Professional Documents
Culture Documents
CHAPTER 8
TRUE/FALSE
1.
2.
The database approach to data management is sometimes called the flat file approach.
The two fundamental components of data structures are organization and access method.
3.
6.
7.
8.
9.
10.
11.
12.
When a large portion of the file is to be processed in one operation such as payroll, sequential data
structures are an inefficient method of organizing a file.
An advantage of using an indexed random file structure is that records are easily added and deleted.
The hierarchical database model forces users to navigate between data elements using predefined
structured paths.
A network model does not allow children files to have multiple parent files.
The physical database is an abstract representation of the database.
A customer name and an unpaid balance is an example of a one-to-many relationship.
In the relational model, a data element is called a relation.
Data normalization groups data attributes into tables in accordance with specific design objectives.
Under the database approach, data is viewed as proprietary or owned by users.
VSAM file structures are most effective where rapid access to individual records is a priority need.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Generalized audit software packages are used to assist the auditor in performing substantive tests.
GAS can be used with simple data structures but not complex structures
Logical database design is the foundation of the conceptual design.
An entity is any physical thing about which the organization wishes to capture data.
An ER diagram is a graphical representation of a data model.
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
Cardinality describes the number of possible occurrences in one table that are associated with a single
occurrence in a related table.
A table in third normal form is free of partial dependencies, multiple dependencies, and transitive
dependencies.
Improperly normalized databases are associated with three types of anomalies: the update anomaly, the
insertion anomaly, and the deletion anomaly.
4.
5.
23.
24.
MULTIPLE CHOICE
1.
2.
3.
4.
An inventory record contains part number, part name, part color, and part weight. These individual items are
called
a.
fields.
b.
stored files.
c.
bytes.
d.
occurrences.
It is appropriate to use a sequential file structure when
a.
records are routinely inserted.
b.
single records need to be retrieved.
c.
records need to be scanned using secondary keys.
d.
a large portion of the file will be processed in one operation.
Which of the following statements is not true?
a.
Indexed random files are dispersed throughout the storage device without regard for physical
proximity with related records.
b.
Indexed random files use disk storage space efficiently.
c.
Indexed random files are efficient when processing a large portion of a file at one time.
d.
Indexed random files are easy to maintain in terms of adding records.
Which characteristic is associated with the database approach to data management?
a. data sharing
b. multiple storage procedures
c. data redundancy
d. excessive storage costs
5.
6.
7.
8.
9.
10.
11.
12.
13.
In the relational database model all of the following are true except
a. data is presented to users as tables
b. data can be extracted from specified rows from specified tables
c. a new table can be built by joining two tables
d. only one-to-many relationships can be supported
14.
In a relational database
a. the users view of the physical database is the same as the physical database
b. users perceive that they are manipulating a single table
c. a virtual table exists in the form of rows and columns of a table stored on the disk
d. a programming language (COBOL) is used to create a users view of the database
15.
16.
17.
18.
d.
trail
connections between M:M tables are provided by a link table
19.
20.
21.
Entities are
a. nouns that are depicted by rectangles on an entity relationship diagram
b. data that describe the characteristics of properties of resources
c. associations among elements
d. sets of data needed to make a decision
A user view
a. presents the physical arrangement of records in a database for a particular user
b. is the logical abstract structure of the database
c. specifies the relationship of data elements in the database
d. defines how a particular user sees the database
All of the following are advantages of a partitioned database except
a. increased user control by having the data stored locally
b. deadlocks are eliminated
c. transaction processing response time is improved
d. partitioning can reduce losses in case of disaster
22.
23.
24.
25.
26.
27.
28.
29.
Generalized audit software packages perform all of the following tasks except
a. recalculate data fields
b. compare files and identify differences
c. stratify statistical samples
d. analyze results and form opinions
30.
A transitive dependency
a.
is a database condition that is resolved through special monitoring software.
b.
is a name given to one of the three anomalies that result from unnormalized database tables.
c.
can exist only in a table with a composite primary key.
d.
cannot exist in tables that are normalized at the 2NF level.
e.
is none of the above.
CHAPTER 11
TRUE/FALSE
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
The primary goal of installing an ERP system is reducing system maintenance costs.
The recommended data architecture for an ERP includes separate operational and data warehouse
databases.
A closed database architecture shares data easily.
ERP systems support a smooth and seamless flow of information across organizations.
OLAP stands for on-line application processing.
The primary goal of installing an ERP system is achieving business process reengineering to improve
customer service, reduce production time, increase productivity, and improve decision-making.
Day-to-day transactions are stored in the operational database.
Data mining typically focuses on the operational databases.
Companies are more likely to modify an ERP to accommodate the company than to modify company
processes to accommodate the ERP.
If a chosen ERP cannot handle a specific company process bolt-on software may be available.
Core applications are also called OLAP.
The client/server model is a form of network technology in which user computers, called clients, access ERP
programs and data via a host computer called a server.
A data warehouse is a relational or multi-dimensional database that may require hundreds of gigabytes of
storage.
Drill-down capability is an OLAP feature of data mining tools.
Supply-chain management software is a type of program that supports efforts relative to moving goods from
the raw material stage to the customer.
In two-tier architecture, the database and application functions are separated.
Slicing and dicing permits the disaggregation of data to reveal underlying details.
Data entered into the data warehouse must be normalized.
OLAP includes decision support, modeling, information retrieval, and what-if analysis.
Efficient supply-chain management provides firms with a competitive advantage.
The big-bang approach involves converting from old legacy systems to the new ERP in one implementation
step.
In a two-tier architecture approach is used primarily for wide area network (WAN) applications.
Data cleansing is a step performed by external auditors to identify and repairing invalid data prior to the
audit.
Organizations using ERP systems employ an internal control tool called a role.
In spite of the high technology employed in ERP systems, critical business controls such as a three way
match always performed manually.
The role model assigns specific access privileges directly to individuals.
An access control list specifies the user-ID, the resources available to the user, and the level of permission
granted.
RBAC assigns access permissions to the role an individual plays in the organization rather than directly to
the individual.
A problem with RBAC is that managers tend to create unnecessary roles
The implementation of an ERP creates an environment with a single point of failure, which places the
organization at risk.
MULTIPLE CHOICE
1.
2.
3.
4.
5.
c.
d.
ad hoc analysis
what-if analysis
6.
Which of the following statements is least likely to be true about a data warehouse?
a. It is constructed for quick searching and ad hoc queries.
b. It was an original part of all ERP systems.
c. It contains data that are normally extracted periodically from the operating databases.
d. It may be deployed by organizations that have not implemented an ERP.
7.
8.
9.
10.
11.
12.
13.A data
a.
b.
c.
d.
mart is
another name for a data warehouse.
a database that provides data to an organizations customers.
an enterprise resource planning system.
a data warehouse created for a single function or department.
14.
15.
16.
17.
18.
19.
20.
Separating the data warehouse from the operations databases occurs for all of the following reasons except
a. to make the management of the databases more economical
b. to increase the efficiency of data mining processes
c. to integrate legacy system data into a form that permits entity-wide analysis
d. to permit the integration of data from diverse sources
21.
22.
23.
24.
25.
26.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
19.
20.
21.
22.
23.
24.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
21.
22.
23.
24.
25.
26.