1. Which of the following represents an iterative process of systems development in which requirements are converted to a working system that is continually revised through close work between analysts and users? A. Agile Methodology B. Data Model C. Prototyping D. Rapid Application Development
1. Which of the following represents an iterative process of systems development in which requirements are converted to a working system that is continually revised through close work between analysts and users? A. Agile Methodology B. Data Model C. Prototyping D. Rapid Application Development
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
1. Which of the following represents an iterative process of systems development in which requirements are converted to a working system that is continually revised through close work between analysts and users?
A. Agile Methodology
B. Data Model
C. Prototyping
D. Rapid Application Development
2. The statement “stored representations of objects and events that have meaning and are of importance in the user’s environment” is known as …………
A. data
B. database
C. information
D. metadata
3. The degree of relationship where VENDORS can supply various PARTS to WAREHOUSES is classified as ……………
A. binary
B. multinary
C. ternary
D. unary
4. A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is known as………..
A. database
B. data warehouse
C. repository
D. server
5. What data type will be used to store the attribute Course for the entity STUDENT?
A. Alphanumeric
B. Decimal
C. Float
D. Integer
6. Which of the following is a limitation of the Traditional File Processing system approach?
A. Data integrity
B. Polymorphism
C. Program-data dependence
D. Unlimited data sharing
7. It is a database that represents data as a collection of tables in which all data relationships are represented by common values in related tables.
A. Automated database
B. Multi-tier database
C. Relational database
D. Structured database
8. A rule that cannot be violated by database users is called…………..
A. confidentiality
B. constraint
C. encryption
D. normalization
9. Which of the following is NOT an example of a Database Management System?
A. Microsoft Access
B. Oracle 12g
C. SQL
D. Visual Basic
10. Data that have been processed in such a way as to increase the knowledge of the person who uses the data is called……………….
A. database
B. entity-relationship diagram
C. information
D. relational database
11. Which of the following is NOT a type of database or application?
A. Enterprise Resource Planning
B. Multi-tier
C. Personal
D. Three-tier
12. A logical representation of the data for an organization or for a business area, using entities for categories of data and relationships for associations between entities is an …………….
A. attribute
B. entity-relationship model
C. entity-relationship process
D. instance
13. In a salesperson’s database, the data would include facts such as customer name, address and telephone number. This type of data is called …………
A. primary data
B. secondary data
C. structured data
D. unstructured data
14. An entity that exists independently of other entity types is known as …………...
A. partial entity
B. reference entity
C. strong entity
D. weak entity
15. Which of the following describes the properties or characteristics of end-user data and the context of those data?
A. File
B. Metadata
C. Primary data
D. Secondary data
16. A software system that is used to create, maintain and provide controlled access to user databases is known as ………..
A. database
B. database management system
C. file system
D. software system
17. Which of the following is NOT an advantage of the database approach?
A. Enforcement of standards
B. Improved data consistency
C. Program-data dependency
D. Reduced program maintenance
18. The following are all components of the database environment EXCEPT
A. CASE tools
B. DBMS
C. Repository
D. System software
19. Conceptual data modelling is done in which stage of the SDLC?
A. Analysis
B. Design
C. Implementation
D. Planning
20. What is the output of the analysis stage in the SDLC?
A. Conceptual schema
B. Data schema
C. Logical schema
D. Physical schema
21. The representation of a database for a particular data management technology is known as ……………..
A. design
B. logical schema
C. model
D. schema
22. “The analyst performs a detailed review of the transactions, reports, displays and inquiries supported by the database”. This activity is done in which phase of the SDLC?
A. Analysis
B. Design
C. Implementation
D. Maintenance
23. Which of the following is an example of a Rapid Application Development?
A. Agile methodology
B. Prototyping
C. Rapid system development
D. Software system
24. Statements that define or constrain some aspects of an organization are called ………
A. business rules
B. constraints
C. limitations
D. restrictions
25. The entity type on which the weak entity type depends on is called …………
A. entity dependant
B. identifying owner
C. identifying relationship
D. weak entity
26. Which of the following does not constitute a characteristic of an identifier?
A. Intelligent identifier
B. No intelligent identifier
C. Not be null
D. Not change in value
27. The number of entity types that participate in a relationship is known as its …………..
A. cardinality
B. degree
C. instance
D. relationship
28. Maximum cardinality is denoted by which of the following symbols?
A. Crow’s foot
B. Double dash
C. Vertical dash
D. zero
29. The state of relation that requires that certain rules regarding relationships between attributes are satisfied is known as …………..
