Computer Science Chapter 1 Discuss how the database approach and the non

subject Type Homework Help
subject Pages 9
subject Words 1425
subject Authors Mary Z. Last, Philip J. Pratt

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 1: Introduction to Database Management
True / False
1. Redundancy wastes space because you are storing different types of data in the same place.
a.
True
b.
False
2. When you need to change data, redundancy makes your changes more cumbersome and time-consuming.
a.
True
b.
False
3. An entity is also defined as an attribute.
a.
True
b.
False
4. An attribute is a characteristic or property of an entity.
a.
True
b.
False
5. An attribute is known as a row in most databases.
a.
True
b.
False
6. A database will not only hold information about multiple types of entities, but also information about the relationships
among these multiple entities.
a.
True
b.
False
7. Each table in a database represents two or more entities.
page-pf2
Chapter 1: Introduction to Database Management
a.
True
b.
False
8. The relationship between different entities (in different tables) is handled by their common columns.
a.
True
b.
False
9. Software packages, called database management systems, can do the job of manipulating databases for you.
a.
True
b.
False
10. Programs created with Visual Basic, Java, Perl, PHP, or C++ can access the database directly, rather than having to
access it through the DBMS.
a.
True
b.
False
11. To create forms to use with a database you must write a program.
a.
True
b.
False
12. Sharing data is one advantage of database processing.
a.
True
b.
False
13. An advantage of using the database approach to processing is that it facilitates consistency.
a.
True
b.
False
page-pf3
Chapter 1: Introduction to Database Management
14. A DBA can assign passwords to prevent unauthorized users from accessing the data.
a.
True
b.
False
15. There is a greater impact of failure in a nondatabase, file-oriented system.
a.
True
b.
False
Multiple Choice
16. Storing the same data in more than one place is called ____.
a.
data independence
b.
redundancy
c.
data integrity
d.
security
17. A(n) ____ is also called a field or column in many database systems.
a.
attribute
b.
entity
c.
data file
d.
relationship
18. A(n) ____ is a person, place, object, event, or idea for which you want to store and process data.
a.
attribute
b.
DBMS
c.
entity
d.
DBA
page-pf4
Chapter 1: Introduction to Database Management
19. A(n) ____ is the computer counterpart to an ordinary paper file you might keep in a file cabinet or an accounting
ledger.
a.
database
b.
spreadsheet
c.
data file
d.
attribute
20. The ____ of an entity become the columns in the database table.
a.
attributes
b.
tuples
c.
data files
d.
E-R diagrams
21. Unlike a typical data file, a database can store information about multiple ____.
a.
attributes
b.
bytes
c.
entities
d.
characters
22. A visual way to represent a database is with a(n) ____.
a.
spreadsheet
b.
DBMS
c.
entity-relationship diagram
d.
DBA
23. Popular ____ include Access, Oracle, DB2, MySQL, and SQL Server.
a.
E-R diagrams
b.
DBAs
c.
data files
d.
DBMSs
page-pf5
24. During the ____ process, a database expert determines the structure of the required database.
a.
data security
b.
database integrity
c.
database design
d.
database selection
25. ____ are screen objects used to maintain, view, and print data from a database.
a.
Fields
b.
Forms
c.
Data files
d.
Entities
26. Which of the following statements is correct?
a.
In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each
system having its own collection of files.
b.
User data cannot be combined and shared among authorized users.
c.
Database users should not have access to the same information.
d.
The elimination of redundancy is always possible.
27. An integrity constraint is a rule that ____.
a.
is kept in an external file
b.
data must follow in the database
c.
can be accessed only by authorized users
d.
can unintentionally be accessed by unauthorized users
28. A database has ____ if the data in it satisfies all established integrity constraints.
a.
redundancy
b.
integrity
c.
data independence
d.
database design
page-pf6
Chapter 1: Introduction to Database Management
29. ____ is the prevention of unauthorized access to the database.
a.
Data independence
b.
Integrity constraint
c.
Redundancy
d.
Security
30. A(n) ____ frees programmers who write database access programs from having to engage in mundane data
manipulation activities, such as adding new data and deleting existing data.
a.
E-R diagram
b.
DBA
c.
entity
d.
DBMS
31. A person who is in charge of a database within an organization is often called the database ____.
a.
writer
b.
designer
c.
administrator
d.
controller
32. A good ____ should provide an opportunity for users to incorporate integrity constraints when they design the
database.
a.
database administrator
b.
DBA
c.
E-R diagram
d.
DBMS
33. A DBMS lets you assign users to ____.
a.
groups
b.
classes
page-pf7
Chapter 1: Introduction to Database Management
c.
attributes
d.
clusters
34. ____ is a property that lets you change the structure of the database without requiring you to change the programs that
access the database.
a.
Database design
b.
Data independence
c.
Integrity constraint
d.
Data dependence
35. One disadvantage of a database system is ____.
a.
a larger file size
b.
data dependence
c.
reduced integrity
d.
reduced productivity
36. In a(n) ____________________ relationship between two entities, each occurrence of the first entity is related to
many occurrences of the second entity and each occurrence of the second entity is related to only one occurrence of the
first entity.
37. A program, or collection of programs, through which users interact with a database is known as a(n)
_________________________.
38. In an E-R diagram, ____________________ represent entities.
page-pf8
39. In an E-R diagram, ____________________ represent relationships between connected entities.
40. In an E-R diagram, the ____________________ at the end of a line indicates the “many” part of the one-to-
many relationship between two entities.
41. A group of people in charge of a database within an organization is often called the ____________________.
42. The problem of inconsistency in data is a direct result of ____________________.
43. Eliminating ____________________ not only saves space but also makes the process of updating data much
simpler.
44. A good _________________________ has many features that allow users to gain access to data in a
database without having to do any programming.
45. A database file requires a large amount of disk space and internal ____________________.
page-pf9
Chapter 1: Introduction to Database Management
Essay
46. List the advantages of database processing.
47. Explain why it is better to try to control redundancy rather than eliminate it.
48. Discuss how the database approach and the nondatabase approach differ in terms of ensuring the security of the
database.
49. List the disadvantages of database processing.
50. Explain why the impact of failure is greater in database processing, compared with the nondatabase
approach.
page-pfa

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.