Deck 9: Data Design

Full screen (f)
exit full mode
Question
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.
Use Space or
up arrow
down arrow
to flip the card.
Question
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
Question
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.

A)data logger framework
B)database management system
C)integrated development environment
D)advanced host controller system
Question
Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
Question
Like a primary key, a foreign key must be unique.
Question
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Question
Cipher codes distinguish items by using a series of subgroups of digits.
Question
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.
Question
A web-based data design requires users to have powerful workstations.
Question
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
Question
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.
Question
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
Question
Web-based designs are dependent on a specific combination of hardware and software.
Question
The three normal forms constitute a progression in which the second normal form represents the best design.
Question
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.
Question
In a table or file, each column represents a record and each row represents a field.
Question
A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.

A)data structure
B)dataroster
C)data object
D)data log
Question
A primary key is composed of exactly two fields.
Question
A common field is an attribute that appears in only one entity.
Question
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
Question
Any field that is not a primary key or a candidate key is called a _____.

A)no-frills field
B)nonkey field
C)secondary field
D)foreign field
Question
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Question
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.

A)viewport
B)schema
C)framework
D)cell
Question
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.

A)procedural language
B)query by example language
C)query language
D)imperative language
Question
In an entity-relationship diagram, entities are commonly represented as _____.

A)triangles
B)circles
C)rectangles
D)hexagons
Question
<strong>  In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.</strong> A)primary key B)secondary key C)candidate key D)foreign key <div style=padding-top: 35px>
In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

A)primary key
B)secondary key
C)candidate key
D)foreign key
Question
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

A)ActiveX data object (ADO)
B)Java virtual connector (JVC)
C)Open database connectivity (ODBC)
D)Open embedded connectivity (OEC)
Question
<strong>  In the accompanying figure, any field that serves as a primary key is called a _____.</strong> A)candidate key B)secondary key C)combination key D)foreign key <div style=padding-top: 35px>
In the accompanying figure, any field that serves as a primary key is called a _____.

A)candidate key
B)secondary key
C)combination key
D)foreign key
Question
During the systems design phase, _____ are used to organize, access, and maintain data structures.

A)glossary fields
B)common fields
C)content fields
D)key fields
Question
The inherent efficiency of high-volume processing on larger computers is called _____.

A)monopoly
B)economy of scope
C)cardinality
D)economy of scale
Question
With a _____, users provide an example of the data requested.

A)query language
B)data table
C)query by example language
D)data frame
Question
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.

A)Java runtime environment (JRE)
B)Java eclipse framework connectivity (JEFC)
C)Java virtual machine (JVM)
D)Java database connectivity (JDBC)
Question
A _____ controls database operations, including storing, retrieving, updating, and deleting data.

A)data manipulation language
B)data device language
C)data definition language
D)data query language
Question
If a primary key combines two or more fields, then it is called a _____.

A)foreign key
B)composite key
C)dedicated key
D)candidate key
Question
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.

A)candidate integrity
B)foreign integrity
C)referential integrity
D)combinatorial integrity
Question
To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.

A)middleware
B)stack
C)server
D)firmware
Question
<strong>  In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.</strong> A)secondary key B)candidate key C)combination key D)foreign key <div style=padding-top: 35px>
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

A)secondary key
B)candidate key
C)combination key
D)foreign key
Question
Typically, a database management system is managed by a person called _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.

A)database administrator
B)business intelligence analyst
C)database consumer
D)big data analyst
Question
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

A)entity-relationship diagram (ERD)
B)illustration flow chart
C)query relationship diagram (QRD)
D)data chart
Question
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.

A)no-frills key
B)super key
C)secondary key
D)foreign key
Question
Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.

A)distinct notation format
B)multifaceted notation format
C)viewport notation format
D)standard notation format
Question
_____ are numbers or letters assigned in a specific order.

A)Sequence codes
B)Category codes
C)Significant digit codes
D)Derivation codes
Question
_____ use a keyword to encode a number.

A)Cipher codes
B)Identifier codes
C)Action codes
D)Associative codes
Question
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.

A)second normal form
B)zeroth normal form
C)third normal form
D)fourth normal form
Question
A table design that contains a repeating group is called _____.

