My Systems Analysis Ch.9 – Flashcards

Unlock all answers in this set

Unlock answers
question
____ is a coding method used on most personal computers.
answer
ASCII
question
In the accompanying figure, any field that could serve as a primary key is called a ____.
answer
candidate key
question
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.
answer
schema
question
____ codes combine data from different item attributes, or characteristics, to build the code.
answer
Derivation
question
A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.
answer
manipulation
question
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.
answer
True
question
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of ____.
answer
four digits for the year, two for the month, and two for the day (YYYYMMDD)
question
A(n) ____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
answer
ERD
question
A data warehouse allows users to specify certain dimensions, or characteristics.
answer
True
question
A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.
answer
query language
question
In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
answer
primary key
question
JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.
answer
Java
question
In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.
answer
recovery procedures
question
EBCDIC and ASCII both require ____ bits.
answer
eight
question
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
answer
False
question
A common field is an attribute that appears in only one entity.
answer
False
question
Like a primary key, a foreign key must be unique.
answer
False
question
The three normal forms constitute a progression in which the first normal form represents the best design.
answer
False
question
____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
answer
Scalability
question
In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
answer
foreign key
question
One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
answer
cardinality
question
Normal forms beyond 3NF exist, but they rarely are used in business-oriented systems.
answer
True
question
JDBC is the language of the Web.
answer
False
question
Unicode represents more than ____ unique, multilingual characters.
answer
65,000
question
____ is a coding method used on mainframe computers and high-capacity servers.
answer
EBCDIC
question
To bridge the gap between a database and the Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.
answer
middleware
question
A table design is in second normal form (2NF) if it is in 1NF and if all fields that are not part of the primary key are functionally independent on part of the primary key.
answer
False
question
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
answer
ODBC
question
Which of the following is a data coding and storage scheme?
answer
EBCDIC binary ASCII
question
In a client/server system, processing is isolated in a single computer.
answer
False
question
To protect stored data, users can be asked to furnish a proper user ID and password to access a file or database.
answer
True
question
A ____ is a set of letters or numbers that represents a data item.
answer
code
question
____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
answer
Encryption
question
Many three-character airport codes are cipher codes.
answer
False
question
During the systems design phase, ____ fields are used to organize, access, and maintain data structures.
answer
key
question
n the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
answer
foreign key
question
With a(n) ____ language, the user provides an example of the data requested.
answer
QBE
question
____ codes are numbers or letters assigned in a specific order.
answer
Sequence
question
An integer format uses ____ bits to represent the number 12,345 in binary form.
answer
16
question
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
answer
True
question
A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.
answer
structure
question
A ____ contains data about people, places, things, or events.
answer
table file
question
Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.
answer
mnemonic
question
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on other nonkey fields.
answer
False
question
____ describes how instances of one entity relate to instances of another entity.
answer
Cardinality
question
In an M:N relationship, the two entities are linked by an event or transaction called an associative entity, which has its own set of attributes and characteristics.
answer
True
question
Many database programs generate ____, which is a language that allows client workstations to communicate with servers and mainframe computers.
answer
SQL
question
Which of the following is a problem found with 1NF (first normal form) design that does not exist in 2NF (second normal form)?
answer
2NF tables always contain consistent data compared to 1NF tables
question
Middleware can interpret client requests in HTML form and translate the requests into commands that the database can execute.
answer
True
question
A table design that does not contain repeating groups is called unnormalized.
answer
False
question
A table is in first normal form (1NF) if it contains a repeating group.
answer
False
question
Which of the following is the advantage of a DBMS (database management system)?
answer
economy of scale stronger standards scalability
question
One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.
answer
referential
question
Compared with character-based formats, a ____ storage format offers a more efficient storage method.
answer
binary
question
A(n) ____ is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze the contents of data.
answer
DBMS
question
Binary digits have only ____ possible value(s).
answer
two
question
Security concerns about Web-based data design can be addressed with software that can protect the system and detect intrusion, for example.
answer
True
question
Any field that is not a primary key or a candidate key is called a ____ key.
answer
nonkey
question
When a primary key combines two or more fields, it is called a ____ key.
answer
composite
question
A long integer format uses ____ bits to represent the number 1,234,567,890 in binary form.
answer
32
question
Migrating a traditional database design to the Web rarely requires design modification or additional software.
answer
False
question
In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.
answer
False
question
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
answer
True
question
A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.
answer
True
question
____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.
answer
Normalization
question
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
answer
True
question
Web-based data design requires users to have powerful workstations.
answer
False
question
Web-based data must be secure but in order to be so, it cannot be easily accessible to authorized users.
answer
False
question
In ASCII, the number 1,234,567,890 requires ____ bytes of storage.
answer
ten
question
A primary key cannot be composed of more than one field.
answer
False
question
Three main types of relationships that can exist between entities are a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
answer
True
question
In an entity-relationship diagram, entities are represented as ____.
answer
rectangles
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New