MIS Management Information Systems Chapters 1,2,3

question

The most common personal digital assistant (PDA) is a smartphone.
answer

True
question

Twitter is an example of a management information system.
answer

False Twitter (www.twitter.com) is a social networking and short-message service.
question

Information systems are broader in scope than information technologies.
answer

True
question

Skill in using word processing software is an example of information literacy.
answer

False Skill in using word processing software is an example of computer literacy.
question

Business Intelligence (BI) provides historical and predictive views of business operations.
answer

True
question

Computers can be used in transaction-processing operations that involve enormous volumes of data.
answer

true
question

The software components of a management information system (MIS) include input, output, and memory devices.
answer

false The hardware components of the management information system (MIS) include input, output, and memory devices and vary depending on the application and the organization.
question

In a management information system (MIS) application, processes are usually methods for performing a task.
answer

True
question

In designing a management information system (MIS), the first task is to clearly define the system’s objectives.
answer

True
question

The data component of an information system is considered the output to the system.
answer

False The data component of an information system is considered the input to the system
question

Irrespective of organizational objectives, an information system should collect data from either an internal or an external source.
answer

False An information system should collect data from both sources, although organizational objectives and the type of application also determine what sources to use.
question

Customers, competitors, and suppliers are examples of internal data sources.
answer

False Customers, competitors, and suppliers are examples of external data sources.
question

A database management system (DBMS) is used to create, organize, and manage databases.
answer

True
question

The quality of information is determined by its usefulness to management information system (MIS) users.
answer

True
question

To be useful, information must have the quality of being fragmented from other data and information.
answer

False To be useful, information must have the ability to integrate with other data and information.
question

Most information systems avoid using graphical user interfaces (GUIs).
answer

False A factor affecting the usefulness of information is the information system’s user interface. Because this interface must be flexible and easy to use, most information systems make use of graphical user interfaces (GUIs), with features such as menus and buttons.
question

When solving problems, the users of an information system must avoid using informal information—such as rumors, unconfirmed reports, and stories.
answer

False : In addition to the formal information that an information system generates, users need to be able to make use of informal information—such as rumors, unconfirmed reports, and stories—when solving problems.
question

Timely, relevant, and accurate information is a critical tool for enhancing a company’s competitive position in the marketplace.
answer

True
question

Intranets are often used to provide basic HR functions, such as employees checking how much vacation time they have left.
answer

True
question

Human resource is the second most important resource after information in any organization.
answer

False Information is the second most important resource (after the human element) in any organization.
question

A personnel information system (PIS) helps in choosing the best job candidate.
answer

True
question

A logistics information system (LIS) provides reports and statistics on employee demographics.
answer

False A personnel information system (PIS) provides reports and statistics on employee demographics.
question

An effective financial information system (FIS) should provide timely, accurate, and integrated information about the marketing mix.
answer

False An effective marketing information system (MKIS) should provide timely, accurate, and integrated information about the marketing mix- 4Ps: price, promotion, place, and product.
question

The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs.
answer

False The focus of a bottom-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs. A top-line strategy focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers.
question

Buyer power is high when customers have few choices and low when they have many choices.
answer

False Buyer power is high when customers have many choices and low when they have few choices.
question

Rivalry among existing competitors is high when many competitors occupy the same marketplace position.
answer

true
question

The threat of new entrants into the marketplace is high when duplicating a company’s product or service is difficult.
answer

false The threat of new entrants into the marketplace is low when duplicating a company’s product or service is difficult.
question

In the context of an information systems job, a chief technology officer (CTO) oversees long-range planning and keeps an eye on new developments in the field that can affect a company’s success.
answer

True
question

In the context of an information systems job, a database administrator is responsible for developing the entire information system by writing computer programs.
answer

false A computer programmer writes computer programs or software segments that allow the information system to perform a specific task. A database administrator (DBA) is responsible for database design and implementation
question

It has been predicted that hardware and software costs will continue to increase in the future, so processing information will be more expensive.
answer

false It has been predicted that hardware and software costs will continue to decline, so processing information will be less expensive.
question

1. A typical personal digital assistant (PDA) includes a(n) _____. a. external monitor c. mouse b. calendar d. external keyboard
answer

b
question

2. _____ sites help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies. a. Tender portal c. Archive b. Social networking d. Classified ads
answer

b
question

3. _____ is a social networking Web site. a. Twitter c. Bing b. Google chrome d. Android
answer

a
question

4. Social networking sites can reduce organizations’ costs by _____. a. giving customers more access to all sorts of data c. providing an inexpensive medium for targeting a large customer base b. limiting buyers’ choices by offering services that make it difficult for customers to switch d. customizing the organization’s Web site and offering many options to customers
answer

c
question

5. _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software. a. Network literacy c. Information literacy b. Data literacy d. Computer literacy
answer

d
question

6. _____ refers to understanding the role of information in generating and using business intelligence. a. Computer literacy c. Information security b. Information literacy d. Computer security
answer

b
question

7. To be competitive in a workplace, a knowledge worker should: a. know how and why data is collected. c. avoid the use of informal information. b. be able to develop one’s own information system. d. refrain from using business intelligence (BI) tools.
answer

a
question

8. Which of the following statements is true of transaction-processing systems? a. They focus on data encapsulation. c. They can automate repetitive operations. b. They pass on additional costs to organizations. d. They require maximum human involvement.
answer

c
question

9. In designing a management information system (MIS), after defining the system’s objectives, the second step is to _____. a. provide information in a useful format c. use information for decision-making b. collect and analyze data d. integrate the hardware and software components
answer

b
question

10. The final task in designing a management information system (MIS) is: a. collecting and analyzing internal and external data for accuracy and relevancy. c. clearly defining the system’s objectives. b. providing information in a useful format for decision-making purposes. d. integrating hardware and software components.
answer

b
question

11. _____ consists of raw facts and is a major component of information systems. a. Cache c. Data b. Kernel d. Process
answer

c
question

12. _____ are an internal data source for an information system. a. Personnel records c. Economic conditions b. Population statistics d. Competitors
answer

a
question

13. _____ are an external data source for an information system. a. Transaction reports c. Labor statistics b. Personnel records d. Sales records
answer

c
question

14. Which of the following statements is true of data? a. Current data is collected for performance reports. c. Aggregated data enables decision makers to focus on specific factors. b. Disaggregated data reports overall performance during a particular sales quarter. d. Future data is predicted for budgets or cash flow reports.
answer

d
question

15. Structuring a data component to define what type of data is collected and in what form is typically easy if an organization: a. has defined its strategic goals. c. has been uninformed of critical success factors. b. has defined ambiguous objectives. d. has conflicting vision and mission statements.
answer

a
question

16. Microsoft Access is a(n) _____, which is used to create and manage a series of integrated files. a. information system c. database management system b. enterprise resource planning system d. knowledge base management system
answer

c
question

17. The purpose of an information system’s _____ component is generating the most useful type of information for making decisions. a. process c. external data b. internal data d. database
answer

a
question

18. Identify an output of an information system. a. Data c. Processes b. Databases d. Analyzed facts
answer

d
question

19. _____ consists of facts that have been analyzed by the process component and are therefore more useful to the MIS user. a. Information c. Database b. Data d. Package
answer

a
question

20. To be useful, information must have the quality of _____. a. randomness c. erroneousness b. timeliness d. abstractness
answer

b
question

21. To be useful, information systems should: a. use command line user interfaces. c. produce information in different formats. b. generate raw data, which can be used for decision making. d. avoid rumors, unconfirmed reports, and stories.
answer

c
question

22. The four Ms of resources are _____. a. management, motivation, manpower, and monitoring b. materials, money, modeling, and monitoring c. manpower, machinery, materials, and money d. manpower, monitoring, movement, and modeling
answer

c
question

23. Decisions related to scheduling and assigning employees can be supported by a _____. a. personnel information system (PIS) c. financial information system (FIS) b. manufacturing information system (MFIS) d. logistics information system (LIS)
answer

a
question

24. A _____ provides reports and statistics on employee demographics. a. manufacturing information system (MFIS) c. logistics information system (LIS) b. marketing information systems (MKIS) d. personnel information system (PIS)
answer

d
question

25. Which of the following decisions is supported by a logistics information system (LIS)? a. Predicting an organization’s future personnel needs c. Determining portfolio structures b. Minimizing capital investment risks d. Selecting the best modes of transportation
answer

d
question

26. Which of the following decisions is supported by a manufacturing information system (MFIS)? a. Determination of portfolio structures c. Improvement of routing and delivery schedules b. Analysis of price changes and discounts d. Monitoring of cost trends
answer

b
question

27. Which of the following decisions is supported by a financial information system (FIS)? a. Determining portfolio structures c. Improving routing and delivery schedules b. Choosing the best job candidate d. Analyzing sales personnel
answer

a
question

28. A _____ is used for sales forecasting. a. logistics information system (LIS) c. marketing information system (MKIS) b. personnel information system (PIS) d. financial information system (FIS)
answer

c
question

29. _____ strategies were identified by Michael Porter for successfully competing in the marketplace. a. Groupthink c. Simulation b. Brainstorming d. Focus
answer

d
question

30. Which of the following strategies is identified by Michael Porter for successfully competing in the marketplace? a. Transformational leadership strategy c. Groupthink strategy b. Differentiation strategy d. Simulation strategy
answer

b
question

31. Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors? a. Simulation strategy c. Focus strategy b. Overall cost leadership strategy d. Differentiation strategy
answer

d
question

32. Which of the following strategies identified by Michael Porter helps organizations concentrate on a specific market segment to achieve a cost advantage? a. Simulation strategy c. Focus strategy b. Overall cost leadership strategy d. Differentiation strategy
answer

c
question

33. Which of the following is one of the forces of the Five Forces Model identified by Michael Porter? a. Rivalry among customers c. Threat of new entrants b. Government regulations d. Consumer groups
answer

c
question

34. In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options. a. buyer c. user b. debtor d. supplier
answer

d
question

35. In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools. a. systems mining analyst c. webmaster b. data design officer d. database administrator
answer

d
question

1. _____ means having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.
answer

Computer literacy
question

2. A(n) _____ is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.
answer

management information system (MIS)
question

3. The _____ component of an information system is considered the input to the system.
answer

Data
question

4. A(n) _____, the heart of an information system, is a collection of all relevant data organized in a series of integrated files..
answer

Database
question

5. The ultimate goal of an information system is to generate _____.
answer

business intelligence (BI)
question

6. Computer networks, database systems, POS systems, etc. are few examples of _____, which support information systems in decision making.
answer

information technologies
question

7. A(n) _____ information system is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery.
answer

logistics
question

8. A(n) _____ information system is typically used to support decisions in managing an organization’s cash flows.
answer

financial
question

9. The Five Forces Model was created by _____.
answer

Michael Porter
question

10. According to Porter’s Five Forces Model, the _____ power is low when customers have more options.
answer

supplier
question

11. According to Porter’s Five Forces Model, the threat of _____ into the marketplace is low when duplicating a company’s product or service is difficult.
answer

new entrants
question

12. The top information systems job belongs to the _____.
answer

chief technology officer (CTO) or the chief information officer (CIO)
question

13. In the context of information technology (IT) jobs in the information systems field, a(n) _____ is typically responsible for providing network and cybersecurity.
answer

network administrator
question

14. In the context of information technology (IT) jobs in the information systems field, a(n) _____ is responsible for database design and implementation.
answer

database administrator (DBA)
question

15.In the context of the information technology(IT) jobs in the information systems field, a(n) _____ designs and maintains the organization’s Web site.
answer

Webmaster
question

SHORT ANSWER 1. What are some ways in which students come into contact with information systems?
answer

Answer: Students use computers and office suite software and might take online classes. Computers are often used to grade exam answers and generate detailed reports comparing the performance of each student in a class. Computers and information systems also calculate grades and GPAs and can deliver this information to the students.
question

SHORT ANSWER 2. How can banks use computers and information systems?
answer

Answer: Banks use computers and information systems for generating a customer’s monthly statement, running ATM machines, and for many banking activities.
question

SHORT ANSWER 3. How do organizations use social networking sites?
answer

Answer: Organizations use social networking sites to give customers up-to-date information and even how-to support via videos. These sites can reduce organizations’ costs by providing an inexpensive medium for targeting a large customer base.
question

SHORT ANSWER 4. Compare information systems and information technologies.
answer

Answer: Information systems are broader in scope than information technologies, but the two overlap in many areas. Both are used to help organizations be more competitive and to improve their overall efficiency and effectiveness. Information technologies offer many advantages for improving decision making but involve some challenges, too, such as security and privacy issues.
question

SHORT ANSWER 5. Give an example of how a management information system (MIS) can be used in the public sector.
answer

Answer: In the public sector, an MIS for a police department, for example, could provide information such as crime statistics, crime forecasts, and allocation of police units. Management can examine these statistics to spot increases and decreases in crime rates or types of crimes and analyze this data to determine future deployment of law enforcement personnel.
question