A)normalized
B)unnormalized
C)unsynchronized
D)synchronized
Question
The data mining technique that relies on association rule learning is often called _____.

A)simulated analysis
B)virtual storage analysis
C)strategy-oriented analysis
D)market basket analysis
Question
A _____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.

A)data mart
B)data frame
C)pseudo-data
D)metadata
Question
_____ combine data from different item attributes, or characteristics, to build a code.

A)Sequence codes
B)Category codes
C)Significant digit codes
D)Derivation codes
Question
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.

A)Encapsulation
B)Normalization
C)Abstraction
D)Encryption
Question
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.

A)ASCII (American Standard Code for Information Interchange)
B)EBCDIC (Extended Binary Coded Decimal Interchange Code)
C)Unicode
D)ISO (International Organization for Standardization)
Question
A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.

A)data warehouse
B)data frame
C)pseudo-data
D)metadata
Question
_____, a coding method that uses one byte per character, is used on most personal computers.

A)ASCII (American Standard Code for Information Interchange)
B)EBCDIC (Extended Binary Coded Decimal Interchange Code)
C)Unicode
D)ISO (International Organization for Standardization) 10646
Question
A table is in _____ if it does not contain a repeating group.

A)second normal form
B)first normal form
C)third normal form
D)fourth normal form
Question
_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

A)Logical storage
B)Virtual storage
C)Simulated storage
D)Physical storage
Question
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

A)big O notation
B)dark resistor's notation
C)crow's foot notation
D)hash topology notation
Question
A _____ is a set of letters or numbers that represents a data item.

A)business glossary
B)data dictionary
C)mnemonic
D)code
Question
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

A)12
B)24
C)30
D)32
Question
A _____ specifies the fields and identifies the primary key in a particular file.

A)frame design
B)table design
C)viewport
D)window
Question
Binary digits have only _____ possible value(s).

A)one
B)two
C)three
D)four
Question
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.

A)harmonic
B)sequence
C)mnemonic
D)rhapsodic
Question
Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest Eamon to use?

A)Cipher code
B)Mnemonic code
C)Action code
D)Derivation code
Question
Which of the following are the advantages of a DBMS (database management system)?

A)Database systems can support enterprise-wide applicationsmore effectively than file processing systems.
B)Effective database administration helps ensure that standardsfor data names, formats, and documentation are followed uniformlythroughout an organization.
C)A DBMS is scalable which makes iteasier to meetthe rapidly changing needs of a business enterprise.
D)Systems that interact with a DBMS are relatively dependentof how the physical data is maintained.
Question
EBCDIC and ASCII both require _____ bits for storage of each character.

A)six
B)eight
C)twelve
D)sixteen
Question
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A set of rules that avoids data inconsistency and quality problems
Question
In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup.

A)recovery procedures
B)market basket analysis
C)crow's foot notation
D)a standard notation format​
Question
Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?

A)Significant digit code
B)Block sequence code
C)Sequence code
D)Action code
Question
In a web-based design, the Internet serves as the _____ for the database management system.

A)front end
B)back end
C)middleware
D)interface
Question
Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.

A)Primary key
B)Secondary key
C)Foreign key
D)Super key
Question
A combination key can also be called a _____.

A)composite key
B)concatenated key
C)foreign key
D)multivalued key
Question
At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____.

A)Y2K issue
B)H2R issue
C)2D issue
D)​2DGT issue
Question
Compared with character-based formats, a _____ offers a more efficient storage method.

A)foreign storage format
B)unary storage format
C)tertiary storage format
D)binary storage format
Question
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____.

A)two digits for the year, two for the month, and two for the day (YYMMDD)
B)two digits for the day, two for the month, and four for the year (DDMMYYYY)
C)four digits for the year, two for the month, and two for the day (YYYYMMDD)
D)four digits for the year, two for the month, and four for the day (YYYYMMDDDD)
Question
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram
Question
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
Defines only those portions of the database that a particular system or user needs or is allowed to access
Question
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables
Question
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A person, place, thing, or event for which data is collected and maintained
Question
Each _____ contains data about people, places, things, or events.

A)nonkey field
B)table
C)cardinality notation
D)file
Question
Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key?

