Deck 14: Databases and Database Management Systems

Full screen (f)
exit full mode
Question
Normalization is usually viewed as a multistep process, from first normal form (1NF) to usually fifth normal form (5NF).
Use Space or
up arrow
down arrow
to flip the card.
Question
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
Question
In some systems, data integrity is enforced on a per transaction basis.
Question
Arranging data for efficient retrieval is called data organization.
Question
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
Question
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
Question
Views need to be designed to extract the needed information in as efficient a manner as possible.
Question
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
Question
Multidimensional databases are appropriate when a variety of types of objects need to be stored and retrieved.
Question
Data integrity refers to the accuracy of data.
Question
If a field needs to store decimal places, the Long Integer field size can be used.
Question
The data dictionary includes data located in the database tables.
Question
A database typically consists of interrelated tables that contain forms and reports.
Question
With HOLAP (Hybrid OLAP), a combination of MOLAP and ROLAP technologies are used.
Question
Data accessibility refers to protecting data against destruction and misuse-both intentionally and accidentally.
Question
IBM's DB2 9 program contains a hybrid XML / relational database server.
Question
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
Question
A field is also called a ____.

A) column
B) row
C) table
D) record
Question
Repairing or restoring data that has become corrupt, perhaps as the result of a storage media error or computer virus, is a database analysis activity.
Question
  The accompanying figure shows an n-tier database model.<div style=padding-top: 35px>
The accompanying figure shows an n-tier database model.
Question
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
Question
A(n) ____ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.

A) tablet
B) keyword
C) index
D) main table
Question
A record is also called a ____.

A) field
B) report
C) row
D) table
Question
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
Question
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
Question
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
Question
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
Question
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
Question
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
Question
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
Question
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
Question
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
Question
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
Question
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
Question
With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
Question
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
Question
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
Question
____ create the actual database, based on the design generated by the database designer, and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
Question
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
Question
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
Question
If a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
Question
Middleware for Web database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
Question
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
Question
____________________ rules are used when the value of one field in the record needs to be checked against another field in that same record to be sure it is valid.
Question
Primary keys can be a combination of two key fields (called ____________________ primary keys), but single primary keys are more typical in simple databases.
Question
____________________ databases are located on a PC and are designed to be accessed by one user.
Question
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
Question
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
Question
<strong>  The figure above illustrates a ____, created from data contained in a database.</strong> A) report B) query C) form D) table <div style=padding-top: 35px>
The figure above illustrates a ____, created from data contained in a database.

A) report
B) query
C) form
D) table
Question
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value.
Question
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
Question
In ____________________ organization, the order of the records is physically based on the content of the key field.
Question
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
Question
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
Question
With indexed organization, a(n) ____________________ is used to keep track of where data is stored.
Question
With ____, data is stored in single multidimensional database structures (sometimes called data cubes).

A) Online Analytical Processing (OLAP)
B) ROLAP (Relational OLAP)
C) MOLAP (Multidimensional OLAP)
D) HOLAP (Hybrid OLAP)
Question
Some database programs allow you to create a table by just entering data, and then the program will create the ____________________ based on the data entered.
Question
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
Question
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
Question
A(n) ____________________ is a specific field in a database table that uniquely identifies the records in that table.
Question
Explain in-memory databases
Question
What do database administrators do?
Question
Describe a database and a database management system (DBMS).
Question
Discuss database entities and attributes.
Question
The appearance and content of ____________________ Web pages change based on a user's input.
Question
When you are beginning to design a new database, sketching a(n) ____________________ of the reports and other desired database output can be helpful in identifying the fields that need to be included in the database.
Question
  In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.<div style=padding-top: 35px>
In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.
Question
____________________ script is a set of instructions written in a programming language and designed to accept data from and return data to a Web page visitor.
Question
____________________ usually includes the programs used with the database and the programs needed to connect the client and server components of the database system.
Question
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____________________.
Question
What is a CGI (common gateway interface) script?
Question
With a(n) ____________________, the data is separated into several databases, each of which is stored on a different computer that may be in different physical locations from one another but that are connected via a network.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Databases and Database Management Systems
1
Normalization is usually viewed as a multistep process, from first normal form (1NF) to usually fifth normal form (5NF).
False
2
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
B
3
In some systems, data integrity is enforced on a per transaction basis.
True
4
Arranging data for efficient retrieval is called data organization.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
Views need to be designed to extract the needed information in as efficient a manner as possible.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
Multidimensional databases are appropriate when a variety of types of objects need to be stored and retrieved.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
Data integrity refers to the accuracy of data.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
If a field needs to store decimal places, the Long Integer field size can be used.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
The data dictionary includes data located in the database tables.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
A database typically consists of interrelated tables that contain forms and reports.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
With HOLAP (Hybrid OLAP), a combination of MOLAP and ROLAP technologies are used.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
Data accessibility refers to protecting data against destruction and misuse-both intentionally and accidentally.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
IBM's DB2 9 program contains a hybrid XML / relational database server.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
A field is also called a ____.

A) column
B) row
C) table
D) record
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Repairing or restoring data that has become corrupt, perhaps as the result of a storage media error or computer virus, is a database analysis activity.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
  The accompanying figure shows an n-tier database model.
The accompanying figure shows an n-tier database model.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ____ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.

A) tablet
B) keyword
C) index
D) main table
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
A record is also called a ____.

A) field
B) report
C) row
D) table
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
____ create the actual database, based on the design generated by the database designer, and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
If a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
Middleware for Web database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
____________________ rules are used when the value of one field in the record needs to be checked against another field in that same record to be sure it is valid.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Primary keys can be a combination of two key fields (called ____________________ primary keys), but single primary keys are more typical in simple databases.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ databases are located on a PC and are designed to be accessed by one user.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
<strong>  The figure above illustrates a ____, created from data contained in a database.</strong> A) report B) query C) form D) table
The figure above illustrates a ____, created from data contained in a database.

A) report
B) query
C) form
D) table
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
In ____________________ organization, the order of the records is physically based on the content of the key field.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
With indexed organization, a(n) ____________________ is used to keep track of where data is stored.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
With ____, data is stored in single multidimensional database structures (sometimes called data cubes).

A) Online Analytical Processing (OLAP)
B) ROLAP (Relational OLAP)
C) MOLAP (Multidimensional OLAP)
D) HOLAP (Hybrid OLAP)
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
Some database programs allow you to create a table by just entering data, and then the program will create the ____________________ based on the data entered.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) ____________________ is a specific field in a database table that uniquely identifies the records in that table.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Explain in-memory databases
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
What do database administrators do?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Describe a database and a database management system (DBMS).
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
Discuss database entities and attributes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
The appearance and content of ____________________ Web pages change based on a user's input.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
When you are beginning to design a new database, sketching a(n) ____________________ of the reports and other desired database output can be helpful in identifying the fields that need to be included in the database.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
  In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.
In Microsoft Access, tables can be created in either Datasheet view or ____________________ view, as shown in the accompanying figure.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ script is a set of instructions written in a programming language and designed to accept data from and return data to a Web page visitor.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ usually includes the programs used with the database and the programs needed to connect the client and server components of the database system.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____________________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
What is a CGI (common gateway interface) script?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
With a(n) ____________________, the data is separated into several databases, each of which is stored on a different computer that may be in different physical locations from one another but that are connected via a network.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 72 flashcards in this deck.