Deck 1: The Database Environment and Development Process

ملء الشاشة (f)
exit full mode
سؤال
All of the following are primary purposes of a database management system (DBMS) EXCEPT:

A) creating data.
B) updating data.
C) storing data.
D) providing an integrated development environment.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Because applications are often developed independently in file processing systems:

A) the data is always non-redundant.
B) unplanned duplicate data files are the rule rather than the exception.
C) data can always be shared with others.
D) there is a large volume of file I/O.
سؤال
With the database approach, data descriptions are stored in a central location known as a:

A) server.
B) mainframe.
C) PC.
D) repository.
سؤال
Data that describe the properties of other data are:

A) relationships.
B) logical.
C) physical.
D) metadata.
سؤال
Relational databases establish the relationships between entities by means of common fields included in a file called a(n):

A) entity.
B) relationship.
C) relation.
D) association.
سؤال
________ are established between entities in a well-structured database so that the desired information can be retrieved.

A) Entities
B) Relationships
C) Lines
D) Ties
سؤال
Which organizational function should set database standards?

A) Management
B) Application development
C) Technical services
D) Database Administration
سؤال
According to a McKinsey Global Institute Report, in 2010 alone, global enterprises stored more than:

A) 1 terabyte of data.
B) 3 gigabytes of data.
C) at least 100 petabytes of data.
D) more than 7 billion exabytes of data.
سؤال
A user view is:

A) what a user sees when he or she looks out the window.
B) a table or set of tables.
C) a logical description of some portion of the database.
D) a procedure stored on the server.
سؤال
Which of the following is NOT an advantage of database systems?

A) Redundant data
B) Program-data independence
C) Better data quality
D) Reduced program maintenance
سؤال
Program-data dependence is caused by:

A) file descriptions being stored in each database application.
B) data descriptions being stored on a server.
C) data descriptions being written into programming code.
D) data cohabiting with programs.
سؤال
A database is an organized collection of ________ related data.

A) logically
B) physically
C) loosely
D) badly
سؤال
A major difference between data warehouses and transactional systems as compared to big data is:

A) the data is unstructured in big data systems.
B) the size of the CPU used.
C) the programming required to access data.
D) all of the above.
سؤال
Legacy systems often contain data of ________ quality and are generally hosted on ________.

A) poor; personal computers
B) excellent; mainframes
C) poor; mainframes
D) excellent; workgroup computers
سؤال
A graphical system used to capture the nature and relationships among data is called a(n):

A) XML data model.
B) hypertext graphic.
C) relational database.
D) data model.
سؤال
A person, place, object, event, or concept about which the organization wishes to maintain data is called a(n):

A) relationship.
B) object.
C) attribute.
D) entity.
سؤال
Database management involves all of the following EXCEPT:

A) collecting data.
B) organizing data.
C) design web pages.
D) managing data.
سؤال
A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

A) enterprise view
B) reporting document
C) user view
D) user snapshot
سؤال
Metatdata typically describes all of the following EXCEPT:

A) data definitions.
B) length.
C) allowable values.
D) location on disk.
سؤال
________ is a tool even non-programmers can use to access information from a database.

A) ODBC
B) Structured query language
C) ASP
D) Data manipulation query language
سؤال
A rule that CANNOT be violated by database users is called a:

A) password.
B) constraint.
C) program.
D) view.
سؤال
The period that can be considered a "proof of concept" time was the:

A) 1950s.
B) 1960s.
C) 1970s.
D) 1990s.
سؤال
Which of the following is NOT a cost and/or risk of the database approach?

A) Specialized personnel
B) Cost of conversion
C) Improved responsiveness
D) Organizational conflict
سؤال
A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is called a(n):

A) index.
B) data warehouse.
C) repository.
D) database management system.
سؤال
The need for consensus on data definitions is an example of which type of risk in the database environment?

A) Specialized personnel needs
B) Organizational conflict
C) Conversion costs
D) Legacy systems
سؤال
A knowledge base of information or facts about an enterprise is called a(n):

A) enterprise information system.
B) repository.
C) systems information unit.
D) database process.
سؤال
The traditional methodology used to develop, maintain, and replace information systems is called the:

A) Enterprise Resource Model.
B) Systems Development Life Cycle.
C) Unified Model.
D) Systems Deployment Life Cycle.
سؤال
A departmental multi-tiered client/server database is stored on a central device called a:

A) client.
B) server.
C) remote PC.
D) network.
سؤال
Specifying how data from a logical schema are stored in secondary memory is part of the:

A) design.
B) maintenance.
C) analysis.
D) implementation.
سؤال
Which of the following is NOT an objective that drove the development and evolution of database technology?

