TEST I - Multiple Choice: C. Data
TEST I - Multiple Choice: C. Data
Computer Education
TEST I - Multiple Choice
2) It is called raw facts that are not yet processed to reveal its meaning?
a. Database b. Information c. Data d. None of These
3) The collection of programs that manages the database structure and controls access to the data
stored in the database.
a. Database Management System b. System Management c. System Software d.
System Design
4) DBMS create an environment in which end users have better access to more and better-managed
data.
a. Improved Data Sharing b. Improved Data Security c. Better Data Integration
d. Minimized Data Inconsistency
5) It will exists when different versions of the same data appear in different places.
a. Data Security b. Data Integration c. Data Inconsistency d. None of These
6) Is a specific request issued to the DBMS for data manipulation – example, to read and update the
data?
a. Query b. Information c. Standard d. Manipulation
7) The more users access the data, the greater the risks of data security breaches, this will provides a
framework for better enforcement of data privacy and security policies.
a. Improved Data Sharing b. Improved Data Security c. Better Data Integration
d. Minimized Data Inconsistency
8) Well managed data promotes an integrated view of the organization’s operations and a clearer
view of the big picture.
a. Improved Data Sharing b. Improved Data Security c. Better Data Integration
d. Minimized Data Inconsistency
9) Refers to the activities that focus on the design of the database structure that will be used to store
and manage end-user data.
a. Database design b. Structure c. Security d. Database Server
10) Are data that exist in their original (raw) stated, that is, in the format in which they were collected?
a. Unstructured Data b. Structured Data c. Format d. Information
TEST II - Explanation
1. Explain the difference between data and information.
2. What is Database Management System, and what are their functions?
3. What is data redundancy, and which characteristics of the file system can lead to it?