BIS 245 Final Exam
BIS 245 Final Exam
Question 1
(CO 1) A foreign key is
a value that can connect two tables simultaneously.
a unique value
... [Show More] that identifies each row within a table.
another name for a candidate key.
a field in one table that is also the primary key of another table.
Question 2
(CO 1) In what situation would Excel be a better choice than Access?
You have a limited amount of data or must do a complicated calculation.
You have an extensive amount of data.
You need to maintain constant connectivity to an external database.
You require a relational view of your data.
Question 3
(CO 1) The navigation pane allows you to
open tables.
open views.
filter by datatype.
filter by group and navigate to category.
Question 4
(CO 1) Filters are used to do all of the following except
a filter can be removed by selecting remove filter from the sort & filter group.
all records in a table will be displayed if all of the filters are removed.
filter effects are cumulative.
it does not matter whether you apply a filter or a sort first.
Question 5
(CO 1) Which one of the following report sections appear once on every report page?
Report header section
Report footer section
Page footer section
Detail section
Question 6
(CO 2) A table is also recognized as a(n)
cardinality.
domain.
entity.red
key.
Question 7
(CO 2) A symbol used in ER diagrams for an entity is a
box.
diamond.
line.
triangle.
Question 8
(CO 3) All of the following are reasons to save first name and last name as separate fields except
fewer fields are used.
first name could be used in a salutation.
last name could be used in a salutation.
you can sort on last name then first name.
Question 9
(CO 3) A functional dependency is
a logical relationship between attributes of a table.
a logical primary key.
a composite key.
a unique identifier.
Question 10
(CO 3) Which of the following is NOT true of indexed property?
An example of a setting is yes (no duplicates).
Indexing a table speeds the retrieval time.
Primary keys must be indexed.
Setting the index requires each record to be scanned sequentially and saves time searching data.
Question 11
(CO 4) Which of the following does NOT describe the following description of a one-to-one relationship?
Description:
Image Description: There are two tables. Table number 1 is named Employees and has a primary key of EmpID with fields: LastName, FirstName, and Salary. Table number 2 is named NewEmployees and has a primary key of EmpID with fields of LastName, FirstName, and Hiring Expenses. The two tables are related with a line. The line has no symbols.
The tables must have exactly the same fields.
The Employees and New Employees tables use the same primary key.
More tables can be joined to either table.
It may be used for security reasons to protect data availability.
Question 12
(CO 5) To edit a form, use
datasheet view.
wizard view.
layout view.
design view.
Question 13
(CO 5) The following are form creation tools except
blank form.
form design.
form layout.
form wizard.
Question 14
(CO 6) Queries are objects in a database based on one or more underlying
forms.
modules.
tables.
macros.
Question 15
(CO 6) After running a query, which view will be shown?
Datasheet
Design
Query
Result
Question 16
(CO 9) A deletion anomaly is
deleting facts about one entity successfully.
deleting a table.
deleting facts about one entity and deleting facts about another entity.
deleting only one fact from a column.
Question 17
(CO 2) Which of the following statements best describes data mining?
It is the determining of future volume of sales.
It is the predicting of future customer buying behavior.
It is identifying patterns or relationships through a process of analyzing large quantities of data.
It is tracking customer purchasing behavior.
Question 18
(CO 8) All of the following describe how a Navigation Form is used except
click the create tab and then navigation in the forms group to create a navigation form.
is another term for a specific report.
helps users open forms and reports.
has the look and feel of a web form.
Question 19
(CO 9) An encrypted file is
created by scrambling the content.
protected by a password.
saved with a specific file extension.
unreadable if it is opened through a tampering tool or another program.
Question 20
(CO 9) Database security is a specialty within computer security that protects a database application from unintended use. Unintended use includes
unauthorized viewing of data.
inadvertent mistakes made by employees.
malicious attacks.
All of the above
Question 21
(CO 10) The table analyzer tool does this for your database.
Will not improve the database
Make suggestions to create another report
Make suggestions to minimize duplication of data
Make suggestions to create another query
Question 22
(CO 4) Which of the following is NOT true of a ship date field?
A ship date is considered a constant.
A ship date would be defined as a date/time field.
A ship date would be defined as a calculated field.
Date arithmetic can be applied to a ship date field.
Question 23
(CO 1) Designing a database often involves obtaining different perspectives from various sources to gather information. Discuss the importance of end-user interviews in the data requirements gathering process.
Your Answer:
Data modeling helps to understand the information requirements. Data modeling differs according to the type of thebusiness, because the business processes or each sector is different, and it needs to be identified in the modeling stage. Initial step is the analyzing the situation, gather data. Data modeling process starts with requirement gatherings. When developing the proper data model it is important to communicate with the stakeholders about the requirements. Data modeling is the act of exploring data oriented structures. This can be used for variety of purposes. One of the important functions of data modeling is that, it helps to understand the information requirements. Especially this makes both developers and end users lives easier. As mentioned above, data modeling helps the end users to define their requirements,and the developers are able to develop a system to meet those specified requirements.
Interviews can be an important part of the data requirements gathering process. Database designers, business analysts, or systems analysts will often work with users to help them articulate the nature of the data they want to capture, as well as the forms and reports the users need from the database. These interviews may also suggest entities and columns that belong in the database design. See the Week 1 Supplemental Reading: Database Design Fundamentals and Data Requirements Gathering.
Question 24
(CO 2) What does it mean to store data in its smallest parts, and why is this important?
Your Answer:
Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical or silicon-based storage media. Storage is a key component of digital devices, as consumers and businesses have come to rely on it to preserve information ranging from personal photos to business-critical information. Storage is frequently used to describe the devices and data connected to the computer through input/output (I/O) operations, including hard disks, flash devices, tape systems and other media types. This is important as it provides more flexibility for retrieving and sorting records.
Storing data in its smallest parts means that we have to break up the data into its components. For example, if we want to store the name of a customer, we would not want to store the whole name as a single field. Instead we would want to break this up in to fields for both first name and last name. This is important as it provides more flexibility for retrieving and sorting records.
Question 25
(CO 4) Describe the update problem caused by a denormalized design.
Your Answer:
Denormalized designs are caused by mistakenly combining multiple entities into a single table. Denormalized designs, by contrast, do contain duplicate data. Duplicate data is the undesirable consequence of the denormalized designs. Duplicate data invited data integrity errors. It can also prevent records from being inserted under certain conditions. If denormalized designs are created by merging two or more tables together into a single table, the resulting duplicate data creates insert, update, and delete problems. The insert problem is caused because all the records must have a primary key set before it can be saved and stored.
In a denormalized design, an update anomaly may take place when data to update is stored in many places and not all of the updates take place. For example, if the student record information provided at registration is repeated with each class, we may wish to update the student's e-mail address. However, we find that it needs to be updated for not only every class enrolled but for each class ever taken in order to make sure that someone doesn't use an out-of-date e-mail address to send notification that a student loan has come through, the account is on hold, and so forth. Trying to find all the places to make updates is one of the problems with having duplicate data (a result of a denormalized database whether by design or accident).
Question 26
(CO 4) Explain 1NF, 2NF, and 3NF as related to database design.
Your Answer:
1NF: The entity contains single values only and each record can be identified by a primary key.
2NF: Foreign keys are used to build relationships that remove repeating subsets of data.
3NF: All attributes that are not dependent upon the primary key are removed.
1NF: The entity contains single values only, and each record can be identified by a primary key.
2NF: Foreign keys are used to build relationships that remove repeating subsets of data.
3NF: All attributes that are not dependent upon the primary key are removed. [Show Less]