Deck 8: Data Structures and Caatts for Data Extraction

ملء الشاشة (f)
exit full mode
سؤال
The database approach to data management is sometimes called the flat file approach.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The two fundamental components of data structures are organization and access method.
سؤال
Data normalization groups data attributes into tables in accordance with specific design objectives.
سؤال
View modeling begins by identifying the primary entities of the business function in question.
سؤال
The hierarchical database model forces users to navigate between data elements using predefined structured paths.
سؤال
Generalized audit software packages are used to assist the auditor in performing substantive tests.
سؤال
An entity is any physical thing about which the organization wishes to capture data.
سؤال
An ER diagram is a graphical representation of a data model.
سؤال
The deletion anomaly is the least important of the problems affecting unnormalized databases.
سؤال
VSAM file structures are most effective where rapid access to individual records is a priority need.
سؤال
GAS can be used with simple data structures but not complex structures
سؤال
A join builds a new table by creating links.
سؤال
Under the database approach, data is viewed as proprietary or owned by users.
سؤال
The physical database is an abstract representation of the database.
سؤال
A customer name and an unpaid balance is an example of a one-to-many relationship.
سؤال
An advantage of using an indexed random file structure is that records are easily added and deleted.
سؤال
View integration combines the data needs to all users into a single-entity wide schema.
سؤال
EAM's allow auditors to identify significant transactions for substantive testing.
سؤال
In the relational model, a data element is called a relation.
سؤال
When a large portion of the file is to be processed in one operation such as payroll, sequential data structures are an inefficient method of organizing a file.
سؤال
In the relational database model all of the following are true except

A) data is presented to users as tables
B) data can be extracted from specified rows from specified tables
C) a new table can be built by joining two tables
D) only one-to-many relationships can be supported
سؤال
In a hashing structure,

A) two records can be stored at the same address.
B) pointers are used to indicate the location of all records.
C) pointers are used to indicate the location of a record with the same address as another record.
D) all locations on the disk are used for record storage.
سؤال
The update anomaly in unnormalized databases

A) occurs because of data redundancy
B) complicates adding records to the database
C) may result in the loss of important data
D) often results in excessive record insertions
سؤال
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
سؤال
Pointers are used

A) to link records within a file.
B) to link records between files.
C) to identify records stored in overflow.
D) all of the above.
سؤال
Pointers can be used for all of the following except

A) to locate the subschema address of the record.
B) to locate the physical address of the record.
C) to locate the relative address of the record.
D) to locate the logical key of the record.
سؤال
Improperly normalized databases are associated with three types of anomalies: the update anomaly, the insertion anomaly, and the deletion anomaly.
سؤال
Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.
سؤال
In the relational database model

A) relationships are explicit
B) the user perceives that files are linked using pointers
C) data is represented on two-dimensional tables
D) data is represented as a tree structure
سؤال
View modeling includes

A) constructing a data model showing entity associations.
B) constructing the physical database.
C) preparing the user views.
D) all of the above.
سؤال
Database anomalies are symptoms of structural problems within tables called

A) tuples
B) dependencies
C) collisions
D) Attributes
سؤال
Which characteristic is associated with the database approach to data management?

A) data sharing
B) multiple storage procedures
C) data redundancy
D) excessive storage costs
سؤال
It is appropriate to use a sequential file structure when

A) records are routinely inserted.
B) single records need to be retrieved.
C) records need to be scanned using secondary keys.
D) a large portion of the file will be processed in one operation.
سؤال
Which statement is not correct? The VSAM structure

A) is used for very large files that need both direct access and batch processing.
B) may use an overflow area for records.
C) provides an exact physical address for each record.
D) is appropriate for files that require few insertions or deletions.
سؤال
In a relational database

A) the user's view of the physical database is the same as the physical database
B) users perceive that they are manipulating a single table
C) a virtual table exists in the form of rows and columns of a table stored on the disk
D) a programming language (COBOL) is used to create a user's view of the database
سؤال
Which statement is true about a hashing structure?

