Deck 5: Database Management Systems

Full screen (f)
exit full mode
Question
Because it uses alphabetic characters,a sequential coding system is most understandable to human beings.
Use Space or
up arrow
down arrow
to flip the card.
Question
A description of a portion of a schema is referred to as a subschema.
Question
In the network database model,a child record can have more than one parent record.
Question
A check digit is a code that includes an extra digit to a code in order to check the accuracy with which the code is keyed into a computer.
Question
Both the mnemonic and the hierarchical coding schemes attach specific meaning to particular character positions.
Question
A database management system (DBMS)is a set of standalone programs designed to complicate the tasks of creating,accessing,and managing data.
Question
Data independence refers to decoupling the data from the system applications,and it is a major difference between the centralized database approach and the applications approach.
Question
The centralized database approach to data management concentrates on the process being performed,rather than on the data themselves.
Question
Another name for sequential coding is block coding.
Question
Classifying data refers to grouping or categorizing data according to some common attributes.
Question
When different information about the same fact is stored in different files the integrity of the data is violated.
Question
Business processes,such as hiring employees,purchasing inventory,and collecting cash from customers,are called events.
Question
The uniform product codes (UPCs)used by supermarkets and other retailers are examples of a block coding scheme.
Question
A DBMS is a set of integrated computer programs designed to simplify the tasks of creating,accessing,and managing a centralized database.
Question
The database management system,containing data related to all an organization's applications,supports normal data processing needs and enhances the organization's management activities by providing data useful to managers.
Question
A scanner is used to access a database and to produce inquiry reports.
Question
The centralized database approach to business event processing,in which facts about events are stored in relational database tables instead of separate files,solves many of the problems caused by data redundancy.
Question
The database administrator is responsible for administrative and technical issues related to the database management system.
Question
The applications approach to data management decouples the data from the applications or other users of the data.
Question
The traditional applications approach to business event processing concentrates on the process being performed.
Question
Data warehousing is the use of information systems facilities to focus on the collection,organization,integration,and long-term storage of entity-wide data.
Question
Update anomalies are problems in a relation table caused by the existence of functional dependencies.
Question
A table is in first normal form (1NF)if it has no partial dependencies;that is,no non-key attribute is dependent on only a portion of the primary key.
Question
An attribute is equivalent to a field and may also be known as a row.
Question
A data model for a database is often depicted using entity-relationship diagrams.
Question
An object-oriented database system is a database that allows both simple and complex objects to be stored using abstract data types.
Question
A data model depicts user requirements for data stored in a database.
Question
A table is in second normal form (2NF),if it does not contain repeating groups.
Question
A relation is in third normal form (3NF)if it is in first normal form and no nonkey attribute is dependent on only a portion of the primary key.
Question
An attribute is an item of data that characterizes an entity or relationship.
Question
An unnormalized table is a table that contains repeating attributes (or fields)within each row (or record).
Question
A secondary key uniquely identifies any row within a relational table.
Question
In a relational database model,data are logically organized into two-dimensional tables.
Question
Data redundancy allows non-technical users to bypass the programmer and to access the database directly.
Question
A partial dependency happens when an attribute that is dependent on a portion of the primary key not on the entire key.
Question
The normalization process involves the application of various rules (called normal forms)that yields relational tables that are free of anomalies.
Question
Data mining refers to the exploration,aggregation,and analysis of large quantities of varied data from across the organization.
Question
In a network database model,data are logically organized into two-dimensional tables.
Question
In a hierarchical database model,a child record may only have one parent.
Question
In a hierarchical database model,all record relationships are 3:N.
Question
The uniform product codes (UPC)used in supermarkets is a type of:

A) block code
B) serial code
C) hierarchical code
D) significant digit code
Question
Another name for sequential coding is:

A) block coding
B) serial coding
C) hierarchical coding
D) significant digit coding
Question
A postal ZIP code is an example of which of the following coding schemes?

A) block code
B) serial code
C) hierarchical code
D) significant digit code
Question
An expert system helps make complex decisions consistently.
Question
Executive information systems use complex processing and calculations to determine a solution to a problem.
Question
Group Support Systems (GSS)focus on such functions as e-mail,scheduling,and document sharing.
Question
Data warehousing and data mining are driving many new DBMS implementations.
Question
Grouping or categorizing data according to common attributes is called:

A) coding data
B) filing data
C) classifying data
D) updating data
Question
Maximum cardinality is used to specify the minimum level of participation that one entity can have with another entity.
Question
An intelligent agent is a computer-based system of hardware and software that mimics the human brain's ability to recognize patterns or predict outcomes using less-than-complete information.
Question
A neural network is a software program that may be integrated into DSS or other software tools.
Question
The coding system that is most understandable by human information processors is:

A) serial coding
B) hierarchical coding
C) block coding
D) mnemonic coding
Question
Data redundancy:

A) occurs when data is stored in multiple locations
B) is eliminated by using the applications approach
C) reduces labor and storage costs
D) improves consistency between applications
Question
A company uses a 7-digit number to identify customers.For example,the customer 1532789 indicates the following information:
Digits 1-2,state,15 = Georgia
Digit 3,type of organization,3 = government agency
Digit 4,credit terms,2 = 2/10,n/30
Digits 5-7,unique customer identifier,789
This type of coding scheme is:

A) hierarchical
B) block
C) significant digit
D) sequential
Question
Knowledge management is the process of capturing,storing,retrieving,and distributing the knowledge of the individuals in an organization for use by others in the organization to improve the quantity and/or efficiency of decision making.
Question
A spreadsheet is a typical component of a decision support system.
Question
Each relationship has a characteristic,called a cardinality that shows the degree to which each entity participates in the relationship.
Question
A record layout depicts:

A) the characters comprising a field
B) the fields comprising a record
C) the records comprising a file
D) the characters comprising a record
Question
Which of the following statements related to the event-driven approach is false?

A) It attempts to describe all aspects of business events.
B) It is also referred to as the top-down approach.
C) It focuses on how users interact with business events and processes.
D) It usually results in a better database design than the bottom-up approach.
Question
In set theory,a two-dimensional collection of information is called a relation.
Question
Which of the following advantages of the centralized database approach does not occur because of a reduction in data redundancy?

A) reduced storage costs
B) easier maintenance
C) increased data integrity
D) reduced user and programmer training
Question
Which of the following is the most likely coding scheme for college courses?

A) hierarchical coding
B) sequential coding
C) block coding
D) mnemonic coding
Question
A(n)____ reflects a system's key entities and the relationship among them.

A) data flow diagram
B) relational table
C) program flowchart
D) entity-relationship diagram
Question
The feature of a database management system that enables nontechnical users to access a database and to produce inquiry reports is the:

A) Schema
B) query language
C) Subschema
D) logical database view
Question
A data model depicts the requirements for data as specified by the:

A) database
B) enterprise
C) user
D) database administrator
Question
Which of the following statements related to events-driven systems is false?

A) In events-driven systems data is aggregated and maintained in its original form.
B) With an events-driven system management views information systems processing as a decision-support activity.
C) Organizations adopting an events-driven system are focused on capturing data for the purpose of generating reports.
D) Users should be able to access and manipulate data using their own models and their own data aggregations.
Question
With the centralized database approach to data management,we expect to have:

A) increased data storage costs
B) improved data integrity
C) increased data redundancy
D) greater difficulty in performing file maintenance
Question
Which of the following is not a function that a database management system performs?

A) Defining the data.
B) Defining the relations among data.
C) Interfacing with the operating system for storage of the data on the physical media.
D) Coordinating access to data stored in the applications programs.
Question
Which of the following statements regarding the centralized database approach to data management is false?

A) Facts about events are stored in relational database tables.
B) Users can access and manipulate data using their own models.
C) The approach eliminates many of the problems caused by data redundancy.
D) In this approach,data and applications are dependent on each other.
Question
Assigning numbers to objects in chronological sequence is known as:

A) block coding
B) mnemonic coding
C) sequential coding
D) check digit coding
Question
A resource,event,or agent about which data are collected is called:

A) an attribute
B) an entity
C) a relationship
D) a query
Question
An extra character added to a numeric code as a device to test the accuracy of data entered into a computer system is called a:

A) control digit
B) check digit
C) mnemonic digit
D) significant digit
Question
In a(n)____ database model,records are organized in a pyramid structure.

A) hierarchical
B) relational
C) network
D) object-oriented
Question
In an entity-relationship diagram,____ are used to show the characteristics of relationships.

A) squares
B) circles
C) diamonds
D) parallelograms
Question
The ____ database model works well for simple data structures,but falls apart quickly when the data becomes more complex.

A) Hierarchical
B) Relational
C) Network
D) object-oriented
Question
Decoupling the data from the system applications is a major difference between the centralized database approach and the applications approach and is known as:

A) data independence
B) data manipulation
C) data redundancy
D) query language
Question
The computer software needed to implement a database approach to data management that is not needed with the applications approach to data management is:

A) operating system software
B) database management system (DBMS)software
C) application program software
D) query language software
Question
Which of the following is not a database model discussed in Chapter 5:

A) Relational
B) Hierarchical
C) Network
D) Physical
Question
The ____ concentrates on the process being performed with data playing a secondary or supporting role.

