You are on page 1of 10

CH.

1
MULTIPLE CHOICE: Choose the one alternative that best completes the statement
or answers the qestion.
1. One application of data warehouses is:
A) shipping of information.
B) order processing.
C) decision support.
D) file updating.
Answer: C
Diff: Difficult Page Ref: 4
Topic: Introduction
2. Older systems that often contain data of poor quality are called systems.
A) controlled
B) legacy
C) data!ase
D) mainframe
Answer: B
Diff: Difficult Page Ref: 26
Topic: Costs and Risks of the Database Approach
Subtopic: Conersion Costs
". A data!ase is an organi#ed collection of related data.
A) logically
B) physically
C) not
D) !adly
Answer: A
Diff: !as" Page Ref: 4
Topic: #asic Concepts and Definitions
$. %hich of the following types of data can !e stored in a data!ase&
A) 'oice
B) (etters
C) )um!ers
D) All of the a!o*e.
Answer: D
Diff: !as" Page Ref: $
Topic: #asic Concepts and Definitions
Subtopic: Data
+. Data processed in a way that increases a user,s -nowledge is:
A) te.t.
B) graphics
C) information.
D) hyperlin-.
Answer: C
Diff: !as" Page Ref: $
Topic: #asic Concepts and Definitions
Subtopic: Data %ersus Infor&ation
/. Data that descri!e the properties of other data are:
A) relationships.
B) logical.
C) physical.
D) )one of the a!o*e.
Answer: D
Diff: 'oderate Page Ref: 6
Topic: #asic Concepts and Definitions
Subtopic: 'etadata
0. All of the following are properties of metadata e.cept:
A) data definitions.
B) processing logic.
C) rules or constraints.
D) data structures.
Answer: B
Diff: 'oderate Page Ref: 6( )
Topic: #asic Concepts and Definitions
Subtopic: 'etadata
1. One disad*antage of file processing systems is:
A) reduced data duplication.
B) program2data independence.
C) limited data sharing.
D) enforcement of integrity constraints.
Answer: C
Diff: 'oderate Page Ref: *
Topic: Traditional +ile Processing S"ste&s
Subtopic: Disadantages of +ile Processing S"ste&s
3. 4rogram2data dependence is caused !y:
A) file descriptors !eing stored in each application.
B) data descriptions !eing stored on a ser*er.
C) data descriptions !eing written into programming code.
D) data coha!iting with programs.
Answer: A
Diff: 'oderate Page Ref: *
Topic: Disadantages of +ile Processing S"ste&s
Subtopic: Progra&,Data Dependence
15. (oss of metadata integrity is often a result of:
A) poor design.
B) unplanned and uncontrolled duplication of data.
C) decreased programmer producti*ity.
D) a large *olume of file i6o.
Answer: B
Diff: 'oderate Page Ref: *
Topic: Disadantages of +ile Processing S"ste&s
Subtopic: Duplication of Data
11. Organi#ations that utili#e the file processing approach spend as much as of their 78
de*elopment !udget on maintenance.
A) $5 percent
B) 2+ percent
C) /5 percent
D) 15 percent
Answer: D
Diff: !as" Page Ref: *
Topic: Disadantages of +ile Processing S"ste&s
Subtopic: Increased Progra& 'aintenance
12. A picture of the high2le*el entities for an organi#ation and the relationships among
99the entities is called a:n):
A) logical data model.
B) hyperte.t graphic.
C) ;<D.
D) enterprise data model.
Answer: D
Diff: !as" Page Ref: -.
Topic: The Database Approach
1". %hich of the following is a characteristic of an enterprise data model&
A) 7t stresses the integration of data.
B) 7t duplicates data.
C) 7t creates physical relationships.
D) 7t reduces storage.
Answer: A
Diff: !as" Page Ref: -2
Topic: The Database Approach
1$. ;ach column in a ta!le represent a:n) of an entity.
A) description
B) attri!ute
C) !yte
D) logical element
Answer: B
Diff: 'oderate Page Ref: -/
Topic: The Database Approach
Subtopic: Relational Databases
1+. 7ntracompany communication can !e impro*ed through the use of a:n):
A) telephone.