6. List the four qualities that information must have to make it useful.
answer

Answer: To be useful, information must have the following qualities: a. Timeliness b. Integration with other data and information c. Consistency and accuracy d. Relevance
question

SHORT ANSWER 7. Describe how a personnel information system (PIS) helps decision makers.
answer

Answer: A personnel information system (PIS) or human resource information system (HRIS) is designed to provide information that helps decision makers in personnel carry out their tasks more effectively. A PIS/HRIS supports the following actions, among others: a. Choosing the best job candidate b. Scheduling and assigning employees c. Predicting the organization’s future personnel needs d. Providing reports and statistics on employee demographics e. Allocating human and financial resources
question

8. Explain the main difference between an intranet and the Internet.
answer

Answer: The main difference between an intranet and the Internet is that an intranet is private and the Internet is public.
question

9. Define and describe a manufacturing information system (MFIS).
answer

Answer: A manufacturing information system (MFIS) is used to manage manufacturing resources so that companies can reduce manufacturing costs, increase product quality, and make better inventory decisions. MFISs can perform many types of analysis with a high degree of timeliness and accuracy.
question

10. Explain the difference in focus for a bottom-line strategy and a top-line strategy.
answer

Answer: The focus of a bottom-line strategy is improving efficiency by reducing overall costs. A top-line strategy focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers.
question

11. How can an organization combat the threat of new entrants?
answer

Answer: The threat of new entrants into the marketplace is low when duplicating a company’s product or service is difficult. Organizations often use focus strategies to ensure that threat of new entrants remains low. In addition, organizations use information technologies to increase customer loyalty, as mentioned previously, which reduces the threat of new entrants.
question

12. Describe the role of a chief privacy officer (CPO).
answer

Answer: The chief privacy officer is an executive position that includes responsibility for managing the risks and business impacts of privacy laws and policies.
question

13. Describe the role of a systems analyst and the knowledge required for the position.
answer

Answer: A systems analyst is responsible for the design and implementation of information systems. In addition to computer knowledge and an information systems background, this position requires a thorough understanding of business systems and functional areas within a business organization.
question

14. Describe how networking technology will improve in the future.
answer

Answer: Networking technology will improve, so connecting computers will be easier, and sending information from one location to another will be faster. Compatibility issues between networks will become more manageable, and integrating voice, data, and images on the same transmission medium will improve communication quality and information delivery.
question

15. Describe the impact of Internet growth in the future.
answer

Answer: Internet growth will continue, which will put small and large organizations on the same footing, regardless of their financial status. Internet growth will also make e-collaboration easier, despite geographical distances.
question

1. Explain personal digital assistants (PDAs).
answer

Answer: Many workers are now telecommuters who perform their jobs at home, and others often use their personal digital assistants (PDAs) to conduct business while on the go. The most common PDA is a smartphone (such as an iPhone, Droid, or a Blackberry). A typical PDA includes a calendar, address book, and task-list programs; more advanced PDAs often allow for wireless connection to the Internet and have built-in MP3 players.
question

2. Explain what a knowledge worker should know in understanding the role of information in generating and using business intelligence.
answer

Answer: Knowledge workers should know the following: a. Internal and external sources of data b. How data is collected c. Why data is collected d. What type of data should be collected e. How data is converted to information and eventually to business intelligence f. How data should be indexed and updated g. How data and information should be used to gain a competitive advantage
question

3. What is a database? What role does a database play in an information system?
answer

Answer: A database, the heart of an information system, is a collection of all relevant data organized in a series of integrated files. A comprehensive database is essential for the success of any information system. To create, organize, and manage databases, a database management system (DBMS) is used, such as Microsoft Access or FileMaker Pro for home or small-office use. In a large organization, a DBMS, such as Oracle or IBM DB2, might be used. Databases are also important for reducing personnel time needed to gather, process, and interpret data manually. With a computerized database and a DBMS, data can be treated as a common resource that’s easy to access and use.
question

4. Describe the factors affecting the usefulness of information.
answer

Answer: To be useful, information must have the following qualities: a. Timeliness b. Integration with other data and information c. Consistency and accuracy d. Relevance If information lacks any of these qualities, the results are incorrect decisions, misallocation of resources, and overlooked windows of opportunity. If the system cannot give users a minimum level of confidence in its reliability, it will not be used or users might dismiss the reports it generates. Information must provide either a base for users to explore different options or insight into tasks. Another factor affecting the usefulness of information is the information system’s user interface. Because this interface must be flexible and easy to use, most information systems make use of graphical user interfaces (GUIs), with features such as menus and buttons. To be useful, information systems should also produce information in different formats, including graphics (e.g., pie charts and bar graphs), tables, and exception reports, which highlight information that is outside a specified range. Supplying information in a variety of formats increases the likelihood of users understanding and being able to use the information.
question

5. Describe the threat of substitute products or services and how organizations fight this threat.
answer

Answer: The threat of customers choosing substitute products or services is high when many alternatives to an organization’s products or services are available. Some organizations add services—such as Amazon.com’s personalized recommendations—to make their positions in the marketplace more distinctive. Other organizations use fees to discourage customers from switching to a competitor, such as cell phone companies adding charges for switching to another provider before the customer contract is up.
question

An object code must be translated into source code in order for a computer to be able to read and execute
answer

FALSE A source code must be translated into object code—consisting of 0s and 1s, which can be understood by a computer.
question

The hardware components of a computer system consist of programs written in computer languages
answer

FALSE It is the software components of a computer system that consist of programs written in computer languages.
question

Both the arithmetic logic unit (ALU) and the control unit are part of the Basic Input/Output System
answer

FALSE The arithmetic logic unit (ALU) and the control unit are part of the central processing unit (CPU). A Basic Input/Output System is located on the motherboard
question

A bus can be internal or external.
answer

TRUE
question

A computer with a 32-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers than a 64-bit system.
answer

FALSE A computer with a 64-bit processor can perform calculations with larger numbers and be more efficient with smaller numbers; it also has better overall performance than a 32-bit system.
question

A serial port is a communication interface through which information is transferred one bit at a time.
answer

TRUE
question

Very-large-scale integration (VLSI) circuits were introduced in the fifth-generation computers.
answer

FALSE Very-large-scale integration circuits were introduced in the fourth-generation computers, which continued several trends that further improved speed and ease of use.
question

ENIAC is an example of a first-generation computer.
answer

TRUE
question

A byte is a single value of 0 or 1.
answer

FALSE 1 bit is a single value of 0 or 1, whereas 1 byte is formed by 8 bits.
question

