Information Management - Database Design
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a primary function of a Database Management System (DBMS)?

  • Design the organization’s business structure
  • Create the Database (correct)
  • Monitor employee performance
  • Install the hardware components
  • Business rules must be incorporated into the physical database design.

    False

    What is a distributed database design?

    A design where portions of the database may reside in different physical locations.

    Data Model Verification is verified against proposed system __________.

    <p>processes</p> Signup and view all the answers

    What is a module in the context of information systems?

    <p>A component that handles specific functions</p> Signup and view all the answers

    Authorization rules control access to data and actions on data.

    <p>True</p> Signup and view all the answers

    Triggers prevent inappropriate actions and invoke __________ procedures.

    <p>special handling</p> Signup and view all the answers

    Match the following components with their descriptions:

    <p>Database Fragment = Subset of a database stored in different locations Virtualization = Logical representations of computing resources Testing and Evaluation = Parallel process to application programming Entity Attributes = Detailed description of entities in the design</p> Signup and view all the answers

    What is the overall purpose of the database initial study?

    <p>To analyze company situation and define objectives</p> Signup and view all the answers

    The designer's view focuses on how data is seen as information.

    <p>False</p> Signup and view all the answers

    What are the two views of data within a system?

    <p>Business view and Designer’s view</p> Signup and view all the answers

    What does the 'A' in the ACID properties of transactions stand for?

    <p>Atomicity</p> Signup and view all the answers

    Loss of data integrity can result from unauthorized changes to the database.

    <p>True</p> Signup and view all the answers

    The Database Design phase requires understanding data character_______ to build the database model.

    <p>istics</p> Signup and view all the answers

    Match the following steps with their descriptions in the database design process:

    <p>Data Analysis = Discover data element characteristics Entity Relationship Modeling = Create relationships between entities Normalization = Organize data to reduce redundancy Documentation = Detailing design specifications</p> Signup and view all the answers

    What are the four ACID properties of a transaction?

    <p>Atomicity, Consistency, Isolation, Durability</p> Signup and view all the answers

    Which of the following is NOT a part of periodic maintenance?

    <p>Database implementation</p> Signup and view all the answers

    A _______ occurs when two or more transactions are waiting on each other to release resources.

    <p>deadlock</p> Signup and view all the answers

    Match the following terms with their descriptions:

    <p>Encryption = Protects data from unauthorized access Backup = Creates copies of data for recovery Journalizing = Records all transactions for integrity Checkpoints = Saves the state of a database periodically</p> Signup and view all the answers

    The database design process is considered a one-time task.

    <p>False</p> Signup and view all the answers

    Which of these integrity controls helps enforce conditions on the database?

    <p>Assertions</p> Signup and view all the answers

    What does the implementation and loading phase require an understanding of?

    <p>The company's data</p> Signup and view all the answers

    What is the first line of defense in data security?

    <p>Passwords</p> Signup and view all the answers

    Data should not be changed frequently for better security.

    <p>False</p> Signup and view all the answers

    Views provide complete access to the underlying data tables.

    <p>False</p> Signup and view all the answers

    Name one method used to protect data from unauthorized access.

    <p>Encryption</p> Signup and view all the answers

    What does 'data availability' refer to?

    <p>Timeliness and reliability of access to and use of data</p> Signup and view all the answers

    Two-factor authentication often involves a smart card and a ______.

    <p>PIN</p> Signup and view all the answers

    Which of the following is NOT a characteristic of strong password creation?

    <p>Includes complete words</p> Signup and view all the answers

    Match the following data recovery features with their descriptions:

    <p>Back-up Facilities = Produces a backup copy of the database Journalizing Facilities = Creates an audit trail of transactions Integrity Controls = Ensures accuracy and consistency of data Views or Subschemas = Restricts access to specific portions of the database</p> Signup and view all the answers

    Accidental losses can be attributed to ______.

    <p>Human Error</p> Signup and view all the answers

    Data security becomes easier with Internet access.

    <p>False</p> Signup and view all the answers

    Which of the following components is NOT part of an Information System?

    <p>Weather Data</p> Signup and view all the answers

    What is the first phase of the Database Life Cycle?

    <p>Database initial study</p> Signup and view all the answers

    Systems Development refers to the process of creating an information system.

    <p>True</p> Signup and view all the answers

    Full backup, differential backup, and transaction log backup are types of maintenance performed during the operational phase.

    <p>False</p> Signup and view all the answers

    What is the primary purpose of the Application phase in Information System development?

