ANSWERS ALL CORRECT
What are examples of business-critical integrity constraints - Answer--Systems will not
allow shipping a product to a customer who does not have an address
-systems will not allow an entry for an order for a nonexistent customer
-systems will not allow returns of fresh produce after 15 days past delivery
What would be considered part of the timely characteristic of high quality information -
Answer-- is the customer address current
- is the information updated weekly or hourly
- is the information current with respect to business needs
What would be considered part of the accurate characteristic of high quality information
- Answer--does the name and the phone values have the exact same information
- is the email address invalid
- is the name spelled correctly
In the relational database model, what is a person, place, thing, transaction, or event
about which information is stored - Answer-entity
Why do relational database use primary keys and foreign keys - Answer-to create
logical relationships
What is the primary difference between an entity and an attribute - Answer-an entity is a
table that stores information about people, places, or events, where as an attribute is a
column or specific field of the data elements associated with an entity
What type of keys do you need to use to create a relational database model - Answer-
relational keys and DBMS keys
What is the role of a foreign key - Answer-it is a primary key of one table that appears
as an attribute in another table and acts to provide a logical relationship between the
two tables
(t/f) counterfeit software is the unauthorized use, duplication, or sale of copyright
software - Answer-true
, (t/f) prated software that is manufactured to look like the real thing and sold as such -
Answer-false
(t/f) copyright is an exclusive right to make, use, and sell an invention and is granted by
a government to the inventor - Answer-true
what is the difference between pirated and counterfeit software - Answer-pirated is the
unauthorized use, duplication, distribution, or sale of copyrighted software, where
counterfeit is software that is manufactured to look like the real thing and sold as much
which of the following include the three section titles of an MIS infrastructure - Answer-
information MIS, agile MIS, and sustainable MIS infrastructure
which characteristics support an agile MIS infracture - Answer-accessibility, availably,
maintainable, portability, reliability, scalability, usability
Francis works in the human resource division of a large oil and gas company in Texas.
His tasks include maintaining payroll and vacation records, employment histories, and
benefit information along with ensuring the security of all sensitive employee
information. Which MIS infrastructure is most important to Francis - Answer-information
MIS infracture
which of the following describe the difference between a backup plan and a recovery
plan - Answer-backup is an exact copy of a system's information, where recovery is the
ability to get a system up and running in the event of a system crash or failure
What is a effect a company could experience because of a disaster such as a fire, flood,
or hurricane - Answer--disrupting communication
-halting transportation
-damaging physical infrastructures
Shawn works at the local electrical company which provides electric to the entire city of
Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise
architect on the night shift, Shawn has been asked to suggest ways the company can
protect its information MIS infrastructure. Shawn notices that the company does not
have the ability for its systems to respond to unexpected failures or crashes and there is
not a backup system that can automatically take over without loss of serve to Boise
residents. What should Shawn recommend his company implement? - Answer-fault
tolerance
(t/f) Transactional information is used when performing operational tasks and repetitive
decisions such as analyzing daily sales reports and production schedules to determine
how much inventory to carry - Answer-true