A petabyte is 230 bytes.
answer

FALSE A petabyte is 250 bytes, whereas a gigabyte is 230 bytes.
question

An Extended ASCII data code allows representation of 1024 characters
answer

FALSE Extended ASCII code is an 8-bit code that also allows representation of 256 characters
question

The split keyboard has been developed for better ergonomics.
answer

TRUE
question

Light pen is an output device
answer

FALSE A light pen is an input device particularly useful for engineers and graphic designers who need to make modifications to technical drawings.
question

Trackballs are ideal for notebook computers because they occupy less space than a mouse
answer

TRUE
question

A disadvantage of trackball is that positioning is sometimes less precise than with a mouse.
answer

TRUE
question

Inkjet printers produce characters by projecting electrically charged droplets of ink onto paper that create an image
answer

TRUE
question

Data can be read from and written to random access memory (RAM).
answer

TRUE
question

The contents of programmable read-only memory (PROM) can be erased and reprogrammed
answer

FALSE The contents of programmable read-only memory (PROM) cannot be erased, whereas erasable programmable read-only memory, which is similar to PROM, can be erased and reprogrammed
question

A magnetic disk is a type of secondary memory device
answer

TRUE
question

A magnetic tape stores data randomly
answer

FALSE Magnetic tape, made of a plastic material, resembles a cassette tape and stores data sequentially.
question

An advantage of a write once, read many (WORM) disc is that it can be easily duplicated
answer

FALSE A major drawback is that a WORM disc cannot be duplicated. It is used mainly to store information that must be kept permanently but not altered.
question

Flash memory is used in memory cards for storing and transferring data between computers and other devices
answer

TRUE
question

A redundant array of independent disks (RAID) system is a collection of disk drives used for fault tolerance and improved performance
answer

TRUE
question

A storage area network (SAN) is essentially a network-connected computer dedicated to providing file-based data storage services to other network devices
answer

FALSE : A storage area network (SAN) is a dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices.
question

Network-attached storage (NAS) increases management costs and is fault prone
answer

FALSE NAS is popular for Web servers and e-mail servers because it lowers management costs and helps make these servers more fault tolerant.
question

A network-attached storage (NAS) system offers only storage; a storage area network (SAN) offers both storage and file services
answer

FALSE A SAN offers only storage; a NAS system offers both storage and file services
question

In a network-attached storage (NAS), as the number of users increase, the performance increases
answer

FALSE The biggest issue with NAS is that, as the number of users increases, its performance deteriorates.
question

A server is a set of programs for controlling and managing computer hardware and software.
answer

FALSE A server is a computer and all the software for managing network resources and offering services to a network
question

A personal computer can perform a variety of tasks by using application software, which can be commercial software or software developed in house
answer

TRUE
question

Sometimes, fourth-generation languages (4GLs) are called procedural languages
answer

FALSE Sometimes 4GLs are called nonprocedural languages, which means you do not need to follow rigorous command syntax to use them.
question

A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand. a. array c. cache b. server d. program
answer

D – PROGRAM
question

A _____ is a peripheral device for recording, storing, and retrieving information a. disk drive c. control unit b. motherboard d. multiprocessor
answer

A – DISK DRIVE
question

A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. a.parallel port c. expansion slot b. serial port d. control unit
answer

A- PARALLEL PORT
question

Beginning in the 1940s, first-generation computers used _____. a. transistors c. integrated circuits b. vacuum tube technology d. laser technology
answer

B- VACUUM TUBE TECHNOLOGY
question

Transistors were the major technology used during the _____ generation of computers a. first c. third b. second d. fourth
answer

B- SECOND
question

Remote data entry and telecommunications were introduced during the _____ generation of computers a. second c. fourth b. third d. fifth
answer

B- THIRD
question

One of the disadvantages of silicon is that: a. it cannot be used for mass production of silicon devices. c. it is very soft and fragile. b. it cannot emit light. d. it is very expensive.
answer

B- IT CANNOT EMIT LIGHT
question

An advantage of silicon over gallium arsenide is that: a.it is less fragile than gallium arsenide. c. it withstands higher temperatures than gallium arsenide. b. it survives much higher doses of radiation than gallium arsenide. d. it emits light, whereas gallium arsenide does not.
answer

A- IT IS LESS FRAGILE THAN GALLIUM ARSENIDE
question

_____ is 1/1,000,000,000,000 of a second a. Millisecond c. Nanosecond b. Microsecond d. Picosecond
answer

D- PICOSECOND
question

In the context of the power of computers, _____ means saving data in computer memory a. speed c. retrieval b. accuracy d. storage
answer

D- STORAGE
question

The word “memory” consists of 48 bits, which is equivalent to _____ bytes a. 6 c. 64 b. 24 d. 384
answer

A – 6
question

A _____ is the size of a character a. nibble c. byte b. bit d. word
answer

C – BYTE
question

Computers and communication systems use _____ to represent and transfer information between computers and network systems a. intranets c. data codes b. light pens d. prototypes
answer

C – DATE CODES
question

In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number. a. EBCDIC c. ASCII b. Unicode d. extended ASCII
answer

C – ASCII
question

Extended ASCII data code allows representation of _____ characters. a. 1042 c. 256 b. 265 d. 1024
answer

C- 256
question

ASCII defines up to _____ characters a. 8 c. 258 b. 128 d. 1024
answer

B- 128
question

A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning. a. motherboard c. mouse b. keyboard d. kernel
answer

C- MOUSE
question

Which of the following is an input device? a. Touch screen c. Liquid crystal display b. Cathode ray tube d. Inkjet printer
answer

A- TOUCH SCREEN
question

_____ is the most common output device for soft copy. a. Liquid crystal display c. Laser printer b. Inkjet printer d. Touch screen
answer

A- LIQUID CRYSTAL DISPLAY
question

_____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods. a. Random access memory c. Secondary memory b. Read-only memory d. Programmable read-only memory
answer

C- SECONDARY MEMORY
question

The Clipboard’s contents are typically stored on ____. a. read-only memory (ROM) c. magnetic disks b. random access memory (RAM) d. magnetic tapes
answer

B- RANDOM ACCESS MEMORY (RAM)
question

Read-only memory (ROM) is different from random access memory (RAM) in that: a. it is volatile memory. c. it is nonvolatile memory. b. it is a secondary memory. d. it is a read-write memory.
answer

C- IT IS NONVOLATILE MEMORY
question

Which of the following is true about magnetic tapes? a. It is made of metal. c. It resembles a compact disc. b. It stores data sequentially. d. It is a main memory device.
answer

B – IT STORES DATE SEQUENTIALLY
question

A write once, read many (WORM) disc is a common type of _____. a. magnetic storage c. random access memory (RAM) b. optical storage d. read-only memory (ROM)
answer

B- OPTICAL STORAGE
question

CD-ROMs and DVDs are examples of _____. a. magnetic tapes c. optical discs b. magnetic disks d. main memory devices
answer

C – OPTICAL DICS
question

A _____ allows data to be stored in multiple places to improve a system’s reliability a. remote access server b. read-only memory c. random access memory d. redundant array of independent disks
answer

D – REDUNDAT ARRAY OF INDEPENDENT DISKS
question

_____ storage, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties. a. Kernel c. Cache b. Buffer d. Cloud
answer

D – CLOUD
question

_____ allow off-site users to connect to network resources, such as network file storage, printers, and databases a. Remote access servers c. Application servers b. Web servers d. Disk servers
answer

A- REMOTE ACCESS SERVERS
question

Which of the following best defines an operating system? a. It is a set of programs for controlling and managing computer hardware and software. c. It is a collection of disk drives used for fault tolerance, typically in large network systems. b. It is a computer and all the software for managing network resources and offering services to a network. d. It is the main circuit board containing connectors for attaching additional boards.
answer

A- It is a set of programs for controlling and managing computer hardware and software
question

The control programs managing computer hardware and software perform the _____ function to control and prioritize tasks performed by the CPU. a. application management c. data management b. resource allocation d. job management
answer

D- JOB MANAGEMENT
question

The supervisor program in an operating system (OS) is called the ____. a. kernel c. applet b. metadata d. cache
answer

A- KERNEL
question

UNIX is a type of _____. a. storage area network c. remote access server b. application software d. operating system
answer

D- OPERATING SYSTEM
question

_____ computer languages are machine independent and are called high-level languages. a. First-generation c. Third-generation b. Second-generation d. Fourth-generation
answer

C- THRID-GENERATION
question

Java and C++ are _____ languages. a. assembly c. machine b. high-level d. second-generation computer
answer

B- HIGH-LEVEL
question

Which of the following computer languages is the easiest to use? a. Assembly language c. Fourth-generation language b. First-generation language d. Machine language
answer

C- FOURTH- GENERATION LANGUAGE
question

A(n) _____ is a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information
answer

COMPUTER
question

The _____ is the heart of a computer
answer

CENTRAL PROCESSING UNIT (CPU)
question

The _____ tells the computer what to do, such as instructing the computer which device to read or send output to
answer

CONTROL UNIT
question

A(n) _____ is the enclosure containing a computer’s main components
answer

CENTRAL PROCESSING (CPU) CASE
question

The _____ computers include parallel processing, gallium arsenide chips that run at higher speeds and consume less power than silicon chips, and optical technologies
answer

FIFTH-GENERATION
question

_____ bits equal 1 byte
answer

EIGHT
question

The most common data code for text files, PC applications, and the Internet is _____, developed by the American National Standards Institute
answer

American Standard Code for Information Interchange (ASCII)
question

_____ is a light-sensitive stylus connected to the monitor with a cable. When it is placed on an on-screen location, the data in that spot is sent to the computer.
answer

LIGHT PEN
question

The most common type of main memory is a semiconductor memory chip made of _____.
answer

SILICON
question

A(n) _____, made of Mylar or metal, is used for random-access processing
answer

MAGNETIC DISK
question

_____ use laser beams to access and store data
answer

OPTICAL DISCS
question

_____ computers are usually compatible with the IBM System/360 line introduced in 1965
answer

MAINFRAME
question

_____ servers store computer software, which users can access from their workstations.
answer

APPLICATION
question

Microsoft PowerPoint is the most commonly used _____ software
answer

PRESENTATION
question

_____ software, which is extensively used in architecture and engineering firms, is used for drafting and design and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.
answer

COMPUTER-AIDED DESIGN (CAD)
question

Provide a general description of how to write a computer program
answer

To write a computer program, first a user must know what needs to be done, and then he or she must plan a method to achieve this goal, including selecting the right language for the task. Many computer languages are available; the language the user selects depends on the problem being solved and the type of computer he or she is using
question

What is a bus?
answer

A bus is a link between devices connected to the computer. It can be parallel or serial, internal (local) or external.
question

Write a short note on single processor and multiprocessor systems
answer

Some computers have a single processor; other computers, called multiprocessors, contain multiple processors. Multiprocessing is the use of two or more CPUs in a single computer system. Generally, a multiprocessor computer has better performance than a single-processor computer in the same way that a team would have better performance than an individual on a large, time-consuming project.
question

What is a motherboard
answer

A motherboard is the main circuit board containing connectors for attaching additional boards. In addition, it usually contains the CPU, Basic Input/Output System (BIOS), memory, storage, interfaces, serial and parallel ports, expansion slots, and all the controllers for standard peripheral devices, such as the display monitor, disk drive, and keyboard.
question

Describe how computer speed is measured
answer

Typically, computer speed is measured as the number of instructions performed during the following fractions of a second: a. Millisecond: 1/1,000 of a second b. Microsecond: 1/1,000,000 of a second c. Nanosecond: 1/1,000,000,000 of a second d. Picosecond: 1/1,000,000,000,000 of a second
question

Describe a binary system.
answer

Every character, number, or symbol on the keyboard is represented as a binary number in computer memory. A binary system consists of 0s and 1s, with a 1 representing “on” and a 0 representing “off,” similar to a light switch.
question

Describe touch screens
answer

Touch screens, which usually work with menus, are a combination of input devices. Some touch screens rely on light detection to determine which menu item has been selected, and others are pressure sensitive. Touch screens are often easier to use than keyboards, but they might not be as accurate because selections can be misread.
question

What are the most common output devices for soft copy?
answer

The most common output devices for soft copy are cathode ray tube (CRT), plasma display, and liquid crystal display (LCD).
question

What are the three main types of secondary memory devices?
answer

There are three main types of secondary memory devices: magnetic disks, magnetic tape, and optical discs
question

What is the reason for the popularity of memory sticks?
answer

Memory sticks have become popular because of their small size, high storage capacity, and decreasing cost
question

Explain how redundant array of independent disks (RAID) provides fault tolerance and improved performance.
answer

With RAID, data can be stored in multiple places to improve the system’s reliability. In other words, if one disk in the array fails, data is not lost. In some RAID configurations, sequences of data can be read from multiple disks simultaneously, which improves performance
question

What are fax servers?
answer

Fax servers contain software and hardware components that enable users to send and receive faxes
question

