BUS 101 Chapter 6

25 July 2022
4.7 (114 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
Specification of database requirements falls under which category of database​ administration? A. Development B. Backup and Recovery C. Operation D. Adaptation E. User support
answer
A
question
You have dinner with your family and tell them that you have taken BCIS. Your mother tells you that she is proud of you and that now you can help her get her database of recipes set up better​ because, as it has gotten​ larger, it seems to have gotten more difficult to use. She shows you her​ database, and you realize that she is using a spreadsheet. What should you tell​ her? A. ​"Don't worry about trying to use a database because they have to be created by professional people and you will need them to keep it​ running." B. ​"You should switch to a database only if you want to share your recipes with other people across the​ Web." C. ​"Keep it​ simple, Mom. There is no need for a real database here. You probably just need to learn how to use the spreadsheet data filter​ properly, and things will go much more​ smoothly." D. ​"I'll show you how to set up a simple database with one table called​ 'Recipes.' You'll be able to manage it and run simple queries on it to find specific recipes very quickly and easily. All you need is some rudimentary knowledge of Access to get the job​ done." E. ​"Stick with your spreadsheet list because it is too expensive to set up and manage a​ database."
answer
D
question
As the head of the DBMS​ department, you attend a meeting with company managers who are known for their tolerance for the changes in the technology in their company. One of them has heard that​ non-relational/nontraditional databases have helped some leading companies to be very successful. He suggests that your​ department, and the​ company, adopt a nontraditional database. You recommend against it and explain that​ ________. A. with​ today's features, nontraditional products are very technical and can be used only by those with a deep background in computer science B. nontraditional databases have not yet been completely vetted by​ industry, and time should be allowed for them to succeed or fail C. the cost of the conversion would be far beyond the finances of the company D. nontraditional products have nothing to offer your company E. nontraditional databases could be brought in for use in new​ projects, but that there is no need to make it a​ company-wide adoption
answer
A
question
Security management falls under which category of database​ administration? A. Development B. User support C. Backup and Recovery D. Adaptation E. Operation
answer
E
question
What is SQL​ injection? A. SQL is added to a system by a programmer who then can run the SQL anytime he or she wishes. B. SQL is used to return data from the database when another less resource intensive technique would suffice. C. SQL is written in such a way that a query never stops running and causes the system to​ "crash." D. SQL code that is not part of the system is added through form fields to cause the system to return sensitive data. E. SQL is executed at a database administration console by an unauthorized user to gain access to sensitive data.
answer
D
question
It is said that a DBMS and a database are not the same thing. Which of the following statements best justifies this​ position? A. There is actually no difference between the two. The trade press and some books have incorrectly caused people to think that there is a difference. B. The DBMS is a software package that you would use to build and manage the database. C. A DBMS is used to make changes to a database. D. Although they sound​ similar, the two are actually completely unrelated. E. The database is a software package that you use to make​ tables, relationships, and​ metadata, and then you use the DBMS to manage those things.
answer
B
question
You are building a database for a survey you are conducting for a class. One of the questions is as​ follows: "Are you participating in this survey of your own free​ will?" What type of database field is the best in which to store the response to this​ question? A. Decimal B. Memo C. ​Yes/No D. Text E. Integer
answer
C
question
You were just hired by a very large automobile sales company with more than 15 sales lots spread around a rapidly growing metropolitan area. At a meeting with the sales​ force, you hear the sales people voice frustration with the inability to know what makes and models of cars are available on the other lots. What do you tell​ them? A. They should rely on ads published in the local newspapers to find where each of the lots is located. Customers should do the same thing. B. Make a group email list of all of the email addresses for the salespeople at the other 14 lots and email them with questions about the makes and models of the cars on their lots. C. This is not an uncommon business problem and the sales team should meet more often to share information. D. It sounds like each lot has its own standalone database. Because the databases have not been consolidated into one corporate inventory​ database, there is no convenient way to find out what cars are available or where they are. E. They should create a spreadsheet and store it in the cloud. As cars are put into inventory or​ sold, each salesperson can update the spreadsheet and then everyone can see what cars are available.
answer
D
question
You were just hired by a very large automobile sales company with more than 15 sales lots spread around a rapidly growing metropolitan area. At a meeting with the sales​ force, you encounter a general attitude that the salespeople​ don't want to share their data with anybody. What do you tell​ them? A. Instead of setting up a central​ database, you will work with each salesperson individually to help them with whatever​ data-keeping system they now employ. B. You will set up the database so that it records data from the final sales only. C. You will configure the database so that they can continue to hide information about their customers. D. If all of the salespeople would put their customer lists in the​ database, they would be able to monitor customer loyalty because they could see if their customers have gone to a different sales lot shopping for lower prices with a different salesperson. By using the notes posted in the​ database, they would be able to prepare for a​ first-time meeting with a customer by reading up on the​ customer's preferences. As a general​ rule, more sales are made at dealerships that use databases than those that​ don't. E. You will configure the database so that salespeople will enter data on a voluntary basis only. You will even allow the entry of partial data in order for salespeople to protect key relationships with select customers.