B) fa. machine.
C) intranet.
D) e.tranet.
Answer: C
Diff: 'oderate Page Ref: -4
Topic: The Database Approach
Subtopic: Introducing Internet Technolog"
1/. A tool that ena!les analysts to query and analy#e data!ases is:
A) cross2line deployment analysis.
B) analytical transaction processing.
C) on2line analytical processing.
D) query processing.
Answer: C
Diff: 'oderate Page Ref: -$
Topic: The Database Approach
Subtopic: Introducing Internet Technolog"
10. %hich of the following functions does a data!ase application program perform&
A) Create data
B) <etrie*e data
C) Delete data
D) All of the a!o*e.
Answer: D
Diff: !as" Page Ref: -$
Topic: The Database Approach
Subtopic: A Database Application
11. %hich of the following decisions must !e made when de*eloping a
personal computer data!ase&
A) Buy or ma-e
B) Data!ase design
C) %ho is responsi!le for data accuracy
D) All of the a!o*e.
Answer: D
Diff: 'oderate Page Ref: -6
Topic: The Range of Database Applications
Subtopic: Personal Databases
13. A relati*ely small team of people who colla!orate on the same pro=ect is called a:n):
A) ser*er group.
B) wor-group.
C) data colla!orati*e.
D) typical arrangement.
Answer: B
Diff: !as" Page Ref: -)
Topic: The Range of Database Applications
Subtopic: 0orkgroup Databases
25. A wor-group data!ase is stored on a central de*ice called a:n):
A) client.
B) ser*er.
C) remote 4C.
D) networ-.
Answer: B
Diff: 'oderate Page Ref: -1
Topic: The Range of Database Applications
Subtopic: 0orkgroup Databases
21. 7n addition to the decisions regarding a 4C data!ase> which of the following questions are
important to wor-group data!ases&
A) %hich processes should !e performed on the ser*er and which on the client&
B) %ith a large num!er of users> how can the data!ase !e optimi#ed&
C) ?ow can mem!ers use the data!ase easily&
D) All of the a!o*e.
Answer: D
Diff: 'oderate Page Ref: -1
Topic: The Range of Database Applications
Subtopic: 0orkgroup Databases
22. %hich of the following is the most common type of data!ase descri!ed in the !oo-&
A) @ainframe
B) 4C
C) Department
D) 8mall
Answer: C
Diff: 'oderate Page Ref: -*
Topic: The Range of Database Applications
Subtopic: Depart&ent Databases
2". %hich of the following is an integrated decision support data!ase with content deri*ed from
*arious operational data!ases&
A) Corporate data structure
B) <elational DB@8
C) Data warehouse
D) Client2ser*er system
Answer: C
Diff: !as" Page Ref: 2.
Topic: The Range of Database Applications
Subtopic: !nterprise Databases
2$. A data warehouse deri*es its data from:
A) on2line transactions.
B) *arious operational data sources.
C) reports.
D) a datamart.
Answer: B
Diff: 'oderate Page Ref: 2.
Topic: The Range of Database Applications
Subtopic: !nterprise Databases
2+. An e.tranet pro*ides:
A) e.tra computing time.
B) access to company data !y company personnel only.
C) limited access to company data and information to customers and suppliers.
D) e.tra data.
Answer: C
Diff: 'oderate Page Ref: 22
Topic: The Range of Database Applications
Subtopic: Internet( Intranet( and !2tranet Databases
2/. %ith the data!ase approach> data descriptions are stored in a central location -nown as a:n):
A) ser*er.
B) mainframe.
C) 4C.
D) repository.
Answer: D
Diff: !as" Page Ref: 2/
Topic: Adantages of the Database Approach
Subtopic: Progra&,Data Independence
20. %hich of the following is )OA an ad*antage of data!ase systems&
A) <edundant data
B) 4rogram2data independence
C) Better data quality
D) <educed program maintenance
Answer: A
Diff: !as" Page Ref: 2/
Topic: Adantages of the Database Approach
21. A user *iew is:
A) what a user sees when he or she loo-s out the window.
B) a ta!le or set of ta!les.
C) a logical description of some portion of the data!ase.
