Relational Database (Chapter 4)
4) The ________ handles the link between the way data are physically stored and each user's logical view of that data. A) database management software (DBMS) B) database manager C) data warehouse D) data dictionary
A) database management software (DBMS)
20) Which of the following is false regarding a well-structured relational database? A) A foreign key cannot be null. B) A primary key cannot be null. C) Every column in a row must be single valued. D) All nonkey attributes in a table must describe a characteristic of the object identified by the primary key.
A) A foreign key cannot be null.
16) Creating an empty table in a relational database requires use of the ________, and populating that table requires the use of ________. A) DDL; DML B) DQL; SQL C) DDL; DQL D) DML; DDA
A) DDL; DML
18) If a national sales tax were implemented, which language would be used to add a new field in the sales table to track the sales tax due? A) Data Definition Language B) Data Manipulation Language C) Data Query Language D) Data Update Language
A) Data Definition Language
9) Identify one potential drawback in the design and implementation of database systems for accounting. A) Double-entry accounting relies on redundancy as part of the accounting process, but well-designed database systems reduce and attempt to eliminate redundancy. B) Relational DBMS query languages will allow financial reports to be prepared to cover whatever time periods managers want to examine. C) Relational DBMS provide the capability of integrating financial and operational data. D) Relational DBMS can accommodate multiple views of the same underlying data; therefore, tables storing information about assets can include data about both historical and replacement costs.
A) Double-entry accounting relies on redundancy as part of the accounting process, but well-designed database systems reduce and attempt to eliminate redundancy.
22) Suppose a relational database contained two linked tables. Assuming the organization wants the database to be normalized, which of the following items represents a problem to normalization? A) The database contains only one primary key. B) The database contains two foreign keys. C) The database contains two primary keys. D) The database contains only one foreign key.
A) The database contains only one primary key.
15) Which would not generally be considered a data dictionary output report? A) a list of cash balances in the organization's bank accounts B) a list of all programs in which a data element is used C) a list of all synonyms for the data elements in a particular file D) a list of all data elements used by a particular user
A) a list of cash balances in the organization's bank accounts
2) The problem of changes being incorrectly recorded in a database is known as A) an update anomaly. B) an insert anomaly. C) a delete anomaly. D) a memory anomaly.
A) an update anomaly.
12) The data dictionary usually is maintained A) automatically by the DBMS. B) by the database administrator. C) by the database programmers. D) by top management.
A) automatically by the DBMS.
1) In a relational database, requiring that every record in a table have a unique identifier is called the A) entity integrity rule. B) referential integrity rule. C) unique primary key rule. D) foreign key rule.
A) entity integrity rule.
3) The logical view of a database system refers to A) how a user or programmer conceptually organizes and understands the data. B) how the DBMS accesses data for a certain application program. C) how and where the data are physically arranged and stored. D) how master files store data values used by more than one application program.
A) how a user or programmer conceptually organizes and understands the data.
8) The update anomaly in non-normalized database tables A) occurs because of data redundancy. B) restricts addition of new fields or attributes. C) results in records that cannot be updated. D) is usually easily detected by users.
A) occurs because of data redundancy.
17) When the human resources manager wants to gather data about salary and start date by employees and by departments, the manager would use which language? A) Data Manipulation Language B) Data Query Language C) Data Report Language D) Data Definition Language
B) Data Query Language
3) Which statement is true regarding file systems? A) Transaction files are similar to ledgers in a manual AIS. B) Multiple master files create problems with data consistency. C) Transaction files are permanent. D) Individual records are never deleted in a master file.
B) Multiple master files create problems with data consistency.
5) A relational database in which customer data is not maintained independently of sales invoice data will most likely result in A) an update anomaly. B) an insert anomaly. C) a delete anomaly. D) an integrity anomaly.
B) an insert anomaly.
18) How do users retrieve data stored in a database? A) by viewing the appropriate data tables B) by executing a query C) by performing a search D) by specifying the primary keys
B) by executing a query
10) The ________ contains information about the structure of the database. A) data definition language B) data dictionary C) data warehouse D) database management system
B) data dictionary
4) All of the following are benefits of the database approach except A) data integration and sharing. B) decentralized management of data. C) minimal data redundancy. D) cross-functional analysis and reporting.
B) decentralized management of data.
4) Inability to add new data to a database without violating the basic integrity of the database is referred to as the A) update anomaly. B) insert anomaly. C) integrity anomaly. D) delete anomaly.
B) insert anomaly.
11) Which of the following would not be found in a data dictionary entry for a data item? A) records containing a specific data item B) physical location of the data C) source of the data item D) field type
B) physical location of the data
2) The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the A) entity integrity rule. B) referential integrity rule. C) unique primary key rule. D) foreign key rule.
B) referential integrity rule.
3) In a well-structured database, the constraint that ensures the consistency of the data is known as the A) entity integrity rule. B) referential integrity rule. C) unique primary key rule. D) foreign key rule.
B) referential integrity rule.