What are print servers?
answer

Print servers enable users to send print jobs to network printers
question

Describe desktop publishing software.
answer

Desktop publishing software is used to produce professional-quality documents without expensive hardware and software. This software works on a “what-you-see-is-what-you-get” concept, so the high-quality screen display gives a user a good idea of what he or she will see in the printed output.
question

What is assembly language?
answer

Assembly language is the second generation of computer languages. It is a higher-level language than machine language but is also machine dependent. It uses a series of short codes, or mnemonics, to represent data or instructions. For example, ADD and SUBTRACT are typical commands in assembly language. Writing programs in assembly language is easier than in machine language
question

Describe the use of gallium arsenide as a replacement for silicon
answer

Because silicon cannot emit light and has speed limitations, computer designers have concentrated on technology using gallium arsenide, in which electrons move almost five times faster than in silicon. Devices made with this synthetic compound can emit light, withstand higher temperatures, and survive much higher doses of radiation than silicon devices. The major problems with gallium arsenide are difficulties in mass production. This material is softer and more fragile than silicon, so it breaks more easily during slicing and polishing. Because of the high costs and difficulty of production, the military is currently the major user of this technology. However, research continues to eliminate some shortcomings of this technology.
question

Discuss the three basic tasks performed by computers
answer

Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations. Computers can add, subtract, multiply, divide, and raise numbers to a power (exponentiation), as shown in these examples: A + B (addition) 5 + 7 = 12 A − B (subtraction) 5 − 2 = 3 A * B (multiplication) 5 * 2 = 10 A / B (division) 5 / 2 = 2.5 A ^ B (exponentiation) 5 ^ 2 = 25
question

What is the most common type of main memory? Describe the purpose of cache RAM.
answer

The most common type of main memory is a semiconductor memory chip made of silicon. A semiconductor memory device can be volatile or nonvolatile. Volatile memory is called random access memory (RAM), although you could think of it as “read-write memory.” In other words, data can be read from and written to RAM. Some examples of the type of information stored in RAM include open files, the Clipboard’s contents, running programs, and so forth
question

Describe the data management function of an operating system.
answer

The data management function of an operating system controls data integrity by generating checksums to verify that data has not been corrupted or changed. Briefly, when the OS writes data to storage, it generates a value (the checksum) along with the data. The next time this data is retrieved, the checksum is recalculated and compared with the original checksum. If they match, the integrity is intact. If they do not, the data has been corrupted somehow.
question

Describe fifth-generation languages (5GLs) and some of their features
answer

Fifth-generation languages (5GLs) use some of the artificial intelligence technologies, such as knowledge-based systems, natural language processing (NLP), visual programming, and a graphical approach to programming. Codes are automatically generated and designed to make the computer solve a given problem without a programmer or with minimum programming effort. These languages are designed to facilitate natural conversations between a user and the computer. Imagine that the user could ask his or her computer, “What product generated the most sales last year?” The computer, equipped with a voice synthesizer, could respond, “Product X.” Dragon NaturallySpeaking Solutions is an example of NLP. Research continues in this field because of the promising results so far
question

1. Although a database can consist of only a single file, it is usually a group of files.
answer

true
question

2. A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.
answer

true
question

3. Data redundancy is eliminated or minimized in a flat file system.
answer

false The problem with a flat file organization was that the same data could be stored in more than one file, creating data redundancy.
question

4. Updating a flat file system is efficient and consumes less time.
answer

false Updating a flat file system can be time consuming and inefficient. Data might not be updated in all files consistently, resulting in conflicting reports generated from these files.
question

5. An advantage that a database has over a flat file system is that more information can be generated from the same data.
answer

True
question

6. The database component of an information system can generate sufficient business intelligence by accessing just the internal data of an organization.
answer

false To generate business intelligence, the database component of an information system needs access to two types of data: internal and external
question

7. Labor and population statistics are sources of internal data that are accessed by a database.
answer

false Labor and population statistics are sources of external data that are accessed by a database.
question

8. The sequential access file structure method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis.
answer

true
question

9. Disks are sequential access devices, whereas tapes are random access devices.
answer

false Disks are random access devices, whereas tapes are sequential access devices.
question

10. The indexed sequential access method (ISAM) is slow and becomes increasingly useful as the number of records becomes larger.
answer

false Because every record needs to be indexed, if the file contains a huge number of records, the index is also quite large. Therefore, an index is more useful when the number of records is small. Access speed with this method is fast, so it is recommended when records must be accessed frequently.
question

11. With the indexed sequential access method (ISAM), records cannot be accessed randomly.
answer

false With the ISAM, records can be accessed sequentially or randomly, depending on the number being used.
question

12. For each database, there can be more than one physical view of data.
answer

false For each database, there is only one physical view of data.
question

13. The integrity rules component of a data model defines the boundaries of a database, constraints, and access methods.
answer

true
question

14. In a hierarchical data model, nodes with the same parents are called siblings.
answer

true
question

15. The network data model is similar to the hierarchical data model because records are organized in the same way
answer

false The network data model is similar to the hierarchical data model but records are organized differently.
question

16. In a relational model, the rows are called attributes and the columns are called tuples.
answer

False In a relational data model, rows are records (also called tuples), and columns are fields (also called attributes).
question

17. Redundant data is eliminated by a process called normalization.
answer

True
question

18. A select operation pares down a table by eliminating columns according to certain criteria
answer

False A select operation searches data in a table and retrieves records based on certain criteria. A project operation pares down a table by eliminating columns according to certain criteria.
question

19. Any changes to a database’s structure, such as adding a field, deleting a field, changing a field’s size, or changing the data type stored in a field, are made with the data manipulation component.
answer

False Any changes to a database’s structure, such as adding a field, deleting a field, changing a field’s size, or changing the data type stored in a field, are made with the data definition component.
question

20. A database engine converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS).
answer

true
question

21. The use of OR operator means that only one of the conditions in an SQL statement must be met.
answer

true
question

22. In the context of data administration component, the acronym CRUD stands for copy, revise, undo, and define
answer

False CRUD stands for create, read, update, and delete.
question

23. A database administrator is responsible for developing recovery procedures in case data is lost or corrupted.
answer

true
question

24. In well-designed data-driven Web sites, changes are made to the HTML code every time a Web site’s data content changes.
answer

False Without the features of a data-driven Web site, Web site designers must edit the HTML code every time a Web site’s data content is changed.
question

25. An e-commerce site that needs frequent updates would benefit from the use of a static Web site.
answer

False Data-driven Web sites are useful for E-commerce sites that need frequent updates. With a data-driven Web site, users can get more current information from a variety of data sources.
question

