Chapter 9 Review


Chapter 9 Review

1.  A ____ is a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values.
A: loop
B: repeating group
C: variety group
D: combination field

2.  ____, which record details of all accesses and changes to the file or database, can be used to recover changes made since the last backup.
A: Primary table files
B: Audit log files
C: Backup encryption files
D: Data warehouse records

3.  A ____ file is created for archiving purposes.
A: work
B: table
C: security
D: history

4.  During the system design phase, you use ____ to organize, access, and maintain data structures.
A: key files
B: key records
C: key fields
D: key tables

5.  ____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.
A: Cardinality
B: ERD
C: The primary key
D: Normalization

6.  ____ codes distinguish items by using a series of subgroups of digits.
A: Significant digit
B: Action
C: Derivation
D: Cipher

7. A(n) ____ date is the total number of days from some specific base date.
A: arithmetic
B: control
C: absolute
D: variable

8. Data ____ problems can occur if updates are not applied in every file.
A: structure
B: security
C: integrity
D: redundancy

9.  Because intranets and extranets use the same protocols as the Internet, they are called ____.
A: protocol-centric
B: client/server focused
C: middleware focused
D: Web-centric
               
10. A(n) ____ relationship exists when exactly one of the second entity occurs for each instance of the first entity.
A: one-to-one
B: one-to-many
C: many-to-many
D: none of the above

11. Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.
A: mnemonic
B: harmonic
C: rhyming
D: alphabetic

12. EBCDIC and ASCII require eight bits, or ____ byte(s), for each character.
A: one
B: two
C: three
D: four

13. A ____ language controls database operations, including storing, retrieving, updating, and deleting data.
A: data manipulation
B: data query
C: data information
D: data communication

14. A ____ key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
A: primary
B: secondary
C: foreign
D: referential
         
15. A table is ____ if it does not contain a repeating group.
A: first normal form
B: second normal form
C: concatenated
D: considered invalid

16. Data ____ software looks for meaningful patterns and relationships among data.
A: process
B: validation
C: mart
D: mining

17. ____ fields are special fields within data records to provide additional control or security information.
A: Primary
B: Audit
C: Check
D: Limit
               
18. The inherent efficiency of high-volume processing on larger computers is called ____.
A: flexible data sharing
B: data independence
C: controlled redundancy
D: economy of scale

19. A record, also called a ____, is a set of related fields that describes one instance of an entity.
A: tuple
B: couple
C: table
D: label

20. A DBMS is usually managed by a person called a ____.
A: database administrator
B: file administrator
C: system administrator
D: security administrator

21. Any field that could serve as a primary key is called a ____ key.
A: candidate
B: summary
C: potential
D: primary

22. A ____ specifies the fields and identifies the primary key in a particular table or file.
A: output design
B: market basket design
C: table design
D: diagram design

23. A ____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
A: data warehouse
B: data storehouse
C: database
D: database set

24. In the event of a file catastrophe, ____ procedures can be used to restore the file or database to its current state at the time of the last backup.
A: recovery
B: reinstatement
C: back-up
D: security

25. A ____ file stores records that contain day-to-day business and operational data.
A: master
B: table
C: transaction
D: work

26. A(n) ____ is a person, place, thing, or event for which data is collected and maintained.
A: table
B: entity
C: field
D: record

27. A ____ relationship exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.
A: one-to-one
B: one-to-many
C: many-to-many
D: none of the above

28. ____ codes combine data from different item attributes, or characteristics, to build the code.
A: Significant digit
B: Action
C: Derivation
D: Cipher

29. A ____ format uses only 16 bits to represent the number 12,345 in binary form.
A: integer
B: binary storage
C: long integer
D: character-based

30. A ____ consists of linked tables that form one overall data structure.
A: database structure
B: database system
C: open structure
D: open system

31. A ____ is a text document written in HTML.
A: Web browser
B: Web page
C: Web site
D: Web server

32. Without referential integrity, you might have a sales order called a(n) ____, because it has no related customer.
A: orphan
B: loop
C: gap
D: error
33. A ____ is a set of numbers or letters that represent a data item.
A: key
B: state
C: code
D: unit

34. ____ storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored.
A: Logical
B: Physical
C: either a. or b.
D: neither a. nor b.

35. A ____ is a view of the database used by one or more systems or users.
A: schema
B: subschema
C: class
D: subclass

36. A nonkey field is any field that is NOT a ____.
A: primary key
B: candidate key
C: both a. and b.
D: neither a. nor b.

37. Field X is ____ on field Y if the value of field X depends on the value of field Y.
A: functionally independent
B: functionally dependent
C: either a. or b.
D: neither a. nor b.

38. Different privileges, also called ____, can be associated with different users of a computer system.
A: passwords
B: user IDs
C: filters
D: permissions

39. A(n) ____ is a graphical model of an information system that depicts the relationships among system entities.
A: SQL
 B: OCE
 C: ODBC
 D: ERD

40. With a(n) ____ language, the user provides an example of the data requested.
A: SQL
 B: IDE
 C: QBE
 D: interpolated

41. One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
A: scalability
 B: compatibility
 C: cardinality
 D: functionality

42. When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.
A: client
 B: table
 C: password
 D: buffer

0 comments:

Post a Comment