Tugas – Multiple Choice : Database Design
1. A significant disadvantage of conventional files is:
A. inflexibility
B. non-scalability
C. duplication of data items in multiple files
D. data integrity problems
E. all of the above
2. A primary key is:
A. A collection of fields arranged in a predefined format.
B. An alternate identifier for a database whose value may identify either a single record or a subset of all records.
C. The field whose values identify one and only one record in a file.
D. A pointer to the records of a different file in a database, used to link records of one type to those of another type.
E. None of the above.
3. A secondary key is:
A. A collection of fields arranged in a predefined format.
B. An alternate identifier for a database whose value may identify either a single record or a subset of all records.
C. The field whose values identify one and only one record in a file.
D. A pointer to the records of a different file in a database, used to link records of one type to those of another type.
E. None of the above.
4. A foreign key is:
A. A collection of fields arranged in a predefined format.
B. An alternate identifier for a database whose value may identify either a single record or a subset of all records.
C. The field whose values identify one and only one record in a file.
D. A pointer to the records of a different file in a database, used to link records of one type to those of another type.
E. None of the above.
5. A collection of fields arranged in a predefined format is known as a(n):
A. attribute
B. associative field
C. primary key
D. secondary key
E. none of the above
6. A fixed length record structure:
A. allows different records in the same file to have different lengths.
B. contains records that are relatively permanent.
C. is used to link records of one type to those of another type.
D. requires each record instance to have the same fields, same number of fields, and same logical size.
E. contains values that identify either a single record or a subset of all records.
7. A variable length record structure:
A. allows different records in the same file to have different lengths.
B. contains records that are relatively permanent.
C. is used to link records of one type to those of another type.
D. requires each record instance to have the same fields, same number of fields, and same logical size.
E. contains values that identify either a single record or a subset of all records.
8. A master file (or table) contains:
A. records that describe business events.
B. records that are relatively permanent.
C. master and transaction file records that have been deleted from on-line storage.
D. stored copies of historical data for easy retrieval and review without the overhead of regeneration.
E. none of the above
9. Transaction files or tables contain:
A. records that describe business events.
B. records that are relatively permanent.
C. master and transaction file records that have been deleted from on-line storage.
D. stored copies of historical data for easy retrieval and review without the overhead of regeneration.
E. none of the above
10. Document files and tables contain:
A. records that describe business events.
B. records that are relatively permanent.
C. master and transaction file records that have been deleted from on-line storage.
D. stored copies of historical data for easy retrieval and review without the overhead of regeneration.
E. none of the above
11. An archival file (or table) contains:
A. records that describe business events.
B. records that are relatively permanent.
C. master and transaction file records that have been deleted from on-line storage.
D. stored copies of historical data for easy retrieval and review without the overhead of regeneration.
E. none of the above
12. A table look-up file contains:
A. records that describe business events.
B. records that are relatively permanent.
C. master and transaction file records that have been deleted from on-line storage.
D. stored copies of historical data for easy retrieval and review without the overhead of regeneration.
E. none of the above
13. Audit files are:
A. special records of updates to other files, especially master and transaction files.
B. records that are relatively permanent.
C. master and transaction file records that have been deleted from on-line storage.
D. stored copies of historical data for easy retrieval and review without the overhead of regeneration.
E. none of the above
14. An example of a master file would be:
A. a file that contains records describing business events.
B. a file that contains off-line records of master or transaction files.
C. a series of tables that are related to one another via foreign keys.
D. an employee and a customer file.
E. all of the above.
15. An example of a transaction file would be:
A. a file that contains records describing business events.
B. a file that contains off-line records of master or transaction files.
C. a series of tables that are related to one another via foreign keys.
D. an employee and a customer file.
E. all of the above.
16. An example of an archive file would be:
A. a file that contains records describing business events.
B. a file that contains off-line records of master or transaction files.
C. a series of tables that are related to one another via foreign keys.
D. an employee and a customer file.
E. all of the above.
17. A trigger is:
A. a program embedded within a relational database table that is automatically invoked by updates to another table.
B. a series of tables that are related to one another via foreign keys.
C. a program embedded within a relational database table that can be called from an application program
D. a language used by the DBMS to create, read, update, and delete records in the database.
E. none of the above
18. A stored procedure is:
A. a program embedded within a relational database table that is automatically invoked by updates to another table.
B. a series of tables that are related to one another via foreign keys.
C. a program embedded within a relational database table that can be called from an application program
D. a language used by the DBMS to create, read, update, and delete records in the database.
E. none of the above
19. Key integrity me
A. Appropriate controls must be designed to ensure that no field takes on a value that is outside of the range of legal values.
B. Every table should have a primary key (which may be concatenated), and that key should be controlled so that no two records in the table have the same primary key value.
C. The alternate name for a foreign key clearly distinguishes the purpose that foreign key serves in the table.
D. The foreign key value in one table must have a matching primary key value in the related table.
E. all of the above
20. Domain integrity me
A. Appropriate controls must be designed to ensure that no field takes on a value that is outside of the range of legal values.
B. Every table should have a primary key (which may be concatenated), and that key should be controlled so that no two records in the table have the same primary key value.
C. The alternate name for a foreign key clearly distinguishes the purpose that foreign key serves in the table.
D. The foreign key value in one table must have a matching primary key value in the related table.
E. all of the above
21. Referential integrity me
A. Appropriate controls must be designed to ensure that no field takes on a value that is outside of the range of legal values.
B. Every table should have a primary key (which may be concatenated), and that key should be controlled so that no two records in the table have the same primary key value.
C. The alternate name for a foreign key clearly distinguishes the purpose that foreign key serves in the table.
D. The foreign key value in one table must have a matching primary key value in the related table.
E. all of the above
22. Centralization occurs when:
A. a table or entire rows in a table are assigned to different database servers and locations.
B. entire tables are duplicated and stored in multiple locations or file servers.
C. a database is implemented on a single server regardless of the number of physical locations that may require access to it.
D. specific columns of tables are assigned to specific databases or servers.
E. none of the above
23. Horizontal distribution occurs when:
A. a table or entire rows in a table are assigned to different database servers and locations.
B. entire tables are duplicated and stored in multiple locations or file servers.
C. a database is implemented on a single server regardless of the number of physical locations that may require access to it.
D. specific columns of tables are assigned to specific databases or servers.
E. none of the above
24. Vertical distribution occurs when:
A. a table or entire rows in a table are assigned to different database servers and locations.
B. entire tables are duplicated and stored in multiple locations or file servers.
C. a database is implemented on a single server regardless of the number of physical locations that may require access to it.
D. specific columns of tables are assigned to specific databases or servers.
E. none of the above
25. Replication occurs when:
A. a table or entire rows in a table are assigned to different database servers and locations.
B. entire tables are duplicated and stored in multiple locations or file servers.
C. a database is implemented on a single server regardless of the number of physical locations that may require access to it.
D. specific columns of tables are assigned to specific databases or servers.
E. none of the above