Chapter05Q - University of Massachusetts Boston

advertisement
University of Massachusetts Boston
College of Management
MSIS 110: Introduction to Computers
Chapter 5: Organizing Data and Information - Q & A
____ 1. A primary key is a field or set of fields that uniquely identifies a record.
____ 2. One of the goals of a DBMS is to increase data redundancy thereby making it less
vulnerable to hackers.
____ 3. The database approach to data management helps to reduce program-data
dependence.
____ 4. Although usually undesirable, data redundancy can be planned so that user reports or
queries can be created more quickly.
____ 5. Data marts are usually larger than data warehouses.
____ 6. E-commerce presents a major opportunity for the effective use of data mining.
____ 7. The value of data ultimately lies in the decisions it enables.
____ 8. The use of competitive intelligence is illegal and unethical.
____ 9. Knowledge management is the process of capturing a company's collective expertise.
____ 10. A database is a collection of integrated and related files.
____ 11. The efficient operation of a business requires a high degree of data redundancy.
____ 12. In the data hierarchy, a byte typically represents a ____.
a. record
b. bit
c. field
d. character
____ 13. A collection of related data fields is called a ____.
a. byte
b. record
c. character
d. bit
1
____ 14. A DBMS is a(n) ____.
a. interface between the database and application programs
b. data repository
c. knowledge base
d. unique group of records
____ 15. A(n) ____ is a generalized class of people, places, or things for which data is
collected, stored, and maintained.
a. record
b. entity
c. attribute
d. file
____ 16. Which attribute would make the best primary key?
a. Social security number
b. Last name
c. First name
d. Age
____ 17. A traditional approach to data management means that ____.
a. data files are created individually by each application
b. data files are placed into objects
c. data files are managed by the DBMS
d. no data files are used
____ 18. The payroll program at Ken's Builders, Inc. generates and maintains its own data files.
These files, which are not compatible with any other software, exhibit ____.
a. data integrity
b. data stability
c. data security
d. program-data dependence
2
____ 19. In the figure above, the area enclosed by bracket '2' represents ____.
a. key fields
b. records
c. attributes
d. entities
____ 20. If Employee # is a unique number, then in the figure above, the area of the table
represented by bracket '1' is a ____.
a. secondary key
b. primary key
c. planned redundancy
d. tuple
3
Download