A) The same address could be calculated for two records.
B) Storage space is used efficiently.
C) Records cannot be accessed rapidly.
D) A separate index is required.
سؤال
An inventory record contains part number, part name, part color, and part weight. These individual items are called

A) fields.
B) stored files.
C) bytes.
D) occurrences.
سؤال
The most serious problem with unnormalized databases is the

A) update anomaly
B) insertion anomaly
C) deletion anomaly
D) none of the above
سؤال
A table in third normal form is free of partial dependencies, multiple dependencies, and transitive dependencies.
سؤال
Which of the following statements is not true?

A) Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.
B) Indexed random files use disk storage space efficiently.
C) Indexed random files are efficient when processing a large portion of a file at one time.
D) Indexed random files are easy to maintain in terms of adding records.
سؤال
The deletion anomaly in unnormalized databases

A) is easily detected by users
B) may result in the loss of important data
C) complicates adding records to the database
D) requires the user to perform excessive updates
سؤال
What is the relationship between a database table and a user view?
سؤال
Which statement is correct?

A) in a normalized database, data about vendors occur in several locations
B) the accountant is responsible for database normalization
C) in a normalized database, deletion of a key record could result in the destruction of the audit trail
D) connections between M:M tables are provided by a link table
سؤال
What are the six phases of view modeling?
سؤال
Give an advantage and a disadvantage of the sequential data structure
سؤال
What are the two fundamental components of data structures?
سؤال
A transitive dependency

A) is a database condition that is resolved through special monitoring software.
B) is a name given to one of the three anomalies that result from unnormalized database tables.
C) can exist only in a table with a composite primary key.
D) cannot exist in tables that are normalized at the 3NF level.
E) is none of the above.
سؤال
What are the three physical components of a VSAM file?
سؤال
Which of the following is a relational algebra function?

A) restrict
B) project
C) join
D) all are relational algebra functions
سؤال
A table is in first normal form when it is

A) free of repeating group data
B) free of transitive dependencies
C) free of partial dependencies
D) free of update anomalies
E) none of the above
سؤال
Comment on the following statement: "Legacy systems use flat file structures."
سؤال
A user view

A) presents the physical arrangement of records in a database for a particular user
B) is the logical abstract structure of the database
C) specifies the relationship of data elements in the database
D) defines how a particular user sees the database
سؤال
Give two limitations of the hierarchical database model?
سؤال
Which statement is not true? Embedded audit modules

A) can be turned on and off by the auditor.
B) reduce operating efficiency.
C) may lose their viability in an environment where programs are modified frequently.
D) identify transactions to be analyzed using white box tests.
سؤال
Generalized audit software packages perform all of the following tasks except

A) recalculate data fields
B) compare files and identify differences
C) stratify statistical samples
D) analyze results and form opinions
سؤال
Each of the following is a relational algebra function except

A) join
B) project
C) link
D) restrict
سؤال
A table is in third normal form when it is

A) free of repeating group data
B) free of transitive dependencies
C) free of partial dependencies
D) free of deletion anomalies
E) none of the above
سؤال
Which of the following is not a common form of conceptual database model?

A) hierarchical
B) network
C) sequential
D) relational
سؤال
Entities are

A) nouns that are depicted by rectangles on an entity relationship diagram
B) data that describe the characteristics of properties of resources
C) associations among elements
D) sets of data needed to make a decision
سؤال
A table is in second normal form when it is