A) database management approach
B) hierarchical data management approach
C) transaction processing approach
D) applications approach
Question
The exploration,aggregation,and analysis of large quantities of varied data from across the organization is known as:

A) data independence
B) data mining
C) data redundancy
D) data warehousing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/175
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Database Management Systems
1
Because it uses alphabetic characters,a sequential coding system is most understandable to human beings.
False
2
A description of a portion of a schema is referred to as a subschema.
True
3
In the network database model,a child record can have more than one parent record.
True
4
A check digit is a code that includes an extra digit to a code in order to check the accuracy with which the code is keyed into a computer.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
5
Both the mnemonic and the hierarchical coding schemes attach specific meaning to particular character positions.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
6
A database management system (DBMS)is a set of standalone programs designed to complicate the tasks of creating,accessing,and managing data.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
7
Data independence refers to decoupling the data from the system applications,and it is a major difference between the centralized database approach and the applications approach.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
8
The centralized database approach to data management concentrates on the process being performed,rather than on the data themselves.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
9
Another name for sequential coding is block coding.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
10
Classifying data refers to grouping or categorizing data according to some common attributes.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
11
When different information about the same fact is stored in different files the integrity of the data is violated.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
12
Business processes,such as hiring employees,purchasing inventory,and collecting cash from customers,are called events.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
13
The uniform product codes (UPCs)used by supermarkets and other retailers are examples of a block coding scheme.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
14
A DBMS is a set of integrated computer programs designed to simplify the tasks of creating,accessing,and managing a centralized database.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
15
The database management system,containing data related to all an organization's applications,supports normal data processing needs and enhances the organization's management activities by providing data useful to managers.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
16
A scanner is used to access a database and to produce inquiry reports.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
17
The centralized database approach to business event processing,in which facts about events are stored in relational database tables instead of separate files,solves many of the problems caused by data redundancy.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
18
The database administrator is responsible for administrative and technical issues related to the database management system.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
19
The applications approach to data management decouples the data from the applications or other users of the data.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
20
The traditional applications approach to business event processing concentrates on the process being performed.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
21
Data warehousing is the use of information systems facilities to focus on the collection,organization,integration,and long-term storage of entity-wide data.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
22
Update anomalies are problems in a relation table caused by the existence of functional dependencies.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
23
A table is in first normal form (1NF)if it has no partial dependencies;that is,no non-key attribute is dependent on only a portion of the primary key.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
24
An attribute is equivalent to a field and may also be known as a row.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
25
A data model for a database is often depicted using entity-relationship diagrams.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
26
An object-oriented database system is a database that allows both simple and complex objects to be stored using abstract data types.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
27
A data model depicts user requirements for data stored in a database.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
28
A table is in second normal form (2NF),if it does not contain repeating groups.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
29
A relation is in third normal form (3NF)if it is in first normal form and no nonkey attribute is dependent on only a portion of the primary key.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
30
An attribute is an item of data that characterizes an entity or relationship.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
31
An unnormalized table is a table that contains repeating attributes (or fields)within each row (or record).
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
32
A secondary key uniquely identifies any row within a relational table.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
33
In a relational database model,data are logically organized into two-dimensional tables.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
34
Data redundancy allows non-technical users to bypass the programmer and to access the database directly.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
35
A partial dependency happens when an attribute that is dependent on a portion of the primary key not on the entire key.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
36
The normalization process involves the application of various rules (called normal forms)that yields relational tables that are free of anomalies.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
37
Data mining refers to the exploration,aggregation,and analysis of large quantities of varied data from across the organization.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
38
In a network database model,data are logically organized into two-dimensional tables.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
39
In a hierarchical database model,a child record may only have one parent.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
40
In a hierarchical database model,all record relationships are 3:N.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
41
The uniform product codes (UPC)used in supermarkets is a type of:

A) block code
B) serial code
C) hierarchical code
D) significant digit code
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
42
Another name for sequential coding is:

A) block coding
B) serial coding
C) hierarchical coding
D) significant digit coding
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
43
A postal ZIP code is an example of which of the following coding schemes?

A) block code
B) serial code
C) hierarchical code
D) significant digit code
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
44
An expert system helps make complex decisions consistently.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
45
Executive information systems use complex processing and calculations to determine a solution to a problem.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
46
Group Support Systems (GSS)focus on such functions as e-mail,scheduling,and document sharing.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
47
Data warehousing and data mining are driving many new DBMS implementations.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
48
Grouping or categorizing data according to common attributes is called:

A) coding data
B) filing data
C) classifying data
D) updating data
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
49
Maximum cardinality is used to specify the minimum level of participation that one entity can have with another entity.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
50
An intelligent agent is a computer-based system of hardware and software that mimics the human brain's ability to recognize patterns or predict outcomes using less-than-complete information.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
51
A neural network is a software program that may be integrated into DSS or other software tools.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
52
The coding system that is most understandable by human information processors is:

A) serial coding
B) hierarchical coding
C) block coding
D) mnemonic coding
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
53
Data redundancy:

A) occurs when data is stored in multiple locations
B) is eliminated by using the applications approach
C) reduces labor and storage costs
D) improves consistency between applications
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
54
A company uses a 7-digit number to identify customers.For example,the customer 1532789 indicates the following information:
Digits 1-2,state,15 = Georgia
Digit 3,type of organization,3 = government agency
Digit 4,credit terms,2 = 2/10,n/30
Digits 5-7,unique customer identifier,789
This type of coding scheme is:

A) hierarchical
B) block
C) significant digit
D) sequential
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
55
Knowledge management is the process of capturing,storing,retrieving,and distributing the knowledge of the individuals in an organization for use by others in the organization to improve the quantity and/or efficiency of decision making.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
56
A spreadsheet is a typical component of a decision support system.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
57
Each relationship has a characteristic,called a cardinality that shows the degree to which each entity participates in the relationship.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
58
A record layout depicts:

A) the characters comprising a field
B) the fields comprising a record
C) the records comprising a file
D) the characters comprising a record
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following statements related to the event-driven approach is false?

A) It attempts to describe all aspects of business events.
B) It is also referred to as the top-down approach.
C) It focuses on how users interact with business events and processes.
D) It usually results in a better database design than the bottom-up approach.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
60
In set theory,a two-dimensional collection of information is called a relation.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following advantages of the centralized database approach does not occur because of a reduction in data redundancy?

A) reduced storage costs
B) easier maintenance
C) increased data integrity
D) reduced user and programmer training
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is the most likely coding scheme for college courses?

A) hierarchical coding
B) sequential coding
C) block coding
D) mnemonic coding
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)____ reflects a system's key entities and the relationship among them.

A) data flow diagram
B) relational table
C) program flowchart
D) entity-relationship diagram
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
64
The feature of a database management system that enables nontechnical users to access a database and to produce inquiry reports is the:

A) Schema
B) query language
C) Subschema
D) logical database view
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
65
A data model depicts the requirements for data as specified by the:

A) database
B) enterprise
C) user
D) database administrator
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following statements related to events-driven systems is false?

A) In events-driven systems data is aggregated and maintained in its original form.
B) With an events-driven system management views information systems processing as a decision-support activity.
C) Organizations adopting an events-driven system are focused on capturing data for the purpose of generating reports.
D) Users should be able to access and manipulate data using their own models and their own data aggregations.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
67
With the centralized database approach to data management,we expect to have:

A) increased data storage costs
B) improved data integrity
C) increased data redundancy
D) greater difficulty in performing file maintenance
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is not a function that a database management system performs?

A) Defining the data.
B) Defining the relations among data.
C) Interfacing with the operating system for storage of the data on the physical media.
D) Coordinating access to data stored in the applications programs.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following statements regarding the centralized database approach to data management is false?

A) Facts about events are stored in relational database tables.
B) Users can access and manipulate data using their own models.
C) The approach eliminates many of the problems caused by data redundancy.
D) In this approach,data and applications are dependent on each other.
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
70
Assigning numbers to objects in chronological sequence is known as:

A) block coding
B) mnemonic coding
C) sequential coding
D) check digit coding
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
71
A resource,event,or agent about which data are collected is called:

A) an attribute
B) an entity
C) a relationship
D) a query
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
72
An extra character added to a numeric code as a device to test the accuracy of data entered into a computer system is called a:

A) control digit
B) check digit
C) mnemonic digit
D) significant digit
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
73
In a(n)____ database model,records are organized in a pyramid structure.

A) hierarchical
B) relational
C) network
D) object-oriented
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
74
In an entity-relationship diagram,____ are used to show the characteristics of relationships.

A) squares
B) circles
C) diamonds
D) parallelograms
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
75
The ____ database model works well for simple data structures,but falls apart quickly when the data becomes more complex.

A) Hierarchical
B) Relational
C) Network
D) object-oriented
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
76
Decoupling the data from the system applications is a major difference between the centralized database approach and the applications approach and is known as:

A) data independence
B) data manipulation
C) data redundancy
D) query language
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
77
The computer software needed to implement a database approach to data management that is not needed with the applications approach to data management is:

A) operating system software
B) database management system (DBMS)software
C) application program software
D) query language software
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is not a database model discussed in Chapter 5:

A) Relational
B) Hierarchical
C) Network
D) Physical
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
79
The ____ concentrates on the process being performed with data playing a secondary or supporting role.

A) database management approach
B) hierarchical data management approach
C) transaction processing approach
D) applications approach
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
80
The exploration,aggregation,and analysis of large quantities of varied data from across the organization is known as:

A) data independence
B) data mining
C) data redundancy
D) data warehousing
Unlock Deck
Unlock for access to all 175 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 175 flashcards in this deck.