Deck 9: Database Design
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 9: Database Design
1
In the Systems Development Life Cycle (SDLC), problems defined during the planning phase are examined in greater detail during the analysis phase.
True
2
A system maintenance activity generated in response to changes in the business environment is referred to as corrective maintenance.
False
3
After the initial declarations in Database Life Cycle (DBLC), the database designer must carefully probe in order to generate additional information that will help define the problem within the larger framework of company operations.
True
4
Systems analysis establishes the need for an information system and its extent.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
In the Systems Development Life Cycle(SDLC), the design of the system's processes begins in the detailed systems design phase.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
The Systems Development Life Cycle (SDLC) traces the history of an information system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
In the detailed systems design phase of the Systems Development Life Cycle (SDLC), steps are laid out for the conversion of a database from an old system to a new system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Data integrity is enforced by the database management system (DBMS) through the proper use of primary and foreign key rules.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
The overall purpose of the database initial study is to create the conceptual design.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
The primary objective in database design is to create complete, normalized, nonredundant, and fully integrated conceptual, logical, and physical database models.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
The analysis phase of the Systems Development Life Cycle (SDLC) involves a cycle of coding, testing, and debugging.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
The term "database development" is used to describe the process of database design and implementation.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
A system is always at some stage of SDLC because every request for structural changes requires retracing the steps of the Systems Development Life Cycle (SDLC).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
The database contents might be loaded interactively or in batch mode using a variety of methods and devices including customized user programs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
In most modern relational DBMSs, a new database implementation requires the creation of special storage-related constructs to house the end-user tables.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
The Systems Development Life Cycle (SDLC) is a sequential process rather than an iterative process.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
The testing and evaluation phase of the Database Life Cycle (DBLC) occurs after applications programming.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Evaluation of database performance is rendered easier by the fact there are no standards to measure it.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
The Systems Development Life Cycle's (SDLC's) planning phase yields a general overview of the company and its objectives.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
The implementation phase of database design includes creating the database storage structure and loading the database, but does not provide for data management.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
The maintenance and evolution phase of the Database Life Cycle (DBLC) involves _____.
A) defining objectives
B) introducing changes
C) testing the database
D) installing the DBMS
A) defining objectives
B) introducing changes
C) testing the database
D) installing the DBMS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
The implementation and loading phase of the Database Life Cycle (DBLC) involves _____.
A) defining objectives
B) introducing changes
C) testing the database
D) installing the DBMS
A) defining objectives
B) introducing changes
C) testing the database
D) installing the DBMS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).
A) planning
B) analysis
C) detailed systems design
D) implementation
A) planning
B) analysis
C) detailed systems design
D) implementation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
"Should the existing system be replaced?" is a question that is asked during the _____ stage of the Systems Development Life Cycle (SDLC).
A) planning
B) analysis
C) implementation
D) maintenance
A) planning
B) analysis
C) implementation
D) maintenance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
"What are the requirements of the current system's end users?" is a question asked during the _____ phase of the Systems Development Life Cycle (SDLC).
A) planning
B) analysis
C) implementation
D) maintenance
A) planning
B) analysis
C) implementation
D) maintenance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Coding, testing, and debugging are part of the _____ phase of the Systems Development Life Cycle (SDLC).
A) planning
B) analysis
C) detailed systems design
D) implementation
A) planning
B) analysis
C) detailed systems design
D) implementation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
In DBLC, the phase after the database initial study is _____.
A) operation
B) database design
C) database initial study
D) implementation and loading
A) operation
B) database design
C) database initial study
D) implementation and loading
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Producing the required information flow is part of the _____ phase of the Database Life Cycle (DBLC).
A) database initial study
B) database design
C) operation
D) testing and evaluation
A) database initial study
B) database design
C) operation
D) testing and evaluation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
Training principles and methodologies are planned during the _____ phase of the Systems Development Life Cycle (SDLC).
A) maintenance
B) implementation
C) analysis
D) detailed systems design
A) maintenance
B) implementation
C) analysis
D) detailed systems design
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
The logical systems design is created during the _____ phase of the Systems Development Life Cycle (SDLC).
A) planning
B) analysis
C) implementation
D) maintenance
A) planning
B) analysis
C) implementation
D) maintenance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
The traditional Systems Development Life Cycle (SDLC) is divided into _____ phases.
A) two
B) three
C) four
D) five
A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Selecting database management system (DBMS) software is part of the _____ phase of the Database Life Cycle (DBLC).
A) database initial study
B) database design
C) implementation and loading
D) testing and evaluation
A) database initial study
B) database design
C) implementation and loading
D) testing and evaluation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
The _____ phase of the Systems Development Life Cycle (SDLC) includes all the necessary technical specifications for the screens, menus, reports, and other devices used to make the system more efficient.
A) analysis
B) implementation
C) detailed systems design
D) maintenance
A) analysis
B) implementation
C) detailed systems design
D) maintenance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, and application programs are installed, and the database design is implemented.
A) detailed systems design
B) analysis
C) maintenance
D) implementation
A) detailed systems design
B) analysis
C) maintenance
D) implementation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
The database contents are loaded during the _____ phase of the Systems Development Life Cycle (SDLC).
A) analysis
B) detailed systems design
C) implementation
D) maintenance
A) analysis
B) detailed systems design
C) implementation
D) maintenance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
The process of creating an information system is known as _____.
A) systems development
B) database development
C) network development
D) enterprise development
A) systems development
B) database development
C) network development
D) enterprise development
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is _____.
A) database analysis and requirements
B) ER modeling and normalization
C) data model verification
D) distributed database design
A) database analysis and requirements
B) ER modeling and normalization
C) data model verification
D) distributed database design
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
_____ is a technique that creates logical representations of computing resources that are independent of the underlying physical computing resources.
A) Normalization
B) Virtualization
C) Specialization
D) Generalization
A) Normalization
B) Virtualization
C) Specialization
D) Generalization
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
The result of the _____phase of the Systems Development Life Cycle (SDLC) should be a better understanding of the system's functional areas, actual and potential problems, and opportunities.
A) analysis
B) implementation
C) detailed systems design
D) maintenance
A) analysis
B) implementation
C) detailed systems design
D) maintenance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
The implementation of _____ applications tends to prolong the operational life of systems by making them easier to update and maintain.
A) database-produced
B) network-produced
C) CASE-produced
D) design-produced
A) database-produced
B) network-produced
C) CASE-produced
D) design-produced
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
The proposed system is subject to limits known as _____, which are external to the system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
In a(n) _____, only the objects that have been updated or modified since the last full backup are backed up.
A) transaction log backup
B) conservative backup
C) differential backup
D) adaptive backup
A) transaction log backup
B) conservative backup
C) differential backup
D) adaptive backup
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transaction-processing requirements is _____.
A) data analysis and requirements
B) entity relationship modeling and normalization
C) data model verification
D) distributed database design
A) data analysis and requirements
B) entity relationship modeling and normalization
C) data model verification
D) distributed database design
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
The first step in developing the conceptual model using ER diagrams is to _____.
A) normalize the entities
B) complete the initial ER diagram
C) identify, analyze, and refine the business rules
D) define the attributes, primary keys, and foreign keys for each of the entities
A) normalize the entities
B) complete the initial ER diagram
C) identify, analyze, and refine the business rules
D) define the attributes, primary keys, and foreign keys for each of the entities
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
_____ are usually provided by the database management system (DBMS) to check for access violations.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
_____ can render data useless to unauthorized users who might have violated some of the database security layers.
A) Data encryption
B) Access rights
C) Physical security
D) Password security
A) Data encryption
B) Access rights
C) Physical security
D) Password security
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
The advent of very sophisticated application generators and _____ has substantially decreased coding and testing time.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is a hardware-induced database failure?
A) Memory chip errors
B) Viruses
C) Malware
D) Abortion due to deadlock
A) Memory chip errors
B) Viruses
C) Malware
D) Abortion due to deadlock
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
During decentralized design, after the _____ has been completed, all modules are integrated into one conceptual model.
A) declaration process
B) verificationprocess
C) conceptual process
D) logical process
A) declaration process
B) verificationprocess
C) conceptual process
D) logical process
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
An initial assessment of the information flow-and-extent requirements must be made during the _____ portion of the Systems Development Life Cycle (SDLC).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
The system's _____ defines the extent of the design according to operational requirements.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
_____ is the process that establishes the need for, and the extent of, an information system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
A(n) _____ is a carefully designed and constructed repository of facts that is a part of a larger whole known as an information system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Once the data has been loaded into the database, the _____ tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints.
A) programmer
B) manager
C) database administrator
D) systems administrator
A) programmer
B) manager
C) database administrator
D) systems administrator
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
_____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.
A) Conceptual design
B) Networkdesign
C) Logical design
D) Physical design
A) Conceptual design
B) Networkdesign
C) Logical design
D) Physical design
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
The traditional Systems Development Life Cycle (SDLC) phases are _____, analysis, detailed systems design, implementation, and maintenance.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
The last step in the Database Life Cycle (DBLC) is _____.
A) maintenance and evolution
B) operation
C) testing and evaluation
D) implementation and loading
A) maintenance and evolution
B) operation
C) testing and evaluation
D) implementation and loading
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
After testing is concluded, the final _____ is reviewed and printed and end users are trained.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
The first step in the ER model verification process is to _____.
A) identify each module and its components
B) identify the ER model's central entity
C) verify all processes against the ER model
D) identify each module's internal transaction requirements
A) identify each module and its components
B) identify the ER model's central entity
C) verify all processes against the ER model
D) identify each module's internal transaction requirements
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
_____ allow end users to access the database without being able to download the information from their workstations.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
The term _____ describes the strength of the relationships found among a module's entities.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Because real-world database design is generally done by teams, the database design is probably divided into major components known as _____.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
The _____ stage uses data modeling to create an abstract database structure that represents real-world objects in the most realistic way possible.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) _____ is an information system component that handles a specific business function, such as inventory, orders, or payroll.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
The _____ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
When selecting DBMS _____, items to consider include processors, RAM, and disk space.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) _____ rule is a brief and precise narrative of a policy, procedure, or principle within a specific organization's environment.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
A designer must have a thorough understanding of the company's data types, extent, and uses in order to develop an accurate _____.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
List and describe the different levels at which database backups can be performed.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Explain the concept of logical design and list the steps involved.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
The first step in _____ is to discover the data element characteristics.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
_____ could become a very technical job that affects not only the accessibility of the data in the storage device(s) but also the performance of the system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
List and briefly describe the three types of system maintenance activities.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Explain the differences between a centralized and decentralized approach to database design.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
What are the factors affecting the purchasing decision for DBMS software?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck