You are on page 1of 14

Chapter 9: Database Management Approaches

1. A distributed database is a single logical database that is physically divided among computers at several sites
on a network.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 276

2. Accessing data using messages over a network is substantially slower than accessing data on a disk.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 276

3. Seek delay refers to the fixed amount of time that is required for every message. (*access delay)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 276

4. In a DDBMS, the site where the user is located is called the remote site. (*local site)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 277

5. A characteristic of a DDBMS that states that users do not need to be aware of the location of the data in a
database is known as replication transparency. (location transparency)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 277

6. If users are unaware of fragmentation, the DDBMS has fragmentation transparency.


a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 279

7. A local deadlock involves one transaction that requires a record held by a second transaction at one site, while

Cengage Learning Testing, Powered by Cognero Page 1


Chapter 9: Database Management Approaches

the second transaction requires a record held by the first transaction at a different site. (*global deadlock)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 281

8. A global deadlock occurs at a single site in a distributed database. (*local deadlock)


a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 281

9. A file server stores the files required by the users on a network.


a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 283

10. On a client/server network, the server is a computer that provides data to the clients.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 284

11. The server is also known as a front-end processor or front-end machine. (*back-end processor or machine)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 284

12. If the client only performs the presentation functions (and not the business functions), then the client is known as a fat
client. (*thin client)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 285

13. Each Web page is assigned an Internet address called a Uniform Resource Locator (URL).
a. True

Cengage Learning Testing, Powered by Cognero Page 2


Chapter 9: Database Management Approaches

b. False
ANSWER: True
POINTS: 1
REFERENCES: 287

14. An XML document should begin with an XML declaration.


a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 292

15. Access to a data warehouse is accomplished through the use of OLAP software.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 295

16. In order to view and analyze higher levels of aggregate data, you must drill down the data. (*specific
aggregate data)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 297

17. When relational databases store complex objects, these special data types are known as VLOBs. (*BLOBS)
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 299

18. The term class refers to the general structure of an object.


a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 301

19. The actions defined for a class are known as methods.


a. True
b. False
ANSWER: True
Cengage Learning Testing, Powered by Cognero Page 3
Chapter 9: Database Management Approaches

POINTS: 1
REFERENCES: 301

20. One approach you can use to model all the various aspects of software development for object-oriented systems is
known as UML.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: 303

21. When computers at one site need to be connected with computers at another site, the connection must be within a
____.
a. room
b. building
c. network
d. combination
ANSWER: c
POINTS: 1
REFERENCES: 275

22. Computers in a network communicate through ____.


a. tokens
b. messages
c. notes
d. letters
ANSWER: b
POINTS: 1
REFERENCES: 276

23. The formula for message transmission time is: communication time = access delay + (data volume / X), where X
represents ____.
a. transmission rate
b. length of transmission
c. lag time
d. seek time
ANSWER: a
POINTS: 1
REFERENCES: 276

24. A DDBMS that has at least two sites at which the local DBMS are different is known as a ____.
a. homogeneous DDBMS
b. heterogeneous DDBMS
c. holistic DDBMS
d. DDBMS

Cengage Learning Testing, Powered by Cognero Page 4


Chapter 9: Database Management Approaches

ANSWER: b
POINTS: 1
REFERENCES: 277

25. When users are unaware of the steps taken by the DDBMS to update the various copies of data, this characteristic of
the DDBMS is called ____.
a. location transparency
b. fragmentation transparency
c. replication transparency
d. location site license
ANSWER: c
POINTS: 1
REFERENCES: 277

26. Which of the following is an advantage of distributed databases?


a. Local control of data
b. Easier updates of replicated data
c. More complex query processing
d. More complex treatment of concurrent updates
ANSWER: a
POINTS: 1
REFERENCES: 279

