Deck 9: Data Design

Full screen (f)
exit full mode
Question
A(n) ____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

A)SQL
B)OCE
C)ODBC
D)ERD
Use Space or
up arrow
down arrow
to flip the card.
Question
In an entity-relationship diagram, entities are represented as ____.

A)triangles
B)circles
C)rectangles
D)hexagons
Question
With a(n) ____ language, the user provides an example of the data requested.

A)SQL
B)IDE
C)QBE
D)interpolated
Question
JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.

A)HTML
B)Web
C)Perl
D)Java
Question
During the systems design phase, ____ fields are used to organize, access, and maintain data structures.

A)glossary
B)tabular
C)content
D)key
Question
Any field that is not a primary key or a candidate key is called a ____ key.

A)combination
B)nonkey
C)secondary
D)foreign
Question
When a primary key combines two or more fields, it is called a ____ key.

A)constructed
B)composite
C)collective
D)parallel
Question
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.

A)connective
B)schema
C)exchange
D)collective
Question
A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.

A)manipulation
B)manufacturing
C)schema
D)dynamic
Question
____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Question
A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

A)machine language
B)assembly language
C)query language
D)markup language
Question
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

A)JDBC
B)JVC
C)ODBC
D)OEC
Question
To bridge the gap between a database and the Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.

A)middleware
B)hardware
C)shareware
D)freeware
Question
Many database programs generate ____, which is a language that allows client workstations to communicate with servers and mainframe computers.

A)DDE
B)DBL
C)DML
D)SQL
Question
<strong>  In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.</strong> A)secondary key B)candidate key C)combination key D)foreign key <div style=padding-top: 35px>
In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

A)secondary key
B)candidate key
C)combination key
D)foreign key
Question
<strong>  In the accompanying figure, any field that could serve as a primary key is called a ____.</strong> A)secondary key B)candidate key C)combination key D)foreign key <div style=padding-top: 35px>
In the accompanying figure, any field that could serve as a primary key is called a ____.

A)secondary key
B)candidate key
C)combination key
D)foreign key
Question
A(n) ____ is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze the contents of data.

A)RMS
B)DBMS
C)scale set
D)HCI
Question
One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.

A)candidate
B)combinatorial
C)referential
D)foreign
Question
<strong>  In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.</strong> A)primary key B)common key C)secondary key D)combination key <div style=padding-top: 35px>
In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

A)primary key
B)common key
C)secondary key
D)combination key
Question
A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.

A)structure
B)roster
C)index
D)integral
Question
Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.

A)harmonic
B)sequence
C)mnemonic
D)rhapsodic
Question
Compared with character-based formats, a ____ storage format offers a more efficient storage method.

A)decimal
B)unary
C)tertiary
D)binary
Question
____ codes combine data from different item attributes, or characteristics, to build the code.

A)Sequence
B)Category
C)Significant digit
D)Derivation
Question
An integer format uses ____ bits to represent the number 12,345 in binary form.

A)8
B)12
C)16
D)20
Question
____ describes how instances of one entity relate to instances of another entity.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Question
____ is a coding method used on most personal computers.

A)ASCII
B)EBCDIC
C)Unicode
D)ISO
Question
Binary digits have only ____ possible value(s).

A)one
B)two
C)three
D)five
Question
A ____ is a set of letters or numbers that represents a data item.

A)syntax
B)data dictionary
C)mnemonic
D)code
Question
____ codes use a keyword to encode a number.

A)Cipher
B)Identifier
C)Encryption
D)Associative
Question
____ is a coding method used on mainframe computers and high-capacity servers.

A)ASCII
B)EBCDIC
C)Unicode
D)ISO
Question
EBCDIC and ASCII both require ____ bits.

A)six
B)eight
C)ten
D)twelve
Question
____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.

A)Encapsulation
B)Normalization
C)Standardization
D)Encryption
Question
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of ____.

A)two digits for the year, two for the month, and two for the day (YYMMDD)
B)two digits for the year, four for the month, and two for the day (YYMMMMDD)
C)four digits for the year, two for the month, and two for the day (YYYYMMDD)
D)four digits for the year, two for the month, and four for the day (YYYYMMDDDD)
Question
A long integer format uses ____ bits to represent the number 1,234,567,890 in binary form.

