Data integrity is composed of rules and mechanisms for ensuring data accuracy and consistency. TF
True
The first step of transforming an entity set is transforming each entity into a relation. TF
True
An attribute is a property or characteristic of an entity set of interest to the organization. TF
True
DDL can be explained as “data defined language”. TF
True
One of the purposes of encryption is to ensure that data cannot be understood if intercepted. TF
True
The effectiveness of BI depends on quality of data gathered at operational level. TF
True
File-processing systems is data that is stored, retrieved, and manipulated by computer (application) programs. TF
True
A database enhances data quality and improves decision making. TF
True
A client is any process that requests specific services from server process. TF
True
Business Intelligence is to generate and present information to support business decision making. TF
True
NoSQL is regularly faster than SQL. TF
True
One advantage of a Distributed Database is its increased reliability/availability. TF
True
One advantage of a Distributed Database is its increased reliability/availability. True Data model is concern with understanding the data and it describes the business process model. TF
True
The attributes in a foreign key have the same domains as the primary key? TF
True
Projects where NoSQL is ideal include simpler or looser project objectives. TF
True
A web server is the main hub through which internet services are accessed? TF
True
Database design process captures and represents key data requirements of a database system. TF
True
A Class is a collection of similar objects with shared structure (attributes) and behavior (methods). TF
True
The having clause is used to restrict the output of a GROUP BY query by applying conditional criteria to the grouped rows. TF
True
Data Manipulation Language (DML) is the commands that maintain and query a database. TF
True
Data management includes the generation, storage, and retrieval of data. TF
True
Advantages of a distributed database are increased reliability/availability, modular growth, and faster response for certain queries. TF
True
ER model is a natural and intuitive way to model the focal business application or phenomenon. TF
True
Client and server processes can reside in different computers connected by a network. TF
True
An entity is a person, place, object, event, or concept in the user environment about which we wish to maintain data. TF
True
SQL has become the de facto standard language for creating and querying relational databases. TF
True
Encapsulation is the ability to hide an object’s internal details. TF
True
One many-to-many relationship will consist of 3 tables on an entity relationship diagram. TF
True
An attribute is a property or characteristic of an entity set of interest to the organization. TF
True
NoSQL is another alternative to SQL. TF
True
Data control language is considered the core of SQL and has a fixed format? TF
False
An advantage of e commerce is no hidden costs. TF
False
In SQL, whenever there is potential unambiguity, an attribute must be qualified by prefixing the relation name and a dot (.) to the attribute name when performing a JOIN operation. TF
False
The advantages to e-commerce are lack of hidden costs, invulnerability to technical failure, reduced costs of staying business, increased security and privacy, higher service levels, and reduced legal issues. TF
False
Data integration does not create a unified view of business data. TF
False
Metadata is data that is gathered to solve specific business problems? TF
False
Cloud computing protects Intellectual Property Rights, is highly secure and easy to integrate with IT systems. T
False
Data Queries are used for the discovery of hidden patterns and predictive models. TF
False
NoSQL is a lot slower than SQL. TF
False
In a relational data model, an attribute has multiple domains; in addition, multiple attributes may share the same domain. TF
False
A Composite key is an attribute in a relation in a database that serves as the primary key of another (referenced) relation in the same database. TF
False
The Internet was designed to provide redundancy and is designed to be secure. TF
False
A poorly designed database does NOT cause difficult to trace errors. TF
False
NoSQL databases are standardized. TF
False
Data describes important properties, characteristics, and structures of relationships. TF
False
To change an object's state, you must send a signal to the object. This signal will invoke a method. TF
False
Metadata describes data that is processed. TF
False
In a data warehouse only correct complete information will be stored. TF
False
To find information about a product you must enter in the exact writing. For example to find information specifically about the product named Cat Food you must enter “product.product_name = ‘Cat Food’" ? TF
False
Browsing options on the Zappos website is an example of E-Commerce. TF
False
Data mining process consists of the following four steps (order): (1) selection, (2) cleaning, (3) data mining, and (4) interpretation and evaluation. TF
False
NoSQL is ideal for project with high data integration? TF
False
How do you handle a multi-valued attribute?
C. Create a new table with the multi valued attribute, and include the primary key from the same table
What Data Type should be used for the following example?-
The serial number of a lego set.
E. Char
_______is the process of inputting data in “plain text” to yield an “encoded” output of the data, making the data unintelligible to unauthorized users.
Encryption
Choose the contents of object oriented programming language in order of importance.
C. Class, Object, Method
________________ are the glue that holds together various components of the ER data.
C. Relationship sets
The (________) clause only appears in conjunction with the GROUP BY clause, for retrieving groups that satisfy certain conditions.
D. HAVING clause
What serves as the communication tool between the designers and the users?
B. ERD models
How do you select all of the information from a specific table in SQL?
Use SELECT * From specific table
List the two types of information systems.
Operational
Strategic
What is the second layer of the e commerce architecture
Business Enabling Services
A Good Business Rule is which of the following?
E. All the above
Which of the following about an entity set is NOT true?
