Databases Book Assignments

advertisement
Name _______________________________________
Database Book Assignments
Tomorrow’s Technology and You—Chapter 7 Review Questions
Answer the following questions from chapter 7.
1. Distinguish between a table, record, and field in a database. p 236
2. Most database management systems use a relational model. What makes a database
relational? pp. 245 & 247
3. Describe how record matching is used to obtain information about you. Give an example.
pp. 257-258
4. What is a query? Give an example of the kinds of questions that might be answered with a
query. p. 237
5. What is data mining? Give an example of its use. p. 250
A Gift of Fire, Chapter 2, “Privacy and Personal Information”
Answer the following questions.
1. What does the term invisible information gathering mean? Give an example. p. 50
2. What are cookies and how do companies use them? p.51
3. What does the term secondary use mean? Give an example. p. 52
4. Give one example in which release of someone’s personal information threatened the
person’s safety. p. 79
5. Describe two tools people can use to protect their privacy on the Web. p. 100
6. Explain the difference between opt in and opt out policies for distribution of a
customer’s name and address (and other personal information) to other businesses. p.
53
Information Technology in a Global Society –Databases
1. What is a primary key? P. 145
Relational Database Management Systems (RDBMS)
2. What does normalisation mean in the context of databases? P. 147
3. What is a foreign key and how does it relate to a relational database? P. 148
Issues: Integrity pp. 154-154
4. What is data integrity?
5. List three cases involving data integrity.
6. List seven ways data may be incorrect:
7. Distinguish between data validation and verification.
8. List three validation checks used in Microsoft Access.
9. What is an input mask?
Issues: Privacy pp. 158-160
10. What is data matching?
11. How can governments use data matching to root out fraud?
12. What is data mining?
13. How can data mining be used in target marketing?
14. How is data mining used by the banking industry?
15. Read the “Common Mistake” box at the top of p. 159. Explain the difference between privacy and
security.
16. List four of the largest databases in the world (see box on p. 160).
17. What are some considerations for companies collecting personal data to avoid privacy problems?
Issue: Security p. 161
18. What should be standard practice to protect personal data? P. 161
19. Describe three cases of security breaches
Download