INFO90002 Ryan
INFO90002 Ryan
Chapter 1
1) A database is an organized collection of ________ related data.
A) logically
B) physically
C) loosely
D) badly
Answer: A
LO: 3.1: Define key terms.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
7) A graphical system used to capture the nature and relationships among data is
called a(n):
A) XML data model.
B) hypertext graphic.
C) relational database
D) data model.
Answer: D
11) ________ are established between entities in a well-structured database so that the
desired information can be retrieved.
A) Entities
B) Relationships
C) Lines
D) Ties
Answer: B
LO: 1.3: Explain at least 10 advantages of the database approach, compared to
traditional file processing.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
35) The SDLC phase in which every data attribute is defined, every category of data
is listed and every business relationship between data entities is defined is called the
________ phase.
A) planning
B) design
C) analysis
D) implementation
Answer: C
LO: 1.7: Describe the life cycle of a systems development project, with an emphasis
on the purpose of database analysis, design, and implementation activities.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
Week 2
Chapter 4
1) ________ database specification indicates all the parameters for data storage that
are then input to database implementation.
A) Logical
B) Physical
C) Schematic
D) Conceptual
Answer: B
LO: 4.1: Define key terms.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
6) An attribute (or attributes) that uniquely identifies each row in a relation is called a:
A) column.
B) foreign field.
C) primary key.
D) duplicate key.
Answer: C
LO: 4.1: Define key terms.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
17) The ________ states that no primary key attribute may be null.
A) referential integrity constraint
B) entity integrity rule
C) partial specialization rule
D) range domain rule
Answer: B
LO: 4.3: State two essential properties of a candidate key.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
19) All of the following are the main goals of normalization EXCEPT:
A) minimize data redundancy.
B) simplify the enforcement of referential integrity.
C) maximize storage space.
D) make it easier to maintain data.
Answer: C
LO: 4.4: Give a concise definition of each of the following: first normal form, second
normal form, and third normal form.
Difficulty: Difficult
Classification: Concept
AACSB: Information Technology
Week 3
Chapter 2, 4
1) The logical representation of an organization's data is called a(n):
A) database model.
B) entity-relationship model.
C) relationship systems design.
D) database entity diagram.
Answer: B
LO: 2.1: Define key terms.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
6) In an E-R diagram, there are/is ________ business rule(s) for every relationship.
A) two
B) three
C) one
D) zero
Answer: A
LO: 2.3: Write good names and definitions for entities, relationships, and attributes.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
13) An entity type whose existence depends on another entity type is called a
________ entity.
A) strong
B) weak
C) codependent
D) variant
Answer: B
LO: 2.3: Write good names and definitions for entities, relationships, and attributes.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
A) a one-to-many relationship.
B) a strong entity and its associated weak entity.
C) a co-dependent relationship.
D) a double-walled relationship.
Answer: B
LO: 2.3: Write good names and definitions for entities, relationships, and attributes.
Difficulty: Moderate
Classification: Application
AACSB: Information Technology, Application of Knowledge
19) A person's name, birthday, and social security number are all examples of:
A) attributes.
B) entities.
C) relationships.
D) descriptors.
Answer: A
LO: 2.3: Write good names and definitions for entities, relationships, and attributes.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
21) An attribute that can be broken down into smaller parts is called a(n) ________
attribute.
A) associative
B) simple
C) composite
D) complex
Answer: C
LO: 2.3: Write good names and definitions for entities, relationships, and attributes.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
22) The number of entity types that participate in a Unary relationship is:
A) zero.
B) one.
C) two.
D) three.
Answer: B
LO: 2.4: Distinguish unary, binary, and ternary relationships and give a common
example of each.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
37) A relationship where the minimum and maximum cardinality are both one is a(n)
________ relationship.
A) optional
B) unidirectional
C) mandatory link
D) mandatory one
Answer: D
LO: 2.5: Model each of the following constructs in an E-R diagram: composite
attribute, multivalued attribute, derived attribute, associative entity, identifying
relationship, and minimum and maximum cardinality constraints.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
20) When all multivalued attributes have been removed from a relation, it is said to be
in:
A) first normal form.