    <p>To transform data into information for decision making.</p> Signup and view all the answers

    The process that establishes the need for an information system is called __________.

    <p>Systems Analysis</p> Signup and view all the answers

    Name one method that can be employed to address problems that surface during the operational phase.

    <p>Load-balancing software</p> Signup and view all the answers

    Match the phase of Information System development with its description:

    <p>Planning = Assessment of flow-and-extent requirements Analysis = Thorough audit of user requirements Application = Transforming data into information Development = Creating the information system</p> Signup and view all the answers

    The _____ phase of the Database Life Cycle involves the generation of database documentation.

    <p>Maintenance and evolution</p> Signup and view all the answers

    What is a common output of the Application phase?

    <p>Formal Reports</p> Signup and view all the answers

    Which type of maintenance is primarily aimed at preventing issues before they occur?

    <p>Preventive maintenance</p> Signup and view all the answers

    The planning phase involves the examination of existing hardware and software systems.

    <p>False</p> Signup and view all the answers

    Match the backup type with its description:

    <p>Full backup = A complete copy of the entire database Differential backup = A backup of all changes made since the last full backup Transaction log backup = A record of all transactions made to the database Incremental backup = A backup of changes made since the last backup of any kind</p> Signup and view all the answers

    What are the two main decisions analyzed in the Planning phase regarding the existing system?

    <p>Whether to continue or modify the existing system.</p> Signup and view all the answers

    Once a database has passed the evaluation stage, it is considered operational.

    <p>True</p> Signup and view all the answers

    What is the role of foreign key rules within database integrity?

    <p>To enforce referential integrity among tables</p> Signup and view all the answers

    Study Notes

    Information Management - Database Design

    • Information Systems: Comprises people, hardware, software, databases, application programs, and procedures. Provides data collection, storage, and retrieval
    • Systems Analysis: Determines the need and scope of an information system
    • Systems Development: The process of creating an information system. Includes steps such as planning, analysis, detailed design, implementation, and maintenance.
    • Application: Transforms data into a format usable for decision-making. Often outputs include formal reports, tables, and graphical displays.
    • Planning: Assessing existing system requirements, determining if it should be modified, replaced, or continued. This phase also includes studying and identifying possible solutions, considering technical and operational aspects of hardware and software.
    • Analysis: In-depth review of problems found during the planning phase, thorough audit of user requirements, and analysis of existing hardware/software. Aids understanding of the existing system's functionality, areas for improvement, and opportunities.
    • Detailed Systems Design: Completes system design, incorporating specifications for processes and system conversion. Includes planning training, and approval from management.
    • Implementation: Installation of hardware, database management system (DBMS) software, and application programs. Includes coding, testing, debugging, customizing the database, and creating necessary tables and user authorizations.
    • Maintenance: Involves corrective, adaptive, and perfective maintenance activities.

    The Database Life Cycle (DBLC)

    • Initial Study: Analyses company situation, constraints, objectives, and scope definition.
    • Database Design: Selection of DBMS software. Creation of conceptual, logical, and physical database designs; database environment installation.
    • Implementation & Loading: Creation and loading of the database; testing.
    • Testing & Evaluation: Database and associated programs are fine-tuned and evaluated for functionality and performance.
    • Operation: Producing necessary information flows.
    • Maintenance & Evolution: Integrating changes and enhancements.

    Database Design - Specific Concepts

    • Data Analysis & Requirements: Identifying characteristics and sources of data; understanding data types; considering business rules and operational descriptions.
    • Entity Relationship Modeling: Modeling and normalization; standards, symbols, documentation, layout in design.
    • Data Security: Protects against accidental or intentional data loss or damage; includes data encryption, authentication, and access control schemes; considerations for protecting data in distributed environments.
    • Recovery Facilities: Backups (full, differential, transaction log), journaling, transaction integrity (ACID properties).
    • Data Availability: Timeliness and reliability of access and use of data.
    • Data Recovery: Ensuring that data loss can be corrected; and minimizing downtime in the event of data loss.
    • Distributed Database Design: Database fragments housed at separate physical locations, with distributed data access processes. Data Security - Data security in a distributed database environment, considering location, users, and security protocols.
    • Views & Integrity Controls: Subset of the database presented to users; data domains and assertions to protect data from unauthorized access.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts in Information Management, focusing on Database Design. It includes areas like systems analysis, development, and application processes. Test your understanding of how information systems function to support data collection, storage, and retrieval.

    More Like This

    Use Quizgecko on...
    Browser
    Browser