Section 2 study guide Bus 391

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A DBMS and database are synonymous terms that can be used interchangeably. True False

False

A computer with two CPUs is called a(n) dual-core computer. True False

False

Cache memory is also called "the brain" of a computer. True False

False

Database design is easy and can be explained in a paragraph. True False

False

Managing the impact of database structural changes on applications and users is an operational task for a database administrator. True False

False

Most traditional databases use the Internet to transmit traffic back and forth between the users' computers and the DBMS server. True False

False

The accuracy of a database design is not dependent on the corresponding data model. True False

False

The cache and main memory are nonvolatile, meaning their contents survive when power is off. True False

False

Web applications are programs that are written to use a particular operating system. True False

False

Which of the following is NOT a valid type of relationship? A.Many-to-one B.One-to-one C.Many-to-many D.One-to-many E.None-to-none

None-to-none

________ is the process of converting a poorly-structured table into two or more well-structured tables. A.Refactoring B.Banding C.Normalization D.Standardization E.Optimization

Normalization

________ is the process of converting a data model into tables, relationships, and data constraints. A.Database querying B.Database design C.Database cross modeling D.Database aggregation E.Data mining

Database design

________ in an E-R diagram refer to the least number of entities required in a relationship. A.Foreign keys B.Minimum cardinalities C.Minimum candidate keys D.Chernozem cardinalities E.Primary keys

Minimum cardinalities

________ is the combination of the real physical world with interactive virtual images or objects. A.Sense of presence B.Virtual reality (VR) C.Mixed reality (MR) D.RealityE.Augmented reality (AR)

Mixed reality (MR)

________ applications are programs that are written to use a particular operating system. A.Web B.Browser C.Native D.Enterprise E.Thin-client

Native

Which of the following is a purpose of "application programs"?A.View data; insert new, update existing, and delete existing data B.Provide security, data consistency, and special purpose processing like handleout-of-stock situations C.Granting access to the users D.Search based upon data values provided by the user E.Structured presentation of data using sorting, grouping, filtering, and other operations

Provide security, data consistency, and special purpose processing like handleout-of-stock situations

Which of the following tasks cannot be performed using a list but can be managed through databases? A.To delete B.To modify the data that is already present C.To keep track of student registration D.To perform some calculations like addition and subtraction E.To store the grades of students

To keep track of student registration

A (bring your own device) BYOD policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business. True False

True

A line in an entity-relationship (E-R) diagram is used to represent the relationships between two entities. True False

True

An operating system is a program that controls a computer's resources. True False

True

Databases that have both primary and foreign keys are called relational databases. True False

True

In the future, your house will be so smart it will analyze you. True False

True

It is to the users advantage to have a working knowledge of database developments. True False

True

Locking must be used to coordinate the activities of users in order to prevent the lost-update problem. True False

True

Native applications are developed by professional programmers only. True False

True

One of the functions of a DBMS is to provide tools to assist in the administration of a database. True False

True

Open source succeeds because of collaboration. True False

True

Reports refer to the structured presentation of data using sorting, grouping, filtering, and other operations. True False

True

SQL is an international standard language for processing a database. True False

True

Some governments are launching their own cryptocurrencies. True False

True

The main memory of a computer is also called random access memory (RAM). True False

True

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A.Auditors B.Users C.Designers D.Administrators E.Developers

Users

Which of the following is an international standard language for processing a database? A.Cassandra B.SQL C.Relational LM D.DB2 E.MS Access

SQL

A database is used instead of a spreadsheet when ________. A.structures of data lists are simple B.lists of data involve a single theme C.lists involve data with multiple themes D.users do not want to store all data in one place E.users have a small amount of data to store

lists involve data with multiple themes

A data model is a ________. A.array of data variables B.set of programs used to retrieve data C.repository of unprocessed data D.logical representation of database data E.collection of isolated databases

logical representation of database data

Which of the following is an example of storage hardware in computers? A.projector B.plotter C.Web camera D.inkjet printer E.magnetic disk

magnetic disk

The CPU stores the results of computations in ________. A.network cards B.secondary memory C.main memory D.SSD storage E.floppy disks

main memory

A ________ is equivalent to 1,024 kilobytes. A.zettabyte B.terabyte C.kilobyte D.megabyte E.gigabyte

megabyte

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A.client operating system B.mobile system C.native application D.nonmobile system E.virtual private network

mobile system

Browser applications are thin-client applications that ________. A.use COBOL as the standard language for user-side processing B.are processed using VisualBasic and C++ C.do not need to be encrypted D.need not be preinstalled on the users' computers E.depend on internal networks and not the Internet to transmit data

