Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

BISM7206

Information Retrieval and Management

Semester 1, 2023

QUESTION 1

tools focus on the strategic and tactical use of information.

a.Relational database management

b. Networking

c.Business intelligence

d. Business

QUESTION 2

In star schema representation, a fact table is related to each dimension table in a relationship.

a. many-to-many (M:M)

b. many-to-one (M:1)

c. one-to many (1:M)

d. one-to-one (1:1)

QUESTION 3

In business intelligence framework, data are captured from an operational database and placed in   .

a. data warehouse

b. relational database

c. dashboard

d. decision support system

QUESTION 4

In the context of Big Data, which of the following "Vs" refers to the speed at which data is entering the system?

a. variety

b. velocity

c. veracity

d. volume

QUESTION 5

uses statistical tools to answer questions about future data occurrences.

a. Data mining

b. Explanatory analytics

c.Predictive analytics

d. Knowledge acquisition

QUESTION 6

Descriptive, predictive, and prescriptive are the four main types of analytics.

a. adaptive

b. decisive

c.diagnostic

d. comparative

QUESTION 7

According to the rules of precedence, which of the following computations should be completed first?

a. Performing multiplications and divisions

b. Performing power operations

c. Performing additions and subtractions

d. Performing operations within parentheses

QUESTION 8

The special operator used to check whether a subquery returns any rows is         .

a. EXISTS

b. LIKE

c.BETWEEN

d. IN

QUESTION 9

The SQL command that allows a user to list the contents of a table is .

a. COMMIT

b. SELECT

c. UPDATE

d. INSERT

QUESTION 10

A lets a single SQL statement access the data that are to be processed by a single remote database processor.

a. distributed request

b. distributed transaction

c. remote transaction

d. remote request

QUESTION 11

fragmentation refers to the division of a relation into attribute subsets.

a. Mixed

b. Data

c. Vertical

d. Horizontal

QUESTION 12

Which of the following is a file that automatically records a brief description of the database operations performed by all users?

a. database log

b. digital footprint

c.audit log

d. change tracker

QUESTION 13

A trigger can be used as a security measure in which of the following ways?

a. To check for viruses

b. To execute a special procedure

c.To control error handling

d. To control database transactions

QUESTION 14

In the context of security controls, what technique is used to determine whether a user is who he or she claims to be?

a. Authorization

b. Authentication

c.Encryption

d. Confidentiality

QUESTION 15

requires that all operations of a transaction be completed.

a. Time stamping

b. Atomicity

c.Durability

d. Specificity

QUESTION 16

A single-user database system automatically ensures _____ of the database, because only one transaction is executed at a time.

a. atmocity and isolation

b. serializability and isolation

c. atomicity and serializability

d. serializability and durability

QUESTION 17

Briefly answer the following questions about database design methodologies:

a. Identify two approaches or methods used to ensure that the user transactions are supported by the logical data model?

b. Why is the validation of user transactions required in the logical database design methodology when these transactions have already been validated in the conceptual database design methodology?

c. Briefly explain what is meant by “user transaction”?

d. Give an example of a possible user transaction for a product inventory system?

QUESTION 18

One of the important objectives of database design is to create a well-structured database whereby the end-users are confident the data they retrieve is high-quality and fit-for-purpose. In this context, answer the following questions:

a. List three characteristics of data quality that are fundamental to the successful retrieval of information from an organisation’s database. List each characteristic on a new line using dot-points.

b. Using dot-points, list two concepts or processes that can be applied during the design of a database to maintain some measure of control over theintegrity of the database.

QUESTION 19

Examining the relationship between attributes in a relation is a technique used to avoid both data redundancy and update anomalies.

a. What is the name of the concept that describes the relationship between attributes?

b. What term is used for the process of breaking a larger relation down into smaller relations?

c. List two properties that must be maintained in the process of breaking a larger relation down into smaller relations.