Lecturer : Mr. Tri Djoko Wahjono, Ir., M.Sc
Name : Agatha Virgitia Darmawan
Student ID : 1701338122
True/False
Mark T for True and F for
False.
__T__
1. Data is a collection of unprocessed
items, which can include text, numbers, images,
audio, and video. (514)
__T__ 2. A database management system allows users to create forms and reports from the
data in the database. (515)
__F__ 3. A range check ensures users enter only numeric data in a field. (523)
__T__ 4. A check digit often confirms the accuracy of a primary key value. (523)
__F__ 5. Databases require less memory, storage, and processing power than a file processing
system. (526)
__F__ 6. A report is a window on the screen that provides areas for entering or modifying
data in a database. (530)
__T__ 7. Continuous backup is a backup plan in which all data is backed up whenever a change
is made. (532)
__T__ 8. A relationship is a link within the data in a database. (533)
__F__ 9. Normalization is a process designed to ensure the data within the relations (tables) is
duplicated so that it is not lost. (534)
__T__ 10. The data in a distributed database exists in many separate locations throughout a
network or the Internet. (536)
audio, and video. (514)
__T__ 2. A database management system allows users to create forms and reports from the
data in the database. (515)
__F__ 3. A range check ensures users enter only numeric data in a field. (523)
__T__ 4. A check digit often confirms the accuracy of a primary key value. (523)
__F__ 5. Databases require less memory, storage, and processing power than a file processing
system. (526)
__F__ 6. A report is a window on the screen that provides areas for entering or modifying
data in a database. (530)
__T__ 7. Continuous backup is a backup plan in which all data is backed up whenever a change
is made. (532)
__T__ 8. A relationship is a link within the data in a database. (533)
__F__ 9. Normalization is a process designed to ensure the data within the relations (tables) is
duplicated so that it is not lost. (534)
__T__ 10. The data in a distributed database exists in many separate locations throughout a
network or the Internet. (536)
Multiple Choice
Select the best answer.
1.
_____ information has an age suited to its use. (516)
(a.)
Organized (b.) Timely (c.) Cost-effective (d.) Verifiable
Answer : (b.)
2. In some tables, the primary key consists of
multiple fields, called a _____. (519)
(a.)
composite key (b.) secondary key (c.) key field (d.) column
Answer : (a.)
3. _____ procedures include adding records to,
modifying records in, and deleting records from a file. (520)
(a.)
Backup (b.) Range
check (c.) Validation (d.) File
maintenance
Answer : (d.)
4. A range check _____. (523)
(a.)
ensures that users enter only alphabetic data into a field
(b.)
determines whether a number is within a specified range
(c.)
ensures that users enter only numeric data into a field
(d.)
v erifies that a required field contains data
Answer : (b.)
5. All of the following are strengths of the
database approach, except _____. (525)
(a.)
less complexity (b.) improved data
integrity (c.) easier access
(d.)
reduced development time
Answer : (a.)
6. Because the _____ contains details about
data, some call it metadata (meta means more comprehensive). (528)
(a.)
data mart (b.) data
dictionary (c.)
data modeler (d.) data
warehouse
Answer : (b.)
7. Many organizations adopt the _____ policy,
where users’ access privileges are limited to the lowest level necessary to
perform required tasks. (531)
(a.)
golden rule (b.) principle
of least privilege (c.) principle of
highest access (d.) least order
Answer
: (b.)
8. The database analyst (DA) _____. (538)
(a.)
decides on the proper placement of fields
(b.)
creates and maintains the data dictionary
(c.)
monitors the performance of the database
(d.)
checks backup and recovery procedures
Answer
: (a.)
Matching Match
__E___ 1. field name (518)
e. uniquely identifies each field
__G___ 2. field size (518)
__G___ 2. field size (518)
g. defines the maximum number of characters a field can
contain
__C___ 3. data type (518)
__C___ 3. data type (518)
c. specifies the kind of data a field can contain and how
the field is used
__B___ 4. primary key (519)
__B___ 4. primary key (519)
b. field that uniquely identifies each record in a file
__J___ 5. query language (528)
__J___ 5. query language (528)
j.
consists of simple, English-like statements that allow users to specify the
data to display, print, or store
__A___ 6. log (532)
data to display, print, or store
__A___ 6. log (532)
a.
listing of activities that modify the contents of a database
__I___ 7. recovery utility (532)
__I___ 7. recovery utility (532)
i.
uses the logs and/or backups to restore a database when it becomes
damaged or destroyed
__D___ 8. GIS (534)
damaged or destroyed
__D___ 8. GIS (534)
d.
database that stores maps and other geographic data
__H___ 9. data modeler (538)
__H___ 9. data modeler (538)
h.
person who focuses on the meaning and usage of data
__F___ 10. database administrator (538)
__F___ 10. database administrator (538)
f.
creates and maintains the data dictionary, manages security of the database,
monitors the performance of the database, and checks backup and recovery
procedures
monitors the performance of the database, and checks backup and recovery
procedures
Short Answer
Write a brief answer to each of the following questions.
1. What is
validation?
Validation is the process of comparing data with a set of
rules or values to find out if the data is correct.
What are five types
of validity checks ?
Alphabetic checks, numeric checks, range checks, consistency
checks, completeness checks.
2. Why is data redundancy a weakness of file processing systems?
In data redundancy each department or area in an
organization has its own files in a file processing system, by duplicating data
it wastes resources such as storage space and people’s time, also data redundancy
can increase the chance of error.
Why is isolated data
a weakness of file processing systems?
Isolated data often it is difficult to access data stored in
separate files in different department. Sharing data from multiple, separate
files to generate such a list in a file processing system often is a
complicated procedure and usually requires the experience of a computer
programmer.
3. What is the database approach?
3. What is the database approach?
Database approach : programs and user share the data in the
database.
Describe five
strengths of the database approach :
• Reduces
Data Redundancy, most data items are stored in only one file, which greatly
reduces duplicated data.
•Improved data
integrity, when user modify data in the database, they make change to one file
instead of multiple files.
•Shared data, the data
in a database environment belongs to and is shared, usually over a network, by the
entire organization.
•Easier Access, the
database approach allows nontechnical users to access and maintain data,
providing they have the necessary privileges.
•Reduces Development Time, it often is
easier and faster to develop programs that use the database approach.
4. Describe how you might use a Simple Query Wizard.
First, select the fields from the Available Fields list you
want to be displayed in the resulting query.
Second, assign a name to the query, so that you can open it
later.
Third, view the query result on the screen.
What is query by example?
Query by example is a feature that has a graphical user
interface to assist users with retrieving data.
5. What are the advantages of object-oriented databases?
5. What are the advantages of object-oriented databases?
They can store more type of data, access this data faster,
and allow programmers to reuse object.
Describe four
examples of object-oriented databases.
•A multimedia database
stores images, audio clips, and/or video clips, for example, a GIS database •stores maps and other geographic data.
•A groupware database
stores documents such as schedules, calendars, manuals, memos, and reports.
•A computer-aided
design database stores data about engineering, architectural, and scientific
design.
•A hypertext database
contains text links to other types of documents. A hypermedia database
contains, text, graphic, video, and sound.
No comments:
Post a Comment