27. When a centralized database becomes unavailable for any reason, no users can continue processing. In contrast, if a
local database in a distributed database becomes unavailable, only users who need that data are affected. Because of this,
distributed databases have a(n) ____ advantage over a centralized database.
a. local control of data
b. increasing database capacity
c. system availability
d. added efficiency
ANSWER: c
POINTS: 1
REFERENCES: 279

28. It is possible for local DBMSs to commit updates at some sites and undo updates at other sites. This inconsistency can
be prevented by using a ____.
a. two-step rollback
b. two-phase commit
c. two-phase rollback
d. two-phase transaction
ANSWER: b
POINTS: 1
REFERENCES: 282

29. The site that initiates the update in a two-phase commit is known as the ____.
a. director
Cengage Learning Testing, Powered by Cognero Page 5
Chapter 9: Database Management Approaches

b. initiator
c. coordinator
d. leader
ANSWER: c
POINTS: 1
REFERENCES: 282

30. ____ implies that the performance of functions such as adding sites, changing versions of DBMSs, creating backups,
and modifying hardware should not require planned shutdowns of the entire distributed database.
a. Continuous operation
b. Local autonomy
c. Location transparency
d. Fragmentation transparency
ANSWER: a
POINTS: 1
REFERENCES: 283

31. ____ implies that users should not need to be concerned with the location of any specific data in the database.
a. Fragmentation transparency
b. Replication transparency
c. Location transparency
d. Distributed query processing
ANSWER: c
POINTS: 1
REFERENCES: 283

32. ____ implies that no site should depend on another site to perform its database functions.
a. No reliance on a central site
b. Local autonomy
c. Continuous operation
d. Fragmentation transparency
ANSWER: b
POINTS: 1
REFERENCES: 283

33. ____ is the ability of a computer system to continue to function well as utilization of the system increases.
a. Data fragmentation
b. Data mining
c. Scalability
d. Polymorphism
ANSWER: c
POINTS: 1
REFERENCES: 285

34. Because the clients and the server perform different functions and can run two different operating systems, there is an
Cengage Learning Testing, Powered by Cognero Page 6
Chapter 9: Database Management Approaches
arrangement of client/server architecture known as ____.
a. single-tier architecture
b. two-tier architecture
c. three-tier architecture
d. four-tier architecture
ANSWER: b
POINTS: 1
REFERENCES: 285

35. If the client, in a client/server system, performs the business functions (calculations, etc.), then this client is known as
a(n) ____.
a. thin client
b. fat client
c. overweight client
d. external client
ANSWER: b
POINTS: 1
REFERENCES: 285

36. Each digital document on the Web is called a ____.


a. Web server
b. Web browser
c. client
d. Web page
ANSWER: d
POINTS: 1
REFERENCES: 287

37. ____ is the data communication method used by Web clients and Web servers to exchange data on the Internet.
a. UML
b. HTTP
c. URL
d. IIS
ANSWER: b
POINTS: 1
REFERENCES: 287

38. ____ is a metalanguage derived from a restricted subset of SGML, and designed for the exchange of data on the Web.
a. UML
b. URL
c. XML
d. HTTP
ANSWER: c
POINTS: 1
REFERENCES: 290
Cengage Learning Testing, Powered by Cognero Page 7
Chapter 9: Database Management Approaches

39. When users interact with an RDBMS, they use transactions. These types of systems are called ____ systems.
a. OLTP
b. ODBMS
c. OLAP
d. ODBC
ANSWER: a
POINTS: 1
REFERENCES: 294

40. When the data is organized by entity rather than by the application that uses the data, it is called ____.
a. table-oriented
b. row-oriented
c. column-oriented
d. subject-oriented
ANSWER: d
POINTS: 1
REFERENCES: 294

41. With respect to the definition of data warehouse, ____ means that data is stored in one place, even though it originates
from everywhere in the organization and from a variety of external sources.
a. time-variant
b. nonvolatile
c. subject-oriented
d. integrated
ANSWER: d
POINTS: 1
REFERENCES: 295