A) free of repeating group data
B) free of transitive dependencies
C) free of partial dependencies
D) free of insert anomalies
E) none of the above
سؤال
What is a partial dependency?
سؤال
What is the update anomaly?
سؤال
Explain the basic results that come from the restrict, project, and join functions.
سؤال
What is repeating group data?
سؤال
Give three examples that illustrate how cardinality reflects an organization's underlying business rules.
سؤال
How does the database approach solve the problem of data redundancy?
سؤال
What is a transitive dependency?
سؤال
Explain the purpose of an ER diagram in database design.
سؤال
Outline some of the key advantages of GAS.
سؤال
What is a hashing structure? What are the advantage(s) and disadvantage(s) associated with it?
سؤال
How does the embedded audit module support the auditor?
سؤال
Explain the three types of anomalies associated with database tables that have not been normalized.
سؤال
Discuss the two fundamental components of data structures.
سؤال
Give an example of the insertion anomaly.
سؤال
What is view integration?
سؤال
Explain how linkages between relational tables are accomplished.
سؤال
When is a table in third normal form (3NF)?
سؤال
How can a poorly designed database result in unintentional loss of critical records?
سؤال
What are the key control implications of the absence of database normalization?
سؤال
Explain the following three types of pointers: physical address pointer, relative address pointer, and logical key pointer.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/81
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Data Structures and Caatts for Data Extraction
1
The database approach to data management is sometimes called the flat file approach.
False
2
The two fundamental components of data structures are organization and access method.
True
3
Data normalization groups data attributes into tables in accordance with specific design objectives.
True
4
View modeling begins by identifying the primary entities of the business function in question.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
5
The hierarchical database model forces users to navigate between data elements using predefined structured paths.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
6
Generalized audit software packages are used to assist the auditor in performing substantive tests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
7
An entity is any physical thing about which the organization wishes to capture data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
8
An ER diagram is a graphical representation of a data model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
9
The deletion anomaly is the least important of the problems affecting unnormalized databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
10
VSAM file structures are most effective where rapid access to individual records is a priority need.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
11
GAS can be used with simple data structures but not complex structures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
12
A join builds a new table by creating links.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
13
Under the database approach, data is viewed as proprietary or owned by users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
14
The physical database is an abstract representation of the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
15
A customer name and an unpaid balance is an example of a one-to-many relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
16
An advantage of using an indexed random file structure is that records are easily added and deleted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
17
View integration combines the data needs to all users into a single-entity wide schema.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
18
EAM's allow auditors to identify significant transactions for substantive testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
19
In the relational model, a data element is called a relation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
20
When a large portion of the file is to be processed in one operation such as payroll, sequential data structures are an inefficient method of organizing a file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
21
In the relational database model all of the following are true except

A) data is presented to users as tables
B) data can be extracted from specified rows from specified tables
C) a new table can be built by joining two tables
D) only one-to-many relationships can be supported
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
22
In a hashing structure,

A) two records can be stored at the same address.
B) pointers are used to indicate the location of all records.
C) pointers are used to indicate the location of a record with the same address as another record.
D) all locations on the disk are used for record storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
23
The update anomaly in unnormalized databases

A) occurs because of data redundancy
B) complicates adding records to the database
C) may result in the loss of important data
D) often results in excessive record insertions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
24
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
25
Pointers are used

A) to link records within a file.
B) to link records between files.
C) to identify records stored in overflow.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
26
Pointers can be used for all of the following except

A) to locate the subschema address of the record.
B) to locate the physical address of the record.
C) to locate the relative address of the record.
D) to locate the logical key of the record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
27
Improperly normalized databases are associated with three types of anomalies: the update anomaly, the insertion anomaly, and the deletion anomaly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
28
Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the relational database model

A) relationships are explicit
B) the user perceives that files are linked using pointers
C) data is represented on two-dimensional tables
D) data is represented as a tree structure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
30
View modeling includes

A) constructing a data model showing entity associations.
B) constructing the physical database.
C) preparing the user views.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
31
Database anomalies are symptoms of structural problems within tables called

A) tuples
B) dependencies
C) collisions
D) Attributes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which characteristic is associated with the database approach to data management?

A) data sharing
B) multiple storage procedures
C) data redundancy
D) excessive storage costs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
33
It is appropriate to use a sequential file structure when

A) records are routinely inserted.
B) single records need to be retrieved.
C) records need to be scanned using secondary keys.
D) a large portion of the file will be processed in one operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which statement is not correct? The VSAM structure

A) is used for very large files that need both direct access and batch processing.
B) may use an overflow area for records.
C) provides an exact physical address for each record.
D) is appropriate for files that require few insertions or deletions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
35
In a relational database

A) the user's view of the physical database is the same as the physical database
B) users perceive that they are manipulating a single table
C) a virtual table exists in the form of rows and columns of a table stored on the disk
D) a programming language (COBOL) is used to create a user's view of the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which statement is true about a hashing structure?