need not be preinstalled on the users' computers

If a database table contains redundant or duplicate data, it can be converted into two tables with better structure through __________. A.cardinality B.data modeling C.normalization D.data integrity E.creating relationships

normalization

Virtualization is the process by which ________. A.one physical computer hosts many different virtual computers within it B.many computers are used to control a server C.a single operating system is licensed for multiple computers D.a single server is used to host the operations of a workstation E.a single operating system is shared by multiple users

one physical computer hosts many different virtual computers within it

Which of the following devices is an example of a storage hardware device? A.random access memory B.the system bus C.central processing unit D.optical disk E.barcode scanner

optical disk

Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a columnlabeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. A.functionally dependent record B.secondary key C.foreign key D.primary key E.key attribute

primary key

The modification or deletion of data in a database is an example of ________ operations of a database management system. A.administrative B.technical C.processing D.statistical E.analytical

processing

The elements that make up a database application are: forms, application programs, reports, and __________. A.backups B.queries C.performance monitors D.data views E.relationships

queries

Main memory is also known as ________. A.read-only memory B.random access memory C.cache memory D.optical memory E.the system bus

random access memory

The rows in a database are also called ________. A.laterals B.records C.files D.fields E.tables

records

In an E-R diagram, a line between two entities represents a(n) ________. A.cardinality B.relationship C.attribute D.branch E.identifier

relationship

All the following are characteristics of native applications EXCEPT __________. A.developed in complex, sophisticated programming languages B.high development cost C.distributed via a company store web site (such as iTunes) D.runs seamlessly on any device under the browser E.developed by skilled professional programmers

runs seamlessly on any device under the browser

Which of the following terms refers to a collection of servers?A.firmware B.server farm C.parallel nodes D.server database E.shareware

server farm

he process of normalization constructs tables such that every table has a ________. A.foreign key B.one-to-one relationship between entities C.specialized graphical query D.single theme E.minimized metadata footprint

single theme

Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A.arrow B.double line C.triangle D.small oval E.vertical bar

small oval

If a list deals with one theme but is long, put it into a __________. A.cell B.separate column C.spreadsheet D.single list E.database column

spreadsheet

The three essential elements of the definition of a database are __________. A.tables; metadata; validation rules B.fields; relationship among fields in tables; metadata C.tables; relationship among rows in tables; metadata D.tables; relationship among rows in tables; validation rules E.validation rules; data; tables

tables; relationship among rows in tables; metadata

Server infrastructure is delivered as a service via the Internet and often referred to as ________. A.main memory B.the cloud C.computer hardware D.secondary memory E.SSD storage

the cloud

All of these issues are results of data integrity problems except ________, A.the system will develop a poor reputation B.inconsistent results C.incorrect results D.the system will give users too much information E.users lose confidence in the data

the system will give users too much information

In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A.wave B.vertical bar C.arrow D.triangular block E.small oval

vertical bar

________ is a completely computer-generated virtual world with interactive digital objects. A.Virtual reality (VR) B.Mixed reality (MR) C.Sense of presence D.Augmented reality (AR) E.Reality

Virtual reality (VR)

An important advantage of __________ is that the browser provides a generally consistent environment in which to execute. A.open source applications B.closed source applications C.native applications D.custom-developed applications E.Web applications

Web applications

Current 3D printing technology __________. A.is basically focused on toy manufacturing B.is unable to create objects with much strength C.can print in an array of materials D.is limited to plastic materials E.is unlikely to affect existing industries significantly

can print in an array of materials

A ________ is also called "the brain" of the computer. A.thumb drive B.CMOS C.network card D.central processing unit E.motherboard

central processing unit

A primary key in a database is a ________. A.group of records that identifies similar attribute B.group of fields or columns that represent metadata C.group of rows that identifies a unique table or file D.column or group of columns that identifies a unique row in a table E.group of tables or files formed to identify a unique field or row

column or group of columns that identifies a unique row in a table

Identify the first step in transforming a data model into a relational database design. A.creating foreign keys B.normalizing the data and files C.representing the entity relationships D.creating data triggers for export E.creating a table for each entity

creating a table for each entity

The angled lines on the lines representing relationship between two related entities are referred to as ________. A.identifiers B.foreign keys C.entities D.switch E.crow's feet

crow's feet

Each entity in a database has a unique attribute called a(n) ________. A.prime value B.index field C.public key D.foreign key E.identifier

identifier

The major elements in a mobile system include all the following EXCEPT __________. A.users in motion B.cloud-based resources C.in-place users D.wireless connectivity E.mobile devices