B) second normal form.
C) Boyce-Codd normal form.
D) third normal form.
Answer: A
LO: 4.4: Give a concise definition of each of the following: first normal form, second
normal form, and third normal form.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
21) The normal form which removes any remaining functional dependencies because
there was more than one primary key for the same nonkeys is called:
A) fifth normal form.
B) fourth normal form.
C) Boyce-Codd normal form.
D) sixth normal form.
Answer: C
LO: 4.4: Give a concise definition of each of the following: first normal form, second
normal form, and third normal form.
Difficulty: Difficult
Classification: Concept
AACSB: Information Technology
22) The normal form which deals with multivalued dependencies is called:
A) fifth normal form.
B) fourth normal form.
C) Boyce-Codd normal form.
D) sixth normal form.
Answer: B
LO: 4.4: Give a concise definition of each of the following: first normal form, second
normal form, and third normal form.
Difficulty: Difficult
Classification: Concept
AACSB: Information Technology
23) A relation that contains no multivalued attributes and has nonkey attributes solely
dependent on the primary key but contains transitive dependencies is in which normal
form?
A) First
B) Second
C) Third
D) Fourth
Answer: B
LO: 4.4: Give a concise definition of each of the following: first normal form, second
normal form, and third normal form.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
Week 4
Chapter 6
11) The SQL command ________ adds one or more new columns to a table.
A) create table
B) alter table
C) create view
D) create relationship
Answer: B
LO: 6.3: Define a database using the SQL data definition language.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
0) In an SQL statement, which of the following parts states the conditions for row
selection?
A) Select
B) From
C) Where
D) Group By
Answer: C
LO: 6.3: Define a database using the SQL data definition language.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
21) The first part of an SQL query to be read is the ________ statement.
A) SELECT
B) FROM
C) WHERE
D) ORDER BY
Answer: B
LO: 6.3: Define a database using the SQL data definition language.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
43) Which of the following is true of the order in which SQL statements are
evaluated?
A) The SELECT clause is always processed first.
B) The SELECT clause is always processed last.
C) The SELECT clause is processed before the ORDER BY clause.
D) The GROUP BY clause is processed before the WHERE clause.
Answer: C
LO: 6.4: Write single-table queries using SQL commands.
Difficulty: Difficult
Classification: Concept
AACSB: Information Technology
Week 5
Chapter 7
17) The following code would include:
A) all rows of the Order_T Table regardless of matches with the Customer_T Table.
B) all rows of the Customer_T Table regardless of matches with the Order_T Table.
C) only rows that match both Customer_T and Order_T Tables.
D) only rows that don't match both Customer_T and Order_T Tables.
Answer: B
LO: 7.3: Define three types of join commands and use SQL to write these commands.
Difficulty: Moderate
Classification: Application
AACSB: Information Technology
19) A join that is based upon equality between values in two common columns with
the same name and where one duplicate column has been removed is called a(n):
A) equi-join.
B) natural join.
C) multivariate join.
D) inner join.
Answer: B
LO: 7.3: Define three types of join commands and use SQL to write these commands.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
20) The most commonly used form of join operation is the:
A) outer join.
B) union join.
C) equi-join.
D) natural join.
Answer: D
LO: 7.3: Define three types of join commands and use SQL to write these commands.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
21) A join in which rows that do not have matching values in common columns are
still included in the result table is called a(n):
A) natural join.
B) equi-join.
C) outer join.
D) union join.
Answer: C
LO: 7.3: Define three types of join commands and use SQL to write these commands.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
22) The outer join syntax does not apply easily to a join condition of more than
________ tables.
A) two
B) three
C) four
D) five
Answer: A
LO: 7.3: Define three types of join commands and use SQL to write these commands.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
27) A type of query that is placed within a WHERE or HAVING clause of another
query is called a:
A) master query.
B) subquery.
C) superquery.
D) multi-query.
Answer: B
LO: 7.4: Write noncorrelated and correlated subqueries and know when to write
each.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
28) SQL provides the ________ technique, which involves placing an inner query
within the WHERE or HAVING clause of an outer query.
A) grouping
B) joining
C) subquery
D) union
Answer: C
LO: 7.4: Write noncorrelated and correlated subqueries and know when to write
each.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
Week 6
Chapter 8
2) A client PC that is responsible for processing presentation logic, extensive
application and business rules logic as well as many DBMS functions is called a:
A) file server.
B) file processor.
C) database server.
D) fat client.
Answer: D
LO: 8.2: Explain the three components of client/server systems: data presentation
services, processing services, and storage services.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
8) A PC configured to handle user interfaces with limited local storage is called a(n):
A) fat client.
B) thin client.
C) light client.
D) overweight client.
Answer: B
LO: 8.3: Distinguish between two-tier and three-tier architectures.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
9) A(n) ________ is a set of application routines that programs use to direct the
performance of procedures by the computer's operating system.
A) API
B) MOM
C) RPC
D) LAN
Answer: A
LO: 8.3: Distinguish between two-tier and three-tier architectures.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
24) The phrase ________ refers to a model for providing ubiquitous, convenient and
on-demand network access.
A) software services
B) grid computing
C) network computing
D) cloud computing
Answer: D
LO: 8.6: Describe how to connect to databases in a three-tier Web application using
Java Server Pages (JSP), PHP, and ASP.NET.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
Week 7
Chapter 12
13) The actions that must be taken to ensure data integrity is maintained during
multiple simultaneous transactions are called ________ actions.
A) logging
B) concurrency control
C) transaction authorization
D) multiple management
Answer: B
LO: 12.5: Compare the optimistic and pessimistic systems of concurrency control.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
14) The extent of the database resource that is included with each lock is called the
level of:
A) impact.
B) management.
C) lock granularity.
D) TIO.
Answer: C
LO: 12.5: Compare the optimistic and pessimistic systems of concurrency control.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
15) A(n) ________ prevents another transaction from reading and therefore updating
a record until it is unlocked.
A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
Answer: B
LO: 12.5: Compare the optimistic and pessimistic systems of concurrency control.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
16) A(n) ________ is a procedure for acquiring the necessary locks for a transaction
where all necessary locks are acquired before any are released.
A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
Answer: D
LO: 12.5: Compare the optimistic and pessimistic systems of concurrency control.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
18) The ________ occurs when one user reads data that have been partially updated
by another user.
A) inconsistent read problem
B) distant read problem
C) honest dirty data
D) data quality problem
Answer: A
LO: 12.5: Compare the optimistic and pessimistic systems of concurrency control.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
34) A discrete unit of work that must be processed completely or not at all within a
computer system is called a:
A) change control device.
B) transaction.
C) before image.
D) journalizing facility.
Answer: B
LO: 12.8: Describe the problem of database recovery and list four basic facilities that
are included with a DBMS to recover databases.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
35) A ________ is a DBMS module that restores the database to a correct condition
when a failure occurs.
A) backup facility
B) recovery manager
C) restart facility
D) transaction logger
Answer: B
LO: 12.8: Describe the problem of database recovery and list four basic facilities that
are included with a DBMS to recover databases.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
36) ________ is used to undo unwanted database changes.
A) Rollback
B) Rollforward
C) Restart
D) Encryption
Answer: A
LO: 12.8: Describe the problem of database recovery and list four basic facilities that
are included with a DBMS to recover databases.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
Week 8
Chapter 13
2) Which of the following are business conditions that encourage the use of
distributed databases?
A) Companies with less than 10 employees
B) Lack of Data sharing needs
C) Data communication reliability
D) Companies that only store data on spreadsheets
Answer: C
LO: 13.2: Explain the business conditions that are drivers for the use of distributed
databases in organizations.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
7) ________ is a design goal for a distributed database, which says a user does not
need to know the location of data to use the data.
A) Location transparency
B) Location autonomy
C) Location dependency
D) Distributed locatability
Answer: A
LO: 13.3: Describe the salient characteristics of a variety of distributed database
environments.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
11) A form of distributed database in which all data across a network are kept
continuously updated, so a user can access any data anywhere on the network and get
the same answer is called a(n) ________ distributed database.
A) synchronous
B) asynchronous
C) private
D) cloud-based
Answer: A
LO: 13.4: Explain the potential advantages and risks associated with distributed
databases.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
Week 9
Chapter 9
3) When we consider data in the data warehouse to be time-variant, we mean:
A) that the time of storage varies.
B) data in the warehouse contain a time dimension so that they may be used to study
trends and changes.
C) that there is a time delay between when data are posted and when we report on the
data.
D) that time is relative.
Answer: B
LO: 9.2: Give two important reasons why an "information gap" often exists between
an information manager's need and the information generally available.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
4) Which of the following advances in information systems contributed to the
emergence of data warehousing?
A) Increase in viruses and other computer threats.
B) Improvements in monitor technologies.
C) Advances in middleware products that enabled enterprise database connectivity
across heterogeneous platforms.
D) The invention of the iPad.
Answer: C
LO: 9.3: List two major reasons most organizations today need data warehousing.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
5) Which of the following factors drive the need for data warehousing?
A) Businesses need an integrated view of company information.
B) Informational data must be kept together with operational data.
C) Data warehouses generally have better security.
D) Reduce virus and Trojan horse threats.
Answer: A
LO: 9.3: List two major reasons most organizations today need data warehousing.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
6) Which of the following organizational trends does not encourage the need for data
warehousing?
A) Multiple, nonsynchronized systems
B) Focus on customer relationship management
C) Downsizing
D) Focus on supplier relationship management
Answer: C
LO: 9.3: List two major reasons most organizations today need data warehousing.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
15) Informational systems are designed for all of the following EXCEPT:
A) running a business in real time.
B) supporting decision making.
C) complex queries.
D) data mining.
Answer: A
LO: 9.4: Name and briefly describe the three levels in a data warehouse architecture.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
16) Operational and informational systems are generally separated because of which
of the following factors?
A) A data warehouse centralizes data that are scattered throughout disparate
operational systems and makes them readily available for decision support
applications.
B) A properly designed data warehouse decreases value to data.
C) A separate data warehouse increases contention for resources.
D) Only operational systems allow SQL statements.
Answer: A
LO: 9.4: Name and briefly describe the three levels in a data warehouse architecture.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
29) Data that are never physically altered once they are added to the store are called
________ data.
A) transient
B) override
C) periodic
D) complete
Answer: C
LO: 9.4: Name and briefly describe the three levels in a data warehouse architecture.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
42) A class of database technology used to store textual and other unstructured data is
called:
A) mySQL.
B) NoSQL.
C) KnowSQL.
D) PHP.
Answer: B
LO: 9.9: Understand the trends that are likely to affect the future of data warehousing
in organizations.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology
Week 10
Chapter 11
1) At a basic level, analytics refers to:
A) collecting data.
B) conducting a needs analysis.
C) analysis and interpretation of data.
D) normalizing data.
Answer: C
LO: 11.2: Describe the reasons why data management technologies and approaches
have expanded beyond relational databases and data warehousing technologies.
Difficulty: Easy
Classification: Concept
AACSB: Information Technology
10) The NoSQL model that includes a simple pair of a key and an associated
collection of values is called a:
A) key-value score.
B) document store.
C) wide-column store.
D) graph database.
Answer: A
LO: 11.3: List the main categories of NoSQL database management systems.
Difficulty: Moderate
Classification: Concept
AACSB: Information Technology