A)12
B)24
C)30
D)32
Question
Unicode represents more than ____ unique, multilingual characters.

A)32,000
B)65,000
C)320,000
D)650,000
Question
In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.

A)recovery procedures
B)crow's foot notation
C)audit log files
D)standard notation format
Question
In ASCII, the number 1,234,567,890 requires ____ bytes of storage.

A)eight
B)nine
C)ten
D)twelve
Question
____ codes are numbers or letters assigned in a specific order.

A)Sequence
B)Category
C)Significant digit
D)Derivation
Question
One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

A)scalability
B)compatibility
C)cardinality
D)functionality
Question
____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

A)Encapsulation
B)Normalization
C)Standardization
D)Encryption
Question
In a client/server system, processing is isolated in a single computer.
Question
A table design that does not contain repeating groups is called unnormalized. _________________________
Question
Which of the following is a problem found with 1NF (first normal form) design that does not exist in 2NF (second normal form)?

A)adding a new record creates difficulties
B)2NF tables always contain consistent data compared to 1NF tables
C)deleting a record creates difficulties
D)changing a particular entity's description is cumbersome and expensive
Question
Web-based data must be secure but in order to be so, it cannot be easily accessible to authorized users.
Question
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs. _________________________
Question
Security concerns about Web-based data design can be addressed with software that can protect the system and detect intrusion, for example.
Question
Which of the following is the advantage of a DBMS (database management system)?

A)economy of scale
B)stronger standards
C)scalability
D)data dependence
Question
The three normal forms constitute a progression in which the first normal form represents the best design. _________________________
Question
A common field is an attribute that appears in only one entity.
Question
A ____ contains data about people, places, things, or events.

A)record
B)column
C)table
D)file
Question
Migrating a traditional database design to the Web rarely requires design modification or additional software.
Question
Middleware can interpret client requests in HTML form and translate the requests into commands that the database can execute. _________________________
Question
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
Question
Web-based data design requires users to have powerful workstations.
Question
JDBC is the language of the Web. _________________________
Question
In a Web-based database design, the Internet serves as the ____ for the database management system.

A)front end
B)back end
C)middleware
D)interface
Question
Web-based design is dependent on a specific combination of hardware and software.
Question
In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.
Question
Like a primary key, a foreign key must be unique.
Question
Which of the following is a data coding and storage scheme?

A)EBCDIC
B)binary
C)ASCII
D)primary
Question
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
Question
  A(n) ____________________, such as that shown in the accompanying figure, contains a set of related records that store data about a specific entity.<div style=padding-top: 35px>
A(n) ____________________, such as that shown in the accompanying figure, contains a set of related records that store data about a specific entity.
Question
Three main types of relationships that can exist between entities are a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
Question
A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.
Question
The ____________________ for DBMS design, which was introduced in the 1970s and continues to be the dominant approach for organizing, storing, and managing business data.
Question
  In the table or file shown in the accompanying figure, a(n) ____________________ is a single characteristic or fact about an entity.<div style=padding-top: 35px>
In the table or file shown in the accompanying figure, a(n) ____________________ is a single characteristic or fact about an entity.
Question
A table design specifies the fields and identifies the primary key in a particular table or file.
Question
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on other nonkey fields.
Question
A table is in first normal form (1NF) if it contains a repeating group.
Question
A table design is in second normal form (2NF) if it is in 1NF and if all fields that are not part of the primary key are functionally independent on part of the primary key.
Question
Normal forms beyond 3NF exist, but they rarely are used in business-oriented systems.
Question
A primary key cannot be composed of more than one field.
Question
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
Question
Typically, a DBMS is managed by a person called a(n) ____________________, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
Question
A data warehouse allows users to specify certain dimensions, or characteristics.
Question
To protect stored data, users can be asked to furnish a proper user ID and password to access a file or database.
Question
In an M:N relationship, the two entities are linked by an event or transaction called an associative entity, which has its own set of attributes and characteristics.
Question
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
Question
The inherent efficiency of high-volume processing on larger computers is called ____________________.
Question
Many three-character airport codes are cipher codes.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/112
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Data Design
1
A(n) ____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

A)SQL
B)OCE
C)ODBC
D)ERD
D
2
In an entity-relationship diagram, entities are represented as ____.

