Deck 1: The Database Environment and Development Process
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/116
Play
Full screen (f)
Deck 1: The Database Environment and Development Process
1
A rule that CANNOT be violated by database users is called a:
A) password.
B) constraint.
C) program.
D) view.
A) password.
B) constraint.
C) program.
D) view.
B
2
The most common source of database failures in organizations is:
A) lack of planning.
B) inadequate budget.
C) inadequate hardware.
D) failure to implement a strong database administration function.
A) lack of planning.
B) inadequate budget.
C) inadequate hardware.
D) failure to implement a strong database administration function.
D
3
________ are established between entities in a well-structured database so that the desired information can be retrieved.
A) Entities
B) Relationships
C) Lines
D) Ties
A) Entities
B) Relationships
C) Lines
D) Ties
B
4
Program-data dependence is caused by:
A) file descriptions being stored in each database application.
B) data descriptions being stored on a server.
C) data descriptions being written into programming code.
D) data cohabiting with programs.
A) file descriptions being stored in each database application.
B) data descriptions being stored on a server.
C) data descriptions being written into programming code.
D) data cohabiting with programs.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.
A) enterprise view
B) reporting document
C) user view
D) user snapshot
A) enterprise view
B) reporting document
C) user view
D) user snapshot
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
6
Which organizational function should set database standards?
A) Management
B) Application development
C) Technical services
D) Database Administration
A) Management
B) Application development
C) Technical services
D) Database Administration
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
7
A database is an organized collection of ________ related data.
A) logically
B) physically
C) loosely
D) badly
A) logically
B) physically
C) loosely
D) badly
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
8
________ is a tool even non-programmers can use to access information from a database.
A) ODBC
B) Structured query language
C) ASP
D) Data manipulation query language
A) ODBC
B) Structured query language
C) ASP
D) Data manipulation query language
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
9
Older systems that often contain data of poor quality are called ________ systems.
A) controlled
B) legacy
C) database
D) mainframe
A) controlled
B) legacy
C) database
D) mainframe
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
10
Relational databases establish the relationships between entities by means of common fields included in a file called a(n):
A) entity.
B) relationship.
C) relation.
D) association.
A) entity.
B) relationship.
C) relation.
D) association.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT an advantage of database systems?
A) Redundant data
B) Program-data independence
C) Better data quality
D) Reduced program maintenance
A) Redundant data
B) Program-data independence
C) Better data quality
D) Reduced program maintenance
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
12
With the database approach, data descriptions are stored in a central location known as a:
A) server.
B) mainframe.
C) PC.
D) repository.
A) server.
B) mainframe.
C) PC.
D) repository.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
13
All of the following are primary purposes of a database management system (DBMS) EXCEPT:
A) creating data.
B) updating data.
C) storing data.
D) providing an integrated development environment.
A) creating data.
B) updating data.
C) storing data.
D) providing an integrated development environment.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
14
A user view is:
A) what a user sees when he or she looks out the window.
B) a table or set of tables.
C) a logical description of some portion of the database.
D) a procedure stored on the server.
A) what a user sees when he or she looks out the window.
B) a table or set of tables.
C) a logical description of some portion of the database.
D) a procedure stored on the server.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
15
A graphical system used to capture the nature and relationships among data is called a(n):
A) XML data model.
B) hypertext graphic.
C) relational database
D) data model.
A) XML data model.
B) hypertext graphic.
C) relational database
D) data model.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
16
A person, place, object, event, or concept about which the organization wishes to maintain data is called a(n):
A) relationship.
B) object.
C) attribute.
D) entity.
A) relationship.
B) object.
C) attribute.
D) entity.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
17
In a file processing environment, descriptions for data and the logic for accessing the data are built into:
A) application programs.
B) database descriptors.
C) fields.
D) records.
A) application programs.
B) database descriptors.
C) fields.
D) records.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
18
Because applications are often developed independently in file processing systems:
A) the data is always non-redundant.
B) unplanned duplicate data files are the rule rather than the exception.
C) data can always be shared with others.
D) there is a large volume of file I/O.
A) the data is always non-redundant.
B) unplanned duplicate data files are the rule rather than the exception.
C) data can always be shared with others.
D) there is a large volume of file I/O.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
19
Data that describe the properties of other data are:
A) relationships.
B) logical.
C) physical.
D) metadata.
A) relationships.
B) logical.
C) physical.
D) metadata.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
20
All of the following are properties of metadata EXCEPT:
A) data definitions.
B) processing logic.
C) rules or constraints.
D) data structures.
A) data definitions.
B) processing logic.
C) rules or constraints.
D) data structures.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is NOT a cost and/or risk of the database approach?
A) Specialized personnel
B) Cost of conversion
C) Improved responsiveness
D) Organizational conflict
A) Specialized personnel
B) Cost of conversion
C) Improved responsiveness
D) Organizational conflict
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
22
Database development begins with ________, which establishes the range and general contents of organizational databases.
A) database design
B) cross-functional analysis
C) departmental data modeling
D) enterprise data modeling
A) database design
B) cross-functional analysis
C) departmental data modeling
D) enterprise data modeling
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is software used to create, maintain, and provide controlled access to databases?
A) Network operating system
B) User view
C) Database management system (DBMS)
D) Attribute
A) Network operating system
B) User view
C) Database management system (DBMS)
D) Attribute
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
24
Organizing the database in computer disk storage is done in the ________ phase.
A) design
B) maintenance
C) analysis
D) implementation
A) design
B) maintenance
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
25
The SDLC phase in which every data attribute is defined, every category of data is listed and every business relationship between data entities is defined is called the ________ phase.
A) planning
B) design
C) analysis
D) implementation
A) planning
B) design
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
26
A knowledge base of information or facts about an enterprise is called a(n):
A) enterprise information system.
B) repository.
C) systems information unit.
D) database process.
A) enterprise information system.
B) repository.
C) systems information unit.
D) database process.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
27
The period that can be considered a "proof of concept" time was the:
A) 1950s.
B) 1960s.
C) 1970s.
D) 1990s.
A) 1950s.
B) 1960s.
C) 1970s.
D) 1990s.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
28
Organizations that utilize the file processing approach spend as much as ________ of their IS development budget on maintenance.
A) 40 percent
B) 25 percent
C) 60 percent
D) 80 percent
A) 40 percent
B) 25 percent
C) 60 percent
D) 80 percent
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
29
A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is called a(n):
A) index.
B) data warehouse.
C) repository.
D) database management system.
A) index.
B) data warehouse.
C) repository.
D) database management system.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
30
A relatively small team of people who collaborate on the same project is called a:
A) server group.
B) workgroup.
C) data collaborative.
D) typical arrangement.
A) server group.
B) workgroup.
C) data collaborative.
D) typical arrangement.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
31
The need for consensus on data definitions is an example of which type of risk in the database environment?
A) Specialized personnel needs
B) Organizational conflict
C) Conversion costs
D) Legacy systems
A) Specialized personnel needs
B) Organizational conflict
C) Conversion costs
D) Legacy systems
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
32
One of the most popular RAD methods is:
A) automated design.
B) structured walkthrough.
C) prototyping.
D) crafting.
A) automated design.
B) structured walkthrough.
C) prototyping.
D) crafting.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
33
The SDLC phase in which the detailed conceptual data model is created is the ________ phase.
A) planning
B) design
C) analysis
D) implementation
A) planning
B) design
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
34
E. F. Codd developed the relational model in the:
A) 1960s.
B) 1970s.
C) 1980s.
D) 1990s.
A) 1960s.
B) 1970s.
C) 1980s.
D) 1990s.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
35
A workgroup database is stored on a central device called a:
A) client.
B) server.
C) remote PC.
D) network.
A) client.
B) server.
C) remote PC.
D) network.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
36
The traditional methodology used to develop, maintain and replace information systems is called the:
A) Enterprise Resource Model.
B) Systems Development Life Cycle.
C) Unified Model.
D) Systems Deployment Life Cycle.
A) Enterprise Resource Model.
B) Systems Development Life Cycle.
C) Unified Model.
D) Systems Deployment Life Cycle.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is NOT an objective that drove the development and evolution of database technology?
A) The need to provide greater independence between programs and data
B) The desire to manage increasing complex data types and structures
C) The desire to require programmers to write all file handling functionality
D) The need to provide ever more powerful platforms for decision support applications
A) The need to provide greater independence between programs and data
B) The desire to manage increasing complex data types and structures
C) The desire to require programmers to write all file handling functionality
D) The need to provide ever more powerful platforms for decision support applications
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
38
The SDLC phase in which database processing programs are created is the ________ phase.
A) planning
B) design
C) analysis
D) implementation
A) planning
B) design
C) analysis
D) implementation
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
39
An iterative methodology that rapidly repeats the analysis, design, and implementation phases of the SDLC is called:
A) CASE.
B) CAD.
C) RAD.
D) MST.
A) CASE.
B) CAD.
C) RAD.
D) MST.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
40
Languages, menus, and other facilities by which users interact with the database are collectively called a(n):
A) client.
B) user interface.
C) icon.
D) development environment.
A) client.
B) user interface.
C) icon.
D) development environment.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
41
Development starts from scratch with the traditional file processing approach because new file formats, descriptions, and file access logic must be designed for each new program.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
42
A relational database establishes the relationships between entities by means of a common field.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
43
A well-structured database establishes the entities between relationships in order to derive the desired information.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
44
________ analyze the business situation and identify the need for information and information services to meet the problems or opportunities of the business.
A) Programmers
B) Users
C) Systems analysts
D) Database analysts
A) Programmers
B) Users
C) Systems analysts
D) Database analysts
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
45
Separation of metadata from application programs that use the data is called data independence.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
46
The data that you are interested in capturing about an entity is called an instance.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
47
With the traditional file processing approach, each application shares data files, thus enabling much data sharing.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
48
________ is the most popular RDMS data model notation.
A) ERD
B) END
C) DRE
D) RED
A) ERD
B) END
C) DRE
D) RED
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
49
Information is processed data.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
50
The three-schema approach includes which of the following schemas?
A) Internal
B) Logical
C) Cross-functional
D) Dissecting
A) Internal
B) Logical
C) Cross-functional
D) Dissecting
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
51
Many of the disadvantages of file processing systems can also be limitations of databases.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
52
Organizations that utilize the file processing approach spend only 20 percent of development time on maintenance.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
53
File processing systems have been replaced by database systems in most critical business applications today.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
54
A person is an example of an entity.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
55
________ do NOT concentrate on determining the requirements for the database component of an information system.
A) Database analysts
B) Systems analysts
C) Programmers
D) End Users
A) Database analysts
B) Systems analysts
C) Programmers
D) End Users
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
56
Unplanned duplicate data files are the rule rather than the exception in file processing systems.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
57
A data warehouse derives its data from:
A) on-line transactions.
B) various operational data sources.
C) reports.
D) a datamart.
A) on-line transactions.
B) various operational data sources.
C) reports.
D) a datamart.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
58
A data model is a graphical system used to capture the nature and relationships among data.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
59
Databases were developed as the first application of computers to data processing.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
60
Metadata are data that describe the properties of other data.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
61
The data repository assists database administrators in enforcing standards.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
62
An enterprise data model describes the scope of data for only one information system.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
63
Repositories are always used in file processing systems.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
64
Database development projects are never done in a bottom-up fashion.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
65
The user interface includes languages, menus, and other facilities by which users interact with various system components.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
66
A modern database management system automates more of the backup and recovery tasks than a file system.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
67
A user view is how the user sees the data when it is produced.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
68
The steps of the systems development life cycle can only be viewed as a linear process.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
69
Personal databases are designed to support a small group of individuals working together on a project.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
70
One reason for improved application development productivity with the database approach is that file design and low-level implementation details do not need to be handled by the application programmer.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
71
Data redundancy is used to establish relationships between data but is never used to improve database performance.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
72
Cost and complexity are just two of the disadvantages of database processing.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
73
The systems development life cycle is the traditional methodology used to develop, maintain, and replace information systems.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
74
Database development begins with the design of the database.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
75
Redundancy increases the risk of inconsistent data.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
76
Reduced program maintenance is an advantage of file processing systems.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
77
A constraint is a rule in a database system that can be violated by users.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
78
The term legacy system refers to a newly installed database management system.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
79
Organizational commitment to a database project is not necessary for its success.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck
80
The failure to implement a strong database administrative function is the most common source of database failures in organizations.
Unlock Deck
Unlock for access to all 116 flashcards in this deck.
Unlock Deck
k this deck