University of Massachusetts Boston

College of Management

MSIS 110: Introduction to Computers

Chapter 5: Databases

____ 1. A primary key is a unique attribute.

____ 2. A goal of a DBMS is to increase data redundancy thereby making it less vulnerable to hackers.

____ 3. E-commerce presents a major opportunity for the effective use of data mining.

____ 4. The value of data ultimately lies in the decisions it enables.

____ 5. The use of competitive intelligence is illegal in most countries.

____ 6. A traditional approach to data management means that:

a. / data files are created individually by each application.
b. / data files are placed into objects.
c. / data files are managed by the DBMS.
d. / no data files are used.

____ 7. The payroll program at Ken's Builders, Inc. generates and maintains its own data files. These files, which are not compatible with any other software, exhibit:

a. / data integrity.
b. / data redundancy.
c. / data security.
d. / program-data dependence.

____ 8. Data redundancy can lead to problems with:

a. / key fields.
b. / data integrity.
c. / data model range.
d. / data domain.

____ 9. A(n) ____ is shown in Figure 5-13.

a. / ORDBMS construct
b. / DML entry
c. / data dictionary entry
d. / SQL statement

____ 10. Which of the following is NOT a typical use of a data dictionary?

a. / Provide a standard definition of data elements
b. / Assist programmers in designing and writing programs
c. / Simplify database modification
d. / Increase program-data dependence

11. A(n) ______is typically a name, number, or combination of characters that describes an aspect of a business object or activity.

12. A collection of related data fields is a(n) ______.

13. A(n) ______is a characteristic of an entity.

14. Because of its inherent advantages, most organizations use the ______model for their large corporate databases.

15. The term ______is sometimes used to describe how well a database performs as the size of the database or number of concurrent users is increased.