C. an entity can have only one attribute
____________Commands that control a database, including administering privileges and committing data
Data Control Language (DCL)
What does ETL stand for?
C. Extract Transform Load
In a Logical schema, the arrow is drawn for a One to Many relationship between entities?
C. From the many, Back to the One
The 2 types of information systems are:
OPERATION
STRATEGIC
An entity has data components and relationships,but lacks manipulative ability. TF
True
Please list at least 2 Costs/Risks associated Database Systems.
New and specialized staff
Organizational conflicts
Data and Systems conversion costs
Need for routine backup and error recovery.
Which of the following is NOT a challenge of Data Mining?
A. Lack of qualified vendors
What is the proper format for Dates in SQL?
A. Yyyy-mm-dd
The purpose of a _____ operation is to retrieve data from more than one relation.
JOIN
2. Advantages of a distributed database include all of the following except?
E. None of the above
B. Additional transaction control mechanism
The three V’s that define big data are?
VOLUME, VELOCITY, VARIETY
In a relation, each ________ is described by its name and domain.
C. Attribute
Disadvantages in E-Commerce including all of the following EXCEPT:
C. Lower Entry Barriers
Which of the following is the correct syntax order for a SQL statement:
E. SELECT, FROM, WHERE, GROUP BY, HAVING
A major concern of operations information systems?
A. Flexibility in report generation
Increased customer knowledge can be used to:
E. All of the above
List order numbers of the orders which contain products supplied by vendor V003.
Clustering is the process of breaking a large group into _______ sub-groups.
A. smaller
B. medium
C. random
D. custom
E. None of the above
A. smaller
B. medium
A common problem of file system data processing (i.e. non integrated database processing systems) is:
D. Data quality issues such as data redundancy, inconsistency, and lack of data sharing/integration
An attribute which can be broken into several components parts is called a:
A. Composite Attribute
One way of NOT improving data capture processes would be to:
C. Disregard simple user interface principles in lieu of a complex/holistic interface which has many options
Which of the following roles would be the most likely to focus on daily operations of the database?
D. DBA (Database Administrator)
What is the purpose of an operational database?
C. To support a company's day-to-day operations.
Which of these is not an aggregate function?
E. All of these are aggregate functions
In data mining, what is classification analysis?
Classifying all objects into predefined classes.
Which of these is not a tier in three-tier architecture?
D. ODBC
What is an entity set?
A. A collection of entities that share common properties
Which is NOT a common pitfall of data mining?
B. Data discovery
What is a "tuple" in a formal relation?
B. Row or record
Which is a correct join statement?
A. product.product_ID = promotion.product_ID
Which of the following is NOT an advantages of NoSQL?
B. standardization
During the translation of business rules to data model components, you identify entities, attributes, relationships, and _____
A. Constraints
Data can become dirty for what reason?
C. Use of synonyms and homonyms across the system
Which of the following is a characteristic of an Object-Oriented system?
E. All of the above
_________ refers to data that have been presented or processed in a way that they become meaningful or can increase the knowledge of users.
INFORMATION
What are some disadvantages of distributed database?
Network dependency
Software cost and complexity
Slower response for certain queries
Network security concerns
Data profiling needs to be done?
PERIODICALLY
______is the ability to change the product to better fit the needs of the customer
CUSTOMIZATION
What are the steps of Data Mining Process?
B. Selection-Cleaning-Transformation-Data Mining- Interpretation and Evaluation
Data mining extracts:
A. previously unknown, interesting, valid, and actionable data patterns
Based on the subscription model, you would:
C. make fixed payments on specific time frames
Which data mining tool is used mostly for “prediction”?\
C. Classification
Which option lists the steps of database design ?
A. Conceptual, Logical, and Physical
What is not a basic procedure for an ER Model
C. Identifying major setbacks in the data system
What is the difference between explanatory analytics and predictive analytics. Give an example for when each would be used.
Part A.) explanatory analytics focuses on the discovering and explaining data characteristics and relationships based on existing data. Predictive analytics focuses on predicting future outcomes with a high degree of accuracy. Part B.) Explanatory analytics would be used when a person is identifying the actual demographics of their product. For example, when you begin to sell a product you have a demographic in mind. Sometimes, products turn out to be purchased by a different demographic than intended.
The three major functions for an Internet environment are:
A. Presentation, Application Logic, and data management
WHAT DOES ERD STAND FOR
ENTITY RELATIONSHIP DIAGRAM
What are the 3 techniques for data integration?
Consolidation
Federation
Propagation
What does SQL stand for?
Structure Query Language
What are the key characteristics of a database?
Self-describing collection of data: A database contains a description of the overall database design and essential data structure and interrelationships.
Related data: A logically coherent collection of data with some inherent meaning.
Integrated data: A unification of data files, reducing or eliminating unplanned data redundancy.
Shared data: A database provides a central information repository which can be accessed by different application programs and users.
What is Varchar and when do you use it?
Variable Character Field is a set of character data of indeterminate length.
I would use this if the user were to use it to enter emails.
Give an example of a threat to internet.
A Trojan horse program hides within the database system and reveals information and remove all access controls within database.