A. functional dependency
B. integrity constraints
C. normal form
D. normalization
30. is the widely adopted standard modelling language, with much richer object
– based system, and it covers the whole development process.
a. Chen’s original system
b. Crowsfoot system
c. UML – type diagrams
d. Relational diagram
e. None of the Above
31. forms the second compartment of the Entity Relationship Diagram.
a. Entity Method
b. Attributes
c. Entity Name
d. Attribute Method
e. None of the above
32. The set of possible values for an attribute is known as?
a. Domain
b. Attribute class
c. Entity class
d. Attribute object
e. Entity object
33. can be further subdivided to yield additional attributes.
a. Simple attribute
b. Composite key
c. Composite attribute
d. Multivalued attribute
e. Compound attribute
34. To facilitate detailed queries, it is usually appropriate to change composite attributes into a series of …………….
a. Simple attributes
b. Composite keys
c. Simple keys
d. Compound attributes
e. Compound keys
35. is an attribute whose value is calculated from other attributes.
a. Deduced attribute
b. Derived attribute
c. Developed attribute
d. Domain attribute
e. None of the above
36. Thefollowingarealladvantagesofanattributethatisstored,except
………………….
a. Saves CPU processing cycles
b. Data value is readily available
c. Can be used to keep track of historical data
d. Requires constant maintenance to ensure derived value is current
e. Not sure
37. is an association between entities?
a. Participation
b. Relationship
c. Modelling
d. All the above
e. None of the above
38. What enables one to define the number of participants in relationship is called
…………
a. Constraint
b. Degree
c. Multiplicity
d. Cardinality
e. None of the above
39. An entity is existence – dependent if it has a mandatory ……….
a. Primary key
b. Composite key
c. Foreign key
d. Alternative key
e. All the above
40. exists if the primary key of the related entity does not contain the primary
key component of the parent entity
a. Non – identifying relationship
b. Weak entity
c. Strong relationship
d. Strong entity
e. None of the above
41. ………… exists when the primary key of the related entity contains a primary key component of the parent entity.
a. Strong entity
b. Non – identifying relationship
c. Strong relationship
d. Weak entity
e. None of the above
42. An entity which has a primary key that is partially or totally derived from the parent entity in the relationship is known as ……………
a. Strong entity
b. Weak entity
c. Child entity
d. Parent entity
e. Adaptive system.
43. ……… means that one entity occurrence requires a corresponding entity occurrence in a particular relationship.
a. Optional relationship
b. Strong relationship
c. Weak relationship
d. Mandatory relationship
e. Non – identifying relationship
44. A minimum of zero and a maximum of many instances of a class are associated with an instance of the other related class is represented by
a. 0..1
b. 0..*
c. 0..5
d. *
e. 1..*
45. What type of entity is composed of the primary key of each of the entities to be connected?
a. Strong entity
b. Connector entity
c. Bridge entity
d. Weak entity
e. None of the above
46. For an object within a class hierarchy to inherit the attributes and methods of a class above it there should be an ……….
a. Inheritance
b. Relationship
c. Participation
d. Association
e. None of the above
47. is used to refer to the task of creating a conceptual data model that could
be implemented in any DBMS.
a. Conceptual schema
b. External schema
c. Logical design
d. Relational schema
e. Database schema
48. What occurs when the internal model is changed without affecting the conceptual model?
a. Logical independence
b. Physical independence
c. Software independence
d. Hardware independence
e. Internal independence
49. The logical view of the relational database is facilitated by the creation of data relationships based on a logical construct known as a ………..
a. Tuple
b. Attribute
c. Relation
d. Database
e. None of the above
50. is a textual representation of the database tables, where each table is described
by its name followed by the list of its attributes in parenthesis.
a. External schema
b. Relational schema
c. Internal schema
d. Physical schema
e. Database schema
51. Which of the following are the two important properties of the relational model?
a. Optional and mandatory relationship
b. Cardinality and participation
c. Degree and cardinality
d. Constraint and restriction
e. Degree and participation
52. What happens when each primary key value within a table must be unique to ensure that each row is uniquely identified by the primary key?
a. Entity dependence
b. Entity integrity
c. Entity independence
d. Entity non-integrity
e. Entity uniqueness
53. An attribute whose value matches the primary key values in the related table is called
…...?
a. Candidate key
b. Composite key
c. Foreign key
d. Super key
e. Secondary key
54. A database table for which all foreign key values in all tables must be matched by a row in another table is said to conform to?
