Beruflich Dokumente
Kultur Dokumente
1) Which of the following best illustrates the relationship between entities and attributes?
1 A) The entity CUSTOMER with the attribute PRODUCT
2 B) The entity CUSTOMER with the attribute PURCHASE
3 C) The entity PRODUCT with the attribute PURCHASE
4 D) The entity PRODUCT with the attribute CUSTOMER
5 E) The entity PURCHASE with the attribute CUSTOMER
Answer: B
2) All of the following are issues with the traditional file environment except:
1. A) data inconsistency.
2. B) inability to develop specialized applications for functional areas.
3. C) lack of flexibility in creating ad-hoc reports.
4. D) poor security.
5. E) data sharing.
Answer: B
5) ________ creates confusion that hampers the creation of information systems that integrate data from
different sources.
1. A) Batch processing
2. B) Data redundancy
3. C) Data independence
4. D) Online processing
5. E) Data quality
Answer: B
6) Data ________ occurs when the same data is duplicated in multiple files of a database.
1. A) redundancy
2. B) repetition
3. C) independence
4. D) partitions
5. E) discrepancy
Answer: A
7) Which of the following occurs when the same attribute in related data files has different values?
1. A) Data redundancy
2. B) Data duplication
3. C) Data dependence
4. D) Data discrepancy
5. E) Data inconsistency
Answer: E
8) Which of the following is a grouping of characters into a word, a group of words, or a complete number?
1. A) File
2. B) Table
3. C) Entity
4. D) Field
5. E) Tuple
Answer: D
10) Program-data dependence refers to the coupling of data stored in files and the specific programs required
to update and maintain those files such that changes in programs require changes to the data.
Answer: TRUE
11) The fact that a traditional file system cannot respond to unanticipated information requirements in a timely
fashion is an example of which of the following issues with traditional file systems
1. A) Program-data dependence
2. B) Lack of flexibility
3. C) Poor security
4. D) Lack of data sharing
5. E) Data redundancy
Answer: B
14) Which of the following enables a DBMS to reduce data redundancy and inconsistency?
1. A) Ability to enforce referential integrity
2. B) Ability to couple program and data
3. C) Use of a data dictionary
4. D) Ability to create two-dimensional tables
5. E) Ability to minimize isolated files with repeated data
Answer: E
20) In a table for customers, the information about a single customer resides in a single:
1. A) field.
2. B) row.
3. C) column.
4. D) table.
5. E) entity.
Answer: B
22) A field identified in a table as holding the unique identifier of the table's records is called the:
1. A) primary key.
2. B) key field.
3. C) primary field.
4. D) unique ID.
5. E) primary entity.
Answer: A
23) A field identified in a record as holding the unique identifier for that record is called the:
1. A) primary key.
2. B) key field.
3. C) primary field.
4. D) unique ID.
5. E) key attribute.
Answer: B
24) In a relational database, the three basic operations used to develop useful sets of data are:
1. A) select, project, and where.
2. B) select, join, and where.
3. C) select, project, and join.
4. D) where, from, and join.
5. E) where, find, and select.
Answer: C
25) The select operation:
1. A) combines relational tables to provide the user with more information than is otherwise available.
2. B) creates a subset consisting of columns in a table.
3. C) identifies the table from which the columns will be selected.
4. D) creates a subset consisting of all records in the file that meet stated criteria.
5. E) creates a subset consisting of rows in a table.
Answer: D
28) Microsoft Accesss data dictionary displays all of the following information about a filed except the:
1. A) size of the field
2. B) format of the field.
3. C) description of the field.
4. D) type of the field.
5. E) the organization within the organization that is responsible for maintain the data.
Answer: E
29) Which of the following is an automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization, and security?
1. A) Data dictionary
2. B) Data definition diagram
3. C) Entity-relationship diagram
4. D) Relationship dictionary
5. E) Data table.
Answer: A
30) Which of the following is a specialized language that programmers use to add and change data in the
database?
1. A) Data access language.
2. B) Data manipulation language.
3. C) Structured query language.
4. D) Data definition language.
5. E) DBMS.
Answer: B
31) Which of the following is the most prominent data manipulation language today?
1. A) Access
2. B) DB2
3. C) SQL
4. D) Crystal Reports
5. E) NoSQL
Answer: C
32) DBMSs typically include report-generating tools in order to:
1. A) retrieve and display data.
2. B) display data in an easier-to-read format.
3. C) display data in graphs.
4. D) perform predictive analysis.
5. E) analyze the database's performance.
Answer: B
33) The process of streamlining data to minimize redundancy and awkward many-to-many relationships is
called:
1. A) normalization.
2. B) data scrubbing.
3. C) data cleansing.
4. D) data defining.
5. E) optimization.
Answer: A
34) A schematic of the entire database that describes the relationships in a database is called a(n):
1. A) data dictionary.
2. B) intersection relationship diagram.
3. C) entity-relationship diagram.
4. D) data definition diagram.
5. E) data analysis table.
Answer: C
35) A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with:
1. A) one short mark.
2. B) two short marks.
3. C) three short marks.
4. D) a crow's foot.
5. E) a crow's foot topped by a short mark.
Answer: E
36) You are creating a database to store temperature and wind data from various airports. Which of the
following fields is the most likely candidate to use as the basis for a primary key in the Airport table?
1. A) Address
2. B) City
3. C) Airport code
4. D) State
5. E) Day
Answer: C
37) The logical and physical views of data are separated in a DBMS.
Answer: TRUE
38) Every record in a file should contain at least one key field.
Answer: TRUE
39) NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and
relations.
Answer: TRUE
40) CGI is a DBMS programming language that end users and programmers use to manipulate data in the
database.
Answer: FALSE
41) Complicated groupings of data in a relational database need to be adjusted to eliminate awkward many-to-
many relationships.
Answer: TRUE
42) A physical view shows data as it is actually organized and structured on the data storage media.
Answer: TRUE
43) DBMS have a data definition capability to specify the structure of the content of the database.
Answer: TRUE
44) Relational DBMSs use key field rules to ensure that relationships between coupled tables remain
consistent.
Answer: FALSE
48) The term big data refers to all of the following except:
1. A) datasets with fewer than a billion records.
2. B) datasets with unstructured data.
3. C) machine-generated data (i.e. from sensors).
4. D) data created by social media (i.e. tweets, Facebook Likes).
5. E) data from Web traffic.
Answer: A
49) Which of the following technologies would you use to analyze the social media data collected by a major
online retailer?
1. A) OLAP
2. B) Data warehouse
3. C) Data mart
4. D) Hadoop
5. E) DBMS
Answer: D
50) Which of the following is not one of the techniques used in web mining?
1. A) Content mining
2. B) Structure mining
3. C) Server mining
4. D) Usage mining
5. E) Data mining
Answer: C
51) You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an
analysis of your customers and their preferences. You wish to find out if there are any particular activities that
your customers engage in, or the types of purchases made in the month before or after purchasing select
items from your store. To do this, you will the data mining software you are using to do which of the following?
1. A) Identify associations
2. B) Identify clusters
3. C) Identify sequences
4. D) Classify data
5. E) Create a forecast
Answer: C
52) You work for a car rental agency and want to determine what characteristics are shared among your most
loyal customers. To do this, you will the data mining software you are using to do which of the following?
1. A) Identify associations
2. B) Identify clusters
3. C) Identify sequences
4. D) Classify data
5. E) Create a forecast
Answer: D
54) All of the following are technologies used to analyze and manage big data except:
1. A) cloud computing.
2. B) noSQL.
3. C) in-memory computing.
4. D) analytic platforms.
5. E) Hadoop.
Answer: A
55) A household appliances manufacturer has hired you to help analyze its social media datasets to determine
which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze
this data?
1. A) Text mining tools
2. B) Sentiment analysis software
3. C) Web mining technologies
4. D) Data mining software
5. E) Data governance software
Answer: B
56) Which of the following tools enables users to view the same data in different ways using multiple
dimensions?
1. A) Predictive analysis
2. B) SQL
3. C) OLAP
4. D) Data mining
5. E) Hadoop
Answer: C
59) In the context of data relationships, the term associations refers to:
1. A) events linked over time.
2. B) patterns that describe a group to which an item belongs.
3. C) occurrences linked to a single event.
4. D) undiscovered groupings.
5. E) relationships between different customers.
Answer: C
60) ________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey
responses to discover patterns and relationships.
1. A) OLAP
2. B) Text mining
3. C) In-memory
4. D) Clustering
5. E) Classification
Answer: B
61) Which of the following enables you to create a script that allows a web server to communicate with a back-
end database?
1. A) CGI
2. B) HTML
3. C) Java
4. D) SQL
5. E) NoSQL
Answer: A
62) HTML has become the preferred method of communicating with back-end databases because it is a cross-
platform language.
Answer: FALSE
63) Legacy systems are used to populate and update data warehouses.
Answer: TRUE
64) Multiple data marts are combined and streamlined to create a data warehouse.
Answer: FALSE
66) OLAP is unable to manage and handle queries with very large sets of data.
Answer: FALSE
67) In-memory computing relies primarily on a computer (RAM) for data storage.
Answer: TRUE
68) Middleware is an application that transfers information from an organization's internal database to a web
server for delivery to a user as part of a web page.
Answer: TRUE
69) Implementing a web interface for an organization's internal database usually requires substantial changes
to be made to the database.
Answer: FALSE
70) You can manipulate data on a web server by using a CGI script.
Answer: TRUE
71) You can use text mining tools to analyze unstructured data, such as memos and legal cases.
Answer: TRUE
72) In a client/server environment, a DBMS is located on a dedicated computer called a web server.
Answer: FALSE
74) High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.
Answer: TRUE
75) Which of the following is software that handles all application operations between browser-based
computers and a company's back-end business applications or databases?
1. A) Database server software
2. B) Application server software
3. C) Web browser software
4. D) Data mining software
5. E) Web server software
Answer: B
76) In data mining, which of the following involves using a series of existing values to determine what other
future values will be?
1. A) Associations
2. B) Sequences
3. C) Classifications
4. D) Clustering
5. E) Forecasting
Answer: E
82) An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying
information is called a(n):
1. A) information policy.
2. B) data definition file.
3. C) data quality audit.
4. D) data governance policy.
5. E) data policy.
Answer: A
83) In a large organization, which of the following functions would be responsible for physical database design
and maintenance?
1. A) Data administration
2. B) Database administration.
3. C) Information policy administration
4. D) Data auditing
5. E) Database management
Answer: B
84) Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean
catalog, each addressed to a slightly different variation of his or her full name?
1. A) Data normalization
2. B) Data accuracy
3. C) Data redundancy
4. D) Data inconsistency
5. E) Data duplication
Answer: D
85) Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or
redundant is called:
1. A) data auditing.
2. B) defragmentation.
3. C) data scrubbing.
4. D) data optimization.
5. E) data normalization.
Answer: C
87) Which of the following is not a method for performing a data quality audit?
1. A) Surveying entire data files
2. B) Surveying samples from data files
3. C) Surveying data definition and query files
4. D) Surveying end users about their perceptions of data quality
5. E) Surveying managers about their perceptions of data quality
Answer: C
88) The term data governance refers to the policies and processes for managing the integrity and security of
data in a firm.
Answer: TRUE
89) In a large organization, which of the following functions would be responsible for policies and procedures
for managing internal data resources?
1. A) Data administration
2. B) Database administration.
3. C) Information policy administration
4. D) Data auditing
5. E) Database management
Answer: A
90) Data scrubbing is a more intensive corrective process than data cleansing.
Answer: FALSE
96) In data mining, which of the following involves recognizing patterns that describe the group to which an
item belongs by examining existing items and inferring a set of rules?
1. A) Associations
2. B) Sequences
3. C) Classifications
4. D) Clustering
5. E) Forecasting
Answer: C
97) In data mining, which of the following involves events linked over time?
1. A) Associations
2. B) Sequences
3. C) Classifications
4. D) Clustering
5. E) Forecasting
Answer: B
99) A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
1. A) in two short marks.
2. B) in one short mark.
3. C) with a crow's foot.
4. D) with a crow's foot topped by a short mark.
5. E) with a crows foot topped by two short marks.
Answer: A
100) Which of the following would you use to find patterns in user interaction data recorded by a web server?
1. A) Web usage mining
2. B) Web server mining
3. C) Web structure mining
4. D) Web content mining
5. E) Web protocol mining
Answer: A