Health Information Systems Midterm

Ace your homework & exams now with Quizwiz!

(Ch. 1) A relational database is: A) a self-describing collection of related tables. B) a collection of forms and reports that support a given purpose. C) a library of queries and data files for querying. D) a set of applications and the data sets for those applications. E) a set of metadata.

A

(Ch. 3) Given the table STUDENT(StudentID, Name, Advisor), which of the following SQL statements would be used to change the value of the Advisor field to 'Smith' for all rows in the STUDENT table? A) UPDATE STUDENT SET Advisor = 'Smith'; B) MODIFY STUDENT SET Advisor = 'Smith'; C) MODIFY Advisor SET STUDENT = 'Smith'; D) UPDATE Advisor = 'Smith'; E) SET STUDENT Advisor = 'Smith';

A

(Ch. 4) The Microsoft Access 2013 report editor is a(n): A) banded report editor. B) wizard-based report editor. C) ASCII report editor. D) WYSIWYG report editor. E) Web-based report editor.

A

(Ch. 5) Each attribute of an entity becomes a(n) ________ of a table. A) column B) primary key C) foreign key D) alternate key E) B or D

A

(Ch. 6) When Microsoft Access 2013 secures a database with just a password, the database file will be a(n): A) *.accdb file. B) *.accdc file. C) *.accde file. D) *.mdb file. E) *.mdw file.

A

(Ch. 8) Non-relational DBMSs associated with the NoSQL movement include: A) Key-Value. B) Document. C) Column Family. D) Graph. E) All of the above

A

(Ch. 8) OLAP stands for: A) Online Analytical Processing. B) Offline Analytical Processing. C) Online Analysis Process. D) Offline Analysis Process. E) Old, Lazy And Particular.

A

(Ch. 8) What is a reporting system?

A reporting system is one of the main categories of a Business Intelligence (BI) system. Reporting systems are used to filter data, sort data, group data and make simple calculations based on the data. These systems summarize the current status of business activities and compare the current status to past or predicted results. They are also used to classify entities such as customers, employees, products, etc. Report delivery is a critical aspect of reporting systems.

(Ch. 6) Explain the concept of an "atomic transaction."

An atomic transaction is a transaction in which either all steps must be completed successfully, or none of the steps can be completed at all. A transaction becomes atomic when the complete set of steps within the transaction is a single logical unit of work.

(Ch. 8) Compare the characteristics of an operational database and a dimensional database.

An operational database is used for structured transaction data processing, while a dimensional database is used for unstructured analytical data processing. An operational database uses current data, while a dimensional database uses both current and historical data. With an operational database, data are inserted, modified and deleted by users, while for a dimensional database, data are loaded and updated systemically by the data warehouse administrators.

(Ch. 6) What is the difference between authentication and authorization?

Authentication refers to making sure a user has the right to use the computer system in the first place. It is the precursor to authorization, which is assigning an authenticated user permission to perform specific tasks on the system. Both are needed for effective computer system security.

(Ch. 1) The statement SELECT STUDENT.StudentNumber, STUDENT.StudentName, FROM STUDENT WHERE STUDENT.StudentName = S12345678; Is an example of: A) QBE B) SQL C) QLE. D) C++. E) Java

B

(Ch. 1) Which of the following is a function of the database application in a database system? A) Create and transmit queries B) Update database data C) Maintain database structures D) Create tables E) Backup and restore data

B

(Ch. 2) Given the below functional dependency, MedicineCode -> (MedicineName, ShelfLife, Manufacturer, Dosage) Which of the following statements is not known to be true? A) MedicineCode is a determinant B) MedicineName is a determinant C) Manufacturer is functionally dependent on MedicineCode D) ShelfLife is functionally dependent on MedicineCode E) MedicineCode is a candidate key of the relation MEDICINE (MedicineName, ShelfLife, Manufacturer, Dosage, MedicineCode)

B

(Ch. 3) Which of the following data types used in SQL would define a numeric field of the pattern 99.99? A) integer(2,2) B) integer(5,2) C) numeric(2,2) D) numeric(4,2) E) numeric(5,2)

B

(Ch. 4) Which of the following is not a stage in the development of a database system? A) Requirements analysis B) Validation C) Component design D) Implementation E) All of the above are stages in the development of a database system.

B

(Ch. 5) One of the important properties of a column is whether or not it is ________. A) found in more than one entity B) required C) character or numeric D) subject to normalization E) subject to denormalization

B

(Ch. 7) The first PHP element to be created is the: A) Command object. B) Connection. C) Errors collection. D) Parameters collection. E) RecordSet object.

B

(Ch. 7) Which of the following SQL commands cannot be used with a trigger? A) INSERT B) SELECT C) UPDATE D) DELETE E) Both B and D

B

(Ch. 8) We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example of: A) dirty data. B) inconsistent data. C) non-integrated data. D) a "wrong format" problem. E) a "too much data" problem.

B

(Ch. 8) The term for the enormous datasets generated by Web 2.0 applications is ________.

Big Data

(Ch. 4) Relationships with the degree 2 are often called ________ relationships.

Binary

(Ch. 4) ________ constrain data values and the processing of the database.

Business rules

(Ch. 1) Microsoft Access 2013 database files are stored using the file extension: A) .adb. B) .asp. C) .accdb. D) .mdb. E) .sql.

C

(Ch. 1) The Microsoft Access 2013 data type of AutoNumber is used when there is a specific need for a: A) foreign key B) primary key C) surrogate key D) spare key E) secondary key

C

(Ch. 2) When the primary key of one relation is placed into a second relation, it is called a A) field key B) referential key C) foreign key D) candidate key E) relocated key

C

(Ch. 3) Given the table CUSTOMER(CustID, Name, PhoneNum, AcctBalance) what is the standard SQL query phrase to retrieve the Name and Phone Number of customers? A) SELECT CUSTOMER-Name AND CUSTOMER-PhoneNum B)SELECT (CUSTOMER-Name AND CUSTOMER-PhoneNum) C) SELECT Name, PhoneNum D) SELECT (Name, PhoneNum) E) SELECT *

C

(Ch. 3) Which of the following is not true about primary keys? A) Primary keys cannot be null. B) Primary keys must be unique. C) Primary keys must be a single attribute. D) Primary keys are used to represent relationships. E) Primary keys can be defined using an SQL CONSTRAINT phrase.

C

(Ch. 4) Microsoft Access can be used to build a prototype database, which allows users: A) to draw a crow's foot E-R diagram themselves. B) to normalize the tables in the E-R diagram. C) to validate the data model by demonstrating the consequences of data modeling decisions. D) to determine the functional dependencies in the data model. E) to determine the appropriate primary and foreign keys in the data model.

C

(Ch. 4) Which of the following would not be contained in a use case? A) Inputs provided to the system to perform a task B) A description of a task the user wants to perform C) A prototype of the system performing a given task D) Outputs generated by the system in performing a given task E) All of the above would be contained in a use case.

C

(Ch. 6) What concurrent processing problem occurs when a transaction reads a changed record that has not been committed to the database? A) Nonrepeatable reads B) Phantom reads C) Dirty reads D) Serialized reads E) Unlocked reads

C

(Ch. 7) Which of the following is true about stored procedures? A) Stored procedures cannot be passed parameters like a regular application function. B) Stored procedures are stored as an embedded function in the application program. C) Stored procedures are stored in the database. D) Stored procedures are invoked automatically by the DBMS when specific events occur. E) All of the above are true about stored procedures.

C

(Ch. 8) Apache Cassandra is an example of a(n) ________ non-relational DBMS.

Column family

(Ch. 7) Briefly describe three types of triggers.

Common types of triggers include BEFORE triggers, AFTER triggers, and INSTEAD OF triggers. BEFORE triggers are modules of procedural logic that the DBMS automatically invokes before inserting, updating, or deleting data. An AFTER trigger is a module of procedural logic that the DBMS automatically invokes after inserting, updating, or deleting data. INSTEAD OF triggers are modules of procedural logic that the DBMS automatically invokes in place of inserting, updating, or deleting data.

(Ch. 1) The Microsoft Access application generator is not responsible for: A) creating forms B) creating reports C) creating queries D) creating tables E) storing queries

D

(Ch. 2) Although Microsoft Access is a personal database, it is still subject to the following modification problems(s): A) problems adding data B) problems changing data C) problems deleting data D) All of the above E) None of the above

D

(Ch. 3) Which SQL keyword is used to eliminate duplicate rows in the results of an SQL SELECT query? A) UNIQUE B) SORT C) ORDER BY D) DISTINCT E) REDUCE

D

(Ch. 5) Which of the following is true about representing a weak entity with the relational model? A) If the weak entity is existence-dependent, the key of the parent must be part of the key of the weak entity. B) If the strong entity has a minimum cardinality of 1, the key of the weak entity must be part of the strong entity. C) If the weak entity is ID-dependent, the key of the weak entity must be part of the key of the parent entity. D) If the weak entity is ID-dependent, the key of the parent entity must be part of the key of the weak entity. E) If the parent entity is existence-dependent, then the minimum cardinality of the weak entity is zero.

D

(Ch. 6) The recovery technique in which the database is returned to a known state and then all valid transactions are reapplied to the database is known as: A) reprocessing. B) rollback. C) transaction logging. D) rollforward. E) checkpointing.

D

(Ch. 6) The term DBA refers to the: A) database accessor. B) database auditor. C) data business auditor. D) database administrator. E) data business administrator.

D

(Ch. 7) Every DBMS product has an API, which stands for: A) All Program Interpreter. B) All Program Interface. C) Application Programming Interpreter. D) Application Programming Interface. E) None of the above

D

(Ch. 7) In PHP, any programming language statements that are to be processed on the server must be enclosed in: A) <!-- and --!>. B) [php and php]. C) (php and php). D) <?php and ?>. E) <server> and </server>.

D

(Ch. 8) Business Intelligence (BI) reporting systems can do which of the following operations? A) Filter data B) Group data C) Modify data D) Both A and B E) All of the above

D

(Ch. 8) Which of the following is true about data mining applications? A) They use sophisticated mathematical techniques. B) They use sophisticated statistical techniques. C) Their report delivery is more difficult than report delivery for reporting systems. D) Both A and B E) All of the above

D

(Ch. 1) What is "metadata" and how does it relate to the definition of a database?

Data about data. It defines those characteristics that help categorize data in a database.

(Ch. 8) Why is operational data sometimes unusable for Business Intelligence use?

Data in operational databases can suffer from a number of problems. These include: (1) Dirty data—data that has problems with it, for example an age of "323"; (2) Missing values—data values that are unknown, for example a person's age; (3) Inconsistent data —Old data values that needed to be updated may not have been, for example, a ZIP code in an area that was split into two new ZIP codes; (4) Data not integrated—when data from two or more data sets is used, the data may be from two or more different DBMSs; (5) Data in the wrong format—data values may have been recorded at an inappropriate value for the needed analysis, for example, distance may have been recorded in miles when we need meters; (6) Too much data—It is possible to simply have very large data sets in terms of records or fields.

(Ch. 8) Hadoop is a(n) ________.

Distributed file system (DFS)

(Ch. 1) A database may be used to help people: A) track which student is assigned to a particular advisor. B) know the current inventory levels of products their company sells. C) check on the estimated arrival time of an incoming flight at an airport. D) look up their checking account balance over the Internet. E) All of the above

E

(Ch. 1) Which of the following would not be an example of database metadata? A) Names of tables in a database B) Properties of tables in a database C) Names of columns in a database and their associated tables D) Properties of columns E) Queries against records in the database tables

E

(Ch. 2) A candidate key is A) required to be unique B) used to represent rows in relationships C) a candidate key to be the primary key D) Both A & B E) All of the above

E

(Ch. 2) A primary key is A) required to be unique B) used to represent rows in relationships C) a candidate key D) used to identify unique rows E) all of the above

E

(Ch. 2) A surrogate key may be appropriate under which of the following circumstances? A) The available candidate keys would produce a lot of data duplication when representing relationships B) The primary key is numeric C) The available candidate keys would be prone to typographical errors. D) The available candidate keys have little meaning to the users. E) Both A & C

E

(Ch. 2) In the normalization process, if you find a candidate key that is not a primary key then you should A) Place the columns of the functional dependency is a new relation B) make the determinant of the functional dependency the primary key of the new relation C) leave a copy of the determinant as a foreign key in the original relation D) All of the above E) None of the above

E

(Ch. 2) Which of the following functional dependency diagrams accurately represents the following situation: - a campus has many buildings - each building has a unique name - each building has many rooms - all rooms in any given building are numbered sequentially starting at 101 - each room has a certain capacity, although many rooms in the same building or different buildings may have the same capacity - each room is assigned to a single department - a department may have many rooms in one or more buildings, each with the same or different capacities A) BuildingName -> (RoomNumber, Capacity, Department) B) RoomNumber -> (BuildingName, Department, Capacity) C) (Department, Capacity) -> (BuildingName, RoomNumber) D) (BuildingName, Capacity) -> (Department, RoomNumber) E) (BuildingName, RoomNumber) -> (Capacity, Department)

E

(Ch. 2) Which of the following is not true about null values? A) A null value can mean that the value is unknown B) A null value is ambiguous C) A null value can mean that the value is known to be blank D) A null value can mean that no value for the field is appropriate E) Null values cannot be avaoided

E

(Ch. 3) To open a Microsoft Access Query Window: A) Click the New button on the Home command tab. B) Click the New Query button on the Home command tab. C) Click the Create Query button on the Create command tab. D) Click the New Query in Design view button on the Create command tab. E) Click the Query Design button on the command tab.

E

(Ch. 3) Which SQL keyword can be used in conjunction with wildcards to select partial values? A) SELECT B) SEARCH C) FIND D) SUBSTRING E) LIKE

E

(Ch. 4) Which of the following is not a source for user requirements during the requirements analysis stage of developing a database system? A) Business rules B) User interviews C) Forms D) Use cases E) All of the above are sources for user requirements.

E

(Ch. 6) Computer systems fail for which of the following reasons? A) Hardware breaks. B) Electrical power fails. C) Programs have bugs. D) People make mistakes. E) All of the above

E

(Ch. 7) Which of the following is a function performed by the driver manager in ODBC? A) Submit SQL statements to the data source. B) Determine the type of DBMS that processes a given ODBC data source. C) Load the appropriate ODBC driver into memory. D) Convert data source error codes into ODBC error codes. E) Both B and C

E

(Ch. 2) In the relational model, each row of a table contains data that represents at attribute of the entity. (T/F)

False

(Ch. 3) In SQL, the WHERE clause is used to specify which columns will be included in the result. (T/F)

False

(Ch. 3) The result for SELECT statements in SQL is a relation unless the result is a single number. (T/F)

False

(Ch. 3) When using SQL to create a table, specifying the NULL property for a column indicates that only null values may be stored in that column. (T/F)

False

(Ch. 5) When applied to 1:N relationships, the term "parent" refers to the many side of the relationship since a child may have many parents. (T/F)

False

(Ch. 6) With optimistic locking, locks are first issued, then the transaction is processed, and then the locks are released. (T/F)

False

(Ch. 7) A BEFORE trigger is called by the DBMS before reading data. (T/F)

False

(Ch. 7) The most commonly used Web server on servers running the UNIX or Linux operating system is Internet Information Services (IIS). (T/F)

False

(Ch. 7) XML provides a standardized, non-customizable way to describe the content of a document. (T/F)

False

(Ch. 8) BI reporting systems summarize the current status of business activities and compare that status with past events but not with predicted future activities. (T/F)

False

(Ch. 8) Operational databases store historical data. (T/F)

False

(Ch. 7) What are the common differences between a Web database processing system running on the Windows operating system and one running on a Linux operating system?

If a Web server is running the Windows operating system, the Web server software will usually be Internet Information Services (IIS) and the Web pages may use ASP pages to integrate application logic with HTML. If a Web server is running the Linux operating system, the Web server software will usually be Apache, the database will typically be MySQL, and the Web pages may use PHP and Pearl to integrate application logic with HTML. This combination is called LAMP. Note that Apache, MySQL and PHP/Pearl can run on a Windows systems, in which case the combination is referred to as WAMP.

(Ch. 6) Standard SQL defines four ________, which specify which of the concurrency control problems are allowed to occur.

Isolation levels

(Ch. 8) Distributed databases can be distributed by partitioning and ________.

Replication

(Ch. 1) In relational databases, query requests use a language called ________.

SQL (Structured Query Language)

(Ch. 6) Distinguish between statement-level consistency and transaction-level consistency.

Statement-level consistency requires that a statement apply to a set of rows that is consistent from the beginning of the statement until the end of the statement. Transaction-level consistency indicates that the set of rows will remain consistent throughout the processing of all statements within the transaction.

(Ch. 4) Distinguish between a data model and a database design.

The data model is a representation of the content, relationships, and constraints of the data needed to support the users' requirements for the system. The data model is a logical representation of business requirements. The database design is created from the data model to include tables, relationships, constraints, data types, column properties, and descriptions of primary and foreign keys. The database design is a component design of how database technology can accomplish the support of the system requirements depicted in the data model.

(Ch. 7) What is a three-tier architecture?

The term tier refers to each different computer that runs a portion of a Web database processing environment. The user's browser running on the user's own computer is one tier, and a Web server running on another computer is another tier. If the DBMS supporting the Web application runs on yet another computer, there is a third tier, and the computer environment is referred to as a three-tier architecture.

(Ch. 2) To be considered a composite key, a key must contain at least two attributes (T/F)

True

(Ch. 3) The SQL GROUP BY keyword can be used to group rows by common values. (T/F)

True

(Ch. 3) When using SQL to create a table, specifying a data type of Char(10) indicates a fixed length field of 10 characters. (T/F)

True

(Ch. 4) An entity class is described by the structure of the entities in that class. (T/F)

True

(Ch. 4) In crow's foot E-R notation, a circle indicates a minimum cardinality of zero. (T/F)

True

(Ch. 4) Subtype entities may be either exclusive or inclusive. (T/F)

True

(Ch. 5) In the relational model, many-to-many relationships cannot be directly represented by relations the way 1:1 and 1:N relationships can. (T/F)

True

(Ch. 5) The ideal primary key is short, numeric, and fixed. (T/F)

True

(Ch. 5) To create a 1:1 relationship in Microsoft Access, the Indexed property of the foreign key column must be set to Yes (No Duplicates). (T/F)

True

(Ch. 6) Concurrent processing of a database only poses problems when two or more processes attempt to use the same data. (T/F)

True

(Ch. 6) In terms of database security, a user can be assigned many roles, and a role can be assigned to many users. (T/F)

True

(Ch. 7) Every DBMS product has an application programming interface (API). (T/F)

True

(Ch. 7) ODBC is an industry standard interface between programming code and DBMS APIs. (T/F)

True

(Ch. 7) When using Microsoft Access and IIS, the basic Web home page can be named index.html. (T/F)

True

(Ch. 8) A data warehouse is a database system that has data and programs for, as well as personnel specialized in, BI processing. (T/F)

True

(Ch. 8) Dimensional databases are used for analytical data processing. (T/F)

True

(Ch. 8) Excel 2013 allows us to connect directly to an Access 2013 database when building a PivotTable. (T/F)

True

(Ch. 4) ________ are descriptions of the ways users will employ the features and functions of the new information system.

Use cases

(Ch. 4) Microsoft Access 2013 ________ allow easy mock-ups of forms and reports for prototyping.

Wizards

(Ch. 7) What are XML Web Services?

XML Web Services is a means for sharing program elements over the Web. It involves several standards, including XML, SOAP, WSDL and UDDI. An example would be a database application that retrieves and produces weather forecasts based on ZIP codes. Using XML Web services, this application could be published so that it can be embedded in various Web pages. Users of those Web pages would then actually be using this application without realizing that it is separate from the Web page.


Related study sets

Prep-U Ch. 60 - Intro to the Musculoskeletal System

View Set

ap spanish ap classroom unit 3 midterm

View Set

Biology: Topic 6: Earth's Early History

View Set

Intro To Health Information Technology Exam

View Set