure above shows the components of a(n) information system. _________________________

True

The purpose of the preliminary investigation is to define and evaluate the situation relatively quickly, to see if it is worthy of further study. _________________________

True

In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

VBScript

Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

Web database

A(n) ______________________________ system performs actions that are characteristic of human intelligence.

artificial intelligence

Neural networks are often used in ____________________ identification systems, such as in the fingerprint reader shown in the accompanying figure.

biometric

Mary is entering her senior year of college. She has a meeting on Friday with her adviser to discuss her career plans. Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.

business analyst

With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer.

centralized database system

A company's ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.

chief information officer (CIO)

____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value.

data validation

Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.

direct

With a(n) ____________________, the data is separated into several databases, each of which is stored on a different computer that may be in different physical locations from one another but that are connected via a network.

distributed database system

The appearance and content of ____________________ Web pages change based on a user's input.

dynamic

With the ____________________ approach, the user is primarily responsible for the development of the system.

end-user development

Systems that are used by an entire enterprise are referred to as ____________________ systems.

enterprise

A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

field

In a typical client-server database application, the client is called the ____.

front end

In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions.

inference engine

The ____________________ approach to system development allows the system to be developed incrementally, with a series of development steps being repeated until the system is finalized.

iterative (repetitive)

The growth and importance of data warehousing today has led to another type of database model—the ______________________________.

multidimensional database

Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.

neural networks

Much of outsourcing today is ____________________; that is, outsourced to another country.

offshore

The systems that record the data generated from order transactions and help staff members manage them are called ____________________.

order entry systems

A(n) ____________________ is a specific field in a database table that uniquely identifies the records in that table.

primary key

A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

query

The figure above illustrates a ____, created from data contained in a database.

report

A record is also called a ____.

row

Define and discuss neural networks. Be sure to cite several examples of their use.

Artificial intelligence system that attempt to imitate the way a human brain works. Used in - handwriting   - speech - image recognition


Set pelajaran terkait

Chapter 12: Corporate Governance

View Set

Chapter 2: Beginnings of English America, 1607-1660

View Set

3C/D (VE/IM) - Department of the Air Force

View Set

Bob Brooks National Contracts Exam Questions

View Set