26. A distributed database is not limited by the data’s physical location.
answer

true
question

27. In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods.
answer

true
question

28. Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions.
answer

False Data in a data warehouse is used for analytical purposes, whereas data in a database is used for capturing and managing transactions.
question

29. As compared to data warehouses, consolidating information from different departments or functional areas is easier in data marts.
answer

False Data marts usually have more limited scope than data warehouses, and consolidating information from different departments or functional areas is more difficult.
question

30. Business intelligence uses scorecards and query reports to support decision-making activities, whereas business analytics uses data mining tools and predictive modeling.
answer

True
question

31. The popularity of social networks has contributed to the growth of big data.
answer

True
question

1. In comparison to a flat file system, in a database, _____. a. complex requests can be difficult to handle c. programs and data are interdependent b. more storage space is required d. more sophisticated security measures can be seen
answer

D
question

2. Which of the following is a source of internal data? a. Tax records c. Distribution networks b. Sales records d. Economic indicators
answer

B
question

3. Which of the following is a source of external data? a. Tax records c. Transaction records b. Sales records d. Personnel records
answer

a
question

4. The _____ view of a database involves how data is stored on and retrieved from storage media. a. physical c. rational b. logical d. analytical
answer

A
question

5. The first step in database design is defining a _____, which defines how data is created, represented, organized, and maintained. a. data warehouse c. data dictionary b. data mart d. data model
answer

D
question

6. Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data? a. Data structure c. Integrity rules b. Operations d. File structure
answer

B
question

7. The _____ of a data model defines the boundaries of a database, such as maximum and minimum values allowed for a field. a. data structure c. integrity rules b. operations d. file structure
answer

C
question

8. In a(n) _____ data model, each record can have multiple parent and child records. a. network c. operations b. hierarchical d. relational
answer

A
question

9. To begin designing a relational database, one must define the _____ by defining each table and the fields in it. a. physical structure c. primary key b. logical structure d. foreign key
answer

B
question

10. A _____ stores definitions, such as data types for fields, default values, and validation rules for data in each field. a. data dictionary c. data warehouse b. data mine d. data mart
answer

A
question

11. In a relational model, when a primary key for one table appears in another table, it is called a _____ key. a. secondary c. surrogate b. foreign d. domain
answer

B
question

12. _____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table. a. Optimization c. Normalization b. Fragmentation d. Encapsulation
answer

C
question

13. In a relational data model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria. a. insert c. find b. join d. select
answer

D
question

14. A(n) _____ operation pares down a table by eliminating columns according to certain criteria. a. project c. find b. join d. insert
answer

A
question

15. The _____ component is responsible for data storage, manipulation, and retrieval. a. data definition c. application generation b. data administration d. database engine
answer

D
question

16. The _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. a. data manipulation c. data definition b. application generation d. data administration
answer

C
question

17. The _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database. a. data manipulation c. data definition b. application generation d. data administration
answer

A
question

18. The _____ operator is used when all the conditions in a query by example (QBE) form are required to be met. a. NOT c. OR b. AND d. MIS
answer

B
question

19. The _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. a. data manipulation c. data definition b. application generation d. data administration
answer

D
question

20. The _____ approach to setting up a distributed database management system (DDBMS) combines fragmentation and replication. a. optimization c. encapsulation b. allocation d. normalization
answer

B
question

21. A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. a. data dictionary c. data mine b. data pattern d. data warehouse
answer

D
question

22. Data warehouses are sometimes called “hypercubes” because they_____. a. are function oriented c. capture raw transaction data b. store multidimensional data d. manage transactions
answer

B
question

23. Data in a data warehouse can be differentiated from data in a database in that the former _____. a. captures raw transaction data c. is focused on a specific area b. is used for capturing and managing transactions d. only keeps recent activity in memory
answer

C
question

24. Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports? a. Online analytical processing c. Enterprise resource planning systems b. Online transaction processing d. Data mining analysis
answer

C
question

25. In a data warehouse, _____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing. a. extraction c. loading b. transformation d. aggregation
answer

A
question

26. _____ is information in its original form. a. Summary data c. Paradata b. Raw data d. Metadata
answer

B
question

27. _____ gives users subtotals of various categories, which can be useful. a. Summary data c. Open data b. Raw data d. Metadata
answer

A
question

28. _____ is information about data—its content, quality, condition, origin, and other characteristics. a. Metadata c. Summary data b. Big data d. Raw data
answer

A
question

29. A _____ is usually a smaller version of a data warehouse, used by a single department or function. a. data domain c. data dictionary b. data mine d. data mart
answer

D
question

30. Which of the following statements is true of data marts and data warehouses? a. Consolidating information from different departments is easier in data marts than in data warehouses. c. Access to data is often slower in data marts than in data warehouses. b. Data marts have more extended scope than data warehouses. d. Despite being smaller, data marts can usually perform the same type of analysis as data warehouses.
answer

D
question

31. Business analytics uses _____ to support decision-making activities. a. data mining tools c. query reports b. dashboards d. OLAP
answer

A
question

32. Which of the following statements is true of big data? a. It is a consequence of geometric decay of data in data warehouses. c. Its three dimensions are value, density, and uniformity. b. It can be efficiently processed and managed by conventional computing methods. d. It is a result of exponential growth of data in both public and private organizations.
answer

D
question

33. The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes. a. viscosity c. variety b. volume d. velocity
answer

B
question

34. The variety dimension of big data refers to a combination of _____. a. data warehouse and data mart c. structured data and unstructured data b. raw data and metadata d. data definition and data manipulation
answer

C
question

35. Which of the following is a key factor that has contributed to the growth and popularity of big data? a. Implosion in data growth c. Mobile and wireless technology b. Brick and mortar businesses d. Exponential decay of organizational data
answer

C
question

36. Which of the following factors has made big data analytics accessible to nearly all types of organizations? a. Significant improvements in storage technology c. Significant increase in costs b. Flat file organization of data d. Increase in the volume of business data
answer

