Chapter07 - Chapter07 True/False Indicate whether the...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter07 True/False Indicate whether the statement is true or false. ____ ____ ____ ____ 1. The impact of database technology on business can be easily overstated. 2. Inaccuracies hurt data integrity. 3. Multiple characters make up a record. 4. A database itself is a collection of several related files, but DBMSs do all the work—structuring files, storing data, and linking records. 5. Data is accessed in a database by sending messages called “protocols,” which request data from specific records and/or fields and direct the computer to display the results. 6. To retrieve records from a relational database, or to sort them, you must use a key. 7. Sometimes a key is composed of several records so that their combination provides a unique key. 8. Usually, a table in a relational database must have a primary key, and most relational DBMSs enforce this rule. 9. Object-oriented databases (ODBs) do not store records, but data objects, which is an advantage for quick updates of data sets and the relationships among them. ____ ____ ____ ____ ____ ____ 10. One of the most useful manipulations of object-oriented databases (ODBs) is the creation of a new table from two or more other tables. ____ 11. A schema describes the structure of the database being designed: the names and types of fields in each record type and the general relationships among different sets of records or files. ____ 12. The conceptual blueprint of the database is called an entity relationship diagram (ERD). ____ 13. From a technical point of view, online databases that are used with Web browsers are different from other databases. ____ 14. A data warehouse is a large, typically relational, database that supports management decision making. ____ 15. The larger the data warehouse, the larger the storage capacity, the greater the memory, and the greater the processing power of the computers that are needed. ____ 16. There are two phases involved in building a data warehouse from transactional data: extraction and transforming. ____ 17. Once the data warehouse is in operation, much of the ETL activity can be automated. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 18. There are two overall approaches to maintaining data: the traditional file approach—which has no mechanism for tagging, retrieving, and manipulating data—and the ____, which does have this mechanism. a. database approach c. datafile approach b. data approach d. indexed file approach ____ 19. The very fact that manipulation of the data requires a programmer is probably the greatest disadvantage of the ____. a. information file approach c. database approach b. file approach d. indexed file approach ____ 20. Often, the traditional file approach to storing data leads to low ____. a. data readability c. data integrity b. data flexibility d. data capacity ____ 21. In the database approach, data pieces are organized about ____. a. indexes c. programs b. characters d. entities ____ 22. A collection of related records, such as all the records of a college’s students, is called a(n) ____. a. field c. item b. character d. file ____ 23. Databases are stored on and processed from ____ storage devices, such as magnetic disks or DVDs. a. internal access c. direct access b. sequential access d. main access ____ 24. A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records. a. database relationship c. database list b. database model d. database catalog ____ 25. To design a(n) ____, you need a clear idea of the different entities and how they relate. a. relational database c. model database b. file database d. object database ____ 26. A(n) ____ is unique if the value (content) in that field appears only in one record. a. entity c. object b. key d. item ____ 27. A ____ is the field by which records in a table are uniquely identified. a. secondary key c. primary key b. composite key d. main key ____ 28. To link records from one table with records of another table, the tables must have at least one field in common, and that field must be a ____ field for one of the tables. a. composite key c. foreign key b. main key d. primary key ____ 29. A ____ can be maintained, for instance, for professors and students in a college database. a. one-to-many relationship c. composite relationship b. foreign relationship d. many-to-many relationship ____ 30. The combined storage of both data and the procedures that manipulate them is referred to as ____. a. compression c. encapsulation b. packaging d. zipping ____ 31. A(n) ____ is created “on the fly” as a result of a query and exists only for the duration the user wishes to view it or to create a paper report from it. a. join table c. object table b. two-way table d. entity table ____ 32. When building a new database, users must first build a schema (from the Greek word for “____”). a. plan c. task b. job d. work ____ 33. Many ____ also allow a builder to positively indicate when a field is not unique, meaning that the value in that field might be the same for more than one record. a. languages c. models b. DBMSs d. structures ____ 34. ____ should first be done to decide which data should be collected and how it should be organized. a. Report modeling c. Object structuring b. Data structuring d. Data modeling ____ 35. Effective ____ and design of each database involves the creation of a conceptual blueprint of the database. a. file modeling c. data modeling b. file structuring d. data relating ____ 36. All relationships and the various needs for ____ must be taken into account when designing the database. a. enquiries c. communications b. programs d. reports ____ 37. Many organizations have found that if they accumulate ____, they can use it for important management decisions, such as researching market trends or tracking down fraud. a. transaction indexes c. field tables b. field indexes d. transaction data ____ 38. ____ do not replace transactional databases, which are updated with daily transactions such as sales, billing, cash receipts, and returns. a. Data houses c. Data boxes b. Data warehouses d. Relational databases ____ 39. While a transactional database contains current data, which is disposed of after some time, the data in ____ is accumulated and might reflect many years of business activities. a. data warehouses c. information bases b. data carts d. information repositories ____ 40. If ____ need to be used as one large data warehouse, special software tools can unify them and make them appear as one large data warehouse. a. data marts c. information marts b. data carts d. information repositories ____ 41. When management decides to build a ____, the IT staff must carefully consider the hardware, software, and data involved in the effort. a. network c. database network b. data warehouse d. data house ____ 42. Because of capacity needs, organizations often choose ____ to store and manage data warehouses. a. midrange servers b. high speed networks c. mainframe computers with multiple CPUs d. workstations ____ 43. To uncover the valuable information contained in their data, organizations must use software that can effectively “____” data warehouses. a. house c. merge b. cement d. mine ____ 44. The designers of data warehouses must keep in mind ____: the ability of the data warehouse to grow as the amount of the data and the processing needs grow. a. flexibility c. capacity b. reliability d. scalability ____ 45. In the ____ phase of transferring data from a transactional database to a data warehouse, the builders create the files from transactional databases and save them on the server that will hold the data warehouse. a. loading c. extraction b. transformation d. injection ____ 46. In the ____ phase of transferring data from a transactional database to a data warehouse, specialists “cleanse” the data and modify it into a form that allows insertion into the data warehouse. a. extraction c. injection b. transformation d. loading Completion Complete each statement. 47. If your last and first name, as well as address and other details appear in the files of the department where you work as well as in the payroll file of the Human Resource department, there is duplication of data, or ____________________. 48. A(n) ____________________ is any object about which an organization chooses to collect data. 49. A(n) ____________________ is one piece of information about an entity, such as the last name or first name of a student, or the student’s street address. 50. While a database itself is a collection of several related files, the program used to build databases, populate them with data, and manipulate the data is called a(n) ____________________. 51. The ability to limit users’ views to only specific columns or records gives the ____________________ another advantage: the ability to implement security measures. 52. The relational model consists of ____________________. 53. The inclusion of foreign keys to create join tables might cause considerable ____________________. 54. A unique key can serve as a(n) ____________________. 55. For some business needs you must use a(n) ____________________, a combination of two or more fields that together serve as a primary key, because it is impractical to use a single field as a primary key. 56. The ability in object-oriented structures to create a new object automatically by replicating all or some of the characteristics of a previously developed object is called ____________________. 57. The ____________________ uses the object-oriented approach to maintaining records. 58. A(n) ____________________ creates a temporary table that is a subset of the original table or tables. 59. ____________________ has become the query language of choice for many developers of relational DBMSs. 60. The description of each table structure and types of fields become part of a(n) ____________________, which is a repository of information about the data and their organization. 61. Analyzing an organization’s data and identifying the relationships among the data is called ____________________. 62. The only way for organizations to conduct some Web-based businesses is to give people outside the organizations access to their ____________________. 63. Organizations often organize their data warehouse as a collection of ____________________, smaller collections of data that focus on a particular subject or department. 64. Unlike ____________________, transactional databases are usually not suitable for business analysis because they contain only current, not historical, data. 65. In the ____________________ phase of transferring data from a transactional database to a data warehouse, the specialists transfer transformed files to the data warehouse. ...
View Full Document

This note was uploaded on 05/19/2010 for the course BCIS 3610 taught by Professor Koh during the Spring '08 term at North Texas.

Ask a homework question - tutors are online