A)Candidate key
B)Ancillary key
C)Foreign key
D)Multifaceted key
Question
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

A)Encapsulation
B)Normalization
C)Standardization
D)Encryption
Question
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A coding method used on mainframe computers and high-capacity servers
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Data Design
1
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.
True
2
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
True
3
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.

A)data logger framework
B)database management system
C)integrated development environment
D)advanced host controller system
B
4
Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
Like a primary key, a foreign key must be unique.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Cipher codes distinguish items by using a series of subgroups of digits.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
A web-based data design requires users to have powerful workstations.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
Web-based designs are dependent on a specific combination of hardware and software.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
The three normal forms constitute a progression in which the second normal form represents the best design.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
In a table or file, each column represents a record and each row represents a field.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.

A)data structure
B)dataroster
C)data object
D)data log
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
A primary key is composed of exactly two fields.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
A common field is an attribute that appears in only one entity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
Any field that is not a primary key or a candidate key is called a _____.

A)no-frills field
B)nonkey field
C)secondary field
D)foreign field
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.

A)viewport
B)schema
C)framework
D)cell
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.

A)procedural language
B)query by example language
C)query language
D)imperative language
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
In an entity-relationship diagram, entities are commonly represented as _____.

A)triangles
B)circles
C)rectangles
D)hexagons
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
<strong>  In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.</strong> A)primary key B)secondary key C)candidate key D)foreign key
In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

A)primary key
B)secondary key
C)candidate key
D)foreign key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

A)ActiveX data object (ADO)
B)Java virtual connector (JVC)
C)Open database connectivity (ODBC)
D)Open embedded connectivity (OEC)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
<strong>  In the accompanying figure, any field that serves as a primary key is called a _____.</strong> A)candidate key B)secondary key C)combination key D)foreign key
In the accompanying figure, any field that serves as a primary key is called a _____.

A)candidate key
B)secondary key
C)combination key
D)foreign key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
During the systems design phase, _____ are used to organize, access, and maintain data structures.

A)glossary fields
B)common fields
C)content fields
D)key fields
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
The inherent efficiency of high-volume processing on larger computers is called _____.

A)monopoly
B)economy of scope
C)cardinality
D)economy of scale
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
With a _____, users provide an example of the data requested.

A)query language
B)data table
C)query by example language
D)data frame
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.

A)Java runtime environment (JRE)
B)Java eclipse framework connectivity (JEFC)
C)Java virtual machine (JVM)
D)Java database connectivity (JDBC)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
A _____ controls database operations, including storing, retrieving, updating, and deleting data.

A)data manipulation language
B)data device language
C)data definition language
D)data query language
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
If a primary key combines two or more fields, then it is called a _____.

A)foreign key
B)composite key
C)dedicated key
D)candidate key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.

A)candidate integrity
B)foreign integrity
C)referential integrity
D)combinatorial integrity
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.

A)middleware
B)stack
C)server
D)firmware
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
<strong>  In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.</strong> A)secondary key B)candidate key C)combination key D)foreign key
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

A)secondary key
B)candidate key
C)combination key
D)foreign key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
Typically, a database management system is managed by a person called _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.

A)database administrator
B)business intelligence analyst
C)database consumer
D)big data analyst
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

A)entity-relationship diagram (ERD)
B)illustration flow chart
C)query relationship diagram (QRD)
D)data chart
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.

A)no-frills key
B)super key
C)secondary key
D)foreign key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.

A)distinct notation format
B)multifaceted notation format
C)viewport notation format
D)standard notation format
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
_____ are numbers or letters assigned in a specific order.

A)Sequence codes
B)Category codes
C)Significant digit codes
D)Derivation codes
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
_____ use a keyword to encode a number.

A)Cipher codes
B)Identifier codes
C)Action codes
D)Associative codes
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.

A)second normal form
B)zeroth normal form
C)third normal form
D)fourth normal form
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
A table design that contains a repeating group is called _____.

A)normalized
B)unnormalized
C)unsynchronized
D)synchronized
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
The data mining technique that relies on association rule learning is often called _____.

A)simulated analysis
B)virtual storage analysis
C)strategy-oriented analysis
D)market basket analysis
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
A _____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.