A) The same address could be calculated for two records.
B) Storage space is used efficiently.
C) Records cannot be accessed rapidly.
D) A separate index is required.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
37
An inventory record contains part number, part name, part color, and part weight. These individual items are called

A) fields.
B) stored files.
C) bytes.
D) occurrences.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
38
The most serious problem with unnormalized databases is the

A) update anomaly
B) insertion anomaly
C) deletion anomaly
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
39
A table in third normal form is free of partial dependencies, multiple dependencies, and transitive dependencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following statements is not true?

A) Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.
B) Indexed random files use disk storage space efficiently.
C) Indexed random files are efficient when processing a large portion of a file at one time.
D) Indexed random files are easy to maintain in terms of adding records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
41
The deletion anomaly in unnormalized databases

A) is easily detected by users
B) may result in the loss of important data
C) complicates adding records to the database
D) requires the user to perform excessive updates
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the relationship between a database table and a user view?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which statement is correct?

A) in a normalized database, data about vendors occur in several locations
B) the accountant is responsible for database normalization
C) in a normalized database, deletion of a key record could result in the destruction of the audit trail
D) connections between M:M tables are provided by a link table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are the six phases of view modeling?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
45
Give an advantage and a disadvantage of the sequential data structure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are the two fundamental components of data structures?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
47
A transitive dependency

A) is a database condition that is resolved through special monitoring software.
B) is a name given to one of the three anomalies that result from unnormalized database tables.
C) can exist only in a table with a composite primary key.
D) cannot exist in tables that are normalized at the 3NF level.
E) is none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are the three physical components of a VSAM file?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is a relational algebra function?

A) restrict
B) project
C) join
D) all are relational algebra functions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
50
A table is in first normal form when it is

A) free of repeating group data
B) free of transitive dependencies
C) free of partial dependencies
D) free of update anomalies
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
51
Comment on the following statement: "Legacy systems use flat file structures."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
52
A user view

A) presents the physical arrangement of records in a database for a particular user
B) is the logical abstract structure of the database
C) specifies the relationship of data elements in the database
D) defines how a particular user sees the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
53
Give two limitations of the hierarchical database model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which statement is not true? Embedded audit modules

A) can be turned on and off by the auditor.
B) reduce operating efficiency.
C) may lose their viability in an environment where programs are modified frequently.
D) identify transactions to be analyzed using white box tests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
55
Generalized audit software packages perform all of the following tasks except

A) recalculate data fields
B) compare files and identify differences
C) stratify statistical samples
D) analyze results and form opinions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
56
Each of the following is a relational algebra function except

A) join
B) project
C) link
D) restrict
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
57
A table is in third normal form when it is

A) free of repeating group data
B) free of transitive dependencies
C) free of partial dependencies
D) free of deletion anomalies
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is not a common form of conceptual database model?

A) hierarchical
B) network
C) sequential
D) relational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
59
Entities are

A) nouns that are depicted by rectangles on an entity relationship diagram
B) data that describe the characteristics of properties of resources
C) associations among elements
D) sets of data needed to make a decision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
60
A table is in second normal form when it is

A) free of repeating group data
B) free of transitive dependencies
C) free of partial dependencies
D) free of insert anomalies
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
61
What is a partial dependency?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is the update anomaly?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
63
Explain the basic results that come from the restrict, project, and join functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
64
What is repeating group data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
65
Give three examples that illustrate how cardinality reflects an organization's underlying business rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
66
How does the database approach solve the problem of data redundancy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
67
What is a transitive dependency?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
68
Explain the purpose of an ER diagram in database design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
69
Outline some of the key advantages of GAS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
70
What is a hashing structure? What are the advantage(s) and disadvantage(s) associated with it?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
71
How does the embedded audit module support the auditor?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
72
Explain the three types of anomalies associated with database tables that have not been normalized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
73
Discuss the two fundamental components of data structures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
74
Give an example of the insertion anomaly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is view integration?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
76
Explain how linkages between relational tables are accomplished.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
77
When is a table in third normal form (3NF)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
78
How can a poorly designed database result in unintentional loss of critical records?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
79
What are the key control implications of the absence of database normalization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
80
Explain the following three types of pointers: physical address pointer, relative address pointer, and logical key pointer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.