Chapter 11 Multiple Choice and True/False Answer Keys for Parts 1 and 2

Part 1 Check Your Understanding

For a quick review to see what you've learned so far, answer the following questions. Visit pearsonhighered.com/techinaction to check your answers.

Multiple Choice

1. Two lists showing the same data about the same person is an example of

a. data redundancy.

b. data inconsistency.

c. data disparity.

d. data irregularity.

2. Which of the following is NOT an advantage of using databases instead of lists?

a. Data can be easily shared among users.

b. Data entry errors can be minimized with databases.

c. Data integrity can be ensured with a database.

d. Databases are easier to build and maintain than lists.

3. A field that has a unique entry for each record in a database table is called the

a. logical key.

b. master field.

c. crucial field.

d. primary key.

4. A(n) __________ database organizes data in two-dimensional tables.

a. relational

b. object-oriented

c. rectangular

d. multidimensional

5. Ensuring that a field must contain a number that is between two values is an example of a(n)

a. alphabetic check.

b. completeness check.

c. range check.

d. consistency check.

True–False

_____ 1. A query is used to extract information from a database. (True)

_____ 2. Validation checks ensure that required fields in a database are filled in completely. (False)

critical thinking questions – Part 1

1. Databases are Everywhere

Think about specific examples of databases you interact with. Try to list at least 10 different ones. Discuss the specific advantages these databases have in your daily life, as well as some of the precautions you may need to take to ensure your privacy.

Student responses will vary. Possible databases might include iTunes, Amazon.com (or any e-commerce site), an address book, workout or diet log, photo or video management site (such as Picasa or YouTube).

2. Facebook as a Database

If you have a Facebook page or some other social networking page, information from your page is often shared with other databases when you participate in various games and other applications that require access to your personal data as a condition of participation. How many games and other applications do you estimate have access to your information? Check your privacy settings for your Facebook page and look in the Apps and Games section to see how many apps you’re actually using. Were you surprised at the difference in the actual number of apps and your estimate? What apps do you think you should disable to prevent them from accessing your information? Give reasons for the ones you will disable (don’t trust, don’t use, etc.)

Answers will vary. The instructor could ask students to tell about some surprises they found and why these surprises disturbed them. How difficult was it to make changes?

Part 2 Check Your Understanding

Multiple Choice

1. Which best describes a data warehouse?

a. A building that stores computer servers

b. A software program that assists with file management

c. A collection of data that organizes all of an organization's data.

d. A database that organizes data from multiple organizations.

2. Which of the following is a component of data staging?

a. Extraction of data from source databases

b. Transformation of the data

c. Storage of the data in the data warehouse

d. All of the above are components of data staging

3. A system that’s designed to help perform routine daily tasks is known as (a)n

a. data mart.

b. office support system.

c. data warehouse.

d. decision support system.

4. A system that tries to mimic human decision making processes is an example of a(n)

a. transaction-processing system.

b. decision support system.

c. expert system.

d. model management system.

5. The process of analyzing and investigating large amounts of data to spot trends is called

a. data mining

b. batch processing

c. transaction processing

d. data marting

True–False

_____ 1. A transaction-processing system (TPS) is an example of a business intelligence system. (true)

_____ 2. Customer demographic data purchased from a third-party is an example of an internal data source. (False)

critical thinking questions – Part 2

3. Database Privacy Policies

Most likely you have provided quite a bit of personal information to various companies when you became their customer. Companies have an ethical responsibility to protect sensitive data obtained from customers. Think about a retailer that you have done business with recently. What personal information did you provide to that retailer? What personal information should a company not be allowed to disclose to others? What information does the company have of yours that you don’t care if they share with (or sell to) other companies?

After reviewing the Privacy Policy any retailer, students could discuss whether the overall Policy seems to be customer-friendly. Examples can be given of specific features which do, and other features which do not, seem customer-friendly. Utilize brainstorming to analyze elements of a Privacy Policy which do not seem customer-friendly and possible modifications in order to improve their customer-friendly rating.

Many Privacy Policy statements declare that changes will be made to the policy as needed, and that customers are encouraged to regularly review the current policy. Students might debate whether this is a reasonable expectation of customers.

Students could discuss that some companies ask permission to share information, whereas others clearly state that no information will be shared or sold. Students should realize that it is unethical to sell personal information without permission of the owner. What problems could result from violating this guideline?

Some students might debate that gathering information based on Internet surfing is not an invasion of privacy since it is a personal choice to visit sites and purchase online. Other students might debate that any personal information obtained without permission is an invasion of privacy. Students might indicate that Web sites should post a notice on their site that information is being gathered and how it will be used. Students could also discuss that personal computers should be maintained and regularly updated to ensure privacy. Some ideas to protect personal privacy could include using firewalls, and updating virus protection and spyware programs. Personal privacy protection is a first-line defense against invasion of privacy! Students could search the Internet to learn about ethical approaches to gathering information on the Web and discuss specific cases they find.

4. Social Security Database

The U.S. Social Security Administration (SSA) maintains a large database containing a great deal of information on the personal income of individuals. The information in this database could be easily sorted and categorized by attributes such as geographic location and age. This information would be of great value to marketing professionals for targeting marketing programs to consumers. Currently, the SSA is prohibited from selling this information to third parties. However, the SSA and other government agencies face increasing pressure to find ways to generate revenue or decrease expenses.

a. Do you favor a change in the laws that would permit the SSA to sell names and addresses with household income information to third parties? Why or why not?

b. Would it be acceptable for the SSA to sell income information to marketing firms if it did not include personal information, but only included income statistics for certain geographic areas? How is this better (or worse) than selling personal information?

Students should realize that the SSA gathers considerable data about income and other personal information. Selling this information could create the potential for identity theft and intrusion of personal privacy. Students might also want to visit the SSA Web site to read the policies about using the site, the Freedom of Information Act, and related privacy laws.

Students should also be aware of the potential for violation of privacy even if specific personal information is not provided. For example, in the wrong hands, information about income statistics for certain geographic areas could cause crime sprees in those areas. This example might be only the beginning of data sharing, and could end up with devastating results.

Students might agree that the SSA should retain its role of collecting retirement taxes and the provision of old-age pensions only, and not become involved in marketing third-party financial products. If the SSA became involved with financial product development and sales, smaller businesses might suffer.