1. Which of the following represents an iterative process of systems development in which requirements are converted to a working system that is continually revised through close work between analysts and users? A. Agile Methodology B. Data Model C. Prototyping D. Rapid Application Development

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
1. Which of the following represents an iterative process of systems development in which requirements are converted to a working system that is continually revised through close work between analysts and users? A. Agile Methodology B. Data Model C. Prototyping D. Rapid Application Development 2. The statement “stored representations of objects and events that have meaning and are of importance in the user’s environment” is known as ………… A. data B. database C. information D. metadata 3. The degree of relationship where VENDORS can supply various PARTS to WAREHOUSES is classified as …………… A. binary B. multinary C. ternary D. unary 4. A centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components is known as……….. A. database B. data warehouse C. repository D. server 5. What data type will be used to store the attribute Course for the entity STUDENT? A. Alphanumeric B. Decimal C. Float D. Integer 6. Which of the following is a limitation of the Traditional File Processing system approach? A. Data integrity B. Polymorphism C. Program-data dependence D. Unlimited data sharing 7. It is a database that represents data as a collection of tables in which all data relationships are represented by common values in related tables. A. Automated database B. Multi-tier database C. Relational database D. Structured database 8. A rule that cannot be violated by database users is called………….. A. confidentiality B. constraint C. encryption D. normalization 9. Which of the following is NOT an example of a Database Management System? A. Microsoft Access B. Oracle 12g C. SQL D. Visual Basic 10. Data that have been processed in such a way as to increase the knowledge of the person who uses the data is called………………. A. database B. entity-relationship diagram C. information D. relational database 11. Which of the following is NOT a type of database or application? A. Enterprise Resource Planning B. Multi-tier C. Personal D. Three-tier 12. A logical representation of the data for an organization or for a business area, using entities for categories of data and relationships for associations between entities is an ……………. A. attribute B. entity-relationship model C. entity-relationship process D. instance 13. In a salesperson’s database, the data would include facts such as customer name, address and telephone number. This type of data is called ………… A. primary data B. secondary data C. structured data D. unstructured data 14. An entity that exists independently of other entity types is known as …………... A. partial entity B. reference entity C. strong entity D. weak entity 15. Which of the following describes the properties or characteristics of end-user data and the context of those data? A. File B. Metadata C. Primary data D. Secondary data 16. A software system that is used to create, maintain and provide controlled access to user databases is known as ……….. A. database B. database management system C. file system D. software system 17. Which of the following is NOT an advantage of the database approach? A. Enforcement of standards B. Improved data consistency C. Program-data dependency D. Reduced program maintenance 18. The following are all components of the database environment EXCEPT A. CASE tools B. DBMS C. Repository D. System software 19. Conceptual data modelling is done in which stage of the SDLC? A. Analysis B. Design C. Implementation D. Planning 20. What is the output of the analysis stage in the SDLC? A. Conceptual schema B. Data schema C. Logical schema D. Physical schema 21. The representation of a database for a particular data management technology is known as …………….. A. design B. logical schema C. model D. schema 22. “The analyst performs a detailed review of the transactions, reports, displays and inquiries supported by the database”. This activity is done in which phase of the SDLC? A. Analysis B. Design C. Implementation D. Maintenance 23. Which of the following is an example of a Rapid Application Development? A. Agile methodology B. Prototyping C. Rapid system development D. Software system 24. Statements that define or constrain some aspects of an organization are called ……… A. business rules B. constraints C. limitations D. restrictions 25. The entity type on which the weak entity type depends on is called ………… A. entity dependant B. identifying owner C. identifying relationship D. weak entity 26. Which of the following does not constitute a characteristic of an identifier? A. Intelligent identifier B. No intelligent identifier C. Not be null D. Not change in value 27. The number of entity types that participate in a relationship is known as its ………….. A. cardinality B. degree C. instance D. relationship 28. Maximum cardinality is denoted by which of the following symbols? A. Crow’s foot B. Double dash C. Vertical dash D. zero 29. The state of relation that requires that certain rules regarding relationships between attributes are satisfied is known as ………….. A. functional dependency B. integrity constraints C. normal form D. normalization 30. is the widely adopted standard modelling