The database approach to data management is sometimes called the flat file approach.
F
The two fundamental components of data structures are organization and access method
T
When a large portion of the file is to be processed in one operation such as payroll, sequential data structures are an inefficient method of organizing a file.
F
An advantage of using an indexed random file structure is that records are easily added and deleted.
T
The hierarchical database model forces users to navigate between data elements using predefined structured paths.
T
A network model does not allow children files to have multiple parent files.
F
The physical database is an abstract representation of the database
F
A customer name and an unpaid balance is an example of a one-to-many relationship.
F
In the relational model, a data element is called a relation
F
Data normalization groups data attributes into tables in accordance with specific design objectives.
T
Under the database approach, data is viewded as proprietry or owned by owners
F
VSAM file structures are most effective where rapid access to individual records is a priority need
F
A join builds a new table by creating links
F
The deletion anomaly is the least important of the problems affecting unnormalized databases.
F
EAM’s allow auditors to identify significant transactions for substantive testing.
T
Generalized audit software packages are used to assist the auditor in performing substantive tests.
T
GAS can be used with simple data structures but not complex structures.
F
Logical database design is the foundation of the conceptual design
F
An entity is any physical thing about which the organization wishes to capture data.
F
An ER diagram is a graphical representation of a data model
T
The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.
F
Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.
T
A table in third normal form is free of partial dependencies, multiple dependencies, and transitive dependencies.
F
Improperly normalized databases are associated with three types of anomalies: the update anomaly, the insertion anomaly, and the deletion anomaly.
T