CIS CHAPTER EXAM|Latest Questions with Complete Answers
2 views 0 purchase
Course
CIS 105
Institution
CIS 105
CIS CHAPTER EXAM|Latest Questions with Complete Answers
Which one of the following statements does not apply to the database approach?
a. Database systems have data independence; that is, the data and the programs are maintained separately, except during processing.
b. Database management syste...
CIS CHAPTER EXAM|Latest Questions with Complete Answers
Which one of the following statements does not apply to the database approach?
a. Database systems have data independence; that is, the data and the programs are maintained
separately, except during processing.
b. Database management systems employ a data definition language that helps describe each schema
and subschema.
c. The database administrator is the part of the software package that instructs the operating aspects of
the program when data are retrieved.
d. A primary goal of database systems is to minimize data redundancy.
e. Database systems are based on the philoso- phy of data ownership.
c. The database administrator is the part of the software package that instructs the operating aspects of
the program when data are retrieved.
Database tables should be normalized. This means
a. each attribute in a row should be dependent on the primary key and independent of other attributes
in the table.
b. each attribute in a row should be indepen- dent of the primary key and dependent on other attributes
in the table.
c. each attribute in a row should contain a unique in its value
d. the value of each attribute should fall within a normal range of values predetermined for that
attribute.
e. both a and d are correct.
a. each attribute in a row should be dependent on the primary key and independent of other attributes
in the table.
Which of the following is a characteristic of a relational database system?
a. User views limit access to the database.
b. Database navigation follows explicit links
that are contained within the records.
c. All users share all the data to achieve integration of functions.
d. No two users share the same user view.
a. User views limit access to the database.
Replicated databases are most effective when
a. users in the system do not need to share common data.
b. primary users of the data are clearly identifiable.
c. read-only access is needed at each site.
d. all of the above.
c. read-only access is needed at each site.
The functions of a database administrator are
a. database planning, data input preparation, and database design.
b. data input preparation, database design, and database operation.
, c. database design, database operation, and equipment operations.
d. database design, database implementation, and database planning.
e. database operations, database maintenance, and data input preparation.
d. database design, database implementation, and database planning.
The data attributes that a particular user has per- mission to access are defined by the
a. operating system view.
b. systems design view.
c. database schema.
d. user view.
e. application program
d. user view.
An inventory table in a relational database system contains values for items such as part number, part
name, description, color, and quantity. These individual items are called
a. entities.
b. record types.
c. attributes.
d. occurrences.
c. attributes
Which of the following is a characteristic of a relational database system?
a. Tables are linked to other related table through explicit pointers.
b. A parent table may be related to many child tables, but a child table may have only one parent.
c. Each table must contain an attribute whose value is unique.
d. Tables in 1:M associations are linked by embedding the primary key of the M side tables into the 1
side table as a foreign key.
c. Each table must contain an attribute whose
value is unique.
A database system that has several remote users networked together, but each user site stores a unique
portion of the database is called a
a. replicated data processing network.
b. partitioned database.
c. recentralized network.
d. multi-drop data network.
e. hybrid system.
b. partitioned database.
For those instances where individual users may be granted summary and statistical query access to
confidential data to which they normally are denied access, which type of control is most suitable?
a. User-defined procedures
b. Data encryption
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LectAziim. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.