Test Chapter 07
Test Chapter 07
Multiple Choice:
B. create graphics.
C. communicate data.
D. manage information.
B. computerized typewriter
C. office desktop
D. computerized calculator
A. DBA.
B. application.
D. operating system.
A. database.
B. database program.
C. operating system.
D. data warehouse.
A. database.
B. DBMS.
C. operating system.
D. utility.
A. directories.
B. tables.
C. folders.
D. DBMS.
A. vector
B. query
C. descriptor
D. record
9. In a customer database table, all of the information for one customer is kept in a:
A. field type.
B. field.
C. record.
D. column.
A. row.
B. text field.
C. record.
D. computed field.
11. In a database, a ____________ field shows results of calculations performed on data in other numeric
fields.
A. configured
B. concatenated
C. key
D. computed
12. The number of newspapers sold on May 30 would be kept in a ____________ field.
A. date
B. numeric
C. text
D. key
13. Bringing data from a word processing program into a database program is known as:
A. exporting.
B. batch processing.
C. importing.
D. mining.
A. Browsing
B. Mining
C. Scrubbing
D. Cleansing
15. When looking for a specific patient in a hospital’s database, ___________ is more efficient than browsing.
A. surfing
B. keying
C. scrubbing
D. querying
16. Arranging all customer records in customer number order is an example of:
A. querying.
B. sorting.
C. inquiring.
D. filtering.
17. An ordered list of specific records and specific fields printed in an easy-to-read format is known as a(n):
A. query.
B. sort.
C. inquiry.
D. report.
Answer: D Reference: Printing Reports, Labels, and Form Letters Difficulty: Easy
18. The process of ____________ would be used when sending data from a database to a word processor so
that mailing labels could be produced.
A. exporting
B. sorting
C. mining
D. querying
Answer: A Reference: Printing Reports, Labels, and Form Letters Difficulty: Moderate
A. contiguous.
B. unambiguous.
C. contoured.
D. batched.
A. query language.
B. BASIC language.
C. HTML language.
D. a spreadsheet formula.
A. PIM
B. intranet
C. SPSS
D. GIS
23. A ____________ manipulates data in a large collection files and cross references those files.
A. DBA
B. GIS
C. PIM
D. DBMS
Answer: D Reference: From File Managers to Database Management Systems Difficulty: Moderate
Copyright © 2008 Prentice-Hall. All rights reserved. 6
Chapter 7: Database Applications and Privacy Implications
24. A large corporation would use a ____________ to keep records for many employees and customers along
with all of its inventory data.
A. GIS
B. spreadsheet program
C. PIM
Answer: D Reference: From File Managers to Database Management Systems Difficulty: Moderate
25. For a customer database, a good choice of key field would be:
A. address.
B. customer ID.
C. phone number.
D. last name.
Answer: B Reference: From File Managers to Database Management Systems Difficulty: Moderate
Answer: A Reference: From File Managers to Database Management Systems Difficulty: Moderate
27. In a(n) ____________, data from more than one table can be combined.
A. key field
B. relational database
C. file manager
D. XML
28. ____________ processing is used when a large mail-order company accumulates orders and processes
them together in one large set.
A. Interactive
B. Group
C. Real-time
D. Batch
29. When making an airline reservation through the Internet, you use ____________ processing.
A. interactive
B. group
C. digitization
D. batch
A. interactive
B. digitization
C. real-time
D. batch
31. In a typical client/server environment, the client can be any of the following EXCEPT a:
A. desktop computer.
B. mainframe.
C. PDA.
D. notebook.
A. processes a query from a client and then sends the answer back to the client.
33. ____________ is connectivity software that hides the complex interaction between client and server
computers and creates a three-tier design separating actual data from the programming logic used to access
it.
A. CRM
B. XML
C. Middleware
D. Firmware
35. ___________ is a new, powerful data description language used to construct web pages as well as access
and query databases using the Internet.
A. SQL
B. CRM
C. PIM
D. XML
A. consulates.
B. computer registers.
C. customers.
D. privacy violations.
A. table
B. field
C. class
D. record.
38. When a person uses language like ordinary English to query a database, it is known as a(n) ____________
language query.
A. HTML
B. object-oriented
C. natural
D. XML
39. The act of accessing data about other people through credit card information, credit bureau data, and public
records and then using that data without permission is known as:
A. identity theft.
B. personal theft.
C. data mining.
40. An aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants:
43. A(n) ____________ field shows results of a calculation done using values in other numeric fields.
45. In a university database table, all of the information for one student (e.g. student ID, name, address) would
be stored in one ____________.
46. In a university database, a course name would be stored as a(n) ____________ type field.
47. In a university database, a student’s birth date would be stored in a(n) ____________ type field.
48. In ____________ view, the database program shows the data one record at a time.
49. Bringing a list of names and addresses from a Word document into a database program is called
____________ data.
50. A request for information from a database that can be saved and reused later is known as a(n)
____________.
51. To arrange students in a university database table in alphabetical order, the user must perform a(n)
____________ on the database.
52. A typical SQL statement filters the ____________ of a database, thereby presenting only those that meet
the criteria given.
53. A specialized database program that can store addresses and phone numbers, keep a calendar, and set
alarms is known as a(n) ____________.
Answer: database-management system Reference: From File Managers to Database Management Systems
Difficulty: Easy
Answer: geographical information system Reference: Directories and Geographic Information Systems
Difficulty: Moderate
Answer: personal information manager Reference: Personal Information Managers Difficulty: Moderate
58. Because it is a unique identifier for a book, an ISBN number would be an example of a(n) ____________
field used in a library database table.
Answer: key Reference: Beyond the Basics: Database Management Systems Difficulty: Moderate
59. In a(n) ____________ database, changes in one file are automatically reflected in other files.
60. Timesheet transactions collected and used to update payroll files once a week, is an example of
____________ processing.
61. In ____________ computing, users can view and change data online.
62. ____________ databases spread data across networks on several different computers.
65. Some large companies keep all of their corporate data in an integrated data repository called a data
____________.
67. Data ____________ uses artificial intelligence and statistical methods to find trends and patterns in data.
69. A company’s self-contained network that uses a search engine and Web browser is called a(n)
____________.
71. Using software to search for and replace data that contains errors is called ____________.
Answer: data scrubbing or cleansing Reference: Databases and the Web Difficulty: Moderate
72. Since the ____________ Act was passed, libraries and bookstores can be required to turn over their
customer records to the FBI.
73. The Children’s Online Privacy Protection Act requires Internet-based businesses to obtain parental consent
before collecting information from children under ____________ years of age.
Matching:
I. Family Education Rights and Privacy Act A. easier for FBI to collect information
about individuals
IV. Fair Credit Reporting Act of 1970 D. students can access and correct
educational records
V. Freedom of Information Act of 1966 E. video stores cannot give out customer
rental records
VI. Video Privacy Protection Act F. federal agencies must provide your
information to you
VII. Children’s Online Privacy G. “I’d like to look at the court records
Protection Act of Joe Smith.”
III. XML C. process that locates hidden predictive information in large databases
V. DBMS E. data description language designed for database access on the Web