in-place users

All of the following are benefits to using cryptocurrencies except ________. A.it is faster and easier to use than traditional payment methods B.there is protection from inflation C.it cannot be seized by the government D.there are no taxes E.it is insured by the Federal Reserve Bank

it is insured by the Federal Reserve Bank

Mobile systems offer the potential of ________, which is data delivered to the user at the precise time it is needed. A.cluster data B.convenient data C.just-in-time data D.granular data E.clean data

just-in-time data

The purpose of a database is to __________. A.eliminate the need to learn about spreadsheets B.keep track of things that share a single theme C.eliminate the need to learn programming D.keep track of things that involve multiple themes E.make the use of the cloud more straightforwardly

keep track of things that involve multiple themes

Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program.When Toby buys the program, he will actually be buying the software ________. A.license B.patent C.copyright D.code E.trademark

license

Which of the following statements is true? A."If the structure of a list is simple enough, it will be necessary to use database technology." B."Professionals rarely use spreadsheets to keep track of things." C."Setting up different forms of data in separate spreadsheets is an effective way to keep trackof that data." D."If the structure of a list is simple enough, there is no need to use databasetechnology." E."Databases are not used to keep track of things."

"If the structure of a list is simple enough, there is no need to use database technology."

All of the following are disruptive forces to change business except ________. A.Internet of Things B.2D printing C.self-driving cars D.digital reality devices E.cryptocurrencies

2D printing

________ reality is the altering of reality by overlaying digital information on real-world objects. A.Virtual B.Augmented C.Actual D.Enhanced E.Mixed

Augmented

________ is the altering of reality by overlaying digital information on real-world objects. A.Reality B.Augmented reality (AR) C.Virtual reality (VR) D.Sense of presence E.Mixed reality (MR)

Augmented reality (AR)

Which of the following is NOT a capability of mobile device management (MDM) software? A.Install and update software. B.Perform a back-up of the device. C.Restoring a device. D.Automate sending of text messages on behalf of the user. E.Reporting usage of the device.

Automate sending of text messages on behalf of the user.

The DBMS does not provide applications for which operation?A.Automatically correcting data B.Deleting data C.Modifying data D.Reading data E.Inserting data

Automatically correcting data

Which of the following is NOT correct regarding browser-based database applications? A.Forms, reports, and queries are displayed and processed using HTML. B.Browser-based applications are thin-client applications. C.Browser-based applications are thick-client applications. D.Languages like C# and Java are used for server-side processing. E.JavaScript is the standard language for user-side processing.

Browser-based applications are thick-client applications.

Which of the following statements about software is true? A.Buying software means you own the software code. B.It is perfectly fine for an organization to buy one copy of a software product and copy it on to allits computers. C.Operating systems for clients and servers is identical. D.Organizations make a lot of money selling licenses to open source software. E.Buying software means you own a license to use the software.

Buying software means you own a license to use the software.

Which of the following statements about client and server computers is correct? A.Clients place requests with servers and servers return data. B.Servers use the services that clients provide through a network. C.Clients are organized in farms, but servers can be located only in the cloud. D.Servers are less powerful than clients. E.A tablet is an example of a server.

Clients place requests with servers and servers return data.

Which of the following is a characteristic of volatile memory?A.Files are stored permanently. B.It should be purged at least once a year. C.Contents are lost when power is off. D.Processor heats up during the operation. E.Processing of data is very slow.

Contents are lost when power is off.

________ are digital-only currencies. A.Cryptocurrencies B.Online payments C.E-wallets D.E-checks E.Debit cards

Cryptocurrencies

Which of the following statements is correct? A.The user does not need to dedicate special time to reviewing the data model. B.A database is a model of how only managers view their business world. C.If corrections are needed in the database structure, the requirements step is the best time todo this. D.Do not proceed with database design unless the data model is accurate. E.If the data model is incorrect, the database can still be used successfully.

Do not proceed with database design unless the data model is accurate.

hich of the following is the most controlling BYOD policy? A.For the company to offer coffee shop style networking. B.If the employee signs on to the company's network, they are financially responsible for anydamage done. C.The company creates special logins for BYOD. D.For the organization to sniff employees' mobile traffic. E.For an organization to declare that it owns any device that employees connect to itsnetwork.

For an organization to declare that it owns any device that employees connect to itsnetwork.

Which of the following is NOT an operation performed by a database developer? A.Create tables B.Queries the table data C.Create relationships and other structures D.Grants access permission to a database E.Modify an existing table

Grants access permission to a database

The __________ will allow all the devices in your home to be connected and will enable it to see what, how, and when you do things and anticipate your needs. A.relaxation of BYOD policies B.advances in self-driving cars C.capacity of 3D printing D.improvements in vertical-market software E.Internet of Things

Internet of Things

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A.Internet of things (IoT) B.visual mapping C.self-driving cars D.3D printing E.automated guided vehicles

Internet of things (IoT)

What is cardinality? A.It is the process of creating a representation of data. B.It is the process by which tables are redesigned. C.It helps to describe the relationship between two entities. D.It defines the foreign keys of a table. E.It corrects and makes the data effective.

It helps to describe the relationship between two entities.

Which of the below defines an identifier? A.It describes characteristics of the entity. B.It is an attribute or group of attributes whose value is associated with one and only oneentity instance. C.It may represent a physical object, logical construct, or transaction. D.It is basically a form of an entity-relationship data model. E.It is something that a user wants to track.

It is an attribute or group of attributes whose value is associated with one and only oneentity instance.

Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which ofthe following is TRUE of the source code for Carter's program? A.It is highly protected and obtained only by having a license. B.It is available to the public. C.It is less stable and platform dependent. D.It cannot be compiled. E.It is available only to carefully vetted contractors.

It is available to the public.

Which of the following is NOT a major element of a mobile system?A.Wireless connectivity B.Cloud-based resource C.Mobile devices D.Users in motion E.Light laptops

Light laptops

________ is a version of Unix that was developed by an open source community. A.SPX B.Android C.Mac OS D.Symbian OS E.Linux

Linux

Which of the following is an advantage of employee use of mobile systems at work? A.Greater support costs B.Compatibility problems C.Loss of control D.Reduced support costs E.Data loss or damage

Reduced support costs

Which of the following is TRUE of single-user databases? A.The application, the DBMS, and the database all reside on the user's computer. B.They use JavaScript for user-side processing. C.The Internet is used to access the DBMS server computer. D.They run on clustered Linux or Unix systems E.They are displayed and processed using HTML5, CSS3, and JavaScript.

The application, the DBMS, and the database all reside on the user's computer.

Which of the following is TRUE about the database development process? A.Changing a relationship from 1:N to N:M in an existing database is a complex and lengthyprocess. B.User review of the data model is avoided as it is not helpful in data modeling. C.The database structure is easy to change during the data modeling stage. D.Databases are easier to develop than spreadsheets. E.Normalization is unnecessary for large databases.

The database structure is easy to change during the data modeling stage.

Why is user involvement critical for database development?A.Because they use the system. B.The design of the database depends on how users view their business environment. C.The data model states it is important. D.Because users design the system. E.The executive board says it is critical.

The design of the database depends on how users view their business environment.

Web applications are characterized by which of the following?A.They are expensive to develop and support. B.They are highly secure and easy to use. C.They can be run on multiple operating systems without modifications. D.They can use the unique capabilities of the hardware device. E.They can run only on a single type of device.

They can be run on multiple operating systems without modifications.

Web applications are characterized by which of the following?A.They are expensive to develop and support. B.They can be run on multiple operating systems without modifications. C.They can use the unique capabilities of the hardware device. D.They are highly secure and easy to use. E.They can run only on a single type of device.

They can be run on multiple operating systems without modifications.

Which of the following is TRUE of N:M relationships? A.They can have more than one entity on each side of the relationship. B.They are the same as N:N relationships. C.They represent minimum cardinalities in a relationship. D.They connect different data types. E.They are also called one-to-many relationships.

They can have more than one entity on each side of the relationship.

Which of the following statements is TRUE about native applications? A.They can be developed by less skilled, lesser-paid employees. B.They are run exclusively through a Web browser. C.The cost of native applications is low. D.They only run on the operating system for which they are programmed. E.The limits on native applications are usually technological, not budgetary.

They only run on the operating system for which they are programmed.

Which of the following is likely to occur in the future? A.Web applications will disappear. B.Your car knows exactly when to self-start so it is warm when you get in. C.Students no longer need to cultivate personal creativity and problem-solving skills D.Future jobs will require less technical skills. E.Workers will still need to go in to work to access data.

Your car knows exactly when to self-start so it is warm when you get in.

he data and relationships that will be stored in a database can be depicted using __________. A.minimum cardinalities B.identifiers C.attributes D.a data model E.an entity

a data model

Which of the following statements refers to server virtualization?A.a server computer that hosts one or more other server computers B.a personal computer, such as a desktop or portable computer, that hosts several differentoperating systems C.a server can connect to multiple networks at the same time D.a server that hosts many versions of desktop operating systems E.a storage area that loses its contents when the power is off

a server computer that hosts one or more other server computers

A group of similar rows or records is known as ________. A.an attribute B.a cluster C.a table D.a field E.a prototype

a table

When using the relational model to represent two tables, one must ________. A.establish only N:M relationships between the tables B.have more than two primary keys in the model C.minimize the number of columns in the second table D.add a foreign key to one of the tables E.use metadata instead of foreign keys

add a foreign key to one of the tables

Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks areperformed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A.system software B.network connection C.application software D.firmware E.operating system

application software

Bits are used for computer data because they ________. A.represent the orientation of a nonoptical media B.have an infinite number of states C.are easy to represent physically D.can have more than two values at a time E.are represented exclusively as letters of the alphabet

are easy to represent physically

Browser-based applications ________. A.do not need to be encrypted B.need to be preinstalled on the users' computers C.eliminate the need to check for data consistency D.run within a corporate network that is protected from the Internet E.are more vulnerable to security threats than are traditional applications

are more vulnerable to security threats than are traditional applications

Entities in a data model have ________ that describe the characteristics of the entity. A.primary keys B.characters C.codes D.attributes E.scribes

attributes

Web applications are typically limited by the capabilities of the ________. A.hardware B.operating system C.browser D.motherboard E.programming language

browser

The limits on creating native applications are usually ________, not technological. A.in finding skilled programmers B.budgetary C.based on complexity D.based on an executive board decision E.based on requirements

budgetary

Which of the following is the smallest element in a database?A.metadata B.field C.zetta D.byte E.record

byte

Bits are grouped into 8-bit chunks called ________. A.switches B.kilobytes C.bytes D.nibbles E.strings

bytes

In a database, ________ are grouped into columns. A.fields B.files C.records D.bytes E.nibbles

bytes

In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A.data integrity problem B.adaptation conflict C.crow's-foot paradigm D.security problem E.data loopback problem

data integrity problem

Data integrity problems are likely to occur when __________. A.minimum cardinalities are not met B.normal forms are used C.data is duplicated D.the data design has a N:M relationship E.attribute conflicts are not resolved

data is duplicated

Disruptive forces that have the potential to disrupt business as we know it include all of the following EXCEPT __________. A.3D printing B.self-driving vehicles C.Internet of Things D.cryptocurrencies E.data mining applications

data mining applications

A ________ describes the data and relationships that will be stored in a database. A.data-tree model B.data model C.data application D.data aggregator E.query model

data model

The designers of a database typically begin by developing a __________ to construct a logical representation of the database before it is implemented. A.3D representation B.network diagram C.process model D.line drawing E.data model

data model

Metadata is/are ________. A.data that are encrypted B.data that describes data C.codes used for server-side processing D.more important data E.error logs of databases

data that describes data

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A.database application B.data model C.data bridge D.database design E.data field

database application

A(n) ________ is a program used to create, process, and administer a database. A.database system B.database management system C.information system D.operating system driver E.operating system

database management system

In a data model, a(n) ________ is something that a user wants to track. A.byte B.record C.quark D.primary key E.entity

entity

In data modeling, a(n) __________ is something that the users want to store data about. A.attribute B.entity C.foreign key D.primary key E.relationship

entity

Which of the following is a developmental task of database administration? A.conducting training for users B.managing configuration changes in systems C.evaluating an application design D.testing backup procedures E.monitoring backup procedures

evaluating an application design

The columns in a database are also called ________. A.records B.fields C.files D.verticals E.tables

fields

Columns that are keys to different tables than the ones in which they reside are called ________. A.internal records B.nonlocal keys C.primary keys D.attributes E.foreign keys

foreign keys

Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data? A.forms B.queries C.reports D.operations E.triggers

forms

All of the following are functions of the DBMS except ________. A.processing the database B.getting the users to use the database C.creating the database D.modifying the database E.providing tools to administer the database

getting the users to use the database

The disadvantages of employees using their own mobile devices at work include all the following EXCEPT __________. A.greater support costs B.loss of control C.greater employee satisfaction D.risk of infection E.compatibility problems

greater employee satisfaction


Set pelajaran terkait

abeka 7th grade history section review 3.2

View Set

What restrictions are there over of the use of property - Positive and Restrictive Covenants (Chapter 9).

View Set

Chemistry For Changing Times Chapter 15

View Set

Contemporary Health Issues Test 3

View Set

Non-Infectious Upper Respiratory

View Set

Maryland Laws and Rules Pertinent to Property and Casualty Insurance

View Set

Individual Life Insurance Contract - Provision and Options

View Set

Early Childhood Studies Practice Test

View Set

Professional Selling Exam 2 (Ch. 4-7)

View Set