A) The need to provide greater independence between programs and data.
B) The desire to manage increasing complex data types and structures.
C) The desire to require programmers to write all file handling functionality.
D) The need to provide ever more powerful platforms for decision support applications.
سؤال
Languages, menus, and other facilities by which users interact with the database are collectively called a(n):

A) client.
B) user interface.
C) icon.
D) development environment.
سؤال
The SDLC phase in which database processing programs are created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
سؤال
Which of the following is software used to create, maintain, and provide controlled access to databases?

A) Network operating system
B) User view
C) Database management system (DBMS)
D) Attribute
سؤال
The SDLC phase in which the detailed conceptual data model is created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
سؤال
Organizations that utilize the file processing approach spend as much as ________ of their IS development budget on maintenance.

A) 40 percent
B) 25 percent
C) 60 percent
D) 80 percent
سؤال
The SDLC phase in which every data attribute is defined, every category of data is listed, and every business relationship between data entities is defined is called the ________ phase.

A) planning
B) design
C) analysis
D) implementation
سؤال
E. F. Codd developed the relational model in the:

A) 1960s.
B) 1970s.
C) 1980s.
D) 1990s.
سؤال
Database development begins with ________, which establishes the range and general contents of organizational databases.

A) database design
B) cross-functional analysis
C) departmental data modeling
D) enterprise data modeling
سؤال
The most common source of database failures in organizations is:

A) lack of planning.
B) inadequate budget.
C) inadequate hardware.
D) failure to implement a strong database administration function.
سؤال
In a file processing environment, descriptions for data and the logic for accessing the data are built into:

A) application programs.
B) database descriptors.
C) fields.
D) records.
سؤال
A data warehouse derives its data from:

A) on-line transactions.
B) various operational data sources.
C) reports.
D) a data mart.
سؤال
Development starts from scratch with the traditional file processing approach because new file formats, descriptions, and file access logic must be designed for each new program.
سؤال
Determining the structure of data and the relationships between data elements either right before or at the time of use of the data is called:

A) tables on write.
B) schema on write.
C) on demand paging.
D) caching.
سؤال
________ do NOT concentrate on determining the requirements for the database component of an information system.

A) Database analysts
B) Systems analysts
C) Programmers
D) End Users
سؤال
The three-schema approach includes which of the following schemas?

A) Internal
B) Logical
C) Cross-functional
D) Dissecting
سؤال
Many of the disadvantages of file processing systems can also be limitations of databases.
سؤال
Metadata are data that describe the properties of other data.
سؤال
Organizations that utilize the file processing approach spend only 20 percent of development time on maintenance.
سؤال
A person is an example of an entity.
سؤال
An iterative methodology that rapidly repeats the analysis, design, and implementation phases of the SDLC is called:

A) CASE.
B) CAD.
C) RAD.
D) MST.
سؤال
The data that you are interested in capturing about an entity is called an instance.
سؤال
Databases were developed as the first application of computers to data processing.
سؤال
With the traditional file processing approach, each application shares data files, thus enabling much data sharing.
سؤال
One of the most popular RAD methods is:

A) automated design.
B) structured walkthrough.
C) prototyping.
D) crafting.
سؤال
A data model is a graphical system used to capture the nature and relationships among data.
سؤال
File processing systems have been replaced by database systems in most critical business applications today.
سؤال
Unplanned duplicate data files are the rule rather than the exception in file processing systems.
سؤال
A well-structured database establishes the entities between relationships in order to derive the desired information.
سؤال
________ specify computer systems requirements.

A) Programmers
B) Users
C) Systems analysts
D) Database analysts
سؤال
Information is processed data.
سؤال
Personal databases are designed to support a small group of individuals working together on a project.
سؤال
An enterprise data model describes the scope of data for only one information system.
سؤال
Data redundancy is used to establish relationships between data but is never used to improve database performance.
سؤال
A relational database establishes the relationships between entities by means of a common field.
سؤال
The user interface includes languages, menus, and other facilities by which users interact with various system components.
سؤال
Repositories are always used in file processing systems.
سؤال
Redundancy increases the risk of inconsistent data.
سؤال
The failure to implement a strong database administrative function is the most common source of database failures in organizations.
سؤال
A constraint is a rule in a database system that can be violated by users.
سؤال
A user view is how the user sees the data when it is produced.
سؤال
Database development begins with the design of the database.
سؤال
Data management technologies are also increasing often used as information systems, as a foundation for analytics or the systematic analysis of data to understand a real-world problem better.
سؤال
A modern database management system automates more of the backup and recovery tasks than a file system.
سؤال
The term legacy system refers to a newly installed database management system.
سؤال
One reason for improved application development productivity with the database approach is that file design and low-level implementation details do not need to be handled by the application programmer.
سؤال
Organizational commitment to a database project is not necessary for its success.
سؤال
Cost and complexity are just two of the disadvantages of database processing.
سؤال
Separation of metadata from application programs that use the data is called data independence.
سؤال
Reduced program maintenance is an advantage of file processing systems.
سؤال
The data repository assists database administrators in enforcing standards.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/119
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: The Database Environment and Development Process
1
All of the following are primary purposes of a database management system (DBMS) EXCEPT:

A) creating data.
B) updating data.
C) storing data.
D) providing an integrated development environment.
D
2
Because applications are often developed independently in file processing systems:

A) the data is always non-redundant.
B) unplanned duplicate data files are the rule rather than the exception.
C) data can always be shared with others.
D) there is a large volume of file I/O.
B
3
With the database approach, data descriptions are stored in a central location known as a:

A) server.
B) mainframe.
C) PC.
D) repository.
D
4
Data that describe the properties of other data are:

A) relationships.
B) logical.
C) physical.
D) metadata.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
5
Relational databases establish the relationships between entities by means of common fields included in a file called a(n):

A) entity.
B) relationship.
C) relation.
D) association.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ are established between entities in a well-structured database so that the desired information can be retrieved.

A) Entities
B) Relationships
C) Lines
D) Ties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which organizational function should set database standards?

A) Management
B) Application development
C) Technical services
D) Database Administration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
8
According to a McKinsey Global Institute Report, in 2010 alone, global enterprises stored more than:

A) 1 terabyte of data.
B) 3 gigabytes of data.
C) at least 100 petabytes of data.
D) more than 7 billion exabytes of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
9
A user view is:

A) what a user sees when he or she looks out the window.
B) a table or set of tables.
C) a logical description of some portion of the database.
D) a procedure stored on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is NOT an advantage of database systems?

A) Redundant data
B) Program-data independence
C) Better data quality
D) Reduced program maintenance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
11
Program-data dependence is caused by:

A) file descriptions being stored in each database application.
B) data descriptions being stored on a server.
C) data descriptions being written into programming code.
D) data cohabiting with programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
12
A database is an organized collection of ________ related data.

A) logically
B) physically
C) loosely
D) badly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
13
A major difference between data warehouses and transactional systems as compared to big data is:

A) the data is unstructured in big data systems.
B) the size of the CPU used.
C) the programming required to access data.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
14
Legacy systems often contain data of ________ quality and are generally hosted on ________.

A) poor; personal computers
B) excellent; mainframes
C) poor; mainframes
D) excellent; workgroup computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
15
A graphical system used to capture the nature and relationships among data is called a(n):

A) XML data model.
B) hypertext graphic.
C) relational database.
D) data model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
16
A person, place, object, event, or concept about which the organization wishes to maintain data is called a(n):

A) relationship.
B) object.
C) attribute.
D) entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
17
Database management involves all of the following EXCEPT:

A) collecting data.
B) organizing data.
C) design web pages.
D) managing data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
18
A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

A) enterprise view
B) reporting document
C) user view
D) user snapshot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
19
Metatdata typically describes all of the following EXCEPT:

A) data definitions.
B) length.
C) allowable values.
D) location on disk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
20
________ is a tool even non-programmers can use to access information from a database.

A) ODBC
B) Structured query language
C) ASP
D) Data manipulation query language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
21
A rule that CANNOT be violated by database users is called a:

A) password.
B) constraint.
C) program.
D) view.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
22
The period that can be considered a "proof of concept" time was the:

A) 1950s.
B) 1960s.
C) 1970s.
D) 1990s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is NOT a cost and/or risk of the database approach?

A) Specialized personnel
B) Cost of conversion
C) Improved responsiveness
D) Organizational conflict
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
24
A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is called a(n):

A) index.
B) data warehouse.
C) repository.
D) database management system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
25
The need for consensus on data definitions is an example of which type of risk in the database environment?

A) Specialized personnel needs
B) Organizational conflict
C) Conversion costs
D) Legacy systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
26
A knowledge base of information or facts about an enterprise is called a(n):

A) enterprise information system.
B) repository.
C) systems information unit.
D) database process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
27
The traditional methodology used to develop, maintain, and replace information systems is called the:

A) Enterprise Resource Model.
B) Systems Development Life Cycle.
C) Unified Model.
D) Systems Deployment Life Cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
28
A departmental multi-tiered client/server database is stored on a central device called a:

A) client.
B) server.
C) remote PC.
D) network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
29
Specifying how data from a logical schema are stored in secondary memory is part of the:

A) design.
B) maintenance.
C) analysis.
D) implementation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is NOT an objective that drove the development and evolution of database technology?

A) The need to provide greater independence between programs and data.
B) The desire to manage increasing complex data types and structures.
C) The desire to require programmers to write all file handling functionality.
D) The need to provide ever more powerful platforms for decision support applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
31
Languages, menus, and other facilities by which users interact with the database are collectively called a(n):

A) client.
B) user interface.
C) icon.
D) development environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
32
The SDLC phase in which database processing programs are created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is software used to create, maintain, and provide controlled access to databases?

A) Network operating system
B) User view
C) Database management system (DBMS)
D) Attribute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
34
The SDLC phase in which the detailed conceptual data model is created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
35
Organizations that utilize the file processing approach spend as much as ________ of their IS development budget on maintenance.

A) 40 percent
B) 25 percent
C) 60 percent
D) 80 percent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
36
The SDLC phase in which every data attribute is defined, every category of data is listed, and every business relationship between data entities is defined is called the ________ phase.

A) planning
B) design
C) analysis
D) implementation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
37
E. F. Codd developed the relational model in the:

A) 1960s.
B) 1970s.
C) 1980s.
D) 1990s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
38
Database development begins with ________, which establishes the range and general contents of organizational databases.

A) database design
B) cross-functional analysis
C) departmental data modeling
D) enterprise data modeling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
39
The most common source of database failures in organizations is:

A) lack of planning.
B) inadequate budget.
C) inadequate hardware.
D) failure to implement a strong database administration function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
40
In a file processing environment, descriptions for data and the logic for accessing the data are built into:

A) application programs.
B) database descriptors.
C) fields.
D) records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
41
A data warehouse derives its data from:

A) on-line transactions.
B) various operational data sources.
C) reports.
D) a data mart.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
42
Development starts from scratch with the traditional file processing approach because new file formats, descriptions, and file access logic must be designed for each new program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
43
Determining the structure of data and the relationships between data elements either right before or at the time of use of the data is called:

A) tables on write.
B) schema on write.
C) on demand paging.
D) caching.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ do NOT concentrate on determining the requirements for the database component of an information system.

A) Database analysts
B) Systems analysts
C) Programmers
D) End Users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
45
The three-schema approach includes which of the following schemas?

A) Internal
B) Logical
C) Cross-functional
D) Dissecting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
46
Many of the disadvantages of file processing systems can also be limitations of databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
47
Metadata are data that describe the properties of other data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
48
Organizations that utilize the file processing approach spend only 20 percent of development time on maintenance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
49
A person is an example of an entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
50
An iterative methodology that rapidly repeats the analysis, design, and implementation phases of the SDLC is called:

A) CASE.
B) CAD.
C) RAD.
D) MST.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
51
The data that you are interested in capturing about an entity is called an instance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
52
Databases were developed as the first application of computers to data processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
53
With the traditional file processing approach, each application shares data files, thus enabling much data sharing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
54
One of the most popular RAD methods is:

A) automated design.
B) structured walkthrough.
C) prototyping.
D) crafting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
55
A data model is a graphical system used to capture the nature and relationships among data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
56
File processing systems have been replaced by database systems in most critical business applications today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
57
Unplanned duplicate data files are the rule rather than the exception in file processing systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
58
A well-structured database establishes the entities between relationships in order to derive the desired information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
59
________ specify computer systems requirements.

A) Programmers
B) Users
C) Systems analysts
D) Database analysts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
60
Information is processed data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
61
Personal databases are designed to support a small group of individuals working together on a project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
62
An enterprise data model describes the scope of data for only one information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
63
Data redundancy is used to establish relationships between data but is never used to improve database performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
64
A relational database establishes the relationships between entities by means of a common field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
65
The user interface includes languages, menus, and other facilities by which users interact with various system components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
66
Repositories are always used in file processing systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
67
Redundancy increases the risk of inconsistent data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
68
The failure to implement a strong database administrative function is the most common source of database failures in organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
69
A constraint is a rule in a database system that can be violated by users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
70
A user view is how the user sees the data when it is produced.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
71
Database development begins with the design of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
72
Data management technologies are also increasing often used as information systems, as a foundation for analytics or the systematic analysis of data to understand a real-world problem better.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
73
A modern database management system automates more of the backup and recovery tasks than a file system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
74
The term legacy system refers to a newly installed database management system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
75
One reason for improved application development productivity with the database approach is that file design and low-level implementation details do not need to be handled by the application programmer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
76
Organizational commitment to a database project is not necessary for its success.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
77
Cost and complexity are just two of the disadvantages of database processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
78
Separation of metadata from application programs that use the data is called data independence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
79
Reduced program maintenance is an advantage of file processing systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
80
The data repository assists database administrators in enforcing standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 119 في هذه المجموعة.