CSIT 241 Chapter 9 Quiz
_____ combine data from different item attributes, or characteristics, to build a code.
Derivation codes
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
Scability
_____ are numbers or letters assigned in a specific order.
Sequence codes
A common field is an attribute that appears in only one entity.
false
A primary key is composed of exactly two fields.
false
A schema is a set of letters or numbers that represents a data item.
false
A subschema is a view of the database used by one or more systems or users.
true
An M:N relationship is different from 1:1 or 1:M relationships because the event or transaction that links the two entities is actually a third entity, called an associative entity, that has its own characteristics.
true
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.
true
College course numbers usually are assigned using a block sequence code.
true
Common fields can be used to link entities in various types of relationships.
true
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.
32
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.
Cardinality
_____ use a keyword to encode a number.
Cipher codes
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
Encryption
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.
Java database connectivity (JDBC)
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.
Normalization
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
Open database connectivity (ODBC)
_____ is strictly hardware related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
Physical storage
_____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.
a data mart
_____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
a data warehouse
In the accompanying figure, any field that serves as a primary key is called a _____.
candidate key
Eamon is planning to start an online store that specializes in books and electronics. Since it's his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which code would you suggest that Eamon use?
cipher code
A _____ is a set of letters or numbers that represents a data item.
code
If a primary key combines two or more fields, then it is called a _____.
composite key
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
crow's foot notation
A _____ controls database operations, including storing, retrieving, updating, and deleting data.
data manipulation language
A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.
data structure
Typically, a database management system is managed by a person called a _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
database administrator
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.
database management system
The inherent efficiency of high-volume processing on larger computers is called _____.
economy of scale
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
entity-relationship diagram (ERD)
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
false
A secondary key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
false
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.
false
A web-based data design requires users to have powerful workstations.
false
Cipher codes distinguish items by using a series of subgroups of digits.
false
Encryption is the process of creating table designs by assigning specific fields or attributes to each table in the database.
false
In a table or file, each column represents a record and each row represents a field.
false
Like a primary key, a foreign key must be unique.
false
Mainframe storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored.
false
Most magazine subscription codes are action codes.
false
The database and the Internet speak the same language.
false
The three normal forms constitute a progression in which second normal form represents the best design.
false
Web-based designs are dependent on a specific combination of hardware and software.
false
A table is in _____ if it does not contain a repeating group.
first normal form
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
During the systems design phase, _____ are used to organize, access, and maintain data structures.
key fields
The data mining technique that relies on association rule learning is often called _____.
market basket analysis
To bridge the gap between a database and the Internet, it is necessary to use _____, which is software that integrates different applications and allows them to exchange data.
middleware
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.
mnemonic
Any field that is not a primary key or a candidate key is called a _____.
nonkey field
In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identify a particular member of an entity.
primary key
With a _____, users provide an example of the data requested.
query by example language
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
query language
In an entity-relationship diagram, entities are commonly represented as _____.
rectangles
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.
referential integrity
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.
schema
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.
second normal form
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
secondary key
Eamon is planning to start an online store that specializes in books and electronics. Since it's his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which code would you suggest that Eamon use?
significant digit code
Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.
standard notation format
A _____ specifies the fields and identifies the primary key in a particular file.
table design
A 3NF design avoids redundancy and data integrity problems that still can exist in 2NF designs.
true
A logical record is a set of field values that describes a single person, place, thing, or event.
true
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
true
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.
true
Systems that interact with a DBMS are relatively independent of how the physical data is maintained.
true
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
true
Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
true
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.
true
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
true
Binary digits have only _____ possible value(s).
two
A table design that contains a repeating group is called _____.
unnormalized