A
question

1. A(n) _____ is a collection of related data that is stored in a central location or multiple locations.
answer

database
question

2. A(n) _____ is the structure and organization of data, which involves fields, records, and files.
answer

data hierarchy
question

3. A(n) _____ is software for creating, storing, maintaining, and accessing database files.
answer

database management system (DBMS)
question

4. In a(n) _____ file structure, records in files are organized and processed in numerical order.
answer

sequential access
question

5. In a(n) _____ file structure, records can be accessed in any order, regardless of their physical location in storage media
answer

random access
question

6. The advantage of _____ is that both sequential and random access can be used, depending on the situation and the user’s needs.
answer

indexed sequential access method (ISAM)
question

7. The _____ view of a database involves how information appears to users and how it can be organized and retrieved.
answer

logical
question

8. In a(n) _____ data model, the relationships among records form a treelike structure.
answer

hierarchical
question

9. In a relational database, every record must be uniquely identified by a(n) _____ key.
answer

primary
question

10. In large organizations, database design and management is handled by the _____.
answer

database administrator (DBA)
question

11. Grouping objects along with their attributes and methods into a class is called _____.
answer

encapsulation
question

12. _____ refers to new objects being created faster and more easily by entering new data in attributes.
answer

Inheritance
question

13. _____ is used to facilitate and manage transaction oriented applications, such as point-of-sale, data entry, and retrieval transaction processing.
answer

Online transaction processing (OLTP)
question

14. _____ analysis is used to discover patterns and relationships.
answer

Data-mining
question

15. _____ is data so voluminous that conventional computing methods are not able to efficiently process and manage it.
answer

Big data
question

1. What type of files might a college database have?
answer

A college database might have files for students, staff, faculty, and courses.
question

2. In the past, why was data stored in “flat files”?
answer

In the past, data was stored in a series of files called “flat files” because they were not arranged in a hierarchy, and there was no relationship among these files.
question

3. What are some of the sources of external data?
answer

Some of the sources of external data are: Competitors, customers, and suppliers Distribution networks Economic indicators (for example, the consumer price index) Government regulations Labor and population statistics Tax records
question

4. Describe how files are accessed in a random access file structure.
answer

In a random access file structure, records can be accessed in any order, regardless of their physical location in storage media. This method of access is fast and very effective when a small number of records need to be processed daily or weekly.
question

5. Explain the ways in which information in a database is observed through a physical view.
answer

The physical view involves how data is stored on and retrieved from storage media, such as hard disks, magnetic tapes, or CDs. For each database, there is only one physical view of data.
question

6. What is a relational data model?
answer

A relational model uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes).
question

7. Describe the tasks performed in the first normal form (1NF) stage of normalization.
answer

: The following three tasks are performed in the 1NF stage: a. Eliminating duplicated fields from the same table b. Creating separate tables for each group of related data c. Identifying each record with a unique field (the primary key)
question

8. Describe how data stored in a relational model is retrieved from tables.
answer

Data stored in a relational model is retrieved from tables by using operations that pick and combine data from one or more tables. There are several operations, such as select, project, join, intersect, union, and difference. The first three operations are the most commonly used.
question

9. What is the function of the data definition component of a database management system?
answer

The data definition component is used to create and maintain the data dictionary and define the structure of files in a database.
question

10. What is structured query language (SQL)?
answer

Structured query language (SQL) is a standard fourth-generation query language used by many DBMS packages, such as Oracle Database 11g and Microsoft SQL Server.
question

11. What is a data-driven Web site?
answer

A data-driven Web site acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
question

12. What is the function of a distributed database management system (DDBMS)?
answer

A distributed database management system (DDBMS) stores data on multiple servers throughout an organization.
question

13. Describe the fragmentation approach to setting up a distributed database management system.
answer

The fragmentation approach to setting up a distributed database management system addresses how tables are divided among multiple locations. There are three variations: horizontal, vertical, and mixed.
question

14. Describe the loading process used in data warehouses.
answer

Loading is the process of transferring data to the data warehouse. Depending on the organization’s needs and the data warehouse’s storage capacity, loading might overwrite existing data or add collected data to existing data.
question

15. What is business analytics?
answer

Business analytics (BA) uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on.
question

1. What are the advantages of a database over a flat file system?
answer

: A database has the following advantages over a flat file system: a. More information can be generated from the same data. b. Complex requests can be handled more easily. c. Data redundancy is eliminated or minimized. d. Programs and data are independent, so more than one program can use the same data. e. Data management is improved. f. A variety of relationships among data can be easily maintained. g. More sophisticated security measures can be used. h. Storage space is reduced.
question

2. List the responsibilities of a database administrator (DBA).
answer

A DBA’s responsibilities include: a. Designing and setting up a database b. Establishing security measures to determine users’ access rights c. Developing recovery procedures in case data is lost or corrupted d. Evaluating database performance e. Adding and fine-tuning database functions
question

3. Describe the features and benefits of an object-oriented database.
answer

Like object-oriented programming, object-oriented database represents real-world entities with database objects. An object consists of attributes (characteristics describing an entity) and methods (operations or calculations) that can be performed on the object’s data. For example, a real-world car can be represented by an object in the Vehicle class. Objects in this class have attributes of year, make, model, and license number, for example. One can then use methods to work with data in a Vehicle object, such as the AddVehicle method to add a car to the database. Thinking of classes as categories or types of objects can be helpful.
question

4. List and describe the features of data in a data warehouse in contrast to data in a database.
answer

Data in a data warehouse is described as having the following characteristics in contrast to data in a database: a. Subject oriented—Data in a data warehouse is focused on a specific area, such as the home- improvement business or a university. Data in a database is transaction/function oriented. b. Integrated—Data in a data warehouse comes from a variety of sources, whereas data in a database usually does not. c. Time variant— Data in a data warehouse is categorized based on time, such as historical information, whereas data in a database only keeps recent activity in memory. d. Type of data—Data in a data warehouse captures aggregated data, whereas data in a database captures raw transaction data. e. Purpose—Data in a data warehouse is used for analytical purposes, whereas data in a database is used for capturing and managing transactions.
question

5. Explain the transformation processes used in data warehouses.
answer

The tasks of transformation processing include the following: a. Selecting only certain columns or rows to load b. Translating coded values, such as replacing Yes with 1 and No with 2 c. Performing select, project, and join operations on data d. Sorting and filtering data e. Aggregating and summarizing data before loading it in the warehouse
question

6. What are the advantages of a data mart over a data warehouse?
answer

A data mart has the following advantages over a data warehouse: a. Access to data is often faster because of their smaller size. b. Response time for users is improved. c. They are easier to create because they are smaller and often less complex. d. They are less expensive. e. Users are targeted better, because a data mart is designed for a specific department or division; identifying their requirements and the functions they need is easier. A data warehouse is designed for an entire organization’s use.
question

7. What are the areas in the retail industry that can benefit from big data?
answer

The retail industry could benefit from big data analytics and gain a competitive advantage in the following areas: a. Customer relationship management b. Tailoring retail offerings to customer needs c. Offering personalized service d. Finding optimum store location and layout

Get instant access to
all materials

Become a Member