A)triangles
B)circles
C)rectangles
D)hexagons
C
3
With a(n) ____ language, the user provides an example of the data requested.

A)SQL
B)IDE
C)QBE
D)interpolated
C
4
JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.

A)HTML
B)Web
C)Perl
D)Java
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
5
During the systems design phase, ____ fields are used to organize, access, and maintain data structures.

A)glossary
B)tabular
C)content
D)key
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
6
Any field that is not a primary key or a candidate key is called a ____ key.

A)combination
B)nonkey
C)secondary
D)foreign
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
7
When a primary key combines two or more fields, it is called a ____ key.

A)constructed
B)composite
C)collective
D)parallel
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
8
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.

A)connective
B)schema
C)exchange
D)collective
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
9
A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.

A)manipulation
B)manufacturing
C)schema
D)dynamic
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
10
____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

A)machine language
B)assembly language
C)query language
D)markup language
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
12
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

A)JDBC
B)JVC
C)ODBC
D)OEC
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
13
To bridge the gap between a database and the Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.

A)middleware
B)hardware
C)shareware
D)freeware
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
14
Many database programs generate ____, which is a language that allows client workstations to communicate with servers and mainframe computers.

A)DDE
B)DBL
C)DML
D)SQL
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
15
<strong>  In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.</strong> A)secondary key B)candidate key C)combination key D)foreign key
In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

A)secondary key
B)candidate key
C)combination key
D)foreign key
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
16
<strong>  In the accompanying figure, any field that could serve as a primary key is called a ____.</strong> A)secondary key B)candidate key C)combination key D)foreign key
In the accompanying figure, any field that could serve as a primary key is called a ____.

A)secondary key
B)candidate key
C)combination key
D)foreign key
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze the contents of data.

A)RMS
B)DBMS
C)scale set
D)HCI
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
18
One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.

A)candidate
B)combinatorial
C)referential
D)foreign
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
19
<strong>  In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.</strong> A)primary key B)common key C)secondary key D)combination key
In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

A)primary key
B)common key
C)secondary key
D)combination key
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
20
A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.

A)structure
B)roster
C)index
D)integral
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
21
Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.

A)harmonic
B)sequence
C)mnemonic
D)rhapsodic
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
22
Compared with character-based formats, a ____ storage format offers a more efficient storage method.

A)decimal
B)unary
C)tertiary
D)binary
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
23
____ codes combine data from different item attributes, or characteristics, to build the code.

A)Sequence
B)Category
C)Significant digit
D)Derivation
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
24
An integer format uses ____ bits to represent the number 12,345 in binary form.

A)8
B)12
C)16
D)20
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
25
____ describes how instances of one entity relate to instances of another entity.

A)Scalability
B)Compatibility
C)Cardinality
D)Functionality
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
26
____ is a coding method used on most personal computers.

A)ASCII
B)EBCDIC
C)Unicode
D)ISO
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
27
Binary digits have only ____ possible value(s).

A)one
B)two
C)three
D)five
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ is a set of letters or numbers that represents a data item.

A)syntax
B)data dictionary
C)mnemonic
D)code
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
29
____ codes use a keyword to encode a number.

A)Cipher
B)Identifier
C)Encryption
D)Associative
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
30
____ is a coding method used on mainframe computers and high-capacity servers.

A)ASCII
B)EBCDIC
C)Unicode
D)ISO
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
31
EBCDIC and ASCII both require ____ bits.

A)six
B)eight
C)ten
D)twelve
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
32
____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.

A)Encapsulation
B)Normalization
C)Standardization
D)Encryption
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
33
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of ____.

A)two digits for the year, two for the month, and two for the day (YYMMDD)
B)two digits for the year, four for the month, and two for the day (YYMMMMDD)
C)four digits for the year, two for the month, and two for the day (YYYYMMDD)
D)four digits for the year, two for the month, and four for the day (YYYYMMDDDD)
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
34
A long integer format uses ____ bits to represent the number 1,234,567,890 in binary form.

A)12
B)24
C)30
D)32
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
35
Unicode represents more than ____ unique, multilingual characters.

A)32,000
B)65,000
C)320,000
D)650,000
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
36
In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.

A)recovery procedures
B)crow's foot notation
C)audit log files
D)standard notation format
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
37
In ASCII, the number 1,234,567,890 requires ____ bytes of storage.

A)eight
B)nine
C)ten
D)twelve
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
38
____ codes are numbers or letters assigned in a specific order.

A)Sequence
B)Category
C)Significant digit
D)Derivation
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
39
One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

A)scalability
B)compatibility
C)cardinality
D)functionality
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
40
____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

A)Encapsulation
B)Normalization
C)Standardization
D)Encryption
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
41
In a client/server system, processing is isolated in a single computer.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
42
A table design that does not contain repeating groups is called unnormalized. _________________________
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is a problem found with 1NF (first normal form) design that does not exist in 2NF (second normal form)?

A)adding a new record creates difficulties
B)2NF tables always contain consistent data compared to 1NF tables
C)deleting a record creates difficulties
D)changing a particular entity's description is cumbersome and expensive
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
44
Web-based data must be secure but in order to be so, it cannot be easily accessible to authorized users.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
45
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs. _________________________
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
46
Security concerns about Web-based data design can be addressed with software that can protect the system and detect intrusion, for example.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is the advantage of a DBMS (database management system)?

A)economy of scale
B)stronger standards
C)scalability
D)data dependence
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
48
The three normal forms constitute a progression in which the first normal form represents the best design. _________________________
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
49
A common field is an attribute that appears in only one entity.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
50
A ____ contains data about people, places, things, or events.

A)record
B)column
C)table
D)file
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
51
Migrating a traditional database design to the Web rarely requires design modification or additional software.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
52
Middleware can interpret client requests in HTML form and translate the requests into commands that the database can execute. _________________________
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
53
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
54
Web-based data design requires users to have powerful workstations.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
55
JDBC is the language of the Web. _________________________
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
56
In a Web-based database design, the Internet serves as the ____ for the database management system.

A)front end
B)back end
C)middleware
D)interface
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
57
Web-based design is dependent on a specific combination of hardware and software.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
58
In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
59
Like a primary key, a foreign key must be unique.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a data coding and storage scheme?

A)EBCDIC
B)binary
C)ASCII
D)primary
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
61
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
62
  A(n) ____________________, such as that shown in the accompanying figure, contains a set of related records that store data about a specific entity.
A(n) ____________________, such as that shown in the accompanying figure, contains a set of related records that store data about a specific entity.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
63
Three main types of relationships that can exist between entities are a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
64
A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
65
The ____________________ for DBMS design, which was introduced in the 1970s and continues to be the dominant approach for organizing, storing, and managing business data.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
66
  In the table or file shown in the accompanying figure, a(n) ____________________ is a single characteristic or fact about an entity.
In the table or file shown in the accompanying figure, a(n) ____________________ is a single characteristic or fact about an entity.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
67
A table design specifies the fields and identifies the primary key in a particular table or file.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
68
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on other nonkey fields.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
69
A table is in first normal form (1NF) if it contains a repeating group.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
70
A table design is in second normal form (2NF) if it is in 1NF and if all fields that are not part of the primary key are functionally independent on part of the primary key.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
71
Normal forms beyond 3NF exist, but they rarely are used in business-oriented systems.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
72
A primary key cannot be composed of more than one field.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
73
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
74
Typically, a DBMS is managed by a person called a(n) ____________________, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
75
A data warehouse allows users to specify certain dimensions, or characteristics.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
76
To protect stored data, users can be asked to furnish a proper user ID and password to access a file or database.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
77
In an M:N relationship, the two entities are linked by an event or transaction called an associative entity, which has its own set of attributes and characteristics.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
78
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
79
The inherent efficiency of high-volume processing on larger computers is called ____________________.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
80
Many three-character airport codes are cipher codes.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 112 flashcards in this deck.