BISM7206 Information Retrieval and Management Semester 1, 2023
Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit
BISM7206
Information Retrieval and Management
Semester 1, 2023
QUESTION 1
tools focus on the strategic and tactical use of information.
a.Relational database management
b. Networking
c.Business intelligence
d. Business
QUESTION 2
In star schema representation, a fact table is related to each dimension table in a relationship.
a. many-to-many (M:M)
b. many-to-one (M:1)
c. one-to many (1:M)
d. one-to-one (1:1)
QUESTION 3
In business intelligence framework, data are captured from an operational database and placed in .
a. data warehouse
b. relational database
c. dashboard
d. decision support system
QUESTION 4
In the context of Big Data, which of the following "Vs" refers to the speed at which data is entering the system?
a. variety
b. velocity
c. veracity
d. volume
QUESTION 5
uses statistical tools to answer questions about future data occurrences.
a. Data mining
b. Explanatory analytics
c.Predictive analytics
d. Knowledge acquisition
QUESTION 6
Descriptive, predictive, and prescriptive are the four main types of analytics.
a. adaptive
b. decisive
c.diagnostic
d. comparative
QUESTION 7
According to the rules of precedence, which of the following computations should be completed first?
a. Performing multiplications and divisions
b. Performing power operations
c. Performing additions and subtractions
d. Performing operations within parentheses
QUESTION 8
The special operator used to check whether a subquery returns any rows is .
a. EXISTS
b. LIKE
c.BETWEEN
d. IN
QUESTION 9
The SQL command that allows a user to list the contents of a table is .
a. COMMIT
b. SELECT
c. UPDATE
d. INSERT
QUESTION 10
A lets a single SQL statement access the data that are to be processed by a single remote database processor.
a. distributed request
b. distributed transaction
c. remote transaction
d. remote request
QUESTION 11
fragmentation refers to the division of a relation into attribute subsets.
a. Mixed
b. Data
c. Vertical
d. Horizontal
QUESTION 12
Which of the following is a file that automatically records a brief description of the database operations performed by all users?
a. database log
b. digital footprint
c.audit log
d. change tracker
QUESTION 13
A trigger can be used as a security measure in which of the following ways?
a. To check for viruses
b. To execute a special procedure
c.To control error handling
d. To control database transactions
QUESTION 14
In the context of security controls, what technique is used to determine whether a user is who he or she claims to be?
a. Authorization
b. Authentication
c.Encryption
d. Confidentiality
QUESTION 15
requires that all operations of a transaction be completed.
a. Time stamping
b. Atomicity
c.Durability
d. Specificity
QUESTION 16
A single-user database system automatically ensures _____ of the database, because only one transaction is executed at a time.
a. atmocity and isolation
b. serializability and isolation
c. atomicity and serializability
d. serializability and durability
QUESTION 17
Briefly answer the following questions about database design methodologies:
a. Identify two approaches or methods used to ensure that the user transactions are supported by the logical data model?
b. Why is the validation of user transactions required in the logical database design methodology when these transactions have already been validated in the conceptual database design methodology?
c. Briefly explain what is meant by “user transaction”?
d. Give an example of a possible user transaction for a product inventory system?
QUESTION 18
One of the important objectives of database design is to create a well-structured database whereby the end-users are confident the data they retrieve is high-quality and fit-for-purpose. In this context, answer the following questions:
a. List three characteristics of data quality that are fundamental to the successful retrieval of information from an organisation’s database. List each characteristic on a new line using dot-points.
b. Using dot-points, list two concepts or processes that can be applied during the design of a database to maintain some measure of control over theintegrity of the database.
QUESTION 19
Examining the relationship between attributes in a relation is a technique used to avoid both data redundancy and update anomalies.
a. What is the name of the concept that describes the relationship between attributes?
b. What term is used for the process of breaking a larger relation down into smaller relations?
c. List two properties that must be maintained in the process of breaking a larger relation down into smaller relations.
2023-11-13