Exam 8: Data Modeling and Analysis
Exam 1: The Context of Systems Analysis and Design Methods130 Questions
Exam 2: Information System Building Blocks81 Questions
Exam 3: Information Systems Development113 Questions
Exam 4: Project Management97 Questions
Exam 5: Systems Analysis161 Questions
Exam 6: Fact-Finding Techniques for Requirements Discovery166 Questions
Exam 7: Modeling System Requirements With Use Cases75 Questions
Exam 8: Data Modeling and Analysis173 Questions
Exam 9: Process Modeling231 Questions
Exam 10: Object-Oriented Analysis and Modeling Using the Uml125 Questions
Exam 11: Feasibility Analysis and the System Proposal149 Questions
Exam 12: Systems Design120 Questions
Exam 13: Application Architecture and Modeling170 Questions
Exam 14: Database Design268 Questions
Exam 15: Output Design and Prototyping101 Questions
Exam 16: Input Design and Prototyping148 Questions
Exam 17: User Interface Design75 Questions
Exam 18: Object-Oriented Design and Modeling Using the UML100 Questions
Exam 19: Systems Construction and Implementation60 Questions
Exam 20: Systems Operations and Support63 Questions
Select questions type
During requirements analysis, what order of model development is used to arrive at the logical data model?
(Multiple Choice)
4.9/5
(35)
A foreign key in the parent entity always matches the primary key in the child entity.
(True/False)
4.9/5
(41)
In ________________________ codes , each digit or group of digits describes a measurable or identifiable characteristic of the entity instance.
(Short Answer)
4.8/5
(40)
Which of the following is NOT a source for entity discovery?
(Multiple Choice)
4.8/5
(36)
The authors of your textbook recommend the use of intelligent keys since they can be quickly processed by humans without the assistance of a computer.
(True/False)
4.8/5
(35)
Another name for an alternate key is _____________________________ key.
(Short Answer)
4.8/5
(38)
Nonidentifying relationships are those in which each of the participating entities has its own independent primary key. That is, none of the primary key attributes is shared.
(True/False)
4.9/5
(31)
A recursive relationship is a relationship with a degree of infinity, because there is no limit to how many entities participate in the relationship.
(True/False)
4.9/5
(37)
A data-to-location CRUD matrix is a table in which the rows indicate entities (and possible attributes); the columns indicate locations; and the cells (the intersection of the rows and columns) document level of access where C=create; R=read; U=update; and D=delete or deactivate.
(True/False)
4.8/5
(46)
Hierarchical codes provide a top-down interpretation for an entity instance by factoring an item into its group, subgroup and so forth.
(True/False)
4.8/5
(39)
A key is an attribute or group of attributes that assumes a unique value for each entity instance. It is sometimes called the domain of the attribute.
(True/False)
4.8/5
(38)
The data model for a single information system is usually called an application data model.
(True/False)
4.8/5
(41)
A compound attribute is one that actually consists of other attributes that are logically grouped together.
(True/False)
4.8/5
(43)
________________________________ defines the minimum and maximum number of occurrences of one entity for a single occurrence of the related entity.
(Short Answer)
4.8/5
(25)
Data modeling is a technique for organizing and documenting a system's logical and physical models.
(True/False)
4.9/5
(43)
The requirements analysis results in a logical data model that is developed in stages as follows: (1) context data model; (2) key-based data model; (3) fully attributed data model; and (4) the normalized data model.
(True/False)
4.9/5
(37)
Showing 141 - 160 of 173
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)