42. With respect to the definition of data warehouse, ____ means that the data is read-only.
a. time-variant
b. integrated
c. nonvolatile
d. subject-oriented
ANSWER: c
POINTS: 1
REFERENCES: 295

43. With respect to the definition of data warehouse, ____ means that data in a data warehouse represents snapshots of
data at various points in time in the past.
a. nonvolatile
b. time-variant
c. subject-oriented
d. integrated
ANSWER: a
Cengage Learning Testing, Powered by Cognero Page 8
Chapter 9: Database Management Approaches

POINTS: 1
REFERENCES: 295

44. A ____ is a subject-oriented, integrated, time-variant, nonvolatile collection of data in support of management's
decision-making process.
a. data warehouse
b. thin client
c. back-end processor
d. fat client
ANSWER: a
POINTS: 1
REFERENCES: 294

45. Each ____ contains a single-part primary key that serves as an index for the fact table and also contains other fields
associated with the primary key value.
a. primary table
b. fact table
c. dimension table
d. star table
ANSWER: c
POINTS: 1
REFERENCES: 295

46. A(n) ____ consists of rows that contain consolidated and summarized data.
a. class
b. data model
c. fact table
d. object
ANSWER: c
POINTS: 1
REFERENCES: 295

47. Uncovering new knowledge, patterns, trends, and rules from the data stored in a data warehouse is known as ____.
a. fragmentation transparency
b. replication transparency
c. polymorphism
d. data mining
ANSWER: d
POINTS: 1
REFERENCES: 298

48. In ____ systems, data and actions are encapsulated.


a. relational
b. object-oriented
c. network
Cengage Learning Testing, Powered by Cognero Page 9
Chapter 9: Database Management Approaches

d. parallel
ANSWER: b
POINTS: 1
REFERENCES: 299

49. In ____ systems, you create actions as part of data manipulation rather than as part of data definition.
a. object-oriented
b. relational
c. parallel
d. simple
ANSWER: b
POINTS: 1
REFERENCES: 299

50. ____ refers to the association of an operation to actual program code.


a. Attaching
b. Matching
c. Linking
d. Binding
ANSWER: d
POINTS: 1
REFERENCES: 306

51. A(n) _________________________ is a DBMS capable of supporting and manipulating distributed


databases.
ANSWER: DDBMS
DDBMS (distributed database management system)
distributed database management system
distributed database management system (DDBMS)
POINTS: 1
REFERENCES: 276

52. A(n) ____________________ DDBMS is a database that has the same local DBMS at each site.
ANSWER: homogeneous
POINTS: 1
REFERENCES: 277

53. ____________________ link one Web page to another or link to another location in the same Web page.
ANSWER: Hyperlinks
POINTS: 1
REFERENCES: 288

54. Web pages that display the same content for all Web clients are called ____________________ Web pages.
ANSWER: static
POINTS: 1
Cengage Learning Testing, Powered by Cognero Page 10
Chapter 9: Database Management Approaches

REFERENCES: 288

55. E-commerce between organizations is called ____________________.


ANSWER: B2B
B2B (business to business)
business to business
business to business (B2B)
POINTS: 1
REFERENCES: 290

56. ____________________ implies that you define an object to contain both the data and its associated actions.
ANSWER: Encapsulation
POINTS: 1
REFERENCES: 299

57. A(n) ______________________________ is one in which data and the actions that operate on the data are
encapsulated into objects.
ANSWER: OODBMS
OODBMS (object-oriented database management system)
OODBMS (object oriented database management system)
object-oriented database management system
object oriented database management system
object-oriented database management system (OODBMS)
object oriented database management system (OODBMS)
POINTS: 1
REFERENCES: 299

58. A(n) ____________________ is the set of values that are permitted for an attribute.
ANSWER: domain
POINTS: 1
REFERENCES: 301

59. Methods are defined during the ___________________ process.


ANSWER: data definition
POINTS: 1
REFERENCES: 302

60. To execute the steps in a method, the user sends a(n) ____________________ to the object.
ANSWER: message
POINTS: 1
REFERENCES: 302

61. With respect to UML, the type of diagram most relevant to database design is the ____________________.
ANSWER: class diagram
POINTS: 1
REFERENCES: 303
Cengage Learning Testing, Powered by Cognero Page 11
Chapter 9: Database Management Approaches

62. On a class diagram, the lines joining the classes represent the relationships and are called ____________________.
ANSWER: associations
POINTS: 1
REFERENCES: 303

63. On a class diagram, a(n) ____________________ symbol precedes each attribute.


ANSWER: visibility
POINTS: 1
REFERENCES: 304

64. The ____________________ symbol in a class diagram indicates whether other classes can view or update
the value in the attribute.
ANSWER: visibility

POINTS: 1
REFERENCES: 304

65. With ____________________ visibility, any other class can view or update the value of an attribute.
ANSWER: public
POINTS: 1
REFERENCES: 304

66. With ____________________ visibility, only the class itself or public or protected subclasses of the class
can view or update the value in the attribute.
ANSWER: protected
POINTS: 1
REFERENCES: 304

67. With ____________________ visibility, only the class itself can view or update the value in the attribute.
ANSWER: private
POINTS: 1
REFERENCES: 304

68. ____________________ indicates the number of objects that can be related to an individual object at the
other end of the relationship.
ANSWER: Multiplicity
POINTS: 1
REFERENCES: 304

69. ____________________ are restrictions placed on the data that can be stored in the database.
ANSWER: Constraints
POINTS: 1
REFERENCES: 304

70. If one class is a subclass of a second class, the second class is called a(n) ____________________ of the
first class.
Cengage Learning Testing, Powered by Cognero Page 12
Chapter 9: Database Management Approaches

ANSWER: superclass

POINTS: 1
REFERENCES: 304|305

71. What are the advantages of distributed databases?


ANSWER: The advantages are:
Local control of data
Increasing database capacity
System availability
Improved performance
POINTS: 1
REFERENCES: 279

72. What are the advantages of a client/server system?


ANSWER: The advantages include:
Lower network traffic
Improved processing distribution
Thinner clients
Greater processing transparency
Increased network, hardware, and software transparency
Improved security
Decreased costs
Increased scalability
POINTS: 1
REFERENCES: 286|287

73. Explain the difference between a Web page, a Web server, and a Web client.
ANSWER: Each digital document on the Web is called a Web page, each computer on which an individual
or organization stores Web pages for access on the Internet is called a Web server, and each
computer requesting a Web page from a Web server is called a Web client.
POINTS: 1
REFERENCES: 287

74. Discuss the differences between how client-side extensions and server-side extensions are created and executed,
including the kinds of languages used to create them.
ANSWER: Client-side extensions can be embedded in HTML documents or contained in separate files that
are referenced within the HTML documents, while server-side extensions are usually separately
executed programs. Client-side extensions can change the user interface in response to user
input actions; JavaScript and VBScript are examples of client-side extension languages.
Because of the processing complexities of server-side extensions and the difficulty of creating
them, most server-side extensions are created using programming development frameworks,
such as ASP.NET and Cold-Fusion, although the PHP scripting language is frequently used
with the Apache HTTP Server.
POINTS: 1
REFERENCES: 288

Cengage Learning Testing, Powered by Cognero Page 13


Chapter 9: Database Management Approaches
75. What is the purpose of the following UML diagrams: class, use case, sequence, and activity?
ANSWER: Class diagram: For each class, this diagram shows the name, attribute, and methods of the class,
a well as the relationship between the classes in the database.
Use Case diagram: Describes how the system is to behave from the standpoint of the systems
users.
Sequence diagram: Shows the sequence of possible interactions between objects over time.
Activity diagram: Shows the business and operational step-by-step workflows of components in
a system.
POINTS: 1
REFERENCES: 303

Cengage Learning Testing, Powered by Cognero Page 14

You might also like