The three essential elements of the definition of a database are ________.

ISM- 3011 Info Systems in Organizations – Chapter 5

To represent relationships, ________ are added to tables.

A.

entity keys

B.

normalized keys

C.

foreign keys

D.

locking keys

E.

value keys

If a student is allowed to have multiple majors, and advisors for each major are assigned to multiple students, this would be an example of a(n) ________ relationship.

A.

1:N

B.

N:M

C.

1:1

D.

one-of-a-kind

E.

0:M

Prior to implementing a database in a DBMS, the developers perform _________ in order to improve the structure of the database tables. structuring

normalization

transformation

data analysis

modeling If Falcon Security chooses to use a SQL DBMS such as Access, it will be able to __________.

A.

store the video footage in the same database as the metadata

B.

face some risk and uncertainty while developing the database with

C.

use a new, unfamiliar product to create the database

D.

gain knowledge and experience with a new form of database

E.

store only the metadata about each video in the database

The elements that make up a database application are: forms, application programs, reports, and __________.

A.

backups

B.

queries

C.

data views

D.

relationships

E.

performance monitors

The following are all processing operations of a DBMS except _________.

A.

insert data

B.

autocorrect data

C.

delete data

D.

read data

E.

modify data

In the context of a database, _________ is data that describes the content of the database.

A.

meta-elements

B.

key data

C.

metadata

D.

megadata

E.

predictive data

Which of the following is NOT a purpose of a database management system (DBMS)?

A.

Establish relationships between tables.

B.

Port the data to the Internet.

C.

Enable the data to be backed up.

D.

Enable data to be added and modified.

E.

Create tables.

In data modeling, a(n) ________ is something that the users want to store data about.

A.

primary key

B.

attribute

C.

relationship

D.

entity

E.

foreign key

The three essential elements of the definition of a database are ________.

A.

fields; relationship among fields in tables; metadata

B.

tables; metadata; validation rules

C.

tables; relationship among rows in tables; metadata

D.

validation rules; data; tables

E.

tables; relationship among rows in tables; validation rules

The purpose of a database is to __________.

A.

keep track of things that share a single theme

B.

keep track of things that involve multiple themes

C.

eliminate the need to learn about spreadsheets

D.

make the use of the cloud more straightforwardly

eliminate the need to learn programming Every normalized table has ________.

A.

repeating fields

B.

multiple topics

C.

duplicated data

D.

a single theme

E.

data integrity problems

With today’s focus on Internet applications, it is far less necessary that database systems impose ________ restrictions on transaction processing.

A.

ELITE

B.

ACID

C.

ELAC

D.

EPIC

E.

AVID

Which of the following statements is correct?

A.

The user doesn’t need to dedicate special time to reviewing the data model.

B.

If corrections are needed in the database structure, the requirements step is the best time to do this.

C.

A database is a model of how only managers view their business world.

D.

If the data model is incorrect, the database can still be used successfully.

E.

Do not proceed with database design unless the data model is accurate.

            The designers of a database typically begin by developing a ________ in order to construct a logical representation of the database before it is implemented.

A.

3D representation

B.

data model

C.

network diagram

D.

line drawing

E.

process model

_______ is an international standard language for processing a database.

A.

PHP

B.

HTML

C.

SQL

D.

DB2

E.

RDBMS

Data integrity problems are likely to occur when __________.

A.

the data design has a N:M relationship

B.

normal forms are used

C.

data is duplicated

D.

attribute conflicts are not resolved

E.

minimum cardinalities are not met

In databases, bytes are grouped into ________ which describe characteristics of the object being stored.

A.

relationships

B.

columns

C.

rows

D.

records

E.

tables

Which of the following is true of the database development process?

A.

User review of the data model is avoided because it is not helpful in data modeling.

B.

Problems in the data model will not affect the application.

C.

A database is a model of how the developers view their business world.

D.

Changing a relationship from 1:N to N:M is simply a matter of changing the notations.

E.

The database structure cannot be changed during the data modeling stage.

A key aspect of database administration is to set __________, or rules that govern precisely what each user can see and do with the data in the database.

A.

user precedence

B.

power users

C.

permissions

D.

usage regulations

E.

supervisor rules

Every database table must have a ________, a field (or fields) that contains a unique value for every table record.

A.

predictive key

B.

foreign key

C.

relationship line

D.

primary key

E.

primary element

When you state a business rule that pertains to your organization, such as “At my university, a student may declare only one single major,” you are actually defining the __________ of the relationship between students and majors.

A.

maximum cardinality

B.

normality

C.

minimum cardinality

D.

foreign keys

E.

relational limits

Characteristics of traditional database application programs include all of the following except _________.

A.

written in programming languages like COBOL, C++, and VisualBasic

B.

they are thick client applications

C.

involve a server to house and serve data

D.

accessed via browsers

E.

require that the application programs be installed on the user computers

The explosive growth in data expected through 2026 means that ________ is even more important.

A.

B.

data prediction

C.

business intelligence

D.

spyware

E.

data outsourcing

If two users of a database access the same record and both attempt to complete a transaction with that record, the ________ problem is likely to occur.

A.

lost update

B.

power surging

C.

transaction processing

D.

processing

E.

Web browsing

Answer

1. C. foreign keys to represent relationships, primary keys of the first table are placed as foreign key in the second table and primary keys of the second table as foreign key in the first. 2. B. N:M A student having multiple majors has association with multiple advisors and each advisor can have multiple students. So it’s a many to many relationship. 3. B. Normalization Normalization is the process in which a poorly structured table is converted into multiple well-structured tables. 4. E. store only the metadata about each video in the database

5. B. queries

Leave a Comment