22) Cornelia Cassidy is a telecom equipment sales representative. Her company has provided her with a laptop computer that uses wireless connectivity to access the accounting information system from virtually anywhere in the country. She, and other sales reps, have access to view customer and product information. All sales reps also have access that allows them to enter and cancel customer orders. The permissions for Cornelia define a ________ in the company's database management system. A) conceptual-level schema B) subschema C) data dictionary D) physical view
B) subschema
11) Databases were originally developed to address which problem? A) to replace the double entry-system B) to address the proliferation of master files C) to increase the speed that an organization could process transactions D) to decrease the costs associated with manual accounting systems
B) to address the proliferation of master files
5) Identify the aspect of a well-structured database that is incorrect. A) Data is consistent. B) Redundancy is minimized and controlled. C) All data is stored in one table or relation. D) The primary key of any row in a relation cannot be null.
C) All data is stored in one table or relation.
1) ________ in a well-structured relational database. A) Every table must be related to all other tables B) One table must be related to at least one other table C) Every table must be related to at least one other table D) One table must be related to all other tables
C) Every table must be related to at least one other table
6) The schema that provides an organization-wide view of the entire database is known as the A) external-level schema. B) internal-level schema. C) conceptual-level schema. D) logical view of the database.
C) conceptual-level schema.
7) Merlin Frodo has been doing custom piercings and tattoos for over thirty years. His home and place of business is a garage in the harbor district of Seattle, Washington. He keeps meticulous records of every job he has ever completed. These have been entered into a computerized accounting information system that his accountant refers to as a "data warehouse." Merlin is considering adding scarification to his service offerings and has asked his accountant to identify past customers who might be likely candidates for this service. Merlin wants his accountant to engage in A) customer auditing. B) customer resource management. C) data mining. D) enterprise resource planning.
C) data mining.
2) The combination of the database, the DBMS, and the application programs that access the database through the DBMS is referred to as the A) data warehouse. B) database administrator. C) database system. D) database management system.
C) database system.
19) In a well-structured relational database, A) foreign keys cannot be null. B) there must be at least two foreign keys. C) every column in a row must be single valued. D) one table must be related to all other tables.
C) every column in a row must be single valued.
6) In the database design approach known as normalization, the first assumption made about data is A) there is no redundancy in the data. B) the delete anomaly will not apply since all customer records will be maintained indefinitely. C) everything is initially stored in one large table. D) the data will not be maintained in 3NF tables.
C) everything is initially stored in one large table.
23) Cornelia Cassidy is a telecom equipment sales representative. Her company has provided her with a laptop computer that uses wireless connectivity to access the accounting information system from virtually anywhere in the country. She has access to view customer and product information. She also has access that allows her to enter and cancel customer orders. The permissions for Cornelia (and other sales reps) define a ________ in the company's database management system. A) conceptual-level schema B) data dictionary C) external-level schema D) physical view
C) external-level schema
7) A set of individual user views of the database is called the A) conceptual-level schema. B) internal-level schema. C) external-level schema. D) meta-schema.
C) external-level schema.
1) The physical view of a database system refers to A) how a user or programmer conceptually organizes and understands the data. B) how the DBMS accesses data for a certain application program. C) how and where the data are physically arranged and stored. D) how master files store data values used by more than one application program.
C) how and where the data are physically arranged and stored.
9) Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema. A) external B) conceptual C) internal D) meta
C) internal
8) A low-level view of the database that describes how the data are actually stored and accessed is the A) conceptual-level schema. B) subschema. C) internal-level schema. D) external-level schema.
C) internal-level schema.
1) Using a file-oriented approach to data and information, data is maintained in A) a centralized database. B) many interconnected files. C) many separate files. D) a decentralized database.
C) many separate files.
19) ________ is a feature in many database systems that simplifies the creation of reports by allowing users to specify the data elements desired and the format of the output. A) Report printer B) Report creator C) Report generator D) Report writer
D) Report writer
1) What acts as an interface between the database and the various application programs? A) data warehouse B) database administrator C) database system D) database management system
D) database management system
2) File-oriented approaches create problems for organizations because of A) multiple transaction files. B) a lack of sophisticated file maintenance software. C) multiple users. D) multiple master files.
D) multiple master files.
5) Which is probably the most immediate and significant effect of database technology on accounting? A) replacement of the double entry-system B) change in the nature of financial reporting C) elimination of traditional records such as journals and ledgers D) quicker access to and greater use of accounting information in decision-making
D) quicker access to and greater use of accounting information in decision-making
7) The database design method in which a designer uses knowledge about business processes to create a diagram of the elements to be included in the database is called A) normalization. B) decentralization. C) geometric data modeling. D) semantic data modeling.
D) semantic data modeling.
13) Reports produced using the data dictionary could include all of the following except a list of A) programs where a data item is used. B) synonyms for the data items in a particular file. C) outputs where a data element is used. D) the schemas included in a database.
D) the schemas included in a database.
3) The ________ occurs when more than one occurrence of a specific data item in a database exists. A) inconsistency anomaly B) insert anomaly C) delete anomaly D) update anomaly
D) update anomaly