D) a procedure stored on the ser*er.
Answer: C
Diff: !as" Page Ref: 2/
Topic: Adantages of the Database Approach
Subtopic: I&proed Data Sharing
23. %hich organi#ational function should set data!ase standards&
A) @anagement
B) Application de*elopment
C) Aechnical ser*ices
D) )one of the a!o*e.
Answer: D
Diff: 'oderate Page Ref: 24
Topic: Adantages of the Database Approach
Subtopic: !nforce&ent of Standards
"5. Ahe most common source of data!ase failures in organi#ations is:
A) lac- of planning.
B) inadequate !udget.
C) inadequate hardware.
D) failure to implement a strong data!ase administration function.
Answer: D
Diff: Difficult Page Ref: 24
Topic: Adantages of the Database Approach
Subtopic: !nforce&ent of Standards
"1. A rule that can)OA !e *iolated !y data!ase users is called a:
A) password.
B) constraint.
C) program.
D) *iew.

Answer: B
Diff: !as" Page Ref: 24
Topic: Adantages of the Database Approach
Subtopic: I&proed Data 3ualit"
"2. 7n a file processing en*ironment> descriptions for data and the logic for accessing the data is
!uilt into:
A) application programs.
B) data!ase descriptors.
C) fields.
D) records.
Answer: A
Diff: !as" Page Ref: 2$
Topic: Adantages of the Database Approach
Subtopic: Reduced Progra& 'aintenance
"". Data!ases may !e more e.pensi*e to maintain than files !ecause of:
A) the need for speciali#ed personnel.
B) the comple.ity of the data!ase en*ironment.
C) !ac-up and reco*ery needs.
D) All of the a!o*e.
Answer: D
Diff: !as" Page Ref: 2$(26
Topic: Costs and Risks of the Database Approach
"$. %hich of the following is )OA a cost and6or ris- of the data!ase approach&
A) 8peciali#ed personnel
B) Cost of con*ersion
C) 7mpro*ed responsi*eness
D) Organi#ational conflict
Answer: C
Diff: 'oderate Page Ref: 2$(26
Topic: Costs and Risks of the Database Approach
"+. Ahe need for consensus on data definitions is an e.ample of which type ris- in the data!ase
en*ironment&
A) 8peciali#ed personnel needs
B) Organi#ational conflict
C) Con*ersion costs
D) (egacy systems
Answer: B
Diff: 'oderate Page Ref: 26
Topic: Costs and Risks of the Database Approach
Subtopic: 4rgani5ational Conflict
"/. %hich of the following is software that is used to create> maintain> and pro*ide controlled
access to data!ases&
A) )etwor- operating system
B) Bser *iew
C) Data!ase management system
D) Attri!ute
Answer: C
Diff: !as" Page Ref: 2)
Topic: Co&ponents of the Database !niron&ent
"0. A centrali#ed -nowledge !ase of all data definitions> data relationships> screen and report
formats> and other system components is called a:n):
A) inde..
B) data warehouse.
C) repository.
D) data!ase management system.
Answer: C
Diff: !as" Page Ref: 2)
Topic: Co&ponents of the Database !niron&ent
Subtopic: Repositor"
"1. CA8; is a class of tools that:
A) assists the data!ase administrator in maintaining a data!ase.
B) pro*ides guidelines for the physical design of a data!ase.
C) pro*ides management reporting tools.
D) automates the design of data!ases and application programs.
Answer: D
Diff: 'oderate Page Ref: 2)
Topic: Co&ponents of the Database !niron&ent
Subtopic: Co&puter,aided Soft6are !ngineering Tools
"3. ;. C. Codd de*eloped the relational model in the:
A) 13/5s.
B) 1305s.
C) 1315s.
D) 1335s.
Answer: B
Diff: !as" Page Ref: 21
Topic: !olution of Database S"ste&s
$5. (anguages> menus> and other facilities !y which users interact with the data!ase are
collecti*ely called a:n):
A) client.
B) user interface.
C) icon.
D) de*elopment en*ironment.
Answer: B
Diff: !as" Page Ref: 2)
Topic: Co&ponents of the Database !niron&ent

You might also like