Exam 5: Database Management Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Object-oriented databases:

(Multiple Choice)
4.8/5
(39)

A secondary key uniquely identifies any row within a relational table.

(True/False)
4.8/5
(38)

Which of the following is not a function that a database management system performs?

(Multiple Choice)
4.9/5
(36)

A scanner is used to access a database and to produce inquiry reports.

(True/False)
4.9/5
(38)

A relation that is in ____ form contains repeating attributes within each row or record.

(Multiple Choice)
4.9/5
(41)

Decoupling the data from the system applications is a major difference between the centralized database approach and the applications approach and is known as:

(Multiple Choice)
4.8/5
(26)

A relation is in third normal form (3NF) if it is in first normal form and no nonkey attribute is dependent on only a portion of the primary key.

(True/False)
4.8/5
(34)

A postal ZIP code is an example of which of the following coding schemes?

(Multiple Choice)
4.9/5
(35)

The principal difference between an executive information system (EIS) and a decision support system (DSS) is that an EIS:

(Multiple Choice)
4.9/5
(40)

Which of the following statements about expert systems (ES) is false:

(Multiple Choice)
4.8/5
(36)

A description of a portion of a schema is referred to as a subschema.

(True/False)
4.7/5
(38)

In an entity-relationship diagram, ____ are used to show the characteristics of relationships.

(Multiple Choice)
5.0/5
(36)

Primary key ______________________________ in a relational table must be a unique identifier for a row.

(Short Answer)
4.9/5
(34)

In a hierarchical database model, a child record may only have one parent.

(True/False)
4.8/5
(42)

List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples. List 1 - Coding Schemes A. Sequential (serial) B. Block C. Significant digit D.Hierarchica E.Mnemonic F.Checkdigit  List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples.   \begin{array}{c} \begin{array}{lll} \text{List 1 - Coding Schemes}\\ \hline A. \quad \text{Sequential (serial)}\\ B.  \quad \text{Block}\\ C.  \quad \text{Significant digit}\\ \end{array} \begin{array}{lll} &&& \end{array} \begin{array}{lll} \\ D. \quad Hierarchica\\ E. \quad Mnemonic\\ F. \quad Check digit\\ \end{array} \end{array}    Required: On your solution sheet, list the numbers 1 through 8 from List 2. Next to each number, show the capital letter from List 1 that best describes the coding type represented by each example. HINT: Some letters from List 1 may be used for more than one coding example, while some letters may not be used at all. Required: On your solution sheet, list the numbers 1 through 8 from List 2. Next to each number, show the capital letter from List 1 that best describes the coding type represented by each example. HINT: Some letters from List 1 may be used for more than one coding example, while some letters may not be used at all.

(Essay)
4.7/5
(42)

A neural network is a software program that may be integrated into DSS or other software tools.

(True/False)
4.9/5
(31)

When different information about the same fact is stored in different files the integrity of the data is violated.

(True/False)
4.7/5
(40)

A software program that may be integrated into DSS or other software tools is a(n):

(Multiple Choice)
4.8/5
(31)

Of the following options, a database that is in ____ form has the best design.

(Multiple Choice)
4.8/5
(31)

The traditional applications approach to business event processing concentrates on the process being performed.

(True/False)
5.0/5
(39)
Showing 41 - 60 of 175
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)