logo image

My Systems Analysis Ch.9

____ is a coding method used on most personal computers.
ASCII
In the accompanying figure, any field that could serve as a primary key is called a ____.
candidate key
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.
schema
____ codes combine data from different item attributes, or characteristics, to build the code.
Derivation
A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.
manipulation
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.
True
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of ____.
four digits for the year, two for the month, and two for the day (YYYYMMDD)
A(n) ____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
ERD
A data warehouse allows users to specify certain dimensions, or characteristics.
True
A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.
query language
In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
primary key
JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.
Java
In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.
recovery procedures
EBCDIC and ASCII both require ____ bits.
eight
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
False
A common field is an attribute that appears in only one entity.
False
Like a primary key, a foreign key must be unique.
False
The three normal forms constitute a progression in which the first normal form represents the best design.
False
____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
Scalability
In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
One common method of indicating ____ is called crow’s foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
cardinality
Normal forms beyond 3NF exist, but they rarely are used in business-oriented systems.
True
JDBC is the language of the Web.
False
Unicode represents more than ____ unique, multilingual characters.
65,000
____ is a coding method used on mainframe computers and high-capacity servers.
EBCDIC
To bridge the gap between a database and the Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.
middleware
A table design is in second normal form (2NF) if it is in 1NF and if all fields that are not part of the primary key are functionally independent on part of the primary key.
False
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
ODBC
Which of the following is a data coding and storage scheme?
EBCDIC
binary
ASCII
In a client/server system, processing is isolated in a single computer.
False
To protect stored data, users can be asked to furnish a proper user ID and password to access a file or database.
True
A ____ is a set of letters or numbers that represents a data item.
code
____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
Encryption
Many three-character airport codes are cipher codes.
False
During the systems design phase, ____ fields are used to organize, access, and maintain data structures.
key
n the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
With a(n) ____ language, the user provides an example of the data requested.
QBE
____ codes are numbers or letters assigned in a specific order.
Sequence
An integer format uses ____ bits to represent the number 12,345 in binary form.
16
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
True
A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.
structure
A ____ contains data about people, places, things, or events.
table
file
Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.
mnemonic
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on other nonkey fields.
False
____ describes how instances of one entity relate to instances of another entity.
Cardinality
In an M:N relationship, the two entities are linked by an event or transaction called an associative entity, which has its own set of attributes and characteristics.
True
Many database programs generate ____, which is a language that allows client workstations to communicate with servers and mainframe computers.
SQL
Which of the following is a problem found with 1NF (first normal form) design that does not exist in 2NF (second normal form)?
2NF tables always contain consistent data compared to 1NF tables
Middleware can interpret client requests in HTML form and translate the requests into commands that the database can execute.
True
A table design that does not contain repeating groups is called unnormalized.
False
A table is in first normal form (1NF) if it contains a repeating group.
False
Which of the following is the advantage of a DBMS (database management system)?
economy of scale
stronger standards
scalability
One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.
referential
Compared with character-based formats, a ____ storage format offers a more efficient storage method.
binary
A(n) ____ is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze the contents of data.
DBMS
Binary digits have only ____ possible value(s).
two
Security concerns about Web-based data design can be addressed with software that can protect the system and detect intrusion, for example.
True
Any field that is not a primary key or a candidate key is called a ____ key.
nonkey
When a primary key combines two or more fields, it is called a ____ key.
composite
A long integer format uses ____ bits to represent the number 1,234,567,890 in binary form.
32
Migrating a traditional database design to the Web rarely requires design modification or additional software.
False
In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.
False
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
True
A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.
True
____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.
Normalization
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
True
Web-based data design requires users to have powerful workstations.
False
Web-based data must be secure but in order to be so, it cannot be easily accessible to authorized users.
False
In ASCII, the number 1,234,567,890 requires ____ bytes of storage.
ten
A primary key cannot be composed of more than one field.
False
Three main types of relationships that can exist between entities are a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
True
In an entity-relationship diagram, entities are represented as ____.
rectangles

Need essay sample on "My Systems Analysis Ch.9"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy