Monday, December 09, 2013

Assignment Chapter 10 Part II

Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc

Name : Agatha Virgitia Darmawan

Student ID : 1701338122


True/False
Mark T for True and F for False.

__T__  1. Data is a collection of unprocessed items, which can include text, numbers, images,
                    audio, and video. (514)
__T__ 2. A database management system allows users to create forms and reports from the
                    data in the database. (515)
__F__ 3. A range check ensures users enter only numeric data in a field. (523)
__T__ 4. A check digit often confirms the accuracy of a primary key value. (523)
__F__ 5. Databases require less memory, storage, and processing power than a file processing
                    system. (526)
__F__ 6. A report is a window on the screen that provides areas for entering or modifying
                    data in a database. (530)
__T__ 7. Continuous backup is a backup plan in which all data is backed up whenever a change
                    is made. (532)
__T__ 8. A relationship is a link within the data in a database. (533)
__F__ 9. Normalization is a process designed to ensure the data within the relations (tables) is
                    duplicated so that it is not lost. (534)
__T__ 10. The data in a distributed database exists in many separate locations throughout a
                    network or the Internet. (536)
Multiple Choice 
Select the best answer.

1. _____ information has an age suited to its use. (516)
(a.) Organized                   (b.) Timely                          (c.) Cost-effective                           (d.) Verifiable
Answer : (b.)
 2. In some tables, the primary key consists of multiple fields, called a _____. (519)
(a.) composite key          (b.) secondary key          (c.) key field                                       (d.) column
Answer : (a.)
 3. _____ procedures include adding records to, modifying records in, and deleting records from a file. (520)
(a.) Backup                         (b.) Range check              (c.) Validation                                    (d.) File maintenance
Answer : (d.)
 4. A range check _____. (523)
(a.) ensures that users enter only alphabetic data into a field
(b.) determines whether a number is within a specified range
(c.) ensures that users enter only numeric data into a field
(d.) v erifies that a required field contains data
Answer : (b.)
 5. All of the following are strengths of the database approach, except _____. (525)
(a.) less complexity         (b.) improved data integrity        (c.) easier access             
(d.) reduced development time
Answer : (a.)
 6. Because the _____ contains details about data, some call it metadata (meta means more comprehensive). (528)
(a.) data mart                    (b.) data dictionary                          (c.) data modeler             (d.) data warehouse
Answer : (b.)
 7. Many organizations adopt the _____ policy, where users’ access privileges are limited to the lowest level necessary to perform required tasks. (531)
(a.) golden rule                 (b.) principle of least privilege    (c.) principle of highest access    (d.) least order
Answer : (b.)
 8. The database analyst (DA) _____. (538)
(a.) decides on the proper placement of fields
(b.) creates and maintains the data dictionary
(c.) monitors the performance of the database
(d.) checks backup and recovery procedures
Answer : (a.)
Matching Match 

__E___ 1. field name (518)
e. uniquely identifies each field
__G___ 2. field size (518)
g. defines the maximum number of characters a field can contain
__C___ 3. data type (518)
c. specifies the kind of data a field can contain and how the field is used
__B___ 4. primary key (519)
b. field that uniquely identifies each record in a file
__J___ 5. query language (528)
j. consists of simple, English-like statements that allow users to specify the
   data to display, print, or store
__A___ 6. log (532)
a. listing of activities that modify the contents of a database
__I___ 7. recovery utility (532)
i. uses the logs and/or backups to restore a database when it becomes
   damaged or destroyed
__D___ 8. GIS (534)
d. database that stores maps and other geographic data
__H___ 9. data modeler (538)
h. person who focuses on the meaning and usage of data
__F___ 10. database administrator (538)
f. creates and maintains the data dictionary, manages security of the database,
   monitors the performance of the database, and checks backup and recovery
   procedures

Short Answer
Write a brief answer to each of the following questions.

1. What is validation?

Validation is the process of comparing data with a set of rules or values to find out if the data is correct.

What are five types of validity checks ?

Alphabetic checks, numeric checks, range checks, consistency checks, completeness checks.

2. Why is data redundancy a weakness of file processing systems?

In data redundancy each department or area in an organization has its own files in a file processing system, by duplicating data it wastes resources such as storage space and people’s time, also data redundancy can increase the chance of error.

Why is isolated data a weakness of file processing systems?

Isolated data often it is difficult to access data stored in separate files in different department. Sharing data from multiple, separate files to generate such a list in a file processing system often is a complicated procedure and usually requires the experience of a computer programmer.

3. What is the database approach?

Database approach : programs and user share the data in the database.

Describe five strengths of the database approach :

• Reduces Data Redundancy, most data items are stored in only one file, which greatly reduces duplicated data.
•Improved data integrity, when user modify data in the database, they make change to one file instead of multiple files.
•Shared data, the data in a database environment belongs to and is shared, usually over a network, by the entire organization.
•Easier Access, the database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges.
•Reduces Development Time, it often is easier and faster to develop programs that use the database approach.

4. Describe how you might use a Simple Query Wizard.

First, select the fields from the Available Fields list you want to be displayed in the resulting query.
Second, assign a name to the query, so that you can open it later.
Third, view the query result on the screen.

What is query by example?

Query by example is a feature that has a graphical user interface to assist users with retrieving data.

5. What are the advantages of object-oriented databases?

They can store more type of data, access this data faster, and allow programmers to reuse object.

Describe four examples of object-oriented databases.

•A multimedia database stores images, audio clips, and/or video clips, for example, a GIS database •stores maps and other geographic data.
•A groupware database stores documents such as schedules, calendars, manuals, memos, and reports.
•A computer-aided design database stores data about engineering, architectural, and scientific design.

•A hypertext database contains text links to other types of documents. A hypermedia database contains, text, graphic, video, and sound.

No comments:

Post a Comment