Chapter
9 Review
1.
A ____ is a set of one or more fields that can occur any number of times in a
single record, with each occurrence having different values.
A:
loop
B: repeating group
C:
variety group
D:
combination field
2.
____, which record details of all accesses and changes to the file or database,
can be used to recover changes made since the last backup.
A:
Primary table files
B: Audit log files
C:
Backup encryption files
D:
Data warehouse records
3.
A ____ file is created for archiving purposes.
A:
work
B:
table
C:
security
D: history
4.
During the system design phase, you use ____ to organize, access, and maintain
data structures.
A:
key files
B:
key records
C: key fields
D:
key tables
5.
____ describes the numeric relationship between two entities and shows how
instances of one entity relate to instances of another entity.
A: Cardinality
B:
ERD
C:
The primary key
D:
Normalization
6.
____ codes distinguish items by using a series of subgroups of digits.
A: Significant digit
B:
Action
C:
Derivation
D:
Cipher
7.
A(n) ____ date is the total number of days from some specific base date.
A:
arithmetic
B:
control
C: absolute
D:
variable
8.
Data ____ problems can occur if updates are not applied in every file.
A:
structure
B:
security
C: integrity
D:
redundancy
9.
Because intranets and extranets use the same protocols as the Internet, they
are called ____.
A:
protocol-centric
B:
client/server focused
C:
middleware focused
D: Web-centric
10.
A(n) ____ relationship exists when exactly one of the second entity occurs for
each instance of the first entity.
A: one-to-one
B:
one-to-many
C:
many-to-many
D:
none of the above
11.
Some abbreviation codes are called ____ codes because they use a specific
combination of letters that are easy to remember.
A: mnemonic
B:
harmonic
C:
rhyming
D:
alphabetic
12.
EBCDIC and ASCII require eight bits, or ____ byte(s), for each character.
A: one
B:
two
C:
three
D:
four
13.
A ____ language controls database operations, including storing, retrieving,
updating, and deleting data.
A: data manipulation
B:
data query
C:
data information
D:
data communication
14.
A ____ key is a field in one table that must match a primary key value in
another table in order to establish the relationship between the two tables.
A:
primary
B:
secondary
C: foreign
D:
referential
15.
A table is ____ if it does not contain a repeating group.
A: first normal form
B:
second normal form
C:
concatenated
D:
considered invalid
16.
Data ____ software looks for meaningful patterns and relationships among data.
A:
process
B:
validation
C:
mart
D: mining
17.
____ fields are special fields within data records to provide additional
control or security information.
A:
Primary
B: Audit
C:
Check
D:
Limit
18.
The inherent efficiency of high-volume processing on larger computers is called
____.
A:
flexible data sharing
B:
data independence
C:
controlled redundancy
D: economy of scale
19.
A record, also called a ____, is a set of related fields that describes one
instance of an entity.
A: tuple
B:
couple
C:
table
D:
label
20.
A DBMS is usually managed by a person called a ____.
A: database administrator
B: file administrator
C: system administrator
D: security administrator
A: database administrator
B: file administrator
C: system administrator
D: security administrator
21.
Any field that could serve as a primary key is called a ____ key.
A: candidate
B: summary
C: potential
A: candidate
B: summary
C: potential
D:
primary
22. A ____ specifies the fields and identifies the primary key in a particular table or file.
A: output design
B: market basket design
C: table design
D: diagram design
23.
A ____ is an integrated collection of data that can include seemingly unrelated
information, no matter where it is stored in the company.
A: data warehouse
B: data storehouse
C: database
D: database set
A: data warehouse
B: data storehouse
C: database
D: database set
24.
In the event of a file catastrophe, ____ procedures can be used to restore the
file or database to its current state at the time of the last backup.
A: recovery
B: reinstatement
C: back-up
D: security
A: recovery
B: reinstatement
C: back-up
D: security
25.
A ____ file stores records that contain day-to-day business and operational
data.
A: master
B: table
C: transaction
D: work
A: master
B: table
C: transaction
D: work
26.
A(n) ____ is a person, place, thing, or event for which data is collected and
maintained.
A: table
B: entity
C: field
D: record
A: table
B: entity
C: field
D: record
27.
A ____ relationship exists when one instance of the first entity can relate to
many instances of the second entity, and one instance of the second entity can
relate to many instances of the first entity.
A: one-to-one
B: one-to-many
C: many-to-many
D: none of the above
A: one-to-one
B: one-to-many
C: many-to-many
D: none of the above
28.
____ codes combine data from different item attributes, or characteristics, to
build the code.
A: Significant digit
B: Action
C: Derivation
D: Cipher
A: Significant digit
B: Action
C: Derivation
D: Cipher
29.
A ____ format uses only 16 bits to represent the number 12,345 in binary form.
A: integer
B: binary storage
C: long integer
D: character-based
A: integer
B: binary storage
C: long integer
D: character-based
30.
A ____ consists of linked tables that form one overall data structure.
A: database structure
B: database system
C: open structure
D: open system
A: database structure
B: database system
C: open structure
D: open system
31.
A ____ is a text document written in HTML.
A: Web browser
B: Web page
C: Web site
D: Web server
A: Web browser
B: Web page
C: Web site
D: Web server
32.
Without referential integrity, you might have a sales order called a(n) ____,
because it has no related customer.
A: orphan
B: loop
C: gap
D: error
A: orphan
B: loop
C: gap
D: error
33.
A ____ is a set of numbers or letters that represent a data item.
A: key
B: state
C: code
D: unit
A: key
B: state
C: code
D: unit
34.
____ storage refers to data that a user can view, understand, and access,
regardless of how or where that information actually is organized or stored.
A: Logical
B: Physical
C: either a. or b.
D: neither a. nor b.
A: Logical
B: Physical
C: either a. or b.
D: neither a. nor b.
35.
A ____ is a view of the database used by one or more systems or users.
A: schema
B: subschema
C: class
D: subclass
A: schema
B: subschema
C: class
D: subclass
36.
A nonkey field is any field that is NOT a ____.
A: primary key
B: candidate key
C: both a. and b.
D: neither a. nor b.
A: primary key
B: candidate key
C: both a. and b.
D: neither a. nor b.
37.
Field X is ____ on field Y if the value of field X depends on the value of
field Y.
A:
functionally independent
B: functionally
dependent
C:
either a. or b.
D:
neither a. nor b.
38.
Different privileges, also called ____, can be associated with different users
of a computer system.
A:
passwords
B:
user IDs
C:
filters
D: permissions
39.
A(n) ____ is a graphical model of an information system that depicts the
relationships among system entities.
A:
SQL
B:
OCE
C:
ODBC
D: ERD
40.
With a(n) ____ language, the user provides an example of the data requested.
A:
SQL
B:
IDE
C: QBE
D:
interpolated
41.
One common method of indicating ____ is called crow's foot notation because of
the shapes, which include circles, bars, and symbols that indicate various
possibilities.
A:
scalability
B:
compatibility
C:
cardinality
D:
functionality
42.
When a system reads a physical record, it loads the data from storage into a
____, which is a segment of computer memory.
A:
client
B:
table
C:
password
D:
buffer
0 comments:
Post a Comment