answer
D
question
Relational databases store data in the tables of columns and rows that represent relationships using​ ____________. A. foreign keys B. primary keys C. objects D. secondary keys E. relational keys
answer
A
question
Which process operation is utilized to edit data that is already stored in the​ database? A. Modify B. Print C. Insert D. Delete E. Read
answer
A
question
The data in a Database Management System that identifies the names of​ tables, fields in each​ table, and the properties of each of the​ fields, as well as which fields are primary and foreign​ keys, etc. is called​ ____________. A. data definitions B. descriptive data C. metadata D. uberdata E. qualitative data
answer
C
question
Your recent promotion has made you responsible for an important customer database. You discover that some of the metadata is accessible from the SQL server and may make it possible for hackers to access the personal information of customers. You are concerned that some victims may be the targets of unscrupulous con artists looking to take advantage of them. You decide to​ ________. A. see if log files indicate this problem has actually occurred. If it​ hasn't, then it probably​ isn't a serious threat B. contact the cybercrimes unit of the local police department and ask them to keep an eye out for data associated with your​ server's IP address C. send an email to all customers letting them know that their data may be at risk and warning them not to respond to unsolicited email offers D. ignore it until there is evidence that it is a real problem E. modify the security settings for the database and the server to ensure that they will prevent hackers from unauthorized access
answer
E
question
What is the value of a​ high-traffic, online customer database that has been integrated with information regarding customer purchase history and product​ preferences? A. The opportunity to provide additional training to the digital security team so the data will be protected and the entire organization will be more secure B. The ability to profile customers and to provide targeted market services tailored to specific​ customer's needs C. The obvious increase in market share that accrues from such an integration of data D. Its estimated dollar value if it was to be sold to a direct competitor E. The ability to produce an​ end-of-year profit statement by customer
answer
B
question
The columns in a database are also called​ ________. A. tables B. files C. records D. fields E. items
answer
D
question
In a database of telephone​ customers, which would be the best primary​ key? A. The account number for each customer B. The​ customer's driver's license number C. The area code D. The​ customer's name E. The​ customer's social security number
answer
A
question
A​ ____________ is a​ self-describing collection of integrated records. A. spreadsheet B. PowerPoint presentation C. database D. Word document E. file cabinet
answer
C
question
Every record in a table in a database must have a​ ____________ which is a column or group of columns that identifies a unique record in the table. A. metadata B. folder C. descriptor D. key E. field
answer
D
question
A team of developers has approached your department manager and told her that they can create a new database that could replace the existing​ non-database system. In response to her inquiry as to why this would be worth the investment of company​ resources, the developers indicated that database is always preferable to other system data storage mechanisms. What should you tell​ her? A. You should tell her to go ahead with the proposal as long as the developers agree to make it open source. B. You should tell her to make sure that the data now in the database would convert smoothly into the new database. C. You should tell her that it is a good idea because the current system is clearly outdated. D. You should tell her that the developers are right. In​ fact, all systems that do not use a database would be improved if they were​ re-developed to do so. E. You should tell her that the proposal is incomplete because a database itself​ isn't justification enough to build a new system. Some systems​ don't require a​ database, and in​ fact, may be less efficient with a database.
answer
E
question
Which process operation is utilized to remove a record that is already stored in the​ database? A. Modify B. Print C. Delete D. Insert E. Read
answer
C
question
As the database administrator for a large​ hospital, you recently found that your database entry personnel are overwhelmed with work. Your employer requires very high accuracy and reliability in all patient records. One person suggests you could modify the database application so that patients could access and modify their own medical information over the Web. Is this a good​ idea? A. ​Yes, because it will dramatically reduce the number of problems that​ you, as the​ administrator, have to deal with. B. ​No, because you would dramatically reduce the amount of data entry work and you would have to lay off a bunch of your employees. C. ​Yes, because you could dramatically reduce the amount of work being done by the data entry​ clerks, and you could save the department and the hospital a lot of money by laying the clerks off. D. ​No, because untrained patients will make far more data entry errors than your professional​ data-entry clerks​ make, and they​ aren't trained to enter complex medical data. E. ​Yes, it is a good idea because it will dramatically reduce the amount of work that your data entry clerks have to do.
answer
D
question
Changing the configuration of a database falls under which category of database​ administration? A. User support B. Development C. Adaptation D. Operation E. Backup and Recovery
answer
C
question
ou are the database administrator for a large group of family counselors. One of your workers has just informed you that she believes that another worker has copied the database onto his flash drive. Some of the clients are​ high-profile public figures whose reputations could be ruined if it became public knowledge that they had sought professional counseling for family issues. You decide that you should​ ________. A. set system security to disallow the use of flash drives anywhere in the organization B. contact that person immediately. If​ s/he has copied the​ database, get that flash drive. C. not take action based on the word of just one person who may have a grudge against the person he or she is accusing D. go directly to your employer and advise them that there has been a security breach and that you know who the person who copied the database is E. do nothing because you trust your colleagues and the content in those files is actually quite interesting
answer
B
question
What is the type of software used to track very large amounts of related​ data? A. Presentation B. Word processing C. Database D. Email E. Spreadsheet
answer
C
question
The records in a database table are generally visualized as​ ________. A. relationships B. fields C. rows D. files E. attributes
answer
C