a. Entity integrity
b. Referential integrity
c. Entity independence
d. Referential independence
e. None of the above
55. Which one is the odd one out, when it comes to business rules?
a. Entities
b. Attributes
c. Relationships
d. Constraints
e. None of the above
56. Considering Primary key characteristics, which of the following is the odd one out?
a. No change over time
b. Preferably multivalued attribute
c. Preferably numeric
d. Security complaint
e. Nonintelligent
57. ………… develops when all of the required changes in the redundant data are not made successfully.
a. Data entry errors
b. Data inconsistency
c. Data anomaly
d. Data redundancy
e. Data inaccuracy
58. A primary key’s main function is to guarantee?
a. Entity dependence
b. Entity integrity
c. Referential integrity
d. Referential dependence
e. Entity independence
59. Data model represents the following except?
a. Data structures
b. Relationships
c. Transformation
d. Constraints
e. None of the above
60. Which of the following is NOT considered as an anomaly in normalization?
A. Deletion anomaly
B. Insertion anomaly
C. Modification anomaly
D. Update anomaly
61. Which of the following best describes known facts that can be recorded and have implicit meaning?
E. Data
F. Database
G. Database Management System
H. Database System
62. The approach used in managing data that utilizes a collection of application programs which performs services to end-users is known as …………
E. database approach
F. file-based approach
G. software development
H. systems development life cycle
63. A database system environment includes the following except ……………
E. application programs
F. end-users
G. files
H. software
64. A …………. is a centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components.
E. database
F. data warehouse
G. repository
H. server
65. What data type will be used to store the attribute Course for the entity STUDENT?
E. Alphanumeric
F. Decimal
G. Float
H. Integer
66. Which of the following is a limitation of the Traditional File Processing system approach?
E. Data integrity
F. Polymorphism
G. Program-data dependence
H. Unlimited data sharing
67. A set of concepts that describe the structure of a database and certain constraints that the database should obey is known as ………………….
E. data abstraction
F. database concepts
G. database constraints
H. data model
68. A rule that cannot be violated by database users is called…………..
E. confidentiality
F. constraint
G. encryption
H. normalization
69. A DBMS performs several important functions that guarantee the integrity and consistency of the data in the database. Which of the following is NOT one of those functions?
E. Data integrity management
F. Data reports
G. Data storage management
H. Security management
70. Which of the following is considered a data anomaly?
A. Inconsistency
B. Modification
C. Obsoletion
D. Timelines
71. A collection of related data which represents some aspect of the real world is known as ……………
E. data
F. database
G. database system
H. file
72. A logical representation of the data for an organization or for a business area, using entities for categories of data and relationships for associations between entities is an …………….
E. attribute
F. entity-relationship model
G. entity-relationship process
H. instance
73. The primary key is selected from the ……………..
E. candidate keys
F. composite keys
G. determinants
H. foreign keys
74. An entity that exists independently of other entity types is known as …………...
E. partial entity
F. reference entity
G. strong entity
H. weak entity
75. An advantage of the database management approach is…………….
A. data is dependent on programs
B. data is integrated and can be accessed by multiple programs
C. data redundancy increases
D. none of the above
76. A software system that is used to create, maintain and provide controlled access to user databases is known as ………..
E. database
F. database management system
G. file system
H. software system
77. Statements that define or constrain some aspects of an organization are called ………
E. business rules
F. constraints
G. limitations
H. restrictions
78. Which of the following is NOT considered as an anomaly in normalization?
E. Deletion anomaly
F. Insertion anomaly
G. Modification anomaly
H. Update anomaly
79. The number of entity types that participate in a relationship is known as its …………..
E. cardinality
F. degree
G. instance
H. relationship
80. Which of the following does not constitute a characteristic of an identifier?
E. Intelligent identifier
F. No intelligent identifier
G. Not be null
H. Not change in value
For each of the statements below, select either TRUE or FALSE
81. Data Definition Language is a language used to define database schemas.
E. True
F. False
82. Data Manipulation Language is a language that is used only to modify data.
E. True
F. False
83. The run-time database processor receives retrieval and update operations and carries them out on the database.
E. True
F. False
84. CASE tools are used in the design phase of database.
A. True
B. False
85. Maximum cardinality is denoted by a vertical dash.
A. True
B. False
86. Loading or import utility is a function that is provided through the normal DBMS components.
A. True
B. False
87. The query compiler component of a DBMS handles high-level queries that are entered into the database interactively.
A. True
B. False
88. Data independence is the ability to change the schema at one level of the database system without having to change the schema at the next higher level.
E. True
F. False
89. Normal form is the state of relation that requires that certain rules regarding relationships between attributes are satisfied.
E. True
F. False
90. The extended entity relationship model is sometimes referred to as the enhanced entity relationship model.
A. True
B. False
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY