Deck 1: The Database Environment and Development Process

Full screen (f)
exit full mode
Question
All of the following are primary purposes of a database management system (DBMS) EXCEPT:

A) creating data.
B) updating data.
C) storing data.
D) providing an integrated development environment.
Use Space or
up arrow
down arrow
to flip the card.
Question
Because applications are often developed independently in file processing systems:

A) the data is always non-redundant.
B) unplanned duplicate data files are the rule rather than the exception.
C) data can always be shared with others.
D) there is a large volume of file I/O.
Question
With the database approach, data descriptions are stored in a central location known as a:

A) server.
B) mainframe.
C) PC.
D) repository.
Question
Data that describe the properties of other data are:

A) relationships.
B) logical.
C) physical.
D) metadata.
Question
Relational databases establish the relationships between entities by means of common fields included in a file called a(n):

A) entity.
B) relationship.
C) relation.
D) association.
Question
________ are established between entities in a well-structured database so that the desired information can be retrieved.

A) Entities
B) Relationships
C) Lines
D) Ties
Question
Which organizational function should set database standards?

A) Management
B) Application development
C) Technical services
D) Database Administration
Question
According to a McKinsey Global Institute Report, in 2010 alone, global enterprises stored more than:

A) 1 terabyte of data.
B) 3 gigabytes of data.
C) at least 100 petabytes of data.
D) more than 7 billion exabytes of data.
Question
A user view is:

A) what a user sees when he or she looks out the window.
B) a table or set of tables.
C) a logical description of some portion of the database.
D) a procedure stored on the server.
Question
Which of the following is NOT an advantage of database systems?

A) Redundant data
B) Program-data independence
C) Better data quality
D) Reduced program maintenance
Question
Program-data dependence is caused by:

A) file descriptions being stored in each database application.
B) data descriptions being stored on a server.
C) data descriptions being written into programming code.
D) data cohabiting with programs.
Question
A database is an organized collection of ________ related data.

A) logically
B) physically
C) loosely
D) badly
Question
A major difference between data warehouses and transactional systems as compared to big data is:

A) the data is unstructured in big data systems.
B) the size of the CPU used.
C) the programming required to access data.
D) all of the above.
Question
Legacy systems often contain data of ________ quality and are generally hosted on ________.

A) poor; personal computers
B) excellent; mainframes
C) poor; mainframes
D) excellent; workgroup computers
Question
A graphical system used to capture the nature and relationships among data is called a(n):

A) XML data model.
B) hypertext graphic.
C) relational database.
D) data model.
Question
A person, place, object, event, or concept about which the organization wishes to maintain data is called a(n):

A) relationship.
B) object.
C) attribute.
D) entity.
Question
Database management involves all of the following EXCEPT:

A) collecting data.
B) organizing data.
C) design web pages.
D) managing data.
Question
A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

A) enterprise view
B) reporting document
C) user view
D) user snapshot
Question
Metatdata typically describes all of the following EXCEPT:

A) data definitions.
B) length.
C) allowable values.
D) location on disk.
Question
________ is a tool even non-programmers can use to access information from a database.

A) ODBC
B) Structured query language
C) ASP
D) Data manipulation query language
Question
A rule that CANNOT be violated by database users is called a:

A) password.
B) constraint.
C) program.
D) view.
Question
The period that can be considered a "proof of concept" time was the:

A) 1950s.
B) 1960s.
C) 1970s.
D) 1990s.
Question
Which of the following is NOT a cost and/or risk of the database approach?

A) Specialized personnel
B) Cost of conversion
C) Improved responsiveness
D) Organizational conflict
Question
A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is called a(n):

A) index.
B) data warehouse.
C) repository.
D) database management system.
Question
The need for consensus on data definitions is an example of which type of risk in the database environment?

A) Specialized personnel needs
B) Organizational conflict
C) Conversion costs
D) Legacy systems
Question
A knowledge base of information or facts about an enterprise is called a(n):

A) enterprise information system.
B) repository.
C) systems information unit.
D) database process.
Question
The traditional methodology used to develop, maintain, and replace information systems is called the:

A) Enterprise Resource Model.
B) Systems Development Life Cycle.
C) Unified Model.
D) Systems Deployment Life Cycle.
Question
A departmental multi-tiered client/server database is stored on a central device called a:

A) client.
B) server.
C) remote PC.
D) network.
Question
Specifying how data from a logical schema are stored in secondary memory is part of the:

A) design.
B) maintenance.
C) analysis.
D) implementation.
Question
Which of the following is NOT an objective that drove the development and evolution of database technology?

A) The need to provide greater independence between programs and data.
B) The desire to manage increasing complex data types and structures.
C) The desire to require programmers to write all file handling functionality.
D) The need to provide ever more powerful platforms for decision support applications.
Question
Languages, menus, and other facilities by which users interact with the database are collectively called a(n):

A) client.
B) user interface.
C) icon.
D) development environment.
Question
The SDLC phase in which database processing programs are created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
Question
Which of the following is software used to create, maintain, and provide controlled access to databases?

A) Network operating system
B) User view
C) Database management system (DBMS)
D) Attribute
Question
The SDLC phase in which the detailed conceptual data model is created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
Question
Organizations that utilize the file processing approach spend as much as ________ of their IS development budget on maintenance.

A) 40 percent
B) 25 percent
C) 60 percent
D) 80 percent
Question
The SDLC phase in which every data attribute is defined, every category of data is listed, and every business relationship between data entities is defined is called the ________ phase.

A) planning
B) design
C) analysis
D) implementation
Question
E. F. Codd developed the relational model in the:

A) 1960s.
B) 1970s.
C) 1980s.
D) 1990s.
Question
Database development begins with ________, which establishes the range and general contents of organizational databases.

A) database design
B) cross-functional analysis
C) departmental data modeling
D) enterprise data modeling
Question
The most common source of database failures in organizations is:

A) lack of planning.
B) inadequate budget.
C) inadequate hardware.
D) failure to implement a strong database administration function.
Question
In a file processing environment, descriptions for data and the logic for accessing the data are built into:

A) application programs.
B) database descriptors.
C) fields.
D) records.
Question
A data warehouse derives its data from:

A) on-line transactions.
B) various operational data sources.
C) reports.
D) a data mart.
Question
Development starts from scratch with the traditional file processing approach because new file formats, descriptions, and file access logic must be designed for each new program.
Question
Determining the structure of data and the relationships between data elements either right before or at the time of use of the data is called:

A) tables on write.
B) schema on write.
C) on demand paging.
D) caching.
Question
________ do NOT concentrate on determining the requirements for the database component of an information system.

A) Database analysts
B) Systems analysts
C) Programmers
D) End Users
Question
The three-schema approach includes which of the following schemas?

A) Internal
B) Logical
C) Cross-functional
D) Dissecting
Question
Many of the disadvantages of file processing systems can also be limitations of databases.
Question
Metadata are data that describe the properties of other data.
Question
Organizations that utilize the file processing approach spend only 20 percent of development time on maintenance.
Question
A person is an example of an entity.
Question
An iterative methodology that rapidly repeats the analysis, design, and implementation phases of the SDLC is called:

A) CASE.
B) CAD.
C) RAD.
D) MST.
Question
The data that you are interested in capturing about an entity is called an instance.
Question
Databases were developed as the first application of computers to data processing.
Question
With the traditional file processing approach, each application shares data files, thus enabling much data sharing.
Question
One of the most popular RAD methods is:

A) automated design.
B) structured walkthrough.
C) prototyping.
D) crafting.
Question
A data model is a graphical system used to capture the nature and relationships among data.
Question
File processing systems have been replaced by database systems in most critical business applications today.
Question
Unplanned duplicate data files are the rule rather than the exception in file processing systems.
Question
A well-structured database establishes the entities between relationships in order to derive the desired information.
Question
________ specify computer systems requirements.

A) Programmers
B) Users
C) Systems analysts
D) Database analysts
Question
Information is processed data.
Question
Personal databases are designed to support a small group of individuals working together on a project.
Question
An enterprise data model describes the scope of data for only one information system.
Question
Data redundancy is used to establish relationships between data but is never used to improve database performance.
Question
A relational database establishes the relationships between entities by means of a common field.
Question
The user interface includes languages, menus, and other facilities by which users interact with various system components.
Question
Repositories are always used in file processing systems.
Question
Redundancy increases the risk of inconsistent data.
Question
The failure to implement a strong database administrative function is the most common source of database failures in organizations.
Question
A constraint is a rule in a database system that can be violated by users.
Question
A user view is how the user sees the data when it is produced.
Question
Database development begins with the design of the database.
Question
Data management technologies are also increasing often used as information systems, as a foundation for analytics or the systematic analysis of data to understand a real-world problem better.
Question
A modern database management system automates more of the backup and recovery tasks than a file system.
Question
The term legacy system refers to a newly installed database management system.
Question
One reason for improved application development productivity with the database approach is that file design and low-level implementation details do not need to be handled by the application programmer.
Question
Organizational commitment to a database project is not necessary for its success.
Question
Cost and complexity are just two of the disadvantages of database processing.
Question
Separation of metadata from application programs that use the data is called data independence.
Question
Reduced program maintenance is an advantage of file processing systems.
Question
The data repository assists database administrators in enforcing standards.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/119
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: The Database Environment and Development Process
1
All of the following are primary purposes of a database management system (DBMS) EXCEPT:

A) creating data.
B) updating data.
C) storing data.
D) providing an integrated development environment.
D
2
Because applications are often developed independently in file processing systems:

A) the data is always non-redundant.
B) unplanned duplicate data files are the rule rather than the exception.
C) data can always be shared with others.
D) there is a large volume of file I/O.
B
3
With the database approach, data descriptions are stored in a central location known as a:

A) server.
B) mainframe.
C) PC.
D) repository.
D
4
Data that describe the properties of other data are:

A) relationships.
B) logical.
C) physical.
D) metadata.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
5
Relational databases establish the relationships between entities by means of common fields included in a file called a(n):

A) entity.
B) relationship.
C) relation.
D) association.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
6
________ are established between entities in a well-structured database so that the desired information can be retrieved.

A) Entities
B) Relationships
C) Lines
D) Ties
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
7
Which organizational function should set database standards?

A) Management
B) Application development
C) Technical services
D) Database Administration
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
8
According to a McKinsey Global Institute Report, in 2010 alone, global enterprises stored more than:

A) 1 terabyte of data.
B) 3 gigabytes of data.
C) at least 100 petabytes of data.
D) more than 7 billion exabytes of data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
9
A user view is:

A) what a user sees when he or she looks out the window.
B) a table or set of tables.
C) a logical description of some portion of the database.
D) a procedure stored on the server.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT an advantage of database systems?

A) Redundant data
B) Program-data independence
C) Better data quality
D) Reduced program maintenance
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
11
Program-data dependence is caused by:

A) file descriptions being stored in each database application.
B) data descriptions being stored on a server.
C) data descriptions being written into programming code.
D) data cohabiting with programs.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
12
A database is an organized collection of ________ related data.

A) logically
B) physically
C) loosely
D) badly
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
13
A major difference between data warehouses and transactional systems as compared to big data is:

A) the data is unstructured in big data systems.
B) the size of the CPU used.
C) the programming required to access data.
D) all of the above.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
14
Legacy systems often contain data of ________ quality and are generally hosted on ________.

A) poor; personal computers
B) excellent; mainframes
C) poor; mainframes
D) excellent; workgroup computers
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
15
A graphical system used to capture the nature and relationships among data is called a(n):

A) XML data model.
B) hypertext graphic.
C) relational database.
D) data model.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
16
A person, place, object, event, or concept about which the organization wishes to maintain data is called a(n):

A) relationship.
B) object.
C) attribute.
D) entity.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
17
Database management involves all of the following EXCEPT:

A) collecting data.
B) organizing data.
C) design web pages.
D) managing data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

A) enterprise view
B) reporting document
C) user view
D) user snapshot
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
19
Metatdata typically describes all of the following EXCEPT:

A) data definitions.
B) length.
C) allowable values.
D) location on disk.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
20
________ is a tool even non-programmers can use to access information from a database.

A) ODBC
B) Structured query language
C) ASP
D) Data manipulation query language
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
21
A rule that CANNOT be violated by database users is called a:

A) password.
B) constraint.
C) program.
D) view.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
22
The period that can be considered a "proof of concept" time was the:

A) 1950s.
B) 1960s.
C) 1970s.
D) 1990s.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is NOT a cost and/or risk of the database approach?

A) Specialized personnel
B) Cost of conversion
C) Improved responsiveness
D) Organizational conflict
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
24
A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is called a(n):

A) index.
B) data warehouse.
C) repository.
D) database management system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
25
The need for consensus on data definitions is an example of which type of risk in the database environment?

A) Specialized personnel needs
B) Organizational conflict
C) Conversion costs
D) Legacy systems
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
26
A knowledge base of information or facts about an enterprise is called a(n):

A) enterprise information system.
B) repository.
C) systems information unit.
D) database process.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
27
The traditional methodology used to develop, maintain, and replace information systems is called the:

A) Enterprise Resource Model.
B) Systems Development Life Cycle.
C) Unified Model.
D) Systems Deployment Life Cycle.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
28
A departmental multi-tiered client/server database is stored on a central device called a:

A) client.
B) server.
C) remote PC.
D) network.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
29
Specifying how data from a logical schema are stored in secondary memory is part of the:

A) design.
B) maintenance.
C) analysis.
D) implementation.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is NOT an objective that drove the development and evolution of database technology?

A) The need to provide greater independence between programs and data.
B) The desire to manage increasing complex data types and structures.
C) The desire to require programmers to write all file handling functionality.
D) The need to provide ever more powerful platforms for decision support applications.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
31
Languages, menus, and other facilities by which users interact with the database are collectively called a(n):

A) client.
B) user interface.
C) icon.
D) development environment.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
32
The SDLC phase in which database processing programs are created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is software used to create, maintain, and provide controlled access to databases?

A) Network operating system
B) User view
C) Database management system (DBMS)
D) Attribute
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
34
The SDLC phase in which the detailed conceptual data model is created is the ________ phase.

A) planning
B) design
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
35
Organizations that utilize the file processing approach spend as much as ________ of their IS development budget on maintenance.

A) 40 percent
B) 25 percent
C) 60 percent
D) 80 percent
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
36
The SDLC phase in which every data attribute is defined, every category of data is listed, and every business relationship between data entities is defined is called the ________ phase.

A) planning
B) design
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
37
E. F. Codd developed the relational model in the:

A) 1960s.
B) 1970s.
C) 1980s.
D) 1990s.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
38
Database development begins with ________, which establishes the range and general contents of organizational databases.

A) database design
B) cross-functional analysis
C) departmental data modeling
D) enterprise data modeling
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
39
The most common source of database failures in organizations is:

A) lack of planning.
B) inadequate budget.
C) inadequate hardware.
D) failure to implement a strong database administration function.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
40
In a file processing environment, descriptions for data and the logic for accessing the data are built into:

A) application programs.
B) database descriptors.
C) fields.
D) records.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
41
A data warehouse derives its data from:

A) on-line transactions.
B) various operational data sources.
C) reports.
D) a data mart.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
42
Development starts from scratch with the traditional file processing approach because new file formats, descriptions, and file access logic must be designed for each new program.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
43
Determining the structure of data and the relationships between data elements either right before or at the time of use of the data is called:

A) tables on write.
B) schema on write.
C) on demand paging.
D) caching.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
44
________ do NOT concentrate on determining the requirements for the database component of an information system.

A) Database analysts
B) Systems analysts
C) Programmers
D) End Users
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
45
The three-schema approach includes which of the following schemas?

A) Internal
B) Logical
C) Cross-functional
D) Dissecting
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
46
Many of the disadvantages of file processing systems can also be limitations of databases.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
47
Metadata are data that describe the properties of other data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
48
Organizations that utilize the file processing approach spend only 20 percent of development time on maintenance.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
49
A person is an example of an entity.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
50
An iterative methodology that rapidly repeats the analysis, design, and implementation phases of the SDLC is called:

A) CASE.
B) CAD.
C) RAD.
D) MST.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
51
The data that you are interested in capturing about an entity is called an instance.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
52
Databases were developed as the first application of computers to data processing.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
53
With the traditional file processing approach, each application shares data files, thus enabling much data sharing.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
54
One of the most popular RAD methods is:

A) automated design.
B) structured walkthrough.
C) prototyping.
D) crafting.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
55
A data model is a graphical system used to capture the nature and relationships among data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
56
File processing systems have been replaced by database systems in most critical business applications today.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
57
Unplanned duplicate data files are the rule rather than the exception in file processing systems.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
58
A well-structured database establishes the entities between relationships in order to derive the desired information.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
59
________ specify computer systems requirements.

A) Programmers
B) Users
C) Systems analysts
D) Database analysts
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
60
Information is processed data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
61
Personal databases are designed to support a small group of individuals working together on a project.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
62
An enterprise data model describes the scope of data for only one information system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
63
Data redundancy is used to establish relationships between data but is never used to improve database performance.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
64
A relational database establishes the relationships between entities by means of a common field.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
65
The user interface includes languages, menus, and other facilities by which users interact with various system components.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
66
Repositories are always used in file processing systems.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
67
Redundancy increases the risk of inconsistent data.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
68
The failure to implement a strong database administrative function is the most common source of database failures in organizations.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
69
A constraint is a rule in a database system that can be violated by users.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
70
A user view is how the user sees the data when it is produced.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
71
Database development begins with the design of the database.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
72
Data management technologies are also increasing often used as information systems, as a foundation for analytics or the systematic analysis of data to understand a real-world problem better.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
73
A modern database management system automates more of the backup and recovery tasks than a file system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
74
The term legacy system refers to a newly installed database management system.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
75
One reason for improved application development productivity with the database approach is that file design and low-level implementation details do not need to be handled by the application programmer.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
76
Organizational commitment to a database project is not necessary for its success.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
77
Cost and complexity are just two of the disadvantages of database processing.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
78
Separation of metadata from application programs that use the data is called data independence.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
79
Reduced program maintenance is an advantage of file processing systems.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
80
The data repository assists database administrators in enforcing standards.
Unlock Deck
Unlock for access to all 119 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 119 flashcards in this deck.