A)data mart
B)data frame
C)pseudo-data
D)metadata
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
_____ combine data from different item attributes, or characteristics, to build a code.

A)Sequence codes
B)Category codes
C)Significant digit codes
D)Derivation codes
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.

A)Encapsulation
B)Normalization
C)Abstraction
D)Encryption
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.

A)ASCII (American Standard Code for Information Interchange)
B)EBCDIC (Extended Binary Coded Decimal Interchange Code)
C)Unicode
D)ISO (International Organization for Standardization)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.

A)data warehouse
B)data frame
C)pseudo-data
D)metadata
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
_____, a coding method that uses one byte per character, is used on most personal computers.

A)ASCII (American Standard Code for Information Interchange)
B)EBCDIC (Extended Binary Coded Decimal Interchange Code)
C)Unicode
D)ISO (International Organization for Standardization) 10646
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
A table is in _____ if it does not contain a repeating group.

A)second normal form
B)first normal form
C)third normal form
D)fourth normal form
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

A)Logical storage
B)Virtual storage
C)Simulated storage
D)Physical storage
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

A)big O notation
B)dark resistor's notation
C)crow's foot notation
D)hash topology notation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
A _____ is a set of letters or numbers that represents a data item.

A)business glossary
B)data dictionary
C)mnemonic
D)code
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

A)12
B)24
C)30
D)32
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
A _____ specifies the fields and identifies the primary key in a particular file.

A)frame design
B)table design
C)viewport
D)window
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
Binary digits have only _____ possible value(s).

A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.

A)harmonic
B)sequence
C)mnemonic
D)rhapsodic
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest Eamon to use?

A)Cipher code
B)Mnemonic code
C)Action code
D)Derivation code
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following are the advantages of a DBMS (database management system)?

A)Database systems can support enterprise-wide applicationsmore effectively than file processing systems.
B)Effective database administration helps ensure that standardsfor data names, formats, and documentation are followed uniformlythroughout an organization.
C)A DBMS is scalable which makes iteasier to meetthe rapidly changing needs of a business enterprise.
D)Systems that interact with a DBMS are relatively dependentof how the physical data is maintained.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
EBCDIC and ASCII both require _____ bits for storage of each character.

A)six
B)eight
C)twelve
D)sixteen
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A set of rules that avoids data inconsistency and quality problems
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup.

A)recovery procedures
B)market basket analysis
C)crow's foot notation
D)a standard notation format​
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?

A)Significant digit code
B)Block sequence code
C)Sequence code
D)Action code
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
In a web-based design, the Internet serves as the _____ for the database management system.

A)front end
B)back end
C)middleware
D)interface
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.

A)Primary key
B)Secondary key
C)Foreign key
D)Super key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
A combination key can also be called a _____.

A)composite key
B)concatenated key
C)foreign key
D)multivalued key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____.

A)Y2K issue
B)H2R issue
C)2D issue
D)​2DGT issue
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
Compared with character-based formats, a _____ offers a more efficient storage method.

A)foreign storage format
B)unary storage format
C)tertiary storage format
D)binary storage format
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____.

A)two digits for the year, two for the month, and two for the day (YYMMDD)
B)two digits for the day, two for the month, and four for the year (DDMMYYYY)
C)four digits for the year, two for the month, and two for the day (YYYYMMDD)
D)four digits for the year, two for the month, and four for the day (YYYYMMDDDD)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
Defines only those portions of the database that a particular system or user needs or is allowed to access
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A person, place, thing, or event for which data is collected and maintained
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
Each _____ contains data about people, places, things, or events.

A)nonkey field
B)table
C)cardinality notation
D)file
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key?

A)Candidate key
B)Ancillary key
C)Foreign key
D)Multifaceted key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

A)Encapsulation
B)Normalization
C)Standardization
D)Encryption
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
Matching
​Identify the letters of the choices that best match the phrases or definitions.
a.Unified Modeling Language (UML)
b.Cardinality
c.Foreign key
d.Data mining
e.Referential integrity
f.Subschema
g.Extended Binary Coded Decimal Interchange Code (EBCDIC)
h.Entity
i.Logical record
j.Logical storage
A coding method used on mainframe computers and high-capacity servers
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 86 flashcards in this deck.