University of Massachusetts Boston
College of Management
MSIS 110: Introduction to Computers
Chapter 5: Databases
____ 1. A primary key is a unique attribute.
____ 2. A goal of a DBMS is to increase data redundancy thereby making it less vulnerable to hackers.
____ 3. E-commerce presents a major opportunity for the effective use of data mining.
____ 4. The value of data ultimately lies in the decisions it enables.
____ 5. The use of competitive intelligence is illegal in most countries.
____ 6. A traditional approach to data management means that:
a. / data files are created individually by each application.b. / data files are placed into objects.
c. / data files are managed by the DBMS.
d. / no data files are used.
____ 7. The payroll program at Ken's Builders, Inc. generates and maintains its own data files. These files, which are not compatible with any other software, exhibit:
a. / data integrity.b. / data redundancy.
c. / data security.
d. / program-data dependence.
____ 8. Data redundancy can lead to problems with:
a. / key fields.b. / data integrity.
c. / data model range.
d. / data domain.
____ 9. A(n) ____ is shown in Figure 5-13.
a. / ORDBMS constructb. / DML entry
c. / data dictionary entry
d. / SQL statement
____ 10. Which of the following is NOT a typical use of a data dictionary?
a. / Provide a standard definition of data elementsb. / Assist programmers in designing and writing programs
c. / Simplify database modification
d. / Increase program-data dependence
11. A(n) ______is typically a name, number, or combination of characters that describes an aspect of a business object or activity.
12. A collection of related data fields is a(n) ______.
13. A(n) ______is a characteristic of an entity.
14. Because of its inherent advantages, most organizations use the ______model for their large corporate databases.
15. The term ______is sometimes used to describe how well a database performs as the size of the database or number of concurrent users is increased.