language, with much richer object – based system, and it covers the whole development process. a. Chen’s original system b. Crowsfoot system c. UML – type diagrams d. Relational diagram e. None of the Above 31. forms the second compartment of the Entity Relationship Diagram. a. Entity Method b. Attributes c. Entity Name d. Attribute Method e. None of the above 32. The set of possible values for an attribute is known as​? a. Domain b. Attribute class c. Entity class d. Attribute object e. Entity object 33. can be further subdivided to yield additional attributes. a. Simple attribute b. Composite key c. Composite attribute d. Multivalued attribute e. Compound attribute 34. To facilitate detailed queries, it is usually appropriate to change composite attributes into a series of ……………. a. Simple attributes b. Composite keys c. Simple keys d. Compound attributes e. Compound keys 35. is an attribute whose value is calculated from other attributes. a. Deduced attribute b. Derived attribute c. Developed attribute d. Domain attribute e. None of the above 36. The​following​are​all​advantages​of​an​attribute​that​is​stored,​except …………………. a. Saves CPU processing cycles b. Data value is readily available c. Can be used to keep track of historical data d. Requires constant maintenance to ensure derived value is current e. Not sure 37. is an association between entities? a. Participation b. Relationship c. Modelling d. All the above e. None of the above 38. What enables one to define the number of participants in relationship is called ………… a. Constraint b. Degree c. Multiplicity d. Cardinality e. None of the above 39. An entity is existence – dependent if it has a mandatory ………. a. Primary key b. Composite key c. Foreign key d. Alternative key e. All the above 40. exists if the primary key of the related entity does not contain the primary key component of the parent entity a. Non – identifying relationship b. Weak entity c. Strong relationship d. Strong entity e. None of the above 41. ………… exists when the primary key of the related entity contains a primary key component of the parent entity. a. Strong entity b. Non – identifying relationship c. Strong relationship d. Weak entity e. None of the above 42. An entity which has a primary key that is partially or totally derived from the parent entity in the relationship is known as …………… a. Strong entity b. Weak entity c. Child entity d. Parent entity e. Adaptive system. 43. ……… means that one entity occurrence requires a corresponding entity occurrence in a particular relationship. a. Optional relationship b. Strong relationship c. Weak relationship d. Mandatory relationship e. Non – identifying relationship 44. A minimum of zero and a maximum of many instances of a class are associated with an instance of the other related class is represented by a. 0..1 b. 0..* c. 0..5 d. * e. 1..* 45. What type of entity is composed of the primary key of each of the entities to be connected? a. Strong entity b. Connector entity c. Bridge entity d. Weak entity e. None of the above 46. For an object within a class hierarchy to inherit the attributes and methods of a class above it there should be an ………. a. Inheritance b. Relationship c. Participation d. Association e. None of the above 47. is used to refer to the task of creating a conceptual data model that could be implemented in any DBMS. a. Conceptual schema b. External schema c. Logical design d. Relational schema e. Database schema 48. What occurs when the internal model is changed without affecting the conceptual model? a. Logical independence b. Physical independence c. Software independence d. Hardware independence e. Internal independence 49. The logical view of the relational database is facilitated by the creation of data relationships based on a logical construct known as a ……….. a. Tuple b. Attribute c. Relation d. Database e. None of the above 50. is a textual representation of the database tables, where each table is described by its name followed by the list of its attributes in parenthesis. a. External schema b. Relational schema c. Internal schema d. Physical schema e. Database schema 51. Which of the following are the two important properties of the relational model? a. Optional and mandatory relationship b. Cardinality and participation c. Degree and cardinality d. Constraint and restriction e. Degree and participation 52. What happens when each primary key value within a table must be unique to ensure that each row is uniquely identified by the primary key? a. Entity dependence b. Entity integrity c. Entity independence d. Entity non-integrity e. Entity uniqueness 53. An attribute whose value matches the primary key values in the related table is called …...? a. Candidate key b. Composite key c. Foreign key d. Super key e. Secondary key 54. A database table for which all foreign key values in all tables must be matched by a row in another table is said to conform to​? a. Entity integrity b. Referential integrity c. Entity independence d. Referential independence e. None of the above 55. Which one is the odd one out, when it comes to business rules? a. Entities b. Attributes c. Relationships d. Constraints e. None of the above 56. Considering Primary key characteristics, which of the following is the odd one out? a. No change over time b. Preferably multivalued attribute c. Preferably numeric d. Security complaint e. Nonintelligent 57. ………… develops when all of the required changes in the redundant data are not made successfully. a. Data entry errors b. Data inconsistency c. Data anomaly d. Data redundancy e. Data inaccuracy 58. A primary key’s main function is to guarantee​? a. Entity dependence b. Entity integrity c. Referential integrity d. Referential dependence e. Entity independence 59. Data model represents the following except? a. Data structures b. Relationships c. Transformation d. Constraints e. None of the above 60. Which of the following is NOT considered as an anomaly in normalization? A. Deletion anomaly B. Insertion anomaly C. Modification anomaly D. Update anomaly 61. Which of the following best describes known facts that can be recorded and have implicit meaning? E. Data F. Database G. Database Management System H. Database System 62. The approach used in managing data that utilizes a collection of application programs which performs services to end-users is known as ………… E. database approach F. file-based approach G. software development H. systems development life cycle 63. A database system environment includes the following except …………… E. application programs F. end-users G. files H. software 64. A …………. is a centralized knowledge base of all data definitions, data relationships, screen and report formats, and other system components. E. database F. data warehouse G. repository H. server 65. What data type will be used to store the attribute Course for the entity STUDENT? E. Alphanumeric F. Decimal G. Float H. Integer 66. Which of the following is a limitation of the Traditional File Processing system approach? E. Data integrity F. Polymorphism G. Program-data dependence H. Unlimited data sharing 67. A set of concepts that describe the structure of a database and certain constraints that the database should obey is known as …………………. E. data abstraction F. database concepts G. database constraints H. data model 68. A rule that cannot be violated by database users is called………….. E. confidentiality F. constraint G. encryption H. normalization 69. A DBMS performs several important functions that guarantee the integrity and consistency of the data in the database. Which of the following is NOT one of those functions? E. Data integrity management F. Data reports G. Data storage management H. Security management 70. Which of the following is considered a data anomaly? A. Inconsistency B. Modification C. Obsoletion D. Timelines 71. A collection of related data which represents some aspect of the real world is known as …………… E. data F. database G. database system H. file 72. A logical representation of the data for an organization or for a business area, using entities for categories of data and relationships for associations between entities is an ……………. E. attribute F. entity-relationship model G. entity-relationship process H. instance 73. The primary key is selected from the …………….. E. candidate keys F. composite keys G. determinants H. foreign keys 74. An entity that exists independently of other entity types is known as …………... E. partial entity F. reference entity G. strong entity H. weak entity 75. An advantage of the database management approach is……………. A. data is dependent on programs B. data is integrated and can be accessed by multiple programs C. data redundancy increases D. none of the above 76. A software system that is used to create, maintain and provide controlled access to user databases is known as ……….. E. database F. database management system G. file system H. software system 77. Statements that define or constrain some aspects of an organization are called ……… E. business rules F. constraints G. limitations H. restrictions 78. Which of the following is NOT considered as an anomaly in normalization? E. Deletion anomaly F. Insertion anomaly G. Modification anomaly H. Update anomaly 79. The number of entity types that participate in a relationship is known as its ………….. E. cardinality F. degree G. instance H. relationship 80. Which of the following does not constitute a characteristic of an identifier? E. Intelligent identifier F. No intelligent identifier G. Not be null H. Not change in value For each of the statements below, select either TRUE or FALSE 81. Data Definition Language is a language used to define database schemas. E. True F. False 82. Data Manipulation Language is a language that is used only to modify data. E. True F. False 83. The run-time database processor receives retrieval and update operations and carries them out on the database. E. True F. False 84. CASE tools are used in the design phase of database. A. True B. False 85. Maximum cardinality is denoted by a vertical dash. A. True B. False 86. Loading or import utility is a function that is provided through the normal DBMS components. A. True B. False 87. The query compiler component of a DBMS handles high-level queries that are entered into the database interactively. A. True B. False 88. Data independence is the ability to change the schema at one level of the database system without having to change the schema at the next higher level. E. True F. False 89. Normal form is the state of relation that requires that certain rules regarding relationships between attributes are satisfied. E. True F. False 90. The extended entity relationship model is sometimes referred to as the enhanced entity relationship model. A. True B. False
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY